On a 5-design related to a putative extremal doubly even self-dual code of length a multiple of 24 Masaaki Harada OriginalPaper 12 April 2014 Pages: 373 - 384
Differential cryptanalysis of PRESENT-like cipher Guo-Qiang LiuChen-Hui Jin OriginalPaper 17 April 2014 Pages: 385 - 408
Bentness and nonlinearity of functions on finite groups Bangteng Xu OriginalPaper 18 April 2014 Pages: 409 - 430
Almost universal forgery attacks on AES-based MAC’s Orr DunkelmanNathan KellerAdi Shamir OriginalPaper 03 May 2014 Pages: 431 - 449
An investigation of the tangent splash of a subplane of \(\mathrm{PG}(2,q^3)\) S. G. BarwickWen-Ai Jackson OriginalPaper 03 May 2014 Pages: 451 - 468
Strongly secure authenticated key exchange from factoring, codes, and lattices Atsushi FujiokaKoutarou SuzukiKazuki Yoneyama OriginalPaper 23 April 2014 Pages: 469 - 504
On the automorphisms of designs constructed from finite simple groups Tung LeJamshid Moori OriginalPaper 04 May 2014 Pages: 505 - 517
Codes over rings and Hermitian lattices Steven DoughertyJon-Lark KimYoonjin Lee OriginalPaper 06 May 2014 Pages: 519 - 535
Plateaued functions and one-and-half difference sets Oktay Olmez OriginalPaper 21 May 2014 Pages: 537 - 549
Diagonally cyclic equitable rectangles Anthony B. EvansDavid FearRebecca J. Stones OriginalPaper 01 June 2014 Pages: 551 - 569
Enhanced Boolean functions suitable for the filter model of pseudo-random generator Claude CarletDeng Tang OriginalPaper 03 June 2014 Pages: 571 - 587
Completely reducible super-simple designs with block size five and index two Hengjia WeiHui ZhangGennian Ge OriginalPaper 03 June 2014 Pages: 589 - 600
Practical-time attacks against reduced variants of MISTY1 Orr DunkelmanNathan Keller OriginalPaper 29 May 2014 Pages: 601 - 627