Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jinyong Shan is active.

Publication


Featured researches published by Jinyong Shan.


IEEE Transactions on Information Theory | 2011

More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks

Xiangyong Zeng; Claude Carlet; Jinyong Shan; Lei Hu

In this paper, three constructions of balanced Boolean functions with optimal algebraic immunity are proposed. It is checked that, at least for small numbers of input variables, these functions have good behavior against fast algebraic attacks as well. Other cryptographic properties such as algebraic degree and nonlinearity of the constructed functions are also analyzed. Lower bounds on the nonlinearity are proved, which are similar to the best bounds obtained for known Boolean functions resisting algebraic attacks and fast algebraic attacks. Moreover, it is checked that for the number n of variables with 5 ≤ n ≤ 19, the proposed n-variable Boolean functions have in fact very good nonlinearity.


Finite Fields and Their Applications | 2012

A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions

Xiangyong Zeng; Jinyong Shan; Lei Hu

Based on a sufficient condition proposed by Hollmann and Xiang for constructing triple-error-correcting codes, the minimum distance of a binary cyclic code


Designs, Codes and Cryptography | 2015

Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks

Jiao Li; Claude Carlet; Xiangyong Zeng; Chunlei Li; Lei Hu; Jinyong Shan

\mathcal{C}_{1,3,13}


international conference on information security | 2015

Improved Differential Analysis of Block Cipher PRIDE

Qianqian Yang; Lei Hu; Siwei Sun; Kexin Qiao; Ling Song; Jinyong Shan; Xiaoshuang Ma

with three zeros


international conference on information security | 2015

Extending the Applicability of the Mixed-Integer Programming Technique in Automatic Differential Cryptanalysis

Siwei Sun; Lei Hu; Meiqin Wang; Qianqian Yang; Kexin Qiao; Xiaoshuang Ma; Ling Song; Jinyong Shan

\alpha


network and system security | 2014

Tighter Security Bound of MIBS Block Cipher against Differential Attack

Xiaoshuang Ma; Lei Hu; Siwei Sun; Kexin Qiao; Jinyong Shan

,


international workshop on security | 2015

Improvement on the Method for Automatic Differential Analysis and Its Application to Two Lightweight Block Ciphers DESL and LBlock-s

Siwei Sun; Lei Hu; Kexin Qiao; Xiaoshuang Ma; Jinyong Shan; Ling Song

\alpha^3


Journal of Systems Science & Complexity | 2018

A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties

Jinyong Shan; Lei Hu; Xiangyong Zeng; Chunlei Li

, and


2015 2nd International Conference on Electronics and Communication Systems (ICECS) | 2015

Security of LBlock-s against related-key differential attack

Jinyong Shan; Lei Hu; Siwei Sun

\alpha^{13}


Cryptography and Communications | 2014

Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher

Jinyong Shan; Lei Hu; Xiangyong Zeng

of length

Collaboration


Dive into the Jinyong Shan's collaboration.

Top Co-Authors

Avatar

Lei Hu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Siwei Sun

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xiaoshuang Ma

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Kexin Qiao

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Ling Song

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Qianqian Yang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge