Journal: Des. Codes Cryptography

Volume 83, Issue 3

493 -- 502Tran van Trung. Simple t-designs: a recursive construction for arbitrary t
503 -- 517Tao Zhang, Gennian Ge. Quantum MDS codes with large minimum distance
519 -- 548Elisa Gorla, Maike Massierer. An optimal representation for the trace zero subgroup
549 -- 563Esmeralda Nastase, Papa Sissokho. The structure of the minimum size supertail of a subspace partition
565 -- 588Xinxin Fan, Adilet Otemissov, Francesco Sica, Andrey Sidorenko. Multiple point compression on elliptic curves
589 -- 609Jon-Lark Kim, Nari Lee. A projection decoding of a binary extremal self-dual code of length 40
611 -- 631Aras Erzurumluoglu, David A. Pike. Twofold triple systems without 2-intersecting Gray codes
633 -- 638Lingfei Jin, Haibin Kan. Construction of binary linear codes via rational function fields
639 -- 660Umberto Martínez-Peñas. On the roots and minimum rank distance of skew cyclic codes
661 -- 683Sergey Bereg, Linda Morales, Ivan Hal Sudborough. Extending permutation arrays: improving MOLS bounds
685 -- 690Victor J. W. Guo, Yiting Yang. Proof of a conjecture of Kløve on permutation codes under the Chebychev distance
691 -- 714Chunming Tang, Can Xiang, Keqin Feng. Linear codes with few weights from inhomogeneous quadratic functions
715 -- 716. Editor's note

Volume 83, Issue 2

233 -- 267Daniele Bartoli, Stefano Marcugini, Fernanda Pambianco. On the completeness of plane cubic curves over finite fields
269 -- 282Angela Aguglia, Luca Giuzzi. Intersection sets, three-character multisets and associated codes
283 -- 305Margreta Kuijper, R. Pinto. An iterative algorithm for parametrization of shortest length linear shift registers over finite chain rings
307 -- 326Ziling Heng, Qin Yue. Evaluation of the Hamming weights of a class of linear codes based on Gauss sums
327 -- 343Mahdi Sajadieh, Arash Mirzaei, Hamid Mala, Vincent Rijmen. A new counting method to bound the number of active S-boxes in Rijndael and 3D
345 -- 356Ignacio F. Rúa. 4e 2 4 e
357 -- 406Bart Mennink. Optimal collision security in double block length hashing with single length key
407 -- 423Yiyuan Luo, Xuejia Lai, Yujie Zhou. Generic attacks on the Lai-Massey scheme
425 -- 443Jingxue Ma, Tao Zhang, Tao Feng, Gennian Ge. Some new results on permutation polynomials over finite fields
445 -- 454Yupeng Jiang, Jiangshuai Yang. On the number of irreducible linear transformation shift registers
455 -- 465Xiang Wang, Fang-Wei Fu. On the snake-in-the-box codes for rank modulation under Kendall's τ -metric
467 -- 492Yonglin Hao, Willi Meier. Truncated differential based known-key attacks on round-reduced SIMON

Volume 83, Issue 1

1 -- 21Liqiang Peng, Lei Hu, Yao Lu, Jun Xu, Zhangjie Huang. Cryptanalysis of Dual RSA
23 -- 32Hao Zheng, Yanxun Chang, Junling Zhou. Direct constructions of large sets of Kirkman triple systems
33 -- 69Xiao-Nan Lu, Masakazu Jimbo. Affine-invariant strictly cyclic Steiner quadruple systems
71 -- 82Minquan Cheng, Hung-Lin Fu, Jing Jiang, Yuan-Hsun Lo, Ying Miao. Codes with the identifiable parent property for multimedia fingerprinting
83 -- 99Jaehyun Ahn, Dongseok Ka, Chengju Li. Complete weight enumerators of a class of linear codes
101 -- 114Diego Napp, Raquel Pinto, Marisa Toste. r
115 -- 143Nicola Pace, Angelo Sonnino. On linear codes admitting large automorphism groups
145 -- 168Esteban Landerreche, David Fernández Duque. A case study in almost-perfect security for unconditionally secure communication
169 -- 177Denis S. Krotov. 4 -linear 1-perfect and Preparata-like codes
179 -- 196Xiaotian Chen, Yue Zhou. Asynchronous channel hopping systems from difference sets
197 -- 217Hongfeng Wu, Li Zhu, Rongquan Feng, Siman Yang. Explicit factorizations of cyclotomic polynomials over finite fields
219 -- 232Bocong Chen, Liren Lin, San Ling, Hongwei Liu. Three new classes of optimal frequency-hopping sequence sets