default search action
Cryptography and Communications, Volume 10
Volume 10, Number 1, January 2018
- Tor Helleseth, Bart Preneel:
Editorial: Special issue on recent trends in cryptography. 1-3 - Michael Scott:
Missing a trick: Karatsuba variations. 5-15 - Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou:
Backtracking-assisted multiplication. 17-26 - Sonia Bogos, John Gaspoz, Serge Vaudenay:
Cryptanalysis of a homomorphic encryption scheme. 27-39 - Marie-Sarah Lacharité:
Security of BLS and BGLS signatures in a multi-user setting. 41-58 - Valérie Nachef, Jacques Patarin, Emmanuel Volte:
Generic attacks with standard deviation analysis on a-feistel schemes. 59-77 - Brett Hemenway, Rafail Ostrovsky:
Efficient robust secret sharing from expander graphs. 79-99 - Eloi de Chérisey, Sylvain Guilley, Annelie Heuser, Olivier Rioul:
On the optimality and practicability of mutual information analysis in some scenarios. 101-121 - Gregory G. Rose:
KISS: A bit too simple. 123-137 - Geong Sen Poh, Moesfa Soeheila Mohamad, Ji-Jian Chin:
Searchable symmetric encryption over multiple servers. 139-158 - Tomás Fabsic, Otokar Grosek, Karol Nemoga, Pavol Zajac:
On generating invertible circulant binary matrices with a prescribed number of ones. 159-175 - Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:
POEx: A beyond-birthday-bound-secure on-line cipher. 177-193 - Tingting Cui, Huaifeng Chen, Long Wen, Meiqin Wang:
Statistical integral attack on CAST-256 and IDEA. 195-209 - Cécile Pierrot, Benjamin Wesolowski:
Malleability of the blockchain's entropy. 211-233
Volume 10, Number 2, March 2018
- Nurdagül Anbar, Wilfried Meidl:
Modified planar functions and their components. 235-249 - Zuling Chang, Martianus Frederic Ezerman, San Ling, Huaxiong Wang:
Construction of de Bruijn sequences from product of two irreducible polynomials. 251-275 - Lin Sok, Minjia Shi, Patrick Solé:
Classification and Construction of quaternary self-dual bent functions. 277-289 - Pan Tan, Zhengchun Zhou, Deng Tang, Tor Helleseth:
The weight distribution of a class of two-weight linear codes derived from Kloosterman sums. 291-299 - Gaojun Luo, Xiwang Cao, Shanding Xu, Jiafu Mi:
Binary linear codes with two or three weights from niho exponents. 301-318 - Cunsheng Ding:
A sequence construction of cyclic codes over finite fields. 319-341 - Mokshi Goyal, Madhu Raka:
Quadratic residue codes over the ring 𝔽p[u]/〈 um - u 〉 and their Gray images. 343-355 - Santiago Barrera Acevedo, Heiko Dietrich:
Perfect sequences over the quaternions and (4n, 2, 4n, 2n)-relative difference sets in C n × Q 8. 357-368 - Andrew Klapper:
Matrix parametrized shift registers. 369-382 - Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist:
Message Authentication Based on Cryptographically Secure CRC without Polynomial Irreducibility Test. 383-399
Volume 10, Number 3, May 2018
- Anuradha Sharma, Taranjot Kaur:
Enumeration formulae for self-dual, self-orthogonal and complementary-dual quasi-cyclic codes over finite fields. 401-435 - Shanding Xu, Xiwang Cao, Guangkui Xu, Gaojun Luo:
Two classes of near-optimal frequency-hopping sequence sets with prime-power period. 437-454 - Li-Ping Wang, Daqing Wan:
On lattice-based algebraic feedback shift registers synthesis for multisequences. 455-465 - Yuhua Sun, Qiang Wang, Tongjiang Yan:
The exact autocorrelation distribution and 2-adic complexity of a class of binary sequences with almost optimal autocorrelation. 467-477 - Amit Jana, Goutam Paul:
Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs. 479-508 - Serdar Boztas, Ferruh Özbudak, Eda Tekin:
Generalized nonbinary sequences with perfect autocorrelation, flexible alphabets and new periods. 509-517 - R. Sobhani:
Cyclic codes over a non-commutative finite chain ring. 519-530 - Kangquan Li, Longjiang Qu, Xi Chen, Chao Li:
Permutation polynomials of the form cx + Trql/q(xa) and permutation trinomials over finite fields with even characteristic. 531-554 - Xuli Zhang, Jing Jiang, Minquan Cheng:
Bounds and constructions for 3¯-strongly separable codes with length 3. 555-565 - Zhengbang Zha, Lei Hu, Zhizheng Zhang:
New results on permutation polynomials of the form (x p m - x + δ) s + x p m + x over 𝔽 p2m. 567-578
Volume 10, Number 4, July 2018
- Xiusheng Liu, Hai Q. Dinh, Hualu Liu, Long Yu:
On new quantum codes from matrix product codes. 579-589 - Zongxiang Yi, Zhiqiang Lin, Lishan Ke:
A generic method to construct zero-difference balanced functions. 591-609 - Yousuf Alsalami:
Constructions with high algebraic degree of differentially 4-uniform (n, n - 1)-functions and differentially 8-uniform (n, n - 2)-functions. 611-628 - Kalikinkar Mandal, Bo Yang, Guang Gong, Mark D. Aagaard:
On ideal t-tuple distribution of filtering de Bruijn sequence generators. 629-641 - Zhonghua Sun, Shixin Zhu, Liqi Wang:
The symbol-pair distance distribution of a class of repeated-root cyclic codes over 𝔽pm. 643-653 - Francis N. Castro, Luis A. Medina, Ivelisse M. Rubio:
Exact 2-divisibility of exponential sums associated to boolean functions. 655-666 - Elena Barcucci, Antonio Bernini, Stefano Bilotta, Renzo Pinzani:
A 2D non-overlapping code over a q-ary alphabet. 667-683 - Somphong Jitman:
Good integers and some applications in coding theory. 685-704 - Aleksandr Tuxanidy, Qiang Wang:
Characteristic digit-sum sequences. 705-717 - Lucky Galvez, Jon-Lark Kim, Nari Lee, Young Gun Roe, Byung-Sun Won:
Some bounds on binary LCD codes. 719-728
Volume 10, Number 5, September 2018
- Subhamoy Maitra:
Guest editorial. 729-730 - Ashwin Jha, Mridul Nandi:
On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers. 731-753 - Tingting Cui, Huaifeng Chen, Sihem Mesnager, Ling Sun, Meiqin Wang:
Statistical integral distinguisher with multi-structure and its application on AES-like ciphers. 755-776 - Kenneth G. Paterson, Jacob C. N. Schuldt:
Statistical attacks on cookie masking for RC4. 777-801 - Matthias Hamann, Matthias Krause, Willi Meier, Bin Zhang:
Design and analysis of small-state grain-like stream ciphers. 803-834 - Subhabrata Samajder, Palash Sarkar:
Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses. 835-879 - Goutam Paul, Souvik Ray:
Analysis of burn-in period for RC4 state transition. 881-908 - Claude Carlet, Sylvain Guilley:
Statistical properties of side-channel and fault injection attacks using coding theory. 909-933 - Srimanta Bhattacharya, Mridul Nandi:
A note on the chi-square method: A tool for proving cryptographic security. 935-957 - Matthias Hamann, Matthias Krause:
On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks. 959-1012
Volume 10, Number 6, November 2018
- László Mérai, Arne Winterhof:
On the pseudorandomness of automatic sequences. 1013-1022 - Tao Bai, Yongbo Xia:
A new class of permutation trinomials constructed from Niho exponents. 1023-1036 - Wilfried Meidl, Isabel Pirsic:
On the normality of p-ary bent functions. 1037-1049 - Claude Carlet:
On the nonlinearity of monotone Boolean functions. 1051-1061 - Ting Gu, Zhixiong Chen, Andrew Klapper:
Correlation immune functions with respect to the q-transform. 1063-1073 - Sartaj Ul Hasan, Daniel Panario, Qiang Wang:
Nonlinear vectorial primitive recursive sequences. 1075-1090 - Gaojun Luo, Xiwang Cao:
Complete weight enumerators of three classes of linear codes. 1091-1108 - Rong Luo, Udaya Parampalli:
Cyclic codes over $M_{2}(\mathbb {F}_{2}+u\mathbb {F}_{2})$. 1109-1117 - Gaojun Luo, Xiwang Cao:
Five classes of optimal two-weight linear codes. 1119-1135 - Subhabrata Samajder, Palash Sarkar:
Multiple (Truncated) Differential Cryptanalysis: Explicit Upper Bounds on Data Complexity. 1137-1163 - Xueying Shi, Qin Yue, Yaotsu Chang:
Some quantum MDS codes with large minimum distance from generalized Reed-Solomon codes. 1165-1182 - Zuling Chang, Martianus Frederic Ezerman, San Ling, Huaxiong Wang:
The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields. 1183-1202 - Somphong Jitman:
Correction to: Good integers and some applications in coding theory. 1203
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.