Sparse polynomial approximation in finite fields
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Polynomial Interpolation of the Discrete Logarithm
Designs, Codes and Cryptography
On the Linear Complexity of the Naor–Reingold Pseudo-random Function from Elliptic Curves
Designs, Codes and Cryptography
A New Construction of Central Relative (pa, pa, pa, 1)-Difference Sets
Designs, Codes and Cryptography
On The Correlation Of Binary M-sequences
Designs, Codes and Cryptography
On the Linear Complexity of the Power Generator
Designs, Codes and Cryptography
Cyclic Designs with Block Size 4 and Related Optimal Optical Orthogonal Codes
Designs, Codes and Cryptography
Short Polynomial Representations for Square Roots Modulo p
Designs, Codes and Cryptography
A New Family of Cyclic Difference Sets with Singer Parameters in Characteristic Three
Designs, Codes and Cryptography
Constructions of relative difference sets with classical parameters and circulant weighing matrices
Journal of Combinatorial Theory Series A
On the Distribution of Nonlinear Recursive Congruential Pseudorandom Numbers of Higher Orders
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
On the Generalised Hidden Number Problem and Bit Security of XTR
AAECC-14 Proceedings of the 14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
The Hidden Number Problem in Extension Fields and Its Applications
LATIN '02 Proceedings of the 5th Latin American Symposium on Theoretical Informatics
Nonlinear Vector Resilient Functions
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Hidden Number Problem with the Trace and Bit Security of XTR and LUC
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A Variant of NTRU with Non-invertible Polynomials
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
On the Security of Lenstra's Variant of DSA without Long Inversions
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Solving Underdefined Systems of Multivariate Quadratic Equations
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
The Insecurity of Nyberg-Rueppel and Other DSA-Like Signature Schemes with Partially Known Nonces
CaLC '01 Revised Papers from the International Conference on Cryptography and Lattices
On the Linear Complexity of the Sidelnikov-Lempel-Cohn-Eastman Sequences
Designs, Codes and Cryptography
Cartesian authentication codes from functions with optimal nonlinearity
Theoretical Computer Science
Reliability Mechanisms for Very Large Storage Systems
MSS '03 Proceedings of the 20 th IEEE/11 th NASA Goddard Conference on Mass Storage Systems and Technologies (MSS'03)
Using BIST Control for Pattern Generation
ITC '97 Proceedings of the 1997 IEEE International Test Conference
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
The average dimension of the hull of cyclic codes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
APN functions in odd characteristic
Discrete Mathematics - Special issue: Combinatorics 2000
A note on the number of irreducible polynomials over finite fields
Analysis, combinatorics and computing
On the hardness of approximating the permanent of structured matrices
Computational Complexity
Constructions for Permutation Codes in Powerline Communications
Designs, Codes and Cryptography
Classical and quantum function reconstruction via character evaluation
Journal of Complexity - Special issue on coding and cryptography
Information dynamics of cellular automata I: an algebraic study
Fundamenta Informaticae - Special issue on cellular automata
Self-Reciprocal Irreducible Polynomials Over Finite Fields
Designs, Codes and Cryptography
A coding theory construction of new systematic authentication codes
Theoretical Computer Science - Insightful theory
Design of long period pseudo-random sequences from the addition of m-sequences over Fp
EURASIP Journal on Wireless Communications and Networking - Special issue on innovative signal transmission and detection techniques for next generation cellular CDMA systems
Piecewise Constructions of Bent and Almost Optimal Boolean Functions
Designs, Codes and Cryptography
Generating More MNT Elliptic Curves
Designs, Codes and Cryptography
On the Algebraic Structure of Quasi-cyclic Codes IV: Repeated Roots
Designs, Codes and Cryptography
Quasi-Cyclic Codes from a Finite Affine Plane
Designs, Codes and Cryptography
Improved generalized Atkin algorithm for computing square roots in finite fields
Information Processing Letters
MuSeQoR: multi-path failure-tolerant security-aware QoS routing in ad hoc wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A polynomial algorithm for codes based on directed graphs
CATS '06 Proceedings of the 12th Computing: The Australasian Theroy Symposium - Volume 51
Catalan and Apéry numbers in residue classes
Journal of Combinatorial Theory Series A
Discrete Applied Mathematics
Uncoverings-by-bases for base-transitive permutation groups
Designs, Codes and Cryptography
A family of skew Hadamard difference sets
Journal of Combinatorial Theory Series A
Secret Sharing Schemes with Nice Access Structures
Fundamenta Informaticae - SPECIAL ISSUE ON TRAJECTORIES OF LANGUAGE THEORY Dedicated to the memory of Alexandru Mateescu
LDPC codes from the Hermitian curve
Designs, Codes and Cryptography
Note: Generalized hyper-bent functions over GF(p)
Discrete Applied Mathematics
Algorithms for computing parameters of graph-based extensions of BCH codes
Journal of Discrete Algorithms
Skew Hadamard difference sets from the Ree--Tits slice symplectic spreads in PG(3,32h+1)
Journal of Combinatorial Theory Series A
Quantum period reconstruction of approximate sequences
Information Processing Letters
Existence of Z-cyclic 3PDTWh(p) for Prime p ≡ 1 (mod 4)
Designs, Codes and Cryptography
Hardware organization to achieve high-speed elliptic curve cryptography for mobile devices
Mobile Networks and Applications
On the counting function of the lattice profile of periodic sequences
Journal of Complexity
Probabilistic algorithm for finding roots of linearized polynomials
Designs, Codes and Cryptography
On the number of directions determined by a pair of functions over a prime field
Journal of Combinatorial Theory Series A
Minimal polynomials of the modified de Bruijn sequences
Discrete Applied Mathematics
Periodic multisequences with large error linear complexity
Designs, Codes and Cryptography
Systematic authentication codes using additive polynomials
Designs, Codes and Cryptography
Translation dual of a semifield
Journal of Combinatorial Theory Series A
Semi-regular relative difference sets with large forbidden subgroups
Journal of Combinatorial Theory Series A
Explicit Factorizations of Cyclotomic and Dickson Polynomials over Finite Fields
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher
New Stream Cipher Designs
ICALP '08 Proceedings of the 35th international colloquium on Automata, Languages and Programming, Part II
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Multiplicative Character Sums of Recurring Sequences with Rédei Functions
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Expected Π-Adic Security Measures of Sequences
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Generalized Joint Linear Complexity of Linear Recurring Multisequences
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
A New Tool for Assurance of Perfect Nonlinearity
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Equiangular lines, mutually unbiased bases, and spin models
European Journal of Combinatorics
On the exact t-value of Niederreiter and Sobol' sequences
Journal of Complexity
Note: The existence and construction of a family of block-transitive 2-(v,6,1) designs
Journal of Combinatorial Theory Series A
Optimal and perfect difference systems of sets
Journal of Combinatorial Theory Series A
Classical and Quantum Algorithms for Exponential Congruences
Theory of Quantum Computation, Communication, and Cryptography
Covering arrays of strength 3 and 4 from holey difference matrices
Designs, Codes and Cryptography
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Affine dispersers from subspace polynomials
Proceedings of the forty-first annual ACM symposium on Theory of computing
Using the doubling dimension to analyze the generalization of learning algorithms
Journal of Computer and System Sciences
On the graph of a function over a prime field whose small powers have bounded degree
European Journal of Combinatorics
The Minimum Hamming Distance of Cyclic Codes of Length 2ps
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Fast arithmetics in artin-schreier towers over finite fields
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
Theoretical exploration of pattern attributes for maximum-length shift-register sequences
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n
ISC '09 Proceedings of the 12th International Conference on Information Security
MuSeQoR: Multi-path failure-tolerant security-aware QoS routing in Ad hoc wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the covering structures of two classes of linear codes from perfect nonlinear functions
IEEE Transactions on Information Theory
Bounds and constructions of optimal (n, 4, 2, 1) optical orthogonal codes
IEEE Transactions on Information Theory
Optimal frequency hopping sequences: auto- and cross-correlation properties
IEEE Transactions on Information Theory
A family of m-sequences with five-valued cross correlation
IEEE Transactions on Information Theory
On certain values of Kloosterman sums
IEEE Transactions on Information Theory
Multisequences with large linear and k-error linear complexity from Hermitian function fields
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Rebound Distinguishers: Results on the Full Whirlpool Compression Function
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Discrete Applied Mathematics
Improved generalized Atkin algorithm for computing square roots in finite fields
Information Processing Letters
On the number of distinct elliptic curves in some families
Designs, Codes and Cryptography
Further results on m-sequences with five-valued cross correlation
IEEE Transactions on Information Theory
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Performance versus overhead for fountain codes over Fq
IEEE Communications Letters
Dynamical systems generated by rational functions
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Three constructions of authentication/secrecy codes
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
On building hash functions from multivariate quadratic equations
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
A transform property of Kloosterman sums
Discrete Applied Mathematics
A result on the distribution of quadratic residues with applications to elliptic curve cryptography
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Black-box extension fields and the inexistence of field-homomorphic one-way permutations
ASIACRYPT'07 Proceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security
A note on a class of quadratic permutations over F2n
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Covering and secret sharing with linear codes
DMTCS'03 Proceedings of the 4th international conference on Discrete mathematics and theoretical computer science
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
On the dual of monomial quadratic p-ary bent functions
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
Cyclotomic mapping permutation polynomials over finite fields
SSC'07 Proceedings of the 2007 international conference on Sequences, subsequences, and consequences
Efficiently computable distortion maps for supersingular curves
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Constructions of a class of partition difference family
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
On the structure of cubic and quartic polynomials
Proceedings of the forty-second ACM symposium on Theory of computing
Optimal sets of frequency hopping sequences with large linear spans
IEEE Transactions on Information Theory
Subspace polynomials and limits to list decoding of Reed-Solomon codes
IEEE Transactions on Information Theory
Expected π-adic security measures of sequences
IEEE Transactions on Information Theory
On zeros of exponential polynomials and quantum algorithms
Quantum Information Processing
A family of two-weight irreducible cyclic codes
IEEE Transactions on Information Theory
On the differential and linear efficiency of balanced Feistel networks
Information Processing Letters
Optimal sets of frequency hopping sequences from linear cyclic codes
IEEE Transactions on Information Theory
Some results concerning cryptographically significant mappings over GF(2n)
Designs, Codes and Cryptography
Permutations of finite fields for check digit systems
Designs, Codes and Cryptography
On integer values of Kloosterman sums
IEEE Transactions on Information Theory
The linear complexity of some binary sequences with three-level autocorrelation
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Application of classical hermitian self-orthogonal MDS codes to quantum MDS codes
IEEE Transactions on Information Theory
Graph homomorphisms with complex values: a dichotomy theorem
ICALP'10 Proceedings of the 37th international colloquium conference on Automata, languages and programming
FAW'10 Proceedings of the 4th international conference on Frontiers in algorithmics
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
On the nonlinearity of discrete logarithm in F2n
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Almost p-ary perfect sequences
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Sequences, Bent functions and Jacobsthal sums
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Two classes of permutation polynomials over finite fields
Journal of Combinatorial Theory Series A
Pseudorandom vector sequences derived from triangular polynomial systems with constant multipliers
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Switching construction of planar functions on finite fields
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Constructing tower extensions of finite fields for implementation of pairing-based cryptography
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Multiplicative characters, the weil bound, and polyphase sequence families with low correlation
IEEE Transactions on Information Theory
The linear complexity of binary sequences with optimal autocorrelation
IEEE Transactions on Information Theory
Automorphissm Classification of Cellular Automata
Fundamenta Informaticae - Non-Classical Models of Automata and Applications
Pseudorandom Bits for Polynomials
SIAM Journal on Computing
A Complexity Dichotomy for Partition Functions with Mixed Signs
SIAM Journal on Computing
SIAM Journal on Discrete Mathematics
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Correlation of the two-prime Sidel'nikov sequence
Designs, Codes and Cryptography
On unbalanced Feistel networks with contracting MDS diffusion
Designs, Codes and Cryptography
Designs, Codes and Cryptography
A class of authentication codes with secrecy
Designs, Codes and Cryptography
Association schemes arising from bent functions
Designs, Codes and Cryptography
Analysis of 3-line generalized Feistel networks with double SD-functions
Information Processing Letters
Multiplication of polynomials modulo xn
Theoretical Computer Science
Pseudo-randomness of certain sequences of k symbols with length pq
Journal of Computer Science and Technology
Strongly regular graphs constructed from p-ary bent functions
Journal of Algebraic Combinatorics: An International Journal
F-rank-width of (edge-colored) graphs
CAI'11 Proceedings of the 4th international conference on Algebraic informatics
Efficient multiplication in finite field extensions of degree 5
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
On Dillon's class H of bent functions, Niho bent functions and o-polynomials
Journal of Combinatorial Theory Series A
Inverting HFE systems is quasi-polynomial for all fields
CRYPTO'11 Proceedings of the 31st annual conference on Advances in cryptology
On (Partial) unit memory codes based on Gabidulin codes
Problems of Information Transmission
The linear span of the frequency hopping sequences in optimal sets
Designs, Codes and Cryptography
On applications of singular matrices over finite fields in cryptography
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Quadratic forms of codimension 2 over certain finite fields of even characteristic
Cryptography and Communications
A construction of weakly and non-weakly regular bent functions
Journal of Combinatorial Theory Series A
Sets of orthogonal hypercubes of class r
Journal of Combinatorial Theory Series A
Guest column: complexity dichotomies of counting problems
ACM SIGACT News
Computational Complexity of Holant Problems
SIAM Journal on Computing
Predicting subset sum pseudorandom generators
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Probabilistic multivariate cryptography
VIETCRYPT'06 Proceedings of the First international conference on Cryptology in Vietnam
Efficient software implementations of large finite fields GF(2n) for secure storage applications
ACM Transactions on Storage (TOS)
On the affine transformations of HFE-Cryptosystems and systems with branches
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Frequency/Time hopping sequences with large linear complexities
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Quantum period reconstruction of binary sequences
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Quantum noisy rational function reconstruction
COCOON'05 Proceedings of the 11th annual international conference on Computing and Combinatorics
Ambiguity and deficiency in costas arrays and APN permutations
LATIN'10 Proceedings of the 9th Latin American conference on Theoretical Informatics
Completeness and degeneracy in information dynamics of cellular automata
MFCS'05 Proceedings of the 30th international conference on Mathematical Foundations of Computer Science
On the distribution of some new explicit nonlinear congruential pseudorandom numbers
SETA'04 Proceedings of the Third international conference on Sequences and Their Applications
On compatibility of discrete relations
CASC'05 Proceedings of the 8th international conference on Computer Algebra in Scientific Computing
Asymmetric quantum Reed-Solomon and generalized Reed-Solomon codes
Quantum Information Processing
Classification of self dual quadratic bent functions
Designs, Codes and Cryptography
On explicit factors of cyclotomic polynomials over finite fields
Designs, Codes and Cryptography
Pseudorandom vector sequences of maximal period generated by triangular polynomial dynamical systems
Designs, Codes and Cryptography
Fixed-point tile sets and their applications
Journal of Computer and System Sciences
Accelerating inverse of GF(2n) with precomputation
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
The characterization of 2n-periodic binary sequences with fixed 1-error linear complexity
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Growth of the ideal generated by a quadratic boolean function
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Pairing-Based cryptography at high security levels
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Algorithms for modular counting of roots of multivariate polynomials
LATIN'06 Proceedings of the 7th Latin American conference on Theoretical Informatics
The provable constructive effect of diffusion switching mechanism in CLEFIA-type block ciphers
Information Processing Letters
The quantum query complexity of learning multilinear polynomials
Information Processing Letters
A simple stream cipher with proven properties
Cryptography and Communications
On character sums with distances on the upper half plane over a finite field
Finite Fields and Their Applications
Reversed Dickson polynomials over finite fields
Finite Fields and Their Applications
On certain diagonal equations over finite fields
Finite Fields and Their Applications
Explicit evaluation of some exponential sums
Finite Fields and Their Applications
Some constructions of (t,m,s)-nets with improved parameters
Finite Fields and Their Applications
Elliptic curves and explicit enumeration of irreducible polynomials with two coefficients prescribed
Finite Fields and Their Applications
New Kloosterman sum identities and equalities over finite fields
Finite Fields and Their Applications
On the cycle structure of permutation polynomials
Finite Fields and Their Applications
Second order linear sequence subgroups in finite fields---II
Finite Fields and Their Applications
Trace forms over finite fields of characteristic 2 with prescribed invariants
Finite Fields and Their Applications
Linear complexity over F q and over Fqm for linear recurring sequences
Finite Fields and Their Applications
Highly degenerate quadratic forms over F2
Finite Fields and Their Applications
On monomial graphs of girth eight
Finite Fields and Their Applications
Four classes of permutation polynomials of F2m
Finite Fields and Their Applications
Kloosterman sum identities and low-weight codewords in a cyclic code with two zeros
Finite Fields and Their Applications
Exponential sums with Dickson polynomials
Finite Fields and Their Applications
Enumerating permutation polynomials over finite fields by degree II
Finite Fields and Their Applications
Ducci-sequences and cyclotomic polynomials
Finite Fields and Their Applications
Finite Fields and Their Applications
On the number of rational points on some families of Fermat curves over finite fields
Finite Fields and Their Applications
Finite Fields and Their Applications
On the regular semisimple elements and primary classes of GL(n,q)
Finite Fields and Their Applications
More explicit classes of permutation polynomials of F33m
Finite Fields and Their Applications
Multivariate permutation polynomial systems and nonlinear pseudorandom number generators
Finite Fields and Their Applications
Non-standard sequence subgroups in finite fields
Finite Fields and Their Applications
An estimate on the number of stable quadratic polynomials
Finite Fields and Their Applications
Permutation polynomials of degree 6 or 7 over finite fields of characteristic 2
Finite Fields and Their Applications
Necessary conditions for reversed Dickson polynomials to be permutational
Finite Fields and Their Applications
Improved results on periodic multisequences with large error linear complexity
Finite Fields and Their Applications
Permutations, hyperplanes and polynomials over finite fields
Finite Fields and Their Applications
On pseudorandom numbers from multivariate polynomial systems
Finite Fields and Their Applications
Invariants of trace forms over finite fields of characteristic 2
Finite Fields and Their Applications
On permutation polynomials of prescribed shape
Finite Fields and Their Applications
On the Carlitz rank of permutation polynomials
Finite Fields and Their Applications
Joint linear complexity of arbitrary multisequences consisting of linear recurring sequences
Finite Fields and Their Applications
Exponential sums for nonlinear recurring sequences
Finite Fields and Their Applications
Curves related to Coulter's maximal curves
Finite Fields and Their Applications
Finite Fields and Their Applications
Permutation polynomials and applications to coding theory
Finite Fields and Their Applications
Revisiting Gauss's analogue of the prime number theorem for polynomials over a finite field
Finite Fields and Their Applications
Permutation polynomials of the form (xp-x+δ)s+L(x)
Finite Fields and Their Applications
On the moments of Kloosterman sums and fibre products of Kloosterman curves
Finite Fields and Their Applications
Second order linear sequence subgroups in finite fields
Finite Fields and Their Applications
Number of points on certain hyperelliptic curves defined over finite fields
Finite Fields and Their Applications
On the isotopism classes of finite semifields
Finite Fields and Their Applications
Amorphic association schemes with negative Latin square-type graphs
Finite Fields and Their Applications
On Ritt's decomposition theorem in the case of finite fields
Finite Fields and Their Applications
On constructing permutations of finite fields
Finite Fields and Their Applications
Finite Fields and Their Applications
Irreducible polynomials over finite fields with prescribed trace/prescribed constant term
Finite Fields and Their Applications
New optimal optical orthogonal codes by restrictions to subgroups
Finite Fields and Their Applications
Irreducible polynomials over GF(2) with three prescribed coefficients
Finite Fields and Their Applications
Highly degenerate quadratic forms over finite fields of characteristic 2
Finite Fields and Their Applications
On the singularity of generalised Vandermonde matrices over finite fields
Finite Fields and Their Applications
A construction of a class of maximal Kummer curves
Finite Fields and Their Applications
On the sum of two primitive elements of maximal subfields of a finite field
Finite Fields and Their Applications
On the Density of Normal Bases in Finite Fields
Finite Fields and Their Applications
Sums of Gauss sums and weights of irreducible codes
Finite Fields and Their Applications
A class of permutation polynomials of F2m related to Dickson polynomials
Finite Fields and Their Applications
Recent progress in algebraic design theory
Finite Fields and Their Applications
Editorial: A decade of Finite Fields and Their Applications
Finite Fields and Their Applications
Finite Fields and Their Applications
On the Distribution and Lattice Structure of Nonlinear Congruential Pseudorandom Numbers
Finite Fields and Their Applications
Projective k-arcs and 2-level secret-sharing schemes
Designs, Codes and Cryptography
Necessary conditions and frame constructions for Z -cyclic patterned starter whist tournaments
Discrete Applied Mathematics
On some permutation binomials of the form x2n-1/k+1 + ax over f2n: existence and count
WAIFI'12 Proceedings of the 4th international conference on Arithmetic of Finite Fields
Attack based on direct sum decomposition against the nonlinear filter generator
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
New families of differentially 4-uniform permutations over F22k
SETA'12 Proceedings of the 7th international conference on Sequences and Their Applications
Dickson polynomials, hyperelliptic curves and hyper-bent functions
SETA'12 Proceedings of the 7th international conference on Sequences and Their Applications
Irreducible coefficient relations
SETA'12 Proceedings of the 7th international conference on Sequences and Their Applications
On the aperiodic hamming correlation of frequency-hopping sequences from norm functions
SETA'12 Proceedings of the 7th international conference on Sequences and Their Applications
Linear complexity of binary sequences derived from polynomial quotients
SETA'12 Proceedings of the 7th international conference on Sequences and Their Applications
Secret Sharing Schemes with Nice Access Structures
Fundamenta Informaticae - SPECIAL ISSUE ON TRAJECTORIES OF LANGUAGE THEORY Dedicated to the memory of Alexandru Mateescu
Information Dynamics of Cellular Automata I - An Algebraic Study
Fundamenta Informaticae - Cellular Automata
On the second-order nonlinearities of some bent functions
Information Sciences: an International Journal
Quo vadis quaternion? cryptanalysis of rainbow over non-commutative rings
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Proceedings of the 4th conference on Innovations in Theoretical Computer Science
A construction of bent functions from plateaued functions
Designs, Codes and Cryptography
Quadratic functions with prescribed spectra
Designs, Codes and Cryptography
European Journal of Combinatorics
Advances in the merit factor problem for binary sequences
Journal of Combinatorial Theory Series A
Predicting masked linear pseudorandom number generators over finite fields
Designs, Codes and Cryptography
On the concrete efficiency of probabilistically-checkable proofs
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Asymmetric quantum codes: new codes from old
Quantum Information Processing
Composed products and factors of cyclotomic polynomials over finite fields
Designs, Codes and Cryptography
Elligator: elliptic-curve points indistinguishable from uniform random strings
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
S-box construction from non-permutation power functions
Proceedings of the 6th International Conference on Security of Information and Networks
A polynomial algorithm for codes based on directed graphs
CATS '06 Proceedings of the Twelfth Computing: The Australasian Theory Symposium - Volume 51
Resilience to distinguishing attacks on WG-7 cipher and their generalizations
Cryptography and Communications
Benefits of network coding for unicast application in disruption-tolerant networks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 1.15 |