Journal: Cryptography and Communications

Volume 8, Issue 4

455 -- 511Debrup Chakraborty, Palash Sarkar. On modes of operations of a block cipher for authentication and authenticated encryption
513 -- 523Fulin Li, Shixin Zhu, Honggang Hu, Ting Jiang. Determining the k-error joint linear complexity spectrum for a binary multisequence with period p n
525 -- 539Can Xiang. Linear codes from a generic construction
541 -- 554Guangkui Xu, Xiwang Cao, Shanding Xu. Optimal p-ary cyclic codes with minimum distance four from monomials
555 -- 577Brandon Dravie, Jérémy Parriaux, Philippe Guillot, Gilles Millérioux. Matrix representations of vectorial Boolean functions and eigenanalysis
579 -- 591Ji-Jian Chin, Syh-Yuan Tan, Swee-Huay Heng, Raphael C.-W. Phan. Twin-Beth: Security under active and concurrent attacks for the beth identity-based identification scheme
593 -- 604Ji-Woong Jang, Dae-Woon Lim. Large low probability of intercept properties of the quaternary sequence with optimal correlation property constructed by legendre sequences
605 -- 616Qiuyan Wang, Dongdai Lin. Generalized cyclotomic numbers of order two and their applications
617 -- 636Anuradha Sharma, Saroj Rani. On constacyclic codes over finite fields
637 -- 645Kai-Uwe Schmidt. Nonlinearity measures of random Boolean functions

Volume 8, Issue 3

313 -- 330Joan Boyar, Magnus Gausdal Find, René Peralta. On various nonlinearity measures for boolean functions
331 -- 369Sonia Bogos, Florian Tramèr, Serge Vaudenay. On solving L P N using B K W and variants - Implementation and analysis
371 -- 381Yuan Cheng, Wen-Feng Qi, Qun-Xiong Zheng, Dong Yang. On the distinctness of primitive sequences over Z/(p e q) modulo 2
383 -- 400Ting Gu, Andrew Klapper. Statistical properties of half-ℓ-sequences
401 -- 413Kaushik Chakraborty, Subhamoy Maitra. Application of Grover's algorithm to check non-resiliency of a Boolean function
415 -- 433Torleiv Kløve. On covering sets for limited-magnitude errors
435 -- 453Yi Lu 0002, Yvo Desmedt. Walsh transforms and cryptographic applications in bias computing

Volume 8, Issue 2

173 -- 174Lilya Budaghyan, Tor Helleseth, Alexander Kholosha. Editorial: Special issue on Boolean functions and their applications
175 -- 189Daniel J. Katz, Philippe Langevin. New open problems related to old conjectures by Helleseth
191 -- 214Canan Kasikci, Wilfried Meidl, Alev Topuzoglu. Spectra of a class of quadratic functions: Average behaviour and counting functions
215 -- 227Chunlei Li, Tor Helleseth. Quasi-perfect linear codes from planar and APN functions
229 -- 246Sihem Mesnager. Further constructions of infinite families of bent functions from new permutations and their duals
247 -- 276Georgi Ivanov, Nikolay Nikolov, Svetla Nikova. Reversed genetic algorithms for generation of bijective s-boxes with good cryptographic properties
277 -- 289Oleksandr Kazymyrov, Roman Oliynykov, Håvard Raddum. Influence of addition modulo 2 n on algebraic attacks
291 -- 311Yin Tan, Guang Gong, Bo Zhu. Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions

Volume 8, Issue 1

1 -- 6Mingxing Wang, Yupeng Jiang, Dongdai Lin. Further results on the nonlinearity of maximum-length NFSR feedbacks
7 -- 18Adel Alahmadi, Hussain Alhazmi, Tor Helleseth, Rola Hijazi, Najat M. Muthana, Patrick Solé. On the lifted Melas code
19 -- 32Maura B. Paterson, Douglas R. Stinson, Yongge Wang. On encoding symbol degrees of array BP-XOR codes
33 -- 49Qiuyan Wang, Yupeng Jiang, Dongdai Lin. Linear complexity of Ding-Helleseth sequences of order 2 over GF(l)
51 -- 66Jian Gao, Linzhi Shen, Fang-Wei Fu. A Chinese remainder theorem approach to skew generalized quasi-cyclic codes over finite fields
67 -- 81Thomas W. Cusick, Pantelimon Stanica. Counting equivalence classes for monomial rotation symmetric Boolean functions with prime dimension
83 -- 101Anuradha Sharma, Amit K. Sharma. m
103 -- 112Chuan Lv, Tongjiang Yan, Guozhen Xiao. New developments in q-polynomial codes
113 -- 137Subhadeep Banik. Conditional differential cryptanalysis of 105 round Grain v1
139 -- 153Iiro S. Honkala, Olivier Hudry, Antoine Lobstein. On the ensemble of optimal identifying codes in a twin-free graph
155 -- 171Guangkui Xu, Xiwang Cao, Shanding Xu. Constructing new APN functions and bent functions over finite fields of odd characteristic via the switching method