Journal: Cryptography and Communications

Volume 10, Issue 6

1013 -- 1022László Mérai, Arne Winterhof. On the pseudorandomness of automatic sequences
1023 -- 1036Tao Bai, Yongbo Xia. A new class of permutation trinomials constructed from Niho exponents
1037 -- 1049Wilfried Meidl, Isabel Pirsic. On the normality of p-ary bent functions
1051 -- 1061Claude Carlet. On the nonlinearity of monotone Boolean functions
1063 -- 1073Ting Gu, Zhixiong Chen, Andrew Klapper. Correlation immune functions with respect to the q-transform
1075 -- 1090Sartaj Ul Hasan, Daniel Panario, Qiang Wang. Nonlinear vectorial primitive recursive sequences
1091 -- 1108Gaojun Luo, Xiwang Cao. Complete weight enumerators of three classes of linear codes
1109 -- 1117Rong Luo, Udaya Parampalli. Cyclic codes over $M_{2}(\mathbb {F}_{2}+u\mathbb {F}_{2})$
1119 -- 1135Gaojun Luo, Xiwang Cao. Five classes of optimal two-weight linear codes
1137 -- 1163Subhabrata Samajder, Palash Sarkar 0001. Multiple (Truncated) Differential Cryptanalysis: Explicit Upper Bounds on Data Complexity
1165 -- 1182Xueying Shi, Qin Yue, Yaotsu Chang. Some quantum MDS codes with large minimum distance from generalized Reed-Solomon codes
1183 -- 1202Zuling Chang, Martianus Frederic Ezerman, San Ling, Huaxiong Wang. The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields
1203 -- 0Somphong Jitman. Correction to: Good integers and some applications in coding theory

Volume 10, Issue 5

729 -- 730Subhamoy Maitra. Guest editorial
731 -- 753Ashwin Jha, Mridul Nandi. On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers
755 -- 776Tingting Cui, Huaifeng Chen, Sihem Mesnager, Ling Sun, Meiqin Wang. Statistical integral distinguisher with multi-structure and its application on AES-like ciphers
777 -- 801Kenneth G. Paterson, Jacob C. N. Schuldt. Statistical attacks on cookie masking for RC4
803 -- 834Matthias Hamann, Matthias Krause 0001, Willi Meier, Bin Zhang 0003. Design and analysis of small-state grain-like stream ciphers
835 -- 879Subhabrata Samajder, Palash Sarkar. Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses
881 -- 908Goutam Paul 0001, Souvik Ray. Analysis of burn-in period for RC4 state transition
909 -- 933Claude Carlet, Sylvain Guilley. Statistical properties of side-channel and fault injection attacks using coding theory
935 -- 957Srimanta Bhattacharya, Mridul Nandi. A note on the chi-square method: A tool for proving cryptographic security
959 -- 1012Matthias Hamann, Matthias Krause 0001. On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks

Volume 10, Issue 4

579 -- 589Xiusheng Liu, Hai Q. Dinh, Hualu Liu, Long Yu. On new quantum codes from matrix product codes
591 -- 609Zongxiang Yi, Zhiqiang Lin, Lishan Ke. A generic method to construct zero-difference balanced functions
611 -- 628Yousuf AlSalami. Constructions with high algebraic degree of differentially 4-uniform (n, n - 1)-functions and differentially 8-uniform (n, n - 2)-functions
629 -- 641Kalikinkar Mandal, Bo Yang, Guang Gong, Mark Aagaard. On ideal t-tuple distribution of filtering de Bruijn sequence generators
643 -- 653Zhonghua Sun, Shixin Zhu, Liqi Wang. m
655 -- 666Francis N. Castro, Luis A. Medina, Ivelisse M. Rubio. Exact 2-divisibility of exponential sums associated to boolean functions
667 -- 683Elena Barcucci, Antonio Bernini, Stefano Bilotta, Renzo Pinzani. A 2D non-overlapping code over a q-ary alphabet
685 -- 704Somphong Jitman. Good integers and some applications in coding theory
705 -- 717Aleksandr Tuxanidy, Qiang Wang. Characteristic digit-sum sequences
719 -- 728Lucky Galvez, Jon-Lark Kim, Nari Lee, Young Gun Roe, Byung-Sun Won. Some bounds on binary LCD codes

Volume 10, Issue 3

401 -- 435Anuradha Sharma, Taranjot Kaur. Enumeration formulae for self-dual, self-orthogonal and complementary-dual quasi-cyclic codes over finite fields
437 -- 454Shanding Xu, Xiwang Cao, Guangkui Xu, Gaojun Luo. Two classes of near-optimal frequency-hopping sequence sets with prime-power period
455 -- 465Li-Ping Wang, Daqing Wan. On lattice-based algebraic feedback shift registers synthesis for multisequences
467 -- 477Yuhua Sun, Qiang Wang, Tongjiang Yan. The exact autocorrelation distribution and 2-adic complexity of a class of binary sequences with almost optimal autocorrelation
479 -- 508Amit Jana, Goutam Paul 0001. Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs
509 -- 517Serdar Boztas, Ferruh Özbudak, Eda Tekin. Generalized nonbinary sequences with perfect autocorrelation, flexible alphabets and new periods
519 -- 530R. Sobhani. Cyclic codes over a non-commutative finite chain ring
531 -- 554Kangquan Li, Longjiang Qu, Xi Chen, Chao Li 0002. a) and permutation trinomials over finite fields with even characteristic
555 -- 565Xuli Zhang, Jing Jiang, Minquan Cheng. Bounds and constructions for 3¯-strongly separable codes with length 3
567 -- 578Zhengbang Zha, Lei Hu, Zhizheng Zhang. 2m

Volume 10, Issue 2

235 -- 249Nurdagül Anbar, Wilfried Meidl. Modified planar functions and their components
251 -- 275Zuling Chang, Martianus Frederic Ezerman, San Ling, Huaxiong Wang. Construction of de Bruijn sequences from product of two irreducible polynomials
277 -- 289Lin Sok, Minjia Shi, Patrick Solé. Classification and Construction of quaternary self-dual bent functions
291 -- 299Pan Tan, Zhengchun Zhou, Deng Tang, Tor Helleseth. The weight distribution of a class of two-weight linear codes derived from Kloosterman sums
301 -- 318Gaojun Luo, Xiwang Cao, Shanding Xu, Jiafu Mi. Binary linear codes with two or three weights from niho exponents
319 -- 341Cunsheng Ding. A sequence construction of cyclic codes over finite fields
343 -- 355Mokshi Goyal, Madhu Raka. m - u 〉 and their Gray images
357 -- 368Santiago Barrera Acevedo, Heiko Dietrich. Perfect sequences over the quaternions and (4n, 2, 4n, 2n)-relative difference sets in C n × Q 8
369 -- 382Andrew Klapper. Matrix parametrized shift registers
383 -- 399Elena Dubrova, Mats Näslund, Göran Selander, Fredrik Lindqvist. Message Authentication Based on Cryptographically Secure CRC without Polynomial Irreducibility Test

Volume 10, Issue 1

1 -- 3Tor Helleseth, Bart Preneel. Editorial: Special issue on recent trends in cryptography
5 -- 15Michael Scott. Missing a trick: Karatsuba variations
17 -- 26Houda Ferradi, Rémi Géraud, Diana Maimut, David Naccache, Hang Zhou. Backtracking-assisted multiplication
27 -- 39Sonia Bogos, John Gaspoz, Serge Vaudenay. Cryptanalysis of a homomorphic encryption scheme
41 -- 58Marie-Sarah Lacharité. Security of BLS and BGLS signatures in a multi-user setting
59 -- 77Valérie Nachef, Jacques Patarin, Emmanuel Volte. Generic attacks with standard deviation analysis on a-feistel schemes
79 -- 99Brett Hemenway, Rafail Ostrovsky. Efficient robust secret sharing from expander graphs
101 -- 121Eloi de Chérisey, Sylvain Guilley, Annelie Heuser, Olivier Rioul. On the optimality and practicability of mutual information analysis in some scenarios
123 -- 137Gregory G. Rose. KISS: A bit too simple
139 -- 158Geong Sen Poh, Moesfa Soeheila Mohamad, Ji-Jian Chin. Searchable symmetric encryption over multiple servers
159 -- 175Tomás Fabsic, Otokar Grosek, Karol Nemoga, Pavol Zajac. On generating invertible circulant binary matrices with a prescribed number of ones
177 -- 193Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel 0001. POEx: A beyond-birthday-bound-secure on-line cipher
195 -- 209Tingting Cui, Huaifeng Chen, Long Wen, Meiqin Wang. Statistical integral attack on CAST-256 and IDEA
211 -- 233Cécile Pierrot, Benjamin Wesolowski. Malleability of the blockchain's entropy