


default search action
Designs, Codes and Cryptography, Volume 93
Volume 93, Number 1, January 2025
- Vassili C. Mavron, Harold N. Ward:
Designer of codes: a tribute to Jennifer Key. 1-10 - Xiang Wang, Fang-Wei Fu, Elena V. Konstantinova:
The sequence reconstruction of permutations with Hamming metric. 11-37 - Christof Beierle:
Revisiting products of the form X times a linearized polynomial L(X). 39-50 - Chin Hei Chan
, Fang-Wei Fu, Maosheng Xiong:
Decoding error probability of random parity-check matrix ensemble over the erasure channel. 51-77 - Reza Dastbasteh
, Farzad Padashnick, Pedro M. Crespo, Markus Grassl, Javad Sharafi:
Equivalence of constacyclic codes with shift constants of different orders. 79-93 - Cain Álvarez-García, Carlos Alberto Castillo-Guillén, Mohamed Badaoui
, Andriy Kryvko:
DNA codes over groups. 95-110 - Kathryn Haymaker, Beth Malmskog, Gretchen L. Matthews:
Algebraic hierarchical locally recoverable codes with nested affine subspace recovery. 111-132 - Sahiba Suryawanshi, Shibam Ghosh, Dhiman Saha, Prathamesh Ram:
Simple vs. vectorial: exploiting structural symmetry to beat the ZeroSum distinguisher. 133-174 - Simeon Ball, Michel Lavrauw, Tabriz Popatia:
Griesmer type bounds for additive codes over finite fields, integral and fractional MDS codes. 175-196 - Xiaoqin Hong
, Xiwang Cao, Gaojun Luo:
Generalized bilateral multilevel construction for constant dimension codes. 197-225 - Xianmang He
, Zusheng Zhang, Si Tian, Jingli Wang, Yindong Chen
:
Parallel construction for constant dimension codes from mixed dimension construction. 227-241 - Sabyasachi Dey
, Gregor Leander
, Nitin Kumar Sharma
:
Improved key recovery attacks on reduced-round Salsa20. 243-262 - Tran van Trung:
Retraction Note: Constructions for t-designs and s-resolvable t-designs. 263
Volume 93, Number 2, February 2025
- Ilaria Cardinali, Michel Lavrauw, Klaus Metsch, Alexander Pott:
Finite geometries. 265-266 - Nour Alnajjarine
, Michel Lavrauw:
A classification of planes intersecting the Veronese surface over finite fields of even order. 267-296 - Jake Faulkner
, Geertrui Van de Voorde
:
On the equivalence, stabilisers, and feet of Buekenhout-Tits unitals. 297-307 - Kanat Abdukhalikov
, Duy Ho
:
Linear codes from arcs and quadrics. 309-329 - John Bamberg
, Yuval Filmus, Ferdinand Ihringer, Sascha Kurz
:
Affine vector space partitions. 331-357 - Sascha Kurz
, Ivan N. Landjev, Francesco Pavese, Assia Rousseva:
The geometry of $(t\mod q)$-arcs. 359-372 - Ivan N. Landjev
, Emiliyan Rogachev:
Sperner's theorem for non-free modules over finite chain rings. 373-390 - Bart De Bruyn
:
Families of quadratic sets on the Klein quadric. 391-407 - Sascha Kurz
:
Capacity of an infinite family of networks related to the diamond network for fixed alphabet sizes. 409-421 - Máté Gyarmati
, Péter Ligeti, Péter Sziklai
, Marcella Takáts
:
Conjunctive hierarchical secret sharing by finite geometry. 423-428 - Kevin Allen, John Sheekey
:
On translation hyperovals in semifield planes. 429-442
Volume 93, Number 3, March 2025
- Sihong Su, Xiaoyan Chen:
A new method of constructing (k+s)-variable bent functions based on a family of s-plateaued functions on k variables. 443-465 - Andrea Di Giusto, Chiara Marcolla:
Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings. 467-502 - Zhedong Wang, Qiqi Lai, Feng-Hao Liu:
Almost tight security in lattices with polynomial moduli - PRF, IBE, all-but-many LTF, and more. 503-551 - Yin-Song Xu, Yi-Bo Luo, Zheng Yuan, Xuan Zhou, Qidi You, Fei Gao, Xiaoyang Dong:
Quantum rectangle attack and its application on Deoxys-BC. 553-590 - Lukas Kölsch
, Lucas Krompholz
, Gohar M. Kyureghyan
:
Factorization and irreducibility of composed products. 591-614 - Li Xu, Cuiling Fan, Chunming Tang, Zhengchun Zhou:
Derivative descendants of cyclic codes and constacyclic codes. 615-632 - Josline Freed:
Codes over $\mathbb {F}_4$ and $\mathbb {F}_2 \times \mathbb {F}_2$ and theta series of the corresponding lattices in quadratic fields. 633-644 - Shikang Yu, Tao Feng
, Menglong Zhang:
A pair of orthogonal orthomorphisms of finite nilpotent groups. 645-665 - Xin Wei, Xiande Zhang, Gennian Ge:
On set systems with strongly restricted intersections. 667-682 - Nathan Kaplan
, Jon-Lark Kim:
Hulls of projective Reed-Muller codes. 683-699 - Huck Bennett, Kaung Myat Htay Win:
Relating code equivalence to other isomorphism problems. 701-723 - Xingyu Zheng
, Shukai Wang, Cuiling Fan:
Optimal combinatorial neural codes via symmetric designs. 725-736 - Ying Xu, Xiaoni Du, Jian Zou:
Quantum security of Trojan message attacks on Merkle-Damgård hash construction. 737-768 - Gaofei Wu, Zhuohui You, Zhengbang Zha, Yuqing Zhang:
Several new classes of optimal ternary cyclic codes with two or three zeros. 769-786 - Federico Canale
, María Naya-Plasencia:
Guessing less and better: improved attacks on GIFT-64. 787-822 - Bingsheng Shen, Tao Yu, Zhengchun Zhou, Yang Yang:
Correction: Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions. 823
Volume 93, Number 4, April 2025
- Jonathan Jedwab, Alexander Pott, Yue Zhou:
Sequences, codes, and Boolean functions: in memory of Kai-Uwe Schmidt. 825-829 - Qiang Wang:
A survey of compositional inverses of permutation polynomials over finite fields. 831-870 - Geyang Wang, Qi Wang:
On the maximum size of variable-length non-overlapping codes. 871-878 - James A. Davis, John B. Polhill, Ken Smith, Eric Swartz, Jordan Webster:
New spence difference sets. 879-888 - Javier de la Cruz, Wolfgang Willems:
Around LCD group codes. 889-897 - Nurdagül Anbar
, Sadmir Kudin, Wilfried Meidl, Enes Pasalic
, Alexandr Polujan
:
Vectorial negabent concepts: similarities, differences, and generalizations. 899-921 - Robert S. Coulter, Bradley Fain:
A class of functions and their application in constructing semisymmetric designs. 923-935 - Tor Helleseth, Chunlei Li, Yongbo Xia:
Investigation of the permutation and linear codes from the Welch APN function. 937-959 - Lukas Kölsch, Gohar M. Kyureghyan:
The classifications of o-monomials and of 2-to-1 binomials are equivalent. 961-970 - Charlene Weiß:
Nontrivial t-designs in polar spaces exist for all t. 971-981 - Ruikai Chen, Sihem Mesnager:
Involutions of finite abelian groups with explicit constructions on finite fields. 983-995 - Radi Abubaker, Guang Gong:
Frequency distance sequences for packet detection in physical-layer security. 997-1020 - Daniel J. Katz, Miriam E. Ramirez:
Moments of autocorrelation demerit factors of binary sequences. 1021-1065 - Lilya Budaghyan, Mohit Pal:
Arithmetization-oriented APN permutations. 1067-1088 - Shuxing Li, Maosheng Xiong:
Intersection distribution of degree four polynomials over finite fields. 1089-1111 - Jozefien D'haeseleer, Ferdinand Ihringer, Kai-Uwe Schmidt:
A common generalization of hypercube partitions and ovoids in polar spaces. 1113-1126 - John Bamberg, Michael Giudici, Jesse Lansdown, Gordon F. Royle:
Tactical decompositions in finite polar spaces and non-spreading classical group actions. 1127-1141 - Michael Kiermaier, Kai-Uwe Schmidt, Alfred Wassermann:
Designs in finite classical polar spaces. 1143-1162 - Jan De Beule, Jonathan Mannaert, Leo Storme:
On two non-existence results for Cameron-Liebler k-sets in ${{\,\mathrm{\textrm{PG}}\,}}(n,q)$. 1163-1177 - Sam Adriaensen, Maarten De Boeck:
Association schemes and orthogonality graphs on anisotropic points of polar spaces. 1179-1216 - Daniele Bartoli, Francesco Ghiandoni:
On 3-dimensional MRD codes of type >Xqt, ,X+δq2t,G(X) >. 1217-1236 - Claude Carlet
:
On the vector subspaces of $\mathbb {F}_{2^n}$ over which the multiplicative inverse function sums to zero. 1237-1254
Volume 93, Number 5, May 2025
- Gustavo Terra Bastos, Angelynn Álvarez, Zachary Flores, Adriana Salerno:
A construction of optimal quasi-cyclic locally recoverable codes using constituent codes. 1255-1270 - Jicheng Ma, Guiying Yan:
On automorphism groups of binary cyclic codes. 1271-1282 - Prachi Gupta, P. R. Mishra, Atul Gaur:
A class of permutations on ${\mathbb {Z}}_{p}$ with differential uniformity at most 3. 1283-1293 - José Gustavo Coelho, Fabio Enrique Brochero Martínez:
Low-weight codewords in cyclic codes. 1295-1310 - Zhonghua Sun, Xinyue Liu:
Several families of negacyclic BCH codes and their duals. 1311-1336 - Wei Lu, Qingyao Wang, Xiaoqiang Wang, Dabin Zheng:
The weight hierarchies of three classes of linear codes. 1337-1355 - Chunzhi Zhao, Jinzheng Cao, Junqi Zhang, Qingfeng Cheng:
Fault attacks on multi-prime RSA signatures. 1357-1374 - Alonso Sepúlveda Castellanos, Erik A. R. Mendoza, Guilherme C. Tizziotti:
The set of pure gaps at several rational places in function fields. 1375-1400 - Bart De Bruyn, Sergey Goryainov, Willem H. Haemers, Leonid Shalaginov:
Divisible design graphs from the symplectic graph. 1401-1424 - Dingding Jia, Haiyang Xue, Bao Li:
Fully selective opening secure IBE from LWE. 1425-1449 - Loïc Bidoux, Jesús-Javier Chi-Domínguez, Thibauld Feneuil, Philippe Gaborit, Antoine Joux, Matthieu Rivain, Adrien Vinçotte:
RYDE: a digital signature scheme based on rank syndrome decoding problem with MPC-in-the-Head paradigm. 1451-1486 - Mohammed El Badry, Abdelfattah Haily, Ayoub Mounir:
On LCD skew group codes. 1487-1499 - Junru Li, Pengzhen Ke, Liang Feng Zhang:
Efficient information-theoretic distributed point functions with general output groups. 1501-1530 - Siwei Chen, Kai Hu, Guozhen Liu, Zhongfeng Niu, Quan Quan Tan, Shichang Wang:
Meet-in-the-middle attack on round-reduced SCARF under single pair-of-tweaks setting. 1531-1547

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.