Остановите войну!
for scientists:
default search action
Chao Li 0002
- > Home > Persons > Chao Li 0002
Publications
- 2022
- [j67]Jiao Du, Shaojing Fu, Longjiang Qu, Chao Li, Tianyin Wang, Shanqi Pang:
A Novel Construction of 2-Resilient Rotation Symmetric Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(2): 93-99 (2022) - [j65]Jiao Du, Ziyu Chen, Shaojing Fu, Longjiang Qu, Chao Li:
Constructions of 2-resilient rotation symmetric Boolean functions through symbol transformations of cyclic Hadamard matrix. Theor. Comput. Sci. 919: 80-91 (2022) - 2021
- [j64]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu, Hao Chen:
Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem. Adv. Math. Commun. 15(3): 441-469 (2021) - [j63]Xi Chen, Longjiang Qu, Shaojing Fu, Chao Li:
The number of affine equivalent classes and extended affine equivalent classes of vectorial Boolean functions. Discret. Appl. Math. 289: 477-491 (2021) - [c26]Luming Yang, Shaojing Fu, Yongjun Wang, Chao Li, Shanghuai Feng, Yuchuan Luo, Lin Liu:
Packet-Sequence and Byte-Distribution is Enough for Real-Time Identification of Application Traffic. ISPA/BDCloud/SocialCom/SustainCom 2021: 1126-1134 - 2020
- [j58]Yunwen Liu, Wenying Zhang, Bing Sun, Vincent Rijmen, Guoqiang Liu, Chao Li, Shaojing Fu, Meichun Cao:
The phantom of differential characteristics. Des. Codes Cryptogr. 88(11): 2289-2311 (2020) - 2018
- [j50]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
A better bound for implicit factorization problem with shared middle bits. Sci. China Inf. Sci. 61(3): 032109:1-032109:10 (2018) - [j49]Zhichao Yang, Shaojing Fu, Longjiang Qu, Chao Li:
A lower dimension lattice attack on NTRU. Sci. China Inf. Sci. 61(5): 059101:1-059101:3 (2018) - [i19]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
Finding Small Solutions of the Equation Bx-Ay=z and Its Applications to Cryptanalysis of the RSA Cryptosystem. IACR Cryptol. ePrint Arch. 2018: 568 (2018) - 2017
- [j46]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(10): 2113-2122 (2017) - 2016
- [j45]Jiao Du, Shaojing Fu, Longjiang Qu, Chao Li, Shanqi Pang:
New constructions of q-variable 1-resilient rotation symmetric functions over 𝔽p. Sci. China Inf. Sci. 59(7): 079102:1-079102:3 (2016) - [j42]Shaojing Fu, Jiao Du, Longjiang Qu, Chao Li:
Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(4): 853-855 (2016) - [j41]Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li:
New Results on the Boolean Functions That Can Be Expressed as the Sum of Two Bent Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(8): 1584-1590 (2016) - [j40]Jiao Du, Chao Li, Shaojing Fu, Shanqi Pang:
Constructions of p-variable 1-resilient rotation symmetric functions over GF(p). Secur. Commun. Networks 9(18): 5651-5658 (2016) - [i18]Kangquan Li, Longjiang Qu, Chao Li, Shaojing Fu:
New Permutation Trinomials Constructed from Fractional Polynomials. CoRR abs/1605.06216 (2016) - 2015
- [j38]Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu:
A New Attack on RSA with Known Middle Bits of the Private Key. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(12): 2677-2685 (2015) - 2014
- [j33]Shaojing Fu, Chao Li, Longjiang Qu:
A recursive construction of highly nonlinear resilient vectorial functions. Inf. Sci. 269: 388-396 (2014) - [i15]Longjiang Qu, Shaojing Fu, Qingping Dai, Chao Li:
When a Boolean Function can be Expressed as the Sum of two Bent Functions. IACR Cryptol. ePrint Arch. 2014: 48 (2014) - 2013
- [j31]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity. Sci. China Inf. Sci. 56(3): 1-9 (2013) - [j27]Shaojing Fu, Chao Li, Longjiang Qu:
Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 360-362 (2013) - [j25]Hai Xiong, Longjiang Qu, Chao Li, Shaojing Fu:
Linear complexity of binary sequences with interleaved structure. IET Commun. 7(15): 1688-1696 (2013) - [j24]Deshuai Dong, Longjiang Qu, Shaojing Fu, Chao Li:
New constructions of semi-bent functions in polynomial forms. Math. Comput. Model. 57(5-6): 1139-1147 (2013) - 2012
- [j21]Shaojing Fu, Kanta Matsuura, Chao Li, Longjiang Qu:
Construction of highly nonlinear resilient S-boxes with given degree. Des. Codes Cryptogr. 64(3): 241-253 (2012) - [j20]Ruilin Li, Bing Sun, Chao Li, Shaojing Fu:
On Algebraic Property of T-Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 267-269 (2012) - [j19]Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu:
New constructions of low-correlation sequences with high-linear complexity. IET Commun. 6(18): 3309-3314 (2012) - [j18]Deshuai Dong, Longjiang Qu, Shaojing Fu, Chao Li:
New Constructions of Vectorial Boolean Functions with Good Cryptographic Properties. Int. J. Found. Comput. Sci. 23(3): 749-760 (2012) - [j17]Shaojing Fu, Chao Li, Longjiang Qu, Deshuai Dong:
On the number of rotation symmetric functions over GF(p). Math. Comput. Model. 55(1-2): 142-150 (2012) - [j16]Peng Zhang, Deshuai Dong, Shaojing Fu, Chao Li:
New constructions of even-variable rotation symmetric Boolean functions with maximum algebraic immunity. Math. Comput. Model. 55(3-4): 828-836 (2012) - [c15]Wentao Zhao, Xin Hai, Shaojing Fu, Chao Li, Yanfeng Wang:
Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity. WISA 2012: 43-54 - [i12]Hai Xiong, Chao Li, Qingping Dai, Shaojing Fu:
New Constructions of Low Correlation Sequences with High Linear Complexity. IACR Cryptol. ePrint Arch. 2012: 161 (2012) - 2011
- [j15]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity. Appl. Math. Lett. 24(12): 2093-2096 (2011) - [j14]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 265-267 (2011) - [j13]Shaojing Fu, Longjiang Qu, Chao Li, Bing Sun:
Balanced rotation symmetric boolean functions with maximum algebraic immunity. IET Inf. Secur. 5(2): 93-99 (2011) - [j10]Shaojing Fu, Bing Sun, Chao Li, Longjiang Qu:
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree. J. Inf. Sci. Eng. 27(6): 1931-1942 (2011) - 2010
- [j7]Shaojing Fu, Chao Li, Longjiang Qu:
On the number of rotation symmetric Boolean functions. Sci. China Inf. Sci. 53(3): 537-545 (2010) - [j5]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Enumeration of balanced symmetric functions over GF(p). Inf. Process. Lett. 110(14-15): 544-548 (2010) - 2009
- [c10]Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu:
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity. CANS 2009: 402-412 - [c5]Deshuai Dong, Shaojing Fu, Longjiang Qu, Chao Li:
A New Construction of Boolean Functions with Maximum Algebraic Immunity. ISC 2009: 177-185 - [c4]Shaojing Fu, Longjiang Qu, Chao Li:
Construction of Odd-Variable Boolean Function with Maximum Algebraic Immunity. WISA 2009: 109-117 - 2008
- [c3]Chao Li, Shaojing Fu, Bing Sun:
Construction of Resilient Functions with Multiple Cryptographic Criteria. CANS 2008: 268-277 - [c2]Shaojing Fu, Chao Li, Bing Sun:
Enumeration of Homogeneous Rotation Symmetric Functions over Fp. CANS 2008: 278-284 - [i3]Shaojing Fu, Chao Li, Longjiang Qu, Ping Li:
Enumeration of Balanced Symmetric Functions over GF(p). IACR Cryptol. ePrint Arch. 2008: 372 (2008)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-28 22:55 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint