Search Results - "Mesnager, Sihem"
-
1
Recent results and problems on constructions of linear codes from cryptographic functions
Published in Cryptography and communications (01-09-2020)“…Linear codes have a wide range of applications in the data storage systems, communication systems, consumer electronics products since their algebraic…”
Get full text
Journal Article -
2
On the boomerang uniformity of quadratic permutations
Published in Designs, codes, and cryptography (01-10-2020)“…At Eurocrypt’18, Cid, Huang, Peyrin, Sasaki, and Song introduced a new tool called Boomerang Connectivity Table (BCT) for measuring the resistance of a block…”
Get full text
Journal Article -
3
New constructions of constant dimension subspace codes with large sizes
Published in Designs, codes, and cryptography (01-05-2024)“…Subspace codes have important applications in random network coding. It is a classical problem to construct subspace codes where both their size and their…”
Get full text
Journal Article -
4
On generalized hyper-bent functions
Published in Cryptography and communications (01-05-2020)“…Hyper-bent Boolean functions were introduced in 2001 by Youssef and Gong (and initially proposed by Golomb and Gong in 1999 as a component of S-boxes) to…”
Get full text
Journal Article -
5
On a class of permutation rational functions involving trace maps
Published in Designs, codes, and cryptography (01-05-2024)“…Permutation rational functions over finite fields have attracted high interest in recent years. However, only a few of them have been exhibited. This article…”
Get full text
Journal Article -
6
New Characterization and Parametrization of LCD Codes
Published in IEEE transactions on information theory (01-01-2019)“…Linear complementary dual (LCD) cyclic codes were referred historically to as reversible cyclic codes, which had applications in data storage. Due to a newly…”
Get full text
Journal Article -
7
Constructions of Optimal Uniform Wide-Gap Frequency-Hopping Sequences
Published in IEEE transactions on information theory (01-01-2022)“…In frequency hopping (FH) communication systems, frequency hopping sequences (FHSs) are crucial in determining the system's anti-jamming performance. If FHSs…”
Get full text
Journal Article -
8
The c -Differential-Linear Connectivity Table of Vectorial Boolean Functions
Published in Entropy (Basel, Switzerland) (22-02-2024)“…Vectorial Boolean functions and codes are closely related and interconnected. On the one hand, various requirements of binary linear codes are needed for their…”
Get full text
Journal Article -
9
New Constructions of Optimal Locally Recoverable Codes via Good Polynomials
Published in IEEE transactions on information theory (01-02-2018)“…In recent literature, a family of optimal linear locally recoverable codes (LRC codes) that attain the maximum possible distance (given code length,…”
Get full text
Journal Article -
10
Constructions of optimal locally recoverable codes via Dickson polynomials
Published in Designs, codes, and cryptography (01-09-2020)“…In 2014, Tamo and Barg have presented in a very remarkable paper a family of optimal linear locally recoverable codes (LRC codes) that attain the maximum…”
Get full text
Journal Article -
11
A new class of bent and hyper-bent Boolean functions in polynomial forms
Published in Designs, codes, and cryptography (01-04-2011)“…Bent functions are maximally nonlinear Boolean functions and exist only for functions with even number of inputs. This paper is a contribution to the…”
Get full text
Journal Article -
12
Constructions of two-dimensional Z-complementary array pairs with large ZCZ ratio
Published in Designs, codes, and cryptography (01-05-2022)“…Two-dimensional (2-D) Z-complementary array pair (ZCAP) is a pair of 2-D arrays, whose 2-D autocorrelation sum gives zero value at all time shifts in a zone…”
Get full text
Journal Article -
13
Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes
Published in Cryptography and communications (01-11-2022)“…The inverse, the Gold, and the Bracken-Leander functions are crucial for building S-boxes of block ciphers with good cryptographic properties in symmetric…”
Get full text
Journal Article -
14
A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity
Published in Designs, codes, and cryptography (2021)“…Rotation symmetric Boolean functions incorporate a super-class of symmetric functions which represent an attractive corpus for computer investigation. These…”
Get full text
Journal Article -
15
Decomposing Generalized Bent and Hyperbent Functions
Published in IEEE transactions on information theory (01-12-2017)“…In this paper, we introduce generalized hyperbent functions from F 2 n to ℤ 2 k , and investigate decompositions of generalized (hyper)bent functions. We show…”
Get full text
Journal Article -
16
Evaluation of weil sums for some polynomials and associated quadratic forms
Published in Cryptography and communications (01-05-2023)“…We study polynomials as quadratic forms over finite fields of odd characteristic. For these polynomials, we establish a connection between a kind of character…”
Get full text
Journal Article -
17
Further projective binary linear codes derived from two-to-one functions and their duals
Published in Designs, codes, and cryptography (01-03-2023)“…Binary linear codes with few weights have wide applications in communication, secret sharing schemes, authentication codes, association schemes, strongly…”
Get full text
Journal Article -
18
Survey on recent trends towards generalized differential and boomerang uniformities
Published in Cryptography and communications (01-07-2022)“…Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block and stream ciphers and cryptographic hash functions. The discovery…”
Get full text
Journal Article -
19
On constructions of weightwise perfectly balanced Boolean functions
Published in Cryptography and communications (01-11-2021)“…The recent FLIP cipher is an encryption scheme described by Méaux et al. at the conference EUROCRYPT 2016. It is based on a new stream cipher model called the…”
Get full text
Journal Article -
20
Optimal quaternary (r,δ)-locally recoverable codes: their structures and complete classification
Published in Designs, codes, and cryptography (01-04-2023)“…Locally recoverable codes (LRCs) have been introduced as a family of erasure codes that support the repair of a failed storage node by contacting a small…”
Get full text
Journal Article