default search action
Baofeng Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Shiqi Hou, Baofeng Wu, Shichang Wang, Hao Guo, Dongdai Lin:
Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros. Comput. J. 67(4): 1483-1500 (2024) - [j24]Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, Takanori Isobe:
Revisiting the Boomerang Attack From a Perspective of 3-Differential. IEEE Trans. Inf. Theory 70(7): 5343-5357 (2024) - 2023
- [j23]Yaqi Xu, Baofeng Wu, Dongdai Lin:
New Strategies To Improve Differential-Linear Attacks With Applications To Chaskey. Comput. J. 66(9): 2279-2295 (2023) - [j22]Zhengnan Li, Baofeng Wu, Dongdai Lin:
Algebraic-Differential Attacks on a Family of Arithmetization-Oriented Symmetric Ciphers. J. Syst. Sci. Complex. 36(6): 2681-2702 (2023) - [j21]Luyao Xu, Zhengyi Dai, Baofeng Wu, Dongdai Lin:
Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 568-586 (2023) - [c13]Jianhua Wang, Lu Qin, Baofeng Wu:
Correlation Cube Attack Revisited - Improved Cube Search and Superpoly Recovery Techniques. ASIACRYPT (3) 2023: 190-222 - [i18]Jianhua Wang, Lu Qin, Baofeng Wu:
Correlation Cube Attack Revisited: Improved Cube Search and Superpoly Recovery Techniques. IACR Cryptol. ePrint Arch. 2023: 1408 (2023) - [i17]Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman, Takanori Isobe:
Revisiting the Boomerang Attack from a Perspective of 3-differential. IACR Cryptol. ePrint Arch. 2023: 1689 (2023) - 2022
- [c12]Chenmeng Li, Baofeng Wu, Dongdai Lin:
Generalized Boomerang Connectivity Table and Improved Cryptanalysis of GIFT. Inscrypt 2022: 213-233 - [i16]Jianhua Wang, Baofeng Wu, Zhuojun Liu:
Improved Degree Evaluation and Superpoly Recovery methods with Application to Trivium. CoRR abs/2201.06394 (2022) - [i15]Haiwen Qin, Baofeng Wu:
Towards non-independence of modular additions in searching differential trails of ARX ciphers: new automatic methods with application to SPECK and Chaskey. CoRR abs/2203.09741 (2022) - 2021
- [j20]Peikang Zhang, Baofeng Wu, Changxiang He:
Balancedness and spectra of signed graphs obtained by $$\dot{H}$$-join operation. Comput. Appl. Math. 40(3) (2021) - [j19]Xuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin:
Searching for impossible subspace trails and improved impossible differential characteristics for SIMON-like block ciphers. Cybersecur. 4(1): 17 (2021) - [c11]Yaqi Xu, Baofeng Wu, Dongdai Lin:
Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX Ciphers with Applications to Chaskey. ICICS (2) 2021: 192-209 - [i14]Baofeng Wu:
Proof of a conjecture on a special class of matrices over commutative rings of characteristic 2. CoRR abs/2112.13340 (2021) - [i13]Baofeng Wu:
Proof of a conjecture on a special class of matrices over commutative rings of characteristic 2. IACR Cryptol. ePrint Arch. 2021: 1689 (2021) - [i12]Yaqi Xu, Baofeng Wu, Dongdai Lin:
Rotational-Linear Attack: A New Framework of Cryptanalysis on ARX ciphers with Applications to Chaskey. IACR Cryptol. ePrint Arch. 2021: 1690 (2021) - 2020
- [j18]Changxiang He, Weilong Liu, Baofeng Wu, Zhensheng Yu, Min Chang:
Minimum fundamental cycle basis of some bipartite graphs. AKCE Int. J. Graphs Comb. 17(1): 587-591 (2020)
2010 – 2019
- 2019
- [j17]Libo Wang, Baofeng Wu, Xiaoqiang Yue, Yanbin Zheng:
Further results on permutation trinomials with Niho exponents. Cryptogr. Commun. 11(5): 1057-1068 (2019) - [j16]Zhuojun Liu, Baofeng Wu:
Recent Results on Constructing Boolean Functions with (Potentially) Optimal Algebraic Immunity Based on Decompositions of Finite Fields. J. Syst. Sci. Complex. 32(1): 356-374 (2019) - 2018
- [j15]Libo Wang, Baofeng Wu, Zhuojun Liu, Dongdai Lin:
Three new infinite families of bent functions. Sci. China Inf. Sci. 61(3): 032104:1-032104:14 (2018) - [j14]Libo Wang, Baofeng Wu:
General constructions of permutation polynomials of the form (x2m+x+δ)i(2m-1)+1+x over F22m. Finite Fields Their Appl. 52: 137-155 (2018) - [j13]Sihem Mesnager, Chunming Tang, Yanfeng Qi, Libo Wang, Baofeng Wu, Keqin Feng:
Further Results on Generalized Bent Functions and Their Complete Characterization. IEEE Trans. Inf. Theory 64(7): 5441-5452 (2018) - [c10]Xuzi Wang, Baofeng Wu, Lin Hou, Dongdai Lin:
Automatic Search for Related-Key Differential Trails in SIMON-like Block Ciphers Based on MILP. ISC 2018: 116-131 - [c9]Qiuping Li, Baofeng Wu, Zhuojun Liu:
Lightweight Recursive MDS Matrices with Generalized Feistel Network. IWSEC 2018: 262-278 - [c8]Qiuping Li, Baofeng Wu, Zhuojun Liu:
Direct Constructions of (Involutory) MDS Matrices from Block Vandermonde and Cauchy-Like Matrices. WAIFI 2018: 275-290 - 2017
- [j12]Libo Wang, Baofeng Wu, Zhuojun Liu:
Further results on permutation polynomials of the form (xpm-x+δ)s+L(x) over Fp2m. Finite Fields Their Appl. 44: 92-112 (2017) - [j11]Shihui Fu, Xiutao Feng, Baofeng Wu:
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies. IACR Trans. Symmetric Cryptol. 2017(2): 228-249 (2017) - [c7]Fujun Bai, Baoyu Xiong, Xiaofei Xue, Weizhe Song, Baofeng Wu, Ni Fu, Bing Yu, Huifu Duan, Xiaowei Han, Alessandro Minzoni, Qiwei Ren:
A two-port SRAM using a single-port cell array with a self-timed write-after-read control scheme to save 47% area & 63% standby power. ASICON 2017: 426-428 - [i11]Libo Wang, Baofeng Wu:
A general construction of permutation polynomials of the form (x2m+x+δ)i(2m-1)+1+x over F22m. CoRR abs/1712.08066 (2017) - [i10]Shihui Fu, Xiutao Feng, Baofeng Wu:
Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies. IACR Cryptol. ePrint Arch. 2017: 449 (2017) - 2016
- [j10]Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
Construction of MDS block diffusion matrices for block ciphers and hash functions. Sci. China Inf. Sci. 59(9): 99101 (2016) - [j9]Xiaoming Zhang, Baofeng Wu, Zhuojun Liu:
Dembowski-Ostrom polynomials from reversed Dickson polynomials. J. Syst. Sci. Complex. 29(1): 259-271 (2016) - [c6]Wentan Yi, Baofeng Wu, Shaozhen Chen, Dongdai Lin:
Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher. Inscrypt 2016: 33-46 - [i9]Ruoxin Zhao, Baofeng Wu, Rui Zhang, Qian Zhang:
Designing Optimal Implementations of Linear Layers (Full Version). IACR Cryptol. ePrint Arch. 2016: 1118 (2016) - 2015
- [j8]Baofeng Wu, Dongdai Lin:
On constructing complete permutation polynomials over finite fields of even characteristic. Discret. Appl. Math. 184: 213-222 (2015) - [j7]Qingfang Jin, Zhuojun Liu, Baofeng Wu, Xiaoming Zhang:
A combinatorial condition and Boolean functions with optimal algebraic immunity. J. Syst. Sci. Complex. 28(3): 725-742 (2015) - [c5]Baofeng Wu, Jia Zheng, Dongdai Lin:
Constructing Boolean functions with (potentially) optimal algebraic immunity based on multiplicative decompositions of finite fields. ISIT 2015: 491-495 - [c4]Baofeng Wu, Dongdai Lin:
On the dual of generalized Boolean bent functions over ℤ4. ISIT 2015: 506-510 - [i8]Ruoxin Zhao, Rui Zhang, Yongqiang Li, Baofeng Wu:
On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions. IACR Cryptol. ePrint Arch. 2015: 449 (2015) - 2014
- [j6]Baofeng Wu:
The compositional inverse of a class of linearized permutation polynomials over 𝔽2n, n odd. Finite Fields Their Appl. 29: 34-48 (2014) - [j5]Jia Zheng, Baofeng Wu, Yufu Chen, Zhuojun Liu:
Constructing 2M-variable Boolean Functionswith Optimal Algebraic Immunity Based on Polar Decomposition of. Int. J. Found. Comput. Sci. 25(5): 537-552 (2014) - [j4]Baofeng Wu, Zhuojun Liu, Qingfang Jin, Xiaoming Zhang:
A note on two classes of Boolean functions with optimal algebraic immunity. J. Syst. Sci. Complex. 27(4): 785-794 (2014) - [c3]Baofeng Wu, Qingfang Jin, Zhuojun Liu, Dongdai Lin:
Constructing Boolean functions with potentially optimal algebraic immunity based on additive decompositions of finite fields (extended abstract). ISIT 2014: 1361-1365 - [c2]Baofeng Wu:
New classes of quadratic bent functions in polynomial forms. ISIT 2014: 1832-1836 - [i7]Baofeng Wu, Qingfang Jin, Zhuojun Liu, Dongdai Lin:
Constructing Boolean Functions With Potential Optimal Algebraic Immunity Based on Additive Decompositions of Finite Fields. CoRR abs/1401.6604 (2014) - 2013
- [j3]Baofeng Wu, Zhuojun Liu:
Linearized polynomials over finite fields revisited. Finite Fields Their Appl. 22: 79-100 (2013) - [j2]Baofeng Wu, Zhuojun Liu:
The compositional inverse of a class of bilinear permutation polynomials over finite fields of characteristic 2. Finite Fields Their Appl. 24: 136-147 (2013) - [i6]Jia Zheng, Baofeng Wu, Yufu Chen, Zhuojun Liu:
Constructing $2m$-variable Boolean functions with optimal algebraic immunity based on polar decomposition of $\mathbb{F}_{2^{2m}}^*$. CoRR abs/1304.2946 (2013) - [i5]Baofeng Wu, Jia Zheng:
A remark on algebraic immunity of Boolean functions. CoRR abs/1305.5919 (2013) - [i4]Baofeng Wu, Dongdai Lin:
New constructions of quaternary bent functions. CoRR abs/1309.0199 (2013) - 2012
- [c1]Xiaoming Zhang, Baofeng Wu, Qingfang Jin, Zhuojun Liu:
Constructing Generalized Bent Functions from Trace Forms of Galois Rings. ASCM 2012: 467-477 - 2011
- [i3]Baofeng Wu, Kai Zhou, Zhuojun Liu:
A new proof to the complexity of the dual basis of a type I optimal normal basis. CoRR abs/1112.3153 (2011) - [i2]Qingfang Jin, Zhuojun Liu, Baofeng Wu, Xiaoming Zhang:
A general conjecture similar to T-D conjecture and its applications in constructing Boolean functions with optimal algebraic immunity. IACR Cryptol. ePrint Arch. 2011: 515 (2011) - [i1]Qingfang Jin, Zhuojun Liu, Baofeng Wu:
1-Resilient Boolean Function with Optimal Algebraic Immunity. IACR Cryptol. ePrint Arch. 2011: 549 (2011)
2000 – 2009
- 2007
- [j1]Zhensheng Yu, Weiguo Zhang, Baofeng Wu:
Strong global convergence of an adaptive nonmonotone memory gradient method. Appl. Math. Comput. 185(1): 681-688 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-02 19:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint