Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Construction of de Bruijn Sequences from Product of Two Irreducible Polynomials., , , and . CoRR, (2016)Skew Constacyclic Codes over Finite Chain Rings, , and . CoRR, (2010)On the Efficiency of FHE-Based Private Queries., , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 357-363 (2018)Duadic Codes over F2 + uF2., and . Appl. Algebra Eng. Commun. Comput., 12 (5): 365-379 (2001)Cycle Systems in the Complete Bipartite Graph Plus a One-Factor., , , and . SIAM J. Discret. Math., 21 (4): 1083-1092 (2008)Zpk+1-Linear codes., and . IEEE Trans. Inf. Theory, 48 (9): 2592-2605 (2002)Split group codes., , and . IEEE Trans. Inf. Theory, 46 (2): 485-495 (2000)On the constructions of constant-composition codes from perfect nonlinear functions., , and . Sci. China Ser. F Inf. Sci., 52 (6): 964-973 (2009)Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes., , , , and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 19-36. Springer, (2008)Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2., , , and . ASIACRYPT, volume 6477 of Lecture Notes in Computer Science, page 56-75. Springer, (2010)