nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
|
Dalai, Deepak Kumar |
|
|
90 |
3 |
p. 489-521 |
artikel |
2 |
Cameron–Liebler k-sets in subspaces and non-existence conditions
|
Beule, Jan De |
|
|
90 |
3 |
p. 633-651 |
artikel |
3 |
Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation
|
Liu, Jiang |
|
|
90 |
3 |
p. 577-591 |
artikel |
4 |
From primary to dual affine variety codes over the Klein quartic
|
Geil, Olav |
|
|
90 |
3 |
p. 523-543 |
artikel |
5 |
Indifferentiable hashing to ordinary elliptic Fq-curves of j=0 with the cost of one exponentiation in Fq
|
Koshelev, Dmitrii |
|
|
90 |
3 |
p. 801-812 |
artikel |
6 |
Linear codes from support designs of ternary cyclic codes
|
Tan, Pan |
|
|
90 |
3 |
p. 681-693 |
artikel |
7 |
Mosaics of combinatorial designs for information-theoretic security
|
Wiese, Moritz |
|
|
90 |
3 |
p. 593-632 |
artikel |
8 |
Nearly optimal balanced quaternary sequence pairs of prime period N≡5(mod8)
|
Zhao, Mengzhen |
|
|
90 |
3 |
p. 813-826 |
artikel |
9 |
On subset-resilient hash function families
|
Yuan, Quan |
|
|
90 |
3 |
p. 719-758 |
artikel |
10 |
On the design and security of Lee metric McEliece cryptosystems
|
Lau, Terry Shue Chien |
|
|
90 |
3 |
p. 695-717 |
artikel |
11 |
On the locality of quasi-cyclic codes over finite fields
|
Rajput, Charul |
|
|
90 |
3 |
p. 759-777 |
artikel |
12 |
Regular complete permutation polynomials over F2n
|
Xu, Xiaofang |
|
|
90 |
3 |
p. 545-575 |
artikel |
13 |
The geometric field of linearity of linear sets
|
Jena, Dibyayoti |
|
|
90 |
3 |
p. 779-799 |
artikel |
14 |
Two secondary constructions of bent functions without initial conditions
|
Zhao, H. |
|
|
90 |
3 |
p. 653-679 |
artikel |
15 |
Uniqueness of the inversive plane of order sixty-four
|
Penttila, Tim |
|
|
90 |
3 |
p. 827-834 |
artikel |