Author of the publication

Generating Large Instances of the Gong-Harn Cryptosystem.

, and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 317-328. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000., and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 15-20. Springer, (2001)A Round and Communication Efficient Secure Ranking Protocol., and . CT-RSA, volume 3860 of Lecture Notes in Computer Science, page 350-364. Springer, (2006)Hyper-bent Functions., and . EUROCRYPT, volume 2045 of Lecture Notes in Computer Science, page 406-419. Springer, (2001)Additive Autocorrelation of Resilient Boolean Functions., and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 275-290. Springer, (2003)A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences., and . SETA, volume 4086 of Lecture Notes in Computer Science, page 237-247. Springer, (2006)High-speed OFDM Physical-Layer Key Exchange., and . CNS, page 1-9. IEEE, (2023)Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case., and . Selected Areas in Cryptography, volume 2259 of Lecture Notes in Computer Science, page 49-59. Springer, (2001)Asymptotic behavior of normalized linear complexity of ultimately non-periodic binary sequences., , , and . ISIT, page 123. IEEE, (2004)On the proof of Lin's conjecture., , , and . ISIT, page 1822-1826. IEEE, (2014)Hyperbent functions, Kloosterman sums and Dickson polynomials., and . ISIT, page 1758-1762. IEEE, (2008)