default search action
Longjiang Qu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j100]Sha Jiang, Mu Yuan, Kangquan Li, Longjiang Qu:
New constructions of permutation polynomials of the form x+γTrqq2(h(x)) over finite fields with even characteristic. Finite Fields Their Appl. 101: 102522 (2025) - 2024
- [j99]Conghui Xie, Hao Chen, Longjiang Qu, Ling Liu:
New dimension-independent upper bounds on linear insdel codes. Adv. Math. Commun. 18(6): 1575-1589 (2024) - [j98]Longjiang Qu, Kangquan Li:
Constructing permutation polynomials over Fq3 from bijections of PG(2,q). Finite Fields Their Appl. 95: 102364 (2024) - [j97]Guanju Xiao, Zijian Zhou, Longjiang Qu:
Oriented supersingular elliptic curves and Eichler orders of prime level. Finite Fields Their Appl. 100: 102501 (2024) - [j96]Jiao Du, Ziwei Zhao, Shaojing Fu, Longjiang Qu, Chao Li:
Constructions of 2-Correlation Immune Rotation Symmetric Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(8): 1241-1246 (2024) - [j95]Renjie Jin, Longjiang Qu, Rongmao Chen, Zhichao Yang, Yi Wang:
A lattice-based forward secure IBE scheme for Internet of things. Inf. Sci. 660: 120083 (2024) - [j94]Minghao Sun, Shixiong Wang, Hao Chen, Longjiang Qu:
A New Random Sampling Method and Its Application in Improving Progressive BKZ Algorithm. J. Syst. Sci. Complex. 37(5): 2262-2292 (2024) - [j93]Jiao Du, Lin Li, Shaojing Fu, Longjiang Qu, Chao Li:
Constructions of 2-resilient rotation symmetric Boolean functions with odd number of variables. Theor. Comput. Sci. 991: 114429 (2024) - [j92]Hao Chen, Longjiang Qu, Chengju Li, Shanxiang Lyu, Liqing Xu, Mingshuo Zhou:
Generalized Singleton Type Upper Bounds. IEEE Trans. Inf. Theory 70(5): 3298-3308 (2024) - [c12]Bing Sun, Zejun Xiang, Zhengyi Dai, Guoqiang Liu, Xuan Shen, Longjiang Qu, Shaojing Fu:
Feistel-Like Structures Revisited: Classification and Cryptanalysis. CRYPTO (4) 2024: 275-304 - [i36]Yunwen Chi, Kangquan Li, Longjiang Qu:
Constructing rotatable permutations of F2m3 with 3-homogeneous functions. CoRR abs/2401.17094 (2024) - 2023
- [j91]Tailin Niu, Kangquan Li, Longjiang Qu, Chao Li:
Characterizations and constructions of n-to-1 mappings over finite fields. Finite Fields Their Appl. 85: 102126 (2023) - [j90]Tailin Niu, Kangquan Li, Longjiang Qu, Bing Sun:
More constructions of n-cycle permutations. Finite Fields Their Appl. 88: 102187 (2023) - [j89]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
Further investigations on permutation based constructions of bent functions. J. Comb. Theory A 199: 105779 (2023) - [j88]Zhichao Yang, Debiao He, Longjiang Qu, Qing Ye:
An Efficient Identity-Based Encryption With Equality Test in Cloud Computing. IEEE Trans. Cloud Comput. 11(3): 2983-2992 (2023) - [j87]Zhichao Yang, Debiao He, Longjiang Qu, Jianqiao Xu:
On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme. IEEE Trans. Dependable Secur. Comput. 20(5): 4441-4442 (2023) - 2022
- [j86]Shanding Xu, Longjiang Qu, Xiwang Cao:
Three classes of partitioned difference families and their optimal constant composition codes. Adv. Math. Commun. 16(3): 465-483 (2022) - [j85]Kangquan Li, Hao Chen, Longjiang Qu:
Generalized hamming weights of linear codes from cryptographic functions. Adv. Math. Commun. 16(4): 859-877 (2022) - [j84]Sha Jiang, Kangquan Li, Yubo Li, Longjiang Qu:
Differential and boomerang spectrums of some power permutations. Cryptogr. Commun. 14(2): 371-393 (2022) - [j83]Guangkui Xu, Longjiang Qu, Gaojun Luo:
Minimal linear codes from weakly regular bent functions. Cryptogr. Commun. 14(2): 415-431 (2022) - [j82]Jiao Du, Shaojing Fu, Longjiang Qu, Chao Li, Tianyin Wang, Shanqi Pang:
A Novel Construction of 2-Resilient Rotation Symmetric Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(2): 93-99 (2022) - [j81]Renjie Jin, Jinquan Luo, Xiaolei Fang, Longjiang Qu:
New constructions of quantum MDS codes over finite fields. Quantum Inf. Process. 21(12): 395 (2022) - [j80]Jiao Du, Ziyu Chen, Shaojing Fu, Longjiang Qu, Chao Li:
Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix. Theor. Comput. Sci. 919: 80-91 (2022) - [j79]Guangkui Xu, Xiwang Cao, Longjiang Qu:
Infinite Families of 3-Designs and 2-Designs From Almost MDS Codes. IEEE Trans. Inf. Theory 68(7): 4344-4353 (2022) - [j78]Kangquan Li, Yue Zhou, Chunlei Li, Longjiang Qu:
Two New Families of Quadratic APN Functions. IEEE Trans. Inf. Theory 68(7): 4761-4769 (2022) - [i35]Tailin Niu, Kangquan Li, Longjiang Qu, Chao Li:
Characterizations and constructions of n-to-1 mappings over finite fields. CoRR abs/2201.10290 (2022) - [i34]Tailin Niu, Kangquan Li, Longjiang Qu, Bing Sun:
More constructions of n-cycle permutations. CoRR abs/2207.10491 (2022) - [i33]Longjiang Qu, Kangquan Li:
More infinite classes of APN-like Power Functions. CoRR abs/2209.13456 (2022) - 2021
- [j77]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu, Hao Chen:
Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem. Adv. Math. Commun. 15(3): 441-469 (2021) - [j76]Yubo Li, Kangquan Li, Sihem Mesnager, Longjiang Qu:
More permutations and involutions for constructing bent functions. Cryptogr. Commun. 13(3): 459-473 (2021) - [j75]Xi Chen, Longjiang Qu, Shaojing Fu, Chao Li:
The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions. Discret. Appl. Math. 289: 477-491 (2021) - [j74]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
Cryptographically strong permutations from the butterfly structure. Des. Codes Cryptogr. 89(4): 737-761 (2021) - [j73]Qianhong Wan, Longjiang Qu, Chao Li:
On equivalence between known polynomial APN functions and power APN functions. Finite Fields Their Appl. 71: 101762 (2021) - [j72]Kangquan Li, Sihem Mesnager, Longjiang Qu:
Further Study of 2-to-1 Mappings Over F2n. IEEE Trans. Inf. Theory 67(6): 3486-3496 (2021) - [j71]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
Binary Linear Codes With Few Weights From Two-to-One Functions. IEEE Trans. Inf. Theory 67(7): 4263-4275 (2021) - [j70]Tailin Niu, Kangquan Li, Longjiang Qu, Qiang Wang:
Finding Compositional Inverses of Permutations From the AGW Criterion. IEEE Trans. Inf. Theory 67(8): 4975-4985 (2021) - [j69]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
A Complete Characterization of the APN Property of a Class of Quadrinomials. IEEE Trans. Inf. Theory 67(11): 7535-7549 (2021) - [j68]Bing Sun, Kangquan Li, Jian Guo, Longjiang Qu:
New Constructions of Complete Permutations. IEEE Trans. Inf. Theory 67(11): 7561-7567 (2021) - [c11]Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer:
Autocorrelations of Vectorial Boolean Functions. LATINCRYPT 2021: 233-253 - [i32]Kangquan Li, Yue Zhou, Chunlei Li, Longjiang Qu:
Two new infinite classes of APN functions. CoRR abs/2105.08464 (2021) - [i31]Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer:
Autocorrelations of vectorial Boolean functions. IACR Cryptol. ePrint Arch. 2021: 947 (2021) - 2020
- [j67]Guangkui Xu, Longjiang Qu:
Two classes of differentially 4-uniform permutations over 픽2n with n even. Adv. Math. Commun. 14(1): 97-110 (2020) - [j66]Jiao Du, Longjiang Qu, Chao Li, Xin Liao:
Constructing 1-resilient rotation symmetric functions over 픽p with q variables through special orthogonal arrays. Adv. Math. Commun. 14(2): 247-263 (2020) - [j65]Tailin Niu, Kangquan Li, Longjiang Qu, Qiang Wang:
New constructions of involutions over finite fields. Cryptogr. Commun. 12(2): 165-185 (2020) - [j64]Zhichao Yang, Rongmao Chen, Chao Li, Longjiang Qu, Guomin Yang:
On the Security of LWE Cryptosystem against Subversion Attacks. Comput. J. 63(4): 495-507 (2020) - [j63]Yubo Li, Zhichao Yang, Kangquan Li, Longjiang Qu:
A new algorithm on the minimal rational fraction representation of feedback with carry shift registers. Des. Codes Cryptogr. 88(3): 533-552 (2020) - [j62]Kangquan Li, Longjiang Qu, Yue Zhou:
A link between two classes of permutation polynomials. Finite Fields Their Appl. 63: 101641 (2020) - [j61]Guangkui Xu, Longjiang Qu, Xiwang Cao:
Minimal linear codes from Maiorana-McFarland functions. Finite Fields Their Appl. 65: 101688 (2020) - [j60]Kangquan Li, Longjiang Qu, Chao Li, Hao Chen:
On a conjecture about a class of permutation quadrinomials. Finite Fields Their Appl. 66: 101690 (2020) - [j59]Tailin Niu, Xi Chen, Longjiang Qu, Chao Li:
A New Construction of (m+k, m)-Functions with Low Differential Uniformity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(6): 850-855 (2020) - [i30]Tailin Niu, Kangquan Li, Longjiang Qu, Qiang Wang:
A general method for finding the compositional inverses of permutations from the AGW criterion. CoRR abs/2004.12552 (2020) - [i29]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
Binary linear codes with few weights from two-to-one functions. CoRR abs/2006.12395 (2020) - [i28]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
A complete characterization of the APN property of a class of quadrinomials. CoRR abs/2007.03996 (2020) - [i27]Yubo Li, Kangquan Li, Longjiang Qu:
On two conjectures about the intersection distribution. CoRR abs/2010.00312 (2020) - [i26]Qianhong Wan, Longjiang Qu, Chao Li:
On equivalence between known polynomial APN functions and power APN functions. IACR Cryptol. ePrint Arch. 2020: 363 (2020)
2010 – 2019
- 2019
- [j58]Shixiong Wang, Longjiang Qu, Chao Li, Huaxiong Wang:
Further improvement of factoring N = pr qs with partial known bits. Adv. Math. Commun. 13(1): 121-135 (2019) - [j57]Kangquan Li, Longjiang Qu, Qiang Wang:
Compositional inverses of permutation polynomials of the form x r h(x s ) over finite fields. Cryptogr. Commun. 11(2): 279-298 (2019) - [j56]Claude Carlet, Xi Chen, Longjiang Qu:
Constructing infinite families of low differential uniformity (n, m)-functions with m > n / 2. Des. Codes Cryptogr. 87(7): 1577-1599 (2019) - [j55]Yubo Li, Kangquan Li, Longjiang Qu, Chao Li:
New Classes of Efficient MDS Transformations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(11): 1504-1511 (2019) - [j54]Guangkui Xu, Longjiang Qu:
Three Classes of Minimal Linear Codes Over the Finite Fields of Odd Characteristic. IEEE Trans. Inf. Theory 65(11): 7067-7078 (2019) - [j53]Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:
New Results About the Boomerang Uniformity of Permutation Polynomials. IEEE Trans. Inf. Theory 65(11): 7542-7553 (2019) - [j52]Sihem Mesnager, Longjiang Qu:
On Two-to-One Mappings Over Finite Fields. IEEE Trans. Inf. Theory 65(12): 7884-7895 (2019) - [c10]Kangquan Li, Sihem Mesnager, Longjiang Qu:
Further study of 2-to-1 mappings over F2n. IWSDA 2019: 1-5 - [i25]Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:
New Results about the Boomerang Uniformity of Permutation Polynomials. CoRR abs/1901.10999 (2019) - [i24]Sihem Mesnager, Longjiang Qu:
On two-to-one mappings over finite fields. CoRR abs/1907.01066 (2019) - [i23]Kangquan Li, Chunlei Li, Chao Li, Longjiang Qu:
On the Differential Linear Connectivity Table of Vectorial Boolean Functions. CoRR abs/1907.05986 (2019) - [i22]Anne Canteaut, Lukas Kölsch, Chao Li, Chunlei Li, Kangquan Li, Longjiang Qu, Friedrich Wiemer:
On the Differential-Linear Connectivity Table of Vectorial Boolean Functions. CoRR abs/1908.07445 (2019) - [i21]Kangquan Li, Longjiang Qu, Chao Li, Hao Chen:
On a conjecture about a class of permutation quadrinomials. CoRR abs/1909.08209 (2019) - [i20]Kangquan Li, Sihem Mesnager, Longjiang Qu:
Further study of 2-to-1 mappings over F2n. CoRR abs/1910.06654 (2019) - [i19]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
Cryptographically Strong Permutations from the Butterfly Structure. CoRR abs/1912.02640 (2019) - [i18]Kangquan Li, Longjiang Qu, Bing Sun, Chao Li:
New Results about the Boomerang Uniformity of Permutation Polynomials. IACR Cryptol. ePrint Arch. 2019: 79 (2019) - 2018
- [j51]Yunwen Liu, Longjiang Qu, Chao Li:
New constructions of systematic authentication codes from three classes of cyclic codes. Adv. Math. Commun. 12(1): 1-16 (2018) - [j50]Kangquan Li, Longjiang Qu, Xi Chen, Chao Li:
Permutation polynomials of the form cx + Trql/q(xa) and permutation trinomials over finite fields with even characteristic. Cryptogr. Commun. 10(3): 531-554 (2018) - [j49]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
A better bound for implicit factorization problem with shared middle bits. Sci. China Inf. Sci. 61(3): 032109:1-032109:10 (2018) - [j48]Zhichao Yang, Shaojing Fu, Longjiang Qu, Chao Li:
A lower dimension lattice attack on NTRU. Sci. China Inf. Sci. 61(5): 059101:1-059101:3 (2018) - [j47]Kangquan Li, Longjiang Qu, Qiang Wang:
New constructions of permutation polynomials of the form xr h(x q - 1) over 𝔽q2. Des. Codes Cryptogr. 86(10): 2379-2405 (2018) - [j46]Xuan Shen, Guoqiang Liu, Chao Li, Longjiang Qu:
Impossible Differential Cryptanalysis of Fantomas and Robin. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(5): 863-866 (2018) - [i17]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem. IACR Cryptol. ePrint Arch. 2018: 568 (2018) - [i16]Claude Carlet, Xi Chen, Longjiang Qu:
Constructing Infinite Families of Low Differential Uniformity (n, m)-Functions with m>n/2. IACR Cryptol. ePrint Arch. 2018: 1046 (2018) - 2017
- [j45]Yue Zhou, Longjiang Qu:
Constructions of negabent functions over finite fields. Cryptogr. Commun. 9(2): 165-180 (2017) - [j44]Kangquan Li, Longjiang Qu, Xi Chen:
New classes of permutation binomials and permutation trinomials over finite fields. Finite Fields Their Appl. 43: 69-85 (2017) - [j43]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(10): 2113-2122 (2017) - [j42]Xi Chen, Yazhi Deng, Min Zhu, Longjiang Qu:
An equivalent condition on the switching construction of differentially 4-uniform permutations on from the inverse function. Int. J. Comput. Math. 94(6): 1252-1267 (2017) - [i15]Kangquan Li, Longjiang Qu, Qiang Wang:
New Constructions of Permutation Polynomials of the Form $x^rh\left(x^{q-1}\right)$ over $\mathbb{F}_{q^2}$. CoRR abs/1708.01165 (2017) - 2016
- [j41]Jiao Du, Shaojing Fu, Longjiang Qu, Chao Li, Shanqi Pang:
New constructions of q-variable 1-resilient rotation symmetric functions over 𝔽p. Sci. China Inf. Sci. 59(7): 079102:1-079102:3 (2016) - [j40]Longjiang Qu, Yin Tan, Chao Li, Guang Gong:
More constructions of differentially 4-uniform permutations on 𝔽22k. Des. Codes Cryptogr. 78(2): 391-408 (2016) - [j39]Xi Chen, Longjiang Qu, Chao Li, Jiao Du:
A new method to investigate the CCZ-equivalence between functions with low differential uniformity. Finite Fields Their Appl. 42: 165-186 (2016) - [j38]Shaojing Fu, Jiao Du, Longjiang Qu, Chao Li:
Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(4): 853-855 (2016) - [j37]Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li:
New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(8): 1584-1590 (2016) - [j36]Longjiang Qu:
A New Approach to Constructing Quadratic Pseudo-Planar Functions Over F2n. IEEE Trans. Inf. Theory 62(11): 6644-6658 (2016) - [c9]Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen:
New Insights on AES-Like SPN Ciphers. CRYPTO (1) 2016: 605-624 - [i14]Kangquan Li, Longjiang Qu, Chao Li, Shaojing Fu:
New Permutation Trinomials Constructed from Fractional Polynomials. CoRR abs/1605.06216 (2016) - [i13]Longjiang Qu:
A New Approach to Constructing Quadratic Pseudo-Planar Functions over $\gf_{2^n}$. CoRR abs/1609.01178 (2016) - [i12]Bing Sun, Meicheng Liu, Jian Guo, Longjiang Qu, Vincent Rijmen:
New Insights on AES-like SPN Ciphers. IACR Cryptol. ePrint Arch. 2016: 533 (2016) - [i11]Xi Chen, Longjiang Qu, Chao Li, Jiao Du:
A New Method to Investigate the CCZ-Equivalence between Functions with Low Differential Uniformity. IACR Cryptol. ePrint Arch. 2016: 744 (2016) - 2015
- [j35]Hai Xiong, Longjiang Qu, Chao Li:
2-Adic complexity of binary sequences with interleaved structure. Finite Fields Their Appl. 33: 14-28 (2015) - [j34]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
A New Attack on RSA with Known Middle Bits of the Private Key. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(12): 2677-2685 (2015) - [j33]Cunsheng Ding, Longjiang Qu, Qiang Wang, Jin Yuan, Pingzhi Yuan:
Permutation Trinomials Over Finite Fields with Even Characteristic. SIAM J. Discret. Math. 29(1): 79-92 (2015) - [i10]Kangquan Li, Longjiang Qu, Xi Chen:
New Classes of Permutation Binomials and Permutation Trinomials over Finite Fields. CoRR abs/1508.07590 (2015) - 2014
- [j32]Hai Xiong, Longjiang Qu, Chao Li, Ying Li:
Some results on the differential functions over finite fields. Appl. Algebra Eng. Commun. Comput. 25(3): 189-195 (2014) - [j31]Longjiang Qu, Yin Tan, Chao Li:
On the Walsh spectrum of a family of quadratic APN functions with five terms. Sci. China Inf. Sci. 57(2): 1-7 (2014) - [j30]Shaojing Fu, Chao Li, Longjiang Qu:
A recursive construction of highly nonlinear resilient vectorial functions. Inf. Sci. 269: 388-396 (2014) - [j29]Longjiang Qu, Cunsheng Ding:
Dickson Polynomials of the Second Kind that Permute Zm. SIAM J. Discret. Math. 28(2): 722-735 (2014) - [j28]Hai Xiong, Longjiang Qu, Chao Li:
A New Method to Compute the 2-Adic Complexity of Binary Sequences. IEEE Trans. Inf. Theory 60(4): 2399-2406 (2014) - [i9]Cunsheng Ding, Longjiang Qu, Qiang Wang, Jin Yuan, Pingzhi Yuan:
Permutation trinomials over finite fields with even characteristic. CoRR abs/1402.5734 (2014) - [i8]Hai Xiong, Longjiang Qu:
A Note on Cross Correlation Distribution of Ternary m-Sequences. CoRR abs/1408.6311 (2014) - [i7]Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li:
When a Boolean Function can be Expressed as the Sum of two Bent Functions. IACR Cryptol. ePrint Arch. 2014: 48 (2014) - [i6]Xi Chen, Yazhi Deng, Min Zhu, Longjiang Qu:
An Equivalent Condition on the Switching Construction of Differentially 4-uniform Permutations on 𝔽22k from the Inverse Function. IACR Cryptol. ePrint Arch. 2014: 648 (2014) - 2013
- [j27]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity. Sci. China Inf. Sci. 56(3): 1-9 (2013) - [j26]Hai Xiong, Longjiang Qu, Chao Li:
New construction of perfect sequence set and low correlation zone sequence set. Sci. China Inf. Sci. 56(11): 1-8 (2013) - [j25]Longjiang Qu, Hai Xiong, Chao Li:
A negative answer to Bracken-Tan-Tan's problem on differentially 4-uniform permutations over F2n. Finite Fields Their Appl. 24: 55-65 (2013) - [j24]Shaojing Fu, Chao Li, Longjiang Qu:
Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 360-362 (2013) - [j23]Longjiang Qu, Qingping Dai, Chao Li:
On the Balanced Elementary Symmetric Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(2): 663-665 (2013) - [j22]Hai Xiong, Longjiang Qu, Chao Li, Shaojing Fu:
Linear complexity of binary sequences with interleaved structure. IET Commun. 7(15): 1688-1696 (2013) - [j21]Deshuai Dong, Xue Zhang, Longjiang Qu, Shaojing Fu:
A note on vectorial bent functions. Inf. Process. Lett. 113(22-24): 866-870 (2013) - [j20]Deshuai Dong, Longjiang Qu, Shaojing Fu, Chao Li:
New constructions of semi-bent functions in polynomial forms. Math. Comput. Model. 57(5-6): 1139-1147 (2013) - [j19]Yin Tan, Longjiang Qu, San Ling, Chik How Tan:
On the Fourier Spectra of New APN Functions. SIAM J. Discret. Math. 27(2): 791-801 (2013) - [j18]Longjiang Qu, Yin Tan, Chik How Tan, Chao Li:
Constructing Differentially 4-Uniform Permutations Over ${\BBF}_{2^{2k}}$ via the Switching Method. IEEE Trans. Inf. Theory 59(7): 4675-4686 (2013) - [i5]Hai Xiong, Longjiang Qu, Chao Li:
A New Method to Compute the 2-adic Complexity of Binary Sequences. CoRR abs/1309.1625 (2013) - [i4]Longjiang Qu, Yin Tan, Chao Li, Guang Gong:
More Constructions of Differentially 4-uniform Permutations on $\gf_{2^{2k}}$. CoRR abs/1309.7423 (2013) - 2012
- [j17]Shaojing Fu, Kanta Matsuura, Chao Li, Longjiang Qu:
Construction of highly nonlinear resilient S-boxes with given degree. Des. Codes Cryptogr. 64(3): 241-253 (2012) - [j16]San Ling, Longjiang Qu:
A note on linearized polynomials and the dimension of their kernels. Finite Fields Their Appl. 18(1): 56-62 (2012) - [j15]Longjiang Qu, Shaojing Fu, Chunqing Wu:
A Comment on Algebraic Immunity of the Sum of Two Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(7): 1187-1188 (2012) - [j14]Deshuai Dong, Longjiang Qu, Shaojing Fu, Chao Li:
New Constructions of Vectorial Boolean Functions with Good Cryptographic Properties. Int. J. Found. Comput. Sci. 23(3): 749-760 (2012) - [j13]Shaojing Fu, Chao Li, Longjiang Qu, Deshuai Dong:
On the number of rotation symmetric functions over GF(p). Math. Comput. Model. 55(1-2): 142-150 (2012) - [c8]Yin Tan, Longjiang Qu, Chik How Tan, Chao Li:
New Families of Differentially 4-Uniform Permutations over ${\mathbb F}_{2^{2k}}$. SETA 2012: 25-39 - 2011
- [j12]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity. Appl. Math. Lett. 24(12): 2093-2096 (2011) - [j11]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 265-267 (2011) - [j10]Shaojing Fu, Longjiang Qu, Chao Li, Bing Sun:
Balanced rotation symmetric boolean functions with maximum algebraic immunity. IET Inf. Secur. 5(2): 93-99 (2011) - [j9]Shaojing Fu, Bing Sun, Chao Li, Longjiang Qu:
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree. J. Inf. Sci. Eng. 27(6): 1931-1942 (2011) - 2010
- [j8]Shaojing Fu, Chao Li, Longjiang Qu:
On the number of rotation symmetric Boolean functions. Sci. China Inf. Sci. 53(3): 537-545 (2010) - [j7]Bing Sun, Ruilin Li, Longjiang Qu, Chao Li:
SQUARE attack on block ciphers with low algebraic degree. Sci. China Inf. Sci. 53(10): 1988-1995 (2010) - [j6]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Enumeration of balanced symmetric functions over GF(p). Inf. Process. Lett. 110(14-15): 544-548 (2010) - [c7]Ruilin Li, Bing Sun, Chao Li, Longjiang Qu:
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure. ACISP 2010: 1-18
2000 – 2009
- 2009
- [j5]Chao Li, Longjiang Qu, San Ling:
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions. IEEE Trans. Inf. Theory 55(1): 70-82 (2009) - [j4]Longjiang Qu, Keqin Feng, Feng Liu, Lei Wang:
Constructing symmetric boolean functions with maximum algebraic immunity. IEEE Trans. Inf. Theory 55(5): 2406-2412 (2009) - [c6]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. CANS 2009: 402-412 - [c5]Longjiang Qu, Chao Li:
Minimum Distance between Bent and Resilient Boolean Functions. IWCC 2009: 219-232 - [c4]Bing Sun, Longjiang Qu, Chao Li:
New Cryptanalysis of Block Ciphers with Low Algebraic Degree. FSE 2009: 180-192 - [c3]Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li:
A New Construction of Boolean Functions with Maximum Algebraic Immunity. ISC 2009: 177-185 - [c2]Shaojing Fu, Longjiang Qu, Chao Li:
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity. WISA 2009: 109-117 - 2008
- [j3]Longjiang Qu, Chao Li:
On the 2m-variable symmetric Boolean functions with maximum algebraic immunity. Sci. China Ser. F Inf. Sci. 51(2): 120-127 (2008) - [j2]Na Li, Longjiang Qu, Wen-Feng Qi, GuoZhu Feng, Chao Li, DuanQiang Xie:
On the Construction of Boolean Functions With Optimal Algebraic Immunity. IEEE Trans. Inf. Theory 54(3): 1330-1334 (2008) - [i3]Shaojing Fu, Chao Li, Longjiang Qu, Ping Li:
Enumeration of Balanced Symmetric Functions over GF(p). IACR Cryptol. ePrint Arch. 2008: 372 (2008) - 2007
- [j1]Longjiang Qu, Chao Li, Keqin Feng:
A Note on Symmetric Boolean Functions With Maximum Algebraic Immunity in Odd Number of Variables. IEEE Trans. Inf. Theory 53(8): 2908-2910 (2007) - [c1]Longjiang Qu, Chao Li:
Weight Support Technique and the Symmetric Boolean Functions with Maximum Algebraic Immunity on Even Number of Variables. Inscrypt 2007: 271-282 - 2006
- [i2]Duo Lei, Da Lin, Chao Li, Keqin Feng, Longjiang Qu:
The Design Principle of Hash Function with Merkle-Damgård Construction. IACR Cryptol. ePrint Arch. 2006: 135 (2006) - 2005
- [i1]Longjiang Qu, GuoZhu Feng, Chao Li:
On the Boolean functions With Maximum Possible Algebraic Immunity : Construction and A Lower Bound of the Count. IACR Cryptol. ePrint Arch. 2005: 449 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint