Author of the publication

Novel qubit block encryption algorithm with hybrid keys

, , , , and . Physica A: Statistical Mechanics and its Applications, 375 (2): 693--698 (Mar 1, 2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

You can lead a horse to water: teacher development and use of digital library resources., , , , , , , and . JCDL, page 1-8. ACM, (2005)Optimal User Pairing in Cache-Based NOMA Systems with Index Coding., , , and . ICC, page 1-6. IEEE, (2019)Japanese named entity recognition for question answering system., and . CCIS, page 402-406. IEEE, (2011)Thin single crystal perovskite solar cells to harvest below-bandgap light absorption, , , , , , , , , and 2 other author(s). Nature Communications, 8 (1): 1890-- (2017)A Quantitative Approach in Heuristic Evaluation of E-commerce Websites., , , and . CoRR, (2018)Online Personalized Recommendation Based on Streaming Implicit User Feedback., , , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 720-731. Springer, (2015)Molecular doping enabled scalable blading of efficient hole-transport-layer-free perovskite solar cells, , , , , , , , , and 2 other author(s). Nature Communications, 9 (1): 1625-- (2018)A Multi-secret Sharing Scheme in an Access Structure., , and . Security and Management, page 481-484. CSREA Press, (2009)Predicting Urban Water Quality With Ubiquitous Data - A Data-Driven Approach., , , , , and . IEEE Trans. Big Data, 8 (2): 564-578 (2022)Optimized decoherence suppression of two qubits in independent non-Markovian environments using weak measurement and quantum measurement reversal., , , , and . Quantum Inf. Process., 14 (2): 755-764 (2015)