


default search action
Designs, Codes and Cryptography, Volume 89
Volume 89, Number 1, January 2021
- Sihem Mesnager, Sihong Su

, Hui Zhang:
A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity. 1-17 - Lilya Budaghyan, Marco Calderini

, Claude Carlet, Robert S. Coulter, Irene Villa
:
Generalized isotopic shift construction for APN functions. 19-32 - Marco Calderini

:
Differentially low uniform permutations from known 4-uniform functions. 33-52 - Paulo José Fernandes Almeida, Diego Napp Avelli

:
A new rank metric for convolutional codes. 53-73 - Wilfried Meidl, Isabel Pirsic

:
Bent and ${{\mathbb {Z}}}_{2^k}$-Bent functions from spread-like partitions. 75-89 - Xin Wang

:
Improved upper bounds for parent-identifying set systems and separable codes. 91-104 - Matthias Grezet

, Camilla Hollanti
:
The complete hierarchical locality of the punctured Simplex code. 105-125 - Pranab Chakraborty, Subhamoy Maitra:

Further clarification on Mantin's Digraph Repetition Bias in RC4. 127-141 - Michael Bamiloshin, Aner Ben-Efraim, Oriol Farràs

, Carles Padró:
Common information, matroid representation, and secret sharing for matroid ports. 143-166 - Alexey Oblaukhov

:
On metric regularity of Reed-Muller codes. 167-197
Volume 89, Number 2, February 2021
- Edoardo Ballico, Giuseppe Favacchio

, Elena Guardo
, Lorenzo Milazzo:
Steiner systems and configurations of points. 199-219 - Sartaj Ul Hasan

, Mohit Pal
, Constanza Riera
, Pantelimon Stanica
:
On the c-differential uniformity of certain maps over finite fields. 221-239 - Xiaopeng Zhao, Zhenfu Cao

, Xiaolei Dong, Jun Shao:
Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity. 241-253 - Jingkun Zhou, Zhiwen He

, Zhao Chai:
Two kinds of constructions of directed strongly regular graphs. 255-268 - Delio Jaramillo

, Maria Vaz Pinto
, Rafael H. Villarreal
:
Evaluation codes and their basic parameters. 269-300 - Cícero Carvalho

, Victor G. L. Neumann
:
Towards the Complete Determination of Next-to-Minimal Weights of Projective Reed-Muller Codes. 301-315 - Chen-Dong Ye, Tian Tian

, Fan-Yang Zeng:
The MILP-aided conditional differential attack and its application to Trivium. 317-339 - Eiichi Bannai, Manabu Oura, Da Zhao

:
The complex conjugate invariants of Clifford groups. 341-350 - Julian Renner, Alessandro Neri

, Sven Puchinger:
Low-rank parity-check codes over Galois rings. 351-386 - Trygve Johnsen, Hugues Verdure

:
Greedy weights for matroids. 387-405
Volume 89, Number 3, March 2021
- Chun Guo

, Guoyan Zhang:
Beyond-birthday security for permutation-based Feistel networks. 407-440 - Claude Carlet, Kwang Ho Kim, Sihem Mesnager

:
A direct proof of APN-ness of the Kasami functions. 441-446 - Heide Gluesing-Luerssen

, Hunter Lehmann
:
Distance Distributions of Cyclic Orbit Codes. 447-470 - Daniele Bartoli

, Matteo Bonini
, Marco Timpanella
:
On the weight distribution of some minimal codes. 471-487 - Stefano Innamorati, Fulvio Zuanni

:
Classifying sets of class [1, q+1, 2q+1, q2+q+1]2 in PG(r, q), $r\ge 3$. 489-496 - Hiram H. López

, Beth Malmskog, Gretchen L. Matthews
, Fernando Piñero-González
, Mary Wootters:
Hermitian-lifted codes. 497-515 - James A. Davis

, J. J. Hoo, Connor Kissane, Ziming Liu, Calvin Reedy, Kartikey Sharma, Ken Smith, Yiwei Sun:
Abelian difference sets with the symmetric difference property. 517-523 - Nicholas J. Cavenagh, Adam Mammoliti

, Ian M. Wanless
:
Maximal sets of mutually orthogonal frequency squares. 525-558 - Sascha Kurz

, Eitan Yaakobi:
PIR Codes with Short Block Length. 559-587 - Tran van Trung:

An extending theorem for s-resolvable t-designs. 589-597
Volume 89, Number 4, April 2021
- José Andrés Armario

, Iván Bailera, Ronan Egan
:
Generalized Hadamard full propelinear codes. 599-615 - Makoto Araya, Masaaki Harada, Ken Saito:

Characterization and classification of optimal LCD codes. 617-640 - Tania Sidana

, Anuradha Sharma
:
Roulette games and depths of words over finite commutative rings. 641-678 - Zhongxiao Wang, Qunxiong Zheng

, Xiao-Xin Zhao, Xiutao Feng:
Grain-like structures with minimal and maximal period sequences. 679-693 - Yuhua Sun, Tongjiang Yan, Qiuyan Wang:

The 2-adic complexity of Yu-Gong sequences with interleaved structure and optimal autocorrelation magnitude. 695-707 - Sebati Ghosh

, Palash Sarkar
:
Variants of Wegman-Carter message authentication code supporting variable tag lengths. 709-736 - Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:

Cryptographically strong permutations from the butterfly structure. 737-761
Volume 89, Number 5, May 2021
- Tsuyoshi Miezaki

:
Design-theoretic analogies between codes, lattices, and vertex operator algebras. 763-780 - Zhaoping Meng

, Bin Zhang, Zhanggui Wu:
Constructions of doubly resolvable Steiner quadruple systems. 781-795 - Hualu Liu, Peng Hu, Xiusheng Liu:

Asymmetric entanglement-assisted quantum codes: bound and constructions. 797-809 - Simeon Ball

:
Some constructions of quantum MDS codes. 811-821 - Lin Sok:

New families of self-dual codes. 823-841 - Tsuyoshi Miezaki

, Akihiro Munemasa, Hiroyuki Nakasora
:
A note on Assmus-Mattson type theorems. 843-858 - Bart Mennink, Samuel Neves

:
On the Resilience of Even-Mansour to Invariant Permutations. 859-893 - Dingding Jia

, Benoît Libert:
SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions. 895-923 - Veronika Kuchta

, Amin Sakzad, Ron Steinfeld, Joseph K. Liu:
Lattice-based zero-knowledge arguments for additive and multiplicative relations. 925-963 - Angela Aguglia, Luca Giuzzi

, Angelo Sonnino:
Near-MDS codes from elliptic curves. 965-972 - Wonhee Cho

, Jiseung Kim
, Changmin Lee
:
(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps. 973-1016 - Nan Cui, Shengli Liu

, Dawu Gu, Jian Weng
:
Robustly reusable fuzzy extractor with imperfect randomness. 1017-1059 - Masoumeh Shafieinejad

, Navid Nasr Esfahani:
A scalable post-quantum hash-based group signature. 1061-1090 - Ankur

, Pramod Kumar Kewat
:
Self-dual codes over ${\mathbb {F}}_2[u]/\langle u^4 \rangle $ and Jacobi forms over a totally real subfield of ${\mathbb {Q}}(\zeta _8)$. 1091-1109
Volume 89, Number 6, June 2021
- Hanwen Feng, Jianwei Liu, Dawei Li, Ya-Nan Li, Qianhong Wu:

Traceable ring signatures: general framework and post-quantum security. 1111-1145 - Huili Dong

:
Flag-transitive 4-designs and PSL(2, q) groups. 1147-1157 - Jun Guo

:
Cameron-Liebler sets in bilinear forms graphs. 1159-1180 - Haode Yan, Chengju Li:

Differential spectra of a class of power permutations with characteristic 5. 1181-1191 - Zhengbang Zha

, Lei Hu:
Some classes of power functions with low c-differential uniformity over finite fields. 1193-1210 - Daniel R. Hawtin

:
s-Elusive codes in Hamming graphs. 1211-1220 - Daniele Bartoli, Maria Montanucci

, Giovanni Zini
:
On certain self-orthogonal AG codes with applications to Quantum error-correcting codes. 1221-1239 - Himadri Shekhar Chakraborty

, Tsuyoshi Miezaki:
Average of complete joint weight enumerators and self-dual codes. 1241-1254 - Jianfu Chen, Shenglin Zhou

:
Flag-transitive, point-imprimitive 2-(v, k, λ ) symmetric designs with k and λ prime powers. 1255-1260 - Giovanni Falcone

, Marco Pavone
:
Binary Hamming codes and Boolean designs. 1261-1277 - Julian Renner

, Sven Puchinger, Antonia Wachter-Zeh:
LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding. 1279-1319 - Jonathan S. Turner, Ilias S. Kotsireas, Dursun A. Bulutoglu, Andrew J. Geyer:

A Legendre pair of length 77 using complementary binary matrices with fixed marginals. 1321-1333 - Olive Chakraborty

, Jean-Charles Faugère, Ludovic Perret:
Cryptanalysis of the extension field cancellation cryptosystem. 1335-1364 - Alexandr A. Polujan

, Alexander Pott:
Correction to: Cubic bent functions outside the completed Maiorana-McFarland class. 1365-1366
Volume 89, Number 7, July 2021
- Hiram H. López

, Ivan Soprunov
, Rafael H. Villarreal
:
The dual of an evaluation code. 1367-1403 - Tairong Shi

, Wenling Wu, Bin Hu, Jie Guan, Sengpeng Wang:
Breaking LWC candidates: sESTATE and Elephant in quantum setting. 1405-1432 - Mahdi Sajadieh

, Mohsen Mousavi
:
Construction of MDS matrices from generalized Feistel structures. 1433-1452 - Yumeng Yang, Xiangyong Zeng

, Shi Wang:
Construction of lightweight involutory MDS matrices. 1453-1483 - Fengrong Zhang

, Enes Pasalic, René Rodríguez
, Yongzhuang Wei:
Wide minimal binary linear codes from the general Maiorana-McFarland class. 1485-1507 - Kanat S. Abdukhalikov

:
Equivalence classes of Niho bent functions. 1509-1534 - Keita Emura, Atsushi Takayasu

, Yohei Watanabe:
Adaptively secure revocable hierarchical IBE from k-linear assumption. 1535-1574 - Yanwei Zhou

, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Novel generic construction of leakage-resilient PKE scheme with CCA security. 1575-1614 - Steven T. Dougherty, Joe Gildea

, Adrian Korban
, Abidin Kaya:
Composite matrices from group rings, composite G-codes and constructions of self-dual codes. 1615-1638 - Ruikai Chen

, Sihem Mesnager, Chang-An Zhao
:
Good polynomials for optimal LRC of low locality. 1639-1660 - Tuvi Etzion

, Junling Zhou:
Large sets with multiplicity. 1661-1690 - Huaning Liu

, Xi Liu:
On the properties of generalized cyclotomic binary sequences of period 2pm. 1691-1712 - Cunsheng Ding, Chunming Tang

, Vladimir D. Tonchev:
The projective general linear group ${\mathrm {PGL}}(2, 2^m)$ and linear codes of length 2m+1. 1713-1734 - Oriol Farràs

, Jordi Ribes-González
, Sara Ricci
:
Privacy-preserving data splitting: a combinatorial approach. 1735-1756
Volume 89, Number 8, August 2021
- Junqing Gong, Haifeng Qian:

Simple and efficient FE for quadratic functions. 1757-1786 - Varsha Chauhan

, Anuradha Sharma
, Sandeep Sharma
, Monika Yadav
:
Hamming weight distributions of multi-twisted codes over finite fields. 1787-1837 - Shoko Chisaki

, Ryoh Fuji-Hara, Nobuko Miyamoto:
A construction for circulant type dropout designs. 1839-1852 - Giovanni Zini, Ferdinando Zullo

:
Scattered subspaces and related codes. 1853-1873 - Ling Song

, Yi Tu, Danping Shi
, Lei Hu:
Security analysis of Subterranean 2.0. 1875-1905 - Sebati Ghosh

, Palash Sarkar:
Breaking tweakable enciphering schemes using Simon's algorithm. 1907-1926 - Atsushi Takayasu

:
Tag-based ABE in prime-order groups via pair encoding. 1927-1963 - Atsushi Takayasu

:
Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity. 1965-1992 - Ziling Heng

, Dexiang Li, Jiao Du, Fuling Chen:
A family of projective two-weight linear codes. 1993-2007 - Xiaoqiang Wang, Dabin Zheng

, Yan Zhang:
Binary linear codes with few weights from Boolean functions. 2009-2030 - Ruikai Chen

, Sihem Mesnager, Chang-An Zhao
:
Correction to: Good polynomials for optimal LRC of low locality. 2031
Volume 89, Number 9, September 2021
- Hadi Kharaghani, Thomas Pender, Sho Suda

:
Balancedly splittable orthogonal designs and equiangular tight frames. 2033-2050 - Hongwei Liu, Shengwei Liu:

Construction of MDS twisted Reed-Solomon codes and LCD MDS codes. 2051-2065 - Péter Ligeti, Péter Sziklai

, Marcella Takáts
:
Generalized threshold secret sharing and finite geometry. 2067-2078 - Fatemeh Ghasemi, Reza Kaboli, Shahram Khazaei

, Maghsoud Parviz, Mohammad-Mahdi Rafiei:
On ideal homomorphic secret sharing schemes and their decomposition. 2079-2096 - Nicolas Aragon, Marco Baldi, Jean-Christophe Deneuville

, Karan Khathuria
, Edoardo Persichetti
, Paolo Santini
:
Cryptanalysis of a code-based full-time signature. 2097-2112 - Sadegh Sadeghi, Vincent Rijmen

, Nasour Bagheri
:
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK. 2113-2155 - Edoardo Ballico

:
Locally Recoverable Codes correcting many erasures over small fields. 2157-2162 - Trygve Johnsen

, Hugues Verdure:
Möbius and coboundary polynomials for matroids. 2163-2177 - Xiaojing Chen

, Shixin Zhu, Wan Jiang, Gaojun Luo:
A new family of EAQMDS codes constructed from constacyclic codes. 2179-2193 - Daitao Huang, Qin Yue

, Yongfeng Niu, Xia Li:
MDS or NMDS self-dual codes from twisted generalized Reed-Solomon codes. 2195-2209
Volume 89, Number 10, October 2021
- Alexander A. Davydov

, Stefano Marcugini
, Fernanda Pambianco
:
Twisted cubic and point-line incidence matrix in $\mathrm {PG}(3, q)$. 2211-2233 - Gianira N. Alfarano

, Julia Lieb
, Joachim Rosenthal:
Construction of LDPC convolutional codes via difference triangle sets. 2235-2254 - Ritam Bhaumik

, Mridul Nandi
, Anik Raychaudhuri:
Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff. 2255-2281 - Kanat S. Abdukhalikov

, Duy Ho
:
Extended cyclic codes, maximal arcs and ovoids. 2283-2294 - Masaaki Harada:

Construction of binary LCD codes, ternary LCD codes and quaternary Hermitian LCD codes. 2295-2312 - Ayça Çesmelioglu, Wilfried Meidl, Isabel Pirsic

:
Vectorial bent functions and partial difference sets. 2313-2330 - Clementa Alonso-González

, Miguel Ángel Navarro-Pérez
:
Cyclic orbit flag codes. 2331-2356 - Yu-Chi Chen

, Xin Xie, Hung-Yu Tsao, Raylin Tso:
Public key encryption with filtered equality test revisited. 2357-2372 - Charles J. Colbourn

:
Egalitarian Steiner triple systems for data popularity. 2373-2395 - Keita Emura, Atsushi Takayasu, Yohei Watanabe

:
Efficient identity-based encryption with Hierarchical key-insulation from HIBE. 2397-2431
Volume 89, Number 11, November 2021
- Michail I. Rozhkov

, Alexander V. Sorokin:
Some conditions for absence of affine functions in NFSR output stream. 2433-2443 - Stefka Bouyuklieva

:
Optimal binary LCD codes. 2445-2461 - Amar Bapic

, Enes Pasalic:
A new method for secondary constructions of vectorial bent functions. 2463-2475 - Qian Wang

, Chenhui Jin:
Bounding the length of impossible differentials for SPN block ciphers. 2477-2493 - Peng Hu, Xiusheng Liu:

Linear complementary pairs of codes over rings. 2495-2509 - Xiang Wang, Yuanjie Wang, Wenjuan Yin, Fang-Wei Fu:

Nonexistence of perfect permutation codes under the Kendall τ-metric. 2511-2531 - Xiaojing Chen, Shixin Zhu, Wan Jiang:

Cyclic codes and some new entanglement-assisted quantum MDS codes. 2533-2551 - Matthew Fickus

, Joseph W. Iverson
, John Jasper
, Emily J. King
:
Grassmannian codes from paired difference sets. 2553-2576 - Junichi Tomida

, Yuto Kawahara, Ryo Nishimaki:
Fast, compact, and expressive attribute-based encryption. 2577-2626 - Sartaj Ul Hasan

, Mohit Pal
, Pantelimon Stanica:
Boomerang uniformity of a class of power maps. 2627-2636 - Yanan Wu, Nian Li

, Xiangyong Zeng:
New PcN and APcN functions over finite fields. 2637-2651
Volume 89, Number 12, December 2021
- Laura Monroe

:
Binary signed-digit integers and the Stern diatomic sequence. 2653-2662 - Jinjin Chai, Zilong Wang

, Erzhong Xue:
Walsh spectrum and nega spectrum of complementary arrays. 2663-2677 - Binbin Pang, Shixin Zhu, Xiaoshan Kai:

Five families of the narrow-sense primitive BCH codes over finite fields. 2679-2696 - WeiGuo Zhang

, Yujuan Sun, Enes Pasalic:
Three classes of balanced vectorial semi-bent functions. 2697-2714 - M. H. Ahmadi, N. Akhlaghinia, Gholamreza B. Khosrovshahi

, S. Sadri:
New partitionings of complete designs. 2715-2723 - Simona Bonvicini, Marco Buratti

, Martino Garonzi
, Gloria Rinaldi, Tommaso Traetta
:
The first families of highly symmetric Kirkman Triple Systems whose orders fill a congruence class. 2725-2757 - Sascha Kurz

:
Bounds for flag codes. 2759-2785 - Chen-Dong Ye, Tian Tian

:
An improved degree evaluation method of NFSR-based cryptosystems. 2787-2806 - Yiming Li, Shengli Liu

, Shuai Han, Dawu Gu:
Pseudorandom functions in NC class from the standard LWE assumption. 2807-2839 - Hariom Sharma, R. K. Sharma:

Existence of primitive normal pairs with one prescribed trace over finite fields. 2841-2855 - Navid Nasr Esfahani, Douglas R. Stinson

:
On security properties of all-or-nothing transforms. 2857-2867 - Ziran Tu, Xiangyong Zeng

, Yupeng Jiang, Yan Li:
Binomial permutations over finite fields with even characteristic. 2869-2888

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














