Chaoyun Li

ORCID: 0000-0001-9917-3419
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Coding theory and cryptography
  • graph theory and CDMA systems
  • Acute Ischemic Stroke Management
  • Chaos-based Image/Signal Encryption
  • Alzheimer's disease research and treatments
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Advanced Malware Detection Techniques
  • Cryptography and Data Security
  • Stroke Rehabilitation and Recovery
  • Cardiovascular Health and Risk Factors
  • Mobile Health and mHealth Applications
  • Antiplatelet Therapy and Cardiovascular Diseases
  • Health Systems, Economic Evaluations, Quality of Life
  • Neurological Disease Mechanisms and Treatments
  • Cellular Automata and Applications
  • Neuroinflammation and Neurodegeneration Mechanisms
  • Medication Adherence and Compliance
  • Nuclear Receptors and Signaling
  • Vehicular Ad Hoc Networks (VANETs)
  • Water Quality and Pollution Assessment
  • Flavonoids in Medical Research
  • Health disparities and outcomes
  • Bioactive Compounds in Plants
  • Advanced Combinatorial Mathematics

IMEC
2017-2023

KU Leuven
2017-2023

Duke Kunshan University
2016-2023

Imec the Netherlands
2017-2019

Sanofi (China)
2019

Hubei University
2011-2018

University of Tübingen
2012-2018

Hainan Medical University
2018

University of Bergen
2018

National University of Defense Technology
2018

There is little evidence of the influence dietary patterns on mortality risk among adults 80 years or older ("oldest-old"). We evaluated association between Simplified Healthy Eating index (SHE-index) and Chinese oldest-old.Population-based cohort study from Longitudinal Longevity Survey (CLHLS 1998-2014, n = 35 927), conducted in 22 provinces, were pooled for analysis. The first seven waves CLHLS (1998, 2000, 2002, 2005, 2008-09, 2011-12, 2013-2014) utilized, with follow-up to last wave...

10.1186/s12966-022-01280-6 article EN cc-by International Journal of Behavioral Nutrition and Physical Activity 2022-05-26

In this paper, the cycle structure and adjacency graphs of a class linear feedback shift registers (LFSRs) are determined. By recursively applying D-morphism to maximum-length LFSRs representing cycles by generating functions, new family nonlinear (NFSRs) proposed based on properties these LFSRs. The number NFSRs in is also considered.

10.1109/tit.2014.2310748 article EN IEEE Transactions on Information Theory 2014-03-11

In this paper, a class of linear feedback shift registers (LFSRs) with characteristic polynomial (1 + x <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">3</sup> )p(x) is discussed, where p(x) primitive degree n > 2. The cycle structure and adjacency graphs the LFSRs are determined. A new de Bruijn sequences constructed from these LFSRs, number in also considered. To illustrate efficiency constructing an algorithm for producing some corresponding...

10.1109/tit.2014.2361522 article EN IEEE Transactions on Information Theory 2014-10-03

In this paper, a family of new de Bruijn sequences is proposed through the construction maximum-length nonlinear feedback shift registers (NFSRs). Let <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$k$ </tex-math></inline-formula> be positive integer and notation="LaTeX">$p_{0}(x), p_{1}(x), \ldots , p_{k}(x)$ primitive polynomials in notation="LaTeX">$\mathbb {F}_{2}[x]$ with their degrees strictly...

10.1109/tit.2015.2496946 article EN IEEE Transactions on Information Theory 2015-12-18

MDS matrices are important building blocks providing diffusion functionality for the design of many symmetric-key primitives. In recent years, continuous efforts made on construction with small area footprints in context lightweight cryptography. Just recently, Duval and Leurent (ToSC 2018/FSE 2019) reported some 32 × binary branch number 5, which can be implemented only 67 XOR gates, whereas previously known lightest ones same size cost 72 gates.In this article, we focus involutory...

10.46586/tosc.v2019.i1.84-117 article EN cc-by IACR Transactions on Symmetric Cryptology 2019-03-08

Icariin, a major constituent of flavonoids from the Chinese medicinal herb Epimedium brevicornum, exhibits multiple biological properties, including anti-inflammatory, neuroregulatory and neuroprotective activities. Therefore, Icariin might be applied in treatment neurodegenerative disorders, Alzheimer's disease (AD), which is neuropathologically characterized by β-amyloid aggregation, hyperphosphorylated tau neuroinflammation. Potential therapeutic effects were investigated an animal model...

10.1371/journal.pone.0104616 article EN cc-by PLoS ONE 2014-08-07

10.1016/j.ffa.2018.01.003 article EN publisher-specific-oa Finite Fields and Their Applications 2018-02-03

Near-MDS matrices provide better trade-offs between security and efficiency compared to constructions based on MDS matrices, which are favored for hardwareoriented designs. We present new designs of lightweight linear diffusion layers by constructing near-MDS matrices. Firstly generic n×n circulant found 5 ≤ n ≤9. Secondly, the implementation cost instantiations is examined. Surprisingly, = 7, 8, it turns out that some proposed order have lowest XOR count among all same order. Further, 5, 6,...

10.46586/tosc.v2017.i1.129-155 article EN cc-by IACR Transactions on Symmetric Cryptology 2017-03-08

With the enlargement of wireless technology, Internet Things (IoT) is emerging as a promising approach to realize smart cities and address lots serious problems such safety, convenience efficiency. In order avoid any possible rancorous attacks, employing lightweight cryptosystems most effective implement encryption/decryption, message authentication digital signature for security IoT. LED cipher with two flexible keysize variants in Since its designing, multitude fault analysis techniques...

10.1109/tdsc.2018.2857770 article EN IEEE Transactions on Dependable and Secure Computing 2018-07-20

At CRYPTO 2017 and IEEE Transactions on Computers in 2018, Todo et al. proposed the division property based cube attack method making it possible to launch attacks with cubes of dimensions far beyond practical reach. However, assumptions are made validate their attacks. In this paper, we further formulate algebraic properties superpoly one framework facilitate more successful applications: propose “flag” technique enhance precision MILP models, which enable us identify proper non-cube IV...

10.1109/tc.2019.2909871 article EN IEEE Transactions on Computers 2019-04-25

MDS matrices are important building blocks providing diffusion functionality for the design of many symmetric-key primitives. In recent years, continuous efforts made on construction with small area footprints in context lightweight cryptography. Just recently, Duval and Leurent (ToSC 2018/FSE 2019) reported some 32 × binary branch number 5, which can be implemented only 67 XOR gates, whereas previously known lightest ones same size cost 72 gates.In this article, we focus involutory...

10.13154/tosc.v2019.i1.84-117 article EN DOAJ (DOAJ: Directory of Open Access Journals) 2019-03-01

Coronary heart disease (CHD) is a major burden globally and in China, but secondary prevention among CHD patients remains insufficient. Mobile health (mHealth) technology holds promise for improving few previous studies included both provider-facing patient-directed measures. We conducted physician needs assessment survey (n = 59), interviews 6), one focus group short cellphone message validation 14) Shanghai Hainan, China. Based on these results, we developed multifaceted mHealth...

10.1080/03091902.2016.1213904 article EN Journal of Medical Engineering & Technology 2016-08-12

Near-MDS matrices provide better trade-offs between security and efficiency compared to constructions based on MDS matrices, which are favored for hardwareoriented designs. We present new designs of lightweight linear diffusion layers by constructing near-MDS matrices. Firstly generic n × circulant found 5 ≤ ≤9. Secondly, the implementation cost instantiations is examined. Surprisingly, = 7 , 8, it turns out that some proposed order have lowest XOR count among all same order. Further, 6, we...

10.13154/tosc.v2017.i1.129-155 article EN DOAJ (DOAJ: Directory of Open Access Journals) 2017-03-01

10.1016/j.ffa.2018.10.001 article EN publisher-specific-oa Finite Fields and Their Applications 2018-10-18
Coming Soon ...