default search action
Cryptography and Communications, Volume 7
Volume 7, Number 1, March 2015
- Claude Carlet, Pierre-Alain Fouque:
Guest Editorial. 1-2 - Begül Bilgin, Svetla Nikova, Ventzislav Nikov, Vincent Rijmen, Natalia N. Tokareva, Valeriya Vitkup:
Threshold implementations of small S-boxes. 3-33 - Bodhisatwa Mazumdar, Debdeep Mukhopadhyay, Indranil Sengupta:
Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers. 35-69 - Michael Tunstall, Marc Joye:
The distributions of individual bits in the output of multiplicative operations. 71-90 - Aurélie Bauer, Éliane Jaulmes, Emmanuel Prouff, Jean-René Reinhard, Justine Wild:
Horizontal collision correlation attack on elliptic curves - - Extended Version -. 91-119 - Christophe Clavier, Quentin Isorez, Damien Marion, Antoine Wurcker:
Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks. 121-162 - Sonia Belaïd, Vincent Grosso, François-Xavier Standaert:
Masking and leakage-resilient primitives: One, the other(s) or both? 163-184 - Nadia El Mrabet, Jacques J. A. Fournier, Louis Goubin, Ronan Lashermes:
A survey of fault attacks in pairing based cryptography. 185-205
Volume 7, Number 2, June 2015
- Mingchao Li, Miao Liang, Beiliang Du:
A construction of t-fold perfect splitting authentication codes with equal deception probabilities. 207-215 - Chengju Li, Qin Yue:
The Walsh transform of a class of monomial functions and cyclic codes. 217-228 - Anuradha Sharma:
Repeated-root constacyclic codes of length ℓ t p s and their dual codes. 229-255 - Kishan Chand Gupta, Indranil Ghosh Ray:
Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications. 257-287
Volume 7, Number 3, September 2015
- Yiyuan Luo, Xuejia Lai, Tiejun Jia:
Attacks on a double length blockcipher-based hash proposal. 289-295 - Yuan Li:
Characterization of robust immune symmetric boolean functions. 297-315 - Santanu Sarkar:
Further non-randomness in RC4, RC4A and VMPC. 317-330 - Ivica Nikolic, Lei Wang, Shuang Wu:
The parallel-cut meet-in-the-middle attack. 331-345
Volume 7, Number 4, December 2015
- Zhi Hu, Lin Wang:
Injectivity of compressing maps on the set of primitive sequences modulo square-free odd integers. 347-361 - Nathan Jolly:
An algebra of arrays and almost perfect watermarks. 363-377 - Francis N. Castro, Oscar E. González, Luis A. Medina:
A divisibility approach to the open boundary cases of Cusick-Li-Stǎnicǎ's conjecture. 379-402 - José R. Ortiz-Ubarri:
New families of asymptotically optimal doubly periodic arrays with ideal correlation constraints. 403-414 - Colleen M. Swanson, Douglas R. Stinson:
Extended results on privacy against coalitions of users in user-private information retrieval protocols. 415-437 - Debrup Chakraborty, Vicente Hernandez-Jimenez, Palash Sarkar:
Another look at XCB. 439-468 - Samir Hodzic, Enes Pasalic:
Generalized Bent Functions - Some General Construction Methods and Related Necessary and Sufficient Conditions. 469-483 - Vladimir Edemskiy, Andrey Ivanov:
The linear complexity of balanced quaternary sequences with optimal autocorrelation value. 485-496 - Jing Jane He, Daniel Panario, Qiang Wang, Arne Winterhof:
Linear complexity profile and correlation measure of interleaved sequences. 497-508 - Chun Guo, Dongdai Lin:
Improved domain extender for the ideal cipher. 509-533 - Ali Reza Rahimipour, A. R. Ashrafi, Ahmad Gholami:
The existence of minimal logarithmic signatures for the sporadic Suzuki and simple Suzuki groups. 535-542
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.