Constructions of cryptographically significant Boolean functions using primitive polynomials Q Wang, J Peng, H Kan, X Xue IEEE Transactions on Information Theory 56 (6), 3048-3053, 2010 | 126 | 2010 |

A note on fast algebraic attacks and higher order nonlinearities Q Wang, T Johansson Information Security and Cryptology: 6th International Conference, Inscrypt …, 2011 | 55 | 2011 |

A new family of differentially 4-uniform permutations over for odd k J Peng, CH Tan, QC Wang Science China Mathematics 59 (6), 1221-1234, 2016 | 26 | 2016 |

Transparency order for Boolean functions: analysis and construction Q Wang, P Stănică Designs, Codes and Cryptography 87, 2043-2059, 2019 | 23 | 2019 |

Cryptographic properties of the hidden weighted bit function Q Wang, C Carlet, P Stănică, CH Tan Discrete Applied Mathematics 174, 1-10, 2014 | 22 | 2014 |

The covering radius of the Reed–Muller code RM (2, 7) is 40 Q Wang Discrete Mathematics 342 (12), 111625, 2019 | 12 | 2019 |

On the covering radius of the third order Reed–Muller code *RM*(3, 7)Q Wang, CH Tan, TF Prabowo Designs, Codes and Cryptography 86, 151-159, 2018 | 12 | 2018 |

New secondary constructions of differentially 4-uniform permutations over J Peng, CH Tan, Q Wang International Journal of Computer Mathematics 94 (8), 1670-1693, 2017 | 11 | 2017 |

Hadamard matrices, d-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights Q Wang Designs, Codes and Cryptography 87 (10), 2321-2333, 2019 | 10 | 2019 |

Concatenations of the hidden weighted bit function and their cryptographic properties. Q Wang, CH Tan, P Stanica Adv. Math. Commun. 8 (2), 153-165, 2014 | 10 | 2014 |

Properties of a family of cryptographic Boolean functions Q Wang, CH Tan Sequences and Their Applications-SETA 2014: 8th International Conference …, 2014 | 10 | 2014 |

A new method to construct Boolean functions with good cryptographic properties Q Wang, CH Tan Information Processing Letters 113 (14-16), 567-571, 2013 | 10 | 2013 |

Some results on fast algebraic attacks and higher-order non-linearities Q Wang, T Johansson, H Kan IET Information Security 6 (1), 41-46, 2012 | 10 | 2012 |

More new classes of differentially 4-uniform permutations with good cryptographic properties J Peng, CH Tan, Q Wang, J Gao, H Kan IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018 | 9 | 2018 |

Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity Q Wang, CH Tan Discrete Applied Mathematics 167, 25-32, 2014 | 9 | 2014 |

New bounds on the covering radius of the second order Reed-Muller code of length 128 Q Wang, P Stănică Cryptography and Communications 11, 269-277, 2019 | 8 | 2019 |

New bounds on the imbalance of a half-l-sequence Q Wang, CH Tan 2015 IEEE International Symposium on Information Theory (ISIT), 2688-2691, 2015 | 7 | 2015 |

Searching for balanced S-boxes with high nonlinearity, low differential uniformity, and improved DPA-resistance Y Xu, Q Wang International Conference on Information Security, 95-106, 2020 | 6 | 2020 |

On equivalence classes of Boolean functions Q Wang, T Johansson Information Security and Cryptology-ICISC 2010: 13th International …, 2011 | 6 | 2011 |

The covering radius of the third-order reed-muller code rm (3, 7) is 20 J Gao, H Kan, Y Li, Q Wang IEEE Transactions on Information Theory 69 (6), 3663-3673, 2023 | 5 | 2023 |