DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 13.170
1.
  • Propagation criterion for m... Propagation criterion for monotone Boolean functions with least vector support set of 1 or 2 elements
    Isaev, Gleb A. Discrete mathematics and applications, 04/2024, Letnik: 34, Številka: 2
    Journal Article
    Recenzirano

    The propagation criterion for monotone Boolean functions with least vector support sets consisting of one or two vectors is studied. We obtain necessary and sufficient conditions for the validity of ...
Celotno besedilo
Dostopno za: UL
2.
  • Pseudo-Boolean Functions fo... Pseudo-Boolean Functions for Optimal Z-Complementary Code Sets With Flexible Lengths
    Sarkar, Palash; Majhi, Sudhan; Liu, Zilong IEEE signal processing letters, 2021, Letnik: 28
    Journal Article
    Recenzirano
    Odprti dostop

    This paper aims to construct optimal Z-complementary code set (ZCCS) with non-power-of-two (NPT) lengths to enable interference-free multicarrier code-division multiple access (MC-CDMA) systems. The ...
Celotno besedilo
Dostopno za: UL

PDF
3.
  • New constructions of balanc... New constructions of balanced Boolean functions with the maximum possible Walsh supports
    Lou, Yueying; Wang, Qichun Discrete Applied Mathematics, 10/2024, Letnik: 355
    Journal Article
    Recenzirano

    Cryptographic Boolean functions play an important role in the design of symmetric ciphers. Many cryptographic criteria such as balancedness, nonlinearity, correlation immunity and transparency order ...
Celotno besedilo
Dostopno za: UL
4.
  • Induced subgraphs of hyperc... Induced subgraphs of hypercubes and a proof of the Sensitivity Conjecture
    Huang, Hao Annals of mathematics, 11/2019, Letnik: 190, Številka: 3
    Journal Article
    Odprti dostop

    In this paper, we show that every (2 n-1 + 1)-vertex induced subgraph of the n-dimensional cube graph has maximum degree at least n . This is the best possible result, and it improves a logarithmic ...
Celotno besedilo

PDF
5.
  • Cryptanalysis and construct... Cryptanalysis and construction of keyed strong S-Box based on random affine transformation matrix and 2D hyper chaotic map
    Liu, Ruoran; Liu, Hongjun; Zhao, Mengdi Expert systems with applications, 10/2024, Letnik: 252
    Journal Article
    Recenzirano

    As the only nonlinear module, S-Box (substitution box) is widely used in stream cipher, hash function, and so on. However, there exist some weaknesses in existing S-Boxes, such as fixed point, ...
Celotno besedilo
Dostopno za: UL
6.
  • Optimal Z -Complementary Co... Optimal Z -Complementary Code Set From Generalized Reed-Muller Codes
    Sarkar, Palash; Majhi, Sudhan; Liu, Zilong IEEE transactions on communications, 2019-March, 2019-3-00, Letnik: 67, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    <inline-formula> <tex-math notation="LaTeX">Z </tex-math></inline-formula>-complementary code set (ZCCS), an extension of perfect CCs, refers to a set of 2-D matrices having zero correlation zone ...
Celotno besedilo
Dostopno za: UL

PDF
7.
  • Boolean Functions with Two ... Boolean Functions with Two Distinct Nega-Hadamard Coefficients
    CHONG, Jinfeng; JIANG, Niu; ZHUO, Zepeng ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2024, 2024-00-00
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, we consider the spectra of Boolean functions with respect to the nega-Hadamard transform. Based on the properties of the nega-Hadamard transform and the solutions of the Diophantine ...
Celotno besedilo
Dostopno za: UL
8.
  • Search for 9-variable Boole... Search for 9-variable Boolean Functions with the Optimal Algebraic Immunity-Resiliency Trade-off and High Nonlinearity
    LOU, Yueying; WANG, Qichun IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2024, 2024-00-00
    Journal Article
    Recenzirano
    Odprti dostop

    Boolean functions play an important role in symmetric ciphers. One of important open problems on Boolean functions is determining the maximum possible resiliency order of n-variable Boolean functions ...
Celotno besedilo
Dostopno za: UL
9.
  • Minimal Binary Linear Codes Minimal Binary Linear Codes
    Ding, Cunsheng; Heng, Ziling; Zhou, Zhengchun IEEE transactions on information theory, 10/2018, Letnik: 64, Številka: 10
    Journal Article
    Recenzirano

    In addition to their applications in data communication and storage, linear codes also have nice applications in combinatorics and cryptography. Minimal linear codes, a special type of linear codes, ...
Celotno besedilo
Dostopno za: UL
10.
  • The Covering Radius of the ... The Covering Radius of the Third-Order Reed-Muller Code RM(3,7) is 20
    Gao, Jinjie; Kan, Haibin; Li, Yuan ... IEEE transactions on information theory, 06/2023, Letnik: 69, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    We prove the covering radius of the third-order Reed-Muller code RM(3, 7) is 20, which was previously known to be between 20 and 23 (inclusive). The covering radius of RM(3, 7) is the maximum ...
Celotno besedilo
Dostopno za: UL
1 2 3 4 5
zadetkov: 13.170

Nalaganje filtrov