From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems., и . IET Inf. Secur., 17 (3): 394-406 (мая 2023)The Properties of the 1-error Linear Complexity of pn-periodic Sequences Over Fp., и . ISIT, стр. 1998-2002. IEEE, (2006)The existence and synchronization properties of symmetric fix-free codes., , и . Sci. China Inf. Sci., 56 (9): 1-9 (2013)On the nonlinearity of S-boxes and linear codes., , и . Cryptogr. Commun., 9 (3): 345-361 (2017)On the Diffusion Property of Iterated Functions., , и . IMACC, том 9496 из Lecture Notes in Computer Science, стр. 239-253. Springer, (2015)Secret Sharing Schemes with General Access Structures., , и . Inscrypt, том 9589 из Lecture Notes in Computer Science, стр. 341-360. Springer, (2015)Detecting DNA-binding domain from sequence and secondary structure Information Using Kernel-based Technique., и . ISKE, стр. 200-204. IEEE, (2008)A Frequent Pattern Mining Method for Finding Planted (l, d)-motifs of Unknown Length., , и . RSKT, том 6401 из Lecture Notes in Computer Science, стр. 240-248. Springer, (2010)More Efficient Trapdoor-Permutation-Based Sequential Aggregate Signatures with Lazy Verification., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (12): 1640-1646 (2020)On homogeneous rotation symmetric bent functions., , и . Discret. Appl. Math., 158 (10): 1111-1117 (2010)