default search action
Designs, Codes and Cryptography, Volume 82
Volume 82, Numbers 1-2, January 2017
- Pascale Charpin, Thomas Johansson, Gohar M. Kyureghyan, Nicolas Sendrier, Jean-Pierre Tillich:
Editorial: Special issue on coding and cryptography. 1-2 - Christina Boura, Anne Canteaut, Lars R. Knudsen, Gregor Leander:
Reflection ciphers. 3-25 - Sondre Rønjom:
Improving algebraic attacks on stream ciphers based on linear feedback shift register over $$\mathbb {F}_{2^k}$$ F 2 k. 27-41 - Pavol Zajac:
Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity. 43-56 - Serhii Dyshko:
MacWilliams Extension Theorem for MDS codes over a vector space alphabet. 57-67 - Sergey Bezzateev, Natalia A. Shekhunova:
Lower bound of covering radius of binary irreducible Goppa codes. 69-76 - Kishan Chand Gupta, Sumit Kumar Pandey, Ayineedi Venkateswarlu:
On the direct construction of recursive MDS matrices. 77-94 - Kaushik Chakraborty, Sumanta Sarkar, Subhamoy Maitra, Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Emmanuel Prouff:
Redefining the transparency order. 95-115 - Marine Minier:
Improving impossible-differential attacks against Rijndael-160 and Rijndael-224. 117-129 - Santanu Sarkar, Ayineedi Venkateswarlu:
Revisiting (nested) Roos bias in RC4 key scheduling algorithm. 131-148 - Srimanta Bhattacharya, Sumanta Sarkar:
On some permutation binomials and trinomials over $$\mathbb {F}_{2^n}$$ F 2 n. 149-160 - Mehdi Tibouchi, Taechan Kim:
Improved elliptic curve hashing and point representation. 161-177 - Kishan Chand Gupta, Sumit Kumar Pandey, Ayineedi Venkateswarlu:
Towards a general construction of recursive MDS diffusion layers. 179-195 - Arkadii G. D'yachkov, Ilya Vorobyev, N. A. Polyanskii, Vladislav Yu. Shchukin:
Cover-free codes and separating system codes. 197-209 - Arkadii G. D'yachkov, Ilya Vorobyev, N. A. Polyanskii, Vladislav Yu. Shchukin:
Symmetric disjunctive list-decoding codes. 211-229 - Arkadii G. D'yachkov, Ilya Vorobyev, Nikita Polyanskii, Vladislav Yu. Shchukin:
Almost cover-free codes and designs. 231-247 - Cem Güneri, Ferruh Özbudak, Funda Özdemir:
Hasse-Weil bound for additive cyclic codes. 249-263 - Nurdagül Anbar, Wilfried Meidl, Alev Topuzoglu:
Idempotent and p-potent quadratic functions: distribution of nonlinearity and co-dimension. 265-291 - Vladimir Gritsenko, Grigory Kabatiansky, Vladimir S. Lebedev, Alexey Maevskiy:
Signature codes for noisy multiple access adder channel. 293-299 - Jeremy Maitin-Shepard:
Optimal software-implemented Itoh-Tsujii inversion for $$\mathbb {F}_{2^{m}}$$ F 2 m. 301-318 - Céline Blondeau, Kaisa Nyberg:
Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity. 319-349 - Santanu Sarkar, Subhamoy Maitra, Anubhab Baksi:
Observing biases in the state: case studies with Trivium and Trivia-SC. 351-375 - Brandon Dravie, Philippe Guillot, Gilles Millérioux:
Security proof of the canonical form of self-synchronizing stream ciphers. 377-388 - Sven Puchinger, Johan Sebastian Rosenkilde, Wenhui Li, Vladimir Sidorenko:
Row reduction applied to decoding of rank-metric and subspace codes. 389-409 - Peter G. Boyvalenkov, Peter D. Dragnev, Douglas P. Hardin, Edward B. Saff, Maya Stoyanova:
Energy bounds for codes and designs in Hamming spaces. 411-433 - Valentin Suder:
Antiderivative functions over $$\mathbb {F}_{2^n}$$ F 2 n. 435-447 - Hannes Bartz, Vladimir Sidorenko:
Algebraic decoding of folded Gabidulin codes. 449-467 - Quentin Alamélou, Olivier Blazy, Stéphane Cauchie, Philippe Gaborit:
A code-based group signature scheme. 469-493 - Anthony Journault, François-Xavier Standaert, Kerem Varici:
Improving the security and efficiency of block ciphers based on LS-designs. 495-509
Volume 82, Number 3, March 2017
- Jerod Michel, Baokun Ding:
A generalization of combinatorial designs and related codes. 511-529 - Yupeng Jiang, Dongdai Lin:
On affine sub-families of Grain-like structures. 531-542 - Yun Fan, Bangteng Xu:
Fourier transforms and bent functions on faithful actions of finite abelian groups. 543-558 - Kaoru Kurosawa, Hiroyuki Ohta, Kenji Kakuta:
How to make a linear network code (strongly) secure. 559-582 - Shuxing Li, Hengjia Wei, Gennian Ge:
Generic constructions for partitioned difference families with applications: a unified combinatorial approach. 583-599 - Palash Sarkar, Shashank Singh:
A new method for decomposition in the Jacobian of small genus hyperelliptic curves. 601-616 - Moises Delgado, Heeralal Janwa:
On the conjecture on APN functions and absolute irreducibility of polynomials. 617-627 - R. Lakshmanan, S. Arumugam:
Construction of a (k, n)-visual cryptography scheme. 629-645 - Haiying Liu, Keqin Feng, Rongquan Feng:
Nonexistence of generalized bent functions from ℤ2n to ℤm. 647-662 - Shudi Yang, Zheng-an Yao:
Complete weight enumerators of a family of three-weight linear codes. 663-674 - Melissa A. Huggan, Gary L. Mullen, Brett Stevens, David Thomson:
Sudoku-like arrays, codes and orthogonality. 675-693 - Ming Li, Yupeng Jiang, Dongdai Lin:
The adjacency graphs of some feedback shift registers. 695-713
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.