Works matching DE "ALGEBRAIC immunity"
1
- Advances in Mathematics of Communications, 2013, v. 7, n. 2, p. 197, doi. 10.3934/amc.2013.7.197
- CARLET, CLAUDE;
- MERABET, BRAHIM
- Article
2
- Mathematical Notes, 2013, v. 93, n. 5/6, p. 727, doi. 10.1134/S000143461305009X
- Article
3
- International Journal of Advanced Research in Computer Science, 2014, v. 5, n. 7, p. 158
- Chatterjee, Sankhadeep;
- Banerjee, Debarshi
- Article
4
- International Journal of Foundations of Computer Science, 2014, v. 25, n. 6, p. 763, doi. 10.1142/S0129054114500324
- TANG, DENG;
- CARLET, CLAUDE;
- TANG, XIAOHU
- Article
5
- International Journal of Foundations of Computer Science, 2014, v. 25, n. 5, p. 537, doi. 10.1142/S0129054114500208
- ZHENG, JIA;
- WU, BAOFENG;
- CHEN, YUFU;
- LIU, ZHUOJUN
- Article
6
- International Journal of Foundations of Computer Science, 2013, v. 24, n. 3, p. 409, doi. 10.1142/S0129054113500111
- ZIRAN TU;
- YUPENG JIANG;
- XIANGYONG ZENG
- Article
7
- Journal of Electrical & Computer Engineering Innovations (JECEI), 2022, v. 10, n. 1, p. 143, doi. 10.22061/JECEI.2021.7801.436
- Khadem, B.;
- Rajav zade, S.
- Article
8
- Journal of Symbolic Logic, 2016, v. 81, n. 2, p. 711, doi. 10.1017/jsl.2015.63
- Article
9
- Journal of Symbolic Logic, 2013, v. 78, n. 4, p. 1218, doi. 10.2178/jsl.7804120
- BIENVENU, LAURENT;
- DAY, ADAM R.;
- HÖLZL, RUPERT
- Article
10
- Quantum Information Processing, 2018, v. 17, n. 6, p. 1, doi. 10.1007/s11128-018-1885-y
- Xie, Zhengwei;
- Qiu, Daowen;
- Cai, Guangya
- Article
11
- Journal of Difference Equations & Applications, 2017, v. 23, n. 3, p. 633, doi. 10.1080/10236198.2016.1270275
- Yang, Qiqi;
- Li, Haitao;
- Song, Pingping;
- Liu, Yansheng
- Article
12
- Scientific Reports, 2014, p. 1, doi. 10.1038/srep06292
- Jianquan Lu;
- Jie Zhong;
- Yang Tang;
- Tingwen Huang;
- Cao, Jinde;
- Kurths, Jürgen
- Article
13
- International Journal of Computer Mathematics, 2016, v. 93, n. 1, p. 55, doi. 10.1080/00207160.2014.988148
- Wei, Yongzhuang;
- Yin, Wenbin;
- Pasalic, Enes;
- Zhang, Fengrong
- Article
14
- International Journal of Computer Mathematics, 2015, v. 92, n. 11, p. 2219, doi. 10.1080/00207160.2014.975695
- Article
15
- International Journal of Computer Mathematics, 2015, v. 92, n. 3, p. 451, doi. 10.1080/00207160.2014.910304
- Lou, Yu;
- Han, Huiting;
- Tang, Chunming;
- Wu, Zhangqing;
- Xu, Maozhi
- Article
16
- International Journal of Computer Mathematics, 2012, v. 89, n. 16, p. 2165, doi. 10.1080/00207160.2012.712689
- Zhou, Yu;
- Zhang, Wenzheng;
- Zhu, Shixiong;
- Xiao, Guozhen
- Article
17
- PIERS Proceedings, 2014, p. 64
- Hongsik Keum;
- Jungyu Yang;
- Heung-Gyoon Ryu
- Article
18
- Journal of Accounting & Finance (2158-3625), 2014, v. 14, n. 1, p. 23
- Shiller, Ilona;
- Radikoko, Ishmael
- Article
19
- Journal of Mathematical Cryptology, 2016, v. 10, n. 1, p. 1, doi. 10.1515/jmc-2014-0030
- Carlet, Claude;
- Joyner, David;
- Stănică, Pantelimon;
- Deng Tang
- Article
20
- Annals of 'Constantin Brancusi' University of Targu-Jiu. Engineering Series / Analele Universităţii Constantin Brâncuşi din Târgu-Jiu. Seria Inginerie, 2013, n. 3, p. 238
- Olimpia, Pecingina;
- Constantin, Bogdan P.
- Article