Abstract is missing.
- Some Results on the Known Classes of Quadratic APN FunctionsLilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun. 3-16 [doi]
- Families of Convolutional Codes over Finite Fields: A SurveyMaría Isabel García-Planas. 17-34 [doi]
- Codes for Side-Channel Attacks and ProtectionsSylvain Guilley, Annelie Heuser, Olivier Rioul. 35-55 [doi]
- An Overview of the State-of-the-Art of Cloud Computing Cyber-SecurityH. Bennasar, Ahmed Bendahmane, Mohammed Essaaidi. 56-67 [doi]
- Somewhat/Fully Homomorphic Encryption: Implementation Progresses and ChallengesGuillaume Bonnoron, Caroline Fontaine, Guy Gogniat, Vincent Herbert, Vianney Lapôtre, Vincent Migliore, Adeline Roux-Langlois. 68-82 [doi]
- Two-Source Randomness Extractors for Elliptic Curves for Authenticated Key ExchangeAbdoul Aziz Ciss, Djiby Sow. 85-95 [doi]
- Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field \mathbb F_qCheikh Thiécoumba Gueye, Jean Belo Klamti, Shoichi Hirose. 96-109 [doi]
- Parameters of 2-Designs from Some BCH CodesCunsheng Ding, Zhengchun Zhou. 110-127 [doi]
- A Median Nearest Neighbors LDA for Anomaly Network DetectionZyad Elkhadir, Khalid Chougdali, Mohammed Benattou. 128-141 [doi]
- Linearly Homomorphic Authenticated Encryption with Provable Correctness and Public VerifiabilityPatrick Struck, Lucas Schabhüser, Denise Demirel, Johannes A. Buchmann. 142-160 [doi]
- Constacyclic Codes over Finite Principal Ideal RingsAicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin. 161-175 [doi]
- On Isodual Cyclic Codes over Finite Chain RingsAicha Batoul, Kenza Guenda, T. Aaron Gulliver, Nuh Aydin. 176-194 [doi]
- Revisiting the Efficient Key Generation of ZHFEYasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi. 195-212 [doi]
- The Weight Distribution for an Extended Family of Reducible Cyclic CodesGerardo Vega, Jesús E. Cuén-Ramos. 213-229 [doi]
- A NP-Complete Problem in Coding Theory with Application to Code Based CryptographyThierry P. Berger, Cheikh Thiécoumba Gueye, Jean Belo Klamti. 230-237 [doi]
- Spectral Approach for Correlation Power AnalysisPhilippe Guillot, Gilles Millérioux, Brandon Dravie, Nadia El Mrabet. 238-253 [doi]
- Efficient Implementation of Hybrid Encryption from Coding TheoryPierre-Louis Cayrel, Cheikh Thiecoumba Gueye, El Hadji Modou Mboup, Ousmane Ndiaye, Edoardo Persichetti. 254-264 [doi]
- On the Multi-output Filtering Model and Its ApplicationsTeng Wu, Yin Tan, Kalikinkar Mandal, Guang Gong. 265-281 [doi]
- New Bent Functions from Permutations and Linear TranslatorsSihem Mesnager, Pinar Ongan, Ferruh Özbudak. 282-297 [doi]
- Bent Functions in C and D Outside the Completed Maiorana-McFarland ClassFengrong Zhang, Enes Pasalic, Nastja Cepak, Yongzhuang Wei. 298-313 [doi]
- Quantum Algorithms Related to \textitHN -Transforms of Boolean FunctionsSugata Gangopadhyay, Subhamoy Maitra, Nishant Sinha, Pantelimon Stanica. 314-327 [doi]
- Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) FunctionsClaude Carlet, Sihem Mesnager, Ferruh Özbudak, Ahmet Sinak. 328-345 [doi]
- A New Dynamic Code-Based Group Signature SchemeBerenger Edoukou Ayebie, Hafsa Assidi, El Mamoun Souidi. 346-364 [doi]
- A Secure Cloud-Based IDPS Using Cryptographic Traces and Revocation ProtocolHind Idrissi, Mohammed Ennahbaoui, Said El Hajji, El Mamoun Souidi. 365-382 [doi]