default search action
Yingpu Deng
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j13]Yingpu Deng, Lixia Luo, Yanbin Pan, Guanju Xiao:
On Some Computational Problems in Local Fields. J. Syst. Sci. Complex. 35(3): 1191-1200 (2022) - 2021
- [j12]Guanju Xiao, Lixia Luo, Yingpu Deng:
Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves. J. Math. Cryptol. 15(1): 454-464 (2021) - [i14]Yingpu Deng, Lixia Luo, Yanbin Pan, Zhaonan Wang, Guanju Xiao:
Public-key Cryptosystems and Signature Schemes from p-adic Lattices. IACR Cryptol. ePrint Arch. 2021: 522 (2021)
2010 – 2019
- 2018
- [i13]Yingpu Deng, Lixia Luo, Guanju Xiao:
On Some Computational Problems in Local Fields. IACR Cryptol. ePrint Arch. 2018: 1229 (2018) - 2017
- [j11]Jianing Li, Yingpu Deng:
Nonexistence of two classes of generalized bent functions. Des. Codes Cryptogr. 85(3): 471-482 (2017) - 2016
- [j10]Yingpu Deng, Yanbin Pan:
The Sum of Binomial Coefficients and Integer Factorization. Integers 16: A42 (2016) - 2015
- [j9]Yupeng Jiang, Yingpu Deng:
New results on nonexistence of generalized bent functions. Des. Codes Cryptogr. 75(3): 375-385 (2015) - [i12]Jianing Li, Yingpu Deng:
Nonexistence of two classes of generalized bent functions. CoRR abs/1507.06886 (2015) - 2014
- [j8]Yupeng Jiang, Yingpu Deng:
Strong pseudoprimes to the first eight prime bases. Math. Comput. 83(290): 2915-2924 (2014) - [c4]Yanbin Pan, Yingpu Deng:
A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012. ACISP 2014: 148-161 - [i11]Dandan Huang, Yingpu Deng:
Deterministic polynomial-time test for prime ideals in a Dedekind domain with finite rank. CoRR abs/1406.3523 (2014) - 2013
- [j7]Yanjuan Zhang, Yingpu Deng:
Results on permutation symmetric Boolean functions. J. Syst. Sci. Complex. 26(2): 302-312 (2013) - 2012
- [j6]Ziran Tu, Yingpu Deng:
Boolean functions optimizing most of the cryptographic criteria. Discret. Appl. Math. 160(4-5): 427-435 (2012) - [c3]Jintai Ding, Yanbin Pan, Yingpu Deng:
An Algebraic Broadcast Attack against NTRU. ACISP 2012: 124-137 - [i10]Yingpu Deng, Yanbin Pan:
An algorithm for factoring integers. IACR Cryptol. ePrint Arch. 2012: 97 (2012) - [i9]Yupeng Jiang, Yingpu Deng:
New results on nonexistence of generalized bent functions. IACR Cryptol. ePrint Arch. 2012: 467 (2012) - 2011
- [j5]Ziran Tu, Yingpu Deng:
A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity. Des. Codes Cryptogr. 60(1): 1-14 (2011) - [j4]Yanbin Pan, Yingpu Deng:
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem. IEEE Trans. Inf. Theory 57(3): 1780-1785 (2011) - [c2]Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu:
A New Lattice-Based Public-Key Cryptosystem Mixed with a Knapsack. CANS 2011: 126-137 - [c1]Yanbin Pan, Yingpu Deng:
A General NTRU-Like Framework for Constructing Lattice-Based Public-Key Cryptosystems. WISA 2011: 109-120 - 2010
- [i8]Ziran Tu, Yingpu Deng:
A Class of 1-Resilient Function with High Nonlinearity and Algebraic Immunity. IACR Cryptol. ePrint Arch. 2010: 179 (2010) - [i7]Ziran Tu, Yingpu Deng:
Boolean functions with all main cryptographic properties. IACR Cryptol. ePrint Arch. 2010: 518 (2010) - [i6]Yanbin Pan, Yingpu Deng:
A Broadcast Attack against NTRU Using Ding's Algorithm. IACR Cryptol. ePrint Arch. 2010: 598 (2010)
2000 – 2009
- 2009
- [i5]Ziran Tu, Yingpu Deng:
A Conjecture on Binary String and Its Applications on Constructing Boolean Functions of Optimal Algebraic Immunity. IACR Cryptol. ePrint Arch. 2009: 272 (2009) - [i4]Yanbin Pan, Yingpu Deng, Yupeng Jiang, Ziran Tu:
A New Lattice-Based Cryptosystem Mixed with a Knapsack. IACR Cryptol. ePrint Arch. 2009: 337 (2009) - [i3]Yupeng Jiang, Yingpu Deng, Yanbin Pan:
Covering Radius of Two-dimensional Lattices. IACR Cryptol. ePrint Arch. 2009: 539 (2009) - 2008
- [j3]Yingpu Deng, Mulan Liu:
Counting isomorphism classes of pointed hyperelliptic curves of genus 4 over finite fields with odd characteristic. Eur. J. Comb. 29(6): 1436-1448 (2008) - [i2]Yanbin Pan, Yingpu Deng:
Cryptanalysis of the Cai-Cusick Lattice-based Public-key Cryptosystem. IACR Cryptol. ePrint Arch. 2008: 204 (2008) - 2007
- [i1]Ziran Tu, Yingpu Deng:
Algebraic Immunity Hierarchy of Boolean Functions. IACR Cryptol. ePrint Arch. 2007: 259 (2007) - 2006
- [j2]Yingpu Deng:
A class of combinatorial identities. Discret. Math. 306(18): 2234-2240 (2006) - [j1]Yingpu Deng:
Isomorphism classes of hyperelliptic curves of genus 3 over finite fields. Finite Fields Their Appl. 12(2): 248-282 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:55 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint