DIKUL - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 165
1.
  • New differentially 4-unifor... New differentially 4-uniform permutations by modifying the inverse function on subfields
    Peng, Jie; Tan, Chik How Cryptography and communications, 05/2017, Volume: 9, Issue: 3
    Journal Article
    Peer reviewed

    Permutations over 𝔽 2 2 k with low differential uniformity, high algebraic degree and high nonlinearity are of great cryptographic importance since they can be chosen as the substitution boxes ...
Full text
Available for: UL
2.
Full text
Available for: UL
3.
  • On the design and security ... On the design and security of Lee metric McEliece cryptosystems
    Lau, Terry Shue Chien; Tan, Chik How Designs, codes, and cryptography, 03/2022, Volume: 90, Issue: 3
    Journal Article
    Peer reviewed

    Recently, Horlemann-Trautmann and Weger (Adv Math Commun, https://doi.org/10.3934/amc.2020089 , 2020) proposed a general framework for a Quaternary McEliece cryptosystem over the ring Z 4 , and ...
Full text
Available for: UL
4.
  • The Explicit Dual of Leande... The Explicit Dual of Leander's Monomial Bent Function
    LI, Yanjun; KAN, Haibin; PENG, Jie ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 09/2021, Volume: E104.A, Issue: 9
    Journal Article
    Peer reviewed

    Permutation polynomials and their compositional inverses are crucial for construction of Maiorana-McFarland bent functions and their dual functions, which have the optimal nonlinearity for resisting ...
Full text
Available for: UL
5.
  • A New 10-Variable Cubic Ben... A New 10-Variable Cubic Bent Function Outside the Completed Maiorana-McFarland Class
    LI, Yanjun; KAN, Haibin; PENG, Jie ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 09/2021, Volume: E104.A, Issue: 9
    Journal Article
    Peer reviewed

    In this letter, we present a construction of bent functions which generalizes a work of Zhang et al. in 2016. Based on that, we obtain a cubic bent function in 10 variables and prove that, it has no ...
Full text
Available for: UL
6.
  • On the second-order nonline... On the second-order nonlinearity of the hidden weighted bit function
    Wang, Qichun; Tan, Chik How Discrete Applied Mathematics, 12/2016, Volume: 215
    Journal Article
    Peer reviewed
    Open access

    The hidden weighted bit function (HWBF) is a well-known benchmark function in the branching program literature. In Wang et al. (2014),authors investigated the cryptographic properties of the HWBF and ...
Full text
Available for: UL

PDF
7.
  • On the security of the modi... On the security of the modified Dual-ouroboros PKE using Gabidulin codes
    Lau, Terry Shue Chien; Tan, Chik How; Prabowo, Theo Fanuela Applicable algebra in engineering, communication and computing, 12/2021, Volume: 32, Issue: 6
    Journal Article
    Peer reviewed

    Recently, Kim et al. proposed a modified Dual-Ouroboros public-key encryption ( PKE ) using Gabidulin codes to overcome the limitation of having decryption failure in the original Dual-Ouroboros ...
Full text
Available for: UL
8.
  • New rank codes based encryp... New rank codes based encryption scheme using partial circulant matrices
    Lau, Terry Shue Chien; Tan, Chik How Designs, codes, and cryptography, 12/2019, Volume: 87, Issue: 12
    Journal Article
    Peer reviewed

    We propose a new rank metric code based encryption based on the hard problem of rank syndrome decoding problem. We consider a generator matrix for Gabidulin codes in the form of k -partial circulant ...
Full text
Available for: UL
9.
  • More New Classes of Differe... More New Classes of Differentially 4-Uniform Permutations with Good Cryptographic Properties
    PENG, Jie; TAN, Chik How; WANG, Qichun ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 06/2018, Volume: E101.A, Issue: 6
    Journal Article
    Peer reviewed

    Research on permutation polynomials over the finite field F22k with significant cryptographical properties such as possibly low differential uniformity, possibly high nonlinearity and algebraic ...
Full text
Available for: UL
10.
  • On the covering radius of t... On the covering radius of the third order Reed–Muller code RM(3, 7)
    Wang, Qichun; Tan, Chik How; Prabowo, Theo Fanuela Designs, codes, and cryptography, 01/2018, Volume: 86, Issue: 1
    Journal Article
    Peer reviewed

    The covering radius of the third order Reed–Muller code of length 128 has been an open problem for many years. The best upper bound of it is known to be 22. In this paper, we give a sufficient and ...
Full text
Available for: UL
1 2 3 4 5
hits: 165

Load filters