Publication | Date of Publication | Type |
---|
A Construction of Maximum Distance Profile Convolutional Codes With Small Alphabet Sizes | 2024-03-19 | Paper |
New Families of MDS Symbol-Pair Codes From Matrix-Product Codes | 2024-03-19 | Paper |
Hulls of Reed-Solomon Codes via Algebraic Geometry Codes | 2024-03-18 | Paper |
Three New Constructions of Optimal Locally Repairable Codes From Matrix-Product Codes | 2024-03-14 | Paper |
Efficient generation of elliptic curve cryptosystems | 2024-01-29 | Paper |
Constructing quantum error-correcting codes that require a variable amount of entanglement | 2024-01-25 | Paper |
A Construction of Asymptotically Optimal Cascaded CDC Schemes via Combinatorial Designs | 2023-09-08 | Paper |
Type-II polyadic constacyclic codes over finite fields | 2023-07-14 | Paper |
Sharper Asymptotically Optimal CDC Schemes via Combinatorial Designs | 2023-07-09 | Paper |
Two new classes of Hermitian self-orthogonal non-GRS MDS codes and their applications | 2023-07-07 | Paper |
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors | 2023-07-05 | Paper |
Generalized negacyclic codes over finite fields | 2023-04-20 | Paper |
On the construction of self-dual cyclic codes over \(\mathbb{Z}_4\) with arbitrary even length | 2022-10-06 | Paper |
Asymmetric quantum Griesmer codes detecting a single bit-flip error | 2022-09-26 | Paper |
A new framework for deniable secure key exchange | 2022-06-08 | Paper |
Application of optimal \(p\)-ary linear codes to alphabet-optimal locally repairable codes | 2022-04-28 | Paper |
Zero-knowledge proofs for committed symmetric Boolean functions | 2022-03-22 | Paper |
A Comparison of Distance Bounds for Quasi-Twisted Codes | 2022-02-17 | Paper |
Quasi-Cyclic Codes | 2021-11-26 | Paper |
Patch-Based Holographic Image Sensing | 2021-11-19 | Paper |
Adaptive oblivious transfer with access control from lattice assumptions | 2021-10-21 | Paper |
New bounds on the minimum distance of cyclic codes | 2021-05-12 | Paper |
An explicit expression for Euclidean self-dual cyclic codes of length \(2^k\) over Galois ring \(\mathrm{GR}(4,m)\) | 2021-04-08 | Paper |
Public key encryption with equality test in the standard model | 2021-03-31 | Paper |
Public key encryption with equality test from generic assumptions in the random oracle model | 2020-12-10 | Paper |
Lightweight Key Encapsulation Using LDPC Codes on FPGAs | 2020-10-02 | Paper |
On the Bounded Distance Decoding Problem for Lattices Constructed and Their Cryptographic Applications | 2020-09-29 | Paper |
Provably Secure Group Signature Schemes From Code-Based Assumptions | 2020-09-29 | Paper |
Threshold Changeable Ramp Secret Sharing | 2020-07-20 | Paper |
Perfect state transfer on Cayley graphs over dihedral groups: the non-normal case | 2020-06-04 | Paper |
Holographic sensing | 2020-04-27 | Paper |
Robust Positioning Patterns with Low Redundancy | 2020-03-25 | Paper |
Forward-secure group signatures from lattices | 2020-02-25 | Paper |
Semi-generic construction of public key encryption and identity-based encryption with equality test | 2020-02-06 | Paper |
Accountable tracing signatures from lattices | 2020-01-28 | Paper |
Burst-Deletion-Correcting Codes for Permutations and Multipermutations | 2020-01-28 | Paper |
Multidimensional quasi-twisted codes: equivalent characterizations and their relation to multidimensional convolutional codes | 2019-11-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q5241187 | 2019-10-30 | Paper |
Binary Robust Positioning Patterns with Low Redundancy and Efficient Locating Algorithms | 2019-10-15 | Paper |
Construction and enumeration for self-dual cyclic codes over \(\mathbb Z_4\) of oddly even length | 2019-09-12 | Paper |
Lattice-based group signatures: achieving full dynamicity (and deniability) with ease | 2019-08-13 | Paper |
Capacity-Achieving Codes That Mitigate Intercell Interference and Charge Leakage in Flash Memories | 2019-07-19 | Paper |
On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials | 2019-05-17 | Paper |
New MILP modeling: improved conditional cube attacks on KECCAK-based constructions | 2019-01-23 | Paper |
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption | 2019-01-18 | Paper |
Revocable predicate encryption from lattices | 2018-11-07 | Paper |
Lattice-based zero-knowledge arguments for integer relations | 2018-09-26 | Paper |
The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields | 2018-08-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4570855 | 2018-07-09 | Paper |
Constant-size group signatures from lattices | 2018-05-29 | Paper |
A lattice-based group signature scheme with verifier-local revocation | 2018-05-17 | Paper |
Adaptive oblivious transfer with access control from lattice assumptions | 2018-04-06 | Paper |
Zero-knowledge arguments for lattice-based PRFs and applications to E-cash | 2018-02-23 | Paper |
Construction of de Bruijn sequences from product of two irreducible polynomials | 2018-02-14 | Paper |
Hardness of \(k\)-LWE and applications in traitor tracing | 2018-01-05 | Paper |
Properties and Applications of Preimage Distributions of Perfect Nonlinear Functions | 2017-08-08 | Paper |
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions | 2017-08-08 | Paper |
Hulls of cyclic and negacyclic codes over finite fields | 2017-08-03 | Paper |
Linear Size Optimal $q$-ary Constant-Weight Codes and Constant-Composition Codes | 2017-07-27 | Paper |
On Self-Dual Cyclic Codes Over Finite Fields | 2017-07-27 | Paper |
Application of Classical Hermitian Self-Orthogonal MDS Codes to Quantum MDS Codes | 2017-07-27 | Paper |
Generalization of Steane's Enlargement Construction of Quantum Codes and Applications | 2017-07-27 | Paper |
Asymmetric Quantum Codes: Characterization and Constructions | 2017-07-27 | Paper |
Authentication of Digital Streams | 2017-07-12 | Paper |
Additive Asymmetric Quantum Codes | 2017-07-12 | Paper |
Abelian Codes in Principal Ideal Group Algebras | 2017-06-08 | Paper |
CSS-Like Constructions of Asymmetric Quantum Codes | 2017-06-08 | Paper |
Upper Bounds on Matching Families in <formula formulatype="inline"> <tex Notation="TeX">$\BBZ_{pq}^{n}$</tex></formula> | 2017-06-08 | Paper |
External Difference Families from Finite Fields | 2017-05-23 | Paper |
Hermitian Self-Dual Abelian Codes | 2017-05-16 | Paper |
Spectral Analysis of Quasi-Cyclic Product Codes | 2017-04-28 | Paper |
Polyadic Constacyclic Codes | 2017-04-28 | Paper |
Application of Constacyclic Codes to Quantum MDS Codes | 2017-04-28 | Paper |
Three new classes of optimal frequency-hopping sequence sets | 2017-03-23 | Paper |
Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption | 2017-01-06 | Paper |
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions | 2017-01-06 | Paper |
On the Implausibility of Constant-Round Public-Coin Zero-Knowledge Proofs | 2016-10-21 | Paper |
On self-dual cyclic codes of length \(p^a\) over \(\mathrm{GR}(p^2,s)\) | 2016-10-12 | Paper |
Enumeration formulas for self-dual cyclic codes | 2016-10-10 | Paper |
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors | 2016-07-15 | Paper |
Analysis of Gong et al.'s CCA2-secure homomorphic encryption | 2016-07-05 | Paper |
A Provably Secure Group Signature Scheme from Code-Based Assumptions | 2016-06-10 | Paper |
Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers | 2015-12-04 | Paper |
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based | 2015-08-27 | Paper |
Quasi-abelian codes | 2015-03-12 | Paper |
Construction of Quasi-Cyclic Product Codes | 2015-01-26 | Paper |
Low Probability Differentials and the Cryptanalysis of Full-Round CLEFIA-128 | 2015-01-16 | Paper |
On the Multidimensional Distribution of the Naor–Reingold Pseudo-Random Function | 2014-09-10 | Paper |
A relation between embedding degrees and class numbers of binary quadratic forms | 2014-09-10 | Paper |
Spatial encryption supporting non-monotone access structure | 2014-09-04 | Paper |
Shorter identity-based encryption via asymmetric pairings | 2014-09-04 | Paper |
Homogeneous weights of matrix product codes over finite principal ideal rings | 2014-09-02 | Paper |
Hardness of k-LWE and Applications in Traitor Tracing | 2014-08-07 | Paper |
The resistance of PRESENT-80 against related-key differential attacks | 2014-06-20 | Paper |
Matrix product codes over finite commutative Frobenius rings | 2014-04-29 | Paper |
The relation and transformation between hierarchical inner product encryption and spatial encryption | 2014-04-29 | Paper |
New results on two hypercube coloring problems | 2014-04-23 | Paper |
Lattice-Based Group Signature Scheme with Verifier-Local Revocation | 2014-03-25 | Paper |
Revocable IBE Systems with Almost Constant-Size Key Update | 2014-02-18 | Paper |
On the Fourier Spectra of New APN Functions | 2013-09-26 | Paper |
PURE ASYMMETRIC QUANTUM MDS CODES FROM CSS CONSTRUCTION: A COMPLETE CHARACTERIZATION | 2013-08-28 | Paper |
Algebraic Curves in Cryptography | 2013-07-15 | Paper |
Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications | 2013-04-19 | Paper |
Query-efficient locally decodable codes of subexponential length | 2013-04-11 | Paper |
Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU | 2013-04-04 | Paper |
Shorter IBE and Signatures via Asymmetric Pairings | 2013-04-04 | Paper |
A \(q\)-polynomial approach to cyclic codes | 2013-03-20 | Paper |
Differential Attacks against Stream Cipher ZUC | 2013-03-19 | Paper |
Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures | 2013-03-18 | Paper |
On the (In)Security of IDEA in Various Hashing Modes | 2013-01-08 | Paper |
Revocable Identity-Based Encryption from Lattices | 2012-09-07 | Paper |
NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model | 2012-07-20 | Paper |
Constructing irreducible polynomials over finite fields | 2012-06-29 | Paper |
Skew constacyclic codes over finite chain rings | 2012-05-11 | Paper |
On the modular inversion hidden number problem | 2012-05-04 | Paper |
Threshold changeable secret sharing schemes revisited | 2012-03-13 | Paper |
A note on cyclic codes over \(\mathrm{GR}(p^{2},m)\) of length \(p^{k}\) | 2012-03-01 | Paper |
Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences | 2012-02-17 | Paper |
A note on linearized polynomials and the dimension of their kernels | 2012-02-11 | Paper |
Side-channel resistant crypto for less than 2,300 GE | 2012-01-18 | Paper |
Structure of functional codes defined on non-degenerate Hermitian varieties | 2011-10-21 | Paper |
List decodability at small radii | 2011-09-27 | Paper |
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster) | 2011-07-07 | Paper |
Pushing the Limits: A Very Compact and a Threshold Implementation of AES | 2011-05-27 | Paper |
From skew-cyclic codes to asymmetric quantum codes | 2011-05-17 | Paper |
Association schemes arising from bent functions | 2011-04-08 | Paper |
Checkable Codes from Group Rings | 2010-12-26 | Paper |
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 | 2010-12-07 | Paper |
256 Bit Standardized Crypto for 650 GE – GOST Revisited | 2010-08-17 | Paper |
On the constructions of constant-composition codes from perfect nonlinear functions | 2010-02-26 | Paper |
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes | 2010-01-07 | Paper |
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 | 2009-12-09 | Paper |
Cryptanalysis of the LAKE Hash Family | 2009-08-11 | Paper |
New informations on the structure of the functional codes defined by forms of degree $h$ on non-degenerate Hermitian varieties in $\mathbb{P}^{n(\mathbb{F}_q)$} | 2009-07-27 | Paper |
Intersection of two quadrics with no common hyperplane in $\mathbb{P}^{n}(\mathbb{F}_q)$}} | 2009-07-27 | Paper |
Constructions and bounds on linear error-block codes | 2009-03-31 | Paper |
Improved Lower Bounds for Constant GC-Content DNA Codes | 2009-02-24 | Paper |
Access Structures of Elliptic Secret Sharing Schemes | 2009-02-24 | Paper |
The Sizes of Optimal $q$-Ary Codes of Weight Three and Distance Four: A Complete Solution | 2009-02-24 | Paper |
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes | 2009-02-10 | Paper |
Quantum Codes From Concatenated Algebraic-Geometric Codes | 2008-12-21 | Paper |
Asymptotic bounds on quantum codes from algebraic geometry codes | 2008-12-21 | Paper |
New lower bounds and constructions for binary codes correcting asymmetric errors | 2008-12-21 | Paper |
An Improvement on the Bounds of Weil Exponential Sums Over Galois Rings With Some Applications | 2008-12-21 | Paper |
On the Algebraic Structure of Quasi-Cyclic Codes III: Generator Theory | 2008-12-21 | Paper |
Polyadic Codes Revisited | 2008-12-21 | Paper |
On the reliability-order-based decoding algorithms for binary linear block codes | 2008-12-21 | Paper |
The Probability of Undetected Error for Binary Constant-Weight Codes | 2008-12-21 | Paper |
Constructions for $q$-Ary Constant-Weight Codes | 2008-12-21 | Paper |
A Lower Bound on the Probability of Undetected Error for Binary Constant Weight Codes | 2008-12-21 | Paper |
Cycle Systems in the Complete Bipartite Graph Plus a One-Factor | 2008-12-05 | Paper |
Cryptanalysis of Rabbit | 2008-11-20 | Paper |
Cryptanalysis of LASH | 2008-09-18 | Paper |
Some constructions of \((t,m,s)\)-nets with improved parameters | 2008-08-27 | Paper |
Cyclic codes over \(\text{GR}(p^2,m)\) of length \(p^k\) | 2008-08-27 | Paper |
Improved p-ary Codes and Sequence Families from Galois Rings | 2008-03-14 | Paper |
Coding and Cryptography | 2007-05-02 | Paper |
Improved p-ary Codes and Sequence Families from Galois Rings of Characteristic p2 | 2006-06-01 | Paper |
On the algebraic structure of quasi-cyclic codes. IV: Repeated roots | 2006-05-29 | Paper |
Cyclic codes over \(\mathbb Z_4\) of even length | 2006-05-29 | Paper |
An explicit class of codes with good parameters and their duals | 2006-04-28 | Paper |
A class of Artin-Schreier towers with finite genus | 2006-01-17 | Paper |
Good self-dual quasi-cyclic codes exist | 2005-06-01 | Paper |
Z(p/sup k+1/)-linear codes | 2005-05-11 | Paper |
On the variance of average distance of subsets in the Hamming space | 2005-02-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q3154859 | 2005-01-14 | Paper |
https://portal.mardi4nfdi.de/entity/Q3154865 | 2005-01-14 | Paper |
A family of group character codes | 2004-08-06 | Paper |
\(\mathbb Z_{8}\)-Kerdock codes and pseudorandom binary sequences | 2004-08-06 | Paper |
On Viterbi-like algorithms and their application to Reed-Muller codes | 2004-08-06 | Paper |
Duadic codes over \(\mathbb{F}_2+u\mathbb{F}_2\) | 2004-02-18 | Paper |
Type II codes over \(\mathbb{F}_{2^m} + u\mathbb{F}_{2^m}\) | 2004-02-02 | Paper |
Symmetric polynomials and some good codes | 2003-09-30 | Paper |
On the algebraic structure of quasi-cyclic codes. II: Chain rings | 2003-09-07 | Paper |
Nonlinear \(p\)-ary sequences | 2003-09-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4792355 | 2003-07-22 | Paper |
Highly symmetric expanders | 2002-09-30 | Paper |
Duadic codes over Z/sub 2k/ | 2002-08-04 | Paper |
Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound | 2002-08-04 | Paper |
On the algebraic structure of quasi-cyclic codes .I. Finite fields | 2002-08-04 | Paper |
New binary linear codes from algebraic curves | 2002-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4330636 | 2002-05-14 | Paper |
Type II codes over \(\mathbb{F}_4+u\mathbb{F}_4\) | 2002-05-05 | Paper |
Maps between Jacobians of Shimura curves and congruence kernels | 2002-05-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q2741437 | 2001-10-15 | Paper |
Constructions of semi-regular relative difference sets | 2001-09-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q2708637 | 2001-07-17 | Paper |
A class of linear codes with good parameters | 2001-03-19 | Paper |
Secret-sharing with a class of ternary codes | 2000-10-26 | Paper |
Component group of the \(p\)-new subvariety of \(J_0 (Mp)\) | 2000-09-19 | Paper |
Elementary 2-group character codes | 2000-09-07 | Paper |
Split group codes | 2000-09-07 | Paper |
A class of linear codes with good parameters from algebraic curves | 2000-09-07 | Paper |
Attack on RSA-type cryptosystems based on singular cubic curves over \(\mathbb{Z}/n\mathbb{Z}\) | 2000-08-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4486236 | 2000-06-26 | Paper |
Combinatorial coverings from geometries over principal ideal rings | 2000-06-07 | Paper |
The rank of a latin square associated to an abelian group | 2000-03-23 | Paper |
On component groups of 𝐽₀(𝑁) and degeneracy maps | 1998-09-22 | Paper |
Almost perfect sequences with \(\theta =2\) | 1998-07-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364588 | 1997-12-15 | Paper |
On the \(\mathbb{Q}\)-rational cuspidal subgroup and the component group of \(J_0(p^r)\) | 1997-12-14 | Paper |
On the rational cuspidal subgroup and the rational torsion points of $J_0(pq)$ | 1997-12-11 | Paper |
Shimura subgroups and degeneracy maps | 1996-10-27 | Paper |
The old subvariety of \(J_ 0(pq)\) and the Eisenstein kernel in Jacobians | 1994-11-27 | Paper |
Shimura Subgroups of Jacobians of Shimura Curves | 1994-09-15 | Paper |
Congruences between cusp forms and the geometry of Jacobians of modular curves | 1994-06-16 | Paper |
The Fitting ideal of \(J_ 0(q)(\mathbb{F}_{p^ n})\) over the Hecke algebra | 1994-06-06 | Paper |
Projective Covering Designs | 1994-05-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4026195 | 1993-02-21 | Paper |