nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A matrix approach for constructing quadratic APN functions
|
Yu, Yuyin |
|
2014 |
73 |
2 |
p. 587-600 |
artikel |
2 |
A new large class of functions not APN infinitely often
|
Caullery, Florian |
|
2014 |
73 |
2 |
p. 601-614 |
artikel |
3 |
Connections between Construction D and related constructions of lattices
|
Kositwattanarerk, Wittawat |
|
2014 |
73 |
2 |
p. 441-455 |
artikel |
4 |
Distinguisher-based attacks on public-key cryptosystems using Reed–Solomon codes
|
Couvreur, Alain |
|
2014 |
73 |
2 |
p. 641-666 |
artikel |
5 |
Editorial: special issue on coding and cryptography
|
Budaghyan, Lilya |
|
2014 |
73 |
2 |
p. 269 |
artikel |
6 |
Exponents of polar codes using algebraic geometric code kernels
|
Anderson, Sarah E. |
|
2014 |
73 |
2 |
p. 699-717 |
artikel |
7 |
Generation of full cycles by a composition of NLFSRs
|
Dubrova, Elena |
|
2014 |
73 |
2 |
p. 469-486 |
artikel |
8 |
Improved algorithms for finding low-weight polynomial multiples in $$\mathbb {F}_{2}^{}[x]$$F2[x] and some cryptographic applications
|
Löndahl, Carl |
|
2014 |
73 |
2 |
p. 625-640 |
artikel |
9 |
Linear covering codes and error-correcting codes for limited-magnitude errors
|
Kløve, Torleiv |
|
2014 |
73 |
2 |
p. 329-354 |
artikel |
10 |
List and unique error-erasure decoding of interleaved Gabidulin codes with interpolation techniques
|
Wachter-Zeh, Antonia |
|
2014 |
73 |
2 |
p. 547-570 |
artikel |
11 |
More differentially 6-uniform power functions
|
Blondeau, Céline |
|
2014 |
73 |
2 |
p. 487-505 |
artikel |
12 |
Multi-trial Guruswami–Sudan decoding for generalised Reed–Solomon codes
|
Nielsen, Johan S. R. |
|
2014 |
73 |
2 |
p. 507-527 |
artikel |
13 |
New inequalities for $$q$$q-ary constant-weight codes
|
Kim, Hyun Kwang |
|
2014 |
73 |
2 |
p. 369-381 |
artikel |
14 |
On discrete Fourier transform, ambiguity, and Hamming-autocorrelation of pseudorandom sequences
|
Pirsic, Gottlieb Isabel |
|
2014 |
73 |
2 |
p. 319-328 |
artikel |
15 |
On low weight codewords of generalized affine and projective Reed–Muller codes
|
Ballet, Stéphane |
|
2014 |
73 |
2 |
p. 271-297 |
artikel |
16 |
On the arithmetic Walsh coefficients of Boolean functions
|
Carlet, Claude |
|
2014 |
73 |
2 |
p. 299-318 |
artikel |
17 |
On the exact number of solutions of certain linearized equations
|
Özbudak, Ferruh |
|
2014 |
73 |
2 |
p. 457-468 |
artikel |
18 |
On the geometry of balls in the Grassmannian and list decoding of lifted Gabidulin codes
|
Rosenthal, Joachim |
|
2014 |
73 |
2 |
p. 393-416 |
artikel |
19 |
On the rank of incidence matrices in projective Hjelmslev spaces
|
Landjev, Ivan |
|
2014 |
73 |
2 |
p. 615-623 |
artikel |
20 |
On transform-domain error and erasure correction by Gabidulin codes
|
Li, Wenhui |
|
2014 |
73 |
2 |
p. 571-586 |
artikel |
21 |
Paillier-based publicly verifiable (non-interactive) secret sharing
|
Jhanwar, Mahabir Prasad |
|
2014 |
73 |
2 |
p. 529-546 |
artikel |
22 |
PotLLL: a polynomial time version of LLL with deep insertions
|
Fontein, Felix |
|
2014 |
73 |
2 |
p. 355-368 |
artikel |
23 |
Quantum codes from nearly self-orthogonal quaternary linear codes
|
Lisoněk, Petr |
|
2014 |
73 |
2 |
p. 417-424 |
artikel |
24 |
Small secret exponent attack on RSA variant with modulus $$N=p^rq$$N=prq
|
Sarkar, Santanu |
|
2014 |
73 |
2 |
p. 383-392 |
artikel |
25 |
Towards the optimality of Feistel ciphers with substitution-permutation functions
|
Shibutani, Kyoji |
|
2014 |
73 |
2 |
p. 667-682 |
artikel |
26 |
Wiretap lattice codes from number fields with no small norm elements
|
Ong, Soon Sheng |
|
2014 |
73 |
2 |
p. 425-440 |
artikel |
27 |
Zero-correlation linear cryptanalysis of reduced-round LBlock
|
Soleimany, Hadi |
|
2014 |
73 |
2 |
p. 683-698 |
artikel |