Journal: Des. Codes Cryptography

Volume 76, Issue 2

135 -- 171Mauro Biliotti, Alessandro Montinaro, Eliana Francot. 2-(v, k, 1) Designs with a point-primitive rank 3 automorphism group of affine type
173 -- 178Ferruh Özbudak, Seher Tutdere, Oguz Yayla. On some bounds on the minimum distance of cyclic codes over finite fields
179 -- 205Jooyoung Lee, Martijn Stam. MJH: a faster alternative to MDC-2
207 -- 216Tamás Héger, Balázs Patkós, Marcella Takáts. Search problems in vector spaces
217 -- 235T. Shaska, C. Shor. Theta functions and symmetric weight enumerators for codes over imaginary quadratic fields
237 -- 256Darcy Best, Hadi Kharaghani, Hugh Ramp. Mutually unbiased weighing matrices
257 -- 267Edward Dobson. Monomial isomorphisms of cyclic codes
269 -- 277José Joaquín Bernal, Joaquim Borges, Cristina Fernández-Córdoba, Mercè Villanueva. 4-linear codes
279 -- 305Jiao Li, Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu, Jinyong Shan. Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks
307 -- 323Eric Zhi Chen. A new iterative computer search algorithm for good quasi-twisted codes
325 -- 344Thomas Plantard, Willy Susilo, Zhenfei Zhang. LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme
345 -- 360Sihuang Hu, Shuxing Li, Tao Zhang, Tao Feng, Gennian Ge. New pseudo-planar binomials in characteristic two and related schemes
361 -- 372Yuan-Hsun Lo, Hung-Lin Fu, Yi-Hean Lin. Weighted maximum matchings and optimal equi-difference conflict-avoiding codes