Author of the publication

Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000.

, and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 15-20. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrated DH-like Key Exchange Protocols from LUC, GH and XTR., and . ISIT, page 922-926. IEEE, (2006)Constructions of Multiple Shift-Distinct Signal Sets with Low Correlation.. ISIT, page 2306-2310. IEEE, (2007)Comparison of boolean function design., , , and . ISIT, page 1111-1115. IEEE, (2005)PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks., and . CoRR, (2020)A Novel Physical Layer Security Scheme for MIMO Two-Way Relay Channels., , , and . GLOBECOM Workshops, page 1-6. IEEE, (2015)Randomness properties of stream ciphers for wireless communications., and . IWSDA, page 107-109. IEEE, (2013)Filtering Nonlinear Feedback Shift Registers Using Welch-Gong Transformations for Securing RFID Applications., and . QSHINE, volume 115 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 643-657. Springer, (2013)On algebraic immunity of trace inverse functions on finite fields of characteristic two., and . J. Systems Science & Complexity, 29 (1): 272-288 (2016)Quadratic Zero-Difference Balanced Functions, APN Functions and Strongly Regular Graphs., , and . CoRR, (2014)New Constructions for Resilient and Highly Nonlinear Boolean Functions., and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 498-509. Springer, (2003)