Author of the publication

On the 2-Adic Complexity and the k-Error 2 -Adic Complexity of Periodic Binary Sequences.

, and . IEEE Trans. Information Theory, 54 (2): 874-883 (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Video Steganalysis Exploiting Motion Vector Reversion-Based Features., , and . IEEE Signal Process. Lett., 19 (1): 35-38 (2012)Cryptanalysis of the end-to-end security for mobile communications with end-user identification/authentication., , and . IEEE Communications Letters, 9 (4): 372-374 (2005)Distributed Oblivious Function Evaluation and Its Applications., , , and . J. Comput. Sci. Technol., 19 (6): 942-947 (2004)Study on Strand Space Model Theory., , , and . J. Comput. Sci. Technol., 18 (5): 553-570 (2003)An Effective Genetic Algorithm for Self-Inverse S-Boxes., and . CIS, page 618-622. IEEE Computer Society, (2007)Incomplete exponential sums over galois rings with applications to some binary sequences derived from Z/sub 2//sup l/., , and . IEEE Trans. Information Theory, 52 (5): 2260-2265 (2006)Composing Administrative Scope of Delegation Policies based on extended XACML., and . EDOC, page 467-470. IEEE Computer Society, (2006)A secure and efficient revocation scheme for fine-grained access control in cloud storage., , , and . CloudCom, page 545-550. IEEE Computer Society, (2012)Bypassing the decomposition attacks on two-round multivariate schemes by a practical cubic round., and . IET Information Security, 4 (3): 167-184 (2010)A New Direct Anonymous Attestation Scheme from Bilinear Maps., and . ICYCS, page 2308-2313. IEEE Computer Society, (2008)