Journal: Des. Codes Cryptography

Volume 89, Issue 8

1757 -- 1786Junqing Gong, Haifeng Qian. Simple and efficient FE for quadratic functions
1787 -- 1837Varsha Chauhan, Anuradha Sharma, Sandeep Sharma, Monika Yadav. Hamming weight distributions of multi-twisted codes over finite fields
1839 -- 1852Shoko Chisaki, Ryoh Fuji-Hara, Nobuko Miyamoto. A construction for circulant type dropout designs
1853 -- 1873Giovanni Zini, Ferdinando Zullo. Scattered subspaces and related codes
1875 -- 1905Ling Song 0001, Yi Tu, Danping Shi, Lei Hu. Security analysis of Subterranean 2.0
1907 -- 1926Sebati Ghosh, Palash Sarkar 0001. Breaking tweakable enciphering schemes using Simon's algorithm
1927 -- 1963Atsushi Takayasu. Tag-based ABE in prime-order groups via pair encoding
1965 -- 1992Atsushi Takayasu. Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity
1993 -- 2007Ziling Heng, Dexiang Li, Jiao Du, Fuling Chen. A family of projective two-weight linear codes
2009 -- 2030Xiaoqiang Wang 0001, Dabin Zheng, Yan Zhang. Binary linear codes with few weights from Boolean functions
2031 -- 0Ruikai Chen, Sihem Mesnager, Chang-An Zhao. Correction to: Good polynomials for optimal LRC of low locality