Author of the publication

On the constructions of constant-composition codes from perfect nonlinear functions.

, , and . Sci. China Ser. F Inf. Sci., 52 (6): 964-973 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Construction of de Bruijn Sequences from Product of Two Irreducible Polynomials., , , and . CoRR, (2016)On Binary de Bruijn Sequences from LFSRs with Arbitrary Characteristic Polynomials., , , and . CoRR, (2016)Skew Constacyclic Codes over Finite Chain Rings, , and . CoRR, (2010)The Resistance of PRESENT-80 Against Related-Key Differential Attacks., , , , and . IACR Cryptology ePrint Archive, (2013)On the Efficiency of FHE-Based Private Queries., , , and . IEEE Trans. Dependable Secur. Comput., 15 (2): 357-363 (2018)Quasi-Cyclic Codes., , and . CoRR, (2020)Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures., , , , , , and . CT-RSA, volume 7779 of Lecture Notes in Computer Science, page 50-67. Springer, (2013)Non-malleable Coding for Arbitrary Varying Channels., , , and . ITW, page 1-5. IEEE, (2019)Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2., , , and . ASIACRYPT, volume 6477 of Lecture Notes in Computer Science, page 56-75. Springer, (2010)Practical Pseudo-collisions for Hash Functions ARIRANG-224/384., , , , and . Selected Areas in Cryptography, volume 5867 of Lecture Notes in Computer Science, page 141-156. Springer, (2009)