期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (8)
This paper presents two functional encryption schemes for quadratic functions (or degree-2 polynomials) achieving simulation-based security in the sem......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)
In this paper, we propose an efficient method to find lightweight involutory MDS matrices. To obtain involutory matrices, we give a necessary and suff......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)
Minimal linear codes form a special class of linear codes that have important applications in secret sharing and secure two-party computation. These c......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (9)
Self-dual maximum distance separable codes (self-dual MDS codes) and self-dual near MDS (NMDS) codes are very important in coding theory and practice.......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (6)
Let n be a positive integer and F(x) = x(d) over F-5(n), where d = 5(n)-3/2 . In this paper, we study the differential properties of the power permuta......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)
According to a magnific method due to I. Tamo and A. Barg, a class of polynomials over finite fields, called good polynomials, was introduced and used......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)
Large sets of combinatorial designs has always been a fascinating topic in design theory. These designs form a partition of the whole space into combi......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (8)
Projective two-weight linear codes are closely related to finite projective spaces and strongly regular graphs. In this paper, a family of q-ary two-w......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (6)
Functions with low c-differential uniformity have optimal resistance to some types of differential cryptanalysis. In this paper, we investigate the c-......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)
The competition for lightweight cryptography (LWC) launched by the National Institute of Standards and Technology (NIST) is an ongoing project calling......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (8)
Subterranean 2.0 is a cipher suite that can be used for hashing, authenticated encryption, MAC computation, etc. It was designed by Daemen, Massolino,......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)
Xiao, Zeng, Li and Helleseth proposed new generalized cyclotomic binary sequences s(infinity) of period p(m) and showed that these sequences are almos......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)
Let q = 2(m). The projective general linear group PGL(2, q) acts as a 3-transitive permutation group on the set of points of the projective line. The ......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (6)
This paper is a contribution to the classification of flag-transitive 4-(v, k, lambda) designs. Let D = (P, B) be a 4-(q + 1, k, lambda) design with l......
期刊: DESIGNS CODES AND CRYPTOGRAPHY, 2021; 89 (7)
Leakage of private state information (e.g. the secret keys) through various leakage attacks (e.g. side channel attacks, cold-boot attacks, etc) has be......