Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Subfield Attack on NTRU by using symmetric function map., , , and . ISIT, page 2308-2313. IEEE, (2023)Quantum Algorithms for the Multiplication of Circulant Matrices and Vectors., , and . Inf., 15 (8): 453 (August 2024)Subfield Attacks on HSVP in Ideal Lattices., , , and . Inscrypt, volume 13837 of Lecture Notes in Computer Science, page 447-462. Springer, (2022)A path relinking with tabu search algorithm for solving hybrid flow shop scheduling problem considering multiple critical paths., , , , and . Comput. Oper. Res., (2024)On the Non-Existence of Certain Classes of Generalized Bent Functions., and . IEEE Trans. Inf. Theory, 63 (1): 738-746 (2017)A fuzzy correlation based heuristic for Dual-mode integrated Location routing problem., , , and . Comput. Oper. Res., (2022)A feature correlation reinforce clustering and evolutionary algorithm for the green bike-sharing reposition problem., , , , and . Comput. Oper. Res., (2024)A modified CG algorithm for solving generalized coupled Sylvester tensor equations., and . Appl. Math. Comput., (2020)Research on Online Physical Education Micro Course System Based on Improved Machine Learning., , and . eLEOT (1), volume 339 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 230-241. Springer, (2020)Research on High Fidelity Cluster Encrypted Transmission Method for Marine Target Detection., , , , and . ICITEE, page 1:1-1:5. ACM, (2019)