The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xian-Mo Zhang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Josef Pieprzyk, Xian-Mo Zhang
    Cheating Prevention in Linear Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:121-135 [Conf]
  2. Xian-Mo Zhang, Yuliang Zheng
    New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:147-158 [Conf]
  3. Josef Pieprzyk, Xian-Mo Zhang
    Permutation Generators of Alternating Groups. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:237-244 [Conf]
  4. Jennifer Seberry, Xian-Mo Zhang
    Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:145-155 [Conf]
  5. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:119-132 [Conf]
  6. Yuliang Zheng, Xian-Mo Zhang
    On Relationships among Avalanche, Nonlinearity, and Correlation Immunity. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:470-482 [Conf]
  7. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Systematic Generation of Cryptographically Robust S-Boxes. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:171-182 [Conf]
  8. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:49-60 [Conf]
  9. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Pitfalls in Designing Substitution Boxes (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:383-396 [Conf]
  10. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:181-199 [Conf]
  11. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Relationships Among Nonlinear Criteria (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:376-388 [Conf]
  12. Xian-Mo Zhang, Yuliang Zheng
    On Nonlinear Resilient Functions (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:274-288 [Conf]
  13. Xian-Mo Zhang, Yuliang Zheng
    Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:294-306 [Conf]
  14. Josef Pieprzyk, Xian-Mo Zhang
    Ideal Threshold Schemes from Orthogonal Arrays. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:469-479 [Conf]
  15. Xian-Mo Zhang, Josef Pieprzyk
    Cheating Immune Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:144-149 [Conf]
  16. Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
    Duality of Boolean functions and its cryptographic significance. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:159-169 [Conf]
  17. Yuliang Zheng, Xian-Mo Zhang
    Plateaued Functions. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:284-300 [Conf]
  18. Josef Pieprzyk, Xian-Mo Zhang
    Constructions of Cheating Immune Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:226-243 [Conf]
  19. Josef Pieprzyk, Xian-Mo Zhang
    Ideal Threshold Schemes from MDS Codes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:253-263 [Conf]
  20. Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golic
    Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:210-228 [Conf]
  21. Xian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng
    On Algebraic Immunity and Annihilators. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:65-80 [Conf]
  22. Yuliang Zheng, Xian-Mo Zhang
    New Results on Correlation Immunity. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:49-63 [Conf]
  23. Yuliang Zheng, Xian-Mo Zhang
    The nonhomomorphicity of S-boxes. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:131-145 [Conf]
  24. Yuliang Zheng, Xian-Mo Zhang
    Relationships between Bent Functions and Complementary Plateaued Functions. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:60-75 [Conf]
  25. Josef Pieprzyk, Xian-Mo Zhang
    Cheating Prevention in Secret Sharing over GF(pt). [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:79-90 [Conf]
  26. Xian-Mo Zhang, Yuliang Zheng
    The Nonhomomorphicity of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:280-295 [Conf]
  27. Yuliang Zheng, Xian-Mo Zhang
    Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:262-274 [Conf]
  28. Yuliang Zheng, Xian-Mo Zhang
    Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:92-105 [Conf]
  29. Xian-Mo Zhang, Yuliang Zheng
    Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:7, n:1-2, pp:111-134 [Journal]
  30. Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
    Relating Differential Distribution Tables to Other Properties of of Substitution Boxes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2000, v:19, n:1, pp:45-63 [Journal]
  31. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Nonlinearity and Propagation Characteristics of Balanced Boolean Functions [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1995, v:119, n:1, pp:1-13 [Journal]
  32. Josef Pieprzyk, Xian-Mo Zhang
    Multisecret Sharing Immune Against Cheating. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal]
  33. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    Improving the Strict Avalanche Characteristics of Cryptographic Functions. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1994, v:50, n:1, pp:37-41 [Journal]
  34. Robert Craigen, Jennifer Seberry, Xian-Mo Zhang
    Product of Four Hadamard Matrices. [Citation Graph (0, 0)][DBLP]
    J. Comb. Theory, Ser. A, 1992, v:59, n:2, pp:318-320 [Journal]
  35. Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng
    The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1995, v:1, n:2, pp:136-150 [Journal]
  36. Xian-Mo Zhang, Yuliang Zheng
    On the Difficulty of Constructing Cryptographically Strong Substitution Boxes. [Citation Graph (0, 0)][DBLP]
    J. UCS, 1996, v:2, n:3, pp:147-162 [Journal]
  37. Yuliang Zheng, Xian-Mo Zhang
    The kth-Order Nonhomomorphicity of S-Boxes. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2000, v:6, n:8, pp:830-848 [Journal]
  38. Yuliang Zheng, Xian-Mo Zhang
    Connections among nonlinearity, avalanche and correlation immunity. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2003, v:292, n:3, pp:697-710 [Journal]
  39. Yuliang Zheng, Xian-Mo Zhang
    The Generalized XOR Lemma. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2004, v:329, n:1-3, pp:331-337 [Journal]
  40. Yuliang Zheng, Xian-Mo Zhang, Hideki Imai
    Restriction, Terms and Nonlinearity of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:226, n:1-2, pp:207-223 [Journal]
  41. Claude Carlet, Jennifer Seberry, Xian-Mo Zhang
    Comments on 'Generating and counting binary Bent sequences'. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:2, pp:600-0 [Journal]
  42. Xian-Mo Zhang, Yuliang Zheng
    Cryptographically resilient functions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1997, v:43, n:5, pp:1740-1747 [Journal]
  43. Yuliang Zheng, Xian-Mo Zhang
    On plateaued functions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2001, v:47, n:3, pp:1215-1223 [Journal]
  44. Josef Pieprzyk, Xian-Mo Zhang
    On Cheating Immune Secret Sharing. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics & Theoretical Computer Science, 2004, v:6, n:2, pp:253-264 [Journal]
  45. Josef Pieprzyk, Xian-Mo Zhang
    Characterisations of Ideal Threshold Schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics & Theoretical Computer Science, 2004, v:6, n:2, pp:471-482 [Journal]

  46. Efficient Disjointness Tests for Private Datasets. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.307secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002