Search results for: Yuliang Zheng
Materials Letters > 2016 > 184 > C > 173-176
Lecture Notes in Computer Science > Selected Areas in Cryptography > Boolean Functions and Stream Ciphers > 262-274
Lecture Notes in Computer Science
IEEE Transactions on Microwave Theory and Techniques > 2016 > 64 > 10 > 3255 - 3263
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’89 > Cryptanalysis > 412-422
Lecture Notes in Computer Science > Information Security > E-Commerce > 135-148
Lecture Notes in Computer Science > Information Security and Privacy > Public Key Cryptography > 371-388
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC’99 > Cryptographic Theory and Computation Complexity > 60-75
Lecture Notes in Computer Science > Selected Areas in Cryptography > Design and Implementation of Secret Key Cryptosystems > 280-295
Lecture Notes in Computer Science > Secure Mobile Ad-hoc Networks and Sensors > Mobile Ad-Hoc Networks and Sensors > 117-117