Author of the publication

A General Construction of ZCZ Sequence Set with Large Family Size and Long Period.

, , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (1): 420-423 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on the Technology of the Secure Computation in the Different Adversarial Models., , , and . CSISE (1), volume 104 of Advances in Intelligent and Soft Computing, page 473-478. Springer, (2011)Certificateless proxy multi-signature., and . Inf. Sci., (2014)Cryptanalysis and improvement of a certificateless encryption scheme in the standard model., , , and . Frontiers Comput. Sci., 8 (1): 163-173 (2014)Constructions of resilient rotation symmetric boolean functions on given number of variables., , , and . IET Inf. Secur., 8 (5): 265-272 (2014)Cryptanalysis and improvement of two certificateless three-party authenticated key agreement protocols, , , , and . CoRR, (2013)Efficient Encrypted Range Query on Cloud Platforms., , , , , and . ACM Trans. Cyber Phys. Syst., 6 (3): 27:1-27:23 (2022)An Improved Biometrics-Based Authentication Scheme for Telecare Medical Information Systems., , , , and . J. Medical Syst., 39 (3): 20 (2015)Efficient Anonymous Data Authentication for Vehicular Ad Hoc Networks., , , , , and . Secur. Commun. Networks, (2021)Searchain: Blockchain-based private keyword search in decentralized storage., , , , and . Future Gener. Comput. Syst., (2020)Secure multi-keyword ranked search over encrypted cloud data for multiple data owners., , , , and . J. Syst. Softw., (2018)