Publications by Selmer Center during 2012-2022

Matching entries: 0
settings...
AuthorTitleYearJournal/ProceedingsReftypeDOI/URL
Algrøy, J., Barbero, A.I. and Ytrehus, Ø. Determining the equivocation in coded transmission over a noisy channel 2022 IEEE International Symposium on Information Theory, ISIT 2022, Espoo, Finland, June 26 - July 1, 2022, pp. 1253-1258  inproceedings DOI URL 
Askeland, A., Dhooghe, S., Nikova, S., Rijmen, V. and Zhang, Z. Guarding the First Order: The Rise of AES Maskings 2022
Vol. 13820Smart Card Research and Advanced Applications - 21st International Conference, CARDIS 2022, Birmingham, UK, November 7-9, 2022, Revised Selected Papers, pp. 103-122 
inproceedings DOI URL 
Azimi, S.A., Ranea, A., Salmasizadeh, M., Mohajeri, J., Aref, M.R. and Rijmen, V. A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis 2022 Des. Codes Cryptogr.
Vol. 90(8), pp. 1797-1855 
article DOI URL 
Barbero, Á.I., Skachek, V. and Ytrehus, Ø. Preface of special issue on coding theory and applications 2022 Cryptogr. Commun.
Vol. 14(3), pp. 503 
article DOI URL 
Bardeh, N.G. and Rijmen, V. New Key-Recovery Attack on Reduced-Round AES 2022 IACR Trans. Symmetric Cryptol.
Vol. 2022(2), pp. 43-62 
article DOI URL 
Bartoli, D., Calderini, M., Riera, C. and Stanica, P. Low c-differential uniformity for functions modified on subfields 2022 Cryptogr. Commun.
Vol. 14(6), pp. 1211-1227 
article DOI URL 
Beierle, C., Carlet, C., Leander, G. and Perrin, L. A further study of quadratic APN permutations in dimension nine 2022 Finite Fields Their Appl.
Vol. 81, pp. 102049 
article DOI URL 
Beierle, C., Felke, P., Leander, G. and Rønjom, S. Decomposing Linear Layers 2022 IACR Trans. Symmetric Cryptol.
Vol. 2022(4), pp. 243-265 
article DOI URL 
Beyne, T. and Rijmen, V. Differential Cryptanalysis in the Fixed-Key Model 2022
Vol. 13509Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part III, pp. 687-716 
inproceedings DOI URL 
Bollauf, M.F., Lin, H. and Ytrehus, Ø. On the Secrecy Gain of Formally Unimodular Construction A4 Lattices 2022 IEEE International Symposium on Information Theory, ISIT 2022, Espoo, Finland, June 26 - July 1, 2022, pp. 3226-3231  inproceedings DOI URL 
Budaghyan, L., Calderini, M., Carlet, C., Davidova, D. and Kaleyski, N.S. On Two Fundamental Problems on APN Power Functions 2022 IEEE Trans. Inf. Theory
Vol. 68(5), pp. 3389-3403 
article DOI URL 
Budaghyan, L., Carlet, C., Ding, C. and Helleseth, T. Editorial: Special issue on Boolean functions and their applications 2021 2022 Cryptogr. Commun.
Vol. 14(6), pp. 1207-1209 
article DOI URL 
Budaghyan, L., Kaleyski, N.S., Riera, C. and Stanica, P. On the behavior of some APN permutations under swapping points 2022 Cryptogr. Commun.
Vol. 14(2), pp. 319-345 
article DOI URL 
Budroni, A. and Pintore, F. Efficient hash maps to textdollar{\textbackslash}mathbb \{G\}\_2textdollar on BLS curves 2022 Appl. Algebra Eng. Commun. Comput.
Vol. 33(3), pp. 261-281 
article DOI URL 
Carlet, C. A Wide Class of Boolean Functions Generalizing the Hidden Weight Bit Function 2022 IEEE Trans. Inf. Theory
Vol. 68(2), pp. 1355-1368 
article DOI URL 
Carlet, C. On APN Functions Whose Graphs are Maximal Sidon Sets 2022
Vol. 13568LATIN 2022: Theoretical Informatics - 15th Latin American Symposium, Guanajuato, Mexico, November 7-11, 2022, Proceedings, pp. 243-254 
inproceedings DOI URL 
Carlet, C. Parameterization of Boolean functions by vectorial functions and associated constructions 2022 Proceedings of the International Symposium on Artificial Intelligence and Mathematics 2022 (ISAIM 2022), Fort Lauderdale, Florida, USA, January 3-5, 2022  inproceedings URL 
Carlet, C., Djurasevic, M., Jakobovic, D., Mariot, L. and Picek, S. Evolving constructions for balanced, highly nonlinear boolean functions 2022 GECCO '22: Genetic and Evolutionary Computation Conference, Boston, Massachusetts, USA, July 9 - 13, 2022, pp. 1147-1155  inproceedings DOI URL 
Carlet, C. and Méaux, P. A Complete Study of Two Classes of Boolean Functions: Direct Sums of Monomials and Threshold Functions 2022 IEEE Trans. Inf. Theory
Vol. 68(5), pp. 3404-3425 
article DOI URL 
Ghosh, G., Majhi, S., Sarkar, P. and Upadhaya, A.K. Direct Construction of Optimal Z-Complementary Code Sets With Even Lengths by Using Generalized Boolean Functions 2022 IEEE Signal Processing Letters
Vol. 29, pp. 872-876 
article DOI  
Grassi, L., Khovratovich, D., Rønjom, S. and Schofnegger, M. The Legendre Symbol and the Modulo-2 Operator in Symmetric Schemes over Fnp Preimage Attack on Full Grendel 2022 IACR Trans. Symmetric Cryptol.
Vol. 2022(1), pp. 5-37 
article DOI URL 
Imaña, J.L., Budaghyan, L. and Kaleyski, N.S. Decomposition of Dillon's APN Permutation with Efficient Hardware Implementation 2022
Vol. 13638Arithmetic of Finite Fields - 9th International Workshop, WAIFI 2022, Chengdu, China, August 29 - September 2, 2022, Revised Selected Papers, pp. 250-268 
inproceedings DOI URL 
Kadir, W.K., Li, C. and Zullo, F. Encoding and decoding of several optimal rank metric codes 2022 Cryptogr. Commun.
Vol. 14(6), pp. 1281-1300 
article DOI URL 
Kaleyski, N.S. Deciding EA-equivalence via invariants 2022 Cryptogr. Commun.
Vol. 14(2), pp. 271-290 
article DOI URL 
Li, D., Li, C. and Sarkar, P. Asymptotically Optimal Quasi-Complementary Code Sets of Length p(_1)(^m\({}_{\mbox{1}}\))p(_2)(^m\({}_{\mbox{2}}\)) 2022 10th International Workshop on Signal Design and Its Applications in Communications, IWSDA 2022, Colchester, UK, August 1-5, 2022, pp. 1-5  inproceedings DOI URL 
Li, K., Zhou, Y., Li, C. and Qu, L. Two New Families of Quadratic APN Functions 2022 IEEE Trans. Inf. Theory
Vol. 68(7), pp. 4761-4769 
article DOI URL 
Liu, J., Rijmen, V., Hu, Y., Chen, J. and Wang, B. WARX: efficient white-box block cipher based on ARX primitives and random MDS matrix 2022 Sci. China Inf. Sci.
Vol. 65(3) 
article DOI URL 
Man, Y., Xia, Y., Li, C. and Helleseth, T. On the differential properties of the power mapping xpm+2 2022 Finite Fields Their Appl.
Vol. 84, pp. 102100 
article DOI URL 
Petrides, G. A number theoretic view on binary shift registers 2022 Cryptogr. Commun.
Vol. 14(5), pp. 1067-1080 
article DOI URL 
Petrides, G., Moldovan, D., Coenen, L., Guns, T. and Verbeke, W. Cost-sensitive learning for profit-driven credit scoring 2022 J. Oper. Res. Soc.
Vol. 73(2), pp. 338-350 
article DOI URL 
Petrides, G. and Verbeke, W. Cost-sensitive ensemble learning: a unifying framework 2022 Data Min. Knowl. Discov.
Vol. 36(1), pp. 1-28 
article DOI URL 
Posteuca, R. and Rijmen, V. RAMus- A New Lightweight Block Cipher for RAM Encryption 2022
Vol. 13409Security and Cryptography for Networks - 13th International Conference, SCN 2022, Amalfi, Italy, September 12-14, 2022, Proceedings, pp. 69-92 
inproceedings DOI URL 
Ranea, A. and Rijmen, V. Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA) 2022 IET Inf. Secur.
Vol. 16(6), pp. 470-481 
article DOI URL 
Shi, M., Helleseth, T., Özbudak, F. and Solé, P. Covering Radius of Melas Codes 2022 IEEE Trans. Inf. Theory
Vol. 68(7), pp. 4354-4364 
article DOI URL 
Shi, M., Wang, S., Helleseth, T. and Solé, P. Quadratic residue codes, rank three groups and PBIBDs 2022 Des. Codes Cryptogr.
Vol. 90(11), pp. 2599-2611 
article DOI URL 
Yan, H., Xia, Y., Li, C., Helleseth, T., Xiong, M. and Luo, J. The Differential Spectrum of the Power Mapping x(^p\({}^{\mbox{n}}\))(^-3) 2022 IEEE Trans. Inf. Theory
Vol. 68(8), pp. 5535-5547 
article DOI URL 
Zhang, D. and Helleseth, T. Sequences With Good Correlations Based on Circular Florentine Arrays 2022 IEEE Trans. Inf. Theory
Vol. 68(5), pp. 3381-3388 
article DOI URL 
Zhu, H., Shi, M., Wang, X. and Helleseth, T. The q-Ary Antiprimitive BCH Codes 2022 IEEE Trans. Inf. Theory
Vol. 68(3), pp. 1683-1695 
article DOI URL 
Zobiri, F., Gama, M., Nikova, S. and Deconinck, G. A Privacy-Preserving Three-Step Demand Response Market Using Multi-Party Computation 2022 2022 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, ISGT 2022, New Orleans, LA, USA, April 24-28, 2022, pp. 1-5  inproceedings DOI URL 
Bartoli, D. and Calderini, M. On construction and (non)existence of c-(almost) perfect nonlinear functions 2021 Finite Fields Their Appl.
Vol. 72, pp. 101835 
article DOI URL 
Bollauf, M.F. and Ytrehus, Ø. Tiling of Constellations 2021 IEEE International Symposium on Information Theory, ISIT 2021, Melbourne, Australia, July 12-20, 2021, pp. 450-454  inproceedings DOI URL 
Budaghyan, L., Calderini, M., Carlet, C., Coulter, R.S. and Villa, I. Generalized isotopic shift construction for APN functions 2021 Des. Codes Cryptogr.
Vol. 89(1), pp. 19-32 
article DOI URL 
Budaghyan, L., Carlet, C., Helleseth, T. and Nyberg, K. Editorial: Special issue on Boolean functions and their applications 2020 2021 Cryptogr. Commun.
Vol. 13(6), pp. 887-889 
article DOI URL 
Budroni, A., Guo, Q., Johansson, T., Mårtensson, E. and Wagner, P.S. Improvements on Making BKW Practical for Solving LWE 2021 Cryptogr.
Vol. 5(4), pp. 31 
article DOI URL 
Canteaut, A., Kölsch, L., Li, C., Li, C., Li, K., Qu, L. and Wiemer, F. Autocorrelations of Vectorial Boolean Functions 2021
Vol. 12912Progress in Cryptology - LATINCRYPT 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6-8, 2021, Proceedings, pp. 233-253 
inproceedings DOI URL 
Carlet, C. Bounds on the Nonlinearity of Differentially Uniform Functions by Means of Their Image Set Size, and on Their Distance to Affine Functions 2021 IEEE Trans. Inf. Theory
Vol. 67(12), pp. 8325-8334 
article DOI URL 
Carlet, C. On the Properties of the Boolean Functions Associated to the Differential Spectrum of General APN Functions and Their Consequences 2021 IEEE Trans. Inf. Theory
Vol. 67(10), pp. 6926-6939 
article DOI URL 
Carlet, C., de Chérisey, É., Guilley, S., Kavut, S. and Tang, D. Intrinsic Resiliency of S-Boxes Against Side-Channel Attacks-Best and Worst Scenarios 2021 IEEE Trans. Inf. Forensics Secur.
Vol. 16, pp. 203-218 
article DOI URL 
Carlet, C., Guilley, S. and Mesnager, S. Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography 2021 IACR Trans. Cryptogr. Hardw. Embed. Syst.
Vol. 2021(4), pp. 57-87 
article DOI URL 
Carlet, C., Jakobovic, D. and Picek, S. Evolutionary algorithms-assisted construction of cryptographic boolean functions 2021 GECCO '21: Genetic and Evolutionary Computation Conference, Lille, France, July 10-14, 2021, pp. 565-573  inproceedings DOI URL 
Carlet, C., Kim, K.H. and Mesnager, S. A direct proof of APN-ness of the Kasami functions 2021 Des. Codes Cryptogr.
Vol. 89(3), pp. 441-446 
article DOI URL 
Cheng, W., Carlet, C., Goli, K., Danger, J. and Guilley, S. Detecting faults in inner product masking scheme 2021 J. Cryptogr. Eng.
Vol. 11(2), pp. 119-133 
article DOI URL 
Cheng, W., Guilley, S., Carlet, C., Danger, J. and Mesnager, S. Information Leakages in Code-based Masking: A Unified Quantification Approach 2021 IACR Trans. Cryptogr. Hardw. Embed. Syst.
Vol. 2021(3), pp. 465-495 
article DOI URL 
Cheng, W., Guilley, S., Carlet, C., Mesnager, S. and Danger, J. Optimizing Inner Product Masking Scheme by a Coding Theory Approach 2021 IEEE Trans. Inf. Forensics Secur.
Vol. 16, pp. 220-235 
article DOI URL 
Davidova, D., Budaghyan, L., Carlet, C., Helleseth, T., Ihringer, F. and Penttila, T. Relation between o-equivalence and EA-equivalence for Niho bent functions 2021 Finite Fields Their Appl.
Vol. 72, pp. 101834 
article DOI URL 
Fernández-Hernández, I., Ashur, T. and Rijmen, V. Analysis and Recommendations for MAC and Key Lengths in Delayed Disclosure GNSS Authentication Protocols 2021 IEEE Trans. Aerosp. Electron. Syst.
Vol. 57(3), pp. 1827-1839 
article DOI URL 
Greve, B.M., Ytrehus, Ø., Raddum, H. and Fløystad, G. Solving non-linear Boolean equation systems by variable elimination 2021 Appl. Algebra Eng. Commun. Comput.
Vol. 32(1), pp. 3-47 
article DOI URL 
Helleseth, T., Katz, D.J. and Li, C. The Resolution of Niho's Last Conjecture Concerning Sequences, Codes, and Boolean Functions 2021 IEEE Trans. Inf. Theory
Vol. 67(10), pp. 6952-6962 
article DOI URL 
Horodecki, K., Studziifmmode nelse ʼnfiski, M., Kostecki, R.P., Sakarya, O. and Yang, D. Upper bounds on the leakage of private data and an operational approach to Markovianity 2021 Phys. Rev. A
Vol. 104, pp. 052422 
article DOI URL 
Kadir, W.K., Li, C. and Zullo, F. On interpolation-based decoding of a class of maximum rank distance codes 2021 IEEE International Symposium on Information Theory, ISIT 2021, Melbourne, Australia, July 12-20, 2021, pp. 31-36  inproceedings DOI URL 
Kaleyski, N.S. Invariants for EA- and CCZ-equivalence of APN and AB functions 2021 Cryptogr. Commun.
Vol. 13(6), pp. 995-1023 
article DOI URL 
Lawrance, N., Petrides, G. and Guerry, M. Predicting employee absenteeism for cost effective interventions 2021 Decis. Support Syst.
Vol. 147, pp. 113539 
article DOI URL 
Li, K., Li, C., Helleseth, T. and Qu, L. A Complete Characterization of the APN Property of a Class of Quadrinomials 2021 IEEE Trans. Inf. Theory
Vol. 67(11), pp. 7535-7549 
article DOI URL 
Li, K., Li, C., Helleseth, T. and Qu, L. Binary Linear Codes With Few Weights From Two-to-One Functions 2021 IEEE Trans. Inf. Theory
Vol. 67(7), pp. 4263-4275 
article DOI URL 
Li, K., Li, C., Helleseth, T. and Qu, L. Cryptographically strong permutations from the butterfly structure 2021 Des. Codes Cryptogr.
Vol. 89(4), pp. 737-761 
article DOI URL 
Luo, G., Cao, X., Shi, M. and Helleseth, T. Three New Constructions of Asymptotically Optimal Periodic Quasi-Complementary Sequence Sets With Small Alphabet Sizes 2021 IEEE Trans. Inf. Theory
Vol. 67(8), pp. 5168-5177 
article DOI URL 
Melloni, A., Stam, M. and Ytrehus, Ø. On Evaluating Anonymity of Onion Routing 2021
Vol. 13203Selected Areas in Cryptography - 28th International Conference, SAC 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers, pp. 3-24 
inproceedings DOI URL 
Mofrad, A.A., Mofrad, S.A., Yazidi, A. and Parker, M.G. On Neural Associative Memory Structures: Storage and Retrieval of Sequences in a Chain of Tournaments 2021 Neural Comput.
Vol. 33(9), pp. 2550-2577 
article DOI URL 
Rijmen, V. Editorial 2021 J. Cryptol.
Vol. 34(3), pp. 15 
article DOI URL 
Sadeghi, S., Rijmen, V. and Bagheri, N. Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK 2021 Des. Codes Cryptogr.
Vol. 89(9), pp. 2113-2155 
article DOI URL 
Sun, Z., Zeng, X., Li, C., Zhang, Y. and Yi, L. The Expansion Complexity of Ultimately Periodic Sequences Over Finite Fields 2021 IEEE Trans. Inf. Theory
Vol. 67(11), pp. 7550-7560 
article DOI URL 
Tor Helleseth, C.L. Pseudo-Noise Sequences 2021 Concise Encyclopedia of Coding Theory  inbook DOI URL 
Aragona, R., Calderini, M. and Civino, R. Some group-theoretical results on Feistel Networks in a long-key scenario 2020 Adv. Math. Commun.
Vol. 14(4), pp. 727-743 
article DOI URL 
Ashur, T., Beyne, T. and Rijmen, V. Revisiting the Wrong-Key-Randomization Hypothesis 2020 J. Cryptol.
Vol. 33(2), pp. 567-594 
article DOI URL 
Azimi, S.A., Ranea, A., Salmasizadeh, M., Mohajeri, J., Aref, M.R. and Rijmen, V. A Bit-Vector Differential Model for the Modular Addition by a Constant 2020
Vol. 12491Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I, pp. 385-414 
inproceedings DOI URL 
Budaghyan, L., Calderini, M., Carlet, C., Coulter, R.S. and Villa, I. Constructing APN Functions Through Isotopic Shifts 2020 IEEE Trans. Inf. Theory
Vol. 66(8), pp. 5299-5309 
article DOI URL 
Budaghyan, L., Calderini, M. and Villa, I. On equivalence between known families of quadratic APN functions 2020 Finite Fields Their Appl.
Vol. 66, pp. 101704 
article DOI URL 
Budaghyan, L., Calderini, M. and Villa, I. On relations between CCZ- and EA-equivalences 2020 Cryptogr. Commun.
Vol. 12(1), pp. 85-100 
article DOI URL 
Budaghyan, L., Carlet, C., Helleseth, T. and Kaleyski, N.S. On the Distance Between APN Functions 2020 IEEE Trans. Inf. Theory
Vol. 66(9), pp. 5742-5753 
article DOI URL 
Budaghyan, L. and Helleseth, T. Editorial: Special issue on Boolean functions and their applications 2020 Cryptogr. Commun.
Vol. 12(5), pp. 819-820 
article DOI URL 
Budaghyan, L., Helleseth, T. and Kaleyski, N.S. A New Family of APN Quadrinomials 2020 IEEE Trans. Inf. Theory
Vol. 66(11), pp. 7081-7087 
article DOI URL 
Budaghyan, L., Kaleyski, N.S., Kwon, S., Riera, C. and Stanica, P. Partially APN Boolean functions and classes of functions that are not APN infinitely often 2020 Cryptogr. Commun.
Vol. 12(3), pp. 527-545 
article DOI URL 
Budaghyan, L., Kaleyski, N.S., Riera, C. and Stanica, P. Partially APN functions with APN-like polynomial representations 2020 Des. Codes Cryptogr.
Vol. 88(6), pp. 1159-1177 
article DOI URL 
Budroni, A., Chetioui, B. and Franch, E. Attacks on Integer-RLWE 2020
Vol. 12282Information and Communications Security - 22nd International Conference, ICICS 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings, pp. 528-542 
inproceedings DOI URL 
Calderini, M. On the EA-classes of known APN functions in small dimensions 2020 Cryptogr. Commun.
Vol. 12(5), pp. 821-840 
article DOI URL 
Calderini, M. and Villa, I. On the boomerang uniformity of some permutation polynomials 2020 Cryptogr. Commun.
Vol. 12(6), pp. 1161-1178 
article DOI URL 
Carlet, C. Boolean Functions for Cryptography and Coding Theory 2020   book DOI URL 
Carlet, C. Graph Indicators of Vectorial Functions and Bounds on the Algebraic Degree of Composite Functions 2020 IEEE Trans. Inf. Theory
Vol. 66(12), pp. 7702-7716 
article DOI URL 
Carlet, C. Handling Vectorial Functions by Means of Their Graph Indicators 2020 IEEE Trans. Inf. Theory
Vol. 66(10), pp. 6324-6339 
article DOI URL 
Carlet, C., Djurasevic, M., Jakobovic, D. and Picek, S. A Search for Additional Structure: The Case of Cryptographic S-boxes 2020
Vol. 12270Parallel Problem Solving from Nature - PPSN XVI - 16th International Conference, PPSN 2020, Leiden, The Netherlands, September 5-9, 2020, Proceedings, Part II, pp. 343-356 
inproceedings DOI URL 
Carlet, C. and Feukoua, S. Three parameters of Boolean functions related to their constancy on affine spaces 2020 Adv. Math. Commun.
Vol. 14(4), pp. 651-676 
article DOI URL 
Davidova, D. and Kaleyski, N.S. Generalization of a Class of APN Binomials to Gold-Like Functions 2020
Vol. 12542Arithmetic of Finite Fields - 8th International Workshop, WAIFI 2020, Rennes, France, July 6-8, 2020, Revised Selected and Invited Papers, pp. 195-206 
inproceedings DOI URL 
Gorodilova, A., Agievich, S., Carlet, C., Hou, X., Idrisova, V., Kolomeec, N., Kutsenko, A., Mariot, L., Oblaukhov, A., Picek, S., Preneel, B., Rosie, R. and Tokareva, N.N. The Fifth International Students' Olympiad in cryptography - NSUCRYPTO: Problems and their solutions 2020 Cryptologia
Vol. 44(3), pp. 223-256 
article DOI URL 
Helleseth, T., Mow, W.H. and Zhou, Z. Editorial: Special issue on sequences and their applications 2018 2020 Cryptogr. Commun.
Vol. 12(3), pp. 321-323 
article DOI URL 
Kadir, W.K. and Li, C. On decoding additive generalized twisted Gabidulin codes 2020 Cryptogr. Commun.
Vol. 12(5), pp. 987-1009 
article DOI URL 
Kraleva, L., Posteuca, R. and Rijmen, V. Cryptanalysis of the Permutation Based Algorithm SpoC 2020
Vol. 12578Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings, pp. 273-293 
inproceedings DOI URL 
Li, C. and Yang, Y. On three conjectures of binary sequences with low odd-periodic autocorrelation 2020 Cryptogr. Commun.
Vol. 12(3), pp. 427-442 
article DOI URL 
Liu, Y., Zhang, W., Sun, B., Rijmen, V., Liu, G., Li, C., Fu, S. and Cao, M. The phantom of differential characteristics 2020 Des. Codes Cryptogr.
Vol. 88(11), pp. 2289-2311 
article DOI URL 
Medina, L.A., Parker, M.G., Riera, C. and Stanica, P. Root-Hadamard transforms and complementary sequences 2020 Cryptogr. Commun.
Vol. 12(5), pp. 1035-1049 
article DOI URL 
Sakalli, M.T., Akleylek, S., Akkanat, K. and Rijmen, V. On the automorphisms and isomorphisms of MDS matrices and their efficient implementations 2020 Turkish J. Electr. Eng. Comput. Sci.
Vol. 28(1), pp. 275-287 
article DOI URL 
Xia, Y., Zhang, X., Li, C. and Helleseth, T. The differential spectrum of a ternary power mapping 2020 Finite Fields Their Appl.
Vol. 64, pp. 101660 
article DOI URL 
Yang, Y. and Li, C. New quaternary sequences with optimal odd-periodic autocorrelation magnitude 2020 Cryptogr. Commun.
Vol. 12(3), pp. 363-374 
article DOI URL 
Yu, Y., Kaleyski, N.S., Budaghyan, L. and Li, Y. Classification of quadratic APN functions with coefficients in F2 for dimensions up to 9 2020 Finite Fields Their Appl.
Vol. 68, pp. 101733 
article DOI URL 
Zhang, D. and Helleseth, T. New Optimal Sets of Perfect Polyphase Sequences Based on Circular Florentine Arrays 2020 IEEE International Symposium on Information Theory, ISIT 2020, Los Angeles, CA, USA, June 21-26, 2020, pp. 2921-2925  inproceedings DOI URL 
Zhang, D., Parker, M.G. and Helleseth, T. Polyphase zero correlation zone sequences from generalised bent functions 2020 Cryptogr. Commun.
Vol. 12(3), pp. 325-335 
article DOI URL 
Aragona, R., Calderini, M., Civino, R., Sala, M. and Zappatore, I. Wave-shaped round functions and primitive groups 2019 Adv. Math. Commun.
Vol. 13(1), pp. 67-88 
article DOI URL 
Bardeh, N.G. and Rønjom, S. Practical Attacks on Reduced-Round AES 2019
Vol. 11627Progress in Cryptology - AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings, pp. 297-310 
inproceedings DOI URL 
Bardeh, N.G. and Rønjom, S. The Exchange Attack: How to Distinguish Six Rounds of AES with 2ˆ88.2 Chosen Plaintexts 2019
Vol. 11923Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III, pp. 347-370 
inproceedings DOI URL 
Bäuml, S., Winter, A. and Yang, D. Every entangled state provides an advantage in classical communication 2019 Journal of Mathematical Physics
Vol. 60(7), pp. 072201 
article DOI URL 
Bocharova, I.E., Kudryashov, B.D., Skachek, V., Rosnes, E. and Ytrehus, Ø. LDPC Codes Over the BEC: Bounds and Decoding Algorithms 2019 IEEE Trans. Commun.
Vol. 67(3), pp. 1754-1769 
article DOI URL 
Brunetta, C., Calderini, M. and Sala, M. On hidden sums compatible with a given block cipher diffusion layer 2019 Discret. Math.
Vol. 342(2), pp. 373-386 
article DOI URL 
Budaghyan, L., Calderini, M., Carlet, C., Coulter, R.S. and Villa, I. On Isotopic Shift Construction for Planar Functions 2019 IEEE International Symposium on Information Theory, ISIT 2019, Paris, France, July 7-12, 2019, pp. 2962-2966  inproceedings DOI URL 
Budaghyan, L., Carlet, C. and Helleseth, T. Editorial: Special Issue on Boolean functions and their applications 2019 Cryptogr. Commun.
Vol. 11(1), pp. 1-2 
article DOI URL 
Budaghyan, L., Carlet, C. and Helleseth, T. Editorial: Special issue on Boolean functions and their applications 2018 2019 Cryptogr. Commun.
Vol. 11(6), pp. 1145-1146 
article DOI URL 
Budaghyan, L., Li, C. and Parker, M.G. Editorial: Special Issue on Mathematical Methods for Cryptography 2019 Cryptogr. Commun.
Vol. 11(3), pp. 363-365 
article DOI URL 
Budroni, A. and Tenti, A. The Mersenne Low Hamming Combination Search Problem Can Be Reduced to an ILP Problem 2019
Vol. 11627Progress in Cryptology - AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9-11, 2019, Proceedings, pp. 41-55 
inproceedings DOI URL 
Carlet, C. On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures 2019 Des. Codes Cryptogr.
Vol. 87(2-3), pp. 203-224 
article DOI URL 
Carlet, C., Chen, X. and Qu, L. Constructing infinite families of low differential uniformity (n, m)-functions with m textgreater n / 2 2019 Des. Codes Cryptogr.
Vol. 87(7), pp. 1577-1599 
article DOI URL 
Carlet, C., Daif, A., Guilley, S. and Tavernier, C. Polynomial direct sum masking to protect against both SCA and FIA 2019 J. Cryptogr. Eng.
Vol. 9(3), pp. 303-312 
article DOI URL 
Carlet, C., Guilley, S., Güneri, C., Mesnager, S. and Özbudak, F. Construction of Efficient Codes for High-Order Direct Sum Masking 2019
Vol. 27Security and Privacy in the Internet of Things: Challenges and Solutions, pp. 108-128 
incollection DOI URL 
Carlet, C., Guilley, S. and Mesnager, S. Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks 2019
Vol. 27Security and Privacy in the Internet of Things: Challenges and Solutions, pp. 148-166 
incollection DOI URL 
Carlet, C., Li, C. and Mesnager, S. Linear codes with small hulls in semi-primitive case 2019 Des. Codes Cryptogr.
Vol. 87(12), pp. 3063-3075 
article DOI URL 
Carlet, C., Li, C. and Mesnager, S. Some (almost) optimally extendable linear codes 2019 Des. Codes Cryptogr.
Vol. 87(12), pp. 2813-2834 
article DOI URL 
Carlet, C., Mesnager, S., Tang, C. and Qi, Y. New Characterization and Parametrization of LCD Codes 2019 IEEE Trans. Inf. Theory
Vol. 65(1), pp. 39-49 
article DOI URL 
Carlet, C., Mesnager, S., Tang, C. and Qi, Y. On textdollar\sigmatextdollar -LCD Codes 2019 IEEE Trans. Inf. Theory
Vol. 65(3), pp. 1694-1704 
article DOI URL 
Cheng, W., Carlet, C., Goli, K., Danger, J. and Guilley, S. Detecting Faults in Inner-Product Masking Scheme - IPM-FD: IPM with Fault Detection 2019
Vol. 11Proceedings of 8th International Workshop on Security Proofs for Embedded Systems, PROOFS 2019, colocated with CHES 2018, Atlanta, GA, USA, August 24, 2019, pp. 17-32 
inproceedings DOI URL 
Edemskiy, V., Li, C., Zeng, X. and Helleseth, T. The linear complexity of generalized cyclotomic binary sequences of period p(^n) 2019 Des. Codes Cryptogr.
Vol. 87(5), pp. 1183-1197 
article DOI URL 
Fu, S., Feng, X., Wang, Q. and Carlet, C. On the Derivative Imbalance and Ambiguity of Functions 2019 IEEE Trans. Inf. Theory
Vol. 65(9), pp. 5833-5845 
article DOI URL 
Kaleyski, N.S. An Update on Known Invariants of Vectorial Boolean Functions 2019 Ninth International Workshop on Signal Design and its Applications in Communications, IWSDA 2019, Dongguan, China, October 20-24, 2019, pp. 1-3  inproceedings DOI URL 
Kaleyski, N.S. Changing APN functions at two points 2019 Cryptogr. Commun.
Vol. 11(6), pp. 1165-1184 
article DOI URL 
Kløve, T. Codes of length two correcting single errors of limited size 2019 Cryptogr. Commun.
Vol. 11(3), pp. 549-555 
article DOI URL 
Li, C. Interpolation-based Decoding of Nonlinear Maximum Rank Distance Codes 2019 IEEE International Symposium on Information Theory, ISIT 2019, Paris, France, July 7-12, 2019, pp. 2054-2058  inproceedings DOI URL 
Li, C., Rong, C. and Jaatun, M.G. A Cost-efficient Protocol for Open Blockchains 2019 2019 International Conference on Cyber Security and Protection of Digital Services, Cyber Security 2018, Oxford, United Kingdom, June 3-4, 2019, pp. 1-7  inproceedings DOI URL 
Li, L., Li, C., Li, C. and Zeng, X. New classes of complete permutation polynomials 2019 Finite Fields Their Appl.
Vol. 55, pp. 177-201 
article DOI URL 
Li, N. and Helleseth, T. New permutation trinomials from Niho exponents over finite fields with even characteristic 2019 Cryptogr. Commun.
Vol. 11(1), pp. 129-136 
article DOI URL 
Méaux, P., Carlet, C., Journault, A. and Standaert, F. Improved Filter Permutators for Efficient FHE: Better Instances and Implementations 2019
Vol. 11898Progress in Cryptology - INDOCRYPT 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings, pp. 68-91 
inproceedings DOI URL 
Wu, G. and Parker, M.G. On Boolean functions with several flat spectra 2019 Cryptogr. Commun.
Vol. 11(5), pp. 853-880 
article DOI URL 
Xu, X., Li, C. and Zeng, X. Nonsingular Polynomials from Feedback Shift Registers 2019 Int. J. Found. Comput. Sci.
Vol. 30(3), pp. 469-487 
article DOI URL 
Yan, H., Zhou, Z., Weng, J., Wen, J., Helleseth, T. and Wang, Q. Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields 2019 IEEE Trans. Inf. Theory
Vol. 65(10), pp. 6819-6826 
article DOI URL 
Yang, D., Horodecki, K. and Winter, A. Distributed Private Randomness Distillation 2019 Phys. Rev. Lett.
Vol. 123, pp. 170501 
article DOI URL 
Codes, Cryptology and Information Security - Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - In Honor of Said El Hajji 2019
Vol. 11445 
proceedings DOI URL 
Barbero, A.I. and Ytrehus, Ø. Rate (n-1)/n Systematic Memory Maximum Distance Separable Convolutional Codes 2018 IEEE Trans. Inf. Theory
Vol. 64(4), pp. 3018-3030 
article DOI URL 
Budaghyan, L., Carlet, C., Helleseth, T., Li, N. and Sun, B. On Upper Bounds for Algebraic Degrees of APN Functions 2018 IEEE Trans. Inf. Theory
Vol. 64(6), pp. 4399-4411 
article DOI URL 
Calderini, M. A note on some algebraic trapdoors for block ciphers 2018 Adv. Math. Commun.
Vol. 12(3), pp. 515-524 
article DOI URL 
Carlet, C. Characterizations of the Differential Uniformity of Vectorial Functions by the Walsh Transform 2018 IEEE Trans. Inf. Theory
Vol. 64(9), pp. 6443-6453 
article DOI URL 
Carlet, C. Componentwise APNness, Walsh uniformity of APN functions, and cyclic-additive difference sets 2018 Finite Fields Their Appl.
Vol. 53, pp. 226-253 
article DOI URL 
Carlet, C. On the nonlinearity of monotone Boolean functions 2018 Cryptogr. Commun.
Vol. 10(6), pp. 1051-1061 
article DOI URL 
Carlet, C. and Chen, X. Constructing Low-Weight dth-Order Correlation-Immune Boolean Functions Through the Fourier-Hadamard Transform 2018 IEEE Trans. Inf. Theory
Vol. 64(4), pp. 2969-2978 
article DOI URL 
Carlet, C. and Guilley, S. Statistical properties of side-channel and fault injection attacks using coding theory 2018 Cryptogr. Commun.
Vol. 10(5), pp. 909-933 
article DOI URL 
Carlet, C., Güneri, C., Mesnager, S. and Özbudak, F. Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks 2018
Vol. 11321Arithmetic of Finite Fields - 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers, pp. 95-107 
inproceedings DOI URL 
Carlet, C., Güneri, C., Özbudak, F., Özkaya, B. and Solé, P. On Linear Complementary Pairs of Codes 2018 IEEE Trans. Inf. Theory
Vol. 64(10), pp. 6583-6589 
article DOI URL 
Carlet, C., Güneri, C., Özbudak, F. and Solé, P. A new concatenated type construction for LCD codes and isometry codes 2018 Discret. Math.
Vol. 341(3), pp. 830-835 
article DOI URL 
Carlet, C., Mesnager, S., Tang, C. and Qi, Y. Euclidean and Hermitian LCD MDS codes 2018 Des. Codes Cryptogr.
Vol. 86(11), pp. 2605-2618 
article DOI URL 
Carlet, C., Mesnager, S., Tang, C., Qi, Y. and Pellikaan, R. Linear Codes Over (F)(_q) Are Equivalent to LCD Codes for qtextgreater3 2018 IEEE Trans. Inf. Theory
Vol. 64(4), pp. 3010-3017 
article DOI URL 
Ding, C., Li, C. and Xia, Y. Another generalisation of the binary Reed-Muller codes and its applications 2018 Finite Fields Their Appl.
Vol. 53, pp. 144-174 
article DOI URL 
Fauskanger, S. and Semaev, I.A. Separable Statistics and Multidimensional Linear Cryptanalysis 2018 IACR Trans. Symmetric Cryptol.
Vol. 2018(2), pp. 79-110 
article DOI URL 
Gong, G., Helleseth, T. and Kumar, P.V. Solomon W. Golomb - Mathematician, Engineer, and Pioneer 2018 IEEE Trans. Inf. Theory
Vol. 64(4), pp. 2844-2857 
article DOI URL 
Helleseth, T. and Preneel, B. Editorial: Special issue on recent trends in cryptography 2018 Cryptogr. Commun.
Vol. 10(1), pp. 1-3 
article DOI URL 
Kløve, T. Codes of Length Two Correcting Single Errors of Limited Size II 2018
Vol. 11321Arithmetic of Finite Fields - 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers, pp. 242-249 
inproceedings DOI URL 
Picek, S., Knezevic, K., Jakobovic, D. and Carlet, C. A Search for Differentially-6 Uniform (n, n-2) Functions 2018 2018 IEEE Congress on Evolutionary Computation, CEC 2018, Rio de Janeiro, Brazil, July 8-13, 2018, pp. 1-7  inproceedings DOI URL 
Shan, J., Hu, L., Zeng, X. and Li, C. A Construction of 1-Resilient Boolean Functions with Good Cryptographic Properties 2018 J. Syst. Sci. Complex.
Vol. 31(4), pp. 1042-1064 
article DOI URL 
Tan, P., Zhou, Z., Tang, D. and Helleseth, T. The weight distribution of a class of two-weight linear codes derived from Kloosterman sums 2018 Cryptogr. Commun.
Vol. 10(2), pp. 291-299 
article DOI URL 
Tu, Z., Zeng, X. and Helleseth, T. A class of permutation quadrinomials 2018 Discret. Math.
Vol. 341(11), pp. 3010-3020 
article DOI URL 
Tu, Z., Zeng, X. and Helleseth, T. New permutation quadrinomials over F22m 2018 Finite Fields Their Appl.
Vol. 50, pp. 304-318 
article DOI URL 
Tu, Z., Zeng, X., Li, C. and Helleseth, T. A class of new permutation trinomials 2018 Finite Fields Their Appl.
Vol. 50, pp. 178-195 
article DOI URL 
Xiao, Z., Zeng, X., Li, C. and Helleseth, T. New generalized cyclotomic binary sequences of period p(^2) 2018 Des. Codes Cryptogr.
Vol. 86(7), pp. 1483-1497 
article DOI URL 
Xu, X., Li, C., Zeng, X. and Helleseth, T. Constructions of complete permutation polynomials 2018 Des. Codes Cryptogr.
Vol. 86(12), pp. 2869-2892 
article DOI URL 
Xu, Y., Carlet, C., Mesnager, S. and Wu, C. Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions 2018 IEEE Trans. Inf. Theory
Vol. 64(1), pp. 367-383 
article DOI URL 
Zhou, Z., Helleseth, T. and Parampalli, U. A Family of Polyphase Sequences With Asymptotically Optimal Correlation 2018 IEEE Trans. Inf. Theory
Vol. 64(4), pp. 2896-2900 
article DOI URL 
Zhou, Z., Zhang, D., Helleseth, T. and Wen, J. A Construction of Multiple Optimal ZCZ Sequence Sets With Good Cross Correlation 2018 IEEE Trans. Inf. Theory
Vol. 64(2), pp. 1340-1346 
article DOI URL 
Arithmetic of Finite Fields - 7th International Workshop, WAIFI 2018, Bergen, Norway, June 14-16, 2018, Revised Selected Papers 2018
Vol. 11321 
proceedings DOI URL 
Alahmadi, A., Alhazmi, H., Ali, S., Helleseth, T., Hijazi, R., Li, C. and Solé, P. An analogue of the (Z)(_4)-Goethals code in non-primitive length 2017 J. Syst. Sci. Complex.
Vol. 30(4), pp. 950-966 
article DOI URL 
Battaglioni, M., Chiaraluce, F. and Kløve, T. On Non-Linear Codes Correcting Errors of Limited Size 2017 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, December 4-8, 2017, pp. 1-7  inproceedings DOI URL 
Bruneau, N., Carlet, C., Guilley, S., Heuser, A., Prouff, E. and Rioul, O. Stochastic Collision Attack 2017 IEEE Trans. Inf. Forensics Secur.
Vol. 12(9), pp. 2090-2104 
article DOI URL 
Budaghyan, L., Helleseth, T., Li, N. and Sun, B. Some Results on the Known Classes of Quadratic APN Functions 2017
Vol. 10194Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet, pp. 3-16 
inproceedings DOI URL 
Carlet, C. and Feukoua, S. Three basic questions on Boolean functions 2017 Adv. Math. Commun.
Vol. 11(4), pp. 837-855 
article DOI URL 
Carlet, C., Heuser, A. and Picek, S. Trade-Offs for S-Boxes: Cryptographic Properties and Side-Channel Resilience 2017
Vol. 10355Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings, pp. 393-414 
inproceedings DOI URL 
Carlet, C., Méaux, P. and Rotella, Y. Boolean functions with restricted input and their robustness; application to the FLIP cipher 2017 IACR Trans. Symmetric Cryptol.
Vol. 2017(3), pp. 192-227 
article DOI URL 
Carlet, C., Mesnager, S., Özbudak, F. and Sinak, A. Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions 2017
Vol. 10194Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet, pp. 328-345 
inproceedings DOI URL 
Grassi, L., Rechberger, C. and Rønjom, S. A New Structural-Differential Property of 5-Round AES 2017
Vol. 10211Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part II, pp. 289-317 
inproceedings DOI URL 
Horák, P., Semaev, I.A. and Tuza, Z. A combinatorial problem related to sparse systems of equations 2017 Des. Codes Cryptogr.
Vol. 85(1), pp. 129-144 
article DOI URL 
Li, N. and Helleseth, T. Several classes of permutation trinomials from Niho exponents 2017 Cryptogr. Commun.
Vol. 9(6), pp. 693-705 
article DOI URL 
Mofrad, A.A. and Parker, M.G. Nested-Clique Network Model of Neural Associative Memory 2017 Neural Comput.
Vol. 29(6), pp. 1681-1695 
article DOI URL 
Poussier, R., Guo, Q., Standaert, F., Carlet, C. and Guilley, S. Connecting and Improving Direct Sum Masking and Inner Product Masking 2017
Vol. 10728Smart Card Research and Advanced Applications - 16th International Conference, CARDIS 2017, Lugano, Switzerland, November 13-15, 2017, Revised Selected Papers, pp. 123-141 
inproceedings DOI URL 
Rønjom, S. Improving algebraic attacks on stream ciphers based on linear feedback shift register over textdollartextdollar\mathbb F\_2{\^{}}k\textdollartextdollar F 2 k 2017 Des. Codes Cryptogr.
Vol. 82(1-2), pp. 27-41 
article DOI URL 
Rønjom, S., Bardeh, N.G. and Helleseth, T. Yoyo Tricks with AES 2017
Vol. 10624Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I, pp. 217-243 
inproceedings DOI URL 
Sun, Z., Zeng, X., Li, C. and Helleseth, T. Investigations on Periodic Sequences With Maximum Nonlinear Complexity 2017 IEEE Trans. Inf. Theory
Vol. 63(10), pp. 6188-6198 
article DOI URL 
Tang, C., Zhou, Z., Qi, Y., Zhang, X., Fan, C. and Helleseth, T. Generic Construction of Bent Functions and Bent Idempotents With Any Possible Algebraic Degrees 2017 IEEE Trans. Inf. Theory
Vol. 63(10), pp. 6149-6157 
article DOI URL 
Tang, D., Carlet, C., Tang, X. and Zhou, Z. Construction of Highly Nonlinear 1-Resilient Boolean Functions With Optimal Algebraic Immunity and Provably High Fast Algebraic Immunity 2017 IEEE Trans. Inf. Theory
Vol. 63(9), pp. 6113-6125 
article DOI URL 
Tang, D., Carlet, C. and Zhou, Z. Binary linear codes from vectorial boolean functions and their weight distribution 2017 Discret. Math.
Vol. 340(12), pp. 3055-3072 
article DOI URL 
Xia, Y. and Li, C. Three-weight ternary linear codes from a family of power functions 2017 Finite Fields Their Appl.
Vol. 46, pp. 17-37 
article DOI URL 
Xia, Y., Li, N., Zeng, X. and Helleseth, T. On the Correlation Distribution for a Niho Decimation 2017 IEEE Trans. Inf. Theory
Vol. 63(11), pp. 7206-7218 
article DOI URL 
Coding Theory and Applications - 5th International Castle Meeting, ICMCTA 2017, Vihula, Estonia, August 28-31, 2017, Proceedings 2017
Vol. 10495 
proceedings DOI URL 
Alahmadi, A., Alhazmi, H., Helleseth, T., Hijazi, R., Muthana, N.M. and Solé, P. On the lifted Melas code 2016 Cryptogr. Commun.
Vol. 8(1), pp. 7-18 
article DOI URL 
Alahmadi, A., Alhazmi, H., Helleseth, T., Hijazi, R., Muthana, N.M. and Solé, P. On the lifted Zetterberg code 2016 Des. Codes Cryptogr.
Vol. 80(3), pp. 561-576 
article DOI URL 
Bocharova, I.E., Kudryashov, B.D., Rosnes, E., Skachek, V. and Ytrehus, Ø. Wrap-around sliding-window near-ML decoding of binary LDPC codes over the BEC 2016 9th International Symposium on Turbo Codes and Iterative Information Processing, ISTC 2016, Brest, France, September 5-9, 2016, pp. 16-20  inproceedings DOI URL 
Budaghyan, L., Carlet, C., Helleseth, T. and Li, N. On the (non-)existence of APN (n, n)-functions of algebraic degree n 2016 IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016, pp. 480-484  inproceedings DOI URL 
Budaghyan, L., Helleseth, T. and Kholosha, A. Editorial: Special issue on Boolean functions and their applications 2016 Cryptogr. Commun.
Vol. 8(2), pp. 173-174 
article DOI URL 
Budaghyan, L., Kholosha, A., Carlet, C. and Helleseth, T. Univariate Niho Bent Functions From o-Polynomials 2016 IEEE Trans. Inf. Theory
Vol. 62(4), pp. 2254-2265 
article DOI URL 
Carlet, C., Gong, G. and Tan, Y. Quadratic zero-difference balanced functions, APN functions and strongly regular graphs 2016 Des. Codes Cryptogr.
Vol. 78(3), pp. 629-654 
article DOI URL 
Carlet, C. and Guilley, S. Complementary dual codes for counter-measures to side-channel attacks 2016 Adv. Math. Commun.
Vol. 10(1), pp. 131-150 
article DOI URL 
Carlet, C., Joyner, D., Stanica, P. and Tang, D. Cryptographic properties of monotone Boolean functions 2016 J. Math. Cryptol.
Vol. 10(1), pp. 1-14 
article URL 
Carlet, C. and Mesnager, S. Four decades of research on bent functions 2016 Des. Codes Cryptogr.
Vol. 78(1), pp. 5-50 
article DOI URL 
Carlet, C. and Prouff, E. Polynomial Evaluation and Side Channel Analysis 2016
Vol. 9100The New Codebreakers - Essays Dedicated to David Kahn on the Occasion of His 85th Birthday, pp. 315-341 
inproceedings DOI URL 
Grassi, L., Rechberger, C. and Rønjom, S. Subspace Trail Cryptanalysis and its Applications to AES 2016 IACR Trans. Symmetric Cryptol.
Vol. 2016(2), pp. 192-225 
article DOI URL 
Helleseth, T. and Kholosha, A. New ternary binomial bent functions 2016 IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016, pp. 101-104  inproceedings DOI URL 
Kazymyrov, O., Oliynykov, R. and Raddum, H. Influence of addition modulo 2 n on algebraic attacks 2016 Cryptogr. Commun.
Vol. 8(2), pp. 277-289 
article DOI URL 
Kløve, T. On covering sets for limited-magnitude errors 2016 Cryptogr. Commun.
Vol. 8(3), pp. 415-433 
article DOI URL 
Kløve, T. Two Constructions of Covering Sets for Limited-Magnitude Errors 2016 IEEE Trans. Inf. Theory
Vol. 62(3), pp. 1177-1182 
article DOI URL 
Li, C. and Helleseth, T. Quasi-perfect linear codes from planar and APN functions 2016 Cryptogr. Commun.
Vol. 8(2), pp. 215-227 
article DOI URL 
Li, C., Zeng, X., Li, C., Helleseth, T. and Li, M. Construction of de Bruijn Sequences From LFSRs With Reducible Characteristic Polynomials 2016 IEEE Trans. Inf. Theory
Vol. 62(1), pp. 610-624 
article DOI URL 
Méaux, P., Journault, A., Standaert, F. and Carlet, C. Towards Stream Ciphers for Efficient FHE with Low-Noise Ciphertexts 2016
Vol. 9665Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I, pp. 311-343 
inproceedings DOI URL 
Mofrad, A.A., Parker, M.G., Ferdosi, Z. and Tadayon, M.H. Clique-Based Neural Associative Memories with Local Coding and Precoding 2016 Neural Comput.
Vol. 28(8), pp. 1553-1573 
article DOI URL 
Picek, S., Carlet, C., Guilley, S., Miller, J.F. and Jakobovic, D. Evolutionary Algorithms for Boolean Functions in Diverse Domains of Cryptography 2016 Evol. Comput.
Vol. 24(4), pp. 667-694 
article DOI URL 
Semaev, I.A. MaxMinMax problem and sparse equations over finite fields 2016 Des. Codes Cryptogr.
Vol. 79(2), pp. 383-404 
article DOI URL 
Tang, C., Li, N., Qi, Y., Zhou, Z. and Helleseth, T. Linear Codes With Two or Three Weights From Weakly Regular Bent Functions 2016 IEEE Trans. Inf. Theory
Vol. 62(3), pp. 1166-1176 
article DOI URL 
Xia, Y., Li, N., Zeng, X. and Helleseth, T. An Open Problem on the Distribution of a Niho-Type Cross-Correlation Function 2016 IEEE Trans. Inf. Theory
Vol. 62(12), pp. 7546-7554 
article DOI URL 
Zhang, F., Carlet, C., Hu, Y. and Zhang, W. New secondary constructions of Bent functions 2016 Appl. Algebra Eng. Commun. Comput.
Vol. 27(5), pp. 413-434 
article DOI URL 
Zhou, Z., Li, N., Fan, C. and Helleseth, T. Linear codes with two or three weights from quadratic Bent functions 2016 Des. Codes Cryptogr.
Vol. 81(2), pp. 283-295 
article DOI URL 
Security, Privacy, and Applied Cryptography Engineering - 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings 2016
Vol. 10076 
proceedings DOI URL 
Alahmadi, A., Helleseth, T., Muthana, N.M., Almuzaini, A. and Solé, P. Irreducible cyclic (Z)4 - codes and allied sequences 2015 Seventh International Workshop on Signal Design and its Applications in Communications, IWSDA 2015, Bengaluru, India, September 14-18, 2015, pp. 160-164  inproceedings DOI URL 
Carlet, C. Boolean and Vectorial Plateaued Functions and APN Functions 2015 IEEE Trans. Inf. Theory
Vol. 61(11), pp. 6272-6289 
article DOI URL 
Carlet, C. On the Properties of Vectorial Functions with Plateaued Components and Their Consequences on APN Functions 2015
Vol. 9084Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger, pp. 63-73 
inproceedings DOI URL 
Carlet, C. S-boxes, Boolean Functions and Codes for the Resistance of Block Ciphers to Cryptographic Attacks, with or without Side Channels 2015
Vol. 9354Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings, pp. 151-171 
inproceedings DOI URL 
Carlet, C. and Alsalami, Y. A new construction of differentially 4-uniform (n, n-1)-functions 2015 Adv. Math. Commun.
Vol. 9(4), pp. 541-565 
article DOI URL 
Carlet, C., Daif, A., Danger, J., Guilley, S., Najm, Z., Ngo, X.T., Porteboeuf, T. and Tavernier, C. Optimized linear complementary codes implementation for hardware trojan prevention 2015 European Conference on Circuit Theory and Design, ECCTD 2015, Trondheim, Norway, August 24-26, 2015, pp. 1-4  inproceedings DOI URL 
Carlet, C. and Fouque, P. Guest Editorial 2015 Cryptogr. Commun.
Vol. 7(1), pp. 1-2 
article DOI URL 
Carlet, C., Prouff, E., Rivain, M. and Roche, T. Algebraic Decomposition for Probing Security 2015
Vol. 9215Advances in Cryptology - CRYPTO 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part I, pp. 742-763 
inproceedings DOI URL 
Carlet, C. and Tang, D. Enhanced Boolean functions suitable for the filter model of pseudo-random generator 2015 Des. Codes Cryptogr.
Vol. 76(3), pp. 571-587 
article DOI URL 
Danielsen, L.E., Parker, M.G., Riera, C. and Knudsen, J.G. On graphs and codes preserved by edge local complementation 2015 Des. Codes Cryptogr.
Vol. 74(3), pp. 601-621 
article DOI URL 
Fauskanger, S. and Semaev, I.A. Statistical and Algebraic Properties of DES 2015
Vol. 9589Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers, pp. 93-107 
inproceedings DOI URL 
Horák, P., Semaev, I.A. and Tuza, Z. An application of Combinatorics in Cryptography 2015 Electron. Notes Discret. Math.
Vol. 49, pp. 31-35 
article DOI URL 
Kløve, T. Codes of Length 2 Correcting Single Errors of Limited Size 2015
Vol. 9496Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings, pp. 190-201 
inproceedings DOI URL 
Leander, G., Minaud, B. and Rønjom, S. A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro 2015
Vol. 9056Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part I, pp. 254-283 
inproceedings DOI URL 
Li, J., Carlet, C., Zeng, X., Li, C., Hu, L. and Shan, J. Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks 2015 Des. Codes Cryptogr.
Vol. 76(2), pp. 279-305 
article DOI URL 
Li, N., Tang, X. and Helleseth, T. A class of quaternary sequences with low correlation 2015 Adv. Math. Commun.
Vol. 9(2), pp. 199-210 
article DOI URL 
Li, N., Zhou, Z. and Helleseth, T. On a conjecture about a class of optimal ternary cyclic codes 2015 Seventh International Workshop on Signal Design and its Applications in Communications, IWSDA 2015, Bengaluru, India, September 14-18, 2015, pp. 62-65  inproceedings DOI URL 
Mofrad, A.A., Ferdosi, Z., Parker, M.G. and Tadayon, M.H. Neural network associative memories with local coding 2015 14th IEEE Canadian Workshop on Information Theory, CWIT 2015, St. John's, NL, Canada, July 6-9, 2015, pp. 178-181  inproceedings DOI URL 
Picek, S., Carlet, C., Jakobovic, D., Miller, J.F. and Batina, L. Correlation Immunity of Boolean Functions: An Evolutionary Algorithms Perspective 2015 Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2015, Madrid, Spain, July 11-15, 2015, pp. 1095-1102  inproceedings DOI URL 
Tang, D., Carlet, C. and Tang, X. Differentially 4-uniform bijections by permuting the inverse function 2015 Des. Codes Cryptogr.
Vol. 77(1), pp. 117-141 
article DOI URL 
Tu, Z., Zeng, X., Li, C. and Helleseth, T. Permutation polynomials of the form (x(^p\({}^{\mbox{m}}\))-x+(δ))(^s)+L(x) over the finite field (_F)(_p)(_2)(_m) of odd characteristic 2015 Finite Fields Their Appl.
Vol. 34, pp. 20-35 
article DOI URL 
Xia, Y., Helleseth, T. and Li, C. Some new classes of cyclic codes with three or six weights 2015 Adv. Math. Commun.
Vol. 9(1), pp. 23-36 
article DOI URL 
Codes, Cryptology, and Information Security - First International Conference, C2SI 2015, Rabat, Morocco, May 26-28, 2015, Proceedings - In Honor of Thierry Berger 2015
Vol. 9084 
proceedings DOI URL 
Barbero, A.I., Rosnes, E., Yang, G. and Ytrehus, Ø. Near-Field Passive RFID Communication: Channel Model and Code Design 2014 IEEE Trans. Commun.
Vol. 62(5), pp. 1716-1727 
article DOI URL 
Barbero, A.I. and Ytrehus, Ø. A Coding-Based Approach to Robust Shortest-Path Routing 2014
Vol. 3Coding Theory and Applications, 4th International Castle Meeting, ICMCTA 2014, Palmela Castle, Portugal, September 15-18, 2014, pp. 35-42 
inproceedings DOI URL 
Barbero, A.I. and Ytrehus, Ø. Information exchange for routing protocols 2014 2014 Information Theory and Applications Workshop, ITA 2014, San Diego, CA, USA, February 9-14, 2014, pp. 1-8  inproceedings DOI URL 
Bitouze, N., i Amat, A.G. and Rosnes, E. Using Short Synchronous WOM Codes to Make WOM Codes Decodable 2014 IEEE Trans. Commun.
Vol. 62(7), pp. 2156-2169 
article DOI URL 
Budaghyan, L. Construction and Analysis of Cryptographic Functions 2014   book DOI URL 
Budaghyan, L., Carlet, C., Helleseth, T. and Kholosha, A. On o-Equivalence of Niho Bent Functions 2014
Vol. 9061Arithmetic of Finite Fields - 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers, pp. 155-168 
inproceedings DOI URL 
Budaghyan, L., Helleseth, T. and Parker, M.G. Editorial: special issue on coding and cryptography 2014 Des. Codes Cryptogr.
Vol. 73(2), pp. 269 
article DOI URL 
Budaghyan, L., Kholosha, A., Carlet, C. and Helleseth, T. Niho bent functions from quadratic o-monomials 2014 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014, pp. 1827-1831  inproceedings DOI URL 
Helleseth, T. Open Problems on the Cross-correlation of m-Sequences 2014 Open Problems in Mathematics and Computational Science, pp. 163-179  incollection DOI URL 
Helleseth, T. and Jedwab, J. Special issue editorial: Sequences and their applications 2014 Cryptogr. Commun.
Vol. 6(1), pp. 1-2 
article DOI URL 
Helmling, M., Rosnes, E., Ruzika, S. and Scholl, S. Efficient maximum-likelihood decoding of linear block codes on binary memoryless channels 2014 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014, pp. 2589-2593  inproceedings DOI URL 
Hong, S., Park, H., No, J., Helleseth, T. and Kim, Y. Near-Optimal Partial Hadamard Codebook Construction Using Binary Sequences Obtained From Quadratic Residue Mapping 2014 IEEE Trans. Inf. Theory
Vol. 60(6), pp. 3698-3705 
article DOI URL 
Hu, H., Shao, S., Gong, G. and Helleseth, T. On the proof of Lin's conjecture 2014 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014, pp. 1822-1826  inproceedings DOI URL 
Hu, H., Shao, S., Gong, G. and Helleseth, T. The Proof of Lin's Conjecture via the Decimation-Hadamard Transform 2014 IEEE Trans. Inf. Theory
Vol. 60(8), pp. 5054-5064 
article DOI URL 
Kløve, T. and Schwartz, M. Erratum to: Linear covering codes and error-correcting codes for limited-magnitude errors 2014 Des. Codes Cryptogr.
Vol. 73(3), pp. 1029 
article DOI URL 
Kløve, T. and Schwartz, M. Linear covering codes and error-correcting codes for limited-magnitude errors 2014 Des. Codes Cryptogr.
Vol. 73(2), pp. 329-354 
article DOI URL 
Li, C., Li, N., Helleseth, T. and Ding, C. The Weight Distributions of Several Classes of Cyclic Codes From APN Monomials 2014 IEEE Trans. Inf. Theory
Vol. 60(8), pp. 4710-4721 
article DOI URL 
Li, C., Zeng, X., Helleseth, T., Li, C. and Hu, L. The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs 2014 IEEE Trans. Inf. Theory
Vol. 60(5), pp. 3052-3061 
article DOI URL 
Li, C., Zeng, X., Li, C. and Helleseth, T. A Class of de Bruijn Sequences 2014 IEEE Trans. Inf. Theory
Vol. 60(12), pp. 7955-7969 
article DOI URL 
Li, N., Li, C., Helleseth, T., Ding, C. and Tang, X. Optimal ternary cyclic codes with minimum distance four and five 2014 Finite Fields Their Appl.
Vol. 30, pp. 100-120 
article DOI URL 
Li, N., Tang, X. and Helleseth, T. New textdollartextdollarMtextdollartextdollar M -ary sequences with low autocorrelation from interleaved technique 2014 Des. Codes Cryptogr.
Vol. 73(1), pp. 237-249 
article DOI URL 
Li, N., Tang, X. and Helleseth, T. New Constructions of Quadratic Bent Functions in Polynomial Form 2014 IEEE Trans. Inf. Theory
Vol. 60(9), pp. 5760-5767 
article DOI URL 
Raddum, H. and Kazymyrov, O. Algebraic Attacks Using Binary Decision Diagrams 2014
Vol. 9024Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers, pp. 40-54 
inproceedings DOI URL 
Rosnes, E. Spatially-coupled counter braids 2014 2014 IEEE Information Theory Workshop, ITW 2014, Hobart, Tasmania, Australia, November 2-5, 2014, pp. 187-191  inproceedings DOI URL 
Rosnes, E., Ambroze, M.A. and Tomlinson, M. An upper bound on the minimum distance of array low-density parity-check codes 2014 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014, pp. 3155-3159  inproceedings DOI URL 
Rosnes, E., Helmling, M. and i Amat, A.G. Minimum Pseudoweight Analysis of 3-Dimensional Turbo Codes 2014 IEEE Trans. Commun.
Vol. 62(7), pp. 2170-2182 
article DOI URL 
Wang, Z., Parker, M.G., Gong, G. and Wu, G. On the PMEPR of Binary Golay Sequences of Length textdollar2ˆn\textdollar 2014 IEEE Trans. Inf. Theory
Vol. 60(4), pp. 2391-2398 
article DOI URL 
Wu, G., Li, N., Helleseth, T. and Zhang, Y. Some classes of monomial complete permutation polynomials over finite fields of characteristic two 2014 Finite Fields Their Appl.
Vol. 28, pp. 148-165 
article DOI URL 
Wu, G. and Parker, M.G. A complementary construction using mutually unbiased bases 2014 Cryptogr. Commun.
Vol. 6(1), pp. 3-25 
article DOI URL 
Xia, Y., Chen, S., Helleseth, T. and Li, C. Cross-Correlation between a p-Ary m-Sequence and Its All Decimated Sequences for d=((p(^m)+1)(p(^m)+p-1))/(p+1) 2014 IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
Vol. 97-A(4), pp. 964-969 
article DOI URL 
Xia, Y., Helleseth, T. and Wu, G. A Note on Cross-Correlation Distribution Between a Ternary m -Sequence and Its Decimated Sequence 2014
Vol. 8865Sequences and Their Applications - SETA 2014 - 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings, pp. 249-259 
inproceedings DOI URL 
Xia, Y., Li, C., Zeng, X. and Helleseth, T. Some Results on Cross-Correlation Distribution Between a \(p\) -Ary \(m\) -Sequence and Its Decimated Sequences 2014 IEEE Trans. Inf. Theory
Vol. 60(11), pp. 7368-7381 
article DOI URL 
Augot, D., Canteaut, A., Kyureghyan, G.M.M., Solov'eva, F.I. and Ytrehus, Ø. Editorial 2013 Des. Codes Cryptogr.
Vol. 66(1-3), pp. 1-2 
article DOI URL 
Cai, H., Zeng, X., Helleseth, T., Tang, X. and Yang, Y. A New Construction of Zero-Difference Balanced Functions and Its Applications 2013 IEEE Trans. Inf. Theory
Vol. 59(8), pp. 5008-5015 
article DOI URL 
Danielsen, L.E. and Parker, M.G. The selfnegadual properties of generalised quadratic Boolean functions 2013 Des. Codes Cryptogr.
Vol. 66(1-3), pp. 305-316 
article DOI URL 
Ding, C. and Helleseth, T. Optimal Ternary Cyclic Codes From Monomials 2013 IEEE Trans. Inf. Theory
Vol. 59(9), pp. 5898-5904 
article DOI URL 
Helleseth, T., Jansen, C.J.A., Kazymyrov, O. and Kholosha, A. State space cryptanalysis of the MICKEY cipher 2013 2013 Information Theory and Applications Workshop, ITA 2013, San Diego, CA, USA, February 10-15, 2013, pp. 1-10  inproceedings DOI URL 
Helleseth, T. and Kholosha, A. Bent functions and their connections to combinatorics 2013
Vol. 409Surveys in Combinatorics 2013, pp. 91-126 
incollection DOI URL 
Kholosha, A. and Pott, A. Bent and related functions 2013 Handbook of Finite Fields, pp. 262-272  incollection  
Li, N., Helleseth, T., Kholosha, A. and Tang, X. On the Walsh Transform of a Class of Functions From Niho Exponents 2013 IEEE Trans. Inf. Theory
Vol. 59(7), pp. 4662-4667 
article DOI URL 
Li, N., Helleseth, T. and Tang, X. Further results on a class of permutation polynomials over finite fields 2013 Finite Fields Their Appl.
Vol. 22, pp. 16-23 
article DOI URL 
Li, N., Helleseth, T., Tang, X. and Kholosha, A. Several New Classes of Bent Functions From Dillon Exponents 2013 IEEE Trans. Inf. Theory
Vol. 59(3), pp. 1818-1831 
article DOI URL 
Yari, S., Kløve, T. and Bose, B. Some Codes Correcting Unbalanced Errors of Limited Magnitude for Flash Memories 2013 IEEE Trans. Inf. Theory
Vol. 59(11), pp. 7278-7287 
article DOI URL 
Baldi, M., Bianchi, M., Cancellieri, G., Chiaraluce, F. and Kløve, T. On the generator matrix of array LDPC codes 2012 20th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2012 , Split, Croatia, September 11-13, 2012, pp. 1-5  inproceedings URL 
Baldi, M., Bianchi, M., Chiaraluce, F. and Kløve, T. A Class of Punctured Simplex Codes Which Are Proper for Error Detection 2012 IEEE Trans. Inf. Theory
Vol. 58(6), pp. 3861-3880 
article DOI URL 
Bitouze, N., i Amat, A.G. and Rosnes, E. Making WOM codes decodable using short synchronous WOM codes 2012 Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 1381-1385  inproceedings DOI URL 
Budaghyan, L., Carlet, C., Helleseth, T. and Kholosha, A. Generalized bent functions and their relation to Maiorana-McFarland class 2012 Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 1212-1215  inproceedings DOI URL 
Budaghyan, L., Carlet, C., Helleseth, T., Kholosha, A. and Mesnager, S. Further Results on Niho Bent Functions 2012 IEEE Trans. Inf. Theory
Vol. 58(11), pp. 6979-6985 
article DOI URL 
Budaghyan, L. and Kazymyrov, O. Verification of Restricted EA-Equivalence for Vectorial Boolean Functions 2012
Vol. 7369Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012. Proceedings, pp. 108-118 
inproceedings DOI URL 
Gong, G., Helleseth, T. and Hu, H. A Three-Valued Walsh Transform From Decimations of Helleseth-Gong Sequences 2012 IEEE Trans. Inf. Theory
Vol. 58(2), pp. 1158-1162 
article DOI URL 
Gong, G., Helleseth, T., Hu, H. and Kholosha, A. On the Dual of Certain Ternary Weakly Regular Bent Functions 2012 IEEE Trans. Inf. Theory
Vol. 58(4), pp. 2237-2243 
article DOI URL 
Gong, G., Helleseth, T., Hu, H. and Li, C. New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences 2012
Vol. 7280Sequences and Their Applications - SETA 2012 - 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings, pp. 327-337 
inproceedings DOI URL 
Jia, W., Zeng, X., Helleseth, T. and Li, C. A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic 2012 IEEE Trans. Inf. Theory
Vol. 58(9), pp. 6054-6063 
article DOI URL 
Kløve, T. On some linear codes that are proper for error detection 2012 2012 Information Theory and Applications Workshop, ITA 2012, San Diego, CA, USA, February 5-10, 2012, pp. 33-38  inproceedings DOI URL 
Kløve, T. and Luo, J. Upper Bounds on the Weight Distribution Function for Some Classes of Linear Codes 2012 IEEE Trans. Inf. Theory
Vol. 58(8), pp. 5512-5521 
article DOI URL 
Kløve, T., Luo, J. and Yari, S. Codes Correcting Single Errors of Limited Magnitude 2012 IEEE Trans. Inf. Theory
Vol. 58(4), pp. 2206-2219 
article DOI URL 
Knudsen, J.G., Riera, C., Danielsen, L.E., Parker, M.G. and Rosnes, E. Random Edge-Local Complementation with Applications to Iterative Decoding of High-Density Parity-Check Codes 2012 IEEE Trans. Commun.
Vol. 60(10), pp. 2796-2808 
article DOI URL 
Li, C. and Helleseth, T. New nonbinary sequence families with low correlation and large linear span 2012 Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 1411-1415  inproceedings DOI URL 
Li, C., Li, N. and Parker, M.G. Complementary Sequence Pairs of Types II and III 2012 IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
Vol. 95-A(11), pp. 1819-1826 
article DOI URL 
Li, N., Tang, X. and Helleseth, T. New classes of generalized boolean bent functions over Z4 2012 Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 841-845  inproceedings DOI URL 
Luo, J. and Helleseth, T. Binary Niho sequences with four-valued cross correlations 2012 Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 1216-1220  inproceedings DOI URL 
Rosnes, E. On the Minimum Distance of Turbo Codes With Quadratic Permutation Polynomial Interleavers 2012 IEEE Trans. Inf. Theory
Vol. 58(7), pp. 4781-4795 
article DOI URL 
Rosnes, E., Barbero, A.I. and Ytrehus, Ø. Coding for Inductively Coupled Channels 2012 IEEE Trans. Inf. Theory
Vol. 58(8), pp. 5418-5436 
article DOI URL 
Rosnes, E., Ytrehus, Ø., Ambroze, M. and Tomlinson, M. Addendum to "An Efficient Algorithm to Find All Small-Size Stopping Sets of Low-Density Parity-Check Matrices" 2012 IEEE Trans. Inf. Theory
Vol. 58(1), pp. 164-171 
article DOI URL 
Schilling, T.E. and Raddum, H. Solving Compressed Right Hand Side Equation Systems with Linear Absorption 2012
Vol. 7280Sequences and Their Applications - SETA 2012 - 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings, pp. 291-302 
inproceedings DOI URL 
Yang, G., Barbero, A.I., Rosnes, E. and Ytrehus, Ø. Error correction on an insertion/deletion channel applying codes from RFID standards 2012 2012 Information Theory and Applications Workshop, ITA 2012, San Diego, CA, USA, February 5-10, 2012, pp. 137-142  inproceedings DOI URL 
Yang, G., Rosnes, E., Barbero, A.I. and Ytrehus, Ø. On the power transfer of error-control codes for RFID communications 2012 Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, pp. 498-502  inproceedings DOI URL 
Created by JabRef on 24/12/2023.