Author Title Year Journal/Proceedings Reftype DOI/URL
Algrøy, J., Barbero, A.I. and Ytrehus, Ø.
Determining the equivocation in coded transmission over a noisy channel
2022
IEEE International Symposium on Information Theory, ISIT 2022, Espoo, Finland, June 26 - July 1, 2022, pp. 1253-1258
inproceedings
DOI URL
Askeland, A., Dhooghe, S., Nikova, S., Rijmen, V. and Zhang, Z.
Guarding the First Order: The Rise of AES Maskings
2022
Vol. 13820Smart Card Research and Advanced Applications - 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers, pp. 103-122
inproceedings
DOI URL
Azimi, S.A., Ranea, A., Salmasizadeh, M., Mohajeri, J., Aref, M.R. and Rijmen, V.
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
2022
Des. Codes Cryptogr. Vol. 90(8), pp. 1797-1855
article
DOI URL
Barbero, Á.I., Skachek, V. and Ytrehus, Ø.
Preface of special issue on coding theory and applications
2022
Cryptogr. Commun. Vol. 14(3), pp. 503
article
DOI URL
Bardeh, N.G. and Rijmen, V.
New Key-Recovery Attack on Reduced-Round AES
2022
IACR Trans. Symmetric Cryptol. Vol. 2022(2), pp. 43-62
article
DOI URL
Bartoli, D., Calderini, M., Riera, C. and Stanica, P.
Low c-differential uniformity for functions modified on subfields
2022
Cryptogr. Commun. Vol. 14(6), pp. 1211-1227
article
DOI URL
Beierle, C., Carlet, C., Leander, G. and Perrin, L.
A further study of quadratic APN permutations in dimension nine
2022
Finite Fields Their Appl. Vol. 81, pp. 102049
article
DOI URL
Beierle, C., Felke, P., Leander, G. and Rønjom, S.
Decomposing Linear Layers
2022
IACR Trans. Symmetric Cryptol. Vol. 2022(4), pp. 243-265
article
DOI URL
Beyne, T. and Rijmen, V.
Differential Cryptanalysis in the Fixed-Key Model
2022
Vol. 13509Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III, pp. 687-716
inproceedings
DOI URL
Bollauf, M.F., Lin, H. and Ytrehus, Ø.
On the Secrecy Gain of Formally Unimodular Construction A4 Lattices
2022
IEEE International Symposium on Information Theory, ISIT 2022, Espoo, Finland, June 26 - July 1, 2022, pp. 3226-3231
inproceedings
DOI URL
Budaghyan, L., Calderini, M., Carlet, C., Davidova, D. and Kaleyski, N.S.
On Two Fundamental Problems on APN Power Functions
2022
IEEE Trans. Inf. Theory Vol. 68(5), pp. 3389-3403
article
DOI URL
Budaghyan, L., Carlet, C., Ding, C. and Helleseth, T.
Editorial: Special issue on Boolean functions and their applications 2021
2022
Cryptogr. Commun. Vol. 14(6), pp. 1207-1209
article
DOI URL
Budaghyan, L., Kaleyski, N.S., Riera, C. and Stanica, P.
On the behavior of some APN permutations under swapping points
2022
Cryptogr. Commun. Vol. 14(2), pp. 319-345
article
DOI URL
Budroni, A. and Pintore, F.
Efficient hash maps to textdollar{\textbackslash}mathbb \{G\}\_2textdollar on BLS curves
2022
Appl. Algebra Eng. Commun. Comput. Vol. 33(3), pp. 261-281
article
DOI URL
Carlet, C.
A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit Function
2022
IEEE Trans. Inf. Theory Vol. 68(2), pp. 1355-1368
article
DOI URL
Carlet, C.
On APN Functions Whose Graphs are Maximal Sidon Sets
2022
Vol. 13568LATIN 2022: Theoretical Informatics - 15th Latin American Symposium, Guanajuato, Mexico, November 7-11, 2022, Proceedings, pp. 243-254
inproceedings
DOI URL
Carlet, C.
Parameterization of Boolean functions by vectorial functions and associated constructions
2022
Proceedings of the International Symposium on Artificial Intelligence and Mathematics 2022 (ISAIM 2022), Fort Lauderdale, Florida, USA, January 3-5, 2022
inproceedings
URL
Carlet, C., Djurasevic, M., Jakobovic, D., Mariot, L. and Picek, S.
Evolving constructions for balanced, highly nonlinear boolean functions
2022
GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9 - 13, 2022, pp. 1147-1155
inproceedings
DOI URL
Carlet, C. and Méaux, P.
A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions
2022
IEEE Trans. Inf. Theory Vol. 68(5), pp. 3404-3425
article
DOI URL
Ghosh, G., Majhi, S., Sarkar, P. and Upadhaya, A.K.
Direct Construction of Optimal Z-Complementary Code Sets With Even Lengths by Using Generalized Boolean Functions
2022
IEEE Signal Processing Letters Vol. 29, pp. 872-876
article
DOI
Grassi, L., Khovratovich, D., Rønjom, S. and Schofnegger, M.
The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on Full Grendel
2022
IACR Trans. Symmetric Cryptol. Vol. 2022(1), pp. 5-37
article
DOI URL
Imaña, J.L., Budaghyan, L. and Kaleyski, N.S.
Decomposition of Dillon's APN Permutation with Efficient Hardware Implementation
2022
Vol. 13638Arithmetic of Finite Fields - 9th International Workshop, WAIFI 2022, Chengdu, China, August 29 - September 2, 2022, Revised Selected Papers, pp. 250-268
inproceedings
DOI URL
Kadir, W.K., Li, C. and Zullo, F.
Encoding and decoding of several optimal rank metric codes
2022
Cryptogr. Commun. Vol. 14(6), pp. 1281-1300
article
DOI URL
Kaleyski, N.S.
Deciding EA-equivalence via invariants
2022
Cryptogr. Commun. Vol. 14(2), pp. 271-290
article
DOI URL
Li, D., Li, C. and Sarkar, P.
Asymptotically Optimal Quasi-Complementary Code Sets of Length p(_1)(^m\({}_{\mbox{1}}\))p(_2)(^m\({}_{\mbox{2}}\))
2022
10th International Workshop on Signal Design and Its Applications in Communications, IWSDA 2022, Colchester, UK, August 1-5, 2022, pp. 1-5
inproceedings
DOI URL
Li, K., Zhou, Y., Li, C. and Qu, L.
Two New Families of Quadratic APN Functions
2022
IEEE Trans. Inf. Theory Vol. 68(7), pp. 4761-4769
article
DOI URL
Liu, J., Rijmen, V., Hu, Y., Chen, J. and Wang, B.
WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix
2022
Sci. China Inf. Sci. Vol. 65(3)
article
DOI URL
Man, Y., Xia, Y., Li, C. and Helleseth, T.
On the differential properties of the power mapping xpm+2
2022
Finite Fields Their Appl. Vol. 84, pp. 102100
article
DOI URL
Petrides, G.
A number theoretic view on binary shift registers
2022
Cryptogr. Commun. Vol. 14(5), pp. 1067-1080
article
DOI URL
Petrides, G., Moldovan, D., Coenen, L., Guns, T. and Verbeke, W.
Cost-sensitive learning for profit-driven credit scoring
2022
J. Oper. Res. Soc. Vol. 73(2), pp. 338-350
article
DOI URL
Petrides, G. and Verbeke, W.
Cost-sensitive ensemble learning: a unifying framework
2022
Data Min. Knowl. Discov. Vol. 36(1), pp. 1-28
article
DOI URL
Posteuca, R. and Rijmen, V.
RAMus- A New Lightweight Block Cipher for RAM Encryption
2022
Vol. 13409Security and Cryptography for Networks - 13th International Conference, SCN 2022, Amalfi, Italy, September 12-14, 2022, Proceedings, pp. 69-92
inproceedings
DOI URL
Ranea, A. and Rijmen, V.
Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA)
2022
IET Inf. Secur. Vol. 16(6), pp. 470-481
article
DOI URL
Shi, M., Helleseth, T., Özbudak, F. and Solé, P.
Covering Radius of Melas Codes
2022
IEEE Trans. Inf. Theory Vol. 68(7), pp. 4354-4364
article
DOI URL
Shi, M., Wang, S., Helleseth, T. and Solé, P.
Quadratic residue codes, rank three groups and PBIBDs
2022
Des. Codes Cryptogr. Vol. 90(11), pp. 2599-2611
article
DOI URL
Yan, H., Xia, Y., Li, C., Helleseth, T., Xiong, M. and Luo, J.
The Differential Spectrum of the Power Mapping x(^p\({}^{\mbox{n}}\))(^-3)
2022
IEEE Trans. Inf. Theory Vol. 68(8), pp. 5535-5547
article
DOI URL
Zhang, D. and Helleseth, T.
Sequences With Good Correlations Based on Circular Florentine Arrays
2022
IEEE Trans. Inf. Theory Vol. 68(5), pp. 3381-3388
article
DOI URL
Zhu, H., Shi, M., Wang, X. and Helleseth, T.
The q-Ary Antiprimitive BCH Codes
2022
IEEE Trans. Inf. Theory Vol. 68(3), pp. 1683-1695
article
DOI URL
Zobiri, F., Gama, M., Nikova, S. and Deconinck, G.
A Privacy-Preserving Three-Step Demand Response Market Using Multi-Party Computation
2022
2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022, New Orleans, LA, USA, April 24-28, 2022, pp. 1-5
inproceedings
DOI URL
Bartoli, D. and Calderini, M.
On construction and (non)existence of c -(almost) perfect nonlinear functions
2021
Finite Fields Their Appl. Vol. 72, pp. 101835
article
DOI URL
Bollauf, M.F. and Ytrehus, Ø.
Tiling of Constellations
2021
IEEE International Symposium on Information Theory, ISIT 2021, Melbourne, Australia, July 12-20, 2021, pp. 450-454
inproceedings
DOI URL
Budaghyan, L., Calderini, M., Carlet, C., Coulter, R.S. and Villa, I.
Generalized isotopic shift construction for APN functions
2021
Des. Codes Cryptogr. Vol. 89(1), pp. 19-32
article
DOI URL
Budaghyan, L., Carlet, C., Helleseth, T. and Nyberg, K.
Editorial: Special issue on Boolean functions and their applications 2020
2021
Cryptogr. Commun. Vol. 13(6), pp. 887-889
article
DOI URL
Budroni, A., Guo, Q., Johansson, T., Mårtensson, E. and Wagner, P.S.
Improvements on Making BKW Practical for Solving LWE
2021
Cryptogr. Vol. 5(4), pp. 31
article
DOI URL
Canteaut, A., Kölsch, L., Li, C., Li, C., Li, K., Qu, L. and Wiemer, F.
Autocorrelations of Vectorial Boolean Functions
2021
Vol. 12912Progress in Cryptology - LATINCRYPT 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6-8, 2021, Proceedings, pp. 233-253
inproceedings
DOI URL
Carlet, C.
Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions
2021
IEEE Trans. Inf. Theory Vol. 67(12), pp. 8325-8334
article
DOI URL
Carlet, C.
On the Properties of the Boolean Functions Associated to the Differential Spectrum of General APN Functions and Their Consequences
2021
IEEE Trans. Inf. Theory Vol. 67(10), pp. 6926-6939
article
DOI URL
Carlet, C., de Chérisey, É., Guilley, S., Kavut, S. and Tang, D.
Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios
2021
IEEE Trans. Inf. Forensics Secur. Vol. 16, pp. 203-218
article
DOI URL
Carlet, C., Guilley, S. and Mesnager, S.
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst. Vol. 2021(4), pp. 57-87
article
DOI URL
Carlet, C., Jakobovic, D. and Picek, S.
Evolutionary algorithms-assisted construction of cryptographic boolean functions
2021
GECCO '21: Genetic and Evolutionary Computation Conference, Lille, France, July 10-14, 2021, pp. 565-573
inproceedings
DOI URL
Carlet, C., Kim, K.H. and Mesnager, S.
A direct proof of APN-ness of the Kasami functions
2021
Des. Codes Cryptogr. Vol. 89(3), pp. 441-446
article
DOI URL
Cheng, W., Carlet, C., Goli, K., Danger, J. and Guilley, S.
Detecting faults in inner product masking scheme
2021
J. Cryptogr. Eng. Vol. 11(2), pp. 119-133
article
DOI URL
Cheng, W., Guilley, S., Carlet, C., Danger, J. and Mesnager, S.
Information Leakages in Code-based Masking: A Unified Quantification Approach
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst. Vol. 2021(3), pp. 465-495
article
DOI URL
Cheng, W., Guilley, S., Carlet, C., Mesnager, S. and Danger, J.
Optimizing Inner Product Masking Scheme by a Coding Theory Approach
2021
IEEE Trans. Inf. Forensics Secur. Vol. 16, pp. 220-235
article
DOI URL
Davidova, D., Budaghyan, L., Carlet, C., Helleseth, T., Ihringer, F. and Penttila, T.
Relation between o-equivalence and EA-equivalence for Niho bent functions
2021
Finite Fields Their Appl. Vol. 72, pp. 101834
article
DOI URL
Fernández-Hernández, I., Ashur, T. and Rijmen, V.
Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols
2021
IEEE Trans. Aerosp. Electron. Syst. Vol. 57(3), pp. 1827-1839
article
DOI URL
Greve, B.M., Ytrehus, Ø., Raddum, H. and Fløystad, G.
Solving non-linear Boolean equation systems by variable elimination
2021
Appl. Algebra Eng. Commun. Comput. Vol. 32(1), pp. 3-47
article
DOI URL
Helleseth, T., Katz, D.J. and Li, C.
The Resolution of Niho's Last Conjecture Concerning Sequences, Codes, and Boolean Functions
2021
IEEE Trans. Inf. Theory Vol. 67(10), pp. 6952-6962
article
DOI URL
Horodecki, K., Studziifmmode nelse ʼnfiski, M., Kostecki, R.P., Sakarya, O. and Yang, D.
Upper bounds on the leakage of private data and an operational approach to Markovianity
2021
Phys. Rev. A Vol. 104, pp. 052422
article
DOI URL
Kadir, W.K., Li, C. and Zullo, F.
On interpolation-based decoding of a class of maximum rank distance codes
2021
IEEE International Symposium on Information Theory, ISIT 2021, Melbourne, Australia, July 12-20, 2021, pp. 31-36
inproceedings
DOI URL
Kaleyski, N.S.
Invariants for EA- and CCZ-equivalence of APN and AB functions
2021
Cryptogr. Commun. Vol. 13(6), pp. 995-1023
article
DOI URL
Lawrance, N., Petrides, G. and Guerry, M.
Predicting employee absenteeism for cost effective interventions
2021
Decis. Support Syst. Vol. 147, pp. 113539
article
DOI URL
Li, K., Li, C., Helleseth, T. and Qu, L.
A Complete Characterization of the APN Property of a Class of Quadrinomials
2021
IEEE Trans. Inf. Theory Vol. 67(11), pp. 7535-7549
article
DOI URL
Li, K., Li, C., Helleseth, T. and Qu, L.
Binary Linear Codes With Few Weights From Two-to-One Functions
2021
IEEE Trans. Inf. Theory Vol. 67(7), pp. 4263-4275
article
DOI URL
Li, K., Li, C., Helleseth, T. and Qu, L.
Cryptographically strong permutations from the butterfly structure
2021
Des. Codes Cryptogr. Vol. 89(4), pp. 737-761
article
DOI URL
Luo, G., Cao, X., Shi, M. and Helleseth, T.
Three New Constructions of Asymptotically Optimal Periodic Quasi-Complementary Sequence Sets With Small Alphabet Sizes
2021
IEEE Trans. Inf. Theory Vol. 67(8), pp. 5168-5177
article
DOI URL
Melloni, A., Stam, M. and Ytrehus, Ø.
On Evaluating Anonymity of Onion Routing
2021
Vol. 13203Selected Areas in Cryptography - 28th International Conference, SAC 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers, pp. 3-24
inproceedings
DOI URL
Mofrad, A.A., Mofrad, S.A., Yazidi, A. and Parker, M.G.
On Neural Associative Memory Structures: Storage and Retrieval of Sequences in a Chain of Tournaments
2021
Neural Comput. Vol. 33(9), pp. 2550-2577
article
DOI URL
Rijmen, V.
Editorial
2021
J. Cryptol. Vol. 34(3), pp. 15
article
DOI URL
Sadeghi, S., Rijmen, V. and Bagheri, N.
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
2021
Des. Codes Cryptogr. Vol. 89(9), pp. 2113-2155
article
DOI URL
Sun, Z., Zeng, X., Li, C., Zhang, Y. and Yi, L.
The Expansion Complexity of Ultimately Periodic Sequences Over Finite Fields
2021
IEEE Trans. Inf. Theory Vol. 67(11), pp. 7550-7560
article
DOI URL
Tor Helleseth, C.L.
Pseudo-Noise Sequences
2021
Concise Encyclopedia of Coding Theory
inbook
DOI URL
Aragona, R., Calderini, M. and Civino, R.
Some group-theoretical results on Feistel Networks in a long-key scenario
2020
Adv. Math. Commun. Vol. 14(4), pp. 727-743
article
DOI URL
Ashur, T., Beyne, T. and Rijmen, V.
Revisiting the Wrong-Key-Randomization Hypothesis
2020
J. Cryptol. Vol. 33(2), pp. 567-594
article
DOI URL
Azimi, S.A., Ranea, A., Salmasizadeh, M., Mohajeri, J., Aref, M.R. and Rijmen, V.
A Bit-Vector Differential Model for the Modular Addition by a Constant
2020
Vol. 12491Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I, pp. 385-414
inproceedings
DOI URL
Budaghyan, L., Calderini, M., Carlet, C., Coulter, R.S. and Villa, I.
Constructing APN Functions Through Isotopic Shifts
2020
IEEE Trans. Inf. Theory Vol. 66(8), pp. 5299-5309
article
DOI URL
Budaghyan, L., Calderini, M. and Villa, I.
On equivalence between known families of quadratic APN functions
2020
Finite Fields Their Appl. Vol. 66, pp. 101704
article
DOI URL
Budaghyan, L., Calderini, M. and Villa, I.
On relations between CCZ- and EA-equivalences
2020
Cryptogr. Commun. Vol. 12(1), pp. 85-100
article
DOI URL
Budaghyan, L., Carlet, C., Helleseth, T. and Kaleyski, N.S.
On the Distance Between APN Functions
2020
IEEE Trans. Inf. Theory Vol. 66(9), pp. 5742-5753
article
DOI URL
Budaghyan, L. and Helleseth, T.
Editorial: Special issue on Boolean functions and their applications
2020
Cryptogr. Commun. Vol. 12(5), pp. 819-820
article
DOI URL
Budaghyan, L., Helleseth, T. and Kaleyski, N.S.
A New Family of APN Quadrinomials
2020
IEEE Trans. Inf. Theory Vol. 66(11), pp. 7081-7087
article
DOI URL
Budaghyan, L., Kaleyski, N.S., Kwon, S., Riera, C. and Stanica, P.
Partially APN Boolean functions and classes of functions that are not APN infinitely often
2020
Cryptogr. Commun. Vol. 12(3), pp. 527-545
article
DOI URL
Budaghyan, L., Kaleyski, N.S., Riera, C. and Stanica, P.
Partially APN functions with APN-like polynomial representations
2020
Des. Codes Cryptogr. Vol. 88(6), pp. 1159-1177
article
DOI URL
Budroni, A., Chetioui, B. and Franch, E.
Attacks on Integer-RLWE
2020
Vol. 12282Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings, pp. 528-542
inproceedings
DOI URL
Calderini, M.
On the EA-classes of known APN functions in small dimensions
2020
Cryptogr. Commun. Vol. 12(5), pp. 821-840
article
DOI URL
Calderini, M. and Villa, I.
On the boomerang uniformity of some permutation polynomials
2020
Cryptogr. Commun. Vol. 12(6), pp. 1161-1178
article
DOI URL
Carlet, C.
Boolean Functions for Cryptography and Coding Theory
2020
book
DOI URL
Carlet, C.
Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions
2020
IEEE Trans. Inf. Theory Vol. 66(12), pp. 7702-7716
article
DOI URL
Carlet, C.
Handling Vectorial Functions by Means of Their Graph Indicators
2020
IEEE Trans. Inf. Theory Vol. 66(10), pp. 6324-6339
article
DOI URL
Carlet, C., Djurasevic, M., Jakobovic, D. and Picek, S.
A Search for Additional Structure: The Case of Cryptographic S-boxes
2020
Vol. 12270Parallel Problem Solving from Nature - PPSN XVI - 16th International Conference, PPSN 2020, Leiden, The Netherlands, September 5-9, 2020, Proceedings, Part II, pp. 343-356
inproceedings
DOI URL
Carlet, C. and Feukoua, S.
Three parameters of Boolean functions related to their constancy on affine spaces
2020
Adv. Math. Commun. Vol. 14(4), pp. 651-676
article
DOI URL
Davidova, D. and Kaleyski, N.S.
Generalization of a Class of APN Binomials to Gold-Like Functions
2020
Vol. 12542Arithmetic of Finite Fields - 8th International Workshop, WAIFI 2020, Rennes, France, July 6-8, 2020, Revised Selected and Invited Papers, pp. 195-206
inproceedings
DOI URL
Gorodilova, A., Agievich, S., Carlet, C., Hou, X., Idrisova, V., Kolomeec, N., Kutsenko, A., Mariot, L., Oblaukhov, A., Picek, S., Preneel, B., Rosie, R. and Tokareva, N.N.
The Fifth International Students' Olympiad in cryptography - NSUCRYPTO: Problems and their solutions
2020
Cryptologia Vol. 44(3), pp. 223-256
article
DOI URL
Helleseth, T., Mow, W.H. and Zhou, Z.
Editorial: Special issue on sequences and their applications 2018
2020
Cryptogr. Commun. Vol. 12(3), pp. 321-323
article
DOI URL
Kadir, W.K. and Li, C.
On decoding additive generalized twisted Gabidulin codes
2020
Cryptogr. Commun. Vol. 12(5), pp. 987-1009
article
DOI URL
Kraleva, L., Posteuca, R. and Rijmen, V.
Cryptanalysis of the Permutation Based Algorithm SpoC
2020
Vol. 12578Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings, pp. 273-293
inproceedings
DOI URL
Li, C. and Yang, Y.
On three conjectures of binary sequences with low odd-periodic autocorrelation
2020
Cryptogr. Commun. Vol. 12(3), pp. 427-442
article
DOI URL
Liu, Y., Zhang, W., Sun, B., Rijmen, V., Liu, G., Li, C., Fu, S. and Cao, M.
The phantom of differential characteristics
2020
Des. Codes Cryptogr. Vol. 88(11), pp. 2289-2311
article
DOI URL
Medina, L.A., Parker, M.G., Riera, C. and Stanica, P.
Root-Hadamard transforms and complementary sequences
2020
Cryptogr. Commun. Vol. 12(5), pp. 1035-1049
article
DOI URL
Sakalli, M.T., Akleylek, S., Akkanat, K. and Rijmen, V.
On the automorphisms and isomorphisms of MDS matrices and their efficient implementations
2020
Turkish J. Electr. Eng. Comput. Sci. Vol. 28(1), pp. 275-287
article
DOI URL
Xia, Y., Zhang, X., Li, C. and Helleseth, T.
The differential spectrum of a ternary power mapping
2020
Finite Fields Their Appl. Vol. 64, pp. 101660
article
DOI URL
Yang, Y. and Li, C.
New quaternary sequences with optimal odd-periodic autocorrelation magnitude
2020
Cryptogr. Commun. Vol. 12(3), pp. 363-374
article
DOI URL
Yu, Y., Kaleyski, N.S., Budaghyan, L. and Li, Y.
Classification of quadratic APN functions with coefficients in F2 for dimensions up to 9
2020
Finite Fields Their Appl. Vol. 68, pp. 101733
article
DOI URL
Zhang, D. and Helleseth, T.
New Optimal Sets of Perfect Polyphase Sequences Based on Circular Florentine Arrays
2020
IEEE International Symposium on Information Theory, ISIT 2020, Los Angeles, CA, USA, June 21-26, 2020, pp. 2921-2925
inproceedings
DOI URL
Zhang, D., Parker, M.G. and Helleseth, T.
Polyphase zero correlation zone sequences from generalised bent functions
2020
Cryptogr. Commun. Vol. 12(3), pp. 325-335
article
DOI URL
Aragona, R., Calderini, M., Civino, R., Sala, M. and Zappatore, I.
Wave-shaped round functions and primitive groups
2019
Adv. Math. Commun. Vol. 13(1), pp. 67-88
article
DOI URL
Bardeh, N.G. and Rønjom, S.
Practical Attacks on Reduced-Round AES
2019
Vol. 11627Progress in Cryptology - AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings, pp. 297-310
inproceedings
DOI URL
Bardeh, N.G. and Rønjom, S.
The Exchange Attack: How to Distinguish Six Rounds of AES with 2ˆ88.2 Chosen Plaintexts
2019
Vol. 11923Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III, pp. 347-370
inproceedings
DOI URL
Bäuml, S., Winter, A. and Yang, D.
Every entangled state provides an advantage in classical communication
2019
Journal of Mathematical Physics Vol. 60(7), pp. 072201
article
DOI URL
Bocharova, I.E., Kudryashov, B.D., Skachek, V., Rosnes, E. and Ytrehus, Ø.
LDPC Codes Over the BEC: Bounds and Decoding Algorithms
2019
IEEE Trans. Commun. Vol. 67(3), pp. 1754-1769
article
DOI URL
Brunetta, C., Calderini, M. and Sala, M.
On hidden sums compatible with a given block cipher diffusion layer
2019
Discret. Math. Vol. 342(2), pp. 373-386
article
DOI URL
Budaghyan, L., Calderini, M., Carlet, C., Coulter, R.S. and Villa, I.
On Isotopic Shift Construction for Planar Functions
2019
IEEE International Symposium on Information Theory, ISIT 2019, Paris, France, July 7-12, 2019, pp. 2962-2966
inproceedings
DOI URL
Budaghyan, L., Carlet, C. and Helleseth, T.
Editorial: Special Issue on Boolean functions and their applications
2019
Cryptogr. Commun. Vol. 11(1), pp. 1-2
article
DOI URL
Budaghyan, L., Carlet, C. and Helleseth, T.
Editorial: Special issue on Boolean functions and their applications 2018
2019
Cryptogr. Commun. Vol. 11(6), pp. 1145-1146
article
DOI URL
Budaghyan, L., Li, C. and Parker, M.G.
Editorial: Special Issue on Mathematical Methods for Cryptography
2019
Cryptogr. Commun. Vol. 11(3), pp. 363-365
article
DOI URL
Budroni, A. and Tenti, A.
The Mersenne Low Hamming Combination Search Problem Can Be Reduced to an ILP Problem
2019
Vol. 11627Progress in Cryptology - AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings, pp. 41-55
inproceedings
DOI URL
Carlet, C.
On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures
2019
Des. Codes Cryptogr. Vol. 87(2-3), pp. 203-224
article
DOI URL
Carlet, C., Chen, X. and Qu, L.
Constructing infinite families of low differential uniformity (n, m)-functions with m textgreater n / 2
2019
Des. Codes Cryptogr. Vol. 87(7), pp. 1577-1599
article
DOI URL
Carlet, C., Daif, A., Guilley, S. and Tavernier, C.
Polynomial direct sum masking to protect against both SCA and FIA
2019
J. Cryptogr. Eng. Vol. 9(3), pp. 303-312
article
DOI URL
Carlet, C., Guilley, S., Güneri, C., Mesnager, S. and Özbudak, F.
Construction of Efficient Codes for High-Order Direct Sum Masking
2019
Vol. 27Security and Privacy in the Internet of Things: Challenges and Solutions, pp. 108-128
incollection
DOI URL
Carlet, C., Guilley, S. and Mesnager, S.
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks
2019
Vol. 27Security and Privacy in the Internet of Things: Challenges and Solutions, pp. 148-166
incollection
DOI URL
Carlet, C., Li, C. and Mesnager, S.
Linear codes with small hulls in semi-primitive case
2019
Des. Codes Cryptogr. Vol. 87(12), pp. 3063-3075
article
DOI URL
Carlet, C., Li, C. and Mesnager, S.
Some (almost) optimally extendable linear codes
2019
Des. Codes Cryptogr. Vol. 87(12), pp. 2813-2834
article
DOI URL
Carlet, C., Mesnager, S., Tang, C. and Qi, Y.
New Characterization and Parametrization of LCD Codes
2019
IEEE Trans. Inf. Theory Vol. 65(1), pp. 39-49
article
DOI URL
Carlet, C., Mesnager, S., Tang, C. and Qi, Y.
On textdollar\sigmatextdollar -LCD Codes
2019
IEEE Trans. Inf. Theory Vol. 65(3), pp. 1694-1704
article
DOI URL
Cheng, W., Carlet, C., Goli, K., Danger, J. and Guilley, S.
Detecting Faults in Inner-Product Masking Scheme - IPM-FD: IPM with Fault Detection
2019
Vol. 11Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, PROOFS 2019, colocated with CHES 2018, Atlanta, GA, USA, August 24, 2019, pp. 17-32
inproceedings
DOI URL
Edemskiy, V., Li, C., Zeng, X. and Helleseth, T.
The linear complexity of generalized cyclotomic binary sequences of period p(^n)
2019
Des. Codes Cryptogr. Vol. 87(5), pp. 1183-1197
article
DOI URL
Fu, S., Feng, X., Wang, Q. and Carlet, C.
On the Derivative Imbalance and Ambiguity of Functions
2019
IEEE Trans. Inf. Theory Vol. 65(9), pp. 5833-5845
article
DOI URL
Kaleyski, N.S.
An Update on Known Invariants of Vectorial Boolean Functions
2019
Ninth International Workshop on Signal Design and its Applications in Communications, IWSDA 2019, Dongguan, China, October 20-24, 2019, pp. 1-3
inproceedings
DOI URL
Kaleyski, N.S.
Changing APN functions at two points
2019
Cryptogr. Commun. Vol. 11(6), pp. 1165-1184
article
DOI URL
Kløve, T.
Codes of length two correcting single errors of limited size
2019
Cryptogr. Commun. Vol. 11(3), pp. 549-555
article
DOI URL
Li, C.
Interpolation-based Decoding of Nonlinear Maximum Rank Distance Codes
2019
IEEE International Symposium on Information Theory, ISIT 2019, Paris, France, July 7-12, 2019, pp. 2054-2058
inproceedings
DOI URL
Li, C., Rong, C. and Jaatun, M.G.
A Cost-efficient Protocol for Open Blockchains
2019
2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-7
inproceedings
DOI URL
Li, L., Li, C., Li, C. and Zeng, X.
New classes of complete permutation polynomials
2019
Finite Fields Their Appl. Vol. 55, pp. 177-201
article
DOI URL
Li, N. and Helleseth, T.
New permutation trinomials from Niho exponents over finite fields with even characteristic
2019
Cryptogr. Commun. Vol. 11(1), pp. 129-136
article
DOI URL
Méaux, P., Carlet, C., Journault, A. and Standaert, F.
Improved Filter Permutators for Efficient FHE: Better Instances and Implementations
2019
Vol. 11898Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings, pp. 68-91
inproceedings
DOI URL
Wu, G. and Parker, M.G.
On Boolean functions with several flat spectra
2019
Cryptogr. Commun. Vol. 11(5), pp. 853-880
article
DOI URL
Xu, X., Li, C. and Zeng, X.
Nonsingular Polynomials from Feedback Shift Registers
2019
Int. J. Found. Comput. Sci. Vol. 30(3), pp. 469-487
article
DOI URL
Yan, H., Zhou, Z., Weng, J., Wen, J., Helleseth, T. and Wang, Q.
Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields
2019
IEEE Trans. Inf. Theory Vol. 65(10), pp. 6819-6826
article
DOI URL
Yang, D., Horodecki, K. and Winter, A.
Distributed Private Randomness Distillation
2019
Phys. Rev. Lett. Vol. 123, pp. 170501
article
DOI URL
Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji
2019
Vol. 11445
proceedings
DOI URL
Barbero, A.I. and Ytrehus, Ø.
Rate (n-1)/n Systematic Memory Maximum Distance Separable Convolutional Codes
2018
IEEE Trans. Inf. Theory Vol. 64(4), pp. 3018-3030
article
DOI URL
Budaghyan, L., Carlet, C., Helleseth, T., Li, N. and Sun, B.
On Upper Bounds for Algebraic Degrees of APN Functions
2018
IEEE Trans. Inf. Theory Vol. 64(6), pp. 4399-4411
article
DOI URL
Calderini, M.
A note on some algebraic trapdoors for block ciphers
2018
Adv. Math. Commun. Vol. 12(3), pp. 515-524
article
DOI URL
Carlet, C.
Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform
2018
IEEE Trans. Inf. Theory Vol. 64(9), pp. 6443-6453
article
DOI URL
Carlet, C.
Componentwise APNness, Walsh uniformity of APN functions, and cyclic-additive difference sets
2018
Finite Fields Their Appl. Vol. 53, pp. 226-253
article
DOI URL
Carlet, C.
On the nonlinearity of monotone Boolean functions
2018
Cryptogr. Commun. Vol. 10(6), pp. 1051-1061
article
DOI URL
Carlet, C. and Chen, X.
Constructing Low-Weight d th-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform
2018
IEEE Trans. Inf. Theory Vol. 64(4), pp. 2969-2978
article
DOI URL
Carlet, C. and Guilley, S.
Statistical properties of side-channel and fault injection attacks using coding theory
2018
Cryptogr. Commun. Vol. 10(5), pp. 909-933
article
DOI URL
Carlet, C., Güneri, C., Mesnager, S. and Özbudak, F.
Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks
2018
Vol. 11321Arithmetic of Finite Fields - 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers, pp. 95-107
inproceedings
DOI URL
Carlet, C., Güneri, C., Özbudak, F., Özkaya, B. and Solé, P.
On Linear Complementary Pairs of Codes
2018
IEEE Trans. Inf. Theory Vol. 64(10), pp. 6583-6589
article
DOI URL
Carlet, C., Güneri, C., Özbudak, F. and Solé, P.
A new concatenated type construction for LCD codes and isometry codes
2018
Discret. Math. Vol. 341(3), pp. 830-835
article
DOI URL
Carlet, C., Mesnager, S., Tang, C. and Qi, Y.
Euclidean and Hermitian LCD MDS codes
2018
Des. Codes Cryptogr. Vol. 86(11), pp. 2605-2618
article
DOI URL
Carlet, C., Mesnager, S., Tang, C., Qi, Y. and Pellikaan, R.
Linear Codes Over (F)(_q) Are Equivalent to LCD Codes for qtextgreater3
2018
IEEE Trans. Inf. Theory Vol. 64(4), pp. 3010-3017
article
DOI URL
Ding, C., Li, C. and Xia, Y.
Another generalisation of the binary Reed-Muller codes and its applications
2018
Finite Fields Their Appl. Vol. 53, pp. 144-174
article
DOI URL
Fauskanger, S. and Semaev, I.A.
Separable Statistics and Multidimensional Linear Cryptanalysis
2018
IACR Trans. Symmetric Cryptol. Vol. 2018(2), pp. 79-110
article
DOI URL
Gong, G., Helleseth, T. and Kumar, P.V.
Solomon W. Golomb - Mathematician, Engineer, and Pioneer
2018
IEEE Trans. Inf. Theory Vol. 64(4), pp. 2844-2857
article
DOI URL
Helleseth, T. and Preneel, B.
Editorial: Special issue on recent trends in cryptography
2018
Cryptogr. Commun. Vol. 10(1), pp. 1-3
article
DOI URL
Kløve, T.
Codes of Length Two Correcting Single Errors of Limited Size II
2018
Vol. 11321Arithmetic of Finite Fields - 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers, pp. 242-249
inproceedings
DOI URL
Picek, S., Knezevic, K., Jakobovic, D. and Carlet, C.
A Search for Differentially-6 Uniform (n, n-2) Functions
2018
2018 IEEE Congress on Evolutionary Computation, CEC 2018, Rio de Janeiro, Brazil, July 8-13, 2018, pp. 1-7
inproceedings
DOI URL
Shan, J., Hu, L., Zeng, X. and Li, C.
A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties
2018
J. Syst. Sci. Complex. Vol. 31(4), pp. 1042-1064
article
DOI URL
Tan, P., Zhou, Z., Tang, D. and Helleseth, T.
The weight distribution of a class of two-weight linear codes derived from Kloosterman sums
2018
Cryptogr. Commun. Vol. 10(2), pp. 291-299
article
DOI URL
Tu, Z., Zeng, X. and Helleseth, T.
A class of permutation quadrinomials
2018
Discret. Math. Vol. 341(11), pp. 3010-3020
article
DOI URL
Tu, Z., Zeng, X. and Helleseth, T.
New permutation quadrinomials over F22m
2018
Finite Fields Their Appl. Vol. 50, pp. 304-318
article
DOI URL
Tu, Z., Zeng, X., Li, C. and Helleseth, T.
A class of new permutation trinomials
2018
Finite Fields Their Appl. Vol. 50, pp. 178-195
article
DOI URL
Xiao, Z., Zeng, X., Li, C. and Helleseth, T.
New generalized cyclotomic binary sequences of period p(^2)
2018
Des. Codes Cryptogr. Vol. 86(7), pp. 1483-1497
article
DOI URL
Xu, X., Li, C., Zeng, X. and Helleseth, T.
Constructions of complete permutation polynomials
2018
Des. Codes Cryptogr. Vol. 86(12), pp. 2869-2892
article
DOI URL
Xu, Y., Carlet, C., Mesnager, S. and Wu, C.
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions
2018
IEEE Trans. Inf. Theory Vol. 64(1), pp. 367-383
article
DOI URL
Zhou, Z., Helleseth, T. and Parampalli, U.
A Family of Polyphase Sequences With Asymptotically Optimal Correlation
2018
IEEE Trans. Inf. Theory Vol. 64(4), pp. 2896-2900
article
DOI URL
Zhou, Z., Zhang, D., Helleseth, T. and Wen, J.
A Construction of Multiple Optimal ZCZ Sequence Sets With Good Cross Correlation
2018
IEEE Trans. Inf. Theory Vol. 64(2), pp. 1340-1346
article
DOI URL
Arithmetic of Finite Fields - 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers
2018
Vol. 11321
proceedings
DOI URL
Alahmadi, A., Alhazmi, H., Ali, S., Helleseth, T., Hijazi, R., Li, C. and Solé, P.
An analogue of the (Z)(_4)-Goethals code in non-primitive length
2017
J. Syst. Sci. Complex. Vol. 30(4), pp. 950-966
article
DOI URL
Battaglioni, M., Chiaraluce, F. and Kløve, T.
On Non-Linear Codes Correcting Errors of Limited Size
2017
2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, December 4-8, 2017, pp. 1-7
inproceedings
DOI URL
Bruneau, N., Carlet, C., Guilley, S., Heuser, A., Prouff, E. and Rioul, O.
Stochastic Collision Attack
2017
IEEE Trans. Inf. Forensics Secur. Vol. 12(9), pp. 2090-2104
article
DOI URL
Budaghyan, L., Helleseth, T., Li, N. and Sun, B.
Some Results on the Known Classes of Quadratic APN Functions
2017
Vol. 10194Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet, pp. 3-16
inproceedings
DOI URL
Carlet, C. and Feukoua, S.
Three basic questions on Boolean functions
2017
Adv. Math. Commun. Vol. 11(4), pp. 837-855
article
DOI URL
Carlet, C., Heuser, A. and Picek, S.
Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience
2017
Vol. 10355Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, pp. 393-414
inproceedings
DOI URL
Carlet, C., Méaux, P. and Rotella, Y.
Boolean functions with restricted input and their robustness; application to the FLIP cipher
2017
IACR Trans. Symmetric Cryptol. Vol. 2017(3), pp. 192-227
article
DOI URL
Carlet, C., Mesnager, S., Özbudak, F. and Sinak, A.
Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions
2017
Vol. 10194Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet, pp. 328-345
inproceedings
DOI URL
Grassi, L., Rechberger, C. and Rønjom, S.
A New Structural-Differential Property of 5-Round AES
2017
Vol. 10211Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II, pp. 289-317
inproceedings
DOI URL
Horák, P., Semaev, I.A. and Tuza, Z.
A combinatorial problem related to sparse systems of equations
2017
Des. Codes Cryptogr. Vol. 85(1), pp. 129-144
article
DOI URL
Li, N. and Helleseth, T.
Several classes of permutation trinomials from Niho exponents
2017
Cryptogr. Commun. Vol. 9(6), pp. 693-705
article
DOI URL
Mofrad, A.A. and Parker, M.G.
Nested-Clique Network Model of Neural Associative Memory
2017
Neural Comput. Vol. 29(6), pp. 1681-1695
article
DOI URL
Poussier, R., Guo, Q., Standaert, F., Carlet, C. and Guilley, S.
Connecting and Improving Direct Sum Masking and Inner Product Masking
2017
Vol. 10728Smart Card Research and Advanced Applications - 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers, pp. 123-141
inproceedings
DOI URL
Rønjom, S.
Improving algebraic attacks on stream ciphers based on linear feedback shift register over textdollartextdollar\mathbb F\_2{\^{}}k\textdollartextdollar F 2 k
2017
Des. Codes Cryptogr. Vol. 82(1-2), pp. 27-41
article
DOI URL
Rønjom, S., Bardeh, N.G. and Helleseth, T.
Yoyo Tricks with AES
2017
Vol. 10624Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I, pp. 217-243
inproceedings
DOI URL
Sun, Z., Zeng, X., Li, C. and Helleseth, T.
Investigations on Periodic Sequences With Maximum Nonlinear Complexity
2017
IEEE Trans. Inf. Theory Vol. 63(10), pp. 6188-6198
article
DOI URL
Tang, C., Zhou, Z., Qi, Y., Zhang, X., Fan, C. and Helleseth, T.
Generic Construction of Bent Functions and Bent Idempotents With Any Possible Algebraic Degrees
2017
IEEE Trans. Inf. Theory Vol. 63(10), pp. 6149-6157
article
DOI URL
Tang, D., Carlet, C., Tang, X. and Zhou, Z.
Construction of Highly Nonlinear 1-Resilient Boolean Functions With Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity
2017
IEEE Trans. Inf. Theory Vol. 63(9), pp. 6113-6125
article
DOI URL
Tang, D., Carlet, C. and Zhou, Z.
Binary linear codes from vectorial boolean functions and their weight distribution
2017
Discret. Math. Vol. 340(12), pp. 3055-3072
article
DOI URL
Xia, Y. and Li, C.
Three-weight ternary linear codes from a family of power functions
2017
Finite Fields Their Appl. Vol. 46, pp. 17-37
article
DOI URL
Xia, Y., Li, N., Zeng, X. and Helleseth, T.
On the Correlation Distribution for a Niho Decimation
2017
IEEE Trans. Inf. Theory Vol. 63(11), pp. 7206-7218
article
DOI URL
Coding Theory and Applications - 5th International Castle Meeting, ICMCTA 2017, Vihula, Estonia, August 28-31, 2017, Proceedings
2017
Vol. 10495
proceedings
DOI URL
Alahmadi, A., Alhazmi, H., Helleseth, T., Hijazi, R., Muthana, N.M. and Solé, P.
On the lifted Melas code
2016
Cryptogr. Commun. Vol. 8(1), pp. 7-18
article
DOI URL
Alahmadi, A., Alhazmi, H., Helleseth, T., Hijazi, R., Muthana, N.M. and Solé, P.
On the lifted Zetterberg code
2016
Des. Codes Cryptogr. Vol. 80(3), pp. 561-576
article
DOI URL
Bocharova, I.E., Kudryashov, B.D., Rosnes, E., Skachek, V. and Ytrehus, Ø.
Wrap-around sliding-window near-ML decoding of binary LDPC codes over the BEC
2016
9th International Symposium on Turbo Codes and Iterative Information Processing, ISTC 2016, Brest, France, September 5-9, 2016, pp. 16-20
inproceedings
DOI URL
Budaghyan, L., Carlet, C., Helleseth, T. and Li, N.
On the (non-)existence of APN (n, n)-functions of algebraic degree n
2016
IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016, pp. 480-484
inproceedings
DOI URL
Budaghyan, L., Helleseth, T. and Kholosha, A.
Editorial: Special issue on Boolean functions and their applications
2016
Cryptogr. Commun. Vol. 8(2), pp. 173-174
article
DOI URL
Budaghyan, L., Kholosha, A., Carlet, C. and Helleseth, T.
Univariate Niho Bent Functions From o-Polynomials
2016
IEEE Trans. Inf. Theory Vol. 62(4), pp. 2254-2265
article
DOI URL
Carlet, C., Gong, G. and Tan, Y.
Quadratic zero-difference balanced functions, APN functions and strongly regular graphs
2016
Des. Codes Cryptogr. Vol. 78(3), pp. 629-654
article
DOI URL
Carlet, C. and Guilley, S.
Complementary dual codes for counter-measures to side-channel attacks
2016
Adv. Math. Commun. Vol. 10(1), pp. 131-150
article
DOI URL
Carlet, C., Joyner, D., Stanica, P. and Tang, D.
Cryptographic properties of monotone Boolean functions
2016
J. Math. Cryptol. Vol. 10(1), pp. 1-14
article
URL
Carlet, C. and Mesnager, S.
Four decades of research on bent functions
2016
Des. Codes Cryptogr. Vol. 78(1), pp. 5-50
article
DOI URL
Carlet, C. and Prouff, E.
Polynomial Evaluation and Side Channel Analysis
2016
Vol. 9100The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, pp. 315-341
inproceedings
DOI URL
Grassi, L., Rechberger, C. and Rønjom, S.
Subspace Trail Cryptanalysis and its Applications to AES
2016
IACR Trans. Symmetric Cryptol. Vol. 2016(2), pp. 192-225
article
DOI URL
Helleseth, T. and Kholosha, A.
New ternary binomial bent functions
2016
IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016, pp. 101-104
inproceedings
DOI URL
Kazymyrov, O., Oliynykov, R. and Raddum, H.
Influence of addition modulo 2 n on algebraic attacks
2016
Cryptogr. Commun. Vol. 8(2), pp. 277-289
article
DOI URL
Kløve, T.
On covering sets for limited-magnitude errors
2016
Cryptogr. Commun. Vol. 8(3), pp. 415-433
article
DOI URL
Kløve, T.
Two Constructions of Covering Sets for Limited-Magnitude Errors
2016
IEEE Trans. Inf. Theory Vol. 62(3), pp. 1177-1182
article
DOI URL
Li, C. and Helleseth, T.
Quasi-perfect linear codes from planar and APN functions
2016
Cryptogr. Commun. Vol. 8(2), pp. 215-227
article
DOI URL
Li, C., Zeng, X., Li, C., Helleseth, T. and Li, M.
Construction of de Bruijn Sequences From LFSRs With Reducible Characteristic Polynomials
2016
IEEE Trans. Inf. Theory Vol. 62(1), pp. 610-624
article
DOI URL
Méaux, P., Journault, A., Standaert, F. and Carlet, C.
Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts
2016
Vol. 9665Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, pp. 311-343
inproceedings
DOI URL
Mofrad, A.A., Parker, M.G., Ferdosi, Z. and Tadayon, M.H.
Clique-Based Neural Associative Memories with Local Coding and Precoding
2016
Neural Comput. Vol. 28(8), pp. 1553-1573
article
DOI URL
Picek, S., Carlet, C., Guilley, S., Miller, J.F. and Jakobovic, D.
Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography
2016
Evol. Comput. Vol. 24(4), pp. 667-694
article
DOI URL
Semaev, I.A.
MaxMinMax problem and sparse equations over finite fields
2016
Des. Codes Cryptogr. Vol. 79(2), pp. 383-404
article
DOI URL
Tang, C., Li, N., Qi, Y., Zhou, Z. and Helleseth, T.
Linear Codes With Two or Three Weights From Weakly Regular Bent Functions
2016
IEEE Trans. Inf. Theory Vol. 62(3), pp. 1166-1176
article
DOI URL
Xia, Y., Li, N., Zeng, X. and Helleseth, T.
An Open Problem on the Distribution of a Niho-Type Cross-Correlation Function
2016
IEEE Trans. Inf. Theory Vol. 62(12), pp. 7546-7554
article
DOI URL
Zhang, F., Carlet, C., Hu, Y. and Zhang, W.
New secondary constructions of Bent functions
2016
Appl. Algebra Eng. Commun. Comput. Vol. 27(5), pp. 413-434
article
DOI URL
Zhou, Z., Li, N., Fan, C. and Helleseth, T.
Linear codes with two or three weights from quadratic Bent functions
2016
Des. Codes Cryptogr. Vol. 81(2), pp. 283-295
article
DOI URL
Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings
2016
Vol. 10076
proceedings
DOI URL
Alahmadi, A., Helleseth, T., Muthana, N.M., Almuzaini, A. and Solé, P.
Irreducible cyclic (Z)4 - codes and allied sequences
2015
Seventh International Workshop on Signal Design and its Applications in Communications, IWSDA 2015, Bengaluru, India, September 14-18, 2015, pp. 160-164
inproceedings
DOI URL
Carlet, C.
Boolean and Vectorial Plateaued Functions and APN Functions
2015
IEEE Trans. Inf. Theory Vol. 61(11), pp. 6272-6289
article
DOI URL
Carlet, C.
On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions
2015
Vol. 9084Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger, pp. 63-73
inproceedings
DOI URL
Carlet, C.
S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels
2015
Vol. 9354Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings, pp. 151-171
inproceedings
DOI URL
Carlet, C. and Alsalami, Y.
A new construction of differentially 4-uniform (n, n-1)-functions
2015
Adv. Math. Commun. Vol. 9(4), pp. 541-565
article
DOI URL
Carlet, C., Daif, A., Danger, J., Guilley, S., Najm, Z., Ngo, X.T., Porteboeuf, T. and Tavernier, C.
Optimized linear complementary codes implementation for hardware trojan prevention
2015
European Conference on Circuit Theory and Design, ECCTD 2015, Trondheim, Norway, August 24-26, 2015, pp. 1-4
inproceedings
DOI URL
Carlet, C. and Fouque, P.
Guest Editorial
2015
Cryptogr. Commun. Vol. 7(1), pp. 1-2
article
DOI URL
Carlet, C., Prouff, E., Rivain, M. and Roche, T.
Algebraic Decomposition for Probing Security
2015
Vol. 9215Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I, pp. 742-763
inproceedings
DOI URL
Carlet, C. and Tang, D.
Enhanced Boolean functions suitable for the filter model of pseudo-random generator
2015
Des. Codes Cryptogr. Vol. 76(3), pp. 571-587
article
DOI URL
Danielsen, L.E., Parker, M.G., Riera, C. and Knudsen, J.G.
On graphs and codes preserved by edge local complementation
2015
Des. Codes Cryptogr. Vol. 74(3), pp. 601-621
article
DOI URL
Fauskanger, S. and Semaev, I.A.
Statistical and Algebraic Properties of DES
2015
Vol. 9589Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers, pp. 93-107
inproceedings
DOI URL
Horák, P., Semaev, I.A. and Tuza, Z.
An application of Combinatorics in Cryptography
2015
Electron. Notes Discret. Math. Vol. 49, pp. 31-35
article
DOI URL
Kløve, T.
Codes of Length 2 Correcting Single Errors of Limited Size
2015
Vol. 9496Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings, pp. 190-201
inproceedings
DOI URL
Leander, G., Minaud, B. and Rønjom, S.
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
2015
Vol. 9056Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, pp. 254-283
inproceedings
DOI URL
Li, J., Carlet, C., Zeng, X., Li, C., Hu, L. and Shan, J.
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
2015
Des. Codes Cryptogr. Vol. 76(2), pp. 279-305
article
DOI URL
Li, N., Tang, X. and Helleseth, T.
A class of quaternary sequences with low correlation
2015
Adv. Math. Commun. Vol. 9(2), pp. 199-210
article
DOI URL
Li, N., Zhou, Z. and Helleseth, T.
On a conjecture about a class of optimal ternary cyclic codes
2015
Seventh International Workshop on Signal Design and its Applications in Communications, IWSDA 2015, Bengaluru, India, September 14-18, 2015, pp. 62-65
inproceedings
DOI URL
Mofrad, A.A., Ferdosi, Z., Parker, M.G. and Tadayon, M.H.
Neural network associative memories with local coding
2015
14th IEEE Canadian Workshop on Information Theory, CWIT 2015, St. John's, NL, Canada, July 6-9, 2015, pp. 178-181
inproceedings
DOI URL
Picek, S., Carlet, C., Jakobovic, D., Miller, J.F. and Batina, L.
Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective
2015
Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2015, Madrid, Spain, July 11-15, 2015, pp. 1095-1102
inproceedings
DOI URL
Tang, D., Carlet, C. and Tang, X.
Differentially 4-uniform bijections by permuting the inverse function
2015
Des. Codes Cryptogr. Vol. 77(1), pp. 117-141
article
DOI URL
Tu, Z., Zeng, X., Li, C. and Helleseth, T.
Permutation polynomials of the form (x(^p\({}^{\mbox{m}}\))-x+(δ))(^s)+L(x) over the finite field (_F)(_p)(_2)(_m) of odd characteristic
2015
Finite Fields Their Appl. Vol. 34, pp. 20-35
article
DOI URL
Xia, Y., Helleseth, T. and Li, C.
Some new classes of cyclic codes with three or six weights
2015
Adv. Math. Commun. Vol. 9(1), pp. 23-36
article
DOI URL
Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger
2015
Vol. 9084
proceedings
DOI URL
Barbero, A.I., Rosnes, E., Yang, G. and Ytrehus, Ø.
Near-Field Passive RFID Communication: Channel Model and Code Design
2014
IEEE Trans. Commun. Vol. 62(5), pp. 1716-1727
article
DOI URL
Barbero, A.I. and Ytrehus, Ø.
A Coding-Based Approach to Robust Shortest-Path Routing
2014
Vol. 3Coding Theory and Applications, 4th International Castle Meeting, ICMCTA 2014, Palmela Castle, Portugal, September 15-18, 2014, pp. 35-42
inproceedings
DOI URL
Barbero, A.I. and Ytrehus, Ø.
Information exchange for routing protocols
2014
2014 Information Theory and Applications Workshop, ITA 2014, San Diego, CA, USA, February 9-14, 2014, pp. 1-8
inproceedings
DOI URL
Bitouze, N., i Amat, A.G. and Rosnes, E.
Using Short Synchronous WOM Codes to Make WOM Codes Decodable
2014
IEEE Trans. Commun. Vol. 62(7), pp. 2156-2169
article
DOI URL
Budaghyan, L.
Construction and Analysis of Cryptographic Functions
2014
book
DOI URL
Budaghyan, L., Carlet, C., Helleseth, T. and Kholosha, A.
On o-Equivalence of Niho Bent Functions
2014
Vol. 9061Arithmetic of Finite Fields - 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers, pp. 155-168
inproceedings
DOI URL
Budaghyan, L., Helleseth, T. and Parker, M.G.
Editorial: special issue on coding and cryptography
2014
Des. Codes Cryptogr. Vol. 73(2), pp. 269
article
DOI URL
Budaghyan, L., Kholosha, A., Carlet, C. and Helleseth, T.
Niho bent functions from quadratic o-monomials
2014
2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014, pp. 1827-1831
inproceedings
DOI URL
Helleseth, T.
Open Problems on the Cross-correlation of m-Sequences
2014
Open Problems in Mathematics and Computational Science, pp. 163-179
incollection
DOI URL
Helleseth, T. and Jedwab, J.
Special issue editorial: Sequences and their applications
2014
Cryptogr. Commun. Vol. 6(1), pp. 1-2
article
DOI URL
Helmling, M., Rosnes, E., Ruzika, S. and Scholl, S.
Efficient maximum-likelihood decoding of linear block codes on binary memoryless channels
2014
2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014, pp. 2589-2593
inproceedings
DOI URL
Hong, S., Park, H., No, J., Helleseth, T. and Kim, Y.
Near-Optimal Partial Hadamard Codebook Construction Using Binary Sequences Obtained From Quadratic Residue Mapping
2014
IEEE Trans. Inf. Theory Vol. 60(6), pp. 3698-3705
article
DOI URL
Hu, H., Shao, S., Gong, G. and Helleseth, T.
On the proof of Lin's conjecture
2014
2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014, pp. 1822-1826
inproceedings
DOI URL
Hu, H., Shao, S., Gong, G. and Helleseth, T.
The Proof of Lin's Conjecture via the Decimation-Hadamard Transform
2014
IEEE Trans. Inf. Theory Vol. 60(8), pp. 5054-5064
article
DOI URL
Kløve, T. and Schwartz, M.
Erratum to: Linear covering codes and error-correcting codes for limited-magnitude errors
2014
Des. Codes Cryptogr. Vol. 73(3), pp. 1029
article
DOI URL
Kløve, T. and Schwartz, M.
Linear covering codes and error-correcting codes for limited-magnitude errors
2014
Des. Codes Cryptogr. Vol. 73(2), pp. 329-354
article
DOI URL
Li, C., Li, N., Helleseth, T. and Ding, C.
The Weight Distributions of Several Classes of Cyclic Codes From APN Monomials
2014
IEEE Trans. Inf. Theory Vol. 60(8), pp. 4710-4721
article
DOI URL
Li, C., Zeng, X., Helleseth, T., Li, C. and Hu, L.
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs
2014
IEEE Trans. Inf. Theory Vol. 60(5), pp. 3052-3061
article
DOI URL
Li, C., Zeng, X., Li, C. and Helleseth, T.
A Class of de Bruijn Sequences
2014
IEEE Trans. Inf. Theory Vol. 60(12), pp. 7955-7969
article
DOI URL
Li, N., Li, C., Helleseth, T., Ding, C. and Tang, X.
Optimal ternary cyclic codes with minimum distance four and five
2014
Finite Fields Their Appl. Vol. 30, pp. 100-120
article
DOI URL
Li, N., Tang, X. and Helleseth, T.
New textdollartextdollarMtextdollartextdollar M -ary sequences with low autocorrelation from interleaved technique
2014
Des. Codes Cryptogr. Vol. 73(1), pp. 237-249
article
DOI URL
Li, N., Tang, X. and Helleseth, T.
New Constructions of Quadratic Bent Functions in Polynomial Form
2014
IEEE Trans. Inf. Theory Vol. 60(9), pp. 5760-5767
article
DOI URL
Raddum, H. and Kazymyrov, O.
Algebraic Attacks Using Binary Decision Diagrams
2014
Vol. 9024Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers, pp. 40-54
inproceedings
DOI URL
Rosnes, E.
Spatially-coupled counter braids
2014
2014 IEEE Information Theory Workshop, ITW 2014, Hobart, Tasmania, Australia, November 2-5, 2014, pp. 187-191
inproceedings
DOI URL
Rosnes, E., Ambroze, M.A. and Tomlinson, M.
An upper bound on the minimum distance of array low-density parity-check codes
2014
2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014, pp. 3155-3159
inproceedings
DOI URL
Rosnes, E., Helmling, M. and i Amat, A.G.
Minimum Pseudoweight Analysis of 3-Dimensional Turbo Codes
2014
IEEE Trans. Commun. Vol. 62(7), pp. 2170-2182
article
DOI URL
Wang, Z., Parker, M.G., Gong, G. and Wu, G.
On the PMEPR of Binary Golay Sequences of Length textdollar2ˆn\textdollar
2014
IEEE Trans. Inf. Theory Vol. 60(4), pp. 2391-2398
article
DOI URL
Wu, G., Li, N., Helleseth, T. and Zhang, Y.
Some classes of monomial complete permutation polynomials over finite fields of characteristic two
2014
Finite Fields Their Appl. Vol. 28, pp. 148-165
article
DOI URL
Wu, G. and Parker, M.G.
A complementary construction using mutually unbiased bases
2014
Cryptogr. Commun. Vol. 6(1), pp. 3-25
article
DOI URL
Xia, Y., Chen, S., Helleseth, T. and Li, C.
Cross-Correlation between a p -Ary m -Sequence and Its All Decimated Sequences for d=((p(^m)+1)(p(^m)+p-1))/(p+1)
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 97-A(4), pp. 964-969
article
DOI URL
Xia, Y., Helleseth, T. and Wu, G.
A Note on Cross-Correlation Distribution Between a Ternary m -Sequence and Its Decimated Sequence
2014
Vol. 8865Sequences and Their Applications - SETA 2014 - 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings, pp. 249-259
inproceedings
DOI URL
Xia, Y., Li, C., Zeng, X. and Helleseth, T.
Some Results on Cross-Correlation Distribution Between a \(p\) -Ary \(m\) -Sequence and Its Decimated Sequences
2014
IEEE Trans. Inf. Theory Vol. 60(11), pp. 7368-7381
article
DOI URL
Augot, D., Canteaut, A., Kyureghyan, G.M.M., Solov'eva, F.I. and Ytrehus, Ø.
Editorial
2013
Des. Codes Cryptogr. Vol. 66(1-3), pp. 1-2
article
DOI URL
Cai, H., Zeng, X., Helleseth, T., Tang, X. and Yang, Y.
A New Construction of Zero-Difference Balanced Functions and Its Applications
2013
IEEE Trans. Inf. Theory Vol. 59(8), pp. 5008-5015
article
DOI URL
Danielsen, L.E. and Parker, M.G.
The selfnegadual properties of generalised quadratic Boolean functions
2013
Des. Codes Cryptogr. Vol. 66(1-3), pp. 305-316
article
DOI URL
Ding, C. and Helleseth, T.
Optimal Ternary Cyclic Codes From Monomials
2013
IEEE Trans. Inf. Theory Vol. 59(9), pp. 5898-5904
article
DOI URL
Helleseth, T., Jansen, C.J.A., Kazymyrov, O. and Kholosha, A.
State space cryptanalysis of the MICKEY cipher
2013
2013 Information Theory and Applications Workshop, ITA 2013, San Diego, CA, USA, February 10-15, 2013, pp. 1-10
inproceedings
DOI URL
Helleseth, T. and Kholosha, A.
Bent functions and their connections to combinatorics
2013
Vol. 409Surveys in Combinatorics 2013, pp. 91-126
incollection
DOI URL
Kholosha, A. and Pott, A.
Bent and related functions
2013
Handbook of Finite Fields, pp. 262-272
incollection
Li, N., Helleseth, T., Kholosha, A. and Tang, X.
On the Walsh Transform of a Class of Functions From Niho Exponents
2013
IEEE Trans. Inf. Theory Vol. 59(7), pp. 4662-4667
article
DOI URL
Li, N., Helleseth, T. and Tang, X.
Further results on a class of permutation polynomials over finite fields
2013
Finite Fields Their Appl. Vol. 22, pp. 16-23
article
DOI URL
Li, N., Helleseth, T., Tang, X. and Kholosha, A.
Several New Classes of Bent Functions From Dillon Exponents
2013
IEEE Trans. Inf. Theory Vol. 59(3), pp. 1818-1831
article
DOI URL
Yari, S., Kløve, T. and Bose, B.
Some Codes Correcting Unbalanced Errors of Limited Magnitude for Flash Memories
2013
IEEE Trans. Inf. Theory Vol. 59(11), pp. 7278-7287
article
DOI URL
Baldi, M., Bianchi, M., Cancellieri, G., Chiaraluce, F. and Kløve, T.
On the generator matrix of array LDPC codes
2012
20th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2012 , Split, Croatia, September 11-13, 2012, pp. 1-5
inproceedings
URL
Baldi, M., Bianchi, M., Chiaraluce, F. and Kløve, T.
A Class of Punctured Simplex Codes Which Are Proper for Error Detection
2012
IEEE Trans. Inf. Theory Vol. 58(6), pp. 3861-3880
article
DOI URL
Bitouze, N., i Amat, A.G. and Rosnes, E.
Making WOM codes decodable using short synchronous WOM codes
2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 1381-1385
inproceedings
DOI URL
Budaghyan, L., Carlet, C., Helleseth, T. and Kholosha, A.
Generalized bent functions and their relation to Maiorana-McFarland class
2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 1212-1215
inproceedings
DOI URL
Budaghyan, L., Carlet, C., Helleseth, T., Kholosha, A. and Mesnager, S.
Further Results on Niho Bent Functions
2012
IEEE Trans. Inf. Theory Vol. 58(11), pp. 6979-6985
article
DOI URL
Budaghyan, L. and Kazymyrov, O.
Verification of Restricted EA-Equivalence for Vectorial Boolean Functions
2012
Vol. 7369Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012. Proceedings, pp. 108-118
inproceedings
DOI URL
Gong, G., Helleseth, T. and Hu, H.
A Three-Valued Walsh Transform From Decimations of Helleseth-Gong Sequences
2012
IEEE Trans. Inf. Theory Vol. 58(2), pp. 1158-1162
article
DOI URL
Gong, G., Helleseth, T., Hu, H. and Kholosha, A.
On the Dual of Certain Ternary Weakly Regular Bent Functions
2012
IEEE Trans. Inf. Theory Vol. 58(4), pp. 2237-2243
article
DOI URL
Gong, G., Helleseth, T., Hu, H. and Li, C.
New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences
2012
Vol. 7280Sequences and Their Applications - SETA 2012 - 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings, pp. 327-337
inproceedings
DOI URL
Jia, W., Zeng, X., Helleseth, T. and Li, C.
A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic
2012
IEEE Trans. Inf. Theory Vol. 58(9), pp. 6054-6063
article
DOI URL
Kløve, T.
On some linear codes that are proper for error detection
2012
2012 Information Theory and Applications Workshop, ITA 2012, San Diego, CA, USA, February 5-10, 2012, pp. 33-38
inproceedings
DOI URL
Kløve, T. and Luo, J.
Upper Bounds on the Weight Distribution Function for Some Classes of Linear Codes
2012
IEEE Trans. Inf. Theory Vol. 58(8), pp. 5512-5521
article
DOI URL
Kløve, T., Luo, J. and Yari, S.
Codes Correcting Single Errors of Limited Magnitude
2012
IEEE Trans. Inf. Theory Vol. 58(4), pp. 2206-2219
article
DOI URL
Knudsen, J.G., Riera, C., Danielsen, L.E., Parker, M.G. and Rosnes, E.
Random Edge-Local Complementation with Applications to Iterative Decoding of High-Density Parity-Check Codes
2012
IEEE Trans. Commun. Vol. 60(10), pp. 2796-2808
article
DOI URL
Li, C. and Helleseth, T.
New nonbinary sequence families with low correlation and large linear span
2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 1411-1415
inproceedings
DOI URL
Li, C., Li, N. and Parker, M.G.
Complementary Sequence Pairs of Types II and III
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 95-A(11), pp. 1819-1826
article
DOI URL
Li, N., Tang, X. and Helleseth, T.
New classes of generalized boolean bent functions over Z4
2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 841-845
inproceedings
DOI URL
Luo, J. and Helleseth, T.
Binary Niho sequences with four-valued cross correlations
2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 1216-1220
inproceedings
DOI URL
Rosnes, E.
On the Minimum Distance of Turbo Codes With Quadratic Permutation Polynomial Interleavers
2012
IEEE Trans. Inf. Theory Vol. 58(7), pp. 4781-4795
article
DOI URL
Rosnes, E., Barbero, A.I. and Ytrehus, Ø.
Coding for Inductively Coupled Channels
2012
IEEE Trans. Inf. Theory Vol. 58(8), pp. 5418-5436
article
DOI URL
Rosnes, E., Ytrehus, Ø., Ambroze, M. and Tomlinson, M.
Addendum to "An Efficient Algorithm to Find All Small-Size Stopping Sets of Low-Density Parity-Check Matrices"
2012
IEEE Trans. Inf. Theory Vol. 58(1), pp. 164-171
article
DOI URL
Schilling, T.E. and Raddum, H.
Solving Compressed Right Hand Side Equation Systems with Linear Absorption
2012
Vol. 7280Sequences and Their Applications - SETA 2012 - 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings, pp. 291-302
inproceedings
DOI URL
Yang, G., Barbero, A.I., Rosnes, E. and Ytrehus, Ø.
Error correction on an insertion/deletion channel applying codes from RFID standards
2012
2012 Information Theory and Applications Workshop, ITA 2012, San Diego, CA, USA, February 5-10, 2012, pp. 137-142
inproceedings
DOI URL
Yang, G., Rosnes, E., Barbero, A.I. and Ytrehus, Ø.
On the power transfer of error-control codes for RFID communications
2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 498-502
inproceedings
DOI URL
Created by JabRef on 24/12/2023.