AMCO - volume 13 - 2019 论文列表 |
点击这里查看 Advances in Mathematics of Communications 的JCR分区、影响因子等信息 |
Kishan Chand Gupta Sumit Kumar Pandey Indranil Ghosh Ray Susanta Samanta
Identity-based key aggregate cryptosystem from multilinear maps.Sikhar Patranabis Debdeep Mukhopadhyay
The secure link prediction problem. sfDWCDM+: A BBB secure nonce based MAC.Nilanjan Datta Avijit Dutta Mridul Nandi Kan Yasuda
Revisiting design principles of Salsa and ChaCha.Sabyasachi Dey Tapabrata Roy Santanu Sarkar
Another look at success probability of linear cryptanalysis.Subhabrata Samajder Palash Sarkar
Embedding cover-free families and cryptographical applications.Thaís Bardini Idalino Lucia Moura
Landscape Boolean functions.Constanza Riera Pantelimon Stanica
A network reliability approach to the analysis of combinatorial repairable threshold schemes.Bailey Kacsmar Douglas R. Stinson
Differential uniformity and the associated codes of cryptographic functions. Some cryptanalytic and coding-theoretic applications of a soft stern algorithm.Qian Guo Thomas Johansson Erik Mårtensson Paul Stankovski Wagner
Critical perspectives on provable security: Fifteen years of "another look" papers. Guest editorial.Eun-Kyung Cho Cunsheng Ding Jong Yoon Hyun
A subspace code of size 333 in the setting of a binary q-analog of the Fano plane.Daniel Heinlein Michael Kiermaier Sascha Kurz Alfred Wassermann
A unified polynomial selection method for the (tower) number field sieve algorithm. New non-binary quantum codes from constacyclic codes over $ \mathbb{F}_q[u, v]/\langle u^{2}-1, v^{2}-v, uv-vu\rangle $.Fanghui Ma Jian Gao Fang-Wei Fu
Exponential generalised network descriptors.Suzana Antunovic Tonci Kokan Tanja Vojkovic Damir Vukicevic
Optimal subspace codes in $ {{\rm{PG}}}(4, q) $. More cyclotomic constructions of optimal frequency-hopping sequences.Felipe Cabarcas Daniel Cabarcas John Baena
Constructions of optimal balanced (m, n, 4, 5, 1)-OOSPCs.Wei Li Hengming Zhao Rongcun Qin Dianhua Wu
Symmetries of weight enumerators and applications to Reed-Muller codes. Further results on optimal (n, {3,4,5}, Λa, 1, Q)-OOCs.Huangsheng Yu Feifei Xie Dianhua Wu Hengming Zhao
Some new constructions of isodual and LCD codes over finite fields.Fatma-Zohra Benahmed Kenza Guenda Aicha Batoul Thomas Aaron Gulliver
Some classes of LCD codes and self-orthogonal codes over finite fields.Xia Li Feng Cheng Chunming Tang Zhengchun Zhou
A new construction of rotation symmetric bent functions with maximal algebraic degree. Type-preserving matrices and security of block ciphers. Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants. Self-dual additive 픽4-codes of lengths up to 40 represented by circulant graphs.Chengju Li Sunghan Bae Shudi Yang
On the security of the WOTS-PRF signature scheme.Philip Lafrance Alfred Menezes
Double circulant self-dual and LCD codes over Galois rings.Minjia Shi Daitao Huang Lin Sok Patrick Solé
New 2-designs over finite fields from derived and residual designs.Michael Braun Michael Kiermaier Reinhard Laue
Cyclic DNA codes over 픽2[u, v]/ u3, v2-v, vu-uv>. The weight distribution of a class of p-ary cyclic codes and their applications. Further improvement of factoring N = pr qs with partial known bits.Shixiong Wang Longjiang Qu Chao Li Huaxiong Wang
Maximum weight spectrum codes.Tim L. Alderson Alessandro Neri
Optimal information ratio of secret sharing schemes on Dutch windmill graphs.Bagher Bagherpour Shahrooz Janbaz Ali Zaghian
Wave-shaped round functions and primitive groups.Riccardo Aragona Marco Calderini Roberto Civino Massimiliano Sala Ilaria Zappatore
Connecting Legendre with Kummer and Edwards.Sabyasachi Karati Palash Sarkar
The secrecy capacity of the arbitrarily varying wiretap channel under list decoding. Strongly secure quantum ramp secret sharing constructed from algebraic curves over finite fields.