Jinyong Shan
Jinyong Shan
Verified email at
Cited by
Cited by
More balanced Boolean functions with optimal algebraic immunity and good nonlinearity and resistance to fast algebraic attacks
X Zeng, C Carlet, J Shan, L Hu
IEEE Transactions on Information Theory 57 (9), 6310-6320, 2011
A triple-error-correcting cyclic code from the Gold and Kasami–Welch APN power functions
X Zeng, J Shan, L Hu
Finite Fields and Their Applications 18 (1), 70-92, 2012
Further results on differentially 4-uniform permutations over
Z Zha, L Hu, S Sun, J Shan
Science China Mathematics 58 (7), 1577-1588, 2015
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
J Li, C Carlet, X Zeng, C Li, L Hu, J Shan
Designs, Codes and Cryptography 76, 279-305, 2015
Improved differential analysis of block cipher PRIDE
Q Yang, L Hu, S Sun, K Qiao, L Song, J Shan, X Ma
Information Security Practice and Experience: 11th International Conference …, 2015
19 轮 RECTANGLE-80 的相关密钥差分分析
单进勇, 胡磊, 宋凌, 孙思维, 马小双
密码学报 2 (1), 54-65, 2015
Tighter security bound of MIBS block cipher against differential attack
X Ma, L Hu, S Sun, K Qiao, J Shan
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
Differentially 6-uniform permutations by modifying the Gold function
Z Zha, L Hu, J Shan
2014 IEEE International Conference on Information and Automation (ICIA), 961-965, 2014
Is vertical logistic regression privacy-preserving? A comprehensive privacy analysis and beyond
Y Hu, T Cai, J Shan, S Tang, C Cai, E Song, B Li, D Song
arXiv preprint arXiv:2207.09087, 2022
Solving small exponential ECDLP in EC-based additively homomorphic encryption and applications
F Tang, G Ling, C Cai, J Shan, X Liu, P Tang, W Qiu
IEEE Transactions on Information Forensics and Security, 2023
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis
S Sun, L Hu, M Wang, Q Yang, K Qiao, X Ma, L Song, J Shan
Information Security: 18th International Conference, ISC 2015, Trondheim …, 2015
IHVFL: A privacy-enhanced intention-hiding vertical federated learning framework for medical data
F Tang, S Liang, G Ling, J Shan
Cybersecurity 6 (1), 37, 2023
Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s
S Sun, L Hu, K Qiao, X Ma, J Shan, L Song
Advances in Information and Computer Security: 10th International Workshop …, 2015
Manipulating supply chain demand forecasting with targeted poisoning attacks
J Chen, Y Gao, J Shan, K Peng, C Wang, H Jiang
IEEE Transactions on Industrial Informatics, 2022
单进勇, 高胜
密码学报 5 (5), 484-500, 2018
Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher
J Shan, L Hu, X Zeng
Cryptography and Communications 6, 233-254, 2014
基于国产密码算法 SM9 的可追踪属性签名方案
唐飞, 凌国玮, 单进勇
电子与信息学报 44 (10), 3610-3617, 2022
基于国密 SM2 和 SM9 的加法同态加密方案
唐飞, 凌国玮, 单进勇
密码学报 9 (3), 535-549, 2022
A construction of 1-resilient Boolean functions with good cryptographic properties
J Shan, L Hu, X Zeng, C Li
Journal of Systems Science and Complexity 31 (4), 1042-1064, 2018
Security of LBlock-s against related-key differential attack
J Shan, L Hu, S Sun
2015 2nd International Conference on Electronics and Communication Systems …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20