In this paper, we propose a new algebraic attack on stream ciphers. Star...
The Maximum Likelihood Decoding Problem (MLD) and the Multivariate Quadr...
Functional Encryption (FE) expands traditional public-key encryption in ...
In this paper we give a complete characterization of the intersections
b...
A (t,n)-threshold signature scheme enables distributed signing among n
p...
A (t,n)- threshold signature scheme enables distributed signing among n
...
Let n be an even number such that n≡ 0 4. We show that a
power function ...
The determination of the weight distribution of linear codes has been a
...
We lay the foundations for a blockchain scheme, whose consensus is reach...
The set of linear structures of most known balanced Boolean functions is...
In this paper some cryptographic properties of Boolean functions, includ...
Satoshi Nakamoto's Blockchain allows to build publicly verifiable and al...
Digital notarization is one of the most promising services offered by mo...
In this paper we analyze the intersection between the norm-trace curve o...