Author of the publication

New constructions of balanced Boolean functions with high nonlinearity and optimal algebraic degree.

, , , and . Int. J. Comput. Math., 89 (10): 1319-1331 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Meet-in-the-Middle Attack on 8 Rounds of the AES Block Cipher under 192 Key Bits., , and . ISPEC, volume 6672 of Lecture Notes in Computer Science, page 222-232. Springer, (2011)Lattice-based linearly homomorphic signature scheme over binary field., , and . Sci. China Inf. Sci., 56 (11): 1-9 (2013)On the Invalidity of LV16/Lin17 Obfuscation Schemes., , , and . IACR Cryptol. ePrint Arch., (2023)A Note on P/poly Validity of GVW15 Predicate Encryption Scheme., , , and . IACR Cryptol. ePrint Arch., (2021)Cryptanalysis of a Fully Anonymous Group Signature with Verifier-Local Revocation from ICICS 2018., , , and . NSS, volume 13041 of Lecture Notes in Computer Science, page 369-382. Springer, (2021)Evolutionary Algorithm Based Immune Intrusion Analysis Engine., , , and . ICNC (7), page 138-142. IEEE Computer Society, (2008)ECGSC: Elliptic Curve Based Generalized Signcryption., , , , and . UIC, volume 4159 of Lecture Notes in Computer Science, page 956-965. Springer, (2006)New constructions of balanced Boolean functions with high nonlinearity and optimal algebraic degree., , , and . Int. J. Comput. Math., 89 (10): 1319-1331 (2012)ID-Based ( t , n ) Threshold Proxy Signcryption for Multi-agent Systems., , and . CIS, volume 4456 of Lecture Notes in Computer Science, page 406-416. Springer, (2006)On the value distributions of Walsh spectrums of quadratic Plateaued functions., , and . Comput. Electr. Eng., 37 (6): 849-857 (2011)