default search action
Guozhen Xiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j40]Chuan Lv, Tongjiang Yan, Guozhen Xiao:
New developments in q-polynomial codes. Cryptogr. Commun. 8(1): 103-112 (2016) - 2015
- [j39]Chuan Lv, Tongjiang Yan, Guozhen Xiao:
Multi-Rate Representation of Generalized Cyclotomic Sequences of Any Odd Period. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(11): 2301-2306 (2015) - 2013
- [j38]Yu Zhou, Weiguo Zhang, Juan Li, Xinfeng Dong, Guozhen Xiao:
The autocorrelation distribution of balanced Boolean function. Frontiers Comput. Sci. 7(2): 272-278 (2013) - [j37]Tongjiang Yan, Guozhen Xiao:
Divisible difference sets, relative difference sets and sequences with ideal autocorrelation. Inf. Sci. 249: 143-147 (2013) - 2012
- [j36]Yu Zhou, Wenzheng Zhang, Shixiong Zhu, Guozhen Xiao:
The global avalanche characteristics of two Boolean functions and algebraic immunity. Int. J. Comput. Math. 89(16): 2165-2179 (2012) - 2011
- [j35]Weiguo Zhang, Guozhen Xiao:
Construction of almost optimal resilient Boolean functions via concatenating Maiorana-McFarland functions. Sci. China Inf. Sci. 54(4): 909-912 (2011) - [j34]Tongjiang Yan, Xiaoni Du, Yuhua Sun, Guozhen Xiao:
Construction of d-Form Sequences with Ideal Autocorrelation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(8): 1696-1700 (2011) - 2010
- [j33]Yu Zhou, Min Xie, Guozhen Xiao:
On the global avalanche characteristics between two Boolean functions and the higher order nonlinearity. Inf. Sci. 180(2): 256-265 (2010)
2000 – 2009
- 2009
- [j32]Yu Zhou, Guozhen Xiao:
On the equal-weight symmetric Boolean functions. Frontiers Comput. Sci. China 3(4): 485-493 (2009) - [j31]Tongjiang Yan, Xiaoni Du, Guozhen Xiao, Xiaolong Huang:
Linear complexity of binary Whiteman generalized cyclotomic sequences of order 2k. Inf. Sci. 179(7): 1019-1023 (2009) - [c8]Ru Li, Liaojun Pang, Qingqi Pei, Guozhen Xiao:
Anonymous Communication in Wireless Mesh Network. CIS (2) 2009: 416-420 - [i5]Weiguo Zhang, Guozhen Xiao:
Constructions of Almost Optimal Resilient Boolean Functions on Large Even Number of Variables. CoRR abs/0905.0794 (2009) - 2008
- [j30]Tongjiang Yan, Shengqiang Li, Guozhen Xiao:
On the linear complexity of generalized cyclotomic sequences with the period pm. Appl. Math. Lett. 21(2): 187-193 (2008) - [j29]Xiaoni Du, Yu Zhou, Rong Sun, Guozhen Xiao:
On the Linear Complexity of Some Ternary Sequences with Ideal Autocorrelation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(2): 709-712 (2008) - [j28]Chunxiang Xu, Junhui Zhou, Guozhen Xiao:
General Group Oriented ID-based Cryptosystems with Chosen Plaintext Security. Int. J. Netw. Secur. 6(1): 1-5 (2008) - [j27]Tongjiang Yan, Xiaoni Du, Shuqing Li, Guozhen Xiao:
Trace Representations and Multi-rate Constructions of Two Classes of Generalized Cyclotomic Sequences. Int. J. Netw. Secur. 7(2): 269-272 (2008) - [j26]Tongjiang Yan, Li Hong, Guozhen Xiao:
The linear complexity of new generalized cyclotomic binary sequences of order four. Inf. Sci. 178(3): 807-815 (2008) - [j25]Tongjiang Yan, Bingjia Huang, Guozhen Xiao:
Cryptographic properties of some binary generalized cyclotomic sequences with the length p2. Inf. Sci. 178(4): 1078-1086 (2008) - [j24]Xiaoni Du, Zhixiong Chen, Guozhen Xiao:
On the linear complexity of some new q. Inf. Sci. 178(16): 3300-3306 (2008) - [j23]Xiaoni Du, Tongjiang Yan, Guozhen Xiao:
Trace representation of some generalized cyclotomic sequences of length pq. Inf. Sci. 178(16): 3307-3316 (2008) - [c7]Huawei Huang, Bo Yang, Shenglin Zhu, Guozhen Xiao:
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem. ProvSec 2008: 1-21 - 2007
- [j22]MingXin Lu, Xuejia Lai, Guozhen Xiao, Lei Qin:
Symmetric-key cryptosystem with DNA technology. Sci. China Ser. F Inf. Sci. 50(3): 324-333 (2007) - [j21]Weiguo Zhang, Mian Cai, Guozhen Xiao:
On constructing disjoint linear codes. Frontiers Comput. Sci. China 1(2): 226-230 (2007) - [j20]Ruwei Chen, Huawei Huang, Guozhen Xiao:
Relation Between Parity-Check Matrixes and Cycles of Associated Tanner Graphs. IEEE Commun. Lett. 11(8): 674-676 (2007) - [j19]Tongjiang Yan, Rong Sun, Guozhen Xiao:
Autocorrelation and Linear Complexity of the New Generalized Cyclotomic Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(4): 857-864 (2007) - [j18]Shengqiang Li, Zhixiong Chen, Rong Sun, Guozhen Xiao:
On the Randomness of Generalized Cyclotomic Sequences of Order Two and Length pq. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 2037-2041 (2007) - [j17]Ning Zhang, Zhixiong Chen, Guozhen Xiao:
Efficient elliptic curve scalar multiplication algorithms resistant to power analysis. Inf. Sci. 177(10): 2119-2129 (2007) - [j16]Zhixiong Chen, Xiaoni Du, Guozhen Xiao:
Sequences related to Legendre/Jacobi sequences. Inf. Sci. 177(21): 4820-4831 (2007) - [j15]Shengqiang Li, Zhixiong Chen, Xiaotong Fu, Guozhen Xiao:
Autocorrelation Values of New Generalized Cyclotomic Sequences of Order Two and Length pq. J. Comput. Sci. Technol. 22(6): 830-834 (2007) - [c6]Zhixiong Chen, Ning Zhang, Guozhen Xiao:
Pseudo-Randomness of Discrete-Log Sequences from Elliptic Curves. Inscrypt 2007: 231-245 - [c5]Tongjiang Yan, Xiaoni Du, Enjian Bai, Guozhen Xiao:
Some Notes on d -Form Functions with Difference-Balanced Property. WAIFI 2007: 11-17 - [i4]Zhixiong Chen, Guozhen Xiao:
'Good' Pseudo-Random Binary Sequences from Elliptic Curves. IACR Cryptol. ePrint Arch. 2007: 275 (2007) - 2006
- [c4]Zhixiong Chen, Shengqiang Li, Guozhen Xiao:
Construction of Pseudo-random Binary Sequences from Elliptic Curves by Using Discrete Logarithm. SETA 2006: 285-294 - 2005
- [j14]Zhang Zhang, Shunsuke Araki, Guozhen Xiao:
Improvement of Tseng et al.'s authenticated encryption scheme with message linkages. Appl. Math. Comput. 162(3): 1475-1483 (2005) - [j13]Enjian Bai, Xiaotong Fu, Guozhen Xiao:
On the Linear Complexity of Generalized Cyclotomic Sequences of Order Four Over Zpq. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 392-395 (2005) - [j12]Zhihua Niu, Enjian Bai, Guozhen Xiao:
The Stability of the Lattice Structure of Pseudorandom Number Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(4): 1096-1098 (2005) - [j11]Zhihua Niu, Guozhen Xiao:
Analysis of the Linear Complexity and Its Stability for 2pn-Periodic Binary Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(9): 2412-2418 (2005) - [j10]Enjian Bai, Xiaojuan Liu, Guozhen Xiao:
Linear complexity of new generalized cyclotomic sequences of order two of length pq. IEEE Trans. Inf. Theory 51(5): 1849-1853 (2005) - [c3]Shimin Wei, Guolong Chen, Guozhen Xiao:
A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences. CISC 2005: 202-209 - [i3]Jun-Bao Liu, Guozhen Xiao:
Multi-Proxy Multi-Signcryption Scheme from Pairings. CoRR abs/cs/0509030 (2005) - 2004
- [j9]Zhang Zhang, Guozhen Xiao:
New multisignature scheme for specified group of verifiers. Appl. Math. Comput. 157(2): 425-431 (2004) - [j8]Yupu Hu, Guozhen Xiao:
Pseudo-randomness of the fourth class of GSS sequences. Sci. China Ser. F Inf. Sci. 47(2): 170-183 (2004) - [j7]Yupu Hu, Guozhen Xiao:
Stream cipher based on GSS sequences. Sci. China Ser. F Inf. Sci. 47(6): 681-696 (2004) - [j6]Yupu Hu, Guozhen Xiao:
Generalized self-shrinking generator. IEEE Trans. Inf. Theory 50(4): 714-719 (2004) - [i2]Xiaotong Fu, Chunxiang Xu, Guozhen Xiao:
Forgery Attacks on Chang et al.'s signature scheme with message recovery. IACR Cryptol. ePrint Arch. 2004: 236 (2004) - 2003
- [j5]Yupu Hu, Guozhen Xiao:
Resilient functions over finite fields. IEEE Trans. Inf. Theory 49(8): 2040-2046 (2003) - [i1]Enjian Bai, Guozhen Xiao:
On the Randomness of the Editing Generator. IACR Cryptol. ePrint Arch. 2003: 139 (2003) - 2002
- [j4]Shimin Wei, Guozhen Xiao, Zhong Chen:
A fast algorithm for determining the minimal polynomial where of a sequence with period 2pn over GF(q). IEEE Trans. Inf. Theory 48(10): 2754-2758 (2002) - [c2]Guozhen Xiao, Shimin Wei:
Fast Algorithms for Determining the Linear Complexity of Period Sequences. INDOCRYPT 2002: 12-21 - 2001
- [j3]Shimin Wei, Guozhen Xiao, Zhong Chen:
A fast algorithm for determining the linear complexity of a binary sequence with period 2npm. Sci. China Ser. F Inf. Sci. 44(6): 453-460 (2001) - 2000
- [j2]Guozhen Xiao, Shimin Wei, Kwok-Yan Lam, Kyoki Imamura:
A fast algorithm for determining the linear complexity of a sequence with period pn over GF(q). IEEE Trans. Inf. Theory 46(6): 2203-2206 (2000) - [c1]Huaxiong Wang, Kwok-Yan Lam, Guozhen Xiao, Huanhui Zhao:
On Multiplicative Secret Sharing Schemes. ACISP 2000: 342-351
1990 – 1999
- 1999
- [j1]Yuqing Zhang, Jihong Li, Guozhen Xiao:
An Approach to the Formal Verification of the Two-Party Crypographic Protocols. ACM SIGOPS Oper. Syst. Rev. 33(4): 48-51 (1999) - 1991
- [b1]Cunsheng Ding, Guozhen Xiao, Weijuan Shan:
The Stability Theory of Stream Ciphers. Lecture Notes in Computer Science 561, Springer 1991, ISBN 3-540-54973-0
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:58 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint