


default search action
Designs, Codes and Cryptography, Volume 87
Volume 87, Number 1, January 2019
- Xinxin Fan, Guang Gong, Berry Schoenmakers, Francesco Sica
, Andrey Sidorenko:
Secure simultaneous bit extraction from Koblitz curves. 1-13 - Haibo Liu
, Qunying Liao:
Several classes of linear codes with a few weights from defining sets over $$\mathbb {F}_p+u\mathbb {F}_p$$ F p + u F p. 15-29 - Shihui Fu, Xiutao Feng
:
Involutory differentially 4-uniform permutations from known constructions. 31-56 - John T. Ethier, Gary L. Mullen:
Sets of mutually orthogonal Sudoku frequency squares. 57-65 - Ronan Egan
:
Phased unitary Golay pairs, Butson Hadamard matrices and a conjecture of Ito's. 67-74 - Thierry Mefenza, Damien Vergnaud
:
Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions. 75-85 - Minjia Shi
, Hongwei Zhu
, Patrick Solé, Gérard D. Cohen:
How many weights can a linear code have? 87-95 - Minquan Cheng
, Jing Jiang, Qiang Wang
:
Improved bounds on 2-frameproof codes with length 4. 97-106 - Tao Zhang
, Gennian Ge:
Constructions of optimal Ferrers diagram rank metric codes. 107-121 - Azam Soleimanian
, Shahram Khazaei
:
Publicly verifiable searchable symmetric encryption based on efficient cryptographic components. 123-147 - Shiyong Zhang
, Gongliang Chen:
New results on the state cycles of Trivium. 149-162 - Zhixiong Chen
, Ting Gu, Andrew Klapper:
On the q-bentness of Boolean functions. 163-171 - Alp Bassa
, Henning Stichtenoth:
Self-dual codes better than the Gilbert-Varshamov bound. 173-182
Volume 87, Numbers 2-3, March 2019
- Faina I. Solov'eva, Daniel Augot, Thomas Johansson, Marine Minier, Victor A. Zinoviev:
Editorial: Special issue on coding and cryptography. 183-184 - Christina Boura
, Anne Canteaut, Jérémy Jean, Valentin Suder:
Two notions of differential equivalence on Sboxes. 185-202 - Claude Carlet
:
On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures. 203-224 - Roberto Civino
, Céline Blondeau, Massimiliano Sala
:
Differential attacks: using alternative operations. 225-247 - Victor Cauchois, Pierre Loidreau
:
On circulant involutory MDS matrices. 249-260 - Selçuk Kavut, Subhamoy Maitra, Deng Tang
:
Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile. 261-276 - Andreas Lenz
, Antonia Wachter-Zeh, Eitan Yaakobi:
Duplication-correcting codes. 277-298 - Peter G. Boyvalenkov
, Peter D. Dragnev
, Douglas P. Hardin
, Edward B. Saff, Maya Stoyanova
:
On spherical codes with inner products in a prescribed interval. 299-315 - Selçuk Kavut, Seher Tutdere
:
The covering radii of a class of binary cyclic codes and some BCH codes. 317-325 - Jerry Anderson Pinheiro, Roberto Assis Machado, Marcelo Firer
:
Combinatorial metrics: MacWilliams-type identities, isometries and extension property. 327-340 - Patric R. J. Östergård:
The sextuply shortened binary Golay code is optimal. 341-347 - Sabyasachi Dey
, Tapabrata Roy, Santanu Sarkar
:
Some results on Fruit. 349-364 - Tsonka Baicheva
, Svetlana Topalova
:
Classification of optimal (v, k, 1) binary cyclically permutable constant weight codes with $$k=5, $$ k = 5 , 6 and 7 and small lengths. 365-374 - Daniel Heinlein
, Thomas Honold, Michael Kiermaier, Sascha Kurz, Alfred Wassermann:
Classifying optimal binary subspace codes of length 8, constant dimension 4 and minimum distance 6. 375-391 - Claudio M. Qureshi, Daniel Panario
:
The graph structure of Chebyshev polynomials over finite fields and applications. 393-416 - Cristina Fernández-Córdoba
, Carlos Vela
, Mercè Villanueva
:
On $$\mathbb {Z}_{2^s}$$ Z 2 s -linear Hadamard codes: kernel and partial classification. 417-435 - Daniel Panario
, Lucas Reis:
The functional graph of linear maps over finite fields and applications. 437-453 - Elena Egorova
, Marcel Fernandez, Grigory Kabatiansky, Moon Ho Lee:
Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing. 455-462 - Sihem Mesnager, Ferruh Özbudak
, Ahmet Sinak
:
Linear codes from weakly regular plateaued functions and their secret sharing schemes. 463-480 - Rafael G. L. D'Oliveira, Marcelo Firer
:
A distance between channels: the average error of mismatched channels. 481-493 - Svetlana Topalova
, Stela Zhelezova
:
Types of spreads and duality of the parallelisms of PG(3, 5) with automorphisms of order 13. 495-507 - Anastasia Vasil'eva
:
Local distributions for eigenfunctions and perfect colorings of q-ary Hamming graph. 509-516 - Stéphane Ballet
, Alexey Zykin:
Dense families of modular curves, prime numbers and uniform symmetric tensor rank of multiplication in certain finite fields. 517-525 - Sebati Ghosh, Palash Sarkar
:
Evaluating Bernstein-Rabin-Winograd polynomials. 527-546 - Hannes Bartz
, Vladimir Sidorenko:
Improved syndrome decoding of lifted $$L$$ L -interleaved Gabidulin codes. 547-567 - Sergey Bezzateev
, Natalia A. Shekhunova:
Totally decomposed cumulative Goppa codes with improved estimations. 569-587 - Sven Puchinger
, Johan Rosenkilde
, Irene I. Bouw:
Improved power decoding of interleaved one-point Hermitian codes. 589-607 - Kishan Chand Gupta, Sumit Kumar Pandey, Ayineedi Venkateswarlu
:
Almost involutory recursive MDS diffusion layers. 609-626 - Hugues Randriam
:
Gaps between prime numbers and tensor rank of multiplication in finite fields. 627-645 - Lukas Holzbaur
, Hannes Bartz, Antonia Wachter-Zeh:
Improved decoding and error floor analysis of staircase codes. 647-664 - Oliver W. Gnilke
, Marcus Greferath, Camilla Hollanti, Guillermo Nuñez Ponasso
, Padraig Ó Catháin
, Eric Swartz
:
Improved user-private information retrieval via finite geometry. 665-677 - S. Alabdullah, J. W. P. Hirschfeld:
A new lower bound for the smallest complete (k, n)-arc in $$\mathrm {PG}(2, q)$$ PG ( 2 , q ). 679-683 - Kévin Carrier, Jean-Pierre Tillich:
Identifying an unknown code by partial Gaussian elimination. 685-713
Volume 87, Number 4, April 2019
- Ilaria Cardinali, Michel Lavrauw
, Klaus Metsch, Alexander Pott:
Preface to the special issue on finite geometries. 715-716 - Karen Meagher
:
An Erdős-Ko-Rado theorem for the group $$\hbox {PSU}(3, q)$$ PSU ( 3 , q ). 717-744 - Marco Buratti
:
On disjoint (v, k, k-1) difference families. 745-755 - Stefaan De Winter
, Zeying Wang
:
Non-existence of partial difference sets in Abelian groups of order 8p3. 757-768 - Marco Buratti, Francesca Merola
:
Fano Kaleidoscopes and their generalizations. 769-784 - Ivan N. Landjev
, Nevyana Georgieva:
Conditions for the existence of spreads in projective Hjelmslev spaces. 785-794 - Daniele Bartoli
, Massimo Giulietti, Maria Montanucci
:
Linear codes from Denniston maximal arcs. 795-806 - Stefaan De Winter
, Cunsheng Ding, Vladimir D. Tonchev
:
Maximal arcs and extended cyclic codes. 807-816 - Fernando Piñero
, Prasant Singh:
The weight spectrum of certain affine Grassmann codes. 817-830 - Dieter Jungnickel
, Spyros S. Magliveras, Vladimir D. Tonchev
, Alfred Wassermann:
The classification of Steiner triple systems on 27 points with 3-rank 24. 831-839 - Assia Rousseva
, Ivan N. Landjev:
Linear codes close to the Griesmer bound and the related geometric structures. 841-854 - Igor E. Shparlinski
, Arne Winterhof
:
Codes correcting restricted errors. 855-863 - Aart Blokhuis, Leo Storme
, Tamás Szonyi:
Relative blocking sets of unions of Baer subplanes. 865-877 - Jan De Beule
, Jeroen Demeyer, Sam Mattheus
, Péter Sziklai:
On the cylinder conjecture. 879-893 - Hiroaki Taniguchi
:
A variation of the dual hyperoval Sc using presemifields. 895-908 - Bart De Bruyn:
Three homogeneous embeddings of DW (2n-1, 2). 909-929 - Anton Betten
, Fatma Karaoglu
:
Cubic surfaces over small finite fields. 931-953
Volume 87, Number 5, May 2019
- Pascale Charpin, Philippe Langevin:
Obituary of Jacques Wolfmann (1932-2018). 955-956 - Alice M. W. Hui, Muhammad Adib Surani, Sanming Zhou
:
The vertex-isoperimetric number of the incidence and non-incidence graphs of unitals. 957-970 - Yuqing Zhu
, Jincheng Zhuang
, Hairong Yi, Chang Lv, Dongdai Lin:
A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity. 971-986 - Mariusz Meszka
, Magdalena Tyniec:
Orthogonal one-factorizations of complete multipartite graphs. 987-993 - Alexander M. Romanov:
On non-full-rank perfect codes over finite fields. 995-1003 - Junji Shikata, Yohei Watanabe
:
Identity-based encryption with hierarchical key-insulation in the standard model. 1005-1033 - Yanbin Li, Meiqin Wang:
Cryptanalysis of MORUS. 1035-1058 - Shoko Chisaki
, Yui Kimura, Nobuko Miyamoto:
A recursive construction for difference systems of sets. 1059-1068 - Giacomo Micheli
, Violetta Weger
:
Cryptanalysis of the CLR-cryptosystem. 1069-1086 - Ziling Heng
, Cunsheng Ding:
A construction of q-ary linear codes with irreducible cyclic codes. 1087-1108 - Darcy Best, Trent G. Marbach
, Rebecca J. Stones
, Ian M. Wanless:
Covers and partial transversals of Latin squares. 1109-1136 - Zuling Chang, Martianus Frederic Ezerman
, San Ling
, Huaxiong Wang:
On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials. 1137-1160 - Huiqin Xie, Li Yang
:
Using Bernstein-Vazirani algorithm to attack block ciphers. 1161-1182 - Vladimir Edemskiy
, Chunlei Li, Xiangyong Zeng
, Tor Helleseth:
The linear complexity of generalized cyclotomic binary sequences of period pn. 1183-1197
Volume 87, Number 6, June 2019
- A. J. van Zanten:
Primitive idempotent tables of cyclic and constacyclic codes. 1199-1225 - Hiroki Koike, István Kovács, Dragan Marusic
, Mikhail E. Muzychuk:
Cyclic groups are CI-groups for balanced configurations. 1227-1235 - Tsuyoshi Miezaki, Manabu Oura:
On the cycle index and the weight enumerator. 1237-1242 - Jerod Michel, Qi Wang
:
Almost difference sets in nonabelian groups. 1243-1251 - Serhii Dyshko:
The extension theorem for Lee and Euclidean weight codes over integer residue rings. 1253-1269 - Wenquan Bi, Xiaoyang Dong
, Zheng Li, Rui Zong, Xiaoyun Wang:
MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes. 1271-1296 - Chun Guo, Yaobin Shen, Lei Wang, Dawu Gu:
Beyond-birthday secure domain-preserving PRFs from a single permutation. 1297-1322 - Oriol Farràs
, Jordi Ribes-González
, Sara Ricci
:
Local bounds for the optimal information ratio of secret sharing schemes. 1323-1344 - Zhengan Huang
, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-based selective opening security for receivers under chosen-ciphertext attacks. 1345-1371 - David Derler
, Daniel Slamanig
:
Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge. 1373-1413 - Yanxun Chang, Hao Zheng, Junling Zhou
:
Existence of frame-derived H-designs. 1415-1431 - Daniele Bartoli, Matteo Bonini
:
Minimum weight codewords in dual algebraic-geometric codes from the Giulietti-Korchmáros curve. 1433-1445 - Minjia Shi, Yan Liu, Hugues Randriam, Lin Sok, Patrick Solé:
Trace codes over Z4, and Boolean functions. 1447-1455 - Ferdinand Ihringer, Karen Meagher
:
Correction to: Miklós-Manickam-Singhi conjectures on partial geometries. 1457
Volume 87, Number 7, July 2019
- Giorgos Kapetanakis
, Lucas Reis:
Variations of the Primitive Normal Basis Theorem. 1459-1480 - Shihui Fu, Xiutao Feng, Dongdai Lin, Qiang Wang
:
A recursive construction of permutation polynomials over Fq2 with odd characteristic related to Rédei functions. 1481-1498 - Tao Feng
, Lidong Wang, Xiaomiao Wang
:
Optimal 2-D (n × m , 3 , 2 , 1)-optical orthogonal codes and related equi-difference conflict avoiding codes. 1499-1520 - Tran van Trung:
On existence theorems for simple t-designs. 1521-1540 - Julien Lavauzelle
:
Lifted projective Reed-Solomon codes. 1541-1575 - Claude Carlet
, Xi Chen
, Longjiang Qu
:
Constructing infinite families of low differential uniformity (n, m)-functions with m > n / 2. 1577-1599 - Keju Meng, Fuyou Miao
, Yue Yu:
A secure and efficient on-line/off-line group key distribution protocol. 1601-1620 - Benoît Cogliati
, Titouan Tanguy:
Multi-user security bound for filter permutators in the random oracle model. 1621-1638 - John B. Polhill
:
A new family of partial difference sets in 3-groups. 1639-1646 - Dongdong Jia, Sumei Zhang, Gengsheng Zhang:
Erasure combinatorial batch codes based on nonadaptive group testing. 1647-1656 - Lucas Reis
:
Factorization of a class of composed polynomials. 1657-1671 - Matthew Fickus
, John Jasper:
Equiangular tight frames from group divisible designs. 1673-1697 - Sabyasachi Dutta
, Avishek Adhikari
, Sushmita Ruj
:
Maximal contrast color visual secret sharing schemes. 1699-1711
Volume 87, Number 8, August 2019
- Xing Liu
, Liang Zhou:
Improved Singleton bound on frequency hopping sequences and optimal constructions. 1713-1733 - Xing Liu
, Liang Zhou:
Correction to: Improved Singleton bound on frequency hopping sequences and optimal constructions. 1735-1736 - Léo Ducas, Cécile Pierrot
:
Polynomial time bounded distance decoding near Minkowski's bound in discrete logarithm lattices. 1737-1748 - Qichun Wang
, Pantelimon Stanica:
A trigonometric sum sharp estimate and new bounds on the nonlinearity of some cryptographic Boolean functions. 1749-1763 - Keisuke Shiromoto
:
Codes with the rank metric and matroids. 1765-1776 - Mahdi Cheraghchi
:
Nearly optimal robust secret sharing. 1777-1796 - Jian Liu, Sihem Mesnager:
Weightwise perfectly balanced functions with high weightwise nonlinearity profile. 1797-1813 - Xiang-Dong Hou:
Optimal binary constant weight codes and affine linear groups over finite fields. 1815-1838 - Aart Blokhuis, Maarten De Boeck
, Jozefien D'haeseleer:
Cameron-Liebler sets of k-spaces in $${{\mathrm{PG}}}(n, q)$$ PG ( n , q ). 1839-1856 - Minjia Shi
, Daitao Huang, Denis S. Krotov
:
Additive perfect codes in Doob graphs. 1857-1869 - Torger Olson, Eric Swartz
:
Transitive PSL(2, 11)-invariant k-arcs in PG(4, q). 1871-1879 - Andries E. Brouwer, Sven C. Polak
:
Uniqueness of codes using semidefinite programming. 1881-1895 - Itai Dinur:
An algorithmic framework for the generalized birthday problem. 1897-1926 - Yansheng Wu
, Qin Yue, Xueying Shi:
At most three-weight binary linear codes from generalized Moisio's exponential sums. 1927-1943
Volume 87, Number 9, September 2019
- Jerod Michel, Qi Wang
:
Almost designs and their links with balanced incomplete block designs. 1945-1960 - Ching-Yi Lai
, Kai-Min Chung
:
Quantum encryption and generalized Shannon impossibility. 1961-1972