Sihem Mesnager
Orcid: 0000-0003-4008-2031
According to our database1,
Sihem Mesnager
authored at least 256 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Subfield Codes of Several Few-Weight Linear Codes Parameterized by Functions and Their Consequences.
IEEE Trans. Inf. Theory, June, 2024
Des. Codes Cryptogr., May, 2024
Des. Codes Cryptogr., May, 2024
On a class of APN power functions over odd characteristic finite fields: Their differential spectrum and <i>c</i>-differential properties.
Discret. Math., April, 2024
Jacobi sums over Galois rings of arbitrary characters and their applications in constructing asymptotically optimal codebooks.
Des. Codes Cryptogr., April, 2024
Entropy, March, 2024
Special Issue on Contemporary interactions between codes, cryptographic functions and/or sequences.
Cryptogr. Commun., January, 2024
Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box.
IACR Cryptol. ePrint Arch., 2024
Finite Fields Their Appl., 2024
Finite Fields Their Appl., 2024
Finite Fields Their Appl., 2024
Study of cyclic codes from low differentially uniform functions and its consequences.
Discret. Math., 2024
Discret. Math., 2024
In-depth analysis of S-boxes over binary finite fields concerning their differential and Feistel boomerang differential uniformities.
Discret. Math., 2024
Discret. Math., 2024
On the differential and Walsh spectra of x<sup>2q+1</sup> over F<sub>q<sup>2</sup></sub>.
CoRR, 2024
Proceedings of the Progress in Cryptology - AFRICACRYPT 2024, 2024
2023
Finite Fields Their Appl., December, 2023
The Complete Differential Spectrum of a Class of Power Permutations Over Odd Characteristic Finite Fields.
IEEE Trans. Inf. Theory, November, 2023
Constructions of Spectrally Null Constrained Complete Complementary Codes via the Graph of Extended Boolean Functions.
IEEE Trans. Inf. Theory, September, 2023
J. Inf. Secur. Appl., September, 2023
IEEE Trans. Inf. Theory, August, 2023
Discret. Math., July, 2023
IEEE Trans. Inf. Theory, June, 2023
Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture.
J. Cryptogr. Eng., June, 2023
IEEE Trans. Inf. Theory, May, 2023
Cryptogr. Commun., May, 2023
Optimal quaternary (r,δ )-locally recoverable codes: their structures and complete classification.
Des. Codes Cryptogr., April, 2023
Finite Fields Their Appl., March, 2023
Corrigendum to "Solving X23n+22n+2n-1+(X+1)23n+22n+2n-1=b in F24n and an alternative proof of a conjecture on the differential spectrum of the related monomial functions" [Finite Fields Appl. 83 (2022) 102086].
Finite Fields Their Appl., March, 2023
Further projective binary linear codes derived from two-to-one functions and their duals.
Des. Codes Cryptogr., March, 2023
IEEE Trans. Inf. Theory, February, 2023
More About the Corpus of Involutions From Two-to-One Mappings and Related Cryptographic S-Boxes.
IEEE Trans. Inf. Theory, February, 2023
Several classes of new weakly regular bent functions outside ℛℱ, their duals and some related (minimal) codes with few weights.
Des. Codes Cryptogr., 2023
Blockchain-Envisioned Post-Quantum Secure Sanitizable Signature for Audit Logs Management.
CoRR, 2023
On the Boomerang Spectrum of Power Permutation $X^{2^{3n}+2^{2n}+2^{n}-1}$ over $\GF{2^{4n}}$ and Extraction of Optimal Uniformity Boomerang Functions.
CoRR, 2023
CoRR, 2023
Proceedings of the Applications of Evolutionary Computation - 26th European Conference, 2023
2022
Classification of the Codewords of Weights 16 and 18 of the Reed-Muller Code RM(n-3, n).
IEEE Trans. Inf. Theory, 2022
IEEE Trans. Inf. Theory, 2022
On Infinite Families of Narrow-Sense Antiprimitive BCH Codes Admitting 3-Transitive Automorphism Groups and Their Consequences.
IEEE Trans. Inf. Theory, 2022
Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences.
IEEE Trans. Inf. Theory, 2022
IEEE Trans. Inf. Theory, 2022
Solving X23n+22n+2n-1+(X+1)23n+22n+2n-1=b in F24n and an alternative proof of a conjecture on the differential spectrum of the related monomial functions.
Finite Fields Their Appl., 2022
A function field approach toward good polynomials for further results on optimal LRC codes.
Finite Fields Their Appl., 2022
Discret. Math., 2022
Des. Codes Cryptogr., 2022
Des. Codes Cryptogr., 2022
Des. Codes Cryptogr., 2022
On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity.
Des. Codes Cryptogr., 2022
On the differential spectrum of a class of APN power functions over odd characteristic finite fields and their c-differential properties.
CoRR, 2022
Two low differentially uniform power permutations over odd characteristic finite fields: APN and differentially 4-uniform functions.
CoRR, 2022
Solving X<sup>2<sup>3n</sup>+2<sup>2n</sup>+2<sup>n</sup>-1</sup>+(X+1)<sup>2<sup>3n</sup>+2<sup>2n</sup>+2<sup>n</sup>-1</sup>=b in GF2<sup>4n</sup>.
CoRR, 2022
Concrete constructions of weightwise perfectly balanced (2-rotation symmetric) functions with optimal algebraic immunity and high weightwise nonlinearity.
Cryptogr. Commun., 2022
Cryptogr. Commun., 2022
Cryptogr. Commun., 2022
Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes.
Cryptogr. Commun., 2022
Möbius transformations and characterizations of hyper-bent functions from Dillon-like exponents with coefficients in extension fields.
Adv. Math. Commun., 2022
2021
IEEE Trans. Inf. Theory, 2021
IEEE Trans. Inf. Theory, 2021
IEEE Trans. Inf. Theory, 2021
IEEE Trans. Inf. Theory, 2021
IEEE Trans. Inf. Theory, 2021
A Novel Application of Boolean Functions With High Algebraic Immunity in Minimal Codes.
IEEE Trans. Inf. Theory, 2021
Guest Editorial Special Issue: "From Deletion-Correction to Graph Reconstruction: In Memory of Vladimir I. Levenshtein".
IEEE Trans. Inf. Theory, 2021
IEEE Trans. Inf. Theory, 2021
IEEE Trans. Inf. Forensics Secur., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IACR Cryptol. ePrint Arch., 2021
Finite Fields Their Appl., 2021
Finite Fields Their Appl., 2021
Discret. Math. Algorithms Appl., 2021
A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity.
Des. Codes Cryptogr., 2021
Des. Codes Cryptogr., 2021
Optimal quaternary (r, δ)-Locally Recoverable Codes: Their Structures and Complete Classification.
CoRR, 2021
Complete solution over F<sub>p<sup>n</sup></sub> of the equation X<sup>p<sup>k</sup>+1</sup>+X+a=0.
CoRR, 2021
Cryptogr. Commun., 2021
Cryptogr. Commun., 2021
Cryptogr. Commun., 2021
Cryptogr. Commun., 2021
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
Several Classes of Minimal Linear Codes With Few Weights From Weakly Regular Plateaued Functions.
IEEE Trans. Inf. Theory, 2020
IEEE Trans. Inf. Theory, 2020
IACR Cryptol. ePrint Arch., 2020
New characterizations and construction methods of bent and hyper-bent Boolean functions.
Discret. Math., 2020
Discret. Math., 2020
A proof of the Beierle-Kranz-Leander conjecture related to lightweight multiplication in $\mathbb {F}_{2^n}$.
Des. Codes Cryptogr., 2020
Des. Codes Cryptogr., 2020
Des. Codes Cryptogr., 2020
On the number of the rational zeros of linearized polynomials and the second-order nonlinearity of cubic Boolean functions.
Cryptogr. Commun., 2020
Solving x+x<sup>2<sup>l</sup></sup>+... +x<sup>2<sup>ml</sup></sup>=a over $\mathbb {F}_{2^{n}}$.
Cryptogr. Commun., 2020
Recent results and problems on constructions of linear codes from cryptographic functions.
Cryptogr. Commun., 2020
2019
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019
On the boomerang uniformity of quadratic permutations over 픽<sub>2<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2019
A Proof of the Beierle-Kranz-Leander's Conjecture related to Lightweight Multiplication in F<sub>2<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2019
Solving x<sup>2<sup>k</sup>+1</sup>+x+a=0 in 픽<sub>2<sup>n</sup></sub> with gcd(n, k)=1.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Eur. J. Comb., 2019
Des. Codes Cryptogr., 2019
Linear codes from weakly regular plateaued functions and their secret sharing schemes.
Des. Codes Cryptogr., 2019
Des. Codes Cryptogr., 2019
CoRR, 2019
Solving x<sup>2<sup>k</sup>+1</sup>+x+a=0 in F<sub>2<sup>n</sup></sub> with gcd(n, k)=1.
CoRR, 2019
CoRR, 2019
On the boomerang uniformity of (quadratic) permutations over F<sub>2<sup>n</sup></sub>.
CoRR, 2019
Cryptogr. Commun., 2019
Cryptogr. Commun., 2019
Cryptogr. Commun., 2019
Proceedings of the Ninth International Workshop on Signal Design and its Applications in Communications, 2019
Proceedings of the Ninth International Workshop on Signal Design and its Applications in Communications, 2019
Proceedings of the Advances in E-Business Engineering for Ubiquitous Computing, 2019
Proceedings of the Codes, Cryptology and Information Security, 2019
Proceedings of the Codes, Cryptology and Information Security, 2019
2018
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions.
IEEE Trans. Inf. Theory, 2018
IEEE Trans. Inf. Theory, 2018
IEEE Trans. Inf. Theory, 2018
IEEE Trans. Inf. Theory, 2018
IEEE Trans. Inf. Theory, 2018
IEEE Trans. Inf. Theory, 2018
Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions.
IACR Cryptol. ePrint Arch., 2018
Des. Codes Cryptogr., 2018
A Proof of the Beierle-Kranz-Leander Conjecture related to Lightweight Multiplication in F<sub>2<sup>n</sup></sub>.
CoRR, 2018
Cyclic bent functions and their applications in codes, codebooks, designs, MUBs and sequences.
CoRR, 2018
CoRR, 2018
Statistical integral distinguisher with multi-structure and its application on AES-like ciphers.
Cryptogr. Commun., 2018
Proceedings of the Arithmetic of Finite Fields - 7th International Workshop, 2018
Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks.
Proceedings of the Arithmetic of Finite Fields - 7th International Workshop, 2018
2017
IEEE Trans. Inf. Theory, 2017
A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs.
J. Hardw. Syst. Secur., 2017
Int. J. Comput. Math., 2017
CoRR, 2017
Linear codes with few weights from weakly regular bent functions based on a generic construction.
Cryptogr. Commun., 2017
Bent functions linear on elements of some classical spreads and presemifields spreads.
Cryptogr. Commun., 2017
Adv. Math. Commun., 2017
On constructions of bent, semi-bent and five valued spectrum functions from old bent functions.
Adv. Math. Commun., 2017
Adv. Math. Commun., 2017
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
Proceedings of the Codes, Cryptology and Information Security, 2017
Proceedings of the Codes, Cryptology and Information Security, 2017
2016
IEEE Trans. Inf. Theory, 2016
A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Further constructions of infinite families of bent functions from new permutations and their duals.
Cryptogr. Commun., 2016
Adv. Math. Commun., 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication.
Proceedings of the Risks and Security of Internet and Systems, 2016
2015
IEEE Trans. Inf. Theory, 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
Proceedings of the 2015 IEEE Information Theory Workshop, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
Proceedings of the Cryptography and Information Security in the Balkans, 2015
2014
IEEE Trans. Inf. Theory, 2014
Proceedings of the Sequences and Their Applications - SETA 2014, 2014
Proceedings of the Coding Theory and Applications, 4th International Castle Meeting, 2014
Proceedings of the Global Summit on Computer & Information Technology, 2014
On Semi-bent Functions and Related Plateaued Functions Over the Galois Field F<sub>2<sup>n</sup></sub>.
Proceedings of the Open Problems in Mathematics and Computational Science, 2014
2013
An efficient characterization of a family of hyper-bent functions with multiple trace terms.
J. Math. Cryptol., 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the Discrete Geometry and Algebraic Combinatorics, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2012
2011
Semibent Functions From Dillon and Niho Exponents, Kloosterman Sums, and Dickson Polynomials.
IEEE Trans. Inf. Theory, 2011
Bent and Hyper-Bent Functions in Polynomial Form and Their Link With Some Exponential Sums and Dickson Polynomials.
IEEE Trans. Inf. Theory, 2011
J. Comb. Theory A, 2011
IACR Cryptol. ePrint Arch., 2011
An efficient characterization of a family of hyperbent functions with multiple trace terms.
IACR Cryptol. ePrint Arch., 2011
Des. Codes Cryptogr., 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Proceedings of the Coding and Cryptology - Third International Workshop, 2011
Proceedings of the First International Conference on Data Compression, 2011
2010
Proceedings of the Arithmetic of Finite Fields, Third International Workshop, 2010
Recent results on bent and hyper-bent functions and their link with some exponential sums.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010
2009
Proceedings of the Cryptography and Coding, 2009
2008
Improving the Lower Bound on the Higher Order Nonlinearity of Boolean Functions With Prescribed Algebraic Immunity.
IEEE Trans. Inf. Theory, 2008
Proceedings of the 2008 IEEE Information Theory Workshop, 2008
2007
IEEE Trans. Inf. Theory, 2007
2006
Proceedings of the Sequences and Their Applications, 2006
2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2004
IACR Cryptol. ePrint Arch., 2004