In this paper, we determine the 4-adic complexity of the balanced quater...
It has been a long standing problem to securely outsource computation ta...
In this paper, we present two ways of synchronization coding and enrich ...
Anonymous Identity-Based Encryption can protect privacy of the receiver....
In this paper, we construct two classes of permutation polynomials over
...