Journal: Des. Codes Cryptography

Volume 83, Issue 2

233 -- 267Daniele Bartoli, Stefano Marcugini, Fernanda Pambianco. On the completeness of plane cubic curves over finite fields
269 -- 282Angela Aguglia, Luca Giuzzi. Intersection sets, three-character multisets and associated codes
283 -- 305Margreta Kuijper, R. Pinto. An iterative algorithm for parametrization of shortest length linear shift registers over finite chain rings
307 -- 326Ziling Heng, Qin Yue. Evaluation of the Hamming weights of a class of linear codes based on Gauss sums
327 -- 343Mahdi Sajadieh, Arash Mirzaei, Hamid Mala, Vincent Rijmen. A new counting method to bound the number of active S-boxes in Rijndael and 3D
345 -- 356Ignacio F. Rúa. 4e 2 4 e
357 -- 406Bart Mennink. Optimal collision security in double block length hashing with single length key
407 -- 423Yiyuan Luo, Xuejia Lai, Yujie Zhou. Generic attacks on the Lai-Massey scheme
425 -- 443Jingxue Ma, Tao Zhang, Tao Feng, Gennian Ge. Some new results on permutation polynomials over finite fields
445 -- 454Yupeng Jiang, Jiangshuai Yang. On the number of irreducible linear transformation shift registers
455 -- 465Xiang Wang, Fang-Wei Fu. On the snake-in-the-box codes for rank modulation under Kendall's τ -metric
467 -- 492Yonglin Hao, Willi Meier. Truncated differential based known-key attacks on round-reduced SIMON