A public-key cryptosystem based on shift register sequences
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Proceedings on Advances in cryptology---CRYPTO '86
The probabilistic theory of linear complexity
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Communications of the ACM - Special issue on simulation
Constructions of bent functions and difference sets
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Efficient and portable combined Tausworthe random number generators
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Finding (good) normal bases in finite fields
ISSAC '91 Proceedings of the 1991 international symposium on Symbolic and algebraic computation
IEEE Transactions on Computers - Special issue on computer arithmetic
Bit-Serial Systolic Divider and Multiplier for Finite Fields GF(2/sup m/)
IEEE Transactions on Computers - Special issue on computer arithmetic
On the lattice structure of the add-with-carry and subtract-with-borrow random number generators
ACM Transactions on Modeling and Computer Simulation (TOMACS)
A search for good multiple recursive random number generators
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Pseudorandom vector generation by the inversive method
ACM Transactions on Modeling and Computer Simulation (TOMACS)
On the linear complexity of products of shift-register sequences
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Digital inversive pseudorandom numbers
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Extremal bipartite graphs and superpolynomial lower bounds for monotone span programs
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
On the limit of maximal density of sequences with a PerfectLinear Complexity Profile
Designs, Codes and Cryptography
A Note on Sequences with the Shift and Add Property
Designs, Codes and Cryptography
Low-Complexity Bit-Parallel Canonical and Normal Basis Multipliers for a Class of Finite Fields
IEEE Transactions on Computers
Montgomery Multiplication in GF(2^k
Designs, Codes and Cryptography
Analysis of protocol sequences for slow frequency hopping
Wireless Networks
On-Line Error Detection for Bit-Serial Multipliers in GF(2m)
Journal of Electronic Testing: Theory and Applications
2-by-n$n$ Hybrid Cellular Automata with Regular Configuration: Theory and Application
IEEE Transactions on Computers
Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering
Designs, Codes and Cryptography
Mastrovito Multiplier for All Trinomials
IEEE Transactions on Computers
Sparse 0-1-matrices and forbidden hypergraphs
Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms
Quasi-Monte Carlo via linear shift-register sequences
Proceedings of the 31st conference on Winter simulation: Simulation---a bridge to the future - Volume 1
A factoring algorithm in F2[x]
SAC '98 Proceedings of the 1998 ACM symposium on Applied Computing
Mastrovito Multiplier for General Irreducible Polynomials
IEEE Transactions on Computers
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Efficient Normal Basis Multipliers in Composite Fields
IEEE Transactions on Computers
Algorithm 806: SPRNG: a scalable library for pseudorandom number generation
ACM Transactions on Mathematical Software (TOMS)
An Efficient Optimal Normal Basis Type II Multiplier
IEEE Transactions on Computers
Efficient parallel exponentiation in GF(2n) using normal basis representations
Proceedings of the thirteenth annual ACM symposium on Parallel algorithms and architectures
IEEE Transactions on Computers
Generalized Lehmer-Tausworthe random number generators
ACM-SE 30 Proceedings of the 30th annual Southeast regional conference
A new hardware architecture for operations In GF (2m)
IEEE Transactions on Computers
A new class of linear feedback shift register generators
Proceedings of the 32nd conference on Winter simulation
Handbook of wireless networks and mobile computing
A New Construction of Massey-Omura Parallel Multiplier over GF(2^{m})
IEEE Transactions on Computers
Equally Spaced Polynomials, Dual Bases, and Multiplication in F2^n
IEEE Transactions on Computers
An RNS Architecture for Quasi-Chaotic Oscillators
Journal of VLSI Signal Processing Systems
Wavelength routing in optical networks of diameter two
Journal of Computational and Applied Mathematics - Special issue: Probabilistic methods in combinatorics and combinatorial optimization
Perfect Baer Subplane Partitions and Three-DimensionalFlag-Transitive Planes
Designs, Codes and Cryptography
All q^m-ary CyclicCodes with Cyclic q-ary Image AreKnown
Designs, Codes and Cryptography
VLSI Algorithms, Architectures, and Implementation of a Versatile GF(2m) Processor
IEEE Transactions on Computers
A New Hardware Architecture for Operations in GF(2m)
IEEE Transactions on Computers
A Modified Massey-Omura Parallel Multiplier for a Class of Finite Fields
IEEE Transactions on Computers
Architecture For A Low Complexity Rate-Adaptive Reed-Solomon Encoder
IEEE Transactions on Computers
Zero-Aliasing for Modeled Faults
IEEE Transactions on Computers
GF(2m) Multiplication and Division Over the Dual Basis
IEEE Transactions on Computers
Analysis of One-Dimensional Linear Hybrid Cellular Automata over GF(q)
IEEE Transactions on Computers
Linear complexity, k-error linear complexity, and the discrete Fourier transform
Journal of Complexity
Mastrovito Multiplier for General Irreducible Polynomials
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
The Euclidean Algorithm and Primitive Polypomials over Finite Fields
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Signature Schemes Based on 3rd Order Shift Registers
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
An ASIC Implementation of the AES SBoxes
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Further Results on Multiples of Primitive Polynomials and Their Products over GF(2)
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Multiples of Primitive Polynomials and Their Products over GF(2)
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
New Public Key Cryptosystem Using Finite Non Abelian Groups
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
An Application of Codes to Attribute-Efficient Learning
EuroCOLT '99 Proceedings of the 4th European Conference on Computational Learning Theory
Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002]
Cryptographic Counters and Applications to Electronic Voting
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Decimation Attack of Stream Ciphers
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Statistical Physics of Low Density Parity Check Error Correcting Codes
Proceedings of the 8th IMA International Conference on Cryptography and Coding
A New Aspect of Dual Basis for Efficient Field Arithmetic
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Redundant Representation of Finite Fields
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A Lattice Based Public Key Cryptosystem Using Polynomial Representations
PKC '03 Proceedings of the 6th International Workshop on Theory and Practice in Public Key Cryptography: Public Key Cryptography
A High Performance Reconfigurable Elliptic Curve Processor for GF(2m)
CHES '00 Proceedings of the Second International Workshop on Cryptographic Hardware and Embedded Systems
Efficient Rijndael Encryption Implementation with Composite Field Arithmetic
CHES '01 Proceedings of the Third International Workshop on Cryptographic Hardware and Embedded Systems
Dual-Field Arithmetic Unit for GF(p) and GF(2m)
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
Efficient Subgroup Exponentiation in Quadratic and Sixth Degree Extensions
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
The advanced encryption standard
Cryptologia
Strong tractability of multivariate integration using quasi-Monte Carlo algorithms
Mathematics of Computation
IEEE Transactions on Computers
Advanced lectures on networking
Efficient galois field arithmetic on SIMD architectures
Proceedings of the fifteenth annual ACM symposium on Parallel algorithms and architectures
Finite field linear algebra subroutines
Proceedings of the 2002 international symposium on Symbolic and algebraic computation
Primality and identity testing via Chinese remaindering
Journal of the ACM (JACM)
Primality and Identity Testing via Chinese Remaindering
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
Approximation of boolean functions by combinatorial rectangles
Theoretical Computer Science
Symmetry properties of multiple recursive random number generators in full period and spectral test
Applied Mathematics and Computation
Computer algebra handbook
A system of high-dimensional, efficient, long-cycle and portable uniform random number generators
ACM Transactions on Modeling and Computer Simulation (TOMACS)
Constructing Composite Field Representations for Efficient Conversion
IEEE Transactions on Computers
IEEE Transactions on Computers
Fonctions de partitions à parité périodique
European Journal of Combinatorics
Applications of finite fields to dynamical systems and reverse engineering problems
Proceedings of the 2004 ACM symposium on Applied computing
Picturing qubits in phase space
IBM Journal of Research and Development
Efficient digit-serial normal basis multipliers over binary extension fields
ACM Transactions on Embedded Computing Systems (TECS)
Towards fault-tolerant cryptographic computations over finite fields
ACM Transactions on Embedded Computing Systems (TECS)
Modeling and analyzing finite state automata in the finite field F2
Mathematics and Computers in Simulation - Special issue: Selected papers from the 4th IMACS symposium on mathematical modelling (4th MATHMOD)
A wide family of nonlinear filter functions with a large linear span
Information Sciences—Informatics and Computer Science: An International Journal
Low Complexity Word-Level Sequential Normal Basis Multipliers
IEEE Transactions on Computers
Efficient and portable multiple recursive generators of large order
ACM Transactions on Modeling and Computer Simulation (TOMACS)
A New Method for Constructing Williamson Matrices
Designs, Codes and Cryptography
Simple PCPs with poly-log rate and query complexity
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
Efficient parallel exponentiation in GF(qn) using normal basis representations
Journal of Algorithms
High-speed systolic architectures for finite field inversion
Integration, the VLSI Journal - Special issue: ACM great lakes symposium on VLSI
Multi-sequences with d-perfect property
Journal of Complexity
Join-distinct aggregate estimation over update streams
Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Designs, Codes and Cryptography
Concurrent Error Detection in a Bit-Parallel Systolic Multiplier for Dual Basis of GF(2m)
Journal of Electronic Testing: Theory and Applications
Designs, Codes and Cryptography
IEEE Transactions on Computers
Efficient Algorithms and Architectures for Field Multiplication Using Gaussian Normal Bases
IEEE Transactions on Computers
A New Characterization of Semi-bent and Bent Functions on Finite Fields*
Designs, Codes and Cryptography
On the xorshift random number generators
ACM Transactions on Modeling and Computer Simulation (TOMACS)
The enumerability of P collapses P to NC
Theoretical Computer Science - Mathematical foundations of computer science 2004
Bit-Parallel Finite Field Multipliers for Irreducible Trinomials
IEEE Transactions on Computers
Proceedings of the conference on Design, automation and test in Europe: Proceedings
Explicit capacity-achieving list-decodable codes
Proceedings of the thirty-eighth annual ACM symposium on Theory of computing
Concurrent Error Detection in a Polynomial Basis Multiplier over GF(2m)
Journal of Electronic Testing: Theory and Applications
The capacity of ciphers fulfilling the accessibility of cryptograms
Enhanced methods in computer security, biometric and artificial intelligence systems
Analysis of non-linear pseudo-noise sequences
Enhanced methods in computer security, biometric and artificial intelligence systems
Algebraic simplification of GP programs during evolution
Proceedings of the 8th annual conference on Genetic and evolutionary computation
A polynomial algorithm for codes based on directed graphs
CATS '06 Proceedings of the 12th Computing: The Australasian Theroy Symposium - Volume 51
Algebraic number theory and code design for Rayleigh fading channels
Communications and Information Theory
Enumeration of inequivalent irreducible Goppa codes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Results on multiples of primitive polynomials and their products over GF(2)
Theoretical Computer Science
CReconfigurable finite field instruction set architecture
Proceedings of the 2007 ACM/SIGDA 15th international symposium on Field programmable gate arrays
Reconfigurable system for high-speed and diversified AES using FPGA
Microprocessors & Microsystems
The limitations of nice mutually unbiased bases
Journal of Algebraic Combinatorics: An International Journal
New infinite families of 3-designs from algebraic curves over Fq
European Journal of Combinatorics
Algorithms for computing parameters of graph-based extensions of BCH codes
Journal of Discrete Algorithms
Projective aspects of the AES inversion
Designs, Codes and Cryptography
Complexity of Ring Morphism Problems
Computational Complexity
Comb Architectures for Finite Field Multiplication in F(2^m)
IEEE Transactions on Computers
Polynomial Identity Testing for Depth 3 Circuits
Computational Complexity
Division of trinomials by pentanomials and orthogonal arrays
Designs, Codes and Cryptography
Low-complexity bit-parallel systolic multipliers over GF(2m)
Integration, the VLSI Journal
Algorithmic results in list decoding
Foundations and Trends® in Theoretical Computer Science
C-testable bit parallel multipliers over GF(2m)
ACM Transactions on Design Automation of Electronic Systems (TODAES)
A dynamic key management solution to access hierarchy
International Journal of Network Management
On complexity of normal basis multiplier using modified Booth's algorithm
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
On complexity of normal basis multiplier using modified Booth's algorithm
AIC'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Informatics and Communications - Volume 7
A novel Conference Key Management solution for Secure Dynamic Conferencing
International Journal of Security and Networks
Maximum distance separable poset codes
Designs, Codes and Cryptography
Linear cellular automata as discrete models for generating cryptographic sequences
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Multiplexer-based bit-parallel systolic multipliers over GF(2m)
Computers and Electrical Engineering
Genetic programming for medical classification: a program simplification approach
Genetic Programming and Evolvable Machines
Low complexity bit parallel multiplier for GF (2m) generated by equally-spaced trinomials
Information Processing Letters
A novel AES cryptographic core highly resistant to differential power analysis attacks
Proceedings of the 21st annual symposium on Integrated circuits and system design
The trace of an optimal normal element and low complexity normal bases
Designs, Codes and Cryptography
Extractors for binary elliptic curves
Designs, Codes and Cryptography
A New Parallel Multiplier for Type II Optimal Normal Basis
Computational Intelligence and Security
A Twin for Euler's φ Function in $\mathbb{F}_2[X]$
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Discrete Phase-Space Structures and Mutually Unbiased Bases
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
PRESENT: An Ultra-Lightweight Block Cipher
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Montgomery Residue Representation Fault-Tolerant Computation in GF(2k)
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Digit-Serial Structures for the Shifted Polynomial Basis Multiplication over Binary Extension Fields
WAIFI '08 Proceedings of the 2nd international workshop on Arithmetic of Finite Fields
Cellular Automata-Based Structures to Compute the Solutions of Linear Difference Equations
ACRI '08 Proceedings of the 8th international conference on Cellular Automata for Reseach and Industry
Using Normal Bases for Compact Hardware Implementations of the AES S-Box
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
On the Use of Linear Cellular Automata for the Synthesis of Cryptographic Sequences
HAIS '08 Proceedings of the 3rd international workshop on Hybrid Artificial Intelligence Systems
A distance-labelling problem for hypercubes
Discrete Applied Mathematics
Strategic attack on the shrinking generator
Theoretical Computer Science
A general mixing strategy for the ECB-Mix-ECB mode of operation
Information Processing Letters
A matricial public key cryptosystem with digital signature
WSEAS Transactions on Mathematics
An efficient cryptosystem Delta for stream cipher applications
Computers and Electrical Engineering
An optimized pseudorandom generator using packed matrices
WSEAS Transactions on Information Science and Applications
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Improved throughput bit-serial multiplier for GF(2m) fields
Integration, the VLSI Journal
Scalable parallel multiple recursive generators of large order
Parallel Computing
Combined circuit architecture for computing normal basis and montgomery multiplications over GF(2m)
Mobility '08 Proceedings of the International Conference on Mobile Technology, Applications, and Systems
Proceedings of the 2009 Asia and South Pacific Design Automation Conference
Modified clock-controlled alternating step generators
Computer Communications
Scalable and Systolic Montgomery Multipliers over GF(2m)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Breaking RSA Generically Is Equivalent to Factoring
EUROCRYPT '09 Proceedings of the 28th Annual International Conference on Advances in Cryptology: the Theory and Applications of Cryptographic Techniques
Artin automorphisms, cyclotomic function fields, and folded list-decodable codes
Proceedings of the forty-first annual ACM symposium on Theory of computing
Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes
Journal of the ACM (JACM)
Permutation group approach to association schemes
European Journal of Combinatorics
Low-complexity bit-parallel multiplier over GF(2m) using dual basis representation
Journal of Computer Science and Technology
A Non-abelian Group Based on Block Upper Triangular Matrices with Cryptographic Applications
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
A class of generalized LDPC codes with fast parallel decoding algorithms
IEEE Communications Letters
Low-complexity bit-parallel dual basis multipliers using the modified Booth's algorithm
Computers and Electrical Engineering
Concurrent error detection architectures for Gaussian normal basis multiplication over GF(2m)
Integration, the VLSI Journal
An algorithm for computing minimal bidirectional linear recurrence relations
IEEE Transactions on Information Theory
Efficient tweakable enciphering schemes from (block-wise) universal hash functions
IEEE Transactions on Information Theory
Algebraic immunity of S-boxes based on power mappings: analysis and construction
IEEE Transactions on Information Theory
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Quadratic Equations from a Kind of S-boxes
Information Security Applications
Enumeration of inequivalent irreducible Goppa codes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Fast, prime factor, discrete Fourier transform algorithms over GF(2m) for 8≤m≤10
Information Sciences: an International Journal
High-speed systolic architectures for finite field inversion
Integration, the VLSI Journal - Special issue: ACM great lakes symposium on VLSI
Efficient parallel exponentiation in GF(qn) using normal basis representations
Journal of Algorithms
A bit-serial word-parallel finite field multiplier using redundant basis in F2M
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
A high-speed word level finite field multiplier in F2m using redundant representation
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Speeding up Euclid's GCD algorithm with no magnitude comparisons
International Journal of Information and Computer Security
An iteratively decodable tensor product code with application to data storage
IEEE Journal on Selected Areas in Communications
Efficient compromising resilient authentication schemes for large scale wireless sensor networks
Proceedings of the third ACM conference on Wireless network security
On the optimal Halton sequence
Mathematics and Computers in Simulation
Constructing efficient linear local features in image processing and analysis problems
Automation and Remote Control
Sequences with almost perfect linear complexity profile
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
S-boxes with controllable nonlinearity
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Random number generators with period divisible by a Mersenne prime
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartI
Efficient inversion algorithm for optimal normal bases type II
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartI
An efficient algorithm for computing inverses in GF(2m) using dual bases
ICCS'03 Proceedings of the 2003 international conference on Computational science
Generic GF(2m) arithmetic in software and its application to ECC
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Clock-controlled shrinking generator of feedback shift registers
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Minimalilty of finite automata representation in hybrid systems control
HSCC'07 Proceedings of the 10th international conference on Hybrid systems: computation and control
On the number of equivalence classes in certain stream ciphers
ICCSA'03 Proceedings of the 2003 international conference on Computational science and its applications: PartIII
Constructing elliptic curves with prescribed embedding degrees
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Construct public key encryption scheme using ergodic matrices over GF(2)
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
New description of SMS4 by an embedding over GF(28)
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
An hybrid approach for efficient multicast stream authentication over unsecured channels
ProvSec'07 Proceedings of the 1st international conference on Provable security
The secure DAES design for embedded system application
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Fault-tolerant finite field computation in the public key cryptosystems
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Novel algebraic structure for cyclic codes
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Extended norm-trace codes with optimized correction capability
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Quasi-cyclic LDPC codes: an algebraic construction
IEEE Transactions on Communications
Algebraic decoding of a class of binary cyclic codes via Lagrange interpolation formula
IEEE Transactions on Information Theory
Decoding of high rate convolutional codes using the dual trellis
IEEE Transactions on Information Theory
Unusual general error locator polynomial for the (23, 12, 7) golay Code
IEEE Communications Letters
Whirlwind: a new cryptographic hash function
Designs, Codes and Cryptography
Optimal solutions for single fault localization in two dimensional lattice networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
Modified self-shrinking generator
Computers and Electrical Engineering
Maps admitting trialities but not dualities
European Journal of Combinatorics
An efficient P2P content distribution system based on altruistic demand and recoding dissemination
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans - Special issue on model-based diagnostics
Galois field hardware architectures for network coding
Proceedings of the 6th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
Recent results on recursive nonlinear pseudorandom number generators
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Ternary Kloosterman sums modulo 18 using Stickelberger's theorem
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Clock-controlled FCSR sequence with large linear complexity
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Nega-hadamard transform, bent and Negabent functions
SETA'10 Proceedings of the 6th international conference on Sequences and their applications
Low complexity digit serial systolic montgomery multipliers for special class of GF(2m)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A modified low complexity digit-level Gaussian normal basis multiplier
WAIFI'10 Proceedings of the Third international conference on Arithmetic of finite fields
Decoding binary cyclic codes with irreducible generator polynomials up to actual minimum distance
IEEE Communications Letters
Speedup of bit-parallel Karatsuba multiplier in GF(2 m) generated by trinomials
Information Processing Letters
Test generation in systolic architecture for multiplication over GF(2m)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Customizable elliptic curve cryptosystems
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Linear recurring sequences for the UOV key generation
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
New constructing of regular Hadamard matrices
ICCOMP'06 Proceedings of the 10th WSEAS international conference on Computers
The software performance of authenticated-encryption modes
FSE'11 Proceedings of the 18th international conference on Fast software encryption
Structural properties of cryptographic sequences
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Generation of pseudorandom binary sequences with controllable cryptographic parameters
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part I
Information Processing Letters
On applications of singular matrices over finite fields in cryptography
InfoSecHiComNet'11 Proceedings of the First international conference on Security aspects in information technology
Primality tests based on fermat's little theorem
ICDCN'06 Proceedings of the 8th international conference on Distributed Computing and Networking
Deterministic analysis of balancedness in symmetric cryptography
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Online program simplification in genetic programming
SEAL'06 Proceedings of the 6th international conference on Simulated Evolution And Learning
On the scrambled soboĺ sequence
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part III
Introducing a new variant of fast algebraic attacks and minimizing their successive data complexity
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Modified serial multipliers for Type-IV gaussian normal bases
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Upper bounds on algebraic immunity of boolean power functions
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Explicit formulae of polynomial basis squarer for pentanomials using weakly dual basis
Integration, the VLSI Journal
On the correlation between parity and modular polynomials
MFCS'06 Proceedings of the 31st international conference on Mathematical Foundations of Computer Science
Automorphisms of finite rings and applications to complexity of problems
STACS'05 Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science
ACRI'06 Proceedings of the 7th international conference on Cellular Automata for Research and Industry
A simple acceptance/rejection criterium for sequence generators in symmetric cryptography
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III
CHES'05 Proceedings of the 7th international conference on Cryptographic hardware and embedded systems
The independence of two randomness properties of sequences over finite fields
Journal of Complexity
VLSI performance evaluation and analysis of systolic and semisystolic finite field multipliers
ACSAC'05 Proceedings of the 10th Asia-Pacific conference on Advances in Computer Systems Architecture
Improved rijndael-like s-box and its transform domain analysis
SETA'06 Proceedings of the 4th international conference on Sequences and Their Applications
Understanding two-round differentials in AES
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Properties of the discrete differential with cryptographic applications
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Large families of pseudorandom sequences of k symbols and their complexity: Part I
General Theory of Information Transfer and Combinatorics
Large families of pseudorandom sequences of k symbols and their complexity: part II
General Theory of Information Transfer and Combinatorics
Perturbing and protecting a traceable block cipher
CMS'06 Proceedings of the 10th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
New variant of the self-shrinking generator and its cryptographic properties
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
On the linearity of cryptographic sequence generators
ICCSA'10 Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part II
Application of LFSRs in time/memory trade-off cryptanalysis
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Divisibility of polynomials over finite fields and combinatorial applications
Designs, Codes and Cryptography
The geometry of distributions in formal methods
2FACS'97 Proceedings of the 2nd BCS-FACS conference on Northern Formal Methods
Concurrency and Computation: Practice & Experience
Cryptographic applications of 3x3 block upper triangular matrices
HAIS'12 Proceedings of the 7th international conference on Hybrid Artificial Intelligent Systems - Volume Part II
Non-standard sequence subgroups in finite fields
Finite Fields and Their Applications
A note on adjacency preservers on hermitian matrices over finite fields
Finite Fields and Their Applications
On the parity of the number of irreducible factors of self-reciprocal polynomials over finite fields
Finite Fields and Their Applications
On puncturing of codes from Norm--Trace curves
Finite Fields and Their Applications
Isomorphism classes of hyperelliptic curves of genus 3 over finite fields
Finite Fields and Their Applications
On the Minimal Polynomial of the Product of Linear Recurring Sequences
Finite Fields and Their Applications
Algebraic curves and cryptography
Finite Fields and Their Applications
Dynamical Zeta Functions for Typical Extensions of Full Shifts
Finite Fields and Their Applications
Power Sums over Finite Subspaces of a Field
Finite Fields and Their Applications
GHB#: a provably secure HB-like lightweight authentication protocol
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
A Lower Bound of the Second-order Nonlinearities of Boolean Bent Functions
Fundamenta Informaticae
Large-Order Multiple Recursive Generators with Modulus 231-1
INFORMS Journal on Computing
Integration, the VLSI Journal
Adleman-Manders-Miller root extraction method revisited
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
A complete characterization of irreducible cyclic orbit codes and their Plücker embedding
Designs, Codes and Cryptography
Weighted Reed---Muller codes revisited
Designs, Codes and Cryptography
Parallel GF(3m) multiplier for trinomials
Information Processing Letters
Computing the linear complexity for sequences with characteristic polynomial fv
Cryptography and Communications
Linear recurring sequences for the UOV key generation revisited
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
New bit parallel multiplier with low space complexity for all irreducible trinomials over GF(2n)
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
A polynomial algorithm for codes based on directed graphs
CATS '06 Proceedings of the Twelfth Computing: The Australasian Theory Symposium - Volume 51
A new multi-linear universal hash family
Designs, Codes and Cryptography
Hi-index | 0.38 |