Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yingpu Deng is active.

Publication


Featured researches published by Yingpu Deng.


Designs, Codes and Cryptography | 2011

A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity

Ziran Tu; Yingpu Deng

In this paper, a combinatorial conjecture about binary strings is proposed. Under the assumption that the proposed conjecture is correct, two classes of Boolean functions with optimal algebraic immunity can be obtained. The functions in first class are bent, and then it can be concluded that the algebraic immunity of bent functions can take all possible values except one. The functions in the second class are balanced, and they have optimal algebraic degree and the best nonlinearity up to now.


Discrete Applied Mathematics | 2012

Boolean functions optimizing most of the cryptographic criteria

Ziran Tu; Yingpu Deng

In this paper, we construct a class of 2 k -variable Boolean functions which have optimal algebraic degree, very high nonlinearity, optimal algebraic immunity, and are 1 -resilient. These properties are unconditional except the algebraic immunity property, which is optimal under some unproven assumptions. However, since the assumptions are verified to be true for k ? 29 , so these functions have optimal algebraic immunity at least for k ? 29 . Highlights? We consider the construction of Boolean functions with good cryptographic properties. ? We construct Boolean functions on even variables which are 1-resilient, with optimal algebraic degree, optimal algebraic immunity and very high nonlinearity. ? We use a combinatorial conjecture about modular addition with carries.


australasian conference on information security and privacy | 2012

An algebraic broadcast attack against NTRU

Jintai Ding; Yanbin Pan; Yingpu Deng

In this paper, we propose an algebraic broadcast attack against NTRU, which recovers a single message encrypted multiple times using different NTRU public keys. Namely, when a message is broadcasted, under some reasonable assumptions, our attack can be completed in polynomial time and space. To the best of our knowledge, this is the first successful broadcast attack against NTRU.


Designs, Codes and Cryptography | 2015

New results on nonexistence of generalized bent functions

Yupeng Jiang; Yingpu Deng

We obtain two kinds of new results on nonexistence of generalized bent functions (GBFs). Based on the results of Feng, Liu and Ma, we use Schmidt’s field descent method to get the first kind. For the second kind, we use both decomposition law in cyclotomic fields and bent requirements to prove that no GBFs with type


Mathematics of Computation | 2014

Strong pseudoprimes to the first eight prime bases

Yupeng Jiang; Yingpu Deng


Journal of Systems Science & Complexity | 2013

Results on permutation symmetric Boolean functions

Yanjuan Zhang; Yingpu Deng

[3,\,2\cdot 23^{e}]


workshop on information security applications | 2011

A general NTRU-Like framework for constructing lattice-based public-key cryptosystems

Yanbin Pan; Yingpu Deng


australasian conference on information security and privacy | 2014

A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012

Yanbin Pan; Yingpu Deng

[3,2·23e] exist.


Science China-mathematics | 2018

An algorithm for computing the factor ring of an ideal in Dedekind domain with finite rank

Dandan Huang; Yingpu Deng

Define ψm to be the smallest strong pseudoprime to the firstm prime bases. The exact value of ψm is known for 1 ≤ m ≤ 8. Z. Zhang have found a 19decimal-digit number Q11 = 3825 12305 65464 13051 which is a strong pseudoprime to the first 11 prime bases and he conjectured that ψ9 = ψ10 = ψ11 = Q11. We prove the conjecture by algorithms.


Science China-mathematics | 2015

On orders in number fields: Picard groups, ring class fields and applications

Chang Lv; Yingpu Deng

This paper provides a systematic method on the enumeration of various permutation symmetric Boolean functions. The results play a crucial role on the search of permutation symmetric Boolean functions with good cryptographic properties. The proposed method is algebraic in nature. As a by-product, the authors correct and generalize the corresponding results of Stănică and Maitra (2008). Further, the authors give a complete classification of block-symmetric bent functions based on the results of Zhao and Li (2006), and the result is the only one classification of a certain class of permutation symmetric bent functions after the classification of symmetric bent functions proposed by Savicky (1994).

Collaboration


Dive into the Yingpu Deng's collaboration.

Top Co-Authors

Avatar

Yanbin Pan

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yupeng Jiang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Ziran Tu

Henan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Chang Lv

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Dandan Huang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Jianing Li

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Yanjuan Zhang

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Jintai Ding

University of Cincinnati

View shared research outputs
Top Co-Authors

Avatar

Huah Chu

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar

Tse-Chung Yang

National Taiwan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge