


default search action
Designs, Codes and Cryptography, Volume 88
Volume 88, Number 1, January 2020
- José Gómez-Torrecillas
, Erik Hieta-aho, Francisco Javier Lobillo
, Sergio R. López-Permouth
, Gabriel Navarro
:
Some remarks on non projective Frobenius algebras and linear codes. 1-15 - Simeon Ball
, Michel Lavrauw
:
Arcs and tensors. 17-31 - Susan G. Barwick
, Alice M. W. Hui, Wen-Ai Jackson, Jeroen Schillewaert:
Characterising hyperbolic hyperplanes of a non-singular quadric in PG(4, q). 33-39 - Jasvinder Singh, Manish Gupta
, Jaskarn Singh Bhullar:
Construction of girth-8 (3, L)-QC-LDPC codes of smallest CPM size using column multipliers. 41-49 - Sihem Mesnager
, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee:
A proof of the Beierle-Kranz-Leander conjecture related to lightweight multiplication in $\mathbb {F}_{2^n}$. 51-62 - Sergey Bereg
, Peter J. Dukes
:
A lower bound on permutation codes of distance n-1. 63-72 - Tai Do Duc
:
Necessary conditions for the existence of group-invariant Butson Hadamard matrices and a new family of perfect arrays. 73-90 - Stefan Kölbl, Elmar Tischhauser
, Patrick Derbez
, Andrey Bogdanov
:
Troika: a ternary cryptographic hash function. 91-117 - Rong Pan, Tao Feng
, Lidong Wang, Xiaomiao Wang
:
Optimal optical orthogonal signature pattern codes with weight three and cross-correlation constraint one. 119-131 - Kenza Guenda, T. Aaron Gulliver, Somphong Jitman
, Satanan Thipworawimon:
Linear ℓ-intersection pairs of codes and their applications. 133-152 - Xiao-Xin Zhao, Wen-Feng Qi, Jia-Min Zhang:
Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs. 153-171 - Abhishek Kesarwani
, Dibyendu Roy, Santanu Sarkar
, Willi Meier:
New cube distinguishers on NFSR-based stream ciphers. 173-199 - Aleksandr Kutsenko
:
Metrical properties of self-dual bent functions. 201-222 - Rohit Gupta
:
Several new permutation quadrinomials over finite fields of odd characteristic. 223-239
Volume 88, Number 2, February 2020
- Hongwei Liu, Xu Pan
:
Galois hulls of linear codes over finite fields. 241-255 - Xia Li
, Qin Yue:
Four classes of minimal binary linear codes with wmin/wmax<1/2 derived from Boolean functions. 257-271 - José Martínez-Bernal, Miguel A. Valencia-Bucio, Rafael H. Villarreal
:
Linear codes over signed graphs. 273-296 - Yan Liu, Xiwang Cao, Wei Lu:
On some conjectures about optimal ternary cyclic codes. 297-309 - Sergey Bereg
, Luis Gerardo Mojica, Linda Morales, Ivan Hal Sudborough:
Constructing permutation arrays using partition and extension. 311-339 - Jun Xu, Lei Hu, Santanu Sarkar
:
Cryptanalysis of elliptic curve hidden number problem from PKC 2017. 341-361 - Tim van de Kamp
, Andreas Peter
, Willem Jonker:
A multi-authority approach to various predicate encryption types. 363-390 - Luca Mariot
, Maximilien Gadouleau, Enrico Formenti
, Alberto Leporati:
Mutually orthogonal latin squares based on cellular automata. 391-411 - Xin Ling, Sihem Mesnager, Yanfeng Qi, Chunming Tang
:
A class of narrow-sense BCH codes over $\mathbb {F}_q$ of length $\frac{q^m-1}{2}$. 413-427 - Bart De Bruyn, Mou Gao:
On four codes with automorphism group PΣ L(3, 4) and pseudo-embeddings of the large Witt designs. 429-452 - Jong Yoon Hyun, Jungyun Lee, Yoonjin Lee
:
Ramanujan graphs and expander families constructed from p-ary bent functions. 453-470
Volume 88, Number 3, March 2020
- Ana Salagean
:
Discrete antiderivatives for functions over $\mathop {{\mathbb {F}}}_p^n$. 471-486 - Xiang Wang
, Fang-Wei Fu:
Snake-in-the-box codes under the ℓ ∞ -metric for rank modulation. 487-503 - Dipayan Das
, Jeffrey Hoffstein
, Jill Pipher, William Whyte, Zhenfei Zhang:
Modular lattice signatures, revisited. 505-532 - Yubo Li
, Zhichao Yang, Kangquan Li, Longjiang Qu
:
A new algorithm on the minimal rational fraction representation of feedback with carry shift registers. 533-552 - Can Xiang, Xin Ling, Qi Wang
:
Combinatorial t-designs from quadratic functions. 553-565 - Saban Alaca, Goldwyn Millar
:
Shift-inequivalent decimations of the Sidelnikov-Lempel-Cohn-Eastman sequences. 567-583 - Raphael Yuster
:
Perfect sequence covering arrays. 585-593 - Sascha Kurz
:
Subspaces intersecting in at most a point. 595-599 - Samir Hodzic
, Enes Pasalic, Sugata Gangopadhyay:
Generic constructions of $\mathbb {Z}$-bent functions. 601-623
Volume 88, Number 4, April 2020
- Cunsheng Ding, Chunming Tang
, Vladimir D. Tonchev:
Linear codes of 2-designs associated with subcodes of the ternary generalized Reed-Muller codes. 625-641 - Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville
, Philippe Gaborit, Terry Shue Chien Lau
, Chik How Tan, Keita Xagawa
:
Cryptanalysis of a rank-based signature with short public keys. 643-653 - John Sheekey
, Geertrui Van de Voorde
:
Rank-metric codes, linear sets, and their duality. 655-675 - Liang Feng Zhang
, Reihaneh Safavi-Naini:
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions. 677-709 - Alessandro Neri
, Anna-Lena Horlemann-Trautmann
:
Random construction of partial MDS codes. 711-725 - Xiusheng Liu, Hualu Liu:
σ-LCD codes over finite chain rings. 727-746 - Hans-Joachim Kroll, Rita Vincenti
:
Linear codes from ruled sets in finite projective spaces. 747-754 - Ka Hin Leung, Qi Wang
:
New nonexistence results on (m, n)-generalized bent functions. 755-770 - Sam Adriaensen
, Lins Denaux
, Leo Storme
, Zsuzsa Weiner:
Small weight code words arising from the incidence of points and hyperplanes in PG(n, q). 771-788
Volume 88, Number 5, May 2020
- Heiko Dietrich, Jeroen Schillewaert:
On a duality for codes over non-abelian groups. 789-805 - Zenghui Fang, Junling Zhou
:
The sizes of maximal (v, k, k-2, k-1) optical orthogonal codes. 807-824 - Sanjit Bhowmick, Alexandre Fotue Tabue, Edgar Martínez-Moro
, Ramakrishna Bandi
, Satya Bagchi
:
Do non-free LCD codes over finite commutative Frobenius rings exist? 825-840 - Yue Zhou
:
On equivalence of maximum additive symmetric rank-distance codes. 841-850 - Jing Jiang
, Yujie Gu
, Minquan Cheng:
Multimedia IPP codes with efficient tracing. 851-866 - Andrea Ferraguti
, Giacomo Micheli
:
Full classification of permutation rational functions and complete rational functions of degree three over finite fields. 867-886 - Gaoli Wang
, Fukang Liu, Binbin Cui, Florian Mendel
, Christoph Dobraunig
:
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160. 887-930 - Elena Kirshanova
, Huyen Nguyen, Damien Stehlé, Alexandre Wallet
:
On the smoothing parameter and last minimum of random orthogonal lattices. 931-950 - Bohua Zhu, Junling Zhou, Yanxun Chang
:
2-(v, 5; m) spontaneous emission error designs. 951-970 - Seyed Hassan Alavi
, Mohsen Bayat
, Jalal Choulaki, Ashraf Daneshkhah
:
Flag-transitive block designs with prime replication number and almost simple groups. 971-992
Volume 88, Number 6, June 2020
- Brett Hemenway Falk
, Nadia Heninger, Michael Rudow
:
Properties of constacyclic codes under the Schur product. 993-1021 - Ryann Cartor
, Daniel Smith-Tone:
All in the C* family. 1023-1036 - Minjia Shi
, Li Xu, Denis S. Krotov
:
On the number of resolvable Steiner triple systems of small 3-rank. 1037-1046 - Aurore Guillevic
, Simon Masson
, Emmanuel Thomé
:
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation. 1047-1081 - Hong-Yu Sun, Xuan-Yong Zhu, Qun-Xiong Zheng
:
Predicting truncated multiple recursive generators with unknown parameters. 1083-1102 - Boxin Zhao, Xiaoyang Dong
, Willi Meier, Keting Jia, Gaoli Wang:
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. 1103-1126 - Xiaolei Fang, Khawla Lebed, Hongwei Liu, Jinquan Luo
:
New MDS self-dual codes over finite fields of odd characteristic. 1127-1138 - Wei Lu, Xia Wu, Xiwang Cao, Ming Chen:
Six constructions of asymptotically optimal codebooks via the character sums. 1139-1158 - Lilya Budaghyan, Nikolay S. Kaleyski, Constanza Riera, Pantelimon Stanica
:
Partially APN functions with APN-like polynomial representations. 1159-1177 - Xiaoyang Dong
, Bingyou Dong, Xiaoyun Wang:
Quantum attacks on some feistel block ciphers. 1179-1203 - Xiao-Xin Zhao, Qun-Xiong Zheng, Zhong-Xiao Wang, Wen-Feng Qi:
On a class of isomorphic NFSRs. 1205-1226 - María Chara, Ricardo A. Podestá, Ricardo Toledano
:
Block transitive codes attaining the Tsfasman-Vladut-Zink bound. 1227-1253 - Yanan Wu, Nian Li
, Xiangyong Zeng:
Linear codes with few weights from cyclotomic classes and weakly regular bent functions. 1255-1272 - Mrinmoy Datta:
Relative generalized Hamming weights of affine Cartesian codes. 1273-1284
Volume 88, Number 7, July 2020
- Julien Lavauzelle, Julian Renner:
Cryptanalysis of a system based on twisted Reed-Solomon codes. 1285-1300 - Alexandru Chirvasitu
, Thomas W. Cusick:
Affine equivalence for quadratic rotation symmetric Boolean functions. 1301-1329 - Tovohery Hajatiana Randrianarisoa
:
A geometric approach to rank metric codes and a classification of constant weight codes. 1331-1348 - Minfeng Shao, Ying Miao:
On optimal weak algebraic manipulation detection codes and weighted external difference families. 1349-1369 - Dingding Jia
, Yamin Liu, Bao Li:
IBE with tight security against selective opening and chosen-ciphertext attacks. 1371-1400 - Lorenzo Grassi
, Christian Rechberger:
Revisiting Gilbert's known-key distinguisher. 1401-1445 - Xuanlong Ma
, Min Feng
, Kaishun Wang:
Subgroup perfect codes in Cayley sum graphs. 1447-1461 - Yupeng Jiang
, Dongdai Lin:
Longest subsequences shared by two de Bruijn sequences. 1463-1475
Volume 88, Number 8, August 2020
- Peter Beelen
, Olav Geil
, Edgar Martínez-Moro
, Xin-Wen Wu
:
Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan. 1477-1478 - Mojtaba Fadavi, Reza Rezaeian Farashahi
:
Uniform encodings to elliptic curves and indistinguishable point representation. 1479-1502 - Thomas Britz
, Adam Mammoliti, Keisuke Shiromoto
:
Wei-type duality theorems for rank metric codes. 1503-1519 - Umberto Martínez-Peñas
:
Hamming and simplex codes for the sum-rank metric. 1521-1539 - Lucky Galvez, Jon-Lark Kim:
Construction of self-dual matrix codes. 1541-1560 - Alain Couvreur, Isabella Panaccione:
Power error locating pairs. 1561-1593 - Alonso Sepúlveda Castellanos
, Maria Bras-Amorós
:
Weierstrass semigroup at m+1 rational points in maximal curves which cannot be covered by the Hermitian curve. 1595-1616 - Maria Bras-Amorós
, Iwan M. Duursma, Euijin Hong:
Isometry-dual flags of AG codes. 1617-1638 - René Bødker Christensen
, Olav Geil
:
Steane-enlargement of quantum codes from the Hermitian function field. 1639-1652 - Ignacio García-Marco
, Irene Márquez-Corbella
, Diego Ruano
:
High dimensional affine codes whose square has a designed minimum distance. 1653-1672 - Hiram H. López
, Gretchen L. Matthews
, Ivan Soprunov
:
Monomial-Cartesian codes and their duals, with applications to LCD codes, quantum codes, and locally recoverable codes. 1673-1685 - Irene Márquez-Corbella
, Edgar Martínez-Moro
, Carlos Munuera:
Computing sharp recovery structures for locally recoverable codes. 1687-1698
Volume 88, Number 9, September 2020
- Anne Canteaut, Gohar M. Kyureghyan, Alexander Pott, Felix Ulmer:
Editorial: Coding and Cryptography 2019. 1699 - Alexandr Polujan
, Alexander Pott:
Cubic bent functions outside the completed Maiorana-McFarland class. 1701-1722 - Daniel Gerike
, Gohar M. Kyureghyan:
Permutations on finite fields with invariant cycle structure on lines. 1723-1740 - Pan Tan, Zhengchun Zhou, Vladimir Sidorenko, Udaya Parampalli:
Two classes of optimal LRCs with information (r, t)-locality. 1741-1757 - Jian Liu, Sihem Mesnager
, Deng Tang:
Constructions of optimal locally recoverable codes via Dickson polynomials. 1759-1780 - Tuvi Etzion, Sascha Kurz, Kamil Otal, Ferruh Özbudak
:
Subspace packings: constructions and bounds. 1781-1810 - Peter G. Boyvalenkov
, Peter D. Dragnev
, Douglas P. Hardin
, Edward B. Saff, Maya Stoyanova
:
Upper bounds for energies of spherical codes of given cardinality and separation. 1811-1826 - Sabyasachi Dey
, Santanu Sarkar
:
Proving the biases of Salsa and ChaCha in differential attack. 1827-1856 - Jean-Christophe Deneuville
, Philippe Gaborit:
Cryptanalysis of a code-based one-time signature. 1857-1866 - Ana Salagean
, Ferruh Özbudak
:
Counting Boolean functions with faster points. 1867-1883 - Elena Egorova
, Marcel Fernandez, Grigory Kabatiansky:
On non-binary traceability set systems. 1885-1892 - Ryutaroh Matsumoto
:
Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets. 1893-1907 - Gretchen L. Matthews
, Fernando Piñero
:
Codes with locality from cyclic extensions of Deligne-Lusztig curves. 1909-1924 - Assia Rousseva
, Ivan N. Landjev:
The geometric approach to the existence of some quaternary Griesmer codes. 1925-1940 - Daniel Coggia, Alain Couvreur:
On the security of a Loidreau rank metric code based encryption scheme. 1941-1957 - Shizhu Tian, Christina Boura
, Léo Perrin:
Boomerang uniformity of popular S-box constructions. 1959-1989 - Delphine Boucher
:
An algorithm for decoding skew Reed-Solomon codes with respect to the skew metric. 1991-2005
Volume 88, Number 10, October 2020
- Samir Hodzic, Enes Pasalic, Yongzhuang Wei
:
A general framework for secondary constructions of bent and plateaued functions. 2007-2035 - Vladimir N. Potapov
:
On q-ary bent and plateaued functions. 2037-2049 - Kai Lin Ong
, Ang Miin Huey:
On equivalency of zero-divisor codes via classifying their idempotent generator. 2051-2065 - Yujie Gu, Shohei Satake
:
On 2-parent-identifying set systems of block size 4. 2067-2076 - Masaya Yasuda
, Satoshi Nakamura, Junpei Yamaguchi:
Analysis of DeepBKZ reduction for finding short lattice vectors. 2077-2100 - Yan Zhu, Naoki Watamura
:
Relative t-designs in Johnson association schemes for P-polynomial structure. 2101-2118 - Mengna Wu, Chengju Li, Zilong Wang:
Characterizations and constructions of triple-cycle permutations of the form xrh(xs). 2119-2132 - Christian Elsholtz
, Péter Pál Pach:
Caps and progression-free sets in ${{\mathbb {Z}}}_m^n$. 2133-2170 - Lijing Zheng, Jie Peng
, Haibin Kan, Yanjun Li
, Juan Luo:
On constructions and properties of (n, m)-functions with maximal number of bent components. 2171-2186 - Simona Boyadzhiyska
, Shagnik Das
, Tibor Szabó:
Enumerating extensions of mutually orthogonal Latin squares. 2187-2206 - Baptiste Lambin
, Patrick Derbez
, Pierre-Alain Fouque
:
Linearly equivalent S-boxes and the division property. 2207-2231 - Sihem Mesnager, Chunming Tang
, Maosheng Xiong:
On the boomerang uniformity of quadratic permutations. 2233-2246 - Boran Kim, Yoonjin Lee
:
Classification of self-dual cyclic codes over the chain ring ℤp[u]/ u3 >. 2247-2273
Volume 88, Number 11, November 2020
- Yanyan Gao, Qin Yue
, Yansheng Wu
:
LCD codes and self-orthogonal codes in generalized dihedral group algebras. 2275-2287 - Yunwen Liu
, Wenying Zhang, Bing Sun, Vincent Rijmen
, Guoqiang Liu, Chao Li, Shaojing Fu, Meichun Cao:
The phantom of differential characteristics. 2289-2311 - Martin Ekerå
:
On post-processing in the quantum algorithm for computing short discrete logarithms. 2313-2335 - Seyed Hassan Alavi
, Ashraf Daneshkhah
, Cheryl E. Praeger
:
Symmetries of biplanes. 2337-2359 - Yeow Meng Chee
, Charles J. Colbourn
, Hoang Dau
, Ryan Gabrys, Alan C. H. Ling, Dylan Lusi, Olgica Milenkovic:
Access balancing in storage systems by labeling partial Steiner systems. 2361-2376 - Juanjuan Xu, Jingjun Bao, Lijun Ji:
Doubly resolvable Steiner quadruple systems of orders 22n+1. 2377-2386 - Khodakhast Bibak
:
Deletion correcting codes meet the Littlewood-Offord problem. 2387-2396 - Cem Güneri, Edgar Martínez-Moro
, Selcen Sayici:
Linear complementary pair of group codes over finite chain rings. 2397-2405 - Xinxin Gong
, Bin Zhang:
Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G. 2407-2431 - Youngkyung Lee, Dong Hoon Lee, Jong Hwan Park:
Tightly CCA-secure encryption scheme in a multi-user setting with corruptions. 2433-2452
Volume 88, Number 12, December 2020
- Xinmei Huang
, Qin Yue, Yansheng Wu
, Xiaoping Shi, Jerod Michel:
Binary primitive LCD BCH codes. 2453-2473 - Jong Yoon Hyun, Hyun Kwang Kim, Yansheng Wu
, Qin Yue
:
Optimal minimal linear codes from posets. 2475-2492 - Minjia Shi
, Wang Xuan, Patrick Solé:
Two families of two-weight codes over $\mathbb {Z}_4$. 2493-2505 - Junling Zhou
, Wenling Zhou:
Wide-sense 2-frameproof codes. 2507-2519 - Petr Lisonek
:
Maximal nonassociativity via fields. 2521-2530 - Sudhir R. Ghorpade
, Trygve Johnsen
:
A polymatroid approach to generalized weights of rank metric codes. 2531-2546 - Minjia Shi
, Li Xu, Patrick Solé:
Construction of isodual codes from polycirculant matrices. 2547-2560 - Juliane Capaverde
, Ariane M. Masuda
, Virginia M. Rodrigues
:
Rédei permutations with cycles of the same length. 2561-2579 - Whan-Hyuk Choi
, Hyun Jin Kim
, Yoonjin Lee
:
Construction of single-deletion-correcting DNA codes using CIS codes. 2581-2596 - Lukas Kölsch
:
On the inverses of Kasami and Bracken-Leander exponents. 2597-2621

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.