


default search action
Cryptography and Communications, Volume 6
Volume 6, Number 1, March 2014
- Tor Helleseth, Jonathan Jedwab:

Special issue editorial: Sequences and their applications. 1-2 - Gaofei Wu, Matthew Geoffrey Parker:

A complementary construction using mutually unbiased bases. 3-25 - Dragana Bajic

, Tatjana Loncar-Turukalo
:
A simple suboptimal construction of cross-bifix-free codes. 27-37 - Rema Hariharan:

New near perfect sequences of even lengths. 39-46 - Santiago Barrera Acevedo, Nathan Jolly:

Perfect arrays of unbounded sizes over the basic quaternions. 47-57 - Srdjan Z. Budisin, Predrag Spasojevic

:
Paraunitary generation/correlation of QAM complementary sequence pairs. 59-102
Volume 6, Number 2, June 2014
- Stéphanie Dib:

Asymptotic nonlinearity of vectorial Boolean functions. 103-115 - Kalikinkar Mandal, Guang Gong, Xinxin Fan, Mark D. Aagaard:

Optimal parameters for the WG stream cipher family. 117-135 - Ying Gao, Romar dela Cruz

:
Secret sharing schemes based on graphical codes. 137-155 - Irène Charon, Iiro S. Honkala, Olivier Hudry, Antoine Lobstein:

Minimum sizes of identifying codes in graphs differing by one edge. 157-170
Volume 6, Number 3, September 2014
- Sareh Emami, San Ling

, Ivica Nikolic
, Josef Pieprzyk
, Huaxiong Wang:
The resistance of PRESENT-80 against related-key differential attacks. 171-187 - Palash Sarkar:

Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector. 189-231 - Jinyong Shan

, Lei Hu, Xiangyong Zeng:
Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher. 233-254 - Pavol Zajac

, Matús Jókay:
Multiplicative complexity of bijective 4×4 S-boxes. 255-277
Volume 6, Number 4, December 2014
- Aslí Bay, Atefeh Mashatan

, Serge Vaudenay:
Revisiting iterated attacks in the context of decorrelation theory. 279-311 - Bo Zhu, Guang Gong:

Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64. 313-333 - Xinxin Gong, Bin Zhang, Wenling Wu, Dengguo Feng:

Computing Walsh coefficients from the algebraic normal form of a Boolean function. 335-358 - Antonio Bernini

, Stefano Bilotta
, Renzo Pinzani, Ahmad Sabri
, Vincent Vajnovszki:
Prefix partitioned gray codes for particular cross-bifix-free sets. 359-369

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














