


default search action
Qun-Xiong Zheng
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
[j28]Xiao-Xin Zhao
, Zhong-Xiao Wang
, Qun-Xiong Zheng
, Deng Tang
, Wen-Feng Qi
:
On a Type of Linear Structures of NFSR Sequences. IEEE Trans. Inf. Theory 71(1): 768-782 (2025)
[j27]Xiao-Xin Zhao
, Wen-Feng Qi
, Zhong-Xiao Wang
, Qun-Xiong Zheng
, Deng Tang
:
The Decomposition of Cascade Connections of NFSRs: Old and New Results. IEEE Trans. Inf. Theory 71(10): 8029-8047 (2025)- 2024
[j26]Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wen-Feng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
LOL: a highly flexible framework for designing stream ciphers. Sci. China Inf. Sci. 67(9) (2024)
[j25]Hongyu Wang
, Qunxiong Zheng, Wenfeng Qi:
A Fibonacci View on the Galois NFSR Used in Trivium. J. Syst. Sci. Complex. 37(3): 1326-1350 (2024)
[j24]Han-Bing Yu
, Qun-Xiong Zheng
:
Predicting Truncated Galois Linear Feedback Shift Registers. IEEE Trans. Inf. Theory 70(12): 9179-9194 (2024)- 2023
[j23]Han-Bing Yu, Qun-Xiong Zheng
, Yijian Liu
, Jingguo Bi, Yu-Fei Duan, Jing-Wen Xue, You Wu, Yue Cao, Rong Cheng, Lin Wang, Bai-Shun Sun:
An improved method for predicting truncated multiple recursive generators with unknown parameters. Des. Codes Cryptogr. 91(5): 1713-1736 (2023)
[j22]Zhongxiao Wang, Xiaoxin Zhao, Qunxiong Zheng, Xiutao Feng, Zehao Sun:
The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited. Des. Codes Cryptogr. 91(5): 1889-1910 (2023)
[j21]Qiang Li, Qun-Xiong Zheng
, Wenfeng Qi:
Practical attacks on small private exponent RSA: new records and new insights. Des. Codes Cryptogr. 91(12): 4107-4142 (2023)- 2021
[j20]Zhongxiao Wang, Qunxiong Zheng
, Xiao-Xin Zhao, Xiutao Feng:
Grain-like structures with minimal and maximal period sequences. Des. Codes Cryptogr. 89(4): 679-693 (2021)
[j19]Hong-Yu Wang
, Qun-Xiong Zheng
, Zhong-Xiao Wang, Xiao-Xin Zhao, Wen-Feng Qi:
A new result on irreducible NFSRs with respect to cascade connection. Finite Fields Their Appl. 73: 101859 (2021)- 2020
[j18]Zhongxiao Wang, Qunxiong Zheng, Wenfeng Qi:
The cycle structure of NFSR(fd) and its applications. Cryptogr. Commun. 12(2): 233-252 (2020)
[j17]Hong-Yu Sun, Xuan-Yong Zhu, Qun-Xiong Zheng
:
Predicting truncated multiple recursive generators with unknown parameters. Des. Codes Cryptogr. 88(6): 1083-1102 (2020)
[j16]Xiao-Xin Zhao, Qun-Xiong Zheng, Zhong-Xiao Wang, Wen-Feng Qi:
On a class of isomorphic NFSRs. Des. Codes Cryptogr. 88(6): 1205-1226 (2020)
[j15]Hong-Yu Wang
, Qun-Xiong Zheng
, Zhong-Xiao Wang, Wen-Feng Qi:
The minimal polynomials of modified de Bruijn sequences revisited. Finite Fields Their Appl. 68: 101735 (2020)
[j14]Junying Liu, Qunxiong Zheng, Dongdai Lin:
A New Upper Bound on the Order of Affine Sub-families of NFSRs. J. Syst. Sci. Complex. 33(1): 196-214 (2020)- 2019
[j13]Junying Liu, Yupeng Jiang, Qunxiong Zheng
, Dongdai Lin:
A new construction of zero-difference balanced functions and two applications. Des. Codes Cryptogr. 87(10): 2251-2265 (2019)
[j12]Jia-Min Zhang
, Tian Tian
, Wen-Feng Qi
, Qun-Xiong Zheng
:
A New Method for Finding Affine Sub-Families of NFSR Sequences. IEEE Trans. Inf. Theory 65(2): 1249-1257 (2019)- 2018
[j11]Jia-Min Zhang
, Tian Tian
, Wen-Feng Qi
, Qun-Xiong Zheng:
On the Affine Sub-Families of Quadratic NFSRs. IEEE Trans. Inf. Theory 64(4): 2932-2940 (2018)- 2017
[j10]Yupeng Jiang, Qun-Xiong Zheng, Dongdai Lin:
On s-uniform property of compressing sequences derived from primitive sequences modulo odd prime powers. Sci. China Inf. Sci. 60(5): 052102:1-052102:12 (2017)- 2016
[j9]Yuan Cheng, Wen-Feng Qi, Qun-Xiong Zheng, Dong Yang:
On the distinctness of primitive sequences over Z/(p e q) modulo 2. Cryptogr. Commun. 8(3): 371-381 (2016)- 2015
[j8]Dong Yang, Wen-Feng Qi, Qun-Xiong Zheng:
Further results on the distinctness of modulo 2 reductions of primitive sequences over Z/(232-1). Des. Codes Cryptogr. 74(2): 467-480 (2015)- 2014
[j7]Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian:
On the distinctness of modular reductions of primitive sequences over Z/(232-1). Des. Codes Cryptogr. 70(3): 359-368 (2014)- 2013
[j6]Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian:
On the Distinctness of Binary Sequences Derived From Primitive Sequences Modulo Square-Free Odd Integers. IEEE Trans. Inf. Theory 59(1): 680-690 (2013)
[j5]Qun-Xiong Zheng, Wen-Feng Qi:
Further Results on the Distinctness of Binary Sequences Derived From Primitive Sequences Modulo Square-Free Odd Integers. IEEE Trans. Inf. Theory 59(6): 4013-4019 (2013)
[j4]Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian:
Further Result on Distribution Properties of Compressing Sequences Derived From Primitive Sequences Over Z/(pe). IEEE Trans. Inf. Theory 59(8): 5016-5022 (2013)- 2012
[j3]Qunxiong Zheng, Wenfeng Qi, Tian Tian:
On the distinctness of modular reductions of primitive sequences modulo square-free odd integers. Inf. Process. Lett. 112(22): 872-875 (2012)- 2011
[j2]Qun-Xiong Zheng, Wen-Feng Qi:
A new result on the distinctness of primitive sequences over Z/(pq) modulo 2. Finite Fields Their Appl. 17(3): 254-274 (2011)- 2010
[j1]Qun-Xiong Zheng, Wen-Feng Qi:
Distribution properties of compressing sequences derived from primitive sequences over Z/(pe). IEEE Trans. Inf. Theory 56(1): 555-563 (2010)
Conference and Workshop Papers
- 2024
[c3]Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang, Quan-feng Liu, Deng Tang:
A New Security Evaluation Method Based on Resultant for Arithmetic-Oriented Algorithms. ASIACRYPT (7) 2024: 457-489- 2021
[c2]Qun-Xiong Zheng, Yupeng Jiang, Dongdai Lin, Wen-Feng Qi:
Binary Sequences Derived from Monomial Permutation Polynomials over GF(2p). Inscrypt 2021: 371-383- 2018
[c1]Qun-Xiong Zheng, Dongdai Lin, Wen-Feng Qi:
Distribution Properties of Binary Sequences Derived from Primitive Sequences Modulo Square-free Odd Integers. Inscrypt 2018: 568-585
Informal and Other Publications
- 2025
[i9]Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wen-Feng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
SCMAC and LOL2.0: An AEAD Design Framework and A New Version of LOL Stream Cipher Design Framework. IACR Cryptol. ePrint Arch. 2025: 925 (2025)
[i8]Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang:
Algebraic Cryptanalysis of AO Primitives Based on Polynomial Decomposition Applications to Rain and Full AIM-IIIIV. IACR Cryptol. ePrint Arch. 2025: 981 (2025)- 2024
[i7]Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang, Quan-feng Liu, Deng Tang:
A New Security Evaluation Method Based on Resultant for Arithmetic-Oriented Algorithms. IACR Cryptol. ePrint Arch. 2024: 886 (2024)- 2023
[i6]Qiang Li, Qun-Xiong Zheng, Wenfeng Qi:
Practical Attacks on Small Private Exponent RSA: New Records and New Insights. IACR Cryptol. ePrint Arch. 2023: 367 (2023)
[i5]Dengguo Feng, Lin Jiao, Yonglin Hao, Qunxiong Zheng, Wenling Wu, Wenfeng Qi, Lei Zhang, Liting Zhang, Siwei Sun, Tian Tian:
LOL: A Highly Flexible Framework for Designing Stream Ciphers. IACR Cryptol. ePrint Arch. 2023: 1235 (2023)- 2022
[i4]Han-Bing Yu, Qun-Xiong Zheng, Yijian Liu, Jingguo Bi, Yu-Fei Duan, Jing-Wen Xue, You Wu, Yue Cao, Rong Cheng, Lin Wang, Bai-Shun Sun:
An improved method for predicting truncated multiple recursive generators with unknown parameters. IACR Cryptol. ePrint Arch. 2022: 1134 (2022)- 2012
[i3]Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian:
On the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers. IACR Cryptol. ePrint Arch. 2012: 3 (2012)
[i2]Qun-Xiong Zheng, Wen-Feng Qi:
Further results on the distinctness of binary sequences derived from primitive sequences modulo square-free odd integers. IACR Cryptol. ePrint Arch. 2012: 709 (2012)- 2010
[i1]Qunxiong Zheng, Wenfeng Qi:
A new result on the distinctness of primitive sequences over Z(pq) modulo 2. IACR Cryptol. ePrint Arch. 2010: 622 (2010)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-17 23:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







