Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000., and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 15-20. Springer, (2001)A Round and Communication Efficient Secure Ranking Protocol., and . CT-RSA, volume 3860 of Lecture Notes in Computer Science, page 350-364. Springer, (2006)A conjecture on binary sequences with the "Trinomial property"., and . IEEE Trans. Inf. Theory, 47 (1): 426-427 (2001)New designs for signal sets with low cross correlation, balance property, and largelinear span: GF(p) case.. IEEE Trans. Inf. Theory, 48 (11): 2847-2867 (2002)Generating Large Instances of the Gong-Harn Cryptosystem., and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 317-328. Springer, (2001)Nonlinear Generators of Binary Sequences with Controllable Complexity and Double Key.. AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 32-36. Springer, (1990)Constructions of Quadratic Bent Functions in Polynomial Forms., and . IEEE Trans. Inf. Theory, 52 (7): 3291-3299 (2006)New Characterizations for the Multi-output Correlation-Immune Boolean Functions., , and . CoRR, (2019)New Implementations of the WG Stream Cipher., , and . IEEE Trans. Very Large Scale Integr. Syst., 22 (9): 1865-1878 (2014)High-speed OFDM Physical-Layer Key Exchange., and . CNS, page 1-9. IEEE, (2023)