Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Related-Key Impossible Differential Attack on Reduced-Round LBlock., , and . J. Comput. Sci. Technol., 29 (1): 165-176 (2014)New Impossible Differential Attack on SAFER Block Cipher Family., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (3): 843-852 (2015)Profiling HPC Applications with Low Overhead and High Accuracy., , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 1311-1319. IEEE, (2021)Autonomous driving system: A comprehensive survey., , , , , , , , , and . Expert Syst. Appl., (2024)An Empirical Study on China's Regional Carbon Emissions of Agriculture., and . Int. J. Asian Bus. Inf. Manag., 4 (4): 67-77 (2013)New Impossible Differential Attack on SAFER + and SAFER + +., , , and . ICISC, volume 7839 of Lecture Notes in Computer Science, page 170-183. Springer, (2012)Conditional Cube Attack on Reduced-Round Keccak Sponge Function., , , , and . IACR Cryptology ePrint Archive, (2016)School knowledge management framework and strategies: The new perspective on teacher professional development.. Comput. Hum. Behav., 26 (2): 168-175 (2010)Conditional Cube Attack on Reduced-Round Keccak Sponge Function., , , , and . EUROCRYPT (2), volume 10211 of Lecture Notes in Computer Science, page 259-288. (2017)New Distinguisher on Reduced-Round Keccak Sponge Function., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (1): 242-250 (2019)