


default search action
Jian Zou 0002
Person information
- affiliation: Fuzhou University, College of Mathematics and Computer Science, Fuzhou, China
Other persons with the same name
- Jian Zou — disambiguation page
- Jian Zou 0001 — Anhui Polytechnic University, School of Computer and Information, Wuhu, China
- Jian Zou 0003
— Beijing Institute of Technology, Beijing, China
- Jian Zou 0004
— Yangtze University, School of Information and Mathematics, Jingzhou, China
- Jian Zou 0005
— Harbin Institute of Technology, Faculty of Computing, Harbin, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2025
- [j12]Qian Liu, Ximeng Liu, Meixiang Chen
, Jian Zou, Zhiwei Huang:
Further results on the (-1)-differential uniformity of some functions over finite fields with odd characteristic. Appl. Algebra Eng. Commun. Comput. 36(4): 681-697 (2025) - 2023
- [j11]Qian Liu
, Zhiwei Huang, Jianrui Xie
, Ximeng Liu, Jian Zou:
The c-differential uniformity and boomerang uniformity of three classes of permutation polynomials over F2n. Finite Fields Their Appl. 89: 102212 (2023) - [j10]Qian Liu
, Guifeng Chen, Ximeng Liu, Jian Zou:
Several classes of permutation pentanomials with the form xrh(xpm-1) over Fp2m. Finite Fields Their Appl. 92: 102307 (2023) - [j9]Hongkai Zou, Jian Zou
, Yiyuan Luo:
New results on quantum boomerang attacks. Quantum Inf. Process. 22(4): 171 (2023) - 2022
- [j8]Jian Zou
, Zihao Wei, Siwei Sun, Yiyuan Luo, Qian Liu, Wenling Wu:
Some efficient quantum circuit implementations of Camellia. Quantum Inf. Process. 21(4): 131 (2022) - [j7]Jian Zou
, Liji Li, Zihao Wei, Yiyuan Luo, Qian Liu, Wenling Wu:
New quantum circuit implementations of SM4 and SM3. Quantum Inf. Process. 21(5): 181 (2022) - 2021
- [j6]Ximeng Liu
, Lehui Xie
, Yaopeng Wang
, Jian Zou, Jinbo Xiong
, Zuobin Ying
, Athanasios V. Vasilakos
:
Privacy and Security Issues in Deep Learning: A Survey. IEEE Access 9: 4566-4593 (2021) - 2020
- [j5]Jian Zou
, Yongyang Liu, Le Dong
:
An Efficient Quantum Multi-Collision Search Algorithm. IEEE Access 8: 181619-181628 (2020) - 2018
- [j4]Jian Zou, Le Dong
, Wenling Wu:
New algorithms for the unbalanced generalised birthday problem. IET Inf. Secur. 12(6): 527-533 (2018) - 2015
- [j3]Le Dong
, Yanling Wang, Wenling Wu, Jian Zou:
Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes. IET Inf. Secur. 9(5): 277-283 (2015) - 2014
- [j2]Le Dong, Wenling Wu, Shuang Wu, Jian Zou:
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes. Frontiers Comput. Sci. 8(3): 513-525 (2014) - [j1]Jian Zou, Wenling Wu, Shuang Wu, Le Dong:
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grostl Hash Function. J. Inf. Sci. Eng. 30(6): 1789-1806 (2014)
Conference and Workshop Papers
- 2020
- [c6]Jian Zou, Zihao Wei, Siwei Sun, Ximeng Liu, Wenling Wu:
Quantum Circuit Implementations of AES with Fewer Qubits. ASIACRYPT (2) 2020: 697-726 - 2013
- [c5]Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong:
LHash: A Lightweight Hash Function. Inscrypt 2013: 291-308 - [c4]Jian Zou, Wenling Wu, Shuang Wu:
Cryptanalysis of the Round-Reduced GOST Hash Function. Inscrypt 2013: 309-322 - 2012
- [c3]Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo
, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. FSE 2012: 127-145 - 2011
- [c2]Jian Zou, Wenling Wu, Shuang Wu, Bozhan Su, Le Dong:
Preimage Attacks on Step-Reduced SM3 Hash Function. ICISC 2011: 375-390 - [c1]Le Dong, Wenling Wu, Shuang Wu, Jian Zou:
Known-Key Distinguisher on Round-Reduced 3D Block Cipher. WISA 2011: 55-69
Informal and Other Publications
- 2023
- [i6]Qian Liu, Xiaobei Dong, Ximeng Liu, Jian Zou:
Further results on several classes of optimal ternary cyclic codes with minimum distance four. IACR Cryptol. ePrint Arch. 2023: 888 (2023) - 2022
- [i5]Qian Liu, Zhiwei Huang, Jianrui Xie
, Ximeng Liu, Jian Zou:
The c-differential uniformity and boomerang uniformity of three classes of permutation polynomials over 픽2n. IACR Cryptol. ePrint Arch. 2022: 664 (2022) - 2019
- [i4]Jian Zou, Yongyang Liu, Chen Dong, Wenling Wu, Le Dong:
Observations on the Quantum Circuit of the SBox of AES. IACR Cryptol. ePrint Arch. 2019: 1245 (2019) - 2013
- [i3]Wenling Wu, Shuang Wu, Lei Zhang, Jian Zou, Le Dong:
LHash: A Lightweight Hash Function (Full Version). IACR Cryptol. ePrint Arch. 2013: 867 (2013) - 2012
- [i2]Shuang Wu, Dengguo Feng, Wenling Wu, Jian Guo, Le Dong, Jian Zou:
(Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others (Extended Version). IACR Cryptol. ePrint Arch. 2012: 206 (2012) - [i1]Jian Zou, Wenling Wu, Shuang Wu, Le Dong:
Improved (Pseudo) Preimage Attack and Second Preimage Attack on Round-Reduced Grøstl. IACR Cryptol. ePrint Arch. 2012: 686 (2012)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-07-31 20:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint