Journal: Des. Codes Cryptography

Volume 78, Issue 3

583 -- 603Michel Lavrauw, John Sheekey. On BEL-configurations and finite semifields
605 -- 613Florian Caullery, Kai-Uwe Schmidt, Yue Zhou. Exceptional planar polynomials
615 -- 627Martin Steinbach, Dirk Hachenberger. A class of quaternary linear codes improving known minimum distances
629 -- 654Claude Carlet, Guang Gong, Yin Tan. Quadratic zero-difference balanced functions, APN functions and strongly regular graphs
655 -- 678Jan De Beule, Jeroen Demeyer, Klaus Metsch, Morgan Rodgers. +(5, q)
679 -- 691Yuan-Hsun Lo, Wing Shing Wong, Hung-Lin Fu. Partially user-irrepressible sequence sets and conflict-avoiding codes
693 -- 702Javier de la Cruz, Michael Kiermaier, Alfred Wassermann. The automorphism group of an extremal [120, 60, 24] code does not contain elements of order 29
703 -- 712Fabio Enrique Brochero Martínez, Carmen Rosa Giraldo Vergara. Weight enumerator of some irreducible cyclic codes
713 -- 730Maosheng Xiong, Nian Li, Zhengchun Zhou, Cunsheng Ding. Weight distribution of cyclic codes with arbitrary number of generalized Niho type zeroes
731 -- 745Long Yu, Hongwei Liu. The weight distribution of a family of p-ary cyclic codes
747 -- 776Yiling Lin, Miwako Mishima, Masakazu Jimbo. Optimal equi-difference conflict-avoiding codes of weight four

Volume 78, Issue 2

383 -- 390Michael Braun. q-Analogs of t-wise balanced designs from Borel subgroups
391 -- 408Longjiang Qu, Yin Tan, Chao Li, Guang Gong. 2k
409 -- 424Natalia Silberstein, Anna Gál. Optimal combinatorial batch codes based on block designs
425 -- 440Christina Delfs, Steven D. Galbraith. p
441 -- 461Özgür Dagdelen, David Galindo, Pascal Véron, Sidi Mohamed El Yousfi Alaoui, Pierre-Louis Cayrel. Extended security arguments for signature schemes
463 -- 471Sho Suda. A two-fold cover of strongly regular graphs with spreads and association schemes of class five
473 -- 491Adonus L. Madison, Junhua Wu. Conics arising from external points and their binary codes
493 -- 526Yu Chen, Jiang Zhang, Dongdai Lin, Zhenfeng Zhang. Generic constructions of integrated PKE and PEKS
527 -- 531Antonio Cossidente, Francesco Pavese. On subspace codes
533 -- 545Di Wu, Wenfeng Qi, Huajin Chen. On the spectral immunity of periodic sequences restricted to binary annihilators
547 -- 581Praveen Gauravaram, Nasour Bagheri, Lars R. Knudsen. Building indifferentiable compression functions from the PGV compression functions

Volume 78, Issue 1

1 -- 3Dieter Jungnickel, Jennifer D. Key, Chris J. Mitchell, Ronald C. Mullin, Peter R. Wild. Editorial for the 25th anniversary issue
5 -- 50Claude Carlet, Sihem Mesnager. Four decades of research on bent functions
51 -- 72Steven D. Galbraith, Pierrick Gaudry. Recent progress on the elliptic curve discrete logarithm problem
73 -- 85Antoine Joux, Cécile Pierrot. Technical history of discrete logarithms in small characteristic finite fields - The road from subexponential to quasi-polynomial complexity
87 -- 102Neal Koblitz, Alfred J. Menezes. Cryptocash, cryptocurrencies, and cryptocontracts
103 -- 127Siaw-Lynn Ng, Maura Beth Paterson. Disjoint difference families and their applications
129 -- 139Harald Niederreiter. A survey of some applications of finite fields
141 -- 195Alexander Pott. Almost perfect and planar functions
197 -- 219Lucia Moura, Gary L. Mullen, Daniel Panario. Finite field constructions of combinatorial arrays
221 -- 236Daniel M. Gordon, Bernhard Schmidt. A survey of the multiplier conjecture
237 -- 267Kai-Uwe Schmidt. Sequences with small correlation
269 -- 310Christina Fragouli, Emina Soljanin. (Secure) Linear network coding multicast - A theoretical minimum and some open problems
311 -- 350Tuvi Etzion, Leo Storme. Galois geometries and coding theory
351 -- 382Anne Broadbent, Christian Schaffner. Quantum cryptography beyond quantum key distribution