Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Related-Key Impossible Differential Attack on Reduced-Round LBlock., , and . J. Comput. Sci. Technol., 29 (1): 165-176 (2014)Ultrasound-Guided Assistive Robots for Scoliosis Assessment with Optimization-based Control and Variable Impedance., , , , and . CoRR, (2022)School Innovative Management Model and Strategies: The Perspective of Organizational Learning., and . Inf. Syst. Manag., 26 (3): 241-251 (2009)New Impossible Differential Attack on SAFER Block Cipher Family., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (3): 843-852 (2015)The urban computing on the distribution of inhalable particulate matters to Smart City-based residential groups., , and . Concurr. Comput. Pract. Exp., (2019)A GPU-based residual network for medical image classification in smart medicine., , , , , , and . Inf. Sci., (2020)Profiling HPC Applications with Low Overhead and High Accuracy., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1311-1319. IEEE, (2021)An Empirical Study on China's Regional Carbon Emissions of Agriculture., and . Int. J. Asian Bus. Inf. Manag., 4 (4): 67-77 (2013)New Impossible Differential Attack on SAFER + and SAFER + +., , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 170-183. Springer, (2012)Conditional Cube Attack on Reduced-Round Keccak Sponge Function., , , , and . EUROCRYPT (2), volume 10211 of Lecture Notes in Computer Science, page 259-288. (2017)