![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Cryptography and Communications, Volume 3
Volume 3, Number 1, March 2011
- Lilya Budaghyan, Tor Helleseth:
New commutative semifields defined by new PN multinomials. 1-16 - David G. Farmer, Kathy J. Horadam:
Equivalence classes of multiplicative central (pn, pn, pn, 1)-relative difference sets. 17-28 - Li-Ping Wang:
A lattice-based minimal partial realization algorithm for matrix sequences of varying length. 29-42 - Carl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire:
A few more quadratic APN functions. 43-53
Volume 3, Number 2, June 2011
- Zheng Yang, Pinhui Ke:
Construction of quaternary sequences of length pq with low autocorrelation. 55-64 - Keith M. Martin, Maura B. Paterson
, Douglas R. Stinson:
Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures. 65-86 - Khmaies Ouahada
, Theo G. Swart
, Hendrik C. Ferreira
:
Permutation sequences and coded PAM signals with spectral nulls at rational submultiples of the symbol frequency. 87-108 - François Arnault, Thierry P. Berger, Benjamin Pousse:
A matrix approach for FCSR automata. 109-139
Volume 3, Number 3, September 2011
- Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap:
Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure. 141-164 - Hassan Aly
, Arne Winterhof
:
Boolean functions derived from Fermat quotients. 165-174 - Yongqiang Li, Mingsheng Wang:
Permutation polynomials EA-equivalent to the inverse function over GF (2n). 175-186
Volume 3, Number 4, December 2011
- Yves Aubry
, Claude Carlet, Philippe Langevin, Pascal Véron
:
Guest editorial for the special issue for Jacques Wolfmann. 187-188 - Stéphane Ballet, Robert Rolland
:
A note on Yao's theorem about pseudo-random generators. 189-206 - Christelle Rovetta, Marc Mouffron:
De Bruijn sequences and complexity of symmetric functions. 207-225 - François Rodier:
Functions of degree 4e that are not APN infinitely often. 227-240 - Ferruh Özbudak
, Elif Saygi
, Zülfükar Saygi
:
Quadratic forms of codimension 2 over certain finite fields of even characteristic. 241-257 - Jérémy Parriaux, Philippe Guillot, Gilles Millerioux:
Towards a spectral approach for the design of self-synchronizing stream ciphers. 259-274 - John F. Dillon:
On the dimension of an APN code. 275-279 - Tor Helleseth, Alexander Kholosha:
Crosscorrelation of m-sequences, exponential sums, bent functions and Jacobsthal sums. 281-291 - Alexander Pott, Yue Zhou
:
A character theoretic approach to planar functions. 293-300
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.