Journal: Des. Codes Cryptography

Volume 92, Issue 6

1455 -- 1475Xiaoni Du, René Rodríguez, Hao Wu. Infinite families of minimal binary codes via Krawtchouk polynomials
1477 -- 1500Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso. Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
1501 -- 1516Laura Monroe. Optimal binary signed-digit representations of integers and the Stern polynomial
1517 -- 1531Zhaoping Meng, Qingling Gao, Zhanggui Wu. A recursive construction of doubly resolvable Steiner quadruple systems
1533 -- 1540Haode Yan, Yanan Yin. On the parameters of extended primitive cyclic codes and the related designs
1541 -- 1597Qiqi Lai, Feng-Hao Liu, Zhedong Wang. Leakage-resilient sf IBE/sf ABE with optimal leakage rates from lattices
1599 -- 1617Adam Michael Roberts. Self-dual codes from a block matrix construction characterised by group rings
1619 -- 1635Kanchan Singh, Ritesh Kumar Pathak, Sheo Kumar Singh. Linear codes associated to determinantal varieties in the space of hermitian matrices
1637 -- 1661Chun Guo, Yiyuan Luo, Chenyu Xiao. On the sequential indifferentiability of the Lai-Massey construction
1663 -- 1728Xinxin Gong, Yonglin Hao, Qingju Wang 0001. Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW
1729 -- 1746Yu-Chi Chen. A conceptually simple and generic construction of plaintext checkable encryption in the standard model
1747 -- 1759Alexander M. Romanov 0001. Perfect mixed codes from generalized Reed-Muller codes
1761 -- 1802Sabrina Kunzweiler. n)-isogenies
1803 -- 1821Angelot Behajaina, Martino Borello, Javier de la Cruz, Wolfgang Willems. Twisted skew G-codes
1823 -- 1843Kaizhan Lin, Jianming Lin, Shiping Cai, Weize Wang, Chang-An Zhao. Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees