Search

Showing total 957 results

Search Constraints

Start Over You searched for: Topic mathematics Remove constraint Topic: mathematics Journal designs, codes and cryptography Remove constraint Journal: designs, codes and cryptography Publisher springer science and business media llc Remove constraint Publisher: springer science and business media llc
957 results

Search Results

1. Hamming codes for wet paper steganography

2. New $$M$$ M -ary sequences with low autocorrelation from interleaved technique

3. A family of linear codes from constant dimension subspace codes

4. Diagonal groups and arcs over groups

5. Combinatorial invariants for nets of conics in $$\mathrm {PG}(2,q)$$

6. On the properties of generalized cyclotomic binary sequences of period $$2p^m$$

7. Construction of $${\text {MDS}}$$ matrices from generalized Feistel structures

8. The phantom of differential characteristics

9. On constructions and properties of (n, m)-functions with maximal number of bent components

10. Uniform encodings to elliptic curves and indistinguishable point representation

11. New MDS self-dual codes over finite fields of odd characteristic

12. Constructions of optimal locally recoverable codes via Dickson polynomials

13. Steiner systems $$S(2, 4, \frac{3^m-1}{2})$$ and 2-designs from ternary linear codes of length $$\frac{3^m-1}{2}$$

14. Provable security against impossible differential and zero correlation linear cryptanalysis of some feistel structures

15. Partitioned difference families versus zero-difference balanced functions

16. Equiangular tight frames from group divisible designs

17. Constructing infinite families of low differential uniformity (n, m)-functions with $$m>n/2$$ m > n / 2

18. Linear codes from weakly regular plateaued functions and their secret sharing schemes

19. On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures

20. A construction of q-ary linear codes with irreducible cyclic codes

21. Cryptanalysis of MORUS

22. On the (in)efficiency of non-interactive secure multiparty computation

23. Three-weight ternary linear codes from a family of cyclic difference sets

24. A correction to: on the linear complexity of the Sidelnikov–Lempel–Cohn–Eastman sequences

25. Hermitian LCD codes from cyclic codes

26. Conditional cube attack on round-reduced River Keyak

27. Constructions of cyclic quaternary constant-weight codes of weight three and distance four

28. Infinite families of 3-designs from a type of five-weight code

29. Cyclic subspace codes via subspace polynomials

30. A combinatorial problem related to sparse systems of equations

31. Quantum MDS codes with relatively large minimum distance from Hermitian self-orthogonal codes

32. Joint data and key distribution of simple, multiple, and multidimensional linear cryptanalysis test statistic and its impact to data complexity

33. On the direct construction of recursive MDS matrices

34. Explicit factorizations of cyclotomic polynomials over finite fields

35. Complete weight enumerators of a class of linear codes

36. Sudoku-like arrays, codes and orthogonality

37. Construction of a (k, n)-visual cryptography scheme

38. New criterion for diffusion property and applications to improved GFS and EGFN

39. Comparison of perfect table cryptanalytic tradeoff algorithms

40. Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension

41. Constructions and analysis of some efficient $$t$$ t - $$(k,n)^*$$ ( k , n ) ∗ -visual cryptographic schemes using linear algebraic techniques

42. A general check digit system based on finite groups

43. Bent vectorial functions and linear codes from o-polynomials

44. Theory of 2-rotation symmetric cubic Boolean functions

45. A matrix approach for constructing quadratic APN functions

46. Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks

47. 4-Cycle decompositions of $$( \lambda +m)K_{v+u} {\setminus } \lambda K_v$$ ( λ + m ) K v + u \ λ K v

48. On relative constant-weight codes

49. Building blockcipher from small-block tweakable blockcipher

50. Optimal assignment schemes for general access structures based on linear programming