default search action
Cryptography and Communications, Volume 6
Volume 6, Number 1, March 2014
- Tor Helleseth, Jonathan Jedwab:
Special issue editorial: Sequences and their applications. 1-2 - Gaofei Wu, Matthew Geoffrey Parker:
A complementary construction using mutually unbiased bases. 3-25 - Dragana Bajic, Tatjana Loncar-Turukalo:
A simple suboptimal construction of cross-bifix-free codes. 27-37 - Rema Hariharan:
New near perfect sequences of even lengths. 39-46 - Santiago Barrera Acevedo, Nathan Jolly:
Perfect arrays of unbounded sizes over the basic quaternions. 47-57 - Srdjan Z. Budisin, Predrag Spasojevic:
Paraunitary generation/correlation of QAM complementary sequence pairs. 59-102
Volume 6, Number 2, June 2014
- Stéphanie Dib:
Asymptotic nonlinearity of vectorial Boolean functions. 103-115 - Kalikinkar Mandal, Guang Gong, Xinxin Fan, Mark D. Aagaard:
Optimal parameters for the WG stream cipher family. 117-135 - Ying Gao, Romar dela Cruz:
Secret sharing schemes based on graphical codes. 137-155 - Irène Charon, Iiro S. Honkala, Olivier Hudry, Antoine Lobstein:
Minimum sizes of identifying codes in graphs differing by one edge. 157-170
Volume 6, Number 3, September 2014
- Sareh Emami, San Ling, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang:
The resistance of PRESENT-80 against related-key differential attacks. 171-187 - Palash Sarkar:
Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector. 189-231 - Jinyong Shan, Lei Hu, Xiangyong Zeng:
Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher. 233-254 - Pavol Zajac, Matús Jókay:
Multiplicative complexity of bijective 4×4 S-boxes. 255-277
Volume 6, Number 4, December 2014
- Aslí Bay, Atefeh Mashatan, Serge Vaudenay:
Revisiting iterated attacks in the context of decorrelation theory. 279-311 - Bo Zhu, Guang Gong:
Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64. 313-333 - Xinxin Gong, Bin Zhang, Wenling Wu, Dengguo Feng:
Computing Walsh coefficients from the algebraic normal form of a Boolean function. 335-358 - Antonio Bernini, Stefano Bilotta, Renzo Pinzani, Ahmad Sabri, Vincent Vajnovszki:
Prefix partitioned gray codes for particular cross-bifix-free sets. 359-369
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.