Author of the publication

Piecewise constructions of inverses of some permutation polynomials.

, , and . Finite Fields Their Appl., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Family of Non-Cartesian Perfect Authentication Codes.. IWCC, volume 5557 of Lecture Notes in Computer Science, page 188-201. Springer, (2009)Determining Parameters of Key Predistribution Schemes via Linear Codes in Wireless Sensor Networks., , and . Inscrypt, volume 6584 of Lecture Notes in Computer Science, page 284-299. Springer, (2010)Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks., , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 34-46. Springer, (2011)Reconstructing Synergy-Based Hand Grasp Kinematics from Electroencephalographic Signals., , , and . Sensors, 22 (14): 5349 (2022)Generalizability of Hand Kinematic Synergies derived using Independent Component Analysis., , and . EMBC, page 621-624. IEEE, (2021)Learning Hand Gestures using Synergies in a Humanoid Robot., , , , , and . ROBIO, page 1-6. IEEE, (2023)Count of annihilators of Boolean functions with given algebraic immunity., and . WCNIS, page 640-643. IEEE, (2010)Message from the General Co-Chairs: AsiaJCIS 2022., , , and . AsiaJCIS, page vii. IEEE, (2022)Myoelectric Control of a Soft Hand Exoskeleton Using Kinematic Synergies., , and . IEEE Trans. Biomed. Circuits Syst., 13 (6): 1351-1361 (2019)A Class of Key Predistribution Schemes Based on Orthogonal Arrays., , and . J. Comput. Sci. Technol., 23 (5): 825-831 (2008)