Search

Showing total 28 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic cryptography Remove constraint Topic: cryptography Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory Database Academic Search Index Remove constraint Database: Academic Search Index
28 results

Search Results

1. Two or Three Weight Linear Codes From Non-Weakly Regular Bent Functions.

2. Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations.

3. Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions.

4. Leakage-Resilient Secret Sharing With Constant Share Size.

5. MDS, Near-MDS or 2-MDS Self-Dual Codes via Twisted Generalized Reed-Solomon Codes.

6. On Correlation Immune Boolean Functions With Minimum Hamming Weight Power of 2.

7. On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes.

8. Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021.

9. Ouroboros: An Efficient and Provably Secure KEM Family.

10. Recovering or Testing Extended-Affine Equivalence.

11. Enumeration of Extended Irreducible Binary Goppa Codes.

12. The Differential Spectrum of the Power Mapping x p n −3.

13. A Subfield-Based Construction of Optimal Linear Codes Over Finite Fields.

14. On the Duals of Generalized Bent Functions.

15. Infinite Families of 3-Designs and 2-Designs From Almost MDS Codes.

16. Theory of Communication Efficient Quantum Secret Sharing.

17. A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions.

18. On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings.

19. Classification of the Codewords of Weights 16 and 18 of the Reed-Muller Code RM(n-3,n).

20. Revisiting the Concrete Security of Goldreich’s Pseudorandom Generator.

21. A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit Function.

22. Algorithms for the Minimal Rational Fraction Representation of Sequences Revisited.

23. Information-Theoretic Secret Sharing From Correlated Gaussian Random Variables and Public Communication.

24. Extended Irreducible Binary Sextic Goppa Codes.

25. Decoding of Interleaved Alternant Codes.

26. The Expansion Complexity of Ultimately Periodic Sequences Over Finite Fields.

27. Investigations on c -(Almost) Perfect Nonlinear Functions.

28. One-Shot Variable-Length Secret Key Agreement Approaching Mutual Information.