Shuqin Fan
According to our database1,
Shuqin Fan
authored at least 33 papers
between 2003 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Another Lattice Attack Against ECDSA with the wNAF to Recover More Bits per Signature.
Proceedings of the Security and Privacy in Communication Networks, 2022
2021
Innovative Supplier Selection from Collaboration Perspective with a Hybrid MCDM Model: A Case Study Based on NEVs Manufacturer.
Symmetry, 2021
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
2020
An Efficient Pairing-Free Certificateless Searchable Public Key Encryption for Cloud-Based IIoT.
Wirel. Commun. Mob. Comput., 2020
Certificateless searchable public key encryption scheme secure against keyword guessing attacks for smart healthcare.
J. Inf. Secur. Appl., 2020
Multi-user certificateless public key encryption with conjunctive keyword search for cloud-based telemedicine.
J. Inf. Secur. Appl., 2020
IACR Cryptol. ePrint Arch., 2020
Self-reciprocal and self-conjugate-reciprocal irreducible factors of <i>x</i><sup><i>n</i></sup> - <i>λ</i> and their applications.
Finite Fields Their Appl., 2020
Self-reciprocal and self-conjugate-reciprocal irreducible factors of $x^n-λ$ and their applications.
CoRR, 2020
Sci. China Inf. Sci., 2020
2019
IACR Cryptol. ePrint Arch., 2019
Tweaking the Asymmetry of Asymmetric-Key Cryptography on Lattices: KEMs and Signatures of Smaller Sizes.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Finite Fields Their Appl., 2018
Sci. China Inf. Sci., 2018
2017
Further results on permutation trinomials over finite fields with even characteristic.
Finite Fields Their Appl., 2017
2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2012
IEEE Trans. Computers, 2012
2011
2010
Concurrent Error Detection Architectures for Field Multiplication Using Gaussian Normal Basis.
Proceedings of the Information Security, 2010
2009
Finite Fields Their Appl., 2009
Finite Fields Their Appl., 2009
Discret. Math., 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
2007
Primitive normal polynomials with the first two coefficients prescribed: A revised p-adic method.
Finite Fields Their Appl., 2007
Primitive normal polynomials with multiple coefficients prescribed: An asymptotic result.
Finite Fields Their Appl., 2007
2004
Finite Fields Their Appl., 2004
Finite Fields Their Appl., 2004
Appl. Algebra Eng. Commun. Comput., 2004
2003
Random properties of the highest level sequences of primitive sequences over Z(2<sup>e</sup>).
IEEE Trans. Inf. Theory, 2003