


default search action
Cryptography and Communications, Volume 17
Volume 17, Number 1, January 2025
- Yuying Man, Nian Li, Zejun Xiang, Xiangyong Zeng:

On the second-order zero differential spectra of some power functions over finite fields. 1-14 - Xinyu Tian, Hongyu Han, Udaya Parampalli:

Construction of low-hit-zone frequency-hopping sequence sets with strictly optimal partial Hamming correlation based on Chinese Remainder Theorem. 15-25 - Juan Di Mauro, Hamid Boukkerou, Gilles Millerioux, Marine Minier, Thomas Stoll:

Provable randomness over lightweight permutations. 27-40 - Nikolaos Verykios, Christos Gogos:

Structures of finite fields of primes and the Euclidean square roots of unity in the finite rings. 41-55 - Jong Yoon Hyun, Jihye Jeong, Yoonjin Lee:

Constructing optimal few weight quaternary linear codes via multivariable functions. 57-85 - Stanislav S. Malakhov

:
On the circulant matrix MDS testing and the search for circulant MDS matrices. 87-119 - Yupeng Jiang, Yifan Zhu:

Distribution of linear and second-highest degree parts of maximum-length feedback functions. 121-138 - He Zhang, Chunming Tang, Xing Hu:

Three families of large cyclic subspace codes. 139-163 - He Zhang, Chunming Tang, Xing Hu:

Correction: Three families of large cyclic subspace codes. 165 - Feifei Yan, Pinhui Ke, Zuling Chang:

The symmetric 2-adic complexity of Tang-Gong interleaved sequences from Legendre sequence pair. 167-179 - Ruhao Wan, Xiujing Zheng, Shixin Zhu:

Construction of quantum MDS codes from Hermitian self-orthogonal generalized Reed-Solomon codes. 181-205 - Yun Ding, Shixin Zhu:

A family of linear codes with few weights and their subfield codes. 207-238 - Abdelghaffar Chibloun

, Hassan Ouazzou
, Mustapha Najmeddine:
On isometry and equivalence of constacyclic codes over finite chain rings. 239-263 - Qinlin Cai, Xiaomiao Wang, Tao Feng

:
Two-dimensional q-ary non-overlapping codes. 265-281 - Maryam Bajalan

, Edgar Martínez-Moro:
Polycyclic codes over serial rings and their annihilator CSS construction. 283-306 - Giuseppe Filippone

:
Erratum. 307-309
Volume 17, Number 2, March 2025
- Gustavo Banegas

, Ricardo Villanueva-Polanco
:
On recovering block cipher secret keys in the cold boot attack setting. 311-335 - Tarun Yadav

, Manoj Kumar
, Amit Kumar, Saibal K. Pal:
A practical-quantum differential attack on block ciphers. 337-357 - Kyungbae Jang, Anubhab Baksi, Jakub Breier

, Hwajeong Seo, Anupam Chattopadhyay:
Quantum Implementation and Analysis of Default. 359-375 - Xing Lin

:
A new repair-efficient piggybacking design for systematic nodes. 377-396 - Yang Li

, Shixin Zhu, Edgar Martínez-Moro:
On general self-orthogonal matrix-product codes associated with Toeplitz matrices. 397-420 - Yaqi Chen, Zhiqiang Cheng, Hao Chen:

Goppa type sum-rank codes. 421-431 - Wajid M. Shaikh

, Rupali S. Jain, B. Surendranath Reddy, Bhagyashri S. Patil:
Construction of minimal binary linear codes with dimension n+3. 433-452 - Zhiru Chen, Vladimir Edemskiy

, Chenhuang Wu:
Binary sequences with ideal and small arithmetic correlations. 453-464 - Said Eddahmani, Sihem Mesnager:

Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box. 465-492 - Animesh Roy

, Dibyendu Roy, Pantelimon Stanica
:
On combining Arbiter based PUFs. 493-510 - Saumya Shah

, Amit Sharma:
Self-dual skew-codes of odd lengths over $\mathbb {Z}_4+u\mathbb {Z}_4$. 511-523 - Akshay Ankush Yadav

, Harshdeep Singh, Indivar Gupta:
A note on QM equivalence of known permutation polynomials. 525-540 - Nikolay Kolomeec, Ivan Sutormin, Denis Bykov, Matvey Panferov, Tatyana Bonich:

On additive differential probabilities of the composition of bitwise exclusive-or and a bit rotation. 541-570
Volume 17, Number 3, May 2025
- Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu, Xiao Wang:

Fast ORAM with server-aided preprocessing and pragmatic privacy-efficiency trade-off. 571-596 - Dor Israeli, Alon Noy, Yehuda Afek, Anat Bremler-Barr

:
Localhost detour from public to private networks: Vulnerabilities and mitigations. 597-620 - Madhurima Mukhopadhyay, Palash Sarkar:

Pseudo-random walk on ideals: Practical speed-up in relation collection for class group computation. 621-641 - Shlomi Dolev, Avraam Yagudaev, Moti Yung:

HBSS: (Simple) hash-based stateless signatures - hash all the way to the rescue! 643-660 - Maryam Bajalan, Edgar Martínez-Moro:

Correction to: Polycyclic codes over serial rings and their annihilator CSS construction. 661-664
Volume 17, Number 4, July 2025
- Kirpa Garg

, Sartaj Ul Hasan, Constanza Riera, Pantelimon Stanica:
The second-order zero differential spectra of some functions over finite fields. 665-694 - Ferruh Özbudak, Paolo Santonastaso, Ferdinando Zullo:

Using multi-orbit cyclic subspace codes for constructing optical orthogonal codes. 695-708 - Sachin Pathak

, Rishi Raj, Dipendu Maity:
Skew negacyclic codes of length 4ps over $\mathbb {F}_{p^m} + u\mathbb {F}_{p^m}$. 709-740 - Iván Blanco-Chacón, Alberto Pedrouzo-Ulloa

, Rahinatou Yuh Njah Nchiwo, Beatriz Barbero-Lucas
:
Fast polynomial arithmetic in homomorphic encryption with cyclo-multiquadratic fields. 741-775 - Johannes Grünberger, Arne Winterhof:

Some notes on the pseudorandomness of Legendre symbol and Liouville function. 777-792 - Ming Yu, Xiaoshan Kai:

Negacyclic dually-BCH codes of length qm-1. 793-807 - Piyush Priyanshu, Abhishek Roy

, Subhabrata Paul, Sudhan Majhi:
Constructions of non-binary Golay complementary pairs of new lengths. 809-822 - Samuele Andreoli

, Lilya Budaghyan
, Robert S. Coulter
, Alise Haukenes, Nikolay S. Kaleyski
, Enrico Piccione
:
On a classification of planar functions in characteristic three. 823-853 - Alessandro Budroni, Andrea Natale:

On the sample complexity of linear code equivalence for all code rates. 855-877 - Zhengting Li, Lin Ding

, Xinhai Wang, Zheng Wu:
Table-based guess and determine attack and application to SOSEMANUK. 879-905 - Yongfeng Niu, Yu Li, Fagang Li, Lingling Wu:

Several new kinds of (k+1)-dimensional Sidon spaces and cyclic subspace codes. 907-919 - Ruhao Wan, Shixin Zhu:

σ hulls of Goppa codes and related codes over ${\mathbb {F}}_q$. 921-943 - Kanchan Singh, Sheo Kumar Singh:

New constant dimension subspace codes via generalized coset construction. 945-957 - Boran Kim:

Minimal codewords over finite fields derived from certain graphs. 959-976 - Zuling Chang, Qiang Wang, Jie Xue:

An effective approach to enumerate universal cycles for k-permutations. 977-988 - V. N. Potapov:

On the number of relevant variables for discrete functions. 989-998 - Yuxuan Lu, Sihem Mesnager, Nian Li, Lisha Wang, Xiangyong Zeng:

A new class of S-boxes with optimal Feistel boomerang uniformity. 999-1011 - Xiangdi Zeng, Xiangrui Meng, Jian Gao, Fang-Wei Fu:

Complete weight enumerators of few-weight linear codes. 1013-1050 - Tran Thi Luong:

Improving block cipher resilience with dynamically generated XOR matrices using the Fisher-Yates shuffle method. 1051-1074 - Alireza Abdollahi, Javad Bagherian, Fatemeh Jafari, Maryam Khatami, Farzad Parvaresh, Reza Sobhani:

Upper bounds on the size of permutation codes with a Hamming distance of five. 1075-1091 - Lei Sun, Zexia Shi, Jian Liu, Fang-Wei Fu:

Generic constructions of plateaued idempotents with high algebraic degree. 1093-1107 - Tapas Chatterjee, Ayantika Laha:

A note on cyclic MDS and non-MDS matrices. 1109-1124 - Jong Hyok Choe:

On the solutions of Xq2+aXq+bX=c over $ {\mathbb {F}}_{2^{n}} $. 1125-1147 - Xue Jia, Qin Yue:

Generator polynomials of cyclic expurgated or extended Goppa codes with odd characteristic. 1149-1172 - Kaimin Cheng, Shuhong Gao:

On binomial Weil sums and an application. 1173-1190
Volume 17, Number 5, September 2025
Special Iaasu on Security and Cryptography for Networks
- Francesco Berti, Carmit Hazay, Itamar Levi:

LR-OT: Leakage-resilient oblivious transfer. 1191-1248 - Masayuki Abe, Miguel Ambrona, Miyako Ohkubo:

Hybrid zero-knowledge from garbled circuits. 1249-1286 - Carsten Baum

, Bernardo Machado David
, Elena Pagnin
, Akira Takahashi
:
Proofs of sequential communication delays from physical assumptions and their applications. 1287-1321 - Clemente Galdi, Duong Hieu Phan:

Preface to the special collection on security and cryptography for networks. 1323-1324 - Chris Brzuska, Geoffroy Couteau, Christoph Egger

, Pihla Karanko, Pierre Meyer:
Instantiating the Hash-then-evaluate paradigm: Strengthening PRFs, PCFs, and OPRFs. 1325-1366 - Lennart Braun, Guilhem Castagnos, Ivan Damgård, Fabien Laguillaumie, Kelsey Melissaris, Claudio Orlandi, Ida Tucker:

An Improved Threshold Homomorphic Cryptosystem Based on Class Groups. 1367-1406 - Haodong Lu, Liqin Qian, Minjia Shi:

An infinite family of binary cyclic codes and two infinite families of ternary cyclic codes with good parameters. 1407-1425 - Xueting Wang, Junling Zhou:

BCH codes with explicit minimum distance and applications in quantum synchronizable codes. 1427-1443 - Zakariae Cheddour:

Double cyclic codes over $ \aleph =\bigoplus _{i=0}^{n} \zeta ^{i}\mathbb {Z}_{2} $, with ζ n=0. 1445-1465 - Chuanping Wang, Jingjun Bao, Zenghui Fang:

Some geometric constructions of optimal frequency hopping sequences. 1467-1486 - Shifu Yang

, Zhe Xu, Kaichuang Jiang, Xing Liu:
Lower bounds on the aperiodic Hamming correlation of low hit zone frequency hopping sequence sets with gaps. 1487-1502 - Xiaolei Fang, Jiangrong Liu:

New constructions on self-dual algebraic geometry codes. 1503-1519 - Qian Liu, Junhao Huang, Dabin Zheng, Rong Jiang, Liupiao Zhang:

Several classes of optimal quinary cyclic codes with minimum distance four. 1521-1542 - Kapish Chand Meena

, Maheshanand Bhaintwal
, Ambrish Awasthi
, Rajendra Kumar Sharma
:
Double-twisted Reed-Solomon codes with twists (1, 3) and general hooks over finite fields. 1543-1567 - Qian Liu, Rong Jiang, Jian Zou:

Several classes of permutation polynomials over $\mathbb {F}_{p^{2m}}$ with odd characteristic based on the AGW criterion. 1569-1582 - Li Shuai, Miao Li:

The locally crooked permutations and the complete permutations over $\mathbb {F}_{2^{n}}$. 1583-1600 - Stephen London, Ilias S. Kotsireas:

New Turyn-type sequences. 1601-1610 - Oisin Campion

, Fernando Hernando, Gary McGuire:
New quantum MDS codes with flexible parameters from Hermitian self-orthogonal GRS codes. 1611-1625 - Yang Yong:

The weight distributions of three new classes of binary linear codes. 1627-1639
Volume 17, Number 6, November 2025
Special Issue on Boolean Functions and Their Applications IX
- Nurdagül Anbar

, Tekgül Kalayci
, Wilfried Meidl, Ferruh Özbudak:
Bent partitions and Maiorana-McFarland association schemes. 1641-1657 - Ayça Çesmelioglu, Wilfried Meidl:

Construction and equivalence for generalized boolean functions. 1659-1682 - Daniele Bartoli, Mohit Pal, Pantelimon Stanica:

A proof of a conjecture on permutation trinomials. 1683-1701 - Gábor Péter Nagy:

On the minimum Hamming distance between vectorial Boolean and affine functions. 1703-1720 - Samuele Andreoli

, George Petrides:
Further existence results of decompositions of permutation polynomials. 1721-1737 - Lyubomir Borissov, Yuri L. Borissov:

Distinctness of the lifted kloosterman sums on the prime field $\mathbb {F}_p,\; p> 3$. 1739-1748

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














