researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Cryptography and Communications
Home
Index
Info
Volume
Volume
5
, Issue
4
229
--
240
Maura B. Paterson
,
Douglas R. Stinson
.
A simple combinatorial treatment of constructions and threshold gaps of ramp schemes
241
--
276
Elodie Leducq
.
Second weight codewords of generalized Reed-Muller codes
277
--
289
Guang Gong
,
Mark Aagaard
,
Xinxin Fan
.
Resilience to distinguishing attacks on WG-7 cipher and their generalizations
Volume
5
, Issue
3
179
--
199
Konstantinos Limniotis
,
Nicholas Kolokotronis
,
Nicholas Kalouptsidis
.
Secondary constructions of Boolean functions with maximum algebraic immunity
201
--
207
K. T. Arasu
,
Simone Severini
,
Edmund Velten
.
Block weighing matrices
209
--
227
Cunsheng Ding
,
Keqin Feng
,
Rongquan Feng
,
Maosheng Xiong
,
Aixian Zhang
.
Unit time-phase signal sets: Bounds and constructions
Volume
5
, Issue
2
85
--
118
Alyssa Brown
,
Thomas W. Cusick
.
Equivalence classes for cubic rotation symmetric functions
119
--
136
Irène Charon
,
Iiro S. Honkala
,
Olivier Hudry
,
Antoine Lobstein
.
Minimum sizes of identifying codes in graphs differing by one vertex
137
--
162
Sourav Das
,
Dipanwita Roy Chowdhury
.
CAR30: A new scalable stream cipher with rule 30
163
--
177
Ana Salagean
,
Alex J. Burrage
,
Raphael C.-W. Phan
.
Computing the linear complexity for sequences with characteristic polynomial f v
Volume
5
, Issue
1
1
--
6
Wenhao Wang
,
Meicheng Liu
,
Yin Zhang
.
Comments on "A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation"
7
--
18
Thomas W. Cusick
.
Finding Hamming weights without looking at truth tables
19
--
47
Sourav Sen Gupta
,
Anupam Chattopadhyay
,
Ayesha Khalid
.
Designing integrated accelerator for stream ciphers with structural similarities
49
--
65
Zoubida Jadda
,
Patrice Parraud
,
Soukayna Qarboua
.
Quaternary cryptographic bent functions and their binary projection
67
--
83
Romar dela Cruz
,
Huaxiong Wang
.
Cheating-immune secret sharing schemes from codes and cumulative arrays