Journal: Des. Codes Cryptography

Volume 49, Issue 1-3

1 -- 2Pascale Charpin, Tor Helleseth. Editorial: In memory of Hans Dobbertin
3 -- 22Hans Dobbertin, Gregor Leander. Bent functions embedded into the recursive framework of /mathbb::::Z::::{/mathbb{Z}} -bent functions
23 -- 32J. F. Dillon. More DD difference sets
33 -- 45Harald Niederreiter, Ayineedi Venkateswarlu. Periodic multisequences with large error linear complexity
47 -- 60Igor Semaev. On solving sparse algebraic equations over finite fields
61 -- 77Ferruh Özbudak, Zülfükar Saygi. Systematic authentication codes using additive polynomials
79 -- 94K. J. Horadam, D. G. Farmer. Bundles, presemifields and nonlinear functions
95 -- 103Sumanta Sarkar, Subhamoy Maitra. Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros
105 -- 122Ernst M. Gabidulin, Nina I. Pilipchuk. Error and erasure correcting algorithms for rank codes
123 -- 134Goutam Paul, Siddheshwar Rathi, Subhamoy Maitra. On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
135 -- 145Jon-Lark Kim, Patrick Solé. Skew Hadamard designs and their codes
147 -- 160Håvard Raddum, Igor Semaev. Solving Multiple Right Hand Sides linear equations
161 -- 170Lars Eirik Danielsen, Matthew G. Parker. Edge local complementation and equivalence of binary linear codes
171 -- 186Reza Rezaeian Farashahi, Ruud Pellikaan, Andrey Sidorenko. Extractors for binary elliptic curves
187 -- 197Jan De Beule, Klaus Metsch, Leo Storme. Characterization results on arbitrary non-weighted minihypers and on linear codes meeting the Griesmer bound
199 -- 215Maria Christopoulou, Theodoulos Garefalakis, Daniel Panario, David Thomson. The trace of an optimal normal element and low complexity normal bases
217 -- 232Mariusz Czapski, Maciej Nikodem. Error detection and error correction procedures for the advanced encryption standard
233 -- 249Haifeng Qian, Yuan Zhou, Zhibin Li, Zecheng Wang, Bing Zhang. Efficient public key encryption with smallest ciphertext expansion from factoring
251 -- 264George Petrides, Johannes Mykkeltveit. Composition of recursions and nonlinear complexity of periodic binary sequences
265 -- 271Danyo Danev, Stefan M. Dodunekov. A family of ternary quasi-perfect BCH codes
273 -- 288Marcus Brinkmann, Gregor Leander. On the classification of APN functions up to dimension five
289 -- 305Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov. Semantic security for the McEliece cryptosystem without random oracles
307 -- 321Rogério M. Siqueira, Sueli I. Rodrigues Costa. Flat tori, lattices and bounds for commutative group codes
323 -- 340Rafaël Fourquet, Cédric Tavernier. An improved list decoding algorithm for the second order Reed-Muller codes and its applications
341 -- 346Christian Bey, Gohar M. M. Kyureghyan. On Boolean functions with the sum of every two of them being bent
347 -- 357Kseniya Garaschuk, Petr Lisonek. On binary Kloosterman sums divisible by 3