Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographically Strong Permutations from the Butterfly Structure., , , and . CoRR, (2019)On the number of rotation symmetric Boolean functions., , and . Sci. China Inf. Sci., 53 (3): 537-545 (2010)Permutation trinomials over finite fields with even characteristic., , , , and . CoRR, (2014)Constructions of negabent functions over finite fields., and . Cryptogr. Commun., 9 (2): 165-180 (2017)A New Attack on RSA with Known Middle Bits of the Private Key., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (12): 2677-2685 (2015)A Comment on Algebraic Immunity of the Sum of Two Boolean Functions., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 95-A (7): 1187-1188 (2012)A link between two classes of permutation polynomials., , and . Finite Fields Their Appl., (2020)2-Adic complexity of binary sequences with interleaved structure., , and . Finite Fields Their Appl., (2015)A note on linearized polynomials and the dimension of their kernels., and . Finite Fields Their Appl., 18 (1): 56-62 (2012)New Classes of Efficient MDS Transformations., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (11): 1504-1511 (2019)