


default search action
Cryptography and Communications, Volume 17
Volume 17, Number 1, January 2025
- Yuying Man, Nian Li, Zejun Xiang, Xiangyong Zeng:
On the second-order zero differential spectra of some power functions over finite fields. 1-14 - Xinyu Tian, Hongyu Han, Udaya Parampalli:
Construction of low-hit-zone frequency-hopping sequence sets with strictly optimal partial Hamming correlation based on Chinese Remainder Theorem. 15-25 - Juan Di Mauro, Hamid Boukkerou, Gilles Millerioux, Marine Minier, Thomas Stoll:
Provable randomness over lightweight permutations. 27-40 - Nikolaos Verykios, Christos Gogos:
Structures of finite fields of primes and the Euclidean square roots of unity in the finite rings. 41-55 - Jong Yoon Hyun, Jihye Jeong, Yoonjin Lee:
Constructing optimal few weight quaternary linear codes via multivariable functions. 57-85 - Stanislav S. Malakhov
:
On the circulant matrix MDS testing and the search for circulant MDS matrices. 87-119 - Yupeng Jiang, Yifan Zhu:
Distribution of linear and second-highest degree parts of maximum-length feedback functions. 121-138 - He Zhang, Chunming Tang, Xing Hu:
Three families of large cyclic subspace codes. 139-163 - He Zhang, Chunming Tang, Xing Hu:
Correction: Three families of large cyclic subspace codes. 165 - Feifei Yan, Pinhui Ke, Zuling Chang:
The symmetric 2-adic complexity of Tang-Gong interleaved sequences from Legendre sequence pair. 167-179 - Ruhao Wan, Xiujing Zheng, Shixin Zhu:
Construction of quantum MDS codes from Hermitian self-orthogonal generalized Reed-Solomon codes. 181-205 - Yun Ding, Shixin Zhu:
A family of linear codes with few weights and their subfield codes. 207-238 - Abdelghaffar Chibloun
, Hassan Ouazzou
, Mustapha Najmeddine:
On isometry and equivalence of constacyclic codes over finite chain rings. 239-263 - Qinlin Cai, Xiaomiao Wang, Tao Feng
:
Two-dimensional q-ary non-overlapping codes. 265-281 - Maryam Bajalan
, Edgar Martínez-Moro:
Polycyclic codes over serial rings and their annihilator CSS construction. 283-306 - Giuseppe Filippone
:
Erratum. 307-309
Volume 17, Number 2, March 2025
- Gustavo Banegas
, Ricardo Villanueva-Polanco
:
On recovering block cipher secret keys in the cold boot attack setting. 311-335 - Tarun Yadav
, Manoj Kumar
, Amit Kumar, Saibal K. Pal:
A practical-quantum differential attack on block ciphers. 337-357 - Kyungbae Jang, Anubhab Baksi, Jakub Breier
, Hwajeong Seo, Anupam Chattopadhyay:
Quantum Implementation and Analysis of Default. 359-375 - Xing Lin
:
A new repair-efficient piggybacking design for systematic nodes. 377-396 - Yang Li, Shixin Zhu, Edgar Martínez-Moro:
On general self-orthogonal matrix-product codes associated with Toeplitz matrices. 397-420 - Yaqi Chen, Zhiqiang Cheng, Hao Chen:
Goppa type sum-rank codes. 421-431 - Wajid M. Shaikh
, Rupali S. Jain, B. Surendranath Reddy, Bhagyashri S. Patil:
Construction of minimal binary linear codes with dimension n+3. 433-452 - Zhiru Chen, Vladimir Edemskiy
, Chenhuang Wu:
Binary sequences with ideal and small arithmetic correlations. 453-464 - Said Eddahmani, Sihem Mesnager:
Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box. 465-492 - Animesh Roy, Dibyendu Roy, Pantelimon Stanica
:
On combining Arbiter based PUFs. 493-510 - Saumya Shah
, Amit Sharma:
Self-dual skew-codes of odd lengths over $\mathbb {Z}_4+u\mathbb {Z}_4$. 511-523 - Akshay Ankush Yadav
, Harshdeep Singh, Indivar Gupta:
A note on QM equivalence of known permutation polynomials. 525-540 - Nikolay Kolomeec, Ivan Sutormin, Denis Bykov, Matvey Panferov, Tatyana Bonich:
On additive differential probabilities of the composition of bitwise exclusive-or and a bit rotation. 541-570
Volume 17, Number 3, May 2025
- Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, Xiao Wang:
Fast ORAM with server-aided preprocessing and pragmatic privacy-efficiency trade-off. 571-596 - Dor Israeli, Alon Noy, Yehuda Afek, Anat Bremler-Barr:
Localhost detour from public to private networks: Vulnerabilities and mitigations. 597-620 - Madhurima Mukhopadhyay, Palash Sarkar:
Pseudo-random walk on ideals: Practical speed-up in relation collection for class group computation. 621-641 - Shlomi Dolev, Avraam Yagudaev, Moti Yung:
HBSS: (Simple) hash-based stateless signatures - hash all the way to the rescue! 643-660 - Maryam Bajalan, Edgar Martínez-Moro:
Correction to: Polycyclic codes over serial rings and their annihilator CSS construction. 661-664

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.