The scope of the journal focuses on discrete structures used in stream and block ciphers in symmetric cryptography; code division multiple access in communications; and random number generation for statistics, cryptography and numerical methods. In particular, papers covering Boolean functions and sequences, without excluding any other discrete structure used in cryptography and communications, such as finite fields and other algebraic structures, are strongly encouraged.
该杂志的范围集中在对称密码学中的流密码和块密码中使用的离散结构;通信中的码分多址;以及用于统计、密码学和数值方法的随机数生成。特别是,论文涵盖布尔函数和序列,不排除任何其他离散结构用于密码学和通信,如有限域和其他代数结构,强烈鼓励。
Quadruple bordered constructions of self-dual codes from group rings
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00380-8
The 2-adic complexity of a class of binary sequences with optimal autocorrelation magnitude
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00411-4
If a generalised butterfly is APN then it operates on 6 bits
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00361-x
Changing APN functions at two points
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00366-6
Unicyclic strong permutations
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00384-4
Integer codes correcting sparse byte errors
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-0350-9
Frobenius linear translators giving rise to new infinite classes of permutations and bent functions
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00395-1
Notes on generalized Hamming weights of some classes of binary codes
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00404-3
A direct construction of primitive formally dual pairs having subsets with unequal sizes
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00389-z
Several new classes of self-dual bent functions derived from involutions
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00371-9
On the algebraic structure of quasi-cyclic codes of index 112\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin{document}$1\\frac {1}
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-0352-7
On complementary dual multinegacirculant codes
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00364-8
On the Menezes-Teske-Weng conjecture
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00359-5
On classical Kloosterman sums
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00357-7
An iterative method for linear decomposition of index generating functions
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-0351-8
Properties of tight frames that are regular schemes
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00378-2
Multiple characters transforms and generalized Boolean functions
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00383-5
On self-dual and LCD double circulant and double negacirculant codes over Fq+uFq\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin{d
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00363-9
Editorial: Special issue on Boolean functions and their applications 2018
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00409-y
On the search of smallest QC-LDPC code with girth six and eight
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00405-2
About the linear complexity of quaternary sequences with even length
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00419-w
A class of exponential sums and sequence families
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00368-4
Binary and ternary sequences with a few cross correlations
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00376-4
Decimated m-sequences families with optimal partial Hamming correlation
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00400-7
The Fourier spectral characterization for the correlation-immune functions over Fp\\documentclass[12pt]{minimal} \\usepackage{amsmath} \\usepackage{wasysym} \\usepackage{amsfonts} \\usepackage{amssymb} \\usepackage{amsbsy} \\usepackage{mathrsfs} \\usepackage{upgreek} \\setlength{\\oddsidemargin}{-69pt} \\begin
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00369-3
On the Nth maximum order complexity and the expansion complexity of a Rudin-Shapiro-like sequence
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00396-0
Frequency-hopping sequence sets with no-hit-zone through Cartesian product
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00381-7
One construction of perfect ternary sequences
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00414-1
On degree-d zero-sum sets of full rank
来源期刊:Cryptography and CommunicationsDOI:10.1007/s12095-019-00415-0