专题:Coding theory and cryptography

This cluster of papers focuses on the intersection of cryptography and error-correcting codes, exploring topics such as algebraic attacks, Reed-Solomon codes, Boolean functions, the McEliece cryptosystem, frequency hopping sequences, and decoding algorithms. The papers delve into the design and analysis of cryptographic functions, code-based cryptography, fast correlation attacks, and constructions of secure communication systems.
最新文献
A note on cohomology and algebraic geometric codes on the curves over rings

article Full Text OpenAlex

Certain Residual Properties of Bounded Nilpotent Groups and Their Tree Products

article Full Text OpenAlex

On Infinite Direct Sums of Minimal Numberings of Functional Families

article Full Text OpenAlex

On sets of type $$(q+3,n)$$ in PG(3, q)

article Full Text OpenAlex

A Construction for Regular‐Graph Designs

article Full Text OpenAlex

$$ \mathcal{N} $$ = 4 line defect correlators of type BCD

article Full Text OpenAlex

Lagrangian Subvarieties of Hyperspherical Varieties Related to $$G_2$$

article Full Text OpenAlex

On Indices of Maximal Chains in Finite Groups

article Full Text OpenAlex

On C -normal and S -semipermutable subgroups of finite groups under coprime action

article Full Text OpenAlex

Several classes of optimal quinary cyclic codes with minimum distance four

article Full Text OpenAlex

近5年高被引文献
New Directions in Cryptography

book-chapter Full Text OpenAlex 570 FWCI75.975

A Refined Laser Method and Faster Matrix Multiplication

book-chapter Full Text OpenAlex 267 FWCI40.164

Color image encryption using orthogonal Latin squares and a new 2D chaotic system

article Full Text OpenAlex 231 FWCI20.867

Realization of an Error-Correcting Surface Code with Superconducting Qubits

article Full Text OpenAlex 229 FWCI29.782

Ascon v1.2: Lightweight Authenticated Encryption and Hashing

article Full Text OpenAlex 221 FWCI21.058

How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits

article Full Text OpenAlex 209 FWCI51.315

An Efficient Key Recovery Attack on SIDH

book-chapter Full Text OpenAlex 176 FWCI171.397

A New Algorithm for Digital Image Encryption Based on Chaos Theory

article Full Text OpenAlex 150 FWCI14.439

A Compact Hardware Implementation of CCA-Secure Key Exchange Mechanism CRYSTALS-KYBER on FPGA

article Full Text OpenAlex 142 FWCI14.852

Integer multiplication in time $O(n\mathrm{log}\, n)$

article Full Text OpenAlex 131 FWCI12.942