nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A code-based group signature scheme
|
Alamélou, Quentin |
|
2016 |
82 |
1-2 |
p. 469-493 |
artikel |
2 |
Algebraic decoding of folded Gabidulin codes
|
Bartz, Hannes |
|
2016 |
82 |
1-2 |
p. 449-467 |
artikel |
3 |
Almost cover-free codes and designs
|
D’yachkov, Arkadii |
|
2016 |
82 |
1-2 |
p. 231-247 |
artikel |
4 |
Antiderivative functions over $$\mathbb {F}_{2^n}$$F2n
|
Suder, Valentin |
|
2016 |
82 |
1-2 |
p. 435-447 |
artikel |
5 |
Cover-free codes and separating system codes
|
D’yachkov, A. G. |
|
2016 |
82 |
1-2 |
p. 197-209 |
artikel |
6 |
Editorial: Special issue on coding and cryptography
|
Charpin, Pascale |
|
2016 |
82 |
1-2 |
p. 1-2 |
artikel |
7 |
Energy bounds for codes and designs in Hamming spaces
|
Boyvalenkov, P. G. |
|
2016 |
82 |
1-2 |
p. 411-433 |
artikel |
8 |
Hasse–Weil bound for additive cyclic codes
|
Güneri, Cem |
|
2016 |
82 |
1-2 |
p. 249-263 |
artikel |
9 |
Idempotent and p-potent quadratic functions: distribution of nonlinearity and co-dimension
|
Anbar, Nurdagül |
|
2016 |
82 |
1-2 |
p. 265-291 |
artikel |
10 |
Improved elliptic curve hashing and point representation
|
Tibouchi, Mehdi |
|
2016 |
82 |
1-2 |
p. 161-177 |
artikel |
11 |
Improving algebraic attacks on stream ciphers based on linear feedback shift register over $$\mathbb {F}_{2^k}$$F2k
|
Rønjom, Sondre |
|
2016 |
82 |
1-2 |
p. 27-41 |
artikel |
12 |
Improving impossible-differential attacks against Rijndael-160 and Rijndael-224
|
Minier, Marine |
|
2016 |
82 |
1-2 |
p. 117-129 |
artikel |
13 |
Improving the security and efficiency of block ciphers based on LS-designs
|
Journault, Anthony |
|
2016 |
82 |
1-2 |
p. 495-509 |
artikel |
14 |
Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity
|
Blondeau, Céline |
|
2016 |
82 |
1-2 |
p. 319-349 |
artikel |
15 |
Lower bound of covering radius of binary irreducible Goppa codes
|
Bezzateev, Sergey |
|
2016 |
82 |
1-2 |
p. 69-76 |
artikel |
16 |
MacWilliams Extension Theorem for MDS codes over a vector space alphabet
|
Dyshko, Serhii |
|
2016 |
82 |
1-2 |
p. 57-67 |
artikel |
17 |
Observing biases in the state: case studies with Trivium and Trivia-SC
|
Sarkar, Santanu |
|
2016 |
82 |
1-2 |
p. 351-375 |
artikel |
18 |
On some permutation binomials and trinomials over $$\mathbb {F}_{2^n}$$F2n
|
Bhattacharya, Srimanta |
|
2016 |
82 |
1-2 |
p. 149-160 |
artikel |
19 |
On the direct construction of recursive MDS matrices
|
Gupta, Kishan Chand |
|
2016 |
82 |
1-2 |
p. 77-94 |
artikel |
20 |
Optimal software-implemented Itoh–Tsujii inversion for $$\mathbb {F}_{2^{m}}$$F2m
|
Maitin-Shepard, Jeremy |
|
2016 |
82 |
1-2 |
p. 301-318 |
artikel |
21 |
Redefining the transparency order
|
Chakraborty, Kaushik |
|
2016 |
82 |
1-2 |
p. 95-115 |
artikel |
22 |
Reflection ciphers
|
Boura, Christina |
|
2015 |
82 |
1-2 |
p. 3-25 |
artikel |
23 |
Revisiting (nested) Roos bias in RC4 key scheduling algorithm
|
Sarkar, Santanu |
|
2016 |
82 |
1-2 |
p. 131-148 |
artikel |
24 |
Row reduction applied to decoding of rank-metric and subspace codes
|
Puchinger, Sven |
|
2016 |
82 |
1-2 |
p. 389-409 |
artikel |
25 |
Security proof of the canonical form of self-synchronizing stream ciphers
|
Dravie, Brandon |
|
2016 |
82 |
1-2 |
p. 377-388 |
artikel |
26 |
Signature codes for noisy multiple access adder channel
|
Gritsenko, Vladimir |
|
2016 |
82 |
1-2 |
p. 293-299 |
artikel |
27 |
Symmetric disjunctive list-decoding codes
|
D’yachkov, A. G. |
|
2016 |
82 |
1-2 |
p. 211-229 |
artikel |
28 |
Towards a general construction of recursive MDS diffusion layers
|
Gupta, Kishan Chand |
|
2016 |
82 |
1-2 |
p. 179-195 |
artikel |
29 |
Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity
|
Zajac, Pavol |
|
2016 |
82 |
1-2 |
p. 43-56 |
artikel |