![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Designs, Codes and Cryptography, Volume 92
Volume 92, Number 1, January 2024
- Hai Liu, Chengju Li, Haifeng Qian:
Parameters of several families of binary duadic codes and their related codes. 1-12 - Arghya Bhattacharjee
, Ritam Bhaumik
, Avijit Dutta, Mridul Nandi, Anik Raychaudhuri:
BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers. 13-49 - Jiaxin Pan
, Chen Qian
, Benedikt Wagner
:
Generic constructions of master-key KDM secure attribute-based encryption. 51-92 - Kris Coolsaet
:
Nonsingular hypercubes and nonintersecting hyperboloids. 93-112 - Aleksandr Kutsenko
:
Decomposing self-dual bent functions. 113-144 - Vidya Sagar
, Ritumoni Sarma
:
Minimal and optimal binary codes obtained using CD-construction over the non-unital ring I. 145-157 - Orr Dunkelman
, Nathan Keller, Eyal Ronen, Adi Shamir:
Quantum time/memory/data tradeoff attacks. 159-177 - Michela Ceria
, Teo Mora:
Towards a Gröbner-free approach to coding. 179-204 - Alexander L. Gavrilyuk, Sho Suda
:
Uniqueness of an association scheme related to the Witt design on 11 points. 205-209 - Boyi He, Qunying Liao:
The properties and the error-correcting pair for lengthened GRS codes. 211-225
Volume 92, Number 2, February 2024
- Samir Hodzic
, Arnab Roy, Elena Andreeva
:
Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks. 227-257 - Ziwei Lu, Shenglin Zhou
:
Flag-transitive symmetric 2-designs of prime order. 259-266 - Danyao Wu
, Pingzhi Yuan:
Permutation polynomials and their compositional inverses over finite fields by a local method. 267-276 - Kota Takahashi, Keitaro Hashimoto
, Wakaha Ogata
:
Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext. 277-301 - Monika Yadav
, Anuradha Sharma
:
Construction and enumeration of self-orthogonal and self-dual codes over Galois rings of even characteristic. 303-339 - Wen Ma, Jinquan Luo
:
Codes with respect to weighted poset block metric. 341-363 - Xiaowei Su, Zihong Tian
, Guohui Hao:
Determination of the sizes of optimal geometric orthogonal codes with parameters (n˟ m,k,λ ,k-1). 365-395 - Cuiling Fan, An Wang, Li Xu
:
New classes of NMDS codes with dimension 3. 397-418 - Diane M. Donovan
, Mike J. Grannell
, Emine Sule Yazici
:
On maximal partial Latin hypercubes. 419-433 - Hannes Bartz
, Thomas Jerkovits
, Johan Rosenkilde:
Fast Kötter-Nielsen-Høholdt interpolation over skew polynomial rings and its application in coding theory. 435-465 - Nikolay Kolomeec
, Denis Bykov:
On the image of an affine subspace under the inverse function within a finite field. 467-476 - Mahir Bilen Can, Roy Joshua
, Girivaru V. Ravindra:
Defects of codes from higher dimensional algebraic varieties. 477-494 - John Bamberg
:
On the 430-cap of rmPG(6,4) having two intersection sizes with respect to hyperplanes. 495-503
Volume 92, Number 3, March 2024
- Editorial Note: Coding and Cryptography 2022. 505
- Marco Timpanella, Giovanni Zini
:
On a family of linear MRD codes with parameters [8˟ 8,16,7]q. 507-530 - Amar Bapic, Enes Pasalic, Alexandr Polujan
, Alexander Pott:
Vectorial Boolean functions with the maximum number of bent components beyond the Nyberg's bound. 531-552 - Felicitas Hörmann
, Hannes Bartz
:
Interpolation-based decoding of folded variants of linearized and skew Reed-Solomon codes. 553-586 - Agathe Cheriere
, Lina Mortajine, Tania Richmond
, Nadia El Mrabet:
Exploiting ROLLO's constant-time implementations with a single-trace analysis. 587-608 - Anina Gruica, Anna-Lena Horlemann, Alberto Ravagnani, Nadja Willenborg
:
Densities of codes of various linearity degrees in translation-invariant metric spaces. 609-637 - Vladimir N. Potapov
, Anna A. Taranenko
, Yuriy V. Tarannikov:
An asymptotic lower bound on the number of bent functions. 639-651 - Selçuk Kavut
:
Modified Patterson-Wiedemann construction. 653-666 - Cem Güneri
, Ferruh Özbudak, Selcen Sayici:
On subfield subcodes obtained from restricted evaluation codes. 667-680 - Faruk Göloglu, Lukas Kölsch
:
Counting the number of non-isotopic Taniguchi semifields. 681-694 - Anna-Maurin Graner
, Gohar M. Kyureghyan:
Constructing irreducible polynomials recursively with a reverse composition method. 695-708 - Rafael A. Arce-Nazario
, Carlos Hernández, José R. Ortiz-Ubarri, Ivelisse Rubio
, Jaziel Torres:
Analysis and computation of multidimensional linear complexity of periodic arrays. 709-722 - Nicolas David, María Naya-Plasencia, André Schrottenloher
:
Quantum impossible differential attacks: applications to AES and SKINNY. 723-751 - Rakhi Pratihar
, Tovohery Hajatiana Randrianarisoa
:
Antipodal two-weight rank metric codes. 753-769 - Akihiro Munemasa, Rowena Alma L. Betty
:
Classification of extremal type II $\mathbb {Z}_4$-codes of length 24. 771-785 - Reza Dastbasteh
, Petr Lisonek
:
New quantum codes from self-dual codes over $\mathbb {F}_4$. 787-801 - André Chailloux
, Simona Etinski:
On the (in)security of optimized Stern-like signature schemes. 803-832 - Krijn Reijnders, Simona Samardjiska, Monika Trimoska:
Hardness estimates of the code equivalence problem in the rank metric. 833-862 - Suman Dutta, Subhamoy Maitra:
Introducing nega-Forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra. 863-883
Volume 92, Number 4, April 2024
- Qianqian Yan, Junling Zhou
:
Mutually disjoint Steiner systems from BCH codes. 885-907 - Léo Ducas
:
Provable lattice reduction of $\mathbb {Z}^n$ with blocksize n/2. 909-916 - Shanxiang Lyu
, Ling Liu, Cong Ling, Junzuo Lai, Hao Chen:
Lattice codes for lattice-based PKE. 917-939 - Shannon Veitch, Douglas R. Stinson
:
Unconditionally secure non-malleable secret sharing and circular external difference families. 941-956 - Jiqiang Lu
, Wenchang Zhou:
Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher. 957-973 - Moritz Wiese
, Holger Boche:
ε-Almost collision-flat universal hash functions and mosaics of designs. 975-998 - Dipak K. Bhunia
, Cristina Fernández-Córdoba
, Carlos Vela, Mercè Villanueva
:
On the equivalence of $\mathbb {Z}_{p^s}$-linear generalized Hadamard codes. 999-1022 - Sergey Bereg
, Mohammadreza Haghpanah, Brian Malouf, Ivan Hal Sudborough:
Improved bounds for permutation arrays under Chebyshev distance. 1023-1039 - Tsuyoshi Miezaki
, Akihiro Munemasa:
Jacobi polynomials and harmonic weight enumerators of the first-order Reed-Muller codes and the extended Hamming codes. 1041-1049 - Deng-Ming Xu, Gang Wang, Sihem Mesnager
, You Gao, Fang-Wei Fu:
Jacobi sums over Galois rings of arbitrary characters and their applications in constructing asymptotically optimal codebooks. 1051-1073 - Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Pierre Loidreau, Julian Renner, Antonia Wachter-Zeh:
LowMS: a new rank metric code-based KEM without ideal structure. 1075-1093 - Guangkui Xu, Gaojun Luo
, Xiwang Cao, Heqian Xu:
Hulls of linear codes from simplex codes. 1095-1112
Volume 92, Number 5, May 2024
- José Alves Oliveira
, Fabio Enrique Brochero Martínez:
Dynamics of polynomial maps over finite fields. 1113-1125 - Elena Kirshanova
, Ekaterina Malygina
:
Construction-D lattice from Garcia-Stichtenoth tower code. 1127-1142 - Cícero Carvalho
, Hiram H. López
, Gretchen L. Matthews:
Decreasing norm-trace codes. 1143-1161 - Xiaojing Chen, Xingbo Lu, Shixin Zhu, Wan Jiang, Xindi Wang:
New entanglement-assisted quantum error-correcting codes from negacyclic codes. 1163-1174 - Lei Zhang
:
Observations on the branch number and differential analysis of SPEEDY. 1175-1199 - Mesut Sahin
, Oguz Yayla:
Codes on subgroups of weighted projective tori. 1201-1218 - Alonso Sepúlveda Castellanos
, Erik A. R. Mendoza
, Luciane Quoos
:
Weierstrass semigroups, pure gaps and codes on function fields. 1219-1242 - Sara Ban
, Sanja Rukavina
:
Construction of self-orthogonal $\mathbb {Z}_{2^k}$-codes. 1243-1250 - Wenqin Zhang, Yuan Luo
, Lele Wang:
Optimal binary and ternary locally repairable codes with minimum distance 6. 1251-1265 - Kenji Yasunaga
:
Improved bounds for codes correcting insertions and deletions. 1267-1278 - Thomas Britz
, Himadri Shekhar Chakraborty
, Reina Ishikawa, Tsuyoshi Miezaki, Hopein Christofen Tang
:
Harmonic Tutte polynomials of matroids II. 1279-1297 - Lidija Stanovnik
, Miha Moskon, Miha Mraz:
In search of maximum non-overlapping codes. 1299-1326 - Ruikai Chen, Sihem Mesnager
:
On a class of permutation rational functions involving trace maps. 1327-1339 - Semira Einsele
, Kenneth G. Paterson:
Average case error estimates of the strong Lucas test. 1341-1378 - Alexander L. Gavrilyuk, Vladislav V. Kabanov:
Strongly regular graphs decomposable into a divisible design graph and a Hoffman coclique. 1379-1391 - Jan Schoone
, Joan Daemen:
The state diagram of χ. 1393-1421 - Yun Li, Hongwei Liu
, Sihem Mesnager:
New constructions of constant dimension subspace codes with large sizes. 1423-1437 - Matthew Kreitzer
, Mihai Nica
, Rajesh Pereira
:
Using alternating de Bruijn sequences to construct de Bruijn tori. 1439-1454
Volume 92, Number 6, June 2024
- Xiaoni Du, René Rodríguez
, Hao Wu:
Infinite families of minimal binary codes via Krawtchouk polynomials. 1455-1475 - Yi-Fan Tseng
, Zi-Yuan Liu, Raylin Tso:
Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives. 1477-1500 - Laura Monroe
:
Optimal binary signed-digit representations of integers and the Stern polynomial. 1501-1516 - Zhaoping Meng
, Qingling Gao, Zhanggui Wu:
A recursive construction of doubly resolvable Steiner quadruple systems. 1517-1531 - Haode Yan, Yanan Yin:
On the parameters of extended primitive cyclic codes and the related designs. 1533-1540 - Qiqi Lai
, Feng-Hao Liu, Zhedong Wang:
Leakage-resilient sf IBE/sf ABE with optimal leakage rates from lattices. 1541-1597 - Adam Michael Roberts
:
Self-dual codes from a block matrix construction characterised by group rings. 1599-1617 - Kanchan Singh, Ritesh Kumar Pathak
, Sheo Kumar Singh:
Linear codes associated to determinantal varieties in the space of hermitian matrices. 1619-1635 - Chun Guo, Yiyuan Luo
, Chenyu Xiao:
On the sequential indifferentiability of the Lai-Massey construction. 1637-1661 - Xinxin Gong
, Yonglin Hao
, Qingju Wang
:
Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW. 1663-1728 - Yu-Chi Chen
:
A conceptually simple and generic construction of plaintext checkable encryption in the standard model. 1729-1746 - Alexander M. Romanov
:
Perfect mixed codes from generalized Reed-Muller codes. 1747-1759 - Sabrina Kunzweiler
:
Efficient computation of (2n,2n)-isogenies. 1761-1802 - Angelot Behajaina, Martino Borello, Javier de la Cruz, Wolfgang Willems:
Twisted skew G-codes. 1803-1821 - Kaizhan Lin, Jianming Lin
, Shiping Cai, Weize Wang, Chang-An Zhao
:
Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees. 1823-1843
Volume 92, Number 7, July 2024
- Hao Chen:
Large Hermitian hull GRS codes of any given length. 1845-1853 - Hongna Yang, Yiwei Wang, Yiwei Zhang:
Extremal regular graphs and hypergraphs related to fractional repetition codes. 1855-1878 - Liqin Qian, Xiwang Cao, Xia Wu, Wei Lu:
MDS codes with l-Galois hulls of arbitrary dimensions. 1879-1902 - Delphine Boucher
, Kayodé Epiphane Nouetowa:
Some constructions and existence conditions for Hermitian self-dual skew codes. 1903-1924 - Tran Viet Xuan Phuong:
Anonymous attribute-based broadcast encryption with hidden multiple access structures. 1925-1945 - Ebru Adiguzel-Goktas
, Enver Ozdemir:
Square root computation in finite fields. 1947-1959 - Giuseppe D'Alconzo
:
Monomial isomorphism for tensors and applications to code equivalence problems. 1961-1982 - Benjamin Fuller
:
Impossibility of efficient information-theoretic fuzzy extraction. 1983-2009 - Rongsheng Wu, Xiande Zhang
:
Balanced reconstruction codes for single edits. 2011-2029 - Chunyu Gan, Chengju Li, Haifeng Qian
, Xueying Shi:
On Bose distance of a class of BCH codes with two types of designed distances. 2031-2053 - Yuxin Tong
, Xiang Xie, Kang Yang, Rui Zhang, Rui Xue:
Efficient secure multi-party computation for proof of custody in Ethereum sharding. 2055-2083 - Zhonghua Sun
, Xinyue Liu, Shixin Zhu, Yongsheng Tang:
Negacyclic BCH codes of length $\frac{q^{2m}-1}{q+1}$ and their duals. 2085-2101
Volume 92, Number 8, August 2024
- Chun Guo, Ling Song:
CCA security for contracting (quasi-)Feistel constructions with tight round complexity. 2103-2129 - Slim Bettaieb, Loïc Bidoux
, Victor Dyseryn, Andre Esser
, Philippe Gaborit, Mukul Kulkarni, Marco Palumbi:
PERK: compact signature scheme based on a new variant of the permuted kernel problem. 2131-2157 - Ka Hin Leung, Bernhard Schmidt, Tao Zhang:
Classification of semiregular relative difference sets with $\gcd (\lambda ,n)=1$ attaining Turyn's bound. 2159-2182 - Giusy Monzillo, Tim Penttila, Alessandro Siciliano:
Classifying pseudo-ovals, translation generalized quadrangles, and elation Laguerre planes of small order. 2183-2196 - Seungjun Baek, Giyoon Kim, Jongsung Kim
:
Preimage attacks on reduced-round Ascon-Xof. 2197-2217 - Cong Yu, Shixin Zhu, Fuyin Tian:
Construction of quantum codes from multivariate polynomial rings. 2219-2234 - Shuangqing Liu
, Lijun Ji:
Combinatorial constructions of optimal low-power error-correcting cooling codes. 2235-2252 - Geyang Wang, Qi Wang
:
On the size distribution of the fixed-length Levenshtein balls with radius one. 2253-2265 - Juanjuan Xu
, Lijun Ji:
Special overlarge sets of Kirkman triple systems. 2267-2285 - Daniele Bartoli
, Nicola Durante, Giovanni Giuseppe Grimaldi
:
Ovoids of Q(6, q) of low degree. 2287-2306 - Ryosuke Yamaguchi
:
Jacobi polynomials for the first-order generalized Reed-Muller codes. 2307-2321 - Zhiwen He, Tingting Chen
, Gennian Ge:
New constructions of signed difference sets. 2323-2340 - Jan Schoone
, Joan Daemen:
Algebraic properties of the maps χ n. 2341-2365 - Sascha Kurz:
Lengths of divisible codes: the missing cases. 2367-2378 - Hannes Bartz
, Sven Puchinger:
Fast decoding of lifted interleaved linearized Reed-Solomon codes for multishot network coding. 2379-2421
Volume 92, Number 9, September 2024
- Xiaoli Dong
, Jun Liu, Yongzhuang Wei, Wen Gao, Jie Chen:
Meet-in-the-middle attacks on AES with value constraints. 2423-2449 - Sam Adriaensen
, Lins Denaux
:
Small weight codewords of projective geometric codes II. 2451-2472 - Bo Yang
, Kangkang He, Xiangyong Zeng, Zibi Xiao
:
Symmetric 2-adic complexity of Tang-Gong interleaved sequences from generalized GMW sequence pair. 2473-2489 - Carmen Amarra
, Alice Devillers
, Cheryl E. Praeger
:
Chain-imprimitive, flag-transitive 2-designs. 2491-2510 - Santiago Barrera Acevedo
, Heiko Dietrich, Corey Lionis:
New families of quaternionic Hadamard matrices. 2511-2525 - Alexander A. Davydov
, Stefano Marcugini
, Fernanda Pambianco
:
Further results on covering codes with radius R and codimension tR+1. 2527-2548 - Carlos Galindo
, Fernando Hernando
, Helena Martín-Cruz
:
Optimal (r,δ )-LRCs from monomial-Cartesian codes and their subfield-subcodes. 2549-2586 - Gergely Kiss, Gábor Somlai
:
Special directions on the finite affine plane. 2587-2597 - Xiaomeng Wang, Lina Wei, Shou-Jun Xu
, Sanming Zhou:
Subgroup total perfect codes in Cayley sum graphs. 2599-2613 - Mikhail E. Muzychuk, Grigory Ryabov:
Constructing linked systems of relative difference sets via Schur rings. 2615-2637 - Enes Pasalic, Amar Bapic, Fengrong Zhang, Yongzhuang Wei:
Using Pτ property for designing bent functions provably outside the completed Maiorana-McFarland class. 2639-2654 - Le Dong, Danxun Zhang, Wenya Li
, Wenling Wu:
Yoyo attack on 4-round Lai-Massey scheme with secret round functions. 2655-2684 - Jie Hao
, Shu-Tao Xia, Kenneth W. Shum, Bin Chen, Fang-Wei Fu, Yixian Yang:
Optimal ternary locally repairable codes. 2685-2704
Volume 92, Number 10, October 2024
- Ang Xiao, Yue Zhou
:
On the packing density of Lee spheres. 2705-2729 - Jong Yoon Hyun, Jungyun Lee, Yoonjin Lee
:
Characterization of weakly regular p-ary bent functions of ℓ-form. 2731-2741 - María Chara, Ricardo A. Podestá, Luciane Quoos
, Ricardo Toledano:
Lifting iso-dual algebraic geometry codes. 2743-2767 - Song Tian:
Computing gluing and splitting (ℓ ,ℓ )-isogenies. 2769-2789 - Hadi Kharaghani, Thomas Pender, Vladimir D. Tonchev:
On optimal constant weight codes derived from ømega-circulant balanced generalized weighing matrices. 2791-2799 - Elena Berardini, Alessio Caminata, Alberto Ravagnani:
Structure of CSS and CSS-T quantum codes. 2801-2823 - Muhammad Imran
, Gábor Ivanyos:
Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem. 2825-2843 - Wenjun Yu, Moshe Schwartz:
On duplication-free codes for disjoint or equal-length errors. 2845-2861 - Joanne Hall, Daniel Horsley
, Douglas R. Stinson:
Bounds on data limits for all-to-all comparison from combinatorial designs. 2863-2879 - Rajendra Prasad Rajpurohit, Maheshanand Bhaintwal
, Charul Rajput
:
Locally maximal recoverable codes and LMR-LCD codes. 2881-2899 - Xinran Wang, Ziling Heng
, Fengwei Li, Qin Yue:
LCD codes and almost optimally extendable codes from self-orthogonal codes. 2901-2926 - Masaaki Harada:
A method for constructing quaternary Hermitian self-dual codes and an application to quantum codes. 2927-2948 - Jing Jiang
, Fenggui Pei, Cailin Wen, Minquan Cheng, Henk D. L. Hollmann:
Constructions of t-strongly multimedia IPP codes with length t+1. 2949-2970 - Jing Qiu, Fang-Wei Fu:
Some new constructions of optimal linear codes and alphabet-optimal (r,δ )-locally repairable codes. 2971-2991 - Hongwei Liu, Zihao Yu
:
Linear codes from simplicial complexes over ${\mathbb {F}}_{2^n}$. 2993-3016 - Yupeng Jiang
, Ming Li, Ying Gao, Dongdai Lin:
On prefer-one sequences. 3017-3032 - Makoto Araya, Masaaki Harada, Hadi Kharaghani, Ali Mohammadian, Behruz Tayfeh-Rezaie:
On the classification of skew Hadamard matrices of order $\varvec{36}$ and related structures. 3049-3062 - Xiaoshan Quan
, Qin Yue, Fuqing Sun:
Hulls of cyclic codes with respect to the regular permutation inner product. 3063-3083 - Sven Schäge
:
TOPAS 2-pass key exchange with full perfect forward secrecy and optimal communication complexity. 3085-3124 - Stefan Steinerberger:
A note on approximate Hadamard matrices. 3125-3131 - Fabio Enrique Brochero Martínez, Daniela Oliveira
:
On the number of rational points of Artin-Schreier's curves and hypersurfaces. 3133-3154 - Pratish Datta, Tapas Pal
, Katsuyuki Takashima:
Compact FE for unbounded attribute-weighted sums for logspace from SXDH. 3155-3235 - Jin Li, Huilian Zhu, Shan Huang:
Some constacyclic BCH codes with good parameters. 3237-3259 - Wonseok Choi, Seongha Hwang, ByeongHak Lee, Jooyoung Lee:
ZLR: a fast online authenticated encryption scheme achieving full security. 3261-3316
Volume 92, Number 11, November 2024
- Manuel González Sarabia, Humberto Muñoz-George, Jorge A. Ordaz, Eduardo Sáenz-de-Cabezón, Rafael H. Villarreal
:
Indicator functions, v-numbers and Gorenstein rings in the theory of projective Reed-Muller-type codes. 3317-3353 - Frank R. Kschischang, Felice Manganiello
, Alberto Ravagnani, Kristen Savary:
External codes for multiple unicast networks via interference alignment. 3355-3369 - Jürgen Bierbrauer, Stefano Marcugini
, Fernanda Pambianco
:
An asymptotic property of quaternary additive codes. 3371-3375 - Huawei Wu
, Jing Yang, Keqin Feng:
Circular external difference families: construction and non-existence. 3377-3390 - Isaac Andrés Canales Martinez
, Igor Semaev:
Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers. 3391-3427 - Xinyue Ming, Tao Feng
, Guojing Jia, Xiaomiao Wang:
The existence of $(\mathbb {Z}_v,4,1)$-disjoint difference families. 3429-3446 - Sarah Arpin
, James Clements, Pierrick Dartois
, Jonathan Komada Eriksen, Péter Kutas, Benjamin Wesolowski:
Finding orientations of supersingular elliptic curves and quaternion orders. 3447-3493 - Somi Gupta
, Francesco Pavese:
Affine vector space partitions and spreads of quadrics. 3495-3502 - (Withdrawn) Constructions for t-designs and s-resolvable t-designs. 3503-3514
- Woohyuk Chung
, Hwigyeom Kim, Jooyoung Lee
, Yeongmin Lee:
Security analysis of the ISO standard sfOFB-sfDRBG. 3515-3532 - Xu Pan, Hao Chen, Hongwei Liu:
Some self-dual codes and isodual codes constructed by matrix product codes. 3533-3559 - Marco Buratti
, Anamari Nakic:
Additivity of symmetric and subspace 2-designs. 3561-3572 - Dongchun Han, Hanbin Zhang:
Explicit constructions of NMDS self-dual codes. 3573-3585 - Shuichi Katsumata
, Yi-Fu Lai, Jason T. LeGrow
, Ling Qin:
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist. 3587-3643 - Gretchen L. Matthews
, Travis Morrison
, Aidan W. Murphy:
Curve-lifted codes for local recovery using lines. 3645-3664 - Sergey Goryainov, Elena V. Konstantinova:
Non-canonical maximum cliques without a design structure in the block graphs of 2-designs. 3665-3675 - Héctor Masip Ardevol, Jordi Baylina Melé, Marc Guzmán-Albiol, Jose Luis Muñoz-Tapia
:
eSTARK: extending STARKs with arguments. 3677-3721 - Yang Li, Shitao Li, Shixin Zhu:
New and improved formally self-dual codes with small hulls from polynomial four Toeplitz codes. 3723-3751 - Bolin Wang, Wenling Wu:
Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes. 3753-3782 - Lei Li, Xinchun Yu, Chenhao Ying, Liang Chen, Yuanyuan Dong, Yuan Luo:
MDS array codes with efficient repair and small sub-packetization level. 3783-3798 - Shuhui Yu, Lijun Ji:
Two new constructions of cyclic subspace codes via Sidon spaces. 3799-3811 - Yin Lv
, Danping Shi
, Lei Hu, Yi Guo:
Utilizing FWT in linear cryptanalysis of block ciphers with various structures. 3813-3842 - Huawei Huang
, Changgen Peng, Lunzhi Deng:
Cryptanalysis of a key exchange protocol based on a modified tropical structure. 3843-3858
Volume 92, Number 12, December 2024
- Yi Li, Xiutao Feng, Qiang Wang:
Towards a classification of permutation binomials of the form xi+ax over ${\mathbb {F}}_{2^n}$. 3859-3875 - Haiyan Guan
, Shenglin Zhou:
Reduction for block-transitive t-(k2,k,λ ) designs. 3877-3894 - Shi Bai, Hansraj Jangir, Tran Ngo, William Youmans:
An algebraic algorithm for breaking NTRU with multiple keys. 3895-3918 - Jinrui Sha, Shengli Liu, Shuai Han:
Functional commitments for arbitrary circuits of bounded sizes. 3919-3953 - Yue Gao, Weijun Fang, Jingke Xu, Dong Wang, Sihuang Hu:
Optimal (2,δ ) locally repairable codes via punctured simplex codes. 3955-3979 - Ferruh Özbudak, Buket Özkaya
:
New distance bounds for quasi-cyclic codes. 3981-4009 - Deepak Agrawal, Srinivasan Krishnaswamy
, Smarajit Das:
On Boolean functions derived from linear maps over $\mathbb {Z}_4$ and their application to secret sharing. 4011-4033 - Noy Soffer Aranov, Angelot Behajaina:
On the maximum size of ultrametric orthogonal sets over discrete valued fields. 4035-4055 - Robert Christian Subroto
:
An algebraic approach to circulant column parity mixers. 4057-4083 - Melek Çil, Baris Bülent Kirlar:
On the construction of certain odd degree irreducible polynomials over finite fields. 4085-4097 - Feixiang Zhao
, Jian Weng, Wenli Xie, Lin Hou, Ming Li:
Time-based attribute-based proxy re-encryption with decryption key update. 4099-4129 - Simon Masson, Antonio Sanso
, Zhenfei Zhang:
Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field. 4131-4143 - Alexander Barg
, Ohad Elishco, Ryan Gabrys, Geyang Wang, Eitan Yaakobi:
Storage codes and recoverable systems on lines and grids. 4145-4168 - Yiwen Gao, Yuan Li, Haibin Kan:
On the uniqueness of balanced complex orthogonal design. 4169-4187 - Zoltán Füredi, Alexandr V. Kostochka, Mohit Kumbhat:
Minimal abundant packings and choosability with separation. 4189-4194 - Nicola Durante, Giovanni Giuseppe Grimaldi
, Giovanni Longobardi:
Non-linear MRD codes from cones over exterior sets. 4195-4211 - Bingsheng Shen, Tao Yu, Zhengchun Zhou, Yang Yang:
Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions. 4213-4230 - Ajani De Vas Gunasekara
, Alice Devillers:
Transitive path decompositions of Cartesian products of complete graphs. 4231-4245 - Birenjith Sasidharan
, Emanuele Viterbo, Son Hoang Dau:
Binary cyclic-gap constant weight codes with low-complexity encoding and decoding. 4247-4277 - Zhiguo Ding
, Michael E. Zieve
:
Two classes of exceptional m-to-1 rational functions. 4279-4285 - Yingyin Pan, Jianghua Zhong, Dongdai Lin:
Generalized cycle joining method and its application to the construction of long-period Galois NFSRs. 4287-4311 - Ákos K. Matszangosz, Ferenc Szöllosi:
A characterization of complex Hadamard matrices appearing in families of MUB triplets. 4313-4333 - Rong Luo, Mingliang Yan, Sihem Mesnager, Dongchun Han:
On Abelian one-dimensional hull codes in group algebras. 4335-4352 - Yadi Wei, Jiaxin Wang, Fang-Wei Fu:
Association schemes arising from non-weakly regular bent functions. 4353-4422 - Kazuhiko Minematsu, Shingo Sato
, Junji Shikata:
Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing. 4423-4451 - Shuping Mao, Tingting Guo, Peng Wang
, Ruozhou Xu, Yuchao Chen, Lei Hu:
A quantum-secure partial parallel MAC QPCBC. 4453-4486 - Guangkui Xu, Xiwang Cao, Gaojun Luo, Huawei Wu:
Infinite families of 3-designs from special symmetric polynomials. 4487-4509 - Carlos Aguilar Melchor, Nicolas Aragon, Jean-Christophe Deneuville
, Philippe Gaborit, Jérôme Lacan, Gilles Zémor:
Efficient error-correcting codes for the HQC post-quantum cryptosystem. 4511-4530 - Shuyu Luo, Weiqiong Wang, Qi Zhang, Zhenjie Song:
Constructions of plateaued correctors with high correction order and good nonlinearity via Walsh spectral neutralization technique. 4531-4548 - Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia:
Truncated differential cryptanalysis: new insights and application to QARMAv1-n and QARMAv2-64. 4549-4591
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.