Pub Date : 2022-06-02DOI: 10.1007/s12095-022-00589-0
Praveen Kumar, P. Sarkar, S. Majhi, S. Paul
{"title":"A direct construction of even length ZCPs with large ZCZ ratio","authors":"Praveen Kumar, P. Sarkar, S. Majhi, S. Paul","doi":"10.1007/s12095-022-00589-0","DOIUrl":"https://doi.org/10.1007/s12095-022-00589-0","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":"15 1","pages":"85-94"},"PeriodicalIF":1.4,"publicationDate":"2022-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43515053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-20DOI: 10.1007/s12095-022-00587-2
L. Budaghyan, I. Ivkovic, Nikolay S. Kaleyski
{"title":"Triplicate functions","authors":"L. Budaghyan, I. Ivkovic, Nikolay S. Kaleyski","doi":"10.1007/s12095-022-00587-2","DOIUrl":"https://doi.org/10.1007/s12095-022-00587-2","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":"15 1","pages":"35-83"},"PeriodicalIF":1.4,"publicationDate":"2022-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47575107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-19DOI: 10.1007/s12095-022-00583-6
Sandeep Sharma, Anuradha Sharma
{"title":"Multi-twisted additive codes over finite fields are asymptotically good","authors":"Sandeep Sharma, Anuradha Sharma","doi":"10.1007/s12095-022-00583-6","DOIUrl":"https://doi.org/10.1007/s12095-022-00583-6","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":"15 1","pages":"17-33"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46309199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-19DOI: 10.1007/s12095-022-00590-7
Xiaoqin Hong, X. Cao
{"title":"Generalized block inserting for constructing new constant dimension codes","authors":"Xiaoqin Hong, X. Cao","doi":"10.1007/s12095-022-00590-7","DOIUrl":"https://doi.org/10.1007/s12095-022-00590-7","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":"15 1","pages":"1-15"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47602524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-18DOI: 10.1007/s12095-022-00582-7
Ziteng Huang, Weijun Fang, Fang-Wei Fu
{"title":"Linear ℓ-intersection pairs of MDS codes and their applications to AEAQECCs","authors":"Ziteng Huang, Weijun Fang, Fang-Wei Fu","doi":"10.1007/s12095-022-00582-7","DOIUrl":"https://doi.org/10.1007/s12095-022-00582-7","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":"14 1","pages":"1189 - 1206"},"PeriodicalIF":1.4,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45502211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-14DOI: 10.1007/s12095-022-00586-3
Boran Kim
{"title":"Quantum codes from one-point codes on norm-trace curves","authors":"Boran Kim","doi":"10.1007/s12095-022-00586-3","DOIUrl":"https://doi.org/10.1007/s12095-022-00586-3","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":"14 1","pages":"1179 - 1188"},"PeriodicalIF":1.4,"publicationDate":"2022-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49419869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-11DOI: 10.1007/s12095-022-00571-w
Y. Chen, Avijit Dutta, M. Nandi
{"title":"Multi-user BBB security of public permutations based MAC","authors":"Y. Chen, Avijit Dutta, M. Nandi","doi":"10.1007/s12095-022-00571-w","DOIUrl":"https://doi.org/10.1007/s12095-022-00571-w","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":"14 1","pages":"1145 - 1177"},"PeriodicalIF":1.4,"publicationDate":"2022-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46551801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-05-03DOI: 10.1007/s12095-022-00581-8
S. Eddahmani, Sihem Mesnager
{"title":"Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes","authors":"S. Eddahmani, Sihem Mesnager","doi":"10.1007/s12095-022-00581-8","DOIUrl":"https://doi.org/10.1007/s12095-022-00581-8","url":null,"abstract":"","PeriodicalId":48936,"journal":{"name":"Cryptography and Communications-Discrete-Structures Boolean Functions and Sequences","volume":"14 1","pages":"1301 - 1344"},"PeriodicalIF":1.4,"publicationDate":"2022-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42806723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}