Journal: Des. Codes Cryptography

Volume 93, Issue 8

2897 -- 2918Julia Lieb, Raquel Pinto, Carlos Vela. A new method for erasure decoding of convolutional codes
2919 -- 2930Eric Kubischta, Ian Teixeira. Quantum codes and irreducible products of characters
2931 -- 2945Giacomo Micheli, Vincenzo Pallozzi Lavorante, Abhi Shukul, Noah Smith. Constructions of locally recoverable codes with large availability
2947 -- 2969Joonas Ahola, Iván Blanco-Chacón, Wilmar Bolaños, Antti Haavikko, Camilla Hollanti, Rodrigo Martín Sánchez-Ledesma. Fast multiplication and the PLWE-RLWE equivalence for an infinite family of maximal real subfields of cyclotomic fields
2971 -- 2992Hai Liu, Chunyu Gan, Chengju Li, Xueying Shi. Constructions of binary cyclic codes with minimum weights exceeding the square-root lower bound
2993 -- 3009Matteo Bonini, Martino Borello, Eimear Byrne. The geometry of covering codes in the sum-rank metric
3011 -- 3027Yuqing Zhu 0003, Chang Lv, Jiqiang Liu. Utilizing two subfields to accelerate individual logarithm computation in extended tower number field sieve
3029 -- 3068Altan Berdan Kilic, Anne Nijsten, Ruud Pellikaan, Alberto Ravagnani. Knot theory and error-correcting codes
3069 -- 3082Chengyu Sun, Xin Wang. New upper bounds for wide-sense frameproof codes
3083 -- 3105Axel Lemoine, Rocco Mora, Jean-Pierre Tillich. Understanding the new distinguisher of alternant codes at degree 2
3107 -- 3133Xue Jia, Qin Yue 0001, Huan Sun. Coding properties and automorphism groups of two classes of twisted generalized Reed-Solomon codes
3135 -- 3142Joshua Cooper, Jack Hyatt. Permutations minimizing the number of collinear triples
3143 -- 3157Max Schulz. Rational transformations over finite fields that are never irreducible
3159 -- 3179Andrea C. Burgess, Nicholas J. Cavenagh, Peter Danziger, David A. Pike. Weak colourings of Kirkman triple systems
3181 -- 3205Shuiyin Liu, Amin Sakzad. Lattice codes for CRYSTALS-Kyber
3207 -- 3225Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, Celestin Nkuimi Jugnia. Avoiding trusted setup in isogeny-based commitments
3227 -- 3241Zibi Xiao, Yaya Ye, Zhiye Yang, Xiangyong Zeng. n
3243 -- 3281Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann 0004, Léo Perrin, Lukas Stennes. Commutative cryptanalysis as a generalization of differential cryptanalysis
3283 -- 3302Lev Yohananov, Moshe Schwartz 0001. On the coding capacity of reverse-complement and palindromic duplication-correcting codes
3303 -- 3335Makhan Maji, Sihem Mesnager, Santanu Sarkar 0001, Kalyan Hansda. Characterizations for minimal codes: graph theory approach and algebraic approach over finite chain rings
3337 -- 3359Seyed Hassan Alavi. On flag-transitive symmetric (v, k, 4) designs
3361 -- 3373Barbara Gatti, Gábor Korchmáros, Gábor Péter Nagy, Vincenzo Pallozzi Lavorante, Gioia Schulte. Evaluation codes arising from symmetric polynomials
3375 -- 3412Chun Guo 0002, Xiao Wang 0012, Kang Yang 0002, Yu Yu 0001. On tweakable correlation robust hashing against key leakages
3413 -- 3436Gretchen L. Matthews, Emily McMillon. A combinatorial approach to avoiding weak keys in the BIKE cryptosystem
3437 -- 3462Zuo Ye, Omer Sabary, Ryan Gabrys, Eitan Yaakobi, Ohad Elishco. More on codes for combinatorial composite DNA