Search results for: Dingyi Pei
Designs, Codes and Cryptography > 2018 > 86 > 4 > 939-953
Designs, Codes and Cryptography > 2017 > 85 > 2 > 343-358
Finite Fields and Their Applications > 2016 > 40 > C > 1-9
Lecture Notes in Computer Science > Ubiquitous Intelligence and Computing > Security, Safety and Privacy > 1191-1200
Lecture Notes in Computer Science > Information and Communications Security > Digital Signatures I > 61-71
Lecture Notes in Computer Science > Information Security and Privacy > Symmetric Key Cryptography > 34-46
Lecture Notes in Computer Science > Progress in Cryptology —INDOCRYPT 2000 > Stream Ciphers and Boolean Functions > 1-8
Lecture Notes in Computer Science
Lecture Notes in Computer Science
Cryptography and Communications > 2017 > 9 > 4 > 431-443
Designs, Codes and Cryptography > 2016 > 81 > 3 > 505-521
Finite Fields and Their Applications > 2015 > 36 > C > 151-169
IEEE Transactions on Information Theory > 2015 > 61 > 5 > 2942 - 2951
Information Processing Letters > 2013 > 113 > 17 > 621-627
Mathematical and Computer Modelling > 2013 > 57 > 11-12 > 2695-2702