


default search action
Designs, Codes and Cryptography, Volume 77
Volume 77, Number 1, October 2015
- Yan Liu, Haode Yan, Chunlei Liu

:
A class of six-weight cyclic codes and their weight distribution. 1-9 - Jiqiang Lu:

A methodology for differential-linear cryptanalysis and its applications. 11-48 - Anamari Nakic

, Mario-Osvin Pavcevic
:
Tactical decompositions of designs over finite fields. 49-60 - Ryo Nishimaki, Keita Xagawa

:
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES. 61-98 - Sihem Mesnager:

Bent vectorial functions and linear codes from o-polynomials. 99-116 - Deng Tang

, Claude Carlet, Xiaohu Tang:
Differentially 4-uniform bijections by permuting the inverse function. 117-141 - Sungwook Kim

, Jung Hee Cheon:
Fixed argument pairing inversion on elliptic curves. 143-152 - Yonglin Cao

, Jian Gao, Fang-Wei Fu:
Semisimple multivariable 𝔽q-linear codes over 𝔽ql. 153-177 - Haibo Hong

, Licheng Wang, Yixian Yang:
Minimal logarithmic signatures for the unitary group Un(q). 179-191 - Jianfa Qian, Lina Zhang:

Entanglement-assisted quantum codes from arbitrary binary linear codes. 193-202 - Stefaan De Winter

, Sara Rottey, Geertrui Van de Voorde
:
Linear representations of subgeometries. 203-215 - Jingjun Bao, Lijun Ji:

The completion determination of optimal (3, 4)-packings. 217-229 - Santanu Sarkar

, Sourav Sen Gupta
, Goutam Paul, Subhamoy Maitra:
Proving TLS-attack related open biases of RC4. 231-253 - Min Zeng, Yuan Luo, Guang Gong:

Sequences with good correlation property based on depth and interleaving techniques. 255-275 - Fabio Enrique Brochero Martínez

, Carmen Rosa Giraldo Vergara
, Lilian Batista de Oliveira:
Explicit factorization of xn-1 ∈ 𝔽q[x]. 277-286
Volume 77, Numbers 2-3, December 2015
- Ian F. Blake, Alfred Menezes, Douglas R. Stinson:

Guest Editorial: Special Issue in Honor of Scott A. Vanstone. 287-299 - Chuan Guo, Douglas R. Stinson, Tran van Trung:

On tight bounds for binary frameproof codes. 301-319 - Charles C. Lindner, Mariusz Meszka, Alexander Rosa:

Almost 2-perfect 6-cycle systems. 321-333 - Dirk Hachenberger:

Primitive normal bases for quartic and cubic extensions: a geometric approach. 335-350 - Ryoh Fuji-Hara:

Perfect hash families of strength three with three rows from varieties on finite projective geometries. 351-356 - Kevin T. Phelps:

Enumeration of Kerdock codes of length 64. 357-363 - Dieter Jungnickel, Vladimir D. Tonchev

:
Maximal arcs and quasi-symmetric designs. 365-374 - Thijs Laarhoven

, Michele Mosca, Joop van de Pol:
Finding shortest lattice vectors faster using quantum search. 375-400 - Sonia Chiasson, Paul C. van Oorschot

:
Quantifying the security advantage of password expiration policies. 401-408 - Dan Archdeacon, Jeffrey H. Dinitz, Diane M. Donovan

, Emine Sule Yazici
:
Square integer Heffter arrays with empty cells. 409-426 - Alice Silverberg, Yuri G. Zarhin:

Isogenies of abelian varieties over finite fields. 427-439 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:

Linearly homomorphic structure-preserving signatures and their applications. 441-477 - Yeow Meng Chee

, Charles J. Colbourn, Alan Chi Hung Ling, Hui Zhang, Xiande Zhang:
Optimal low-power coding for error correction and crosstalk avoidance in on-chip data buses. 479-491 - Michael Düll, Björn Haase

, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe:
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. 493-514 - Eric L. Roettger, Hugh C. Williams, Richard K. Guy:

Some primality tests that eluded Lucas. 515-539 - Jeffrey Hoffstein

, Joseph H. Silverman
:
PASS-Encrypt: a public key cryptosystem based on partial evaluation of polynomials. 541-552 - Esther R. Lamken:

The asymptotic existence of DR(v, k, k-1)-BIBDs. 553-562 - Liang Feng Zhang, Reihaneh Safavi-Naini:

Batch verifiable computation of outsourced functions. 563-585 - Neal Koblitz, Alfred J. Menezes:

The random oracle model: a twenty-year retrospective. 587-610 - Elena Andreeva

, Bart Mennink, Bart Preneel
:
Open problems in hash function security. 611-631 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:

Reflections on slide with a twist attacks. 633-651 - Gary McGuire, Emrah Sercan Yilmaz:

Further results on the number of rational points of hyperelliptic supersingular curves in characteristic 2. 653-662 - Ueli Maurer:

Zero-knowledge proofs of knowledge for group homomorphisms. 663-676 - Gerhard Frey, Ernst Kani:

Normal forms of hyperelliptic curves of genus 3. 677-712 - Peter Landrock:

Power map permutations and the discrete log problem. 713-724 - Tatsuaki Okamoto, Katsuyuki Takashima:

Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption. 725-771

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














