Suivre
Yin Tan
Titre
Citée par
Citée par
Année
Constructing Differentially 4-Uniform Permutations Over ${\BBF} _ {2^{2k}} $ via the Switching Method
L Qu, Y Tan, CH Tan, C Li
IEEE transactions on information theorY 59 (7), 4675-4686, 2013
1172013
Strongly regular graphs associated with ternary bent functions
Y Tan, A Pott, T Feng
Journal of Combinatorial Theory, Series A 117 (6), 668-682, 2010
1032010
Binomial differentially 4 uniform permutations with high nonlinearity
C Bracken, CH Tan, Y Tan
Finite Fields and Their Applications, 2011
912011
More Constructions of Differentially 4-uniform Permutations on
L Qu, Y Tan, C Li, G Gong
Designs, Codes and Cryptography, 2014
66*2014
Association schemes arising from bent functions
A Pott, Y Tan, T Feng, S Ling
Designs, Codes and Cryptography 59 (1), 319-331, 2011
632011
Strongly regular graphs constructed from p-ary bent functions
YM Chee, Y Tan, XD Zhang
Journal of Algebraic Combinatorics 34 (2), 251-266, 2011
562011
Zero-Difference Balanced Functions With Applications
C Ding, Y Tan
Journal of Statistical Theory and Practice 6 (1), 3-19, 2012
382012
New Families of Differentially 4-Uniform Permutations over\ mathbb F 2 2k\ mathbb F _ 2^ 2k
Y Tan, L Qu, C Tan, C Li
Sequences and Their Applications–SETA 2012, 25-39, 2012
282012
On a class of quadratic polynomials with no zeros and its application to APN functions
C Bracken, CH Tan, Y Tan
Finite Fields and Their Applications 25, 26-36, 2014
272014
On quadratic almost perfect nonlinear functions and their related algebraic object
G Weng, Y Tan, G Gong
Workshop on Coding and Cryptography, WCC, 2013
252013
Quadratic Zero-Difference Balanced Functions, APN Functions and Strongly Regular Graphs
C Carlet, G Gong, Y Tan
Designs, Codes and Cryptography, 2014
242014
A recursive construction of p-ary bent functions which are not weakly regular
Y Tan, J Yang, X Zhang
2010 IEEE International Conference on Information Theory and Information …, 2010
192010
Revisiting MAC forgeries, weak keys and provable security of Galois/counter mode of operation
B Zhu, Y Tan, G Gong
Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013
172013
Almost p-ary perfect sequences
Y Chee, Y Tan, Y Zhou
Sequences and Their Applications–SETA 2010, 399-415, 2010
172010
Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences
YM Chee, S Ling, Y Tan, X Zhang
Math. Comp 81, 585-603, 2012
132012
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions
Y Tan, G Gong, B Zhu
Cryptography and communications 8, 291-311, 2016
122016
On the Walsh spectrum of a family of quadratic APN functions with five terms
LJ Qu, Y Tan, C Li
Science China Information Sciences 57 (2), 1-7, 2014
82014
On the Fourier spectra of new APN functions
Y Tan, L Qu, S Ling, CH Tan
SIAM journal on discrete mathematics 27 (2), 791-801, 2013
72013
On a family of planar mappings
G Kyureghyan, Y Tan
Enhancing Cryptographic Primitives with Techniques from Error Correcting …, 2009
62009
Security assessment of TUAK algorithm set
G Gong, K Mandal, Y Tan, T Wu
CACR Technical Report, University of Waterloo, 2014
52014
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20