


default search action
Designs, Codes and Cryptography, Volume 86
Volume 86, Number 1, January 2018
- Javier de la Cruz, Elisa Gorla

, Hiram H. López
, Alberto Ravagnani:
Weight distribution of rank-metric codes. 1-16 - Yohei Watanabe

, Junji Shikata:
Timed-release computational secret sharing and threshold encryption. 17-54 - Gottfried Herold, Elena Kirshanova

, Alexander May
:
On the asymptotic complexity of solving LWE. 55-83 - Oliver Wilhelm Gnilke

, Marcus Greferath, Mario-Osvin Pavcevic
:
Mosaics of combinatorial designs. 85-95 - Jongkil Kim

, Willy Susilo
, Fuchun Guo
, Man Ho Au
:
Functional encryption for computational hiding in prime order groups via pair encodings. 97-120 - Kenza Guenda, Somphong Jitman

, T. Aaron Gulliver:
Constructions of good entanglement-assisted quantum error correcting codes. 121-136 - Léo Ducas

, Wessel P. J. van Woerden:
The closest vector problem in tensored root lattices of type A and in their duals. 137-150 - Qichun Wang, Chik How Tan, Theo Fanuela Prabowo

:
On the covering radius of the third order Reed-Muller code RM(3, 7). 151-159 - Daniele Bartoli

, Maria Montanucci
, Giovanni Zini
:
Multi point AG codes on the GK maximal curve. 161-177 - Alice M. W. Hui, Bernardo Gabriel Rodrigues:

Switched graphs of some strongly regular graphs related to the symplectic graph. 179-194 - Douglas R. Stinson

, Ruizhong Wei:
Combinatorial repairability for threshold schemes. 195-210 - Chuangqiang Hu, Shudi Yang:

Multi-point codes over Kummer extensions. 211-230 - Alexander L. Gavrilyuk, Ilia Matkin, Tim Penttila:

Derivation of Cameron-Liebler line classes. 231-236
Volume 86, Number 2, February 2018
- Simon R. Blackburn, Marcus Greferath, Camilla Hollanti

, Mario-Osvin Pavcevic
, Joachim Rosenthal
, Leo Storme
, Ángeles Vázquez-Castro, Alfred Wassermann:
Preface to the special issue on network coding and designs. 237-238 - Michael Kiermaier, Sascha Kurz, Alfred Wassermann

:
The order of the automorphism group of a binary q -analog of the Fano plane is at most two. 239-250 - Michael Kiermaier, Reinhard Laue, Alfred Wassermann:

A new series of large sets of subspace designs over the binary field. 251-268 - Dirk Liebhold, Gabriele Nebe

, Ángeles Vázquez-Castro:
Network coding with flags. 269-284 - Paulo José Fernandes Almeida

, Diego Napp
, Raquel Pinto
:
MDS 2D convolutional codes with optimal 1D horizontal projections. 285-302 - Diego Napp Avelli

, Raquel Pinto
, Vladimir Sidorenko
:
Concatenation of convolutional codes and rank metric codes for multi-shot network coding. 303-318 - Anna-Lena Horlemann-Trautmann

, Kyle Marshall, Joachim Rosenthal
:
Extension of Overbeck's attack for Gabidulin-based cryptosystems. 319-340 - Alessandro Neri

, Anna-Lena Horlemann-Trautmann
, Tovohery Randrianarisoa
, Joachim Rosenthal
:
On the genericity of maximum rank distance and Gabidulin codes. 341-363 - Anna-Lena Horlemann-Trautmann

:
Message encoding and retrieval for spread and cyclic orbit codes. 365-386 - Netanel Raviv

, Eitan Yaakobi, Muriel Médard:
Coding for locality in reconstructing permutations. 387-418 - Natalia Silberstein

, Alexander Zeh:
Anticode-based locally repairable codes with high availability. 419-445
Volume 86, Number 3, March 2018
- Editor's note. 447

- Dieter Jungnickel, Vladimir D. Tonchev

:
On Bonisoli's theorem and the block codes of Steiner triple systems. 449-462 - Joaquim Borges

, Cristina Fernández-Córdoba
, Roger Ten-Valls
:
Z2-double cyclic codes. 463-479 - Michèle Feltz

, Cas Cremers:
Strengthening the security of authenticated key exchange against bad randomness. 481-516 - Shuai Han, Shengli Liu, Baodong Qin, Dawu Gu:

Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. 517-554 - Ales Drápal

, Viliam Valent:
Few associative triples, isotopisms and groups. 555-568 - Roland D. Barrolleta

, Mercè Villanueva
:
Partial permutation decoding for binary linear and $$Z_4$$ Z 4 -linear Hadamard codes. 569-586 - Dieter Jungnickel, Yue Zhou

, Vladimir D. Tonchev
:
Extension sets, affine designs, and Hamada's conjecture. 587-610 - Jürgen Bierbrauer, Daniele Bartoli

, Giorgio Faina, Stefano Marcugini, Fernanda Pambianco:
A family of semifields in odd characteristic. 611-621 - Jooyoung Lee, Atul Luykx, Bart Mennink, Kazuhiko Minematsu:

Connecting tweakable and multi-key blockcipher security. 623-640 - Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee:

Improved, black-box, non-malleable encryption from semantic security. 641-663 - Ulrich Dempwolff

:
CCZ equivalence of power functions. 665-692 - Rafael A. Arce-Nazario, Francis N. Castro, Oscar E. González

, Luis A. Medina
, Ivelisse M. Rubio:
New families of balanced symmetric functions and a generalization of Cusick, Li and Stǎnicǎ's conjecture. 693-701 - Cunsheng Ding:

Infinite families of 3-designs from a type of five-weight code. 703-719
Volume 86, Number 4, April 2018
- Li Lin, Wenling Wu:

Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512. 721-741 - Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe:

Analysing and exploiting the Mantin biases in RC4. 743-770 - Fengwei Li, Qin Yue:

The primitive idempotents and weight distributions of irreducible constacyclic codes. 771-784 - José Moreira

, Marcel Fernández, Grigory Kabatiansky:
Constructions of almost secure frameproof codes with applications to fingerprinting schemes. 785-802 - Tao Zhang

, Gennian Ge:
Combinatorial constructions of packings in Grassmannian spaces. 803-815 - Oktay Olmez

:
A link between combinatorial designs and three-weight linear codes. 817-833 - Gerardo Vega

:
A correction on the determination of the weight enumerator polynomial of some irreducible cyclic codes. 835-840 - Baokun Ding, Gennian Ge, Jun Zhang, Tao Zhang

, Yiwei Zhang
:
New constructions of MDS symbol-pair codes. 841-859 - Sven C. Polak

:
New nonbinary code bounds based on divisibility arguments. 861-874 - Irrinki Gnana Sudha, R. S. Selvaraj

:
Codes with a pomset metric and constructions. 875-892 - Xiang-Dong Hou:

Complexities of normal bases constructed from Gauss periods. 893-905 - Charles J. Colbourn, Erin Lanus, Kaushik Sarkar:

Asymptotic and constructive methods for covering perfect hash families and covering arrays. 907-937 - Zhiqiang Lin, Dingyi Pei, Dongdai Lin, Xiaolei Zhang:

Fast construction of binary ring FCSRs for hardware stream ciphers. 939-953
Volume 86, Number 5, May 2018
- Jooyoung Lee

:
Key alternating ciphers based on involutions. 955-988 - Boris Ryabko

:
Properties of two Shannon's ciphers. 989-995 - John Bamberg

, Jesse Lansdown
, Melissa Lee
:
On m-ovoids of regular near polygons. 997-1006 - Dabin Zheng, Jingjun Bao:

Four classes of linear codes from cyclotomic cosets. 1007-1022 - Weihua Liu, Andrew Klapper, Zhixiong Chen:

Solving the FCSR synthesis problem for multi-sequences by lattice basis reduction. 1023-1038 - John Vincent S. Morales, Hajime Tanaka

:
An Assmus-Mattson theorem for codes over commutative association schemes. 1039-1062 - Liantao Lan, Yanxun Chang

, Lidong Wang:
Constructions of cyclic quaternary constant-weight codes of weight three and distance four. 1063-1083 - Masaaki Harada:

Binary extremal self-dual codes of length 60 and related codes. 1085-1094 - Sergey Bereg

, Avi Levy, Ivan Hal Sudborough:
Constructing permutation arrays from groups. 1095-1111 - László Mérai

:
On the elliptic curve endomorphism generator. 1113-1129 - Sugata Gangopadhyay

, Bimal Mandal, Pantelimon Stanica
:
Gowers U3 norm of some classes of bent Boolean functions. 1131-1148 - Jiejing Wen, Minghui Yang, Fang-Wei Fu, Keqin Feng:

Cyclotomic construction of strong external difference families in finite fields. 1149-1159 - Antonio Cossidente, Francesco Pavese

:
On intriguing sets of finite symplectic spaces. 1161-1174
Volume 86, Number 6, June 2018
- Giorgio Donati, Nicola Durante

:
A generalization of the normal rational curve in PG(d, qn) and its associated non-linear MRD codes. 1175-1184 - Tran van Trung:

A recursive construction for simple t-designs using resolutions. 1185-1200 - Minjia Shi, Zahra Sepasdar

, Adel Alahmadi, Patrick Solé:
On two-weight Z2k -codes. 1201-1209 - Goutam Paul

, Souvik Ray
:
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers. 1211-1247 - Nuh Aydin

, Yasemin Cengellenmis, Abdullah Dertli:
On some constacyclic codes over $$\mathbb {Z}_{4}\left[ u\right] /\left\langle u^{2}-1\right\rangle $$ , their $Z4 images, and new codes. 1249-1255 - Adel Alahmadi, Funda Özdemir

, Patrick Solé:
On self-dual double circulant codes. 1257-1265 - Bocong Chen, Hongwei Liu:

Constructions of cyclic constant dimension codes. 1267-1279 - Chong-Dao Lee

, Yaotsu Chang, Chia-an Liu:
A construction of group divisible designs with block sizes 3 to 7. 1281-1293 - Wenquan Bi, Zheng Li, Xiaoyang Dong

, Lu Li, Xiaoyun Wang:
Conditional cube attack on round-reduced River Keyak. 1295-1310 - Ferdinand Ihringer

, Karen Meagher
:
Miklós-Manickam-Singhi conjectures on partial geometries. 1311-1327 - Wei Su, Yang Yang

, Cuiling Fan:
New optimal binary sequences with period 4p via interleaving Ding-Helleseth-Lam sequences. 1329-1338 - Jie Zhang, Jie Chen, Junqing Gong, Aijun Ge

, Chuangui Ma:
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings. 1339-1366 - James A. Davis

, Oktay Ölmez:
A framework for constructing partial geometric difference sets. 1367-1375
Volume 86, Number 7, July 2018
- Joaquim Borges

, Cristina Fernández-Córdoba
:
A characterization of ℤ2ℤ2[u]-linear codes. 1377-1389 - Philippe Gaborit, Ayoub Otmani

, Hervé Talé Kalachi:
Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes. 1391-1403 - David Clayton:

A note on almost difference sets in nonabelian groups. 1405-1410 - Shuai Han, Shengli Liu, Lin Lyu

:
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system. 1411-1449 - Hai Q. Dinh, Abhay Kumar Singh

, Sukhamoy Pattanayak, Songsak Sriboonchitta:
Cyclic DNA codes over the ring 𝔽2+u𝔽2+v𝔽2+uv𝔽2+v2𝔽2+uv2𝔽2. 1451-1467 - Kai-Uwe Schmidt:

Hermitian rank distance codes. 1469-1481 - Zibi Xiao

, Xiangyong Zeng, Chunlei Li, Tor Helleseth:
New generalized cyclotomic binary sequences of period p2. 1483-1497 - Jingyuan Chen

, Lijun Ji, Yun Li:
Combinatorial constructions of optimal (m, n, 4, 2) optical orthogonal signature pattern codes. 1499-1525 - SenPeng Wang, Bin Hu, Yan Liu:

The autocorrelation properties of single cycle polynomial T-functions. 1527-1540 - Qian Wang

, Chenhui Jin:
Upper bound of the length of truncated impossible differentials for AES. 1541-1552 - Shuai Li

, Li Miao:
A method to calculate differential uniformity for permutations. 1553-1563 - Jianfa Qian, Lina Zhang:

On MDS linear complementary dual codes and entanglement-assisted quantum codes. 1565-1572 - Hadi Kharaghani

, Sho Suda:
Unbiased orthogonal designs. 1573-1588
Volume 86, Number 8, August 2018
- Daniele Bartoli

, Luciane Quoos
:
Permutation polynomials of the type g(xs) over 𝔽q2n. 1589-1599 - Maosheng Xiong, Haode Yan

, Pingzhi Yuan:
On a conjecture of differentially 8-uniform power functions. 1601-1621 - Keita Emura

, Goichiro Hanaoka, Koji Nuida
, Go Ohtake, Takahiro Matsuda, Shota Yamada
:
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems. 1623-1683 - Konstantinos Limniotis

, Nicholas Kolokotronis
:
Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction. 1685-1706 - Neranga Fernando

:
Self-reciprocal polynomials and coterm polynomials. 1707-1726 - Chong Shangguan

, Jingxue Ma, Gennian Ge:
New upper bounds for parent-identifying codes and traceability codes. 1727-1737 - Mingchao Li, Miao Liang

, Beiliang Du, Jingyuan Chen:
A construction for optimal c-splitting authentication and secrecy codes. 1739-1755 - Hongxue Liang, Shenglin Zhou:

Flag-transitive point-primitive automorphism groups of non-symmetric 2-(v, k, 3) designs. 1757-1766 - Iván Blanco-Chacón, Eimear Byrne

, Iwan M. Duursma, John Sheekey
:
Rank metric codes and zeta functions. 1767-1792 - Maki Yoshida

, Satoshi Obana:
On the (in)efficiency of non-interactive secure multiparty computation. 1793-1805 - Daniel Augot

, Pierre Loidreau, Gwezheneg Robert:
Generalized Gabidulin codes over fields of any characteristic. 1807-1848 - José Ignacio Farrán, Pedro A. García-Sánchez

, Benjamín A. Heredia, Micah J. Leamer:
The second Feng-Rao number for codes coming from telescopic semigroups. 1849-1864 - Sihem Mesnager, Ferruh Özbudak

, Ahmet Sinak
:
On the p-ary (cubic) bent and plateaued (vectorial) functions. 1865-1892
Volume 86, Number 9, September 2018
- Khodakhast Bibak

, Bruce M. Kapron
, Venkatesh Srinivasan:
Unweighted linear congruences with distinct coordinates and the Varshamov-Tenengolts codes. 1893-1904 - Josep Rifà

, Emilio Suárez-Canedo:
Hadamard full propelinear codes of type Q; rank and kernel. 1905-1921 - Ling Sun, Huaifeng Chen, Meiqin Wang:

Zero-correlation attacks: statistical models independent of the number of approximations. 1923-1945 - Yoshitaka Koga, Tatsuya Maruta, Keisuke Shiromoto

:
On critical exponents of Dowling matroids. 1947-1962 - Zhilin Zhang, Shenglin Zhou:

Flag-transitive point-quasiprimitive 2-(v, k, 2) designs. 1963-1971 - Kai-Uwe Schmidt, Yue Zhou

:
On the number of inequivalent Gabidulin codes. 1973-1982 - Ayoub Otmani

, Hervé Talé Kalachi, Sélestin Ndjeya:
Improved cryptanalysis of rank metric schemes based on Gabidulin codes. 1983-1996 - Jun Xu, Santanu Sarkar

, Lei Hu, Zhangjie Huang, Liqiang Peng:
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator. 1997-2033 - Alberto Ravagnani

:
Duality of codes supported on regular lattices, with an application to enumerative combinatorics. 2035-2063 - Javier de la Cruz, Wolfgang Willems:

On group codes with complementary duals. 2065-2073 - Trygve Johnsen, Hugues Verdure

:
Flags of almost affine codes and the two-party wire-tap channel of type II. 2075-2090 - Yun Fan, Bangteng Xu

:
Fourier transforms and bent functions on finite groups. 2091-2113 - Steven T. Dougherty, Joe Gildea

, Rhian Taylor, Alexander Tylyshchak
:
Group rings, G-codes and constructions of self-dual and formally self-dual codes. 2115-2138
Volume 86, Number 10, October 2018
- Shixin Zhu, Zhonghua Sun, Ping Li:

A class of negacyclic BCH codes and its application to quantum codes. 2139-2165 - Seunghwan Chang, Jong Yoon Hyun:

Linear codes from simplicial complexes. 2167-2181 - Jezerca Hodaj

, Melissa S. Keranen
, Donald L. Kreher
, Leah Tollefson:
Some new Kirkman signal sets. 2183-2195 - Dario Catalano, Dario Fiore, Luca Nizzardo

:
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions. 2197-2246 - Ramakrishna Bandi

, Alexandre Fotue Tabue, Edgar Martínez-Moro
:
On counting subring-submodules of free modules over finite commutative frobenius rings. 2247-2254 - Lijun Ji:

Group divisible designs with large block sizes. 2255-2260 - Chengju Li:

Hermitian LCD codes from cyclic codes. 2261-2278 - Jean-Charles Faugère, Alexandre Wallet

:
The point decomposition problem over hyperelliptic curves - Toward efficient computation of discrete logarithms in even characteristic. 2279-2314 - Daniele Bartoli

, Maria Montanucci
, Giovanni Zini
:
AG codes and AG quantum codes from the GGS curve. 2315-2344 - Khadijeh Bagheri

, Mohammad-Reza Sadeghi
, Daniel Panario
:
A non-commutative cryptosystem based on quaternion algebras. 2345-2377 - Kangquan Li, Longjiang Qu

, Qiang Wang
:
New constructions of permutation polynomials of the form xr h(x q - 1) over 𝔽q2. 2379-2405 - Kwangsu Lee

, Seunghwan Park:
Revocable hierarchical identity-based encryption with shorter private keys and update keys. 2407-2440 - Cuiling Fan:

The linear complexity of a class of binary sequences with optimal autocorrelation. 2441-2450
Volume 86, Number 11, November 2018
- Song Tian, Bao Li, Kunpeng Wang, Wei Yu:

Cover attacks for elliptic curves with cofactor two. 2451-2468 - Yunwen Liu

, Vincent Rijmen
, Gregor Leander
:
Nonlinear diffusion layers. 2469-2484 - Minjia Shi

, Liqin Qian, Patrick Solé:
On self-dual negacirculant codes of index two and four. 2485-2494 - Yunhua Wen, Shengli Liu, Shuai Han:

Reusable fuzzy extractor from the decisional Diffie-Hellman assumption. 2495-2512 - Zhengchun Zhou:

Three-weight ternary linear codes from a family of cyclic difference sets. 2513-2523 - David Derler

, Daniel Slamanig
:
Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs. 2525-2547 - Jia Liu

, Tibor Jager, Saqib A. Kakvi
, Bogdan Warinschi:
How to build time-lock encryption. 2549-2586 - Chunpeng Ge, Willy Susilo

, Liming Fang, Jiandong Wang, Yunqing Shi:
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. 2587-2603 - Claude Carlet

, Sihem Mesnager, Chunming Tang
, Yanfeng Qi:
Euclidean and Hermitian LCD MDS codes. 2605-2618 - Ivan Yu. Mogilnykh

, Faina I. Solov'eva:
On explicit minimum weight bases for extended cyclic codes related to Gold functions. 2619-2627 - Jose Torres-Jimenez

, Idelfonso Izquierdo-Marquez
:
Covering arrays of strength three from extended permutation vectors. 2629-2643 - Hui Zhang

, Eitan Yaakobi, Natalia Silberstein
:
Multiset combinatorial batch codes. 2645-2660 - Jared Antrobus, Heide Gluesing-Luerssen

:
Lexicodes over finite principal ideal rings. 2661-2676
Volume 86, Number 12, December 2018
- Ming Ming Tan:

Group invariant weighing matrices. 2677-2702 - Benoît Cogliati, Yannick Seurin

:
Analysis of the single-permutation encrypted Davies-Meyer construction. 2703-2723 - Simone Costa, Tao Feng

, Xiaomiao Wang
:
Frame difference families and resolvable balanced incomplete block designs. 2725-2745 - Benoît Cogliati

:
Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model. 2747-2763 - Xiaoqin Zhan

, Shenglin Zhou:
Non-symmetric 2-designs admitting a two-dimensional projective linear group. 2765-2773 - Xiao-Xin Zhao, Tian Tian, Wen-Feng Qi:

A ring-like cascade connection and a class of NFSRs with the same cycle structures. 2775-2790 - Wittawat Kositwattanarerk:

Pseudocodeword-free criterion for codes with cycle-free Tanner graph. 2791-2805 - Neriman Gamze Orhon, Hüseyin Hisil

:
Speeding up Huff form of elliptic curves. 2807-2823 - Fernando L. Piñero

, Prasant Singh
:
A note on the weight spectrum of the Schubert code Cα(2, m). 2825-2836 - Jin Li, Aixian Zhang, Keqin Feng:

Linear codes over Fq[x]/(x2) and GR(p2, m) reaching the Griesmer bound. 2837-2855 - Xiaojuan Lu, Xiaolei Niu, Haitao Cao

:
Some results on generalized strong external difference families. 2857-2868 - Xiaofang Xu

, Chunlei Li, Xiangyong Zeng
, Tor Helleseth:
Constructions of complete permutation polynomials. 2869-2892 - José Ignacio Farrán, Pedro A. García-Sánchez

, Benjamín A. Heredia:
On the second Feng-Rao distance of Algebraic Geometry codes related to Arf semigroups. 2893-2916

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














