Journal: Des. Codes Cryptography

Volume 64, Issue 3

229 -- 239Xiwang Cao, Lei Hu. On the reducibility of some composite polynomials over finite fields
241 -- 253Shaojing Fu, Kanta Matsuura, Chao Li, Longjiang Qu. Construction of highly nonlinear resilient S-boxes with given degree
255 -- 263Anna Y. Pun, Philip P. W. Wong. A geometric proof of a theorem on antiregularity of generalized quadrangles
265 -- 274Olof Heden, Juliane Lehmann, Esmeralda Nastase, Papa Sissokho. Extremal sizes of subspace partitions
275 -- 283Denis S. Krotov. On the binary codes with parameters of triply-shortened 1-perfect codes
285 -- 286Jianqin Zhou. A counterexample concerning the 3-error linear complexity of 2 n -periodic binary sequences
287 -- 308Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala, Behnaz Omoomi. On construction of involutory MDS matrices from Vandermonde Matrices in GF(2 q )
309 -- 314Antonio Cossidente, Giuseppe Marino. Hyperovals of Hermitian polar spaces

Volume 64, Issue 1-2

1 -- 2Arrigo Bonisoli, James W. P. Hirschfeld, Spyros S. Magliveras. Preface: geometry, combinatorial designs and cryptology
3 -- 15Gábor Korchmáros, Valentino Lanzone, Angelo Sonnino. Projective k-arcs and 2-level secret-sharing schemes
17 -- 31Frank De Clerck, Stefaan De Winter, Thomas Maes. Singer 8-arcs of Mathon type in PG(2, 27)
33 -- 46Lucia Indaco, Gábor Korchmáros. 42-arcs in PG(2, q) left invariant by PSL(2, 7)
47 -- 60Ilaria Cardinali, Antonio Pasini. Two forms related to the symplectic dual polar space in odd characteristic
61 -- 80Beukje Temmermans, Joseph A. Thas, Hendrik Van Maldeghem. Collineations of polar spaces with restricted displacements
81 -- 91Bart De Bruyn. A decomposition of the universal embedding space for the near polygon $${{\mathbb H}_n}$$
93 -- 103Stanley E. Payne, Joseph A. Thas. An essay on self-dual generalized quadrangles
105 -- 128Philippe Cara, Alice Devillers, Michael Giudici, Cheryl E. Praeger. Quotients of incidence geometries
129 -- 141Stelios D. Georgiou, E. Lappas. Self-dual codes from circulant matrices
143 -- 151Ka Hin Leung, Bernhard Schmidt. New restrictions on possible orders of circulant Hadamard matrices
153 -- 160Marien Abreu, Domenico Labbate, John Sheehan. Irreducible pseudo 2-factor isomorphic cubic bipartite graphs
161 -- 169Madeline González Muñiz, Rainer Steinwandt. Security of message authentication codes in the presence of key-dependent messages
171 -- 193Simon R. Blackburn, Douglas R. Stinson, Jalaj Upadhyay. On the complexity of the herding attack and some related attacks on hash functions
195 -- 208Rainer Steinwandt, Adriana Suárez Corona. Identity-based non-interactive key distribution with forward security
209 -- 220Pascal Marquardt, Pavol Svaba, Tran van Trung. Pseudorandom number generators based on random covers for finite groups
221 -- 227Otokar Grosek, Peter Horák. On quasigroups with few associative triples