UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 48
1.
  • More Balanced Boolean Funct... More Balanced Boolean Functions With Optimal Algebraic Immunity and Good Nonlinearity and Resistance to Fast Algebraic Attacks
    Xiangyong Zeng; Carlet, Claude; Jinyong Shan ... IEEE transactions on information theory, 09/2011, Letnik: 57, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, three constructions of balanced Boolean functions with optimal algebraic immunity are proposed. It is checked that, at least for small numbers of input variables, these functions have ...
Celotno besedilo

PDF
2.
  • IHVFL: a privacy-enhanced i... IHVFL: a privacy-enhanced intention-hiding vertical federated learning framework for medical data
    Tang, Fei; Liang, Shikai; Ling, Guowei ... Cybersecurity (Singapore), 12/2023, Letnik: 6, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Vertical Federated Learning (VFL) has many applications in the field of smart healthcare with excellent performance. However, current VFL systems usually primarily focus on the privacy protection ...
Celotno besedilo
3.
  • A triple-error-correcting c... A triple-error-correcting cyclic code from the Gold and Kasami–Welch APN power functions
    Zeng, Xiangyong; Shan, Jinyong; Hu, Lei Finite fields and their applications, 2012, 2012-01-00, Letnik: 18, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    Based on a sufficient condition proposed by Hollmann and Xiang for constructing triple-error-correcting codes, the minimum distance of a binary cyclic code C 1 , 3 , 13 with three zeros α, α 3 , and ...
Celotno besedilo

PDF
4.
  • Further results on differen... Further results on differentially 4-uniform permutations over
    Zha, ZhengBang; Hu, Lei; Sun, SiWei ... Science China. Mathematics, 07/2015, Letnik: 58, Številka: 7
    Journal Article
    Recenzirano

    We present several new constructions of differentially 4-uniform permutations over by modifying the values of the inverse function on some subsets of . The resulted differentially 4-uniform ...
Celotno besedilo
5.
Celotno besedilo
6.
  • Solving Small Exponential E... Solving Small Exponential ECDLP in EC-based Additively Homomorphic Encryption and Applications
    Tang, Fei; Ling, Guowei; Cai, Chaochao ... IEEE transactions on information forensics and security, 01/2023, Letnik: 18
    Journal Article
    Recenzirano

    Additively Homomorphic Encryption (AHE) has been widely used in various applications, such as federated learning, blockchain, and online auctions. Elliptic Curve (EC) based AHE has the advantages of ...
Celotno besedilo
7.
  • Manipulating Supply Chain D... Manipulating Supply Chain Demand Forecasting With Targeted Poisoning Attacks
    Chen, Jian; Gao, Yuan; Shan, Jinyong ... IEEE transactions on industrial informatics, 02/2023, Letnik: 19, Številka: 2
    Journal Article

    Demand forecasting (DF) plays an essential role in supply chain management, as it provides an estimate of the goods that customers are expected to purchase in the foreseeable future. While machine ...
Celotno besedilo
8.
  • P²FRPSI: Privacy-Preserving... P²FRPSI: Privacy-Preserving Feature Retrieved Private Set Intersection
    Ling, Guowei; Tang, Fei; Cai, Chaochao ... IEEE transactions on information forensics and security, 2024, Letnik: 19
    Journal Article
    Recenzirano

    Private Set Intersection (PSI) protocols can securely compute the intersection of the private sets on the server and the client without revealing additional data. This work introduces the concept of ...
Celotno besedilo
9.
  • A Construction of 1-Resilie... A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties
    Shan, Jinyong; Hu, Lei; Zeng, Xiangyong ... Journal of systems science and complexity, 08/2018, Letnik: 31, Številka: 4
    Journal Article
    Recenzirano

    This paper proposes a general method to construct 1-resilient Boolean functions by modifying the Tu-Deng and Tang-Carlet-Tang functions. Cryptographic properties such as algebraic degree, ...
Celotno besedilo
10.
  • Two constructions of balanc... Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
    Li, Jiao; Carlet, Claude; Zeng, Xiangyong ... Designs, codes, and cryptography, 08/2015, Letnik: 76, Številka: 2
    Journal Article
    Recenzirano

    In this paper, two constructions of Boolean functions with optimal algebraic immunity are proposed. They generalize previous ones respectively given by Rizomiliotis (IEEE Trans Inf Theory ...
Celotno besedilo
1 2 3 4 5
zadetkov: 48

Nalaganje filtrov