Skip to main content


Cryptography and Communications

Discrete Structures, Boolean Functions and Sequences

Cryptography and Communications OnlineFirst articles


Decomposition of permutations in a finite field

We describe a method to decompose any power permutation, as a sequence of power permutations of lower algebraic degree. As a result we obtain decompositions of the inversion in GF(2 n ) for small n from 3 up to 16, as well as for the APN …


Optimal bounds on codes for location in circulant graphs

Identifying and locating-dominating codes have been studied widely in circulant graphs of type C n ( 1 , 2 , 3 , … , r ) $C_{n}(1,2,3,\dots , r)$ over the recent years. In 2013, Ghebleh and Niepel studied locating-dominating and identifying codes …


Complete weight enumerators of a class of two-weight linear codes

Recently, linear codes constructed from defining sets have been investigated extensively and they have many applications. For an odd prime p $p$ , we determine the complete weight enumerator and weight enumerator of a class of p $p$ -ary linear …


Cellular automata based S-boxes

Cellular Automata (CA) represent an interesting approach to design Substitution Boxes (S-boxes) having good cryptographic properties and low implementation costs. From the cryptographic perspective, up to now there have been only ad-hoc studies …


New lower bounds on q-ary error-correcting codes

Let A q (n, d) denote the maximum size of a q-ary code with length n and minimum distance d. For most values of n and d, only lower and upper bounds on A q (n, d) are known. In this paper new lower bounds on and updated tables of A q (n, d) for q …

Aktuelle Ausgaben

Über diese Zeitschrift

Cryptography and Communications Discrete Structures, Boolean Functions and Sequences (CCDS) publishes high-quality papers discussing cryptography, error correcting codes, communications and their interactions. The journal provides a forum for the research communities of these domains, and covers all the fundamental and computational aspects of these fields.

The journal publishes both theoretical and applied papers, with an emphasis on supporting applications. Applications include channel coding; wireless communications, including mobile phones and satellite communications; security of the internet; banking transfer security; e-commerce and embedded security devices.

The central topics of the journal include discrete structures used in stream and block ciphers in symmetric cryptography; code division multiple access in communications; and random number generation for statistics, cryptography and numerical methods.

Weitere Informationen

Premium Partner

Neuer Inhalt

BranchenIndex Online

Die B2B-Firmensuche für Industrie und Wirtschaft: Kostenfrei in Firmenprofilen nach Lieferanten, Herstellern, Dienstleistern und Händlern recherchieren.



Product Lifecycle Management im Konzernumfeld – Herausforderungen, Lösungsansätze und Handlungsempfehlungen

Für produzierende Unternehmen hat sich Product Lifecycle Management in den letzten Jahrzehnten in wachsendem Maße zu einem strategisch wichtigen Ansatz entwickelt. Forciert durch steigende Effektivitäts- und Effizienzanforderungen stellen viele Unternehmen ihre Product Lifecycle Management-Prozesse und -Informationssysteme auf den Prüfstand. Der vorliegende Beitrag beschreibt entlang eines etablierten Analyseframeworks Herausforderungen und Lösungsansätze im Product Lifecycle Management im Konzernumfeld.
Jetzt gratis downloaden!