Author of the publication

Bit Security of the CDH Problems over Finite Fields.

, , and . SAC, volume 9566 of Lecture Notes in Computer Science, page 441-461. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Image Enhancement of Finger Vein Patterns Based on the Guided Filter., , and . CSPS (2), volume 516 of Lecture Notes in Electrical Engineering, page 218-226. Springer, (2018)Concolic testing of SystemC designs., , , , , , and . ISQED, page 1-7. IEEE, (2018)Discrete Impulsive Signal Observer for Fractional-Order Control Systems and Its Consumer Electronic Circuit Application., , and . IEEE Trans. Consumer Electron., 70 (1): 3341-3348 (February 2024)A comparative experimental evaluation on performance of type-1 and interval type-2 Takagi-Sugeno fuzzy models., , , , , and . Int. J. Mach. Learn. Cybern., 12 (7): 2135-2150 (2021)Decomposition-based multiobjective particle swarm optimization for change detection in SAR images., , , , and . GECCO (Companion), page 1729-1736. ACM, (2018)Generating Pseudo Connectives with MLMs for Implicit Discourse Relation Recognition., , , , , and . PRICAI (2), volume 13032 of Lecture Notes in Computer Science, page 113-126. Springer, (2021)Active Network Approach for Web Caching., , , and . AWIC, volume 3528 of Lecture Notes in Computer Science, page 260-265. Springer, (2005)Fault attacks on hyperelliptic curve discrete logarithm problem over binary field., , and . Sci. China Inf. Sci., 57 (3): 1-17 (2014)Exploit a Multi-head Reference Graph for Semi-supervised Relation Extraction., , , , , and . IJCNN, page 1-7. IEEE, (2021)Double-Quantitative-Based Knowledge Reduction Approach to Inconsistency Information System., , , , and . ICMLC, page 1-6. IEEE, (2021)