Journal: Des. Codes Cryptography

Volume 87, Issue 11

2461 -- 2467Marco Buratti, Dieter Jungnickel. Partitioned difference families versus zero-difference balanced functions
2469 -- 2488Ana-Isabel Gómez, Domingo Gómez-Pérez, Guénaël Renault. A probabilistic analysis on a lattice attack against DSA
2489 -- 2505Masaya Yasuda, Junpei Yamaguchi. A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths
2507 -- 2536Iwan M. Duursma. Matrix theory for minimal trellises
2537 -- 2551Min Kyu Song, Hong-Yeop Song. Hamming correlation properties of the array structure of Sidelnikov sequences
2553 -- 2570Yupu Hu, Huiwen Jia. A new Gaussian sampling for trapdoor lattices with arbitrary modulus
2571 -- 2583John Sheekey. Binary additive MRD codes with minimum distance n-1 must contain a semifield spread set
2585 -- 2596Yi Ouyang, Xianhong Xie. m
2597 -- 2610Sihem Mesnager, Fengrong Zhang, Chunming Tang, Yong Zhou 0003. Further study on the maximum number of bent components of vectorial functions
2611 -- 2623YiWei Zhang, Gennian Ge. A general private information retrieval scheme for MDS coded databases with colluding servers
2625 -- 2637Zixiang Xu, YiWei Zhang, Gennian Ge. New theoretical bounds and constructions of permutation codes under block permutation metric
2639 -- 2654Theodoulos Garefalakis, Giorgos Kapetanakis. Further Results on the Morgan-Mullen Conjecture
2655 -- 2670Jerod Michel, Qi Wang 0012. Partial geometric designs from group actions
2671 -- 2681Kevin M. Byrnes. The maximum length of circuit codes with long bit runs and a new characterization theorem
2683 -- 2700Dong Yang, Wen-Feng Qi, Hua-Jin Chen. Provable security against impossible differential and zero correlation linear cryptanalysis of some feistel structures
2701 -- 2722Siaw-Lynn Ng, Maura B. Paterson. Functional repair codes: a view from projective geometry
2723 -- 2728Xiaoqin Zhan, Suyun Ding, Shuyi Bai. Flag-transitive 2-designs from PSL(2, q) with block size 4