1 |
Implementing the 4-dimensional GLV method on GLS elliptic curves with j-invariant 0
|
期刊论文 |
Hu Zhi;Longa Patrick;Xu Maozhi |
2 |
广义Reed-Solomon码的深洞
|
期刊论文 |
张俊;符方伟;廖群英 |
3 |
Proof of a conjecture about rotation symmetric functions
|
期刊论文 |
Guo hua|Feng rongquan|Li Yifa|Zhang xiyong| |
4 |
The Gaussian period normal basis and its trace basis over finite fields
|
期刊论文 |
Qunying Liao |
5 |
Twisted Jacobi intersections curves
|
期刊论文 |
Feng Rongquan;Nie Menglong;Wu Hongfeng |
6 |
Weight Distribution of A p-ary Cyclic Code
|
期刊论文 |
Xiangyong Zeng;Lei Hu;Wenfeng Jiang;Qin Yue;Xiwang Cao |
7 |
Implicit Polynomial Recovery and Cryptanalysis of A Combinatorial Key Cryptosystem
|
期刊论文 |
Jun Xu|Lei Hu|Siwei Sun| |
8 |
Enabling Secure Location-based Services in Mobile Cloud Computing
|
会议论文 |
Y. Zhu;D. Ma;D. Huang;C. Hu |
9 |
The Complexity of Network Coding With Two Unit-Rate Multicast Sessions
|
期刊论文 |
Song, Wentu|Cai, Kai|Feng, Rongquan|Yuen, Chau| |
10 |
Regular t-balanced Cayley maps for abelian groups
|
期刊论文 |
Feng Rongquan;Jajcay Robert;Wang Yan |
11 |
Solving the two simple multicast network coding problem in time O(E)
|
会议论文 |
Song Wentu;Cai Kai;Feng Rongquan;Rui Wang |
12 |
量子纠错码
|
专著 |
冯克勤;陈豪 |
13 |
A note on pairing computation on Edwards curves
|
期刊论文 |
Wu Hongfeng;Feng Rongquan |
14 |
The weight distributions of cyclic codes and elliptic curves
|
期刊论文 |
Wang Baocheng;Tang Chunming;Qi Yanfeng;Yang Yixian;Xu Maozhi |
15 |
Dynamic Audit Services for Outsourced Storages in Clouds
|
期刊论文 |
Yan Zhu;Gail-Joon Ahn;Hongxin Hu;Stephen S. Yau;Ho G. An;Chang-Jun Hu |
16 |
A New Self-Generated-Certificate Public Key Encryption Scheme with Flexible Public Key
|
期刊论文 |
Zhao Yanhui;Xu Maozhi;Shen Xunxun |
17 |
Implicit Polynomial Recovery and Cryptanalysis of A Combinatorial Key Cryptosystem
|
会议论文 |
Jun Xu|Lei Hu|Siwei Sun| |
18 |
Efficient Construction of Provably Secure Steganography under Ordinary Covert Channels
|
期刊论文 |
MengYang Yu|HongXin Hu|Gail-Joon Ahn|HongJia Zhao| |
19 |
Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One
|
会议论文 |
Zhi Hu|Lin Wang|Maozhi Xu|Guoliang Zhang| |
20 |
Attribute-Based Signature with Policy-and-Endorsement Mechanism
|
期刊论文 |
H. Wang;Y. Zhu;Z. Hu;R. Feng;S. Yau |
21 |
Inhomogenous quantum codes (I): additive case
|
期刊论文 |
Wang WeiYang;Feng RongQuan;Feng KeQin |
22 |
An Effective Construction of a Class of Hyper-Bent Functions
|
期刊论文 |
Yu Lou;Feng Zhou;Chunming Tang |
23 |
Network coding for two-unicast with rate (1,2)
|
期刊论文 |
W. Song;R. Feng;K. Cai;J. Zhang |
24 |
Efficient bidirectional proxy re-encryption with direct chosen-ciphertext Security
|
期刊论文 |
Lifeng Guo;Lei Hu |
25 |
Planarity of mappings x(Tr(x)-alpha/2x) on finite fields
|
期刊论文 |
Minghui Yang;Shixin Zhu;Keqin Feng |
26 |
常规隐信道下可证明安全隐写术的有效构造方法
|
期刊论文 |
朱岩;余孟扬;胡宏新;Gail-Joon Ahn;赵红佳 |
27 |
Explicit Determination of Certain Kinds of Gauss Sums
|
期刊论文 |
L. Xia|D. Chen|J. Yang| |
28 |
Construction of network error correction codes in packet networks
|
期刊论文 |
Zhang, Zhen|Guang, Xuan|Fu, Fang-Wei| |
29 |
On explicit factors of cyclotomic polynomials over finite fields
|
期刊论文 |
L.-P. Wang|Q. Wang| |
30 |
利用Gauss和与Jacobi和构造近似MUB和SIC-POVM
|
期刊论文 |
王威杨;张爱仙;冯克勤 |
31 |
Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage
|
期刊论文 |
Yan Zhu;Hongxin Hu;Gail-Joon Ahn;Mengyang Yu;Shimin Chen |
32 |
Secure and Efficient Constructions of Hash, MAC and PRF for Mobile Devices
|
会议论文 |
Yan Zhu;Shanbiao Wang;Di Ma;Hongxin Hu;Gail-Joon Ahn |
33 |
Super-optimal pairings
|
会议论文 |
Qi Yanfeng;Tang Chunming;Guo Baoan;Xu Maozhi |
34 |
The Gauss sums and Jacobi sums over Galois ring GR(p(2), r)
|
期刊论文 |
Li Jin;Zhu ShiXin;Feng KeQin |
35 |
A lattice-based minimal partial realization algorithm for matrix sequences of varying length
|
期刊论文 |
Liping Wang |
36 |
Two new permutation polynomials with the form (x2k+x+d)s+x over F2n
|
期刊论文 |
Xianyong Zeng|Xishun Zhu|Lei Hu| |
37 |
Some lower bounds for the spectral radius of matrices using traces
|
期刊论文 |
Min Liu;Zhuyuan Wang;Liqing Pan;Yiping Cui;Yi |
38 |
Families of p-ary sequences with low correlation and large linear complexity
|
期刊论文 |
Cai Han;Zeng Xiangyong;Hu Lei |
39 |
New sets of frequency-hopping sequences with optimal Hamming correlation
|
期刊论文 |
Wenli Ren|Fangwei Fu|Zhengchun Zhou| |
40 |
Linear recurring sequences and subfield subcodes of cyclic codes
|
期刊论文 |
Gao ZhiHan;Fu FangWei |
41 |
The minimal polynomial of a sequence obtained from the componentwise linear transformation of a linear recurring sequence
|
期刊论文 |
Fu, Fang-Wei|Gao, Zhi-Han| |
42 |
End-to-End Aggregate Authentication of Time-Series Data
|
会议论文 |
D. Ma;Y. Zhu |
43 |
Further crosscorrelation properties of sequences with the decimation factor d=(pn+1)/(p+1)-(pn-1)/2
|
期刊论文 |
Yongbo Xia;Xiangyong Zeng;Lei Hu |
44 |
Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem
|
会议论文 |
Jun Xu;Lei Hu;Siwei Sun;Ping Wang |
45 |
A generalization of Verheul's theorem for some ordinary curves
|
会议论文 |
Hu, Zhi|Xu, Maozhi|Zhou, Zhenghua| |
46 |
Kipnis-Shamir Attack on Unbalanced Oil-Vinegar Scheme
|
会议论文 |
Weiwei Cao;Lei Hu;Jintai Ding;Zhijun YIn |
47 |
Constructions for binary codes correcting asymmetric errors from function fields
|
期刊论文 |
Zhang Jun;Fu Fang-Wei |
48 |
On Reed-Solomon Codes
|
期刊论文 |
Qunying Liao |
49 |
Two Classes of Codebooks Nearly Meeting the Welch Bound
|
期刊论文 |
Zhang Aixian;Feng Keqin |
50 |
2-Distance paired-dominating number of graphs
|
期刊论文 |
Kan YU;Mei Lu |
51 |
Comparison-Based Encryption for Fine-grained Access Control in Clouds
|
会议论文 |
Yan Zhu;Hongxin Hu;Gail-Joon Ahn;Mengyang Yu;Hongjia Zhao |
52 |
Error correction for cooperative data exchange
|
期刊论文 |
W. Song;X. Wang;C. Yuen;Tiffany J Li;R. Feng |
53 |
VECTORIAL BOOLEAN FUNCTIONS WITH GOOD CRYPTOGRAPHIC PROPERTIES
|
期刊论文 |
Feng Keqin;Yang Jing |
54 |
Efficient Audit Service Outsourcing for Data Integrity in Clouds
|
期刊论文 |
Yan Zhu;Hongxin Hu;Gail-Joon Ahn;Stephen S. Yau;Yu Chen |
55 |
On the average partial hamming correlation of frequency-hopping sequences
|
期刊论文 |
Wenli Ren|Fangwei Fu|Zhengchun Zhou| |
56 |
A matrix construction of Boolean functions with maximum algebraic immunity
|
期刊论文 |
Yonghong Xie;Lei Hu |
57 |
Secure Collaborative Integrity Verification For Hybrid Cloud Environments
|
期刊论文 |
Yan Zhu|Shanbiao Wang|Hongxin Hu|Gail-Joon Ahn|Di Ma| |
58 |
Towards Temporal Access Control in Cloud Computing
|
会议论文 |
Yan Zhu;Hongxin Hu;Gail-Joon Ahn;Dijiang Huang;Shanbiao Wang |
59 |
On the number of isomorphism classes of elliptic curves with 2-torsion points over finite fields
|
会议论文 |
R. Feng;M. Nie;H. Wu |
60 |
Fault-tolerant diameter for three family interconnection networks,
|
期刊论文 |
Tongliang SHI;Mei LU |
61 |
Cryptanalysis of Two Quartic Encryption Schemes and One Improved MFE Scheme
|
期刊论文 |
Weiwei Cao;Xuyun Nie;Lei Hu;Xiling Tang;Jintai Ding |
62 |
Boolean functions with two distinct Walsh coefficients
|
期刊论文 |
Tu, Ziran|Zheng, Dabin|Zeng, Xiangyong|Hu, Lei| |
63 |
On the reducibility of some composite polynomials over finite fields
|
期刊论文 |
Cao Xiwang, Hu Lei| |
64 |
Differential Fault Attack on the PRINCE Block Cipher
|
会议论文 |
Ling Song, Lei Hu| |
65 |
The capacity kernel of communication networks
|
会议论文 |
Song Wentu;Cai Kai;Feng Rongquan;Fan Pingyi |
66 |
Several classes of complete permutation polynomials
|
期刊论文 |
Tu Ziran;Zeng Xiangyong();Hu Lei |
67 |
Universal network error correction MDS codes
|
会议论文 |
Zhang, Zhen|Fu, Fang-Wei|Guang, Xuan| |
68 |
Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves
|
期刊论文 |
Xu, Maozhi|Song, Wangan|Hu, Zhi|Zhou, Zhenghua| |
69 |
Construction of network error correction codes in packet networks
|
会议论文 |
Zhang, Zhen|Guang, Xuan|Fu, Fang-Wei| |
70 |
阶数极大的临界全控制图
|
期刊论文 |
李凡;陆玫 |
71 |
Attribute-based signature with policy-and-endorsement mechanism
|
期刊论文 |
Wang Huai-Xi;Zhu Yan;Feng Rong-Quan;Yau Stephen S. |
72 |
A Novel Identity Based Undeniable Signature Scheme
|
会议论文 |
S. Li;C. Wang;M.Z. Xu;D. Xie |
73 |
Complete solving of explicit evaluation of Gauss sums in the index 2 case
|
期刊论文 |
Jing Yang;LingLi Xia |
74 |
Linear recurring sequences and subfield subcodes
|
会议论文 |
Gao Zhi-Han; Fu Fang-Wei |
75 |
Isomorphism classes of Jacobi quartic curve over finite fields, Information Technology Convergence, Secure and Trust Computing, and Data Management
|
期刊论文 |
Hongfeng Wu;Rongquan Feng |
76 |
A kind of cyclotomic numbers and Sidelnikov sequences
|
会议论文 |
J. Yang;L. Xia |
77 |
On m-MDS Codes
|
期刊论文 |
Qunying Liao;Huan Liao |
78 |
Stopping Set Distributions of Algebraic Geometry Codes from Elliptic Curves
|
期刊论文 |
Zhang Jun|Fu Fang-Wei|Wan Daqing| |
79 |
On the solvability of single rate 2-pair networks - A cut-based characterization
|
期刊论文 |
Cai Kai;Letaief K.B.;Fan Pingyi;Feng Rongquan |
80 |
Periods of Polynomials over a Galois Ring
|
期刊论文 |
Xiao lei Zhang;Lei Hu |
81 |
On the isomorphism classes of Legendre elliptic curves over finite fields
|
期刊论文 |
Wu HongFeng;Feng RongQuan |
82 |
Two Classes of Permutation Polynomials over Finite Fields
|
期刊论文 |
Zhengbang Zha|Lei Hu| |
83 |
The effective construction of the lattice basis and its cryptographic application
|
期刊论文 |
B. Wang;C. Tang;C. Song;Y. Qi;Y. Yang |
84 |
Spectral Radius and Hamiltonion graphs
|
期刊论文 |
Mei Lu;Huiqing Liu;Feng Tian |
85 |
Inhomogeneous quantum codes (II): non-additive case
|
期刊论文 |
Wang Weiyang;Feng Keqin |
86 |
Strongly quasi-Hamiltonian-connected semicomplete multipartite digraphs
|
期刊论文 |
Mei Lu|Yubao Gao|Michel Surmacs| |
87 |
How to Use Attribute-Based Encryption to Implement Role-based Access Control in the Cloud
|
会议论文 |
Y. Zhu;D. Ma;C. Hu;D. Huang |
88 |
Pseudorandom generators based on subcovers for finite groups
|
会议论文 |
Song, Chenggen|Xu, Maozhi|Tang, Chunming| |
89 |
A Class of Elliptic Curves in Edwards Form
|
会议论文 |
Y. Qi;M.Z. Xu;C. Tang |
90 |
Hierarchical Management Scheme by Local Fields
|
期刊论文 |
Yue Zhi Hong;Xu Mao Zhi |
91 |
Linear complexity of binary sequences derived from Euler quotients with prime-power modulus
|
期刊论文 |
Du, Xiaoni|Chen, Zhixiong|Hu, Lei| |
92 |
The encoding complexity of network coding with two simple multicast sessions
|
会议论文 |
Song Wentu;Cai Kai;Feng Rongquan |
93 |
Cube Cryptanalysis of Hitag2 Stream Cipher
|
会议论文 |
Siwei Sun;Lei Hu;Yonghong Xie;Xiangyong Zeng |
94 |
Role-based cryptosystem: A new cryptographic RBAC system based on role-key hierarchy
|
期刊论文 |
Zhu, Yan|Ahn, Gail-Joon|Hu, Hongxin|Ma, Di|Wang, Shanbiao| |
95 |
Lagrange interpolation polynomials and generalized Reed-Solomon codes over rings of matrices
|
会议论文 |
Li-Ping Wang| |
96 |
The existence and synchronization properties of symmetric fix-free codes
|
期刊论文 |
Guang, Xuan|Fu, FangWei|Chen, LuSheng| |
97 |
Asymmetric Quantum Codes: Characterization and Constructions
|
期刊论文 |
Wang, Long|Feng, Keqin|Ling, San|Xing, Chaoping| |
98 |
On homogeneous rotation symmetric bent functions
|
期刊论文 |
Chen, Lusheng|Meng, Qiang|Fu, Fang-Wei| |
99 |
On the correlation distributions of optimal quaternary sequence Family U and optimal binary sequence family V
|
期刊论文 |
Nian Li;Xiaohu Tang;Xiangyong Zeng;Lei Hu |
100 |
Projective Interpolation of Polynomial Vectors and Improved Key Recovery Attack on SFLASH
|
期刊论文 |
Weiwei Cao;Lei Hu |
101 |
Weakly quasi-Hamiltonian-set-connected multipartite tournaments
|
期刊论文 |
Yubao Guo|Mei Lu| Michel Surmacs| |
102 |
Full automorphism group of the generalized symplectic graph
|
期刊论文 |
Zeng LiWei;Chai Zhao;Feng RongQuan;Ma ChangLi |
103 |
Linear Complexity of Some Binary Sequences Derived from Fermat Quotients
|
期刊论文 |
Chen Zhixiong;Hu Lei;Du Xiaoni |
104 |
Low complexity of a class of normal bases over finite fields
|
期刊论文 |
Liao, Qunying|You, Lin| |
105 |
An improved algorithm for computing 2P Q on elliptic curves
|
会议论文 |
Qi Yanfeng;Xu Maozhi;Tang Chunming |
106 |
Secure Data Retrieval of Outsourced Data with Complex Query Support
|
会议论文 |
Yan Zhu;Di Ma;Shanbiao Wang |
107 |
On the signless Laplacian spectral radius of irregular graphs
|
期刊论文 |
Wenjie Ning;Hao Li;Mei Lu |
108 |
Analysis of Two Knapsack Public Key Cryptosystems
|
期刊论文 |
Liqiang Peng, Lei Hu, Jun Xu, Yonghong Xie, Jinyi| |
109 |
Solving the single rate 2-pair network coding problem with the A-set equation
|
会议论文 |
Cai, Kai|Letaief, K.B.|Fan, Pingyi|Feng, Rongquan| |
110 |
Construction of 1-resilient Boolean functions with optimum algebraic immunity
|
期刊论文 |
Wei SU;Xiangyong Zeng;Lei Hu |
111 |
具有最优代数免疫度的2~m个变量的对称Boolean函数
|
期刊论文 |
廖群英;冯克勤;刘峰 |
112 |
Cryptographic Spatio-Temporal Predicates for Location-based Services
|
会议论文 |
Y. Zhu;C. Hu;D. Ma;J. Li |
113 |
Weights Distribution of a Class of Cyclic Codes with Arbitrary Number of Zeros
|
期刊论文 |
J. Yang;M. Xiong;C. Ding;J. Luo |
114 |
1-Generator quasi-cycliccodes over
|
期刊论文 |
Gao Jian;Kong Qiong |
115 |
Lattice-based Key Exchange on Small Integer Solution Problem
|
期刊论文 |
ShanBiao Wang();Yan Zhu();Di Ma;RongQuan Feng |
116 |
More Balanced Boolean Functions with Optimal Algebraic Immunity, and Good Nonlinearity and Resistance to Fast Algebraic Attacks
|
期刊论文 |
Xiangyong Zeng;C. Carlet;Jinyong Shan;Lei Hu |
117 |
Improved Results on the Probabilistic Theory of the Joint Linear Complexity of Multisequences
|
期刊论文 |
H. Niederreiter;M. Vielhaber;L.-P. Wang |
118 |
A Triple-Error-Correcting Cyclic Code from the Gold and Kasami-Welch APN Power Functions
|
期刊论文 |
Xiangyong Zeng;Jinyong Shan;Lei Hu |
119 |
Construction of Network Error Correction Codes in Packet Networks
|
期刊论文 |
Guang Xuan;Fu Fang-Wei;Zhang Zhen |
120 |
A construction of hyperbent functions with polynomial trace form
|
期刊论文 |
CAO XiWang1 2 3 & HU Lei3 1Department of Mathematics Nanjing University of Aeronautics and Astronautics Nanjing 210016 China;2LMIB of Ministry of Education Beijing University of Aeronautics and Astronautics Beijing 100191 China;3State Key Laboratory of Information Security Graduate School of Chinese Academy of Sciences Beijing 100049 China |
121 |
ON SELMER GROUPS AND TATE-SHAFAREVICH GROUPS FOR ELLIPTIC CURVES y(2)=x(3)-n(3)
|
期刊论文 |
Feng, Keqin|Xiong, Maosheng| |
122 |
On the generalized large set of Kasami sequences
|
期刊论文 |
Wenfeng Jiang|Lei Hu|Xiangyong Zeng| |
123 |
Faster pairing computation on genus 2 hyperelliptic curves
|
期刊论文 |
Tang Chunming;Xu Maozhi;Qi Yanfeng |
124 |
Sign or root of unity ambiguities of certain Gauss sums
|
期刊论文 |
Lingli Xia|Jing Yang| |
125 |
Evaluation of Gauss Sums for 2-Power Order in Index 4
|
期刊论文 |
Yang, Jing|Feng, Keqin| |
126 |
Aperiodic correlation of Kasami sequences in the small set
|
期刊论文 |
Zhimin Sun|Xiangyong Zeng|Wei Su|Lei Hu| |
127 |
Construction of cyclotomic codebooks nearly meeting the Welch bound
|
期刊论文 |
Zhang Aixian;Feng Keqin |
128 |
有限域及其应用---Finite Fields and Their Applications
|
专著 |
冯克勤|廖群英| |
129 |
Strong Unforgeability in Ring Signature Schemes
|
会议论文 |
C Wang;H. Wang;M.Z. Xu;R. Feng |
130 |
Efficient identity-based encryption without pairings and key escrow for mobile devices
|
会议论文 |
Y. Zhu;D. Ma;S. Wang;R. Feng |
131 |
Boolean Functions with Four-valued Walsh Spectra
|
期刊论文 |
Sun Zhiqiang;Lei Hu |
132 |
A method of evaluation of exponential sum of binary quadratic functions
|
期刊论文 |
Xiyong Zhang;Xiwang Cao;Rongquan Feng |
133 |
Edge-connectivity and (signless) Laplacient eigenvalue of graphs
|
期刊论文 |
H. Liu;M. Lu;F. Tian |
134 |
A New Family of Quadriphase Sequences with Low Correlation
|
会议论文 |
J. Li;X. Zeng;L. Hu |
135 |
New results on two hypercube coloring problems
|
期刊论文 |
Fang-Wei Fu*|San Ling|Chaoping Xing| |
136 |
Permutation polynomials with low differential uniformity over finite fields of odd characteristic
|
期刊论文 |
Wenjie Jia;Xiangyong Zeng;Chunlei Li;Tor Helleseth;Lei Hu |
137 |
A Family of p-ary Binomial Bent Functions. IEICE Transactions on Fundamentals of Electronics
|
期刊论文 |
Dabin Zheng;Xiangyong Zeng;Lei Hu |
138 |
Unit time-phase signal sets: Bounds and constructions
|
期刊论文 |
Cunsheng Ding;Keqin Feng;Rongquan Feng;Maosheng Xiong;Aixian Zhang |
139 |
Bounds of signless Laplacian spectrum of graphs based on k-domination number
|
期刊论文 |
H. Liu;M. Lu |
140 |
Stopping set distributions of some Reed-Muller codes
|
期刊论文 |
Jiang, Yong|Xia, Shu-Tao|Fu, Fang-Wei| |
141 |
Hamming weights in irreducible cyclic codes
|
期刊论文 |
Cunsheng Ding;Jing Yang |
142 |
New Methods for Generating Permutation Polynomials over Finite Fields
|
期刊论文 |
Xiwang Cao;Lei Hu |
143 |
Distance spectral radius of trees with fixed number of pendent vertices
|
期刊论文 |
Wenjie Ning|Liangqi Ouyang|Mei Lu| |
144 |
Eigenvalues and Diameter
|
期刊论文 |
H. Liu|M. Liu| |
145 |
Cyclotomic problem, Gauss sums and Legendre curve
|
期刊论文 |
Xia LingLi|Yang Jing| |
146 |
~A note on some special class of hyper-bent functions
|
期刊论文 |
Y. Lou|C. Tang|Y. Qi|M.Z. Xu| |
147 |
A new model of binary elliptic curves
|
会议论文 |
Wu Hongfeng;Tang Chunming;Feng Rongquan |
148 |
Implementing optimized pairings with elliptic nets
|
期刊论文 |
Tang ChunMing;Ni DongMei;Xu MaoZhi;Guo BaoAn;Qi YanFeng |
149 |
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy
|
会议论文 |
Y. Zhu;G. Ahn;H. Hu;H. Wang |
150 |
On random linear network coding for butterfly network
|
期刊论文 |
Guang, Xuan|Fu, Fangwei| |
151 |
A Practical Chaos Based Pseudo-Random Number Generator
|
会议论文 |
S. Li|M.Z. Xu|C. Wang| |
152 |
Incorrigible Set Distributions and Unsuccessful Decoding Probability of Linear Codes
|
会议论文 |
Jiang Yong;Xia Shutao;Liu Xinji;Fu Fangwei |
153 |
The average failure probabilities of random linear network coding
|
期刊论文 |
Guang, Xuan|Fu, Fang-Wei| |
154 |
On the existence of some specific elements in finite fields of characteristic 2
|
期刊论文 |
Peipei Wang, Xiwang Cao*, Rongquan Feng| |
155 |
On a class of binomial bent functions over the finite fields of odd characteristic
|
期刊论文 |
Dabin Zheng;Long Yu;Lei Hu |
156 |
Efficient self-pairing on ordinary elliptic curves
|
会议论文 |
H. Wu;R. Feng |
157 |
Edge fault tolerance of super edge connectivity for three families of interconnection networks
|
期刊论文 |
Wang, Dongye|Lu, Mei| |
158 |
Vertex weighted complexities of graph coverings
|
期刊论文 |
H. Wu;R. Feng;I. Sato |