×

Found 174 Documents (Results 1–100)

Evolutionary strategies for the design of binary linear codes. (English) Zbl 07787617

Pérez Cáceres, Leslie (ed.) et al., Evolutionary computation in combinatorial optimization. 23rd European conference, EvoCOP 2023, held as part of EvoStar 2023, Brno, Czech Republic, April 12–14, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13987, 114-129 (2023).
MSC:  68W50 90C27 90C59
PDFBibTeX XMLCite
Full Text: DOI arXiv

Boolean functions for homomorphic-friendly stream ciphers. (English) Zbl 1457.94106

Gueye, Cheikh Thiecoumba (ed.) et al., Algebra, codes and cryptology. Proceedings of the first international conference, A2C 2019, in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019. Cham: Springer. Commun. Comput. Inf. Sci. 1133, 166-182 (2019).
MSC:  94A60 94D10
PDFBibTeX XMLCite
Full Text: DOI

Improved filter permutators for efficient FHE: better instances and implementations. (English) Zbl 1456.94100

Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 68-91 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Codes, cryptology and information security. Third international conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019. Proceedings – in honor of Said el Hajji. (English) Zbl 1408.68011

Lecture Notes in Computer Science 11445. Cham: Springer (ISBN 978-3-030-16457-7/pbk; 978-3-030-16458-4/ebook). xix, 482 p. (2019).
PDFBibTeX XMLCite
Full Text: DOI

Explicit characterizations for plateaued-Ness of \(p\)-ary (vectorial) functions. (English) Zbl 1420.94122

El Hajji, Said (ed.) et al., Codes, cryptology and information security. Second international conference, C2SI 2017, Rabat, Morocco, April 10–12, 2017. Proceedings – in honor of Claude Carlet. Cham: Springer. Lect. Notes Comput. Sci. 10194, 328-345 (2017).
MSC:  94C10 94D05
PDFBibTeX XMLCite
Full Text: DOI

Towards stream ciphers for efficient FHE with low-noise ciphertexts. (English) Zbl 1384.94086

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 311-343 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Algebraic decomposition for probing security. (English) Zbl 1375.94108

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 742-763 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On o-equivalence of Niho bent functions. (English) Zbl 1400.94199

Koç, Çetin Kaya (ed.) et al., Arithmetic of finite fields. 5th international workshop, WAIFI 2014, Gebze, Turkey, September 27–28, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-319-16276-8/pbk). Lecture Notes in Computer Science 9061, 155-168 (2015).
MSC:  94C10 94A60
PDFBibTeX XMLCite
Full Text: DOI

On the properties of vectorial functions with plateaued components and their consequences on APN functions. (English) Zbl 1441.94119

El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer. Lect. Notes Comput. Sci. 9084, 63-73 (2015).
MSC:  94D10
PDFBibTeX XMLCite
Full Text: DOI

Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. (English) Zbl 1316.68010

Lecture Notes in Computer Science 9084. Cham: Springer (ISBN 978-3-319-18680-1/pbk; 978-3-319-18681-8/ebook). xxv, 375 p. (2015).
PDFBibTeX XMLCite
Full Text: DOI

New construction of differentially 4-uniform bijections. (English) Zbl 1347.94024

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 22-38 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Results on constructions of rotation symmetric bent and semi-bent functions. (English) Zbl 1337.94115

Schmidt, Kai-Uwe (ed.) et al., Sequences and their applications – SETA 2014. 8th international conference, Melbourne, VIC, Australia, November 24–28, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-12324-0/pbk; 978-3-319-12325-7/ebook). Lecture Notes in Computer Science 8865, 21-33 (2014).
MSC:  94D10 05E05 06E30
PDFBibTeX XMLCite
Full Text: DOI

Open problems on binary bent functions. (English) Zbl 1342.94134

Koç, Çetin Kaya (ed.), Open problems in mathematics and computational science. Based on the presentations at the conference, Istanbul, Turkey, September 18–20, 2013. Cham: Springer (ISBN 978-3-319-10682-3/hbk; 978-3-319-10683-0/ebook). 203-241 (2014).
MSC:  94D05
PDFBibTeX XMLCite
Full Text: DOI

Correlation-immune Boolean functions for leakage squeezing and rotating S-box masking against side channel attacks. (English) Zbl 1355.94050

Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 70-74 (2013).
MSC:  94A60 94A62 94D10
PDFBibTeX XMLCite
Full Text: DOI
[Ball, L. Simeon; Blake, Ian; Blokhuis, Aart; Cioaba, Sebastian M.; Colbourn, Charles J.; Ding, Jintai; Dinitz, Jeffrey H.; Dumas, Jean-Guillaume; Ebert, Gary; Effinger, Gove; Enge, Andreas; Fan, Haining; Gong, Guang; Goss, David; Gupta, Kishan Chand; Hasan, M. Anwarul; Hinkelmann, Franziska; Hirschfeld, James W. P.; Huffman, W. Cary; Jedwab, Jonathan; Jungnickel, Dieter; Laubenbacher, Reinhard; Litsyn, Simon; Menezes, Alfred; Mullen, Gary L.; Murty, Kumar; Murty, M. Ram; Niederreiter, Harald; Pernet, Clément; Pott, Alexander; Roetteler, Martin; Schmidt, Kai-Uwe; Stevens, Brett; Storme, Leo; Takeshita, Oscar; Thas, Joseph A.; Thériault, Nicolas; Wan, Zhe-Xian; Winterhof, Arne; Gow, Roderick; Panario, Daniel; Thomson, David; Yucas, Joseph L.; Kyuregyan, Melsik; Ahmadi, Omran; Cohen, Stephen D.; Hou, Xiang-dong; Voloch, Jose Felipe; Gao, Shuhong; Liao, Qunying; Hachenberger, Dirk; Evans, Ronald J.; Rojas-Leon, Antonio; Ostafe, Alina; Garaev, Moubariz Z.; Fitzgerald, Robert; Castro, Francis; Rubio, Ivelisse; Lidl, Rudolf; Zieve, Michael E.; Carlet, Claude; Charpin, Pascale; Kholosha, Alexander; Coulter, Robert; Wang, Qiang; Fried, Michael D.; McGuire, Gary; Helleseth, Tor; Meidl, Wilfried; Shparlinski, Igor; Doche, Christophe; Giesbrecht, Mark; von zur Gathen, Joachim; Kaltofen, Erich; Lecerf, Gregoire; Odlyzko, Andrew; de Smit, Bart; Lenstra, Hendrik; Silverman, Joseph; Bernstein, Daniel J.; Lange, Tanja; Jacobson, Michael John jun.; Scheidler, Renate; Garcia, Arnaldo; Stichtenoth, Henning; Fu, Lei; Blache, Regis; Wan, Daqing]

Handbook of finite fields. (English) Zbl 1319.11001

Discrete Mathematics and Its Applications. Boca Raton, FL: CRC Press (ISBN 978-1-4398-7378-6/hbk; 978-1-4398-7382-3/ebook). xxxv, 1033 p. (2013).
PDFBibTeX XMLCite
Full Text: DOI

Higher-order masking schemes for S-boxes. (English) Zbl 1312.94037

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 366-384 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimal first-order masking with linear and non-linear bijections. (English) Zbl 1291.94123

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 360-377 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Database

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

all top 3

Software