On the structural weakness of the GGHN stream cipher Aleksandar KircanskiAmr M. Youssef OriginalPaper 18 September 2009 Pages: 1 - 17
The second weight of generalized Reed-Muller codes in most cases Robert Rolland OriginalPaper 06 October 2009 Pages: 19 - 40
New bounds for (r, ≤ 2)-identifying codes in the infinite king grid Mikko Pelto OriginalPaper 12 November 2009 Pages: 41 - 47
Pseudorandom numbers and hash functions from iterations of multivariate polynomials Alina OstafeIgor E. Shparlinski OriginalPaper 09 January 2010 Pages: 49 - 67
Third-order nonlinearities of a subclass of Kasami functions Ruchi GodeSugata Gangopadhyay OriginalPaper 12 January 2010 Pages: 69 - 83
\(\boldsymbol{x^{2^l+1}+x+a}\) and related affine polynomials over GF (2 k ) Tor HellesethAlexander Kholosha OriginalPaper 19 January 2010 Pages: 85 - 109
Asymptotic enumeration of correlation-immune boolean functions E. Rodney CanfieldZhicheng GaoRobert W. Robinson OriginalPaper 21 January 2010 Pages: 111 - 126