From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Energy Balanced Source Location Privacy Scheme Using Multibranch Path in WSNs for IoT., , , , и . Wirel. Commun. Mob. Comput., (2021)Constructions of 1-resilient Boolean functions on odd number of variables with a high nonlinearity., , , и . Secur. Commun. Networks, 5 (6): 614-624 (2012)Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher., , , и . IWSEC, том 7631 из Lecture Notes in Computer Science, стр. 197-215. Springer, (2012)Weak keys of the full MISTY1 block cipher for related-key amplified boomerang cryptanalysis., , и . IET Inf. Secur., 12 (5): 389-397 (2018)Maximum Autocorrelation Analysis of Nonlinear Combining Functions in Stream Ciphers., и . ISIT, стр. 176-180. IEEE, (2007)Parallelized Near-Duplicate Document Detection Algorithm for Large Scale Chinese Web Pages., , , и . PDCAT, стр. 523-528. IEEE, (2012)Minimal p-Ary Codes via the Direct Sum of Functions, Non-Covering Permutations and Subspaces of Derivatives., , , и . IEEE Trans. Inf. Theory, 70 (6): 4445-4463 (июня 2024)The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher., , , и . INDOCRYPT, том 7668 из Lecture Notes in Computer Science, стр. 244-264. Springer, (2012)A construction of resilient functions with satisfying synthetical cryptographic criteria., и . ITW, стр. 248-252. IEEE, (2005)New construction of highly nonlinear resilient S-boxes via linear codes., и . Frontiers Comput. Sci., 16 (3): 163805 (2022)