Journal: Des. Codes Cryptography

Volume 89, Issue 5

763 -- 780Tsuyoshi Miezaki. Design-theoretic analogies between codes, lattices, and vertex operator algebras
781 -- 795Zhaoping Meng, Bin Zhang, Zhanggui Wu. Constructions of doubly resolvable Steiner quadruple systems
797 -- 809Hualu Liu, Peng Hu, Xiusheng Liu. Asymmetric entanglement-assisted quantum codes: bound and constructions
811 -- 821Simeon Ball. Some constructions of quantum MDS codes
823 -- 841Lin Sok. New families of self-dual codes
843 -- 858Tsuyoshi Miezaki, Akihiro Munemasa, Hiroyuki Nakasora. A note on Assmus-Mattson type theorems
859 -- 893Bart Mennink, Samuel Neves. On the Resilience of Even-Mansour to Invariant Permutations
895 -- 923Dingding Jia, BenoƮt Libert. SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions
925 -- 963Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu. Lattice-based zero-knowledge arguments for additive and multiplicative relations
965 -- 972Angela Aguglia, Luca Giuzzi, Angelo Sonnino. Near-MDS codes from elliptic curves
973 -- 1016Wonhee Cho, Jiseung Kim 0001, Changmin Lee. (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
1017 -- 1059Nan Cui, Shengli Liu, Dawu Gu, Jian Weng 0001. Robustly reusable fuzzy extractor with imperfect randomness
1061 -- 1090Masoumeh Shafieinejad, Navid Nasr Esfahani. A scalable post-quantum hash-based group signature
1091 -- 1109Ankur, Pramod Kumar Kewat. Self-dual codes over ${\mathbb {F}}_2[u]/\langle u^4 \rangle $ and Jacobi forms over a totally real subfield of ${\mathbb {Q}}(\zeta _8)$