default search action
Yongzhuang Wei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j60]Xiaoli Dong, Jun Liu, Yongzhuang Wei, Wen Gao, Jie Chen:
Meet-in-the-middle attacks on AES with value constraints. Des. Codes Cryptogr. 92(9): 2423-2449 (2024) - [j59]Enes Pasalic, Amar Bapic, Fengrong Zhang, Yongzhuang Wei:
Using Pτ property for designing bent functions provably outside the completed Maiorana-McFarland class. Des. Codes Cryptogr. 92(9): 2639-2654 (2024) - [j58]Yongchao Li, Jingya Feng, Qi Zhao, Yongzhuang Wei:
HDLBC: A lightweight block cipher with high diffusion. Integr. 94: 102090 (2024) - [j57]Guoqiang Deng, Yongzhuang Wei, Xuefeng Duan, Enes Pasalic, Samir Hodzic:
Specifying cycles of minimal length for commonly used linear layers in block ciphers. J. Inf. Secur. Appl. 84: 103824 (2024) - [j56]Fu Yao, Hua Chen, Yongzhuang Wei, Enes Pasalic, Feng Zhou, Limin Fan:
Optimizing AES Threshold Implementation Under the Glitch-Extended Probing Model. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(7): 1984-1997 (2024) - [j55]Jingya Feng, Yongzhuang Wei, Fengrong Zhang, Enes Pasalic, Yu Zhou:
Novel Optimized Implementations of Lightweight Cryptographic S-Boxes via SAT Solvers. IEEE Trans. Circuits Syst. I Regul. Pap. 71(1): 334-347 (2024) - [j54]René Rodríguez-Aldama, Enes Pasalic, Fengrong Zhang, Yongzhuang Wei:
Minimal p-Ary Codes via the Direct Sum of Functions, Non-Covering Permutations and Subspaces of Derivatives. IEEE Trans. Inf. Theory 70(6): 4445-4463 (2024) - [i17]René Rodríguez-Aldama, Enes Pasalic, Fengrong Zhang, Yongzhuang Wei:
Self-Orthogonal Minimal Codes From (Vectorial) p-ary Plateaued Functions. IACR Cryptol. ePrint Arch. 2024: 1383 (2024) - 2023
- [j53]René Rodríguez, Yongzhuang Wei, Enes Pasalic:
A theoretical analysis of generalized invariants of bijective S-boxes. Cryptogr. Commun. 15(3): 487-512 (2023) - [j52]Xiaoli Dong, Yongzhuang Wei, Wen Gao, Jie Chen:
New Meet-in-the-Middle Attacks on FOX Block Cipher. Comput. J. 66(5): 1195-1212 (2023) - [j51]Enes Pasalic, Amar Bapic, Fengrong Zhang, Yongzhuang Wei:
Explicit infinite families of bent functions outside the completed Maiorana-McFarland class. Des. Codes Cryptogr. 91(7): 2365-2393 (2023) - [j50]Tianyi Shao, Bohua Wei, Yu Ou, Yongzhuang Wei, Xiaonian Wu:
New Second-order Threshold Implementation of Sm4 Block Cipher. J. Electron. Test. 39(4): 435-445 (2023) - [j49]Haixia Zhao, Keque Li, Yongzhuang Wei:
A new algebraic attack on DASTA. J. High Speed Networks 29(2): 147-157 (2023) - [j48]Wanjun Xiong, Ruomei Wang, Yujue Wang, Yongzhuang Wei, Fan Zhou, Xiaonan Luo:
Improved Certificateless Aggregate Signature Scheme Against Collusion Attacks for VANETs. IEEE Syst. J. 17(1): 1098-1109 (2023) - [i16]René Rodríguez, Enes Pasalic, Fengrong Zhang, Yongzhuang Wei:
Minimal p-ary codes from non-covering permutations. IACR Cryptol. ePrint Arch. 2023: 438 (2023) - [i15]Fu Yao, Hua Chen, Yongzhuang Wei, Enes Pasalic, Feng Zhou, Limin Fan:
Optimizing AES Threshold Implementation under the Glitch-Extended Probing Model. IACR Cryptol. ePrint Arch. 2023: 1856 (2023) - 2022
- [j47]Yu Zhou, Xinfeng Dong, Yongzhuang Wei, Fengrong Zhang:
A note on the Signal-to-noise ratio of (n, m)-functions. Adv. Math. Commun. 16(2): 413-437 (2022) - [j46]H. Zhao, Yongzhuang Wei, Fengrong Zhang, Enes Pasalic, Nastja Cepak:
Two secondary constructions of bent functions without initial conditions. Des. Codes Cryptogr. 90(3): 653-679 (2022) - [j45]Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei:
Minimal binary linear codes: a general framework based on bent concatenation. Des. Codes Cryptogr. 90(5): 1289-1318 (2022) - [j44]Haixia Zhao, Yongzhuang Wei:
New construction of highly nonlinear resilient S-boxes via linear codes. Frontiers Comput. Sci. 16(3): 163805 (2022) - [j43]Xiaoli Dong, Yongzhuang Wei:
New attacks against reduced Rijndael-160. IET Inf. Secur. 16(1): 28-40 (2022) - [j42]Ting Fan, Lingchen Li, Yongzhuang Wei, Enes Pasalic:
Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher. Int. J. Distributed Sens. Networks 18(9): 155013292211193 (2022) - [j41]Haixia Zhao, Yongzhuang Wei, Zhenghong Liu:
A New BISON-like Construction Block Cipher: DBISON. KSII Trans. Internet Inf. Syst. 16(5): 1611-1633 (2022) - [j40]Xiaonian Wu, Ying-Xin Li, Lingchen Li, Yongzhuang Wei, Runlian Zhang:
Impossible Differential Cryptanalysis of BORON. J. Inf. Sci. Eng. 38(4): 805-819 (2022) - [c14]Xiaonian Wu, Nian Tong, Ruanlian Zhang, Yongzhuang Wei:
The Power Analysis Based on Mean-Ridge Regression. DSC 2022: 268-274 - [i14]Enes Pasalic, Amar Bapic, Fengrong Zhang, Yongzhuang Wei:
Explicit infinite families of bent functions outside MM#. IACR Cryptol. ePrint Arch. 2022: 1126 (2022) - 2021
- [j39]Enes Pasalic, René Rodríguez, Fengrong Zhang, Yongzhuang Wei:
Several classes of minimal binary linear codes violating the Ashikhmin-Barg bound. Cryptogr. Commun. 13(5): 637-659 (2021) - [j38]Enes Pasalic, Fengrong Zhang, Sadmir Kudin, Yongzhuang Wei:
Vectorial bent functions weakly/strongly outside the completed Maiorana-McFarland class. Discret. Appl. Math. 294: 138-151 (2021) - [j37]Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei:
Wide minimal binary linear codes from the general Maiorana-McFarland class. Des. Codes Cryptogr. 89(7): 1485-1507 (2021) - [j36]Fengrong Zhang, Enes Pasalic, Yongzhuang Wei:
Constructions of balanced Boolean functions on even number of variables with maximum absolute value in autocorrelation spectra 2n2☆. Inf. Sci. 575: 437-453 (2021) - [j35]Yu Zhou, Xinfeng Dong, Yongzhuang Wei:
On the transparency order relationships between one Boolean function and its decomposition functions. J. Inf. Secur. Appl. 58: 102738 (2021) - [j34]Xueying Qiu, Yongzhuang Wei, Samir Hodzic, Enes Pasalic:
Integral Distinguishers of the Full-Round Lightweight Block Cipher SAT_Jo. Secur. Commun. Networks 2021: 5310545:1-5310545:9 (2021) - [j33]Yu Zhou, Yongzhuang Wei, Hailong Zhang, Wenzheng Zhang:
On the Modified Transparency Order of n , m -Functions. Secur. Commun. Networks 2021: 6640099:1-6640099:14 (2021) - [j32]Xianwen Liao, Yongzhong Huang, Yongzhuang Wei, Chenhao Zhang, Fu Wang, Yong Wang:
Efficient Estimate of Sentence's Representation Based on the Difference Semantics Model. IEEE ACM Trans. Audio Speech Lang. Process. 29: 3384-3399 (2021) - [j31]Huijiao Wang, Lin Wu, Qing Zhao, Yongzhuang Wei, Hua Jiang:
Energy Balanced Source Location Privacy Scheme Using Multibranch Path in WSNs for IoT. Wirel. Commun. Mob. Comput. 2021: 6654427:1-6654427:12 (2021) - [c13]Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:
On Characterization of Transparency Order for (n, m)-functions. Inscrypt 2021: 351-370 - [c12]Tao Ye, Yongzhuang Wei, Lingcheng Li, Enes Pasalic:
Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation. ISPEC 2021: 306-326 - [c11]Yu Zhou, Yongzhuang Wei, Hailong Zhang, Luyang Li, Enes Pasalic, Wenling Wu:
Transparency Order of (n, m)-Functions - Its Further Characterization and Applications. ISC 2021: 139-157 - 2020
- [j30]Fengrong Zhang, Nastja Cepak, Enes Pasalic, Yongzhuang Wei:
Further analysis of bent functions from C and D which are provably outside or inside M#. Discret. Appl. Math. 285: 458-472 (2020) - [j29]Samir Hodzic, Enes Pasalic, Yongzhuang Wei:
A general framework for secondary constructions of bent and plateaued functions. Des. Codes Cryptogr. 88(10): 2007-2035 (2020) - [j28]Xuexuan Hao, Fengrong Zhang, Yongzhuang Wei, Yong Zhou:
Quantum period finding based on the Bernstein-Vazirani algorithm. Quantum Inf. Comput. 20(1&2): 65-84 (2020) - [i13]Fengrong Zhang, Nastja Cepak, Enes Pasalic, Yongzhuang Wei:
Bent functions stemming from Maiorana-McFarland class being provably outside its completed version. IACR Cryptol. ePrint Arch. 2020: 345 (2020) - [i12]Yongzhuang Wei, René Rodríguez, Enes Pasalic:
Cycle structure of generalized and closed loop invariants. IACR Cryptol. ePrint Arch. 2020: 1095 (2020) - [i11]Enes Pasalic, René Rodríguez, Fengrong Zhang, Yongzhuang Wei:
Several classes of minimal binary linear codes violating the Aschikhmin-Barg's bound. IACR Cryptol. ePrint Arch. 2020: 1131 (2020) - [i10]Guoqiang Deng, Yongzhuang Wei, Xuefeng Duan, Enes Pasalic, Samir Hodzic:
Specifying cycles of minimal length for commonly used linear layers in block ciphers. IACR Cryptol. ePrint Arch. 2020: 1163 (2020) - [i9]Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei:
A huge class of infinite sequences of minimal binary linear codes with or without crossing the Ashikhmin-Barg's bound. IACR Cryptol. ePrint Arch. 2020: 1398 (2020)
2010 – 2019
- 2019
- [j27]Enes Pasalic, Samir Hodzic, Fengrong Zhang, Yongzhuang Wei:
Bent functions from nonlinear permutations and conversely. Cryptogr. Commun. 11(2): 207-225 (2019) - [j26]Yongzhuang Wei, Fu Yao, Enes Pasalic, An Wang:
New second-order threshold implementation of AES. IET Inf. Secur. 13(2): 117-124 (2019) - [j25]Samir Hodzic, Enes Pasalic, Yongzhuang Wei:
Guess and determine cryptanalysis with variable sampling and its applications. IET Inf. Secur. 13(6): 559-569 (2019) - [j24]Yu Zhou, Yongzhuang Wei, Fengrong Zhang:
Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things. Secur. Commun. Networks 2019: 1348639:1-1348639:15 (2019) - [j23]Tao Ye, Yongzhuang Wei, Willi Meier:
A New Cube Attack on MORUS by Using Division Property. IEEE Trans. Computers 68(12): 1731-1740 (2019) - [j22]Yujue Wang, Yong Ding, Qianhong Wu, Yongzhuang Wei, Bo Qin, Huiyong Wang:
Privacy-Preserving Cloud-Based Road Condition Monitoring With Source Authentication in VANETs. IEEE Trans. Inf. Forensics Secur. 14(7): 1779-1790 (2019) - [j21]Samir Hodzic, Enes Pasalic, Yongzhuang Wei, Fengrong Zhang:
Designing Plateaued Boolean Functions in Spectral Domain and Their Classification. IEEE Trans. Inf. Theory 65(9): 5865-5879 (2019) - 2018
- [j20]Qian He, Ning Zhang, Yongzhuang Wei, Yan Zhang:
Lightweight attribute based encryption scheme for mobile cloud assisted cyber-physical systems. Comput. Networks 140: 163-173 (2018) - [j19]Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:
Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis. IET Inf. Secur. 12(5): 389-397 (2018) - [j18]Fengrong Zhang, Yongzhuang Wei, Enes Pasalic, Shixiong Xia:
Large Sets of Disjoint Spectra Plateaued Functions Inequivalent to Partially Linear Functions. IEEE Trans. Inf. Theory 64(4): 2987-2999 (2018) - [j17]Yongzhuang Wei, Tao Ye, Wenling Wu, Enes Pasalic:
Generalized Nonlinear Invariant Attack and a New Design Criterion for Round Constants. IACR Trans. Symmetric Cryptol. 2018(4): 62-79 (2018) - [i8]Samir Hodzic, Enes Pasalic, Yongzhuang Wei:
A general framework for secondary constructions of bent and plateaued functions. CoRR abs/1809.07390 (2018) - [i7]Samir Hodzic, Enes Pasalic, Yongzhuang Wei, Fengrong Zhang:
Designing plateaued Boolean functions in spectral domain and their classification. CoRR abs/1811.04171 (2018) - 2017
- [j16]Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Samir Hodzic:
Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large n. Inf. Sci. 402: 91-104 (2017) - [j15]Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Wenling Wu, Cheng-Xiang Wang:
New constructions of resilient functions with strictly almost optimal nonlinearity via non-overlap spectra functions. Inf. Sci. 415: 377-396 (2017) - [j14]Yudan Tian, Yongzhuang Wei:
iPMAC及VPMAC的伪造攻击 (Forgery Attack on Authenticated Cipher Mode iPMAC and VPMAC). 计算机科学 44(3): 192-194 (2017) - [j13]Fengrong Zhang, Enes Pasalic, Yongzhuang Wei, Nastja Cepak:
Constructing Bent Functions Outside the Maiorana-McFarland Class Using a General Form of Rothaus. IEEE Trans. Inf. Theory 63(8): 5336-5349 (2017) - [c10]Fengrong Zhang, Enes Pasalic, Nastja Cepak, Yongzhuang Wei:
Bent Functions in C and D Outside the Completed Maiorana-McFarland Class. C2SI 2017: 298-313 - 2016
- [j12]Enes Pasalic, Nastja Cepak, Yongzhuang Wei:
Infinite classes of vectorial plateaued functions, permutations and complete permutations. Discret. Appl. Math. 215: 177-184 (2016) - [j11]Yongzhuang Wei, Wenbin Yin, Enes Pasalic, Fengrong Zhang:
On algebraic properties of S-boxes designed by means of disjoint linear codes. Int. J. Comput. Math. 93(1): 55-66 (2016) - [i6]Samir Hodzic, Enes Pasalic, Yongzhuang Wei:
Optimizing the placement of tap positions and guess and determine cryptanalysis with variable sampling. CoRR abs/1609.08422 (2016) - [i5]Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Samir Hodzic:
Efficient probabilistic algorithm for estimating the algebraic properties of Boolean functions for large n. IACR Cryptol. ePrint Arch. 2016: 671 (2016) - 2015
- [j10]Fengrong Zhang, Yongzhuang Wei, Enes Pasalic:
Constructions of Bent - Negabent Functions and Their Relation to the Completed Maiorana - McFarland Class. IEEE Trans. Inf. Theory 61(3): 1496-1506 (2015) - 2014
- [j9]Hongmei Zhang, Yongzhuang Wei, Rongxing Lu, Rose Qingyang Hu:
Call for papers: systematic network optimizations for security parameters (security and communication networks). Secur. Commun. Networks 7(11): 2180 (2014) - [j8]Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic:
The higher-order meet-in-the-middle attack and its application to the Camellia block cipher. Theor. Comput. Sci. 527: 102-122 (2014) - [c9]Enes Pasalic, Samir Hodzic, Samed Bajric, Yongzhuang Wei:
Optimizing the Placement of Tap Positions. BalkanCryptSec 2014: 15-30 - [i4]Yongzhuang Wei, Enes Pasalic, Fengrong Zhang, Wenling Wu:
Key recovery attacks on Grain family using BSW sampling and certain weaknesses of the filtering function. IACR Cryptol. ePrint Arch. 2014: 971 (2014) - 2013
- [j7]Yongzhuang Wei, Enes Pasalic:
On the approximation of S-boxes via Maiorana-McFarland functions. IET Inf. Secur. 7(2) (2013) - [c8]Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis. CT-RSA 2013: 389-404 - [i3]Enes Pasalic, Yongzhuang Wei:
Generic related-key and induced chosen IV attacks using the method of key differentiation. IACR Cryptol. ePrint Arch. 2013: 586 (2013) - 2012
- [j6]Jiqiang Lu, Yongzhuang Wei, Pierre-Alain Fouque, Jongsung Kim:
Cryptanalysis of reduced versions of the Camellia block cipher. IET Inf. Secur. 6(3): 228-238 (2012) - [j5]Fengrong Zhang, Yupu Hu, Min Xie, Yongzhuang Wei:
Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity. Secur. Commun. Networks 5(6): 614-624 (2012) - [j4]Yongzhuang Wei, Enes Pasalic, Yupu Hu:
Guess and Determine Attacks on Filter Generators - Revisited. IEEE Trans. Inf. Theory 58(4): 2530-2539 (2012) - [j3]Enes Pasalic, Yongzhuang Wei:
On the Construction of Cryptographically Significant Boolean Functions Using Objects in Projective Geometry Spaces. IEEE Trans. Inf. Theory 58(10): 6681-6693 (2012) - [c7]Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic:
The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher. INDOCRYPT 2012: 244-264 - [c6]Jiqiang Lu, Yongzhuang Wei, Enes Pasalic, Pierre-Alain Fouque:
Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher. IWSEC 2012: 197-215 - [c5]Yongzhuang Wei, Shuai Wang, Chunfeng Yuan, Yihua Huang:
Parallelized Near-Duplicate Document Detection Algorithm for Large Scale Chinese Web Pages. PDCAT 2012: 523-528 - [i2]Jiqiang Lu, Wun-She Yap, Yongzhuang Wei:
Weak Keys of the Full MISTY1 Block Cipher for Related-Key Cryptanalysis. IACR Cryptol. ePrint Arch. 2012: 66 (2012) - 2011
- [j2]Yongzhuang Wei, Enes Pasalic, Yupu Hu:
A New Correlation Attack on Nonlinear Combining Generators. IEEE Trans. Inf. Theory 57(9): 6321-6331 (2011) - [c4]Yongzhuang Wei, Jiqiang Lu, Yupu Hu:
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits. ISPEC 2011: 222-232 - 2010
- [i1]Yongzhuang Wei, Jiqiang Lu, Yupu Hu:
Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits. IACR Cryptol. ePrint Arch. 2010: 537 (2010)
2000 – 2009
- 2009
- [j1]Yongzhuang Wei, YuPu Hu:
New related-key rectangle attacks on reduced AES-192 and AES-256. Sci. China Ser. F Inf. Sci. 52(4): 617-626 (2009) - 2007
- [c3]Yongzhuang Wei, Yupu Hu:
Maximum Autocorrelation Analysis of Nonlinear Combining Functions in Stream Ciphers. ISIT 2007: 176-180 - 2005
- [c2]Yongzhuang Wei, Yu-pu Hu:
A construction of resilient functions with satisfying synthetical cryptographic criteria. ITW 2005: 248-252 - 2004
- [c1]Yongzhuang Wei, Yu-Pu Hu:
New construction of resilient functions with satisfying multiple cryptographic criteria. InfoSecu 2004: 175-180
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint