From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Boolean functions with four-valued Walsh spectra., и . J. Systems Science & Complexity, 28 (3): 743-754 (2015)Evaluating BEA Systems Application Server Technology, , , и . CSIRO Mathematical and Information Sciences, Macquarie University, Australia, (July 2001)A Novel Approach for Blood Vessel Edge Detection in Retinal Images., , , , , , и . BMEI, стр. 1-4. IEEE, (2009)Salient object detection based on discriminative boundary and multiple cues integration., , , , , и . J. Electronic Imaging, 25 (1): 013019 (2016)Several Classes of Boolean Functions with Four-Valued Walsh Spectra., и . Int. J. Found. Comput. Sci., 28 (4): 357-378 (2017)Partial Prime Factor Exposure Attacks on RSA and Its Takagi's Variant., , , и . ISPEC, том 9065 из Lecture Notes in Computer Science, стр. 96-108. Springer, (2015)Breaking a New Instance of TTM Cryptosystems., , , , и . ACNS, том 3989 из Lecture Notes in Computer Science, стр. 210-225. (2006)Further properties of several classes of Boolean functions with optimum algebraic immunity., , , и . Des. Codes Cryptogr., 52 (3): 303-338 (2009)Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator., , , , и . Des. Codes Cryptogr., 86 (9): 1997-2033 (2018)Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH., и . Des. Codes Cryptogr., 73 (3): 719-730 (2014)