I agree that this site is using cookies. You can find further informations
here
.
X
Login
My folder (
0
)
Home
About us
Home About us
Our history
Profile
Press & public relations
Friends
The library in figures
Exhibitions
Projects
Training, internships, careers
Films
Services & Information
Home Services & Information
Lending and interlibrary loans
Returns and renewals
Training and library tours
My Account
Library cards
New to the library?
Download Information
Opening hours
Learning spaces
PC, WLAN, copy, scan and print
Catalogs and collections
Home Catalogs and Collections
Rare books and manuscripts
Digital collections
Subject Areas
Our sites
Home Our sites
Central Library
Law Library (Juridicum)
BB Business and Economics (BB11)
BB Physics and Electrical Engineering
TB Engineering and Social Sciences
TB Economics and Nautical Sciences
TB Music
TB Art & Design
TB Bremerhaven
Contact the library
Home Contact the library
Staff Directory
Open access & publishing
Home Open access & publishing
Reference management: Citavi & RefWorks
Publishing documents
Open Access in Bremen
Show Desktop-Version
Toggle navigation
Jin, Chenhui
577
results:
Search for persons
X
Format
Online (577)
Mediatypes
Articles (Online) (316)
Bookchapter (Online) (17)
OpenAccess-fulltext (244)
Languages
english (442)
Sorted by: Relevance
Sorted by: Year
?
1
Unveiling the Neutral Difference and Its Automated Search:
Lv, Guangqiu
;
Jin, Chenhui
;
Shi, Zhen
..
IET Information Security. 2024 (2024) - p. 1-15 , 2024
Link:
https://doi.org/10.1049/..
?
2
Outcomes and risk factors of transported patients with extr..:
Liu, Lingjuan
;
Hu, Dingji
;
Hao, Tong
...
Journal of Intensive Medicine. , 2024
Link:
https://doi.org/10.1016/..
?
3
Congruent Differential Cluster for Binary SPN Ciphers:
Cui, Ting
;
Mao, Yiming
;
Yang, Yang
...
IEEE Transactions on Information Forensics and Security. 19 (2024) - p. 2385-2397 , 2024
Link:
https://doi.org/10.1109/..
?
4
Correlation Attacks on SNOW-V-Like Stream Ciphers Based on ..:
Ma, Sudong
;
Jin, Chenhui
;
Shi, Zhen
..
IEEE Transactions on Information Theory. 70 (2024) 6 - p. 4478-4491 , 2024
Link:
https://doi.org/10.1109/..
?
5
Impact of Refractive Status on Presbyopia Progression among..:
Qiu, Dongrong
;
Liao, Youfen
;
Wang, Ying
...
Graefe's Archive for Clinical and Experimental Ophthalmology. , 2024
Link:
https://doi.org/10.1007/..
?
6
Differential-Invariant Subspace Cryptanalysis—A Real-Time A..:
Cui, Ting
;
Zhang, Yi
;
Zhang, Jiyan
..
IEEE Internet of Things Journal. 11 (2024) 10 - p. 17642-17650 , 2024
Link:
https://doi.org/10.1109/..
?
7
Improved fast correlation attack using multiple linear appr..:
Ma, Sudong
;
Jin, Chenhui
;
Guan, Jie
..
IEEE Transactions on Information Theory. , 2024
Link:
https://doi.org/10.1109/..
?
8
Pancreatic giant malignancy simulating a gastrointestinal s..:
Liu, Ben-Jie
;
Jin, Chen-Hui
;
Guo, Yan-Lun
...
Hepatobiliary & Pancreatic Diseases International. 23 (2024) 4 - p. 431-433 , 2024
Link:
https://doi.org/10.1016/..
?
9
Remediation of vanadium contaminated soils in a waste smelt..:
Yang, Jie
;
Jin, Chenhui
;
Li, Jian
...
Environmental Technology & Innovation. 32 (2023) - p. 103291 , 2023
Link:
https://doi.org/10.1016/..
?
10
A General Correlation Evaluation Model on LFSR-Based Stream..:
Shi, Zhen
;
Jin, Chenhui
;
Zhang, Jiyan
...
IEEE Transactions on Information Theory. 69 (2023) 10 - p. 6682-6699 , 2023
Link:
https://doi.org/10.1109/..
?
11
Potassium Permanganate and Sodium Silicate Co-modified Bamb..:
Feng, Yaxin
;
Jin, Chenhui
;
Xue, Qiang
...
Water, Air, & Soil Pollution. 234 (2023) 2 - p. , 2023
Link:
https://doi.org/10.1007/..
?
12
Fast Correlation Attacks on K2 Stream Cipher:
Ma, Sudong
;
Jin, Chenhui
;
Guan, Jie
IEEE Transactions on Information Theory. 69 (2023) 8 - p. 5426-5439 , 2023
Link:
https://doi.org/10.1109/..
?
13
Practical distinguishing attack against the IoT‐friendly bl..:
Cui, Ting
;
Zhang, Jiyan
;
Jin, Chenhui
..
Electronics Letters. 58 (2022) 16 - p. 612-613 , 2022
Link:
https://doi.org/10.1049/..
?
14
A Correlation Attack on Full SNOW-V and SNOW-Vi:
, In:
Advances in Cryptology – EUROCRYPT 2022; Lecture Notes in Computer Science
,
Shi, Zhen
;
Jin, Chenhui
;
Zhang, Jiyan
... - p. 34-56 , 2022
Link:
https://doi.org/10.1007/..
?
15
Multiple Impossible Differential Attacks for ForkAES:
Jiang, Zilong
;
Jin, Chenhui
;
Byun, Jin Wook
Security and Communication Networks. 2022 (2022) - p. 1-11 , 2022
Link:
https://doi.org/10.1155/..
1-15