Entity usage
From MaRDI portal
This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.
Showing below up to 50 results in range #101 to #150.
- Error analysis of weak poly-LWE instances: Label: en
- Secret sharing on large girth graphs: Label: en
- Constructions of S-boxes with uniform sharing: Label: en
- Decomposition of permutations in a finite field: Label: en
- Affine linear cryptanalysis: Label: en
- Editorial: Special issue on mathematical methods for cryptography: Label: en
- Paraunitary generation/correlation of QAM complementary sequence pairs: Label: en
- Perfect arrays of unbounded sizes over the basic quaternions: Label: en
- New near perfect sequences of even lengths: Label: en
- A simple suboptimal construction of cross-bifix-free codes: Label: en
- A complementary construction using mutually unbiased bases: Label: en
- Special issue editorial: Sequences and their applications: Label: en
- On the irreducibility of the hyperplane sections of Fermat varieties in \(\mathbb {P}^{3}\) in characteristic 2. II: Label: en
- A new family of arrays with low autocorrelation: Label: en
- Sequences of bent functions and near-bent functions: Label: en
- Generalized methods to construct low-hit-zone frequency-hopping sequence sets and optimal constructions: Label: en
- Several classes of permutation trinomials from Niho exponents: Label: en
- Design sequences with high linear complexity over finite fields using generalized cyclotomy: Label: en
- Character values of the Sidelnikov-Lempel-Cohn-Eastman sequences: Label: en
- Unit time-phase signal sets: bounds and constructions: Label: en
- Block weighing matrices: Label: en
- Secondary constructions of Boolean functions with maximum algebraic immunity: Label: en
- Computing the linear complexity for sequences with characteristic polynomial \(f^v\): Label: en
- CAR30: a new scalable stream cipher with rule 30: Label: en
- Minimum sizes of identifying codes in graphs differing by one vertex: Label: en
- Equivalence classes for cubic rotation symmetric functions: Label: en
- Cheating-immune secret sharing schemes from codes and cumulative arrays: Label: en
- Quaternary cryptographic bent functions and their binary projection: Label: en
- Designing integrated accelerator for stream ciphers with structural similarities: Label: en
- Finding Hamming weights without looking at truth tables: Label: en
- Comments on ``A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation: Label: en
- Asymptotic enumeration of correlation-immune Boolean functions: Label: en
- \(X^{2^l+1}+x+a\) and related affine polynomials over \(\mathrm{GF}(2^k\)): Label: en
- Third-order nonlinearities of a subclass of Kasami functions: Label: en
- Pseudorandom numbers and hash functions from iterations of multivariate polynomials: Label: en
- New bounds for (\(r, \leq 2\))-identifying codes in the infinite king grid: Label: en
- The second weight of generalized Reed-Muller codes in most cases: Label: en
- On the structural weakness of the GGHN stream cipher: Label: en
- Cryptanalysis of WG-7: a lightweight stream cipher: Label: en
- Synthetic linear analysis with applications to CubeHash and Rabbit: Label: en
- State cycles, initialization and the Trivium stream cipher: Label: en
- On the nonlinearity of maximum-length NFSR feedbacks: Label: en
- Applying cube attacks to stream ciphers in realistic scenarios: Label: en
- High order differential attacks on stream ciphers: Label: en
- A survey on fast correlation attacks: Label: en
- Correlation attacks on combination generators: Label: en
- Regular \(p\)-ary bent functions with five terms and Kloosterman sums: Label: en
- Absorbing sets of codes from finite geometries: Label: en
- A concatenated construction of linear complementary pair of codes: Label: en
- An iterative method for linear decomposition of index generating functions: Label: en