Search

Showing total 202 results

Search Constraints

Start Over You searched for: Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic cryptography Remove constraint Topic: cryptography Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory Database Complementary Index Remove constraint Database: Complementary Index
202 results

Search Results

1. Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021.

2. Leakage-Resilient Secret Sharing With Constant Share Size.

3. MDS, Near-MDS or 2-MDS Self-Dual Codes via Twisted Generalized Reed-Solomon Codes.

4. Enumeration of Extended Irreducible Binary Goppa Codes.

5. Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions.

6. Two or Three Weight Linear Codes From Non-Weakly Regular Bent Functions.

7. Recovering or Testing Extended-Affine Equivalence.

8. Ouroboros: An Efficient and Provably Secure KEM Family.

9. Binary Linear Codes With Few Weights From Two-to-One Functions.

10. Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations.

11. The Differential Spectrum of the Power Mapping x p n −3.

12. A Subfield-Based Construction of Optimal Linear Codes Over Finite Fields.

13. On the Duals of Generalized Bent Functions.

14. Infinite Families of 3-Designs and 2-Designs From Almost MDS Codes.

15. On Correlation Immune Boolean Functions With Minimum Hamming Weight Power of 2.

16. On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes.

17. Theory of Communication Efficient Quantum Secret Sharing.

18. A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions.

19. On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings.

20. The Wideband Slope of Interference Channels: The Small Bandwidth Case.

21. Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes<xref ref-type="fn" rid="fn1">1</xref><fn id="fn1"><label>1</label><p>The paper is registered to the ORCID of Olav Geil. For more details please visit ...

22. Factorizations of Binomial Polynomials and Enumerations of LCD and Self-Dual Constacyclic Codes.

23. Classification of the Codewords of Weights 16 and 18 of the Reed-Muller Code RM(n-3,n).

24. Revisiting the Concrete Security of Goldreich’s Pseudorandom Generator.

25. A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit Function.

26. Algorithms for the Minimal Rational Fraction Representation of Sequences Revisited.

27. Information-Theoretic Secret Sharing From Correlated Gaussian Random Variables and Public Communication.

28. Extended Irreducible Binary Sextic Goppa Codes.

29. Decoding of Interleaved Alternant Codes.

30. On the Derivative Imbalance and Ambiguity of Functions.

31. Improved Bounds on Lossless Source Coding and Guessing Moments via Rényi Measures.

32. The Expansion Complexity of Ultimately Periodic Sequences Over Finite Fields.

33. Investigations on c -(Almost) Perfect Nonlinear Functions.

34. Centralized Repair of Multiple Node Failures With Applications to Communication Efficient Secret Sharing.

35. Minimal Linear Codes From Characteristic Functions.

36. One-Shot Variable-Length Secret Key Agreement Approaching Mutual Information.

37. Provable Security Evaluation of Block Ciphers Against Demirci-Selçuk’s Meet-in-the-Middle Attack.

38. Full Characterization of Minimal Linear Codes as Cutting Blocking Sets.

39. Further Study of 2-to-1 Mappings Over F2n.

40. Construction of Sequences With High Nonlinear Complexity From Function Fields.

41. Absolute Maximum Nonlinear Functions on Finite Nonabelian Groups.

42. Systematic Methods of Constructing Bent Functions and 2-Rotation Symmetric Bent Functions.

43. Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography.

44. Generic Constructions of Five-Valued Spectra Boolean Functions.

45. High-Meets-Low: Construction of Strictly Almost Optimal Resilient Boolean Functions via Fragmentary Walsh Spectra.

46. Generalized Subspace Subcodes With Application in Cryptology.

47. Perfect Anonymity.

48. Verifiably Multiplicative Secret Sharing.

49. Minimal Binary Linear Codes.

50. Construction of n -Variable ( n\equiv 2 \bmod 4 ) Balanced Boolean Functions With Maximum Absolute Value in Autocorrelation Spectra < 2^\frac n2.