Search the dblp DataBase
Chuan-Kun Wu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Chuan-Kun Wu , Ed Dawson On construction of resilient functions. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:79-86 [Conf ] Liming Wang , Chuan-Kun Wu Authenticated Group Key Agreement for Multicast. [Citation Graph (0, 0)][DBLP ] CANS, 2006, pp:55-72 [Conf ] Ed Dawson , Chuan-Kun Wu Construction of correlation immune Boolean functions. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:170-180 [Conf ] Chuan-Kun Wu , Vijay Varadharajan Fair Exchange of Digital Signatures with Offline Trusted Third Party. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:466-470 [Conf ] Chuan-Kun Wu , Vijay Varadharajan Modified Chinese Remainder Theorem and Its Application to Proxy Signatures. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:146-0 [Conf ] Wenying Zhang , Chuan-Kun Wu The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function. [Citation Graph (0, 0)][DBLP ] SETA, 2006, pp:391-401 [Conf ] Wenying Zhang , Chuan-Kun Wu , Shiqu Li Construction of Cryptographically Important Boolean Permutations. [Citation Graph (0, 0)][DBLP ] Appl. Algebra Eng. Commun. Comput., 2004, v:15, n:3-4, pp:173-177 [Journal ] Chuan-Kun Wu Hash channels. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:8, pp:653-661 [Journal ] Chuan-Kun Wu On the independence of Boolean functions. [Citation Graph (0, 0)][DBLP ] Int. J. Comput. Math., 2005, v:82, n:4, pp:415-420 [Journal ] Chuan-Kun Wu , Ed Dawson Correlation immunity and resiliency of symmetric Boolean functions. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2004, v:312, n:2-3, pp:321-335 [Journal ] Guo-Zhen Xiao , Ba-Zhong Shen , Chuan-Kun Wu , Chi Song Wong Some spectral techniques in coding theory. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 1991, v:87, n:2, pp:181-186 [Journal ] Xiao-Li Huang , Chuan-Kun Wu Cryptanalysis of Achterbahn-Version 1 and -Version 2. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2007, v:22, n:3, pp:469-475 [Journal ] Threshold Password-Based Authenticated Group Key Exchange in Gateway-Oriented Setting. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs