×
Author ID: wu.chuankun Recent zbMATH articles by "Wu, Chuankun"
Published as: Wu, Chuankun; Wu, Chuan-Kun; Wu, ChuanKun; Wu, Chuan Kun
Documents Indexed: 60 Publications since 1991, including 1 Book
2 Contributions as Editor
Software Indexed: 2 Packages
Co-Authors: 51 Co-Authors with 56 Joint Publications
2,559 Co-Co-Authors

Publications by Year

Citations contained in zbMATH Open

38 Publications have been cited 147 times in 132 Documents Cited by Year
Boolean functions and their applications in cryptography. Zbl 1364.94010
Wu, Chuan-Kun; Feng, Dengguo
19
2016
The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity. Zbl 1156.94382
Sun, Guanghong; Wu, Chuankun
15
2009
The lower bound on the second-order nonlinearity of a class of Boolean functions with high nonlinearity. Zbl 1254.94045
Sun, Guanghong; Wu, Chuankun
12
2011
Loiss: a byte-oriented stream cipher. Zbl 1272.94029
Feng, Dengguo; Feng, Xiutao; Zhang, Wentao; Fan, Xiubin; Wu, Chuankun
11
2011
On the linear structure of symmetric Boolean functions. Zbl 0889.94016
Dawson, Ed; Wu, Chuan-Kun
9
1997
Classification of bent monomials, constructions of bent multinomials and upper bounds on the nonlinearity of vectorial functions. Zbl 1390.94955
Xu, Yuwei; Carlet, Claude; Mesnager, Sihem; Wu, Chuankun
9
2018
Construction of correlation immune Boolean functions. Zbl 0887.94006
Dawson, Ed; Wu, Chuan-Kun
6
1997
On \((k,n)\) visual cryptography scheme with\( t\) essential parties. Zbl 1395.94285
Guo, Teng; Liu, Feng; Wu, ChuanKun; Ren, YaWei; Wang, Wen
5
2014
A byte-based guess and determine attack on SOSEMANUK. Zbl 1253.94046
Feng, Xiutao; Liu, Jun; Zhou, Zhaocun; Wu, Chuankun; Feng, Dengguo
5
2010
Some spectral techniques in coding theory. Zbl 0718.94010
Xiao, Guozhen; Shen, Bazhong; Wu, Chuankun; Wong, Chi Song
5
1991
Existence of generalized inverse of linear transformations over finite fields. Zbl 0953.15006
Wu, Chuan-Kun; Dawson, Ed
4
1998
The algebraic normal form, linear complexity and \(k\)-error linear complexity of single-cycle T-function. Zbl 1152.94442
Zhang, Wenying; Wu, Chuan-Kun
4
2006
Connecting transport AMHS in a wafer fab. Zbl 1038.90006
Lin, J. T.; Wang, F. K.; Wu, C. K.
4
2003
Correlation immunity and resiliency of symmetric Boolean functions. Zbl 1070.68035
Wu, Chuan-Kun; Dawson, Ed
4
2004
Linear approximations of addition modulo \(2^n-1\). Zbl 1307.94115
Zhou, Chunfang; Feng, Xiutao; Wu, Chuankun
3
2011
On the construction of differentially 4-uniform involutions. Zbl 1409.94912
Xu, Yuwei; Li, Yongqiang; Wu, Chuankun; Liu, Feng
3
2017
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. Zbl 1319.94087
Zhang, Wentao; Su, Bozhan; Wu, Wenling; Feng, Dengguo; Wu, Chuankun
3
2012
Threshold secret image sharing. Zbl 1346.94144
Guo, Teng; Liu, Feng; Wu, ChuanKun; Yang, ChingNung; Wang, Wen; Ren, YaWei
2
2013
Public key cryptosystems based on Boolean permutations and their applications. Zbl 0978.94039
Wu, Chuan-Kun; Varadharajan, Vijay
2
2000
Construction of correlation immune Boolean functions. Zbl 0972.94024
Wu, Chuan-Kun; Dawson, Ed
2
2000
On distribution of Boolean functions with nonlinearity \(\leq 2^{n-2}\). Zbl 0906.94015
Wu, Chuan-Kun
2
1998
Dynamic tree-based authenticated group key exchange protocol. Zbl 1497.94102
Li, Hui; Wu, Chuankun; Teng, Jikai
2
2010
A general compiler for password-authenticated group key exchange protocol. Zbl 1209.68116
Li, Hui; Wu, Chuan-Kun; Sun, Jun
2
2010
An unconditionally secure protocol for multi-party set intersection. Zbl 1214.94050
Li, Ronghua; Wu, Chuankun
2
2007
Construction of cryptographically important Boolean permutations. Zbl 1062.94043
Zhang, Wenying; Wu, Chuan-Kun; Li, Shiqu
2
2004
An ID-based authenticated dynamic group key agreement with optimal round. Zbl 1270.94065
Teng, Jikai; Wu, Chuankun; Tang, Chunming
2
2012
Efficient construction of permutations of high nonlinearity. Zbl 0782.94010
Wu, Chuankun; Wang, Xinmei
1
1993
Analysis of an authenticated identity-based multicast scheme. Zbl 1273.94354
Lin, Xi Jun; Wu, Chuan Kun; Liu, Feng
1
2008
A strongly secure identity-based authenticated group key exchange protocol. Zbl 1497.94117
Teng, Jikai; Wu, Chuankun; Tang, Chunming; Tian, Youliang
1
2015
On construction of resilient functions. Zbl 1541.94064
Wu, Chuan-Kun; Dawson, Ed
1
1996
Comments on “Monomial bent functions”. Zbl 1365.94461
Sun, Guanghong; Wu, Chuankun
1
2011
Construction and enumeration of Boolean functions with maximum algebraic immunity. Zbl 1185.94073
Zhang, Wenying; Wu, Chuankun; Liu, Xiangzhong
1
2009
A new definition of the contrast of visual cryptography scheme. Zbl 1209.68228
Liu, Feng; Wu, ChuanKun; Lin, XiJun
1
2010
On guess and determine analysis of Rabbit. Zbl 1225.94016
Feng, Xiutao; Shi, Zhenqing; Wu, Chuankun; Feng, Dengguo
1
2011
Security of the redefined Liaw’s broadcasting cryptosystem. Zbl 1152.94443
Zhu, Wen-Tao; Wu, Chuan-Kun
1
2008
The alignment problem of visual cryptography schemes. Zbl 1237.94075
Liu, Feng; Wu, Chuan Kun; Lin, Xi Jun
1
2009
Fair exchange of digital signatures with offline trusted third party. Zbl 1050.94535
Wu, Chuan-Kun; Varadharajan, Vijay
1
2001
Visual cryptography for natural images and visual voting. Zbl 1311.94084
Guo, Teng; Liu, Feng; Wu, ChuanKun
1
2013
Classification of bent monomials, constructions of bent multinomials and upper bounds on the nonlinearity of vectorial functions. Zbl 1390.94955
Xu, Yuwei; Carlet, Claude; Mesnager, Sihem; Wu, Chuankun
9
2018
On the construction of differentially 4-uniform involutions. Zbl 1409.94912
Xu, Yuwei; Li, Yongqiang; Wu, Chuankun; Liu, Feng
3
2017
Boolean functions and their applications in cryptography. Zbl 1364.94010
Wu, Chuan-Kun; Feng, Dengguo
19
2016
A strongly secure identity-based authenticated group key exchange protocol. Zbl 1497.94117
Teng, Jikai; Wu, Chuankun; Tang, Chunming; Tian, Youliang
1
2015
On \((k,n)\) visual cryptography scheme with\( t\) essential parties. Zbl 1395.94285
Guo, Teng; Liu, Feng; Wu, ChuanKun; Ren, YaWei; Wang, Wen
5
2014
Threshold secret image sharing. Zbl 1346.94144
Guo, Teng; Liu, Feng; Wu, ChuanKun; Yang, ChingNung; Wang, Wen; Ren, YaWei
2
2013
Visual cryptography for natural images and visual voting. Zbl 1311.94084
Guo, Teng; Liu, Feng; Wu, ChuanKun
1
2013
Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. Zbl 1319.94087
Zhang, Wentao; Su, Bozhan; Wu, Wenling; Feng, Dengguo; Wu, Chuankun
3
2012
An ID-based authenticated dynamic group key agreement with optimal round. Zbl 1270.94065
Teng, Jikai; Wu, Chuankun; Tang, Chunming
2
2012
The lower bound on the second-order nonlinearity of a class of Boolean functions with high nonlinearity. Zbl 1254.94045
Sun, Guanghong; Wu, Chuankun
12
2011
Loiss: a byte-oriented stream cipher. Zbl 1272.94029
Feng, Dengguo; Feng, Xiutao; Zhang, Wentao; Fan, Xiubin; Wu, Chuankun
11
2011
Linear approximations of addition modulo \(2^n-1\). Zbl 1307.94115
Zhou, Chunfang; Feng, Xiutao; Wu, Chuankun
3
2011
Comments on “Monomial bent functions”. Zbl 1365.94461
Sun, Guanghong; Wu, Chuankun
1
2011
On guess and determine analysis of Rabbit. Zbl 1225.94016
Feng, Xiutao; Shi, Zhenqing; Wu, Chuankun; Feng, Dengguo
1
2011
A byte-based guess and determine attack on SOSEMANUK. Zbl 1253.94046
Feng, Xiutao; Liu, Jun; Zhou, Zhaocun; Wu, Chuankun; Feng, Dengguo
5
2010
Dynamic tree-based authenticated group key exchange protocol. Zbl 1497.94102
Li, Hui; Wu, Chuankun; Teng, Jikai
2
2010
A general compiler for password-authenticated group key exchange protocol. Zbl 1209.68116
Li, Hui; Wu, Chuan-Kun; Sun, Jun
2
2010
A new definition of the contrast of visual cryptography scheme. Zbl 1209.68228
Liu, Feng; Wu, ChuanKun; Lin, XiJun
1
2010
The lower bounds on the second order nonlinearity of three classes of Boolean functions with high nonlinearity. Zbl 1156.94382
Sun, Guanghong; Wu, Chuankun
15
2009
Construction and enumeration of Boolean functions with maximum algebraic immunity. Zbl 1185.94073
Zhang, Wenying; Wu, Chuankun; Liu, Xiangzhong
1
2009
The alignment problem of visual cryptography schemes. Zbl 1237.94075
Liu, Feng; Wu, Chuan Kun; Lin, Xi Jun
1
2009
Analysis of an authenticated identity-based multicast scheme. Zbl 1273.94354
Lin, Xi Jun; Wu, Chuan Kun; Liu, Feng
1
2008
Security of the redefined Liaw’s broadcasting cryptosystem. Zbl 1152.94443
Zhu, Wen-Tao; Wu, Chuan-Kun
1
2008
An unconditionally secure protocol for multi-party set intersection. Zbl 1214.94050
Li, Ronghua; Wu, Chuankun
2
2007
The algebraic normal form, linear complexity and \(k\)-error linear complexity of single-cycle T-function. Zbl 1152.94442
Zhang, Wenying; Wu, Chuan-Kun
4
2006
Correlation immunity and resiliency of symmetric Boolean functions. Zbl 1070.68035
Wu, Chuan-Kun; Dawson, Ed
4
2004
Construction of cryptographically important Boolean permutations. Zbl 1062.94043
Zhang, Wenying; Wu, Chuan-Kun; Li, Shiqu
2
2004
Connecting transport AMHS in a wafer fab. Zbl 1038.90006
Lin, J. T.; Wang, F. K.; Wu, C. K.
4
2003
Fair exchange of digital signatures with offline trusted third party. Zbl 1050.94535
Wu, Chuan-Kun; Varadharajan, Vijay
1
2001
Public key cryptosystems based on Boolean permutations and their applications. Zbl 0978.94039
Wu, Chuan-Kun; Varadharajan, Vijay
2
2000
Construction of correlation immune Boolean functions. Zbl 0972.94024
Wu, Chuan-Kun; Dawson, Ed
2
2000
Existence of generalized inverse of linear transformations over finite fields. Zbl 0953.15006
Wu, Chuan-Kun; Dawson, Ed
4
1998
On distribution of Boolean functions with nonlinearity \(\leq 2^{n-2}\). Zbl 0906.94015
Wu, Chuan-Kun
2
1998
On the linear structure of symmetric Boolean functions. Zbl 0889.94016
Dawson, Ed; Wu, Chuan-Kun
9
1997
Construction of correlation immune Boolean functions. Zbl 0887.94006
Dawson, Ed; Wu, Chuan-Kun
6
1997
On construction of resilient functions. Zbl 1541.94064
Wu, Chuan-Kun; Dawson, Ed
1
1996
Efficient construction of permutations of high nonlinearity. Zbl 0782.94010
Wu, Chuankun; Wang, Xinmei
1
1993
Some spectral techniques in coding theory. Zbl 0718.94010
Xiao, Guozhen; Shen, Bazhong; Wu, Chuankun; Wong, Chi Song
5
1991
all top 5

Cited by 276 Authors

5 Ferreyra, David Eduardo
5 Thome, Néstor
4 Alekseychuk, Anton Nikolaevich
4 Kan, Haibin
4 Li, Chao
4 Sala, Massimiliano
4 Tang, Deng
4 Zeng, Xiangyong
3 Adhikari, Avishek
3 Dutta, Sabyasachi
3 Gangopadhyay, Sugata
3 Garg, Manish
3 Musukwa, Augustine I.
3 Pasalic, Enes
3 Peng, Jie
3 Wu, Chuankun
3 Zheng, Lijing
2 Bapić, Amar
2 Bhatta, Vadiraja G. R.
2 Canteaut, Anne
2 Çeşmelioğlu, Ayça
2 Cui, Jingyi
2 Dai, Zong-Duo
2 Ding, Lin
2 Feng, Xiutao
2 Gode, Ruchi
2 Guo, Jiansheng
2 Hu, Lei
2 Hu, Yupu
2 Jeong, Jaeseong
2 Jin, Chenhui
2 John, Anita
2 Jose, Jimmy
2 Kircanski, Aleksandar
2 Konyushok, S. N.
2 Koo, Namhun
2 Kwon, Soonhak
2 Levis, Fabián Eduardo
2 Li, Chunlei
2 Li, Nian
2 Li, Ruilin
2 Logachev, Oleg A.
2 Markowitch, Olivier
2 Meidl, Wilfried
2 Mesnager, Sihem
2 Orquera, V.
2 Panackal, Harikrishnan
2 Poojary, Prasanna
2 Qi, Wenfeng
2 Qu, Longjiang
2 Saini, Kezia
2 Selezneva, Svetlana Nikolaevna
2 Singh, Deep
2 Sun, Bing
2 Villa, Irene
2 Wang, Qichun
2 Xu, Xiaofang
2 Yan, Haode
2 Yashchenko, Valery V.
2 Youssef, Amr M.
2 Zaninelli, Marco
1 Abdukhalikov, Kanat S.
1 Alamsyah
1 Alekseev, Evgeny K.
1 Alkhzaimi, Hoda A.
1 Anashin, Vladimir Sergeevich
1 Astola, Jaakko T.
1 Babueva, Aleksandra A.
1 Bagheri, Nasour
1 Bala, Suman
1 Bao, Zhenzhen
1 Beierle, Christof
1 Bejo, Agus
1 Bhaintwal, Maheshanand
1 Bharata Adji, Teguh
1 Biryukov, Alex
1 Bors, Alexander
1 Çalık, Çağdaş
1 Cao, Xiwang
1 Castro, Francis Noel
1 Chai, Jinjin
1 Charoghchi, Sara
1 Chen, Jinrui
1 Chen, Yu-Ao
1 Chen, Zhixiong
1 Cheng, Lei
1 Climent, Joan-Josep
1 Cui, Ting
1 Cusick, Thomas W.
1 de la Cruz Jiménez, Reynier Antonio
1 Dehmer, Matthias
1 Dehnavi, Seyed Mojtaba
1 Demirbaş, Fatih
1 Doğanaksoy, Ali
1 Elsheh, E.
1 Emmert-Streib, Frank
1 Eriguchi, Reo
1 Esmaeili Salehani, Yaser
1 Fedorov, Sergey N.
1 Feng, Rongquan
...and 176 more Authors
all top 5

Cited in 47 Serials

14 Cryptography and Communications
11 Designs, Codes and Cryptography
10 Finite Fields and their Applications
5 Discrete Applied Mathematics
4 Information Sciences
4 International Journal of Foundations of Computer Science
4 International Journal of Computer Mathematics
4 Applicable Algebra in Engineering, Communication and Computing
3 Information Processing Letters
3 Discrete Mathematics and Applications
3 Cybernetics and Systems Analysis
3 Journal of Discrete Mathematical Sciences & Cryptography
3 Quantum Information Processing
3 Advances in Mathematics of Communications
2 Computers & Mathematics with Applications
2 Discrete Mathematics
2 Linear Algebra and its Applications
2 Nonlinear Dynamics
2 Wuhan University Journal of Natural Sciences (WUJNS)
2 Science China. Information Sciences
2 Diskretnyĭ Analiz i Issledovanie Operatsiĭ
2 Prikladnaya Diskretnaya Matematika
1 Artificial Intelligence
1 IEEE Transactions on Information Theory
1 Linear and Multilinear Algebra
1 Physica A
1 Gaṇita
1 Journal of Combinatorial Theory. Series A
1 Journal of Computational and Applied Mathematics
1 Quaestiones Mathematicae
1 Information and Computation
1 Science in China. Series A
1 Aequationes Mathematicae
1 International Journal of Bifurcation and Chaos in Applied Sciences and Engineering
1 Advances in Applied Clifford Algebras
1 ELA. The Electronic Journal of Linear Algebra
1 Annals of Combinatorics
1 Journal of Systems Science and Complexity
1 Journal of Applied Mathematics
1 International Journal of Quantum Information
1 Mediterranean Journal of Mathematics
1 Mathematics in Computer Science
1 Advances and Applications in Discrete Mathematics
1 Revista de la Real Academia de Ciencias Exactas, Físicas y Naturales. Serie A: Matemáticas. RACSAM
1 Symmetry
1 Axioms
1 Matematicheskie Voprosy Kriptografii

Citations by Year