| Publication | Date of Publication | Type |
|---|
LIFTS OF THE TERNARY QUADRATIC RESIDUE CODE OF LENGTH 24 AND THEIR WEIGHT ENUMERATORS Korean Journal of Mathematics | 2023-04-12 | Paper |
Score normalization for a university grades input system using a neural network | 2021-02-18 | Paper |
New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves IEEE Transactions on Information Theory | 2020-09-29 | Paper |
Optimized method for computing odd-degree isogenies on Edwards curves | 2020-05-05 | Paper |
QUADRATIC RESIDUE CODES OVER p-ADIC INTEGERS AND THEIR PROJECTIONS TO INTEGERS MODULO pe Korean Journal of Mathematics | 2020-02-21 | Paper |
Quadratic residue codes over Galois rings Korean Journal of Mathematics | 2020-02-18 | Paper |
Self-dual codes over \({\mathbb Z}_{p^2}\) of small lengths | 2020-01-08 | Paper |
The mass formula of self-orthogonal codes over \(\mathrm{GF}(q) \) | 2020-01-08 | Paper |
The \(q\)-adic liftings of codes over finite fields | 2019-12-04 | Paper |
Cyclic codes over the ring of 4-adic integers of lengths 15, 17 and 19 | 2019-12-04 | Paper |
Characterizations of network structures using eigenmode analysis Symmetry | 2017-09-27 | Paper |
An efficient and secure navigation protocol based on vehicular cloud International Journal of Computer Mathematics | 2016-05-06 | Paper |
Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis Information Sciences | 2015-09-24 | Paper |
The classification of self-dual modular codes Finite Fields and their Applications | 2011-10-12 | Paper |
scientific article; zbMATH DE number 5896977 (Why is no real title available?) | 2011-05-18 | Paper |
Operation-efficient subgroups of finite fields Electronics Letters | 2010-07-10 | Paper |
Weakness in a RSA-based password authenticated key exchange protocol Information Processing Letters | 2010-06-09 | Paper |
Chosen-ciphertext secure certificateless proxy re-encryption Communications and Multimedia Security | 2010-06-01 | Paper |
A Robust Conditional Privacy-Preserving Authentication Protocol in VANET Security and Privacy in Mobile Information and Communication Systems | 2010-04-24 | Paper |
Efficient Linear Array for Multiplication over NIST Recommended Binary Fields Fuzzy Logic and Applications | 2009-07-02 | Paper |
Modular independence and generator matrices for codes over \(\mathbb{Z}_m\) Designs, Codes and Cryptography | 2009-03-31 | Paper |
OPTIMAL LINEAR CODES OVER ℤm Journal of the Korean Mathematical Society | 2008-02-22 | Paper |
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism Selected Areas in Cryptography | 2007-11-15 | Paper |
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves Selected Areas in Cryptography | 2007-11-15 | Paper |
Information Security and Cryptology - ICISC 2005 Lecture Notes in Computer Science | 2007-05-02 | Paper |
On modular cyclic codes Finite Fields and their Applications | 2007-02-14 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Codes over the \(p\)-adic integers Designs, Codes and Cryptography | 2006-05-29 | Paper |
Lifted codes and their weight enumerators Discrete Mathematics | 2006-01-10 | Paper |
IMPLEMENTATION ISSUES FOR ARITHMETIC OVER EXTENSION FIELDS OF CHARACTERISTIC ODD Communications of the Korean Mathematical Society | 2005-12-12 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
A note on the factorization method of Niederreiter Finite Fields and their Applications | 2005-06-01 | Paper |
ON THE LINEAR COMPLEXITY OF SOME GENERALIZED CYCLOTOMIC SEQUENCES International Journal of Algebra and Computation | 2004-11-01 | Paper |
scientific article; zbMATH DE number 2086707 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2085440 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2085439 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2043311 (Why is no real title available?) | 2004-02-16 | Paper |
scientific article; zbMATH DE number 1951623 (Why is no real title available?) | 2003-07-21 | Paper |
The class number one problem for the non-abelian normal CM-fields of degree 24 and~40 Acta Arithmetica | 2002-02-21 | Paper |
scientific article; zbMATH DE number 1558382 (Why is no real title available?) | 2001-08-05 | Paper |
Permutation polynomials and group permutation polynomials Bulletin of the Australian Mathematical Society | 2001-05-16 | Paper |
Construction of the real dihedral number fields of degree 2p. Applications Acta Arithmetica | 1999-09-09 | Paper |
Permutation polynomials with exponents in an arithmetic progression Bulletin of the Australian Mathematical Society | 1999-01-26 | Paper |
scientific article; zbMATH DE number 1159777 (Why is no real title available?) | 1998-09-13 | Paper |
Determination of all non-quadratic imaginary cyclic number fields of 2-power degree with relative class number ≤ 20 Acta Arithmetica | 1998-04-20 | Paper |
Determination of all imaginary abelian sextic number fields with class number ≤ 11 Acta Arithmetica | 1998-01-08 | Paper |
Gauss sums for orthogonal groups over a finite field of characteristic two Acta Arithmetica | 1997-09-13 | Paper |
scientific article; zbMATH DE number 859366 (Why is no real title available?) | 1996-08-13 | Paper |
scientific article; zbMATH DE number 474660 (Why is no real title available?) | 1995-02-13 | Paper |
scientific article; zbMATH DE number 3497766 (Why is no real title available?) | 1975-01-01 | Paper |