Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Range-Free Multiple Target Localization Algorithm Using Compressive Sensing Theory in Wireless Sensor Networks., , and . MASS, page 690-695. IEEE Computer Society, (2014)Automatic search method for multiple differentials and its application on MANTIS., , , and . SCIENCE CHINA Information Sciences, 62 (3): 32111:1-32111:15 (2019)A two-view VR shooting theater system., , , , , , , , , and . VRCAI, page 223-226. ACM, (2014)Computing Realistic Images for Audience Interaction in Projection-Based Multi-view Display System., , , , , and . UIC/ATC/ScalCom, page 789-793. IEEE Computer Society, (2014)Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using χ2-method., , and . Des. Codes Cryptogr., 81 (3): 523-540 (2016)Some cryptanalytic results on Lizard., , , and . IACR Trans. Symmetric Cryptol., 2017 (4): 82-98 (2017)Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants., , , , , and . FSE, volume 9783 of Lecture Notes in Computer Science, page 399-415. Springer, (2016)An Efficient Approach for Solving Reliable Facility Location Models., , and . INFORMS J. Comput., 25 (4): 720-729 (2013)Improved Differential Cryptanalysis of CAST-128 and CAST-256., , and . Inscrypt, volume 10143 of Lecture Notes in Computer Science, page 18-32. Springer, (2016)Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES., , , and . SAC, volume 11349 of Lecture Notes in Computer Science, page 139-162. Springer, (2018)