


default search action
Xiyong Zhang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Yuxuan Zhang, Hua Guo, Chen Chen, Yewei Guan, Xiyong Zhang, Zhenyu Guan:
Efficient and Flexible Differet-Radix Montgomery Modular Multiplication for Hardware Implementation. CoRR abs/2407.12701 (2024) - 2023
- [j19]Yuanchao Ding, Hua Guo, Yewei Guan, Hutao Song, Xiyong Zhang, Jianwei Liu:
Some New Methods to Generate Short Addition Chains. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 270-285 (2023) - [c7]Hua Guo, Shuo Wang
, Hutao Song, Yiran Han, Xiyong Zhang, Jianwei Liu:
A New Method of Construction of Permutation Trinomials with Coefficients 1. BigDataSecurity/HPSC/IDS 2023: 40-44 - [i5]Yuanchao Ding, Hua Guo, Yewei Guan, Weixin Liu, Jiarong Huo, Zhenyu Guan, Xiyong Zhang:
East: Efficient and Accurate Secure Transformer Framework for Inference. CoRR abs/2308.09923 (2023) - 2022
- [i4]Yuanchao Ding, Hua Guo, Yewei Guan, Hutao Song, Xiyong Zhang:
Some New Methods to Generate Short Addition Chains. CoRR abs/2207.13276 (2022) - 2021
- [i3]Hua Guo, Shuo Wang, Hutao Song, Xiyong Zhang, Jianwei Liu:
A New Method of Construction of Permutation Trinomials with Coefficients 1. CoRR abs/2112.14547 (2021) - 2020
- [j18]Yun Chen, Yanyi Xu, Qian Lin, Xiyong Zhang
:
Model and criteria on the global finite-time synchronization of the chaotic gyrostat systems. Math. Comput. Simul. 178: 515-533 (2020)
2010 – 2019
- 2019
- [j17]Hua Guo, Ya Gao, Tongge Xu, Xiyong Zhang, Jianfeng Ye:
A secure and efficient three-factor multi-gateway authentication protocol for wireless sensor networks. Ad Hoc Networks 95 (2019) - 2017
- [j16]Xiwang Cao, Wun-Seng Chou, Xiyong Zhang:
More constructions of near optimal codebooks associated with binary sequences. Adv. Math. Commun. 11(1): 187-202 (2017) - 2016
- [j15]Hua Guo, Yandong Zheng, Xiyong Zhang, Zhoujun Li:
Exponential Arithmetic Based Self-Healing Group Key Distribution Scheme with Backward Secrecy under the Resource-Constrained Wireless Networks. Sensors 16(5): 609 (2016) - 2015
- [j14]Xiyong Zhang, Weiwei Huang, Quanmei Chu, Wenbao Han:
Trace self-orthogonal relations of normal bases. Finite Fields Their Appl. 35: 284-317 (2015) - 2014
- [j13]Xiyong Zhang, Rongquan Feng, Qunying Liao, Xuhong Gao:
Finding normal bases over finite fields with prescribed trace self-orthogonal relations. Finite Fields Their Appl. 28: 1-21 (2014) - 2013
- [i2]Xiyong Zhang, Guangpu Gao:
On the conjecture about the nonexistence of rotation symmetric bent functions. CoRR abs/1303.2282 (2013) - 2012
- [j12]Xiyong Zhang, Xiwang Cao, Rongquan Feng:
A method of evaluation of exponential sum of binary quadratic functions. Finite Fields Their Appl. 18(6): 1089-1103 (2012) - [j11]Guangpu Gao, Xiyong Zhang, Wenfen Liu
, Claude Carlet:
Constructions of Quadratic and Cubic Rotation Symmetric Bent Functions. IEEE Trans. Inf. Theory 58(7): 4908-4913 (2012) - 2011
- [j10]Hua Guo, Yi Mu, Zhoujun Li, Xiyong Zhang:
An efficient and non-interactive hierarchical key agreement protocol. Comput. Secur. 30(1): 28-34 (2011) - [j9]Xiyong Zhang, Hua Guo, Rongquan Feng, Yifa Li:
Proof of a conjecture about rotation symmetric functions. Discret. Math. 311(14): 1281-1289 (2011) - [j8]Xiyong Zhang, Hua Guo, Zongsheng Gao:
Characterizations of Bent and Almost Bent Function on \mathbbZp2. Graphs Comb. 27(4): 603-620 (2011) - [j7]Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang:
Provably secure identity-based authenticated key agreement protocols with malicious private key generators. Inf. Sci. 181(3): 628-647 (2011) - [j6]Guangpu Gao, Wenfen Liu
, Xiyong Zhang:
The Degree of Balanced Elementary Symmetric Boolean Functions of bf 4k+bf 3 Variables. IEEE Trans. Inf. Theory 57(7): 4822-4825 (2011) - [j5]Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Authenticated key exchange protocol with selectable identities. Wirel. Commun. Mob. Comput. 11(2): 226-239 (2011) - 2010
- [j4]Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Enhanced McCullagh-Barreto identity-based key exchange protocols with master key forward security. Int. J. Secur. Networks 5(2/3): 173-187 (2010) - [i1]Xiyong Zhang, Hua Guo, Yifa Li:
Proof of a Conjecture about Rotation Symmetric Functions. CoRR abs/1001.2942 (2010)
2000 – 2009
- 2009
- [c6]Hua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li:
An Efficient Certificateless Encryption Scheme in the Standard Model. NSS 2009: 302-309 - [c5]Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Server-Controlled Identity-Based Authenticated Key Exchange. ProvSec 2009: 214-229 - [c4]Hua Guo, Yi Mu, Xiyong Zhang, Zhoujun Li:
Novel and Efficient Identity-Based Authenticated Key Agreement Protocols from Weil Pairings. UIC 2009: 310-324 - 2008
- [j3]Xiyong Zhang, Hua Guo:
On perfect nonlinear functions (Pi). Appl. Algebra Eng. Commun. Comput. 19(4): 293-309 (2008) - [j2]Hua Guo, Zhoujun Li, Yi Mu, Xiyong Zhang:
Cryptanalysis of simple three-party key exchange protocol. Comput. Secur. 27(1-2): 16-21 (2008) - [c3]Zhoujun Li, Hua Guo, Xiyong Zhang:
fficient and Provably Secure Generic Construction of Client-to-Client Password-Based Key Exchange Protocol. FICS 2008: 257-268 - 2007
- [j1]Shuqin Fan, Wenbao Han, Keqin Feng, Xiyong Zhang:
Primitive normal polynomials with the first two coefficients prescribed: A revised p-adic method. Finite Fields Their Appl. 13(3): 577-604 (2007) - 2006
- [c2]Xiyong Zhang, Hua Guo, Jinjiang Yuan:
A Note of Perfect Nonlinear Functions. CANS 2006: 259-269 - [c1]Xiyong Zhang, Hua Guo, Wenbao Han:
Nonexistence of a Kind of Generalized Perfect Binary Array. SETA 2006: 304-312
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint