Search the dblp DataBase
Xian-Mo Zhang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Josef Pieprzyk , Xian-Mo Zhang Cheating Prevention in Linear Secret Sharing. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:121-135 [Conf ] Xian-Mo Zhang , Yuliang Zheng New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:147-158 [Conf ] Josef Pieprzyk , Xian-Mo Zhang Permutation Generators of Alternating Groups. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:237-244 [Conf ] Jennifer Seberry , Xian-Mo Zhang Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:145-155 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:119-132 [Conf ] Yuliang Zheng , Xian-Mo Zhang On Relationships among Avalanche, Nonlinearity, and Correlation Immunity. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:470-482 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Systematic Generation of Cryptographically Robust S-Boxes. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:171-182 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:49-60 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Pitfalls in Designing Substitution Boxes (Extended Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:383-396 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:181-199 [Conf ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Relationships Among Nonlinear Criteria (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:376-388 [Conf ] Xian-Mo Zhang , Yuliang Zheng On Nonlinear Resilient Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:274-288 [Conf ] Xian-Mo Zhang , Yuliang Zheng Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1996, pp:294-306 [Conf ] Josef Pieprzyk , Xian-Mo Zhang Ideal Threshold Schemes from Orthogonal Arrays. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:469-479 [Conf ] Xian-Mo Zhang , Josef Pieprzyk Cheating Immune Secret Sharing. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:144-149 [Conf ] Xian-Mo Zhang , Yuliang Zheng , Hideki Imai Duality of Boolean functions and its cryptographic significance. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:159-169 [Conf ] Yuliang Zheng , Xian-Mo Zhang Plateaued Functions. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:284-300 [Conf ] Josef Pieprzyk , Xian-Mo Zhang Constructions of Cheating Immune Secret Sharing. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:226-243 [Conf ] Josef Pieprzyk , Xian-Mo Zhang Ideal Threshold Schemes from MDS Codes. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:253-263 [Conf ] Josef Pieprzyk , Xian-Mo Zhang , Jovan Dj. Golic Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:210-228 [Conf ] Xian-Mo Zhang , Josef Pieprzyk , Yuliang Zheng On Algebraic Immunity and Annihilators. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:65-80 [Conf ] Yuliang Zheng , Xian-Mo Zhang New Results on Correlation Immunity. [Citation Graph (0, 0)][DBLP ] ICISC, 2000, pp:49-63 [Conf ] Yuliang Zheng , Xian-Mo Zhang The nonhomomorphicity of S-boxes. [Citation Graph (0, 0)][DBLP ] ICISC, 1998, pp:131-145 [Conf ] Yuliang Zheng , Xian-Mo Zhang Relationships between Bent Functions and Complementary Plateaued Functions. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:60-75 [Conf ] Josef Pieprzyk , Xian-Mo Zhang Cheating Prevention in Secret Sharing over GF(pt ). [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:79-90 [Conf ] Xian-Mo Zhang , Yuliang Zheng The Nonhomomorphicity of Boolean Functions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:280-295 [Conf ] Yuliang Zheng , Xian-Mo Zhang Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:262-274 [Conf ] Yuliang Zheng , Xian-Mo Zhang Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1999, pp:92-105 [Conf ] Xian-Mo Zhang , Yuliang Zheng Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1996, v:7, n:1-2, pp:111-134 [Journal ] Xian-Mo Zhang , Yuliang Zheng , Hideki Imai Relating Differential Distribution Tables to Other Properties of of Substitution Boxes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2000, v:19, n:1, pp:45-63 [Journal ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Nonlinearity and Propagation Characteristics of Balanced Boolean Functions [Citation Graph (0, 0)][DBLP ] Inf. Comput., 1995, v:119, n:1, pp:1-13 [Journal ] Josef Pieprzyk , Xian-Mo Zhang Multisecret Sharing Immune Against Cheating. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng Improving the Strict Avalanche Characteristics of Cryptographic Functions. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1994, v:50, n:1, pp:37-41 [Journal ] Robert Craigen , Jennifer Seberry , Xian-Mo Zhang Product of Four Hadamard Matrices. [Citation Graph (0, 0)][DBLP ] J. Comb. Theory, Ser. A, 1992, v:59, n:2, pp:318-320 [Journal ] Jennifer Seberry , Xian-Mo Zhang , Yuliang Zheng The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions. [Citation Graph (0, 0)][DBLP ] J. UCS, 1995, v:1, n:2, pp:136-150 [Journal ] Xian-Mo Zhang , Yuliang Zheng On the Difficulty of Constructing Cryptographically Strong Substitution Boxes. [Citation Graph (0, 0)][DBLP ] J. UCS, 1996, v:2, n:3, pp:147-162 [Journal ] Yuliang Zheng , Xian-Mo Zhang The kth-Order Nonhomomorphicity of S-Boxes. [Citation Graph (0, 0)][DBLP ] J. UCS, 2000, v:6, n:8, pp:830-848 [Journal ] Yuliang Zheng , Xian-Mo Zhang Connections among nonlinearity, avalanche and correlation immunity. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2003, v:292, n:3, pp:697-710 [Journal ] Yuliang Zheng , Xian-Mo Zhang The Generalized XOR Lemma. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2004, v:329, n:1-3, pp:331-337 [Journal ] Yuliang Zheng , Xian-Mo Zhang , Hideki Imai Restriction, Terms and Nonlinearity of Boolean Functions. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:226, n:1-2, pp:207-223 [Journal ] Claude Carlet , Jennifer Seberry , Xian-Mo Zhang Comments on 'Generating and counting binary Bent sequences'. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1994, v:40, n:2, pp:600-0 [Journal ] Xian-Mo Zhang , Yuliang Zheng Cryptographically resilient functions. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1997, v:43, n:5, pp:1740-1747 [Journal ] Yuliang Zheng , Xian-Mo Zhang On plateaued functions. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2001, v:47, n:3, pp:1215-1223 [Journal ] Josef Pieprzyk , Xian-Mo Zhang On Cheating Immune Secret Sharing. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics & Theoretical Computer Science, 2004, v:6, n:2, pp:253-264 [Journal ] Josef Pieprzyk , Xian-Mo Zhang Characterisations of Ideal Threshold Schemes. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics & Theoretical Computer Science, 2004, v:6, n:2, pp:471-482 [Journal ] Efficient Disjointness Tests for Private Datasets. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.307secs