Constructing Differentially 4-Uniform Permutations Over ${\BBF} _ {2^{2k}} $ via the Switching Method L Qu, Y Tan, CH Tan, C Li IEEE transactions on information theorY 59 (7), 4675-4686, 2013 | 115 | 2013 |
Strongly regular graphs associated with ternary bent functions Y Tan, A Pott, T Feng Journal of Combinatorial Theory, Series A 117 (6), 668-682, 2010 | 96 | 2010 |
Binomial differentially 4 uniform permutations with high nonlinearity C Bracken, CH Tan, Y Tan Finite Fields and Their Applications, 2011 | 90 | 2011 |
More Constructions of Differentially 4-uniform Permutations on L Qu, Y Tan, C Li, G Gong Designs, Codes and Cryptography, 2014 | 67* | 2014 |
Association schemes arising from bent functions A Pott, Y Tan, T Feng, S Ling Designs, Codes and Cryptography 59 (1), 319-331, 2011 | 59 | 2011 |
Strongly regular graphs constructed from p-ary bent functions YM Chee, Y Tan, XD Zhang Journal of Algebraic Combinatorics 34 (2), 251-266, 2011 | 50 | 2011 |
Zero-Difference Balanced Functions With Applications C Ding, Y Tan Journal of Statistical Theory and Practice 6 (1), 3-19, 2012 | 36 | 2012 |
New Families of Differentially 4-Uniform Permutations over\ mathbb F 2 2k\ mathbb F _ 2^ 2k Y Tan, L Qu, C Tan, C Li Sequences and Their Applications–SETA 2012, 25-39, 2012 | 28 | 2012 |
On a class of quadratic polynomials with no zeros and its application to APN functions C Bracken, CH Tan, Y Tan Finite Fields and Their Applications 25, 26-36, 2014 | 27 | 2014 |
Quadratic Zero-Difference Balanced Functions, APN Functions and Strongly Regular Graphs C Carlet, G Gong, Y Tan Designs, Codes and Cryptography, 2014 | 23 | 2014 |
On quadratic almost perfect nonlinear functions and their related algebraic object G Weng, Y Tan, G Gong Workshop on Coding and Cryptography, WCC, 2013 | 23 | 2013 |
A recursive construction of p-ary bent functions which are not weakly regular Y Tan, J Yang, X Zhang 2010 IEEE International Conference on Information Theory and Information …, 2010 | 18 | 2010 |
Almost p-ary perfect sequences Y Chee, Y Tan, Y Zhou Sequences and Their Applications–SETA 2010, 399-415, 2010 | 18 | 2010 |
Revisiting MAC forgeries, weak keys and provable security of Galois/counter mode of operation B Zhu, Y Tan, G Gong Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013 | 17 | 2013 |
Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences YM Chee, S Ling, Y Tan, X Zhang Math. Comp 81, 585-603, 2012 | 13 | 2012 |
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions Y Tan, G Gong, B Zhu Cryptography and communications 8, 291-311, 2016 | 12 | 2016 |
On the Walsh spectrum of a family of quadratic APN functions with five terms LJ Qu, Y Tan, C Li Science China Information Sciences 57 (2), 1-7, 2014 | 8 | 2014 |
On the Fourier spectra of new APN functions Y Tan, L Qu, S Ling, CH Tan SIAM journal on discrete mathematics 27 (2), 791-801, 2013 | 7 | 2013 |
On a family of planar mappings G Kyureghyan, Y Tan Enhancing Cryptographic Primitives with Techniques from Error Correcting …, 2009 | 6 | 2009 |
Security assessment of TUAK algorithm set G Gong, K Mandal, Y Tan, T Wu CACR Technical Report, University of Waterloo, 2014 | 5 | 2014 |