Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research and Implementation of Evolution Cipher Chip., , , , and . ISCID (1), page 32-35. IEEE Computer Society, (2009)The Practical Detailed Requirements of Accountability and Its Application in the Electronic Payment Protocols., , and . EEE, page 556-561. IEEE Computer Society, (2005)Efficient Modular Exponentiation with Three-Moduli (2n 1, 2n+3)., , and . SNPD (3), page 927-931. IEEE Computer Society, (2007)A Trusted Start-Up Based on Embedded System., , and . CIT (2), page 242-246. IEEE Computer Society, (2009)978-0-7695-3836-5.Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem., , , , , and . SCIENCE CHINA Information Sciences, 59 (5): 052109:1-052109:11 (2016)A privacy-preserving distance-based incentive scheme in opportunistic VANETs., , , and . Security and Communication Networks, 9 (15): 2789-2801 (2016)Survey of information security., , , , and . Science in China Series F: Information Sciences, 50 (3): 273-298 (2007)Analysis of affinely equivalent Boolean functions., , , and . Science in China Series F: Information Sciences, 50 (3): 299-306 (2007)Extended multivariate public key cryptosystems with secure encryption function., , , and . SCIENCE CHINA Information Sciences, 54 (6): 1161-1171 (2011)Research on trusted computing and its development., , , , , , , , and . SCIENCE CHINA Information Sciences, 53 (3): 405-433 (2010)