Author of the publication

Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity.

, , , , and . WISA, volume 7690 of Lecture Notes in Computer Science, page 43-54. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integral and Impossible Differential Cryptanalysis of RC6., , and . ICCCS (3), volume 11065 of Lecture Notes in Computer Science, page 606-616. Springer, (2018)New observation on division property., , , , and . Sci. China Inf. Sci., 60 (9): 98102 (2017)New Observation on Division Property., , , , and . IACR Cryptol. ePrint Arch., (2015)Enumeration of Even-Variable Boolean Functions with Maximum Algebraic Immunity., , , , and . WISA, volume 7690 of Lecture Notes in Computer Science, page 43-54. Springer, (2012)Human head-shoulder segmentation., , , and . FG, page 227-232. IEEE Computer Society, (2011)IABA: An improved PNN Algorithm for anomaly detection in network security management., , , and . ICNC, page 335-339. IEEE, (2010)Algorithms for Congestion Detection and Control., , , , and . GCC Workshops, volume 3252 of Lecture Notes in Computer Science, page 374-381. Springer, (2004)A self-reference and high-resolution method for measuring the magnitude frequency response of optical filters., , , , and . WOCC, page 1-3. IEEE, (2016)Analysis of Cryptographic Algorithms' Characters in Binary File., , , and . PDCAT, page 219-223. IEEE, (2012)ValCAT: Variable-Length Contextualized Adversarial Transformations Using Encoder-Decoder Language Model., , , , , and . NAACL-HLT, page 1735-1746. Association for Computational Linguistics, (2022)