2007 |
13 | EE | Xiao-Li Huang,
Chuan-Kun Wu:
Cryptanalysis of Achterbahn-Version 1 and -Version 2.
J. Comput. Sci. Technol. 22(3): 469-475 (2007) |
12 | EE | Rong-Hua Li,
Chuan-Kun Wu:
A Protocol for a Private Set-Operation.
J. Comput. Sci. Technol. 22(6): 822-829 (2007) |
2006 |
11 | EE | Liming Wang,
Chuan-Kun Wu:
Authenticated Group Key Agreement for Multicast.
CANS 2006: 55-72 |
10 | EE | Wenying Zhang,
Chuan-Kun Wu:
The Algebraic Normal Form, Linear Complexity and k-Error Linear Complexity of Single-Cycle T-Function.
SETA 2006: 391-401 |
2005 |
9 | EE | Chuan-Kun Wu:
Hash channels.
Computers & Security 24(8): 653-661 (2005) |
8 | EE | Chuan-Kun Wu:
On the independence of Boolean functions.
Int. J. Comput. Math. 82(4): 415-420 (2005) |
2004 |
7 | EE | Wenying Zhang,
Chuan-Kun Wu,
Shiqu Li:
Construction of Cryptographically Important Boolean Permutations.
Appl. Algebra Eng. Commun. Comput. 15(3-4): 173-177 (2004) |
6 | EE | Chuan-Kun Wu,
Ed Dawson:
Correlation immunity and resiliency of symmetric Boolean functions.
Theor. Comput. Sci. 312(2-3): 321-335 (2004) |
2001 |
5 | EE | Chuan-Kun Wu,
Vijay Varadharajan:
Fair Exchange of Digital Signatures with Offline Trusted Third Party.
ICICS 2001: 466-470 |
1999 |
4 | EE | Chuan-Kun Wu,
Vijay Varadharajan:
Modified Chinese Remainder Theorem and Its Application to Proxy Signatures.
ICPP Workshops 1999: 146- |
1997 |
3 | | Ed Dawson,
Chuan-Kun Wu:
Construction of correlation immune Boolean functions.
ICICS 1997: 170-180 |
1996 |
2 | | Chuan-Kun Wu,
Ed Dawson:
On construction of resilient functions.
ACISP 1996: 79-86 |
1991 |
1 | EE | Guo-Zhen Xiao,
Ba-Zhong Shen,
Chuan-Kun Wu,
Chi Song Wong:
Some spectral techniques in coding theory.
Discrete Mathematics 87(2): 181-186 (1991) |