Search dblp for Publications

export results for "toc:db/journals/ccds/ccds7.bht:"

 download as .bib file

@article{DBLP:journals/ccds/BauerJPRW15,
  author       = {Aur{\'{e}}lie Bauer and
                  {\'{E}}liane Jaulmes and
                  Emmanuel Prouff and
                  Jean{-}Ren{\'{e}} Reinhard and
                  Justine Wild},
  title        = {Horizontal collision correlation attack on elliptic curves - - Extended
                  Version -},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {91--119},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0111-8},
  doi          = {10.1007/S12095-014-0111-8},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BauerJPRW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BelaidGS15,
  author       = {Sonia Bela{\"{\i}}d and
                  Vincent Grosso and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Masking and leakage-resilient primitives: One, the other(s) or both?},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {163--184},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0113-6},
  doi          = {10.1007/S12095-014-0113-6},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BelaidGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BilginNNRTV15,
  author       = {Beg{\"{u}}l Bilgin and
                  Svetla Nikova and
                  Ventzislav Nikov and
                  Vincent Rijmen and
                  Natalia N. Tokareva and
                  Valeriya Vitkup},
  title        = {Threshold implementations of small S-boxes},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {3--33},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0104-7},
  doi          = {10.1007/S12095-014-0104-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BilginNNRTV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CarletF15,
  author       = {Claude Carlet and
                  Pierre{-}Alain Fouque},
  title        = {Guest Editorial},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {1--2},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0115-4},
  doi          = {10.1007/S12095-014-0115-4},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CarletF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CastroGM15,
  author       = {Francis N. Castro and
                  Oscar E. Gonz{\'{a}}lez and
                  Luis A. Medina},
  title        = {A divisibility approach to the open boundary cases of Cusick-Li-St{\unicode{462}}nic{\unicode{462}}'s
                  conjecture},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {379--402},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-015-0124-y},
  doi          = {10.1007/S12095-015-0124-Y},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CastroGM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/ChakrabortyHS15,
  author       = {Debrup Chakraborty and
                  Vicente Hernandez{-}Jimenez and
                  Palash Sarkar},
  title        = {Another look at {XCB}},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {439--468},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-015-0127-8},
  doi          = {10.1007/S12095-015-0127-8},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/ChakrabortyHS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/ClavierIMW15,
  author       = {Christophe Clavier and
                  Quentin Isorez and
                  Damien Marion and
                  Antoine Wurcker},
  title        = {Complete reverse-engineering of AES-like block ciphers by {SCARE}
                  and {FIRE} attacks},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {121--162},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0112-7},
  doi          = {10.1007/S12095-014-0112-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/ClavierIMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/EdemskiyI15,
  author       = {Vladimir Edemskiy and
                  Andrey Ivanov},
  title        = {The linear complexity of balanced quaternary sequences with optimal
                  autocorrelation value},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {485--496},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-015-0130-0},
  doi          = {10.1007/S12095-015-0130-0},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/EdemskiyI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/GuoL15,
  author       = {Chun Guo and
                  Dongdai Lin},
  title        = {Improved domain extender for the ideal cipher},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {509--533},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-015-0128-7},
  doi          = {10.1007/S12095-015-0128-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/GuoL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/GuptaR15,
  author       = {Kishan Chand Gupta and
                  Indranil Ghosh Ray},
  title        = {Cryptographically significant {MDS} matrices based on circulant and
                  circulant-like matrices for lightweight applications},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {2},
  pages        = {257--287},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0116-3},
  doi          = {10.1007/S12095-014-0116-3},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/GuptaR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/HePWW15,
  author       = {Jing Jane He and
                  Daniel Panario and
                  Qiang Wang and
                  Arne Winterhof},
  title        = {Linear complexity profile and correlation measure of interleaved sequences},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {497--508},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-015-0131-z},
  doi          = {10.1007/S12095-015-0131-Z},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/HePWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/HodzicP15,
  author       = {Samir Hodzic and
                  Enes Pasalic},
  title        = {Generalized Bent Functions - Some General Construction Methods and
                  Related Necessary and Sufficient Conditions},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {469--483},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-015-0126-9},
  doi          = {10.1007/S12095-015-0126-9},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/HodzicP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/HuW15,
  author       = {Zhi Hu and
                  Lin Wang},
  title        = {Injectivity of compressing maps on the set of primitive sequences
                  modulo square-free odd integers},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {347--361},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0121-6},
  doi          = {10.1007/S12095-014-0121-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/HuW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Jolly15,
  author       = {Nathan Jolly},
  title        = {An algebra of arrays and almost perfect watermarks},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {363--377},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-015-0123-z},
  doi          = {10.1007/S12095-015-0123-Z},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Jolly15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Li15,
  author       = {Yuan Li},
  title        = {Characterization of robust immune symmetric boolean functions},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {3},
  pages        = {297--315},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0120-7},
  doi          = {10.1007/S12095-014-0120-7},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Li15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/LiLD15,
  author       = {Mingchao Li and
                  Miao Liang and
                  Beiliang Du},
  title        = {A construction of t-fold perfect splitting authentication codes with
                  equal deception probabilities},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {2},
  pages        = {207--215},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0107-4},
  doi          = {10.1007/S12095-014-0107-4},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/LiLD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/LiY15,
  author       = {Chengju Li and
                  Qin Yue},
  title        = {The Walsh transform of a class of monomial functions and cyclic codes},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {2},
  pages        = {217--228},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0109-2},
  doi          = {10.1007/S12095-014-0109-2},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/LiY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/LuoLJ15,
  author       = {Yiyuan Luo and
                  Xuejia Lai and
                  Tiejun Jia},
  title        = {Attacks on a double length blockcipher-based hash proposal},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {3},
  pages        = {289--295},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0117-2},
  doi          = {10.1007/S12095-014-0117-2},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/LuoLJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/MazumdarMS15,
  author       = {Bodhisatwa Mazumdar and
                  Debdeep Mukhopadhyay and
                  Indranil Sengupta},
  title        = {Construction of RSBFs with improved cryptographic properties to resist
                  differential fault attack on grain family of stream ciphers},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {35--69},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0108-3},
  doi          = {10.1007/S12095-014-0108-3},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/MazumdarMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/MrabetFGL15,
  author       = {Nadia El Mrabet and
                  Jacques J. A. Fournier and
                  Louis Goubin and
                  Ronan Lashermes},
  title        = {A survey of fault attacks in pairing based cryptography},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {185--205},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0114-5},
  doi          = {10.1007/S12095-014-0114-5},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/MrabetFGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/NikolicWW15,
  author       = {Ivica Nikolic and
                  Lei Wang and
                  Shuang Wu},
  title        = {The parallel-cut meet-in-the-middle attack},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {3},
  pages        = {331--345},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0118-1},
  doi          = {10.1007/S12095-014-0118-1},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/NikolicWW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Ortiz-Ubarri15,
  author       = {Jos{\'{e}} R. Ortiz{-}Ubarri},
  title        = {New families of asymptotically optimal doubly periodic arrays with
                  ideal correlation constraints},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {403--414},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-015-0122-0},
  doi          = {10.1007/S12095-015-0122-0},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Ortiz-Ubarri15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/RahimipourAG15,
  author       = {Ali Reza Rahimipour and
                  A. R. Ashrafi and
                  Ahmad Gholami},
  title        = {The existence of minimal logarithmic signatures for the sporadic Suzuki
                  and simple Suzuki groups},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {535--542},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-015-0129-6},
  doi          = {10.1007/S12095-015-0129-6},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/RahimipourAG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Sarkar15,
  author       = {Santanu Sarkar},
  title        = {Further non-randomness in RC4, {RC4A} and {VMPC}},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {3},
  pages        = {317--330},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0119-0},
  doi          = {10.1007/S12095-014-0119-0},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Sarkar15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Sharma15,
  author       = {Anuradha Sharma},
  title        = {Repeated-root constacyclic codes of length {\(\mathscr{l}\)} t p s
                  and their dual codes},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {2},
  pages        = {229--255},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0106-5},
  doi          = {10.1007/S12095-014-0106-5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Sharma15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/SwansonS15,
  author       = {Colleen M. Swanson and
                  Douglas R. Stinson},
  title        = {Extended results on privacy against coalitions of users in user-private
                  information retrieval protocols},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {4},
  pages        = {415--437},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-015-0125-x},
  doi          = {10.1007/S12095-015-0125-X},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/SwansonS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/TunstallJ15,
  author       = {Michael Tunstall and
                  Marc Joye},
  title        = {The distributions of individual bits in the output of multiplicative
                  operations},
  journal      = {Cryptogr. Commun.},
  volume       = {7},
  number       = {1},
  pages        = {71--90},
  year         = {2015},
  url          = {https://doi.org/10.1007/s12095-014-0110-9},
  doi          = {10.1007/S12095-014-0110-9},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/TunstallJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics