


default search action
Designs, Codes and Cryptography, Volume 91
Volume 91, Number 1, January 2023
- Lukas Kölsch

, Björn Kriepke
, Gohar M. Kyureghyan:
Image sets of perfectly nonlinear maps. 1-27 - He Zhang, Chunming Tang:

Constructions of large cyclic constant dimension codes via Sidon spaces. 29-44 - Hadi Kharaghani

, Sho Suda, Vlad Zaitsev:
On a class of optimal constant weight ternary codes. 45-54 - Yasamin Khaefi, Zeinab Akhlaghi

, Behrooz Khosravi:
On the subgroup perfect codes in Cayley graphs. 55-61 - Maximilien Gadouleau, Luca Mariot, Stjepan Picek:

Bent functions in the partial spread class generated by linear recurring sequences. 63-82 - Pan Tan, Cuiling Fan

, Cunsheng Ding, Chunming Tang, Zhengchun Zhou:
The minimum locality of linear codes. 83-114 - Josimar J. R. Aguirre, Cícero Carvalho

, Victor G. L. Neumann
:
About r-primitive and k-normal elements in finite fields. 115-126 - Jiaxin Wang

, Fang-Wei Fu:
New results on vectorial dual-bent functions and partial difference sets. 127-149 - Claude Carlet, Rebeka Kiss, Gábor Péter Nagy

:
Simplicity conditions for binary orthogonal arrays. 151-163 - Marloes Venema

, Greg Alpár, Jaap-Henk Hoepman:
Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice. 165-220 - Ming Li, Yupeng Jiang

, Dongdai Lin:
Properties of the cycles that contain all vectors of weight $\le k$. 221-239 - Xavier Caruso, Amaury Durand:

Duals of linearized Reed-Solomon codes. 241-271 - Minjia Shi, Na Liu, Jon-Lark Kim, Patrick Solé:

Additive complementary dual codes over $\mathbb {F}_4$. 273-284 - Yupeng Jiang

:
A relation between sequences generated by Golomb's preference algorithm. 285-291 - Vincenzo Pallozzi Lavorante

, Valentino Smaldore
:
New hemisystems of the Hermitian surface. 293-307
Volume 91, Number 2, February 2023
- Xi Xie, Nian Li

, Xiangyong Zeng, Xiaohu Tang, Yao Yao:
Several classes of bent functions over finite fields. 309-332 - José Andrés Armario

, Iván Bailera, Ronan Egan
:
Butson full propelinear codes. 333-351 - Bingsheng Shen, Hua Meng

, Yang Yang, Zhengchun Zhou:
New constructions of Z-complementary code sets and mutually orthogonal complementary sequence sets. 353-371 - WeiGuo Zhang

, Enes Pasalic, Yiran Liu, Liupiao Zhang, Chunlei Xie:
A design and flexible assignment of orthogonal binary sequence sets for (QS)-CDMA systems. 373-389 - Shuichi Katsumata, Toi Tomita

, Shota Yamada:
Direct computation of branching programs and its applications to more efficient lattice-based cryptography. 391-431 - Christof Beierle

, Claude Carlet
:
Gold functions and switched cube functions are not 0-extendable in dimension n > 5. 433-449 - Eimear Byrne, Michela Ceria, Sorina Ionica, Relinde P. M. J. Jurrius

, Elif Saçikara:
Constructions of new matroids and designs over ${\mathbb {F}}_q$. 451-473 - Xiaoqin Hong

, Xiwang Cao:
Improved generalized block inserting construction of constant dimension codes. 475-495 - Loïc Bidoux

, Philippe Gaborit, Mukul Kulkarni, Víctor Mateu
:
Code-based signatures from new proofs of knowledge for the syndrome decoding problem. 497-544 - Nurdagül Anbar

, Tekgül Kalayci
, Wilfried Meidl:
Generalized semifield spreads. 545-562 - Thibauld Feneuil

, Antoine Joux, Matthieu Rivain:
Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature. 563-608 - Emmanouil Doulgerakis

, Thijs Laarhoven, Benne de Weger:
The irreducible vectors of a lattice. 609-643 - Michael Kiermaier

, Sascha Kurz, Patrick Solé, Michael Stoll, Alfred Wassermann:
On strongly walk regular graphs, triple sum sets and their codes. 645-675 - Minjia Shi, Shukai Wang, Jon-Lark Kim, Patrick Solé:

Self-orthogonal codes over a non-unital ring and combinatorial matrices. 677-689 - Minjia Shi, Shukai Wang, Jon-Lark Kim, Patrick Solé:

Correction: Self-orthogonal codes over a non-unital ring and combinatorial matrices. 691 - (Withdrawn) RETRACTED ARTICLE: $\mathbb {Z}_p\mathbb {Z}_{p^2}$-linear codes: rank and kernel. 693

Volume 91, Number 3, March 2023
- Xiusheng Liu, Hualu Liu:

LCP of group codes over finite Frobenius rings. 695-708 - Jiaxin Shen, Jianfu Chen

, Shenglin Zhou:
Flag-transitive 2-designs with prime square replication number and alternating groups. 709-717 - Sihem Mesnager, Liqin Qian, Xiwang Cao:

Further projective binary linear codes derived from two-to-one functions and their duals. 719-746 - Mrinmoy Datta

, Trygve Johnsen:
Codes from symmetric polynomials. 747-761 - Dev Akre, Nuh Aydin

, Matthew J. Harrington, Saurav R. Pandey:
A generalization of cyclic code equivalence algorithm to constacyclic codes. 763-777 - Bill Correll Jr.

, Christopher N. Swanson
:
Difference-based structural properties of costas arrays. 779-794 - Makoto Araya, Masaaki Harada, Koji Momihara:

Hadamard matrices related to a certain series of ternary self-dual codes. 795-805 - Xiangrui Meng, Jian Gao

, Fang-Wei Fu, Fanghui Ma:
Weight distributions of Q2DC codes over finite fields. 807-830 - Maria Montanucci

, Guilherme C. Tizziotti
:
Generalized Weierstrass semigroups at several points on certain maximal curves which cannot be covered by the Hermitian curve. 831-851 - Hyoseung Kim, Olivier Sanders, Michel Abdalla, Jong Hwan Park:

Practical dynamic group signatures without knowledge extractors. 853-893 - Maarten De Boeck, Geertrui Van de Voorde

:
Embedded antipodal planes and the minimum weight of the dual code of points and lines in projective planes of order p2. 895-920 - Yan Tong

, Xiangyong Zeng
, Shasha Zhang, Shiwei Xu, Zhengwei Ren:
The estimates of trigonometric sums and new bounds on a mean value, a sequence and a cryptographic function. 921-949 - Jingzhou Na, Jonathan Jedwab

, Shuxing Li:
A group-based structure for perfect sequence covering arrays. 951-970 - Fei Guo, Zilong Wang

, Guang Gong:
Several secondary methods for constructing bent-negabent functions. 971-995 - Clémence Bouvier

, Anne Canteaut, Léo Perrin:
On the algebraic degree of iterated power functions. 997-1033 - Zhongliang Zhang, Zhen Qin, Chun Guo

:
Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher. 1035-1052 - Kwangsu Lee

:
Decentralized multi-client functional encryption for set intersection with improved efficiency. 1053-1093 - Michela Ceria, Antonio Cossidente, Giuseppe Marino, Francesco Pavese

:
On near-MDS codes and caps. 1095-1110 - Daniel Augot

, Sarah Bordage, Jade Nardi:
Efficient multivariate low-degree tests via interactive oracle proofs of proximity for polynomial codes. 1111-1151 - Wanbao Zhang

, Shenglin Zhou:
Extremely line-primitive automorphism groups of finite linear spaces. 1153-1163
Volume 91, Number 4, April 2023
- Yanbin Zheng

, Yuyin Yu, Zhengbang Zha, Xingchen Zhou:
On inverses of permutation polynomials of the form $x\left( x^{s} -a\right) ^{(q^m-1)/s}$ over $\mathbb {F}_{q^n}$. 1165-1181 - Ilya Vorobyev

:
Complete traceability multimedia fingerprinting codes resistant to averaging attack and adversarial noise with optimal rate. 1183-1191 - Yun Li, Hongwei Liu

:
Cyclic constant dimension subspace codes via the sum of Sidon spaces. 1193-1207 - Weijun Fang

, Bin Chen, Shu-Tao Xia, Fang-Wei Fu, Xiangyu Chen:
Perfect LRCs and k-optimal LRCs. 1209-1232 - Zhengan Huang

, Junzuo Lai, Gongxian Zeng, Xin Mu:
Receiver selective opening security for identity-based encryption in the multi-challenge setting. 1233-1259 - Bangteng Xu

:
Characterizations and constructions of plateaued functions on finite abelian groups. 1261-1292 - Michael J. Gill

, Ian M. Wanless:
Pairs of MOLS of order ten satisfying non-trivial relations. 1293-1313 - Shohei Satake

, Yujie Gu:
Cayley sum graphs and their applications to codebooks. 1315-1333 - Songbao Mo

:
Ideal hierarchical secret sharing and lattice path matroids. 1335-1349 - Rocco Mora

, Jean-Pierre Tillich:
On the dimension and structure of the square of the dual of a Goppa code. 1351-1372 - Dan Zeng, Xiangyong Zeng

, Lisha Li, Yunge Xu:
The cycle structure of a class of permutation polynomials. 1373-1400 - Shifeng Sun, Ron Steinfeld, Amin Sakzad:

Incremental symmetric puncturable encryption with support for unbounded number of punctures. 1401-1426 - Vincenzo Pallozzi Lavorante

:
External points to a conic from a Baer subplane. 1427-1441 - Christian Elsholtz

, Benjamin Klahn, Gabriel F. Lipnik
:
Large subsets of $\mathbb {Z}_m^n$ without arithmetic progressions. 1443-1452 - Minjia Shi

, Yaya Li, Wei Cheng, Dean Crnkovic
, Denis S. Krotov, Patrick Solé:
Self-dual bent sequences for complex Hadamard matrices. 1453-1474 - Giusy Monzillo, Tim Penttila, Alessandro Siciliano

:
Eggs in finite projective spaces and unitals in translation planes. 1475-1485 - Enrico Iurlano

:
Growth of the perfect sequence covering array number. 1487-1494 - Li Xu, Zhengchun Zhou, Jun Zhang, Sihem Mesnager

:
Optimal quaternary (r,δ )-locally recoverable codes: their structures and complete classification. 1495-1526 - Zhonghua Sun

, Sujuan Huang, Shixin Zhu:
Optimal quaternary Hermitian LCD codes and their related codes. 1527-1558 - Sihong Su

, Xiaoqi Guo:
A further study on the construction methods of bent functions and self-dual bent functions based on Rothaus's bent function. 1559-1580
Volume 91, Number 5, May 2023
- Susan G. Barwick, Alice M. W. Hui, Wen-Ai Jackson:

A geometric description of the Figueroa plane. 1581-1593 - Henk D. L. Hollmann

, Karan Khathuria
, Ago-Erik Riet
, Vitaly Skachek
:
On some batch code properties of the simplex code. 1595-1605 - Alexander Shaporenko:

Derivatives of bent functions in connection with the bent sum decomposition problem. 1607-1625 - Jérôme Ducoat, Frédérique E. Oggier

:
Rank weight hierarchy of some classes of polynomial codes. 1627-1644 - Nuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa

, Takahiro Matsuda, Jacob C. N. Schuldt:
Maliciously circuit-private multi-key FHE and MPC based on LWE. 1645-1684 - Simeon Ball

:
Grassl-Rötteler cyclic and consta-cyclic MDS codes are generalised Reed-Solomon codes. 1685-1694 - Zhao Hu, Nian Li

, Linjie Xu, Xiangyong Zeng, Xiaohu Tang:
The differential spectrum and boomerang spectrum of a class of locally-APN functions. 1695-1711 - Han-Bing Yu, Qun-Xiong Zheng

, Yijian Liu
, Jingguo Bi, Yu-Fei Duan, Jing-Wen Xue, You Wu, Yue Cao, Rong Cheng, Lin Wang, Bai-Shun Sun:
An improved method for predicting truncated multiple recursive generators with unknown parameters. 1713-1736 - Hopein Christofen Tang

, Djoko Suprijanto
:
A general family of Plotkin-optimal two-weight codes over $\mathbb {Z}_4$. 1737-1750 - Reo Eriguchi

, Noboru Kunihiro, Koji Nuida
:
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures. 1751-1778 - Jiabo Wang

, Cong Ling:
Polar sampler: A novel Bernoulli sampler using polar codes with application to integer Gaussian sampling. 1779-1811 - Makoto Araya

, Masaaki Harada
:
Some restrictions on the weight enumerators of near-extremal ternary self-dual codes and quaternary Hermitian self-dual codes. 1813-1843 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:

Short attribute-based signatures for arbitrary Turing machines from standard assumptions. 1845-1872 - Fengwei Li:

Cyclic codes of length 5p with MDS symbol-pair. 1873-1888 - Zhongxiao Wang, Xiaoxin Zhao, Qunxiong Zheng, Xiutao Feng, Zehao Sun:

The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited. 1889-1910 - Nicola Durante, Giovanni Longobardi

, Valentina Pepe:
$(d,\varvec{\sigma })$-Veronese variety and some applications. 1911-1921 - Hui Han, Jianjun Mu

, Xiaopeng Jiao, Yu-Cheng He
, Zhanzhan Zhao:
Constructions of multi-permutation codes correcting a single burst of deletions. 1923-1934 - Michel Lavrauw, John Sheekey

:
Symplectic 4-dimensional semifields of order 84 and 94. 1935-1949 - Máté Gyarmati

:
Secret sharing on regular bipartite access structures. 1951-1971 - Monika Yadav

, Anuradha Sharma
:
A recursive method for the construction and enumeration of self-orthogonal and self-dual codes over the quasi-Galois ring $\mathbb {F}_{2^r}[u]/$. 1973-2003 - Elisa Gorla

, Cristina Landolina:
Quasi optimal anticodes: structure and invariants. 2005-2020 - Lin Jiao

, Yonglin Hao, Yongqiang Li:
Guess-and-determine attacks on SNOW-Vi stream cipher. 2021-2055 - Wenxiao Qiao, Hailun Yan

, Siwei Sun, Lei Hu, Jiwu Jing:
New cryptanalysis of LowMC with algebraic techniques. 2057-2075 - María Chara, Sam Kottler, Beth Malmskog

, Bianca Thompson
, Mckenzie West
:
Minimum distance and parameter ranges of locally recoverable codes with availability from fiber products of curves. 2077-2105 - Daniel M. Gordon

:
Signed difference sets. 2107-2115
Volume 91, Number 6, June 2023
- Rupert Li

:
Unique optima of the Delsarte linear program. 2117-2140 - Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, Federico Pintore

:
Group signatures and more from isogenies and lattices: generic, simple, and efficient. 2141-2200 - Boris Ryabko

:
Unconditionally secure short key ciphers based on data compression and randomization. 2201-2212 - Gerardo Vega

:
The b-symbol weight distributions of all semiprimitive irreducible cyclic codes. 2213-2221 - Himadri Shekhar Chakraborty

, Tsuyoshi Miezaki, Manabu Oura:
Harmonic Tutte polynomials of matroids. 2223-2236 - Nam-Su Jho, Jooyoung Lee

:
Partition and mix: generalizing the swap-or-not shuffle. 2237-2254 - Zihan Zhang

:
A new metric on symmetric groups and applications to block permutation codes. 2255-2271 - Xiaoni Du, Wengang Jin, Sihem Mesnager

:
Several classes of new weakly regular bent functions outside ℛℱ, their duals and some related (minimal) codes with few weights. 2273-2307 - James M. Hammer, John Lorch

:
Diagonal cellular factor pair Latin squares. 2309-2322 - Abílio Lemos, Victor G. L. Neumann, Sávio Ribas

:
On arithmetic progressions in finite fields. 2323-2346 - Tao Feng

, Jianbing Lu
:
On finite generalized quadrangles with rmPSL(2, q) as an automorphism group. 2347-2364
Volume 91, Number 7, July 2023
- Enes Pasalic, Amar Bapic

, Fengrong Zhang, Yongzhuang Wei:
Explicit infinite families of bent functions outside the completed Maiorana-McFarland class. 2365-2393 - Xiaoqiang Wang

, Zhonghua Sun, Cunsheng Ding:
Two families of negacyclic BCH codes. 2395-2420 - Jian Ding

, Changlu Lin
, Fuchun Lin, Huaxiong Wang:
Full threshold change range of threshold changeable secret sharing. 2421-2447 - Mima Stanojkovski

:
Submodule codes as spherical codes in buildings. 2449-2472 - Igor E. Shparlinski

:
Fixed points of the subset sum pseudorandom number generators. 2473-2479 - Moises Delgado, Heeralal Janwa

, Carlos Agrinsoni:
Some new techniques and progress towards the resolution of the conjecture of exceptional APN functions and absolutely irreducibility of a class of polynomials. 2481-2495 - Tran van Trung

:
Point-missing s-resolvable t-designs: infinite series of 4-designs with constant index. 2497-2508 - Eiichi Bannai, Tsuyoshi Miezaki

, Hiroyuki Nakasora
:
A note on the Assmus-Mattson theorem for some binary codes II. 2509-2522 - Hirokazu Kobayashi

, Yohei Watanabe, Kazuhiko Minematsu, Junji Shikata:
Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication. 2523-2562 - Shitao Li

, Minjia Shi
, Juan Wang:
An improved method for constructing formally self-dual codes with small hulls. 2563-2583 - Marco Pavone

:
Subset sums and block designs in a finite vector space. 2585-2603 - Guangzhou Chen

, Xiaodong Niu:
Constructions for new orthogonal arrays based on large sets of orthogonal arrays. 2605-2625
Volume 91, Number 8, August 2023
- Wei Lu, Xia Wu, Yufei Wang, Xiwang Cao:

A general construction of regular complete permutation polynomials. 2627-2647 - Isabel Byrne, Natalie Dodson, Ryan Lynch, Eric Pabón-Cancel, Fernando Piñero-González

:
Improving the minimum distance bound of Trace Goppa codes. 2649-2663 - Hao Chen:

New MDS entanglement-assisted quantum codes from MDS Hermitian self-orthogonal codes. 2665-2676 - Yan Liu, Jianguo Lei

:
More results on large sets of Kirkman triple systems. 2677-2686 - Zhongya Zhang

, Wenling Wu, Han Sui, Bolin Wang:
Post-quantum security on the Lai-Massey scheme. 2687-2704 - Jaap-Henk Hoepman:

Two faces of blindness. 2705-2721 - Bagher Bagherpour

:
A bivariate polynomial-based cryptographic hard problem and its applications. 2723-2735 - Yan Zhu

:
Optimal and extremal graphical designs on regular graphs associated with classical parameters. 2737-2754 - Xiantong Tan, Haode Yan:

Differential spectrum of a class of APN power functions. 2755-2768 - Erzhong Xue, Zilong Wang

:
The q-ary Golay arrays of size 2˟ 2˟ ... ˟ 2 are standard. 2769-2778 - Jiseung Kim

, Changmin Lee
:
A polynomial time algorithm for breaking NTRU encryption with multiple keys. 2779-2789 - Ting Lan

, Weijun Liu, Fugang Yin
:
Block-transitive 3-(v, k, 1) designs associated with alternating groups. 2791-2807
Volume 91, Number 9, September 2023
- Rongquan Feng:

Obituary of Professor Zhexian Wan. 2809-2810 - Junyang Zhang

:
Characterizing subgroup perfect codes by 2-subgroups. 2811-2819 - Zhonghua Sun

, Xiaoqiang Wang, Cunsheng Ding:
Several families of irreducible constacyclic and cyclic codes. 2821-2843 - Kai Zhang

, Xuejia Lai, Lei Wang, Jie Guan, Bin Hu, Senpeng Wang, Tairong Shi:
Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework. 2845-2878 - Stephen P. Glasby

, Ferdinand Ihringer
, Sam Mattheus:
The proportion of non-degenerate complementary subspaces in classical spaces. 2879-2891 - Yu Zhan, Ziqian Zhang, Qian Liu, Baocang Wang

:
Hiding the input-size in multi-party private set intersection. 2893-2915 - Pratish Datta, Tapas Pal

:
(Compact) Adaptively secure FE for attribute-weighted sums from k-Lin. 2917-3034 - Aurélien Dupin, Pierrick Méaux

, Mélissa Rossi:
On the algebraic immunity - resiliency trade-off, implications for Goldreich's pseudorandom generator. 3035-3079 - Hyung Tae Lee, Jae Hong Seo

:
On the security of functional encryption in the generic group model. 3081-3114
Volume 91, Number 10, October 2023
- Kaiqiang Liu, Zhengchun Zhou

, Avik Ranjan Adhikary
, Rong Luo
:
New sets of non-orthogonal spreading sequences with low correlation and low PAPR using extended Boolean functions. 3115-3139 - Yu Dai, Kaizhan Lin, Chang-An Zhao

, Zijian Zhou:
Fast subgroup membership testings for $\mathbb {G}_1$, $\mathbb {G}_2$ and $\mathbb {G}_T$ on pairing-friendly curves. 3141-3166 - Daniele Bartoli

, Giuliana Fatabbi, Francesco Ghiandoni
:
On the exceptionality of rational APN functions. 3167-3186 - Kai Zhang

, Xuejia Lai, Jie Guan, Bin Hu:
Weak rotational property and its application. 3187-3214 - Dean Crnkovic

, Andrea Svob
:
LCD subspace codes. 3215-3226 - Melissa Lee

, Gabriel Verret:
Extremely primitive groups and linear spaces. 3227-3240 - Pin-Chieh Tseng

, Ching-Yi Lai
, Wei-Hsuan Yu:
Semidefinite programming bounds for binary codes from a split Terwilliger algebra. 3241-3262 - Wen Ma, Jinquan Luo

:
Block codes in pomset metric over ${\mathbb {Z}}_m$. 3263-3284 - Lucas Reis

:
The average density of K-normal elements over finite fields. 3285-3292 - Denis S. Krotov

:
Projective tilings and full-rank perfect codes. 3293-3303 - Livia Betti, Jim Brown

, Fernando Gaitan, Aiyana Spear, Japheth Varlack:
Lattices in real quadratic fields and associated theta series arising from codes over bfF4 and bfF2 ˟ bfF2. 3305-3319 - Jie Xu, Zhiyong Zheng, Kun Tian, Man Chen:

Two properties of prefix codes and uniquely decodable codes. 3321-3330
Volume 91, Number 11, November 2023
- Steven D. Galbraith, Rosario Gennaro, Carla Ràfols, Ron Steinfeld:

Guest editorial: Special issue on Mathematics of Zero-Knowledge. 3331-3332 - Diego F. Aranha

, Youssef El Housni
, Aurore Guillevic
:
A survey of elliptic curves for proof systems. 3333-3378 - Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam

:
Ligero: lightweight sublinear arguments without a trusted setup. 3379-3424 - Ward Beullens, Luca De Feo, Steven D. Galbraith

, Christophe Petit
:
Proving knowledge of isogenies: a survey. 3425-3456 - Daniel Benarroch, Matteo Campanelli

, Dario Fiore, Kobi Gurkan, Dimitris Kolonelos
:
Zero-knowledge proofs for set membership: efficient, succinct, modular. 3457-3525 - Carsten Baum

, Samuel Dittmer
, Peter Scholl, Xiao Wang:
Sok: vector OLE-based zero-knowledge protocols. 3527-3561 - André Guerino Castoldi

, Anderson Novaes Martinhão
, Emerson L. Monte Carmelo
, Otávio J. N. T. N. dos Santos
:
Covering schemes of strength t. 3563-3580 - Congming Wei

, Bingyou Dong, Jialiang Hua, Xiaoyang Dong, Guoyan Zhang:
Improved attacks against reduced-round Whirlwind. 3581-3602 - Senpeng Wang

, Dengguo Feng, Bin Hu, Jie Guan, Kai Zhang, Tairong Shi:
New method for combining Matsui's bounding conditions with sequential encoding method. 3603-3642 - Shamil Asgarli, Dragos Ghioca, Chi Hoi Yip

:
Plane curves giving rise to blocking sets over finite fields. 3643-3669 - Magali Bardet, Pierre Briaud

, Maxime Bros
, Philippe Gaborit, Jean-Pierre Tillich:
Revisiting algebraic attacks on MinRank and on the rank decoding problem. 3671-3707 - Shizhu Tian, Yitong Liu, Xiangyong Zeng

:
A further study on bridge structures and constructing bijective S-boxes for low-latency masking. 3709-3739 - Jingjun Bao

:
Constructions of column-orthogonal strong orthogonal arrays via matchings of bipartite graphs. 3741-3755 - Yanwei Zhou

, Bo Yang, Zirui Qiao, Zhe Xia, Mingwu Zhang, Yi Mu:
Leakage-resilient identity-based cryptography from minimal assumptions. 3757-3801 - Jinzheng Cao, Jian Weng

, Yanbin Pan, Qingfeng Cheng
:
Generalized attack on ECDSA: known bits in arbitrary positions. 3803-3823
Volume 91, Number 12, December 2023
- Xuan Pang, Xiaoqin Zhan

:
Block-transitive 3-(v,4,λ ) designs with sporadic or alternating socle. 3825-3835 - Subhabrata Samajder

, Palash Sarkar:
Another look at key randomisation hypotheses. 3837-3855 - Somayyeh Golalizadeh, Nasrin Soltankhah:

On the fourth weight of generalized Reed-Muller codes. 3857-3879 - Xiaofeng Xie, Tian Tian

:
Structural evaluation of AES-like ciphers against mixture differential cryptanalysis. 3881-3899 - Hexiang Huang

, Qing Xiang:
Construction of storage codes of rate approaching one on triangle-free graphs. 3901-3913 - Kazumasa Shinagawa

, Reo Eriguchi, Shohei Satake, Koji Nuida
:
Private simultaneous messages based on quadratic residues. 3915-3932 - Binbin Pang, Shixin Zhu, Tian Yang, Jun Gao:

BCH codes with larger dimensional hull. 3933-3951 - Ziling Heng, Dexiang Li

, Fenjin Liu:
Ternary self-orthogonal codes from weakly regular bent functions and their application in LCD Codes. 3953-3976 - Shuangqing Liu

:
Optimal Ferrers diagram rank-metric codes from MRD codes. 3977-3993 - José Gómez-Torrecillas, Francisco Javier Lobillo

, Gabriel Navarro:
Skew differential Goppa codes and their application to Mceliece cryptosystem. 3995-4017 - Haider Al Kim

, Sven Puchinger, Ludo Tolhuizen, Antonia Wachter-Zeh:
Coding and bounds for partially defective memory cells. 4019-4058 - Haetham Al Aswad

, Cécile Pierrot:
Individual discrete logarithm with sublattice reduction. 4059-4091 - Yeow Meng Chee

, Alan Chi Hung Ling, Van Khu Vu, Hui Zhang
:
Scheduling to reduce close contacts: resolvable grid graph decomposition and packing. 4093-4106 - Qiang Li, Qun-Xiong Zheng

, Wenfeng Qi:
Practical attacks on small private exponent RSA: new records and new insights. 4107-4142 - Hongwei Liu, Shengwei Liu

:
A class of constacyclic codes are generalized Reed-Solomon codes. 4143-4151

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














