| 2007 |
| 13 | EE | Xiao-Li Huang,
Chuan-Kun Wu:
Cryptanalysis of Achterbahn-Version 1 and -Version 2.
J. Comput. Sci. Technol. 22(3): 469-475 (2007) |
| 12 | EE | Rong-Hua Li,
Chuan-Kun Wu:
A Protocol for a Private Set-Operation.
J. Comput. Sci. Technol. 22(6): 822-829 (2007) |
| 2006 |
| 11 | EE | Liming Wang,
Chuan-Kun Wu:
Authenticated Group Key Agreement for Multicast.
CANS 2006: 55-72 |
| 10 | EE | Wenying Zhang,
Chuan-Kun Wu:
The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function.
SETA 2006: 391-401 |
| 2005 |
| 9 | EE | Chuan-Kun Wu:
Hash channels.
Computers & Security 24(8): 653-661 (2005) |
| 8 | EE | Chuan-Kun Wu:
On the independence of Boolean functions.
Int. J. Comput. Math. 82(4): 415-420 (2005) |
| 2004 |
| 7 | EE | Wenying Zhang,
Chuan-Kun Wu,
Shiqu Li:
Construction of Cryptographically Important Boolean Permutations.
Appl. Algebra Eng. Commun. Comput. 15(3-4): 173-177 (2004) |
| 6 | EE | Chuan-Kun Wu,
Ed Dawson:
Correlation immunity and resiliency of symmetric Boolean functions.
Theor. Comput. Sci. 312(2-3): 321-335 (2004) |
| 2001 |
| 5 | EE | Chuan-Kun Wu,
Vijay Varadharajan:
Fair Exchange of Digital Signatures with Offline Trusted Third Party.
ICICS 2001: 466-470 |
| 1999 |
| 4 | EE | Chuan-Kun Wu,
Vijay Varadharajan:
Modified Chinese Remainder Theorem and Its Application to Proxy Signatures.
ICPP Workshops 1999: 146- |
| 1997 |
| 3 | | Ed Dawson,
Chuan-Kun Wu:
Construction of correlation immune Boolean functions.
ICICS 1997: 170-180 |
| 1996 |
| 2 | | Chuan-Kun Wu,
Ed Dawson:
On construction of resilient functions.
ACISP 1996: 79-86 |
| 1991 |
| 1 | EE | Guo-Zhen Xiao,
Ba-Zhong Shen,
Chuan-Kun Wu,
Chi Song Wong:
Some spectral techniques in coding theory.
Discrete Mathematics 87(2): 181-186 (1991) |