Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Stability of the Walsh-Hadamard spectrum of cryptographic Boolean functions with biased inputs., , , and . J. Appl. Math. Comput., 69 (4): 3337-3357 (August 2023)Generalized bent Boolean functions and strongly regular Cayley graphs., , and . CoRR, (2018)An analysis of the C class of bent functions., , , and . IACR Cryptology ePrint Archive, (2015)On the Lower Bounds of the Second Order Nonlinearity of some Boolean Functions., , and . IACR Cryptology ePrint Archive, (2009)Design methods for semi-bent functions., , , and . Inf. Process. Lett., (2019)Lattice attack on group ring NTRU: The case of the dihedral group., , , and . CoRR, (2023)On the lower bounds of the second order nonlinearities of some Boolean functions., , and . Inf. Sci., 180 (2): 266-273 (2010)Gowers U3 norm of some classes of bent Boolean functions., , and . Des. Codes Cryptogr., 86 (5): 1131-1148 (2018)A secure image encryption scheme based on a novel 2D sine-cosine cross-chaotic (SC3) map., , and . J. Real Time Image Process., 18 (1): 1-18 (2021)Affine inequivalence of cubic Maiorana-McFarland type bent functions.. Discret. Appl. Math., 161 (7-8): 1141-1146 (2013)