Sihem Mesnager

Orcid: 0000-0003-4008-2031

According to our database1, Sihem Mesnager authored at least 240 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On a class of APN power functions over odd characteristic finite fields: Their differential spectrum and <i>c</i>-differential properties.
Discret. Math., April, 2024

Jacobi sums over Galois rings of arbitrary characters and their applications in constructing asymptotically optimal codebooks.
Des. Codes Cryptogr., April, 2024

Special Issue on Contemporary interactions between codes, cryptographic functions and/or sequences.
Cryptogr. Commun., January, 2024

Determination of cryptographic tables and properties related to the revised boomerang and its application to a fundamental S-box.
IACR Cryptol. ePrint Arch., 2024

2023
Several classes of linear codes with few weights over finite fields.
Finite Fields Their Appl., December, 2023

The Complete Differential Spectrum of a Class of Power Permutations Over Odd Characteristic Finite Fields.
IEEE Trans. Inf. Theory, November, 2023

Constructions of Spectrally Null Constrained Complete Complementary Codes via the Graph of Extended Boolean Functions.
IEEE Trans. Inf. Theory, September, 2023

A constant round quantum secure protocol for oblivious polynomial evaluation.
J. Inf. Secur. Appl., September, 2023

Parameters of Squares of Primitive Narrow-Sense BCH Codes and Their Complements.
IEEE Trans. Inf. Theory, August, 2023

Two families of few-weight codes over a finite chain ring.
Discret. Math., July, 2023

On the Niho Type Locally-APN Power Functions and Their Boomerang Spectrum.
IEEE Trans. Inf. Theory, June, 2023

Mul-IBS: a multivariate identity-based signature scheme compatible with IoT-based NDN architecture.
J. Cryptogr. Eng., June, 2023

Several Families of Binary Minimal Linear Codes From Two-to-One Functions.
IEEE Trans. Inf. Theory, May, 2023

Evaluation of weil sums for some polynomials and associated quadratic forms.
Cryptogr. Commun., May, 2023

Optimal quaternary (r,δ )-locally recoverable codes: their structures and complete classification.
Des. Codes Cryptogr., April, 2023

Completely characterizing a class of permutation quadrinomials.
Finite Fields Their Appl., March, 2023

Corrigendum to "Solving X23n+22n+2n-1+(X+1)23n+22n+2n-1=b in F24n and an alternative proof of a conjecture on the differential spectrum of the related monomial functions" [Finite Fields Appl. 83 (2022) 102086].
Finite Fields Their Appl., March, 2023

Further projective binary linear codes derived from two-to-one functions and their duals.
Des. Codes Cryptogr., March, 2023

New Binary Cross Z-Complementary Pairs With Large CZC Ratio.
IEEE Trans. Inf. Theory, February, 2023

More About the Corpus of Involutions From Two-to-One Mappings and Related Cryptographic S-Boxes.
IEEE Trans. Inf. Theory, February, 2023

Several classes of new weakly regular bent functions outside ℛℱ, their duals and some related (minimal) codes with few weights.
Des. Codes Cryptogr., 2023

Blockchain-Envisioned Post-Quantum Secure Sanitizable Signature for Audit Logs Management.
CoRR, 2023

On Linear Complementary Pairs of Algebraic Geometry Codes over Finite Fields.
CoRR, 2023

In-depth analysis of S-boxes over binary finite fields concerning their differential and Feistel boomerang differential uniformities.
CoRR, 2023

Constructions of Constant Dimension Subspace Codes.
CoRR, 2023

On the Boomerang Spectrum of Power Permutation $X^{2^{3n}+2^{2n}+2^{n}-1}$ over $\GF{2^{4n}}$ and Extraction of Optimal Uniformity Boomerang Functions.
CoRR, 2023

Solving $X^{2^{2k}+2^{k}+1}+(X+1)^{2^{2k}+2^{k}+1}=b$ over $\GF{2^{4k}}$.
CoRR, 2023

On differential properties of a class of Niho-type power function.
CoRR, 2023

Characterizations of a Class of Planar Functions over Finite Fields.
CoRR, 2023

Binomials and Trinomials as Planar Functions on Cubic Extensions of Finite Fields.
CoRR, 2023

On the Evolution of Boomerang Uniformity in Cryptographic S-boxes.
Proceedings of the Applications of Evolutionary Computation - 26th European Conference, 2023

2022
Classification of the Codewords of Weights 16 and 18 of the Reed-Muller Code RM(n-3, n).
IEEE Trans. Inf. Theory, 2022

On One-Dimensional Linear Minimal Codes Over Finite (Commutative) Rings.
IEEE Trans. Inf. Theory, 2022

On Infinite Families of Narrow-Sense Antiprimitive BCH Codes Admitting 3-Transitive Automorphism Groups and Their Consequences.
IEEE Trans. Inf. Theory, 2022

Generic Constructions of (Boolean and Vectorial) Bent Functions and Their Consequences.
IEEE Trans. Inf. Theory, 2022

Constructions of Optimal Uniform Wide-Gap Frequency-Hopping Sequences.
IEEE Trans. Inf. Theory, 2022

Solving X23n+22n+2n-1+(X+1)23n+22n+2n-1=b in F24n and an alternative proof of a conjecture on the differential spectrum of the related monomial functions.
Finite Fields Their Appl., 2022

A function field approach toward good polynomials for further results on optimal LRC codes.
Finite Fields Their Appl., 2022

Constructions of Z-optimal Type-II quadriphase Z-complementary pairs.
Discret. Math., 2022

Constructions of two-dimensional Z-complementary array pairs with large ZCZ ratio.
Des. Codes Cryptogr., 2022

Linear codes from support designs of ternary cyclic codes.
Des. Codes Cryptogr., 2022

An STP-based model toward designing S-boxes with good cryptographic properties.
Des. Codes Cryptogr., 2022

On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity.
Des. Codes Cryptogr., 2022

The Subfield Codes of Some Few-Weight Linear Codes.
CoRR, 2022

Cyclic codes from low differentially uniform functions.
CoRR, 2022

On the differential spectrum of a class of APN power functions over odd characteristic finite fields and their c-differential properties.
CoRR, 2022

Two low differentially uniform power permutations over odd characteristic finite fields: APN and differentially 4-uniform functions.
CoRR, 2022

Solving X<sup>2<sup>3n</sup>+2<sup>2n</sup>+2<sup>n</sup>-1</sup>+(X+1)<sup>2<sup>3n</sup>+2<sup>2n</sup>+2<sup>n</sup>-1</sup>=b in GF2<sup>4n</sup>.
CoRR, 2022

Concrete constructions of weightwise perfectly balanced (2-rotation symmetric) functions with optimal algebraic immunity and high weightwise nonlinearity.
Cryptogr. Commun., 2022

Survey on recent trends towards generalized differential and boomerang uniformities.
Cryptogr. Commun., 2022

Cryptanalysis of the AEAD and hash algorithm DryGASCON.
Cryptogr. Commun., 2022

Preimages of p -Linearized Polynomials over ${\mathbb {F}}_{p}$.
Cryptogr. Commun., 2022

A new family of polyphase sequences with low correlation.
Cryptogr. Commun., 2022

Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken-Leander S-boxes.
Cryptogr. Commun., 2022

Preface.
Adv. Math. Commun., 2022

Möbius transformations and characterizations of hyper-bent functions from Dillon-like exponents with coefficients in extension fields.
Adv. Math. Commun., 2022

2021
Fast Algebraic Immunity of Boolean Functions and LCD Codes.
IEEE Trans. Inf. Theory, 2021

On Correlation Immune Boolean Functions With Minimum Hamming Weight Power of 2.
IEEE Trans. Inf. Theory, 2021

Investigations on c-(Almost) Perfect Nonlinear Functions.
IEEE Trans. Inf. Theory, 2021

Further Study of 2-to-1 Mappings Over F<sub>2<sup>n</sup></sub>.
IEEE Trans. Inf. Theory, 2021

On Hulls of Some Primitive BCH Codes and Self-Orthogonal Codes.
IEEE Trans. Inf. Theory, 2021

A Novel Application of Boolean Functions With High Algebraic Immunity in Minimal Codes.
IEEE Trans. Inf. Theory, 2021

Guest Editorial Special Issue: "From Deletion-Correction to Graph Reconstruction: In Memory of Vladimir I. Levenshtein".
IEEE Trans. Inf. Theory, 2021

Cyclic Bent Functions and Their Applications in Sequences.
IEEE Trans. Inf. Theory, 2021

Optimizing Inner Product Masking Scheme by a Coding Theory Approach.
IEEE Trans. Inf. Forensics Secur., 2021

Information Leakages in Code-based Masking: A Unified Quantification Approach.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Structural Attack (and Repair) of Diffused-Input-Blocked-Output White-Box Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Complete solution over $\GF{p^n}$ of the equation X<sup>p<sup>k+1</sup>+X+a=0</sup>.
IACR Cryptol. ePrint Arch., 2021

Complete solution over Fpn of the equation Xpk+1+X+a=0.
Finite Fields Their Appl., 2021

Solving <i>X</i><sup><i>q</i>+1</sup> + <i>X</i> + <i>a</i> = 0 over finite fields.
Finite Fields Their Appl., 2021

Linear codes from vectorial Boolean functions in the context of algebraic attacks.
Discret. Math. Algorithms Appl., 2021

A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity.
Des. Codes Cryptogr., 2021

Correction to: Good polynomials for optimal LRC of low locality.
Des. Codes Cryptogr., 2021

Good polynomials for optimal LRC of low locality.
Des. Codes Cryptogr., 2021

A direct proof of APN-ness of the Kasami functions.
Des. Codes Cryptogr., 2021

Optimal quaternary (r, δ)-Locally Recoverable Codes: Their Structures and Complete Classification.
CoRR, 2021

Constructions of Binary Cross Z-Complementary Pairs With Large CZC Ratio.
CoRR, 2021

New constructions of $q$-Ary 2-D Z-Complementary Array Pairs.
CoRR, 2021

A function field approach toward good polynomials for optimal LRC codes.
CoRR, 2021

Complete solution over F<sub>p<sup>n</sup></sub> of the equation X<sup>p<sup>k</sup>+1</sup>+X+a=0.
CoRR, 2021

Linear codes with one-dimensional hull associated with Gaussian sums.
Cryptogr. Commun., 2021

On constructions of weightwise perfectly balanced Boolean functions.
Cryptogr. Commun., 2021

More permutations and involutions for constructing bent functions.
Cryptogr. Commun., 2021

Investigation for 8-bit SKINNY-like S-boxes, analysis and applications.
Cryptogr. Commun., 2021

Secret sharing schemes based on the dual of Golay codes.
Cryptogr. Commun., 2021

POSTER: Resistance Analysis of Two AES-Like Against the Boomerang Attack.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Several Classes of Minimal Linear Codes With Few Weights From Weakly Regular Plateaued Functions.
IEEE Trans. Inf. Theory, 2020

Minimal Linear Codes From Characteristic Functions.
IEEE Trans. Inf. Theory, 2020

Constructions of Self-Orthogonal Codes From Hulls of BCH Codes and Their Parameters.
IEEE Trans. Inf. Theory, 2020

Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks.
IACR Cryptol. ePrint Arch., 2020

Solving some affine equations over finite fields.
Finite Fields Their Appl., 2020

Solving x2k+1+x+a=0 in F2n with gcd⁡(n, k)=1.
Finite Fields Their Appl., 2020

Codebooks from generalized bent Z4-valued quadratic forms.
Discret. Math., 2020

New characterizations and construction methods of bent and hyper-bent Boolean functions.
Discret. Math., 2020

New characterizations for the multi-output correlation-immune Boolean functions.
Discret. Math., 2020

On the boomerang uniformity of quadratic permutations.
Des. Codes Cryptogr., 2020

A proof of the Beierle-Kranz-Leander conjecture related to lightweight multiplication in $\mathbb {F}_{2^n}$.
Des. Codes Cryptogr., 2020

Constructions of optimal locally recoverable codes via Dickson polynomials.
Des. Codes Cryptogr., 2020

A class of narrow-sense BCH codes over $\mathbb {F}_q$ of length $\frac{q^m-1}{2}$.
Des. Codes Cryptogr., 2020

Preimages of p-Linearized Polynomials over F<sub>p</sub>.
CoRR, 2020

On the number of the rational zeros of linearized polynomials and the second-order nonlinearity of cubic Boolean functions.
Cryptogr. Commun., 2020

On the Menezes-Teske-Weng conjecture.
Cryptogr. Commun., 2020

Solving x+x<sup>2<sup>l</sup></sup>+... +x<sup>2<sup>ml</sup></sup>=a over $\mathbb {F}_{2^{n}}$.
Cryptogr. Commun., 2020

On generalized hyper-bent functions.
Cryptogr. Commun., 2020

Recent results and problems on constructions of linear codes from cryptographic functions.
Cryptogr. Commun., 2020

Letters for post-quantum cryptography standard evaluation.
Adv. Math. Commun., 2020

2019
Direct Sum Masking as a Countermeasure to Side-Channel and Fault Injection Attacks.
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019

Construction of Efficient Codes for High-Order Direct Sum Masking.
Proceedings of the Security and Privacy in the Internet of Things: Challenges and Solutions, 2019

On Two-to-One Mappings Over Finite Fields.
IEEE Trans. Inf. Theory, 2019

On $\sigma$ -LCD Codes.
IEEE Trans. Inf. Theory, 2019

New Characterization and Parametrization of LCD Codes.
IEEE Trans. Inf. Theory, 2019

On the boomerang uniformity of quadratic permutations over 픽<sub>2<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2019

A Proof of the Beierle-Kranz-Leander's Conjecture related to Lightweight Multiplication in F<sub>2<sup>n</sup></sub>.
IACR Cryptol. ePrint Arch., 2019

Solving x<sup>2<sup>k</sup>+1</sup>+x+a=0 in 픽<sub>2<sup>n</sup></sub> with gcd(n, k)=1.
IACR Cryptol. ePrint Arch., 2019

Solving X<sup>q+1</sup>+X+a=0 over Finite Fields.
IACR Cryptol. ePrint Arch., 2019

Solutions of x<sup>q<sup>k</sup>+...+x<sup>q</sup>+x=a</sup> in GF(2<sup>n)</sup>.
IACR Cryptol. ePrint Arch., 2019

On q-ary plateaued functions over Fq and their explicit characterizations.
Eur. J. Comb., 2019

Further study on the maximum number of bent components of vectorial functions.
Des. Codes Cryptogr., 2019

Linear codes from weakly regular plateaued functions and their secret sharing schemes.
Des. Codes Cryptogr., 2019

Weightwise perfectly balanced functions with high weightwise nonlinearity profile.
Des. Codes Cryptogr., 2019

Linear codes with small hulls in semi-primitive case.
Des. Codes Cryptogr., 2019

Some (almost) optimally extendable linear codes.
Des. Codes Cryptogr., 2019

Solutions of x<sup>q<sup>k</sup></sup>+...+x<sup>q</sup>+x=a in GF{2<sup>n</sup>}.
CoRR, 2019

Codebooks from generalized bent Z<sub>4</sub>-valued quadratic forms.
CoRR, 2019

Solving x<sup>2<sup>k</sup>+1</sup>+x+a=0 in F<sub>2<sup>n</sup></sub> with gcd(n, k)=1.
CoRR, 2019

A class of narrow-sense BCH codes over F<sub>q</sub> of length (q<sup>m</sup>-1)/2.
CoRR, 2019

On the boomerang uniformity of (quadratic) permutations over F<sub>2<sup>n</sup></sub>.
CoRR, 2019

On the nonlinearity of Boolean functions with restricted input.
Cryptogr. Commun., 2019

Multiple characters transforms and generalized Boolean functions.
Cryptogr. Commun., 2019

Several new classes of self-dual bent functions derived from involutions.
Cryptogr. Commun., 2019

Strongly Regular Graphs from Weakly Regular Plateaued Functions.
Proceedings of the Ninth International Workshop on Signal Design and its Applications in Communications, 2019

Further study of 2-to-1 mappings over F2<sup>n</sup>.
Proceedings of the Ninth International Workshop on Signal Design and its Applications in Communications, 2019

Privacy as a Service: Anonymisation of NetFlow Traces.
Proceedings of the Advances in E-Business Engineering for Ubiquitous Computing, 2019

On Plateaued Functions, Linear Structures and Permutation Polynomials.
Proceedings of the Codes, Cryptology and Information Security, 2019

On Good Polynomials over Finite Fields for Optimal Locally Recoverable Codes.
Proceedings of the Codes, Cryptology and Information Security, 2019

2018
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions.
IEEE Trans. Inf. Theory, 2018

Further Results on Generalized Bent Functions and Their Complete Characterization.
IEEE Trans. Inf. Theory, 2018

2-Correcting Lee Codes: (Quasi)-Perfect Spectral Conditions and Some Constructions.
IEEE Trans. Inf. Theory, 2018

Complementary Dual Algebraic Geometry Codes.
IEEE Trans. Inf. Theory, 2018

New Constructions of Optimal Locally Recoverable Codes via Good Polynomials.
IEEE Trans. Inf. Theory, 2018

Bent Functions From Involutions Over 𝔽<sub>2<sup>n</sup></sub>.
IEEE Trans. Inf. Theory, 2018

Linear Codes Over 𝔽<sub>q</sub> Are Equivalent to LCD Codes for q>3.
IEEE Trans. Inf. Theory, 2018

Improved upper bound on root number of linearized polynomials and its application to nonlinearity estimation of Boolean functions.
IACR Cryptol. ePrint Arch., 2018

On the Menezes-Teske-Weng's conjecture.
IACR Cryptol. ePrint Arch., 2018

On the p-ary (cubic) bent and plateaued (vectorial) functions.
Des. Codes Cryptogr., 2018

Euclidean and Hermitian LCD MDS codes.
Des. Codes Cryptogr., 2018

A Proof of the Beierle-Kranz-Leander Conjecture related to Lightweight Multiplication in F<sub>2<sup>n</sup></sub>.
CoRR, 2018

Cyclic bent functions and their applications in codes, codebooks, designs, MUBs and sequences.
CoRR, 2018

Vectorial Boolean functions and linear codes in the context of algebraic attacks.
CoRR, 2018

Statistical integral distinguisher with multi-structure and its application on AES-like ciphers.
Cryptogr. Commun., 2018

Characterizations of Partially Bent and Plateaued Functions over Finite Fields.
Proceedings of the Arithmetic of Finite Fields - 7th International Workshop, 2018

Construction of Some Codes Suitable for Both Side Channel and Fault Injection Attacks.
Proceedings of the Arithmetic of Finite Fields - 7th International Workshop, 2018

2017
Generalized Plateaued Functions and Admissible (Plateaued) Functions.
IEEE Trans. Inf. Theory, 2017

Decomposing Generalized Bent and Hyperbent Functions.
IEEE Trans. Inf. Theory, 2017

A Scalable and Systolic Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems Based on DSPs.
J. Hardw. Syst. Secur., 2017

A comparison of Carlet's second-order nonlinearity bounds.
Int. J. Comput. Math., 2017

Characterizations of o-polynomials by the Walsh transform.
CoRR, 2017

A new class of three-weight linear codes from weakly regular plateaued functions.
CoRR, 2017

On σ-LCD codes.
CoRR, 2017

Linear codes over Fq which are equivalent to LCD codes.
CoRR, 2017

Linear codes with few weights from weakly regular bent functions based on a generic construction.
Cryptogr. Commun., 2017

On the nonlinearity of S-boxes and linear codes.
Cryptogr. Commun., 2017

Bent functions linear on elements of some classical spreads and presemifields spreads.
Cryptogr. Commun., 2017

On construction of bent functions involving symmetric functions and their duals.
Adv. Math. Commun., 2017

On constructions of bent, semi-bent and five valued spectrum functions from old bent functions.
Adv. Math. Commun., 2017

Fast algebraic immunity of Boolean functions.
Adv. Math. Commun., 2017

DNA cyclic codes over rings.
Adv. Math. Commun., 2017

Explicit constructions of bent functions from pseudo-planar functions.
Adv. Math. Commun., 2017

Protocol for preserving privacy in distributed system (PPDS).
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

Preserving privacy in distributed system (PPDS) protocol: Security analysis.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

New Bent Functions from Permutations and Linear Translators.
Proceedings of the Codes, Cryptology and Information Security, 2017

Explicit Characterizations for Plateaued-ness of p-ary (Vectorial) Functions.
Proceedings of the Codes, Cryptology and Information Security, 2017

2016
Involutions Over the Galois Field 𝔽<sub><sup>n</sup></sub>.
IEEE Trans. Inf. Theory, 2016

A Systolic Hardware Architectures of Montgomery Modular Multiplication for Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2016

Partially homomorphic encryption schemes over finite fields.
IACR Cryptol. ePrint Arch., 2016

Four decades of research on bent functions.
Des. Codes Cryptogr., 2016

Quasi-Perfect Lee Codes from Quadratic Curves over Finite Fields.
CoRR, 2016

Further constructions of infinite families of bent functions from new permutations and their duals.
Cryptogr. Commun., 2016

Variation on correlation immune Boolean and vectorial functions.
Adv. Math. Commun., 2016

Yet another variation on minimal linear codes.
Adv. Math. Commun., 2016

Further results on semi-bent functions in polynomial form.
Adv. Math. Commun., 2016

On constructions of bent functions from involutions.
Proceedings of the IEEE International Symposium on Information Theory, 2016

High-Performance Elliptic Curve Cryptography by Using the CIOS Method for Modular Multiplication.
Proceedings of the Risks and Security of Internet and Systems, 2016

Bent Functions - Fundamentals and Results
Springer, ISBN: 978-3-319-32595-8, 2016

2015
Optimal Codebooks From Binary Codes Meeting the Levenshtein Bound.
IEEE Trans. Inf. Theory, 2015

A note on constructions of bent functions from involutions.
IACR Cryptol. ePrint Arch., 2015

Secret Sharing Schemes with General Access Structures (Full version).
IACR Cryptol. ePrint Arch., 2015

On the Diffusion Property of Iterated Functions.
IACR Cryptol. ePrint Arch., 2015

Bent and Semi-bent Functions via Linear Translators.
IACR Cryptol. ePrint Arch., 2015

Dickson Polynomials that are Involutions.
IACR Cryptol. ePrint Arch., 2015

Bent vectorial functions and linear codes from o-polynomials.
Des. Codes Cryptogr., 2015

New DNA Cyclic Codes over Rings.
CoRR, 2015

Cyclic codes and algebraic immunity of Boolean functions.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

On involutions of finite fields.
Proceedings of the IEEE International Symposium on Information Theory, 2015

On Existence (Based on an Arithmetical Problem) and Constructions of Bent Functions.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Secret Sharing Schemes with General Access Structures.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Results on Characterizations of Plateaued Functions in Arbitrary Characteristic.
Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014
Several New Infinite Families of Bent Functions and Their Duals.
IEEE Trans. Inf. Theory, 2014

Sphere coverings and identifying codes.
Des. Codes Cryptogr., 2014

Characterizations of Plateaued and Bent Functions in Characteristic p.
Proceedings of the Sequences and Their Applications - SETA 2014, 2014

Variations on Minimal Linear Codes.
Proceedings of the Coding Theory and Applications, 4th International Castle Meeting, 2014

Implementation of faster miller over Barreto-Naehrig curves in Jacobian cordinates.
Proceedings of the Global Summit on Computer & Information Technology, 2014

On Semi-bent Functions and Related Plateaued Functions Over the Galois Field F<sub>2<sup>n</sup></sub>.
Proceedings of the Open Problems in Mathematics and Computational Science, 2014

2013
Hyperbent Functions via Dillon-Like Exponents.
IEEE Trans. Inf. Theory, 2013

An efficient characterization of a family of hyper-bent functions with multiple trace terms.
J. Math. Cryptol., 2013

Semi-bent Functions from Oval Polynomials.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

On Minimal and Quasi-minimal Linear Codes.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

On constructions of semi-bent functions from bent functions.
Proceedings of the Discrete Geometry and Algebraic Combinatorics, 2013

2012
On Semibent Boolean Functions.
IEEE Trans. Inf. Theory, 2012

Further Results on Niho Bent Functions.
IEEE Trans. Inf. Theory, 2012

A note on hyper-bent functions via Dillon-like exponents.
IACR Cryptol. ePrint Arch., 2012

Dickson polynomials, hyperelliptic curves and hyper-bent functions.
IACR Cryptol. ePrint Arch., 2012

Niho Bent Functions and Subiaco/Adelaide Hyperovals
CoRR, 2012

Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves.
Proceedings of the Progress in Cryptology - LATINCRYPT 2012, 2012

Hyper-bent functions via Dillon-like exponents.
Proceedings of the 2012 IEEE International Symposium on Information Theory, 2012

On Dillon's class H of Niho bent functions and o-polynomials.
Proceedings of the International Symposium on Artificial Intelligence and Mathematics, 2012

2011
Semibent Functions From Dillon and Niho Exponents, Kloosterman Sums, and Dickson Polynomials.
IEEE Trans. Inf. Theory, 2011

Bent and Hyper-Bent Functions in Polynomial Form and Their Link With Some Exponential Sums and Dickson Polynomials.
IEEE Trans. Inf. Theory, 2011

A note on semi-bent functions with multiple trace terms and hyperelliptic curves.
IACR Cryptol. ePrint Arch., 2011

The Value 4 of Binary Kloosterman Sums.
IACR Cryptol. ePrint Arch., 2011

An efficient characterization of a family of hyperbent functions with multiple trace terms.
IACR Cryptol. ePrint Arch., 2011

A new class of bent and hyper-bent Boolean functions in polynomial forms.
Des. Codes Cryptogr., 2011

On the dual of bent functions with 2<sup>r</sup> Niho exponents.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Binary Kloosterman Sums with Value 4.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

On the Link of Some Semi-bent Functions with Kloosterman Sums.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

Generalized Witness Sets.
Proceedings of the First International Conference on Data Compression, 2011

2010
On the construction of bent vectorial functions.
Int. J. Inf. Coding Theory, 2010

On a conjecture about binary strings distribution.
IACR Cryptol. ePrint Arch., 2010

ON DILLON'S CLASS H OF BENT FUNCTIONS, NIHO BENT FUNCTIONS AND O-POLYNOMIALS.
IACR Cryptol. ePrint Arch., 2010

A NOTE ON SEMI-BENT BOOLEAN FUNCTIONS.
IACR Cryptol. ePrint Arch., 2010

Hyper-bent Boolean Functions with Multiple Trace Terms.
Proceedings of the Arithmetic of Finite Fields, Third International Workshop, 2010

Recent results on bent and hyper-bent functions and their link with some exponential sums.
Proceedings of the 2010 IEEE Information Theory Workshop, 2010

2009
A New Family of Hyper-Bent Boolean Functions in Polynomial Form.
Proceedings of the Cryptography and Coding, 2009

2008
Improving the Lower Bound on the Higher Order Nonlinearity of Boolean Functions With Prescribed Algebraic Immunity.
IEEE Trans. Inf. Theory, 2008

A new class of Bent functions in Polynomial Forms.
IACR Cryptol. ePrint Arch., 2008

Secret-sharing schemes based on self-dual codes.
Proceedings of the 2008 IEEE Information Theory Workshop, 2008

2007
Improving the Upper Bounds on the Covering Radii of Binary Reed-Muller Codes.
IEEE Trans. Inf. Theory, 2007

2006
On Immunity Profile of Boolean Functions.
Proceedings of the Sequences and Their Applications, 2006

2005
Improving the upper bounds on the covering radii of Reed-Muller codes.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
On the supports of the Walsh transforms of Boolean functions.
IACR Cryptol. ePrint Arch., 2004


  Loading...