Xu, Haiping; Lin, Zhenmei; Guo, Yanqing; Wang, Meiqing Image segmentation using GAC model combining with GVF and balloon force. (English) Zbl 1540.94020 J. Algorithms Comput. Technol. 9, No. 2, 177-198 (2015). MSC: 94A08 65D18 68U10 PDFBibTeX XMLCite \textit{H. Xu} et al., J. Algorithms Comput. Technol. 9, No. 2, 177--198 (2015; Zbl 1540.94020) Full Text: DOI
Lee, Clarissa Ai Ling Non-trivial philosophy: cybernetics, data analytics, and the biophysics of information theory. (English) Zbl 1511.81029 Kybernetes 44, No. 8-9, 1310-1323 (2015). MSC: 81P45 92C05 94A17 PDFBibTeX XMLCite \textit{C. A. L. Lee}, Kybernetes 44, No. 8--9, 1310--1323 (2015; Zbl 1511.81029) Full Text: DOI
Dar, Javid Gani; Al-Hossain, Abdullah Order statistics properties of the two parameter Lomax distribution. (English) Zbl 1509.62237 Pak. J. Stat. Oper. Res. 11, No. 2, 181-194 (2015). MSC: 62G30 60E05 94A17 PDFBibTeX XMLCite \textit{J. G. Dar} and \textit{A. Al-Hossain}, Pak. J. Stat. Oper. Res. 11, No. 2, 181--194 (2015; Zbl 1509.62237) Full Text: DOI
Modi, Kanak; Gill, Vinod Length-biased weighted Maxwell distribution. (English) Zbl 1509.60053 Pak. J. Stat. Oper. Res. 11, No. 4, 465-472 (2015). MSC: 60E05 62F10 94A17 PDFBibTeX XMLCite \textit{K. Modi} and \textit{V. Gill}, Pak. J. Stat. Oper. Res. 11, No. 4, 465--472 (2015; Zbl 1509.60053) Full Text: DOI
Wang, Wen Shu; Li, Wei Guo Application of a new Bregman iterative algorithm to signal recovery. (Chinese. English summary) Zbl 1503.94013 Math. Theory Appl. 35, No. 1, 115-121 (2015). MSC: 94A12 PDFBibTeX XMLCite \textit{W. S. Wang} and \textit{W. G. Li}, Math. Theory Appl. 35, No. 1, 115--121 (2015; Zbl 1503.94013)
Gu, Tian Ye; Yan, Shen Hai; Huang, Xian Tong A new three-party communication cryptosystem based on an integer matrix equation of a Galois field. (Chinese. English summary) Zbl 1503.94031 Math. Theory Appl. 35, No. 4, 80-85 (2015). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{T. Y. Gu} et al., Math. Theory Appl. 35, No. 4, 80--85 (2015; Zbl 1503.94031)
Bi, Hui; Zhang, Bingchen; Hong, Wen Matrix completion-based distributed compressive sensing for polarimetric SAR tomography. (English) Zbl 1497.94017 Sci. China, Inf. Sci. 58, No. 11, Article ID 119301, 3 p. (2015). MSC: 94A12 PDFBibTeX XMLCite \textit{H. Bi} et al., Sci. China, Inf. Sci. 58, No. 11, Article ID 119301, 3 p. (2015; Zbl 1497.94017) Full Text: DOI
Liu, Bin; Gao, Fei; Huang, Wei; Li, Dan; Wen, Qiaoyan Controlling the key by choosing the detection bits in quantum cryptographic protocols. (English) Zbl 1497.94103 Sci. China, Inf. Sci. 58, No. 11, Article ID 112110, 11 p. (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Liu} et al., Sci. China, Inf. Sci. 58, No. 11, Article ID 112110, 11 p. (2015; Zbl 1497.94103) Full Text: DOI
Dai, Shuguang; Wei, Jinfeng; Zhang, Fangguo Memory leakage-resilient secret sharing schemes. (English) Zbl 1497.94082 Sci. China, Inf. Sci. 58, No. 11, Article ID 112109, 9 p. (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Dai} et al., Sci. China, Inf. Sci. 58, No. 11, Article ID 112109, 9 p. (2015; Zbl 1497.94082) Full Text: DOI
Yang, Min; Meng, Qingshu; Wang, Zhangyi; Li, Li; Zhang, Huanguo On the coefficients of the polynomial in the number field sieve. (English) Zbl 1497.94130 Sci. China, Inf. Sci. 58, No. 11, Article ID 112108, 9 p. (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Yang} et al., Sci. China, Inf. Sci. 58, No. 11, Article ID 112108, 9 p. (2015; Zbl 1497.94130) Full Text: DOI
Wang, Lichao; Li, Guoqiang; Hu, Zhenjiang Constructing format-preserving printing from syntax-directed definitions. (English) Zbl 1497.94012 Sci. China, Inf. Sci. 58, No. 11, Article ID 112106, 14 p. (2015). MSC: 94A08 PDFBibTeX XMLCite \textit{L. Wang} et al., Sci. China, Inf. Sci. 58, No. 11, Article ID 112106, 14 p. (2015; Zbl 1497.94012) Full Text: DOI
Qian, Chao; Yu, Yang; Zhou, Zhi-Hua Variable solution structure can be helpful in evolutionary optimization. (English) Zbl 1497.94050 Sci. China, Inf. Sci. 58, No. 11, Article ID 112105, 17 p. (2015). MSC: 94A29 PDFBibTeX XMLCite \textit{C. Qian} et al., Sci. China, Inf. Sci. 58, No. 11, Article ID 112105, 17 p. (2015; Zbl 1497.94050) Full Text: DOI
Tang, Yuchen; Zeng, Guang; Han, Wenbao Classification of disturbance vectors for collision attack in SHA-1. (English) Zbl 1497.94116 Sci. China, Inf. Sci. 58, No. 11, Article ID 112102, 10 p. (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Tang} et al., Sci. China, Inf. Sci. 58, No. 11, Article ID 112102, 10 p. (2015; Zbl 1497.94116) Full Text: DOI
Zhang, Junwei; Ma, Jianfeng; Yang, Chao; Yang, Li Universally composable secure positioning in the bounded retrieval model. (English) Zbl 1497.94131 Sci. China, Inf. Sci. 58, No. 11, Article ID 110105, 15 p. (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Zhang} et al., Sci. China, Inf. Sci. 58, No. 11, Article ID 110105, 15 p. (2015; Zbl 1497.94131) Full Text: DOI
Liu, Zhe; Hu, Zhi; Wu, Wei Elliptic curve with optimal mixed Montgomery-Edwards model for low-end devices. (English) Zbl 1497.94106 Sci. China, Inf. Sci. 58, No. 11, Article ID 110104, 8 p. (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Liu} et al., Sci. China, Inf. Sci. 58, No. 11, Article ID 110104, 8 p. (2015; Zbl 1497.94106) Full Text: DOI
Zheng, Mengce; Hu, Honggang Cryptanalysis of prime power RSA with two private exponents. (English) Zbl 1497.94133 Sci. China, Inf. Sci. 58, No. 11, Article ID 110103, 8 p. (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Zheng} and \textit{H. Hu}, Sci. China, Inf. Sci. 58, No. 11, Article ID 110103, 8 p. (2015; Zbl 1497.94133) Full Text: DOI
Wu, Wanqing; Zhang, Huanguo; Wang, Houzhen; Mao, Shaowu; Jia, Jianwei; Liu, Jinhui A public key cryptosystem based on data complexity under quantum environment. (English) Zbl 1497.94128 Sci. China, Inf. Sci. 58, No. 11, Article ID 110102, 11 p. (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Wu} et al., Sci. China, Inf. Sci. 58, No. 11, Article ID 110102, 11 p. (2015; Zbl 1497.94128) Full Text: DOI
Wang, Liwei; Zhang, Jiapeng On the measurement complexity of differentially private query answering. (English) Zbl 1497.94124 Sci. China, Inf. Sci. 58, No. 9, Article ID 092112, 11 p. (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Wang} and \textit{J. Zhang}, Sci. China, Inf. Sci. 58, No. 9, Article ID 092112, 11 p. (2015; Zbl 1497.94124) Full Text: DOI
Teng, Jikai; Wu, Chuankun; Tang, Chunming; Tian, Youliang A strongly secure identity-based authenticated group key exchange protocol. (English) Zbl 1497.94117 Sci. China, Inf. Sci. 58, No. 9, Article ID 092108, 12 p. (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Teng} et al., Sci. China, Inf. Sci. 58, No. 9, Article ID 092108, 12 p. (2015; Zbl 1497.94117) Full Text: DOI
Chen, Zhixiong; Niu, Zhihua; Wu, Chenhuang On the \(k\)-error linear complexity of binary sequences derived from polynomial quotients. (English) Zbl 1497.94067 Sci. China, Inf. Sci. 58, No. 9, Article ID 092107, 15 p. (2015). MSC: 94A55 PDFBibTeX XMLCite \textit{Z. Chen} et al., Sci. China, Inf. Sci. 58, No. 9, Article ID 092107, 15 p. (2015; Zbl 1497.94067) Full Text: DOI arXiv
Tian, Youliang; Peng, Changgen; Lin, Dongdai; Ma, Jianfeng; Jiang, Qi; Ji, Wenjiang Bayesian mechanism for rational secret sharing scheme. (English) Zbl 1497.94148 Sci. China, Inf. Sci. 58, No. 5, Article ID 052109, 13 p. (2015). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Tian} et al., Sci. China, Inf. Sci. 58, No. 5, Article ID 052109, 13 p. (2015; Zbl 1497.94148) Full Text: DOI
Pupeikis, Rimantas Fast Fourier transform revisited. (English) Zbl 1515.94027 Liet. Mat. Rink., Proc. Lith. Math. Soc., Ser. A 56, 113-118 (2015). MSC: 94A12 65T50 PDFBibTeX XMLCite \textit{R. Pupeikis}, Liet. Mat. Rink., Proc. Lith. Math. Soc., Ser. A 56, 113--118 (2015; Zbl 1515.94027) Full Text: DOI
Li, Ximeng; Nielson, Flemming; Riis Nielson, Hanne Factorization of behavioral integrity. (English) Zbl 1499.68050 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 500-519 (2015). MSC: 68M25 68Q85 94A60 PDFBibTeX XMLCite \textit{X. Li} et al., Lect. Notes Comput. Sci. 9327, 500--519 (2015; Zbl 1499.68050) Full Text: DOI
Tran Viet Xuan Phuong; Yang, Guomin; Susilo, Willy; Chen, Xiaofeng Attribute based broadcast encryption with short ciphertext and decryption key. (English) Zbl 1499.94051 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 252-269 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{Tran Viet Xuan Phuong} et al., Lect. Notes Comput. Sci. 9327, 252--269 (2015; Zbl 1499.94051) Full Text: DOI
Chrétien, Rémy; Cortier, Véronique; Delaune, Stéphanie Checking trace equivalence: how to get rid of nonces? (English) Zbl 1499.68048 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 230-251 (2015). MSC: 68M25 94A60 PDFBibTeX XMLCite \textit{R. Chrétien} et al., Lect. Notes Comput. Sci. 9327, 230--251 (2015; Zbl 1499.68048) Full Text: DOI
Almousa, Omar; Mödersheim, Sebastian; Modesti, Paolo; Viganò, Luca Typing and compositionality for security protocols: a generalization to the geometric fragment. (English) Zbl 1499.68043 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 209-229 (2015). MSC: 68M25 94A60 PDFBibTeX XMLCite \textit{O. Almousa} et al., Lect. Notes Comput. Sci. 9327, 209--229 (2015; Zbl 1499.68043) Full Text: DOI Link
Zhang, Liang Feng; Safavi-Naini, Reihaneh Batch verifiable computation of polynomials on outsourced data. (English) Zbl 1522.68093 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015, Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 9327, 167-185 (2015). MSC: 68M25 68M11 94A60 PDFBibTeX XMLCite \textit{L. F. Zhang} and \textit{R. Safavi-Naini}, Lect. Notes Comput. Sci. 9327, 167--185 (2015; Zbl 1522.68093) Full Text: DOI
Jager, Tibor; Schwenk, Jörg; Somorovsky, Juraj Practical invalid curve attacks on TLS-ECDH. (English) Zbl 1504.94150 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 407-425 (2015). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{T. Jager} et al., Lect. Notes Comput. Sci. 9326, 407--425 (2015; Zbl 1504.94150) Full Text: DOI OA License
Yi, Xun; Hao, Feng; Chen, Liqun; Liu, Joseph K. Practical threshold password-authenticated secret sharing protocol. (English) Zbl 1503.94053 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 347-365 (2015). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{X. Yi} et al., Lect. Notes Comput. Sci. 9326, 347--365 (2015; Zbl 1503.94053) Full Text: DOI OA License
Kiayias, Aggelos; Tang, Qiang Making any identity-based encryption accountable, efficiently. (English) Zbl 1504.94160 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 326-346 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{A. Kiayias} and \textit{Q. Tang}, Lect. Notes Comput. Sci. 9326, 326--346 (2015; Zbl 1504.94160) Full Text: DOI OA License
Benhamouda, Fabrice; Krenn, Stephan; Lyubashevsky, Vadim; Pietrzak, Krzysztof Efficient zero-knowledge proofs for commitments from learning with errors over rings. (English) Zbl 1499.68113 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 305-325 (2015). MSC: 68Q10 68Q11 94A60 PDFBibTeX XMLCite \textit{F. Benhamouda} et al., Lect. Notes Comput. Sci. 9326, 305--325 (2015; Zbl 1499.68113) Full Text: DOI OA License
Qin, Baodong; Deng, Robert H.; Li, Yingjiu; Liu, Shengli Server-aided revocable identity-based encryption. (English) Zbl 1499.68057 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 286-304 (2015). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{B. Qin} et al., Lect. Notes Comput. Sci. 9326, 286--304 (2015; Zbl 1499.68057) Full Text: DOI OA License
Yang, Rupeng; Xu, Qiuliang; Zhou, Yongbin; Zhang, Rui; Hu, Chengyu; Yu, Zuoxia Updatable hash proof system and its applications. (English) Zbl 1502.94041 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 266-285 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Yang} et al., Lect. Notes Comput. Sci. 9326, 266--285 (2015; Zbl 1502.94041) Full Text: DOI OA License
Bootle, Jonathan; Cerulli, Andrea; Chaidos, Pyrros; Ghadafi, Essam; Groth, Jens; Petit, Christophe Short accountable ring signatures based on DDH. (English) Zbl 1499.94054 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 243-265 (2015). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Bootle} et al., Lect. Notes Comput. Sci. 9326, 243--265 (2015; Zbl 1499.94054) Full Text: DOI OA License
Guan, Chaowen; Ren, Kui; Zhang, Fangguo; Kerschbaum, Florian; Yu, Jia Symmetric-key based proofs of retrievability supporting public verification. (English) Zbl 1499.68092 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 203-223 (2015). MSC: 68P20 68M11 68P25 94A60 PDFBibTeX XMLCite \textit{C. Guan} et al., Lect. Notes Comput. Sci. 9326, 203--223 (2015; Zbl 1499.68092) Full Text: DOI OA License
Minematsu, Kazuhiko Efficient message authentication codes with combinatorial group testing. (English) Zbl 1504.94220 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 185-202 (2015). MSC: 94A62 94A60 68M25 PDFBibTeX XMLCite \textit{K. Minematsu}, Lect. Notes Comput. Sci. 9326, 185--202 (2015; Zbl 1504.94220) Full Text: DOI OA License
Avoine, Gildas; Carpent, Xavier; Lauradoux, Cédric Interleaving cryptanalytic time-memory trade-offs on non-uniform distributions. (English) Zbl 1504.94097 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 165-184 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Avoine} et al., Lect. Notes Comput. Sci. 9326, 165--184 (2015; Zbl 1504.94097) Full Text: DOI OA License
Hanser, Christian; Rabkin, Max; Schröder, Dominique Verifiably encrypted signatures: security revisited and a new construction. (English) Zbl 1504.94212 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 146-164 (2015). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C. Hanser} et al., Lect. Notes Comput. Sci. 9326, 146--164 (2015; Zbl 1504.94212) Full Text: DOI OA License
Backes, Michael; Mohammadi, Esfandiar; Ruffing, Tim Computational soundness for interactive primitives. (English) Zbl 1502.68052 Pernul, Günther (ed.) et al., Computer security – ESORICS 2015. 20th European symposium on research in computer security, Vienna, Austria, September 21–25, 2015. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 9326, 125-145 (2015). MSC: 68M25 94A60 PDFBibTeX XMLCite \textit{M. Backes} et al., Lect. Notes Comput. Sci. 9326, 125--145 (2015; Zbl 1502.68052) Full Text: DOI OA License
Sarde, Pankaj; Banerjee, Amitabh Strong designated verifier signature scheme based on discrete logarithm problem. (English) Zbl 1495.94090 J. Discrete Math. Sci. Cryptography 18, No. 6, 877-885 (2015). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{P. Sarde} and \textit{A. Banerjee}, J. Discrete Math. Sci. Cryptography 18, No. 6, 877--885 (2015; Zbl 1495.94090) Full Text: DOI
Thandra, Prasanth Kumar; Rajan, J.; Satyamurty, S. A. V. Unconditionally anonymous controllable ID-based ring signatures. (English) Zbl 1495.94093 J. Discrete Math. Sci. Cryptography 18, No. 6, 849-867 (2015). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{P. K. Thandra} et al., J. Discrete Math. Sci. Cryptography 18, No. 6, 849--867 (2015; Zbl 1495.94093) Full Text: DOI
Yellapu, Ganesh Correlation (fast) attack against nonlinear combination generator. (English) Zbl 1495.94075 J. Discrete Math. Sci. Cryptography 18, No. 6, 705-715 (2015). MSC: 94A60 94A55 PDFBibTeX XMLCite \textit{G. Yellapu}, J. Discrete Math. Sci. Cryptography 18, No. 6, 705--715 (2015; Zbl 1495.94075) Full Text: DOI
Karuppiah, Marimuthu; Saravanan, R. Cryptanalysis and an improvement of new remote mutual authentication scheme using smart cards. (English) Zbl 1495.94082 J. Discrete Math. Sci. Cryptography 18, No. 5, 623-649 (2015). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{M. Karuppiah} and \textit{R. Saravanan}, J. Discrete Math. Sci. Cryptography 18, No. 5, 623--649 (2015; Zbl 1495.94082) Full Text: DOI
Bjorkman, Beth; Talbert, Robert Fixed points of columnar transpositions. (English) Zbl 1490.94049 J. Discrete Math. Sci. Cryptography 18, No. 5, 541-557 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Bjorkman} and \textit{R. Talbert}, J. Discrete Math. Sci. Cryptography 18, No. 5, 541--557 (2015; Zbl 1490.94049) Full Text: DOI
Iovane, G.; Amorosia, A.; Benedetto, E.; Lamponi, G. An information fusion approach based on prime numbers coming from RSA algorithm and fractals for secure coding. (English) Zbl 1495.94052 J. Discrete Math. Sci. Cryptography 18, No. 5, 455-479 (2015). MSC: 94A60 28A80 PDFBibTeX XMLCite \textit{G. Iovane} et al., J. Discrete Math. Sci. Cryptography 18, No. 5, 455--479 (2015; Zbl 1495.94052) Full Text: DOI
Kakkar, Shantnu; Makkar, Inderpreet Singh; Mohapatra, A. K. Secret key generation using OFDM samples. (English) Zbl 1495.94081 J. Discrete Math. Sci. Cryptography 18, No. 4, 439-454 (2015). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. Kakkar} et al., J. Discrete Math. Sci. Cryptography 18, No. 4, 439--454 (2015; Zbl 1495.94081) Full Text: DOI
Gopal, P. V. S. S. N.; Reddy, P. Vasudeva Efficient ID-based key-insulated signature scheme with batch verifications using bilinear pairings over elliptic curves. (English) Zbl 1495.94080 J. Discrete Math. Sci. Cryptography 18, No. 4, 385-402 (2015). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{P. V. S. S. N. Gopal} and \textit{P. V. Reddy}, J. Discrete Math. Sci. Cryptography 18, No. 4, 385--402 (2015; Zbl 1495.94080) Full Text: DOI
Kaundal, Ashish Kumar; Verma, A. K. Extending Feistel structure to DNA cryptography. (English) Zbl 1506.68028 J. Discrete Math. Sci. Cryptography 18, No. 4, 349-362 (2015). MSC: 68Q07 94A60 PDFBibTeX XMLCite \textit{A. K. Kaundal} and \textit{A. K. Verma}, J. Discrete Math. Sci. Cryptography 18, No. 4, 349--362 (2015; Zbl 1506.68028) Full Text: DOI
Sharma, P. L.; Sharma, S.; Rehan, M. On construction of irreducible polynomials over \(F_3\). (English) Zbl 1495.11131 J. Discrete Math. Sci. Cryptography 18, No. 4, 335-347 (2015). MSC: 11T06 PDFBibTeX XMLCite \textit{P. L. Sharma} et al., J. Discrete Math. Sci. Cryptography 18, No. 4, 335--347 (2015; Zbl 1495.11131) Full Text: DOI
Viswanath, M. K.; Kumar, M. Ranjith A public key cryptosystem using Hiil’s cipher. (English) Zbl 1495.94073 J. Discrete Math. Sci. Cryptography 18, No. 1-2, 129-138 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. K. Viswanath} and \textit{M. R. Kumar}, J. Discrete Math. Sci. Cryptography 18, No. 1--2, 129--138 (2015; Zbl 1495.94073) Full Text: DOI
Srinivasan, Chungath; Pillai, Utkarsh Umesan; Lakshmy, K. V.; Sethumadhavan, M. Cube attack on stream ciphers using a modified linearity test. (English) Zbl 1495.94070 J. Discrete Math. Sci. Cryptography 18, No. 3, 301-311 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Srinivasan} et al., J. Discrete Math. Sci. Cryptography 18, No. 3, 301--311 (2015; Zbl 1495.94070) Full Text: DOI
Lokeshwari, G.; Susarla, Sreevidya; Kumar, S. Udaya A modified technique for reliable image encryption method using Merkle-Hellman cryptosystem and RSA algorithm. (English) Zbl 1495.94006 J. Discrete Math. Sci. Cryptography 18, No. 3, 293-300 (2015). MSC: 94A08 94A60 PDFBibTeX XMLCite \textit{G. Lokeshwari} et al., J. Discrete Math. Sci. Cryptography 18, No. 3, 293--300 (2015; Zbl 1495.94006) Full Text: DOI
Susarla, Lakshmi Bhavani Madhuri; Kumar, S. Udaya A block cipher using an iterative method involving a permutation. (English) Zbl 1495.94038 J. Discrete Math. Sci. Cryptography 18, No. 3, 275-292 (2015). MSC: 94A55 05A05 PDFBibTeX XMLCite \textit{L. B. M. Susarla} and \textit{S. U. Kumar}, J. Discrete Math. Sci. Cryptography 18, No. 3, 275--292 (2015; Zbl 1495.94038) Full Text: DOI
Khadir, Omar Insecure primitive elements in an ElGamal signature protocol. (English) Zbl 1495.94083 J. Discrete Math. Sci. Cryptography 18, No. 3, 237-245 (2015). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{O. Khadir}, J. Discrete Math. Sci. Cryptography 18, No. 3, 237--245 (2015; Zbl 1495.94083) Full Text: DOI arXiv
Mehan, Vineet; Dhir, Renu; Brar, Yadwinder Singh A novel elliptic curve cryptography based approach of re-watermarking for cheque truncation system. (English) Zbl 1495.94061 J. Discrete Math. Sci. Cryptography 18, No. 3, 219-235 (2015). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{V. Mehan} et al., J. Discrete Math. Sci. Cryptography 18, No. 3, 219--235 (2015; Zbl 1495.94061) Full Text: DOI
Priyadarsini, P. L. K. A survey on some applications of graph theory in cryptography. (English) Zbl 1495.94067 J. Discrete Math. Sci. Cryptography 18, No. 3, 209-217 (2015). MSC: 94A60 05C48 PDFBibTeX XMLCite \textit{P. L. K. Priyadarsini}, J. Discrete Math. Sci. Cryptography 18, No. 3, 209--217 (2015; Zbl 1495.94067) Full Text: DOI
Mahalanobis, Ayan The MOR cryptosystem and extra-special \(p\)-groups. (English) Zbl 1495.94059 J. Discrete Math. Sci. Cryptography 18, No. 3, 201-208 (2015). MSC: 94A60 20D15 20D45 PDFBibTeX XMLCite \textit{A. Mahalanobis}, J. Discrete Math. Sci. Cryptography 18, No. 3, 201--208 (2015; Zbl 1495.94059) Full Text: DOI arXiv
Walsh, James Lyons; Knuth, Kevin H. Information-based physics, influence, and forces. (English) Zbl 1483.94022 Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 538-547 (2015). MSC: 94A15 81P10 PDFBibTeX XMLCite \textit{J. L. Walsh} and \textit{K. H. Knuth}, AIP Conf. Proc. 1641, 538--547 (2015; Zbl 1483.94022) Full Text: DOI arXiv Link
Zozor, Steeve; Brossier, Jean-Marc Debruijn identities: from Shannon, Kullback-Leibler and Fisher to generalized \(\phi \)-entropies, \( \phi \)-divergences and \(\phi \)-Fisher informations. (English) Zbl 1483.62008 Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 522-529 (2015). MSC: 62B10 94A17 94A24 PDFBibTeX XMLCite \textit{S. Zozor} and \textit{J.-M. Brossier}, AIP Conf. Proc. 1641, 522--529 (2015; Zbl 1483.62008) Full Text: DOI
Choi, Jaehyung; Mullhaupt, Andrew P. Application of Kähler manifold to signal processing and Bayesian inference. (English) Zbl 1483.53121 Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 113-120 (2015). MSC: 53Z50 62F15 94A15 PDFBibTeX XMLCite \textit{J. Choi} and \textit{A. P. Mullhaupt}, AIP Conf. Proc. 1641, 113--120 (2015; Zbl 1483.53121) Full Text: DOI arXiv
Rioul, Olivier; Magossi, José Carlos Shannon’s formula and Hartley’s rule: a mathematical coincidence? (English) Zbl 1483.62065 Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 105-112 (2015). MSC: 62F15 62-03 94A24 PDFBibTeX XMLCite \textit{O. Rioul} and \textit{J. C. Magossi}, AIP Conf. Proc. 1641, 105--112 (2015; Zbl 1483.62065) Full Text: DOI HAL
Mohammad-Djafari, Ali Bayesian or Laplacien inference, entropy and information theory and information geometry in data and signal processing. (English) Zbl 1483.62011 Mohammad-Djafari, Ali (ed.) et al., Bayesian inference and maximum entropy methods in science and engineering (MaxEnt 2014), Clos Lucé, Amboise, France, September 21–26, 2014. Melville, NY: American Institute of Physics (AIP). AIP Conf. Proc. 1641, 43-58 (2015). MSC: 62B11 62F15 94A17 PDFBibTeX XMLCite \textit{A. Mohammad-Djafari}, AIP Conf. Proc. 1641, 43--58 (2015; Zbl 1483.62011) Full Text: DOI
Chen, Ke; Wei, Suhua On some variational models and their algorithms for axially symmetric objects tomography from a single X-ray source. (Chinese. English summary) Zbl 1499.94006 Sci. Sin., Math. 45, No. 9, 1537-1548 (2015). MSC: 94A08 PDFBibTeX XMLCite \textit{K. Chen} and \textit{S. Wei}, Sci. Sin., Math. 45, No. 9, 1537--1548 (2015; Zbl 1499.94006) Full Text: DOI
Huo, Haiye; Sun, Wenchang Average sampling theorem. (Chinese. English summary) Zbl 1499.94028 Sci. Sin., Math. 45, No. 9, 1403-1422 (2015). MSC: 94A20 94A12 PDFBibTeX XMLCite \textit{H. Huo} and \textit{W. Sun}, Sci. Sin., Math. 45, No. 9, 1403--1422 (2015; Zbl 1499.94028) Full Text: DOI
Zhang, Juan Mei; Cao, Jie; Liu, Nian Yi; Yang, Ya Tao; Li, Zi Chen A new design of digital signature scheme based on NTRU. (Chinese. English summary) Zbl 1479.94279 J. Sichuan Univ., Eng. Sci. Ed. 47, No. 1, 49-53 (2015). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{J. M. Zhang} et al., J. Sichuan Univ., Eng. Sci. Ed. 47, No. 1, 49--53 (2015; Zbl 1479.94279)
Cao, Zhen Fu New development of cryptography. (Chinese. English summary) Zbl 1479.94140 J. Sichuan Univ., Eng. Sci. Ed. 47, No. 1, 1-12 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. F. Cao}, J. Sichuan Univ., Eng. Sci. Ed. 47, No. 1, 1--12 (2015; Zbl 1479.94140)
Li, Ming Xiang; An, Ni; Feng, Er Ying; Pang, Ling An attribute-based signature scheme based on lattices. (Chinese. English summary) Zbl 1479.94214 J. Sichuan Univ., Eng. Sci. Ed. 47, No. 2, 102-107 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{M. X. Li} et al., J. Sichuan Univ., Eng. Sci. Ed. 47, No. 2, 102--107 (2015; Zbl 1479.94214)
Chen, Zhi Gang; Song, Xin Xia; Zhang, Yan Hong A fully homomorphic encryption scheme based on binary-LWE and analysis of security parameters. (Chinese. English summary) Zbl 1479.94143 J. Sichuan Univ., Eng. Sci. Ed. 47, No. 2, 75-81 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. G. Chen} et al., J. Sichuan Univ., Eng. Sci. Ed. 47, No. 2, 75--81 (2015; Zbl 1479.94143)
Zhao, Yong Jun; Wang, Ting; Liu, Cheng Cheng; Wang, Tao Robust reduced-dimension STAP method for airborne radar based on BIA and SOCP. (Chinese. English summary) Zbl 1479.94083 J. Sichuan Univ., Eng. Sci. Ed. 47, No. 4, 150-155 (2015). MSC: 94A13 PDFBibTeX XMLCite \textit{Y. J. Zhao} et al., J. Sichuan Univ., Eng. Sci. Ed. 47, No. 4, 150--155 (2015; Zbl 1479.94083)
Lü, Cong Dong; Han, Zhen A method to keep noninterference in multi-level security policy refinement. (Chinese. English summary) Zbl 1479.94230 J. Sichuan Univ., Eng. Sci. Ed. 47, No. 4, 136-141 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{C. D. Lü} and \textit{Z. Han}, J. Sichuan Univ., Eng. Sci. Ed. 47, No. 4, 136--141 (2015; Zbl 1479.94230)
Zhang, Xue; Li, Guang Song; Han, Wen Bao; Ji, Hui Fang; Hu, Hong Yu Identity-based authenticated key agreement protocol cross autonomous domains. (Chinese. English summary) Zbl 1479.94282 J. Sichuan Univ., Eng. Sci. Ed. 47, No. 4, 125-131 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Zhang} et al., J. Sichuan Univ., Eng. Sci. Ed. 47, No. 4, 125--131 (2015; Zbl 1479.94282)
Peng, Zhen Long; Gui, Xiao Lin; An, Jian; Ji, Ya Li; Guo, Jian Hong An information hiding algorithm of gray images based on suboptimum weighted matrix. (Chinese. English summary) Zbl 1479.94044 J. Sichuan Univ., Eng. Sci. Ed. 47, No. 6, 139-143 (2015). MSC: 94A08 68P25 68U10 PDFBibTeX XMLCite \textit{Z. L. Peng} et al., J. Sichuan Univ., Eng. Sci. Ed. 47, No. 6, 139--143 (2015; Zbl 1479.94044)
Han, Feng Ying Tamper-proof and recoverable net-flow fingerprint coding scheme. (Chinese. English summary) Zbl 1479.94185 J. Sichuan Univ., Eng. Sci. Ed. 47, No. 5, 94-102 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Y. Han}, J. Sichuan Univ., Eng. Sci. Ed. 47, No. 5, 94--102 (2015; Zbl 1479.94185)
Pasqualetti, Fabio; Dorfler, Florian; Bullo, Francesco Control-theoretic methods for cyberphysical security: geometric principles for optimal cross-layer resilient control systems. (English) Zbl 1476.93096 IEEE Control Syst. 35, No. 1, 110-127 (2015). MSC: 93B51 94A60 PDFBibTeX XMLCite \textit{F. Pasqualetti} et al., IEEE Control Syst. 35, No. 1, 110--127 (2015; Zbl 1476.93096) Full Text: DOI
Smith, Roy S. Covert misappropriation of networked control systems: presenting a feedback structure. (English) Zbl 1476.93116 IEEE Control Syst. 35, No. 1, 82-92 (2015). MSC: 93C83 94A60 PDFBibTeX XMLCite \textit{R. S. Smith}, IEEE Control Syst. 35, No. 1, 82--92 (2015; Zbl 1476.93116) Full Text: DOI
Amin, Saurabh; Schwartz, Galina A.; Cardenas, Alvaro A.; Sastry, S. Shankar Game-theoretic models of electricity theft detection in smart utility networks: providing new capabilities with advanced metering infrastructure. (English) Zbl 1476.94024 IEEE Control Syst. 35, No. 1, 66-81 (2015). MSC: 94A60 91A40 91A80 93B51 PDFBibTeX XMLCite \textit{S. Amin} et al., IEEE Control Syst. 35, No. 1, 66--81 (2015; Zbl 1476.94024) Full Text: DOI
Zhu, Quanyan; Basar, Tamer Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-In-games principle for optimal cross-layer resilient control systems. (English) Zbl 1476.93098 IEEE Control Syst. 35, No. 1, 46-65 (2015). MSC: 93B51 49N70 91A05 91A06 91A80 94A60 PDFBibTeX XMLCite \textit{Q. Zhu} and \textit{T. Basar}, IEEE Control Syst. 35, No. 1, 46--65 (2015; Zbl 1476.93098) Full Text: DOI
Teixeira, Andre; Sou, Kin Cheong; Sandberg, Henrik; Johansson, Karl Henrik Secure control systems: a quantitative risk management approach. (English) Zbl 1476.93097 IEEE Control Syst. 35, No. 1, 24-45 (2015). MSC: 93B51 94A60 PDFBibTeX XMLCite \textit{A. Teixeira} et al., IEEE Control Syst. 35, No. 1, 24--45 (2015; Zbl 1476.93097) Full Text: DOI
Sandberg, Henrik; Amin, Saurabh; Johansson, Karl Henrik Cyberphysical security in networked control systems: an introduction to the issue. (English) Zbl 1476.93072 IEEE Control Syst. 35, No. 1, 20-23 (2015). MSC: 93-06 00B15 93B51 94A60 PDFBibTeX XMLCite \textit{H. Sandberg} et al., IEEE Control Syst. 35, No. 1, 20--23 (2015; Zbl 1476.93072) Full Text: DOI
Bernard, Séverine; Bouza, Gemayqzel; Piétrus, Alain An optimal control approach for e-rumor. (English) Zbl 1473.49024 Rev. Invest. Oper. 36, No. 2, 108-114 (2015). MSC: 49K15 49S05 94A15 91D30 PDFBibTeX XMLCite \textit{S. Bernard} et al., Rev. Invest. Oper. 36, No. 2, 108--114 (2015; Zbl 1473.49024) Full Text: Link
Pil’shchikov, D. V. A complexity analysis of algorithm of parallel search of the “gold” collision. (Russian. English summary) Zbl 1472.68231 Mat. Vopr. Kriptografii 6, No. 4, 77-97 (2015). MSC: 68W40 94A60 PDFBibTeX XMLCite \textit{D. V. Pil'shchikov}, Mat. Vopr. Kriptografii 6, No. 4, 77--97 (2015; Zbl 1472.68231) Full Text: DOI MNR
Kamlovskiĭ, O. V. Distribution properties of rows and columns for matrix linear recurrent sequences of the first order. (Russian. English summary) Zbl 1476.11027 Mat. Vopr. Kriptografii 6, No. 4, 65-76 (2015). MSC: 11B37 11B83 11T99 PDFBibTeX XMLCite \textit{O. V. Kamlovskiĭ}, Mat. Vopr. Kriptografii 6, No. 4, 65--76 (2015; Zbl 1476.11027) Full Text: DOI MNR
Ivanov, A. V. Asymptotically optimal criteria for testing hypotheses on the distribution of a random vector. II. (Russian. English summary) Zbl 1476.62049 Mat. Vopr. Kriptografii 6, No. 4, 49-64 (2015). MSC: 62F03 94A05 PDFBibTeX XMLCite \textit{A. V. Ivanov}, Mat. Vopr. Kriptografii 6, No. 4, 49--64 (2015; Zbl 1476.62049) Full Text: DOI MNR
Afanas’eva, A. V.; Balakirskiĭ, V. B.; Bezzateev, S. V. Private information retrieval protocol. (Russian. English summary) Zbl 1472.68049 Mat. Vopr. Kriptografii 6, No. 4, 5-21 (2015). MSC: 68P20 94A60 PDFBibTeX XMLCite \textit{A. V. Afanas'eva} et al., Mat. Vopr. Kriptografii 6, No. 4, 5--21 (2015; Zbl 1472.68049) Full Text: DOI MNR
Nesterenko, A. Yu. On a family of universal hash functions. (Russian. English summary) Zbl 1472.68052 Mat. Vopr. Kriptografii 6, No. 3, 135-151 (2015). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{A. Yu. Nesterenko}, Mat. Vopr. Kriptografii 6, No. 3, 135--151 (2015; Zbl 1472.68052) Full Text: DOI MNR
Ivanov, A. V. Asymptotically optimal criteria for testing parametric hypothesis on the distribution of a random vector. I. (Russian. English summary) Zbl 1476.62048 Mat. Vopr. Kriptografii 6, No. 3, 89-116 (2015). MSC: 62F03 94A05 PDFBibTeX XMLCite \textit{A. V. Ivanov}, Mat. Vopr. Kriptografii 6, No. 3, 89--116 (2015; Zbl 1476.62048) Full Text: DOI MNR
Ermilov, D. M.; Kozlitin, O. A. On the structure of graph of polynomial transformation of the Galois ring. (Russian. English summary) Zbl 1475.94116 Mat. Vopr. Kriptografii 6, No. 3, 47-73 (2015). MSC: 94A60 94B25 PDFBibTeX XMLCite \textit{D. M. Ermilov} and \textit{O. A. Kozlitin}, Mat. Vopr. Kriptografii 6, No. 3, 47--73 (2015; Zbl 1475.94116) Full Text: DOI MNR
Drelikhov, V. O.; Kruglov, I. A. Local characteristics of smoothing properties of endomorphisms of finite abelian groups. (Russian. English summary) Zbl 1476.94027 Mat. Vopr. Kriptografii 6, No. 3, 33-45 (2015). MSC: 94A60 20K30 42A16 PDFBibTeX XMLCite \textit{V. O. Drelikhov} and \textit{I. A. Kruglov}, Mat. Vopr. Kriptografii 6, No. 3, 33--45 (2015; Zbl 1476.94027) Full Text: DOI MNR
Fomin, D. B. Implementation of an XSL block cipher with MDS-matrix linear transformation on NVIDIA CUDA. (Russian. English summary) Zbl 1475.94120 Mat. Vopr. Kriptografii 6, No. 2, 99-108 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{D. B. Fomin}, Mat. Vopr. Kriptografii 6, No. 2, 99--108 (2015; Zbl 1475.94120) Full Text: DOI MNR
Sedov, G. K. The security of GOST R 34.11-2012 against preimage and collision attacks. (Russian. English summary) Zbl 1475.94163 Mat. Vopr. Kriptografii 6, No. 2, 79-98 (2015). MSC: 94A60 68P25 11T71 PDFBibTeX XMLCite \textit{G. K. Sedov}, Mat. Vopr. Kriptografii 6, No. 2, 79--98 (2015; Zbl 1475.94163) Full Text: DOI MNR
Saarinen, M.-J. O. StriBob: authenticated encryption from GOST R 34.11-2012 LPS permutation. (English) Zbl 1475.94157 Mat. Vopr. Kriptografii 6, No. 2, 67-78 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. J. O. Saarinen}, Mat. Vopr. Kriptografii 6, No. 2, 67--78 (2015; Zbl 1475.94157) Full Text: DOI MNR
Pilshchikov, D. V. On the limiting mean values in probabilistic models of time-memory-data tradeoff methods. (Russian. English summary) Zbl 1475.94048 Mat. Vopr. Kriptografii 6, No. 2, 59-65 (2015). MSC: 94A17 94A60 60J80 PDFBibTeX XMLCite \textit{D. V. Pilshchikov}, Mat. Vopr. Kriptografii 6, No. 2, 59--65 (2015; Zbl 1475.94048) Full Text: DOI MNR
Nikolaev, M. V. On the complexity of two-dimensional discrete logarithm problem in a finite cyclic group with efficient automorphism. (English) Zbl 1476.11143 Mat. Vopr. Kriptografii 6, No. 2, 45-57 (2015). MSC: 11T71 11Y16 94A60 PDFBibTeX XMLCite \textit{M. V. Nikolaev}, Mat. Vopr. Kriptografii 6, No. 2, 45--57 (2015; Zbl 1476.11143) Full Text: DOI MNR
Matveev, S. V. GOST 28147-89 masking against side channel attacks. (English) Zbl 1475.94137 Mat. Vopr. Kriptografii 6, No. 2, 35-43 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. V. Matveev}, Mat. Vopr. Kriptografii 6, No. 2, 35--43 (2015; Zbl 1475.94137) Full Text: DOI MNR
Dygin, D. M.; Lavrikov, I. V.; Marshalko, G. B.; Rudskoy, V. I.; Trifonov, D. I.; Shishkin, V. A. On a new Russian encryption standard. (English) Zbl 1475.94115 Mat. Vopr. Kriptografii 6, No. 2, 29-34 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{D. M. Dygin} et al., Mat. Vopr. Kriptografii 6, No. 2, 29--34 (2015; Zbl 1475.94115) Full Text: DOI MNR
Goltvanitsa, M. A. Digit sequences of skew linear recurrences of maximal period over Galois rings. (English) Zbl 1476.11025 Mat. Vopr. Kriptografii 6, No. 2, 19-27 (2015). MSC: 11B37 11B83 11T99 PDFBibTeX XMLCite \textit{M. A. Goltvanitsa}, Mat. Vopr. Kriptografii 6, No. 2, 19--27 (2015; Zbl 1476.11025) Full Text: DOI MNR
Alekseev, E. K.; Popov, V. O.; Prokhorov, A. S.; Smyshlyaev, S. V.; Sonina, L. A. On the performance of one perspective LSX-based block cipher. (English) Zbl 1475.94095 Mat. Vopr. Kriptografii 6, No. 2, 7-17 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{E. K. Alekseev} et al., Mat. Vopr. Kriptografii 6, No. 2, 7--17 (2015; Zbl 1475.94095) Full Text: DOI MNR
Sachkov, V. N. Combinatorial properties of differentially 2-uniform substitutions. (Russian. English summary) Zbl 1475.94159 Mat. Vopr. Kriptografii 6, No. 1, 159-179 (2015). MSC: 94A60 60C05 05B05 PDFBibTeX XMLCite \textit{V. N. Sachkov}, Mat. Vopr. Kriptografii 6, No. 1, 159--179 (2015; Zbl 1475.94159) Full Text: DOI MNR
Polin, S. V. Permutation lattices of equivalence relations on the Cartesian products and systems of equations concordant with these lattices. I. (Russian. English summary) Zbl 1475.94153 Mat. Vopr. Kriptografii 6, No. 1, 135-158 (2015). MSC: 94A60 06B75 08A72 PDFBibTeX XMLCite \textit{S. V. Polin}, Mat. Vopr. Kriptografii 6, No. 1, 135--158 (2015; Zbl 1475.94153) Full Text: DOI MNR
Pogorelov, B. A.; Pudovkina, M. A. Orbital derivatives on the residue ring. II: Probabilistic and combinatorial properties. (Russian. English summary) Zbl 1475.94149 Mat. Vopr. Kriptografii 6, No. 1, 117-133 (2015). MSC: 94A60 20B99 PDFBibTeX XMLCite \textit{B. A. Pogorelov} and \textit{M. A. Pudovkina}, Mat. Vopr. Kriptografii 6, No. 1, 117--133 (2015; Zbl 1475.94149) Full Text: DOI MNR