| Publication | Date of Publication | Type |
|---|
Several classes of permutation pentanomials with the form \(x^r h(x^{p^m -1})\) over \(\mathbb{F}_{p^{2m}}\) Finite Fields and their Applications | 2023-11-07 | Paper |
Generation matrix: an embeddable matrix representation for hierarchical trees Theoretical Computer Science | 2023-10-26 | Paper |
The Component Diagnosability of General Networks International Journal of Foundations of Computer Science | 2023-08-15 | Paper |
Simplified server-aided revocable identity-based encryption from lattices Provable and Practical Security | 2023-07-21 | Paper |
The \(c\)-differential uniformity and boomerang uniformity of three classes of permutation polynomials over \(\mathbb{F}_{2^n}\) Finite Fields and their Applications | 2023-06-19 | Paper |
Uniform attractors for nonclassical diffusion equations with perturbed parameter and memory Journal of Mathematical Physics | 2023-04-11 | Paper |
| Quantum circuit implementations of AES with fewer qubits | 2023-03-21 | Paper |
On some conjectures about optimal ternary cyclic codes Applicable Algebra in Engineering, Communication and Computing | 2022-07-19 | Paper |
Reliability evaluation of generalized exchanged hypercubes based on imprecise diagnosis strategies Parallel Processing Letters | 2022-07-08 | Paper |
Further results on permutation polynomials and complete permutation polynomials over finite fields AIMS Mathematics | 2022-05-30 | Paper |
| scientific article; zbMATH DE number 7478039 (Why is no real title available?) | 2022-02-22 | Paper |
Efficient ciphertext-policy attribute-based encryption with blackbox traceability Information Sciences | 2021-11-23 | Paper |
Privacy-preserving Krawtchouk moment feature extraction over encrypted image data Information Sciences | 2021-11-23 | Paper |
The component connectivity, component diagnosability, and \(t/k\)-diagnosability of bicube networks Theoretical Computer Science | 2021-11-18 | Paper |
Public-key authenticated encryption with keyword search revisited: security model and constructions Information Sciences | 2021-03-31 | Paper |
Expressive query over outsourced encrypted data Information Sciences | 2020-09-08 | Paper |
Lattice-based group signatures with verifier-local revocation: achieving shorter key-sizes and explicit traceability with ease Cryptology and Network Security | 2020-07-20 | Paper |
FABSS: Attribute-Based Sanitizable Signature for Flexible Access Structure Information and Communications Security | 2020-07-20 | Paper |
Efficient inner product encryption with simulation-based security Information and Communications Security | 2020-07-20 | Paper |
| Efficient attribute-based encryption with blackbox traceability | 2018-11-07 | Paper |
| Privacy-preserving mining of association rule on outsourced cloud data from multiple parties | 2018-09-26 | Paper |
A Privacy-Preserving Outsourced Functional Computation Framework Across Large-Scale Multiple Encrypted Domains IEEE Transactions on Computers | 2017-05-16 | Paper |
| An identity traceable attribute-based multi-signature scheme | 2016-01-15 | Paper |
| A ciphertext-policy weighted attribute based encryption scheme | 2014-02-28 | Paper |
| scientific article; zbMATH DE number 6263174 (Why is no real title available?) | 2014-02-28 | Paper |