Journal: Des. Codes Cryptography

Volume 87, Issue 7

1459 -- 1480Giorgos Kapetanakis, Lucas Reis. Variations of the Primitive Normal Basis Theorem
1481 -- 1498Shihui Fu, Xiutao Feng, Dongdai Lin, Qiang Wang. 2 with odd characteristic related to Rédei functions
1499 -- 1520Tao Feng, Lidong Wang, Xiaomiao Wang. Optimal 2-D (n × m , 3 , 2 , 1)-optical orthogonal codes and related equi-difference conflict avoiding codes
1521 -- 1540Tran van Trung. On existence theorems for simple t-designs
1541 -- 1575Julien Lavauzelle. Lifted projective Reed-Solomon codes
1577 -- 1599Claude Carlet, Xi Chen 0013, Longjiang Qu. Constructing infinite families of low differential uniformity (n, m)-functions with m > n / 2
1601 -- 1620Keju Meng, Fuyou Miao, Yue Yu. A secure and efficient on-line/off-line group key distribution protocol
1621 -- 1638Benoît Cogliati, Titouan Tanguy. Multi-user security bound for filter permutators in the random oracle model
1639 -- 1646John B. Polhill. A new family of partial difference sets in 3-groups
1647 -- 1656Dongdong Jia, Sumei Zhang, Gengsheng Zhang. Erasure combinatorial batch codes based on nonadaptive group testing
1657 -- 1671Lucas Reis. Factorization of a class of composed polynomials
1673 -- 1697Matthew Fickus, John Jasper. Equiangular tight frames from group divisible designs
1699 -- 1711Sabyasachi Dutta, Avishek Adhikari, Sushmita Ruj. Maximal contrast color visual secret sharing schemes