default search action
Designs, Codes and Cryptography, Volume 77
Volume 77, Number 1, October 2015
- Yan Liu, Haode Yan, Chunlei Liu:
A class of six-weight cyclic codes and their weight distribution. 1-9 - Jiqiang Lu:
A methodology for differential-linear cryptanalysis and its applications. 11-48 - Anamari Nakic, Mario-Osvin Pavcevic:
Tactical decompositions of designs over finite fields. 49-60 - Ryo Nishimaki, Keita Xagawa:
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES. 61-98 - Sihem Mesnager:
Bent vectorial functions and linear codes from o-polynomials. 99-116 - Deng Tang, Claude Carlet, Xiaohu Tang:
Differentially 4-uniform bijections by permuting the inverse function. 117-141 - Sungwook Kim, Jung Hee Cheon:
Fixed argument pairing inversion on elliptic curves. 143-152 - Yonglin Cao, Jian Gao, Fang-Wei Fu:
Semisimple multivariable 𝔽q-linear codes over 𝔽ql. 153-177 - Haibo Hong, Licheng Wang, Yixian Yang:
Minimal logarithmic signatures for the unitary group Un(q). 179-191 - Jianfa Qian, Lina Zhang:
Entanglement-assisted quantum codes from arbitrary binary linear codes. 193-202 - Stefaan De Winter, Sara Rottey, Geertrui Van de Voorde:
Linear representations of subgeometries. 203-215 - Jingjun Bao, Lijun Ji:
The completion determination of optimal (3, 4)-packings. 217-229 - Santanu Sarkar, Sourav Sen Gupta, Goutam Paul, Subhamoy Maitra:
Proving TLS-attack related open biases of RC4. 231-253 - Min Zeng, Yuan Luo, Guang Gong:
Sequences with good correlation property based on depth and interleaving techniques. 255-275 - Fabio Enrique Brochero Martínez, Carmen Rosa Giraldo Vergara, Lilian Batista de Oliveira:
Explicit factorization of xn-1 ∈ 𝔽q[x]. 277-286
Volume 77, Numbers 2-3, December 2015
- Ian F. Blake, Alfred Menezes, Douglas R. Stinson:
Guest Editorial: Special Issue in Honor of Scott A. Vanstone. 287-299 - Chuan Guo, Douglas R. Stinson, Tran van Trung:
On tight bounds for binary frameproof codes. 301-319 - Charles C. Lindner, Mariusz Meszka, Alexander Rosa:
Almost 2-perfect 6-cycle systems. 321-333 - Dirk Hachenberger:
Primitive normal bases for quartic and cubic extensions: a geometric approach. 335-350 - Ryoh Fuji-Hara:
Perfect hash families of strength three with three rows from varieties on finite projective geometries. 351-356 - Kevin T. Phelps:
Enumeration of Kerdock codes of length 64. 357-363 - Dieter Jungnickel, Vladimir D. Tonchev:
Maximal arcs and quasi-symmetric designs. 365-374 - Thijs Laarhoven, Michele Mosca, Joop van de Pol:
Finding shortest lattice vectors faster using quantum search. 375-400 - Sonia Chiasson, Paul C. van Oorschot:
Quantifying the security advantage of password expiration policies. 401-408 - Dan Archdeacon, Jeffrey H. Dinitz, Diane M. Donovan, Emine Sule Yazici:
Square integer Heffter arrays with empty cells. 409-426 - Alice Silverberg, Yuri G. Zarhin:
Isogenies of abelian varieties over finite fields. 427-439 - Benoît Libert, Thomas Peters, Marc Joye, Moti Yung:
Linearly homomorphic structure-preserving signatures and their applications. 441-477 - Yeow Meng Chee, Charles J. Colbourn, Alan Chi Hung Ling, Hui Zhang, Xiande Zhang:
Optimal low-power coding for error correction and crosstalk avoidance in on-chip data buses. 479-491 - Michael Düll, Björn Haase, Gesine Hinterwälder, Michael Hutter, Christof Paar, Ana Helena Sánchez, Peter Schwabe:
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers. 493-514 - Eric L. Roettger, Hugh C. Williams, Richard K. Guy:
Some primality tests that eluded Lucas. 515-539 - Jeffrey Hoffstein, Joseph H. Silverman:
PASS-Encrypt: a public key cryptosystem based on partial evaluation of polynomials. 541-552 - Esther R. Lamken:
The asymptotic existence of DR(v, k, k-1)-BIBDs. 553-562 - Liang Feng Zhang, Reihaneh Safavi-Naini:
Batch verifiable computation of outsourced functions. 563-585 - Neal Koblitz, Alfred J. Menezes:
The random oracle model: a twenty-year retrospective. 587-610 - Elena Andreeva, Bart Mennink, Bart Preneel:
Open problems in hash function security. 611-631 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Reflections on slide with a twist attacks. 633-651 - Gary McGuire, Emrah Sercan Yilmaz:
Further results on the number of rational points of hyperelliptic supersingular curves in characteristic 2. 653-662 - Ueli Maurer:
Zero-knowledge proofs of knowledge for group homomorphisms. 663-676 - Gerhard Frey, Ernst Kani:
Normal forms of hyperelliptic curves of genus 3. 677-712 - Peter Landrock:
Power map permutations and the discrete log problem. 713-724 - Tatsuaki Okamoto, Katsuyuki Takashima:
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption. 725-771
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.