UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 12,326
21.
  • New Constructions of Comple... New Constructions of Complementary Sequence Pairs Over 4q-QAM
    Wang, Zilong; Xue, Erzhong; Gong, Guang IEEE transactions on information theory, 2022-March, Volume: 68, Issue: 3
    Journal Article
    Peer reviewed

    The researches of Golay complementary sequences (GCSs) over 16 and 64 quadrature amplitude modulation (QAM) from 2001 to 2008 were generalized to <inline-formula> <tex-math notation="LaTeX">4^{q} ...
Full text

PDF
22.
  • A Direct Construction of Go... A Direct Construction of Golay Complementary Pairs and Binary Complete Complementary Codes of Length Non-Power of Two
    Kumar, Praveen; Majhi, Sudhan; Paul, Subhabrata IEEE transactions on communications, 03/2023, Volume: 71, Issue: 3
    Journal Article
    Peer reviewed

    Golay complementary pairs (GCPs) and complete complementary codes (CCCs) have found a wide range of practical applications in coding, signal processing and wire-less communication due to their ideal ...
Full text
23.
  • S-Blocks of Special Type wi... S-Blocks of Special Type with Few Variables
    Zyubina, D. A.; Tokareva, N. N. Journal of applied and industrial mathematics, 06/2023, Volume: 17, Issue: 2
    Journal Article
    Peer reviewed

    When constructing block ciphers, it is necessary to use vector Boolean functions with special cryptographic properties as S-blocks for the cipher’s resistance to various types of cryptanalysis. In ...
Full text
24.
  • Four classes of bivariate p... Four classes of bivariate permutation polynomials over finite fields of even characteristic
    CHEN, Changhui; KAN, Haibin; PENG, Jie ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 07/2024, Volume: E107.A, Issue: 7
    Journal Article
    Peer reviewed
    Open access

    Permutation polynomials have important applications in cryptography, coding theory and combinatorial designs. In this letter, we construct four classes of permutation polynomials over 𝔽2n × 𝔽2n , ...
Full text
25.
  • Several families of binary ... Several families of binary minimal linear codes from two-to-one functions
    Mesnager, Sihem; Qian, Liqin; Cao, Xiwang ... IEEE transactions on information theory, 05/2023, Volume: 69, Issue: 5
    Journal Article
    Peer reviewed

    Minimal linear codes have important applications in secure communications, including in the framework of secret sharing schemes and secure multi-party computation. A lot of research have been carried ...
Full text
26.
  • Analysis on Boolean Functio... Analysis on Boolean Function in a Restricted (Biased) Domain
    Maitra, Subhamoy; Mandal, Bimal; Martinsen, Thor ... IEEE transactions on information theory, 02/2020, Volume: 66, Issue: 2
    Journal Article
    Peer reviewed

    Boolean functions are usually studied under the assumption that each input bit is considered independent and identically distributed. However, in the case of some stream ciphers, a keystream bit is ...
Full text
27.
  • Constructions of balanced B... Constructions of balanced Boolean functions on even number of variables with maximum absolute value in autocorrelation spectra <2n2
    Zhang, Fengrong; Pasalic, Enes; Wei, Yongzhuang Information sciences, October 2021, Volume: 575
    Journal Article
    Peer reviewed

    The autocorrelation properties of Boolean functions are closely related to the Shannon’s concept of diffusion and can be accompanied with other cryptographic criteria (such as high nonlinearity and ...
Full text
28.
  • Binary Cross Z-Complementar... Binary Cross Z-Complementary Pairs With Flexible Lengths From Boolean Functions
    Huang, Zhen-Ming; Pai, Cheng-Yu; Chen, Chao-Yu IEEE communications letters, 04/2021, Volume: 25, Issue: 4
    Journal Article
    Peer reviewed

    In this letter, a novel construction of binary cross Z-complementary pairs (CZCPs) based on Boolean functions is proposed. CZCPs have been proposed to be used as training sequences in the spatial ...
Full text
29.
  • Optimal and Almost-Optimal ... Optimal and Almost-Optimal Golay-ZCZ Sequence Sets With Bounded PAPRs
    Pai, Cheng-Yu; Lin, Yu-Jen; Chen, Chao-Yu IEEE transactions on communications, 02/2023, Volume: 71, Issue: 2
    Journal Article
    Peer reviewed

    This paper aims to present novel constructions of Golay-ZCZ sequence sets with various set sizes and flexible lengths. A Golay-ZCZ sequence set is not only a Golay complementary set (GCS) but also a ...
Full text
30.
  • On Correlation Immune Boole... On Correlation Immune Boolean Functions With Minimum Hamming Weight Power of 2
    Mesnager, Sihem; Su, Sihong IEEE transactions on information theory, 2021-Nov., 2021-11-00, 2021-11, Volume: 67, Issue: 11
    Journal Article
    Peer reviewed

    The notion of correlation immune functions has been introduced by Siegenthaler (1984) in symmetric cryptography in the framework of stream ciphers. At the conference CRYPTO'91 by Camion et al., it ...
Full text
1 2 3 4 5
hits: 12,326

Load filters