Author of the publication

Constructing Quadratic and Cubic Negabent Functions over Finite Fields.

, , and . ISIT, page 1414-1418. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case.. IEEE Trans. Inf. Theory, 48 (11): 2847-2867 (2002)A conjecture on binary sequences with the "Trinomial property"., and . IEEE Trans. Inf. Theory, 47 (1): 426-427 (2001)Generating Large Instances of the Gong-Harn Cryptosystem., and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 317-328. Springer, (2001)Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key.. AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 32-36. Springer, (1990)New Implementations of the WG Stream Cipher., , and . IEEE Trans. Very Large Scale Integr. Syst., 22 (9): 1865-1878 (2014)New Characterizations for the Multi-output Correlation-Immune Boolean Functions., , and . CoRR, (2019)Correlation of binary sequence families derived from the multiplicative characters of finite fields., and . Adv. Math. Commun., 7 (4): 475-484 (2013)A generalized construction of OFDM M-QAM sequences with low peak-to-average power ratio., , and . Adv. Math. Commun., 3 (4): 421-428 (2009)MILP-Based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher., , and . IMACC, volume 10655 of Lecture Notes in Computer Science, page 333-351. Springer, (2017)A Round and Communication Efficient Secure Ranking Protocol., and . CT-RSA, volume 3860 of Lecture Notes in Computer Science, page 350-364. Springer, (2006)