Skip to main content
main-content

Zeitschrift

Cryptography and Communications

Cryptography and Communications 2/2019

Ausgabe 2/2019

Inhaltsverzeichnis ( 15 Artikel )

11.01.2018 | Ausgabe 2/2019

Several new classes of linear codes with few weights

Hongwei Liu, Youcef Maouche

13.01.2018 | Ausgabe 2/2019

Universal secure rank-metric coding schemes with optimal communication overheads

Umberto Martínez-Peñas

20.01.2018 | Ausgabe 2/2019

Injectivity on distribution of elements in the compressed sequences derived from primitive sequences over

Lin Wang, Zhi Hu

29.01.2018 | Ausgabe 2/2019

Some new balanced and almost balanced quaternary sequences with low autocorrelation

Jerod Michel, Qi Wang

02.02.2018 | Ausgabe 2/2019

Bent functions from nonlinear permutations and conversely

Enes Pasalic, Samir Hodžić, Fengrong Zhang, Yongzhuang Wei

08.02.2018 | Ausgabe 2/2019

More classes of permutation trinomials with Niho exponents

Huali Deng, Dabin Zheng

19.02.2018 | Ausgabe 2/2019

On affine variety codes from the Klein quartic

Olav Geil, Ferruh Özbudak

02.03.2018 | Ausgabe 2/2019

A note on the constructions of MDS self-dual codes

Haode Yan

02.03.2018 | Ausgabe 2/2019

New bounds on the covering radius of the second order Reed-Muller code of length 128

Qichun Wang, Pantelimon Stănică

13.03.2018 | Ausgabe 2/2019

Compositional inverses of permutation polynomials of the form xrh(xs) over finite fields

Kangquan Li, Longjiang Qu, Qiang Wang

19.03.2018 | Ausgabe 2/2019

Upper bounds and constructions of complete Asynchronous channel hopping systems

Zhe Gao, Chao Li, Yue Zhou

22.03.2018 | Ausgabe 2/2019

Several classes of permutation trinomials over from Niho exponents

Gaofei Wu, Nian Li

04.04.2018 | Ausgabe 2/2019

Quantum codes over Fp from cyclic codes over Fp[u, v]/〈u2 − 1, v3 − v, uv − vu〉

Mohammad Ashraf, Ghulam Mohammad

11.04.2018 | Ausgabe 2/2019

A lower bound on the 2-adic complexity of the modified Jacobi sequence

Yuhua Sun, Qiang Wang, Tongjiang Yan

13.04.2018 | Ausgabe 2/2019

Cryptanalysis of WG-8 and WG-16 stream ciphers

Saeed Rostami, Elham Shakour, Mohammad Ali Orumiehchiha, Josef Pieprzyk

Aktuelle Ausgaben

Premium Partner

    Bildnachweise