Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | Jean-Sébastien Coron |
A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 50(1), pp. 115-133, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
18 | Wilfried Meidl |
Remarks on a cyclotomic sequence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 51(1), pp. 33-43, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) 94A55, 94A60, 11B50 |
18 | Dimitrios Poulakis |
A variant of Digital Signature Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 51(1), pp. 99-104, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
18 | Weidong Guo, Gennian Ge |
The existence of generalized mix functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 50(1), pp. 107-113, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
AMS Classifications Primary 05B15, 94A60 |
18 | Gilles Piret, François-Xavier Standaert |
Provable security of block ciphers against linear cryptanalysis: a mission impossible? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 50(3), pp. 325-338, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
18 | Keqin Feng, Qunying Liao, Jing Yang |
Maximal values of generalized algebraic immunity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 50(2), pp. 243-252, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60, 11T71 |
18 | Kenneth G. Paterson, Sriramkrishnan Srinivasan |
On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 52(2), pp. 219-241, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
18 | Jooyoung Lee, Yongjin Yeom |
Efficient RFID authentication protocols based on pseudorandom sequence generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 51(2), pp. 195-210, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
18 | Michael J. Collins 0003 |
Upper bounds for parent-identifying set systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 51(2), pp. 167-173, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
18 | Young Ho Park 0001 |
Modular independence and generator matrices for codes over \mathbb Zm{\mathbb {Z}_m}. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 50(2), pp. 147-162, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94B05, 94A60 |
18 | Thomas Martin 0002, Keith M. Martin, Peter R. Wild |
Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 51(3), pp. 315-334, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
18 | Feng Liu 0001, Chuan Kun Wu, Xi Jun Lin |
The alignment problem of visual cryptography schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 50(2), pp. 215-227, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
18 | Tian Tian 0004, Wen-Feng Qi 0001 |
A note on the crosscorrelation of maximal length FCSR sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 51(1), pp. 1-8, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 11A07, 94A55, 94A60, 11B50 |
18 | Clemens Heuberger, James A. Muir |
Unbalanced digit sets and the closest choice strategy for minimal weight integer representations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 52(2), pp. 185-208, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classifications (2000) 11A63, 94A60, 68W40 |
18 | Sugata Gangopadhyay, Deepmala Sharma, Sumanta Sarkar, Subhamoy Maitra |
On affine (non)equivalence of Boolean functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 85(1-2), pp. 37-55, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60, 06E30, 94C10 |
18 | Lee C. Klingler, Spyros S. Magliveras, Fred Richman, Michal Sramka |
Discrete logarithms for finite groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 85(1-2), pp. 3-19, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60, 20G40 |
18 | Joan Daemen, Mario Lamberger, Norbert Pramstaller, Vincent Rijmen, Frederik Vercauteren |
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 85(1-2), pp. 85-104, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60, 11T71 |
18 | Marek Klonowski, Lukasz Krzywiecki, Miroslaw Kutylowski, Anna Lauks |
Step-out group signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 85(1-2), pp. 137-151, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
18 | Miodrag J. Mihaljevic, Hideki Imai |
An approach for stream ciphers design based on joint computing over random and secret data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 85(1-2), pp. 153-168, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60, 94B60 |
18 | László Csirmaz, Péter Ligeti |
On an infinite family of graphs with information ratio 2 - 1/k. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 85(1-2), pp. 127-136, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60, 94A17 |
18 | Johannes Buchmann 0001, Richard Lindner, Markus Rückert, Michael Schneider 0002 |
Post-quantum cryptography: lattice signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 85(1-2), pp. 105-125, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
18 | Andrej Dujella |
A variant of Wiener's attack on RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computing ![In: Computing 85(1-2), pp. 77-83, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) Primary: 94A60, Secondary: 11A55, 11J70 |
18 | Benny Applebaum, Yuval Ishai, Eyal Kushilevitz |
On Pseudorandom Generators with Linear Stretch in NC0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Complex. ![In: Comput. Complex. 17(1), pp. 38-69, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Subject classification. 94A60, 68P25 |
18 | Haifeng Qian, Yuan Zhou 0008, Zhibin Li 0005, Zecheng Wang, Bing Zhang 0008 |
Efficient public key encryption with smallest ciphertext expansion from factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 49(1-3), pp. 233-249, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
18 | Reza Rezaeian Farashahi, Ruud Pellikaan, Andrey Sidorenko |
Extractors for binary elliptic curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 49(1-3), pp. 171-186, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classifications 14H52, 94A60, 14G50 |
18 | Mariusz Czapski, Maciej Nikodem |
Error detection and error correction procedures for the advanced encryption standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 49(1-3), pp. 217-232, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
18 | Harald Niederreiter, Ayineedi Venkateswarlu |
Periodic multisequences with large error linear complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 49(1-3), pp. 33-45, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
94A60, AMS Classifications 94A55, 11B50 |
18 | Nicholas Kolokotronis |
Cryptographic properties of nonlinear pseudorandom number generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 46(3), pp. 353-363, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classifications 65C10, 68Q19, 94A60 |
18 | Wilfried Meidl |
Reducing the calculation of the linear complexity of u 2 v -periodic binary sequences to Games-Chan algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 46(1), pp. 57-65, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
94A60, AMS Classifications 94A55, 11B50 |
18 | Kathy J. Horadam, David G. Farmer |
Bundles, presemifields and nonlinear functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 49(1-3), pp. 79-94, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
12K10, 20J06, 11T71, AMS Classifications 94A60 |
18 | Goutam Paul 0001, Siddheshwar Rathi, Subhamoy Maitra |
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 49(1-3), pp. 123-134, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
18 | Berkant Ustaoglu |
Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 46(3), pp. 329-342, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
18 | Andreas Klein 0001 |
Attacks on the RC4 stream cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 48(3), pp. 269-286, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AMS Classifications 68P25, 94A60 |
18 | Ferruh Özbudak, Zülfükar Saygi |
Systematic authentication codes using additive polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 49(1-3), pp. 61-77, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
94A62, AMS Classifications 94A60, 14G50 |
18 | Rafaël Fourquet, Cédric Tavernier |
An improved list decoding algorithm for the second order Reed-Muller codes and its applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 49(1-3), pp. 323-340, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
94B35, AMS Classifications 94B05, 94A60, 94B65 |
18 | Dan Gutfreund, Ronen Shaltiel, Amnon Ta-Shma |
If NP Languages are Hard on the Worst-Case, Then it is Easy to Find Their Hard Instances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Complex. ![In: Comput. Complex. 16(4), pp. 412-441, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
68Q17, 68Q15, 94A60, Subject classification. 68Q10 |
18 | Wen-Ai Jackson, S. Murphy |
Projective aspects of the AES inversion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 43(2-3), pp. 167-179, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
51E15, AMS Classifications 94A60 |
18 | Wilfried Meidl, Ayineedi Venkateswarlu |
Remarks on the k-error linear complexity of pn-periodic sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 42(2), pp. 181-193, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
94A60, AMS Classifications 94A55, 11B50 |
18 | Peter Roelse |
The design of composite permutations with applications to DES-like S-boxes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 42(1), pp. 21-42, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
11T71, AMS Classification 94A60 |
18 | Paulo S. L. M. Barreto, Steven D. Galbraith, Colm O'hEigeartaigh, Michael Scott |
Efficient pairing computation on supersingular Abelian varieties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 42(3), pp. 239-271, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
AMS Classification 14G50, 14Q05, 11T71, 94A60, 11G20 |
18 | Aggelos Kiayias, Moti Yung |
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 43(2-3), pp. 61-78, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
18 | Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng |
Certificateless signature: a new security model and an improved generic construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 42(2), pp. 109-126, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
18 | Douglas R. Stinson |
Generalized mix functions and orthogonal equitable rectangles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 45(3), pp. 347-357, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
94A60, AMS Classifications 05B15 |
18 | Ki Hyoung Ko, Jang-Won Lee, Tony Thomas |
Towards generating secure keys for braid cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 45(3), pp. 317-333, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
20F36, 20F10, AMS Classifications 94A60 |
18 | Chris J. Mitchell, Fred Piper, Peter R. Wild |
ID-based cryptography using symmetric primitives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 44(1-3), pp. 249-262, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
18 | Benny Applebaum, Yuval Ishai, Eyal Kushilevitz |
Computationally Private Randomizing Polynomials and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Complex. ![In: Comput. Complex. 15(2), pp. 115-162, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Subject classification. 94A60, 68P25, 68Q15 |
18 | Peter Ackermann, Martin Kreuzer |
Gröbner Basis Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 17(3-4), pp. 173-194, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (1991) Primary 94A60, Secondary 11T71, 16-08, 13P10 |
18 | Alfred Menezes, Edlyn Teske |
Cryptographic implications of Hess' generalized GHS attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 16(6), pp. 439-460, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (1991) 94A60 |
18 | Hassan Aly, Arne Winterhof |
On the Linear Complexity Profile of Nonlinear Congruential Pseudorandom Number Generators with Dickson Polynomials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 39(2), pp. 155-162, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 11K45, 94A55, 94A60 |
18 | Deepak Kumar Dalai, Subhamoy Maitra, Sumanta Sarkar |
Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 40(1), pp. 41-58, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60, 06E30 |
18 | Marten van Dijk, Dwaine E. Clarke, Blaise Gassend, G. Edward Suh, Srinivas Devadas |
Speeding up Exponentiation using an Untrusted Computational Resource. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 39(2), pp. 253-273, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
18 | Christopher Wolf, An Braeken, Bart Preneel |
On the security of stepwise triangular systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 40(3), pp. 285-302, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
11T55, 12F99, 51E26, 14Q99, 14N10, 68Q25, AMS Classification 94A60, 68W40 |
18 | Gilles Piret |
Luby-Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 39(2), pp. 233-245, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
18 | Hassan Aly, Arne Winterhof |
On the k-error linear complexity over \mathbbFp of Legendre and Sidelnikov sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 40(3), pp. 369-374, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
11T71, 94A60, AMS Classification 94A55 |
18 | Javier Herranz, Germán Sáez |
Distributed Ring Signatures from General Dual Access Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 40(1), pp. 103-120, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
68P25, AMS Classification 94A60 |
18 | Mausumi Bose, Rahul Mukerjee |
Optimal (2, n) visual cryptographic schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 40(3), pp. 255-267, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60, 05B05 |
18 | Douglas R. Stinson |
Some Observations on the Theory of Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 38(2), pp. 259-277, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60 |
18 | Ferruh Özbudak, Zülfükar Saygi |
Some constructions of systematic authentication codes using galois rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 41(3), pp. 343-357, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
AMS Classification 94A60, 14G50, 94B27 |
18 | Wilfried Meidl, Arne Winterhof |
Some Notes on the Linear Complexity of Sidel'nikov-Lempel-Cohn-Eastman Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 38(2), pp. 159-178, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
11T22, 11T71, 94A60, AMS Classification 94A55 |
18 | Jens-Matthias Bohli, Rainer Steinwandt, María Isabel González Vasco, Consuelo Martínez |
Weak Keys in MST1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 37(3), pp. 509-524, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
20B40, AMS classification 94A60 |
18 | Claude Carlet, Joseph L. Yucas |
Piecewise Constructions of Bent and Almost Optimal Boolean Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 37(3), pp. 449-464, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
94A60, AMS Classification 11T71 |
18 | Matthias Krause 0001, Stefan Lucks |
Pseudorandom functions in TC0 and cryptographic limitations to proving lower bounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Complex. ![In: Comput. Complex. 10(4), pp. 297-313, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
$ textit{TC}^{0} $, lower bounds.¶ Subject classification. 68Q25, Pseudorandomness, 94A60, function generators |