default search action
Designs, Codes and Cryptography, Volume 87
Volume 87, Number 1, January 2019
- Xinxin Fan, Guang Gong, Berry Schoenmakers, Francesco Sica, Andrey Sidorenko:
Secure simultaneous bit extraction from Koblitz curves. 1-13 - Haibo Liu, Qunying Liao:
Several classes of linear codes with a few weights from defining sets over $$\mathbb {F}_p+u\mathbb {F}_p$$ F p + u F p. 15-29 - Shihui Fu, Xiutao Feng:
Involutory differentially 4-uniform permutations from known constructions. 31-56 - John T. Ethier, Gary L. Mullen:
Sets of mutually orthogonal Sudoku frequency squares. 57-65 - Ronan Egan:
Phased unitary Golay pairs, Butson Hadamard matrices and a conjecture of Ito's. 67-74 - Thierry Mefenza, Damien Vergnaud:
Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions. 75-85 - Minjia Shi, Hongwei Zhu, Patrick Solé, Gérard D. Cohen:
How many weights can a linear code have? 87-95 - Minquan Cheng, Jing Jiang, Qiang Wang:
Improved bounds on 2-frameproof codes with length 4. 97-106 - Tao Zhang, Gennian Ge:
Constructions of optimal Ferrers diagram rank metric codes. 107-121 - Azam Soleimanian, Shahram Khazaei:
Publicly verifiable searchable symmetric encryption based on efficient cryptographic components. 123-147 - Shiyong Zhang, Gongliang Chen:
New results on the state cycles of Trivium. 149-162 - Zhixiong Chen, Ting Gu, Andrew Klapper:
On the q-bentness of Boolean functions. 163-171 - Alp Bassa, Henning Stichtenoth:
Self-dual codes better than the Gilbert-Varshamov bound. 173-182
Volume 87, Numbers 2-3, March 2019
- Faina I. Solov'eva, Daniel Augot, Thomas Johansson, Marine Minier, Victor A. Zinoviev:
Editorial: Special issue on coding and cryptography. 183-184 - Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder:
Two notions of differential equivalence on Sboxes. 185-202 - Claude Carlet:
On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures. 203-224 - Roberto Civino, Céline Blondeau, Massimiliano Sala:
Differential attacks: using alternative operations. 225-247 - Victor Cauchois, Pierre Loidreau:
On circulant involutory MDS matrices. 249-260 - Selçuk Kavut, Subhamoy Maitra, Deng Tang:
Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile. 261-276 - Andreas Lenz, Antonia Wachter-Zeh, Eitan Yaakobi:
Duplication-correcting codes. 277-298 - Peter G. Boyvalenkov, Peter D. Dragnev, Douglas P. Hardin, Edward B. Saff, Maya Stoyanova:
On spherical codes with inner products in a prescribed interval. 299-315 - Selçuk Kavut, Seher Tutdere:
The covering radii of a class of binary cyclic codes and some BCH codes. 317-325 - Jerry Anderson Pinheiro, Roberto Assis Machado, Marcelo Firer:
Combinatorial metrics: MacWilliams-type identities, isometries and extension property. 327-340 - Patric R. J. Östergård:
The sextuply shortened binary Golay code is optimal. 341-347 - Sabyasachi Dey, Tapabrata Roy, Santanu Sarkar:
Some results on Fruit. 349-364 - Tsonka Baicheva, Svetlana Topalova:
Classification of optimal (v, k, 1) binary cyclically permutable constant weight codes with $$k=5, $$ k = 5 , 6 and 7 and small lengths. 365-374 - Daniel Heinlein, Thomas Honold, Michael Kiermaier, Sascha Kurz, Alfred Wassermann:
Classifying optimal binary subspace codes of length 8, constant dimension 4 and minimum distance 6. 375-391 - Claudio M. Qureshi, Daniel Panario:
The graph structure of Chebyshev polynomials over finite fields and applications. 393-416 - Cristina Fernández-Córdoba, Carlos Vela, Mercè Villanueva:
On $$\mathbb {Z}_{2^s}$$ Z 2 s -linear Hadamard codes: kernel and partial classification. 417-435 - Daniel Panario, Lucas Reis:
The functional graph of linear maps over finite fields and applications. 437-453 - Elena Egorova, Marcel Fernandez, Grigory Kabatiansky, Moon Ho Lee:
Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing. 455-462 - Sihem Mesnager, Ferruh Özbudak, Ahmet Sinak:
Linear codes from weakly regular plateaued functions and their secret sharing schemes. 463-480 - Rafael G. L. D'Oliveira, Marcelo Firer:
A distance between channels: the average error of mismatched channels. 481-493 - Svetlana Topalova, Stela Zhelezova:
Types of spreads and duality of the parallelisms of PG(3, 5) with automorphisms of order 13. 495-507 - Anastasia Vasil'eva:
Local distributions for eigenfunctions and perfect colorings of q-ary Hamming graph. 509-516 - Stéphane Ballet, Alexey Zykin:
Dense families of modular curves, prime numbers and uniform symmetric tensor rank of multiplication in certain finite fields. 517-525 - Sebati Ghosh, Palash Sarkar:
Evaluating Bernstein-Rabin-Winograd polynomials. 527-546 - Hannes Bartz, Vladimir Sidorenko:
Improved syndrome decoding of lifted $$L$$ L -interleaved Gabidulin codes. 547-567 - Sergey Bezzateev, Natalia A. Shekhunova:
Totally decomposed cumulative Goppa codes with improved estimations. 569-587 - Sven Puchinger, Johan Rosenkilde, Irene I. Bouw:
Improved power decoding of interleaved one-point Hermitian codes. 589-607 - Kishan Chand Gupta, Sumit Kumar Pandey, Ayineedi Venkateswarlu:
Almost involutory recursive MDS diffusion layers. 609-626 - Hugues Randriam:
Gaps between prime numbers and tensor rank of multiplication in finite fields. 627-645 - Lukas Holzbaur, Hannes Bartz, Antonia Wachter-Zeh:
Improved decoding and error floor analysis of staircase codes. 647-664 - Oliver W. Gnilke, Marcus Greferath, Camilla Hollanti, Guillermo Nuñez Ponasso, Padraig Ó Catháin, Eric Swartz:
Improved user-private information retrieval via finite geometry. 665-677 - S. Alabdullah, J. W. P. Hirschfeld:
A new lower bound for the smallest complete (k, n)-arc in $$\mathrm {PG}(2, q)$$ PG ( 2 , q ). 679-683 - Kévin Carrier, Jean-Pierre Tillich:
Identifying an unknown code by partial Gaussian elimination. 685-713
Volume 87, Number 4, April 2019
- Ilaria Cardinali, Michel Lavrauw, Klaus Metsch, Alexander Pott:
Preface to the special issue on finite geometries. 715-716 - Karen Meagher:
An Erdős-Ko-Rado theorem for the group $$\hbox {PSU}(3, q)$$ PSU ( 3 , q ). 717-744 - Marco Buratti:
On disjoint (v, k, k-1) difference families. 745-755 - Stefaan De Winter, Zeying Wang:
Non-existence of partial difference sets in Abelian groups of order 8p3. 757-768 - Marco Buratti, Francesca Merola:
Fano Kaleidoscopes and their generalizations. 769-784 - Ivan N. Landjev, Nevyana Georgieva:
Conditions for the existence of spreads in projective Hjelmslev spaces. 785-794 - Daniele Bartoli, Massimo Giulietti, Maria Montanucci:
Linear codes from Denniston maximal arcs. 795-806 - Stefaan De Winter, Cunsheng Ding, Vladimir D. Tonchev:
Maximal arcs and extended cyclic codes. 807-816 - Fernando Piñero, Prasant Singh:
The weight spectrum of certain affine Grassmann codes. 817-830 - Dieter Jungnickel, Spyros S. Magliveras, Vladimir D. Tonchev, Alfred Wassermann:
The classification of Steiner triple systems on 27 points with 3-rank 24. 831-839 - Assia Rousseva, Ivan N. Landjev:
Linear codes close to the Griesmer bound and the related geometric structures. 841-854 - Igor E. Shparlinski, Arne Winterhof:
Codes correcting restricted errors. 855-863 - Aart Blokhuis, Leo Storme, Tamás Szonyi:
Relative blocking sets of unions of Baer subplanes. 865-877 - Jan De Beule, Jeroen Demeyer, Sam Mattheus, Péter Sziklai:
On the cylinder conjecture. 879-893 - Hiroaki Taniguchi:
A variation of the dual hyperoval Sc using presemifields. 895-908 - Bart De Bruyn:
Three homogeneous embeddings of DW (2n-1, 2). 909-929 - Anton Betten, Fatma Karaoglu:
Cubic surfaces over small finite fields. 931-953
Volume 87, Number 5, May 2019
- Pascale Charpin, Philippe Langevin:
Obituary of Jacques Wolfmann (1932-2018). 955-956 - Alice M. W. Hui, Muhammad Adib Surani, Sanming Zhou:
The vertex-isoperimetric number of the incidence and non-incidence graphs of unitals. 957-970 - Yuqing Zhu, Jincheng Zhuang, Hairong Yi, Chang Lv, Dongdai Lin:
A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity. 971-986 - Mariusz Meszka, Magdalena Tyniec:
Orthogonal one-factorizations of complete multipartite graphs. 987-993 - Alexander M. Romanov:
On non-full-rank perfect codes over finite fields. 995-1003 - Junji Shikata, Yohei Watanabe:
Identity-based encryption with hierarchical key-insulation in the standard model. 1005-1033 - Yanbin Li, Meiqin Wang:
Cryptanalysis of MORUS. 1035-1058 - Shoko Chisaki, Yui Kimura, Nobuko Miyamoto:
A recursive construction for difference systems of sets. 1059-1068 - Giacomo Micheli, Violetta Weger:
Cryptanalysis of the CLR-cryptosystem. 1069-1086 - Ziling Heng, Cunsheng Ding:
A construction of q-ary linear codes with irreducible cyclic codes. 1087-1108 - Darcy Best, Trent G. Marbach, Rebecca J. Stones, Ian M. Wanless:
Covers and partial transversals of Latin squares. 1109-1136 - Zuling Chang, Martianus Frederic Ezerman, San Ling, Huaxiong Wang:
On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials. 1137-1160 - Huiqin Xie, Li Yang:
Using Bernstein-Vazirani algorithm to attack block ciphers. 1161-1182 - Vladimir Edemskiy, Chunlei Li, Xiangyong Zeng, Tor Helleseth:
The linear complexity of generalized cyclotomic binary sequences of period pn. 1183-1197
Volume 87, Number 6, June 2019
- A. J. van Zanten:
Primitive idempotent tables of cyclic and constacyclic codes. 1199-1225 - Hiroki Koike, István Kovács, Dragan Marusic, Mikhail E. Muzychuk:
Cyclic groups are CI-groups for balanced configurations. 1227-1235 - Tsuyoshi Miezaki, Manabu Oura:
On the cycle index and the weight enumerator. 1237-1242 - Jerod Michel, Qi Wang:
Almost difference sets in nonabelian groups. 1243-1251 - Serhii Dyshko:
The extension theorem for Lee and Euclidean weight codes over integer residue rings. 1253-1269 - Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang:
MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes. 1271-1296 - Chun Guo, Yaobin Shen, Lei Wang, Dawu Gu:
Beyond-birthday secure domain-preserving PRFs from a single permutation. 1297-1322 - Oriol Farràs, Jordi Ribes-González, Sara Ricci:
Local bounds for the optimal information ratio of secret sharing schemes. 1323-1344 - Zhengan Huang, Junzuo Lai, Wenbin Chen, Man Ho Au, Zhen Peng, Jin Li:
Simulation-based selective opening security for receivers under chosen-ciphertext attacks. 1345-1371 - David Derler, Daniel Slamanig:
Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge. 1373-1413 - Yanxun Chang, Hao Zheng, Junling Zhou:
Existence of frame-derived H-designs. 1415-1431 - Daniele Bartoli, Matteo Bonini:
Minimum weight codewords in dual algebraic-geometric codes from the Giulietti-Korchmáros curve. 1433-1445 - Minjia Shi, Yan Liu, Hugues Randriam, Lin Sok, Patrick Solé:
Trace codes over Z4, and Boolean functions. 1447-1455 - Ferdinand Ihringer, Karen Meagher:
Correction to: Miklós-Manickam-Singhi conjectures on partial geometries. 1457
Volume 87, Number 7, July 2019
- Giorgos Kapetanakis, Lucas Reis:
Variations of the Primitive Normal Basis Theorem. 1459-1480 - Shihui Fu, Xiutao Feng, Dongdai Lin, Qiang Wang:
A recursive construction of permutation polynomials over Fq2 with odd characteristic related to Rédei functions. 1481-1498 - Tao Feng, Lidong Wang, Xiaomiao Wang:
Optimal 2-D (n × m , 3 , 2 , 1)-optical orthogonal codes and related equi-difference conflict avoiding codes. 1499-1520 - Tran van Trung:
On existence theorems for simple t-designs. 1521-1540 - Julien Lavauzelle:
Lifted projective Reed-Solomon codes. 1541-1575 - Claude Carlet, Xi Chen, Longjiang Qu:
Constructing infinite families of low differential uniformity (n, m)-functions with m > n / 2. 1577-1599 - Keju Meng, Fuyou Miao, Yue Yu:
A secure and efficient on-line/off-line group key distribution protocol. 1601-1620 - Benoît Cogliati, Titouan Tanguy:
Multi-user security bound for filter permutators in the random oracle model. 1621-1638 - John B. Polhill:
A new family of partial difference sets in 3-groups. 1639-1646 - Dongdong Jia, Sumei Zhang, Gengsheng Zhang:
Erasure combinatorial batch codes based on nonadaptive group testing. 1647-1656 - Lucas Reis:
Factorization of a class of composed polynomials. 1657-1671 - Matthew Fickus, John Jasper:
Equiangular tight frames from group divisible designs. 1673-1697 - Sabyasachi Dutta, Avishek Adhikari, Sushmita Ruj:
Maximal contrast color visual secret sharing schemes. 1699-1711
Volume 87, Number 8, August 2019
- Xing Liu, Liang Zhou:
Improved Singleton bound on frequency hopping sequences and optimal constructions. 1713-1733 - Xing Liu, Liang Zhou:
Correction to: Improved Singleton bound on frequency hopping sequences and optimal constructions. 1735-1736 - Léo Ducas, Cécile Pierrot:
Polynomial time bounded distance decoding near Minkowski's bound in discrete logarithm lattices. 1737-1748 - Qichun Wang, Pantelimon Stanica:
A trigonometric sum sharp estimate and new bounds on the nonlinearity of some cryptographic Boolean functions. 1749-1763 - Keisuke Shiromoto:
Codes with the rank metric and matroids. 1765-1776 - Mahdi Cheraghchi:
Nearly optimal robust secret sharing. 1777-1796 - Jian Liu, Sihem Mesnager:
Weightwise perfectly balanced functions with high weightwise nonlinearity profile. 1797-1813 - Xiang-Dong Hou:
Optimal binary constant weight codes and affine linear groups over finite fields. 1815-1838 - Aart Blokhuis, Maarten De Boeck, Jozefien D'haeseleer:
Cameron-Liebler sets of k-spaces in $${{\mathrm{PG}}}(n, q)$$ PG ( n , q ). 1839-1856 - Minjia Shi, Daitao Huang, Denis S. Krotov:
Additive perfect codes in Doob graphs. 1857-1869 - Torger Olson, Eric Swartz:
Transitive PSL(2, 11)-invariant k-arcs in PG(4, q). 1871-1879 - Andries E. Brouwer, Sven C. Polak:
Uniqueness of codes using semidefinite programming. 1881-1895 - Itai Dinur:
An algorithmic framework for the generalized birthday problem. 1897-1926 - Yansheng Wu, Qin Yue, Xueying Shi:
At most three-weight binary linear codes from generalized Moisio's exponential sums. 1927-1943
Volume 87, Number 9, September 2019
- Jerod Michel, Qi Wang:
Almost designs and their links with balanced incomplete block designs. 1945-1960 - Ching-Yi Lai, Kai-Min Chung:
Quantum encryption and generalized Shannon impossibility. 1961-1972 - Hiroaki Taniguchi:
On some quadratic APN functions. 1973-1983 - Antonio Cossidente, Francesco Pavese:
On line covers of finite projective and polar spaces. 1985-2002 - Miao Liang, Lijun Ji:
On (t, L)-fold perfect authentication and secrecy codes with arbitration. 2003-2026 - Cícero Carvalho, Xavier Ramírez-Mondragón, Victor G. L. Neumann, Horacio Tapia-Recillas:
Projective Reed-Muller type codes on higher dimensional scrolls. 2027-2042 - Qichun Wang, Pantelimon Stanica:
Transparency order for Boolean functions: analysis and construction. 2043-2059 - Yanwei Zhou, Bo Yang, Yi Mu:
Continuous leakage-resilient identity-based encryption with leakage amplification. 2061-2090 - Minjia Shi, Denis S. Krotov, Patrick Solé:
A new distance-regular graph of diameter 3 on 1024 vertices. 2091-2101 - Minjia Shi, Denis S. Krotov, Patrick Solé:
Correction to: A new distance-regular graph of diameter 3 on 1024 vertices. 2103 - Sergey Bereg, Zevi Miller, Luis Gerardo Mojica, Linda Morales, Ivan Hal Sudborough:
New lower bounds for permutation arrays using contraction. 2105-2128 - Peter Vandendriessche:
On KM-arcs in non-Desarguesian projective planes. 2129-2137 - Gregory Maxwell, Andrew Poelstra, Yannick Seurin, Pieter Wuille:
Simple Schnorr multi-signatures with applications to Bitcoin. 2139-2164 - Xueying Shi, Qin Yue, Yansheng Wu:
The dual-containing primitive BCH codes with the maximum designed distance and their applications to quantum codes. 2165-2183
Volume 87, Number 10, October 2019
- Xin Wang, Jie Cui, Lijun Ji:
Linear (2, p, p)-AONTs exist for all primes p. 2185-2197 - Nuh Aydin, Jonathan G. G. Lambrinos, Oliver VandenBerg:
On equivalence of cyclic codes, generalization of a quasi-twisted search algorithm, and new linear codes. 2199-2212 - Liang Bai, Zihui Liu:
On the third greedy weight of 4-dimensional codes. 2213-2230 - Matvei Kotov, Anton Menshov, Alexander Ushakov:
An attack on the Walnut digital signature algorithm. 2231-2250 - Junying Liu, Yupeng Jiang, Qunxiong Zheng, Dongdai Lin:
A new construction of zero-difference balanced functions and two applications. 2251-2265 - Tian Tian, Jia-Min Zhang, Wen-Feng Qi:
On the uniqueness of a type of cascade connection representations for NFSRs. 2267-2294 - Umberto Martínez-Peñas:
Theory of supports for linear codes endowed with the sum-rank metric. 2295-2320 - Qichun Wang:
Hadamard matrices, d-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights. 2321-2333 - Reza Sobhani, Alireza Abdollahi, Javad Bagherian, Maryam Khatami:
A note on good permutation codes from Reed-Solomon codes. 2335-2340 - Hadi Kharaghani, Sho Suda:
Linked systems of symmetric group divisible designs of type II. 2341-2360 - Jon-Lark Kim, Junyong Park, Soohak Choi:
Steganographic schemes from perfect codes on Cayley graphs. 2361-2374 - Bhaskar Bagchi:
A coding theoretic approach to the uniqueness conjecture for projective planes of prime order. 2375-2389 - Minglong Qi, Shengwu Xiong:
A correction to: on the linear complexity of the Sidelnikov-Lempel-Cohn-Eastman sequences. 2391-2393 - Minjia Shi, Patrick Solé:
Three-weight codes, triple sum sets, and strongly walk regular graphs. 2395-2404 - José Andrés Armario, Dane L. Flannery:
Generalized binary arrays from quasi-orthogonal cocycles. 2405-2417 - Yuan Cao, Yonglin Cao, Steven T. Dougherty, San Ling:
Construction and enumeration for self-dual cyclic codes over Z4 of oddly even length. 2419-2446 - Shuxing Li:
On the weight distribution of second order Reed-Muller codes and their relatives. 2447-2460
Volume 87, Number 11, November 2019
- Marco Buratti, Dieter Jungnickel:
Partitioned difference families versus zero-difference balanced functions. 2461-2467 - Ana-Isabel Gómez, Domingo Gómez-Pérez, Guénaël Renault:
A probabilistic analysis on a lattice attack against DSA. 2469-2488 - Masaya Yasuda, Junpei Yamaguchi:
A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths. 2489-2505 - Iwan M. Duursma:
Matrix theory for minimal trellises. 2507-2536 - Min Kyu Song, Hong-Yeop Song:
Hamming correlation properties of the array structure of Sidelnikov sequences. 2537-2551 - Yupu Hu, Huiwen Jia:
A new Gaussian sampling for trapdoor lattices with arbitrary modulus. 2553-2570 - John Sheekey:
Binary additive MRD codes with minimum distance n-1 must contain a semifield spread set. 2571-2583 - Yi Ouyang, Xianhong Xie:
Linear complexity of generalized cyclotomic sequences of period 2pm. 2585-2596 - Sihem Mesnager, Fengrong Zhang, Chunming Tang, Yong Zhou:
Further study on the maximum number of bent components of vectorial functions. 2597-2610 - Yiwei Zhang, Gennian Ge:
A general private information retrieval scheme for MDS coded databases with colluding servers. 2611-2623 - Zixiang Xu, Yiwei Zhang, Gennian Ge:
New theoretical bounds and constructions of permutation codes under block permutation metric. 2625-2637 - Theodoulos Garefalakis, Giorgos Kapetanakis:
Further Results on the Morgan-Mullen Conjecture. 2639-2654 - Jerod Michel, Qi Wang:
Partial geometric designs from group actions. 2655-2670 - Kevin M. Byrnes:
The maximum length of circuit codes with long bit runs and a new characterization theorem. 2671-2681 - Dong Yang, Wen-Feng Qi, Hua-Jin Chen:
Provable security against impossible differential and zero correlation linear cryptanalysis of some feistel structures. 2683-2700 - Siaw-Lynn Ng, Maura B. Paterson:
Functional repair codes: a view from projective geometry. 2701-2722 - Xiaoqin Zhan, Suyun Ding, Shuyi Bai:
Flag-transitive 2-designs from PSL(2, q) with block size 4. 2723-2728
Volume 87, Number 12, December 2019
- Peter J. Dukes, Esther R. Lamken:
Constructions and uses of incomplete pairwise balanced designs. 2729-2751 - Chong Shangguan, Gennian Ge:
A new piggybacking design for systematic MDS storage codes. 2753-2770 - Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco:
New covering codes of radius R, codimension tR and $$tR+\frac{R}{2}$$, and saturating sets in projective spaces. 2771-2792 - Chunming Tang, Cunsheng Ding, Maosheng Xiong:
Steiner systems $$S(2, 4, \frac{3^m-1}{2})$$ and 2-designs from ternary linear codes of length $$\frac{3^m-1}{2}$$. 2793-2811 - Claude Carlet, Chengju Li, Sihem Mesnager:
Some (almost) optimally extendable linear codes. 2813-2834 - Tran van Trung:
Recursive constructions for s-resolvable t-designs. 2835-2845 - Ron Steinfeld, Amin Sakzad, Raymond K. Zhao:
Practical $$\mathsf {MP} \text{- }\mathsf {LWE} $$ -based encryption balancing security-risk versus efficiency. 2847-2884 - Guomin Yang, Rongmao Chen, Yi Mu, Willy Susilo, Fuchun Guo, Jie Li:
Strongly leakage resilient authenticated key exchange, revisited. 2885-2911 - Qi Chen, Chunming Tang, Zhiqiang Lin:
Efficient explicit constructions of compartmented secret sharing schemes. 2913-2940 - San Ling, Buket Özkaya:
Multidimensional quasi-twisted codes: equivalent characterizations and their relation to multidimensional convolutional codes. 2941-2965 - Dávid Mezofi, Gábor Péter Nagy:
On the geometry of full points of abstract unitals. 2967-2978 - Terry Shue Chien Lau, Chik How Tan:
New rank codes based encryption scheme using partial circulant matrices. 2979-2999 - Qian Wang, Chenhui Jin:
More accurate results on the provable security of AES against impossible differential cryptanalysis. 3001-3018 - Julia Lieb:
Necessary field size and probability for MDP and complete MDP convolutional codes. 3019-3043 - Yujuan Sun, Jia-Fang Zhang, Sugata Gangopadhyay:
Construction of resilient Boolean functions in odd variables with strictly almost optimal nonlinearity. 3045-3062 - Claude Carlet, Chengju Li, Sihem Mesnager:
Linear codes with small hulls in semi-primitive case. 3063-3075 - Zihui Liu, Jinliang Wang:
Linear complementary dual codes over rings. 3077-3086
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.