1 | -- | 2 | Pascale Charpin, Tor Helleseth. Editorial: In memory of Hans Dobbertin |
3 | -- | 22 | Hans Dobbertin, Gregor Leander. Bent functions embedded into the recursive framework of /mathbb::::Z::::{/mathbb{Z}} -bent functions |
23 | -- | 32 | J. F. Dillon. More DD difference sets |
33 | -- | 45 | Harald Niederreiter, Ayineedi Venkateswarlu. Periodic multisequences with large error linear complexity |
47 | -- | 60 | Igor Semaev. On solving sparse algebraic equations over finite fields |
61 | -- | 77 | Ferruh Özbudak, Zülfükar Saygi. Systematic authentication codes using additive polynomials |
79 | -- | 94 | K. J. Horadam, D. G. Farmer. Bundles, presemifields and nonlinear functions |
95 | -- | 103 | Sumanta Sarkar, Subhamoy Maitra. Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros |
105 | -- | 122 | Ernst M. Gabidulin, Nina I. Pilipchuk. Error and erasure correcting algorithms for rank codes |
123 | -- | 134 | Goutam Paul, Siddheshwar Rathi, Subhamoy Maitra. On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key |
135 | -- | 145 | Jon-Lark Kim, Patrick Solé. Skew Hadamard designs and their codes |
147 | -- | 160 | Håvard Raddum, Igor Semaev. Solving Multiple Right Hand Sides linear equations |
161 | -- | 170 | Lars Eirik Danielsen, Matthew G. Parker. Edge local complementation and equivalence of binary linear codes |
171 | -- | 186 | Reza Rezaeian Farashahi, Ruud Pellikaan, Andrey Sidorenko. Extractors for binary elliptic curves |
187 | -- | 197 | Jan De Beule, Klaus Metsch, Leo Storme. Characterization results on arbitrary non-weighted minihypers and on linear codes meeting the Griesmer bound |
199 | -- | 215 | Maria Christopoulou, Theodoulos Garefalakis, Daniel Panario, David Thomson. The trace of an optimal normal element and low complexity normal bases |
217 | -- | 232 | Mariusz Czapski, Maciej Nikodem. Error detection and error correction procedures for the advanced encryption standard |
233 | -- | 249 | Haifeng Qian, Yuan Zhou, Zhibin Li, Zecheng Wang, Bing Zhang. Efficient public key encryption with smallest ciphertext expansion from factoring |
251 | -- | 264 | George Petrides, Johannes Mykkeltveit. Composition of recursions and nonlinear complexity of periodic binary sequences |
265 | -- | 271 | Danyo Danev, Stefan M. Dodunekov. A family of ternary quasi-perfect BCH codes |
273 | -- | 288 | Marcus Brinkmann, Gregor Leander. On the classification of APN functions up to dimension five |
289 | -- | 305 | Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov. Semantic security for the McEliece cryptosystem without random oracles |
307 | -- | 321 | Rogério M. Siqueira, Sueli I. Rodrigues Costa. Flat tori, lattices and bounds for commutative group codes |
323 | -- | 340 | Rafaël Fourquet, Cédric Tavernier. An improved list decoding algorithm for the second order Reed-Muller codes and its applications |
341 | -- | 346 | Christian Bey, Gohar M. M. Kyureghyan. On Boolean functions with the sum of every two of them being bent |
347 | -- | 357 | Kseniya Garaschuk, Petr Lisonek. On binary Kloosterman sums divisible by 3 |