![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Cryptography and Communications, Volume 10
Volume 10, Number 1, January 2018
- Tor Helleseth, Bart Preneel
:
Editorial: Special issue on recent trends in cryptography. 1-3 - Michael Scott:
Missing a trick: Karatsuba variations. 5-15 - Houda Ferradi, Rémi Géraud
, Diana Maimut
, David Naccache, Hang Zhou:
Backtracking-assisted multiplication. 17-26 - Sonia Bogos
, John Gaspoz, Serge Vaudenay:
Cryptanalysis of a homomorphic encryption scheme. 27-39 - Marie-Sarah Lacharité
:
Security of BLS and BGLS signatures in a multi-user setting. 41-58 - Valérie Nachef
, Jacques Patarin, Emmanuel Volte:
Generic attacks with standard deviation analysis on a-feistel schemes. 59-77 - Brett Hemenway
, Rafail Ostrovsky:
Efficient robust secret sharing from expander graphs. 79-99 - Eloi de Chérisey
, Sylvain Guilley, Annelie Heuser, Olivier Rioul
:
On the optimality and practicability of mutual information analysis in some scenarios. 101-121 - Gregory G. Rose:
KISS: A bit too simple. 123-137 - Geong Sen Poh, Moesfa Soeheila Mohamad, Ji-Jian Chin
:
Searchable symmetric encryption over multiple servers. 139-158 - Tomás Fabsic
, Otokar Grosek
, Karol Nemoga
, Pavol Zajac
:
On generating invertible circulant binary matrices with a prescribed number of ones. 159-175 - Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:
POEx: A beyond-birthday-bound-secure on-line cipher. 177-193 - Tingting Cui, Huaifeng Chen, Long Wen, Meiqin Wang:
Statistical integral attack on CAST-256 and IDEA. 195-209 - Cécile Pierrot
, Benjamin Wesolowski:
Malleability of the blockchain's entropy. 211-233
Volume 10, Number 2, March 2018
- Nurdagül Anbar
, Wilfried Meidl:
Modified planar functions and their components. 235-249 - Zuling Chang, Martianus Frederic Ezerman
, San Ling
, Huaxiong Wang:
Construction of de Bruijn sequences from product of two irreducible polynomials. 251-275 - Lin Sok, Minjia Shi, Patrick Solé:
Classification and Construction of quaternary self-dual bent functions. 277-289 - Pan Tan, Zhengchun Zhou
, Deng Tang
, Tor Helleseth:
The weight distribution of a class of two-weight linear codes derived from Kloosterman sums. 291-299 - Gaojun Luo, Xiwang Cao, Shanding Xu, Jiafu Mi:
Binary linear codes with two or three weights from niho exponents. 301-318 - Cunsheng Ding:
A sequence construction of cyclic codes over finite fields. 319-341 - Mokshi Goyal, Madhu Raka
:
Quadratic residue codes over the ring 𝔽p[u]/〈 um - u 〉 and their Gray images. 343-355 - Santiago Barrera Acevedo
, Heiko Dietrich
:
Perfect sequences over the quaternions and (4n, 2, 4n, 2n)-relative difference sets in C n × Q 8. 357-368 - Andrew Klapper:
Matrix parametrized shift registers. 369-382 - Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist:
Message Authentication Based on Cryptographically Secure CRC without Polynomial Irreducibility Test. 383-399
Volume 10, Number 3, May 2018
- Anuradha Sharma
, Taranjot Kaur:
Enumeration formulae for self-dual, self-orthogonal and complementary-dual quasi-cyclic codes over finite fields. 401-435 - Shanding Xu, Xiwang Cao, Guangkui Xu, Gaojun Luo:
Two classes of near-optimal frequency-hopping sequence sets with prime-power period. 437-454 - Li-Ping Wang, Daqing Wan:
On lattice-based algebraic feedback shift registers synthesis for multisequences. 455-465 - Yuhua Sun
, Qiang Wang
, Tongjiang Yan:
The exact autocorrelation distribution and 2-adic complexity of a class of binary sequences with almost optimal autocorrelation. 467-477 - Amit Jana, Goutam Paul
:
Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs. 479-508 - Serdar Boztas
, Ferruh Özbudak
, Eda Tekin
:
Generalized nonbinary sequences with perfect autocorrelation, flexible alphabets and new periods. 509-517 - R. Sobhani
:
Cyclic codes over a non-commutative finite chain ring. 519-530 - Kangquan Li, Longjiang Qu, Xi Chen, Chao Li:
Permutation polynomials of the form cx + Trql/q(xa) and permutation trinomials over finite fields with even characteristic. 531-554 - Xuli Zhang, Jing Jiang, Minquan Cheng:
Bounds and constructions for 3¯-strongly separable codes with length 3. 555-565 - Zhengbang Zha, Lei Hu, Zhizheng Zhang:
New results on permutation polynomials of the form (x p m - x + δ) s + x p m + x over 𝔽 p2m. 567-578
Volume 10, Number 4, July 2018
- Xiusheng Liu, Hai Q. Dinh, Hualu Liu, Long Yu:
On new quantum codes from matrix product codes. 579-589 - Zongxiang Yi
, Zhiqiang Lin, Lishan Ke:
A generic method to construct zero-difference balanced functions. 591-609 - Yousuf Alsalami
:
Constructions with high algebraic degree of differentially 4-uniform (n, n - 1)-functions and differentially 8-uniform (n, n - 2)-functions. 611-628 - Kalikinkar Mandal, Bo Yang, Guang Gong, Mark D. Aagaard:
On ideal t-tuple distribution of filtering de Bruijn sequence generators. 629-641 - Zhonghua Sun, Shixin Zhu, Liqi Wang:
The symbol-pair distance distribution of a class of repeated-root cyclic codes over 𝔽pm. 643-653 - Francis N. Castro, Luis A. Medina, Ivelisse M. Rubio
:
Exact 2-divisibility of exponential sums associated to boolean functions. 655-666 - Elena Barcucci, Antonio Bernini
, Stefano Bilotta, Renzo Pinzani:
A 2D non-overlapping code over a q-ary alphabet. 667-683 - Somphong Jitman
:
Good integers and some applications in coding theory. 685-704 - Aleksandr Tuxanidy, Qiang Wang
:
Characteristic digit-sum sequences. 705-717 - Lucky Galvez, Jon-Lark Kim, Nari Lee, Young Gun Roe, Byung-Sun Won:
Some bounds on binary LCD codes. 719-728
Volume 10, Number 5, September 2018
- Subhamoy Maitra:
Guest editorial. 729-730 - Ashwin Jha
, Mridul Nandi
:
On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers. 731-753 - Tingting Cui, Huaifeng Chen, Sihem Mesnager, Ling Sun, Meiqin Wang:
Statistical integral distinguisher with multi-structure and its application on AES-like ciphers. 755-776 - Kenneth G. Paterson, Jacob C. N. Schuldt:
Statistical attacks on cookie masking for RC4. 777-801 - Matthias Hamann, Matthias Krause, Willi Meier
, Bin Zhang:
Design and analysis of small-state grain-like stream ciphers. 803-834 - Subhabrata Samajder
, Palash Sarkar
:
Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses. 835-879 - Goutam Paul
, Souvik Ray
:
Analysis of burn-in period for RC4 state transition. 881-908 - Claude Carlet
, Sylvain Guilley
:
Statistical properties of side-channel and fault injection attacks using coding theory. 909-933 - Srimanta Bhattacharya, Mridul Nandi
:
A note on the chi-square method: A tool for proving cryptographic security. 935-957 - Matthias Hamann
, Matthias Krause:
On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks. 959-1012
Volume 10, Number 6, November 2018
- László Mérai
, Arne Winterhof
:
On the pseudorandomness of automatic sequences. 1013-1022 - Tao Bai, Yongbo Xia
:
A new class of permutation trinomials constructed from Niho exponents. 1023-1036 - Wilfried Meidl, Isabel Pirsic
:
On the normality of p-ary bent functions. 1037-1049 - Claude Carlet:
On the nonlinearity of monotone Boolean functions. 1051-1061 - Ting Gu, Zhixiong Chen, Andrew Klapper:
Correlation immune functions with respect to the q-transform. 1063-1073 - Sartaj Ul Hasan
, Daniel Panario
, Qiang Wang
:
Nonlinear vectorial primitive recursive sequences. 1075-1090 - Gaojun Luo
, Xiwang Cao:
Complete weight enumerators of three classes of linear codes. 1091-1108 - Rong Luo, Udaya Parampalli:
Cyclic codes over $M_{2}(\mathbb {F}_{2}+u\mathbb {F}_{2})$. 1109-1117 - Gaojun Luo
, Xiwang Cao:
Five classes of optimal two-weight linear codes. 1119-1135 - Subhabrata Samajder, Palash Sarkar
:
Multiple (Truncated) Differential Cryptanalysis: Explicit Upper Bounds on Data Complexity. 1137-1163 - Xueying Shi, Qin Yue, Yaotsu Chang:
Some quantum MDS codes with large minimum distance from generalized Reed-Solomon codes. 1165-1182 - Zuling Chang, Martianus Frederic Ezerman
, San Ling
, Huaxiong Wang:
The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields. 1183-1202 - Somphong Jitman
:
Correction to: Good integers and some applications in coding theory. 1203
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.