researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Cryptography and Communications
Home
Index
Info
Issue
Volume
2
, Issue
1
1
--
17
Aleksandar Kircanski
,
Amr M. Youssef
.
On the structural weakness of the GGHN stream cipher
19
--
40
Robert Rolland
.
The second weight of generalized Reed-Muller codes in most cases
41
--
47
Mikko Pelto
.
New bounds for (::::r::::, <= 2)-identifying codes in the infinite king grid
49
--
67
Alina Ostafe
,
Igor Shparlinski
.
Pseudorandom numbers and hash functions from iterations of multivariate polynomials
69
--
83
Ruchi Gode
,
Sugata Gangopadhyay
.
Third-order nonlinearities of a subclass of Kasami functions
85
--
109
Tor Helleseth
,
Alexander Kholosha
.
x:::2:::l:::+1:::+x+a and related affine polynomials over GF (2:::::::k:::::::)
111
--
126
E. Rodney Canfield
,
Zhicheng Gao
,
Catherine S. Greenhill
,
Brendan D. McKay
,
Robert W. Robinson
.
Asymptotic enumeration of correlation-immune boolean functions