Journal: Cryptography and Communications

Volume 9, Issue 6

665 -- 682Saban Alaca, Goldwyn Millar. Character values of the Sidelnikov-Lempel-Cohn-Eastman sequences
683 -- 691Vladimir Edemskiy, Xiaoni Du. Design sequences with high linear complexity over finite fields using generalized cyclotomy
693 -- 705Nian Li, Tor Helleseth. Several classes of permutation trinomials from Niho exponents
707 -- 728LiMengNan Zhou, Daiyuan Peng, Hongbin Liang, ChangYuan Wang, Hongyu Han. Generalized methods to construct low-hit-zone frequency-hopping sequence sets and optimal constructions
729 -- 736Jacques Wolfmann. Sequences of bent functions and near-bent functions
737 -- 748Heiko Dietrich, Nathan Jolly. A new family of arrays with low autocorrelation
749 -- 767Eric Férard. On the irreducibility of the hyperplane sections of Fermat varieties in ℙ 3 $\mathbb {P}^{3}$ in characteristic 2. II

Volume 9, Issue 5

545 -- 562Xianfang Wang, Jian Gao, Fang-Wei Fu. Complete weight enumerators of two classes of linear codes
563 -- 580Shuai Xue, Wen-Feng Qi, Xiao-Yuan Yang. On the best linear approximation of addition modulo 2 n
581 -- 597Thalia M. Laing, Keith M. Martin, Maura B. Paterson, Douglas R. Stinson. Localised multisecret sharing
599 -- 624Yuan Cao, Qingguo Li. Cyclic codes of odd length over ℤ4 [u] / 〈u k 〉
625 -- 635Xianfang Wang, Can Xiang, Fang-Wei Fu. Secret sharing schemes for compartmented access structures
637 -- 646Minjia Shi, Rongsheng Wu, Yan Liu, Patrick Solé. Two and three weight codes over $\mathbb {F}_{p}+u\mathbb {F}_{p}$
647 -- 664Chunming Tang, Yanfeng Qi. A class of hyper-bent functions and Kloosterman sums

Volume 9, Issue 4

431 -- 443Zhiqiang Lin, Dongdai Lin, Dingyi Pei. Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications
445 -- 458Zhixiong Chen. 4 based on generalized cyclotomic classes modulo pq
459 -- 473Madhu Raka, Leetika Kathuria, Mokshi Goyal. 4-u〉
475 -- 499Pramod Kumar Kewat, Priti Kumari. Cyclic codes from the second class two-prime Whiteman's generalized cyclotomic sequence with order 6
501 -- 509László Mérai, Harald Niederreiter, Arne Winterhof. Expansion complexity and linear complexity of sequences over finite fields
511 -- 522Hongyu Han, Daiyuan Peng, Udaya Parampalli. New sets of optimal low-hit-zone frequency-hopping sequences based on m-sequences
523 -- 543Santanu Sarkar, Prakash Dey, Avishek Adhikari, Subhamoy Maitra. Probabilistic signature based generalized framework for differential fault analysis of stream ciphers

Volume 9, Issue 3

315 -- 322Qiuyan Wang, Kelan Ding, Dongdai Lin, Rui Xue. A kind of three-weight linear codes
323 -- 343Ziling Heng, Qin Yue. Complete weight distributions of two classes of cyclic codes
345 -- 361Jian Liu, Sihem Mesnager, Lusheng Chen. On the nonlinearity of S-boxes and linear codes
363 -- 378Jie Peng, Chik-How Tan. New differentially 4-uniform permutations by modifying the inverse function on subfields
379 -- 396Morteza Esmaeili, M. Moosavi, T. Aaron Gulliver. A new class of Fibonacci sequence based error correcting codes
397 -- 405Minquan Cheng, Jing Jiang, Xiaohu Tang. Asymptotically optimal 2¯-separable codes with length 4
407 -- 430Miao Liang, Lijun Ji, Jingcai Zhang. Some new classes of 2-fold optimal or perfect splitting authentication codes

Volume 9, Issue 2

165 -- 180Yue Zhou, Longjiang Qu. Constructions of negabent functions over finite fields
181 -- 197Xin Li, Zihui Liu. On the second relative greedy weight
199 -- 215Lisha Wang, Xiaohu Tang. On the correlation distribution of the generalized maximal length ℤ4-sequences
217 -- 239Ana Salagean, Matei Mandache-Salagean. Counting and characterising functions with "fast points" for differential attacks
241 -- 272Rama Krishna Bandi, Maheshanand Bhaintwal, Nuh Aydin. 4
273 -- 289Elena Dubrova, Martin Hell. Espresso: A stream cipher for 5G wireless communication systems
291 -- 299Tingting Wu, Jian Gao, Fang-Wei Fu. 4
301 -- 314Sugata Gangopadhyay, Aditi Kar Gangopadhyay, Spyridon Pollatos, Pantelimon Stanica. Cryptographic Boolean functions with biased inputs

Volume 9, Issue 1

1 -- 2Cunsheng Ding, Zhengchun Zhou. Preface: Special functions and codes
3 -- 21Kanat S. Abdukhalikov, Sihem Mesnager. Bent functions linear on elements of some classical spreads and presemifields spreads
23 -- 39Sergey Bezzateev, Natalia A. Shekhunova. Quasi-cyclic Goppa codes with special Goppa polynomials and matched location sets
41 -- 53Ziling Heng, Qin Yue. 4
55 -- 69Chengju Li, Sunghan Bae, Haode Yan. A construction of codes with linearity from two linear codes
71 -- 84Sihem Mesnager. Linear codes with few weights from weakly regular bent functions based on a generic construction
85 -- 92Qi Wang. Some cyclic codes with prime length from cyclotomy of order 4
93 -- 116Can Xiang, Chunming Tang, Keqin Feng. A class of linear codes with a few weights
117 -- 131Guangkui Xu, Xiwang Cao, Shanding Xu. Two classes of p-ary bent functions and linear codes with three or four weights
133 -- 149Shudi Yang, Zheng-an Yao, Chang-An Zhao. A class of three-weight linear codes and their complete weight enumerators
151 -- 163Dan Zhang, Cuiling Fan, Daiyuan Peng, Xiaohu Tang. Complete weight enumerators of some linear codes from quadratic forms