default search action
Cryptography and Communications, Volume 13
Volume 13, Number 1, January 2021
- Xiaolei Fang, Meiqing Liu, Jinquan Luo:
On Euclidean Hulls of MDS Codes. 1-14 - Ming Yan, Tongjiang Yan, Yu Li:
Computing the 2-adic complexity of two classes of Ding-Helleseth generalized cyclotomic sequences of periods of twin prime products. 15-26 - Wateekorn Sriwirach, Chakkrid Klin-Eam:
Repeated-root constacyclic codes of length 2ps over $\mathbb {F}_{p^{m}}+u\mathbb {F}_{p^{m}}+u^{2}\mathbb {F}_{p^{m}}$. 27-52 - Minfeng Shao, Ying Miao:
Algebraic manipulation detection codes via highly nonlinear functions. 53-69 - Swapan Maiti, Dipanwita Roy Chowdhury:
Design of fault-resilient S-boxes for AES-like block ciphers. 71-100 - Junru Ma, Jinquan Luo:
On symbol-pair weight distribution of MDS codes and simplex codes over finite fields. 101-115 - Can Xiang, Wenjuan Yin:
Two families of subfield codes with a few weights. 117-127 - Refia Aksoy, Fatma Çaliskan:
Self-dual codes over $\mathbb {F}_{2} \times (\mathbb {F}_{2}+v\mathbb {F}_{2})$. 129-141 - Krishna Gopal Benerjee, Sourav Deb, Manish K. Gupta:
On conflict free DNA codes. 143-171 - Xiaoqiang Wang, Dabin Zheng, Yan Zhang:
A class of subfield codes of linear codes and their duals. 173-196
Volume 13, Number 2, March 2021
- B. Rega, Z. H. Liu, C. Durairajan:
The t-wise intersection and trellis of relative four-weight codes. 197-223 - Liqin Qian, Xiwang Cao, Sihem Mesnager:
Linear codes with one-dimensional hull associated with Gaussian sums. 225-243 - He Zhang, Xiwang Cao:
Further constructions of cyclic subspace codes. 245-262 - Iliya Bouyukliev, Stefka Bouyuklieva, Tatsuya Maruta, Paskal Piperkov:
Characteristic vector and weight distribution of a linear code. 263-282 - Nurdagül Anbar, Canan Kasikci:
Permutations polynomials of the form G(X)k - L(X) and curves over finite fields. 283-294 - Pantelimon Stanica, Aaron Geary:
The c-differential behavior of the inverse function under the EA-equivalence. 295-306 - Fanghui Ma, Jian Gao, Juan Li, Fang-Wei Fu:
(σ, δ)-Skew quasi-cyclic codes over the ring $\mathbb {Z}_{4}+u\mathbb {Z}_{4}$. 307-320 - Ajeet Kumar, Subhamoy Maitra, Chandra Sekhar Mukherjee:
On approximate real mutually unbiased bases in square dimension. 321-329 - Sophie Huczynska, Christopher Jefferson, Silvia Nepsinská:
Strong external difference families in abelian and non-abelian groups. 331-341 - Jingwei Zhang, Chuangqiang Hu, Xiang Fan, Chang-An Zhao:
Trace representation of the binary pq2-periodic sequences derived from Euler quotients. 343-359 - Refia Aksoy, Fatma Çaliskan:
Correction to: Self-dual codes over $ {\mathbbm{F}}_2\times \left({\mathbbm{F}}_2+v{\mathbbm{F}}_2\right) $. 361-362
Volume 13, Number 3, May 2021
- Mustafa Faraj, Catherine H. Gebotys:
Quiescent photonics side channel analysis: Low cost SRAM readout attack. 363-376 - Faruk Göloglu, Jirí Pavlu:
On CCZ-inequivalence of some families of almost perfect nonlinear functions to permutations. 377-391 - Wengang Jin, Xiaoni Du, Yanzhong Sun, Cuiling Fan:
Boolean functions with six-valued Walsh spectra and their application. 393-405 - Zhiwen He, Jiejing Wen:
Linear codes of 2-designs as subcodes of the generalized Reed-Muller codes. 407-423 - Briji J. Chathely, Rajendra P. Deore:
Construction of binary Hadamard codes and their s-PD sets. 425-438 - Daniele Bartoli, Matteo Bonini, Burçin Günes:
An inductive construction of minimal codes. 439-449 - Aniruddha Biswas, Palash Sarkar:
Separation results for boolean function classes. 451-458 - Yubo Li, Kangquan Li, Sihem Mesnager, Longjiang Qu:
More permutations and involutions for constructing bent functions. 459-473
Volume 13, Number 4, July 2021
- Yves Aubry, Pierre Barthélémy, Nadia El Mrabet:
Special issue from mathematics to embedded devices. 475-477 - Dmitrii I. Koshelev:
Hashing to elliptic curves of j-invariant 1728. 479-494 - Stéphane Ballet, Alexis Bonnecaze, Thanh-Hung Dang:
Optimization of the scalar complexity of Chudnovsky2 multiplication algorithms in finite fields. 495-517 - Sarah Bordage, Julien Lavauzelle:
On the privacy of a code-based single-server computational PIR scheme. 519-526 - Wei Cheng, Sylvain Guilley, Jean-Luc Danger:
Categorizing all linear codes of IPM over ${\mathbb {F}}_{2^{8}}$. 527-542 - Simon Landry, Yanis Linge, Emmanuel Prouff:
Monomial evaluation of polynomial functions protected by threshold implementations - with an illustration on AES -. 543-572 - Charles-Henry Bertrand Van Ouytsel, Olivier Bronchain, Gaëtan Cassiers, François-Xavier Standaert:
How to fool a black box machine learning based side-channel security evaluation. 573-585 - Charles Momin, Olivier Bronchain, François-Xavier Standaert:
A stealthy Hardware Trojan based on a Statistical Fault Attack. 587-600
Volume 13, Number 5, September 2021
- Steven T. Dougherty, Joe Gildea, Adrian Korban, Serap Sahinkaya:
G-codes, self-dual G-codes and reversible G-codes over the ring ${\mathscr{B}}_{j, k}$. 601-616 - Yanhong Fan, Sihem Mesnager, Weijia Wang, Yongqing Li, Tingting Cui, Meiqin Wang:
Investigation for 8-bit SKINNY-like S-boxes, analysis and applications. 617-636 - Enes Pasalic, René Rodríguez, Fengrong Zhang, Yongzhuang Wei:
Several classes of minimal binary linear codes violating the Ashikhmin-Barg bound. 637-659 - Jingjie Lv, Ruihu Li, Yu Yao:
Quasi-cyclic constructions of asymmetric quantum error-correcting codes. 661-680 - Xiang-dong Hou:
A power sum formula by Carlitz and its applications to permutation rational functions of finite fields. 681-694 - Pavan Kumar, Noor Mohammad Khan:
A class of linear codes with their complete weight enumerators over finite fields. 695-725 - Xiaoping Shi, Qin Yue, Xinmei Huang:
Quantum synchronizable codes from the Whiteman's generalized cyclotomy. 727-739 - Pierrick Méaux:
On the fast algebraic immunity of threshold functions. 741-762 - Chen Liu, Shuaijun Liu, Xianfu Lei, Avik Ranjan Adhikary, Zhengchun Zhou:
Three-phase Z-complementary triads and almost complementary triads. 763-773 - K. T. Arasu, Daniel M. Gordon, Yiran Zhang:
New nonexistence results on circulant weighing matrices. 775-789 - Damien Jamet, Pierre Popoli, Thomas Stoll:
Maximum order complexity of the sum of digits function in Zeckendorf base and polynomial subsequences. 791-814 - Lukas Kölsch, Robert Schüler:
Formal self duality. 815-836 - Kamil Otal, Eda Tekin:
Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials. 837-845 - Ge Yao, Udaya Parampalli:
Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers. 847-864 - Zibi Xiao, Xiangyong Zeng:
2-Adic complexity of two constructions of binary sequences with period 4N and optimal autocorrelation magnitude. 865-885
Volume 13, Number 6, November 2021
- Lilya Budaghyan, Claude Carlet, Tor Helleseth, Kaisa Nyberg:
Editorial: Special issue on Boolean functions and their applications 2020. 887-889 - Pantelimon Stanica, Constanza Riera, Anton Tkachenko:
Characters, Weil sums and c-differential uniformity with an application to the perturbed Gold function. 891-907 - Nikolay Kolomeec:
Some general properties of modified bent functions through addition of indicator functions. 909-926 - Cunsheng Ding, Chunming Tang:
The linear codes of t-designs held in the Reed-Muller and Simplex codes. 927-949 - Sihem Mesnager, Sihong Su:
On constructions of weightwise perfectly balanced Boolean functions. 951-979 - Benjamin Chase, Petr Lisonek:
Kim-type APN functions are affine equivalent to Gold functions. 981-993 - Nikolay S. Kaleyski:
Invariants for EA- and CCZ-equivalence of APN and AB functions. 995-1023 - Jian Ding, Changlu Lin, Sihem Mesnager:
Secret sharing schemes based on the dual of Golay codes. 1025-1041
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.