


default search action
Designs, Codes and Cryptography, Volume 90
Volume 90, Number 1, January 2022
- Xia Li, Qin Yue, Deng Tang

:
A family of linear codes from constant dimension subspace codes. 1-15 - Kwangsu Lee

, Minhye Seo:
Functional encryption for set intersection in the multi-client setting. 17-47 - Fei Li

, Xiumei Li:
Weight distributions and weight hierarchies of a family of p-ary linear codes. 49-66 - Ville Junnila

, Tero Laihonen
, Tuomo Lehtilä
:
Improved lower bound for locating-dominating codes in binary Hamming spaces. 67-85 - Yuwen Huang, Chengju Li, Qi Wang

, Zongrun Du:
Parameters and characterizations of hulls of some projective narrow-sense BCH codes. 87-106 - Haoxuan Wu, Jincheng Zhuang

:
Improving the Gaudry-Schost algorithm for multidimensional discrete logarithms. 107-119 - Junru Ma, Jinquan Luo

:
MDS symbol-pair codes from repeated-root cyclic codes. 121-137 - Vitaly Roman'kov

:
An improvement of the Diffie-Hellman noncommutative protocol. 139-153 - Shiyao Chen, Yanhong Fan

, Ling Sun, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang
, Weijia Wang
, Chun Guo:
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations. 155-198 - Bart De Bruyn

, Mou Gao:
Pseudo-embeddings and quadratic sets of quadrics. 199-213 - Anirban Ghatak

:
Extending Coggia-Couvreur attack on Loidreau's rank-metric cryptosystem. 215-238 - Qi Cheng

, Jun Zhang, Jincheng Zhuang
:
LWE from non-commutative group rings. 239-263
Volume 90, Number 2, February 2022
- Nian Li, Zhao Hu, Maosheng Xiong

, Xiangyong Zeng:
A note on "Cryptographically strong permutations from the butterfly structure". 265-276 - Keisuke Hara, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:

Generic transformation from broadcast encryption to round-optimal deniable ring authentication. 277-316 - Joe Gildea

, Adrian Korban, Adam Michael Roberts
:
New binary self-dual codes of lengths 80, 84 and 96 from composite matrices. 317-342 - Soumak Biswas, Maheshanand Bhaintwal:

Quantum codes from $\mathbb {Z}_2\mathbb {Z}_2[u]/\langle u^4 \rangle $-cyclic codes. 343-366 - Rong Pan

, R. Julian R. Abel
, Yudhistira A. Bunjamin
, Tao Feng
, Tiana J. Tsang Ung
, Xiaomiao Wang
:
Difference matrices with five rows over finite abelian groups. 367-386 - Xiao-Juan Wang, Tian Tian

, Wen-Feng Qi:
A generic method for investigating nonsingular Galois NFSRs. 387-408 - Steven T. Dougherty

:
The neighbor graph of binary self-dual codes. 409-425 - Marcel Fernandez

, Jorge Jiménez Urroz
:
A study of the separating property in Reed-Solomon codes by bounding the minimum distance. 427-442 - Fatih Demirbas

, Orhun Kara
:
Integral characteristics by keyspace partitioning. 443-472 - Ulrich Dempwolff

:
Correction to: CCZ equivalence of power functions. 473-475 - Aart Blokhuis, Maarten De Boeck, Jozefien D'haeseleer:

Correction to: Cameron-Liebler sets of k-spaces in ${{\, \mathrm{PG}\, }}(n, q)$. 477-487
Volume 90, Number 3, March 2022
- Deepak Kumar Dalai, Santu Pal

, Santanu Sarkar
:
A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a. 489-521 - Olav Geil

:
From primary to dual affine variety codes over the Klein quartic. 523-543 - Xiaofang Xu

, Xiangyong Zeng
, Shasha Zhang:
Regular complete permutation polynomials over ${\mathbb {F}}_{2^{n}}$. 545-575 - Jiang Liu, Qin Li

, Junyu Quan, Can Wang, Jinjing Shi, Haozhen Situ
:
Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation. 577-591 - Moritz Wiese

, Holger Boche:
Mosaics of combinatorial designs for information-theoretic security. 593-632 - Jan De Beule

, Jonathan Mannaert
, Leo Storme:
Cameron-Liebler k-sets in subspaces and non-existence conditions. 633-651 - H. Zhao, Yongzhuang Wei

, Fengrong Zhang, Enes Pasalic, Nastja Cepak:
Two secondary constructions of bent functions without initial conditions. 653-679 - Pan Tan, Cuiling Fan, Sihem Mesnager, Wei Guo

:
Linear codes from support designs of ternary cyclic codes. 681-693 - Terry Shue Chien Lau

, Chik How Tan:
On the design and security of Lee metric McEliece cryptosystems. 695-717 - Quan Yuan

, Mehdi Tibouchi, Masayuki Abe:
On subset-resilient hash function families. 719-758 - Charul Rajput

, Maheshanand Bhaintwal
:
On the locality of quasi-cyclic codes over finite fields. 759-777 - Dibyayoti Jena

, Geertrui Van de Voorde
:
The geometric field of linearity of linear sets. 779-799 - Dmitrii I. Koshelev

:
Indifferentiable hashing to ordinary elliptic ${\mathbb {F}}_{\!q}$-curves of j=0 with the cost of one exponentiation in ${\mathbb {F}}_{\!q}$. 801-812 - Mengzhen Zhao, Cuiling Fan

, Zihong Tian:
Nearly optimal balanced quaternary sequence pairs of prime period N=uiv 5±od 8. 813-826 - Tim Penttila:

Uniqueness of the inversive plane of order sixty-four. 827-834
Volume 90, Number 4, April 2022
- Kevin M. Byrnes

:
Isomorphism of maximum length circuit codes. 835-850 - Liantao Lan, Yanxun Chang

, Lidong Wang:
The completion of optimal cyclic quaternary codes of weight 3 and distance 3. 851-862 - Yanwei Zhao

, Shenglin Zhou:
Flag-transitive 2-(v, k, λ ) designs with r>λ (k-3). 863-869 - Rajendra M. Pawale

, Mohan S. Shrikhande, Kusum S. Rajbhar:
Non-existence of quasi-symmetric designs with restricted block graphs. 871-879 - Luka Music, Céline Chevalier, Elham Kashefi:

Dispelling myths on superposition attacks: formal security model and attack analyses. 881-920 - Yi Zhao, Kaitai Liang, Yanqi Zhao, Bo Yang, Yang Ming, Emmanouil Panaousis:

Practical algorithm substitution attack on extractable signatures. 921-937 - Alexander Barg

, Zitan Chen, Itzhak Tamo:
A construction of maximally recoverable codes. 939-945 - Daiki Kawabata, Tatsuya Maruta

:
On the nonexistence of ternary linear codes attaining the Griesmer bound. 947-956 - Paolo Santonastaso

, Ferdinando Zullo
:
On the list decodability of rank-metric codes containing Gabidulin codes. 957-982 - Orr Dunkelman

, Maria Eichlseder
, Daniel Kales
, Nathan Keller, Gaëtan Leurent, Markus Schofnegger:
Practical key recovery attacks on FlexAEAD. 983-1007 - Christof Beierle

, Gregor Leander
, Léo Perrin
:
Trims and extensions of quadratic APN functions. 1009-1036 - Dipak K. Bhunia

, Cristina Fernández-Córdoba
, Mercè Villanueva
:
On the linearity and classification of ${\mathbb {Z}}_{p^s}$-linear generalized hadamard codes. 1037-1058 - Janaka Alawatugoda

, Tatsuaki Okamoto:
Standard model leakage-resilient authenticated key exchange using inner-product extractors. 1059-1079 - Nurdagül Anbar

, Wilfried Meidl:
Bent partitions. 1081-1101
Volume 90, Number 5, May 2022
- Carlos Galindo

, Fernando Hernando
:
On the generalization of the construction of quantum codes from Hermitian self-orthogonal codes. 1103-1112 - Hongwei Zhu

, Minjia Shi, Ferruh Özbudak
:
Complete b-symbol weight distribution of some irreducible cyclic codes. 1113-1125 - Kai Lin Ong

, Ang Miin Huey:
On equivalence of cyclic and dihedral zero-divisor codes having nilpotents of nilpotency degree two as generators. 1127-1138 - WeiGuo Zhang

, Enes Pasalic, Liupiao Zhang:
Phase orthogonal sequence sets for (QS)CDMA communications. 1139-1156 - Fucai Luo

, Saif M. Al-Kuwari:
Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security. 1157-1177 - Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan

, Meiqin Wang
:
An STP-based model toward designing S-boxes with good cryptographic properties. 1179-1202 - Felix Lazebnik, Lorinda Leshock:

On Pappus configurations in Hall planes. 1203-1219 - Hui Zhang, Cuiling Fan

, Sihem Mesnager:
Constructions of two-dimensional Z-complementary array pairs with large ZCZ ratio. 1221-1239 - Nuh Aydin

, Peihan Liu, Bryan Yoshino:
Polycyclic codes associated with trinomials: good codes and open questions. 1241-1269 - Gaojun Luo

, San Ling
:
Application of optimal p-ary linear codes to alphabet-optimal locally repairable codes. 1271-1287 - Fengrong Zhang, Enes Pasalic, René Rodríguez

, Yongzhuang Wei:
Minimal binary linear codes: a general framework based on bent concatenation. 1289-1318
Volume 90, Number 6, June 2022
- Can Xiang, Chunming Tang

, Qi Liu:
An infinite family of antiprimitive cyclic codes supporting Steiner systems S(3, 8, 7m+1). 1319-1333 - Michael Kiermaier

:
On α-points of q-analogs of the Fano plane. 1335-1345 - Valerio Dose

, Pietro Mercuri
, Ankan Pal
, Claudio Stirpe:
High order elements in finite fields arising from recursive towers. 1347-1368 - Engin Senel

, Figen Öke:
On the automorphisms of generalized algebraic geometry codes. 1369-1379 - Arghya Bhattacharjee

, Avijit Dutta, Eik List, Mridul Nandi:
CENCPP*: beyond-birthday-secure encryption from public permutations. 1381-1425 - Austin Dukes, Andrea Ferraguti, Giacomo Micheli:

Optimal selection for good polynomials of degree up to five. 1427-1436 - Kwang Ho Kim, Sihem Mesnager

, Jong Hyok Choe, Dok Nam Lee, Sengsan Lee, Myong Chol Jo:
On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity. 1437-1461 - Jinming Wen

, Xiao-Wen Chang:
Sharper bounds on four lattice constants. 1463-1484 - Tsuyoshi Miezaki, Hiroyuki Nakasora

:
A note on the Assmus-Mattson theorem for some binary codes. 1485-1502 - Angela Aguglia, Michela Ceria, Luca Giuzzi

:
Some hypersurfaces over finite fields, minimal codes and secret sharing schemes. 1503-1519 - Dean Crnkovic

, Daniel R. Hawtin
, Andrea Svob
:
Neighbour-transitive codes and partial spreads in generalised quadrangles. 1521-1533 - Luka Music, Céline Chevalier, Elham Kashefi:

Correction to: Dispelling myths on superposition attacks: formal security model and attack analyses. 1535
Volume 90, Number 7, July 2022
- Ferruh Özbudak

, Burcu Gülmez Temür:
Classification of permutation polynomials of the form x3g(xq-1) of 픽q2 where g(x)=x3+bx+c and $b, c \in {\mathbb F}_q^*$. 1537-1556 - Simeon Ball

, James Dixon:
The equivalence of linear codes implies semi-linear equivalence. 1557-1565 - Tran van Trung:

A method of constructing 2-resolvable t-designs for t=3, 4. 1567-1583 - Dean Crnkovic

, Andrea Svob
:
Switching for 2-designs. 1585-1593 - Vladimir D. Tonchev:

Book Review: "Designs from Linear Codes", second edition, by Cunsheng Ding and Chunming Tang, World Scientific, 2022. 1595-1597 - Jingjun Bao, Lijun Ji:

Large sets of t-designs over finite fields exist for all t. 1599-1609 - Menglong Zhang, Tao Feng

, Xiaomiao Wang
:
The existence of cyclic (v, 4, 1)-designs. 1611-1628 - Xia Li

, Qin Yue:
Non-binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codes. 1629-1647 - Jun Zhang

, Zhengchun Zhou, Chunming Tang:
A class of twisted generalized Reed-Solomon codes. 1649-1658 - Sergey Bereg

, Brian Malouf, Linda Morales, Thomas Stanley, Ivan Hal Sudborough
:
Using permutation rational functions to obtain permutation arrays with large hamming distance. 1659-1677 - Adrian Korban

, Serap Sahinkaya
, Deniz Ustun
:
Reversible Gk-codes with applications to DNA codes. 1679-1694
Volume 90, Number 8, August 2022
- Yan Wang, Xilin Han

, Weiqiong Wang, Ziling Heng:
Linear complexity over ${\mathbb {F}_{{q}}}$ and 2-adic complexity of a class of binary generalized cyclotomic sequences with good autocorrelation. 1695-1712 - Alexander M. Romanov

:
On the number of q-ary quasi-perfect codes with covering radius 2. 1713-1719 - Khodakhast Bibak

, Behrouz Zolfaghari
:
The Modular Subset-Sum Problem and the size of deletion correcting codes. 1721-1734 - Jung Hee Cheon, Wonhee Cho

, Jeong Han Kim, Jiseung Kim
:
Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions. 1735-1760 - Samaneh Mashhadi

, Bagher Bagherpour, Ali Zaghian:
A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme. 1761-1782 - Sadmir Kudin, Enes Pasalic:

A complete characterization of ${\mathcal {D}}_0 \cap {\mathcal {M}}^\#$ and a general framework for specifying bent functions in C outside M#. 1783-1796 - Seyyed Arash Azimi

, Adrián Ranea
, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen
:
A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis. 1797-1855 - Lidong Wang, Lulu Cai, Tao Feng

, Zihong Tian, Xiaomiao Wang
:
Geometric orthogonal codes and geometrical difference packings. 1857-1879 - Marién Abreu, Martin Funk, Vedran Krcadinac

, Domenico Labbate:
Strongly regular configurations. 1881-1897 - Katharina Boudgoust

, Amin Sakzad, Ron Steinfeld:
Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems. 1899-1936 - Junzhen Sui

, Xiaomeng Zhu, Xueying Shi:
MDS and near-MDS codes via twisted Reed-Solomon codes. 1937-1958
Volume 90, Number 9, September 2022
- Simeon Ball, Michel Lavrauw, Tamás Szonyi:

Contributions by Aart Blokhuis to finite geometry, discrete mathematics, and combinatorics. 1959-1961 - Bart De Bruyn, Mou Gao:

A characterization of the Coxeter cap. 1963-1981 - Willem H. Haemers

, Leila Parsaei-Majd:
Spectral symmetry in conference matrices. 1983-1990 - Oliver Janzer

, Zoltán Lóránt Nagy
:
Coloring linear hypergraphs: the Erdős-Faber-Lovász conjecture and the Combinatorial Nullstellensatz. 1991-2001 - Aida Abiad, Bart De Bruyn, Jozefien D'haeseleer, Jack H. Koolen:

Neumaier graphs with few eigenvalues. 2003-2019 - Michel Lavrauw, Tomasz Popiel

, John Sheekey
:
Combinatorial invariants for nets of conics in $\mathrm {PG}(2, q)$. 2021-2067 - Rosemary A. Bailey

, Peter J. Cameron
, Michael Kinyon
, Cheryl E. Praeger
:
Diagonal groups and arcs over groups. 2069-2080 - Giovanni Longobardi

, Leo Storme, Rocco Trombetti
:
On sets of subspaces with two intersection dimensions and a geometrical junta bound. 2081-2099 - Aart Blokhuis, Maarten De Boeck, Jozefien D'haeseleer

:
On the sunflower bound for k-spaces, pairwise intersecting in a point. 2101-2111 - Lins Denaux

:
Constructing saturating sets in projective spaces using subgeometries. 2113-2144 - William M. Kantor:

Automorphism subgroups for designs with λ =1. 2145-2157 - Anton Betten

, Fatma Karaoglu
:
The Eckardt point configuration of cubic surfaces revisited. 2159-2180 - Xinyu Tan

, Narayanan Rengaswamy
, A. Robert Calderbank
:
Approximate unitary 3-designs from transvection Markov chains. 2181-2204 - Carmen Amarra

, Alice Devillers
, Cheryl E. Praeger
:
Delandtsheer-Doyen parameters for block-transitive point-imprimitive 2-designs. 2205-2221 - Aart Blokhuis, Ruud Pellikaan

, Tamás Szonyi:
The extended coset leader weight enumerator of a twisted cubic code. 2223-2247
Volume 90, Number 10, October 2022
- Hyun Kwang Kim, Jieun Kwon

:
Classification of weighted posets and digraphs admitting the extended Hamming code to be a perfect code. 2249-2269 - Masayuki Abe, Miguel Ambrona

:
Blind key-generation attribute-based encryption for general predicates. 2271-2299 - Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa

, Xiang Xie
, Shota Yamada
:
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013. 2301-2318 - Abbas Alhakim

:
Designing preference functions for de Bruijn sequences with forbidden words. 2319-2335 - Junru Ma, Jinquan Luo

:
Constructions of MDS symbol-pair codes with minimum distance seven or eight. 2337-2359 - Hamidreza Eyvazi, Karim Samei, Batoul Savari:

The linearity of Carlet's Gray image of linear codes over ${\mathbb {Z}}_{8}$. 2361-2373 - Daniel Horsley

, Padraig Ó Catháin
:
Block avoiding point sequencings of partial Steiner systems. 2375-2383 - Haode Yan, Kun Zhang:

On the c-differential spectrum of power functions over finite fields. 2385-2405 - Yagmur Çakiroglu

, Oguz Yayla
, Emrah Sercan Yilmaz:
The number of irreducible polynomials over finite fields with vanishing trace and reciprocal trace. 2407-2417 - Jun Liu

, Dachao Wang, Yupu Hu, Jie Chen
, Baocang Wang
:
Improved key-recovery attacks on reduced-round WEM-8. 2419-2448 - Zhaocun Zhou

, Dengguo Feng, Bin Zhang:
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V. 2449-2479 - Gerald J. Janusz:

Covering polynomials and projections of self-dual codes. 2481-2489 - Lijun Ji, Miao Liang

, Yanting Wang:
Combinational constructions of splitting authentication codes with perfect secrecy. 2491-2515
Volume 90, Number 11, November 2022
- W. Cary Huffman, Jon-Lark Kim, Patrick Solé:

Guest editorial: On coding theory and combinatorics - in memory of Vera Pless. 2517-2527 - Jian Gao

, Xiangrui Meng, Fang-Wei Fu:
Weight distribution of double cyclic codes over Galois rings. 2529-2549 - Rongsheng Wu, Minjia Shi

:
On $\mathbb {Z}_2\mathbb {Z}_4$-additive polycyclic codes and their Gray images. 2551-2562 - Federico N. Martínez

:
Symmetric functions and spherical t-designs in $\pmb {\mathbb {R}^2}$. 2563-2581 - Himadri Shekhar Chakraborty

, Tsuyoshi Miezaki:
Variants of Jacobi polynomials in coding theory. 2583-2597 - Minjia Shi, Shukai Wang, Tor Helleseth, Patrick Solé:

Quadratic residue codes, rank three groups and PBIBDs. 2599-2611 - Rongcun Qin, Hengming Zhao

, Huangsheng Yu:
Compatible difference packing set systems and their applications to multilength variable-weight OOCs. 2613-2645 - Martino Borello, Cem Güneri, Elif Saçikara

, Patrick Solé:
The concatenated structure of quasi-abelian codes. 2647-2661 - Liqin Qian, Xiwang Cao, Wei Lu, Patrick Solé:

A new method for constructing linear codes with small hulls. 2663-2682 - Serhii Dyshko, Jay A. Wood:

MacWilliams extension property for arbitrary weights on linear codes over module alphabets. 2683-2701 - Yuqing Fu, Hongwei Liu

:
Galois self-orthogonal constacyclic codes over finite fields. 2703-2733 - Whan-Hyuk Choi, Jon-Lark Kim

:
An improved upper bound on self-dual codes over finite fields GF(11), GF(19), and GF(23). 2735-2751 - Vladimir D. Tonchev

:
On Pless symmetry codes, ternary QR codes, and related Hadamard matrices and designs. 2753-2762 - Shikha Patel

, Om Prakash
:
(θ , δ θ )-Cyclic codes over $\mathbb {F}_q[u, v]/\langle u^2-u, v^2-v, uv-vu \rangle $. 2763-2781
Volume 90, Number 12, December 2022
- Stéphane Ballet, Nicolas Baudru, Alexis Bonnecaze

, Mila Tukumuli:
Construction of asymmetric Chudnovsky-type algorithms for multiplication in finite fields. 2783-2811 - Yansheng Wu

, Yoonjin Lee
, Qiang Wang:
Further improvement on index bounds. 2813-2821 - Lin Sok

:
A new construction of linear codes with one-dimensional hull. 2823-2839 - Fatemeh Jafari

, Alireza Abdollahi
, Javad Bagherian, Maryam Khatami
, Reza Sobhani:
Equidistant permutation group codes. 2841-2859 - Edoukou Berenger Ayebie

, El Mamoun Souidi:
New code-based cryptographic accumulator and fully dynamic group signature. 2861-2891 - Hokuto Takahashi

, Manabu Hagiwara
:
Decoding algorithms of monotone codes and azinv codes and their unified view. 2893-2922 - Iwan M. Duursma

, Xiao Li:
Johnson graph codes. 2923-2941 - Jessica Bariffi

, Sam Mattheus, Alessandro Neri
, Joachim Rosenthal:
Moderate-density parity-check codes from projective bundles. 2943-2966 - Jon-Lark Kim

, Junyong Park:
Steganography from perfect codes on Cayley graphs over Gaussian integers, Eisenstein-Jacobi integers and Lipschitz integers. 2967-2989 - Xianmang He

, Yindong Chen
, Zusheng Zhang, Kunxiao Zhou:
Parallel sub-code construction for constant-dimension codes. 2991-3001 - Adel Alahmadi

, Amani Alkathiry, Alaa Altassan, Alexis Bonnecaze, Hatoon Shoaib, Patrick Solé:
The build-up construction over a commutative non-unital ring. 3003-3010 - Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Yann Connan

, Philippe Gaborit:
A gapless code-based hash proof system based on RQC and its applications. 3011-3044

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














