Author of the publication

On algebraic immunity of trace inverse functions on finite fields of characteristic two.

, and . J. Systems Science & Complexity, 29 (1): 272-288 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000., and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 15-20. Springer, (2001)A New Algorithm to Compute Remote Terms in Special Types of Characteristic Sequences., and . SETA, volume 4086 of Lecture Notes in Computer Science, page 237-247. Springer, (2006)A Round and Communication Efficient Secure Ranking Protocol., and . CT-RSA, volume 3860 of Lecture Notes in Computer Science, page 350-364. Springer, (2006)Additive Autocorrelation of Resilient Boolean Functions., and . Selected Areas in Cryptography, volume 3006 of Lecture Notes in Computer Science, page 275-290. Springer, (2003)Hyper-bent Functions., and . EUROCRYPT, volume 2045 of Lecture Notes in Computer Science, page 406-419. Springer, (2001)New results on periodic sequences with large k-error linear complexity., , and . ISIT, page 2409-2413. IEEE, (2008)On the proof of Lin's conjecture., , , and . ISIT, page 1822-1826. IEEE, (2014)Asymptotic behavior of normalized linear complexity of ultimately non-periodic binary sequences., , , and . ISIT, page 123. IEEE, (2004)New sequence families with zero or low correlation zone via interleaving techniques., and . ISIT, page 124-128. IEEE, (2009)Hyperbent functions, Kloosterman sums and Dickson polynomials., and . ISIT, page 1758-1762. IEEE, (2008)