


default search action
Cryptography and Communications, Volume 7
Volume 7, Number 1, March 2015
- Claude Carlet, Pierre-Alain Fouque

:
Guest Editorial. 1-2 - Begül Bilgin

, Svetla Nikova
, Ventzislav Nikov, Vincent Rijmen
, Natalia N. Tokareva
, Valeriya Vitkup:
Threshold implementations of small S-boxes. 3-33 - Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta:

Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers. 35-69 - Michael Tunstall

, Marc Joye:
The distributions of individual bits in the output of multiplicative operations. 71-90 - Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild:

Horizontal collision correlation attack on elliptic curves - - Extended Version -. 91-119 - Christophe Clavier, Quentin Isorez, Damien Marion

, Antoine Wurcker:
Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks. 121-162 - Sonia Belaïd, Vincent Grosso

, François-Xavier Standaert
:
Masking and leakage-resilient primitives: One, the other(s) or both? 163-184 - Nadia El Mrabet

, Jacques J. A. Fournier, Louis Goubin, Ronan Lashermes:
A survey of fault attacks in pairing based cryptography. 185-205
Volume 7, Number 2, June 2015
- Mingchao Li, Miao Liang, Beiliang Du:

A construction of t-fold perfect splitting authentication codes with equal deception probabilities. 207-215 - Chengju Li, Qin Yue:

The Walsh transform of a class of monomial functions and cyclic codes. 217-228 - Anuradha Sharma

:
Repeated-root constacyclic codes of length ℓ t p s and their dual codes. 229-255 - Kishan Chand Gupta, Indranil Ghosh Ray:

Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications. 257-287
Volume 7, Number 3, September 2015
- Yiyuan Luo, Xuejia Lai, Tiejun Jia:

Attacks on a double length blockcipher-based hash proposal. 289-295 - Yuan Li:

Characterization of robust immune symmetric boolean functions. 297-315 - Santanu Sarkar

:
Further non-randomness in RC4, RC4A and VMPC. 317-330 - Ivica Nikolic

, Lei Wang, Shuang Wu:
The parallel-cut meet-in-the-middle attack. 331-345
Volume 7, Number 4, December 2015
- Zhi Hu, Lin Wang:

Injectivity of compressing maps on the set of primitive sequences modulo square-free odd integers. 347-361 - Nathan Jolly:

An algebra of arrays and almost perfect watermarks. 363-377 - Francis N. Castro, Oscar E. González

, Luis A. Medina
:
A divisibility approach to the open boundary cases of Cusick-Li-Stǎnicǎ's conjecture. 379-402 - José R. Ortiz-Ubarri:

New families of asymptotically optimal doubly periodic arrays with ideal correlation constraints. 403-414 - Colleen M. Swanson, Douglas R. Stinson:

Extended results on privacy against coalitions of users in user-private information retrieval protocols. 415-437 - Debrup Chakraborty

, Vicente Hernandez-Jimenez, Palash Sarkar:
Another look at XCB. 439-468 - Samir Hodzic, Enes Pasalic

:
Generalized Bent Functions - Some General Construction Methods and Related Necessary and Sufficient Conditions. 469-483 - Vladimir Edemskiy

, Andrey Ivanov:
The linear complexity of balanced quaternary sequences with optimal autocorrelation value. 485-496 - Jing Jane He, Daniel Panario

, Qiang Wang
, Arne Winterhof
:
Linear complexity profile and correlation measure of interleaved sequences. 497-508 - Chun Guo, Dongdai Lin:

Improved domain extender for the ideal cipher. 509-533 - Ali Reza Rahimipour

, A. R. Ashrafi, Ahmad Gholami:
The existence of minimal logarithmic signatures for the sporadic Suzuki and simple Suzuki groups. 535-542

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














