Author of the publication

Security of SM4 Against (Related-Key) Differential Cryptanalysis.

, , and . ISPEC, volume 10060 of Lecture Notes in Computer Science, page 65-78. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two Effective Algorithms for Color Image Denoising., , and . ICVS, volume 10528 of Lecture Notes in Computer Science, page 207-217. Springer, (2017)Hierarchical Modal Control of a Novel Manipulator., and . ICINCO (1), page 206-213. INSTICC Press, (2004)Collaboration in an Open Data eScience: A Case Study of Sloan Digital Sky Survey, and . CoRR, page 8. (January 2010)Classifying Detection of Epileptic EEG Based on Approximate Entropy in Wavelet Domain., , , , and . BMEI, page 1-5. IEEE, (2009)Implmentation of a covariance-based principal component analysis algorithm for hyperspectral imaging applications with multi-threading in both CPU and GPU., and . IGARSS, page 4264-4266. IEEE, (2012)Semi-supervised feature selection based on local discriminative information., , , and . Neurocomputing, (2016)Existence of infinitely many solutions for a quasilinear elliptic equation., , and . Appl. Math. Lett., (2014)A Hadoop Based Analysis and Detection Model for IP Spoofing Typed DDoS Attack., , , and . Trustcom/BigDataSE/ISPA, page 1976-1983. IEEE, (2016)A scalability analysis of classifiers in text categorization., , and . SIGIR, page 96-103. ACM, (2003)Study on quantity flexibility supply chain contract based on system dynamics., , , and . LISS, page 1-7. IEEE, (2016)