What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Xian-Mo Zhang
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2008
conf/acisp
Efficient Disjointness Tests for Private Datasets.
Qingsong Ye
Huaxiong Wang
Josef Pieprzyk
Xian-Mo Zhang
2006
conf/icisc
On Algebraic Immunity and Annihilators.
Xian-Mo Zhang
Josef Pieprzyk
Yuliang Zheng
2005
conf/icisc
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes.
Josef Pieprzyk
Xian-Mo Zhang
Jovan Dj. Golic
2002
conf/acisp
Cheating Prevention in Linear Secret Sharing.
Josef Pieprzyk
Xian-Mo Zhang
2002
conf/icisc
Ideal Threshold Schemes from MDS Codes.
Josef Pieprzyk
Xian-Mo Zhang
2002
conf/icics
Ideal Threshold Schemes from Orthogonal Arrays.
Josef Pieprzyk
Xian-Mo Zhang
2001
conf/icisc
Constructions of Cheating Immune Secret Sharing.
Josef Pieprzyk
Xian-Mo Zhang
2001
conf/icics
Cheating Immune Secret Sharing.
Xian-Mo Zhang
Josef Pieprzyk
2000
conf/icisc
New Results on Correlation Immunity.
Yuliang Zheng
Xian-Mo Zhang
2000
conf/asiacrypt
On Relationships among Avalanche, Nonlinearity, and Correlation Immunity.
Yuliang Zheng
Xian-Mo Zhang
2000
conf/sacrypt
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions.
Yuliang Zheng
Xian-Mo Zhang
1999
conf/icisc
Relationships between Bent Functions and Complementary Plateaued Functions.
Yuliang Zheng
Xian-Mo Zhang
1999
conf/icics
Plateaued Functions.
Yuliang Zheng
Xian-Mo Zhang
1999
conf/sacrypt
Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors.
Yuliang Zheng
Xian-Mo Zhang
1998
conf/icisc
The nonhomomorphicity of S-boxes.
Yuliang Zheng
Xian-Mo Zhang
1998
conf/sacrypt
The Nonhomomorphicity of Boolean Functions.
Xian-Mo Zhang
Yuliang Zheng
1997
conf/acisp
New Lower Bounds on Nonlinearity and a Class of Highly Nonlinear Functions.
Xian-Mo Zhang
Yuliang Zheng
1997
conf/icics
Duality of Boolean functions and its cryptographic significance.
Xian-Mo Zhang
Yuliang Zheng
Hideki Imai
1996
conf/eurocrypt
Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions.
Xian-Mo Zhang
Yuliang Zheng
1995
conf/eurocrypt
On Nonlinear Resilient Functions (Extended Abstract).
Xian-Mo Zhang
Yuliang Zheng
1994
conf/crypto
Pitfalls in Designing Substitution Boxes (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1994
conf/eurocrypt
Relationships Among Nonlinear Criteria (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1994
conf/asiacrypt
Structures of Cryptographic Functions with Strong Avalanche Characteristics (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1993
conf/ccs
Systematic Generation of Cryptographically Robust S-Boxes.
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1993
conf/crypto
Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1993
conf/eurocrypt
On Constructions and Nonlinearity of Correlation Immune Functions (Extended Abstract).
Jennifer Seberry
Xian-Mo Zhang
Yuliang Zheng
1992
conf/asiacrypt
Highly Nonlinear 0-1 Balanced Boolean Functions Satisfying Strict Avalanche Criterion.
Jennifer Seberry
Xian-Mo Zhang
1990
conf/asiacrypt
Permutation Generators of Alternating Groups.
Josef Pieprzyk
Xian-Mo Zhang
Coauthors
Hideki Imai
(1)
Huaxiong Wang
(1)
Jennifer Seberry
(7)
Josef Pieprzyk
(9)
Jovan Dj. Golic
(1)
Qingsong Ye
(1)
Xian-Mo Zhang
(28)
Yuliang Zheng
(19)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to