- Cryptography
- Coding
- Number theory

Working Experience:

Professor, Nanjing Normal University, China (09/2017-till now)

Research Scientist, National University of Singapore, Singapore (02/2012-08/2017)

Assistant Professor, Hunan University of Science and Engineering, China (07/2006-06/2008)

Educational Background:

Joint Ph.D., Cryptography, Lund University, Sweden (11/2009-10/2010)

Ph.D., Computer Application Technology, Fudan University (09/2008-06/2011)

M.E., Mathematics, Fudan University (09/2003-06/2006)

B.S., Mathematics, China University of Petroleum (09/1998-06/2002)

Selected Research Projects：

PI, Some important problems on Boolean functions, National Science Foundation of China, No. 61572189, (01/2016-12/2019)

PI, Designs and analyses of nonlinear functions in symmetric cryptosystems，Singapore DRTech Seed Research Project， (07/2013-06/2014)

PI, Designs and analyses of cryptographic Boolean functions, National Science Foundation of China, No. 61202463, (01/2013-12/2015)

Selected Publications：

Selected Publications：

[1] Qichun Wang, “Hadamard Matrices, d-Linearly Independent Sets and Correlation-Immune Boolean Functions with Minimum Hamming Weights,” to appear in Designs, Codes and Cryptography, DOI: 10.1007/s10623-019-00620-1, 2019.

[2] Qichun Wang and Pantelimon Stanica, “Transparency order for Boolean functions: analysis and construction”, to appear in Designs, Codes and Cryptography, DOI: 10.1007/s10623-019-00604-1, 2019.

[3] Qichun Wang and Pantelimon Stanica, “A trigonometric sum sharp estimate and new bounds on the nonlinearity of some cryptographic Boolean functions”, to appear in Designs, Codes and Cryptography, DOI: 10.1007/s10623-018-0574-2, 2019.

[4] Qichun Wang and Pantelimon Stanica, “New bounds on the covering radius of the second order Reed-Muller code of length 128”, to appear in Cryptography and Communications, DOI: 10.1007/s12095-018-0289-2, 2019.

[5] Qichun Wang, Chik How Tan and Theo Fanuela Prabowo, “On the Covering Radius of the Third Order Reed-Muller Code RM(3,7)”, Designs, Codes and Cryptography, Designs, Codes and Cryptography, 2018, 86(1):151-159.

[6] Qichun Wang and Chik How Tan, “On the Second-Order Nonlinearity of the Hidden Weighted Bit Function”, Discrete Applied Mathematics, vol. 215, 2016, pp. 197-202.

[7] Qichun Wang and Chik How Tan, “Proof of a Conjecture and a Bound on the Imbalance Properties of LFSR Subsequences”, Discrete Applied Mathematics, vol. 211, 2016, pp. 217-221.

[8] Qichun Wang and Chik How Tan, “New Bounds on the Imbalance of a Half-l-Sequence”, 2015 IEEE International Symposium on Information Theory (ISIT 2015), IEEE Explore, 2015, pp. 2688-2691.

[9] Qichun Wang, Claude Carlet, Pantelimon Stanica and Chik How Tan, “Cryptographic Properties of the Hidden Weighted Bit Function”, Discrete Applied Mathematics, vol. 174, 2014, pp. 1-10.

[10] Qichun Wang and Chik How Tan, “Properties of a Family of Cryptographic Boolean Functions”, SETA 2014: SEquences and Their Applications, LNCS 8865, Springer--Verlag, 2014, pp. 34-46.

[11] Qichun Wang and Chik How Tan, “Cryptographic Boolean Functions with a Large Number of Variables”, 2014 IEEE International Symposium on Information Theory (ISIT 2014), IEEE Explore, 2014, pp. 1534-1538.

[12] Qichun Wang, Chik How Tan and Pantelimon Stanica, “Concatenations of the Hidden Weighted Bit Function and Their Cryptographic Properties”, Advances in Mathematics of Communications, vol. 8, No. 2, 2014, pp. 153-165.

[13] Qichun Wang and Chik How Tan, “Balanced Boolean functions with optimum algebraic degree, optimum algebraic immunity and very high nonlinearity”, Discrete Applied Mathematics, vol. 167, 2014, pp. 25-32.

[14] Qichun Wang, Chik How Tan and Timothy Foo, “A Family of Cryptographically Significant Boolean Functions Based on the Hidden Weighted Bit Function”, ICISC 2013, LNCS 8565, pp. 311–322, Springer-Verlag, 2014.

[15] Qichun Wang and Chik How Tan, “A New Method to Construct Boolean Functions with Good Cryptographic Properties”, Information Processing Letters, vol. 113, no. 14, 2013, pp. 567-571.

[16] Qichun Wang and Chik How Tan, “A note on the algebraic immunity of the Maiorana McFarland class of bent functions”, Information Processing Letters, vol. 112, no. 22, 2012, pp. 869-871.

[17] Qichun Wang, Thomas Johansson and Haibin Kan, “Some results on fast algebraic attacks and higher-order non-linearities”, IET Information Security, vol.6, no.1, 2012, pp. 41-46.

[18] Qichun Wang and Thomas Johansson, “A Note on Fast Algebraic Attacks and Higher Order Nonlinearities”, Inscrypt 2010, LNCS 6584, pp.404-414, Springer Verlag, 2011.

[19] Qichun Wang and Haibin Kan, “Counting Irreducible Polynomials over Finite Fields”, Czechoslovak Mathematical Journal, vol. 60, no. 3, 2010, pp. 881-886.

[20] Qichun Wang, Jie Peng, Haibin Kan and Xiangyang Xue, “Constructions of Cryptographically Significant Boolean Functions Using Primitive Polynomials”, IEEE Transactions on Information Theory, vol. 56, no. 6, 2010, pp.3048-3053.

Contact:

qcwang@fudan.edu.cn