default search action
Cryptography and Communications, Volume 4
Volume 4, Number 1, March 2012
- Laurent Poinsot:
Non Abelian bent functions. 1-23 - Enes Pasalic:
A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation. 25-45 - Miia Hermelin, Kaisa Nyberg:
Multidimensional linear distinguishing attacks and Boolean functions. 47-64 - Peter Beelen, Gregor Leander:
A new construction of highly nonlinear S-boxes. 65-77
Volume 4, Number 2, June 2012
- Wenpei Si, Cunsheng Ding:
A simple stream cipher with proven properties. 79-104 - Maxwell L. Bileschi, Thomas W. Cusick, Daniel Padgett:
Weights of Boolean cubic monomial rotation symmetric functions. 105-130 - Abdel Alim Kamal, Amr M. Youssef:
Fault analysis of the NTRUSign digital signature scheme. 131-144
Volume 4, Numbers 3-4, December 2012
- Subhamoy Maitra, Palash Sarkar:
Guest editorial. 145-146 - Anne Canteaut, María Naya-Plasencia:
Correlation attacks on combination generators. 147-171 - Martin Ågren, Carl Löndahl, Martin Hell, Thomas Johansson:
A survey on fast correlation attacks. 173-202 - Simon Knellwolf, Willi Meier:
High order differential attacks on stream ciphers. 203-215 - Itai Dinur, Adi Shamir:
Applying cube attacks to stream ciphers in realistic scenarios. 217-232 - Meltem Sönmez Turan:
On the nonlinearity of maximum-length NFSR feedbacks. 233-243 - Leonie Simpson, Serdar Boztas:
State cycles, initialization and the Trivium stream cipher. 245-258 - Yi Lu, Serge Vaudenay, Willi Meier:
Synthetic linear analysis with applications to CubeHash and Rabbit. 259-276 - Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld:
Cryptanalysis of WG-7: a lightweight stream cipher. 277-285
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.