Journal: Des. Codes Cryptography

Volume 77, Issue 2-3

287 -- 299Ian F. Blake, Alfred Menezes, Doug Stinson. Guest Editorial: Special Issue in Honor of Scott A. Vanstone
301 -- 319Chuan Guo, Douglas R. Stinson, Tran van Trung. On tight bounds for binary frameproof codes
321 -- 333Charles C. Lindner, Mariusz Meszka, Alexander Rosa. Almost 2-perfect 6-cycle systems
335 -- 350Dirk Hachenberger. Primitive normal bases for quartic and cubic extensions: a geometric approach
351 -- 356Ryoh Fuji-Hara. Perfect hash families of strength three with three rows from varieties on finite projective geometries
357 -- 363Kevin T. Phelps. Enumeration of Kerdock codes of length 64
365 -- 374Dieter Jungnickel, Vladimir D. Tonchev. Maximal arcs and quasi-symmetric designs
375 -- 400Thijs Laarhoven, Michele Mosca, Joop van de Pol. Finding shortest lattice vectors faster using quantum search
401 -- 408Sonia Chiasson, Paul C. van Oorschot. Quantifying the security advantage of password expiration policies
409 -- 426Dan Archdeacon, Jeffrey H. Dinitz, Diane M. Donovan, Emine Sule Yazici. Square integer Heffter arrays with empty cells
427 -- 439Alice Silverberg, Yuri G. Zarhin. Isogenies of abelian varieties over finite fields
441 -- 477Benoît Libert, Thomas Peters, Marc Joye, Moti Yung. Linearly homomorphic structure-preserving signatures and their applications
479 -- 491Yeow Meng Chee, Charles J. Colbourn, Alan Chi Hung Ling, Hui Zhang 0004, Xiande Zhang. Optimal low-power coding for error correction and crosstalk avoidance in on-chip data buses
493 -- 514Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe. High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
515 -- 539Eric L. Roettger, Hugh C. Williams, R. K. Guy. Some primality tests that eluded Lucas
541 -- 552Jeffrey Hoffstein, Joseph H. Silverman. PASS-Encrypt: a public key cryptosystem based on partial evaluation of polynomials
553 -- 562Esther R. Lamken. The asymptotic existence of DR(v, k, k-1)-BIBDs
563 -- 585Liang Feng Zhang, Reihaneh Safavi-Naini. Batch verifiable computation of outsourced functions
587 -- 610Neal Koblitz, Alfred J. Menezes. The random oracle model: a twenty-year retrospective
611 -- 631Elena Andreeva, Bart Mennink, Bart Preneel. Open problems in hash function security
633 -- 651Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir. Reflections on slide with a twist attacks
653 -- 662Gary McGuire, Emrah Sercan Yilmaz. Further results on the number of rational points of hyperelliptic supersingular curves in characteristic 2
663 -- 676Ueli Maurer. Zero-knowledge proofs of knowledge for group homomorphisms
677 -- 712Gerhard Frey, Ernst Kani. Normal forms of hyperelliptic curves of genus 3
713 -- 724Peter Landrock. Power map permutations and the discrete log problem
725 -- 771Tatsuaki Okamoto, Katsuyuki Takashima. Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption

Volume 77, Issue 1

1 -- 9Yan Liu, Haode Yan, Chunlei Liu. A class of six-weight cyclic codes and their weight distribution
11 -- 48Jiqiang Lu. A methodology for differential-linear cryptanalysis and its applications
49 -- 60Anamari Nakic, Mario-Osvin Pavcevic. Tactical decompositions of designs over finite fields
61 -- 98Ryo Nishimaki, Keita Xagawa. Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
99 -- 116Sihem Mesnager. Bent vectorial functions and linear codes from o-polynomials
117 -- 141Deng Tang, Claude Carlet, Xiaohu Tang. Differentially 4-uniform bijections by permuting the inverse function
143 -- 152Sungwook Kim, Jung Hee Cheon. Fixed argument pairing inversion on elliptic curves
153 -- 177Yonglin Cao, Jian Gao, Fang-Wei Fu. l
179 -- 191Haibo Hong, Licheng Wang, Yixian Yang. n(q)
193 -- 202Jianfa Qian, Lina Zhang. Entanglement-assisted quantum codes from arbitrary binary linear codes
203 -- 215Stefaan De Winter, Sara Rottey, Geertrui Van de Voorde. Linear representations of subgeometries
217 -- 229Jingjun Bao, Lijun Ji. The completion determination of optimal (3, 4)-packings
231 -- 253Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra. Proving TLS-attack related open biases of RC4
255 -- 275Min Zeng, Yuan Luo, Guang Gong. Sequences with good correlation property based on depth and interleaving techniques
277 -- 286Fabio Enrique Brochero Martínez, Carmen Rosa Giraldo Vergara, Lilian Batista de Oliveira. q[x]