default search action
Designs, Codes and Cryptography, Volume 89
Volume 89, Number 1, January 2021
- Sihem Mesnager, Sihong Su, Hui Zhang:
A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity. 1-17 - Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa:
Generalized isotopic shift construction for APN functions. 19-32 - Marco Calderini:
Differentially low uniform permutations from known 4-uniform functions. 33-52 - Paulo José Fernandes Almeida, Diego Napp Avelli:
A new rank metric for convolutional codes. 53-73 - Wilfried Meidl, Isabel Pirsic:
Bent and ${{\mathbb {Z}}}_{2^k}$-Bent functions from spread-like partitions. 75-89 - Xin Wang:
Improved upper bounds for parent-identifying set systems and separable codes. 91-104 - Matthias Grezet, Camilla Hollanti:
The complete hierarchical locality of the punctured Simplex code. 105-125 - Pranab Chakraborty, Subhamoy Maitra:
Further clarification on Mantin's Digraph Repetition Bias in RC4. 127-141 - Michael Bamiloshin, Aner Ben-Efraim, Oriol Farràs, Carles Padró:
Common information, matroid representation, and secret sharing for matroid ports. 143-166 - Alexey Oblaukhov:
On metric regularity of Reed-Muller codes. 167-197
Volume 89, Number 2, February 2021
- Edoardo Ballico, Giuseppe Favacchio, Elena Guardo, Lorenzo Milazzo:
Steiner systems and configurations of points. 199-219 - Sartaj Ul Hasan, Mohit Pal, Constanza Riera, Pantelimon Stanica:
On the c-differential uniformity of certain maps over finite fields. 221-239 - Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao:
Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity. 241-253 - Jingkun Zhou, Zhiwen He, Zhao Chai:
Two kinds of constructions of directed strongly regular graphs. 255-268 - Delio Jaramillo, Maria Vaz Pinto, Rafael H. Villarreal:
Evaluation codes and their basic parameters. 269-300 - Cícero Carvalho, Victor G. L. Neumann:
Towards the Complete Determination of Next-to-Minimal Weights of Projective Reed-Muller Codes. 301-315 - Chen-Dong Ye, Tian Tian, Fan-Yang Zeng:
The MILP-aided conditional differential attack and its application to Trivium. 317-339 - Eiichi Bannai, Manabu Oura, Da Zhao:
The complex conjugate invariants of Clifford groups. 341-350 - Julian Renner, Alessandro Neri, Sven Puchinger:
Low-rank parity-check codes over Galois rings. 351-386 - Trygve Johnsen, Hugues Verdure:
Greedy weights for matroids. 387-405
Volume 89, Number 3, March 2021
- Chun Guo, Guoyan Zhang:
Beyond-birthday security for permutation-based Feistel networks. 407-440 - Claude Carlet, Kwang Ho Kim, Sihem Mesnager:
A direct proof of APN-ness of the Kasami functions. 441-446 - Heide Gluesing-Luerssen, Hunter Lehmann:
Distance Distributions of Cyclic Orbit Codes. 447-470 - Daniele Bartoli, Matteo Bonini, Marco Timpanella:
On the weight distribution of some minimal codes. 471-487 - Stefano Innamorati, Fulvio Zuanni:
Classifying sets of class [1, q+1, 2q+1, q2+q+1]2 in PG(r, q), $r\ge 3$. 489-496 - Hiram H. López, Beth Malmskog, Gretchen L. Matthews, Fernando Piñero-González, Mary Wootters:
Hermitian-lifted codes. 497-515 - James A. Davis, J. J. Hoo, Connor Kissane, Ziming Liu, Calvin Reedy, Kartikey Sharma, Ken Smith, Yiwei Sun:
Abelian difference sets with the symmetric difference property. 517-523 - Nicholas J. Cavenagh, Adam Mammoliti, Ian M. Wanless:
Maximal sets of mutually orthogonal frequency squares. 525-558 - Sascha Kurz, Eitan Yaakobi:
PIR Codes with Short Block Length. 559-587 - Tran van Trung:
An extending theorem for s-resolvable t-designs. 589-597
Volume 89, Number 4, April 2021
- José Andrés Armario, Iván Bailera, Ronan Egan:
Generalized Hadamard full propelinear codes. 599-615 - Makoto Araya, Masaaki Harada, Ken Saito:
Characterization and classification of optimal LCD codes. 617-640 - Tania Sidana, Anuradha Sharma:
Roulette games and depths of words over finite commutative rings. 641-678 - Zhongxiao Wang, Qunxiong Zheng, Xiao-Xin Zhao, Xiutao Feng:
Grain-like structures with minimal and maximal period sequences. 679-693 - Yuhua Sun, Tongjiang Yan, Qiuyan Wang:
The 2-adic complexity of Yu-Gong sequences with interleaved structure and optimal autocorrelation magnitude. 695-707 - Sebati Ghosh, Palash Sarkar:
Variants of Wegman-Carter message authentication code supporting variable tag lengths. 709-736 - Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
Cryptographically strong permutations from the butterfly structure. 737-761
Volume 89, Number 5, May 2021
- Tsuyoshi Miezaki:
Design-theoretic analogies between codes, lattices, and vertex operator algebras. 763-780 - Zhaoping Meng, Bin Zhang, Zhanggui Wu:
Constructions of doubly resolvable Steiner quadruple systems. 781-795 - Hualu Liu, Peng Hu, Xiusheng Liu:
Asymmetric entanglement-assisted quantum codes: bound and constructions. 797-809 - Simeon Ball:
Some constructions of quantum MDS codes. 811-821 - Lin Sok:
New families of self-dual codes. 823-841 - Tsuyoshi Miezaki, Akihiro Munemasa, Hiroyuki Nakasora:
A note on Assmus-Mattson type theorems. 843-858 - Bart Mennink, Samuel Neves:
On the Resilience of Even-Mansour to Invariant Permutations. 859-893 - Dingding Jia, Benoît Libert:
SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions. 895-923 - Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu:
Lattice-based zero-knowledge arguments for additive and multiplicative relations. 925-963 - Angela Aguglia, Luca Giuzzi, Angelo Sonnino:
Near-MDS codes from elliptic curves. 965-972 - Wonhee Cho, Jiseung Kim, Changmin Lee:
(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps. 973-1016 - Nan Cui, Shengli Liu, Dawu Gu, Jian Weng:
Robustly reusable fuzzy extractor with imperfect randomness. 1017-1059 - Masoumeh Shafieinejad, Navid Nasr Esfahani:
A scalable post-quantum hash-based group signature. 1061-1090 - Ankur, Pramod Kumar Kewat:
Self-dual codes over ${\mathbb {F}}_2[u]/\langle u^4 \rangle $ and Jacobi forms over a totally real subfield of ${\mathbb {Q}}(\zeta _8)$. 1091-1109
Volume 89, Number 6, June 2021
- Hanwen Feng, Jianwei Liu, Dawei Li, Ya-Nan Li, Qianhong Wu:
Traceable ring signatures: general framework and post-quantum security. 1111-1145 - Huili Dong:
Flag-transitive 4-designs and PSL(2, q) groups. 1147-1157 - Jun Guo:
Cameron-Liebler sets in bilinear forms graphs. 1159-1180 - Haode Yan, Chengju Li:
Differential spectra of a class of power permutations with characteristic 5. 1181-1191 - Zhengbang Zha, Lei Hu:
Some classes of power functions with low c-differential uniformity over finite fields. 1193-1210 - Daniel R. Hawtin:
s-Elusive codes in Hamming graphs. 1211-1220 - Daniele Bartoli, Maria Montanucci, Giovanni Zini:
On certain self-orthogonal AG codes with applications to Quantum error-correcting codes. 1221-1239 - Himadri Shekhar Chakraborty, Tsuyoshi Miezaki:
Average of complete joint weight enumerators and self-dual codes. 1241-1254 - Jianfu Chen, Shenglin Zhou:
Flag-transitive, point-imprimitive 2-(v, k, λ ) symmetric designs with k and λ prime powers. 1255-1260 - Giovanni Falcone, Marco Pavone:
Binary Hamming codes and Boolean designs. 1261-1277 - Julian Renner, Sven Puchinger, Antonia Wachter-Zeh:
LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding. 1279-1319 - Jonathan S. Turner, Ilias S. Kotsireas, Dursun A. Bulutoglu, Andrew J. Geyer:
A Legendre pair of length 77 using complementary binary matrices with fixed marginals. 1321-1333 - Olive Chakraborty, Jean-Charles Faugère, Ludovic Perret:
Cryptanalysis of the extension field cancellation cryptosystem. 1335-1364 - Alexandr A. Polujan, Alexander Pott:
Correction to: Cubic bent functions outside the completed Maiorana-McFarland class. 1365-1366
Volume 89, Number 7, July 2021
- Hiram H. López, Ivan Soprunov, Rafael H. Villarreal:
The dual of an evaluation code. 1367-1403 - Tairong Shi, Wenling Wu, Bin Hu, Jie Guan, Sengpeng Wang:
Breaking LWC candidates: sESTATE and Elephant in quantum setting. 1405-1432 - Mahdi Sajadieh, Mohsen Mousavi:
Construction of MDS matrices from generalized Feistel structures. 1433-1452 - Yumeng Yang, Xiangyong Zeng, Shi Wang:
Construction of lightweight involutory MDS matrices. 1453-1483 - Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei:
Wide minimal binary linear codes from the general Maiorana-McFarland class. 1485-1507 - Kanat S. Abdukhalikov:
Equivalence classes of Niho bent functions. 1509-1534 - Keita Emura, Atsushi Takayasu, Yohei Watanabe:
Adaptively secure revocable hierarchical IBE from k-linear assumption. 1535-1574 - Yanwei Zhou, Bo Yang, Zhe Xia, Mingwu Zhang, Yi Mu:
Novel generic construction of leakage-resilient PKE scheme with CCA security. 1575-1614 - Steven T. Dougherty, Joe Gildea, Adrian Korban, Abidin Kaya:
Composite matrices from group rings, composite G-codes and constructions of self-dual codes. 1615-1638 - Ruikai Chen, Sihem Mesnager, Chang-An Zhao:
Good polynomials for optimal LRC of low locality. 1639-1660 - Tuvi Etzion, Junling Zhou:
Large sets with multiplicity. 1661-1690 - Huaning Liu, Xi Liu:
On the properties of generalized cyclotomic binary sequences of period 2pm. 1691-1712 - Cunsheng Ding, Chunming Tang, Vladimir D. Tonchev:
The projective general linear group ${\mathrm {PGL}}(2, 2^m)$ and linear codes of length 2m+1. 1713-1734 - Oriol Farràs, Jordi Ribes-González, Sara Ricci:
Privacy-preserving data splitting: a combinatorial approach. 1735-1756
Volume 89, Number 8, August 2021
- Junqing Gong, Haifeng Qian:
Simple and efficient FE for quadratic functions. 1757-1786 - Varsha Chauhan, Anuradha Sharma, Sandeep Sharma, Monika Yadav:
Hamming weight distributions of multi-twisted codes over finite fields. 1787-1837 - Shoko Chisaki, Ryoh Fuji-Hara, Nobuko Miyamoto:
A construction for circulant type dropout designs. 1839-1852 - Giovanni Zini, Ferdinando Zullo:
Scattered subspaces and related codes. 1853-1873 - Ling Song, Yi Tu, Danping Shi, Lei Hu:
Security analysis of Subterranean 2.0. 1875-1905 - Sebati Ghosh, Palash Sarkar:
Breaking tweakable enciphering schemes using Simon's algorithm. 1907-1926 - Atsushi Takayasu:
Tag-based ABE in prime-order groups via pair encoding. 1927-1963 - Atsushi Takayasu:
Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity. 1965-1992 - Ziling Heng, Dexiang Li, Jiao Du, Fuling Chen:
A family of projective two-weight linear codes. 1993-2007 - Xiaoqiang Wang, Dabin Zheng, Yan Zhang:
Binary linear codes with few weights from Boolean functions. 2009-2030 - Ruikai Chen, Sihem Mesnager, Chang-An Zhao:
Correction to: Good polynomials for optimal LRC of low locality. 2031
Volume 89, Number 9, September 2021
- Hadi Kharaghani, Thomas Pender, Sho Suda:
Balancedly splittable orthogonal designs and equiangular tight frames. 2033-2050 - Hongwei Liu, Shengwei Liu:
Construction of MDS twisted Reed-Solomon codes and LCD MDS codes. 2051-2065 - Péter Ligeti, Péter Sziklai, Marcella Takáts:
Generalized threshold secret sharing and finite geometry. 2067-2078 - Fatemeh Ghasemi, Reza Kaboli, Shahram Khazaei, Maghsoud Parviz, Mohammad-Mahdi Rafiei:
On ideal homomorphic secret sharing schemes and their decomposition. 2079-2096 - Nicolas Aragon, Marco Baldi, Jean-Christophe Deneuville, Karan Khathuria, Edoardo Persichetti, Paolo Santini:
Cryptanalysis of a code-based full-time signature. 2097-2112 - Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri:
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK. 2113-2155 - Edoardo Ballico:
Locally Recoverable Codes correcting many erasures over small fields. 2157-2162 - Trygve Johnsen, Hugues Verdure:
Möbius and coboundary polynomials for matroids. 2163-2177 - Xiaojing Chen, Shixin Zhu, Wan Jiang, Gaojun Luo:
A new family of EAQMDS codes constructed from constacyclic codes. 2179-2193 - Daitao Huang, Qin Yue, Yongfeng Niu, Xia Li:
MDS or NMDS self-dual codes from twisted generalized Reed-Solomon codes. 2195-2209
Volume 89, Number 10, October 2021
- Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco:
Twisted cubic and point-line incidence matrix in $\mathrm {PG}(3, q)$. 2211-2233 - Gianira N. Alfarano, Julia Lieb, Joachim Rosenthal:
Construction of LDPC convolutional codes via difference triangle sets. 2235-2254 - Ritam Bhaumik, Mridul Nandi, Anik Raychaudhuri:
Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff. 2255-2281 - Kanat S. Abdukhalikov, Duy Ho:
Extended cyclic codes, maximal arcs and ovoids. 2283-2294 - Masaaki Harada:
Construction of binary LCD codes, ternary LCD codes and quaternary Hermitian LCD codes. 2295-2312 - Ayça Çesmelioglu, Wilfried Meidl, Isabel Pirsic:
Vectorial bent functions and partial difference sets. 2313-2330 - Clementa Alonso-González, Miguel Ángel Navarro-Pérez:
Cyclic orbit flag codes. 2331-2356 - Yu-Chi Chen, Xin Xie, Hung-Yu Tsao, Raylin Tso:
Public key encryption with filtered equality test revisited. 2357-2372 - Charles J. Colbourn:
Egalitarian Steiner triple systems for data popularity. 2373-2395 - Keita Emura, Atsushi Takayasu, Yohei Watanabe:
Efficient identity-based encryption with Hierarchical key-insulation from HIBE. 2397-2431
Volume 89, Number 11, November 2021
- Michail I. Rozhkov, Alexander V. Sorokin:
Some conditions for absence of affine functions in NFSR output stream. 2433-2443 - Stefka Bouyuklieva:
Optimal binary LCD codes. 2445-2461 - Amar Bapic, Enes Pasalic:
A new method for secondary constructions of vectorial bent functions. 2463-2475 - Qian Wang, Chenhui Jin:
Bounding the length of impossible differentials for SPN block ciphers. 2477-2493 - Peng Hu, Xiusheng Liu:
Linear complementary pairs of codes over rings. 2495-2509 - Xiang Wang, Yuanjie Wang, Wenjuan Yin, Fang-Wei Fu:
Nonexistence of perfect permutation codes under the Kendall τ-metric. 2511-2531 - Xiaojing Chen, Shixin Zhu, Wan Jiang:
Cyclic codes and some new entanglement-assisted quantum MDS codes. 2533-2551 - Matthew Fickus, Joseph W. Iverson, John Jasper, Emily J. King:
Grassmannian codes from paired difference sets. 2553-2576 - Junichi Tomida, Yuto Kawahara, Ryo Nishimaki:
Fast, compact, and expressive attribute-based encryption. 2577-2626 - Sartaj Ul Hasan, Mohit Pal, Pantelimon Stanica:
Boomerang uniformity of a class of power maps. 2627-2636 - Yanan Wu, Nian Li, Xiangyong Zeng:
New PcN and APcN functions over finite fields. 2637-2651
Volume 89, Number 12, December 2021
- Laura Monroe:
Binary signed-digit integers and the Stern diatomic sequence. 2653-2662 - Jinjin Chai, Zilong Wang, Erzhong Xue:
Walsh spectrum and nega spectrum of complementary arrays. 2663-2677 - Binbin Pang, Shixin Zhu, Xiaoshan Kai:
Five families of the narrow-sense primitive BCH codes over finite fields. 2679-2696 - WeiGuo Zhang, Yujuan Sun, Enes Pasalic:
Three classes of balanced vectorial semi-bent functions. 2697-2714 - M. H. Ahmadi, N. Akhlaghinia, Gholamreza B. Khosrovshahi, S. Sadri:
New partitionings of complete designs. 2715-2723 - Simona Bonvicini, Marco Buratti, Martino Garonzi, Gloria Rinaldi, Tommaso Traetta:
The first families of highly symmetric Kirkman Triple Systems whose orders fill a congruence class. 2725-2757 - Sascha Kurz:
Bounds for flag codes. 2759-2785 - Chen-Dong Ye, Tian Tian:
An improved degree evaluation method of NFSR-based cryptosystems. 2787-2806 - Yiming Li, Shengli Liu, Shuai Han, Dawu Gu:
Pseudorandom functions in NC class from the standard LWE assumption. 2807-2839 - Hariom Sharma, R. K. Sharma:
Existence of primitive normal pairs with one prescribed trace over finite fields. 2841-2855 - Navid Nasr Esfahani, Douglas R. Stinson:
On security properties of all-or-nothing transforms. 2857-2867 - Ziran Tu, Xiangyong Zeng, Yupeng Jiang, Yan Li:
Binomial permutations over finite fields with even characteristic. 2869-2888
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.