Papers (Partial List)
| Permutation Generators of
Alternating Groups (with J. Pieprzyk) In Advances in Cryptography -
AUSCRYPT'90, Lecture Notes in Computer Science, 453, Springer - Verlag, Berlin, Heidelbeg, New York,
1993, 237-244. |
| Some Orthogonal Designs and Complex
Hadamard Matrices by Using Two Hadamard Matrices (with Jennifer Seberry) Australasian Journal of Combinatorics, 4 (1991), 93-102.
|
| Semi Williamson Type Matrices and W(2n, n)
Conjecture (with Jennifer Seberry) Journal of Combinatorial Mathematics and
Combinatorial Computing, 11 (1992), 65-71. |
| G-Matrices of Order 19 Bulletin of The Institute of
Combinatorics and Its Applications 4, 1992, 95-98. |
| Product of Four Hadamard Matrices (wirh R. Craigen and J.
Seberry) Journal of Combinatorial Theory (Series A), Vol. 59, No.2, 1992,
318-320 |
| Some Orthogonal Matrices Constructed by Using
Strong Kronecker Multiplication (with Jennifer Seberry) Australasian Journal of Combinatorics, 7 (1993),
213-224. |
| Regular Sets of Matrices and
Applications (with Jennifer Seberry) Graphs and Combinatorics, 9 (1993), 185-195. |
| Semi-regular Sets of Matrices and
Applications Australasian Journal of Combinatorics, 7 (1993), 65-81.
|
| Highly Nonlinear 0-1 Balanced Satisfying Strict
Avalanche Criterion (with Jennifer Seberry) In Advances in Cryptography - AUSCRYPT'92, Lecture Notes in Computer Science, 718,
Springer - Verlag, Berlin, Heidelbeg, New York, 1993, 145-155.
|
| Systematic Generation of Cryptographically Robust
S-boxes (with J. Seberry and Y.
Zheng) Proceedings of 1st ACM Conference on Computer and Communications
Security, 172-182, New York, 1993, The Association for Computing Machinery.
|
| Construction of Bent Functions by Using Two Known
Bent Functions (with Jennifer
Seberry) Australasian Journal of Combinatorics, 9 (1994), 21-35.
|
| Cryptographic Boolean Functions via Group Hadamard
Matrices (with J. Seberry and Y.
Zheng) Australasian Journal of Combinatorics, 10 (1994), 131-145.
|
| Improving The Strict Avalenche Characteristics of
Cryptographic Functions (with J. Seberry and Y. Zheng) Information Processing Letters, 50 (1994), 37-41.
|
| Comments on ``Generating and Counting Binary Bent
Sequences'' (with C. Carlet and J. Seberry) IEEE Trans. on Inform. Thy. 40, No. 2, 1994, 600-600.
|
| New Construction of Correction Immune
Functions (with J. Seberry and Y. Zheng) In Advances in Cryptography - EUROCRYPT'93, Lecture Notes in Computer Science, 765,
Springer - Verlag, Berlin, Heidelbeg, New York, 1994, 181-199.
|
| Highly Nonlinear Balanced Boolean Functions and
their Propagation Characteristics (with J. Seberry and Y.
Zheng) In Advances in Cryptography - CRYPTO'93, Lecture Notes in Computer
Science, 773, Springer - Verlag, Berlin, Heidelbeg, New York, 1993, 49-60.
|
| Pitfalls in Designing Substitutions
Boxes (with J. Seberry and Y. Zheng) In Advances in
Cryptography - CRYPTO'94, Lecture Notes in Computer Science, 839, Springer - Verlag, Berlin,
Heidelbeg, New York, 1994, 383-396. |
| Relationship among
Nonlinearity Criteria (with J. Seberry and Y. Zheng) In Advances in Cryptography - EUROCRYPTO'94, Lecture Notes in Computer Science, 950,
Springer - Verlag, Berlin, Heidelbeg, New York, 1995, 376-388.
|
| On Nonlinear Resilient Functions (with J. Seberry and Y. Zheng) In Advances in Cryptography -
EUROCRYPTO'95, Lecture Notes in Computer Science, 921, Springer - Verlag, Berlin, Heidelbeg, New
York, 1995, 274-288. |
| Nonlinearity and
Propagation Characteristics of Balanced Functions (with J. Seberry and Y.
Zheng) Information and Computation, Vol. 119, No. 1 (1995), 1-13.
|
| GAC-The Criterion for Global Avalanche
Characteristics of Cryptographic Functions (with Yuliang
Zheng) Journal for Universal Computer Science, Vol. 1. No. 5, 1995,
316-333. |
| The Relationship between Propagation
Characteristics and Nonlinearity of Cryptographic Functions (with J. Seberry
and Yuliang Zheng) Journal for Universal Computer Science, Vol. 1. No.
2, 1995, 136-150. |
| Characterizing the Structures of
Highly Nonlinear Cryptographic Functions (with Yuliang Zheng) Designs, Codes and
Cryptography, Vol. 7, No. 1/2, 1996, 111-134. |
| New Bounds on The Nonlinearity of Boolean
Functions (with Yuliang Zheng) In Advances in Cryptography - EUROCRYPT'96, Lecture Notes in Computer Science, 1070,
Springer - Verlag, Berlin, Heidelbeg, New York, 1996, 294-306. |
| Difference Distribution Table of A Regular
Substitution Box (with Yuliang Zheng) Proceeding of The Third Annual Workship on Selected Areas in Cryptography (SAC'96), 1996,
57-60. |
| Non-existence of Certain Quadratic S-boxes and Two
Bounds on Nonlinear Characteristics of General S-boxes (with Yuliang Zheng and
Hideki Imai) Proceeding of The Fourth Annual Workship on
Selected Areas in Cryptography (SAC'97), 1997, 27-39. |
| New Lower Bounds on Nonlinearity and A Class of
Highly Nonlinear Functions (with Yuliang Zheng) Information Security and Privacy, Second Australasian Conference, ACISP'97, Lecture Notes
in Computer Science, 1270, Springer - Verlag, Berlin, Heidelbeg, New York, 1997,
147-158. |
| Cryptographically Resilient
Functions (with Yuliang Zheng) IEEE Trans. on Inform. Thy. 43, No. 5, 1997,
1740-1747. |
| Duality of Boolian Functions and Its
Cryptographic Significance (with Yuliang Zheng and Hideki
Imai) 1st International Conference on Information and Communications
Security, ICICS'97, Lecture Notes in Computer Science, 1334, Springer - Verlag, Berlin, Heidelbeg,
New York, 1997, 159-169. |
| The Nonhomomorphicity of
Boolean Functions (with Yuliang Zheng) 5th Annual International Workship on Selected Areas in Cryptography (SAC'98), Lecture
Notes in Computer Science, 1556, Springer - Verlag, Berlin, Heidelbeg, New York, 1999,
280-295. |
| Connections between Nonlinearity and Restrictions,
Terms and Hypergraphs of Boolean Functions (with Yuliang Zheng and Hideki
Imai) 1998 IEEE International Symposium on Information Theory, 1998,
439. |
| The Nonhomomorphicity of
S-boxes (with Yuliang Zheng) Proceedings of The 1st
International Conference on Information Security and Cryptography (ICISC'98), 131-145.
|
| Strong Linear Dependence and Unbiased Distribution
of Non-prppagative Vectors (with Yuliang Zheng) The Sixth Annual Workship on Selected Areas in Cryptography (SAC'99), Lecture Notes in
Computer Science, 1758, Springer - Verlag, Berlin, Heidelbeg, New York, 2000, 92-105.
|
| Restrictions, Terms and Nonlinearity of Boolean
Functions (with Yuliang Zheng and Hideki
Imai) Special Issue on Cryptography for Theoretical Computer Science, Vol.
226, No. 1-2, 1999, 207-223. |
| Plateaued
Functions (with Yuliang Zheng) 2nd International Conference on Information and Communications Security, ICICS'99, Lecture
Notes in Computer Science, 1726, Springer - Verlag, Berlin, Heidelbeg, New York, 1999,
284-300. |
| Relationships between Bent Functions and
Complementary Plateaued Functions (with Yuliang Zheng) The 2nd International Conference on Information Security and Cryptography (ICISC'99),
Lecture Notes in Computer Science, 1787, Springer - Verlag, Berlin, Heidelbeg, New York, 2000,
60-75. |
| Relating Differential Distribution Tables to Other
Properties of Substitution Boxes (with Yuliang Zheng and Hideki Imai) Designs, Codes
and Cryptography, Vol. 19, Issue 1, 2000, 45-63. |
| The Kth Order Nonhomomorphicity of
S-boxes (with Yuliang Zheng) Journal for Universal
Computer Science, Vol. 6. No. 8, 2000, 830-848. |
| Improved Upper Bound on the Nonlinearity of High
Order Correlation Immune Functions (with Yuliang Zheng) The Seventh Annual Workship on Selected Areas in Cryptography (SAC 2000), Lecture Notes in
Computer Science, 2012, Springer - Verlag, Berlin, Heidelbeg, New York, 2001, 262-274.
|
| Non-Separable Cryptographic
Functions, (with Yuliang Zheng) Proceedings of the 2000 IEEE International Symposium on Information Theory and its
Application (ISITA2000), 2000, Hawail, 51-58. |
| On Relationships among Avalanche, Nonlinearity, and
Correlation Immunity (with Yuliang Zheng) In Advances in Cryptography - Asiacrypt 2000, Lecture Notes in Computer Science, 1976,
Springer - Verlag, Berlin, Heidelbeg, New York, 2000, 470-482
|
| New Results on Correlation
Immunity (with Yuliang Zheng) The 3rd International
Conference on Information Security and Cryptography (ICISC 2000), Lecture Notes in Computer Science,
2015, Springer - Verlag, Berlin, Heidelbeg, New York, 2001, 49-63.
|
| On Plateaued Functions (with Yuliang Zheng) IEEE Trans. on Inform. Thy. 47, No. 3,
2001, 1215-1223. |
| A New Property of Maiorana-McFarland
Functions (with Yuliang Zheng) Bulletin of The Institute of Combinatorics and Its Applications, 33, 2001, 13-22.
|
| Nonlinear Secret Sharing Immune against
Cheating (with Josef Pieprzyk) Proceedings of
International Workshop on Cryptology and Network Security, September 26-28, 2001, Taiwan,
154-161. |
| Cheating Immune Secret
Sharing (with Josef Pieprzyk) 3rd International
Conference on Information and Communications Security, ICICS'01, Lecture Notes in Computer Science,
2229, Springer - Verlag, Berlin, Heidelbeg, New York, 2001, 144-149.
|
| Constructions of Cheating Immune Secret
Sharing (with Josef Pieprzyk) Proceedings of The 4th
International Conference on Information Security and Cryptography (ICISC 2001), Lecture Notes in
Computer Science, 2288, Springer - Verlag, Berlin, Heidelbeg, New York, 2002, 226-243.
|
| Cheating Prevention in Secret Sharing over
$GF(p^t)$ (with Josef Pieprzyk) 2nd International Conference on Cryptology in India (Indocrypt 2001), Lecture Notes in
Computer Science, 2247, Springer - Verlag, Berlin, Heidelbeg, New York, 2001, 79-90.
|
| Cheating Prevention in Linear Secret
Sharing (with Josef Pieprzyk) Information Security and
Privacy, 7th Australasian Conference, ACISP'02, Lecture Notes in Computer Science, 2384, Springer -
Verlag, Berlin, Heidelbeg, New York, 2002, 121-135. |
| Multisecret Sharing Immune against
Cheating (with Josef Pieprzyk) Proceedings of 2002
International Workshop on Cryptology and Network Security, September 26-28, 2002, San Francisco,
California, USA, 249-256. |
| Ideal Threshold Schemes
from MDS Codes (with Josef Pieprzyk) Proceedings of The 5th International Conference on Information Security and Cryptography
(ICISC 2002), November 28-29, 2002, Seoul, Korea, Lecture Notes in Computer Science, 2587, Springer
- Verlag, Berlin, Heidelberg, New York, 2003, pp. 253-263. |
| Ideal Threshold Schemes from Orthogonal
Arrays (with Josef Pieprzyk) 4th International
Conference on Information and Communications Security, ICICS'02, Lecture Notes in Computer Science,
2531, Springer - Verlag, Berlin, Heidelbeg, New York, 2002, 469-479.
|
| Connections among Nonlinearity, Avalanche and
Correlation Immunuty, (with Yuliang Zheng) Theoretical Computer Science, Vol. 292, No. 3, 2003, 697-710.
|
| The Generalized XOR Lemma (with Yuliang Zheng) Theoretical Computer Science, Vol. 329, No.
1-3, 2004, 331-337. |
| Characterisations of Extended
Resiliency and Extended Immunity of S-Boxes, (with Josef Pieprzyk and Jovan Dj.
Golic) The 8th International Conference on Information Security and
Cryptography (ICISC 2005), December 1-2, 2005, Seoul, Korea, Lecture Notes in Computer Science,
3935, Springer - Verlag, Berlin, Heidelbeg, New York, 2006, 210-228.
|
| On Algebraic Immunity and
Annihilators, (with Josef Pieprzyk and Yuliang
Zheng) The 9th International Conference on Information Security and
Cryptography (ICISC 2006), November 30 -- December 1, 2006, Busan, Korea, Lecture Notes in Computer
Science, 4296, Springer - Verlag, Berlin, Heidelbeg, New York, 2006, 65-80.
|
| Computing {M}$ddot{o}$bius Transforms of
Boolean Functions and Characterising Coincident Boolean Functions, (with Josef Pieprzyk) Proceedings of Third International Workshop
on Boolean Functions: Cryptography and Applications (BFCA'07), PUBLICATION DES UNIVERSIT ES DE ROUEN
ET DU HAVRE, Paris France, May 2-4, 2007, 127-143. |
| M$ddot{o}$bius-$alpha$ Commutative Functions and
Partially Coincident Functions, (with Josef Pieprzyk and Huaxiong
Wang) Proceedings of Fourth International Workshop on Boolean Functions:
Cryptography and Applications (BFCA'08)}, Copenhagen, Denmark, May 19-21, 2008, 135-150.
|
| M$ddot{o}$bius Transforms, Coincident Boolean
Functions and Noncoincidence Property of Boolean Functions, (with Josef
Pieprzyk and Huaxiong Wang) International Journal of Computer Mathematics},
Vol. 88, No. 7, May 2011, 1398 - 1416.
|
| | | |
|
|