Journal: Des. Codes Cryptography

Volume 94, Issue 1

1 -- 0Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie. Simulation secure multi-input quadratic functional encryption: applications to differential privacy
2 -- 0Joo Woo, Jonghyun Kim, Ga Hee Hong, Seungwoo Lee, Minkyu Kim, HoChang Lee, Jong Hwan Park. NTRU+Sign: compact NTRU-based signatures using bimodal distributions
3 -- 0Michele Battagliola, Riccardo Longo, Alessio Meneghetti. Extensible decentralized secret sharing and application to Schnorr signatures
4 -- 0Wanbao Zhang, Zhilin Zhang, Shenglin Zhou. On flag-transitive quasi-symmetric 2-designs
5 -- 0Jianming Lin, Damien Robert 0001, Chang-An Zhao, Yuhao Zheng. Biextensions in pairing-based cryptography
6 -- 0Yaoda Hu, Yu Zhang, Wenling Wu. Construction of correctors using resilient fragmentary Boolean functions
7 -- 0Huilan Chang, Ching-Chih Hsu. Lemmas on traceability codes and an upper bound for 4-traceability
8 -- 0Mahir Bilen Can. MDS stabilizer poset codes
9 -- 0Tomer Ashur, Amit Singh Bhati. Generalized indifferentiable sponge and its application to Polygon Miden VM
10 -- 0Sanjit Bhowmick, Deepak Kumar Dalai, Sihem Mesnager. On construction of linear (Euclidean) hull codes over finite extensions binary fields
11 -- 0Amin Saeidi, Hadiseh Saydi, Thekiso Seretlo. A new method for constructing designs and codes from the conjugacy classes of groups
12 -- 0Tingting Wu, Lanqiang Li, Xiuyu Zhang, Shixin Zhu. Binary duadic codes and their related codes with a square-root-like lower bound
13 -- 0Leijo Jose, Anuradha Sharma. On Eisenstein additive codes over chain rings and linear codes over mixed alphabets
14 -- 0Hao Chen, Shengwei Liu, Conghui Xie, Hongwei Liu. Optimal CIS codes, optimal t-CIS codes and their applications in cryptography
15 -- 0Giuseppe D'Alconzo, Andre Esser 0001, Andrea Gangemi, Carlo Sanna. Sneaking up the ranks: Partial key exposure attacks on rank-based schemes
16 -- 0Giulia Cavicchioni, Alessio Meneghetti, Giovanni Tognolini. Information set decoding for ring-linear codes
17 -- 0Chunyan Qin, Gaojun Luo, Bocong Chen. New construction of non-expandable (1, k)-overlap-free codes
18 -- 0Mohsen Bayat, Nasrin Soltankhah. On flag-transitive 2-designs with prime block length and projective special linear groups
19 -- 0Zixiang Xu, Chi Hoi Yip. Intersective sets over abelian groups
20 -- 0Andrea C. Burgess, Peter Danziger, Daniel Horsley, Muhammad Tariq Javed. Packing designs with large block size
21 -- 0Yanzhi Li, Wenjie Zhong, Tingting Chen, Xiande Zhang. Improved bounds for codes over trees
22 -- 0Ivan N. Landjev, Emiliyan Rogachev, Assia Rousseva. Characterization of some minihypers in ${{\,\textrm{PG}\,}}(r,3)$ and the nonexistence of some ternary Griesmer codes
23 -- 0Shun Zhang, Tairong Shi, SenPeng Wang, Jie Guan, Mingyao Gao. Improved preimage attacks on Ascon-XOF based on linearization technique
24 -- 0Sanjit Chatterjee, Tapas Pandit, Subhabrata Samajder. Multi-splitting forking based modular security of signatures in multivariate quadratic setting
25 -- 0Yao Tian, Hengfeng Jin, Fang-Wei Fu 0001. Weight distributions of two classes of optimal (r,δ )-locally repairable codes