Author of the publication

On algebraic immunity of trace inverse functions on finite fields of characteristic two.

, and . J. Systems Science & Complexity, 29 (1): 272-288 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Further results on complete permutation monomials over finite fields., , , and . Finite Fields Their Appl., (2019)Towards a classification of permutation binomials of the form xi+ax over $F_2^n$., , and . Des. Codes Cryptogr., 92 (12): 3859-3875 (December 2024)Quantum Circuits of AES with a Low-Depth Linear Layer and a New Structure., and . ASIACRYPT (8), volume 15491 of Lecture Notes in Computer Science, page 358-395. Springer, (2024)Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme., , , and . Int. J. Bifurc. Chaos, 28 (7): 1850086:1-1850086:27 (2018)Improved Differential Fault Attack on the Block Cipher SPECK., , , and . FDTC, page 28-34. IEEE Computer Society, (2015)A Framework with Improved Heuristics to Optimize Low-Latency Implementations of Linear Layers., , and . IACR Trans. Symmetric Cryptol., 2023 (4): 489-510 (2023)Loiss: A Byte-Oriented Stream Cipher., , , , and . IACR Cryptology ePrint Archive, (2010)Linear Approximations of Addition Modulo 2n-1., , and . FSE, volume 6733 of Lecture Notes in Computer Science, page 359-377. Springer, (2011)Loiss: A Byte-Oriented Stream Cipher., , , , and . IWCC, volume 6639 of Lecture Notes in Computer Science, page 109-125. Springer, (2011)On algebraic immunity of trace inverse functions on finite fields of characteristic two., and . J. Systems Science & Complexity, 29 (1): 272-288 (2016)