


default search action
Designs, Codes and Cryptography, Volume 94
Volume 94, Number 1, January 2026
- Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie:

Simulation secure multi-input quadratic functional encryption: applications to differential privacy. 1 - Joo Woo, Jonghyun Kim, Ga Hee Hong, Seungwoo Lee, Minkyu Kim, Hochang Lee, Jong Hwan Park:

NTRU+Sign: compact NTRU-based signatures using bimodal distributions. 2 - Michele Battagliola, Riccardo Longo, Alessio Meneghetti:

Extensible decentralized secret sharing and application to Schnorr signatures. 3 - Wanbao Zhang, Zhilin Zhang, Shenglin Zhou:

On flag-transitive quasi-symmetric 2-designs. 4 - Jianming Lin, Damien Robert, Chang-An Zhao, Yuhao Zheng:

Biextensions in pairing-based cryptography. 5 - Yaoda Hu, Yu Zhang, Wenling Wu:

Construction of correctors using resilient fragmentary Boolean functions. 6 - Huilan Chang, Ching-Chih Hsu:

Lemmas on traceability codes and an upper bound for 4-traceability. 7 - Mahir Bilen Can:

MDS stabilizer poset codes. 8 - Tomer Ashur

, Amit Singh Bhati
:
Generalized indifferentiable sponge and its application to Polygon Miden VM. 9 - Sanjit Bhowmick, Deepak Kumar Dalai, Sihem Mesnager:

On construction of linear (Euclidean) hull codes over finite extensions binary fields. 10 - Amin Saeidi, Hadiseh Saydi, Thekiso Seretlo:

A new method for constructing designs and codes from the conjugacy classes of groups. 11 - Tingting Wu, Lanqiang Li, Xiuyu Zhang, Shixin Zhu:

Binary duadic codes and their related codes with a square-root-like lower bound. 12 - Leijo Jose, Anuradha Sharma:

On Eisenstein additive codes over chain rings and linear codes over mixed alphabets. 13 - Hao Chen, Shengwei Liu, Conghui Xie, Hongwei Liu:

Optimal CIS codes, optimal t-CIS codes and their applications in cryptography. 14 - Giuseppe D'Alconzo

, Andre Esser
, Andrea Gangemi
, Carlo Sanna
:
Sneaking up the ranks: Partial key exposure attacks on rank-based schemes. 15 - Giulia Cavicchioni, Alessio Meneghetti, Giovanni Tognolini:

Information set decoding for ring-linear codes. 16 - Chunyan Qin, Gaojun Luo, Bocong Chen:

New construction of non-expandable (1, k)-overlap-free codes. 17 - Mohsen Bayat, Nasrin Soltankhah:

On flag-transitive 2-designs with prime block length and projective special linear groups. 18 - Zixiang Xu, Chi Hoi Yip:

Intersective sets over abelian groups. 19 - Andrea C. Burgess, Peter Danziger, Daniel Horsley, Muhammad Tariq Javed:

Packing designs with large block size. 20 - Yanzhi Li, Wenjie Zhong, Tingting Chen, Xiande Zhang:

Improved bounds for codes over trees. 21 - Ivan N. Landjev, Emiliyan Rogachev, Assia Rousseva:

Characterization of some minihypers in ${{\,\textrm{PG}\,}}(r,3)$ and the nonexistence of some ternary Griesmer codes. 22 - Shun Zhang, Tairong Shi, Senpeng Wang, Jie Guan, Mingyao Gao:

Improved preimage attacks on Ascon-XOF based on linearization technique. 23 - Sanjit Chatterjee, Tapas Pandit, Subhabrata Samajder:

Multi-splitting forking based modular security of signatures in multivariate quadratic setting. 24 - Yao Tian, Hengfeng Jin, Fang-Wei Fu:

Weight distributions of two classes of optimal (r,δ )-locally repairable codes. 25

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














