Search results for: Wen-Feng Qi
Designs, Codes and Cryptography > 2019 > 87 > 11 > 2683-2700
Designs, Codes and Cryptography > 2019 > 87 > 10 > 2267-2294
Designs, Codes and Cryptography > 2018 > 86 > 12 > 2775-2790
IET Information Security > 2017 > 11 > 6 > 363 - 368
IET Information Security > 2017 > 11 > 6 > 377 - 385
IET Information Security > 2017 > 11 > 5 > 230 - 234
IET Information Security > 2017 > 11 > 3 > 139 - 145
IET Information Security > 2017 > 11 > 1 > 46 - 53
Lecture Notes in Computer Science > Sequences and Their Applications – SETA 2006 > FCSR Sequences > 323-333
Cryptography and Communications > 2017 > 9 > 5 > 563-580
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2006 > Stream Ciphers and Boolean Functions > 84-98
Lecture Notes in Computer Science > Information Security and Cryptology > Boolean Functions > 256-270
Lecture Notes in Computer Science > Information Security and Cryptology > Stream Cipher and Pseudorandomness > 216-230
Lecture Notes in Computer Science > Sequences and Their Applications – SETA 2006 > FCSR Sequences > 313-322
Lecture Notes in Computer Science > Sequences and Their Applications – SETA 2006 > Correlation of Sequences > 129-140
Cryptography and Communications > 2016 > 8 > 3 > 371-381
IEEE Transactions on Information Theory > 2015 > 61 > 1 > 645 - 654
Designs, Codes and Cryptography > 2015 > 74 > 2 > 467-480
Designs, Codes and Cryptography > 2015 > 75 > 2 > 199-212