UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 11,322
1.
  • Pseudo-Boolean Functions fo... Pseudo-Boolean Functions for Optimal Z-Complementary Code Sets With Flexible Lengths
    Sarkar, Palash; Majhi, Sudhan; Liu, Zilong IEEE signal processing letters, 2021, Volume: 28
    Journal Article
    Peer reviewed
    Open access

    This paper aims to construct optimal Z-complementary code set (ZCCS) with non-power-of-two (NPT) lengths to enable interference-free multicarrier code-division multiple access (MC-CDMA) systems. The ...
Full text

PDF
2.
  • New constructions of balanc... New constructions of balanced Boolean functions with the maximum possible Walsh supports
    Lou, Yueying; Wang, Qichun Discrete Applied Mathematics, 10/2024, Volume: 355
    Journal Article
    Peer reviewed

    Cryptographic Boolean functions play an important role in the design of symmetric ciphers. Many cryptographic criteria such as balancedness, nonlinearity, correlation immunity and transparency order ...
Full text
3.
  • Design of Highly Nonlinear ... Design of Highly Nonlinear Substitution Boxes Based on I-Ching Operators
    Zhang, Tong; Chen, C. L. Philip; Chen, Long ... IEEE transactions on cybernetics, 2018-Dec., 2018-Dec, 2018-12-00, 20181201, Volume: 48, Issue: 12
    Journal Article
    Peer reviewed

    This paper is to design substitution boxes (S-Boxes) using innovative I-Ching operators (ICOs) that have evolved from ancient Chinese I-Ching philosophy. These three operators-intrication, turnover, ...
Full text
4.
  • Minimal Binary Linear Codes Minimal Binary Linear Codes
    Ding, Cunsheng; Heng, Ziling; Zhou, Zhengchun IEEE transactions on information theory, 2018-Oct., 2018-10-00, Volume: 64, Issue: 10
    Journal Article
    Peer reviewed

    In addition to their applications in data communication and storage, linear codes also have nice applications in combinatorics and cryptography. Minimal linear codes, a special type of linear codes, ...
Full text
5.
  • A Novel Application of Bool... A Novel Application of Boolean Functions With High Algebraic Immunity in Minimal Codes
    Chen, Hang; Ding, Cunsheng; Mesnager, Sihem ... IEEE transactions on information theory, 2021-Oct., 2021-10-00, 2021-10, Volume: 67, Issue: 10
    Journal Article
    Peer reviewed
    Open access

    Boolean functions with high algebraic immunity are important cryptographic primitives in some stream ciphers. In this paper, two methodologies for constructing minimal binary codes from sets, Boolean ...
Full text

PDF
6.
Full text

PDF
7.
  • Cryptanalysis and construct... Cryptanalysis and construction of keyed strong S-Box based on random affine transformation matrix and 2D hyper chaotic map
    Liu, Ruoran; Liu, Hongjun; Zhao, Mengdi Expert systems with applications, 10/2024, Volume: 252
    Journal Article
    Peer reviewed

    As the only nonlinear module, S-Box (substitution box) is widely used in stream cipher, hash function, and so on. However, there exist some weaknesses in existing S-Boxes, such as fixed point, ...
Full text
8.
  • Optimal Z -Complementary Co... Optimal Z -Complementary Code Set From Generalized Reed-Muller Codes
    Sarkar, Palash; Majhi, Sudhan; Liu, Zilong IEEE transactions on communications, 2019-March, 2019-3-00, Volume: 67, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    <inline-formula> <tex-math notation="LaTeX">Z </tex-math></inline-formula>-complementary code set (ZCCS), an extension of perfect CCs, refers to a set of 2-D matrices having zero correlation zone ...
Full text

PDF
9.
  • Search for 9-variable Boole... Search for 9-variable Boolean Functions with the Optimal Algebraic Immunity-Resiliency Trade-off and High Nonlinearity
    LOU, Yueying; WANG, Qichun IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2024
    Journal Article
    Peer reviewed
    Open access

    Boolean functions play an important role in symmetric ciphers. One of important open problems on Boolean functions is determining the maximum possible resiliency order of n-variable Boolean functions ...
Full text
10.
  • The equivalence between Gal... The equivalence between Galois and Fibonacci NFSRs
    Pan, Yingyin; Zhong, Jianghua; Lin, Dongdai Theoretical computer science, 07/2024, Volume: 1003
    Journal Article
    Peer reviewed

    Nonlinear feedback shift registers (NFSRs) are used in many stream ciphers as their main building blocks. In particular, Galois NFSRs with terminal bits are used in typical stream ciphers Grain and ...
Full text
1 2 3 4 5
hits: 11,322

Load filters