Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             29 results found
no title author magazine year volume issue page(s) type
1 A code-based group signature scheme Alamélou, Quentin
2016
82 1-2 p. 469-493
article
2 Algebraic decoding of folded Gabidulin codes Bartz, Hannes
2016
82 1-2 p. 449-467
article
3 Almost cover-free codes and designs D’yachkov, Arkadii
2016
82 1-2 p. 231-247
article
4 Antiderivative functions over $$\mathbb {F}_{2^n}$$F2n Suder, Valentin
2016
82 1-2 p. 435-447
article
5 Cover-free codes and separating system codes D’yachkov, A. G.
2016
82 1-2 p. 197-209
article
6 Editorial: Special issue on coding and cryptography Charpin, Pascale
2016
82 1-2 p. 1-2
article
7 Energy bounds for codes and designs in Hamming spaces Boyvalenkov, P. G.
2016
82 1-2 p. 411-433
article
8 Hasse–Weil bound for additive cyclic codes Güneri, Cem
2016
82 1-2 p. 249-263
article
9 Idempotent and p-potent quadratic functions: distribution of nonlinearity and co-dimension Anbar, Nurdagül
2016
82 1-2 p. 265-291
article
10 Improved elliptic curve hashing and point representation Tibouchi, Mehdi
2016
82 1-2 p. 161-177
article
11 Improving algebraic attacks on stream ciphers based on linear feedback shift register over $$\mathbb {F}_{2^k}$$F2k Rønjom, Sondre
2016
82 1-2 p. 27-41
article
12 Improving impossible-differential attacks against Rijndael-160 and Rijndael-224 Minier, Marine
2016
82 1-2 p. 117-129
article
13 Improving the security and efficiency of block ciphers based on LS-designs Journault, Anthony
2016
82 1-2 p. 495-509
article
14 Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity Blondeau, Céline
2016
82 1-2 p. 319-349
article
15 Lower bound of covering radius of binary irreducible Goppa codes Bezzateev, Sergey
2016
82 1-2 p. 69-76
article
16 MacWilliams Extension Theorem for MDS codes over a vector space alphabet Dyshko, Serhii
2016
82 1-2 p. 57-67
article
17 Observing biases in the state: case studies with Trivium and Trivia-SC Sarkar, Santanu
2016
82 1-2 p. 351-375
article
18 On some permutation binomials and trinomials over $$\mathbb {F}_{2^n}$$F2n Bhattacharya, Srimanta
2016
82 1-2 p. 149-160
article
19 On the direct construction of recursive MDS matrices Gupta, Kishan Chand
2016
82 1-2 p. 77-94
article
20 Optimal software-implemented Itoh–Tsujii inversion for $$\mathbb {F}_{2^{m}}$$F2m Maitin-Shepard, Jeremy
2016
82 1-2 p. 301-318
article
21 Redefining the transparency order Chakraborty, Kaushik
2016
82 1-2 p. 95-115
article
22 Reflection ciphers Boura, Christina
2015
82 1-2 p. 3-25
article
23 Revisiting (nested) Roos bias in RC4 key scheduling algorithm Sarkar, Santanu
2016
82 1-2 p. 131-148
article
24 Row reduction applied to decoding of rank-metric and subspace codes Puchinger, Sven
2016
82 1-2 p. 389-409
article
25 Security proof of the canonical form of self-synchronizing stream ciphers Dravie, Brandon
2016
82 1-2 p. 377-388
article
26 Signature codes for noisy multiple access adder channel Gritsenko, Vladimir
2016
82 1-2 p. 293-299
article
27 Symmetric disjunctive list-decoding codes D’yachkov, A. G.
2016
82 1-2 p. 211-229
article
28 Towards a general construction of recursive MDS diffusion layers Gupta, Kishan Chand
2016
82 1-2 p. 179-195
article
29 Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity Zajac, Pavol
2016
82 1-2 p. 43-56
article
                             29 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands