Home
Oleksandr Kholosha's picture

Oleksandr Kholosha

Associate Professor
  • E-mailoleksandr.kholosha@uib.no
  • Visitor Address
    HIB - Thormøhlens gate 55
    5006 Bergen
  • Postal Address
    Postboks 7803
    5020 Bergen
Academic article
  • Show author(s) (2016). Univariate niho bent functions from o-polynomials. IEEE Transactions on Information Theory. 2254-2265.
  • Show author(s) (2016). New ternary binomial bent functions. IEEE International Symposium on Information Theory. Proceedings. 101-104.
  • Show author(s) (2015). On o-equivalence of Niho bent functions. Lecture Notes in Computer Science (LNCS). 155-168.
  • Show author(s) (2013). State space cryptanalysis of the MICKEY cipher. Information Theory and Applications.
  • Show author(s) (2013). Several new classes of bent functions from Dillon exponents. IEEE Transactions on Information Theory. 1818-1831.
  • Show author(s) (2013). On the Walsh transform of a class of functions From niho exponents. IEEE Transactions on Information Theory. 4662-4667.
  • Show author(s) (2012). On the dual of certain ternary weakly regular bent functions. IEEE Transactions on Information Theory. 2237-2243.
  • Show author(s) (2012). Niho bent functions and Subiaco hyperovals. Contemporary Mathematics. 91-101.
  • Show author(s) (2012). Generalized bent functions and their relation to Maiorana-McFarland class. IEEE International Symposium on Information Theory. Proceedings. 4 pages.
  • Show author(s) (2012). Further results on Niho bent functions. IEEE Transactions on Information Theory. 6979-6985.
  • Show author(s) (2011). Niho bent functions and Subiaco hyperovals. Contemporary Mathematics. 91-101.
  • Show author(s) (2011). Crosscorrelation of m-sequences, exponential sums, bent functions and Jacobsthal sums. Cryptography and Communications. 281-291.
  • Show author(s) (2010). x^{2^l}+x+a and related affine polynomials over the finite fields of GF(2^k). Cryptography and Communications. 85-109.
  • Show author(s) (2010). Sequences, bent functions and Jacobsthal sums. Lecture Notes in Computer Science (LNCS). 416-429.
  • Show author(s) (2010). New binomial bent functions over the finite fields of odd characteristic. IEEE International Symposium on Information Theory. Proceedings. 1277-1281.
  • Show author(s) (2010). New Binomial Bent Functions Over the Finite Fields of Odd Characteristic. IEEE Transactions on Information Theory. 4646-4652.
  • Show author(s) (2009). Proofs of two conjectures on ternary weakly regular bent functions. IEEE Transactions on Information Theory. 5272-5283.
  • Show author(s) (2009). Period-different m-sequences with at most four-valued cross correlation. IEEE Transactions on Information Theory. 3305-3311.
  • Show author(s) (2009). Further results on m-sequences with five-valued cross correlation. IEEE Transactions on Information Theory. 5792-5802.
  • Show author(s) (2008). On the equation x(2l+1)+x+a=0 over GF(2(k)). Finite Fields and Their Applications. 159-176.
  • Show author(s) (2008). Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher. Lecture Notes in Computer Science (LNCS). 224-243.
  • Show author(s) (2008). $m$-Sequences of Lengths $2^{2k}-1$ and $2^k-1$ with at Most Four-Valued Cross Correlation. Lecture Notes in Computer Science (LNCS). 106-120.
  • Show author(s) (2007). On the dual of monomial quadratic p-ary bent functions. Lecture Notes in Computer Science (LNCS). 50-61.
  • Show author(s) (2007). Characterization of m-sequences of length 2^{2k}-1 and 2^k-1 with three-valued crosscorrelation. IEEE Transactions on Information Theory. 2236-2245.
  • Show author(s) (2006). Security of jump controlled sequence generators for stream ciphers. Lecture Notes in Computer Science (LNCS). 141-152.
  • Show author(s) (2006). On the correlation distribution of the Coulter-Matthews decimation. IEEE Transactions on Information Theory. 2241-2247.
  • Show author(s) (2006). Monomial and quadratic bent functions over the finite fields of odd characteristic. IEEE Transactions on Information Theory. 2018-2032.
  • Show author(s) (2006). Bent functions with 2^r Niho exponents. IEEE Transactions on Information Theory. 5529-5532.
Academic lecture
  • Show author(s) (2007). Secure and Reliable Communicationfor the Inductively Coupled Channel.
Editorial
  • Show author(s) (2016). Editorial: Special issue on Boolean functions and their applications. Cryptography and Communications. 173-174.
  • Show author(s) (2011). Special Issue: Coding and Cryptography. Designs, Codes and Cryptography. 1-1.
  • Show author(s) (2010). (Guest Editorial -) Preface (NILCRYPT'10). Tatra Mountains Mathematical Publications. 2 pages.
Academic anthology/Conference proceedings
  • Show author(s) (2009). Preproceedings The International Workshop on Coding and Cryptography. Allkopi Forlag.
Academic chapter/article/Conference paper
  • Show author(s) (2012). Generalized bent functions and their relation to Maiorana-McFarland class. 4 pages.
  • Show author(s) (2011). Two nonbinary sequences with six-valued cross correlation. 4 pages.
  • Show author(s) (2011). On the dual of bent functions with 2^r Niho exponents. 5 pages.
  • Show author(s) (2010). Sequences, bent functions and Jacobstahl sums. 14 pages.
  • Show author(s) (2010). On Generalized bent functions. 6 pages.
  • Show author(s) (2010). New binomial bent functions over the finite fields of odd characteristic. 5 pages.
  • Show author(s) (2008). m-Sequences of different lengths with four-valued cross correlation. 5 pages.
  • Show author(s) (2008). Lighweight cryptography for RFID devices. 4 pages.
  • Show author(s) (2005). On the correlation distribution of the Coulter-Matthews decimation. 7 pages.
  • Show author(s) (2005). New monomial bent functions over the finite fields of odd characteristic. 5 pages.

More information in national current research information system (CRIStin)