


default search action
Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes 2009
- Bart Preneel, Stefan M. Dodunekov, Vincent Rijmen, Svetla Nikova:

Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes. NATO Science for Peace and Security Series - D: Information and Communication Security 23, IOS Press 2009, ISBN 978-1-60750-002-5
Invited Talks
- Henk van Tilborg:

Authentication Codes from Error-Correcting Codes; An Overview. 3-16 - Yuliang Zheng:

Coded Modulation and the Arrival of Signcryption. 17-27 - Svetla Nikova

, Ventzislav Nikov:
Secret Sharing and Error Correcting. 28-38 - Tor Helleseth, Michal Hojsík, Sondre Rønjom:

Algebraic Attacks on Filter and Combiner Generators. 39-48 - Rafael Álvarez, Gary McGuire:

S-Boxes, APN Functions and Related Codes. 49-62 - Sebastiaan Indesteege, Bart Preneel:

Coding Theory and Hash Function Design - A Case Study: The Lane Hash Function. 63-68 - Joan Daemen, Vincent Rijmen

:
Codes and Provable Security of Ciphers - Extended abstract. 69-80 - Stefan M. Dodunekov:

Applications of Near MDS Codes in Cryptography. 81-86 - Yves Edel

, Alexander Pott:
On the Equivalence of Nonlinear Functions. 87-103 - Claude Carlet:

On the Algebraic Immunities and Higher Order Nonlinearities of Vectorial Boolean Functions. 104-116 - Miodrag J. Mihaljevic:

A Framework for Stream Ciphers Based on Pseudorandomness, Randomness and Coding. 117-139 - Subhamoy Maitra:

On the Studies Related to Linear Codes in Generalized Construction of Resilient Functions with Very High Nonlinearity. 140-149
Participants' Talks
- Peter Beelen, Gregor Leander

:
Reconstruction of Highly Non Linear Sboxes from Linear Codes. 153-159 - Marco Baldi

:
LDPC Codes in the McEliece Cryptosystem: Attacks and Countermeasures. 160-174 - Gohar M. Kyureghyan, Yin Tan:

On a Family of Planar Mappings. 175-178 - Cees J. A. Jansen:

Linearities in Cascade Jump Controlled Stream Ciphers. 179-191 - Panagiotis Rizomiliotis:

New Results on the Algebraic Immunity of Boolean Functions. 192-202 - Tor E. Bjørstad, Matthew Geoffrey Parker:

Equivalence Between Certain Complementary Pairs of Types I and III. 203-221 - Oleg A. Logachev, Alexei A. Salnikov, Stanislav V. Smyshlyaev, Valery V. Yashchenko:

Symbolic Dynamics, Codes, and Perfectly Balanced Functions. 222-233 - Agnes Andics:

Algebraic Immunity of Boolean Power Functions with Kasami and Niho Exponents. 234-243 - Yuri L. Borissov, Nikolai L. Manev:

Some Comments on Bossert-Mahr-Heilig Scheme. 244-249 - Tsonka Baicheva:

Linear Codes of Good Error Control Performance. 250-259 - Svetlana Topalova, Stela Zhelezova:

Classification of Doubly Resolvable Designs and Orthogonal Resolutions. 260-264 - Stefka Bouyuklieva:

Self-Dual Codes with Some Applications to Cryptography. 265-269

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














