


default search action
Cryptography and Communications, Volume 8
Volume 8, Number 1, January 2016
- Mingxing Wang, Yupeng Jiang, Dongdai Lin:

Further results on the nonlinearity of maximum-length NFSR feedbacks. 1-6 - Adel Alahmadi, Hussain Alhazmi

, Tor Helleseth, Rola Hijazi, Najat M. Muthana, Patrick Solé:
On the lifted Melas code. 7-18 - Maura B. Paterson

, Douglas R. Stinson, Yongge Wang
:
On encoding symbol degrees of array BP-XOR codes. 19-32 - Qiuyan Wang, Yupeng Jiang, Dongdai Lin:

Linear complexity of Ding-Helleseth sequences of order 2 over GF(l). 33-49 - Jian Gao, Linzhi Shen

, Fang-Wei Fu:
A Chinese remainder theorem approach to skew generalized quasi-cyclic codes over finite fields. 51-66 - Thomas W. Cusick, Pantelimon Stanica

:
Counting equivalence classes for monomial rotation symmetric Boolean functions with prime dimension. 67-81 - Anuradha Sharma

, Amit K. Sharma
:
Construction of self-dual codes over ℤ2m. 83-101 - Chuan Lv, Tongjiang Yan, Guozhen Xiao:

New developments in q-polynomial codes. 103-112 - Subhadeep Banik

:
Conditional differential cryptanalysis of 105 round Grain v1. 113-137 - Iiro S. Honkala, Olivier Hudry, Antoine Lobstein:

On the ensemble of optimal identifying codes in a twin-free graph. 139-153 - Guangkui Xu

, Xiwang Cao, Shanding Xu:
Constructing new APN functions and bent functions over finite fields of odd characteristic via the switching method. 155-171
Volume 8, Number 2, April 2016
- Lilya Budaghyan, Tor Helleseth, Alexander Kholosha:

Editorial: Special issue on Boolean functions and their applications. 173-174 - Daniel J. Katz, Philippe Langevin:

New open problems related to old conjectures by Helleseth. 175-189 - Canan Kasikci, Wilfried Meidl, Alev Topuzoglu:

Spectra of a class of quadratic functions: Average behaviour and counting functions. 191-214 - Chunlei Li, Tor Helleseth:

Quasi-perfect linear codes from planar and APN functions. 215-227 - Sihem Mesnager:

Further constructions of infinite families of bent functions from new permutations and their duals. 229-246 - Georgi Ivanov, Nikolay Nikolov

, Svetla Nikova
:
Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties. 247-276 - Oleksandr Kazymyrov, Roman Oliynykov

, Håvard Raddum
:
Influence of addition modulo 2 n on algebraic attacks. 277-289 - Yin Tan, Guang Gong, Bo Zhu:

Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions. 291-311
Volume 8, Number 3, July 2016
- Joan Boyar

, Magnus Gausdal Find, René Peralta
:
On various nonlinearity measures for boolean functions. 313-330 - Sonia Bogos, Florian Tramèr

, Serge Vaudenay:
On solving L P N using B K W and variants - Implementation and analysis. 331-369 - Yuan Cheng, Wen-Feng Qi, Qun-Xiong Zheng, Dong Yang:

On the distinctness of primitive sequences over Z/(p e q) modulo 2. 371-381 - Ting Gu, Andrew Klapper:

Statistical properties of half-ℓ-sequences. 383-400 - Kaushik Chakraborty, Subhamoy Maitra:

Application of Grover's algorithm to check non-resiliency of a Boolean function. 401-413 - Torleiv Kløve:

On covering sets for limited-magnitude errors. 415-433 - Yi Lu, Yvo Desmedt:

Walsh transforms and cryptographic applications in bias computing. 435-453
Volume 8, Number 4, October 2016
- Debrup Chakraborty

, Palash Sarkar:
On modes of operations of a block cipher for authentication and authenticated encryption. 455-511 - Fulin Li, Shixin Zhu, Honggang Hu, Ting Jiang:

Determining the k-error joint linear complexity spectrum for a binary multisequence with period p n. 513-523 - Can Xiang

:
Linear codes from a generic construction. 525-539 - Guangkui Xu

, Xiwang Cao, Shanding Xu:
Optimal p-ary cyclic codes with minimum distance four from monomials. 541-554 - Brandon Dravie, Jérémy Parriaux, Philippe Guillot, Gilles Millérioux:

Matrix representations of vectorial Boolean functions and eigenanalysis. 555-577 - Ji-Jian Chin

, Syh-Yuan Tan, Swee-Huay Heng
, Raphael C.-W. Phan
:
Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme. 579-591 - Ji-Woong Jang, Dae-Woon Lim:

Large low probability of intercept properties of the quaternary sequence with optimal correlation property constructed by legendre sequences. 593-604 - Qiuyan Wang, Dongdai Lin:

Generalized cyclotomic numbers of order two and their applications. 605-616 - Anuradha Sharma

, Saroj Rani:
On constacyclic codes over finite fields. 617-636 - Kai-Uwe Schmidt:

Nonlinearity measures of random Boolean functions. 637-645

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














