Search

Showing total 39 results
39 results

Search Results

1. Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions.

2. Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021.

3. Enumeration of Extended Irreducible Binary Goppa Codes.

4. Two or Three Weight Linear Codes From Non-Weakly Regular Bent Functions.

5. Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations.

6. On Correlation Immune Boolean Functions With Minimum Hamming Weight Power of 2.

7. On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes.

8. Leakage-Resilient Secret Sharing With Constant Share Size.

9. MDS, Near-MDS or 2-MDS Self-Dual Codes via Twisted Generalized Reed-Solomon Codes.

10. Recovering or Testing Extended-Affine Equivalence.

11. Ouroboros: An Efficient and Provably Secure KEM Family.

12. The Differential Spectrum of the Power Mapping x p n −3.

13. A Subfield-Based Construction of Optimal Linear Codes Over Finite Fields.

14. On the Duals of Generalized Bent Functions.

15. Infinite Families of 3-Designs and 2-Designs From Almost MDS Codes.

16. Theory of Communication Efficient Quantum Secret Sharing.

17. A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions.

18. On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings.

19. Classification of the Codewords of Weights 16 and 18 of the Reed-Muller Code RM(n-3,n).

20. Revisiting the Concrete Security of Goldreich’s Pseudorandom Generator.

21. A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit Function.

22. Algorithms for the Minimal Rational Fraction Representation of Sequences Revisited.

23. Information-Theoretic Secret Sharing From Correlated Gaussian Random Variables and Public Communication.

24. Extended Irreducible Binary Sextic Goppa Codes.

25. Decoding of Interleaved Alternant Codes.

26. The Expansion Complexity of Ultimately Periodic Sequences Over Finite Fields.

27. Investigations on c -(Almost) Perfect Nonlinear Functions.

28. One-Shot Variable-Length Secret Key Agreement Approaching Mutual Information.

29. The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.

30. Quantifying the Cost of Privately Storing Data in Distributed Storage Systems.

31. Secure Distributed Matrix Computation With Discrete Fourier Transform.

32. k -Uniform States in Heterogeneous Systems.

33. An Algorithmic Reduction Theory for Binary Codes: LLL and More.

34. Efficient Explicit Constructions of Multipartite Secret Sharing Schemes.

35. The Adjacency Graphs of FSRs With Affine Characteristic Functions.

36. The Resolution of Niho’s Last Conjecture Concerning Sequences, Codes, and Boolean Functions.

37. On Communication for Distributed Babai Point Computation.

38. On the Properties of the Boolean Functions Associated to the Differential Spectrum of General APN Functions and Their Consequences.

39. The Birthday Problem and Zero-Error List Codes.