Designs, Codes, and Cryptography, 1573-7586

Tidskrift

Fler filtreringsmöjligheter
  1. 2017
  2. Editorial: Special issue on coding and cryptography

    Charpin, P., Thomas Johansson, Kyureghyan, G., Sendrier, N. & Tillich, J. P., 2017 jan, I : Designs, Codes, and Cryptography. 82, 1, s. 1-2 2 s.

    Forskningsoutput: TidskriftsbidragDebate/Note/Editorial

  3. 2016
  4. Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension

    Löndahl, C., Thomas Johansson, Koochak Shooshtari, M., Ahmadian-Attari, M. & Aref, M. R., 2016 aug 1, I : Designs, Codes, and Cryptography. 80, 2, s. 359-377 19 s.

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  5. 2015
  6. A generalized birthday approach for efficiently finding linear relations in l-sequences

    Wang, H., Paul Stankovski & Thomas Johansson, 2015, I : Designs, Codes and Cryptography. 74, 1, s. 41-57

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  7. 2014
  8. Improved Algorithms for Finding Low-Weight Polynomial Multiples in GF(2)[x] and Some Cryptographic Applications

    Löndahl, C. & Thomas Johansson, 2014, I : Designs, Codes and Cryptography. 73, 2, s. 625-640

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  9. 2012
  10. Improved distinguishers for HC-128

    Paul Stankovski, Ruj, S., Martin Hell & Thomas Johansson, 2012, I : Designs, Codes and Cryptography. 63, 2, s. 225-240

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  11. 1995
  12. Authentication codes for non-trusting parties obtained from rank metric codes

    Thomas Johansson, 1995, I : Designs, Codes and Cryptography. 6, 3, s. 205-218

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift

  13. 1994
  14. A shift register construction of unconditionally secure authentication codes

    Thomas Johansson, 1994, I : Designs, Codes and Cryptography. 4, 1, s. 69-81

    Forskningsoutput: TidskriftsbidragArtikel i vetenskaplig tidskrift