


default search action
Designs, Codes and Cryptography, Volume 93
Volume 93, Number 1, January 2025
- Vassili C. Mavron, Harold N. Ward:

Designer of codes: a tribute to Jennifer Key. 1-10 - Xiang Wang, Fang-Wei Fu, Elena V. Konstantinova:

The sequence reconstruction of permutations with Hamming metric. 11-37 - Christof Beierle:

Revisiting products of the form X times a linearized polynomial L(X). 39-50 - Chin Hei Chan

, Fang-Wei Fu, Maosheng Xiong:
Decoding error probability of random parity-check matrix ensemble over the erasure channel. 51-77 - Reza Dastbasteh

, Farzad Padashnick, Pedro M. Crespo, Markus Grassl, Javad Sharafi:
Equivalence of constacyclic codes with shift constants of different orders. 79-93 - Cain Álvarez-García, Carlos Alberto Castillo-Guillén, Mohamed Badaoui

, Andriy Kryvko:
DNA codes over groups. 95-110 - Kathryn Haymaker, Beth Malmskog, Gretchen L. Matthews:

Algebraic hierarchical locally recoverable codes with nested affine subspace recovery. 111-132 - Sahiba Suryawanshi, Shibam Ghosh, Dhiman Saha, Prathamesh Ram:

Simple vs. vectorial: exploiting structural symmetry to beat the ZeroSum distinguisher. 133-174 - Simeon Ball, Michel Lavrauw, Tabriz Popatia:

Griesmer type bounds for additive codes over finite fields, integral and fractional MDS codes. 175-196 - Xiaoqin Hong

, Xiwang Cao, Gaojun Luo:
Generalized bilateral multilevel construction for constant dimension codes. 197-225 - Xianmang He

, Zusheng Zhang, Si Tian, Jingli Wang, Yindong Chen
:
Parallel construction for constant dimension codes from mixed dimension construction. 227-241 - Sabyasachi Dey

, Gregor Leander
, Nitin Kumar Sharma
:
Improved key recovery attacks on reduced-round Salsa20. 243-262 - Tran van Trung:

Retraction Note: Constructions for t-designs and s-resolvable t-designs. 263
Volume 93, Number 2, February 2025
- Ilaria Cardinali, Michel Lavrauw, Klaus Metsch, Alexander Pott:

Finite geometries. 265-266 - Nour Alnajjarine

, Michel Lavrauw:
A classification of planes intersecting the Veronese surface over finite fields of even order. 267-296 - Jake Faulkner

, Geertrui Van de Voorde
:
On the equivalence, stabilisers, and feet of Buekenhout-Tits unitals. 297-307 - Kanat Abdukhalikov

, Duy Ho
:
Linear codes from arcs and quadrics. 309-329 - John Bamberg

, Yuval Filmus, Ferdinand Ihringer, Sascha Kurz
:
Affine vector space partitions. 331-357 - Sascha Kurz

, Ivan N. Landjev, Francesco Pavese, Assia Rousseva:
The geometry of $(t\mod q)$-arcs. 359-372 - Ivan N. Landjev

, Emiliyan Rogachev:
Sperner's theorem for non-free modules over finite chain rings. 373-390 - Bart De Bruyn

:
Families of quadratic sets on the Klein quadric. 391-407 - Sascha Kurz

:
Capacity of an infinite family of networks related to the diamond network for fixed alphabet sizes. 409-421 - Máté Gyarmati

, Péter Ligeti, Péter Sziklai
, Marcella Takáts
:
Conjunctive hierarchical secret sharing by finite geometry. 423-428 - Kevin Allen, John Sheekey

:
On translation hyperovals in semifield planes. 429-442
Volume 93, Number 3, March 2025
- Sihong Su, Xiaoyan Chen:

A new method of constructing (k+s)-variable bent functions based on a family of s-plateaued functions on k variables. 443-465 - Andrea Di Giusto, Chiara Marcolla:

Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings. 467-502 - Zhedong Wang, Qiqi Lai, Feng-Hao Liu:

Almost tight security in lattices with polynomial moduli - PRF, IBE, all-but-many LTF, and more. 503-551 - Yin-Song Xu, Yi-Bo Luo, Zheng Yuan, Xuan Zhou, Qidi You, Fei Gao, Xiaoyang Dong:

Quantum rectangle attack and its application on Deoxys-BC. 553-590 - Lukas Kölsch

, Lucas Krompholz
, Gohar M. Kyureghyan
:
Factorization and irreducibility of composed products. 591-614 - Li Xu, Cuiling Fan, Chunming Tang, Zhengchun Zhou:

Derivative descendants of cyclic codes and constacyclic codes. 615-632 - Josline Freed:

Codes over $\mathbb {F}_4$ and $\mathbb {F}_2 \times \mathbb {F}_2$ and theta series of the corresponding lattices in quadratic fields. 633-644 - Shikang Yu, Tao Feng

, Menglong Zhang:
A pair of orthogonal orthomorphisms of finite nilpotent groups. 645-665 - Xin Wei

, Xiande Zhang, Gennian Ge:
On set systems with strongly restricted intersections. 667-682 - Nathan Kaplan

, Jon-Lark Kim:
Hulls of projective Reed-Muller codes. 683-699 - Huck Bennett, Kaung Myat Htay Win:

Relating code equivalence to other isomorphism problems. 701-723 - Xingyu Zheng

, Shukai Wang, Cuiling Fan:
Optimal combinatorial neural codes via symmetric designs. 725-736 - Ying Xu, Xiaoni Du, Jian Zou:

Quantum security of Trojan message attacks on Merkle-Damgård hash construction. 737-768 - Gaofei Wu, Zhuohui You, Zhengbang Zha, Yuqing Zhang:

Several new classes of optimal ternary cyclic codes with two or three zeros. 769-786 - Federico Canale

, María Naya-Plasencia:
Guessing less and better: improved attacks on GIFT-64. 787-822 - Bingsheng Shen, Tao Yu, Zhengchun Zhou, Yang Yang:

Correction: Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions. 823
Volume 93, Number 4, April 2025
- Jonathan Jedwab, Alexander Pott, Yue Zhou:

Sequences, codes, and Boolean functions: in memory of Kai-Uwe Schmidt. 825-829 - Qiang Wang:

A survey of compositional inverses of permutation polynomials over finite fields. 831-870 - Geyang Wang

, Qi Wang:
On the maximum size of variable-length non-overlapping codes. 871-878 - James A. Davis, John B. Polhill, Ken Smith, Eric Swartz

, Jordan Webster:
New spence difference sets. 879-888 - Javier de la Cruz, Wolfgang Willems:

Around LCD group codes. 889-897 - Nurdagül Anbar

, Sadmir Kudin, Wilfried Meidl, Enes Pasalic
, Alexandr Polujan
:
Vectorial negabent concepts: similarities, differences, and generalizations. 899-921 - Robert S. Coulter, Bradley Fain:

A class of functions and their application in constructing semisymmetric designs. 923-935 - Tor Helleseth, Chunlei Li, Yongbo Xia:

Investigation of the permutation and linear codes from the Welch APN function. 937-959 - Lukas Kölsch, Gohar M. Kyureghyan:

The classifications of o-monomials and of 2-to-1 binomials are equivalent. 961-970 - Charlene Weiß:

Nontrivial t-designs in polar spaces exist for all t. 971-981 - Ruikai Chen

, Sihem Mesnager:
Involutions of finite abelian groups with explicit constructions on finite fields. 983-995 - Radi Abubaker, Guang Gong:

Frequency distance sequences for packet detection in physical-layer security. 997-1020 - Daniel J. Katz, Miriam E. Ramirez:

Moments of autocorrelation demerit factors of binary sequences. 1021-1065 - Lilya Budaghyan, Mohit Pal

:
Arithmetization-oriented APN permutations. 1067-1088 - Shuxing Li, Maosheng Xiong:

Intersection distribution of degree four polynomials over finite fields. 1089-1111 - Jozefien D'haeseleer, Ferdinand Ihringer, Kai-Uwe Schmidt:

A common generalization of hypercube partitions and ovoids in polar spaces. 1113-1126 - John Bamberg

, Michael Giudici
, Jesse Lansdown
, Gordon F. Royle
:
Tactical decompositions in finite polar spaces and non-spreading classical group actions. 1127-1141 - Michael Kiermaier, Kai-Uwe Schmidt, Alfred Wassermann:

Designs in finite classical polar spaces. 1143-1162 - Jan De Beule

, Jonathan Mannaert
, Leo Storme:
On two non-existence results for Cameron-Liebler k-sets in ${{\,\mathrm{\textrm{PG}}\,}}(n,q)$. 1163-1177 - Sam Adriaensen

, Maarten De Boeck:
Association schemes and orthogonality graphs on anisotropic points of polar spaces. 1179-1216 - Daniele Bartoli, Francesco Ghiandoni

:
On 3-dimensional MRD codes of type >Xqt, ,X+δq2t,G(X) >. 1217-1236 - Claude Carlet

:
On the vector subspaces of $\mathbb {F}_{2^n}$ over which the multiplicative inverse function sums to zero. 1237-1254
Volume 93, Number 5, May 2025
- Gustavo Terra Bastos, Angelynn Álvarez, Zachary Flores, Adriana Salerno:

A construction of optimal quasi-cyclic locally recoverable codes using constituent codes. 1255-1270 - Jicheng Ma, Guiying Yan:

On automorphism groups of binary cyclic codes. 1271-1282 - Prachi Gupta, P. R. Mishra, Atul Gaur:

A class of permutations on ${\mathbb {Z}}_{p}$ with differential uniformity at most 3. 1283-1293 - José Gustavo Coelho

, Fabio Enrique Brochero Martínez:
Low-weight codewords in cyclic codes. 1295-1310 - Zhonghua Sun, Xinyue Liu:

Several families of negacyclic BCH codes and their duals. 1311-1336 - Wei Lu, Qingyao Wang, Xiaoqiang Wang, Dabin Zheng:

The weight hierarchies of three classes of linear codes. 1337-1355 - Chunzhi Zhao, Jinzheng Cao, Junqi Zhang, Qingfeng Cheng:

Fault attacks on multi-prime RSA signatures. 1357-1374 - Alonso Sepúlveda Castellanos

, Erik A. R. Mendoza
, Guilherme C. Tizziotti:
The set of pure gaps at several rational places in function fields. 1375-1400 - Bart De Bruyn, Sergey Goryainov, Willem H. Haemers

, Leonid Shalaginov:
Divisible design graphs from the symplectic graph. 1401-1424 - Dingding Jia, Haiyang Xue

, Bao Li:
Fully selective opening secure IBE from LWE. 1425-1449 - Loïc Bidoux, Jesús-Javier Chi-Domínguez, Thibauld Feneuil, Philippe Gaborit, Antoine Joux, Matthieu Rivain, Adrien Vinçotte:

RYDE: a digital signature scheme based on rank syndrome decoding problem with MPC-in-the-Head paradigm. 1451-1486 - Mohammed El Badry, Abdelfattah Haily, Ayoub Mounir:

On LCD skew group codes. 1487-1499 - Junru Li, Pengzhen Ke, Liang Feng Zhang

:
Efficient information-theoretic distributed point functions with general output groups. 1501-1530 - Siwei Chen, Kai Hu, Guozhen Liu, Zhongfeng Niu, Quan Quan Tan, Shichang Wang:

Meet-in-the-middle attack on round-reduced SCARF under single pair-of-tweaks setting. 1531-1547
Volume 93, Number 6, June 2025
- Yongbo Xia, Chunlei Li, Furong Bao, Shaoping Chen, Tor Helleseth:

Further investigation on differential properties of the generalized Ness-Helleseth function. 1549-1573 - Cunsheng Ding, Zhonghua Sun, Qianqian Yan:

The support designs of several families of lifted linear codes. 1575-1595 - Giacomo Micheli, Vincenzo Pallozzi Lavorante, Phillip Waitkevich:

Codes from Am-invariant polynomials. 1597-1609 - Lynn Engelberts, Simona Etinski, Johanna Loyer:

Quantum sieving for code-based cryptanalysis and its limitations for ISD. 1611-1644 - Carlos Aguilar Melchor, Victor Dyseryn, Philippe Gaborit:

Somewhat homomorphic encryption based on random codes. 1645-1669 - Minjia Shi, Ruowen Liu, Dean Crnkovic, Patrick Solé, Andrea Svob

:
Ternary isodual codes and 3-designs. 1671-1685 - Reza Dastbasteh, Petr Lisonek:

Additive twisted codes: new distance bounds and infinite families of quantum codes. 1687-1724 - Xiang Wang, Fang-Wei Fu:

Rate-improved multi-permutation codes for correcting a single burst of stable deletions. 1725-1737 - Bart De Bruyn, Puspendu Pradhan, Binod Kumar Sahoo:

Blocking sets of secant and tangent lines with respect to a quadric of PG (n,q). 1739-1760 - Mark Pankov, Krzysztof Petelczyc, Mariusz Zynel:

Symmetric (15, 8, 4)-designs in terms of the geometry of binary simplex codes of dimension 4. 1761-1775 - Pavol Zajac:

Polynomial reduction from syndrome decoding problem to regular decoding problem. 1777-1793 - Fabio Enrique Brochero Martínez, Lucas Reis, Sávio Ribas:

On polynomials over finite fields that are free of binomials. 1795-1807 - Rudong Min, Jiale Han, Shouliang Li, Zhen Yang, Yi Yang:

A public key encryption algorithm based on multi-dimensional general Chebyshev polynomial. 1809-1836 - Jin Sima, Chao Pan, Olgica Milenkovic:

Perturbation-resilient sets for dynamic service balancing. 1837-1861 - Francisco Javier Lobillo

, José Manuel Muñoz
:
Linear complementary pairs of skew constacyclic codes. 1863-1888 - Xianhong Xie

, Yi Ouyang
, Honggang Hu:
On vectorial functions with maximal number of bent components. 1889-1910 - Soumya Sahoo

, Raghavendra Patil, Sandip Kumar Mondal, Santanu Sarkar, Chester Rebeiro:
Improved Side Channel Attacks on TRIVIUM, GRAIN-128-AEAD, ACORN-128 v3 and ASCON-128a. 1911-1933 - Zuling Chang, Qiang Wang:

Efficient generation of odd order de Bruijn sequence with the same complement and reverse sequences. 1935-1949 - Kirpa Garg

, Sartaj Ul Hasan, Constanza Riera, Pantelimon Stanica:
The revised boomerang connectivity tables and their connection to the difference distribution table. 1951-1984 - Sophie Huczynska

, Sophie Hume:
New results on non-disjoint and classical strong external difference families. 1985-2012 - Yuhan Zhang, Lei Zhang, Yafei Zheng, Wenling Wu:

A new automatic framework for searching rotational-XOR differential characteristics in ARX ciphers. 2013-2054 - Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher:

New models for the cryptanalysis of ASCON. 2055-2072 - Chunghun Baek, Taechan Kim

:
Can we beat three halves lower bound? (Im)possibility of reducing communication cost for garbled circuits. 2073-2105 - Xinyue Ming, Tao Feng

, Menglong Zhang:
The asymptotic existence of BIBDs having a nesting. 2107-2118 - Shuangqing Liu, Shuhui Yu, Lijun Ji:

Construction of optimal flag codes by MRD codes. 2119-2136 - Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau:

Secret and shared keys recovery on hamming quasi-cyclic with SASCA. 2137-2157 - Mahak

, Maheshanand Bhaintwal:
On equidistant single-orbit cyclic and quasi-cyclic subspace codes. 2159-2175 - Alexander L. Gavrilyuk, Vladislav V. Kabanov

:
Strongly regular graphs decomposable into a divisible design graph and a Delsarte clique. 2177-2189 - Zhixiong Chen, Arne Winterhof:

Probabilistic results on the 2-adic complexity. 2191-2203 - Kangquan Li:

Constructions of complete permutations in multiplication. 2205-2228 - Chunyan Qin, Gaojun Luo:

A generalized construction of variable-length non-overlapping codes. 2229-2243 - Matthias Johann Steiner

:
A note on the Walsh spectrum of the Flystel. 2245-2262 - Hengming Zhao, Rongcun Qin, Minquan Cheng, Dianhua Wu:

Optimal two-dimensional multilength optical orthogonal codes via compatible mixed difference packing set systems. 2263-2296 - Mengzhen Zhao, Yanxun Chang:

Bounds and constructions of optimal symbol-pair codes with constant pair-weight. 2297-2316
Volume 93, Number 7, July 2025
- Bastien Pacifico

:
Introducing locality in some generalized AG codes. 2317-2332 - Hai Q. Dinh, Hieu V. Ha, Bac Trong Nguyen, Thieu N. Vo

:
A new family of AMDS symbol-pair constacyclic codes of length bf4p and symbol-pair distance bf9. 2333-2347 - Daniel Gabric, Joe Sawada:

Constructing k-ary orientable sequences with asymptotically optimal length. 2349-2367 - Kapish Chand Meena

, Piyush Pachauri, Ambrish Awasthi
, Maheshanand Bhaintwal
:
A class of triple-twisted GRS codes. 2369-2393 - Kaimin Cheng:

A class of ternary codes with few weights. 2395-2414 - Tung Chou, Edoardo Persichetti, Paolo Santini:

On linear equivalence, canonical forms, and digital signatures. 2415-2457 - Wenya Li, Kai Zhang, Bin Hu:

A framework for constructing impossible differential distinguishers and its applications. 2459-2486 - Miroslav Markov, Yuri L. Borissov:

The weight distribution of the fourth-order Reed-Muller code of length 512. 2487-2502 - Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, Antonia Wachter-Zeh:

How to lose some weight: a practical template syndrome decoding attack. 2503-2519 - Hugo Sauerbier Couvée, Thomas Jerkovits

, Jessica Bariffi:
Bounds on sphere sizes in the sum-rank metric and coordinate-additive metrics. 2521-2542 - Chang Lv, Yuqing Zhu:

Nonexistence of generalized bent functions and the quadratic norm form equations. 2543-2559 - John Baena, Daniel Cabarcas, Sharwan K. Tiwari, Javier A. Verbel, Luis Villota:

Admissible parameters for the Crossbred algorithm and semi-regular sequences over finite fields. 2561-2589 - Carlos Agrinsoni, Heeralal Janwa, Moises Delgado:

Resolution of the exceptional APN conjecture in the Gold degree case. 2591-2610 - Ling Song, Qinggan Fu, Qianqian Yang, Yin Lv, Lei Hu:

Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY. 2611-2655 - Arianna Dionigi, Barbara Gatti:

Galois subcovers of the Hermitian curve in characteristic p with respect to subgroups of order dp with $d\not =p$ prime. 2657-2670 - Xiaopeng Zheng, Hongbo Li, Dingkang Wang:

A new framework for fast homomorphic matrix multiplication. 2671-2693 - Chi Zhang:

An attack on p-adic lattice public-key encryption cryptosystems and signature schemes. 2695-2716 - Marco Buratti, Francesca Merola, Anamari Nakic:

Additive combinatorial designs. 2717-2740 - Javad Ebrahimi Boroojeni, Mehri Oghbaei Bonab:

Binary stretch embedding of weighted graphs. 2741-2760 - Madhura Pathegama, Alexander Barg:

Limitations of the decoding-to-LPN reduction via code smoothing. 2761-2778 - Canze Zhu:

The complete weight enumerator of the square of one-weight irreducible cyclic codes. 2779-2802 - William D. Carey, Matthew Kearney, Rachel Kirsch, Stefan Popescu:

Universal partial tori. 2803-2822 - Jingtao Xiong, Jianghua Zhong, Dongdai Lin:

Studying the isomorphism of NFSRs via a general framework of bijections. 2823-2853 - Xiao-Juan Wang, Tian Tian

, Wen-Feng Qi:
On the cycle structure of a class of Galois NFSRs: component sequences possessing identical periods. 2855-2871 - Eduardo Camps-Moreno, Hiram H. López, Gretchen L. Matthews, Rodrigo San-José

:
The weight hierarchy of decreasing norm-trace codes. 2873-2894 - Lukas Kölsch, Gohar M. Kyureghyan:

Correction: The classifications of o-monomials and of 2-to-1 binomials are equivalent. 2895-2896
Volume 93, Number 8, August 2025
- Julia Lieb, Raquel Pinto, Carlos Vela:

A new method for erasure decoding of convolutional codes. 2897-2918 - Eric Kubischta

, Ian Teixeira:
Quantum codes and irreducible products of characters. 2919-2930 - Giacomo Micheli, Vincenzo Pallozzi Lavorante, Abhi Shukul, Noah Smith:

Constructions of locally recoverable codes with large availability. 2931-2945 - Joonas Ahola, Iván Blanco-Chacón, Wilmar Bolaños, Antti Haavikko, Camilla Hollanti

, Rodrigo Martín Sánchez-Ledesma
:
Fast multiplication and the PLWE-RLWE equivalence for an infinite family of maximal real subfields of cyclotomic fields. 2947-2969 - Hai Liu, Chunyu Gan, Chengju Li, Xueying Shi:

Constructions of binary cyclic codes with minimum weights exceeding the square-root lower bound. 2971-2992 - Matteo Bonini

, Martino Borello, Eimear Byrne:
The geometry of covering codes in the sum-rank metric. 2993-3009 - Yuqing Zhu, Chang Lv, Jiqiang Liu:

Utilizing two subfields to accelerate individual logarithm computation in extended tower number field sieve. 3011-3027 - Altan Berdan Kilic

, Anne Nijsten
, Ruud Pellikaan, Alberto Ravagnani:
Knot theory and error-correcting codes. 3029-3068 - Chengyu Sun, Xin Wang:

New upper bounds for wide-sense frameproof codes. 3069-3082 - Axel Lemoine

, Rocco Mora
, Jean-Pierre Tillich
:
Understanding the new distinguisher of alternant codes at degree 2. 3083-3105 - Xue Jia, Qin Yue, Huan Sun:

Coding properties and automorphism groups of two classes of twisted generalized Reed-Solomon codes. 3107-3133 - Joshua Cooper, Jack Hyatt:

Permutations minimizing the number of collinear triples. 3135-3142 - Max Schulz:

Rational transformations over finite fields that are never irreducible. 3143-3157 - Andrea C. Burgess, Nicholas J. Cavenagh, Peter Danziger, David A. Pike:

Weak colourings of Kirkman triple systems. 3159-3179 - Shuiyin Liu

, Amin Sakzad:
Lattice codes for CRYSTALS-Kyber. 3181-3205 - Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, Celestin Nkuimi Jugnia:

Avoiding trusted setup in isogeny-based commitments. 3207-3225 - Zibi Xiao

, Yaya Ye, Zhiye Yang, Xiangyong Zeng:
Trace representation of a family of generalized cyclotomic binary sequences with period pn. 3227-3241 - Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander

, Patrick Neumann, Léo Perrin, Lukas Stennes:
Commutative cryptanalysis as a generalization of differential cryptanalysis. 3243-3281 - Lev Yohananov, Moshe Schwartz:

On the coding capacity of reverse-complement and palindromic duplication-correcting codes. 3283-3302 - Makhan Maji

, Sihem Mesnager, Santanu Sarkar, Kalyan Hansda:
Characterizations for minimal codes: graph theory approach and algebraic approach over finite chain rings. 3303-3335 - Seyed Hassan Alavi

:
On flag-transitive symmetric (v, k, 4) designs. 3337-3359 - Barbara Gatti, Gábor Korchmáros, Gábor Péter Nagy, Vincenzo Pallozzi Lavorante, Gioia Schulte:

Evaluation codes arising from symmetric polynomials. 3361-3373 - Chun Guo, Xiao Wang, Kang Yang, Yu Yu:

On tweakable correlation robust hashing against key leakages. 3375-3412 - Gretchen L. Matthews, Emily McMillon:

A combinatorial approach to avoiding weak keys in the BIKE cryptosystem. 3413-3436 - Zuo Ye, Omer Sabary, Ryan Gabrys, Eitan Yaakobi, Ohad Elishco:

More on codes for combinatorial composite DNA. 3437-3462
Volume 93, Number 9, September 2025
- B. G. Rodrigues, Patrick Solé:

Primitive rank 3 groups, binary codes, and 3-designs. 3463-3479 - Niklas Gassner, Julia Lieb, Abhinaba Mazumder

, Michael Schaller:
Information-set decoding for convolutional codes. 3481-3505 - Sergey Bezzateev, Natalia A. Shekhunova:

Self-reversible generalized (L,G)-codes. 3507-3519 - Antonio Corbo Esposito, Rosa Fera, Francesco Romeo:

Hilbert series and degrees of regularity of Oil & Vinegar and mixed quadratic systems. 3521-3541 - Javier Herranz, Germán Sáez:

(k, n)-Consecutive access structures. 3543-3563 - R. Julian R. Abel

, Ingo Janiszczak
, Reiner Staszewski:
Improvements for lower bounds of mutually orthogonal Latin squares of sizes 54, 96 and 108. 3565-3573 - Hajime Matsui

, Kakeru Kaneko:
Entanglement-assisted quantum error-correcting codes via quasi-cyclic codes with complementary duals. 3575-3591 - Giulia Cavicchioni, Eleonora Guerrini, Alessio Meneghetti:

A class of locally recoverable codes over finite chain rings. 3593-3618 - Frederique Oggier, Shengwei Liu, Hongwei Liu:

About the Rankin and Bergé-Martinet constants from a coding theory view point. 3619-3640 - Kamel Mohamed Faraoun, Nadia El Mrabet:

Optimizing and securing GLV multiplication over BLS pairings-friendly curves. 3641-3669 - Yuehui Cui, Jinquan Luo:

Differential uniformity and constacyclic code from some power mapping. 3671-3687 - Søren Fuglede Jørgensen

:
On the clique covering numbers of Johnson graphs. 3689-3705 - Yanyan Zhou, Senpeng Wang, Yunong Wu, Bin Hu:

Improved method of searching for boomerang distinguishers on Feistel structures-applications to WARP, TWINE, LBlock, LBlock-s, and ALLPC. 3707-3731 - Shakir Ali, Nuh Aydin, Pushpendra Sharma, Elif Segah Oztas, Atif Ahmad Khan:

Constacyclic codes over general mixed alphabets and their applications. 3733-3760 - Xiaoen Lin, Le He, Zhengrong Lu, Yantian Shen, Chongxu Ren, Hongbo Yu:

Internal differential structure: preimage attacks on up to 5-round Keccak. 3761-3808 - Danilo Francati

, Daniele Venturi
:
Evolving secret sharing revisited: computational security and succinctness. 3809-3861 - Marco Buratti, Anita Pasotti:

Shiftable Heffter spaces. 3863-3874 - Sergiy V. Borodachov, Peter G. Boyvalenkov

, Peter D. Dragnev, Douglas P. Hardin, Edward B. Saff, Maya Stoyanova:
Bounds on discrete potentials of spherical (k, k)-designs. 3875-3902 - Mrinal Kanti Bose, Udaya Parampalli, Abhay Kumar Singh

:
Binary cyclic codes from permutation polynomials over ${\mathbb {F}}_{2^m}$. 3903-3932 - Danyao Wu, Pingzhi Yuan:

The compositional inverses of the permutation polynomials from trace functions over finite fields. 3933-3953 - Hao Lin, Mingqiang Wang, Weiqiang Wen, Shifeng Sun, Kaitai Liang:

Generic construction of threshold ring signatures and lattice-based instantiations. 3955-4017 - Hiroki Kajiura, Koji Momihara, Utano Ogata:

Divisible pre-difference sets for approximating integrations over finite groups. 4019-4042 - Yong Liu

, Zejun Xiang, Xiangyong Zeng, Shasha Zhang:
A novel algorithm for the k-XOR problem. 4043-4081 - Tongliang Zhang, Haibin Kan, Lijing Zheng, Jie Peng, Hanbing Zhao:

Further results on permutation pentanomials over finite fields with characteristic two. 4083-4112 - Simeon Ball, Michel Lavrauw, Tabriz Popatia:

Correction to: Griesmer type bounds for additive codes over finite fields, integral and fractional MDS codes. 4113-4115
Volume 93, Number 10, October 2025
- Yuli Tan, Junling Zhou:

Steiner quadruple systems with minimum colorable derived designs: constructions and applications. 4117-4140 - Yagmur Çakiroglu

, Jade Nardi
, Mesut Sahin
:
Codes on weighted projective planes. 4141-4171 - Lorenzo Grassi:

On generalizations of the Lai-Massey scheme. 4173-4208 - Rajeev Anand Sahu, Jim Jean-Pierre Barthel, Razvan Rosie:

A simple inner-product functional encryption scheme from the inverse-DDH assumption. 4209-4221 - Klaus Metsch:

On the treewidth of generalized q-Kneser graphs. 4223-4234 - Makoto Araya, Masaaki Harada, Hadi Kharaghani, Sho Suda, Wei-Hsuan Yu:

Unbiased weighing matrices of weight 9. 4235-4273 - Zheng Gao Chen, Jing Jian Li, Jun-Yang Zhang:

Subgroup perfect codes in lie type simple groups of rank one. 4275-4292 - Xing Lin:

Distributed repair schemes for Reed-Solomon codes with multiple erasures. 4293-4312 - Ivan N. Landjev, Konstantin V. Vorob'ev:

On binary codes with distances d and d+2. 4313-4322 - Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini:

Security of fixed-weight repetitions of special-sound multi-round interactive proofs. 4323-4353 - Céline Chevalier, Ehsan Ebrahimi, Quoc-Huy Vu:

On security notions for encryption in a quantum world. 4355-4402 - Benedek Kovács, Zoltán Lóránt Nagy, Dávid R. Szabó

:
Blocking planes by lines in ${{\,\textrm{PG}\,}}(n,q)$. 4403-4432 - Clementa Alonso-González, Miguel Ángel Navarro-Pérez:

Distance distribution of cyclic orbit flag codes. 4433-4459 - Shamil Asgarli, Chi Hoi Yip

:
Mutual position of two smooth quadrics over finite fields. 4461-4472 - Meng Cao, Fuchuan Wei, Gaojun Luo:

Entanglement-assisted quantum error-correcting codes using matrix-product codes. 4473-4500 - Haoran Xiong

, Guanghui Wang, Zhiming Ma, Guiying Yan:
On the lifting degree of girth-8 QC-LDPC codes. 4501-4514 - Kaimin Cheng:

The inverse stability of Artin-Schreier polynomials over finite fields. 4515-4523 - Thinh Hung Dang, Dustin Moody:

New types of formula for isogenies between elliptic curves. 4525-4543 - Adrián Fidalgo-Díaz, Umberto Martínez-Peñas:

Distributed matrix multiplication with straggler tolerance over very small fields. 4545-4565 - Dipak K. Bhunia

, Cristina Fernández-Córdoba
, Mercè Villanueva
:
Linearity and classification of $\mathbb {Z}_2\mathbb {Z}_4\mathbb {Z}_8$-linear Hadamard codes. 4567-4594 - Chenmiao Shi, Jie Peng, Haibin Kan, Jinjie Gao:

On CCZ-equivalence of two new APN functions in trivariate form. 4595-4625 - Avijit Dutta, Eik List:

Forking sums of permutations for highly secure and efficient PRFs. 4627-4658
Volume 93, Number 11, November 2025
- Patric R. J. Östergård:

Classifying generalized Howell designs. 4659-4670 - Yaqian Zhang

:
New centralized multi-node repair schemes for distributed storage. 4671-4682 - Seyed Hassan Alavi, Carmen Amarra, Ashraf Daneshkhah, Alice Devillers

, Cheryl E. Praeger
:
Higher-dimensional grid-imprimitive block-transitive designs. 4683-4719 - Henk D. L. Hollmann, Junming Ke, Ago-Erik Riet:

An optimal binary linear functional-repair storage code with efficient repair related to rmPG(2,8). 4721-4755 - Patrick Bennett:

Asymptotically optimal constant weight codes with even distance. 4757-4763 - Kanat Abdukhalikov, Simeon Ball, Duy Ho

, Tabriz Popatia:
Ovoids in the cyclic presentation of rmPG(3, q ). 4765-4778 - Kirill V. Vedenev

:
On the security of two IKKR-type code-based cryptosystems. 4779-4798 - Claude Carlet, Serge Feukoua, Ana Salagean:

The stability of the algebraic degree of Boolean functions when restricted to affine spaces. 4799-4832 - Gang Wang, Xuan Gao, Sihem Mesnager, Fang-Wei Fu:

Multilevel inserting constructions for constant dimension subspace codes. 4833-4856 - Rongxing Qiu, Weijun Fang:

New constructions of MDS symbol-pair codes via simple-root cyclic codes. 4857-4886 - Tianling Weng, Gaoli Wang, Keting Jia, Xiaoyang Dong, Siwei Sun, Tingting Cui:

Exploiting output bits and the χ operation in MitM preimage attacks on Keccak. 4887-4909 - Jie Liu, Peng Hu, Xiusheng Liu:

Galois LCD subspace codes. 4911-4923 - Yueying Lou, Qichun Wang:

Determining the weight spectrum of the Reed-Muller codes RM(m-6,m). 4925-4936 - Denis S. Krotov

, Ferruh Özbudak
, Vladimir N. Potapov
:
Generalizing the Bierbrauer-Friedman bound for orthogonal arrays. 4937-4950 - Decai Wen, Guoyuan Li, Zihui Liu:

On the support weight distributions of relative subcodes of some classes of codes. 4951-4980 - Claude Carlet, Xiang-Dong Hou:

More on the sum-freedom of the multiplicative inverse function. 4981-4997 - Angela Aguglia

, Luca Giuzzi
, Viola Siconolfi
:
On mutually μ-intersecting quasi-Hermitian varieties with some applications. 4999-5013 - Donald L. Kreher, Maura B. Paterson, Douglas R. Stinson:

Near-factorizations of dihedral groups. 5015-5038 - Daiki Kawabata, Tatsuya Maruta, Keita Yasufuku:

A conjecture on the minimum length of linear codes over finite fields. 5039-5054 - Sihem Mesnager, Huawei Wu:

On the boomerang properties of xq+2 over $\mathbb {F}_{q^2}$. 5055-5078 - Fengwei Li, Ruiyuan Jiang, Yuting Liu:

New MDS and self-dual generalized Roth-Lempel codes as well as their deep holes. 5079-5096 - Seyed Hassan Alavi

:
Correction: On flag-transitive symmetric (v, k, 4) designs. 5097-5098
Volume 93, Number 12, December 2025
- Diane M. Donovan, Mike J. Grannell, Emine Sule Yazici

:
On maximal orthogonal partial Latin squares and minimal codes with specified length, minimum distance and covering radius. 5099-5113 - Tianrun Liu, Zihui Liu:

The enumeration and generalizations for relative one-weight codes. 5115-5129 - Chi Hoi Yip:

Exact values and improved bounds on the clique number of cyclotomic graphs. 5131-5142 - Ka Hin Leung, Jun Heng Edmil Chue, Meng Zhao:

On vanishing sums and cyclic Butson matrices. 5143-5157 - Rod Gow, Gary McGuire:

Linearization of polynomials in prime characteristic, with applications to the Golay code and Steiner system. 5159-5177 - Antoine Joux, Rocco Mora:

The regular multivariate quadratic problem. 5179-5229 - Abdoulaye Maïga, Damien Robert, Djiby Sow:

Towards computing canonical lifts of ordinary elliptic curves in medium characteristic. 5231-5255 - Amber E. Gentle, Daniel Horsley

, Ian M. Wanless:
Excess coverage arrays and Levenshtein's conjecture. 5257-5269 - Gustavo Terra Bastos, Maiara F. Bollauf

, Agnaldo J. Ferreira, Øyvind Ytrehus:
Linearity of $\mathbb {Z}_{2^L}$-linear codes via Schur product. 5271-5301 - Gustavo Terra Bastos, Maiara F. Bollauf, Agnaldo José Ferrari, Øyvind Ytrehus:

Correction: Linearity of $\mathbb {Z}_{2^L}$-linear codes via Schur product. 5303-5304 - Umberto Martínez-Peñas, Rubén Rodríguez-Ballesteros:

Linear codes in the folded Hamming distance and the quasi MDS property. 5305-5326 - Xiujing Zheng, Liqi Wang, Shixin Zhu:

Several new classes of MDS symbol-pair codes. 5327-5356 - Xiao-Xin Zhao, Zhong-Xiao Wang, Deng Tang, Qun-Xiong Zheng:

The expectation and the variance of the weights of de Bruijn sequences. 5357-5365 - Bart De Bruyn, Mou Gao, Dibyayoti Jena

:
The homogeneous pseudo-embeddings of rmPG(2,8). 5367-5380 - Eduardo Brandani da Silva, Douglas Fernando Copatti, Waldir Silva Soares Jr., Evandro Mazetto Brizola:

Surface and color codes from semi-regular tessellations on non-orientable surfaces. 5381-5421 - Gang Wang, Ming Xu, You Gao:

New constructions of cyclic constant-dimension subspace codes based on Sidon spaces and subspace polynomials. 5423-5444 - Yeow Meng Chee, Tuvi Etzion, Hoang Ta, Van Khu Vu:

Constructions of covering sequences and 2D-sequences. 5445-5471 - Ka Hin Leung, Bernhard Schmidt, Tao Zhang:

Semiregular relative difference sets related to Gauss sums and projective planes. 5473-5485 - Xavier Caruso, Fabrice Drain:

Selfdual skew cyclic codes. 5487-5516 - Yanxun Chang, Tommaso Traetta, Junling Zhou:

The existence of pyramidal Steiner triple systems over abelian groups. 5517-5533 - Amin Bahmanian:

Ryser's theorem for simple multi-Latin rectangles. 5535-5550

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














