| Quantum codes over F-p from cyclic codes over F-p[u, v]/< u(2)- v(3) - v, uv - vu > |
10 |
| A note on the constructions of MDS self-dual codes |
7 |
| Some bounds on binary LCD codes |
6 |
| Cellular automata based S-boxes |
6 |
| A survey on the applications of Niho exponents |
6 |
| Some quantum MDS codes with large minimum distance from generalized Reed-Solomon codes |
6 |
| The exact autocorrelation distribution and 2-adic complexity of a class of binary sequences with almost optimal autocorrelation |
5 |
| A lower bound on the 2-adic complexity of the modified Jacobi sequence |
5 |
| Two constructions of asymptotically optimal codebooks |
5 |
| A lower bound on the size of the largest metrically regular subset of the Boolean cube |
5 |
| Cryptanalysis of a homomorphic encryption scheme |
5 |
| Binary linear complementary dual codes |
5 |
| Compositional inverses of permutation polynomials of the form x(r)h(x(s)) over finite fields |
4 |
| On a class of permutation trinomials in characteristic 2 |
4 |
| Permutation polynomials of the form cx + Tr (ql/q) (x(a)) and permutation trinomials over finite fields with even characteristic |
4 |
| Construction of de Bruijn sequences from product of two irreducible polynomials |
4 |
| Several new classes of self-dual bent functions derived from involutions |
3 |
| Classification and Construction of quaternary self-dual bent functions |
3 |
| Binary linear codes with two or three weights from niho exponents |
3 |
| Malleability of the blockchain's entropy |
3 |
| Integer codes correcting sparse byte errors |
3 |
| Searchable symmetric encryption over multiple servers |
3 |
| On the nonlinearity of Boolean functions with restricted input |
3 |
| On new quantum codes from matrix product codes |
3 |
| The symbol-pair distance distribution of a class of repeated-root cyclic codes over F-pm |
3 |
| On the differential equivalence of APN functions |
3 |
| Complete weight enumerators of a class of two-weight linear codes |
3 |
| Statistical integral distinguisher with multi-structure and its application on AES-like ciphers |
2 |
| Design and analysis of small-state grain-like stream ciphers |
2 |
| A note on the chi-square method: A tool for proving cryptographic security |
2 |
| On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks |
2 |
| Several new classes of linear codes with few weights |
2 |
| Good integers and some applications in coding theory |
2 |
| KISS: A bit too simple |
2 |
| The multiplicative complexity of 6-variable Boolean functions |
2 |
| New permutation trinomials from Niho exponents over finite fields with even characteristic |
2 |
| Decomposition of permutations in a finite field |
2 |
| Changing APN functions at two points |
2 |
| On affine variety codes from the Klein quartic |
2 |
| Some new balanced and almost balanced quaternary sequences with low autocorrelation |
2 |
| A family of weightwise (almost) perfectly balanced boolean functions with optimal algebraic immunity |
2 |
| Perfect sequences over the quaternions and (4n, 4n, 2n)-relative difference sets in C-n x Q(8) |
2 |
| Five classes of optimal two-weight linear codes |
2 |
| The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields |
1 |
| Correlation immune functions with respect to the q-transform |
1 |
| Nonlinear vectorial primitive recursive sequences |
1 |
| On the nonlinearity of monotone Boolean functions |
1 |
| A new class of permutation trinomials constructed from Niho exponents |
1 |
| On the pseudorandomness of automatic sequences |
1 |
| A sequence construction of cyclic codes over finite fields |
1 |