The following pages link to Cryptography and Communications (Q267784):
Displayed 50 items.
- Permutation sequences and coded PAM signals with spectral nulls at rational submultiples of the symbol frequency (Q662171) (← links)
- A matrix approach for FCSR automata (Q662175) (← links)
- Cryptographic properties and application of a generalized unbalanced Feistel network structure (Q662179) (← links)
- Boolean functions derived from Fermat quotients (Q662181) (← links)
- Permutation polynomials EA-equivalent to the inverse function over \(\mathrm{GF}(2^n)\) (Q662182) (← links)
- A note on Yao's theorem about pseudo-random generators (Q662183) (← links)
- De Bruijn sequences and complexity of symmetric functions (Q662186) (← links)
- Functions of degree \(4e\) that are not APN infinitely often (Q662188) (← links)
- Quadratic forms of codimension 2 over certain finite fields of even characteristic (Q662189) (← links)
- Towards a spectral approach for the design of self-synchronizing stream ciphers (Q662190) (← links)
- On the dimension of an APN code (Q662192) (← links)
- Crosscorrelation of \(m\)-sequences, exponential sums, bent functions and Jacobsthal sums (Q662194) (← links)
- A character theoretic approach to planar functions (Q662195) (← links)
- Non abelian bent functions (Q662196) (← links)
- A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation (Q662198) (← links)
- Multidimensional linear distinguishing attacks and Boolean functions (Q662200) (← links)
- A new construction of highly nonlinear S-boxes (Q662201) (← links)
- Editorial: Special issue on recent trends in cryptography (Q680911) (← links)
- Missing a trick: Karatsuba variations (Q680912) (← links)
- Backtracking-assisted multiplication (Q680916) (← links)
- Cryptanalysis of a homomorphic encryption scheme (Q680918) (← links)
- Security of BLS and BGLS signatures in a multi-user setting (Q680920) (← links)
- Generic attacks with standard deviation analysis on a-Feistel schemes (Q680923) (← links)
- Efficient robust secret sharing from expander graphs (Q680925) (← links)
- On the optimality and practicability of mutual information analysis in some scenarios (Q680928) (← links)
- KISS: a bit too simple (Q680930) (← links)
- Searchable symmetric encryption over multiple servers (Q680933) (← links)
- On generating invertible circulant binary matrices with a prescribed number of ones (Q680936) (← links)
- \textsc{POEx}: a beyond-birthday-bound-secure on-line cipher (Q680941) (← links)
- Statistical integral attack on CAST-256 and IDEA (Q680942) (← links)
- Malleability of the blockchain's entropy (Q680944) (← links)
- Threshold implementations of small S-boxes (Q892276) (← links)
- Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers (Q892277) (← links)
- The distributions of individual bits in the output of multiplicative operations (Q892279) (← links)
- Horizontal collision correlation attack on elliptic curves (Q892284) (← links)
- Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks (Q892289) (← links)
- Masking and leakage-resilient primitives: one, the other(s) or both? (Q892292) (← links)
- A survey of fault attacks in pairing based cryptography (Q892296) (← links)
- Repeated-root constacyclic codes of length \(\ell^{t}p^{s}\) and their dual codes (Q892297) (← links)
- A construction of \(t\)-fold perfect splitting authentication codes with equal deception probabilities (Q892298) (← links)
- The Walsh transform of a class of monomial functions and cyclic codes (Q892299) (← links)
- Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications (Q892302) (← links)
- Attacks on a double length blockcipher-based hash proposal (Q892386) (← links)
- Characterization of robust immune symmetric Boolean functions (Q892387) (← links)
- Further non-randomness in RC4, RC4A and VMPC (Q892388) (← links)
- The parallel-cut meet-in-the-middle attack (Q892391) (← links)
- Injectivity of compressing maps on the set of primitive sequences modulo square-free odd integers (Q892496) (← links)
- An algebra of arrays and almost perfect watermarks (Q892498) (← links)
- A divisibility approach to the open boundary cases of Cusick-Li-Stǎnicǎ's conjecture (Q892500) (← links)
- New families of asymptotically optimal doubly periodic arrays with ideal correlation constraints (Q892502) (← links)