Institution: | 1. School of Science, Chang''an University, Xi''an 710064, China;2. Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong, China;1. Department of Mathematics, Nanjing University of Aeronautics and Astronautics, Nanjing, 211106, PR China;2. State Key Laboratory of Cryptology, P.O. Box 5159, Beijing, 100878, PR China;3. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, 100093, PR China;1. School of Mathematics, Southwest Jiaotong University, Chengdu, 610031, China;2. Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong;1. Department of Computer Science and Engineering, Hong Kong University of Science and Technology, Clear Water Bay, Kowloon, Hong Kong;2. Department of Electrical Engineering and Computer Science, University of Stavanger, 4036, Stavanger, Norway;3. Department of Informatics, University of Bergen, N-5020 Bergen, Norway;4. School of Mathematics, Southwest Jiaotong University, Chengdu, 610031, China;1. Faculty of Mathematics and Statistics, Hubei Key Laboratory of Applied Mathematics, Hubei University, Wuhan 430062, China;2. Wuhan Maritime Communication Research Institute, Wuhan 430079, China |