Author of the publication

A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management.

, , , and . CIS (2), page 584-586. IEEE Computer Society, (2009)978-0-7695-3931-7.

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stability of the Linear Complexity of the Generalized Self-shrinking Sequences., , and . CIS (2), volume 3802 of Lecture Notes in Computer Science, page 68-73. Springer, (2005)Distribution and Pollution Assessment of Heavy Metals in Sewage Discharge Channels Inpouring into Sea in Tianjin, China., , , , and . ESIAT (2), page 205-208. IEEE Computer Society, (2009)Exploring the Substrate-Assisted Dehydration of Chorismate Catalyzed by Dehydratase MqnA from QM/MM Calculations: The Role of Pocket Residues and the Hydrolysis Mechanism of N17D Mutant., and . J. Chem. Inf. Model., 63 (23): 7499-7507 (December 2023)Out-of-Order-Delivery-Tolerant Secure Code Dissemination with Fountain Codes in Wireless Sensor Networks., , , , and . CIS, page 683-686. IEEE Computer Society, (2012)Study on the Pass Rate of NIST SP800-22 Statistical Test Suite., , , and . CIS, page 402-404. IEEE Computer Society, (2014)Computing the k-Error N-Adic Complexity of a Sequence of Period pn., , and . SETA, volume 4086 of Lecture Notes in Computer Science, page 190-198. Springer, (2006)Efficient secure multicast route using genetic algorithms for wireless sensor and actor networks., , , and . HPCS, page 676-678. IEEE, (2010)A Hardware-Oriented Fast Encryption Keystream Generator for Digital Rights Management., , , and . CIS (2), page 584-586. IEEE Computer Society, (2009)978-0-7695-3931-7.Performance Study for Impact of Mobility Model and Position Update Interval in Geographic Routing., and . J. Inform. and Commun. Convergence Engineering, 7 (4): 489-495 (2009)Novel Analysis of Stream Cipher Combing LFSR and FCSR., , and . FCS, volume 879 of Communications in Computer and Information Science, page 23-38. Springer, (2018)