Journal: Cryptography and Communications

Volume 5, Issue 4

229 -- 240Maura B. Paterson, Douglas R. Stinson. A simple combinatorial treatment of constructions and threshold gaps of ramp schemes
241 -- 276Elodie Leducq. Second weight codewords of generalized Reed-Muller codes
277 -- 289Guang Gong, Mark Aagaard, Xinxin Fan. Resilience to distinguishing attacks on WG-7 cipher and their generalizations

Volume 5, Issue 3

179 -- 199Konstantinos Limniotis, Nicholas Kolokotronis, Nicholas Kalouptsidis. Secondary constructions of Boolean functions with maximum algebraic immunity
201 -- 207K. T. Arasu, Simone Severini, Edmund Velten. Block weighing matrices
209 -- 227Cunsheng Ding, Keqin Feng, Rongquan Feng, Maosheng Xiong, Aixian Zhang. Unit time-phase signal sets: Bounds and constructions

Volume 5, Issue 2

85 -- 118Alyssa Brown, Thomas W. Cusick. Equivalence classes for cubic rotation symmetric functions
119 -- 136Irène Charon, Iiro S. Honkala, Olivier Hudry, Antoine Lobstein. Minimum sizes of identifying codes in graphs differing by one vertex
137 -- 162Sourav Das, Dipanwita Roy Chowdhury. CAR30: A new scalable stream cipher with rule 30
163 -- 177Ana Salagean, Alex J. Burrage, Raphael C.-W. Phan. Computing the linear complexity for sequences with characteristic polynomial f v

Volume 5, Issue 1

1 -- 6Wenhao Wang, Meicheng Liu, Yin Zhang. Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation"
7 -- 18Thomas W. Cusick. Finding Hamming weights without looking at truth tables
19 -- 47Sourav Sen Gupta, Anupam Chattopadhyay, Ayesha Khalid. Designing integrated accelerator for stream ciphers with structural similarities
49 -- 65Zoubida Jadda, Patrice Parraud, Soukayna Qarboua. Quaternary cryptographic bent functions and their binary projection
67 -- 83Romar dela Cruz, Huaxiong Wang. Cheating-immune secret sharing schemes from codes and cumulative arrays