Author of the publication

A Chosen - Plaintext Differential Power Analysis Attack on HMAC - SM3.

, , , , , , and . CIS, page 350-353. IEEE Computer Society, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Capabilities and Applications of FY-3A/B SEM on Monitoring Space Weather Events., , , , , , , , and . IEEE Trans. Geosci. Remote. Sens., 50 (12): 4975-4985 (2012)Synthesis of scalable micro-droplets with heat-driven effect in flow-focusing device., , , , and . NEMS, page 141-142. IEEE, (2015)Classifying quantum steering, entanglement, and discord for continuous variables in Schwarzschild spacetime., , , , , and . Quantum Inf. Process., 22 (10): 372 (October 2023)The Autonomous Underwater Vehicle Vision Denoising Method of Surfacelet Based on Sample Matrix.. ICIRA (1), volume 5314 of Lecture Notes in Computer Science, page 771-778. Springer, (2008)Synthesis of scalable microdroplets with fluid instability of shearing flow in microfluidics., , , , , , , and . NEMS, page 217-220. IEEE, (2013)Application of Touch Sensing Technique Based on Magneto-Rheological Fluid in Constant Power Control of Coal Mining Machine., , and . ICIRA (2), volume 5315 of Lecture Notes in Computer Science, page 64-72. Springer, (2008)一种基于ST-RFT算法的数字调制信号识别方法 (Digital Modulation Signal Recognition Method Based on ST-RFT Algorithm)., , and . 计算机科学, 45 (5): 64-68 (2018)An Empirical Study of the Relationship Between ITGC, Compliance, and IT-Related Risk in China., , and . J. Inf. Technol. Manag., 29 (2): 1-21 (2018)The Deep Fusion of Topological Structure and Attribute Information for Link Prediction., , , , and . IEEE Access, (2020)Competitive Business Model in Audio-book Industry: A Case of China., , and . J. Softw., 7 (1): 33-40 (2012)