default search action
Search dblp for Publications
export results for "stream:journals/ccds:"
@article{DBLP:journals/ccds/AgrawalS24, author = {Astha Agrawal and Rajendra Kumar Sharma}, title = {{ACD} codes over skew-symmetric dualities}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {1013--1032}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00709-y}, doi = {10.1007/S12095-024-00709-Y}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AgrawalS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ArmarioEF24, author = {Jos{\'{e}} Andr{\'{e}}s Armario and Ronan Egan and Dane L. Flannery}, title = {Generalized partially bent functions, generalized perfect arrays, and cocyclic Butson matrices}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {323--337}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00657-z}, doi = {10.1007/S12095-023-00657-Z}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ArmarioEF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BhoiPS24, author = {Siddhartha Siddhiprada Bhoi and Udaya Parampalli and Abhay Kumar Singh}, title = {Construction of {DNA} codes with multiple constrained properties}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {1135--1149}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00718-x}, doi = {10.1007/S12095-024-00718-X}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BhoiPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudroniM24, author = {Alessandro Budroni and Erik M{\aa}rtensson}, title = {Further improvements of the estimation of key enumeration with applications to solving {LWE}}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {1163--1182}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00722-1}, doi = {10.1007/S12095-024-00722-1}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudroniM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CaoYW24, author = {Meng Cao and Jing Yang and Fuchuan Wei}, title = {On the {\(\sigma\)} duals and {\(\sigma\)} hulls of linear codes}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {507--530}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00679-7}, doi = {10.1007/S12095-023-00679-7}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CaoYW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CheT24, author = {Cheng Che and Tian Tian}, title = {Further Results on Affine Sub-Families of {NFSR} Sequences}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {309--321}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00663-1}, doi = {10.1007/S12095-023-00663-1}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/CheT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChenKPZL24, author = {Changhui Chen and Haibin Kan and Jie Peng and Lijing Zheng and Yanjun Li}, title = {Three classes of permutation quadrinomials in odd characteristic}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {351--365}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00672-0}, doi = {10.1007/S12095-023-00672-0}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ChenKPZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DaemenKMV24, author = {Joan Daemen and Dani{\"{e}}l Kuijsters and Silvia Mella and Denise Verbakel}, title = {Propagation properties of a non-linear mapping based on squaring in odd characteristic}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {997--1011}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00711-4}, doi = {10.1007/S12095-024-00711-4}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DaemenKMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DragoiCCG24, author = {Vlad{-}Florin Dragoi and Brice Colombier and Pierre{-}Louis Cayrel and Vincent Grosso}, title = {Integer syndrome decoding in the presence of noise}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {1103--1134}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00712-3}, doi = {10.1007/S12095-024-00712-3}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DragoiCCG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/EyvaziSS24, author = {Hamidreza Eyvazi and Karim Samei and Batoul Savari}, title = {The Homogeneous Gray image of linear codes over the Galois ring GR(4, m)}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {531--540}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00683-x}, doi = {10.1007/S12095-023-00683-X}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/EyvaziSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FalconeF24, author = {Giovanni Falcone and Giuseppe Filippone}, title = {Mumford representation and Riemann-Roch space of a divisor on a hyperelliptic curve}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {949--959}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00713-2}, doi = {10.1007/S12095-024-00713-2}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/FalconeF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FernandezLM24, author = {Marcel Fernandez and John Livieratos and Sebasti{\`{a}} Mart{\'{\i}}n}, title = {Frameproof codes, separable codes and B\({}_{\mbox{2}}\) codes: Bounds and constructions}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {481--506}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00682-y}, doi = {10.1007/S12095-023-00682-Y}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/FernandezLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GhoshMP24, author = {Gobinda Ghosh and Sudhan Majhi and Shubhabrata Paul}, title = {A direct construction of optimal 2d-zcacs with flexible array size and large set size}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {367--385}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00669-9}, doi = {10.1007/S12095-023-00669-9}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/GhoshMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GrasslOOT24, author = {Markus Grassl and Ferruh {\"{O}}zbudak and Buket {\"{O}}zkaya and Burcu G{\"{u}}lmez Tem{\"{u}}r}, title = {Complete characterization of a class of permutation trinomials in characteristic five}, journal = {Cryptogr. Commun.}, volume = {16}, number = {4}, pages = {825--841}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00705-2}, doi = {10.1007/S12095-024-00705-2}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GrasslOOT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuptaPS24, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Susanta Samanta}, title = {On the construction of near-MDS matrices}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {249--283}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00667-x}, doi = {10.1007/S12095-023-00667-X}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/GuptaPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuptaQW24, author = {Rohit Gupta and Luciane Quoos and Qiang Wang}, title = {Some classes of permutation binomials and trinomials of index q-1 over {\textdollar}\{{\textbackslash}mathbb \{F\}{\_}\{qn\}\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {387--402}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00674-y}, doi = {10.1007/S12095-023-00674-Y}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuptaQW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HanHCY24, author = {Xiaopan Han and Guojun Han and Han Cai and Linxin Yin}, title = {Locally repairable codes with multiple repair sets based on packings of block size 4}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {459--479}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00681-z}, doi = {10.1007/S12095-023-00681-Z}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HanHCY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HyunHL24, author = {Jong Yoon Hyun and Nayoung Han and Yoonjin Lee}, title = {The Griesmer codes of Belov type and optimal quaternary codes via multi-variable functions}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {579--600}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00686-8}, doi = {10.1007/S12095-023-00686-8}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HyunHL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JingX24, author = {Xiaoyan Jing and Zhefeng Xu}, title = {The 4-adic complexity of interleaved quaternary sequences of even period with optimal autocorrelation}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {613--628}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00690-y}, doi = {10.1007/S12095-023-00690-Y}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/JingX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KaiZLZ24, author = {Xiaoshan Kai and Jiayuan Zhang and Ping Li and Shixin Zhu}, title = {Construction of binary self-orthogonal codes}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {427--444}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00677-9}, doi = {10.1007/S12095-023-00677-9}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/KaiZLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Krotov24, author = {Denis S. Krotov}, title = {Equitable [[2, 10], [6, 6]]-partitions of the 12-cube}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {975--996}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00716-z}, doi = {10.1007/S12095-024-00716-Z}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Krotov24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KumarMK24, author = {Nishant Kumar and Sudhan Majhi and Sushant Kumar}, title = {A new construction of almost-optimal multiple {ZCZ} sequence sets for multi-cell {QS-CDMA} system}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {541--556}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00684-w}, doi = {10.1007/S12095-023-00684-W}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KumarMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KumarMP24, author = {Praveen Kumar and Sudhan Majhi and Subhabrata Paul}, title = {A direct construction of cross z-complementary sequence sets with large set size}, journal = {Cryptogr. Commun.}, volume = {16}, number = {4}, pages = {767--777}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00700-7}, doi = {10.1007/S12095-024-00700-7}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KumarMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KumarMU24, author = {Nishant Kumar and Sudhan Majhi and Ashish Kumar Upadhyay}, title = {A direct construction of complete complementary code with zero correlation zone property for prime-power length}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {403--426}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00676-w}, doi = {10.1007/S12095-023-00676-W}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KumarMU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KumarSM24, author = {Nishant Kumar and Palash Sarkar and Sudhan Majhi}, title = {Construction of spectrally-null-constrained zero-correlation zone sequences with flexible support}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {1059--1075}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00715-0}, doi = {10.1007/S12095-024-00715-0}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KumarSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KumariS24, author = {Prity Kumari and Karam Ratan Singh}, title = {Re-keying analysis in group key management of wireless sensor networks}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {665--677}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00693-9}, doi = {10.1007/S12095-023-00693-9}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KumariS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiHZY24, author = {Fulin Li and Hang Hu and Shixin Zhu and Jiayun Yan}, title = {A fully dynamic multi-secret sharing scheme with redundant authorization}, journal = {Cryptogr. Commun.}, volume = {16}, number = {1}, pages = {3--20}, year = {2024}, url = {https://doi.org/10.1007/s12095-022-00613-3}, doi = {10.1007/S12095-022-00613-3}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/LiHZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiMHY24, author = {Fengwei Li and Fanhui Meng and Ziling Heng and Qin Yue}, title = {An improvement on Weil bounds for character sums of polynomials over finite fields}, journal = {Cryptogr. Commun.}, volume = {16}, number = {4}, pages = {879--887}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00706-1}, doi = {10.1007/S12095-024-00706-1}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiMHY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiSL24, author = {Shitao Li and Minjia Shi and Huizhou Liu}, title = {Several constructions of optimal {LCD} codes over small finite fields}, journal = {Cryptogr. Commun.}, volume = {16}, number = {4}, pages = {779--800}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00699-x}, doi = {10.1007/S12095-024-00699-X}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiSL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiYH24, author = {Xia Li and Qin Yue and Daitao Huang}, title = {Factorization of invariant polynomials under actions of projective linear groups and its applications in coding theory}, journal = {Cryptogr. Commun.}, volume = {16}, number = {1}, pages = {185--207}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00675-x}, doi = {10.1007/S12095-023-00675-X}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/LiYH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Liu24, author = {Xing Liu}, title = {Low-hit-zone frequency hopping sequence sets under aperiodic Hamming correlation}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {629--645}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00691-x}, doi = {10.1007/S12095-023-00691-X}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Liu24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Liu24a, author = {Xing Liu}, title = {Correction: Low-hit-zone frequency hopping sequence sets under aperiodic Hamming correlation}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {647}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00714-1}, doi = {10.1007/S12095-024-00714-1}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Liu24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiuZAY24, author = {Shilu Liu and Zhengchun Zhou and Avik Ranjan Adhikary and Yang Yang}, title = {New supersets of Zadoff-Chu sequences via the Weil bound}, journal = {Cryptogr. Commun.}, volume = {16}, number = {1}, pages = {89--108}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00632-8}, doi = {10.1007/S12095-023-00632-8}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiuZAY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LvFW24, author = {Xinxin Lv and Cuiling Fan and Yanyan Wang}, title = {The cross-correlation spectrum of ternary perfect sequences and their decimations}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {339--349}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00671-1}, doi = {10.1007/S12095-023-00671-1}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/LvFW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MeauxR24, author = {Pierrick M{\'{e}}aux and Dibyendu Roy}, title = {Theoretical differential fault attacks on {FLIP} and FiLIP}, journal = {Cryptogr. Commun.}, volume = {16}, number = {4}, pages = {721--744}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00698-y}, doi = {10.1007/S12095-024-00698-Y}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MeauxR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Mesnager24, author = {Sihem Mesnager}, title = {Special Issue on Contemporary interactions between codes, cryptographic functions and/or sequences}, journal = {Cryptogr. Commun.}, volume = {16}, number = {1}, pages = {1--2}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00696-0}, doi = {10.1007/S12095-024-00696-0}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/Mesnager24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PanarioSW24, author = {Daniel Panario and Murat Sahin and Qiang Wang}, title = {Additive codes with few weights}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {1077--1102}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00720-3}, doi = {10.1007/S12095-024-00720-3}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PanarioSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RadonjicDV24, author = {Aleksandar Radonjic and Pankaj Kumar Das and Vladimir Vujicic}, title = {Integer codes correcting burst errors within one byte and single errors within two bytes}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {961--974}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00687-7}, doi = {10.1007/S12095-023-00687-7}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RadonjicDV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RodierCF24, author = {Fran{\c{c}}ois Rodier and Florian Caullery and Eric F{\'{e}}rard}, title = {Periodic autocorrelation of sequences}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {445--458}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00680-0}, doi = {10.1007/S12095-023-00680-0}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/RodierCF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RoyM24, author = {Abhishek Roy and Sudhan Majhi}, title = {Lower bounds on the maximum cross-correlations of 2-D quasi-complementary array sets}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {229--247}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00665-z}, doi = {10.1007/S12095-023-00665-Z}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/RoyM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SharmaD24, author = {Deepmala Sharma and Mayasar Ahmad Dar}, title = {On Generalized Nega-Hadamard Transform and Nega-crosscorrelation}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {1151--1162}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00721-2}, doi = {10.1007/S12095-024-00721-2}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SharmaD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShenYF24, author = {Bingsheng Shen and Yang Yang and Pingzhi Fan}, title = {Preferred Z-complementary pairs and their application in doppler resilient waveform design}, journal = {Cryptogr. Commun.}, volume = {16}, number = {1}, pages = {71--87}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00636-4}, doi = {10.1007/S12095-023-00636-4}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ShenYF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShenZ24, author = {Shuhui Shen and Xiaojun Zhang}, title = {A class of balanced binary sequences with two-valued non-zero autocorrelation sum and good crosscorrelation sum}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {649--663}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00692-w}, doi = {10.1007/S12095-023-00692-W}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ShenZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SinghM24, author = {Harshdeep Singh and Kapish Chand Meena}, title = {{MDS} multi-twisted Reed-Solomon codes with small dimensional hull}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {557--578}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00688-6}, doi = {10.1007/S12095-023-00688-6}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SinghM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Steiner24, author = {Matthias Johann Steiner}, title = {A lower bound for differential uniformity by multiplicative complexity {\&} bijective functions of multiplicative complexity 1 over finite fields}, journal = {Cryptogr. Commun.}, volume = {16}, number = {2}, pages = {285--308}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00661-3}, doi = {10.1007/S12095-023-00661-3}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Steiner24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TekinGOBG24, author = {Eda Tekin and Oliver Wilhelm Gnilke and Ferruh {\"{O}}zbudak and Bernhard Bl{\"{u}}mich and Marcus Greferath}, title = {Almost perfect autocorrelation sequences with small number of pauses for applications in magnetic resonance}, journal = {Cryptogr. Commun.}, volume = {16}, number = {1}, pages = {109--127}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00659-x}, doi = {10.1007/S12095-023-00659-X}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/TekinGOBG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangDLZ24, author = {Xiaoqiang Wang and Cunsheng Ding and Hongwei Liu and Dabin Zheng}, title = {{MDS} constacyclic codes of length q + 1 over GF(q)}, journal = {Cryptogr. Commun.}, volume = {16}, number = {1}, pages = {21--48}, year = {2024}, url = {https://doi.org/10.1007/s12095-022-00624-0}, doi = {10.1007/S12095-022-00624-0}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/WangDLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangK24, author = {Xiang Wang and Elena V. Konstantinova}, title = {The sequence reconstruction problem for permutations with the Hamming distance}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {1033--1057}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00717-y}, doi = {10.1007/S12095-024-00717-Y}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangTQ24, author = {Xiao{-}Juan Wang and Tian Tian and Wen{-}Feng Qi}, title = {{GL-S-NFSR:} {A} new {NFSR} structure and its period properties}, journal = {Cryptogr. Commun.}, volume = {16}, number = {4}, pages = {679--698}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00694-2}, doi = {10.1007/S12095-024-00694-2}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangTQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangYTY24, author = {Zheng Wang and Zhifan Ye and Chunming Tang and Yang Yang}, title = {New construction of optimal {ZCZ} sequence sets with inter-set zero cross-correlation zone}, journal = {Cryptogr. Commun.}, volume = {16}, number = {1}, pages = {209--228}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00685-9}, doi = {10.1007/S12095-023-00685-9}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/WangYTY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WuLCL24, author = {Xia Wu and Wei Lu and Xiwang Cao and Gaojun Luo}, title = {Minimal linear codes constructed from partial spreads}, journal = {Cryptogr. Commun.}, volume = {16}, number = {3}, pages = {601--611}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00689-5}, doi = {10.1007/S12095-023-00689-5}, timestamp = {Sun, 05 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WuLCL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WuZLL24, author = {Tingting Wu and Shixin Zhu and Li Liu and Lanqiang Li}, title = {Optimal quinary cyclic codes with three zeros}, journal = {Cryptogr. Commun.}, volume = {16}, number = {4}, pages = {801--823}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00703-4}, doi = {10.1007/S12095-024-00703-4}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WuZLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XiaoC24, author = {Hongyang Xiao and Xiwang Cao}, title = {New constructions of mutually orthogonal complementary sets and Z-complementary code sets based on extended Boolean functions}, journal = {Cryptogr. Commun.}, volume = {16}, number = {1}, pages = {167--184}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00673-z}, doi = {10.1007/S12095-023-00673-Z}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XiaoC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XiaoC24a, author = {Hongyang Xiao and Xiwang Cao}, title = {Sequences with ideal auto-correlation derived from group actions}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {909--920}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00710-5}, doi = {10.1007/S12095-024-00710-5}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XiaoC24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XuXTQ24, author = {Zhichao Xu and Hong Xu and Lin Tan and Wen{-}Feng Qi}, title = {New linear approximation of modular addition and improved differential-linear cryptanalysis of {SPARX-64/128}}, journal = {Cryptogr. Commun.}, volume = {16}, number = {5}, pages = {921--947}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00708-z}, doi = {10.1007/S12095-024-00708-Z}, timestamp = {Tue, 10 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XuXTQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XueWC24, author = {Erzhong Xue and Zilong Wang and Jinjin Chai}, title = {Boolean functions of binary Type-II and Type-III/II complementary array pairs}, journal = {Cryptogr. Commun.}, volume = {16}, number = {4}, pages = {843--855}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00701-6}, doi = {10.1007/S12095-024-00701-6}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XueWC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YangLFYR24, author = {Ruipan Yang and Ruihu Li and Qiang Fu and Sen Yang and Yi Rao}, title = {On locality of binary distance-optimal codes}, journal = {Cryptogr. Commun.}, volume = {16}, number = {1}, pages = {49--69}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00626-6}, doi = {10.1007/S12095-023-00626-6}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/YangLFYR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YilmazgucCM24, author = {G{\"{u}}ls{\"{u}}m G{\"{o}}zde Yilmazg{\"{u}}{\c{c}} and Javier de la Cruz and Edgar Mart{\'{\i}}nez{-}Moro}, title = {Abelian and consta-Abelian polyadic codes over affine algebras with a finite commutative chain coefficient ring}, journal = {Cryptogr. Commun.}, volume = {16}, number = {4}, pages = {889--907}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00707-0}, doi = {10.1007/S12095-024-00707-0}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/YilmazgucCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhangC24, author = {Hanglong Zhang and Xiwang Cao}, title = {On the parameters of some {LCD} {BCH} codes over {\textdollar}{\textbackslash}mathbb \{F\}{\_}q{\textdollar} with length (q\({}^{\mbox{m+1)/{\(\lambda\)}}}\)}, journal = {Cryptogr. Commun.}, volume = {16}, number = {4}, pages = {745--765}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00697-z}, doi = {10.1007/S12095-024-00697-Z}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhangC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhaoST24, author = {Jinghui Zhao and Xiuling Shan and Zihong Tian}, title = {Combinatorial constructions of repairable ramp schemes}, journal = {Cryptogr. Commun.}, volume = {16}, number = {4}, pages = {699--719}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00695-1}, doi = {10.1007/S12095-024-00695-1}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhaoST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhuL24, author = {Canze Zhu and Qunying Liao}, title = {The [1, 0]-twisted generalized Reed-Solomon code}, journal = {Cryptogr. Commun.}, volume = {16}, number = {4}, pages = {857--878}, year = {2024}, url = {https://doi.org/10.1007/s12095-024-00704-3}, doi = {10.1007/S12095-024-00704-3}, timestamp = {Tue, 02 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhuL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZidaricMGA24, author = {Nusa Zidaric and Kalikinkar Mandal and Guang Gong and Mark D. Aagaard}, title = {The welch-gong stream cipher - evolutionary path}, journal = {Cryptogr. Commun.}, volume = {16}, number = {1}, pages = {129--165}, year = {2024}, url = {https://doi.org/10.1007/s12095-023-00656-0}, doi = {10.1007/S12095-023-00656-0}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZidaricMGA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AbdollahiBJKPS23, author = {Alireza Abdollahi and Javad Bagherian and Fatemeh Jafari and Maryam Khatami and Farzad Parvaresh and Reza Sobhani}, title = {New upper bounds on the size of permutation codes under Kendall {\(\tau\)}-metric}, journal = {Cryptogr. Commun.}, volume = {15}, number = {5}, pages = {891--903}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00642-6}, doi = {10.1007/S12095-023-00642-6}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AbdollahiBJKPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AbdukhalikovH23, author = {Kanat Abdukhalikov and Duy Ho}, title = {Hyperbent functions from hyperovals}, journal = {Cryptogr. Commun.}, volume = {15}, number = {5}, pages = {1031--1048}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00668-w}, doi = {10.1007/S12095-023-00668-W}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AbdukhalikovH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AnbarKM23, author = {Nurdag{\"{u}}l Anbar and Tekg{\"{u}}l Kalayci and Wilfried Meidl}, title = {On generalized spread bent partitions}, journal = {Cryptogr. Commun.}, volume = {15}, number = {6}, pages = {1217--1234}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00670-2}, doi = {10.1007/S12095-023-00670-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/AnbarKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BasakMPR23, author = {Jyotirmoy Basak and Subhamoy Maitra and Prabal Paul and Animesh Roy}, title = {Analysis of boolean functions related to binary input binary output two-party nonlocal games}, journal = {Cryptogr. Commun.}, volume = {15}, number = {5}, pages = {861--890}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00648-0}, doi = {10.1007/S12095-023-00648-0}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BasakMPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BishnoiK23, author = {Monika Bishnoi and Pankaj Kumar}, title = {Weight enumerators of some irreducible cyclic codes of odd length}, journal = {Cryptogr. Commun.}, volume = {15}, number = {4}, pages = {795--809}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00637-3}, doi = {10.1007/S12095-023-00637-3}, timestamp = {Sun, 25 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BishnoiK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BoudineLC23, author = {Brahim Boudine and Jamal Laaouine and Mohammed Elhassani Charkani}, title = {On the classification of ideals over R[X]/{\unicode{12296}}f(X)\({}^{\mbox{p\({}^{\mbox{s}}\)}}\){\unicode{12297}} when R={\(\mathbb{F}\)}\({}_{\mbox{p\{m\}}}\)+u{\(\mathbb{F}\)}\({}_{\mbox{p\{m\}}}\)+{\textbackslash}ldots +u\{n\}{\(\mathbb{F}\)}\({}_{\mbox{p\{m\}}}\)}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {589--598}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00620-4}, doi = {10.1007/S12095-022-00620-4}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BoudineLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanCHM23, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Wilfried Meidl}, title = {Editorial: Special issue on Boolean functions and their applications 2022}, journal = {Cryptogr. Commun.}, volume = {15}, number = {6}, pages = {1049--1051}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00678-8}, doi = {10.1007/S12095-023-00678-8}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanCHM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanIK23, author = {Lilya Budaghyan and Ivana Ivkovic and Nikolay S. Kaleyski}, title = {Triplicate functions}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {35--83}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00587-2}, doi = {10.1007/S12095-022-00587-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanIK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CaliskanAL23, author = {Basri {\c{C}}aliskan and Nuh Aydin and Peihan Liu}, title = {Skew cyclic codes over {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{4\}+u{\textbackslash}mathbb \{Z\}{\_}\{4\}+v{\textbackslash}mathbb \{Z\}{\_}\{4\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {15}, number = {4}, pages = {845--858}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00645-3}, doi = {10.1007/S12095-023-00645-3}, timestamp = {Sun, 25 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CaliskanAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChenC23, author = {Li{-}An Chen and Robert S. Coulter}, title = {Bounds on the differential uniformity of the Wan-Lidl polynomials}, journal = {Cryptogr. Commun.}, volume = {15}, number = {6}, pages = {1069--1085}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00634-6}, doi = {10.1007/S12095-023-00634-6}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ChenC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChenM23, author = {Ruikai Chen and Sihem Mesnager}, title = {Evaluation of weil sums for some polynomials and associated quadratic forms}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {661--673}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00628-4}, doi = {10.1007/S12095-023-00628-4}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChenM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChoiGKO23, author = {Whan{-}Hyuk Choi and Cem G{\"{u}}neri and Jon{-}Lark Kim and Ferruh {\"{O}}zbudak}, title = {Optimal Binary Linear Complementary Pairs of Codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {469--486}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00612-4}, doi = {10.1007/S12095-022-00612-4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ChoiGKO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Datta23, author = {Somantika Datta}, title = {Welch bound equality sets with few distinct inner products from Delsarte-Goethals sets}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {719--729}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00635-5}, doi = {10.1007/S12095-023-00635-5}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Datta23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DebnathPI23, author = {Indibar Debnath and Om Prakash and Habibul Islam}, title = {Galois hulls of constacyclic codes over finite fields}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {111--127}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00591-6}, doi = {10.1007/S12095-022-00591-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DebnathPI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DebnathPI23a, author = {Indibar Debnath and Om Prakash and Habibul Islam}, title = {Correction to: Galois hulls of constacyclic codes over finite fields}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {129--130}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00602-6}, doi = {10.1007/S12095-022-00602-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DebnathPI23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DinhBAPUBC23, author = {Hai Q. Dinh and Tushar Bag and Kanat Abdukhalikov and Sachin Pathak and Ashish Kumar Upadhyay and Ramakrishna Bandi and Warattaya Chinnakum}, title = {On a class of skew constacyclic codes over mixed alphabets and applications in constructing optimal and quantum codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {171--198}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00594-3}, doi = {10.1007/S12095-022-00594-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DinhBAPUBC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DinhYBPU23, author = {Hai Q. Dinh and Bhanu Pratap Yadav and Tushar Bag and Daniel Panario and Ashish Kumar Upadhyay}, title = {Self-dual and {LCD} double circulant and double negacirculant codes over a family of finite rings {\textdollar} {\textbackslash}mathbb \{F\}{\_}\{q\}[v{\_}\{1\}, v{\_}\{2\},{\textbackslash}dots ,v{\_}\{t\}]{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {529--551}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00616-0}, doi = {10.1007/S12095-022-00616-0}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DinhYBPU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DjurasevicJMP23, author = {Marko Djurasevic and Domagoj Jakobovic and Luca Mariot and Stjepan Picek}, title = {A survey of metaheuristic algorithms for the design of cryptographic Boolean functions}, journal = {Cryptogr. Commun.}, volume = {15}, number = {6}, pages = {1171--1197}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00662-2}, doi = {10.1007/S12095-023-00662-2}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/DjurasevicJMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GhoshMP23, author = {Gobinda Ghosh and Sudhan Majhi and Subhabrata Paul}, title = {Construction of Optimal Binary Z-Complementary Code Sets with New Lengths Using Generalized Boolean Function}, journal = {Cryptogr. Commun.}, volume = {15}, number = {5}, pages = {979--993}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00658-y}, doi = {10.1007/S12095-023-00658-Y}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GhoshMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GillotL23, author = {Val{\'{e}}rie Gillot and Philippe Langevin}, title = {Classification of some cosets of the Reed-Muller code}, journal = {Cryptogr. Commun.}, volume = {15}, number = {6}, pages = {1129--1137}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00652-4}, doi = {10.1007/S12095-023-00652-4}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/GillotL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GongW23, author = {Guang Gong and Z. L. Wang}, title = {Status of three classes of sequences}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {257--308}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00585-4}, doi = {10.1007/S12095-022-00585-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GongW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuZAF23, author = {Zhi Gu and Zhengchun Zhou and Avik Ranjan Adhikary and Pingzhi Fan}, title = {Two-dimensional Golay complementary array pairs with flexible size and large zero correlation zone}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {709--717}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00633-7}, doi = {10.1007/S12095-023-00633-7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuZAF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuoLLS23, author = {Guanmin Guo and Ruihu Li and Yang Liu and Hao Song}, title = {Duality of generalized twisted Reed-Solomon codes and Hermitian self-dual {MDS} or {NMDS} codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {383--395}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00605-3}, doi = {10.1007/S12095-022-00605-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuoLLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuoMW23, author = {Qian Guo and Erik M{\aa}rtensson and Paul Stankovski Wagner}, title = {Modeling and simulating the sample complexity of solving {LWE} using BKW-style algorithms}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {331--350}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00597-0}, doi = {10.1007/S12095-022-00597-0}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuoMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HebbornLU23, author = {Phil Hebborn and Gregor Leander and Aleksei Udovenko}, title = {Mathematical aspects of division property}, journal = {Cryptogr. Commun.}, volume = {15}, number = {4}, pages = {731--774}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00622-2}, doi = {10.1007/S12095-022-00622-2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HebbornLU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HongC23, author = {Xiaoqin Hong and Xiwang Cao}, title = {Generalized block inserting for constructing new constant dimension codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {1--15}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00590-7}, doi = {10.1007/S12095-022-00590-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HongC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HuangYL23, author = {Daitao Huang and Qin Yue and Fengwei Li}, title = {Two classes of quasi-cyclic codes via irreducible polynomials}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {649--659}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00629-3}, doi = {10.1007/S12095-023-00629-3}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HuangYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HuangYN23, author = {Daitao Huang and Qin Yue and Yongfeng Niu}, title = {{MDS} or {NMDS} {LCD} codes from twisted Reed-Solomon codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {221--237}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00564-9}, doi = {10.1007/S12095-022-00564-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HuangYN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Ishizuka23, author = {Keita Ishizuka}, title = {Construction of quaternary Hermitian {LCD} codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {455--467}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00614-2}, doi = {10.1007/S12095-022-00614-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Ishizuka23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KaleyskiNS23, author = {Nikolay S. Kaleyski and Kjetil Nesheim and Pantelimon Stanica}, title = {An infinite family of 0-APN monomials with two parameters}, journal = {Cryptogr. Commun.}, volume = {15}, number = {6}, pages = {1139--1169}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00651-5}, doi = {10.1007/S12095-023-00651-5}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/KaleyskiNS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KalginI23, author = {Konstantin Kalgin and Valeriya Idrisova}, title = {The classification of quadratic {APN} functions in 7 variables and combinatorial approaches to search for {APN} functions}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {239--256}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00588-1}, doi = {10.1007/S12095-022-00588-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KalginI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Kavut23, author = {Sel{\c{c}}uk Kavut}, title = {Improved cryptographic properties of Boolean functions obtained from the neighbourhood of Patterson-Wiedemann functions}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {433--442}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00610-6}, doi = {10.1007/S12095-022-00610-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Kavut23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KumarSMP23, author = {Praveen Kumar and Palash Sarkar and Sudhan Majhi and Subhabrata Paul}, title = {A direct construction of even length ZCPs with large {ZCZ} ratio}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {85--94}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00589-0}, doi = {10.1007/S12095-022-00589-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KumarSMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiCLL23, author = {Fagang Li and Hao Chen and Huimin Lao and Shanxiang Lyu}, title = {New upper bounds and constructions of multi-erasure locally recoverable codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {513--528}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00618-y}, doi = {10.1007/S12095-022-00618-Y}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiCLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiH23, author = {Xiaoru Li and Ziling Heng}, title = {A construction of optimal locally recoverable codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {553--563}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00619-x}, doi = {10.1007/S12095-022-00619-X}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiKPZ23, author = {Yanjun Li and Haibin Kan and Jie Peng and Lijing Zheng}, title = {Cryptographic functions with interesting properties from CCZ-equivalence}, journal = {Cryptogr. Commun.}, volume = {15}, number = {4}, pages = {831--844}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00646-2}, doi = {10.1007/S12095-023-00646-2}, timestamp = {Sun, 25 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiKPZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiZL23, author = {Yang Li and Shixin Zhu and Ping Li}, title = {On {MDS} codes with galois hulls of arbitrary dimensions}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {565--587}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00621-3}, doi = {10.1007/S12095-022-00621-3}, timestamp = {Wed, 11 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiZSY23, author = {Min Li and Yajing Zhou and Wei Su and Yang Yang}, title = {Constructions of almost complementary pairs based on non-standard Golay sequences}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {95--110}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00555-w}, doi = {10.1007/S12095-022-00555-W}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiZSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Maouche23, author = {Youcef Maouche}, title = {Symbol-pair weight distribution of some irreducible cyclic codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {209--220}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00599-y}, doi = {10.1007/S12095-022-00599-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Maouche23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MellaMD23, author = {Silvia Mella and Alireza Mehrdad and Joan Daemen}, title = {Differential and Linear properties of vectorial boolean functions based on chi}, journal = {Cryptogr. Commun.}, volume = {15}, number = {6}, pages = {1087--1116}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00639-1}, doi = {10.1007/S12095-023-00639-1}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/MellaMD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Milshtein23, author = {Moshe Milshtein}, title = {A new binary (17,4,5) constant weight code}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {443--453}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00611-5}, doi = {10.1007/S12095-022-00611-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Milshtein23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Milshtein23a, author = {Moshe Milshtein}, title = {Correction: {A} new binary (17,4,5) constant weight code}, journal = {Cryptogr. Commun.}, volume = {15}, number = {4}, pages = {859}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00638-2}, doi = {10.1007/S12095-023-00638-2}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Milshtein23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Nyberg23, author = {Kaisa Nyberg}, title = {Modifications of bijective S-Boxes with linear structures}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {617--625}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00631-9}, doi = {10.1007/S12095-023-00631-9}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Nyberg23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/OzbudakT23, author = {Ferruh {\"{O}}zbudak and Burcu G{\"{u}}lmez Tem{\"{u}}r}, title = {Complete characterization of some permutation polynomials of the form x\({}^{\mbox{r}}\)(1+ax\({}^{\mbox{s\({}_{\mbox{1}}\)(q-1)}}\)+bx\({}^{\mbox{s\({}_{\mbox{2}}\)(q-1)}}\)) over {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{q2\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {15}, number = {4}, pages = {775--793}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00641-7}, doi = {10.1007/S12095-023-00641-7}, timestamp = {Sun, 25 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/OzbudakT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PanarioPS23, author = {Daniel Panario and Lucas Pandolfo Perin and Brett Stevens}, title = {Comparing balanced sequences obtained from ElGamal function to random balanced sequences}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {675--707}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00623-1}, doi = {10.1007/S12095-022-00623-1}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PanarioPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Petrides23, author = {George Petrides}, title = {On decompositions of permutation polynomials into quadratic and cubic power permutations}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {199--207}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00600-8}, doi = {10.1007/S12095-022-00600-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Petrides23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/QuanYLL23, author = {Xiaoshan Quan and Qin Yue and Xia Li and Chengju Li}, title = {Two classes of 2-weight and 3-weight linear codes in terms of Kloosterman sums}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {365--380}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00604-4}, doi = {10.1007/S12095-022-00604-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/QuanYLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/QuanYLL23a, author = {Xiaoshan Quan and Qin Yue and Xia Li and Chengju Li}, title = {Correction: Two classes of 2-weight and 3-weight linear codes in terms of Kloosterman sums}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {381}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00608-0}, doi = {10.1007/S12095-022-00608-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/QuanYLL23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RaiG23, author = {Amritanshu Rai and Rohit Gupta}, title = {Further results on a class of permutation trinomials}, journal = {Cryptogr. Commun.}, volume = {15}, number = {4}, pages = {811--820}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00640-8}, doi = {10.1007/S12095-023-00640-8}, timestamp = {Thu, 12 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RaiG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RodierCF23, author = {Fran{\c{c}}ois Rodier and Florian Caullery and Eric F{\'{e}}rard}, title = {Distribution of the autocorrelation of random Boolean functions}, journal = {Cryptogr. Commun.}, volume = {15}, number = {5}, pages = {995--1009}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00653-3}, doi = {10.1007/S12095-023-00653-3}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RodierCF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RodriguezWP23, author = {Ren{\'{e}} Rodr{\'{\i}}guez and Yongzhuang Wei and Enes Pasalic}, title = {A theoretical analysis of generalized invariants of bijective S-boxes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {487--512}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00615-1}, doi = {10.1007/S12095-022-00615-1}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RodriguezWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SagarS23, author = {Vidya Sagar and Ritumoni Sarma}, title = {Octanary linear codes using simplicial complexes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {599--616}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00617-z}, doi = {10.1007/S12095-022-00617-Z}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SagarS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SalageanO23, author = {Ana Salagean and Ferruh {\"{O}}zbudak}, title = {Further constructions and characterizations of generalized almost perfect nonlinear functions}, journal = {Cryptogr. Commun.}, volume = {15}, number = {6}, pages = {1117--1127}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00647-1}, doi = {10.1007/S12095-023-00647-1}, timestamp = {Wed, 15 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/SalageanO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SalageanR23, author = {Ana Salagean and Percy Reyes{-}Paredes}, title = {Probabilistic estimation of the algebraic degree of Boolean functions}, journal = {Cryptogr. Commun.}, volume = {15}, number = {6}, pages = {1199--1215}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00660-4}, doi = {10.1007/S12095-023-00660-4}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/SalageanR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Shallit23, author = {Jeffrey O. Shallit}, title = {Note on a Fibonacci parity sequence}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {309--315}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00592-5}, doi = {10.1007/S12095-022-00592-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Shallit23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SharmaS23, author = {Sandeep Sharma and Anuradha Sharma}, title = {Multi-twisted additive codes over finite fields are asymptotically good}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {17--33}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00583-6}, doi = {10.1007/S12095-022-00583-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SharmaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShiPZL23, author = {Chenmiao Shi and Jie Peng and Lijing Zheng and Shihao Lu}, title = {On the equivalence between a new family of {APN} quadrinomials and the power {APN} functions}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {351--363}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00606-2}, doi = {10.1007/S12095-022-00606-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ShiPZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Subroto23, author = {Robert Christian Subroto}, title = {An algebraic approach to symmetric linear layers in cryptographic primitives}, journal = {Cryptogr. Commun.}, volume = {15}, number = {6}, pages = {1053--1067}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00630-w}, doi = {10.1007/S12095-023-00630-W}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/Subroto23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SuiYS23, author = {Junzhen Sui and Qin Yue and Fuqing Sun}, title = {New constructions of self-dual codes via twisted generalized Reed-Solomon codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {5}, pages = {959--978}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00644-4}, doi = {10.1007/S12095-023-00644-4}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SuiYS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Taniguchi23, author = {Hiroaki Taniguchi}, title = {D-property for {APN} functions from {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{2\}\{n\}{\textdollar} to {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{2\}\{n+1\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {15}, number = {3}, pages = {627--647}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00627-5}, doi = {10.1007/S12095-023-00627-5}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Taniguchi23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TiwariS23, author = {Sampada Tiwari and Deepmala Sharma}, title = {On higher order nonlinearities of Boolean functions}, journal = {Cryptogr. Commun.}, volume = {15}, number = {4}, pages = {821--830}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00643-5}, doi = {10.1007/S12095-023-00643-5}, timestamp = {Sun, 25 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TiwariS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TorresR23, author = {Jaziel Torres and Ivelisse Rubio}, title = {Circular Costas maps: {A} multidimensional analog of circular Costas sequences}, journal = {Cryptogr. Commun.}, volume = {15}, number = {5}, pages = {941--958}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00654-2}, doi = {10.1007/S12095-023-00654-2}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TorresR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/VegaH23, author = {Gerardo Vega and F{\'{e}}lix Hern{\'{a}}ndez}, title = {The complete weight distribution of a subclass of optimal three-weight cyclic codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {317--330}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00601-7}, doi = {10.1007/S12095-022-00601-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/VegaH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Wang23, author = {Xiang Wang}, title = {Reconstruction of permutations distorted by single Kendall {\(\tau\)}-errors}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {131--144}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00595-2}, doi = {10.1007/S12095-022-00595-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Wang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangKSZ23, author = {Yu Wang and Xiaoshan Kai and Zhonghua Sun and Shixin Zhu}, title = {Hermitian dual-containing constacyclic codes over {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{q\{2\}\}+\{v{\_}\{1\}\}{\textbackslash}mathbb \{F\}{\_}\{q\{2\}\}+{\textbackslash}cdots +\{v{\_}\{r\}\}{\textbackslash}mathbb \{F\}{\_}\{q\{2\}\}{\textdollar} and new quantum codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {145--158}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00593-4}, doi = {10.1007/S12095-022-00593-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangKSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangL23, author = {Jiabo Wang and Cong Ling}, title = {Polar coding for Ring-LWE-based public key encryption}, journal = {Cryptogr. Commun.}, volume = {15}, number = {2}, pages = {397--431}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00607-1}, doi = {10.1007/S12095-022-00607-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XieOM23, author = {Xianhong Xie and Yi Ouyang and Ming Mao}, title = {Vectorial bent functions and linear codes from quadratic forms}, journal = {Cryptogr. Commun.}, volume = {15}, number = {5}, pages = {1011--1029}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00664-0}, doi = {10.1007/S12095-023-00664-0}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XieOM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YangXZ23, author = {Zhiye Yang and Zibi Xiao and Xiangyong Zeng}, title = {Linear complexity and trace representation of balanced quaternary cyclotomic sequences of prime period p}, journal = {Cryptogr. Commun.}, volume = {15}, number = {5}, pages = {921--940}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00649-z}, doi = {10.1007/S12095-023-00649-Z}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/YangXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YinXF23, author = {Wenjuan Yin and Can Xiang and Fang{-}Wei Fu}, title = {New frequency-hopping sequence sets with good parameters under aperiodic hamming correlation}, journal = {Cryptogr. Commun.}, volume = {15}, number = {1}, pages = {159--169}, year = {2023}, url = {https://doi.org/10.1007/s12095-022-00596-1}, doi = {10.1007/S12095-022-00596-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/YinXF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhouKZ23, author = {Yajing Zhou and Xiaoshan Kai and Shixin Zhu}, title = {Two classes of ternary {LCD} constacyclic {BCH} codes}, journal = {Cryptogr. Commun.}, volume = {15}, number = {5}, pages = {905--919}, year = {2023}, url = {https://doi.org/10.1007/s12095-023-00655-1}, doi = {10.1007/S12095-023-00655-1}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhouKZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AllahmadiAHMOS22, author = {Adel Allahmadi and Ahmad Alkenani and Rola Hijazi and Najat M. Muthana and Ferruh {\"{O}}zbudak and Patrick Sol{\'{e}}}, title = {New constructions of entanglement-assisted quantum codes}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {15--37}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00499-7}, doi = {10.1007/S12095-021-00499-7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/AllahmadiAHMOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AllahmadiAHMOS22a, author = {Adel Allahmadi and Ahmad Alkenani and Rola Hijazi and Najat M. Muthana and Ferruh {\"{O}}zbudak and Patrick Sol{\'{e}}}, title = {Correction to: New constructions of entanglement-assisted quantum codes}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {39}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00532-9}, doi = {10.1007/S12095-021-00532-9}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/AllahmadiAHMOS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AnupindiM22, author = {Vishnupriya Anupindi and L{\'{a}}szl{\'{o}} M{\'{e}}rai}, title = {Linear complexity of some sequences derived from hyperelliptic curves of genus 2}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {117--134}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00521-y}, doi = {10.1007/S12095-021-00521-Y}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/AnupindiM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ArayaH22, author = {Makoto Araya and Masaaki Harada}, title = {On the classification of quaternary optimal Hermitian {LCD} codes}, journal = {Cryptogr. Commun.}, volume = {14}, number = {4}, pages = {833--847}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00552-5}, doi = {10.1007/S12095-021-00552-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ArayaH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BapicPZH22, author = {Amar Bapic and Enes Pasalic and Fengrong Zhang and Samir Hodzic}, title = {Constructing new superclasses of bent functions from known ones}, journal = {Cryptogr. Commun.}, volume = {14}, number = {6}, pages = {1229--1256}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00566-7}, doi = {10.1007/S12095-022-00566-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BapicPZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BarberoSY22, author = {{\'{A}}ngela I. Barbero and Vitaly Skachek and {\O}yvind Ytrehus}, title = {Preface of special issue on coding theory and applications}, journal = {Cryptogr. Commun.}, volume = {14}, number = {3}, pages = {503}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00560-z}, doi = {10.1007/S12095-022-00560-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BarberoSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BartoliCRS22, author = {Daniele Bartoli and Marco Calderini and Constanza Riera and Pantelimon Stanica}, title = {Low c-differential uniformity for functions modified on subfields}, journal = {Cryptogr. Commun.}, volume = {14}, number = {6}, pages = {1211--1227}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00554-x}, doi = {10.1007/S12095-022-00554-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BartoliCRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BartoliT22, author = {Daniele Bartoli and Marco Timpanella}, title = {On a conjecture on {APN} permutations}, journal = {Cryptogr. Commun.}, volume = {14}, number = {4}, pages = {925--931}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00558-7}, doi = {10.1007/S12095-022-00558-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BartoliT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BouzaraGM22, author = {Reguia Lamia Bouzara and Kenza Guenda and Edgar Mart{\'{\i}}nez{-}Moro}, title = {Lifted codes and lattices from codes over finite chain rings}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {1009--1020}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00568-5}, doi = {10.1007/S12095-022-00568-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BouzaraGM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanCDH22, author = {Lilya Budaghyan and Claude Carlet and Cunsheng Ding and Tor Helleseth}, title = {Editorial: Special issue on Boolean functions and their applications 2021}, journal = {Cryptogr. Commun.}, volume = {14}, number = {6}, pages = {1207--1209}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00609-z}, doi = {10.1007/S12095-022-00609-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanCDH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanKRS22, author = {Lilya Budaghyan and Nikolay S. Kaleyski and Constanza Riera and Pantelimon Stanica}, title = {On the behavior of some {APN} permutations under swapping points}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {319--345}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00520-z}, doi = {10.1007/S12095-021-00520-Z}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanKRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CaoCLW22, author = {Yuan Cao and Yonglin Cao and San Ling and Guidong Wang}, title = {On the construction of self-dual cyclic codes over {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{4\}{\textdollar} with arbitrary even length}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {1117--1143}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00579-2}, doi = {10.1007/S12095-022-00579-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CaoCLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChaseL22, author = {Benjamin Chase and Petr Lisonek}, title = {Construction of {APN} permutations via Walsh zero spaces}, journal = {Cryptogr. Commun.}, volume = {14}, number = {6}, pages = {1345--1357}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00580-9}, doi = {10.1007/S12095-022-00580-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChaseL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChenDN22, author = {Yu Long Chen and Avijit Dutta and Mridul Nandi}, title = {Multi-user {BBB} security of public permutations based {MAC}}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {1145--1177}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00571-w}, doi = {10.1007/S12095-022-00571-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChenDN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChirvasituC22, author = {Alexandru Chirvasitu and Thomas W. Cusick}, title = {Symbolic dynamics and rotation symmetric Boolean functions}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {1091--1115}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00563-w}, doi = {10.1007/S12095-022-00563-W}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChirvasituC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DhoogheN22, author = {Siemen Dhooghe and Svetla Nikova}, title = {Resilient uniformity: applying resiliency in masking}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {41--58}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00515-w}, doi = {10.1007/S12095-021-00515-W}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DhoogheN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DinhKS22, author = {Hai Q. Dinh and Narendra Kumar and Abhay Kumar Singh}, title = {A study of quantum codes obtained from cyclic codes over a non-chain ring}, journal = {Cryptogr. Commun.}, volume = {14}, number = {4}, pages = {909--923}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00567-6}, doi = {10.1007/S12095-022-00567-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DinhKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/EddahmaniM22, author = {Said Eddahmani and Sihem Mesnager}, title = {Explicit values of the DDT, the BCT, the FBCT, and the {FBDT} of the inverse, the gold, and the Bracken-Leander S-boxes}, journal = {Cryptogr. Commun.}, volume = {14}, number = {6}, pages = {1301--1344}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00581-8}, doi = {10.1007/S12095-022-00581-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/EddahmaniM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/EdemskiyS22, author = {Vladimir Edemskiy and Yuhua Sun}, title = {The symmetric 2-adic complexity of sequences with optimal autocorrelation magnitude and length 8q}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {183--199}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00503-0}, doi = {10.1007/S12095-021-00503-0}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/EdemskiyS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/EdemskiyS22a, author = {Vladimir Edemskiy and Nikita Sokolovskiy}, title = {The estimate of the linear complexity of generalized cyclotomic binary and quaternary sequences with periods p\({}^{\mbox{n}}\) and 2p\({}^{\mbox{n}}\)}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {395--414}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00534-7}, doi = {10.1007/S12095-021-00534-7}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/EdemskiyS22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FangJLM22, author = {Xiaolei Fang and Renjie Jin and Jinquan Luo and Wen Ma}, title = {New Galois Hulls of {GRS} Codes and Application to EAQECCs}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {145--159}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00525-8}, doi = {10.1007/S12095-021-00525-8}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/FangJLM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FangZXF22, author = {Weijun Fang and Jun Zhang and Shu{-}Tao Xia and Fang{-}Wei Fu}, title = {New constructions of self-dual generalized Reed-Solomon codes}, journal = {Cryptogr. Commun.}, volume = {14}, number = {3}, pages = {677--690}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00549-0}, doi = {10.1007/S12095-021-00549-0}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/FangZXF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FigueiredoL22, author = {Ravi B. D. Figueiredo and Juliano B. Lima}, title = {Tangent-chebyshev maps over finite fields: New properties and functional graphs}, journal = {Cryptogr. Commun.}, volume = {14}, number = {4}, pages = {897--908}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00565-8}, doi = {10.1007/S12095-022-00565-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/FigueiredoL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuZMP22, author = {Zhi Gu and Zhengchun Zhou and Sihem Mesnager and Udaya Parampalli}, title = {A new family of polyphase sequences with low correlation}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {135--144}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00522-x}, doi = {10.1007/S12095-021-00522-X}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuZMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Gutierrez22, author = {Jaime Gutierrez}, title = {Attacking the linear congruential generator on elliptic curves via lattice techniques}, journal = {Cryptogr. Commun.}, volume = {14}, number = {3}, pages = {505--525}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00535-6}, doi = {10.1007/S12095-021-00535-6}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Gutierrez22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HasanPS22, author = {Sartaj Ul Hasan and Mohit Pal and Pantelimon Stanica}, title = {The binary Gold function and its c-boomerang connectivity table}, journal = {Cryptogr. Commun.}, volume = {14}, number = {6}, pages = {1257--1280}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00573-8}, doi = {10.1007/S12095-022-00573-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HasanPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HuangFF22, author = {Ziteng Huang and Weijun Fang and Fang{-}Wei Fu}, title = {Linear {\(\mathscr{l}\)}-intersection pairs of {MDS} codes and their applications to AEAQECCs}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {1189--1206}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00582-7}, doi = {10.1007/S12095-022-00582-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HuangFF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/IslamP22, author = {Habibul Islam and Om Prakash}, title = {Construction of {LCD} and new quantum codes from cyclic codes over a finite non-chain ring}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {59--73}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00516-9}, doi = {10.1007/S12095-021-00516-9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/IslamP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/IzadiKRS22, author = {Maryam Izadi and Arezoo Soufi Karbaski and Rashid Rezaei and Karim Samei}, title = {Isodual codes over {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{q\}{\textdollar} from a multiplier}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {973--982}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00561-y}, doi = {10.1007/S12095-022-00561-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/IzadiKRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JeonBKKK22, author = {Yongjin Jeon and Seungjun Baek and Hangi Kim and Giyoon Kim and Jongsung Kim}, title = {Differential uniformity and linearity of S-boxes by multiplicative complexity}, journal = {Cryptogr. Commun.}, volume = {14}, number = {4}, pages = {849--874}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00547-2}, doi = {10.1007/S12095-021-00547-2}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/JeonBKKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JiangLLQ22, author = {Sha Jiang and Kangquan Li and Yubo Li and Longjiang Qu}, title = {Differential and boomerang spectrums of some power permutations}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {371--393}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00530-x}, doi = {10.1007/S12095-021-00530-X}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/JiangLLQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KadirLZ22, author = {Wrya K. Kadir and Chunlei Li and Ferdinando Zullo}, title = {Encoding and decoding of several optimal rank metric codes}, journal = {Cryptogr. Commun.}, volume = {14}, number = {6}, pages = {1281--1300}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00578-3}, doi = {10.1007/S12095-022-00578-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KadirLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Kaleyski22, author = {Nikolay S. Kaleyski}, title = {Deciding EA-equivalence via invariants}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {271--290}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00513-y}, doi = {10.1007/S12095-021-00513-Y}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Kaleyski22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Kim22, author = {Boran Kim}, title = {Quantum codes from one-point codes on norm-trace curves}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {1179--1188}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00586-3}, doi = {10.1007/S12095-022-00586-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Kim22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KimMCL22, author = {Kwang Ho Kim and Sihem Mesnager and Jong Hyok Choe and Dok Nam Lee}, title = {Preimages of p -Linearized Polynomials over {\textdollar}\{{\textbackslash}mathbb \{F\}\}{\_}\{p\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {75--86}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00514-x}, doi = {10.1007/S12095-021-00514-X}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/KimMCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KoseO22, author = {Seyda K{\"{o}}se and Ferruh {\"{O}}zbudak}, title = {Factorization of some polynomials over finite local commutative rings and applications to certain self-dual and {LCD} codes}, journal = {Cryptogr. Commun.}, volume = {14}, number = {4}, pages = {933--948}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00557-8}, doi = {10.1007/S12095-022-00557-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KoseO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KudinPCZ22, author = {Sadmir Kudin and Enes Pasalic and Nastja Cepak and Fengrong Zhang}, title = {Permutations without linear structures inducing bent functions outside the completed Maiorana-McFarland class}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {101--116}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00523-w}, doi = {10.1007/S12095-021-00523-W}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/KudinPCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KumarB22, author = {Raj Kumar and Maheshanand Bhaintwal}, title = {Repeated root cyclic codes over {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{p\{2\}\}+u{\textbackslash}mathbb \{Z\}{\_}\{p\{2\}\}{\textdollar} and their Lee distances}, journal = {Cryptogr. Commun.}, volume = {14}, number = {3}, pages = {551--577}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00540-9}, doi = {10.1007/S12095-021-00540-9}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KumarB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KumarM22, author = {Ajeet Kumar and Subhamoy Maitra}, title = {Resolvable block designs in construction of approximate real MUBs that are sparse}, journal = {Cryptogr. Commun.}, volume = {14}, number = {3}, pages = {527--549}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00537-4}, doi = {10.1007/S12095-021-00537-4}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KumarM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LaoCT22, author = {Huimin Lao and Hao Chen and Xiaoqing Tan}, title = {New constant dimension subspace codes from block inserting constructions}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {87--99}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00524-9}, doi = {10.1007/S12095-021-00524-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LaoCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Li22, author = {Fengwei Li}, title = {The Hermitian dual-containing {LCD} {BCH} codes and related quantum codes}, journal = {Cryptogr. Commun.}, volume = {14}, number = {3}, pages = {579--596}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00543-6}, doi = {10.1007/S12095-021-00543-6}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Li22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiLSW22, author = {Haitao Li and Yang Liu and Ming Su and Gang Wang}, title = {Jump and hop randomness tests for binary sequences}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {483--502}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00538-3}, doi = {10.1007/S12095-021-00538-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiLSW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiLYZ22, author = {Fulin Li and Yang Liu and Jiayun Yan and Shixin Zhu}, title = {A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {1039--1053}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00576-5}, doi = {10.1007/S12095-022-00576-5}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiLYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiYT22, author = {Xia Li and Qin Yue and Deng Tang}, title = {The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic}, journal = {Cryptogr. Commun.}, volume = {14}, number = {3}, pages = {653--662}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00544-5}, doi = {10.1007/S12095-021-00544-5}, timestamp = {Fri, 20 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiangMW22, author = {Huicong Liang and Sihem Mesnager and Meiqin Wang}, title = {Cryptanalysis of the {AEAD} and hash algorithm DryGASCON}, journal = {Cryptogr. Commun.}, volume = {14}, number = {3}, pages = {597--625}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00542-7}, doi = {10.1007/S12095-021-00542-7}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiangMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiuC22, author = {Yan Liu and Xiwang Cao}, title = {A class of affine-invariant codes and their support 2-designs}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {215--227}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00506-x}, doi = {10.1007/S12095-021-00506-X}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/LiuC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiuHZZ22, author = {Xing Liu and Shaofang Hong and Qi Zeng and Limengnan Zhou}, title = {{NHZ} frequency hopping sequence sets under aperiodic Hamming correlation: Tighter bound and optimal constructions}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {347--356}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00527-6}, doi = {10.1007/S12095-021-00527-6}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiuHZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiuWY22, author = {Kaiqiang Liu and Qi Wang and Haode Yan}, title = {A class of binary cyclic codes with optimal parameters}, journal = {Cryptogr. Commun.}, volume = {14}, number = {3}, pages = {663--675}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00548-1}, doi = {10.1007/S12095-021-00548-1}, timestamp = {Mon, 27 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiuWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Meidl22, author = {Wilfried Meidl}, title = {A survey on p-ary and generalized bent functions}, journal = {Cryptogr. Commun.}, volume = {14}, number = {4}, pages = {737--782}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00570-x}, doi = {10.1007/S12095-022-00570-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Meidl22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MeraiW22, author = {L{\'{a}}szl{\'{o}} M{\'{e}}rai and Arne Winterhof}, title = {Pseudorandom sequences derived from automatic sequences}, journal = {Cryptogr. Commun.}, volume = {14}, number = {4}, pages = {783--815}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00556-9}, doi = {10.1007/S12095-022-00556-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MeraiW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MesnagerMM22, author = {Sihem Mesnager and Bimal Mandal and Mounira Msahli}, title = {Survey on recent trends towards generalized differential and boomerang uniformities}, journal = {Cryptogr. Commun.}, volume = {14}, number = {4}, pages = {691--735}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00551-6}, doi = {10.1007/S12095-021-00551-6}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MesnagerMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MesnagerSLZ22, author = {Sihem Mesnager and Sihong Su and Jingjing Li and Linya Zhu}, title = {Concrete constructions of weightwise perfectly balanced (2-rotation symmetric) functions with optimal algebraic immunity and high weightwise nonlinearity}, journal = {Cryptogr. Commun.}, volume = {14}, number = {6}, pages = {1371--1389}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00603-5}, doi = {10.1007/S12095-022-00603-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MesnagerSLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/NiuYH22, author = {Yongfeng Niu and Qin Yue and Daitao Huang}, title = {New constant dimension subspace codes from parallel linkage construction and multilevel construction}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {201--214}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00504-z}, doi = {10.1007/S12095-021-00504-Z}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/NiuYH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PatelPI22, author = {Shikha Patel and Om Prakash and Habibul Islam}, title = {Cyclic codes over {\textdollar}M{\_}4 ({\textbackslash}mathbb \{F\}{\_}2+u{\textbackslash}mathbb \{F\}{\_}2){\textdollar}}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {1021--1034}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00572-9}, doi = {10.1007/S12095-022-00572-9}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PatelPI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PatelPI22a, author = {Shikha Patel and Om Prakash and Habibul Islam}, title = {Correction to: Cyclic codes over {\textdollar}M{\_}\{4\} ({\textbackslash}mathbb \{F\}{\_}\{2\}+u{\textbackslash}mathbb \{F\}{\_}\{2\}){\textdollar}}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {1035--1037}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00584-5}, doi = {10.1007/S12095-022-00584-5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PatelPI22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Petrides22, author = {George Petrides}, title = {A number theoretic view on binary shift registers}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {1067--1080}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00562-x}, doi = {10.1007/S12095-022-00562-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Petrides22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SainiG22, author = {Kezia Saini and Manish Garg}, title = {On the higher-order nonlinearity of a Boolean bent function class (Constructed via Niho power functions)}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {1055--1066}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00574-7}, doi = {10.1007/S12095-022-00574-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SainiG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SalageanS22, author = {Ana Salagean and Pantelimon Stanica}, title = {Improving bounds on probabilistic affine tests to estimate the nonlinearity of Boolean functions}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {459--481}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00529-4}, doi = {10.1007/S12095-021-00529-4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SalageanS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShenYFZ22, author = {Bingsheng Shen and Yang Yang and Pingzhi Fan and Zhengchun Zhou}, title = {New z-complementary/complementary sequence sets with non-power-of-two length and low {PAPR}}, journal = {Cryptogr. Commun.}, volume = {14}, number = {4}, pages = {817--832}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00550-7}, doi = {10.1007/S12095-021-00550-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ShenYFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShiLKS22, author = {Minjia Shi and Shitao Li and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {{LCD} and {ACD} codes over a noncommutative non-unital ring with four elements}, journal = {Cryptogr. Commun.}, volume = {14}, number = {3}, pages = {627--640}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00545-4}, doi = {10.1007/S12095-021-00545-4}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ShiLKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Sok22, author = {Lin Sok}, title = {{MDS} linear codes with one-dimensional hull}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {949--971}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00559-6}, doi = {10.1007/S12095-022-00559-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Sok22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SunSLF22, author = {Lei Sun and Zexia Shi and Jian Liu and Fang{-}Wei Fu}, title = {Results on the nonexistence of bent-negabent rotation symmetric Boolean functions}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {999--1008}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00575-6}, doi = {10.1007/S12095-022-00575-6}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/SunSLF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/VielhaberCC22, author = {Michael Vielhaber and M{\'{o}}nica del Pilar Canales Chacon and Sergio Jara Ceballos}, title = {Rational complexity of binary sequences, F{\(\mathbb{Q}\)}SRs, and pseudo-ultrametric continued fractions in {\(\mathbb{R}\)}}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {433--457}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00539-2}, doi = {10.1007/S12095-021-00539-2}, timestamp = {Fri, 13 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/VielhaberCC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WanL22, author = {Qianhong Wan and Chao Li}, title = {On equivalence between two known families of {APN} polynomial functions and {APN} power functions}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {161--182}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00533-8}, doi = {10.1007/S12095-021-00533-8}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/WanL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangC22, author = {Dandan Wang and Xiwang Cao}, title = {A family of optimal ternary cyclic codes with minimum distance five and their duals}, journal = {Cryptogr. Commun.}, volume = {14}, number = {1}, pages = {1--13}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00493-z}, doi = {10.1007/S12095-021-00493-Z}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/WangC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WuLC22, author = {Xia Wu and Wei Lu and Xiwang Cao}, title = {Minimal linear codes constructed from functions}, journal = {Cryptogr. Commun.}, volume = {14}, number = {4}, pages = {875--895}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00553-4}, doi = {10.1007/S12095-021-00553-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WuLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Xiang22, author = {Can Xiang}, title = {Some t-designs from {BCH} codes}, journal = {Cryptogr. Commun.}, volume = {14}, number = {3}, pages = {641--652}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00546-3}, doi = {10.1007/S12095-021-00546-3}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Xiang22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Xu22, author = {Shanding Xu}, title = {Optimal frequency-hopping sequences based on the decimated m-sequences}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {983--998}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00569-4}, doi = {10.1007/S12095-022-00569-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Xu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XuD22, author = {Heqian Xu and Wei Du}, title = {Hermitian {LCD} codes over {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{q\{2\}\}+u {\textbackslash}mathbb \{F\}{\_}\{q\{2\}\}{\textdollar} and their applications to maximal entanglement EAQECCs}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {259--269}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00510-1}, doi = {10.1007/S12095-021-00510-1}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XuD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XuQL22, author = {Guangkui Xu and Longjiang Qu and Gaojun Luo}, title = {Minimal linear codes from weakly regular bent functions}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {415--431}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00519-6}, doi = {10.1007/S12095-021-00519-6}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XuQL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Yan22, author = {Haode Yan}, title = {On {(-} 1)-differential uniformity of ternary {APN} power functions}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {357--369}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00526-7}, doi = {10.1007/S12095-021-00526-7}, timestamp = {Sat, 19 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/Yan22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YanL22, author = {Haode Yan and Zhen Li}, title = {A note on the differential spectrum of a class of power mappings with Niho exponent}, journal = {Cryptogr. Commun.}, volume = {14}, number = {5}, pages = {1081--1089}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00577-4}, doi = {10.1007/S12095-022-00577-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/YanL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YaoP22, author = {Ge Yao and Udaya Parampalli}, title = {Improved transformation algorithms for generalized Galois NLFSRs}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {229--258}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00500-3}, doi = {10.1007/S12095-021-00500-3}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/YaoP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YuP22, author = {Yuyin Yu and L{\'{e}}o Perrin}, title = {Constructing more quadratic {APN} functions with the {QAM} method}, journal = {Cryptogr. Commun.}, volume = {14}, number = {6}, pages = {1359--1369}, year = {2022}, url = {https://doi.org/10.1007/s12095-022-00598-z}, doi = {10.1007/S12095-022-00598-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/YuP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhouLHW22, author = {Limengnan Zhou and Xing Liu and Hongyu Han and ChangYuan Wang}, title = {Classes of optimal low-hit-zone frequency-hopping sequence sets with new parameters}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {291--306}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00518-7}, doi = {10.1007/S12095-021-00518-7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ZhouLHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhouW22, author = {Limengnan Zhou and Hanzhou Wu}, title = {Multi-party watermark embedding with frequency-hopping sequences}, journal = {Cryptogr. Commun.}, volume = {14}, number = {2}, pages = {307--318}, year = {2022}, url = {https://doi.org/10.1007/s12095-021-00517-8}, doi = {10.1007/S12095-021-00517-8}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhouW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AksoyC21, author = {Refia Aksoy and Fatma {\c{C}}aliskan}, title = {Self-dual codes over {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{2\} {\textbackslash}times ({\textbackslash}mathbb \{F\}{\_}\{2\}+v{\textbackslash}mathbb \{F\}{\_}\{2\}){\textdollar}}, journal = {Cryptogr. Commun.}, volume = {13}, number = {1}, pages = {129--141}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00461-z}, doi = {10.1007/S12095-020-00461-Z}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/AksoyC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AksoyC21a, author = {Refia Aksoy and Fatma {\c{C}}aliskan}, title = {Correction to: Self-dual codes over {\textdollar} \{{\textbackslash}mathbbm\{F\}\}{\_}2{\textbackslash}times {\textbackslash}left(\{{\textbackslash}mathbbm\{F\}\}{\_}2+v\{{\textbackslash}mathbbm\{F\}\}{\_}2{\textbackslash}right) {\textdollar}}, journal = {Cryptogr. Commun.}, volume = {13}, number = {2}, pages = {361--362}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00464-w}, doi = {10.1007/S12095-020-00464-W}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AksoyC21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AnbarK21, author = {Nurdag{\"{u}}l Anbar and Canan Kasikci}, title = {Permutations polynomials of the form G(X)\({}^{\mbox{k}}\) - {L(X)} and curves over finite fields}, journal = {Cryptogr. Commun.}, volume = {13}, number = {2}, pages = {283--294}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00465-9}, doi = {10.1007/S12095-020-00465-9}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AnbarK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ArasuGZ21, author = {K. T. Arasu and Daniel M. Gordon and Yiran Zhang}, title = {New nonexistence results on circulant weighing matrices}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {775--789}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00492-0}, doi = {10.1007/S12095-021-00492-0}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ArasuGZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AubryBM21, author = {Yves Aubry and Pierre Barth{\'{e}}l{\'{e}}my and Nadia El Mrabet}, title = {Special issue from mathematics to embedded devices}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {475--477}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00502-1}, doi = {10.1007/S12095-021-00502-1}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AubryBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BalletBD21, author = {St{\'{e}}phane Ballet and Alexis Bonnecaze and Thanh{-}Hung Dang}, title = {Optimization of the scalar complexity of Chudnovsky\({}^{\mbox{2}}\) multiplication algorithms in finite fields}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {495--517}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00494-y}, doi = {10.1007/S12095-021-00494-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BalletBD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BartoliBG21, author = {Daniele Bartoli and Matteo Bonini and Bur{\c{c}}in G{\"{u}}nes}, title = {An inductive construction of minimal codes}, journal = {Cryptogr. Commun.}, volume = {13}, number = {3}, pages = {439--449}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00474-2}, doi = {10.1007/S12095-021-00474-2}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BartoliBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BenerjeeDG21, author = {Krishna Gopal Benerjee and Sourav Deb and Manish K. Gupta}, title = {On conflict free {DNA} codes}, journal = {Cryptogr. Commun.}, volume = {13}, number = {1}, pages = {143--171}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00459-7}, doi = {10.1007/S12095-020-00459-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BenerjeeDG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BiswasS21, author = {Aniruddha Biswas and Palash Sarkar}, title = {Separation results for boolean function classes}, journal = {Cryptogr. Commun.}, volume = {13}, number = {3}, pages = {451--458}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00488-w}, doi = {10.1007/S12095-021-00488-W}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BiswasS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BordageL21, author = {Sarah Bordage and Julien Lavauzelle}, title = {On the privacy of a code-based single-server computational {PIR} scheme}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {519--526}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00477-z}, doi = {10.1007/S12095-021-00477-Z}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BordageL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BouyuklievBMP21, author = {Iliya Bouyukliev and Stefka Bouyuklieva and Tatsuya Maruta and Paskal Piperkov}, title = {Characteristic vector and weight distribution of a linear code}, journal = {Cryptogr. Commun.}, volume = {13}, number = {2}, pages = {263--282}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00458-8}, doi = {10.1007/S12095-020-00458-8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/BouyuklievBMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanCHN21, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth and Kaisa Nyberg}, title = {Editorial: Special issue on Boolean functions and their applications 2020}, journal = {Cryptogr. Commun.}, volume = {13}, number = {6}, pages = {887--889}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00536-5}, doi = {10.1007/S12095-021-00536-5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanCHN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChaseL21, author = {Benjamin Chase and Petr Lisonek}, title = {Kim-type {APN} functions are affine equivalent to Gold functions}, journal = {Cryptogr. Commun.}, volume = {13}, number = {6}, pages = {981--993}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00490-2}, doi = {10.1007/S12095-021-00490-2}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ChaseL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChathelyD21, author = {Briji J. Chathely and Rajendra P. Deore}, title = {Construction of binary Hadamard codes and their s-PD sets}, journal = {Cryptogr. Commun.}, volume = {13}, number = {3}, pages = {425--438}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00471-5}, doi = {10.1007/S12095-021-00471-5}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChathelyD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChengGD21, author = {Wei Cheng and Sylvain Guilley and Jean{-}Luc Danger}, title = {Categorizing all linear codes of {IPM} over {\textdollar}\{{\textbackslash}mathbb \{F\}\}{\_}\{2\{8\}\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {527--542}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00483-1}, doi = {10.1007/S12095-021-00483-1}, timestamp = {Fri, 11 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ChengGD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DingLM21, author = {Jian Ding and Changlu Lin and Sihem Mesnager}, title = {Secret sharing schemes based on the dual of Golay codes}, journal = {Cryptogr. Commun.}, volume = {13}, number = {6}, pages = {1025--1041}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00531-w}, doi = {10.1007/S12095-021-00531-W}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/DingLM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DingT21, author = {Cunsheng Ding and Chunming Tang}, title = {The linear codes of t-designs held in the Reed-Muller and Simplex codes}, journal = {Cryptogr. Commun.}, volume = {13}, number = {6}, pages = {927--949}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00470-6}, doi = {10.1007/S12095-021-00470-6}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/DingT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DoughertyGKS21, author = {Steven T. Dougherty and Joe Gildea and Adrian Korban and Serap Sahinkaya}, title = {G-codes, self-dual G-codes and reversible G-codes over the ring {\textdollar}\{{\textbackslash}mathscr\{B\}\}{\_}\{j, k\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {601--616}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00487-x}, doi = {10.1007/S12095-021-00487-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DoughertyGKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FanMWLCW21, author = {Yanhong Fan and Sihem Mesnager and Weijia Wang and Yongqing Li and Tingting Cui and Meiqin Wang}, title = {Investigation for 8-bit SKINNY-like S-boxes, analysis and applications}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {617--636}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00486-y}, doi = {10.1007/S12095-021-00486-Y}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/FanMWLCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FangLL21, author = {Xiaolei Fang and Meiqing Liu and Jinquan Luo}, title = {On Euclidean Hulls of {MDS} Codes}, journal = {Cryptogr. Commun.}, volume = {13}, number = {1}, pages = {1--14}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00428-0}, doi = {10.1007/S12095-020-00428-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/FangLL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FarajG21, author = {Mustafa Faraj and Catherine H. Gebotys}, title = {Quiescent photonics side channel analysis: Low cost {SRAM} readout attack}, journal = {Cryptogr. Commun.}, volume = {13}, number = {3}, pages = {363--376}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00469-5}, doi = {10.1007/S12095-020-00469-5}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/FarajG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GologluP21, author = {Faruk G{\"{o}}loglu and Jir{\'{\i}} Pavlu}, title = {On CCZ-inequivalence of some families of almost perfect nonlinear functions to permutations}, journal = {Cryptogr. Commun.}, volume = {13}, number = {3}, pages = {377--391}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00476-0}, doi = {10.1007/S12095-021-00476-0}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GologluP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HeW21, author = {Zhiwen He and Jiejing Wen}, title = {Linear codes of 2-designs as subcodes of the generalized Reed-Muller codes}, journal = {Cryptogr. Commun.}, volume = {13}, number = {3}, pages = {407--423}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00472-4}, doi = {10.1007/S12095-021-00472-4}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HeW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Hou21, author = {Xiang{-}dong Hou}, title = {A power sum formula by Carlitz and its applications to permutation rational functions of finite fields}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {681--694}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00495-x}, doi = {10.1007/S12095-021-00495-X}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/Hou21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HuczynskaJN21, author = {Sophie Huczynska and Christopher Jefferson and Silvia Nepsinsk{\'{a}}}, title = {Strong external difference families in abelian and non-abelian groups}, journal = {Cryptogr. Commun.}, volume = {13}, number = {2}, pages = {331--341}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00473-3}, doi = {10.1007/S12095-021-00473-3}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HuczynskaJN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JametPS21, author = {Damien Jamet and Pierre Popoli and Thomas Stoll}, title = {Maximum order complexity of the sum of digits function in Zeckendorf base and polynomial subsequences}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {791--814}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00507-w}, doi = {10.1007/S12095-021-00507-W}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/JametPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JinDSF21, author = {Wengang Jin and Xiaoni Du and Yanzhong Sun and Cuiling Fan}, title = {Boolean functions with six-valued Walsh spectra and their application}, journal = {Cryptogr. Commun.}, volume = {13}, number = {3}, pages = {393--405}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00484-0}, doi = {10.1007/S12095-021-00484-0}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/JinDSF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Kaleyski21, author = {Nikolay S. Kaleyski}, title = {Invariants for {EA-} and CCZ-equivalence of {APN} and {AB} functions}, journal = {Cryptogr. Commun.}, volume = {13}, number = {6}, pages = {995--1023}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00541-8}, doi = {10.1007/S12095-021-00541-8}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/Kaleyski21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Kolomeec21, author = {Nikolay Kolomeec}, title = {Some general properties of modified bent functions through addition of indicator functions}, journal = {Cryptogr. Commun.}, volume = {13}, number = {6}, pages = {909--926}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00528-5}, doi = {10.1007/S12095-021-00528-5}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/Kolomeec21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KolschS21, author = {Lukas K{\"{o}}lsch and Robert Sch{\"{u}}ler}, title = {Formal self duality}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {815--836}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00508-9}, doi = {10.1007/S12095-021-00508-9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/KolschS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Koshelev21, author = {Dmitrii I. Koshelev}, title = {Hashing to elliptic curves of j-invariant 1728}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {479--494}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00478-y}, doi = {10.1007/S12095-021-00478-Y}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/Koshelev21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KumarK21, author = {Pavan Kumar and Noor Mohammad Khan}, title = {A class of linear codes with their complete weight enumerators over finite fields}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {695--725}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00496-w}, doi = {10.1007/S12095-021-00496-W}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/KumarK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KumarMM21, author = {Ajeet Kumar and Subhamoy Maitra and Chandra Sekhar Mukherjee}, title = {On approximate real mutually unbiased bases in square dimension}, journal = {Cryptogr. Commun.}, volume = {13}, number = {2}, pages = {321--329}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00468-6}, doi = {10.1007/S12095-020-00468-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KumarMM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LandryLP21, author = {Simon Landry and Yanis Linge and Emmanuel Prouff}, title = {Monomial evaluation of polynomial functions protected by threshold implementations - with an illustration on {AES} -}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {543--572}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00497-9}, doi = {10.1007/S12095-021-00497-9}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LandryLP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiLMQ21, author = {Yubo Li and Kangquan Li and Sihem Mesnager and Longjiang Qu}, title = {More permutations and involutions for constructing bent functions}, journal = {Cryptogr. Commun.}, volume = {13}, number = {3}, pages = {459--473}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00482-2}, doi = {10.1007/S12095-021-00482-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiLMQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiuLLAZ21, author = {Chen Liu and Shuaijun Liu and Xianfu Lei and Avik Ranjan Adhikary and Zhengchun Zhou}, title = {Three-phase Z-complementary triads and almost complementary triads}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {763--773}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00509-8}, doi = {10.1007/S12095-021-00509-8}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiuLLAZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LvLY21, author = {Jingjie Lv and Ruihu Li and Yu Yao}, title = {Quasi-cyclic constructions of asymmetric quantum error-correcting codes}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {661--680}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00489-9}, doi = {10.1007/S12095-021-00489-9}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/LvLY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MaGLF21, author = {Fanghui Ma and Jian Gao and Juan Li and Fang{-}Wei Fu}, title = {({\(\sigma\)}, {\(\delta\)})-Skew quasi-cyclic codes over the ring {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{4\}+u{\textbackslash}mathbb \{Z\}{\_}\{4\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {13}, number = {2}, pages = {307--320}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00467-7}, doi = {10.1007/S12095-020-00467-7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MaGLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MaL21, author = {Junru Ma and Jinquan Luo}, title = {On symbol-pair weight distribution of {MDS} codes and simplex codes over finite fields}, journal = {Cryptogr. Commun.}, volume = {13}, number = {1}, pages = {101--115}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00455-x}, doi = {10.1007/S12095-020-00455-X}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/MaL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MaitiC21, author = {Swapan Maiti and Dipanwita Roy Chowdhury}, title = {Design of fault-resilient S-boxes for AES-like block ciphers}, journal = {Cryptogr. Commun.}, volume = {13}, number = {1}, pages = {71--100}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00452-0}, doi = {10.1007/S12095-020-00452-0}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MaitiC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Meaux21, author = {Pierrick M{\'{e}}aux}, title = {On the fast algebraic immunity of threshold functions}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {741--762}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00505-y}, doi = {10.1007/S12095-021-00505-Y}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Meaux21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MesnagerS21, author = {Sihem Mesnager and Sihong Su}, title = {On constructions of weightwise perfectly balanced Boolean functions}, journal = {Cryptogr. Commun.}, volume = {13}, number = {6}, pages = {951--979}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00481-3}, doi = {10.1007/S12095-021-00481-3}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/MesnagerS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MominBS21, author = {Charles Momin and Olivier Bronchain and Fran{\c{c}}ois{-}Xavier Standaert}, title = {A stealthy Hardware Trojan based on a Statistical Fault Attack}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {587--600}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00480-4}, doi = {10.1007/S12095-021-00480-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MominBS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/OtalT21, author = {Kamil Otal and Eda Tekin}, title = {Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {837--845}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00512-z}, doi = {10.1007/S12095-021-00512-Z}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/OtalT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/OuytselBCS21, author = {Charles{-}Henry Bertrand Van Ouytsel and Olivier Bronchain and Ga{\"{e}}tan Cassiers and Fran{\c{c}}ois{-}Xavier Standaert}, title = {How to fool a black box machine learning based side-channel security evaluation}, journal = {Cryptogr. Commun.}, volume = {13}, number = {4}, pages = {573--585}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00479-x}, doi = {10.1007/S12095-021-00479-X}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/OuytselBCS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PasalicRZW21, author = {Enes Pasalic and Ren{\'{e}} Rodr{\'{\i}}guez and Fengrong Zhang and Yongzhuang Wei}, title = {Several classes of minimal binary linear codes violating the Ashikhmin-Barg bound}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {637--659}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00491-1}, doi = {10.1007/S12095-021-00491-1}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PasalicRZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/QianCM21, author = {Liqin Qian and Xiwang Cao and Sihem Mesnager}, title = {Linear codes with one-dimensional hull associated with Gaussian sums}, journal = {Cryptogr. Commun.}, volume = {13}, number = {2}, pages = {225--243}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00462-y}, doi = {10.1007/S12095-020-00462-Y}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/QianCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RegaLD21, author = {B. Rega and Z. H. Liu and C. Durairajan}, title = {The t-wise intersection and trellis of relative four-weight codes}, journal = {Cryptogr. Commun.}, volume = {13}, number = {2}, pages = {197--223}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00456-w}, doi = {10.1007/S12095-020-00456-W}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RegaLD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShaoM21, author = {Minfeng Shao and Ying Miao}, title = {Algebraic manipulation detection codes via highly nonlinear functions}, journal = {Cryptogr. Commun.}, volume = {13}, number = {1}, pages = {53--69}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00453-z}, doi = {10.1007/S12095-020-00453-Z}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ShaoM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShiYH21, author = {Xiaoping Shi and Qin Yue and Xinmei Huang}, title = {Quantum synchronizable codes from the Whiteman's generalized cyclotomy}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {727--739}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00501-2}, doi = {10.1007/S12095-021-00501-2}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ShiYH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SriwirachK21, author = {Wateekorn Sriwirach and Chakkrid Klin{-}Eam}, title = {Repeated-root constacyclic codes of length 2p\({}^{\mbox{s}}\) over {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{p\{m\}\}+u{\textbackslash}mathbb \{F\}{\_}\{p\{m\}\}+u\{2\}{\textbackslash}mathbb \{F\}{\_}\{p\{m\}\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {13}, number = {1}, pages = {27--52}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00450-2}, doi = {10.1007/S12095-020-00450-2}, timestamp = {Wed, 09 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/SriwirachK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/StanicaG21, author = {Pantelimon Stanica and Aaron Geary}, title = {The c-differential behavior of the inverse function under the EA-equivalence}, journal = {Cryptogr. Commun.}, volume = {13}, number = {2}, pages = {295--306}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00466-8}, doi = {10.1007/S12095-020-00466-8}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/StanicaG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/StanicaRT21, author = {Pantelimon Stanica and Constanza Riera and Anton Tkachenko}, title = {Characters, Weil sums and c-differential uniformity with an application to the perturbed Gold function}, journal = {Cryptogr. Commun.}, volume = {13}, number = {6}, pages = {891--907}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00485-z}, doi = {10.1007/S12095-021-00485-Z}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/StanicaRT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangZZ21, author = {Xiaoqiang Wang and Dabin Zheng and Yan Zhang}, title = {A class of subfield codes of linear codes and their duals}, journal = {Cryptogr. Commun.}, volume = {13}, number = {1}, pages = {173--196}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00460-0}, doi = {10.1007/S12095-020-00460-0}, timestamp = {Fri, 23 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XiangY21, author = {Can Xiang and Wenjuan Yin}, title = {Two families of subfield codes with a few weights}, journal = {Cryptogr. Commun.}, volume = {13}, number = {1}, pages = {117--127}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00457-9}, doi = {10.1007/S12095-020-00457-9}, timestamp = {Wed, 27 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/XiangY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XiaoZ21, author = {Zibi Xiao and Xiangyong Zeng}, title = {2-Adic complexity of two constructions of binary sequences with period 4N and optimal autocorrelation magnitude}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {865--885}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00498-8}, doi = {10.1007/S12095-021-00498-8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/XiaoZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YanYL21, author = {Ming Yan and Tongjiang Yan and Yu Li}, title = {Computing the 2-adic complexity of two classes of Ding-Helleseth generalized cyclotomic sequences of periods of twin prime products}, journal = {Cryptogr. Commun.}, volume = {13}, number = {1}, pages = {15--26}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00451-1}, doi = {10.1007/S12095-020-00451-1}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/YanYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YaoP21, author = {Ge Yao and Udaya Parampalli}, title = {Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers}, journal = {Cryptogr. Commun.}, volume = {13}, number = {5}, pages = {847--864}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00511-0}, doi = {10.1007/S12095-021-00511-0}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/YaoP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhangC21, author = {He Zhang and Xiwang Cao}, title = {Further constructions of cyclic subspace codes}, journal = {Cryptogr. Commun.}, volume = {13}, number = {2}, pages = {245--262}, year = {2021}, url = {https://doi.org/10.1007/s12095-020-00463-x}, doi = {10.1007/S12095-020-00463-X}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ZhangC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhangHFZ21, author = {Jingwei Zhang and Chuangqiang Hu and Xiang Fan and Chang{-}An Zhao}, title = {Trace representation of the binary pq\({}^{\mbox{2}}\)-periodic sequences derived from Euler quotients}, journal = {Cryptogr. Commun.}, volume = {13}, number = {2}, pages = {343--359}, year = {2021}, url = {https://doi.org/10.1007/s12095-021-00475-1}, doi = {10.1007/S12095-021-00475-1}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhangHFZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AlahmadiGOSS20, author = {Adel Alahmadi and Cem G{\"{u}}neri and Buket {\"{O}}zkaya and Hatoon Shohaib and Patrick Sol{\'{e}}}, title = {On complementary dual multinegacirculant codes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {1}, pages = {101--113}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00364-8}, doi = {10.1007/S12095-019-00364-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AlahmadiGOSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AnbarKMT20, author = {Nurdag{\"{u}}l Anbar and Canan Kasikci and Wilfried Meidl and Alev Topuzoglu}, title = {Shifted plateaued functions and their differential properties}, journal = {Cryptogr. Commun.}, volume = {12}, number = {6}, pages = {1091--1105}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00426-2}, doi = {10.1007/S12095-020-00426-2}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/AnbarKMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ArayaH20, author = {Makoto Araya and Masaaki Harada}, title = {On the minimum weights of binary linear complementary dual codes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {2}, pages = {285--300}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00402-5}, doi = {10.1007/S12095-019-00402-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ArayaH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ArmarioF20, author = {Jos{\'{e}} Andr{\'{e}}s Armario and Dane L. Flannery}, title = {Almost supplementary difference sets and quaternary sequences with optimal autocorrelation}, journal = {Cryptogr. Commun.}, volume = {12}, number = {4}, pages = {757--768}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00418-x}, doi = {10.1007/S12095-019-00418-X}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ArmarioF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BeierleBU20, author = {Christof Beierle and Alex Biryukov and Aleksei Udovenko}, title = {On degree-d zero-sum sets of full rank}, journal = {Cryptogr. Commun.}, volume = {12}, number = {4}, pages = {685--710}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00415-0}, doi = {10.1007/S12095-019-00415-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BeierleBU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BeierleL20, author = {Christof Beierle and Gregor Leander}, title = {4-uniform permutations with null nonlinearity}, journal = {Cryptogr. Commun.}, volume = {12}, number = {6}, pages = {1133--1141}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00434-2}, doi = {10.1007/S12095-020-00434-2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/BeierleL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BenerjeeG20, author = {Krishna Gopal Benerjee and Manish K. Gupta}, title = {On non-uniform flower codes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {613--643}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00430-6}, doi = {10.1007/S12095-020-00430-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BenerjeeG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BorissovB20, author = {Yuri L. Borissov and Lyubomir Borissov}, title = {A note on the distinctness of some Kloosterman sums}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {1051--1056}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00443-1}, doi = {10.1007/S12095-020-00443-1}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BorissovB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanCV20, author = {Lilya Budaghyan and Marco Calderini and Irene Villa}, title = {On relations between {CCZ-} and EA-equivalences}, journal = {Cryptogr. Commun.}, volume = {12}, number = {1}, pages = {85--100}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00367-5}, doi = {10.1007/S12095-019-00367-5}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanCV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanH20, author = {Lilya Budaghyan and Tor Helleseth}, title = {Editorial: Special issue on Boolean functions and their applications}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {819--820}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00454-y}, doi = {10.1007/S12095-020-00454-Y}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanKKRS20, author = {Lilya Budaghyan and Nikolay S. Kaleyski and Soonhak Kwon and Constanza Riera and Pantelimon Stanica}, title = {Partially {APN} Boolean functions and classes of functions that are not {APN} infinitely often}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {527--545}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00372-8}, doi = {10.1007/S12095-019-00372-8}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanKKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Calderini20, author = {Marco Calderini}, title = {On the EA-classes of known {APN} functions in small dimensions}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {821--840}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00427-1}, doi = {10.1007/S12095-020-00427-1}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Calderini20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CalderiniV20, author = {Marco Calderini and Irene Villa}, title = {On the boomerang uniformity of some permutation polynomials}, journal = {Cryptogr. Commun.}, volume = {12}, number = {6}, pages = {1161--1178}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00439-x}, doi = {10.1007/S12095-020-00439-X}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CalderiniV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CalikTP20, author = {{\c{C}}agdas {\c{C}}alik and Meltem S{\"{o}}nmez Turan and Ren{\'{e}} Peralta}, title = {Boolean functions with multiplicative complexity 3 and 4}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {935--946}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00445-z}, doi = {10.1007/S12095-020-00445-Z}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/CalikTP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CaoC20, author = {Yuan Cao and Yonglin Cao}, title = {Complete classification for simple root cyclic codes over the local ring {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{4\}[v]/{\textbackslash}langle v\{2\}+2v{\textbackslash}rangle {\textdollar}}, journal = {Cryptogr. Commun.}, volume = {12}, number = {2}, pages = {301--319}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00403-4}, doi = {10.1007/S12095-019-00403-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CaoC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CaoCBF20, author = {Yuan Cao and Yonglin Cao and Ramakrishna Bandi and Fang{-}Wei Fu}, title = {Correcting mistakes in the paper "A mass formula for negacyclic codes of length 2\({}^{\mbox{k}}\) and some good negacyclic codes over {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{4\}+u{\textbackslash}mathbb \{Z\}{\_}\{4\}{\textdollar}" [Cryptogr. Commun. {(2017)} 9: 241-272]}, journal = {Cryptogr. Commun.}, volume = {12}, number = {6}, pages = {1107--1110}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00429-z}, doi = {10.1007/S12095-020-00429-Z}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CaoCBF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CaoLX20, author = {Xiwang Cao and Gaojun Luo and Guangkui Xu}, title = {Three deterministic constructions of compressed sensing matrices with low coherence}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {547--558}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00375-5}, doi = {10.1007/S12095-019-00375-5}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CaoLX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CesmeliogluMP20, author = {Ay{\c{c}}a {\c{C}}esmelioglu and Wilfried Meidl and Alexander Pott}, title = {Vectorial bent functions in odd characteristic and their components}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {899--912}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00444-0}, doi = {10.1007/S12095-020-00444-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CesmeliogluMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DingT20, author = {Cunsheng Ding and Chunming Tang}, title = {Combinatorial t-designs from special functions}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {1011--1033}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00442-2}, doi = {10.1007/S12095-020-00442-2}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/DingT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DoughertyGK20, author = {Steven T. Dougherty and Joseph Gildea and Abidin Kaya}, title = {Quadruple bordered constructions of self-dual codes from group rings}, journal = {Cryptogr. Commun.}, volume = {12}, number = {1}, pages = {127--146}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00380-8}, doi = {10.1007/S12095-019-00380-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DoughertyGK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Egan20, author = {Malcolm Egan}, title = {Properties of tight frames that are regular schemes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {499--510}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00378-2}, doi = {10.1007/S12095-019-00378-2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/Egan20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Felke20, author = {Patrick Felke}, title = {The multivariate method strikes again: New power functions with low differential uniformity in odd characteristic}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {841--857}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00437-z}, doi = {10.1007/S12095-020-00437-Z}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Felke20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GaoFF20, author = {Yun Gao and Weijun Fang and Fang{-}Wei Fu}, title = {On the algebraic structure of quasi-cyclic codes of index {\textdollar}1{\textbackslash}frac \{1\}\{2\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {12}, number = {1}, pages = {1--18}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-0352-7}, doi = {10.1007/S12095-019-0352-7}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/GaoFF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GildeaTKT20, author = {Joe Gildea and Rhian Taylor and Abidin Kaya and Alexander Tylyshchak}, title = {Double bordered constructions of self-dual codes from group rings over Frobenius rings}, journal = {Cryptogr. Commun.}, volume = {12}, number = {4}, pages = {769--784}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00420-3}, doi = {10.1007/S12095-019-00420-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GildeaTKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Gologlu20, author = {Faruk G{\"{o}}loglu}, title = {Inverse function is not component-wise uniform}, journal = {Cryptogr. Commun.}, volume = {12}, number = {6}, pages = {1179--1194}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00441-3}, doi = {10.1007/S12095-020-00441-3}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Gologlu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Gomez-PerezGT20, author = {Domingo G{\'{o}}mez{-}P{\'{e}}rez and Ana{-}Isabel G{\'{o}}mez and Andrew Z. Tirkel}, title = {Large families of sequences for CDMA, frequency hopping, and {UWB}}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {389--403}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00399-x}, doi = {10.1007/S12095-019-00399-X}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Gomez-PerezGT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuoLLW20, author = {Guanmin Guo and Ruihu Li and Yang Liu and Junli Wang}, title = {A family of negacyclic {BCH} codes of length {\textdollar}n={\textbackslash}frac \{q\{2m\}-1\}\{2\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {12}, number = {2}, pages = {187--203}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00387-1}, doi = {10.1007/S12095-019-00387-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuoLLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HanZZL20, author = {Hongyu Han and Sheng Zhang and LiMengNan Zhou and Xing Liu}, title = {Decimated m-sequences families with optimal partial Hamming correlation}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {405--413}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00400-7}, doi = {10.1007/S12095-019-00400-7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/HanZZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HellesethMZ20, author = {Tor Helleseth and Wai Ho Mow and Zhengchun Zhou}, title = {Editorial: Special issue on sequences and their applications 2018}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {321--323}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00433-3}, doi = {10.1007/S12095-020-00433-3}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HellesethMZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HuF20, author = {Liqin Hu and Keqin Feng}, title = {The minimum distance of new generalisations of the punctured binary Reed-Muller codes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {4}, pages = {795--808}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00421-2}, doi = {10.1007/S12095-019-00421-2}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HuF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JiangC20, author = {Jing Jiang and Minquan Cheng}, title = {Regular (k, R, 1)-packings with {\textdollar}{\textbackslash}max {\textbackslash}limits \{(R)\}=3{\textdollar} and their locally repairable codes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {6}, pages = {1071--1089}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00424-4}, doi = {10.1007/S12095-020-00424-4}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/JiangC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KadirL20, author = {Wrya K. Kadir and Chunlei Li}, title = {On decoding additive generalized twisted Gabidulin codes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {987--1009}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00449-9}, doi = {10.1007/S12095-020-00449-9}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KadirL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KalayciST20, author = {Tekg{\"{u}}l Kalayci and Henning Stichtenoth and Alev Topuzoglu}, title = {Permutation polynomials and factorization}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {913--934}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00446-y}, doi = {10.1007/S12095-020-00446-Y}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/KalayciST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Krengel20, author = {Evgeny I. Krengel}, title = {One construction of perfect ternary sequences}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {337--347}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00414-1}, doi = {10.1007/S12095-019-00414-1}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Krengel20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Kutsenko20, author = {Aleksandr Kutsenko}, title = {The group of automorphisms of the set of self-dual bent functions}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {881--898}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00438-y}, doi = {10.1007/S12095-020-00438-Y}, timestamp = {Sat, 19 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Kutsenko20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiFD20, author = {Xia Li and Cuiling Fan and Xiaoni Du}, title = {A family of distance-optimal minimal linear codes with flexible parameters}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {559--567}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00373-7}, doi = {10.1007/S12095-019-00373-7}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiFD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiM20, author = {Nian Li and Sihem Mesnager}, title = {Recent results and problems on constructions of linear codes from cryptographic functions}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {965--986}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00435-1}, doi = {10.1007/S12095-020-00435-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiP20, author = {Shuxing Li and Alexander Pott}, title = {A direct construction of primitive formally dual pairs having subsets with unequal sizes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {469--483}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00389-z}, doi = {10.1007/S12095-019-00389-Z}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiWMZ20, author = {Shuai Li and Lina Wang and Li Miao and Xianwei Zhou}, title = {Differential uniformity of the composition of two functions}, journal = {Cryptogr. Commun.}, volume = {12}, number = {2}, pages = {205--220}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00382-6}, doi = {10.1007/S12095-019-00382-6}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/LiWMZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiY20, author = {Chunlei Li and Yang Yang}, title = {On three conjectures of binary sequences with low odd-periodic autocorrelation}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {427--442}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00393-3}, doi = {10.1007/S12095-019-00393-3}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiYW20, author = {Fengwei Li and Qin Yue and Yansheng Wu}, title = {Designed distances and parameters of new {LCD} {BCH} codes over finite fields}, journal = {Cryptogr. Commun.}, volume = {12}, number = {1}, pages = {147--163}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00385-3}, doi = {10.1007/S12095-019-00385-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiYW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiYXP20, author = {Chengju Li and Qin Yue and Yongbo Xia and Wei Peng}, title = {A class of exponential sums and sequence families}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {569--584}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00368-4}, doi = {10.1007/S12095-019-00368-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiYXP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiuW20, author = {Zihui Liu and Jinliang Wang}, title = {Notes on generalized Hamming weights of some classes of binary codes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {4}, pages = {645--657}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00404-3}, doi = {10.1007/S12095-019-00404-3}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiuW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MedinaPRS20, author = {Luis A. Medina and Matthew Geoffrey Parker and Constanza Riera and Pantelimon Stanica}, title = {Root-Hadamard transforms and complementary sequences}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {1035--1049}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00440-4}, doi = {10.1007/S12095-020-00440-4}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MedinaPRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Mesnager20, author = {Sihem Mesnager}, title = {On generalized hyper-bent functions}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {455--468}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00390-6}, doi = {10.1007/S12095-019-00390-6}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Mesnager20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MesnagerKCLG20, author = {Sihem Mesnager and Kwang Ho Kim and Jong Hyok Choe and Dok Nam Lee and Dae Song Go}, title = {Solving x+x\({}^{\mbox{2\({}^{\mbox{l}}\)}}\)+... +x\({}^{\mbox{2\({}^{\mbox{ml}}\)}}\)=a over {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{2\{n\}\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {12}, number = {4}, pages = {809--817}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00425-3}, doi = {10.1007/S12095-020-00425-3}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MesnagerKCLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MesnagerKCT20, author = {Sihem Mesnager and Kwang Ho Kim and Junyop Choe and Chunming Tang}, title = {On the Menezes-Teske-Weng conjecture}, journal = {Cryptogr. Commun.}, volume = {12}, number = {1}, pages = {19--27}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00359-5}, doi = {10.1007/S12095-019-00359-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MesnagerKCT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MesnagerKJ20, author = {Sihem Mesnager and Kwang Ho Kim and Myong Song Jo}, title = {On the number of the rational zeros of linearized polynomials and the second-order nonlinearity of cubic Boolean functions}, journal = {Cryptogr. Commun.}, volume = {12}, number = {4}, pages = {659--674}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00410-5}, doi = {10.1007/S12095-019-00410-5}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MesnagerKJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Milshtein20, author = {Moshe Milshtein}, title = {A new two-error-correcting binary code of length 16}, journal = {Cryptogr. Commun.}, volume = {12}, number = {1}, pages = {71--75}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00365-7}, doi = {10.1007/S12095-019-00365-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Milshtein20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MusukwaS20, author = {Augustine Musukwa and Massimiliano Sala}, title = {On the linear structures of balanced functions and quadratic {APN} functions}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {859--880}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00431-5}, doi = {10.1007/S12095-020-00431-5}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/MusukwaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/NiuLQW20, author = {Tailin Niu and Kangquan Li and Longjiang Qu and Qiang Wang}, title = {New constructions of involutions over finite fields}, journal = {Cryptogr. Commun.}, volume = {12}, number = {2}, pages = {165--185}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00386-2}, doi = {10.1007/S12095-019-00386-2}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/NiuLQW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Ortiz-Ubarri20, author = {Jos{\'{e}} R. Ortiz{-}Ubarri}, title = {New asymptotically optimal three-dimensional wave-length/space/time optical orthogonal codes for {OCDMA} systems}, journal = {Cryptogr. Commun.}, volume = {12}, number = {4}, pages = {785--794}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00422-1}, doi = {10.1007/S12095-019-00422-1}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Ortiz-Ubarri20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/OzdenY20, author = {B{\"{u}}sra {\"{O}}zden and Oguz Yayla}, title = {Almost p-ary sequences}, journal = {Cryptogr. Commun.}, volume = {12}, number = {6}, pages = {1057--1069}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00423-5}, doi = {10.1007/S12095-020-00423-5}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/OzdenY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PangZK20, author = {Binbin Pang and Shixin Zhu and Xiaoshan Kai}, title = {Some new bounds on {LCD} codes over finite fields}, journal = {Cryptogr. Commun.}, volume = {12}, number = {4}, pages = {743--755}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00417-y}, doi = {10.1007/S12095-019-00417-Y}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PangZK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RadonjicV20, author = {Aleksandar Radonjic and Vladimir Vujicic}, title = {Integer codes correcting burst asymmetric within a byte and double asymmetric errors}, journal = {Cryptogr. Commun.}, volume = {12}, number = {2}, pages = {221--230}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00388-0}, doi = {10.1007/S12095-019-00388-0}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/RadonjicV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RadonjicV20a, author = {Aleksandar Radonjic and Vladimir Vujicic}, title = {Correction to: Integer codes correcting burst asymmetric errors within a byte and double asymmetric errors}, journal = {Cryptogr. Commun.}, volume = {12}, number = {2}, pages = {231}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00398-y}, doi = {10.1007/S12095-019-00398-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RadonjicV20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RoyK20, author = {Suman Roy and Srinivasan Krishnaswamy}, title = {On the frequency of symbols in sequences generated by nonlinear Feedforward generators}, journal = {Cryptogr. Commun.}, volume = {12}, number = {1}, pages = {115--126}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00379-1}, doi = {10.1007/S12095-019-00379-1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/RoyK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShiF20, author = {Zexia Shi and Fang{-}Wei Fu}, title = {The primitive idempotents of irreducible constacyclic codes and {LCD} cyclic codes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {1}, pages = {29--52}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00362-w}, doi = {10.1007/S12095-019-00362-W}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ShiF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShiWWHC20, author = {Minjia Shi and Chenchen Wang and Rongsheng Wu and Yu Hu and Yaoqiang Chang}, title = {One-weight and two-weight {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2\}{\textbackslash}mathbb \{Z\}{\_}\{2\}[u, v]{\textdollar}-additive codes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {443--454}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00391-5}, doi = {10.1007/S12095-019-00391-5}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ShiWWHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShiZQSS20, author = {Minjia Shi and Hongwei Zhu and Liqin Qian and Lin Sok and Patrick Sol{\'{e}}}, title = {On self-dual and {LCD} double circulant and double negacirculant codes over {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{q\}+u{\textbackslash}mathbb \{F\}{\_}\{q\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {12}, number = {1}, pages = {53--70}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00363-9}, doi = {10.1007/S12095-019-00363-9}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ShiZQSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SinghGB20, author = {Jasvinder Singh and Manish Gupta and Jaskarn Singh Bhullar}, title = {On the search of smallest {QC-LDPC} code with girth six and eight}, journal = {Cryptogr. Commun.}, volume = {12}, number = {4}, pages = {711--723}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00405-2}, doi = {10.1007/S12095-019-00405-2}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SinghGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Srikanth20, author = {Ch. Srikanth}, title = {Certain sequence of arithmetic progressions and a new key sharing method}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {597--612}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00416-z}, doi = {10.1007/S12095-019-00416-Z}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Srikanth20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SunYCW20, author = {Yuhua Sun and Tongjiang Yan and Zhixiong Chen and Lianhai Wang}, title = {The 2-adic complexity of a class of binary sequences with optimal autocorrelation magnitude}, journal = {Cryptogr. Commun.}, volume = {12}, number = {4}, pages = {675--683}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00411-4}, doi = {10.1007/S12095-019-00411-4}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SunYCW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SunZL20, author = {Zhimin Sun and Xiangyong Zeng and Da Lin}, title = {On the Nth maximum order complexity and the expansion complexity of a Rudin-Shapiro-like sequence}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {415--426}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00396-0}, doi = {10.1007/S12095-019-00396-0}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SunZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SunZW20, author = {Zhonghua Sun and Shixin Zhu and Liqi Wang}, title = {A class of constacyclic {BCH} codes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {2}, pages = {265--284}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00401-6}, doi = {10.1007/S12095-019-00401-6}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/SunZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TangL20, author = {Deng Tang and Xia Li}, title = {A note on the minimal binary linear code}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {375--388}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00412-3}, doi = {10.1007/S12095-019-00412-3}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TangL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TangYZZ20, author = {Deng Tang and Haode Yan and Zhengchun Zhou and Xiaosong Zhang}, title = {A new lower bound on the second-order nonlinearity of a class of monomial bent functions}, journal = {Cryptogr. Commun.}, volume = {12}, number = {1}, pages = {77--83}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00360-y}, doi = {10.1007/S12095-019-00360-Y}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TangYZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangCG20, author = {Zilong Wang and Jinjin Chai and Guang Gong}, title = {The Fourier spectral characterization for the correlation-immune functions over {\textdollar}{\textbackslash}phantom \{{\textbackslash}dot \{i\}{\textbackslash}!\}{\textbackslash}mathbb \{F\}{\_}\{p\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {585--595}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00369-3}, doi = {10.1007/S12095-019-00369-3}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangCG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangZ20, author = {Xiaoqiang Wang and Dabin Zheng}, title = {The subfield codes of several classes of linear codes}, journal = {Cryptogr. Commun.}, volume = {12}, number = {6}, pages = {1111--1131}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00432-4}, doi = {10.1007/S12095-020-00432-4}, timestamp = {Fri, 23 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangZQ20, author = {Zhongxiao Wang and Qunxiong Zheng and Wenfeng Qi}, title = {The cycle structure of NFSR(f\({}^{\mbox{d}}\)) and its applications}, journal = {Cryptogr. Commun.}, volume = {12}, number = {2}, pages = {233--252}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00392-4}, doi = {10.1007/S12095-019-00392-4}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/WangZQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WuLC20, author = {Xia Wu and Wei Lu and Xiwang Cao}, title = {Two constructions of asymptotically optimal codebooks via the trace functions}, journal = {Cryptogr. Commun.}, volume = {12}, number = {6}, pages = {1195--1211}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00448-w}, doi = {10.1007/S12095-020-00448-W}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WuLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WuYSZ20, author = {Yansheng Wu and Qin Yue and Xueying Shi and Xiaomeng Zhu}, title = {Binary and ternary sequences with a few cross correlations}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {511--525}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00376-4}, doi = {10.1007/S12095-019-00376-4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WuYSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YangL20, author = {Yang Yang and Chunlei Li}, title = {New quaternary sequences with optimal odd-periodic autocorrelation magnitude}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {363--374}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00407-0}, doi = {10.1007/S12095-019-00407-0}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/YangL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YaoZ20, author = {Ting Yao and Shixin Zhu}, title = {{\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{p\}{\textbackslash}mathbb \{Z\}{\_}\{p\{s\}\}{\textdollar}-additive cyclic codes are asymptotically good}, journal = {Cryptogr. Commun.}, volume = {12}, number = {2}, pages = {253--264}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00397-z}, doi = {10.1007/S12095-019-00397-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/YaoZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZajacJ20, author = {Pavol Zajac and Mat{\'{u}}s J{\'{o}}kay}, title = {Cryptographic properties of small bijective S-boxes with respect to modular addition}, journal = {Cryptogr. Commun.}, volume = {12}, number = {5}, pages = {947--963}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00447-x}, doi = {10.1007/S12095-020-00447-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZajacJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhangPH20, author = {Dan Zhang and Matthew Geoffrey Parker and Tor Helleseth}, title = {Polyphase zero correlation zone sequences from generalised bent functions}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {325--335}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00413-2}, doi = {10.1007/S12095-019-00413-2}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhangPH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Zhao20, author = {Lu Zhao}, title = {About the linear complexity of quaternary sequences with even length}, journal = {Cryptogr. Commun.}, volume = {12}, number = {4}, pages = {725--741}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00419-w}, doi = {10.1007/S12095-019-00419-W}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Zhao20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhengPKL20, author = {Lijing Zheng and Jie Peng and Haibin Kan and Yanjun Li}, title = {Several new infinite families of bent functions via second order derivatives}, journal = {Cryptogr. Commun.}, volume = {12}, number = {6}, pages = {1143--1160}, year = {2020}, url = {https://doi.org/10.1007/s12095-020-00436-0}, doi = {10.1007/S12095-020-00436-0}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhengPKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhouHL20, author = {LiMengNan Zhou and Hongyu Han and Xing Liu}, title = {Frequency-hopping sequence sets with no-hit-zone through Cartesian product}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {485--497}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00381-7}, doi = {10.1007/S12095-019-00381-7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ZhouHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhouZYW20, author = {Yajing Zhou and Zhengchun Zhou and Yang Yang and Yong Wang}, title = {Two constructions for 16-QAM complementary sequence sets with non-power-of-two length}, journal = {Cryptogr. Commun.}, volume = {12}, number = {3}, pages = {349--362}, year = {2020}, url = {https://doi.org/10.1007/s12095-019-00406-1}, doi = {10.1007/S12095-019-00406-1}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhouZYW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AshrafM19, author = {Mohammad Ashraf and Ghulam Mohammad}, title = {Quantum codes over {F} p from cyclic codes over {F} p [u, v]/{\unicode{12296}}u 2 - 1, v 3 - v, u v - v u{\unicode{12297}}}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {325--335}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0299-0}, doi = {10.1007/S12095-018-0299-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AshrafM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AydinBL19, author = {Nuh Aydin and Ghada Bakbouk and Jonathan G. G. Lambrinos}, title = {New linear codes over non-prime fields}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {891--902}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0333-2}, doi = {10.1007/S12095-018-0333-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AydinBL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BartoliDGMP19, author = {Daniele Bartoli and Alexander A. Davydov and Massimo Giulietti and Stefano Marcugini and Fernanda Pambianco}, title = {New bounds for linear codes of covering radii 2 and 3}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {903--920}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0335-0}, doi = {10.1007/S12095-018-0335-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BartoliDGMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BeemerHK19, author = {Allison Beemer and Kathryn Haymaker and Christine A. Kelley}, title = {Absorbing sets of codes from finite geometries}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {1115--1131}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-0353-6}, doi = {10.1007/S12095-019-0353-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BeemerHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BojilovBB19, author = {Assen Bojilov and Lyubomir Borissov and Yuri L. Borissov}, title = {Computing the number of finite field elements with prescribed absolute trace and co-trace}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {497--507}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0336-z}, doi = {10.1007/S12095-018-0336-Z}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BojilovBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BoyarFP19, author = {Joan Boyar and Magnus Gausdal Find and Ren{\'{e}} Peralta}, title = {Small low-depth circuits for cryptographic applications}, journal = {Cryptogr. Commun.}, volume = {11}, number = {1}, pages = {109--127}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0296-3}, doi = {10.1007/S12095-018-0296-3}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/BoyarFP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BrandaoCTP19, author = {Lu{\'{\i}}s T. A. N. Brand{\~{a}}o and {\c{C}}agdas {\c{C}}alik and Meltem S{\"{o}}nmez Turan and Ren{\'{e}} Peralta}, title = {Upper bounds on the multiplicative complexity of symmetric Boolean functions}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1339--1362}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00377-3}, doi = {10.1007/S12095-019-00377-3}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/BrandaoCTP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanCH19, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth}, title = {Editorial: Special Issue on Boolean functions and their applications}, journal = {Cryptogr. Commun.}, volume = {11}, number = {1}, pages = {1--2}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0341-2}, doi = {10.1007/S12095-018-0341-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanCH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanCH19a, author = {Lilya Budaghyan and Claude Carlet and Tor Helleseth}, title = {Editorial: Special issue on Boolean functions and their applications 2018}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1145--1146}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00409-y}, doi = {10.1007/S12095-019-00409-Y}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanCH19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanLP19, author = {Lilya Budaghyan and Chunlei Li and Matthew Geoffrey Parker}, title = {Editorial: Special Issue on Mathematical Methods for Cryptography}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {363--365}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00356-8}, doi = {10.1007/S12095-019-00356-8}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Buratti19, author = {Marco Buratti}, title = {Hadamard partitioned difference families and their descendants}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {557--562}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0308-3}, doi = {10.1007/S12095-018-0308-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Buratti19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CalikTP19, author = {{\c{C}}agdas {\c{C}}alik and Meltem S{\"{o}}nmez Turan and Ren{\'{e}} Peralta}, title = {The multiplicative complexity of 6-variable Boolean functions}, journal = {Cryptogr. Commun.}, volume = {11}, number = {1}, pages = {93--107}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0297-2}, doi = {10.1007/S12095-018-0297-2}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/CalikTP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CanteautPT19, author = {Anne Canteaut and L{\'{e}}o Perrin and Shizhu Tian}, title = {If a generalised butterfly is {APN} then it operates on 6 bits}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1147--1164}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00361-x}, doi = {10.1007/S12095-019-00361-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CanteautPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CepakPM19, author = {Nastja Cepak and Enes Pasalic and Amela Muratovic{-}Ribic}, title = {Frobenius linear translators giving rise to new infinite classes of permutations and bent functions}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1275--1295}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00395-1}, doi = {10.1007/S12095-019-00395-1}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/CepakPM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CesarzC19, author = {Patrick G. Cesarz and Robert S. Coulter}, title = {Image sets with regularity of differences}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1307--1337}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00358-6}, doi = {10.1007/S12095-019-00358-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CesarzC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChenCGG19, author = {Yao Chen and Benjamin M. Case and Shuhong Gao and Guang Gong}, title = {Error analysis of weak Poly-LWE instances}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {411--426}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0301-x}, doi = {10.1007/S12095-018-0301-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChenCGG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ClimentRS19, author = {Joan{-}Josep Climent and Ver{\'{o}}nica Requena and Xaro Soler{-}Escriv{\`{a}}}, title = {A construction of Abelian non-cyclic orbit codes}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {839--852}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0306-5}, doi = {10.1007/S12095-018-0306-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ClimentRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CsirmazL19, author = {L{\'{a}}szl{\'{o}} Csirmaz and P{\'{e}}ter Ligeti}, title = {Secret sharing on large girth graphs}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {399--410}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0338-x}, doi = {10.1007/S12095-018-0338-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CsirmazL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DengZ19, author = {Huali Deng and Dabin Zheng}, title = {More classes of permutation trinomials with Niho exponents}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {227--236}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0284-7}, doi = {10.1007/S12095-018-0284-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DengZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DeyS19, author = {Sabyasachi Dey and Santanu Sarkar}, title = {Settling the mystery of {Z} r = r in {RC4}}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {697--715}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0323-4}, doi = {10.1007/S12095-018-0323-4}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/DeyS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Felke19, author = {Patrick Felke}, title = {On the security of biquadratic {C} {\({_\ast}\)} public-key cryptosystems and its generalizations}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {427--442}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0337-y}, doi = {10.1007/S12095-018-0337-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Felke19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GaoLL19, author = {Ying Gao and Zihui Liu and Yiwei Liu}, title = {The separation of binary relative three-weight codes and its applications}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {979--992}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0339-9}, doi = {10.1007/S12095-018-0339-9}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GaoLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GaoLZ19, author = {Zhe Gao and Chao Li and Yue Zhou}, title = {Upper bounds and constructions of complete Asynchronous channel hopping systems}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {299--312}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0295-4}, doi = {10.1007/S12095-018-0295-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GaoLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GarciaMN19, author = {Ismael Guti{\'{e}}rrez Garc{\'{\i}}a and Daladier Jabba Molinares and Ivan Molina Naizir}, title = {A novel maximum distance separable code to generate universal identifiers}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {1021--1035}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0346-x}, doi = {10.1007/S12095-018-0346-X}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/GarciaMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GeilO19, author = {Olav Geil and Ferruh {\"{O}}zbudak}, title = {On affine variety codes from the Klein quartic}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {237--257}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0285-6}, doi = {10.1007/S12095-018-0285-6}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/GeilO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Gorodilova19, author = {Anastasiya Gorodilova}, title = {On the differential equivalence of {APN} functions}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {793--813}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0329-y}, doi = {10.1007/S12095-018-0329-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Gorodilova19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GravelPT19, author = {Claude Gravel and Daniel Panario and David Thomson}, title = {Unicyclic strong permutations}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1211--1231}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00384-4}, doi = {10.1007/S12095-019-00384-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GravelPT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuneriOS19, author = {Cem G{\"{u}}neri and Ferruh {\"{O}}zbudak and Elif Sa{\c{c}}ikara}, title = {A concatenated construction of linear complementary pair of codes}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {1103--1114}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-0354-5}, doi = {10.1007/S12095-019-0354-5}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/GuneriOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Harada19, author = {Masaaki Harada}, title = {Singly even self-dual codes of length 24k + 10 and minimum weight 4k + 2}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {597--608}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0303-8}, doi = {10.1007/S12095-018-0303-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Harada19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HaradaS19, author = {Masaaki Harada and Ken Saito}, title = {Binary linear complementary dual codes}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {677--696}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0319-0}, doi = {10.1007/S12095-018-0319-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HaradaS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HodzicPC19, author = {Samir Hodzic and Enes Pasalic and Anupam Chattopadhyay}, title = {An iterative method for linear decomposition of index generating functions}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {1079--1102}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-0351-8}, doi = {10.1007/S12095-019-0351-8}, timestamp = {Sun, 20 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/HodzicPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HoferW19, author = {Richard Hofer and Arne Winterhof}, title = {r-th order nonlinearity, correlation measure and least significant bit of the discrete logarithm}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {993--997}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0344-z}, doi = {10.1007/S12095-018-0344-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HoferW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Hou19, author = {Xiang{-}dong Hou}, title = {On a class of permutation trinomials in characteristic 2}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1199--1210}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0342-1}, doi = {10.1007/S12095-018-0342-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Hou19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Idrisova19, author = {Valeriya Idrisova}, title = {On an algorithm generating 2-to-1 {APN} functions and its applications to "the big {APN} problem"}, journal = {Cryptogr. Commun.}, volume = {11}, number = {1}, pages = {21--39}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0310-9}, doi = {10.1007/S12095-018-0310-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Idrisova19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JohnsenV19, author = {Trygve Johnsen and Hugues Verdure}, title = {Relative profiles and extended weight polynomials of almost affine codes}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {1009--1020}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0348-8}, doi = {10.1007/S12095-018-0348-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/JohnsenV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JunnilaLP19, author = {Ville Junnila and Tero Laihonen and Gabrielle Paris}, title = {Optimal bounds on codes for location in circulant graphs}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {621--640}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0316-3}, doi = {10.1007/S12095-018-0316-3}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/JunnilaLP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Kaleyski19, author = {Nikolay S. Kaleyski}, title = {Changing {APN} functions at two points}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1165--1184}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00366-6}, doi = {10.1007/S12095-019-00366-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Kaleyski19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KavutB19, author = {Sel{\c{c}}uk Kavut and Sevdenur Baloglu}, title = {Results on symmetric S-boxes constructed by concatenation of RSSBs}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {641--660}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0318-1}, doi = {10.1007/S12095-018-0318-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KavutB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Klove19, author = {Torleiv Kl{\o}ve}, title = {Codes of length two correcting single errors of limited size}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {549--555}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0327-0}, doi = {10.1007/S12095-018-0327-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Klove19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LaaksonenO19, author = {Antti Laaksonen and Patric R. J. {\"{O}}sterg{\aa}rd}, title = {New lower bounds on q-ary error-correcting codes}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {881--889}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0302-9}, doi = {10.1007/S12095-018-0302-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LaaksonenO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiH19, author = {Nian Li and Tor Helleseth}, title = {New permutation trinomials from Niho exponents over finite fields with even characteristic}, journal = {Cryptogr. Commun.}, volume = {11}, number = {1}, pages = {129--136}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0321-6}, doi = {10.1007/S12095-018-0321-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiQW19, author = {Kangquan Li and Longjiang Qu and Qiang Wang}, title = {Compositional inverses of permutation polynomials of the form x r h(x s {)} over finite fields}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {279--298}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0292-7}, doi = {10.1007/S12095-018-0292-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiQW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiYL19, author = {Yu Li and Tongjiang Yan and Chuan Lv}, title = {Construction of a Near-Optimal Quasi-Complementary Sequence Set from Almost Difference Set}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {815--824}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0330-5}, doi = {10.1007/S12095-018-0330-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiZ19, author = {Nian Li and Xiangyong Zeng}, title = {A survey on the applications of Niho exponents}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {509--548}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0305-6}, doi = {10.1007/S12095-018-0305-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiangCCCF19, author = {Yana Liang and Jiali Cao and Xingfa Chen and Shiping Cai and Xiang Fan}, title = {Linear complexity of Ding-Helleseth generalized cyclotomic sequences of order eight}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {1037--1056}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0343-0}, doi = {10.1007/S12095-018-0343-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiangCCCF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiuM19, author = {Hongwei Liu and Youcef Maouche}, title = {Several new classes of linear codes with few weights}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {137--146}, year = {2019}, url = {https://doi.org/10.1007/s12095-017-0277-y}, doi = {10.1007/S12095-017-0277-Y}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiuM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LuoC19, author = {Gaojun Luo and Xiwang Cao}, title = {Two constructions of asymptotically optimal codebooks}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {825--838}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0331-4}, doi = {10.1007/S12095-018-0331-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LuoC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LuoCM19, author = {Gaojun Luo and Xiwang Cao and Sihem Mesnager}, title = {Several new classes of self-dual bent functions derived from involutions}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1261--1273}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00371-9}, doi = {10.1007/S12095-019-00371-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LuoCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MandalSG19, author = {Bimal Mandal and Pantelimon Stanica and Sugata Gangopadhyay}, title = {New classes of p-ary bent functions}, journal = {Cryptogr. Commun.}, volume = {11}, number = {1}, pages = {77--92}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0290-9}, doi = {10.1007/S12095-018-0290-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MandalSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MariotPLJ19, author = {Luca Mariot and Stjepan Picek and Alberto Leporati and Domagoj Jakobovic}, title = {Cellular automata based S-boxes}, journal = {Cryptogr. Commun.}, volume = {11}, number = {1}, pages = {41--62}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0311-8}, doi = {10.1007/S12095-018-0311-8}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MariotPLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Martinez-Penas19, author = {Umberto Mart{\'{\i}}nez{-}Pe{\~{n}}as}, title = {Universal secure rank-metric coding schemes with optimal communication overheads}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {147--166}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0279-4}, doi = {10.1007/S12095-018-0279-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Martinez-Penas19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MeidlP19, author = {Wilfried Meidl and Alexander Pott}, title = {Generalized bent functions into {\(\mathbb{Z}\)} p k {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{p\{k\}\}{\textdollar} from the partial spread and the Maiorana-McFarland class}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1233--1245}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00370-w}, doi = {10.1007/S12095-019-00370-W}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MeidlP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MesnagerRS19, author = {Sihem Mesnager and Constanza Riera and Pantelimon Stanica}, title = {Multiple characters transforms and generalized Boolean functions}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1247--1260}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00383-5}, doi = {10.1007/S12095-019-00383-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MesnagerRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MesnagerZD19, author = {Sihem Mesnager and Zhengchun Zhou and Cunsheng Ding}, title = {On the nonlinearity of Boolean functions with restricted input}, journal = {Cryptogr. Commun.}, volume = {11}, number = {1}, pages = {63--76}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0293-6}, doi = {10.1007/S12095-018-0293-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MesnagerZD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MichelW19, author = {Jerod Michel and Qi Wang}, title = {Some new balanced and almost balanced quaternary sequences with low autocorrelation}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {191--206}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0281-x}, doi = {10.1007/S12095-018-0281-X}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MichelW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Naghipour19, author = {Avaz Naghipour}, title = {New classes of quantum codes on closed orientable surfaces}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {999--1008}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0347-9}, doi = {10.1007/S12095-018-0347-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Naghipour19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/NappPPR19, author = {Diego Napp and Ricardo Pereira and Raquel Pinto and Paula Rocha}, title = {Periodic state-space representations of periodic convolutional codes}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {585--595}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0313-6}, doi = {10.1007/S12095-018-0313-6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/NappPPR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/NikovaNR19, author = {Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Decomposition of permutations in a finite field}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {379--384}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0317-2}, doi = {10.1007/S12095-018-0317-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/NikovaNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Nyberg19, author = {Kaisa Nyberg}, title = {Affine linear cryptanalysis}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {367--377}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0325-2}, doi = {10.1007/S12095-018-0325-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Nyberg19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Oblaukhov19, author = {Alexey Oblaukhov}, title = {A lower bound on the size of the largest metrically regular subset of the Boolean cube}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {777--791}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0326-1}, doi = {10.1007/S12095-018-0326-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Oblaukhov19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/OzbudakP19, author = {Ferruh {\"{O}}zbudak and Rumi Melih Pelen}, title = {Strongly regular graphs arising from non-weakly regular bent functions}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1297--1306}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00394-2}, doi = {10.1007/S12095-019-00394-2}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/OzbudakP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PasalicHZW19, author = {Enes Pasalic and Samir Hodzic and Fengrong Zhang and Yongzhuang Wei}, title = {Bent functions from nonlinear permutations and conversely}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {207--225}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0282-9}, doi = {10.1007/S12095-018-0282-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PasalicHZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/QianSS19, author = {Liqin Qian and Minjia Shi and Patrick Sol{\'{e}}}, title = {On self-dual and {LCD} quasi-twisted codes of index two over a special chain ring}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {717--734}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0322-5}, doi = {10.1007/S12095-018-0322-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/QianSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RabiiK19, author = {Hila Rabii and Osnat Keren}, title = {A new class of security oriented error correcting robust codes}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {965--978}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0340-3}, doi = {10.1007/S12095-018-0340-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RabiiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RaddumV19, author = {H{\aa}vard Raddum and Srimathi Varadharajan}, title = {Factorization using binary decision diagrams}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {443--460}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0304-7}, doi = {10.1007/S12095-018-0304-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RaddumV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RadonjicV19, author = {Aleksandar Radonjic and Vladimir Vujicic}, title = {Integer codes correcting sparse byte errors}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {1069--1077}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-0350-9}, doi = {10.1007/S12095-019-0350-9}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/RadonjicV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RostamiSOP19, author = {Saeed Rostami and Elham Shakour and Mohammad Ali Orumiehchiha and Josef Pieprzyk}, title = {Cryptanalysis of {WG-8} and {WG-16} stream ciphers}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {351--362}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0298-1}, doi = {10.1007/S12095-018-0298-1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/RostamiSOP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SunWY19, author = {Yuhua Sun and Qiang Wang and Tongjiang Yan}, title = {A lower bound on the 2-adic complexity of the modified Jacobi sequence}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {337--349}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0300-y}, doi = {10.1007/S12095-018-0300-Y}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/SunWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TangL19, author = {Deng Tang and Jian Liu}, title = {A family of weightwise (almost) perfectly balanced boolean functions with optimal algebraic immunity}, journal = {Cryptogr. Commun.}, volume = {11}, number = {6}, pages = {1185--1197}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00374-6}, doi = {10.1007/S12095-019-00374-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TangL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TangQH19, author = {Chunming Tang and Yanfeng Qi and Dongmei Huang}, title = {Regular p-ary bent functions with five terms and Kloosterman sums}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {1133--1144}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-0355-4}, doi = {10.1007/S12095-019-0355-4}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/TangQH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TuZ19, author = {Ziran Tu and Xiangyong Zeng}, title = {A class of permutation trinomials over finite fields of odd characteristic}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {563--583}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0307-4}, doi = {10.1007/S12095-018-0307-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TuZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/UguzDSK19, author = {Muhiddin Uguz and Ali Doganaksoy and Fatih Sulak and Onur Ko{\c{c}}ak}, title = {{R-2} composition tests: a family of statistical randomness tests for a collection of binary sequences}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {921--949}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0334-1}, doi = {10.1007/S12095-018-0334-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/UguzDSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/VariciNNR19, author = {Kerem Varici and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen}, title = {Constructions of S-boxes with uniform sharing}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {385--398}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0345-y}, doi = {10.1007/S12095-018-0345-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/VariciNNR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Villa19, author = {Irene Villa}, title = {On {APN} functions {L} 1(x 3) + {L} 2(x 9) with linear {L} 1 and {L} 2}, journal = {Cryptogr. Commun.}, volume = {11}, number = {1}, pages = {3--20}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0283-8}, doi = {10.1007/S12095-018-0283-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Villa19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangH19, author = {Lin Wang and Zhi Hu}, title = {Injectivity on distribution of elements in the compressed sequences derived from primitive sequences over {\(\mathbb{Z}\)}\({}_{\mbox{p\({}^{\mbox{e}}\)}}\)}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {167--189}, year = {2019}, url = {https://doi.org/10.1007/s12095-017-0278-x}, doi = {10.1007/S12095-017-0278-X}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangH19a, author = {Lin Wang and Zhi Hu}, title = {New explicit injective compressing mappings on primitive sequences over {\(\mathbb{Z}\)} p e {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{pe\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {951--963}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0332-3}, doi = {10.1007/S12095-018-0332-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangH19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangNF19, author = {Gang Wang and Min{-}Yao Niu and Fang{-}Wei Fu}, title = {Deterministic constructions of compressed sensing matrices based on codes}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {759--775}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0328-z}, doi = {10.1007/S12095-018-0328-Z}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/WangNF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangS19, author = {Qichun Wang and Pantelimon Stanica}, title = {New bounds on the covering radius of the second order Reed-Muller code of length 128}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {269--277}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0289-2}, doi = {10.1007/S12095-018-0289-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangWYZ19, author = {Libo Wang and Baofeng Wu and Xiaoqiang Yue and Yanbin Zheng}, title = {Further results on permutation trinomials with Niho exponents}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {1057--1068}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-0349-2}, doi = {10.1007/S12095-019-0349-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangWYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WuL19, author = {Gaofei Wu and Nian Li}, title = {Several classes of permutation trinomials over {\(\mathbb{F}\)}\({}_{\mbox{5\({}^{\mbox{n}}\)}}\) from Niho exponents}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {313--324}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0291-8}, doi = {10.1007/S12095-018-0291-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WuL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WuP19, author = {Gaofei Wu and Matthew Geoffrey Parker}, title = {On Boolean functions with several flat spectra}, journal = {Cryptogr. Commun.}, volume = {11}, number = {5}, pages = {853--880}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0309-2}, doi = {10.1007/S12095-018-0309-2}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WuP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XiaoZLJ19, author = {Zibi Xiao and Xiangyong Zeng and Chaoyun Li and Yupeng Jiang}, title = {Binary sequences with period {N} and nonlinear complexity {N} - 2}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {735--757}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0324-3}, doi = {10.1007/S12095-018-0324-3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/XiaoZLJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Yan19, author = {Haode Yan}, title = {A note on the constructions of {MDS} self-dual codes}, journal = {Cryptogr. Commun.}, volume = {11}, number = {2}, pages = {259--268}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0288-3}, doi = {10.1007/S12095-018-0288-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Yan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YangYWK19, author = {Shudi Yang and Qin Yue and Yansheng Wu and Xiangli Kong}, title = {Complete weight enumerators of a class of two-weight linear codes}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {609--620}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0315-4}, doi = {10.1007/S12095-018-0315-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/YangYWK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhouPLHM19, author = {LiMengNan Zhou and Daiyuan Peng and Xing Liu and Hongyu Han and Zheng Ma}, title = {Frequency-hopping sequence sets with good aperiodic Hamming correlation property}, journal = {Cryptogr. Commun.}, volume = {11}, number = {4}, pages = {661--675}, year = {2019}, url = {https://doi.org/10.1007/s12095-018-0320-7}, doi = {10.1007/S12095-018-0320-7}, timestamp = {Sat, 27 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhouPLHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Zinoviev19, author = {Victor A. Zinoviev}, title = {On classical Kloosterman sums}, journal = {Cryptogr. Commun.}, volume = {11}, number = {3}, pages = {461--496}, year = {2019}, url = {https://doi.org/10.1007/s12095-019-00357-7}, doi = {10.1007/S12095-019-00357-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Zinoviev19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AcevedoD18, author = {Santiago Barrera Acevedo and Heiko Dietrich}, title = {Perfect sequences over the quaternions and (4n, 2, 4n, 2n)-relative difference sets in {C} n {\texttimes} {Q} 8}, journal = {Cryptogr. Commun.}, volume = {10}, number = {2}, pages = {357--368}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0224-y}, doi = {10.1007/S12095-017-0224-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AcevedoD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Alsalami18, author = {Yousuf Alsalami}, title = {Constructions with high algebraic degree of differentially 4-uniform (n, n - 1)-functions and differentially 8-uniform (n, n - 2)-functions}, journal = {Cryptogr. Commun.}, volume = {10}, number = {4}, pages = {611--628}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0246-5}, doi = {10.1007/S12095-017-0246-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Alsalami18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AnbarM18, author = {Nurdag{\"{u}}l Anbar and Wilfried Meidl}, title = {Modified planar functions and their components}, journal = {Cryptogr. Commun.}, volume = {10}, number = {2}, pages = {235--249}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0218-9}, doi = {10.1007/S12095-017-0218-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AnbarM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BaiX18, author = {Tao Bai and Yongbo Xia}, title = {A new class of permutation trinomials constructed from Niho exponents}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1023--1036}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0263-4}, doi = {10.1007/S12095-017-0263-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BaiX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BarcucciBBP18, author = {Elena Barcucci and Antonio Bernini and Stefano Bilotta and Renzo Pinzani}, title = {A 2D non-overlapping code over a q-ary alphabet}, journal = {Cryptogr. Commun.}, volume = {10}, number = {4}, pages = {667--683}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0251-8}, doi = {10.1007/S12095-017-0251-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BarcucciBBP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BhattacharyaN18, author = {Srimanta Bhattacharya and Mridul Nandi}, title = {A note on the chi-square method: {A} tool for proving cryptographic security}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {935--957}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0276-z}, doi = {10.1007/S12095-017-0276-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BhattacharyaN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BogosGV18, author = {Sonia Bogos and John Gaspoz and Serge Vaudenay}, title = {Cryptanalysis of a homomorphic encryption scheme}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {27--39}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0243-8}, doi = {10.1007/S12095-017-0243-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BogosGV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BoztasOT18, author = {Serdar Boztas and Ferruh {\"{O}}zbudak and Eda Tekin}, title = {Generalized nonbinary sequences with perfect autocorrelation, flexible alphabets and new periods}, journal = {Cryptogr. Commun.}, volume = {10}, number = {3}, pages = {509--517}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0237-6}, doi = {10.1007/S12095-017-0237-6}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/BoztasOT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Carlet18, author = {Claude Carlet}, title = {On the nonlinearity of monotone Boolean functions}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1051--1061}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0262-5}, doi = {10.1007/S12095-017-0262-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Carlet18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CarletG18, author = {Claude Carlet and Sylvain Guilley}, title = {Statistical properties of side-channel and fault injection attacks using coding theory}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {909--933}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0271-4}, doi = {10.1007/S12095-017-0271-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CarletG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CastroMR18, author = {Francis N. Castro and Luis A. Medina and Ivelisse M. Rubio}, title = {Exact 2-divisibility of exponential sums associated to boolean functions}, journal = {Cryptogr. Commun.}, volume = {10}, number = {4}, pages = {655--666}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0252-7}, doi = {10.1007/S12095-017-0252-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CastroMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChangELW18, author = {Zuling Chang and Martianus Frederic Ezerman and San Ling and Huaxiong Wang}, title = {Construction of de Bruijn sequences from product of two irreducible polynomials}, journal = {Cryptogr. Commun.}, volume = {10}, number = {2}, pages = {251--275}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0219-8}, doi = {10.1007/S12095-017-0219-8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChangELW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChangELW18a, author = {Zuling Chang and Martianus Frederic Ezerman and San Ling and Huaxiong Wang}, title = {The cycle structure of {LFSR} with arbitrary characteristic polynomial over finite fields}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1183--1202}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0273-2}, doi = {10.1007/S12095-017-0273-2}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChangELW18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CheriseyGHR18, author = {Eloi de Ch{\'{e}}risey and Sylvain Guilley and Annelie Heuser and Olivier Rioul}, title = {On the optimality and practicability of mutual information analysis in some scenarios}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {101--121}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0241-x}, doi = {10.1007/S12095-017-0241-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CheriseyGHR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CuiCMSW18, author = {Tingting Cui and Huaifeng Chen and Sihem Mesnager and Ling Sun and Meiqin Wang}, title = {Statistical integral distinguisher with multi-structure and its application on AES-like ciphers}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {755--776}, year = {2018}, url = {https://doi.org/10.1007/s12095-018-0286-5}, doi = {10.1007/S12095-018-0286-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CuiCMSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CuiCWW18, author = {Tingting Cui and Huaifeng Chen and Long Wen and Meiqin Wang}, title = {Statistical integral attack on {CAST-256} and {IDEA}}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {195--209}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0245-6}, doi = {10.1007/S12095-017-0245-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CuiCWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Ding18, author = {Cunsheng Ding}, title = {A sequence construction of cyclic codes over finite fields}, journal = {Cryptogr. Commun.}, volume = {10}, number = {2}, pages = {319--341}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0222-0}, doi = {10.1007/S12095-017-0222-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Ding18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DubrovaNSL18, author = {Elena Dubrova and Mats N{\"{a}}slund and G{\"{o}}ran Selander and Fredrik Lindqvist}, title = {Message Authentication Based on Cryptographically Secure {CRC} without Polynomial Irreducibility Test}, journal = {Cryptogr. Commun.}, volume = {10}, number = {2}, pages = {383--399}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0227-8}, doi = {10.1007/S12095-017-0227-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DubrovaNSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FabsicGNZ18, author = {Tom{\'{a}}s Fabsic and Otokar Grosek and Karol Nemoga and Pavol Zajac}, title = {On generating invertible circulant binary matrices with a prescribed number of ones}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {159--175}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0239-4}, doi = {10.1007/S12095-017-0239-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/FabsicGNZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FerradiGMNZ18, author = {Houda Ferradi and R{\'{e}}mi G{\'{e}}raud and Diana Maimut and David Naccache and Hang Zhou}, title = {Backtracking-assisted multiplication}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {17--26}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0254-5}, doi = {10.1007/S12095-017-0254-5}, timestamp = {Thu, 02 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/FerradiGMNZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ForlerLLW18, author = {Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel}, title = {POEx: {A} beyond-birthday-bound-secure on-line cipher}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {177--193}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0250-9}, doi = {10.1007/S12095-017-0250-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ForlerLLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GalvezKLRW18, author = {Lucky Galvez and Jon{-}Lark Kim and Nari Lee and Young Gun Roe and Byung{-}Sun Won}, title = {Some bounds on binary {LCD} codes}, journal = {Cryptogr. Commun.}, volume = {10}, number = {4}, pages = {719--728}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0258-1}, doi = {10.1007/S12095-017-0258-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GalvezKLRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GoyalR18, author = {Mokshi Goyal and Madhu Raka}, title = {Quadratic residue codes over the ring {\(\mathbb{F}\)}\({}_{\mbox{p}}\)[u]/{\unicode{12296}} u\({}^{\mbox{m}}\) - u {\unicode{12297}} and their Gray images}, journal = {Cryptogr. Commun.}, volume = {10}, number = {2}, pages = {343--355}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0223-z}, doi = {10.1007/S12095-017-0223-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GoyalR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuCK18, author = {Ting Gu and Zhixiong Chen and Andrew Klapper}, title = {Correlation immune functions with respect to the q-transform}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1063--1073}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0267-0}, doi = {10.1007/S12095-017-0267-0}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuCK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HamannK18, author = {Matthias Hamann and Matthias Krause}, title = {On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {959--1012}, year = {2018}, url = {https://doi.org/10.1007/s12095-018-0294-5}, doi = {10.1007/S12095-018-0294-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HamannK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HamannKMZ18, author = {Matthias Hamann and Matthias Krause and Willi Meier and Bin Zhang}, title = {Design and analysis of small-state grain-like stream ciphers}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {803--834}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0261-6}, doi = {10.1007/S12095-017-0261-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HamannKMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HasanPW18, author = {Sartaj Ul Hasan and Daniel Panario and Qiang Wang}, title = {Nonlinear vectorial primitive recursive sequences}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1075--1090}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0265-2}, doi = {10.1007/S12095-017-0265-2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HasanPW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HellesethP18, author = {Tor Helleseth and Bart Preneel}, title = {Editorial: Special issue on recent trends in cryptography}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {1--3}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0269-y}, doi = {10.1007/S12095-017-0269-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HellesethP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HemenwayO18, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Efficient robust secret sharing from expander graphs}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {79--99}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0215-z}, doi = {10.1007/S12095-017-0215-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HemenwayO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JanaP18, author = {Amit Jana and Goutam Paul}, title = {Revisiting {RC4} key collision: Faster search algorithm and new 22-byte colliding key pairs}, journal = {Cryptogr. Commun.}, volume = {10}, number = {3}, pages = {479--508}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0231-z}, doi = {10.1007/S12095-017-0231-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/JanaP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JhaN18, author = {Ashwin Jha and Mridul Nandi}, title = {On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {731--753}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0275-0}, doi = {10.1007/S12095-017-0275-0}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/JhaN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Jitman18, author = {Somphong Jitman}, title = {Good integers and some applications in coding theory}, journal = {Cryptogr. Commun.}, volume = {10}, number = {4}, pages = {685--704}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0255-4}, doi = {10.1007/S12095-017-0255-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Jitman18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Jitman18a, author = {Somphong Jitman}, title = {Correction to: Good integers and some applications in coding theory}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1203}, year = {2018}, url = {https://doi.org/10.1007/s12095-018-0314-5}, doi = {10.1007/S12095-018-0314-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Jitman18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Klapper18, author = {Andrew Klapper}, title = {Matrix parametrized shift registers}, journal = {Cryptogr. Commun.}, volume = {10}, number = {2}, pages = {369--382}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0226-9}, doi = {10.1007/S12095-017-0226-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Klapper18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Lacharite18, author = {Marie{-}Sarah Lacharit{\'{e}}}, title = {Security of {BLS} and {BGLS} signatures in a multi-user setting}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {41--58}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0253-6}, doi = {10.1007/S12095-017-0253-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Lacharite18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiQCL18, author = {Kangquan Li and Longjiang Qu and Xi Chen and Chao Li}, title = {Permutation polynomials of the form cx + Tr\({}_{\mbox{q\({}^{\mbox{l}}\)/q}}\)(x\({}^{\mbox{a}}\)) and permutation trinomials over finite fields with even characteristic}, journal = {Cryptogr. Commun.}, volume = {10}, number = {3}, pages = {531--554}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0236-7}, doi = {10.1007/S12095-017-0236-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiQCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiuDLY18, author = {Xiusheng Liu and Hai Q. Dinh and Hualu Liu and Long Yu}, title = {On new quantum codes from matrix product codes}, journal = {Cryptogr. Commun.}, volume = {10}, number = {4}, pages = {579--589}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0242-9}, doi = {10.1007/S12095-017-0242-9}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/LiuDLY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LuoC18, author = {Gaojun Luo and Xiwang Cao}, title = {Complete weight enumerators of three classes of linear codes}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1091--1108}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0270-5}, doi = {10.1007/S12095-017-0270-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LuoC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LuoC18a, author = {Gaojun Luo and Xiwang Cao}, title = {Five classes of optimal two-weight linear codes}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1119--1135}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0272-3}, doi = {10.1007/S12095-017-0272-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LuoC18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LuoCXM18, author = {Gaojun Luo and Xiwang Cao and Shanding Xu and Jiafu Mi}, title = {Binary linear codes with two or three weights from niho exponents}, journal = {Cryptogr. Commun.}, volume = {10}, number = {2}, pages = {301--318}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0220-2}, doi = {10.1007/S12095-017-0220-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LuoCXM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LuoP18, author = {Rong Luo and Udaya Parampalli}, title = {Cyclic codes over {\textdollar}M{\_}\{2\}({\textbackslash}mathbb \{F\}{\_}\{2\}+u{\textbackslash}mathbb \{F\}{\_}\{2\}){\textdollar}}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1109--1117}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0266-1}, doi = {10.1007/S12095-017-0266-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LuoP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Maitra18, author = {Subhamoy Maitra}, title = {Guest editorial}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {729--730}, year = {2018}, url = {https://doi.org/10.1007/s12095-018-0312-7}, doi = {10.1007/S12095-018-0312-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Maitra18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MandalYGA18, author = {Kalikinkar Mandal and Bo Yang and Guang Gong and Mark D. Aagaard}, title = {On ideal t-tuple distribution of filtering de Bruijn sequence generators}, journal = {Cryptogr. Commun.}, volume = {10}, number = {4}, pages = {629--641}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0248-3}, doi = {10.1007/S12095-017-0248-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MandalYGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MeidlP18, author = {Wilfried Meidl and Isabel Pirsic}, title = {On the normality of p-ary bent functions}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1037--1049}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0259-0}, doi = {10.1007/S12095-017-0259-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MeidlP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MeraiW18, author = {L{\'{a}}szl{\'{o}} M{\'{e}}rai and Arne Winterhof}, title = {On the pseudorandomness of automatic sequences}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1013--1022}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0260-7}, doi = {10.1007/S12095-017-0260-7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/MeraiW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/NachefPV18, author = {Val{\'{e}}rie Nachef and Jacques Patarin and Emmanuel Volte}, title = {Generic attacks with standard deviation analysis on a-feistel schemes}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {59--77}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0244-7}, doi = {10.1007/S12095-017-0244-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/NachefPV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PatersonS18, author = {Kenneth G. Paterson and Jacob C. N. Schuldt}, title = {Statistical attacks on cookie masking for {RC4}}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {777--801}, year = {2018}, url = {https://doi.org/10.1007/s12095-018-0280-y}, doi = {10.1007/S12095-018-0280-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PatersonS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PaulR18, author = {Goutam Paul and Souvik Ray}, title = {Analysis of burn-in period for {RC4} state transition}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {881--908}, year = {2018}, url = {https://doi.org/10.1007/s12095-018-0287-4}, doi = {10.1007/S12095-018-0287-4}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/PaulR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PierrotW18, author = {C{\'{e}}cile Pierrot and Benjamin Wesolowski}, title = {Malleability of the blockchain's entropy}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {211--233}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0264-3}, doi = {10.1007/S12095-017-0264-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PierrotW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PohMC18, author = {Geong Sen Poh and Moesfa Soeheila Mohamad and Ji{-}Jian Chin}, title = {Searchable symmetric encryption over multiple servers}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {139--158}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0232-y}, doi = {10.1007/S12095-017-0232-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PohMC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Rose18, author = {Gregory G. Rose}, title = {{KISS:} {A} bit too simple}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {123--137}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0225-x}, doi = {10.1007/S12095-017-0225-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Rose18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SamajderS18, author = {Subhabrata Samajder and Palash Sarkar}, title = {Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {835--879}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0257-2}, doi = {10.1007/S12095-017-0257-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SamajderS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SamajderS18a, author = {Subhabrata Samajder and Palash Sarkar}, title = {Multiple (Truncated) Differential Cryptanalysis: Explicit Upper Bounds on Data Complexity}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1137--1163}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0268-z}, doi = {10.1007/S12095-017-0268-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SamajderS18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Scott18, author = {Michael Scott}, title = {Missing a trick: Karatsuba variations}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {5--15}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0217-x}, doi = {10.1007/S12095-017-0217-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Scott18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SharmaK18, author = {Anuradha Sharma and Taranjot Kaur}, title = {Enumeration formulae for self-dual, self-orthogonal and complementary-dual quasi-cyclic codes over finite fields}, journal = {Cryptogr. Commun.}, volume = {10}, number = {3}, pages = {401--435}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0228-7}, doi = {10.1007/S12095-017-0228-7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SharmaK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShiYC18, author = {Xueying Shi and Qin Yue and Yaotsu Chang}, title = {Some quantum {MDS} codes with large minimum distance from generalized Reed-Solomon codes}, journal = {Cryptogr. Commun.}, volume = {10}, number = {6}, pages = {1165--1182}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0274-1}, doi = {10.1007/S12095-017-0274-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ShiYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Sobhani18, author = {R. Sobhani}, title = {Cyclic codes over a non-commutative finite chain ring}, journal = {Cryptogr. Commun.}, volume = {10}, number = {3}, pages = {519--530}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0238-5}, doi = {10.1007/S12095-017-0238-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Sobhani18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SokSS18, author = {Lin Sok and Minjia Shi and Patrick Sol{\'{e}}}, title = {Classification and Construction of quaternary self-dual bent functions}, journal = {Cryptogr. Commun.}, volume = {10}, number = {2}, pages = {277--289}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0216-y}, doi = {10.1007/S12095-017-0216-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SokSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SunWY18, author = {Yuhua Sun and Qiang Wang and Tongjiang Yan}, title = {The exact autocorrelation distribution and 2-adic complexity of a class of binary sequences with almost optimal autocorrelation}, journal = {Cryptogr. Commun.}, volume = {10}, number = {3}, pages = {467--477}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0233-x}, doi = {10.1007/S12095-017-0233-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SunWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SunZW18, author = {Zhonghua Sun and Shixin Zhu and Liqi Wang}, title = {The symbol-pair distance distribution of a class of repeated-root cyclic codes over {\(\mathbb{F}\)}\({}_{\mbox{p\({}^{\mbox{m}}\)}}\)}, journal = {Cryptogr. Commun.}, volume = {10}, number = {4}, pages = {643--653}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0249-2}, doi = {10.1007/S12095-017-0249-2}, timestamp = {Mon, 15 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/SunZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TanZTH18, author = {Pan Tan and Zhengchun Zhou and Deng Tang and Tor Helleseth}, title = {The weight distribution of a class of two-weight linear codes derived from Kloosterman sums}, journal = {Cryptogr. Commun.}, volume = {10}, number = {2}, pages = {291--299}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0221-1}, doi = {10.1007/S12095-017-0221-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TanZTH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TuxanidyW18, author = {Aleksandr Tuxanidy and Qiang Wang}, title = {Characteristic digit-sum sequences}, journal = {Cryptogr. Commun.}, volume = {10}, number = {4}, pages = {705--717}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0256-3}, doi = {10.1007/S12095-017-0256-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TuxanidyW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangW18, author = {Li{-}Ping Wang and Daqing Wan}, title = {On lattice-based algebraic feedback shift registers synthesis for multisequences}, journal = {Cryptogr. Commun.}, volume = {10}, number = {3}, pages = {455--465}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0230-0}, doi = {10.1007/S12095-017-0230-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XuCXL18, author = {Shanding Xu and Xiwang Cao and Guangkui Xu and Gaojun Luo}, title = {Two classes of near-optimal frequency-hopping sequence sets with prime-power period}, journal = {Cryptogr. Commun.}, volume = {10}, number = {3}, pages = {437--454}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0229-6}, doi = {10.1007/S12095-017-0229-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XuCXL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YiLK18, author = {Zongxiang Yi and Zhiqiang Lin and Lishan Ke}, title = {A generic method to construct zero-difference balanced functions}, journal = {Cryptogr. Commun.}, volume = {10}, number = {4}, pages = {591--609}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0247-4}, doi = {10.1007/S12095-017-0247-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/YiLK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhaHZ18, author = {Zhengbang Zha and Lei Hu and Zhizheng Zhang}, title = {New results on permutation polynomials of the form (x p m - x + {\(\delta\)}) s + x p m + x over {\(\mathbb{F}\)} p\({}^{\mbox{2m}}\)}, journal = {Cryptogr. Commun.}, volume = {10}, number = {3}, pages = {567--578}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0234-9}, doi = {10.1007/S12095-017-0234-9}, timestamp = {Fri, 07 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ZhaHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhangJC18, author = {Xuli Zhang and Jing Jiang and Minquan Cheng}, title = {Bounds and constructions for 3{\textasciimacron}-strongly separable codes with length 3}, journal = {Cryptogr. Commun.}, volume = {10}, number = {3}, pages = {555--565}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0235-8}, doi = {10.1007/S12095-017-0235-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhangJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AbdukhalikovM17, author = {Kanat S. Abdukhalikov and Sihem Mesnager}, title = {Bent functions linear on elements of some classical spreads and presemifields spreads}, journal = {Cryptogr. Commun.}, volume = {9}, number = {1}, pages = {3--21}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0195-4}, doi = {10.1007/S12095-016-0195-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AbdukhalikovM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AlacaM17, author = {Saban Alaca and Goldwyn Millar}, title = {Character values of the Sidelnikov-Lempel-Cohn-Eastman sequences}, journal = {Cryptogr. Commun.}, volume = {9}, number = {6}, pages = {665--682}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0208-3}, doi = {10.1007/S12095-016-0208-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AlacaM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BandiBA17, author = {Rama Krishna Bandi and Maheshanand Bhaintwal and Nuh Aydin}, title = {A mass formula for negacyclic codes of length 2 k and some good negacyclic codes over {\(\mathbb{Z}\)}\({}_{\mbox{4}}\)+u{\(\mathbb{Z}\)}\({}_{\mbox{4}}\)}, journal = {Cryptogr. Commun.}, volume = {9}, number = {2}, pages = {241--272}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0172-3}, doi = {10.1007/S12095-015-0172-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BandiBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BezzateevS17, author = {Sergey Bezzateev and Natalia A. Shekhunova}, title = {Quasi-cyclic Goppa codes with special Goppa polynomials and matched location sets}, journal = {Cryptogr. Commun.}, volume = {9}, number = {1}, pages = {23--39}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0196-3}, doi = {10.1007/S12095-016-0196-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BezzateevS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CaoL17, author = {Yuan Cao and Qingguo Li}, title = {Cyclic codes of odd length over {\(\mathbb{Z}\)}4 [u] / {\unicode{12296}}u k {\unicode{12297}}}, journal = {Cryptogr. Commun.}, volume = {9}, number = {5}, pages = {599--624}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0204-7}, doi = {10.1007/S12095-016-0204-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CaoL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Chen17, author = {Zhixiong Chen}, title = {Linear complexity and trace representation of quaternary sequences over {\(\mathbb{Z}\)}\({}_{\mbox{4}}\) based on generalized cyclotomic classes modulo pq}, journal = {Cryptogr. Commun.}, volume = {9}, number = {4}, pages = {445--458}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0185-6}, doi = {10.1007/S12095-016-0185-6}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Chen17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChengJT17, author = {Minquan Cheng and Jing Jiang and Xiaohu Tang}, title = {Asymptotically optimal 2{\textasciimacron}-separable codes with length 4}, journal = {Cryptogr. Commun.}, volume = {9}, number = {3}, pages = {397--405}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0182-9}, doi = {10.1007/S12095-016-0182-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChengJT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DietrichJ17, author = {Heiko Dietrich and Nathan Jolly}, title = {A new family of arrays with low autocorrelation}, journal = {Cryptogr. Commun.}, volume = {9}, number = {6}, pages = {737--748}, year = {2017}, url = {https://doi.org/10.1007/s12095-017-0214-0}, doi = {10.1007/S12095-017-0214-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DietrichJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DingZ17, author = {Cunsheng Ding and Zhengchun Zhou}, title = {Preface: Special functions and codes}, journal = {Cryptogr. Commun.}, volume = {9}, number = {1}, pages = {1--2}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0201-x}, doi = {10.1007/S12095-016-0201-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DingZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DubrovaH17, author = {Elena Dubrova and Martin Hell}, title = {Espresso: {A} stream cipher for 5G wireless communication systems}, journal = {Cryptogr. Commun.}, volume = {9}, number = {2}, pages = {273--289}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0173-2}, doi = {10.1007/S12095-015-0173-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DubrovaH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/EdemskiyD17, author = {Vladimir Edemskiy and Xiaoni Du}, title = {Design sequences with high linear complexity over finite fields using generalized cyclotomy}, journal = {Cryptogr. Commun.}, volume = {9}, number = {6}, pages = {683--691}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0209-2}, doi = {10.1007/S12095-016-0209-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/EdemskiyD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/EsmaeiliMG17, author = {Morteza Esmaeili and M. Moosavi and T. Aaron Gulliver}, title = {A new class of Fibonacci sequence based error correcting codes}, journal = {Cryptogr. Commun.}, volume = {9}, number = {3}, pages = {379--396}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0178-x}, doi = {10.1007/S12095-015-0178-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/EsmaeiliMG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Ferard17, author = {Eric F{\'{e}}rard}, title = {On the irreducibility of the hyperplane sections of Fermat varieties in {\(\mathbb{P}\)} 3 {\textdollar}{\textbackslash}mathbb \{P\}\{3\}{\textdollar} in characteristic 2. {II}}, journal = {Cryptogr. Commun.}, volume = {9}, number = {6}, pages = {749--767}, year = {2017}, url = {https://doi.org/10.1007/s12095-017-0213-1}, doi = {10.1007/S12095-017-0213-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Ferard17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GangopadhyayGPS17, author = {Sugata Gangopadhyay and Aditi Kar Gangopadhyay and Spyridon Pollatos and Pantelimon Stanica}, title = {Cryptographic Boolean functions with biased inputs}, journal = {Cryptogr. Commun.}, volume = {9}, number = {2}, pages = {301--314}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0174-1}, doi = {10.1007/S12095-015-0174-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GangopadhyayGPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HanPP17, author = {Hongyu Han and Daiyuan Peng and Udaya Parampalli}, title = {New sets of optimal low-hit-zone frequency-hopping sequences based on m-sequences}, journal = {Cryptogr. Commun.}, volume = {9}, number = {4}, pages = {511--522}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0192-7}, doi = {10.1007/S12095-016-0192-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HanPP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HengY17, author = {Ziling Heng and Qin Yue}, title = {Optimal codebooks achieving the Levenshtein bound from generalized bent functions over {\(\mathbb{Z}\)} 4 Z\({}_{\mbox{4}}\)}, journal = {Cryptogr. Commun.}, volume = {9}, number = {1}, pages = {41--53}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0194-5}, doi = {10.1007/S12095-016-0194-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HengY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HengY17a, author = {Ziling Heng and Qin Yue}, title = {Complete weight distributions of two classes of cyclic codes}, journal = {Cryptogr. Commun.}, volume = {9}, number = {3}, pages = {323--343}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0177-y}, doi = {10.1007/S12095-015-0177-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HengY17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KewatK17, author = {Pramod Kumar Kewat and Priti Kumari}, title = {Cyclic codes from the second class two-prime Whiteman's generalized cyclotomic sequence with order 6}, journal = {Cryptogr. Commun.}, volume = {9}, number = {4}, pages = {475--499}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0191-8}, doi = {10.1007/S12095-016-0191-8}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KewatK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LaingMPS17, author = {Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson}, title = {Localised multisecret sharing}, journal = {Cryptogr. Commun.}, volume = {9}, number = {5}, pages = {581--597}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0202-9}, doi = {10.1007/S12095-016-0202-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LaingMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiBY17, author = {Chengju Li and Sunghan Bae and Haode Yan}, title = {A construction of codes with linearity from two linear codes}, journal = {Cryptogr. Commun.}, volume = {9}, number = {1}, pages = {55--69}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0193-6}, doi = {10.1007/S12095-016-0193-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiBY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiH17, author = {Nian Li and Tor Helleseth}, title = {Several classes of permutation trinomials from Niho exponents}, journal = {Cryptogr. Commun.}, volume = {9}, number = {6}, pages = {693--705}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0210-9}, doi = {10.1007/S12095-016-0210-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiL17, author = {Xin Li and Zihui Liu}, title = {On the second relative greedy weight}, journal = {Cryptogr. Commun.}, volume = {9}, number = {2}, pages = {181--197}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0168-z}, doi = {10.1007/S12095-015-0168-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiangJZ17, author = {Miao Liang and Lijun Ji and Jingcai Zhang}, title = {Some new classes of 2-fold optimal or perfect splitting authentication codes}, journal = {Cryptogr. Commun.}, volume = {9}, number = {3}, pages = {407--430}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0179-9}, doi = {10.1007/S12095-015-0179-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiangJZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LinLP17, author = {Zhiqiang Lin and Dongdai Lin and Dingyi Pei}, title = {Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications}, journal = {Cryptogr. Commun.}, volume = {9}, number = {4}, pages = {431--443}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0183-8}, doi = {10.1007/S12095-016-0183-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LinLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiuMC17, author = {Jian Liu and Sihem Mesnager and Lusheng Chen}, title = {On the nonlinearity of S-boxes and linear codes}, journal = {Cryptogr. Commun.}, volume = {9}, number = {3}, pages = {345--361}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0176-z}, doi = {10.1007/S12095-015-0176-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiuMC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MeraiNW17, author = {L{\'{a}}szl{\'{o}} M{\'{e}}rai and Harald Niederreiter and Arne Winterhof}, title = {Expansion complexity and linear complexity of sequences over finite fields}, journal = {Cryptogr. Commun.}, volume = {9}, number = {4}, pages = {501--509}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0189-2}, doi = {10.1007/S12095-016-0189-2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/MeraiNW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Mesnager17, author = {Sihem Mesnager}, title = {Linear codes with few weights from weakly regular bent functions based on a generic construction}, journal = {Cryptogr. Commun.}, volume = {9}, number = {1}, pages = {71--84}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0186-5}, doi = {10.1007/S12095-016-0186-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Mesnager17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PengT17, author = {Jie Peng and Chik How Tan}, title = {New differentially 4-uniform permutations by modifying the inverse function on subfields}, journal = {Cryptogr. Commun.}, volume = {9}, number = {3}, pages = {363--378}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0181-x}, doi = {10.1007/S12095-016-0181-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PengT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RakaKG17, author = {Madhu Raka and Leetika Kathuria and Mokshi Goyal}, title = {(1-2u 3)-constacyclic codes and quadratic residue codes over {\(\mathbb{F}\)}\({}_{\mbox{p}}\)[u]/{\unicode{12296}}u\({}^{\mbox{4}}\)-u{\unicode{12297}}}, journal = {Cryptogr. Commun.}, volume = {9}, number = {4}, pages = {459--473}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0184-7}, doi = {10.1007/S12095-016-0184-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RakaKG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SalageanM17, author = {Ana Salagean and Matei Mandache{-}Salagean}, title = {Counting and characterising functions with "fast points" for differential attacks}, journal = {Cryptogr. Commun.}, volume = {9}, number = {2}, pages = {217--239}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0166-1}, doi = {10.1007/S12095-015-0166-1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SalageanM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SarkarDAM17, author = {Santanu Sarkar and Prakash Dey and Avishek Adhikari and Subhamoy Maitra}, title = {Probabilistic signature based generalized framework for differential fault analysis of stream ciphers}, journal = {Cryptogr. Commun.}, volume = {9}, number = {4}, pages = {523--543}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0197-2}, doi = {10.1007/S12095-016-0197-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SarkarDAM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShiWLS17, author = {Minjia Shi and Rongsheng Wu and Yan Liu and Patrick Sol{\'{e}}}, title = {Two and three weight codes over {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{p\}+u{\textbackslash}mathbb \{F\}{\_}\{p\}{\textdollar}}, journal = {Cryptogr. Commun.}, volume = {9}, number = {5}, pages = {637--646}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0206-5}, doi = {10.1007/S12095-016-0206-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ShiWLS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TangQ17, author = {Chunming Tang and Yanfeng Qi}, title = {A class of hyper-bent functions and Kloosterman sums}, journal = {Cryptogr. Commun.}, volume = {9}, number = {5}, pages = {647--664}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0207-4}, doi = {10.1007/S12095-016-0207-4}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/TangQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Wang17, author = {Qi Wang}, title = {Some cyclic codes with prime length from cyclotomy of order 4}, journal = {Cryptogr. Commun.}, volume = {9}, number = {1}, pages = {85--92}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0188-3}, doi = {10.1007/S12095-016-0188-3}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Wang17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangDLX17, author = {Qiuyan Wang and Kelan Ding and Dongdai Lin and Rui Xue}, title = {A kind of three-weight linear codes}, journal = {Cryptogr. Commun.}, volume = {9}, number = {3}, pages = {315--322}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0180-3}, doi = {10.1007/S12095-015-0180-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangDLX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangGF17, author = {Xianfang Wang and Jian Gao and Fang{-}Wei Fu}, title = {Complete weight enumerators of two classes of linear codes}, journal = {Cryptogr. Commun.}, volume = {9}, number = {5}, pages = {545--562}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0198-1}, doi = {10.1007/S12095-016-0198-1}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/WangGF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangT17, author = {Lisha Wang and Xiaohu Tang}, title = {On the correlation distribution of the generalized maximal length {\(\mathbb{Z}\)}4-sequences}, journal = {Cryptogr. Commun.}, volume = {9}, number = {2}, pages = {199--215}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0169-y}, doi = {10.1007/S12095-015-0169-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangXF17, author = {Xianfang Wang and Can Xiang and Fang{-}Wei Fu}, title = {Secret sharing schemes for compartmented access structures}, journal = {Cryptogr. Commun.}, volume = {9}, number = {5}, pages = {625--635}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0205-6}, doi = {10.1007/S12095-016-0205-6}, timestamp = {Mon, 01 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/WangXF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Wolfmann17, author = {Jacques Wolfmann}, title = {Sequences of bent functions and near-bent functions}, journal = {Cryptogr. Commun.}, volume = {9}, number = {6}, pages = {729--736}, year = {2017}, url = {https://doi.org/10.1007/s12095-017-0212-2}, doi = {10.1007/S12095-017-0212-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Wolfmann17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WuGF17, author = {Tingting Wu and Jian Gao and Fang{-}Wei Fu}, title = {1-generator generalized quasi-cyclic codes over {\(\mathbb{Z}\)}\({}_{\mbox{4}}\)}, journal = {Cryptogr. Commun.}, volume = {9}, number = {2}, pages = {291--299}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0175-0}, doi = {10.1007/S12095-015-0175-0}, timestamp = {Wed, 08 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/WuGF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XiangTF17, author = {Can Xiang and Chunming Tang and Keqin Feng}, title = {A class of linear codes with a few weights}, journal = {Cryptogr. Commun.}, volume = {9}, number = {1}, pages = {93--116}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0200-y}, doi = {10.1007/S12095-016-0200-Y}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/XiangTF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XuCX17, author = {Guangkui Xu and Xiwang Cao and Shanding Xu}, title = {Two classes of p-ary bent functions and linear codes with three or four weights}, journal = {Cryptogr. Commun.}, volume = {9}, number = {1}, pages = {117--131}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0199-0}, doi = {10.1007/S12095-016-0199-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XuCX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XueQY17, author = {Shuai Xue and Wen{-}Feng Qi and Xiaoyuan Yang}, title = {On the best linear approximation of addition modulo 2 n}, journal = {Cryptogr. Commun.}, volume = {9}, number = {5}, pages = {563--580}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0203-8}, doi = {10.1007/S12095-016-0203-8}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XueQY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YangYZ17, author = {Shudi Yang and Zheng{-}an Yao and Chang{-}An Zhao}, title = {A class of three-weight linear codes and their complete weight enumerators}, journal = {Cryptogr. Commun.}, volume = {9}, number = {1}, pages = {133--149}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0187-4}, doi = {10.1007/S12095-016-0187-4}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/YangYZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhangFPT17, author = {Dan Zhang and Cuiling Fan and Daiyuan Peng and Xiaohu Tang}, title = {Complete weight enumerators of some linear codes from quadratic forms}, journal = {Cryptogr. Commun.}, volume = {9}, number = {1}, pages = {151--163}, year = {2017}, url = {https://doi.org/10.1007/s12095-016-0190-9}, doi = {10.1007/S12095-016-0190-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhangFPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhouPLWH17, author = {LiMengNan Zhou and Daiyuan Peng and Hongbin Liang and ChangYuan Wang and Hongyu Han}, title = {Generalized methods to construct low-hit-zone frequency-hopping sequence sets and optimal constructions}, journal = {Cryptogr. Commun.}, volume = {9}, number = {6}, pages = {707--728}, year = {2017}, url = {https://doi.org/10.1007/s12095-017-0211-3}, doi = {10.1007/S12095-017-0211-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhouPLWH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhouQ17, author = {Yue Zhou and Longjiang Qu}, title = {Constructions of negabent functions over finite fields}, journal = {Cryptogr. Commun.}, volume = {9}, number = {2}, pages = {165--180}, year = {2017}, url = {https://doi.org/10.1007/s12095-015-0167-0}, doi = {10.1007/S12095-015-0167-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhouQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AlahmadiAHHMS16, author = {Adel Alahmadi and Hussain Alhazmi and Tor Helleseth and Rola Hijazi and Najat M. Muthana and Patrick Sol{\'{e}}}, title = {On the lifted Melas code}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {7--18}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0135-8}, doi = {10.1007/S12095-015-0135-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AlahmadiAHHMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Banik16, author = {Subhadeep Banik}, title = {Conditional differential cryptanalysis of 105 round Grain v1}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {113--137}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0146-5}, doi = {10.1007/S12095-015-0146-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Banik16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BogosTV16, author = {Sonia Bogos and Florian Tram{\`{e}}r and Serge Vaudenay}, title = {On solving {L} {P} {N} using {B} {K} {W} and variants - Implementation and analysis}, journal = {Cryptogr. Commun.}, volume = {8}, number = {3}, pages = {331--369}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0149-2}, doi = {10.1007/S12095-015-0149-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BogosTV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BoyarFP16, author = {Joan Boyar and Magnus Gausdal Find and Ren{\'{e}} Peralta}, title = {On various nonlinearity measures for boolean functions}, journal = {Cryptogr. Commun.}, volume = {8}, number = {3}, pages = {313--330}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0150-9}, doi = {10.1007/S12095-015-0150-9}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/BoyarFP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanHK16, author = {Lilya Budaghyan and Tor Helleseth and Alexander Kholosha}, title = {Editorial: Special issue on Boolean functions and their applications}, journal = {Cryptogr. Commun.}, volume = {8}, number = {2}, pages = {173--174}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0171-4}, doi = {10.1007/S12095-015-0171-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChakrabortyM16, author = {Kaushik Chakraborty and Subhamoy Maitra}, title = {Application of Grover's algorithm to check non-resiliency of a Boolean function}, journal = {Cryptogr. Commun.}, volume = {8}, number = {3}, pages = {401--413}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0156-3}, doi = {10.1007/S12095-015-0156-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChakrabortyM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChakrabortyS16, author = {Debrup Chakraborty and Palash Sarkar}, title = {On modes of operations of a block cipher for authentication and authenticated encryption}, journal = {Cryptogr. Commun.}, volume = {8}, number = {4}, pages = {455--511}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0153-6}, doi = {10.1007/S12095-015-0153-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChakrabortyS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChengQZY16, author = {Yuan Cheng and Wen{-}Feng Qi and Qun{-}Xiong Zheng and Dong Yang}, title = {On the distinctness of primitive sequences over Z/(p e q) modulo 2}, journal = {Cryptogr. Commun.}, volume = {8}, number = {3}, pages = {371--381}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0151-8}, doi = {10.1007/S12095-015-0151-8}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/ChengQZY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChinTHP16, author = {Ji{-}Jian Chin and Syh{-}Yuan Tan and Swee{-}Huay Heng and Raphael C.{-}W. Phan}, title = {Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme}, journal = {Cryptogr. Commun.}, volume = {8}, number = {4}, pages = {579--591}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0162-5}, doi = {10.1007/S12095-015-0162-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChinTHP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CusickS16, author = {Thomas W. Cusick and Pantelimon Stanica}, title = {Counting equivalence classes for monomial rotation symmetric Boolean functions with prime dimension}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {67--81}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0143-8}, doi = {10.1007/S12095-015-0143-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CusickS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DraviePGM16, author = {Brandon Dravie and J{\'{e}}r{\'{e}}my Parriaux and Philippe Guillot and Gilles Mill{\'{e}}rioux}, title = {Matrix representations of vectorial Boolean functions and eigenanalysis}, journal = {Cryptogr. Commun.}, volume = {8}, number = {4}, pages = {555--577}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0160-7}, doi = {10.1007/S12095-015-0160-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DraviePGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GaoSF16, author = {Jian Gao and Linzhi Shen and Fang{-}Wei Fu}, title = {A Chinese remainder theorem approach to skew generalized quasi-cyclic codes over finite fields}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {51--66}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0140-y}, doi = {10.1007/S12095-015-0140-Y}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GaoSF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuK16, author = {Ting Gu and Andrew Klapper}, title = {Statistical properties of half-{\(\mathscr{l}\)}-sequences}, journal = {Cryptogr. Commun.}, volume = {8}, number = {3}, pages = {383--400}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0152-7}, doi = {10.1007/S12095-015-0152-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HonkalaHL16, author = {Iiro S. Honkala and Olivier Hudry and Antoine Lobstein}, title = {On the ensemble of optimal identifying codes in a twin-free graph}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {139--153}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0148-3}, doi = {10.1007/S12095-015-0148-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HonkalaHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/IvanovNN16, author = {Georgi Ivanov and Nikolay Nikolov and Svetla Nikova}, title = {Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties}, journal = {Cryptogr. Commun.}, volume = {8}, number = {2}, pages = {247--276}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0170-5}, doi = {10.1007/S12095-015-0170-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/IvanovNN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JangL16, author = {Ji{-}Woong Jang and Dae{-}Woon Lim}, title = {Large low probability of intercept properties of the quaternary sequence with optimal correlation property constructed by legendre sequences}, journal = {Cryptogr. Commun.}, volume = {8}, number = {4}, pages = {593--604}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0161-6}, doi = {10.1007/S12095-015-0161-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/JangL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KasikciMT16, author = {Canan Kasikci and Wilfried Meidl and Alev Topuzoglu}, title = {Spectra of a class of quadratic functions: Average behaviour and counting functions}, journal = {Cryptogr. Commun.}, volume = {8}, number = {2}, pages = {191--214}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0142-9}, doi = {10.1007/S12095-015-0142-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KasikciMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KatzL16, author = {Daniel J. Katz and Philippe Langevin}, title = {New open problems related to old conjectures by Helleseth}, journal = {Cryptogr. Commun.}, volume = {8}, number = {2}, pages = {175--189}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0137-6}, doi = {10.1007/S12095-015-0137-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KatzL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KazymyrovOR16, author = {Oleksandr Kazymyrov and Roman Oliynykov and H{\aa}vard Raddum}, title = {Influence of addition modulo 2 n on algebraic attacks}, journal = {Cryptogr. Commun.}, volume = {8}, number = {2}, pages = {277--289}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0136-7}, doi = {10.1007/S12095-015-0136-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KazymyrovOR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Klove16, author = {Torleiv Kl{\o}ve}, title = {On covering sets for limited-magnitude errors}, journal = {Cryptogr. Commun.}, volume = {8}, number = {3}, pages = {415--433}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0154-5}, doi = {10.1007/S12095-015-0154-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Klove16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiH16, author = {Chunlei Li and Tor Helleseth}, title = {Quasi-perfect linear codes from planar and {APN} functions}, journal = {Cryptogr. Commun.}, volume = {8}, number = {2}, pages = {215--227}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0132-y}, doi = {10.1007/S12095-015-0132-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiZHJ16, author = {Fulin Li and Shixin Zhu and Honggang Hu and Ting Jiang}, title = {Determining the k-error joint linear complexity spectrum for a binary multisequence with period p n}, journal = {Cryptogr. Commun.}, volume = {8}, number = {4}, pages = {513--523}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0157-2}, doi = {10.1007/S12095-015-0157-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiZHJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LuD16, author = {Yi Lu and Yvo Desmedt}, title = {Walsh transforms and cryptographic applications in bias computing}, journal = {Cryptogr. Commun.}, volume = {8}, number = {3}, pages = {435--453}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0155-4}, doi = {10.1007/S12095-015-0155-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LuD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LvYX16, author = {Chuan Lv and Tongjiang Yan and Guozhen Xiao}, title = {New developments in q-polynomial codes}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {103--112}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0147-4}, doi = {10.1007/S12095-015-0147-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LvYX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Mesnager16, author = {Sihem Mesnager}, title = {Further constructions of infinite families of bent functions from new permutations and their duals}, journal = {Cryptogr. Commun.}, volume = {8}, number = {2}, pages = {229--246}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0144-7}, doi = {10.1007/S12095-015-0144-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Mesnager16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PatersonSW16, author = {Maura B. Paterson and Douglas R. Stinson and Yongge Wang}, title = {On encoding symbol degrees of array {BP-XOR} codes}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {19--32}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0134-9}, doi = {10.1007/S12095-015-0134-9}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/PatersonSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Schmidt16, author = {Kai{-}Uwe Schmidt}, title = {Nonlinearity measures of random Boolean functions}, journal = {Cryptogr. Commun.}, volume = {8}, number = {4}, pages = {637--645}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0164-3}, doi = {10.1007/S12095-015-0164-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Schmidt16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SharmaR16, author = {Anuradha Sharma and Saroj Rani}, title = {On constacyclic codes over finite fields}, journal = {Cryptogr. Commun.}, volume = {8}, number = {4}, pages = {617--636}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0163-4}, doi = {10.1007/S12095-015-0163-4}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SharmaR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SharmaS16, author = {Anuradha Sharma and Amit K. Sharma}, title = {Construction of self-dual codes over {\(\mathbb{Z}\)}\({}_{\mbox{2\({}^{\mbox{m}}\)}}\)}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {83--101}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0139-4}, doi = {10.1007/S12095-015-0139-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SharmaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TanGZ16, author = {Yin Tan and Guang Gong and Bo Zhu}, title = {Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions}, journal = {Cryptogr. Commun.}, volume = {8}, number = {2}, pages = {291--311}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0141-x}, doi = {10.1007/S12095-015-0141-X}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TanGZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangJL16, author = {Mingxing Wang and Yupeng Jiang and Dongdai Lin}, title = {Further results on the nonlinearity of maximum-length {NFSR} feedbacks}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {1--6}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0133-x}, doi = {10.1007/S12095-015-0133-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangJL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangJL16a, author = {Qiuyan Wang and Yupeng Jiang and Dongdai Lin}, title = {Linear complexity of Ding-Helleseth sequences of order 2 over GF(l)}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {33--49}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0138-5}, doi = {10.1007/S12095-015-0138-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangJL16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangL16, author = {Qiuyan Wang and Dongdai Lin}, title = {Generalized cyclotomic numbers of order two and their applications}, journal = {Cryptogr. Commun.}, volume = {8}, number = {4}, pages = {605--616}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0165-2}, doi = {10.1007/S12095-015-0165-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Xiang16, author = {Can Xiang}, title = {Linear codes from a generic construction}, journal = {Cryptogr. Commun.}, volume = {8}, number = {4}, pages = {525--539}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0158-1}, doi = {10.1007/S12095-015-0158-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Xiang16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XuCX16, author = {Guangkui Xu and Xiwang Cao and Shanding Xu}, title = {Constructing new {APN} functions and bent functions over finite fields of odd characteristic via the switching method}, journal = {Cryptogr. Commun.}, volume = {8}, number = {1}, pages = {155--171}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0145-6}, doi = {10.1007/S12095-015-0145-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XuCX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XuCX16a, author = {Guangkui Xu and Xiwang Cao and Shanding Xu}, title = {Optimal p-ary cyclic codes with minimum distance four from monomials}, journal = {Cryptogr. Commun.}, volume = {8}, number = {4}, pages = {541--554}, year = {2016}, url = {https://doi.org/10.1007/s12095-015-0159-0}, doi = {10.1007/S12095-015-0159-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XuCX16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BauerJPRW15, author = {Aur{\'{e}}lie Bauer and {\'{E}}liane Jaulmes and Emmanuel Prouff and Jean{-}Ren{\'{e}} Reinhard and Justine Wild}, title = {Horizontal collision correlation attack on elliptic curves - - Extended Version -}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {91--119}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0111-8}, doi = {10.1007/S12095-014-0111-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BauerJPRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BelaidGS15, author = {Sonia Bela{\"{\i}}d and Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Masking and leakage-resilient primitives: One, the other(s) or both?}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {163--184}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0113-6}, doi = {10.1007/S12095-014-0113-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BelaidGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BilginNNRTV15, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Natalia N. Tokareva and Valeriya Vitkup}, title = {Threshold implementations of small S-boxes}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {3--33}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0104-7}, doi = {10.1007/S12095-014-0104-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BilginNNRTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CarletF15, author = {Claude Carlet and Pierre{-}Alain Fouque}, title = {Guest Editorial}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0115-4}, doi = {10.1007/S12095-014-0115-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CarletF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CastroGM15, author = {Francis N. Castro and Oscar E. Gonz{\'{a}}lez and Luis A. Medina}, title = {A divisibility approach to the open boundary cases of Cusick-Li-St{\unicode{462}}nic{\unicode{462}}'s conjecture}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {379--402}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0124-y}, doi = {10.1007/S12095-015-0124-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CastroGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChakrabortyHS15, author = {Debrup Chakraborty and Vicente Hernandez{-}Jimenez and Palash Sarkar}, title = {Another look at {XCB}}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {439--468}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0127-8}, doi = {10.1007/S12095-015-0127-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChakrabortyHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ClavierIMW15, author = {Christophe Clavier and Quentin Isorez and Damien Marion and Antoine Wurcker}, title = {Complete reverse-engineering of AES-like block ciphers by {SCARE} and {FIRE} attacks}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {121--162}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0112-7}, doi = {10.1007/S12095-014-0112-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ClavierIMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/EdemskiyI15, author = {Vladimir Edemskiy and Andrey Ivanov}, title = {The linear complexity of balanced quaternary sequences with optimal autocorrelation value}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {485--496}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0130-0}, doi = {10.1007/S12095-015-0130-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/EdemskiyI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuoL15, author = {Chun Guo and Dongdai Lin}, title = {Improved domain extender for the ideal cipher}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {509--533}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0128-7}, doi = {10.1007/S12095-015-0128-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuptaR15, author = {Kishan Chand Gupta and Indranil Ghosh Ray}, title = {Cryptographically significant {MDS} matrices based on circulant and circulant-like matrices for lightweight applications}, journal = {Cryptogr. Commun.}, volume = {7}, number = {2}, pages = {257--287}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0116-3}, doi = {10.1007/S12095-014-0116-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuptaR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HePWW15, author = {Jing Jane He and Daniel Panario and Qiang Wang and Arne Winterhof}, title = {Linear complexity profile and correlation measure of interleaved sequences}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {497--508}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0131-z}, doi = {10.1007/S12095-015-0131-Z}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HePWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HodzicP15, author = {Samir Hodzic and Enes Pasalic}, title = {Generalized Bent Functions - Some General Construction Methods and Related Necessary and Sufficient Conditions}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {469--483}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0126-9}, doi = {10.1007/S12095-015-0126-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HodzicP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HuW15, author = {Zhi Hu and Lin Wang}, title = {Injectivity of compressing maps on the set of primitive sequences modulo square-free odd integers}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {347--361}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0121-6}, doi = {10.1007/S12095-014-0121-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HuW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Jolly15, author = {Nathan Jolly}, title = {An algebra of arrays and almost perfect watermarks}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {363--377}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0123-z}, doi = {10.1007/S12095-015-0123-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Jolly15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Li15, author = {Yuan Li}, title = {Characterization of robust immune symmetric boolean functions}, journal = {Cryptogr. Commun.}, volume = {7}, number = {3}, pages = {297--315}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0120-7}, doi = {10.1007/S12095-014-0120-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Li15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiLD15, author = {Mingchao Li and Miao Liang and Beiliang Du}, title = {A construction of t-fold perfect splitting authentication codes with equal deception probabilities}, journal = {Cryptogr. Commun.}, volume = {7}, number = {2}, pages = {207--215}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0107-4}, doi = {10.1007/S12095-014-0107-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiY15, author = {Chengju Li and Qin Yue}, title = {The Walsh transform of a class of monomial functions and cyclic codes}, journal = {Cryptogr. Commun.}, volume = {7}, number = {2}, pages = {217--228}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0109-2}, doi = {10.1007/S12095-014-0109-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LuoLJ15, author = {Yiyuan Luo and Xuejia Lai and Tiejun Jia}, title = {Attacks on a double length blockcipher-based hash proposal}, journal = {Cryptogr. Commun.}, volume = {7}, number = {3}, pages = {289--295}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0117-2}, doi = {10.1007/S12095-014-0117-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LuoLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MazumdarMS15, author = {Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Indranil Sengupta}, title = {Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {35--69}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0108-3}, doi = {10.1007/S12095-014-0108-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MazumdarMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MrabetFGL15, author = {Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin and Ronan Lashermes}, title = {A survey of fault attacks in pairing based cryptography}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {185--205}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0114-5}, doi = {10.1007/S12095-014-0114-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MrabetFGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/NikolicWW15, author = {Ivica Nikolic and Lei Wang and Shuang Wu}, title = {The parallel-cut meet-in-the-middle attack}, journal = {Cryptogr. Commun.}, volume = {7}, number = {3}, pages = {331--345}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0118-1}, doi = {10.1007/S12095-014-0118-1}, timestamp = {Tue, 13 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/NikolicWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Ortiz-Ubarri15, author = {Jos{\'{e}} R. Ortiz{-}Ubarri}, title = {New families of asymptotically optimal doubly periodic arrays with ideal correlation constraints}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {403--414}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0122-0}, doi = {10.1007/S12095-015-0122-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Ortiz-Ubarri15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RahimipourAG15, author = {Ali Reza Rahimipour and A. R. Ashrafi and Ahmad Gholami}, title = {The existence of minimal logarithmic signatures for the sporadic Suzuki and simple Suzuki groups}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {535--542}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0129-6}, doi = {10.1007/S12095-015-0129-6}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RahimipourAG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Sarkar15, author = {Santanu Sarkar}, title = {Further non-randomness in RC4, {RC4A} and {VMPC}}, journal = {Cryptogr. Commun.}, volume = {7}, number = {3}, pages = {317--330}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0119-0}, doi = {10.1007/S12095-014-0119-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Sarkar15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Sharma15, author = {Anuradha Sharma}, title = {Repeated-root constacyclic codes of length {\(\mathscr{l}\)} t p s and their dual codes}, journal = {Cryptogr. Commun.}, volume = {7}, number = {2}, pages = {229--255}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0106-5}, doi = {10.1007/S12095-014-0106-5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Sharma15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SwansonS15, author = {Colleen M. Swanson and Douglas R. Stinson}, title = {Extended results on privacy against coalitions of users in user-private information retrieval protocols}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {415--437}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0125-x}, doi = {10.1007/S12095-015-0125-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SwansonS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TunstallJ15, author = {Michael Tunstall and Marc Joye}, title = {The distributions of individual bits in the output of multiplicative operations}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {71--90}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0110-9}, doi = {10.1007/S12095-014-0110-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TunstallJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AcevedoJ14, author = {Santiago Barrera Acevedo and Nathan Jolly}, title = {Perfect arrays of unbounded sizes over the basic quaternions}, journal = {Cryptogr. Commun.}, volume = {6}, number = {1}, pages = {47--57}, year = {2014}, url = {https://doi.org/10.1007/s12095-013-0086-x}, doi = {10.1007/S12095-013-0086-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AcevedoJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BajicL14, author = {Dragana Bajic and Tatjana Loncar{-}Turukalo}, title = {A simple suboptimal construction of cross-bifix-free codes}, journal = {Cryptogr. Commun.}, volume = {6}, number = {1}, pages = {27--37}, year = {2014}, url = {https://doi.org/10.1007/s12095-013-0088-8}, doi = {10.1007/S12095-013-0088-8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/BajicL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BayMV14, author = {Asl{\'{\i}} Bay and Atefeh Mashatan and Serge Vaudenay}, title = {Revisiting iterated attacks in the context of decorrelation theory}, journal = {Cryptogr. Commun.}, volume = {6}, number = {4}, pages = {279--311}, year = {2014}, url = {https://doi.org/10.1007/s12095-014-0101-x}, doi = {10.1007/S12095-014-0101-X}, timestamp = {Wed, 28 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BayMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BerniniBPSV14, author = {Antonio Bernini and Stefano Bilotta and Renzo Pinzani and Ahmad Sabri and Vincent Vajnovszki}, title = {Prefix partitioned gray codes for particular cross-bifix-free sets}, journal = {Cryptogr. Commun.}, volume = {6}, number = {4}, pages = {359--369}, year = {2014}, url = {https://doi.org/10.1007/s12095-014-0105-6}, doi = {10.1007/S12095-014-0105-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BerniniBPSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudisinS14, author = {Srdjan Z. Budisin and Predrag Spasojevic}, title = {Paraunitary generation/correlation of {QAM} complementary sequence pairs}, journal = {Cryptogr. Commun.}, volume = {6}, number = {1}, pages = {59--102}, year = {2014}, url = {https://doi.org/10.1007/s12095-013-0087-9}, doi = {10.1007/S12095-013-0087-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudisinS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CharonHHL14, author = {Ir{\`{e}}ne Charon and Iiro S. Honkala and Olivier Hudry and Antoine Lobstein}, title = {Minimum sizes of identifying codes in graphs differing by one edge}, journal = {Cryptogr. Commun.}, volume = {6}, number = {2}, pages = {157--170}, year = {2014}, url = {https://doi.org/10.1007/s12095-013-0094-x}, doi = {10.1007/S12095-013-0094-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CharonHHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Dib14, author = {St{\'{e}}phanie Dib}, title = {Asymptotic nonlinearity of vectorial Boolean functions}, journal = {Cryptogr. Commun.}, volume = {6}, number = {2}, pages = {103--115}, year = {2014}, url = {https://doi.org/10.1007/s12095-013-0090-1}, doi = {10.1007/S12095-013-0090-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Dib14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/EmamiLNPW14, author = {Sareh Emami and San Ling and Ivica Nikolic and Josef Pieprzyk and Huaxiong Wang}, title = {The resistance of {PRESENT-80} against related-key differential attacks}, journal = {Cryptogr. Commun.}, volume = {6}, number = {3}, pages = {171--187}, year = {2014}, url = {https://doi.org/10.1007/s12095-013-0096-8}, doi = {10.1007/S12095-013-0096-8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/EmamiLNPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GaoC14, author = {Ying Gao and Romar dela Cruz}, title = {Secret sharing schemes based on graphical codes}, journal = {Cryptogr. Commun.}, volume = {6}, number = {2}, pages = {137--155}, year = {2014}, url = {https://doi.org/10.1007/s12095-013-0092-z}, doi = {10.1007/S12095-013-0092-Z}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GaoC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GongZWF14, author = {Xinxin Gong and Bin Zhang and Wenling Wu and Dengguo Feng}, title = {Computing Walsh coefficients from the algebraic normal form of a Boolean function}, journal = {Cryptogr. Commun.}, volume = {6}, number = {4}, pages = {335--358}, year = {2014}, url = {https://doi.org/10.1007/s12095-014-0103-8}, doi = {10.1007/S12095-014-0103-8}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GongZWF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Hariharan14, author = {Rema Hariharan}, title = {New near perfect sequences of even lengths}, journal = {Cryptogr. Commun.}, volume = {6}, number = {1}, pages = {39--46}, year = {2014}, url = {https://doi.org/10.1007/s12095-013-0093-y}, doi = {10.1007/S12095-013-0093-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Hariharan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HellesethJ14, author = {Tor Helleseth and Jonathan Jedwab}, title = {Special issue editorial: Sequences and their applications}, journal = {Cryptogr. Commun.}, volume = {6}, number = {1}, pages = {1--2}, year = {2014}, url = {https://doi.org/10.1007/s12095-014-0098-1}, doi = {10.1007/S12095-014-0098-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HellesethJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MandalGFA14, author = {Kalikinkar Mandal and Guang Gong and Xinxin Fan and Mark D. Aagaard}, title = {Optimal parameters for the {WG} stream cipher family}, journal = {Cryptogr. Commun.}, volume = {6}, number = {2}, pages = {117--135}, year = {2014}, url = {https://doi.org/10.1007/s12095-013-0091-0}, doi = {10.1007/S12095-013-0091-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MandalGFA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Sarkar14, author = {Palash Sarkar}, title = {Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector}, journal = {Cryptogr. Commun.}, volume = {6}, number = {3}, pages = {189--231}, year = {2014}, url = {https://doi.org/10.1007/s12095-013-0097-7}, doi = {10.1007/S12095-013-0097-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Sarkar14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ShanHZ14, author = {Jinyong Shan and Lei Hu and Xiangyong Zeng}, title = {Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher}, journal = {Cryptogr. Commun.}, volume = {6}, number = {3}, pages = {233--254}, year = {2014}, url = {https://doi.org/10.1007/s12095-014-0099-0}, doi = {10.1007/S12095-014-0099-0}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ShanHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WuP14, author = {Gaofei Wu and Matthew Geoffrey Parker}, title = {A complementary construction using mutually unbiased bases}, journal = {Cryptogr. Commun.}, volume = {6}, number = {1}, pages = {3--25}, year = {2014}, url = {https://doi.org/10.1007/s12095-013-0095-9}, doi = {10.1007/S12095-013-0095-9}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WuP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZajacJ14, author = {Pavol Zajac and Mat{\'{u}}s J{\'{o}}kay}, title = {Multiplicative complexity of bijective 4{\texttimes}4 S-boxes}, journal = {Cryptogr. Commun.}, volume = {6}, number = {3}, pages = {255--277}, year = {2014}, url = {https://doi.org/10.1007/s12095-014-0100-y}, doi = {10.1007/S12095-014-0100-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZajacJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ZhuG14, author = {Bo Zhu and Guang Gong}, title = {Multidimensional meet-in-the-middle attack and its applications to {KATAN32/48/64}}, journal = {Cryptogr. Commun.}, volume = {6}, number = {4}, pages = {313--333}, year = {2014}, url = {https://doi.org/10.1007/s12095-014-0102-9}, doi = {10.1007/S12095-014-0102-9}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ZhuG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ArasuSV13, author = {K. T. Arasu and Simone Severini and Edmund Velten}, title = {Block weighing matrices}, journal = {Cryptogr. Commun.}, volume = {5}, number = {3}, pages = {201--207}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0083-0}, doi = {10.1007/S12095-013-0083-0}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ArasuSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BrownC13, author = {Alyssa Brown and Thomas W. Cusick}, title = {Equivalence classes for cubic rotation symmetric functions}, journal = {Cryptogr. Commun.}, volume = {5}, number = {2}, pages = {85--118}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0075-5}, doi = {10.1007/S12095-012-0075-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BrownC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CharonHHL13, author = {Ir{\`{e}}ne Charon and Iiro S. Honkala and Olivier Hudry and Antoine Lobstein}, title = {Minimum sizes of identifying codes in graphs differing by one vertex}, journal = {Cryptogr. Commun.}, volume = {5}, number = {2}, pages = {119--136}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0078-2}, doi = {10.1007/S12095-012-0078-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CharonHHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CruzW13, author = {Romar dela Cruz and Huaxiong Wang}, title = {Cheating-immune secret sharing schemes from codes and cumulative arrays}, journal = {Cryptogr. Commun.}, volume = {5}, number = {1}, pages = {67--83}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0076-4}, doi = {10.1007/S12095-012-0076-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CruzW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Cusick13, author = {Thomas W. Cusick}, title = {Finding Hamming weights without looking at truth tables}, journal = {Cryptogr. Commun.}, volume = {5}, number = {1}, pages = {7--18}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0072-8}, doi = {10.1007/S12095-012-0072-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Cusick13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DasC13, author = {Sourav Das and Dipanwita Roy Chowdhury}, title = {{CAR30:} {A} new scalable stream cipher with rule 30}, journal = {Cryptogr. Commun.}, volume = {5}, number = {2}, pages = {137--162}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0079-1}, doi = {10.1007/S12095-012-0079-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DasC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DingFFXZ13, author = {Cunsheng Ding and Keqin Feng and Rongquan Feng and Maosheng Xiong and Aixian Zhang}, title = {Unit time-phase signal sets: Bounds and constructions}, journal = {Cryptogr. Commun.}, volume = {5}, number = {3}, pages = {209--227}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0085-y}, doi = {10.1007/S12095-013-0085-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DingFFXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GongAF13, author = {Guang Gong and Mark D. Aagaard and Xinxin Fan}, title = {Resilience to distinguishing attacks on {WG-7} cipher and their generalizations}, journal = {Cryptogr. Commun.}, volume = {5}, number = {4}, pages = {277--289}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0089-7}, doi = {10.1007/S12095-013-0089-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GongAF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuptaCK13, author = {Sourav Sen Gupta and Anupam Chattopadhyay and Ayesha Khalid}, title = {Designing integrated accelerator for stream ciphers with structural similarities}, journal = {Cryptogr. Commun.}, volume = {5}, number = {1}, pages = {19--47}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0074-6}, doi = {10.1007/S12095-012-0074-6}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/GuptaCK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JaddaPQ13, author = {Zoubida Jadda and Patrice Parraud and Soukayna Qarboua}, title = {Quaternary cryptographic bent functions and their binary projection}, journal = {Cryptogr. Commun.}, volume = {5}, number = {1}, pages = {49--65}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0077-3}, doi = {10.1007/S12095-012-0077-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/JaddaPQ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Leducq13, author = {Elodie Leducq}, title = {Second weight codewords of generalized Reed-Muller codes}, journal = {Cryptogr. Commun.}, volume = {5}, number = {4}, pages = {241--276}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0084-z}, doi = {10.1007/S12095-013-0084-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Leducq13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LimniotisKK13, author = {Konstantinos Limniotis and Nicholas Kolokotronis and Nicholas Kalouptsidis}, title = {Secondary constructions of Boolean functions with maximum algebraic immunity}, journal = {Cryptogr. Commun.}, volume = {5}, number = {3}, pages = {179--199}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0081-2}, doi = {10.1007/S12095-013-0081-2}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/LimniotisKK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PatersonS13, author = {Maura B. Paterson and Douglas R. Stinson}, title = {A simple combinatorial treatment of constructions and threshold gaps of ramp schemes}, journal = {Cryptogr. Commun.}, volume = {5}, number = {4}, pages = {229--240}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0082-1}, doi = {10.1007/S12095-013-0082-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PatersonS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SalageanBP13, author = {Ana Salagean and Alex J. Burrage and Raphael C.{-}W. Phan}, title = {Computing the linear complexity for sequences with characteristic polynomial f v}, journal = {Cryptogr. Commun.}, volume = {5}, number = {2}, pages = {163--177}, year = {2013}, url = {https://doi.org/10.1007/s12095-013-0080-3}, doi = {10.1007/S12095-013-0080-3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SalageanBP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/WangLZ13, author = {Wenhao Wang and Meicheng Liu and Yin Zhang}, title = {Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation"}, journal = {Cryptogr. Commun.}, volume = {5}, number = {1}, pages = {1--6}, year = {2013}, url = {https://doi.org/10.1007/s12095-012-0063-9}, doi = {10.1007/S12095-012-0063-9}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/WangLZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/0002VM12, author = {Yi Lu and Serge Vaudenay and Willi Meier}, title = {Synthetic linear analysis with applications to CubeHash and Rabbit}, journal = {Cryptogr. Commun.}, volume = {4}, number = {3-4}, pages = {259--276}, year = {2012}, url = {https://doi.org/10.1007/s12095-012-0064-8}, doi = {10.1007/S12095-012-0064-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/0002VM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AgrenLHJ12, author = {Martin {\AA}gren and Carl L{\"{o}}ndahl and Martin Hell and Thomas Johansson}, title = {A survey on fast correlation attacks}, journal = {Cryptogr. Commun.}, volume = {4}, number = {3-4}, pages = {173--202}, year = {2012}, url = {https://doi.org/10.1007/s12095-012-0062-x}, doi = {10.1007/S12095-012-0062-X}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/AgrenLHJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BeelenL12, author = {Peter Beelen and Gregor Leander}, title = {A new construction of highly nonlinear S-boxes}, journal = {Cryptogr. Commun.}, volume = {4}, number = {1}, pages = {65--77}, year = {2012}, url = {https://doi.org/10.1007/s12095-011-0052-4}, doi = {10.1007/S12095-011-0052-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BeelenL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BileschiCP12, author = {Maxwell L. Bileschi and Thomas W. Cusick and Daniel Padgett}, title = {Weights of Boolean cubic monomial rotation symmetric functions}, journal = {Cryptogr. Commun.}, volume = {4}, number = {2}, pages = {105--130}, year = {2012}, url = {https://doi.org/10.1007/s12095-011-0060-4}, doi = {10.1007/S12095-011-0060-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BileschiCP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CanteautN12, author = {Anne Canteaut and Mar{\'{\i}}a Naya{-}Plasencia}, title = {Correlation attacks on combination generators}, journal = {Cryptogr. Commun.}, volume = {4}, number = {3-4}, pages = {147--171}, year = {2012}, url = {https://doi.org/10.1007/s12095-012-0069-3}, doi = {10.1007/S12095-012-0069-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CanteautN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DinurS12, author = {Itai Dinur and Adi Shamir}, title = {Applying cube attacks to stream ciphers in realistic scenarios}, journal = {Cryptogr. Commun.}, volume = {4}, number = {3-4}, pages = {217--232}, year = {2012}, url = {https://doi.org/10.1007/s12095-012-0068-4}, doi = {10.1007/S12095-012-0068-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DinurS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HermelinN12, author = {Miia Hermelin and Kaisa Nyberg}, title = {Multidimensional linear distinguishing attacks and Boolean functions}, journal = {Cryptogr. Commun.}, volume = {4}, number = {1}, pages = {47--64}, year = {2012}, url = {https://doi.org/10.1007/s12095-011-0053-3}, doi = {10.1007/S12095-011-0053-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HermelinN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KamalY12, author = {Abdel Alim Kamal and Amr M. Youssef}, title = {Fault analysis of the NTRUSign digital signature scheme}, journal = {Cryptogr. Commun.}, volume = {4}, number = {2}, pages = {131--144}, year = {2012}, url = {https://doi.org/10.1007/s12095-011-0061-3}, doi = {10.1007/S12095-011-0061-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KamalY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KnellwolfM12, author = {Simon Knellwolf and Willi Meier}, title = {High order differential attacks on stream ciphers}, journal = {Cryptogr. Commun.}, volume = {4}, number = {3-4}, pages = {203--215}, year = {2012}, url = {https://doi.org/10.1007/s12095-012-0071-9}, doi = {10.1007/S12095-012-0071-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KnellwolfM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MaitraS12, author = {Subhamoy Maitra and Palash Sarkar}, title = {Guest editorial}, journal = {Cryptogr. Commun.}, volume = {4}, number = {3-4}, pages = {145--146}, year = {2012}, url = {https://doi.org/10.1007/s12095-012-0073-7}, doi = {10.1007/S12095-012-0073-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MaitraS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/OrumiehchihaPS12, author = {Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld}, title = {Cryptanalysis of {WG-7:} a lightweight stream cipher}, journal = {Cryptogr. Commun.}, volume = {4}, number = {3-4}, pages = {277--285}, year = {2012}, url = {https://doi.org/10.1007/s12095-012-0070-x}, doi = {10.1007/S12095-012-0070-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/OrumiehchihaPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Pasalic12, author = {Enes Pasalic}, title = {A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation}, journal = {Cryptogr. Commun.}, volume = {4}, number = {1}, pages = {25--45}, year = {2012}, url = {https://doi.org/10.1007/s12095-011-0057-z}, doi = {10.1007/S12095-011-0057-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Pasalic12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Poinsot12, author = {Laurent Poinsot}, title = {Non Abelian bent functions}, journal = {Cryptogr. Commun.}, volume = {4}, number = {1}, pages = {1--23}, year = {2012}, url = {https://doi.org/10.1007/s12095-011-0058-y}, doi = {10.1007/S12095-011-0058-Y}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Poinsot12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SiD12, author = {Wenpei Si and Cunsheng Ding}, title = {A simple stream cipher with proven properties}, journal = {Cryptogr. Commun.}, volume = {4}, number = {2}, pages = {79--104}, year = {2012}, url = {https://doi.org/10.1007/s12095-011-0059-x}, doi = {10.1007/S12095-011-0059-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SiD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SimpsonB12, author = {Leonie Simpson and Serdar Boztas}, title = {State cycles, initialization and the Trivium stream cipher}, journal = {Cryptogr. Commun.}, volume = {4}, number = {3-4}, pages = {245--258}, year = {2012}, url = {https://doi.org/10.1007/s12095-012-0066-6}, doi = {10.1007/S12095-012-0066-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SimpsonB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Turan12, author = {Meltem S{\"{o}}nmez Turan}, title = {On the nonlinearity of maximum-length {NFSR} feedbacks}, journal = {Cryptogr. Commun.}, volume = {4}, number = {3-4}, pages = {233--243}, year = {2012}, url = {https://doi.org/10.1007/s12095-012-0067-5}, doi = {10.1007/S12095-012-0067-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Turan12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AlyW11, author = {Hassan Aly and Arne Winterhof}, title = {Boolean functions derived from Fermat quotients}, journal = {Cryptogr. Commun.}, volume = {3}, number = {3}, pages = {165--174}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0043-5}, doi = {10.1007/S12095-011-0043-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AlyW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ArnaultBP11, author = {Fran{\c{c}}ois Arnault and Thierry P. Berger and Benjamin Pousse}, title = {A matrix approach for {FCSR} automata}, journal = {Cryptogr. Commun.}, volume = {3}, number = {2}, pages = {109--139}, year = {2011}, url = {https://doi.org/10.1007/s12095-010-0041-z}, doi = {10.1007/S12095-010-0041-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ArnaultBP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/AubryCLV11, author = {Yves Aubry and Claude Carlet and Philippe Langevin and Pascal V{\'{e}}ron}, title = {Guest editorial for the special issue for Jacques Wolfmann}, journal = {Cryptogr. Commun.}, volume = {3}, number = {4}, pages = {187--188}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0056-0}, doi = {10.1007/S12095-011-0056-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/AubryCLV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BalletR11, author = {St{\'{e}}phane Ballet and Robert Rolland}, title = {A note on Yao's theorem about pseudo-random generators}, journal = {Cryptogr. Commun.}, volume = {3}, number = {4}, pages = {189--206}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0047-1}, doi = {10.1007/S12095-011-0047-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BalletR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BrackenBMM11, author = {Carl Bracken and Eimear Byrne and Nadya Markin and Gary McGuire}, title = {A few more quadratic {APN} functions}, journal = {Cryptogr. Commun.}, volume = {3}, number = {1}, pages = {43--53}, year = {2011}, url = {https://doi.org/10.1007/s12095-010-0038-7}, doi = {10.1007/S12095-010-0038-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BrackenBMM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BudaghyanH11, author = {Lilya Budaghyan and Tor Helleseth}, title = {New commutative semifields defined by new {PN} multinomials}, journal = {Cryptogr. Commun.}, volume = {3}, number = {1}, pages = {1--16}, year = {2011}, url = {https://doi.org/10.1007/s12095-010-0022-2}, doi = {10.1007/S12095-010-0022-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BudaghyanH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChoyCKY11, author = {Jiali Choy and Guanhan Chew and Khoongming Khoo and Huihui Yap}, title = {Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure}, journal = {Cryptogr. Commun.}, volume = {3}, number = {3}, pages = {141--164}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0042-6}, doi = {10.1007/S12095-011-0042-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChoyCKY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Dillon11, author = {John F. Dillon}, title = {On the dimension of an {APN} code}, journal = {Cryptogr. Commun.}, volume = {3}, number = {4}, pages = {275--279}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0049-z}, doi = {10.1007/S12095-011-0049-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Dillon11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FarmerH11, author = {David G. Farmer and Kathy J. Horadam}, title = {Equivalence classes of multiplicative central (\emph{p}\({}^{\mbox{\emph{n}}}\), \emph{p}\({}^{\mbox{\emph{n}}}\), \emph{p}\({}^{\mbox{\emph{n}}}\), 1)-relative difference sets}, journal = {Cryptogr. Commun.}, volume = {3}, number = {1}, pages = {17--28}, year = {2011}, url = {https://doi.org/10.1007/s12095-010-0026-y}, doi = {10.1007/S12095-010-0026-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/FarmerH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HellesethK11, author = {Tor Helleseth and Alexander Kholosha}, title = {Crosscorrelation of m-sequences, exponential sums, bent functions and Jacobsthal sums}, journal = {Cryptogr. Commun.}, volume = {3}, number = {4}, pages = {281--291}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0048-0}, doi = {10.1007/S12095-011-0048-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HellesethK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiW11, author = {Yongqiang Li and Mingsheng Wang}, title = {Permutation polynomials EA-equivalent to the inverse function over {GF} (2\({}^{\mbox{\emph{n}}}\))}, journal = {Cryptogr. Commun.}, volume = {3}, number = {3}, pages = {175--186}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0045-3}, doi = {10.1007/S12095-011-0045-3}, timestamp = {Mon, 31 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MartinPS11, author = {Keith M. Martin and Maura B. Paterson and Douglas R. Stinson}, title = {Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures}, journal = {Cryptogr. Commun.}, volume = {3}, number = {2}, pages = {65--86}, year = {2011}, url = {https://doi.org/10.1007/s12095-010-0039-6}, doi = {10.1007/S12095-010-0039-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MartinPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/OuahadaSF11, author = {Khmaies Ouahada and Theo G. Swart and Hendrik C. Ferreira}, title = {Permutation sequences and coded {PAM} signals with spectral nulls at rational submultiples of the symbol frequency}, journal = {Cryptogr. Commun.}, volume = {3}, number = {2}, pages = {87--108}, year = {2011}, url = {https://doi.org/10.1007/s12095-010-0040-0}, doi = {10.1007/S12095-010-0040-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/OuahadaSF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/OzbudakSS11, author = {Ferruh {\"{O}}zbudak and Elif Saygi and Z{\"{u}}lf{\"{u}}kar Saygi}, title = {Quadratic forms of codimension 2 over certain finite fields of even characteristic}, journal = {Cryptogr. Commun.}, volume = {3}, number = {4}, pages = {241--257}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0051-5}, doi = {10.1007/S12095-011-0051-5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/OzbudakSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ParriauxGM11, author = {J{\'{e}}r{\'{e}}my Parriaux and Philippe Guillot and Gilles Millerioux}, title = {Towards a spectral approach for the design of self-synchronizing stream ciphers}, journal = {Cryptogr. Commun.}, volume = {3}, number = {4}, pages = {259--274}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0046-2}, doi = {10.1007/S12095-011-0046-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ParriauxGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PottZ11, author = {Alexander Pott and Yue Zhou}, title = {A character theoretic approach to planar functions}, journal = {Cryptogr. Commun.}, volume = {3}, number = {4}, pages = {293--300}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0044-4}, doi = {10.1007/S12095-011-0044-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PottZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Rodier11, author = {Fran{\c{c}}ois Rodier}, title = {Functions of degree 4e that are not {APN} infinitely often}, journal = {Cryptogr. Commun.}, volume = {3}, number = {4}, pages = {227--240}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0050-6}, doi = {10.1007/S12095-011-0050-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Rodier11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RovettaM11, author = {Christelle Rovetta and Marc Mouffron}, title = {De Bruijn sequences and complexity of symmetric functions}, journal = {Cryptogr. Commun.}, volume = {3}, number = {4}, pages = {207--225}, year = {2011}, url = {https://doi.org/10.1007/s12095-011-0054-2}, doi = {10.1007/S12095-011-0054-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RovettaM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Wang11, author = {Li{-}Ping Wang}, title = {A lattice-based minimal partial realization algorithm for matrix sequences of varying length}, journal = {Cryptogr. Commun.}, volume = {3}, number = {1}, pages = {29--42}, year = {2011}, url = {https://doi.org/10.1007/s12095-010-0037-8}, doi = {10.1007/S12095-010-0037-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Wang11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/YangK11, author = {Zheng Yang and Pinhui Ke}, title = {Construction of quaternary sequences of length \emph{pq} with low autocorrelation}, journal = {Cryptogr. Commun.}, volume = {3}, number = {2}, pages = {55--64}, year = {2011}, url = {https://doi.org/10.1007/s12095-010-0034-y}, doi = {10.1007/S12095-010-0034-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/YangK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ArasuG10, author = {Krishnasamy Thiru Arasu and Alex J. Gutman}, title = {Circulant weighing matrices}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {155--171}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0025-z}, doi = {10.1007/S12095-010-0025-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ArasuG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Armario10, author = {Jos{\'{e}} Andr{\'{e}}s Armario}, title = {On an inequivalence criterion for cocyclic Hadamard matrices}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {247--259}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0024-0}, doi = {10.1007/S12095-010-0024-0}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/Armario10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BestK10, author = {Darcy Best and Hadi Kharaghani}, title = {Unbiased complex Hadamard matrices and bases}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {199--209}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0029-8}, doi = {10.1007/S12095-010-0029-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BestK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CanfieldGGMR10, author = {E. Rodney Canfield and Zhicheng Gao and Catherine S. Greenhill and Brendan D. McKay and Robert W. Robinson}, title = {Asymptotic enumeration of correlation-immune boolean functions}, journal = {Cryptogr. Commun.}, volume = {2}, number = {1}, pages = {111--126}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0019-x}, doi = {10.1007/S12095-010-0019-X}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CanfieldGGMR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CathainS10, author = {Padraig {\'{O}} Cath{\'{a}}in and Richard M. Stafford}, title = {On twin prime power Hadamard matrices}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {261--269}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0030-2}, doi = {10.1007/S12095-010-0030-2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CathainS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Dillon10, author = {J. F. Dillon}, title = {Some {REALLY} beautiful Hadamard matrices}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {271--292}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0031-1}, doi = {10.1007/S12095-010-0031-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Dillon10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FlanneryH10, author = {Dane L. Flannery and Kathy J. Horadam}, title = {Guest editorial for the special issue on design theory}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {127--128}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0035-x}, doi = {10.1007/S12095-010-0035-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/FlanneryH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GodeG10, author = {Ruchi Gode and Sugata Gangopadhyay}, title = {Third-order nonlinearities of a subclass of Kasami functions}, journal = {Cryptogr. Commun.}, volume = {2}, number = {1}, pages = {69--83}, year = {2010}, url = {https://doi.org/10.1007/s12095-009-0017-z}, doi = {10.1007/S12095-009-0017-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GodeG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HellesethK10, author = {Tor Helleseth and Alexander Kholosha}, title = {x\({}^{\mbox{2\({}^{\mbox{l}}\)+1}}\)+x+a and related affine polynomials over {GF} (2\({}^{\mbox{\emph{k}}}\))}, journal = {Cryptogr. Commun.}, volume = {2}, number = {1}, pages = {85--109}, year = {2010}, url = {https://doi.org/10.1007/s12095-009-0018-y}, doi = {10.1007/S12095-009-0018-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HellesethK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Horadam10, author = {Kathy J. Horadam}, title = {Hadamard matrices and their applications: Progress 2007-2010}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {129--154}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0032-0}, doi = {10.1007/S12095-010-0032-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Horadam10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Huber10, author = {Michael Huber}, title = {Combinatorial bounds and characterizations of splitting authentication codes}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {173--185}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0020-4}, doi = {10.1007/S12095-010-0020-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Huber10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/JamingMM10, author = {Philippe Jaming and M{\'{a}}t{\'{e}} Matolcsi and P{\'{e}}ter M{\'{o}}ra}, title = {The problem of mutually unbiased bases in dimension 6}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {211--220}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0023-1}, doi = {10.1007/S12095-010-0023-1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/JamingMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KircanskiY10, author = {Aleksandar Kircanski and Amr M. Youssef}, title = {On the structural weakness of the {GGHN} stream cipher}, journal = {Cryptogr. Commun.}, volume = {2}, number = {1}, pages = {1--17}, year = {2010}, url = {https://doi.org/10.1007/s12095-009-0013-3}, doi = {10.1007/S12095-009-0013-3}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KircanskiY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LauneyG10, author = {Warwick de Launey and Daniel M. Gordon}, title = {On the density of the set of known Hadamard orders}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {233--246}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0028-9}, doi = {10.1007/S12095-010-0028-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LauneyG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LauneyL10, author = {Warwick de Launey and David A. Levin}, title = {A Fourier-analytic approach to counting partial Hadamard matrices}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {307--334}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0033-z}, doi = {10.1007/S12095-010-0033-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LauneyL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/OstafeS10, author = {Alina Ostafe and Igor E. Shparlinski}, title = {Pseudorandom numbers and hash functions from iterations of multivariate polynomials}, journal = {Cryptogr. Commun.}, volume = {2}, number = {1}, pages = {49--67}, year = {2010}, url = {https://doi.org/10.1007/s12095-009-0016-0}, doi = {10.1007/S12095-009-0016-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/OstafeS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Pelto10, author = {Mikko Pelto}, title = {New bounds for (\emph{r}, {\textless}= 2)-identifying codes in the infinite king grid}, journal = {Cryptogr. Commun.}, volume = {2}, number = {1}, pages = {41--47}, year = {2010}, url = {https://doi.org/10.1007/s12095-009-0015-1}, doi = {10.1007/S12095-009-0015-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Pelto10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RaoDH10, author = {Asha Rao and Diane M. Donovan and Joanne L. Hall}, title = {Mutually orthogonal Latin squares and mutually unbiased bases in dimensions of odd prime power - {MOLS} and MUBs in odd prime power dimensions}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {221--231}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0027-x}, doi = {10.1007/S12095-010-0027-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RaoDH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Rolland10, author = {Robert Rolland}, title = {The second weight of generalized Reed-Muller codes in most cases}, journal = {Cryptogr. Commun.}, volume = {2}, number = {1}, pages = {19--40}, year = {2010}, url = {https://doi.org/10.1007/s12095-009-0014-2}, doi = {10.1007/S12095-009-0014-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Rolland10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SeberryM10, author = {Jennifer Seberry and Marilena Mitrouli}, title = {Some remarks on Hadamard matrices}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {293--306}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0036-9}, doi = {10.1007/S12095-010-0036-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SeberryM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Szollosi10, author = {Ferenc Sz{\"{o}}ll{\"{o}}si}, title = {Exotic complex Hadamard matrices and their equivalence}, journal = {Cryptogr. Commun.}, volume = {2}, number = {2}, pages = {187--198}, year = {2010}, url = {https://doi.org/10.1007/s12095-010-0021-3}, doi = {10.1007/S12095-010-0021-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Szollosi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Carlet09, author = {Claude Carlet}, title = {Editorial: Cryptography and Communications, Volume 1, Issue 1}, journal = {Cryptogr. Commun.}, volume = {1}, number = {1}, pages = {1--2}, year = {2009}, url = {https://doi.org/10.1007/s12095-009-0010-6}, doi = {10.1007/S12095-009-0010-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Carlet09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ColbournF09, author = {Charles J. Colbourn and Yuichiro Fujiwara}, title = {Small stopping sets in Steiner triple systems}, journal = {Cryptogr. Commun.}, volume = {1}, number = {1}, pages = {31--46}, year = {2009}, url = {https://doi.org/10.1007/s12095-008-0002-y}, doi = {10.1007/S12095-008-0002-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ColbournF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/DaemenR09, author = {Joan Daemen and Vincent Rijmen}, title = {New criteria for linear maps in AES-like ciphers}, journal = {Cryptogr. Commun.}, volume = {1}, number = {1}, pages = {47--69}, year = {2009}, url = {https://doi.org/10.1007/s12095-008-0003-x}, doi = {10.1007/S12095-008-0003-X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/DaemenR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/FuNO09, author = {Fang{-}Wei Fu and Harald Niederreiter and Ferruh {\"{O}}zbudak}, title = {Joint linear complexity of multisequences consisting of linear recurring sequences}, journal = {Cryptogr. Commun.}, volume = {1}, number = {1}, pages = {3--29}, year = {2009}, url = {https://doi.org/10.1007/s12095-007-0001-4}, doi = {10.1007/S12095-007-0001-4}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/FuNO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HellJB09, author = {Martin Hell and Thomas Johansson and Lennart Brynielsson}, title = {An overview of distinguishing attacks on stream ciphers}, journal = {Cryptogr. Commun.}, volume = {1}, number = {1}, pages = {71--94}, year = {2009}, url = {https://doi.org/10.1007/s12095-008-0006-7}, doi = {10.1007/S12095-008-0006-7}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ccds/HellJB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KavuluruK09, author = {Ramakanth Kavuluru and Andrew Klapper}, title = {Lower bounds on error complexity measures for periodic {LFSR} and {FCSR} sequences}, journal = {Cryptogr. Commun.}, volume = {1}, number = {1}, pages = {95--116}, year = {2009}, url = {https://doi.org/10.1007/s12095-008-0004-9}, doi = {10.1007/S12095-008-0004-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KavuluruK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KircanskiAY09, author = {Aleksandar Kircanski and Rabeah Al{-}Zaidy and Amr M. Youssef}, title = {A new distinguishing and key recovery attack on {NGG} stream cipher}, journal = {Cryptogr. Commun.}, volume = {1}, number = {2}, pages = {269--282}, year = {2009}, url = {https://doi.org/10.1007/s12095-009-0012-4}, doi = {10.1007/S12095-009-0012-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KircanskiAY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/KolokotronisLK09, author = {Nicholas Kolokotronis and Konstantinos Limniotis and Nicholas Kalouptsidis}, title = {Factorization of determinants over finite fields and application in stream ciphers}, journal = {Cryptogr. Commun.}, volume = {1}, number = {2}, pages = {175--205}, year = {2009}, url = {https://doi.org/10.1007/s12095-008-0005-8}, doi = {10.1007/S12095-008-0005-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/KolokotronisLK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Meidl09, author = {Wilfried Meidl}, title = {How to determine linear complexity and \emph{k}-error linear complexity in some classes of linear recurring sequences}, journal = {Cryptogr. Commun.}, volume = {1}, number = {1}, pages = {117--133}, year = {2009}, url = {https://doi.org/10.1007/s12095-008-0007-6}, doi = {10.1007/S12095-008-0007-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Meidl09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PaulM09, author = {Goutam Paul and Subhamoy Maitra}, title = {On biases of permutation and keystream bytes of {RC4} towards the secret key}, journal = {Cryptogr. Commun.}, volume = {1}, number = {2}, pages = {225--268}, year = {2009}, url = {https://doi.org/10.1007/s12095-008-0009-4}, doi = {10.1007/S12095-008-0009-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PaulM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SanadhyaS09, author = {Somitra Kumar Sanadhya and Palash Sarkar}, title = {A combinatorial analysis of recent attacks on step reduced {SHA-2} family}, journal = {Cryptogr. Commun.}, volume = {1}, number = {2}, pages = {135--173}, year = {2009}, url = {https://doi.org/10.1007/s12095-009-0011-5}, doi = {10.1007/S12095-009-0011-5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SanadhyaS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/XuQZ09, author = {Hong Xu and Wen{-}Feng Qi and Yonghui Zheng}, title = {Autocorrelations of \emph{l}-sequences with prime connection integer}, journal = {Cryptogr. Commun.}, volume = {1}, number = {2}, pages = {207--223}, year = {2009}, url = {https://doi.org/10.1007/s12095-008-0008-5}, doi = {10.1007/S12095-008-0008-5}, timestamp = {Wed, 08 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/XuQZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.