Author of the publication

SQUARE attack on block ciphers with low algebraic degree.

, , , and . Sci. China Inf. Sci., 53 (10): 1988-1995 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-scale modeling of aerosol transport in a mouth-to-truncated bronchial tree system., , , , and . Comput. Biol. Medicine, (2024)Design of UVC Surface Disinfection Robot with Coverage Path Planning Using Map-Based Approach At-The-Edge., , , , , , and . Robotics, 11 (6): 117 (2022)Pallet detection and localization with RGB image and depth data using deep learning techniques., , , , , , and . CACRE, page 306-310. IEEE, (2021)A New Path Expression Computing Approach for XML Data., , , , , and . EEXTT, volume 2590 of Lecture Notes in Computer Science, page 35-46. Springer, (2002)Efficient Evaluation of XML Path Queries with Automata., , , , and . WAIM, volume 2762 of Lecture Notes in Computer Science, page 116-127. Springer, (2003)The Tracking Control of Unmanned Underwater Vehicles Based on QPSO-Model Predictive Control., , , and . ICIRA (1), volume 10462 of Lecture Notes in Computer Science, page 711-720. Springer, (2017)A New Moving Target Interception Algorithm for an AUV in the Ocean Current Environment., , , and . ICIRA (4), volume 13016 of Lecture Notes in Computer Science, page 45-55. Springer, (2021)Causality-Based Neural Network Repair., , , and . ICSE, page 338-349. ACM, (2022)Improved Cryptanalysis on SipHash., , , and . CANS, volume 11829 of Lecture Notes in Computer Science, page 61-79. Springer, (2019)Deceptive jamming suppression for SAR based on time-varying initial phase., , , and . IGARSS, page 4996-4999. IEEE, (2016)