Search dblp for Publications

export results for "toc:db/journals/ccds/ccds5.bht:"

 download as .bib file

@article{DBLP:journals/ccds/ArasuSV13,
  author       = {K. T. Arasu and
                  Simone Severini and
                  Edmund Velten},
  title        = {Block weighing matrices},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {3},
  pages        = {201--207},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-013-0083-0},
  doi          = {10.1007/S12095-013-0083-0},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/ArasuSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BrownC13,
  author       = {Alyssa Brown and
                  Thomas W. Cusick},
  title        = {Equivalence classes for cubic rotation symmetric functions},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {2},
  pages        = {85--118},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-012-0075-5},
  doi          = {10.1007/S12095-012-0075-5},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BrownC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CharonHHL13,
  author       = {Ir{\`{e}}ne Charon and
                  Iiro S. Honkala and
                  Olivier Hudry and
                  Antoine Lobstein},
  title        = {Minimum sizes of identifying codes in graphs differing by one vertex},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {2},
  pages        = {119--136},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-012-0078-2},
  doi          = {10.1007/S12095-012-0078-2},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CharonHHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CruzW13,
  author       = {Romar dela Cruz and
                  Huaxiong Wang},
  title        = {Cheating-immune secret sharing schemes from codes and cumulative arrays},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {1},
  pages        = {67--83},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-012-0076-4},
  doi          = {10.1007/S12095-012-0076-4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CruzW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Cusick13,
  author       = {Thomas W. Cusick},
  title        = {Finding Hamming weights without looking at truth tables},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {1},
  pages        = {7--18},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-012-0072-8},
  doi          = {10.1007/S12095-012-0072-8},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Cusick13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/DasC13,
  author       = {Sourav Das and
                  Dipanwita Roy Chowdhury},
  title        = {{CAR30:} {A} new scalable stream cipher with rule 30},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {2},
  pages        = {137--162},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-012-0079-1},
  doi          = {10.1007/S12095-012-0079-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/DasC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/DingFFXZ13,
  author       = {Cunsheng Ding and
                  Keqin Feng and
                  Rongquan Feng and
                  Maosheng Xiong and
                  Aixian Zhang},
  title        = {Unit time-phase signal sets: Bounds and constructions},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {3},
  pages        = {209--227},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-013-0085-y},
  doi          = {10.1007/S12095-013-0085-Y},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/DingFFXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/GongAF13,
  author       = {Guang Gong and
                  Mark D. Aagaard and
                  Xinxin Fan},
  title        = {Resilience to distinguishing attacks on {WG-7} cipher and their generalizations},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {4},
  pages        = {277--289},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-013-0089-7},
  doi          = {10.1007/S12095-013-0089-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/GongAF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/GuptaCK13,
  author       = {Sourav Sen Gupta and
                  Anupam Chattopadhyay and
                  Ayesha Khalid},
  title        = {Designing integrated accelerator for stream ciphers with structural
                  similarities},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {1},
  pages        = {19--47},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-012-0074-6},
  doi          = {10.1007/S12095-012-0074-6},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/GuptaCK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/JaddaPQ13,
  author       = {Zoubida Jadda and
                  Patrice Parraud and
                  Soukayna Qarboua},
  title        = {Quaternary cryptographic bent functions and their binary projection},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {1},
  pages        = {49--65},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-012-0077-3},
  doi          = {10.1007/S12095-012-0077-3},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/JaddaPQ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Leducq13,
  author       = {Elodie Leducq},
  title        = {Second weight codewords of generalized Reed-Muller codes},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {4},
  pages        = {241--276},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-013-0084-z},
  doi          = {10.1007/S12095-013-0084-Z},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Leducq13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/LimniotisKK13,
  author       = {Konstantinos Limniotis and
                  Nicholas Kolokotronis and
                  Nicholas Kalouptsidis},
  title        = {Secondary constructions of Boolean functions with maximum algebraic
                  immunity},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {3},
  pages        = {179--199},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-013-0081-2},
  doi          = {10.1007/S12095-013-0081-2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/LimniotisKK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/PatersonS13,
  author       = {Maura B. Paterson and
                  Douglas R. Stinson},
  title        = {A simple combinatorial treatment of constructions and threshold gaps
                  of ramp schemes},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {4},
  pages        = {229--240},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-013-0082-1},
  doi          = {10.1007/S12095-013-0082-1},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/PatersonS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/SalageanBP13,
  author       = {Ana Salagean and
                  Alex J. Burrage and
                  Raphael C.{-}W. Phan},
  title        = {Computing the linear complexity for sequences with characteristic
                  polynomial f v},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {2},
  pages        = {163--177},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-013-0080-3},
  doi          = {10.1007/S12095-013-0080-3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/SalageanBP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/WangLZ13,
  author       = {Wenhao Wang and
                  Meicheng Liu and
                  Yin Zhang},
  title        = {Comments on "A design of Boolean functions resistant to (fast) algebraic
                  cryptanalysis with efficient implementation"},
  journal      = {Cryptogr. Commun.},
  volume       = {5},
  number       = {1},
  pages        = {1--6},
  year         = {2013},
  url          = {https://doi.org/10.1007/s12095-012-0063-9},
  doi          = {10.1007/S12095-012-0063-9},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/WangLZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics