Constructing New APN Functions Through Relative Trace Functions | 0 | 0.34 | 2022 |
Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences | 0 | 0.34 | 2022 |
A Galois Connection Approach to Wei-Type Duality Theorems | 0 | 0.34 | 2022 |
More classes of permutation quadrinomials from Niho exponents in characteristic two | 0 | 0.34 | 2022 |
Poster: Blockchain-Envisioned Secure Generic Communication Framework using Signcryption | 0 | 0.34 | 2022 |
Fourier-Reflexive Partitions Induced by Poset Metric | 0 | 0.34 | 2022 |
Preprocessing succinct non-interactive arguments for rank-1 constraint satisfiability from holographic proofs | 0 | 0.34 | 2022 |
Binary Locally Repairable Codes With Large Availability and its Application to Private Information Retrieval | 0 | 0.34 | 2022 |
New Color Image Cryptosystem Via Sha-512 And Hybrid Domain | 2 | 0.37 | 2021 |
Further Constructions Of Bent Functions And Their Duals | 0 | 0.34 | 2021 |
Constructing Vectorial Bent Functions Via Second-Order Derivatives | 0 | 0.34 | 2021 |
Fourier-Reflexive Partitions Induced by Poset Metric | 0 | 0.34 | 2021 |
The Explicit Dual of Leander's Monomial Bent Function | 0 | 0.34 | 2021 |
A New 10-Variable Cubic Bent Function Outside the Completed Maiorana-McFarland Class | 0 | 0.34 | 2021 |
Constructions of Locally Repairable Codes With Multiple Recovering Sets via Rational Function Fields | 1 | 0.36 | 2020 |
Several New Infinite Families Of Bent Functions Via Second Order Derivatives | 1 | 0.37 | 2020 |
Reliability-Aware Virtualized Network Function Services Provisioning in Mobile Edge Computing | 6 | 0.40 | 2020 |
Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain. | 0 | 0.34 | 2020 |
Permutation polynomials $${x^{{2^{k + 1}} + 3}} + a{x^{{2^k} + 2}} + bx$$x2k+1+3+ax2k+2+bx over $${F_{{2^{2k}}}}$$F22k and their differential uniformity | 0 | 0.34 | 2020 |
Characterizing differential support of vectorial Boolean functions using the Walsh transform | 0 | 0.34 | 2020 |
Locally repairable codes from combinatorial designs. | 0 | 0.34 | 2020 |
Two classes of permutation trinomials with Niho exponents over finite fields with even characteristic | 0 | 0.34 | 2020 |
Power-Law Graphs Have Minimal Scaling of Kemeny Constant for Random Walks | 0 | 0.34 | 2020 |
Minimizing the Longest Charge Delay of Multiple Mobile Chargers for Wireless Rechargeable Sensor Networks by Charging Multiple Sensors Simultaneously | 0 | 0.34 | 2019 |
Constructing vectorial bent functions via second-order derivatives. | 0 | 0.34 | 2019 |
On Constructions And Properties Of (N, M)-Functions With Maximal Number Of Bent Components | 0 | 0.34 | 2019 |
Self-Dual Near MDS Codes from Elliptic Curves | 3 | 0.38 | 2019 |
Locally repairable codes with strict availability from linear functions. | 0 | 0.34 | 2018 |
Color image DNA encryption using NCA map-based CML and one-time keys. | 8 | 0.47 | 2018 |
More New Classes Of Differentially 4-Uniform Permutations With Good Cryptographic Properties | 0 | 0.34 | 2018 |
Non-orthogonal Homothetic Range Partial-Sum Query on Integer Grids - [Extended Abstract]. | 0 | 0.34 | 2018 |
A robust and lossless DNA encryption scheme for color images. | 3 | 0.37 | 2018 |
Quantum MDS codes with relatively large minimum distance from Hermitian self-orthogonal codes. | 10 | 0.56 | 2017 |
A Novel Construction of Low-Complexity MDS Codes with Optimal Repair Capability for Distributed Storage Systems. | 0 | 0.34 | 2017 |
A New Construction of Exact-Repair MSR Codes Using Linearly Dependent Vectors. | 0 | 0.34 | 2017 |
On the criteria for designing complex orthogonal space-time block codes. | 2 | 0.45 | 2016 |
A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system. | 21 | 0.95 | 2016 |
An improved secure communication scheme based passive synchronization of hyperchaotic complex nonlinear system | 7 | 0.55 | 2015 |
A refined analysis on the jump number problem of interval orders | 0 | 0.34 | 2015 |
A Blind Dual Color Images Watermarking Method via SVD and DNA Sequences. | 1 | 0.35 | 2015 |
Cache-oblivious wavefront: improving parallelism of recursive dynamic programming algorithms without losing cache-efficiency | 9 | 0.83 | 2015 |
A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps | 34 | 1.18 | 2015 |
Construction of one special minimum storage regenerating code when α=2 | 2 | 0.40 | 2015 |
Improved Milp Modeling For Automatic Security Evaluation And Application To Fox | 1 | 0.37 | 2015 |
Decoding of Dual-Containing Codes From Hermitian Tower and Applications | 0 | 0.34 | 2015 |
The Degree Of Two Classes Of 3rd Order Correlation Immune Symmetric Boolean Functions | 0 | 0.34 | 2014 |
An Average-Case Efficient Algorithm On Testing The Identity Of Boolean Functions In Trace Representation | 0 | 0.34 | 2014 |
A note on sparse solutions of sparse linear systems. | 0 | 0.34 | 2014 |
Linear Exact-Repair Construction of Hybrid MSR Codes in Distributed Storage Systems | 1 | 0.37 | 2014 |
Capacity factors in a point-to-point network. | 0 | 0.34 | 2014 |