Journal: Cryptography and Communications

Volume 2, Issue 1

1 -- 17Aleksandar Kircanski, Amr M. Youssef. On the structural weakness of the GGHN stream cipher
19 -- 40Robert Rolland. The second weight of generalized Reed-Muller codes in most cases
41 -- 47Mikko Pelto. New bounds for (::::r::::, <= 2)-identifying codes in the infinite king grid
49 -- 67Alina Ostafe, Igor Shparlinski. Pseudorandom numbers and hash functions from iterations of multivariate polynomials
69 -- 83Ruchi Gode, Sugata Gangopadhyay. Third-order nonlinearities of a subclass of Kasami functions
85 -- 109Tor Helleseth, Alexander Kholosha. x:::2:::l:::+1:::+x+a and related affine polynomials over GF (2:::::::k:::::::)
111 -- 126E. Rodney Canfield, Zhicheng Gao, Catherine S. Greenhill, Brendan D. McKay, Robert W. Robinson. Asymptotic enumeration of correlation-immune boolean functions