Journal: Des. Codes Cryptography

Volume 89, Issue 7

1367 -- 1403Hiram H. López, Ivan Soprunov, Rafael H. Villarreal. The dual of an evaluation code
1405 -- 1432Tairong Shi, Wenling Wu, Bin Hu 0011, Jie Guan, Sengpeng Wang. Breaking LWC candidates: sESTATE and Elephant in quantum setting
1433 -- 1452Mahdi Sajadieh, Mohsen Mousavi. Construction of MDS matrices from generalized Feistel structures
1453 -- 1483Yumeng Yang, Xiangyong Zeng, Shi Wang. Construction of lightweight involutory MDS matrices
1485 -- 1507Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei. Wide minimal binary linear codes from the general Maiorana-McFarland class
1509 -- 1534Kanat S. Abdukhalikov. Equivalence classes of Niho bent functions
1535 -- 1574Keita Emura, Atsushi Takayasu, Yohei Watanabe 0001. Adaptively secure revocable hierarchical IBE from k-linear assumption
1575 -- 1614Yanwei Zhou, Bo Yang 0003, Zhe Xia, Mingwu Zhang, Yi Mu 0001. Novel generic construction of leakage-resilient PKE scheme with CCA security
1615 -- 1638Steven T. Dougherty, Joe Gildea, Adrian Korban, Abidin Kaya. Composite matrices from group rings, composite G-codes and constructions of self-dual codes
1639 -- 1660Ruikai Chen, Sihem Mesnager, Chang-An Zhao. Good polynomials for optimal LRC of low locality
1661 -- 1690Tuvi Etzion, Junling Zhou. Large sets with multiplicity
1691 -- 1712Huaning Liu, Xi Liu. m
1713 -- 1734Cunsheng Ding, Chunming Tang 0001, Vladimir D. Tonchev. m+1
1735 -- 1756Oriol Farràs, Jordi Ribes-González, Sara Ricci. Privacy-preserving data splitting: a combinatorial approach