The following pages link to Mao-Zhi Xu (Q846330):
Displaying 40 items.
- (Q344779) (redirect page) (← links)
- A semantically secure public key cryptoscheme using bit-pair shadows (Q344780) (← links)
- Implementing the 4-dimensional GLV method on GLS elliptic curves with \(j\)-invariant 0 (Q411481) (← links)
- Hierarchical management scheme by local fields (Q546281) (← links)
- A note on cyclic codes from APN functions (Q744011) (← links)
- Some lower bounds for the spectral radius of matrices using traces (Q846331) (← links)
- Some techniques for faster scalar multiplication on GLS curves (Q888957) (← links)
- Implementing optimized pairings with elliptic nets (Q893619) (← links)
- A break of public key cryptosystem PKCY (Q1373853) (← links)
- Efficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curves (Q1675781) (← links)
- Faster pairing computation on genus \(2\) hyperelliptic curves (Q1944931) (← links)
- A new class of \(p\)-ary regular bent functions (Q2025347) (← links)
- On the linear complexity of feedforward clock-controlled sequence (Q2151314) (← links)
- New quadratic bent functions in polynomial forms with coefficients in extension fields (Q2321948) (← links)
- Cryptography on elliptic curves over \(p\) -adic number fields (Q2425853) (← links)
- Cryptography on twisted Edwards curves over local fields (Q2515455) (← links)
- On algorithmic aspects of the<i>l</i>-torsion of Brauer groups (Q2862805) (← links)
- Generation and Tate Pairing Computation of Ordinary Elliptic Curves with Embedding Degree One (Q2920982) (← links)
- Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model (Q2988350) (← links)
- The Weight Distributions of Cyclic Codes and Elliptic Curves (Q2989682) (← links)
- A Generalization of Verheul’s Theorem for Some Ordinary Curves (Q3019919) (← links)
- (Q3170749) (← links)
- (Q3170750) (← links)
- (Q3170752) (← links)
- A Public Key Cryptoscheme Using Bit-Pairs with Provable Semantical Security (Q3196425) (← links)
- (Q3403244) (← links)
- A model of hierarchical key assignment scheme (Q3443233) (← links)
- A Note on Semi-bent and Hyper-bent Boolean Functions (Q3454139) (← links)
- The Gallant-Lambert-Vanstone Decomposition Revisited (Q3454154) (← links)
- On properties of the Mullineux map with an application to Schur modules (Q4262306) (← links)
- (Q4320276) (← links)
- On mullineux' conjecture in the representation theory of symmetric groups (Q4344680) (← links)
- (Q4527229) (← links)
- Applied Cryptography and Network Security (Q4680961) (← links)
- On<sub>p</sub>-series and the mullineux conjecture (Q4700470) (← links)
- Pseudorandom Generators Based on Subcovers for Finite Groups (Q4899220) (← links)
- Construction of Efficient MDS Matrices Based on Block Circulant Matrices for Lightweight Application (Q4976407) (← links)
- The KDM-CCA Security of REACT (Q5056009) (← links)
- The ECCA Security of Hybrid Encryptions (Q5056044) (← links)
- Constructing vectorial Boolean functions with high algebraic immunity based on group decomposition (Q5259050) (← links)