Journal: Des. Codes Cryptography

Volume 76, Issue 3

373 -- 384Masaaki Harada. On a 5-design related to a putative extremal doubly even self-dual code of length a multiple of 24
385 -- 408Guo-qiang Liu, Chen-Hui Jin. Differential cryptanalysis of PRESENT-like cipher
409 -- 430Bangteng Xu. Bentness and nonlinearity of functions on finite groups
431 -- 449Orr Dunkelman, Nathan Keller, Adi Shamir. Almost universal forgery attacks on AES-based MAC's
451 -- 468Susan G. Barwick, Wen-Ai Jackson. 3)
469 -- 504Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama. Strongly secure authenticated key exchange from factoring, codes, and lattices
505 -- 517Tung Le, Jamshid Moori. On the automorphisms of designs constructed from finite simple groups
519 -- 535Steven T. Dougherty, Jon-Lark Kim, Yoonjin Lee. Codes over rings and Hermitian lattices
537 -- 549Oktay Olmez. Plateaued functions and one-and-half difference sets
551 -- 569Anthony B. Evans, David Fear, Rebecca J. Stones. Diagonally cyclic equitable rectangles
571 -- 587Claude Carlet, Deng Tang. Enhanced Boolean functions suitable for the filter model of pseudo-random generator
589 -- 600Hengjia Wei, Hui Zhang 0004, Gennian Ge. Completely reducible super-simple designs with block size five and index two
601 -- 627Orr Dunkelman, Nathan Keller. Practical-time attacks against reduced variants of MISTY1