World Scientific
  • Search
  •   
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at [email protected] for any enquiries.
International Journal of Foundations of Computer Science cover

Volume 22, Issue 06 (September 2011)

Special Issue – Cryptography
No Access
ON ISOTOPISMS OF COMMUTATIVE PRESEMIFIELDS AND CCZ-EQUIVALENCE OF FUNCTIONS
  • Pages:1243–1258

https://doi.org/10.1142/S0129054111008684

Special Issue – Cryptography
No Access
MORE VECTORIAL BOOLEAN FUNCTIONS WITH UNBOUNDED NONLINEARITY PROFILE
  • Pages:1259–1269

https://doi.org/10.1142/S0129054111008696

Special Issue – Cryptography
No Access
VECTORIAL BOOLEAN FUNCTIONS WITH GOOD CRYPTOGRAPHIC PROPERTIES
  • Pages:1271–1282

https://doi.org/10.1142/S0129054111008702

Special Issue – Cryptography
No Access
ON GUESS AND DETERMINE ANALYSIS OF RABBIT
  • Pages:1283–1296

https://doi.org/10.1142/S0129054111008714

Special Issue – Cryptography
No Access
STATISTICAL PROPERTIES OF THE ARITHMETIC CORRELATION OF SEQUENCES
  • Pages:1297–1315

https://doi.org/10.1142/S0129054111008726

Special Issue – Cryptography
No Access
PERIODS ON TWO KINDS OF NONLINEAR FEEDBACK SHIFT REGISTERS WITH TIME VARYING FEEDBACK FUNCTIONS
  • Pages:1317–1329

https://doi.org/10.1142/S0129054111008738

Special Issue – Cryptography
No Access
LOWER BOUNDS ON THE SECOND ORDER NONLINEARITY OF BOOLEAN FUNCTIONS
  • Pages:1331–1349

https://doi.org/10.1142/S012905411100874X

Special Issue – Cryptography
No Access
NON-BOOLEAN ALMOST PERFECT NONLINEAR FUNCTIONS ON NON-ABELIAN GROUPS
  • Pages:1351–1367

https://doi.org/10.1142/S0129054111008751

Special Issue – Cryptography
No Access
UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS
  • Pages:1369–1393

https://doi.org/10.1142/S0129054111008763

Special Issue – Cryptography
No Access
AN EFFICIENT AND INFORMATION THEORETICALLY SECURE RATIONAL SECRET SHARING SCHEME BASED ON SYMMETRIC BIVARIATE POLYNOMIALS
  • Pages:1395–1416

https://doi.org/10.1142/S0129054111008775

Special Issue – Cryptography
No Access
AUTHENTICATION CODES FROM DIFFERENCE BALANCED FUNCTIONS
  • Pages:1417–1429

https://doi.org/10.1142/S0129054111008787

Special Issue – Cryptography
No Access
ON THE NONEXISTENCE of BENT FUNCTIONS
  • Pages:1431–1438

https://doi.org/10.1142/S0129054111008799

Regular Papers
No Access
PROCESSING AN OFFLINE INSERTION-QUERY SEQUENCE WITH APPLICATIONS
  • Pages:1439–1456

https://doi.org/10.1142/S0129054111008805

Regular Papers
No Access
COUNTING SUBWORDS USING A TRIE AUTOMATON
  • Pages:1457–1469

https://doi.org/10.1142/S0129054111008817

Regular Papers
No Access
HETEROGENEITY IN COMPUTING: INSIGHTS FROM A WORKSHARING SCHEDULING PROBLEM
  • Pages:1471–1493

https://doi.org/10.1142/S0129054111008829