Journal: Des. Codes Cryptography

Volume 93, Issue 9

3463 -- 3479B. G. Rodrigues, Patrick Solé. Primitive rank 3 groups, binary codes, and 3-designs
3481 -- 3505Niklas Gassner, Julia Lieb, Abhinaba Mazumder, Michael Schaller. Information-set decoding for convolutional codes
3507 -- 3519Sergey Bezzateev, Natalia A. Shekhunova. Self-reversible generalized (L,G)-codes
3521 -- 3541Antonio Corbo Esposito, Rosa Fera, Francesco Romeo. Hilbert series and degrees of regularity of Oil & Vinegar and mixed quadratic systems
3543 -- 3563Javier Herranz, Germán Sáez. (k, n)-Consecutive access structures
3565 -- 3573R. Julian R. Abel, Ingo Janiszczak, Reiner Staszewski. Improvements for lower bounds of mutually orthogonal Latin squares of sizes 54, 96 and 108
3575 -- 3591Hajime Matsui, Kakeru Kaneko. Entanglement-assisted quantum error-correcting codes via quasi-cyclic codes with complementary duals
3593 -- 3618Giulia Cavicchioni, Eleonora Guerrini, Alessio Meneghetti. A class of locally recoverable codes over finite chain rings
3619 -- 3640Frederique Oggier, Shengwei Liu, Hongwei Liu. About the Rankin and Bergé-Martinet constants from a coding theory view point
3641 -- 3669Kamel Mohamed Faraoun, Nadia El Mrabet. Optimizing and securing GLV multiplication over BLS pairings-friendly curves
3671 -- 3687Yuehui Cui, Jinquan Luo. Differential uniformity and constacyclic code from some power mapping
3689 -- 3705Søren Fuglede Jørgensen. On the clique covering numbers of Johnson graphs
3707 -- 3731Yanyan Zhou, SenPeng Wang, Yunong Wu, Bin Hu. Improved method of searching for boomerang distinguishers on Feistel structures-applications to WARP, TWINE, LBlock, LBlock-s, and ALLPC
3733 -- 3760Shakir Ali, Nuh Aydin, Pushpendra Sharma, Elif Segah Oztas, Atif Ahmad Khan. Constacyclic codes over general mixed alphabets and their applications
3761 -- 3808Xiaoen Lin, Le He, Zhengrong Lu, Yantian Shen, Chongxu Ren, Hongbo Yu. Internal differential structure: preimage attacks on up to 5-round Keccak
3809 -- 3861Danilo Francati, Daniele Venturi 0001. Evolving secret sharing revisited: computational security and succinctness
3863 -- 3874Marco Buratti, Anita Pasotti. Shiftable Heffter spaces
3875 -- 3902Sergiy V. Borodachov, Peter G. Boyvalenkov, Peter D. Dragnev, Douglas P. Hardin, Edward B. Saff, Maya Stoyanova. Bounds on discrete potentials of spherical (k, k)-designs
3903 -- 3932Mrinal Kanti Bose, Udaya Parampalli, Abhay Kumar Singh. Binary cyclic codes from permutation polynomials over ${\mathbb {F}}_{2^m}$
3933 -- 3953Danyao Wu, Pingzhi Yuan. The compositional inverses of the permutation polynomials from trace functions over finite fields
3955 -- 4017Hao Lin 0012, Mingqiang Wang, Weiqiang Wen, Shifeng Sun 0001, Kaitai Liang. Generic construction of threshold ring signatures and lattice-based instantiations
4019 -- 4042Hiroki Kajiura, Koji Momihara, Utano Ogata. Divisible pre-difference sets for approximating integrations over finite groups
4043 -- 4081Yong Liu, Zejun Xiang 0001, Xiangyong Zeng, Shasha Zhang. A novel algorithm for the k-XOR problem
4083 -- 4112Tongliang Zhang, Haibin Kan, Lijing Zheng, Jie Peng 0001, Hanbing Zhao. Further results on permutation pentanomials over finite fields with characteristic two
4113 -- 4115Simeon Ball, Michel Lavrauw, Tabriz Popatia. Correction to: Griesmer type bounds for additive codes over finite fields, integral and fractional MDS codes