Showing 1 - 6 results of 6 for search 'WEN Qiao-yan', query time: 0.01s
Refine Results
-
1
Cross-correlation properties between GMW and WG sequences and that of WG sequences by TONG Xin, WEN Qiao-yan
Published 2007-01-01
Article -
2
Survey of braid-based cryptography by ZHU Ping1, WEN Qiao-yan2
Published 2009-01-01
Article -
3
Verifier-based password-authenticated key exchange protocol for three-party by LI Wen-min, WEN Qiao-yan, ZHANG Hua
Published 2008-01-01
Article -
4
Efficient traceable identity-based signature scheme by DU Hong-zhen1, WEN Qiao-yan2
Published 2009-01-01
Article -
5
Review of algebraic attacks on stream ciphers by ZHANG Long1, WU Wen-ling2, WEN Qiao-yan1
Published 2006-01-01
Article -
6
Further study of the trace representation of Bent sequences families by KE Pin-hui1, ZHANG Jie2, WEN Qiao-yan2
Published 2007-01-01
Article