Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ccds/ccds5.bht:"
@article{DBLP:journals/ccds/ArasuSV13, author = {K. T. Arasu and Simone Severini and Edmund Velten}, title = {Block weighing matrices}, journal = {Cryptogr. Commun.}, volume = {5}, number = {3}, pages = {201--207}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0083-0}, doi = {10.1007/S12095-013-0083-0}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ArasuSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BrownC13, author = {Alyssa Brown and Thomas W. Cusick}, title = {Equivalence classes for cubic rotation symmetric functions}, journal = {Cryptogr. Commun.}, volume = {5}, number = {2}, pages = {85--118}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0075-5}, doi = {10.1007/S12095-012-0075-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BrownC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CharonHHL13, author = {Ir{\`{e}}ne Charon and Iiro S. Honkala and Olivier Hudry and Antoine Lobstein}, title = {Minimum sizes of identifying codes in graphs differing by one vertex}, journal = {Cryptogr. Commun.}, volume = {5}, number = {2}, pages = {119--136}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0078-2}, doi = {10.1007/S12095-012-0078-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CharonHHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CruzW13, author = {Romar dela Cruz and Huaxiong Wang}, title = {Cheating-immune secret sharing schemes from codes and cumulative arrays}, journal = {Cryptogr. Commun.}, volume = {5}, number = {1}, pages = {67--83}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0076-4}, doi = {10.1007/S12095-012-0076-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CruzW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Cusick13, author = {Thomas W. Cusick}, title = {Finding Hamming weights without looking at truth tables}, journal = {Cryptogr. Commun.}, volume = {5}, number = {1}, pages = {7--18}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0072-8}, doi = {10.1007/S12095-012-0072-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Cusick13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DasC13, author = {Sourav Das and Dipanwita Roy Chowdhury}, title = {{CAR30:} {A} new scalable stream cipher with rule 30}, journal = {Cryptogr. Commun.}, volume = {5}, number = {2}, pages = {137--162}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0079-1}, doi = {10.1007/S12095-012-0079-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DasC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DingFFXZ13, author = {Cunsheng Ding and Keqin Feng and Rongquan Feng and Maosheng Xiong and Aixian Zhang}, title = {Unit time-phase signal sets: Bounds and constructions}, journal = {Cryptogr. Commun.}, volume = {5}, number = {3}, pages = {209--227}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0085-y}, doi = {10.1007/S12095-013-0085-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DingFFXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GongAF13, author = {Guang Gong and Mark D. Aagaard and Xinxin Fan}, title = {Resilience to distinguishing attacks on {WG-7} cipher and their generalizations}, journal = {Cryptogr. Commun.}, volume = {5}, number = {4}, pages = {277--289}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0089-7}, doi = {10.1007/S12095-013-0089-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GongAF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuptaCK13, author = {Sourav Sen Gupta and Anupam Chattopadhyay and Ayesha Khalid}, title = {Designing integrated accelerator for stream ciphers with structural similarities}, journal = {Cryptogr. Commun.}, volume = {5}, number = {1}, pages = {19--47}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0074-6}, doi = {10.1007/S12095-012-0074-6}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/GuptaCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JaddaPQ13, author = {Zoubida Jadda and Patrice Parraud and Soukayna Qarboua}, title = {Quaternary cryptographic bent functions and their binary projection}, journal = {Cryptogr. Commun.}, volume = {5}, number = {1}, pages = {49--65}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0077-3}, doi = {10.1007/S12095-012-0077-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/JaddaPQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Leducq13, author = {Elodie Leducq}, title = {Second weight codewords of generalized Reed-Muller codes}, journal = {Cryptogr. Commun.}, volume = {5}, number = {4}, pages = {241--276}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0084-z}, doi = {10.1007/S12095-013-0084-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Leducq13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LimniotisKK13, author = {Konstantinos Limniotis and Nicholas Kolokotronis and Nicholas Kalouptsidis}, title = {Secondary constructions of Boolean functions with maximum algebraic immunity}, journal = {Cryptogr. Commun.}, volume = {5}, number = {3}, pages = {179--199}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0081-2}, doi = {10.1007/S12095-013-0081-2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/LimniotisKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PatersonS13, author = {Maura B. Paterson and Douglas R. Stinson}, title = {A simple combinatorial treatment of constructions and threshold gaps of ramp schemes}, journal = {Cryptogr. Commun.}, volume = {5}, number = {4}, pages = {229--240}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0082-1}, doi = {10.1007/S12095-013-0082-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PatersonS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SalageanBP13, author = {Ana Salagean and Alex J. Burrage and Raphael C.{-}W. Phan}, title = {Computing the linear complexity for sequences with characteristic polynomial f v}, journal = {Cryptogr. Commun.}, volume = {5}, number = {2}, pages = {163--177}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0080-3}, doi = {10.1007/S12095-013-0080-3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SalageanBP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangLZ13, author = {Wenhao Wang and Meicheng Liu and Yin Zhang}, title = {Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation"}, journal = {Cryptogr. Commun.}, volume = {5}, number = {1}, pages = {1--6}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0063-9}, doi = {10.1007/S12095-012-0063-9}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.