| Publication | Date of Publication | Type |
|---|
A quantum-secure partial parallel MAC QPCBC Designs, Codes and Cryptography | 2024-12-11 | Paper |
Utilizing FWT in linear cryptanalysis of block ciphers with various structures Designs, Codes and Cryptography | 2024-11-04 | Paper |
New results on PcN and APcN polynomials over finite fields Finite Fields and their Applications | 2024-09-03 | Paper |
Improved integral cryptanalysis of block ciphers BORON and Khudra | 2024-07-19 | Paper |
Revisiting modular inversion hidden number problem and its applications IEEE Transactions on Information Theory | 2024-07-18 | Paper |
Optimizing rectangle attacks: a unified and generic framework for key recovery Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Improving bounds on elliptic curve hidden number problem for ECDH key exchange Advances in Cryptology – ASIACRYPT 2022 | 2023-08-25 | Paper |
Inferring sequences produced by the quadratic generator Information Security and Cryptology | 2023-08-21 | Paper |
Quantum attacks on PRFs based on public random permutations Lecture Notes in Computer Science | 2023-08-14 | Paper |
Quantum attacks on Lai-Massey structure Post-Quantum Cryptography | 2023-07-07 | Paper |
Speeding up MILP Aided Differential Characteristic Search with Matsui’s Strategy Developments in Language Theory | 2023-06-30 | Paper |
A Systematic Approach and Analysis of Key Mismatch Attacks on Lattice-Based NIST Candidate KEMs Lecture Notes in Computer Science | 2023-05-26 | Paper |
Automatic classical and quantum rebound attacks on AES-like hashing by exploiting related-key differentials Lecture Notes in Computer Science | 2023-05-12 | Paper |
New cryptanalysis of LowMC with algebraic techniques Designs, Codes and Cryptography | 2023-04-28 | Paper |
Binary Darboux transformation, solitons, periodic waves and modulation instability for a nonlocal Lakshmanan-Porsezian-Daniel equation Wave Motion | 2023-02-17 | Paper |
Rotational differential-linear cryptanalysis revisited Journal of Cryptology | 2023-01-05 | Paper |
New Results of Breaking the CLS Scheme from ACM-CCS 2014 | 2022-12-09 | Paper |
Parameter identification for portfolio optimization with a slow stochastic factor Journal of Inverse and Ill-posed Problems | 2022-11-28 | Paper |
Several classes of PcN power functions over finite fields Discrete Applied Mathematics | 2022-10-13 | Paper |
A new method to solve the Hamilton-Jacobi-Bellman equation for a stochastic portfolio optimization model with boundary memory Journal of Industrial and Management Optimization | 2022-09-23 | Paper |
On a vortex filament with the axial velocity Chaos, Solitons and Fractals | 2022-09-02 | Paper |
Hybrid solutions for the (2+1)-dimensional variable-coefficient Caudrey-Dodd-Gibbon-Kotera-Sawada equation in fluid mechanics Chaos, Solitons and Fractals | 2022-08-29 | Paper |
Automatic key recovery of Feistel ciphers: application to SIMON and SIMECK Information Security Practice and Experience | 2022-08-11 | Paper |
Integer LWE with non-subgaussian error and related attacks | 2022-07-13 | Paper |
New results for nonlinear fractional jerk equations with resonant boundary value conditions AIMS Mathematics | 2022-04-27 | Paper |
The existence of solutions and generalized Lyapunov-type inequalities to boundary value problems of differential equations of variable order AIMS Mathematics | 2022-04-25 | Paper |
On definition of solution of initial value problem for fractional differential equation of variable order AIMS Mathematics | 2022-04-25 | Paper |
Meet-in-the-middle attacks revisited: key-recovery, collision, and preimage attacks | 2022-04-22 | Paper |
Vector bright soliton interactions of the two-component AB system in a baroclinic fluid Chaos, Solitons and Fractals | 2022-04-21 | Paper |
Revisiting orthogonal lattice attacks on approximate common divisor problems Theoretical Computer Science | 2022-03-23 | Paper |
Attacks on beyond-birthday-bound MACs in the quantum setting | 2022-03-22 | Paper |
MNN-IK: mixing neural network and numerical IK for human posing SCIENTIA SINICA Mathematica | 2022-03-21 | Paper |
scientific article; zbMATH DE number 7459021 (Why is no real title available?) | 2022-01-18 | Paper |
scientific article; zbMATH DE number 7458940 (Why is no real title available?) | 2022-01-18 | Paper |
Positive solutions of higher order nonlinear fractional differential equations with nonlocal initial conditions at resonance | 2022-01-18 | Paper |
scientific article; zbMATH DE number 7449789 (Why is no real title available?) | 2021-12-20 | Paper |
Existence of positive solutions to a periodic boundary value problems for nonlinear fractional differential equations at resonance | 2021-12-18 | Paper |
Study of construction and empirical of the credit risk contagion models among the Internet financial platforms | 2021-12-17 | Paper |
Further results on optimal ternary cyclic codes Finite Fields and their Applications | 2021-09-03 | Paper |
Security analysis of subterranean 2.0 Designs, Codes and Cryptography | 2021-08-02 | Paper |
Some classes of power functions with low \(c\)-differential uniformity over finite fields Designs, Codes and Cryptography | 2021-06-23 | Paper |
Higher-order hybrid waves for the (2 + 1)-dimensional Boiti-Leon-Manna-Pempinelli equation for an irrotational incompressible fluid via the modified Pfaffian technique ZAMP. Zeitschrift für angewandte Mathematik und Physik | 2021-05-19 | Paper |
Several classes of PcN power functions over finite fields | 2021-04-26 | Paper |
On the quintic time-dependent coefficient derivative nonlinear Schrödinger equation in hydrodynamics or fiber optics Nonlinear Dynamics | 2020-08-04 | Paper |
New results on Modular Inversion Hidden Number problem and inversive congruential generator | 2020-05-20 | Paper |
Revisiting approximate polynomial common divisor problem and noisy multipolynomial reconstruction | 2020-05-12 | Paper |
New classes of optimal ternary cyclic codes with minimum distance four Finite Fields and their Applications | 2020-04-09 | Paper |
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS | 2020-03-09 | Paper |
Quintic time-dependent-coefficient derivative nonlinear Schrödinger equation in hydrodynamics or fiber optics: bilinear forms and dark/anti-dark/gray solitons Nonlinear Dynamics | 2020-02-18 | Paper |
Cryptanalysis of elliptic curve hidden number problem from PKC 2017 Designs, Codes and Cryptography | 2020-01-31 | Paper |
Constructions of Involutions Over Finite Fields IEEE Transactions on Information Theory | 2020-01-28 | Paper |
Stochastic resonance in multi-scale bistable array Physics Letters. A | 2020-01-13 | Paper |
Bilinear forms, modulational instability and dark solitons for a fifth-order variable-coefficient nonlinear Schrödinger equation in an inhomogeneous optical fiber Applied Mathematics and Computation | 2019-11-27 | Paper |
Permutation polynomials of the form \(x + \gamma \mathrm{Tr}_q^{q^n}(h(x))\) Finite Fields and their Applications | 2019-11-22 | Paper |
The existeness and uniqueness result of solutions to initial value problems of nonlinear diffusion equations involving with the conformable variable derivative Revista de la Real Academia de Ciencias Exactas, Físicas y Naturales. Serie A: Matemáticas. RACSAM | 2019-07-29 | Paper |
The uniqueness of solution for initial value problems for fractional differential equation involving the Caputo-Fabrizio derivative The Journal of Nonlinear Sciences and Applications | 2019-07-22 | Paper |
The existence of solutions to boundary value problems for differential equations of variable order | 2019-04-23 | Paper |
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints | 2019-01-23 | Paper |
Partial prime factor exposure attacks on RSA and its Takagi's variant | 2018-12-07 | Paper |
Improved differential analysis of block cipher PRIDE | 2018-12-07 | Paper |
Existence of solutions to a coupled system of fractional differential equations with infinite-point boundary value conditions at resonance Advances in Difference Equations | 2018-12-03 | Paper |
Existence and uniqueness of solutions for a higher-order coupled fractional differential equations at resonance Advances in Difference Equations | 2018-11-13 | Paper |
A construction of 1-resilient Boolean functions with good cryptographic properties Journal of Systems Science and Complexity | 2018-11-08 | Paper |
Implicit factorization of RSA moduli revisited (short paper) | 2018-10-24 | Paper |
Improvement on the method for automatic differential analysis and its application to two lightweight block ciphers DESL and LBlock-s | 2018-10-24 | Paper |
Related-key impossible differential analysis of full Khudra | 2018-10-24 | Paper |
Initial value problem for nonlinear fractional differential equations with variable-order derivative and a parameter | 2018-10-22 | Paper |
Cryptanalysis and improved construction of a group key agreement for secure group communication | 2018-10-18 | Paper |
Cryptanalysis of multi-prime \(\varPhi \)-hiding assumption | 2018-10-18 | Paper |
Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis | 2018-10-18 | Paper |
A deterministic algorithm for computing divisors in an interval Information Security and Privacy | 2018-09-26 | Paper |
Positive solutions to periodic boundary value problems of nonlinear fractional differential equations at resonance International Journal of Differential Equations | 2018-08-10 | Paper |
Three new classes of generalized almost perfect nonlinear power functions Finite Fields and their Applications | 2018-08-08 | Paper |
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator Designs, Codes and Cryptography | 2018-07-13 | Paper |
MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck Fast Software Encryption | 2018-05-09 | Paper |
Existence results for \((n-1,1)\)-type nonlocal integral boundary value problems for coupled systems of fractional differential equations at resonance Journal of Applied Mathematics and Computing | 2018-04-13 | Paper |
New results on permutation polynomials of the form \((x^{{p}^{m}} - x + \delta)^s + x^{p^m} + x\) over \(\mathbb F_{p^{2m}}\) Cryptography and Communications | 2018-02-19 | Paper |
Breather-to-soliton transition for a sixth-order nonlinear Schrödinger equation in an optical fiber Applied Mathematics Letters | 2017-11-16 | Paper |
Several Classes of Boolean Functions with Four-Valued Walsh Spectra International Journal of Foundations of Computer Science | 2017-09-08 | Paper |
Period-Different $m$-Sequences With at Most Four-Valued Cross Correlation IEEE Transactions on Information Theory | 2017-08-08 | Paper |
New Optimal Quadriphase Sequences With Larger Linear Span IEEE Transactions on Information Theory | 2017-08-08 | Paper |
Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences IEEE Transactions on Information Theory | 2017-08-08 | Paper |
More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks IEEE Transactions on Information Theory | 2017-07-12 | Paper |
On the Correlation Distributions of the Optimal Quaternary Sequence Family ${\cal U}$ and the Optimal Binary Sequence Family ${\cal V}$ IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Existence results for a coupled system of fractional differential equations with \(p\)-Laplacian operator and infinite-point boundary conditions Boundary Value Problems | 2017-07-10 | Paper |
Further results on permutation trinomials over finite fields with even characteristic Finite Fields and their Applications | 2017-05-24 | Paper |
Improved results on cryptanalysis of prime power RSA Information Security and Cryptology – ICISC 2016 | 2017-05-19 | Paper |
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs IEEE Transactions on Information Theory | 2017-05-16 | Paper |
An improved analysis on three variants of the RSA cryptosystem Information Security and Cryptology | 2017-05-05 | Paper |
Cyclotomic Constructions of Zero-Difference Balanced Functions With Applications IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Cryptanalysis of Dual RSA Designs, Codes and Cryptography | 2017-03-23 | Paper |
Recovering a sum of two squares decomposition revisited Information Security and Cryptology | 2016-07-25 | Paper |
Some classes of permutation polynomials of the form \((x^{p^m}-x+\delta)^s+x\) over \(\mathbb{F}_{p^{2m}}\) Finite Fields and their Applications | 2016-05-19 | Paper |
Towards optimal bounds for implicit factorization problem Lecture Notes in Computer Science | 2016-05-19 | Paper |
Boolean functions with four-valued Walsh spectra Journal of Systems Science and Complexity | 2016-01-14 | Paper |
Cryptanalysis of variants of RSA with multiple small secret exponents Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks Information Security and Cryptology | 2015-12-02 | Paper |
Attacking RSA with a composed decryption exponent using unravelled linearization Information Security and Cryptology | 2015-11-25 | Paper |
The weight distributions of a class of non-primitive cyclic codes with two nonzeros Science China. Mathematics | 2015-11-09 | Paper |
Further results on differentially 4-uniform permutations over \(\mathbb{F}_{2^{2m}}\) Science China. Mathematics | 2015-10-27 | Paper |
Two Boolean functions with five-valued Walsh spectra and high nonlinearity International Journal of Foundations of Computer Science | 2015-10-02 | Paper |
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks Designs, Codes and Cryptography | 2015-09-29 | Paper |
Match Box Meet-in-the-Middle Attacks on the SIMON Family of Block Ciphers Lecture Notes in Computer Science | 2015-09-18 | Paper |
scientific article; zbMATH DE number 6453086 (Why is no real title available?) | 2015-06-29 | Paper |
The weight distributions of two classes of binary cyclic codes Finite Fields and their Applications | 2015-06-10 | Paper |
Existence result for nonlinear fractional differential equation with \(p\)-Laplacian operator at resonance Journal of Applied Mathematics and Computing | 2015-06-02 | Paper |
Families of \(p\)-ary sequences with low correlation and large linear complexity Journal of Systems Science and Complexity | 2015-04-27 | Paper |
The weight distribution of a family of \(p\)-ary cyclic codes Designs, Codes and Cryptography | 2015-04-16 | Paper |
Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers Lecture Notes in Computer Science | 2015-01-16 | Paper |
Constructing permutations and complete permutations over finite fields via subfield-valued polynomials Finite Fields and their Applications | 2014-11-21 | Paper |
Existence of solutions for two-point boundary value problem of fractional differential equations at resonance International Journal of Differential Equations | 2014-11-17 | Paper |
New constructions of APN polynomial functions in odd characteristic Applicable Algebra in Engineering, Communication and Computing | 2014-10-02 | Paper |
Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH Designs, Codes and Cryptography | 2014-09-04 | Paper |
The weight distributions of two classes of \(p\)-ary cyclic codes Finite Fields and their Applications | 2014-09-02 | Paper |
Partial key exposure attacks on Takagi's variant of RSA Applied Cryptography and Network Security | 2014-07-07 | Paper |
Constructing new APN functions from known PN functions International Journal of Foundations of Computer Science | 2014-07-04 | Paper |
Further improvement of factoring RSA moduli with implicit hint Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher Cryptography and Communications | 2014-06-20 | Paper |
On a class of binomial bent functions over the finite fields of odd characteristic Applicable Algebra in Engineering, Communication and Computing | 2014-03-24 | Paper |
A matrix construction of Boolean functions with maximum algebraic immunity Journal of Systems Science and Complexity | 2014-03-18 | Paper |
Permutation polynomials with low differential uniformity over finite fields of odd characteristic Science China. Mathematics | 2014-03-05 | Paper |
The shift equivalence of maximal period sequences over a Galois ring | 2014-02-28 | Paper |
Constructing permutation polynomials from piecewise permutations Finite Fields and their Applications | 2014-02-11 | Paper |
Constructing new differentially 4-uniform permutations from the inverse function Finite Fields and their Applications | 2014-02-05 | Paper |
Several classes of complete permutation polynomials Finite Fields and their Applications | 2014-02-05 | Paper |
Periods of polynomials over a Galois ring Science China. Mathematics | 2013-11-22 | Paper |
New optimal frequency hopping sequence sets from balanced nested difference packings of partition-type International Journal of Foundations of Computer Science | 2013-10-23 | Paper |
A Class of Binomial Permutation Polynomials | 2013-09-28 | Paper |
Implicit Polynomial Recovery and Cryptanalysis of a Combinatorial Key Cryptosystem Information and Communications Security | 2013-04-08 | Paper |
Concurrent Non-Malleable Witness Indistinguishable Argument from Any One-Way Function Information Security and Cryptology | 2013-01-07 | Paper |
Two classes of permutation polynomials over finite fields Finite Fields and their Applications | 2012-08-01 | Paper |
On the reducibility of some composite polynomials over finite fields Designs, Codes and Cryptography | 2012-07-31 | Paper |
Linear complexity of binary sequences derived from Euler quotients with prime-power modulus Information Processing Letters | 2012-07-25 | Paper |
Cube cryptanalysis of Hitag2 stream cipher Cryptology and Network Security | 2012-07-20 | Paper |
Aperiodic correlation of Kasami sequences in the small set Applicable Algebra in Engineering, Communication and Computing | 2012-06-20 | Paper |
Boolean functions with two distinct Walsh coefficients Applicable Algebra in Engineering, Communication and Computing | 2012-06-20 | Paper |
Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security Computers & Mathematics with Applications | 2012-05-28 | Paper |
A triple-error-correcting cyclic code from the Gold and Kasami-Welch APN power functions Finite Fields and their Applications | 2012-02-11 | Paper |
A construction of hyperbent functions with polynomial trace form Science China. Mathematics | 2012-01-24 | Paper |
New methods for generating permutation polynomials over finite fields Finite Fields and their Applications | 2011-12-07 | Paper |
How to Construct Secure and Efficient Three-Party Password-Based Authenticated Key Exchange Protocols Information Security and Cryptology | 2011-07-29 | Paper |
scientific article; zbMATH DE number 5927451 (Why is no real title available?) | 2011-07-19 | Paper |
A new family of quadriphase sequences with low correlation Lecture Notes in Computer Science | 2011-06-08 | Paper |
Kipnis-Shamir attack on unbalanced oil-vinegar scheme Information Security Practice and Experience | 2011-05-19 | Paper |
Construction of 1-resilient Boolean functions with optimum algebraic immunity International Journal of Computer Mathematics | 2011-04-06 | Paper |
A class of binary cyclic codes with five weights Science China. Mathematics | 2011-02-25 | Paper |
The weight distribution of a class of \(p\)-ary cyclic codes Finite Fields and their Applications | 2011-02-14 | Paper |
On the generalized large set of Kasami sequences Applicable Algebra in Engineering, Communication and Computing | 2010-12-21 | Paper |
Further crosscorrelation properties of sequences with the decimation factor \({d=\frac{p^n+1}{p+1}-\frac{p^n-1}{2}}\) Applicable Algebra in Engineering, Communication and Computing | 2010-11-22 | Paper |
The large set of \(p\)-ary Kasami sequences International Journal of Computer Mathematics | 2010-09-14 | Paper |
New family of binary sequences of period \(4(2^n - 1\)) with low correlation Applicable Algebra in Engineering, Communication and Computing | 2010-08-05 | Paper |
Cryptanalysis of two quartic encryption schemes and one improved MFE scheme Post-Quantum Cryptography | 2010-06-17 | Paper |
Two new permutation polynomials with the form \({\left(x^{2^k}+x+\delta\right)^{s}+x}\) over \({\mathbb{F}_{2^n}}\) Applicable Algebra in Engineering, Communication and Computing | 2010-04-20 | Paper |
A class of rotation symmetric Boolean functions with optimum algebraic immunity Wuhan University Journal of Natural Sciences | 2010-02-12 | Paper |
Multi-recipient public key encryption scheme based on Weil pairing Journal of Software | 2010-02-12 | Paper |
Further properties of several classes of Boolean functions with optimum algebraic immunity Designs, Codes and Cryptography | 2009-10-14 | Paper |
A new family of quadriphase sequences with optimal correlation properties | 2009-07-22 | Paper |
Some results on skew Hadamard difference sets Designs, Codes and Cryptography | 2009-03-31 | Paper |
Analysis of the SMS4 Block Cipher Information Security and Privacy | 2009-03-06 | Paper |
Compression of Tate pairings on elliptic curves | 2009-03-06 | Paper |
Kipnis-Shamir Attack on HFE Revisited Information Security and Cryptology | 2009-02-10 | Paper |
A Class of Nonbinary Codes and Sequence Families Sequences and Their Applications - SETA 2008 | 2009-02-10 | Paper |
Provably Secure N-Party Authenticated Key Exchange in the Multicast DPWA Setting Information Security and Cryptology | 2009-02-10 | Paper |
On a Class of Pseudorandom Sequences From Elliptic Curves Over Finite Fields IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Generalized Kasami Sequences: The Large Set IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On the Expected Value of the Joint 2-Adic Complexity of Periodic Binary Multisequences Sequences and Their Applications – SETA 2006 | 2008-11-27 | Paper |
Partially Perfect Nonlinear Functions and a Construction of Cryptographic Boolean Functions Sequences and Their Applications – SETA 2006 | 2008-11-27 | Paper |
Authentication codes and bipartite graphs European Journal of Combinatorics | 2008-07-11 | Paper |
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
New Description of SMS4 by an Embedding overGF(28) Lecture Notes in Computer Science | 2008-04-11 | Paper |
A formula on linear complexity of highest coordinate sequences from maximal periodic sequences over Galois rings Progress in Natural Science | 2008-03-18 | Paper |
A New Family of Gold-Like Sequences Lecture Notes in Computer Science | 2008-03-07 | Paper |
Constructions of \(p\)-ary quadratic bent functions Acta Applicandae Mathematicae | 2008-02-27 | Paper |
Using an efficient hash chain and delaying function to improve an e-lottery scheme International Journal of Computer Mathematics | 2007-09-03 | Paper |
Coding and Cryptography Lecture Notes in Computer Science | 2007-05-02 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2007-05-02 | Paper |
Kronecker product of two-dimensional arrays Acta Mathematicae Applicatae Sinica. English Series | 2006-10-24 | Paper |
Expansion and linear complexity of the coordinate sequences over Galois rings Journal of Complexity | 2006-07-12 | Paper |
Cryptanalysis of a new signal security system for multimedia data transmission EURASIP Journal on Applied Signal Processing | 2005-10-28 | Paper |
Maximal Periodic Two-Dimensional Arrays Over Galois Rings Communications in Algebra | 2005-08-25 | Paper |
scientific article; zbMATH DE number 2112354 (Why is no real title available?) | 2004-10-28 | Paper |
Generator polynomials of characteristic ideal of maximal periodic arrays over Galois rings. Discrete Mathematics | 2004-03-14 | Paper |
scientific article; zbMATH DE number 1921344 (Why is no real title available?) | 2003-10-09 | Paper |
scientific article; zbMATH DE number 1810257 (Why is no real title available?) | 2002-12-09 | Paper |
scientific article; zbMATH DE number 1340845 (Why is no real title available?) | 2002-09-05 | Paper |
scientific article; zbMATH DE number 1789834 (Why is no real title available?) | 2002-08-27 | Paper |
Constructing optimal arbitration-authentication codes of arbitrary order Journal of Systems Science and Mathematical Sciences | 2002-03-13 | Paper |
Chrestenson spectral characterization of correlation-immunity of multiple-valued logic functions over \(Z/(m)\) Chinese Science Bulletin | 2002-02-18 | Paper |
The degeneracy problem of two-dimensional linear recurring arrays Systems Science and Mathematical Sciences | 2001-07-11 | Paper |
scientific article; zbMATH DE number 1517064 (Why is no real title available?) | 2001-01-14 | Paper |
Module structure of doubly periodic arrays over finite fields Science in China. Series A | 2000-12-06 | Paper |
The finite groups of order \(p^2q\) with \(p\)-blocks of defect \(0\) Journal of Algebra | 1999-09-08 | Paper |
scientific article; zbMATH DE number 1187248 (Why is no real title available?) | 1998-11-01 | Paper |
Properties of Gröbner bases and applications to doubly periodic arrays Journal of Symbolic Computation | 1998-10-06 | Paper |
Product of spaces of doubly periodic arrays Science in China. Series E | 1998-01-07 | Paper |