Author of the publication

Hamming distance of repeated-root constacyclic codes of length 2ps over $F_p^m+uF_p^m$.

, , , , , and . Appl. Algebra Eng. Commun. Comput., 31 (3-4): 291-305 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the symbol-pair distance of some classes of repeated-root constacyclic codes over Galois ring., , , , , and . Appl. Algebra Eng. Commun. Comput., 34 (1): 111-128 (2023)Construction of cryptographically strong S-boxes from ternary quasigroups of order 4., , , and . Cryptologia, 46 (6): 525-551 (2022)Cryptanalysis of an Extension of the Hill Cipher., , and . Cryptologia, 31 (3): 246-253 (2007)Distributed Signcryption from Pairings., and . ICISS, volume 7093 of Lecture Notes in Computer Science, page 215-234. Springer, (2011)Distributed Signcryption Schemes with Formal Proof of Security., and . InfoSecHiComNet, volume 7011 of Lecture Notes in Computer Science, page 93-110. Springer, (2011)SMT Solver-Based Cryptanalysis of Block Ciphers., , , and . SN Comput. Sci., 1 (3): 169 (2020)On the security of DLCSP over $GL_n(F_qS_r)$., , and . Appl. Algebra Eng. Commun. Comput., 34 (4): 619-628 (July 2023)Survey on SAP and its application in public-key cryptography., , and . J. Math. Cryptol., 14 (1): 144-152 (2020)Generalized Avalanche Test for Stream Cipher Analysis., , and . InfoSecHiComNet, volume 7011 of Lecture Notes in Computer Science, page 168-180. Springer, (2011)BDD-based cryptanalysis of stream cipher: a practical approach., , , and . IET Inf. Secur., 11 (3): 159-167 (2017)