Name
Affiliation
Papers
HAIBIN KAN
fudan university
108
Collaborators
Citations 
PageRank 
138
294
44.22
Referers 
Referees 
References 
637
901
747
Search Limit
100901
Title
Citations
PageRank
Year
Constructing New APN Functions Through Relative Trace Functions00.342022
Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences00.342022
A Galois Connection Approach to Wei-Type Duality Theorems00.342022
More classes of permutation quadrinomials from Niho exponents in characteristic two00.342022
Poster: Blockchain-Envisioned Secure Generic Communication Framework using Signcryption00.342022
Fourier-Reflexive Partitions Induced by Poset Metric00.342022
Preprocessing succinct non-interactive arguments for rank-1 constraint satisfiability from holographic proofs00.342022
Binary Locally Repairable Codes With Large Availability and its Application to Private Information Retrieval00.342022
New Color Image Cryptosystem Via Sha-512 And Hybrid Domain20.372021
Further Constructions Of Bent Functions And Their Duals00.342021
Constructing Vectorial Bent Functions Via Second-Order Derivatives00.342021
Fourier-Reflexive Partitions Induced by Poset Metric00.342021
The Explicit Dual of Leander's Monomial Bent Function00.342021
A New 10-Variable Cubic Bent Function Outside the Completed Maiorana-McFarland Class00.342021
Constructions of Locally Repairable Codes With Multiple Recovering Sets via Rational Function Fields10.362020
Several New Infinite Families Of Bent Functions Via Second Order Derivatives10.372020
Reliability-Aware Virtualized Network Function Services Provisioning in Mobile Edge Computing60.402020
Edge Computing to Secure IoT Data Ownership and Trade with the Ethereum Blockchain.00.342020
Permutation polynomials $${x^{{2^{k + 1}} + 3}} + a{x^{{2^k} + 2}} + bx$$x2k+1+3+ax2k+2+bx over $${F_{{2^{2k}}}}$$F22k and their differential uniformity00.342020
Characterizing differential support of vectorial Boolean functions using the Walsh transform00.342020
Locally repairable codes from combinatorial designs.00.342020
Two classes of permutation trinomials with Niho exponents over finite fields with even characteristic00.342020
Power-Law Graphs Have Minimal Scaling of Kemeny Constant for Random Walks00.342020
Minimizing the Longest Charge Delay of Multiple Mobile Chargers for Wireless Rechargeable Sensor Networks by Charging Multiple Sensors Simultaneously00.342019
Constructing vectorial bent functions via second-order derivatives.00.342019
On Constructions And Properties Of (N, M)-Functions With Maximal Number Of Bent Components00.342019
Self-Dual Near MDS Codes from Elliptic Curves30.382019
Locally repairable codes with strict availability from linear functions.00.342018
Color image DNA encryption using NCA map-based CML and one-time keys.80.472018
More New Classes Of Differentially 4-Uniform Permutations With Good Cryptographic Properties00.342018
Non-orthogonal Homothetic Range Partial-Sum Query on Integer Grids - [Extended Abstract].00.342018
A robust and lossless DNA encryption scheme for color images.30.372018
Quantum MDS codes with relatively large minimum distance from Hermitian self-orthogonal codes.100.562017
A Novel Construction of Low-Complexity MDS Codes with Optimal Repair Capability for Distributed Storage Systems.00.342017
A New Construction of Exact-Repair MSR Codes Using Linearly Dependent Vectors.00.342017
On the criteria for designing complex orthogonal space-time block codes.20.452016
A novel lossless color image encryption scheme using 2D DWT and 6D hyperchaotic system.210.952016
An improved secure communication scheme based passive synchronization of hyperchaotic complex nonlinear system70.552015
A refined analysis on the jump number problem of interval orders00.342015
A Blind Dual Color Images Watermarking Method via SVD and DNA Sequences.10.352015
Cache-oblivious wavefront: improving parallelism of recursive dynamic programming algorithms without losing cache-efficiency90.832015
A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps341.182015
Construction of one special minimum storage regenerating code when α=220.402015
Improved Milp Modeling For Automatic Security Evaluation And Application To Fox10.372015
Decoding of Dual-Containing Codes From Hermitian Tower and Applications00.342015
The Degree Of Two Classes Of 3rd Order Correlation Immune Symmetric Boolean Functions00.342014
An Average-Case Efficient Algorithm On Testing The Identity Of Boolean Functions In Trace Representation00.342014
A note on sparse solutions of sparse linear systems.00.342014
Linear Exact-Repair Construction of Hybrid MSR Codes in Distributed Storage Systems10.372014
Capacity factors in a point-to-point network.00.342014
  • 1
  • 2