The following pages link to Yu Pu Hu (Q332060):
Displaying 23 items.
- Efficient quantum dialogue using entangled states and entanglement swapping without information leakage (Q332061) (← links)
- A resynchronization attack on stream ciphers filtered by Maiorana-McFarland functions (Q352050) (← links)
- (Q445343) (redirect page) (← links)
- Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups (Q445344) (← links)
- On the value distributions of Walsh spectrums of quadratic plateaued functions (Q456442) (← links)
- New secondary constructions of bent functions (Q503554) (← links)
- Secondary constructions of highly nonlinear Boolean functions and disjoint spectra plateaued functions (Q508599) (← links)
- (Q655094) (redirect page) (← links)
- Identity-based broadcast encryption with shorter transmissions (Q655096) (← links)
- Fault analysis of Trivium (Q664385) (← links)
- Certificateless signcryption scheme in the standard model (Q845333) (← links)
- Key management using certificate-based cryptosystem in ad hoc networks (Q849917) (← links)
- Pseudo-randomness of the fourth class of GSS sequences (Q866073) (← links)
- Stream cipher based on GSS sequences (Q866116) (← links)
- Gaussian sampling of lattices for cryptographic applications (Q893724) (← links)
- Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model (Q893865) (← links)
- Quadratic compact knapsack public-key cryptosystem (Q980333) (← links)
- Lattice-based certificateless encryption scheme (Q1633051) (← links)
- Secondary constructions of bent functions and their enforcement (Q1760065) (← links)
- Sieve method for polynomial linear equivalence (Q1791367) (← links)
- Identity-based blind signature from lattices (Q4641449) (← links)
- Lattice-based linearly homomorphic signature scheme over binary field (Q5018301) (← links)
- (Q5399937) (← links)