default search action
Deng Tang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Wenqin Zhang, Deng Tang, Chenhao Ying, Yuan Luo:
Constructions of optimal binary locally repairable codes via intersection subspaces. Sci. China Inf. Sci. 67(6) (2024) - [j41]Zhaole Li, Bing Shen, Deng Tang:
A lower bound on the third-order nonlinearity of the simplest PSap bent functions. Discret. Appl. Math. 349: 148-161 (2024) - [j40]Jianing Zhang, Haoyang Wang, Deng Tang:
Impossible Boomerang Attacks Revisited Applications to Deoxys-BC, Joltik-BC and SKINNY. IACR Trans. Symmetric Cryptol. 2024(2): 254-295 (2024) - [i17]Hong-Sen Yang, Qun-Xiong Zheng, Jing Yang, Quan-feng Liu, Deng Tang:
A New Security Evaluation Method Based on Resultant for Arithmetic-Oriented Algorithms. IACR Cryptol. ePrint Arch. 2024: 886 (2024) - [i16]Weizhe Wang, Deng Tang:
Differential Fault Attack on HE-Friendly Stream Ciphers: Masta, Pasta and Elisabeth. IACR Cryptol. ePrint Arch. 2024: 1005 (2024) - [i15]Jianing Zhang, Haoyang Wang, Deng Tang:
Impossible Boomerang Attacks Revisited: Applications to Deoxys-BC, Joltik-BC and SKINNY. IACR Cryptol. ePrint Arch. 2024: 1230 (2024) - [i14]Ying Ouyang, Deng Tang, Yanhong Xu:
Code-Based Zero-Knowledge from VOLE-in-the-Head and Their Applications: Simpler, Faster, and Smaller. IACR Cryptol. ePrint Arch. 2024: 1414 (2024) - 2023
- [j39]Jianchao Zhang, Deng Tang:
A Note on the Transformation Behaviors between Truth Tables and Algebraic Normal Forms of Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(7): 1007-1010 (2023) - [c6]Weizhe Wang, Haoyang Wang, Deng Tang:
An Improved Method for Evaluating Secret Variables and Its Application to WAGE. Inscrypt (1) 2023: 360-378 - [i13]Weizhe Wang, Haoyang Wang, Deng Tang:
An Improved Method for Evaluating Secret Variables and Its Application to WAGE. IACR Cryptol. ePrint Arch. 2023: 1870 (2023) - [i12]Weizhe Wang, Deng Tang:
Integral Multiset: A Novel Framework for Integral Attacks over Finite Fields. IACR Cryptol. ePrint Arch. 2023: 1872 (2023) - [i11]Anupam Chattopadhyay, Subhamoy Maitra, Bimal Mandal, Manmatha Roy, Deng Tang:
Efficient Hardware Implementation for Maiorana-McFarland type Functions. IACR Cryptol. ePrint Arch. 2023: 1970 (2023) - 2022
- [j38]Xia Li, Qin Yue, Deng Tang:
The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic. Cryptogr. Commun. 14(3): 653-662 (2022) - [j37]Deng Tang, Bimal Mandal, Subhamoy Maitra:
Further cryptographic properties of the multiplicative inverse function. Discret. Appl. Math. 307: 191-211 (2022) - [j36]Xia Li, Qin Yue, Deng Tang:
A family of linear codes from constant dimension subspace codes. Des. Codes Cryptogr. 90(1): 1-15 (2022) - [j35]Lijing Zheng, Baixiang Liu, Haibin Kan, Jie Peng, Deng Tang:
More classes of permutation quadrinomials from Niho exponents in characteristic two. Finite Fields Their Appl. 78: 101962 (2022) - [j34]Lijing Zheng, Haibin Kan, Yanjun Li, Jie Peng, Deng Tang:
Constructing New APN Functions Through Relative Trace Functions. IEEE Trans. Inf. Theory 68(11): 7528-7537 (2022) - 2021
- [j33]Lijing Zheng, Haibin Kan, Jie Peng, Deng Tang:
Constructing vectorial bent functions via second-order derivatives. Discret. Math. 344(8): 112473 (2021) - [j32]Lijing Zheng, Haibin Kan, Jie Peng, Deng Tang:
Two classes of permutation trinomials with Niho exponents. Finite Fields Their Appl. 70: 101790 (2021) - [j31]Deng Tang, Bimal Mandal, Subhamoy Maitra:
Construction of balanced vectorial Boolean functions with almost optimal nonlinearity and very low differential-linear uniformity. Finite Fields Their Appl. 76: 101903 (2021) - [j30]Claude Carlet, Éloi de Chérisey, Sylvain Guilley, Selçuk Kavut, Deng Tang:
Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios. IEEE Trans. Inf. Forensics Secur. 16: 203-218 (2021) - [i10]Lijing Zheng, Haibin Kan, Yanjun Li, Jie Peng, Deng Tang:
Constructing new APN functions through relative trace functions. CoRR abs/2101.11535 (2021) - [i9]Wenqin Zhang, Deng Tang, Yuan Luo:
Constructions of Binary Optimal Locally Repairable Codes via Intersection Subspaces. CoRR abs/2105.11271 (2021) - [i8]Subhamoy Maitra, Chandra Sekhar Mukherjee, Pantelimon Stanica, Deng Tang:
On Boolean Functions with Low Polynomial Degree and Higher Order Sensitivity. CoRR abs/2107.11205 (2021) - 2020
- [j29]Deng Tang:
A note on the fast algebraic immunity and its consequences on modified majority functions. Adv. Math. Commun. 14(1): 111-125 (2020) - [j28]Deng Tang, Haode Yan, Zhengchun Zhou, Xiaosong Zhang:
A new lower bound on the second-order nonlinearity of a class of monomial bent functions. Cryptogr. Commun. 12(1): 77-83 (2020) - [j27]Deng Tang, Xia Li:
A note on the minimal binary linear code. Cryptogr. Commun. 12(3): 375-388 (2020) - [j26]Jian Liu, Sihem Mesnager, Deng Tang:
Constructions of optimal locally recoverable codes via Dickson polynomials. Des. Codes Cryptogr. 88(9): 1759-1780 (2020) - [j25]Haode Yan, Deng Tang:
Improving lower bounds on the second-order nonlinearity of three classes of Boolean functions. Discret. Math. 343(5): 111698 (2020) - [j24]Deng Tang:
A Note on the Algebraic Immunity of the Enhanced Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 366-369 (2020) - [c5]Subhamoy Maitra, Bimal Mandal, Manmatha Roy, Deng Tang:
Experimental Results on Higher-Order Differential Spectra of 6 and 8-bit Invertible S-Boxes. SPACE 2020: 226-237 - [i7]Deng Tang, Bimal Mandal, Subhamoy Maitra:
Further Cryptographic Properties of the Multiplicative Inverse Function. IACR Cryptol. ePrint Arch. 2020: 920 (2020)
2010 – 2019
- 2019
- [j23]Deng Tang, Jian Liu:
A family of weightwise (almost) perfectly balanced boolean functions with optimal algebraic immunity. Cryptogr. Commun. 11(6): 1185-1197 (2019) - [j22]Selçuk Kavut, Subhamoy Maitra, Deng Tang:
Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile. Des. Codes Cryptogr. 87(2-3): 261-276 (2019) - [j21]Lin Wang, Zhi Hu, Deng Tang:
On Searching Maximal-Period Dynamic LFSRs With at Most Four Switches. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 152-154 (2019) - [j20]Yindong Chen, Liu Zhang, Deng Tang, Weihong Cai:
Translation Equivalence of Boolean Functions Expressed by Primitive Element. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(4): 672-675 (2019) - [j19]Deng Tang:
On the Construction of Balanced Boolean Functions with Strict Avalanche Criterion and Optimal Algebraic Immunity. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1321-1325 (2019) - [j18]Deng Tang, Selçuk Kavut, Bimal Mandal, Subhamoy Maitra:
Modifying Maiorana-McFarland Type Bent Functions for Good Cryptographic Properties and Efficient Implementation. SIAM J. Discret. Math. 33(1): 238-256 (2019) - [c4]Deng Tang, Bimal Mandal, Subhamoy Maitra:
Vectorial Boolean Functions with Very Low Differential-Linear Uniformity Using Maiorana-McFarland Type Construction. INDOCRYPT 2019: 341-360 - 2018
- [j17]Pan Tan, Zhengchun Zhou, Deng Tang, Tor Helleseth:
The weight distribution of a class of two-weight linear codes derived from Kloosterman sums. Cryptogr. Commun. 10(2): 291-299 (2018) - [j16]Qi Gao, Deng Tang:
A Lower Bound on the Second-Order Nonlinearity of the Generalized Maiorana-McFarland Boolean Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2397-2401 (2018) - [j15]Deng Tang, Shaojing Fu, Yang Yang:
Two Constructions of Semi-Bent Functions with Perfect Three-Level Additive Autocorrelation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2402-2404 (2018) - [j14]Deng Tang, Subhamoy Maitra:
Construction of n-Variable (n ≡ 2 mod 4) Balanced Boolean Functions With Maximum Absolute Value in Autocorrelation Spectra < 2n/2. IEEE Trans. Inf. Theory 64(1): 393-402 (2018) - 2017
- [j13]Deng Tang, Claude Carlet, Zhengchun Zhou:
Binary linear codes from vectorial boolean functions and their weight distribution. Discret. Math. 340(12): 3055-3072 (2017) - [j12]Deng Tang, Cuiling Fan:
A Class of Distance-Optimal Binary Linear Codes With Flexible Parameters. IEEE Commun. Lett. 21(9): 1893-1896 (2017) - [j11]Xia Li, Deng Tang, Feng Cheng:
A Family of at Least Almost Optimal p-Ary Cyclic Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 2048-2051 (2017) - [j10]Deng Tang, Claude Carlet, Xiaohu Tang, Zhengchun Zhou:
Construction of Highly Nonlinear 1-Resilient Boolean Functions With Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity. IEEE Trans. Inf. Theory 63(9): 6113-6125 (2017) - [c3]Deng Tang, Yang Yang, Shaojing Fu:
Semi-bent functions with perfect three-level additive autocorrelation. IWSDA 2017: 164-168 - [c2]Qi Gao, Deng Tang:
A lower bound on the second-order nonlinearity of the class of Maiorana-McFarland bent functions. IWSDA 2017: 191-195 - 2016
- [j9]Deng Tang, Rong Luo, Xiaoni Du:
The Exact Fast Algebraic Immunity of Two Subclasses of the Majority Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(11): 2084-2088 (2016) - [j8]Claude Carlet, David Joyner, Pantelimon Stanica, Deng Tang:
Cryptographic properties of monotone Boolean functions. J. Math. Cryptol. 10(1): 1-14 (2016) - [i6]Deng Tang, Claude Carlet, Zhengchun Zhou:
Binary Linear Codes From Vectorial Boolean Functions and Their Weight Distribution. CoRR abs/1612.04456 (2016) - [i5]Deng Tang, Subhamoy Maitra:
Construction of n-variable (n ≡ 2 mod 4) balanced Boolean functions with maximum absolute value in autocorrelation spectra < 2n/2. IACR Cryptol. ePrint Arch. 2016: 1078 (2016) - 2015
- [j7]Claude Carlet, Deng Tang:
Enhanced Boolean functions suitable for the filter model of pseudo-random generator. Des. Codes Cryptogr. 76(3): 571-587 (2015) - [j6]Deng Tang, Claude Carlet, Xiaohu Tang:
Differentially 4-uniform bijections by permuting the inverse function. Des. Codes Cryptogr. 77(1): 117-141 (2015) - 2014
- [j5]WeiGuo Zhang, Fuqiang Jiang, Deng Tang:
Construction of highly nonlinear resilient Boolean functions satisfying strict avalanche criterion. Sci. China Inf. Sci. 57(4): 1-6 (2014) - [j4]Deng Tang, Claude Carlet, Xiaohu Tang:
A class of 1-Resilient Boolean Functions with Optimal Algebraic Immunity and Good Behavior against Fast Algebraic Attacks. Int. J. Found. Comput. Sci. 25(6): 763-780 (2014) - 2013
- [j3]Deng Tang, WeiGuo Zhang, Xiaohu Tang:
Construction of balanced Boolean functions with high nonlinearity and good autocorrelation properties. Des. Codes Cryptogr. 67(1): 77-91 (2013) - [j2]Deng Tang, Claude Carlet, Xiaohu Tang:
On the second-order nonlinearities of some bent functions. Inf. Sci. 223: 322-330 (2013) - [j1]Deng Tang, Claude Carlet, Xiaohu Tang:
Highly Nonlinear Boolean Functions With Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks. IEEE Trans. Inf. Theory 59(1): 653-664 (2013) - [c1]Claude Carlet, Deng Tang, Xiaohu Tang, Qunying Liao:
New Construction of Differentially 4-Uniform Bijections. Inscrypt 2013: 22-38 - [i4]Deng Tang, Claude Carlet, Xiaohu Tang:
Differentially 4-Uniform Bijections by Permuting the Inverse Function. IACR Cryptol. ePrint Arch. 2013: 639 (2013) - 2011
- [i3]Deng Tang, Claude Carlet, Xiaohu Tang:
Highly Nonlinear Boolean Functions with Optimal Algebraic Immunity and Good Behavior Against Fast Algebraic Attacks. IACR Cryptol. ePrint Arch. 2011: 366 (2011) - 2010
- [i2]Deng Tang, WeiGuo Zhang, Xiaohu Tang:
Construction of Balanced Boolean Functions with High Nonlinearity and Good Autocorrelation Properties. IACR Cryptol. ePrint Arch. 2010: 362 (2010) - [i1]Xiaohu Tang, Deng Tang, Xiangyong Zeng, Lei Hu:
Balanced Boolean Functions with (Almost) Optimal Algebraic Immunity and Very High Nonlinearity. IACR Cryptol. ePrint Arch. 2010: 443 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 20:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint