default search action
Cryptography and Communications, Volume 5
Volume 5, Number 1, March 2013
- Wenhao Wang, Meicheng Liu, Yin Zhang:
Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation". 1-6 - Thomas W. Cusick:
Finding Hamming weights without looking at truth tables. 7-18 - Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid:
Designing integrated accelerator for stream ciphers with structural similarities. 19-47 - Zoubida Jadda, Patrice Parraud, Soukayna Qarboua:
Quaternary cryptographic bent functions and their binary projection. 49-65 - Romar dela Cruz, Huaxiong Wang:
Cheating-immune secret sharing schemes from codes and cumulative arrays. 67-83
Volume 5, Number 2, June 2013
- Alyssa Brown, Thomas W. Cusick:
Equivalence classes for cubic rotation symmetric functions. 85-118 - Irène Charon, Iiro S. Honkala, Olivier Hudry, Antoine Lobstein:
Minimum sizes of identifying codes in graphs differing by one vertex. 119-136 - Sourav Das, Dipanwita Roy Chowdhury:
CAR30: A new scalable stream cipher with rule 30. 137-162 - Ana Salagean, Alex J. Burrage, Raphael C.-W. Phan:
Computing the linear complexity for sequences with characteristic polynomial f v. 163-177
Volume 5, Number 3, September 2013
- Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis:
Secondary constructions of Boolean functions with maximum algebraic immunity. 179-199 - K. T. Arasu, Simone Severini, Edmund Velten:
Block weighing matrices. 201-207 - Cunsheng Ding, Keqin Feng, Rongquan Feng, Maosheng Xiong, Aixian Zhang:
Unit time-phase signal sets: Bounds and constructions. 209-227
Volume 5, Number 4, December 2013
- Maura B. Paterson, Douglas R. Stinson:
A simple combinatorial treatment of constructions and threshold gaps of ramp schemes. 229-240 - Elodie Leducq:
Second weight codewords of generalized Reed-Muller codes. 241-276 - Guang Gong, Mark D. Aagaard, Xinxin Fan:
Resilience to distinguishing attacks on WG-7 cipher and their generalizations. 277-289
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.