筛选条件 共查询到244条结果
排序方式
Simple and efficient FE for quadratic functions

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (8)

This paper presents two functional encryption schemes for quadratic functions (or degree-2 polynomials) achieving simulation-based security in the sem......

Construction of lightweight involutory MDS matrices

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)

In this paper, we propose an efficient method to find lightweight involutory MDS matrices. To obtain involutory matrices, we give a necessary and suff......

Wide minimal binary linear codes from the general Maiorana-McFarland class

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)

Minimal linear codes form a special class of linear codes that have important applications in secret sharing and secure two-party computation. These c......

MDS or NMDS self-dual codes from twisted generalized Reed-Solomon codes

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (9)

Self-dual maximum distance separable codes (self-dual MDS codes) and self-dual near MDS (NMDS) codes are very important in coding theory and practice.......

Differential spectra of a class of power permutations with characteristic 5

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (6)

Let n be a positive integer and F(x) = x(d) over F-5(n), where d = 5(n)-3/2 . In this paper, we study the differential properties of the power permuta......

Good polynomials for optimal LRC of low locality

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)

According to a magnific method due to I. Tamo and A. Barg, a class of polynomials over finite fields, called good polynomials, was introduced and used......

Large sets with multiplicity

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)

Large sets of combinatorial designs has always been a fascinating topic in design theory. These designs form a partition of the whole space into combi......

A family of projective two-weight linear codes

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (8)

Projective two-weight linear codes are closely related to finite projective spaces and strongly regular graphs. In this paper, a family of q-ary two-w......

Some classes of power functions with low c-differential uniformity over finite fields

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (6)

Functions with low c-differential uniformity have optimal resistance to some types of differential cryptanalysis. In this paper, we investigate the c-......

Breaking LWC candidates: sESTATE and Elephant in quantum setting

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)

The competition for lightweight cryptography (LWC) launched by the National Institute of Standards and Technology (NIST) is an ongoing project calling......

Security analysis of Subterranean 2.0

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (8)

Subterranean 2.0 is a cipher suite that can be used for hashing, authenticated encryption, MAC computation, etc. It was designed by Daemen, Massolino,......

On the properties of generalized cyclotomic binary sequences of period 2p(m)

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)

Xiao, Zeng, Li and Helleseth proposed new generalized cyclotomic binary sequences s(infinity) of period p(m) and showed that these sequences are almos......

The projective general linear group PGL(2, 2(m)) and linear codes of length 2(m)+1

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)

Let q = 2(m). The projective general linear group PGL(2, q) acts as a 3-transitive permutation group on the set of points of the projective line. The ......

Flag-transitive 4-designs and PSL(2, q) groups

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (6)

This paper is a contribution to the classification of flag-transitive 4-(v, k, lambda) designs. Let D = (P, B) be a 4-(q + 1, k, lambda) design with l......

Novel generic construction of leakage-resilient PKE scheme with CCA security

期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)

Leakage of private state information (e.g. the secret keys) through various leakage attacks (e.g. side channel attacks, cold-boot attacks, etc) has be......

共244条页码: 1/17页15条/页