Journal: Cryptography and Communications

Volume 1, Issue 2

135 -- 173Somitra Kumar Sanadhya, Palash Sarkar. A combinatorial analysis of recent attacks on step reduced SHA-2 family
175 -- 205Nicholas Kolokotronis, Konstantinos Limniotis, Nicholas Kalouptsidis. Factorization of determinants over finite fields and application in stream ciphers
207 -- 223Hong Xu, Wen-Feng Qi, Yong-Hui Zheng. Autocorrelations of ::::l::::-sequences with prime connection integer
225 -- 268Goutam Paul, Subhamoy Maitra. On biases of permutation and keystream bytes of RC4 towards the secret key
269 -- 282Aleksandar Kircanski, Rabeah Al-Zaidy, Amr M. Youssef. A new distinguishing and key recovery attack on NGG stream cipher

Volume 1, Issue 1

3 -- 29Fang-Wei Fu, Harald Niederreiter, Ferruh Özbudak. Joint linear complexity of multisequences consisting of linear recurring sequences
31 -- 46Charles J. Colbourn, Yuichiro Fujiwara. Small stopping sets in Steiner triple systems
47 -- 69Joan Daemen, Vincent Rijmen. New criteria for linear maps in AES-like ciphers
71 -- 94Martin Hell, Thomas Johansson, Lennart Brynielsson. An overview of distinguishing attacks on stream ciphers
95 -- 116Ramakanth Kavuluru, Andrew Klapper. Lower bounds on error complexity measures for periodic LFSR and FCSR sequences
117 -- 133Wilfried Meidl. How to determine linear complexity and ::::k::::-error linear complexity in some classes of linear recurring sequences