Author of the publication

Primitive Polynomials over Finite Fields of Characteristic Two.

, and . Appl. Algebra Eng. Commun. Comput., 14 (5): 381-395 (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

基于身份的跨信任域签密方案 (Identity-based Signcryption Cross Autonomous Domains)., , , and . 计算机科学, 42 (5): 165-168 (2015)Information diffusion network inferring and pathway tracking., , , and . Sci. China Inf. Sci., 58 (9): 1-15 (2015)Trace self-orthogonal relations of normal bases., , , and . Finite Fields Their Appl., (2015)A zero trust and blockchain-based defense model for smart electric vehicle chargers., , , , , and . J. Netw. Comput. Appl., (April 2023)Efficient Certificateless Signcryption Scheme from Weil Pairing., , , , and . J. Networks, 6 (9): 1280-1287 (2011)A New Scheme for Key Management in Ad Hoc Networks., and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 242-249. Springer, (2005)Primitive Polynomials over Finite Fields of Characteristic Two., and . Appl. Algebra Eng. Commun. Comput., 14 (5): 381-395 (2004)SHA-1充分条件自动化求解算法 (New Algorithm for Automatic Deriving Sufficient Conditions of SHA-1)., , , and . 计算机科学, 43 (8): 123-127 (2016)A trinomial type of σ-LFSR oriented toward software implementation., , and . Sci. China Ser. F Inf. Sci., 50 (3): 359-372 (2007)Intrusion Detection Model for Internet of Vehicles Using GRIPCA and OWELM., , , , , , and . IEEE Access, (2024)