


default search action
Designs, Codes and Cryptography, Volume 88
Volume 88, Number 1, January 2020
- José Gómez-Torrecillas

, Erik Hieta-aho
, Francisco Javier Lobillo
, Sergio R. López-Permouth
, Gabriel Navarro
:
Some remarks on non projective Frobenius algebras and linear codes. 1-15 - Simeon Ball

, Michel Lavrauw
:
Arcs and tensors. 17-31 - Susan G. Barwick

, Alice M. W. Hui, Wen-Ai Jackson, Jeroen Schillewaert:
Characterising hyperbolic hyperplanes of a non-singular quadric in PG(4, q). 33-39 - Jasvinder Singh, Manish Gupta

, Jaskarn Singh Bhullar:
Construction of girth-8 (3, L)-QC-LDPC codes of smallest CPM size using column multipliers. 41-49 - Sihem Mesnager

, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee:
A proof of the Beierle-Kranz-Leander conjecture related to lightweight multiplication in $\mathbb {F}_{2^n}$. 51-62 - Sergey Bereg

, Peter J. Dukes
:
A lower bound on permutation codes of distance n-1. 63-72 - Tai Do Duc

:
Necessary conditions for the existence of group-invariant Butson Hadamard matrices and a new family of perfect arrays. 73-90 - Stefan Kölbl, Elmar Tischhauser

, Patrick Derbez
, Andrey Bogdanov
:
Troika: a ternary cryptographic hash function. 91-117 - Rong Pan, Tao Feng

, Lidong Wang, Xiaomiao Wang
:
Optimal optical orthogonal signature pattern codes with weight three and cross-correlation constraint one. 119-131 - Kenza Guenda, T. Aaron Gulliver, Somphong Jitman

, Satanan Thipworawimon:
Linear ℓ-intersection pairs of codes and their applications. 133-152 - Xiao-Xin Zhao, Wen-Feng Qi, Jia-Min Zhang:

Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs. 153-171 - Abhishek Kesarwani

, Dibyendu Roy, Santanu Sarkar
, Willi Meier:
New cube distinguishers on NFSR-based stream ciphers. 173-199 - Aleksandr Kutsenko

:
Metrical properties of self-dual bent functions. 201-222 - Rohit Gupta

:
Several new permutation quadrinomials over finite fields of odd characteristic. 223-239
Volume 88, Number 2, February 2020
- Hongwei Liu, Xu Pan

:
Galois hulls of linear codes over finite fields. 241-255 - Xia Li

, Qin Yue:
Four classes of minimal binary linear codes with wmin/wmax<1/2 derived from Boolean functions. 257-271 - José Martínez-Bernal, Miguel A. Valencia-Bucio, Rafael H. Villarreal

:
Linear codes over signed graphs. 273-296 - Yan Liu, Xiwang Cao, Wei Lu:

On some conjectures about optimal ternary cyclic codes. 297-309 - Sergey Bereg

, Luis Gerardo Mojica, Linda Morales, Ivan Hal Sudborough:
Constructing permutation arrays using partition and extension. 311-339 - Jun Xu, Lei Hu, Santanu Sarkar

:
Cryptanalysis of elliptic curve hidden number problem from PKC 2017. 341-361 - Tim van de Kamp

, Andreas Peter
, Willem Jonker:
A multi-authority approach to various predicate encryption types. 363-390 - Luca Mariot

, Maximilien Gadouleau, Enrico Formenti
, Alberto Leporati:
Mutually orthogonal latin squares based on cellular automata. 391-411 - Xin Ling, Sihem Mesnager, Yanfeng Qi, Chunming Tang

:
A class of narrow-sense BCH codes over $\mathbb {F}_q$ of length $\frac{q^m-1}{2}$. 413-427 - Bart De Bruyn, Mou Gao:

On four codes with automorphism group PΣ L(3, 4) and pseudo-embeddings of the large Witt designs. 429-452 - Jong Yoon Hyun, Jungyun Lee, Yoonjin Lee

:
Ramanujan graphs and expander families constructed from p-ary bent functions. 453-470
Volume 88, Number 3, March 2020
- Ana Salagean

:
Discrete antiderivatives for functions over $\mathop {{\mathbb {F}}}_p^n$. 471-486 - Xiang Wang

, Fang-Wei Fu:
Snake-in-the-box codes under the ℓ ∞ -metric for rank modulation. 487-503 - Dipayan Das

, Jeffrey Hoffstein
, Jill Pipher, William Whyte, Zhenfei Zhang:
Modular lattice signatures, revisited. 505-532 - Yubo Li

, Zhichao Yang, Kangquan Li, Longjiang Qu
:
A new algorithm on the minimal rational fraction representation of feedback with carry shift registers. 533-552 - Can Xiang, Xin Ling, Qi Wang

:
Combinatorial t-designs from quadratic functions. 553-565 - Saban Alaca, Goldwyn Millar

:
Shift-inequivalent decimations of the Sidelnikov-Lempel-Cohn-Eastman sequences. 567-583 - Raphael Yuster

:
Perfect sequence covering arrays. 585-593 - Sascha Kurz

:
Subspaces intersecting in at most a point. 595-599 - Samir Hodzic

, Enes Pasalic, Sugata Gangopadhyay:
Generic constructions of $\mathbb {Z}$-bent functions. 601-623
Volume 88, Number 4, April 2020
- Cunsheng Ding, Chunming Tang

, Vladimir D. Tonchev:
Linear codes of 2-designs associated with subcodes of the ternary generalized Reed-Muller codes. 625-641 - Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville

, Philippe Gaborit, Terry Shue Chien Lau
, Chik How Tan, Keita Xagawa
:
Cryptanalysis of a rank-based signature with short public keys. 643-653 - John Sheekey

, Geertrui Van de Voorde
:
Rank-metric codes, linear sets, and their duality. 655-675 - Liang Feng Zhang

, Reihaneh Safavi-Naini:
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions. 677-709 - Alessandro Neri

, Anna-Lena Horlemann-Trautmann
:
Random construction of partial MDS codes. 711-725 - Xiusheng Liu, Hualu Liu:

σ-LCD codes over finite chain rings. 727-746 - Hans-Joachim Kroll, Rita Vincenti

:
Linear codes from ruled sets in finite projective spaces. 747-754 - Ka Hin Leung, Qi Wang

:
New nonexistence results on (m, n)-generalized bent functions. 755-770 - Sam Adriaensen

, Lins Denaux
, Leo Storme
, Zsuzsa Weiner:
Small weight code words arising from the incidence of points and hyperplanes in PG(n, q). 771-788
Volume 88, Number 5, May 2020
- Heiko Dietrich, Jeroen Schillewaert:

On a duality for codes over non-abelian groups. 789-805 - Zenghui Fang, Junling Zhou

:
The sizes of maximal (v, k, k-2, k-1) optical orthogonal codes. 807-824 - Sanjit Bhowmick, Alexandre Fotue Tabue, Edgar Martínez-Moro

, Ramakrishna Bandi
, Satya Bagchi
:
Do non-free LCD codes over finite commutative Frobenius rings exist? 825-840 - Yue Zhou

:
On equivalence of maximum additive symmetric rank-distance codes. 841-850 - Jing Jiang

, Yujie Gu
, Minquan Cheng:
Multimedia IPP codes with efficient tracing. 851-866 - Andrea Ferraguti

, Giacomo Micheli
:
Full classification of permutation rational functions and complete rational functions of degree three over finite fields. 867-886 - Gaoli Wang

, Fukang Liu, Binbin Cui, Florian Mendel
, Christoph Dobraunig
:
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160. 887-930 - Elena Kirshanova

, Huyen Nguyen, Damien Stehlé, Alexandre Wallet
:
On the smoothing parameter and last minimum of random orthogonal lattices. 931-950 - Bohua Zhu, Junling Zhou, Yanxun Chang

:
2-(v, 5; m) spontaneous emission error designs. 951-970 - Seyed Hassan Alavi

, Mohsen Bayat
, Jalal Choulaki, Ashraf Daneshkhah
:
Flag-transitive block designs with prime replication number and almost simple groups. 971-992
Volume 88, Number 6, June 2020
- Brett Hemenway Falk

, Nadia Heninger, Michael Rudow
:
Properties of constacyclic codes under the Schur product. 993-1021 - Ryann Cartor

, Daniel Smith-Tone:
All in the C* family. 1023-1036 - Minjia Shi

, Li Xu, Denis S. Krotov
:
On the number of resolvable Steiner triple systems of small 3-rank. 1037-1046 - Aurore Guillevic

, Simon Masson
, Emmanuel Thomé
:
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation. 1047-1081 - Hong-Yu Sun, Xuan-Yong Zhu, Qun-Xiong Zheng

:
Predicting truncated multiple recursive generators with unknown parameters. 1083-1102 - Boxin Zhao, Xiaoyang Dong

, Willi Meier, Keting Jia, Gaoli Wang:
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. 1103-1126 - Xiaolei Fang, Khawla Lebed, Hongwei Liu, Jinquan Luo

:
New MDS self-dual codes over finite fields of odd characteristic. 1127-1138 - Wei Lu, Xia Wu, Xiwang Cao, Ming Chen:

Six constructions of asymptotically optimal codebooks via the character sums. 1139-1158 - Lilya Budaghyan, Nikolay S. Kaleyski, Constanza Riera, Pantelimon Stanica

:
Partially APN functions with APN-like polynomial representations. 1159-1177 - Xiaoyang Dong

, Bingyou Dong, Xiaoyun Wang:
Quantum attacks on some feistel block ciphers. 1179-1203 - Xiao-Xin Zhao, Qun-Xiong Zheng, Zhong-Xiao Wang, Wen-Feng Qi:

On a class of isomorphic NFSRs. 1205-1226 - María Chara, Ricardo A. Podestá, Ricardo Toledano

:
Block transitive codes attaining the Tsfasman-Vladut-Zink bound. 1227-1253 - Yanan Wu, Nian Li

, Xiangyong Zeng:
Linear codes with few weights from cyclotomic classes and weakly regular bent functions. 1255-1272 - Mrinmoy Datta:

Relative generalized Hamming weights of affine Cartesian codes. 1273-1284
Volume 88, Number 7, July 2020
- Julien Lavauzelle, Julian Renner:

Cryptanalysis of a system based on twisted Reed-Solomon codes. 1285-1300 - Alexandru Chirvasitu

, Thomas W. Cusick:
Affine equivalence for quadratic rotation symmetric Boolean functions. 1301-1329 - Tovohery Hajatiana Randrianarisoa

:
A geometric approach to rank metric codes and a classification of constant weight codes. 1331-1348 - Minfeng Shao, Ying Miao:

On optimal weak algebraic manipulation detection codes and weighted external difference families. 1349-1369 - Dingding Jia

, Yamin Liu, Bao Li:
IBE with tight security against selective opening and chosen-ciphertext attacks. 1371-1400 - Lorenzo Grassi

, Christian Rechberger:
Revisiting Gilbert's known-key distinguisher. 1401-1445 - Xuanlong Ma

, Min Feng
, Kaishun Wang:
Subgroup perfect codes in Cayley sum graphs. 1447-1461 - Yupeng Jiang

, Dongdai Lin:
Longest subsequences shared by two de Bruijn sequences. 1463-1475
Volume 88, Number 8, August 2020
- Peter Beelen

, Olav Geil
, Edgar Martínez-Moro
, Xin-Wen Wu
:
Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan. 1477-1478 - Mojtaba Fadavi, Reza Rezaeian Farashahi

:
Uniform encodings to elliptic curves and indistinguishable point representation. 1479-1502 - Thomas Britz

, Adam Mammoliti
, Keisuke Shiromoto
:
Wei-type duality theorems for rank metric codes. 1503-1519 - Umberto Martínez-Peñas

:
Hamming and simplex codes for the sum-rank metric. 1521-1539 - Lucky Galvez, Jon-Lark Kim:

Construction of self-dual matrix codes. 1541-1560 - Alain Couvreur, Isabella Panaccione:

Power error locating pairs. 1561-1593 - Alonso Sepúlveda Castellanos

, Maria Bras-Amorós
:
Weierstrass semigroup at m+1 rational points in maximal curves which cannot be covered by the Hermitian curve. 1595-1616 - Maria Bras-Amorós

, Iwan M. Duursma, Euijin Hong:
Isometry-dual flags of AG codes. 1617-1638 - René Bødker Christensen

, Olav Geil
:
Steane-enlargement of quantum codes from the Hermitian function field. 1639-1652 - Ignacio García-Marco

, Irene Márquez-Corbella
, Diego Ruano
:
High dimensional affine codes whose square has a designed minimum distance. 1653-1672 - Hiram H. López

, Gretchen L. Matthews
, Ivan Soprunov
:
Monomial-Cartesian codes and their duals, with applications to LCD codes, quantum codes, and locally recoverable codes. 1673-1685 - Irene Márquez-Corbella

, Edgar Martínez-Moro
, Carlos Munuera:
Computing sharp recovery structures for locally recoverable codes. 1687-1698
Volume 88, Number 9, September 2020
- Anne Canteaut, Gohar M. Kyureghyan, Alexander Pott, Felix Ulmer:

Editorial: Coding and Cryptography 2019. 1699 - Alexandr Polujan

, Alexander Pott:
Cubic bent functions outside the completed Maiorana-McFarland class. 1701-1722 - Daniel Gerike

, Gohar M. Kyureghyan:
Permutations on finite fields with invariant cycle structure on lines. 1723-1740 - Pan Tan, Zhengchun Zhou, Vladimir Sidorenko, Udaya Parampalli:

Two classes of optimal LRCs with information (r, t)-locality. 1741-1757 - Jian Liu, Sihem Mesnager

, Deng Tang:
Constructions of optimal locally recoverable codes via Dickson polynomials. 1759-1780 - Tuvi Etzion, Sascha Kurz, Kamil Otal, Ferruh Özbudak

:
Subspace packings: constructions and bounds. 1781-1810 - Peter G. Boyvalenkov

, Peter D. Dragnev
, Douglas P. Hardin
, Edward B. Saff, Maya Stoyanova
:
Upper bounds for energies of spherical codes of given cardinality and separation. 1811-1826 - Sabyasachi Dey

, Santanu Sarkar
:
Proving the biases of Salsa and ChaCha in differential attack. 1827-1856 - Jean-Christophe Deneuville

, Philippe Gaborit:
Cryptanalysis of a code-based one-time signature. 1857-1866 - Ana Salagean

, Ferruh Özbudak
:
Counting Boolean functions with faster points. 1867-1883 - Elena Egorova

, Marcel Fernandez, Grigory Kabatiansky:
On non-binary traceability set systems. 1885-1892 - Ryutaroh Matsumoto

:
Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets. 1893-1907 - Gretchen L. Matthews

, Fernando Piñero
:
Codes with locality from cyclic extensions of Deligne-Lusztig curves. 1909-1924 - Assia Rousseva

, Ivan N. Landjev:
The geometric approach to the existence of some quaternary Griesmer codes. 1925-1940 - Daniel Coggia, Alain Couvreur:

On the security of a Loidreau rank metric code based encryption scheme. 1941-1957 - Shizhu Tian, Christina Boura

, Léo Perrin:
Boomerang uniformity of popular S-box constructions. 1959-1989 - Delphine Boucher

:
An algorithm for decoding skew Reed-Solomon codes with respect to the skew metric. 1991-2005
Volume 88, Number 10, October 2020
- Samir Hodzic, Enes Pasalic, Yongzhuang Wei

:
A general framework for secondary constructions of bent and plateaued functions. 2007-2035 - Vladimir N. Potapov

:
On q-ary bent and plateaued functions. 2037-2049 - Kai Lin Ong

, Ang Miin Huey:
On equivalency of zero-divisor codes via classifying their idempotent generator. 2051-2065 - Yujie Gu, Shohei Satake

:
On 2-parent-identifying set systems of block size 4. 2067-2076 - Masaya Yasuda

, Satoshi Nakamura, Junpei Yamaguchi:
Analysis of DeepBKZ reduction for finding short lattice vectors. 2077-2100 - Yan Zhu, Naoki Watamura

:
Relative t-designs in Johnson association schemes for P-polynomial structure. 2101-2118 - Mengna Wu, Chengju Li, Zilong Wang:

Characterizations and constructions of triple-cycle permutations of the form xrh(xs). 2119-2132 - Christian Elsholtz

, Péter Pál Pach:
Caps and progression-free sets in ${{\mathbb {Z}}}_m^n$. 2133-2170 - Lijing Zheng, Jie Peng

, Haibin Kan, Yanjun Li
, Juan Luo:
On constructions and properties of (n, m)-functions with maximal number of bent components. 2171-2186 - Simona Boyadzhiyska

, Shagnik Das
, Tibor Szabó:
Enumerating extensions of mutually orthogonal Latin squares. 2187-2206 - Baptiste Lambin

, Patrick Derbez
, Pierre-Alain Fouque
:
Linearly equivalent S-boxes and the division property. 2207-2231 - Sihem Mesnager, Chunming Tang

, Maosheng Xiong:
On the boomerang uniformity of quadratic permutations. 2233-2246 - Boran Kim, Yoonjin Lee

:
Classification of self-dual cyclic codes over the chain ring ℤp[u]/ u3 >. 2247-2273
Volume 88, Number 11, November 2020
- Yanyan Gao, Qin Yue

, Yansheng Wu
:
LCD codes and self-orthogonal codes in generalized dihedral group algebras. 2275-2287 - Yunwen Liu

, Wenying Zhang, Bing Sun, Vincent Rijmen
, Guoqiang Liu, Chao Li, Shaojing Fu, Meichun Cao:
The phantom of differential characteristics. 2289-2311 - Martin Ekerå

:
On post-processing in the quantum algorithm for computing short discrete logarithms. 2313-2335 - Seyed Hassan Alavi

, Ashraf Daneshkhah
, Cheryl E. Praeger
:
Symmetries of biplanes. 2337-2359 - Yeow Meng Chee

, Charles J. Colbourn
, Hoang Dau
, Ryan Gabrys, Alan C. H. Ling, Dylan Lusi, Olgica Milenkovic:
Access balancing in storage systems by labeling partial Steiner systems. 2361-2376 - Juanjuan Xu, Jingjun Bao, Lijun Ji:

Doubly resolvable Steiner quadruple systems of orders 22n+1. 2377-2386 - Khodakhast Bibak

:
Deletion correcting codes meet the Littlewood-Offord problem. 2387-2396 - Cem Güneri, Edgar Martínez-Moro

, Selcen Sayici:
Linear complementary pair of group codes over finite chain rings. 2397-2405 - Xinxin Gong

, Bin Zhang:
Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G. 2407-2431 - Youngkyung Lee, Dong Hoon Lee, Jong Hwan Park:

Tightly CCA-secure encryption scheme in a multi-user setting with corruptions. 2433-2452
Volume 88, Number 12, December 2020
- Xinmei Huang

, Qin Yue, Yansheng Wu
, Xiaoping Shi, Jerod Michel:
Binary primitive LCD BCH codes. 2453-2473 - Jong Yoon Hyun, Hyun Kwang Kim, Yansheng Wu

, Qin Yue
:
Optimal minimal linear codes from posets. 2475-2492 - Minjia Shi

, Wang Xuan, Patrick Solé:
Two families of two-weight codes over $\mathbb {Z}_4$. 2493-2505 - Junling Zhou

, Wenling Zhou:
Wide-sense 2-frameproof codes. 2507-2519 - Petr Lisonek

:
Maximal nonassociativity via fields. 2521-2530 - Sudhir R. Ghorpade

, Trygve Johnsen
:
A polymatroid approach to generalized weights of rank metric codes. 2531-2546 - Minjia Shi

, Li Xu, Patrick Solé:
Construction of isodual codes from polycirculant matrices. 2547-2560 - Juliane Capaverde

, Ariane M. Masuda
, Virginia M. Rodrigues
:
Rédei permutations with cycles of the same length. 2561-2579 - Whan-Hyuk Choi

, Hyun Jin Kim
, Yoonjin Lee
:
Construction of single-deletion-correcting DNA codes using CIS codes. 2581-2596 - Lukas Kölsch

:
On the inverses of Kasami and Bracken-Leander exponents. 2597-2621

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














