Author of the publication

Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption.

, , , , , and . ISC, volume 9866 of Lecture Notes in Computer Science, page 440-453. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Weakly Supervised Adversarial Learning for 3D Human Pose Estimation from Point Clouds., , , and . IEEE Trans. Vis. Comput. Graph., 26 (5): 1851-1859 (2020)A Family of p-ary Binomial Bent Functions., , and . IACR Cryptology ePrint Archive, (2009)Constructing Low-latency Involutory MDS Matrices with Lightweight Circuit., , , , and . IACR Cryptology ePrint Archive, (2019)Moth and Ant Inspired Routing in Hierarchical Airborne Networks with Multi-Beam Antennas., , and . IEEE Trans. Mob. Comput., 18 (4): 910-922 (2019)基于压缩域编码长度的视频显著性检测 (Video Saliency Detection Based on Compressed Domain Coding Length)., , , and . 计算机科学, 44 (10): 312-317 (2017)The Integration of Linguistic and Geospatial Features Using Global Context Embedding for Automated Text Geocoding., , , , , and . ISPRS Int. J. Geo Inf., 10 (9): 572 (2021)Three new classes of generalized almost perfect nonlinear power functions., , and . Finite Fields Their Appl., (2018)Constructing permutation polynomials from piecewise permutations., , and . Finite Fields Their Appl., (2014)Cryptanalysis of countermeasures against multiple transmission attacks on NTRU., , , and . IET Commun., 8 (12): 2142-2146 (2014)Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks., , , , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 39-51. Springer, (2013)