Home

Papers (Partial List)



Permutation Generators of Alternating Groups 
(with J. Pieprzyk) In Advances in Cryptography - AUSCRYPT'90, Lecture Notes in Computer Science, 453, Springer - Verlag, Berlin, Heidelbeg, New York, 1993, 237-244.

Some Orthogonal Designs and Complex Hadamard Matrices by Using Two Hadamard Matrices 
(with Jennifer Seberry) 
Australasian Journal of Combinatorics, 4 (1991), 93-102.

Semi Williamson Type Matrices and W(2n, n) Conjecture 
(with Jennifer Seberry) 
Journal of Combinatorial Mathematics and Combinatorial Computing, 11 (1992), 65-71.

G-Matrices of Order 19 
Bulletin of The Institute of Combinatorics and Its Applications 4, 1992, 95-98.

Product of Four Hadamard Matrices 
(wirh R. Craigen and J. Seberry) 
Journal of Combinatorial Theory (Series A), Vol. 59, No.2, 1992, 318-320

Some Orthogonal Matrices Constructed by Using Strong Kronecker Multiplication (with Jennifer Seberry) 
Australasian Journal of Combinatorics, 7 (1993), 213-224.

Regular Sets of Matrices and Applications 
(with Jennifer Seberry) 
Graphs and Combinatorics, 9 (1993), 185-195.

Semi-regular Sets of Matrices and Applications 
Australasian Journal of Combinatorics, 7 (1993), 65-81.

Highly Nonlinear 0-1 Balanced Satisfying Strict Avalanche Criterion 
(with Jennifer Seberry) 
In Advances in Cryptography - AUSCRYPT'92, Lecture Notes in Computer Science, 718, Springer - Verlag, Berlin, Heidelbeg, New York, 1993, 145-155.

Systematic Generation of Cryptographically Robust S-boxes (with J. Seberry and Y. Zheng) 
Proceedings of 1st ACM Conference on Computer and Communications Security, 172-182, New York, 1993, The Association for Computing Machinery.

Construction of Bent Functions by Using Two Known Bent Functions (with Jennifer Seberry) 
Australasian Journal of Combinatorics, 9 (1994), 21-35.

Cryptographic Boolean Functions via Group Hadamard Matrices (with J. Seberry and Y. Zheng) 
Australasian Journal of Combinatorics, 10 (1994), 131-145.

Improving The Strict Avalenche Characteristics of Cryptographic Functions 
(with J. Seberry and Y. Zheng) 
Information Processing Letters, 50 (1994), 37-41.

Comments on ``Generating and Counting Binary Bent Sequences'' 
(with C. Carlet and J. Seberry) 
IEEE Trans. on Inform. Thy. 40, No. 2, 1994, 600-600.

New Construction of Correction Immune Functions 
(with J. Seberry and Y. Zheng) 
In Advances in Cryptography - EUROCRYPT'93, Lecture Notes in Computer Science, 765, Springer - Verlag, Berlin, Heidelbeg, New York, 1994, 181-199.

Highly Nonlinear Balanced Boolean Functions and their Propagation Characteristics 
(with J. Seberry and Y. Zheng) 
In Advances in Cryptography - CRYPTO'93, Lecture Notes in Computer Science, 773, Springer - Verlag, Berlin, Heidelbeg, New York, 1993, 49-60.

Pitfalls in Designing Substitutions Boxes 
(with J. Seberry and Y. Zheng) 
In Advances in Cryptography - CRYPTO'94, Lecture Notes in Computer Science, 839, Springer - Verlag, Berlin, Heidelbeg, New York, 1994, 383-396.

Relationship among Nonlinearity Criteria 
(with J. Seberry and Y. Zheng) 
In Advances in Cryptography - EUROCRYPTO'94, Lecture Notes in Computer Science, 950, Springer - Verlag, Berlin, Heidelbeg, New York, 1995, 376-388.

On Nonlinear Resilient Functions 
(with J. Seberry and Y. Zheng) 
In Advances in Cryptography - EUROCRYPTO'95, Lecture Notes in Computer Science, 921, Springer - Verlag, Berlin, Heidelbeg, New York, 1995, 274-288.

Nonlinearity and Propagation Characteristics of Balanced Functions 
(with J. Seberry and Y. Zheng) 
Information and Computation, Vol. 119, No. 1 (1995), 1-13.

GAC-The Criterion for Global Avalanche Characteristics of Cryptographic Functions 
(with Yuliang Zheng) 
Journal for Universal Computer Science, Vol. 1. No. 5, 1995, 316-333.

The Relationship between Propagation Characteristics and Nonlinearity of Cryptographic Functions 
(with J. Seberry and Yuliang Zheng) 
Journal for Universal Computer Science, Vol. 1. No. 2, 1995, 136-150.

Characterizing the Structures of Highly Nonlinear Cryptographic Functions 
(with Yuliang Zheng) 
Designs, Codes and Cryptography, Vol. 7, No. 1/2, 1996, 111-134.

New Bounds on The Nonlinearity of Boolean Functions 
(with Yuliang Zheng) 
In Advances in Cryptography - EUROCRYPT'96, Lecture Notes in Computer Science, 1070, Springer - Verlag, Berlin, Heidelbeg, New York, 1996, 294-306.

Difference Distribution Table of A Regular Substitution Box 
(with Yuliang Zheng) 
Proceeding of The Third Annual Workship on Selected Areas in Cryptography (SAC'96), 1996, 57-60.

Non-existence of Certain Quadratic S-boxes and Two Bounds on Nonlinear Characteristics of General S-boxes 
(with Yuliang Zheng and Hideki Imai) 
Proceeding of The Fourth Annual Workship on Selected Areas in Cryptography (SAC'97), 1997, 27-39.

New Lower Bounds on Nonlinearity and A Class of Highly Nonlinear Functions 
(with Yuliang Zheng) 
Information Security and Privacy, Second Australasian Conference, ACISP'97, Lecture Notes in Computer Science, 1270, Springer - Verlag, Berlin, Heidelbeg, New York, 1997, 147-158.

Cryptographically Resilient Functions 
(with Yuliang Zheng) 
IEEE Trans. on Inform. Thy. 43, No. 5, 1997, 1740-1747.

Duality of Boolian Functions and Its Cryptographic Significance 
(with Yuliang Zheng and Hideki Imai) 
1st International Conference on Information and Communications Security, ICICS'97, Lecture Notes in Computer Science, 1334, Springer - Verlag, Berlin, Heidelbeg, New York, 1997, 159-169.

The Nonhomomorphicity of Boolean Functions 
(with Yuliang Zheng) 
5th Annual International Workship on Selected Areas in Cryptography (SAC'98), Lecture Notes in Computer Science, 1556, Springer - Verlag, Berlin, Heidelbeg, New York, 1999, 280-295.

Connections between Nonlinearity and Restrictions, Terms and Hypergraphs of Boolean Functions 
(with Yuliang Zheng and Hideki Imai) 
1998 IEEE International Symposium on Information Theory, 1998, 439.

The Nonhomomorphicity of S-boxes 
(with Yuliang Zheng) 
Proceedings of The 1st International Conference on Information Security and Cryptography (ICISC'98), 131-145.

Strong Linear Dependence and Unbiased Distribution of Non-prppagative Vectors 
(with Yuliang Zheng) 
The Sixth Annual Workship on Selected Areas in Cryptography (SAC'99), Lecture Notes in Computer Science, 1758, Springer - Verlag, Berlin, Heidelbeg, New York, 2000, 92-105.

Restrictions, Terms and Nonlinearity of Boolean Functions 
(with Yuliang Zheng and Hideki Imai) 
Special Issue on Cryptography for Theoretical Computer Science, Vol. 226, No. 1-2, 1999, 207-223.

Plateaued Functions 
(with Yuliang Zheng) 
2nd International Conference on Information and Communications Security, ICICS'99, Lecture Notes in Computer Science, 1726, Springer - Verlag, Berlin, Heidelbeg, New York, 1999, 284-300.

Relationships between Bent Functions and Complementary Plateaued Functions 
(with Yuliang Zheng) 
The 2nd International Conference on Information Security and Cryptography (ICISC'99), Lecture Notes in Computer Science, 1787, Springer - Verlag, Berlin, Heidelbeg, New York, 2000, 60-75.

Relating Differential Distribution Tables to Other Properties of Substitution Boxes 
(with Yuliang Zheng and Hideki Imai) 
Designs, Codes and Cryptography, Vol. 19, Issue 1, 2000, 45-63.

The Kth Order Nonhomomorphicity of S-boxes 
(with Yuliang Zheng) 
Journal for Universal Computer Science, Vol. 6. No. 8, 2000, 830-848.

Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions 
(with Yuliang Zheng) 
The Seventh Annual Workship on Selected Areas in Cryptography (SAC 2000), Lecture Notes in Computer Science, 2012, Springer - Verlag, Berlin, Heidelbeg, New York, 2001, 262-274.

Non-Separable Cryptographic Functions, 
(with Yuliang Zheng) 
Proceedings of the 2000 IEEE International Symposium on Information Theory and its Application (ISITA2000), 2000, Hawail, 51-58.

On Relationships among Avalanche, Nonlinearity, and Correlation Immunity 
(with Yuliang Zheng) 
In Advances in Cryptography - Asiacrypt 2000, Lecture Notes in Computer Science, 1976, Springer - Verlag, Berlin, Heidelbeg, New York, 2000, 470-482

New Results on Correlation Immunity 
(with Yuliang Zheng) 
The 3rd International Conference on Information Security and Cryptography (ICISC 2000), Lecture Notes in Computer Science, 2015, Springer - Verlag, Berlin, Heidelbeg, New York, 2001, 49-63.

On Plateaued Functions 
(with Yuliang Zheng) 
IEEE Trans. on Inform. Thy. 47, No. 3, 2001, 1215-1223.

A New Property of Maiorana-McFarland Functions 
(with Yuliang Zheng) 
Bulletin of The Institute of Combinatorics and Its Applications, 33, 2001, 13-22.

Nonlinear Secret Sharing Immune against Cheating 
(with Josef Pieprzyk) 
Proceedings of International Workshop on Cryptology and Network Security, September 26-28, 2001, Taiwan, 154-161.

Cheating Immune Secret Sharing 
(with Josef Pieprzyk) 
3rd International Conference on Information and Communications Security, ICICS'01, Lecture Notes in Computer Science, 2229, Springer - Verlag, Berlin, Heidelbeg, New York, 2001, 144-149.

Constructions of Cheating Immune Secret Sharing 
(with Josef Pieprzyk) 
Proceedings of The 4th International Conference on Information Security and Cryptography (ICISC 2001), Lecture Notes in Computer Science, 2288, Springer - Verlag, Berlin, Heidelbeg, New York, 2002, 226-243.

Cheating Prevention in Secret Sharing over $GF(p^t)$ 
(with Josef Pieprzyk) 
2nd International Conference on Cryptology in India (Indocrypt 2001), Lecture Notes in Computer Science, 2247, Springer - Verlag, Berlin, Heidelbeg, New York, 2001, 79-90.

Cheating Prevention in Linear Secret Sharing 
(with Josef Pieprzyk) 
Information Security and Privacy, 7th Australasian Conference, ACISP'02, Lecture Notes in Computer Science, 2384, Springer - Verlag, Berlin, Heidelbeg, New York, 2002, 121-135.

Multisecret Sharing Immune against Cheating 
(with Josef Pieprzyk) 
Proceedings of 2002 International Workshop on Cryptology and Network Security, September 26-28, 2002, San Francisco, California, USA, 249-256.

Ideal Threshold Schemes from MDS Codes 
(with Josef Pieprzyk) 
Proceedings of The 5th International Conference on Information Security and Cryptography (ICISC 2002), November 28-29, 2002, Seoul, Korea, Lecture Notes in Computer Science, 2587, Springer - Verlag, Berlin, Heidelberg, New York, 2003, pp. 253-263.

Ideal Threshold Schemes from Orthogonal Arrays 
(with Josef Pieprzyk) 
4th International Conference on Information and Communications Security, ICICS'02, Lecture Notes in Computer Science, 2531, Springer - Verlag, Berlin, Heidelbeg, New York, 2002, 469-479.

Connections among Nonlinearity, Avalanche and Correlation Immunuty, 
(with Yuliang Zheng) 
Theoretical Computer Science, Vol. 292, No. 3, 2003, 697-710.

The Generalized XOR Lemma 
(with Yuliang Zheng) 
Theoretical Computer Science, Vol. 329, No. 1-3, 2004, 331-337.

Characterisations of Extended Resiliency and Extended Immunity of S-Boxes, 
(with Josef Pieprzyk and Jovan Dj. Golic) 
The 8th International Conference on Information Security and Cryptography (ICISC 2005), December 1-2, 2005, Seoul, Korea, Lecture Notes in Computer Science, 3935, Springer - Verlag, Berlin, Heidelbeg, New York, 2006, 210-228.

On Algebraic Immunity and Annihilators, 
(with Josef Pieprzyk and Yuliang Zheng) 
The 9th International Conference on Information Security and Cryptography (ICISC 2006), November 30 -- December 1, 2006, Busan, Korea, Lecture Notes in Computer Science, 4296, Springer - Verlag, Berlin, Heidelbeg, New York, 2006, 65-80.

Computing {M}$ddot{o}$bius Transforms of Boolean Functions and Characterising Coincident Boolean Functions, 
(with Josef Pieprzyk) 
Proceedings of Third International Workshop on Boolean Functions: Cryptography and Applications (BFCA'07), PUBLICATION DES UNIVERSIT ES DE ROUEN ET DU HAVRE, Paris France, May 2-4, 2007, 127-143.

M$ddot{o}$bius-$alpha$ Commutative Functions and Partially Coincident Functions, 
(with Josef Pieprzyk and Huaxiong Wang) 
Proceedings of Fourth International Workshop on Boolean Functions: Cryptography and Applications (BFCA'08)}, Copenhagen, Denmark, May 19-21, 2008, 135-150.

M$ddot{o}$bius Transforms, Coincident Boolean Functions and Noncoincidence Property of Boolean Functions, 
(with Josef Pieprzyk and Huaxiong Wang) 
International Journal of Computer Mathematics}, Vol. 88, No. 7, May 2011, 1398 - 1416.