Journal: Appl. Algebra Eng. Commun. Comput.

Volume 28, Issue 6

457 -- 467Yun Gao, Jian Gao, Tingting Wu, Fang-Wei Fu. 2-1〉
469 -- 495Zohreh Rajabi, Kazem Khashyarmanesh. Some cyclic codes from some monomials
497 -- 525Krzysztof Ziemianski. Spaces of directed paths on pre-cubical sets
527 -- 533Gerardo Vega. An improved method for determining the weight distribution of a family of q-ary cyclic codes
535 -- 547Xiaoni Du, Yunqi Wan. Linear codes from quadratic forms

Volume 28, Issue 5

351 -- 368Michele Rossi, Lea Terracini. A numerical ampleness criterion via Gale duality
369 -- 386W. Fish. Binary codes and permutation decoding sets from the graph products of cycles
387 -- 408Miriam Abdón, Robert Rolland. Hamming distances from a function to all codewords of a Generalized Reed-Muller code of order one
409 -- 424T. Aaron Gulliver, Masaaki Harada. Performance of ternary double circulant, double twistulant, and self-dual codes
425 -- 436Riccardo Aragona, Riccardo Longo, Massimiliano Sala. Several proofs of security for a tokenization algorithm
437 -- 456Ulrich Oberst. A constructive test for exponential stability of linear time-varying discrete-time systems

Volume 28, Issue 4

281 -- 282Marc Giusti, Kenza Guenda. Special issue "International Conference on Coding and Cryptography" Algiers, Algeria, November 2-5, 2015
283 -- 294Pierre-Louis Cayrel, Mohammed Meziani, Ousmane Ndiaye, Richard Lindner, Rosemberg Silva. A pseudorandom number generator based on worst-case lattice problems
295 -- 309Serhii Dyshko. Geometric approach to the MacWilliams Extension Theorem for codes over module alphabets
311 -- 320Fatmanur Gursoy, Elif Segah Oztas, Irfan Siap. Reversible DNA codes using skew polynomial rings
321 -- 338Jacques Patarin. Mirror theory and cryptography
339 -- 350Nuh Aydin, Nicholas Connolly, John Murphree. New binary linear codes from quasi-cyclic codes and an augmentation algorithm

Volume 28, Issue 3

193 -- 203László Mérai. Predicting the elliptic curve congruential generator
205 -- 214Alexander Bors. On the dynamics of endomorphisms of finite groups
215 -- 223Dabin Zheng, Zhen Chen. s + L(x)
225 -- 235B. Panbehkar, H. Doostie. An automatic semigroup of languages
237 -- 255Thierry Mefenza, Damien Vergnaud. Polynomial interpolation of the Naor-Reingold pseudo-random function
257 -- 279Yogesh Kumar, P. R. Mishra, N. Rajesh Pillai, Rajendra Kumar Sharma. n

Volume 28, Issue 2

99 -- 108Jiang Weng, Yunqi Dou, Chuangui Ma. New algorithm for the elliptic curve discrete logarithm problem with auxiliary inputs
109 -- 130Palash Sarkar, Shashank Singh 0001. A simple method for obtaining relations among factor basis elements for special hyperelliptic curves
131 -- 153Jian Gao, Fang-Wei Fu, Yun Gao. Some classes of linear codes over $$\mathbb {Z}_4+v\mathbb {Z}_4$$ and their applications to construct good and new $$\mathbb {Z}_4$$ -linear codes
155 -- 176Guangkui Xu, Xiwang Cao, Shanding Xu. Several classes of Boolean functions with few Walsh transform values
177 -- 192Haibo Hong, Licheng Wang, Haseeb Ahmad, Jun Shao, Yixian Yang. Minimal logarithmic signatures for one type of classical groups

Volume 28, Issue 1

1 -- 10Florian Luca, Pantelimon Stanica. Counting permutation equivalent degree six binary polynomials invariant under the cyclic group
11 -- 30Chengju Li, Qin Yue, Fang-Wei Fu. A construction of several classes of two-weight and three-weight linear codes
31 -- 78Graham H. Norton. On the annihilator ideal of an inverse form
79 -- 97Jon-Lark Kim, Nari Lee. Secret sharing schemes based on additive codes over GF(4)