Yingpu Deng

According to our database1, Yingpu Deng authored at least 29 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
On Some Computational Problems in Local Fields.
J. Syst. Sci. Complex., 2022

2021
Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves.
J. Math. Cryptol., 2021

Public-key Cryptosystems and Signature Schemes from p-adic Lattices.
IACR Cryptol. ePrint Arch., 2021

2018
On Some Computational Problems in Local Fields.
IACR Cryptol. ePrint Arch., 2018

2017
Nonexistence of two classes of generalized bent functions.
Des. Codes Cryptogr., 2017

2016
The Sum of Binomial Coefficients and Integer Factorization.
Integers, 2016

2015
New results on nonexistence of generalized bent functions.
Des. Codes Cryptogr., 2015

2014
Strong pseudoprimes to the first eight prime bases.
Math. Comput., 2014

Deterministic polynomial-time test for prime ideals in a Dedekind domain with finite rank.
CoRR, 2014

A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Results on permutation symmetric Boolean functions.
J. Syst. Sci. Complex., 2013

2012
An algorithm for factoring integers.
IACR Cryptol. ePrint Arch., 2012

Boolean functions optimizing most of the cryptographic criteria.
Discret. Appl. Math., 2012

An Algebraic Broadcast Attack against NTRU.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem.
IEEE Trans. Inf. Theory, 2011

A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity.
Des. Codes Cryptogr., 2011

A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

2010
Boolean functions with all main cryptographic properties.
IACR Cryptol. ePrint Arch., 2010

A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity.
IACR Cryptol. ePrint Arch., 2010

A Broadcast Attack against NTRU Using Ding's Algorithm.
IACR Cryptol. ePrint Arch., 2010

2009
A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity.
IACR Cryptol. ePrint Arch., 2009

A New Lattice-Based Cryptosystem Mixed with a Knapsack.
IACR Cryptol. ePrint Arch., 2009

Covering Radius of Two-dimensional Lattices.
IACR Cryptol. ePrint Arch., 2009

2008
Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem.
IACR Cryptol. ePrint Arch., 2008

Counting isomorphism classes of pointed hyperelliptic curves of genus 4 over finite fields with odd characteristic.
Eur. J. Comb., 2008

2007
Algebraic Immunity Hierarchy of Boolean Functions.
IACR Cryptol. ePrint Arch., 2007

2006
Isomorphism classes of hyperelliptic curves of genus 3 over finite fields.
Finite Fields Their Appl., 2006

A class of combinatorial identities.
Discret. Math., 2006


  Loading...