86 results on '"Feng, Xiutao"'
Search Results
2. Towards a classification of permutation binomials of the form xi+axF2n over xi+axF2n
3. Applications of Quantum Annealing in Cryptography
4. Size optimization of CNOT circuits on NISQ
5. The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited
6. Minimizing Deduction System and its Application
7. Straightforward Guess and Determine Analysis Based on Genetic Algorithm
8. A Recursive Construction of Permutation Polynomials over $\mathbb{F}_{q^2}$ with Odd Characteristic from R\'{e}dei Functions
9. On the Derivative Imbalance and Ambiguity of Functions
10. Further results on complete permutation monomials over finite fields
11. Size optimization of CNOT circuits on NISQ
12. A Framework with Improved Heuristics to Optimize Low-Latency Implementations of Linear Layers
13. Further Results of the Cryptographic Properties on the Butterfly Structures
14. Grain-like structures with minimal and maximal period sequences
15. A recursive construction of permutation polynomials over Fq2 with odd characteristic related to Rédei functions
16. Involutory differentially 4-uniform permutations from known constructions
17. Cryptanalysis on the Authenticated Cipher Sablier
18. A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2
19. The Initialization Stage Analysis of ZUC v1.5
20. Linear Approximations of Addition Modulo 2 n -1
21. Loiss: A Byte-Oriented Stream Cipher
22. A Byte-Based Guess and Determine Attack on SOSEMANUK
23. On algebraic immunity of trace inverse functions on finite fields of characteristic two
24. Multi-continued Fraction Algorithm and Generalized B-M Algorithm over F 2
25. Expected Value of the Linear Complexity of Two-Dimensional Binary Sequences
26. Cryptanalysis on the Authenticated Cipher Sablier
27. Classification and counting on multi-continued fractions and its application to multi-sequences
28. The expectation and variance of the number of solutions of a class of differential system of modular addition
29. A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2
30. The Initialization Stage Analysis of ZUC v1.5
31. Linear Approximations of Addition Modulo 2n-1
32. A Byte-Based Guess and Determine Attack on SOSEMANUK
33. The Adjacency Graphs of a Class of LFSRs and Their Applications*
34. On the Derivative Imbalance and Ambiguity of Functions
35. Expected Value of the Linear Complexity of Two-Dimensional Binary Sequences
36. Multi-continued Fraction Algorithm and Generalized B-M Algorithm over F 2
37. Complete permutation polynomials with the form (xpm−x+δ)s+axpm+bx over Fpn
38. Further results on complete permutation monomials over finite fields
39. A recursive construction of permutation polynomials over $${\mathbb {F}}_{q^2}$$ F q 2 with odd characteristic related to Rédei functions
40. Cryptanalysis of a Chaotic Stream Cipher and Its Improved Scheme
41. Fault Attack on ACORN v3
42. Involutory differentially 4-uniform permutations from known constructions
43. Differentially 4-Uniform Permutations with the Best Known Nonlinearity from Butterflies
44. Fault Attack on the Authenticated Cipher ACORN v2
45. Complete permutation polynomials with the form [formula omitted] over [formula omitted].
46. Improved Differential Fault Attack on the Block Cipher SPECK
47. ON GUESS AND DETERMINE ANALYSIS OF RABBIT
48. A criterion for periodicity of multi-continued fraction expansion of multi-formal Laurent series
49. Multi-sequences with d-perfect property
50. Multi-sequences with <f>d</f>-perfect property
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.