


default search action
Advances in Mathematics of Communications, Volume 17
Volume 17, Number 1, 2023
- Daniele Bartoli, Martino Borello, Anna-Lena Horlemann

:
Preface. i - Gianira N. Alfarano, Anina Gruica, Julia Lieb

, Joachim Rosenthal:
Convolutional codes over finite chain rings, MDP codes and their characterization. 1-22 - Alessandro Barenghi

, Jean-François Biasse
, Edoardo Persichetti
, Paolo Santini:
On the computational hardness of the code equivalence problem in cryptography. 23-55 - Daniele Bartoli, Lins Denaux

:
Minimal codewords arising from the incidence of points and hyperplanes in projective spaces. 56-77 - René Bødker Christensen

, Carlos Munuera, Francisco Revson Fernandes Pereira
, Diego Ruano:
An algorithmic approach to entanglement-assisted quantum error-correcting codes from the Hermitian curve. 78-97 - Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco:

Upper bounds on the length function for covering codes with covering radius $ R $ and codimension $ tR+1 $. 98-118 - Heide Gluesing-Luerssen, Hunter Lehmann

:
Automorphism groups and isometries for cyclic orbit codes. 119-138 - Keita Ishizuka

, Ken Saito:
Construction for both self-dual codes and LCD codes. 139-151 - Sascha Kurz:

The interplay of different metrics for the construction of constant dimension codes. 152-171 - Sascha Kurz, Ivan N. Landjev, Assia Rousseva:

Classification of $ \mathbf{(3 \!\mod 5)} $ arcs in $ \mathbf{ \operatorname{PG}(3,5)} $. 172-206 - Tung Le, Bernardo Gabriel Rodrigues:

On some codes from rank 3 primitive actions of the simple Chevalley group $ G_2(q) $. 207-226 - Vito Napolitano, Olga Polverino, Paolo Santonastaso

, Ferdinando Zullo
:
Two pointsets in $ \mathrm{PG}(2,q^n) $ and the associated codes. 227-245 - Om Prakash

, Shikha Yadav
, Habibul Islam
, Patrick Solé:
On $ \mathbb{Z}_4\mathbb{Z}_4[u^3] $-additive constacyclic codes. 246-261 - Rakhi Pratihar

, Tovohery Hajatiana Randrianarisoa
:
Constructions of optimal rank-metric codes from automorphisms of rational function fields. 262-287 - Padmapani Seneviratne, Martianus Frederic Ezerman:

New quantum codes from metacirculant graphs via self-dual additive $\mathbb{F}_4$-codes. 288-297
Volume 17, Number 2, 2023
- Ravi Anand

, Dibyendu Roy, Santanu Sarkar:
Some results on lightweight stream ciphers Fountain v1 & Lizard. 298-319 - Vito Napolitano, Ferdinando Zullo

:
Codes with few weights arising from linear sets. 320-332 - Romar dela Cruz, Michael Kiermaier, Sascha Kurz, Alfred Wassermann:

On the minimum number of minimal codewords. 333-341 - Wenli Ren, Feng Wang:

A new class of optimal wide-gap one-coincidence frequency-hopping sequence sets. 342-352 - Terry Shue Chien Lau, Chik How Tan:

Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems. 353-366 - Jong Yoon Hyun, Yoonjin Lee, Yansheng Wu

:
Connection of $ p $-ary $ t $-weight linear codes to Ramanujan Cayley graphs with $ t+1 $ eigenvalues. 367-380 - Liqin Qian, Xiwang Cao:

Character sums over a non-chain ring and their applications. 381-403 - Raj Kumar, Maheshanand Bhaintwal:

Duadic codes over $ \mathbb{Z}_4+u\mathbb{Z}_4 $. 404-417 - Qian Liu

:
The lower bounds on the second-order nonlinearity of three classes of Boolean functions. 418-430 - Kai Cai, Guangyue Han:

An optimization approach to the Langberg-Médard multiple unicast conjecture. 431-445 - Ricardo A. Podestá, Denis E. Videla:

The weight distribution of irreducible cyclic codes associated with decomposable generalized Paley graphs. 446-464 - Emily McMillon

, Allison Beemer, Christine A. Kelley:
Extremal absorbing sets in low-density parity-check codes. 465-483 - Palash Sarkar, Subhadip Singha

:
Classical reduction of gap SVP to LWE: A concrete security analysis. 484-499 - Chiara Spadafora

, Riccardo Longo
, Massimiliano Sala:
A coercion-resistant blockchain-based E-voting protocol with receipts. 500-521
Volume 17, Number 3, 2023
- Takao Komatsu, Bijan Kumar Patel

, Claudio Pita-Ruiz:
Several formulas for Bernoulli numbers and polynomials. 522-535 - Antonio Cossidente, Sascha Kurz, Giuseppe Marino, Francesco Pavese:

Combining subspace codes. 536-550 - Huaning Liu, Xi Liu:

On the correlation measures of orders $ 3 $ and $ 4 $ of binary sequence of period $ p^2 $ derived from Fermat quotients. 551-561 - Roberto Civino

, Riccardo Longo
:
Formal security proof for a scheme on a topological network. 562-571 - Büsra Özden, Oguz Yayla:

Partial direct product difference sets and almost quaternary sequences. 572-588 - Thomas W. Cusick, Younhwan Cheon:

The weight recursions for the 2-rotation symmetric quartic Boolean functions. 589-604 - Kailu Yang, Xiaomiao Wang

, Menglong Zhang, Lidong Wang:
Some progress on optimal $ 2 $-D $ (n\times m,3,2,1) $-optical orthogonal codes. 605-625 - Nupur Patanker, Sanjay Kumar Singh

:
Generalized Hamming weights of toric codes over hypersimplices and squarefree affine evaluation codes. 626-643 - Xinmei Huang, Qin Yue, Yansheng Wu

, Xiaoping Shi:
Ternary Primitive LCD BCH codes. 644-659 - Constanza Riera, Matthew Geoffrey Parker, Pantelimon Stanica:

Quantum states associated to mixed graphs and their algebraic characterization. 660-680 - Sumit Kumar Debnath

, Tanmay Choudhury, Pantelimon Stanica, Kunal Dey
, Nibedita Kundu:
Delegating signing rights in a multivariate proxy signature scheme. 681-696 - Reza Kaboli, Shahram Khazaei, Maghsoud Parviz:

On ideal and weakly-ideal access structures. 697-713 - María Chara, Ricardo A. Podestá, Ricardo Toledano:

The conorm code of an AG-code. 714-732 - Lin Yi, Xiangyong Zeng, Zhimin Sun, Shasha Zhang:

On the linear complexity and autocorrelation of generalized cyclotomic binary sequences with period $ 4p^n $. 733-756
Volume 17, Number 4, 2023
- Rui Zhang, Sihong Su:

A new construction of weightwise perfectly balanced Boolean functions. 757-770 - Debrup Chakraborty, Avijit Dutta, Samir Kundu

:
Designing tweakable enciphering schemes using public permutations. 771-798 - Minjia Shi, Liqin Qian, Tor Helleseth, Patrick Solé:

Five-weight codes from three-valued correlation of M-sequences. 799-814 - Can Xiang, Jinquan Luo:

Some subfield codes from MDS codes. 815-827 - Simeon Ball, Guillermo Gamboa, Michel Lavrauw:

On additive MDS codes over small fields. 828-844 - Shi Wang, Yongqiang Li, Shizhu Tian, Xiangyong Zeng:

Four by four MDS matrices with the fewest XOR gates based on words. 845-872 - Bei Wang, Yi Ouyang

, Songsong Li, Honggang Hu:
A new twofold Cornacchia-type algorithm and its applications. 873-887 - Ghislain Fourier, Gabriele Nebe:

Degenerate flag varieties in network coding. 888-899 - Ram Krishna Verma

, Om Prakash
, Ashutosh Singh
, Habibul Islam
:
New quantum codes from skew constacyclic codes. 900-919 - Alar Leibak:

On the number of factorizations of $ t $ mod $ N $ and the probability distribution of Diffie-Hellman secret keys for many users. 920-927 - Marco Buratti, Dieter Jungnickel:

Partitioned difference families: The storm has not yet passed. 928-934 - Julia Lieb

, Raquel Pinto
:
A decoding algorithm for 2D convolutional codes over the erasure channel. 935-959 - Johan Chrisnata, Han Mao Kiah, Sankeerth Rao Karingula, Alexander Vardy, Eitan Yaakobi, Hanwen Yao:

On the number of distinct k-decks: Enumeration and bounds. 960-978 - Yan Liu, Xiwang Cao, Wei Lu:

Two classes of new optimal ternary cyclic codes. 979-993 - Adrian Korban, Serap Sahinkaya

, Deniz Ustun
:
New type i binary [72, 36, 12] self-dual codes from composite matrices and R1 lifts. 994-1011
Volume 17, Number 5, 2023
- Claude Carlet:

Revisiting some results on APN and algebraic immune functions. 1012-1026 - Yeow Meng Chee

, Tuvi Etzion, Han Mao Kiah, Alexander Vardy:
Domination mappings into the hamming ball: Existence, constructions, and algorithms. 1027-1059 - Liqun Yao, Wenli Ren, Yong Wang, Chunming Tang:

Z-complementary pairs with flexible lengths and large zero odd-periodic correlation zones. 1060-1071 - Huaning Liu, Yixin Ren:

On the pseudorandom properties of $ k $-ary Sidel'nikov sequences. 1072-1085 - Joe Gildea

, Abidin Kaya, Adam Michael Roberts
, Rhian Taylor, Alexander Tylyshchak:
New self-dual codes from $ 2 \times 2 $ block circulant matrices, group rings and neighbours of neighbours. 1086-1100 - Delaram Kahrobaei

, Mima Stanojkovski:
Cryptographic multilinear maps using pro-p groups. 1101-1114 - Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco:

On the weight distribution of the cosets of MDS codes. 1115-1138 - Jinmei Fan, Yanhai Zhang:

Optimal quinary negacyclic codes with minimum distance four. 1139-1153 - Tingting Wu, Shixin Zhu, Li Liu, Lanqiang Li:

Repeated-root constacyclic codes of length 6lmpn. 1154-1180 - Angelot Behajaina:

On BCH split metacyclic codes. 1181-1195 - Jie Geng, Huazhang Wu, Patrick Solé:

On one-lee weight and two-lee weight $ \mathbb{Z}_2\mathbb{Z}_4[u] $ additive codes and their constructions. 1196-1209 - John B. Baena, Daniel Cabarcas, Javier A. Verbel:

On the complexity of solving generic overdetermined bilinear systems. 1210-1234 - Kanat S. Abdukhalikov

, Duy Ho
:
Vandermonde sets, hyperovals and Niho bent functions. 1235-1250 - Carla Mascia

, Massimiliano Sala, Irene Villa
:
A survey on functional encryption. 1251-1289 - Ting Yao, Heqian Xu, Yongsheng Tang, Shixin Zhu:

Asymptotically good $ \mathbb{Z}_{p}\mathbb{Z}_{p}[u]/\langle u^{t}\rangle $-additive cyclic codes. 1290-1301
Volume 17, Number 6, 2023
- Vikas Srivastava

, Sumit Kumar Debnath
, Pantelimon Stanica, Saibal Kumar Pal:
A multivariate identity-based broadcast encryption with applications to the internet of things. 1302-1313 - Guangzhou Chen, Xiaotong Zhang:

Constructions of irredundant orthogonal arrays. 1314-1337 - Toshiharu Sawashima, Tatsuya Maruta:

Nonexistence of some ternary linear codes with minimum weight -2 modulo 9. 1338-1357 - Yu-Chi Chen:

Security analysis of public key encryption with filtered equality test. 1358-1363 - Maura B. Paterson, Douglas R. Stinson:

Splitting authentication codes with perfect secrecy: New results, constructions and connections with algebraic manipulation detection codes. 1364-1387 - Jean-François Biasse

, Muhammed Rashad Erukulangara
:
A proof of the conjectured run time of the Hafner-McCurley class group algorithm. 1388-1405 - Yasemin Cengellenmis, Abdullah Dertli, Steven T. Dougherty, Adrian Korban, Serap Sahinkaya, Deniz Ustun

:
Reversible $ G $-codes over the ring $ {\mathcal{F}}_{j,k} $ with applications to DNA codes. 1406-1421 - Stefano Barbero, Emanuele Bellini

, Rusydi H. Makarim:
Rotational analysis of ChaCha permutation. 1422-1439 - Xiang Wang, Wenjuan Yin:

New nonexistence results on perfect permutation codes under the hamming metric. 1440-1452 - Ziteng Huang, Weijun Fang, Fang-Wei Fu, Fengting Li:

Generic constructions of MDS Euclidean self-dual codes via GRS codes. 1453-1467 - Zhen Li

, Haode Yan:
Differential spectra of a class of power permutations with Niho exponents. 1468-1475 - Upendra Kapshikar, Ayan Mahalanobis:

Niederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier sampling. 1476-1492 - Zhen Li

, Cuiling Fan, Wei Su, Yanfeng Qi:
Aperiodic/periodic complementary sequence pairs over quaternions. 1493-1506 - Claude Carlet, Stjepan Picek:

On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials. 1507-1525 - Gang Wang, Deng-Ming Xu, Fang-Wei Fu:

Constructions of asymptotically optimal codebooks with respect to Welch bound and Levenshtein bound. 1526-1541

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














