Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Faster initial splitting for small characteristic composite extension degree fields., and . Finite Fields Their Appl., (2020)Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings., and . IMACC, volume 8308 of Lecture Notes in Computer Science, page 344-363. Springer, (2013)A Direct Construction of q-ary Even Length Z-Complementary Pairs Using Generalized Boolean Functions., , and . IEEE Signal Process. Lett., (2020)Toward a General Correlation Theorem., and . IEEE Trans. Inf. Theory, 51 (9): 3297-3302 (2005)Construction of Perfect Nonlinear and Maximally Nonlinear Multiple-Output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria., and . IEEE Trans. Inf. Theory, 50 (11): 2886-2893 (2004)Another look at XCB., , and . Cryptogr. Commun., 7 (4): 439-468 (2015)Improved Time-Memory Trade-Offs with Multiple Data., , and . Selected Areas in Cryptography, volume 3897 of Lecture Notes in Computer Science, page 110-127. Springer, (2005)A New Test Statistic for Key Recovery Attacks Using Multiple Linear Approximations., and . Mycrypt, volume 10311 of Lecture Notes in Computer Science, page 277-293. Springer, (2016)Efficient (Anonymous) Compact HIBE from Standard Assumptions., and . ProvSec, volume 8782 of Lecture Notes in Computer Science, page 243-258. Springer, (2014)Masking Based Domain Extenders for UOWHFs: Bounds and Constructions.. ASIACRYPT, volume 3329 of Lecture Notes in Computer Science, page 187-200. Springer, (2004)