Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ccds/ccds7.bht:"
@article{DBLP:journals/ccds/BauerJPRW15, author = {Aur{\'{e}}lie Bauer and {\'{E}}liane Jaulmes and Emmanuel Prouff and Jean{-}Ren{\'{e}} Reinhard and Justine Wild}, title = {Horizontal collision correlation attack on elliptic curves - - Extended Version -}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {91--119}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0111-8}, doi = {10.1007/S12095-014-0111-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BauerJPRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BelaidGS15, author = {Sonia Bela{\"{\i}}d and Vincent Grosso and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Masking and leakage-resilient primitives: One, the other(s) or both?}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {163--184}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0113-6}, doi = {10.1007/S12095-014-0113-6}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BelaidGS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/BilginNNRTV15, author = {Beg{\"{u}}l Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Natalia N. Tokareva and Valeriya Vitkup}, title = {Threshold implementations of small S-boxes}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {3--33}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0104-7}, doi = {10.1007/S12095-014-0104-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/BilginNNRTV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CarletF15, author = {Claude Carlet and Pierre{-}Alain Fouque}, title = {Guest Editorial}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0115-4}, doi = {10.1007/S12095-014-0115-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CarletF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/CastroGM15, author = {Francis N. Castro and Oscar E. Gonz{\'{a}}lez and Luis A. Medina}, title = {A divisibility approach to the open boundary cases of Cusick-Li-St{\unicode{462}}nic{\unicode{462}}'s conjecture}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {379--402}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0124-y}, doi = {10.1007/S12095-015-0124-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/CastroGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ChakrabortyHS15, author = {Debrup Chakraborty and Vicente Hernandez{-}Jimenez and Palash Sarkar}, title = {Another look at {XCB}}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {439--468}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0127-8}, doi = {10.1007/S12095-015-0127-8}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ChakrabortyHS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/ClavierIMW15, author = {Christophe Clavier and Quentin Isorez and Damien Marion and Antoine Wurcker}, title = {Complete reverse-engineering of AES-like block ciphers by {SCARE} and {FIRE} attacks}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {121--162}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0112-7}, doi = {10.1007/S12095-014-0112-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/ClavierIMW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/EdemskiyI15, author = {Vladimir Edemskiy and Andrey Ivanov}, title = {The linear complexity of balanced quaternary sequences with optimal autocorrelation value}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {485--496}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0130-0}, doi = {10.1007/S12095-015-0130-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/EdemskiyI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuoL15, author = {Chun Guo and Dongdai Lin}, title = {Improved domain extender for the ideal cipher}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {509--533}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0128-7}, doi = {10.1007/S12095-015-0128-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuoL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/GuptaR15, author = {Kishan Chand Gupta and Indranil Ghosh Ray}, title = {Cryptographically significant {MDS} matrices based on circulant and circulant-like matrices for lightweight applications}, journal = {Cryptogr. Commun.}, volume = {7}, number = {2}, pages = {257--287}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0116-3}, doi = {10.1007/S12095-014-0116-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/GuptaR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HePWW15, author = {Jing Jane He and Daniel Panario and Qiang Wang and Arne Winterhof}, title = {Linear complexity profile and correlation measure of interleaved sequences}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {497--508}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0131-z}, doi = {10.1007/S12095-015-0131-Z}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HePWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HodzicP15, author = {Samir Hodzic and Enes Pasalic}, title = {Generalized Bent Functions - Some General Construction Methods and Related Necessary and Sufficient Conditions}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {469--483}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0126-9}, doi = {10.1007/S12095-015-0126-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HodzicP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HuW15, author = {Zhi Hu and Lin Wang}, title = {Injectivity of compressing maps on the set of primitive sequences modulo square-free odd integers}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {347--361}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0121-6}, doi = {10.1007/S12095-014-0121-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HuW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Jolly15, author = {Nathan Jolly}, title = {An algebra of arrays and almost perfect watermarks}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {363--377}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0123-z}, doi = {10.1007/S12095-015-0123-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Jolly15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Li15, author = {Yuan Li}, title = {Characterization of robust immune symmetric boolean functions}, journal = {Cryptogr. Commun.}, volume = {7}, number = {3}, pages = {297--315}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0120-7}, doi = {10.1007/S12095-014-0120-7}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Li15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiLD15, author = {Mingchao Li and Miao Liang and Beiliang Du}, title = {A construction of t-fold perfect splitting authentication codes with equal deception probabilities}, journal = {Cryptogr. Commun.}, volume = {7}, number = {2}, pages = {207--215}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0107-4}, doi = {10.1007/S12095-014-0107-4}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiLD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LiY15, author = {Chengju Li and Qin Yue}, title = {The Walsh transform of a class of monomial functions and cyclic codes}, journal = {Cryptogr. Commun.}, volume = {7}, number = {2}, pages = {217--228}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0109-2}, doi = {10.1007/S12095-014-0109-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LiY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/LuoLJ15, author = {Yiyuan Luo and Xuejia Lai and Tiejun Jia}, title = {Attacks on a double length blockcipher-based hash proposal}, journal = {Cryptogr. Commun.}, volume = {7}, number = {3}, pages = {289--295}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0117-2}, doi = {10.1007/S12095-014-0117-2}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/LuoLJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MazumdarMS15, author = {Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Indranil Sengupta}, title = {Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {35--69}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0108-3}, doi = {10.1007/S12095-014-0108-3}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MazumdarMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/MrabetFGL15, author = {Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin and Ronan Lashermes}, title = {A survey of fault attacks in pairing based cryptography}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {185--205}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0114-5}, doi = {10.1007/S12095-014-0114-5}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/MrabetFGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/NikolicWW15, author = {Ivica Nikolic and Lei Wang and Shuang Wu}, title = {The parallel-cut meet-in-the-middle attack}, journal = {Cryptogr. Commun.}, volume = {7}, number = {3}, pages = {331--345}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0118-1}, doi = {10.1007/S12095-014-0118-1}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/NikolicWW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Ortiz-Ubarri15, author = {Jos{\'{e}} R. Ortiz{-}Ubarri}, title = {New families of asymptotically optimal doubly periodic arrays with ideal correlation constraints}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {403--414}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0122-0}, doi = {10.1007/S12095-015-0122-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Ortiz-Ubarri15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/RahimipourAG15, author = {Ali Reza Rahimipour and A. R. Ashrafi and Ahmad Gholami}, title = {The existence of minimal logarithmic signatures for the sporadic Suzuki and simple Suzuki groups}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {535--542}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0129-6}, doi = {10.1007/S12095-015-0129-6}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/RahimipourAG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Sarkar15, author = {Santanu Sarkar}, title = {Further non-randomness in RC4, {RC4A} and {VMPC}}, journal = {Cryptogr. Commun.}, volume = {7}, number = {3}, pages = {317--330}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0119-0}, doi = {10.1007/S12095-014-0119-0}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Sarkar15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/Sharma15, author = {Anuradha Sharma}, title = {Repeated-root constacyclic codes of length {\(\mathscr{l}\)} t p s and their dual codes}, journal = {Cryptogr. Commun.}, volume = {7}, number = {2}, pages = {229--255}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0106-5}, doi = {10.1007/S12095-014-0106-5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/Sharma15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/SwansonS15, author = {Colleen M. Swanson and Douglas R. Stinson}, title = {Extended results on privacy against coalitions of users in user-private information retrieval protocols}, journal = {Cryptogr. Commun.}, volume = {7}, number = {4}, pages = {415--437}, year = {2015}, url = {https://doi.org/10.1007/s12095-015-0125-x}, doi = {10.1007/S12095-015-0125-X}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/SwansonS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/TunstallJ15, author = {Michael Tunstall and Marc Joye}, title = {The distributions of individual bits in the output of multiplicative operations}, journal = {Cryptogr. Commun.}, volume = {7}, number = {1}, pages = {71--90}, year = {2015}, url = {https://doi.org/10.1007/s12095-014-0110-9}, doi = {10.1007/S12095-014-0110-9}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/TunstallJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.