Search

Showing total 657 results

Search Constraints

Start Over You searched for: Topic cryptography Remove constraint Topic: cryptography Language english Remove constraint Language: english Journal ieee transactions on information theory Remove constraint Journal: ieee transactions on information theory
657 results

Search Results

1. Secret Writing on Dirty Paper: A Deterministic View.

2. Relative Generalized Hamming Weights of One-Point Algebraic Geometric Codes<xref ref-type="fn" rid="fn1">1</xref><fn id="fn1"><label>1</label><p>The paper is registered to the ORCID of Olav Geil. For more details please visit ...

3. Improved Bounds on Lossless Source Coding and Guessing Moments via Rényi Measures.

4. Factorizations of Binomial Polynomials and Enumerations of LCD and Self-Dual Constacyclic Codes.

5. Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions.

6. Linear Codes From Some 2-Designs.

7. The Wideband Slope of Interference Channels: The Small Bandwidth Case.

8. Construction of Sequences With High Nonlinear Complexity From Function Fields.

9. Binary Linear Codes With Few Weights From Two-to-One Functions.

10. Revisiting Cryptanalysis on ChaCha From Crypto 2020 and Eurocrypt 2021.

11. Enumeration of Extended Irreducible Binary Goppa Codes.

12. Centralized Repair of Multiple Node Failures With Applications to Communication Efficient Secret Sharing.

13. Near-Optimal Codes for Information Embedding in Gray-Scale Signals.

14. Two or Three Weight Linear Codes From Non-Weakly Regular Bent Functions.

15. Linear Codes With Two or Three Weights From Weakly Regular Bent Functions.

16. On the Derivative Imbalance and Ambiguity of Functions.

17. Error-Correcting Regenerating and Locally Repairable Codes via Rank-Metric Codes.

18. A Class of Two-Weight and Three-Weight Codes and Their Applications in Secret Sharing.

19. Construction of n -Variable ( n\equiv 2 \bmod 4 ) Balanced Boolean Functions With Maximum Absolute Value in Autocorrelation Spectra < 2^\frac n2.

20. On the Maximum Number of Bent Components of Vectorial Functions.

21. Narrow-Sense BCH Codes Over \mathrm GF(q) With Length n=\frac q^m-1q-1.

22. Investigations on Periodic Sequences With Maximum Nonlinear Complexity.

23. Structural and Statistical Analysis of Multidimensional Linear Approximations of Random Functions and Permutations.

24. On Correlation Immune Boolean Functions With Minimum Hamming Weight Power of 2.

25. On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes.

26. Arbitrarily Varying Wiretap Channels With Type Constrained States.

27. Security in Locally Repairable Storage.

28. Leakage-Resilient Secret Sharing With Constant Share Size.

29. MDS, Near-MDS or 2-MDS Self-Dual Codes via Twisted Generalized Reed-Solomon Codes.

30. Generalized Subspace Subcodes With Application in Cryptology.

31. Perfect Anonymity.

32. Verifiably Multiplicative Secret Sharing.

33. Minimal Binary Linear Codes.

34. Recovering or Testing Extended-Affine Equivalence.

35. Ouroboros: An Efficient and Provably Secure KEM Family.

36. The Henchman Problem: Measuring Secrecy by the Minimum Distortion in a List.

38. Minimal Linear Codes From Characteristic Functions.

39. On the Expansion Complexity of Sequences Over Finite Fields.

40. Staircase Codes for Secret Sharing With Optimal Communication and Read Overheads.

41. Construction of Highly Nonlinear 1-Resilient Boolean Functions With Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity.

42. The Differential Spectrum of the Power Mapping x p n −3.

43. A Subfield-Based Construction of Optimal Linear Codes Over Finite Fields.

44. On the Duals of Generalized Bent Functions.

45. Infinite Families of 3-Designs and 2-Designs From Almost MDS Codes.

46. $k$ -Connectivity in Random Key Graphs With Unreliable Links.

47. Secure Network Coding With Erasures and Feedback.

48. Absolute Maximum Nonlinear Functions on Finite Nonabelian Groups.

49. Systematic Methods of Constructing Bent Functions and 2-Rotation Symmetric Bent Functions.

50. Low Rank Parity Check Codes: New Decoding Algorithms and Applications to Cryptography.