119 results on '"Mesnager, Sihem"'
Search Results
2. On the Evolution of Boomerang Uniformity in Cryptographic S-boxes
3. A Suitable Proposal of S-Boxes (Inverse-Like) for the AES, Their Analysis and Performances
4. Further Results on Bent–Negabent Boolean Functions
5. POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack
6. Privacy as a Service: Anonymisation of NetFlow Traces
7. On Good Polynomials over Finite Fields for Optimal Locally Recoverable Codes
8. On Plateaued Functions, Linear Structures and Permutation Polynomials
9. Characterizations of Partially Bent and Plateaued Functions over Finite Fields
10. Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks
11. Subclasses of Bent Functions: Hyper-Bent Functions
12. Bent Functions: Primary Constructions (Part II)
13. Boolean Functions and Cryptography
14. Class , Niho Bent Functions and o-Polynomials
15. Bent Functions: Secondary Constructions
16. Bent Functions-Generalities
17. Plateaued Functions: Generalities and Characterizations
18. Bent Functions: Primary Constructions (Part I)
19. Various Cryptographic and Algebraic Generalizations of Bent Functions
20. Generalities on Boolean Functions and p-Ary Functions
21. Linear Codes from Bent, Semi-bent and Almost Bent Functions
22. Mathematical Foundations
23. (Hyper)-Bent Functions, Exponential Sums and (Hyper-)elliptic Curves
24. Plateaued Boolean Functions: Constructions of Semi-bent Functions
25. Bent Functions and (Partial-)spreads
26. Bent Functions in Arbitrary Characteristic
27. Bent Vectorial Functions
28. Hyper-Bent Functions: Primary Constructions with Multiple Trace Terms
29. Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions
30. New Bent Functions from Permutations and Linear Translators
31. High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication
32. Secret Sharing Schemes with General Access Structures
33. Results on Characterizations of Plateaued Functions in Arbitrary Characteristic
34. A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs
35. Partially Homomorphic Encryption Schemes over Finite Fields
36. Variations on Minimal Linear Codes
37. On the Diffusion Property of Iterated Functions
38. Bent and Semi-bent Functions via Linear Translators
39. On Existence (Based on an Arithmetical Problem) and Constructions of Bent Functions
40. Characterizations of Plateaued and Bent Functions in Characteristic
41. On Semi-bent Functions and Related Plateaued Functions Over the Galois Field
42. On Minimal and Quasi-minimal Linear Codes
43. Semi-bent Functions from Oval Polynomials
44. Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves
45. Dickson Polynomials, Hyperelliptic Curves and Hyper-bent Functions
46. Binary Kloosterman Sums with Value 4
47. On the Link of Some Semi-bent Functions with Kloosterman Sums
48. On a Conjecture about Binary Strings Distribution
49. Hyper-bent Boolean Functions with Multiple Trace Terms
50. A New Family of Hyper-Bent Boolean Functions in Polynomial Form
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.