default search action
Cryptography and Communications, Volume 8
Volume 8, Number 1, January 2016
- Mingxing Wang, Yupeng Jiang, Dongdai Lin:
Further results on the nonlinearity of maximum-length NFSR feedbacks. 1-6 - Adel Alahmadi, Hussain Alhazmi, Tor Helleseth, Rola Hijazi, Najat M. Muthana, Patrick Solé:
On the lifted Melas code. 7-18 - Maura B. Paterson, Douglas R. Stinson, Yongge Wang:
On encoding symbol degrees of array BP-XOR codes. 19-32 - Qiuyan Wang, Yupeng Jiang, Dongdai Lin:
Linear complexity of Ding-Helleseth sequences of order 2 over GF(l). 33-49 - Jian Gao, Linzhi Shen, Fang-Wei Fu:
A Chinese remainder theorem approach to skew generalized quasi-cyclic codes over finite fields. 51-66 - Thomas W. Cusick, Pantelimon Stanica:
Counting equivalence classes for monomial rotation symmetric Boolean functions with prime dimension. 67-81 - Anuradha Sharma, Amit K. Sharma:
Construction of self-dual codes over ℤ2m. 83-101 - Chuan Lv, Tongjiang Yan, Guozhen Xiao:
New developments in q-polynomial codes. 103-112 - Subhadeep Banik:
Conditional differential cryptanalysis of 105 round Grain v1. 113-137 - Iiro S. Honkala, Olivier Hudry, Antoine Lobstein:
On the ensemble of optimal identifying codes in a twin-free graph. 139-153 - Guangkui Xu, Xiwang Cao, Shanding Xu:
Constructing new APN functions and bent functions over finite fields of odd characteristic via the switching method. 155-171
Volume 8, Number 2, April 2016
- Lilya Budaghyan, Tor Helleseth, Alexander Kholosha:
Editorial: Special issue on Boolean functions and their applications. 173-174 - Daniel J. Katz, Philippe Langevin:
New open problems related to old conjectures by Helleseth. 175-189 - Canan Kasikci, Wilfried Meidl, Alev Topuzoglu:
Spectra of a class of quadratic functions: Average behaviour and counting functions. 191-214 - Chunlei Li, Tor Helleseth:
Quasi-perfect linear codes from planar and APN functions. 215-227 - Sihem Mesnager:
Further constructions of infinite families of bent functions from new permutations and their duals. 229-246 - Georgi Ivanov, Nikolay Nikolov, Svetla Nikova:
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties. 247-276 - Oleksandr Kazymyrov, Roman Oliynykov, Håvard Raddum:
Influence of addition modulo 2 n on algebraic attacks. 277-289 - Yin Tan, Guang Gong, Bo Zhu:
Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions. 291-311
Volume 8, Number 3, July 2016
- Joan Boyar, Magnus Gausdal Find, René Peralta:
On various nonlinearity measures for boolean functions. 313-330 - Sonia Bogos, Florian Tramèr, Serge Vaudenay:
On solving L P N using B K W and variants - Implementation and analysis. 331-369 - Yuan Cheng, Wen-Feng Qi, Qun-Xiong Zheng, Dong Yang:
On the distinctness of primitive sequences over Z/(p e q) modulo 2. 371-381 - Ting Gu, Andrew Klapper:
Statistical properties of half-ℓ-sequences. 383-400 - Kaushik Chakraborty, Subhamoy Maitra:
Application of Grover's algorithm to check non-resiliency of a Boolean function. 401-413 - Torleiv Kløve:
On covering sets for limited-magnitude errors. 415-433 - Yi Lu, Yvo Desmedt:
Walsh transforms and cryptographic applications in bias computing. 435-453
Volume 8, Number 4, October 2016
- Debrup Chakraborty, Palash Sarkar:
On modes of operations of a block cipher for authentication and authenticated encryption. 455-511 - Fulin Li, Shixin Zhu, Honggang Hu, Ting Jiang:
Determining the k-error joint linear complexity spectrum for a binary multisequence with period p n. 513-523 - Can Xiang:
Linear codes from a generic construction. 525-539 - Guangkui Xu, Xiwang Cao, Shanding Xu:
Optimal p-ary cyclic codes with minimum distance four from monomials. 541-554 - Brandon Dravie, Jérémy Parriaux, Philippe Guillot, Gilles Millérioux:
Matrix representations of vectorial Boolean functions and eigenanalysis. 555-577 - Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan:
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme. 579-591 - Ji-Woong Jang, Dae-Woon Lim:
Large low probability of intercept properties of the quaternary sequence with optimal correlation property constructed by legendre sequences. 593-604 - Qiuyan Wang, Dongdai Lin:
Generalized cyclotomic numbers of order two and their applications. 605-616 - Anuradha Sharma, Saroj Rani:
On constacyclic codes over finite fields. 617-636 - Kai-Uwe Schmidt:
Nonlinearity measures of random Boolean functions. 637-645
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.