Journal: Des. Codes Cryptography

Volume 86, Issue 9

1893 -- 1904Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan. Unweighted linear congruences with distinct coordinates and the Varshamov-Tenengolts codes
1905 -- 1921Josep Rifà, Emilio Suárez-Canedo. Hadamard full propelinear codes of type Q; rank and kernel
1923 -- 1945Ling Sun, Huaifeng Chen, Meiqin Wang. Zero-correlation attacks: statistical models independent of the number of approximations
1947 -- 1962Yoshitaka Koga, Tatsuya Maruta, Keisuke Shiromoto. On critical exponents of Dowling matroids
1963 -- 1971Zhilin Zhang, Shenglin Zhou. Flag-transitive point-quasiprimitive 2-(v, k, 2) designs
1973 -- 1982Kai-Uwe Schmidt, Yue Zhou. On the number of inequivalent Gabidulin codes
1983 -- 1996Ayoub Otmani, Hervé Talé Kalachi, Sélestin Ndjeya. Improved cryptanalysis of rank metric schemes based on Gabidulin codes
1997 -- 2033Jun Xu 0022, Santanu Sarkar 0001, Lei Hu, Zhangjie Huang, Liqiang Peng. Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator
2035 -- 2063Alberto Ravagnani. Duality of codes supported on regular lattices, with an application to enumerative combinatorics
2065 -- 2073Javier de la Cruz, Wolfgang Willems. On group codes with complementary duals
2075 -- 2090Trygve Johnsen, Hugues Verdure. Flags of almost affine codes and the two-party wire-tap channel of type II
2091 -- 2113Yun Fan, Bangteng Xu. Fourier transforms and bent functions on finite groups
2115 -- 2138Steven T. Dougherty, Joe Gildea, Rhian Taylor, Alexander Tylyshchak. Group rings, G-codes and constructions of self-dual and formally self-dual codes

Volume 86, Issue 8

1589 -- 1599Daniele Bartoli, Luciane Quoos. 2n
1601 -- 1621Maosheng Xiong, Haode Yan, Pingzhi Yuan. On a conjecture of differentially 8-uniform power functions
1623 -- 1683Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda 0002, Shota Yamada 0001. Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
1685 -- 1706Konstantinos Limniotis, Nicholas Kolokotronis. Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction
1707 -- 1726Neranga Fernando. Self-reciprocal polynomials and coterm polynomials
1727 -- 1737Chong Shangguan, Jingxue Ma, Gennian Ge. New upper bounds for parent-identifying codes and traceability codes
1739 -- 1755Mingchao Li, Miao Liang, Beiliang Du, Jingyuan Chen. A construction for optimal c-splitting authentication and secrecy codes
1757 -- 1766Hongxue Liang, Shenglin Zhou. Flag-transitive point-primitive automorphism groups of non-symmetric 2-(v, k, 3) designs
1767 -- 1792Iván Blanco-Chacón, Eimear Byrne, Iwan Duursma, John Sheekey. Rank metric codes and zeta functions
1793 -- 1805Maki Yoshida, Satoshi Obana. On the (in)efficiency of non-interactive secure multiparty computation
1807 -- 1848Daniel Augot, Pierre Loidreau, Gwezheneg Robert. Generalized Gabidulin codes over fields of any characteristic
1849 -- 1864José Ignacio Farrán, Pedro A. García-Sánchez, Benjamín A. Heredia, Micah J. Leamer. The second Feng-Rao number for codes coming from telescopic semigroups
1865 -- 1892Sihem Mesnager, Ferruh Özbudak, Ahmet Sinak. On the p-ary (cubic) bent and plateaued (vectorial) functions

Volume 86, Issue 7

1377 -- 1389Joaquim Borges, Cristina Fernández-Córdoba. 2[u]-linear codes
1391 -- 1403Philippe Gaborit, Ayoub Otmani, Hervé Talé Kalachi. Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes
1405 -- 1410David Clayton. A note on almost difference sets in nonabelian groups
1411 -- 1449Shuai Han, Shengli Liu, Lin Lyu. Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system
1451 -- 1467Hai Q. Dinh, Abhay Kumar Singh, Sukhamoy Pattanayak, Songsak Sriboonchitta. 2
1469 -- 1481Kai-Uwe Schmidt. Hermitian rank distance codes
1483 -- 1497Zibi Xiao, Xiangyong Zeng, Chunlei Li, Tor Helleseth. 2
1499 -- 1525Jingyuan Chen, Lijun Ji, Yun Li. Combinatorial constructions of optimal (m, n, 4, 2) optical orthogonal signature pattern codes
1527 -- 1540SenPeng Wang, Bin Hu, Yan Liu. The autocorrelation properties of single cycle polynomial T-functions
1541 -- 1552Qian Wang, Chenhui Jin. Upper bound of the length of truncated impossible differentials for AES
1553 -- 1563Li Shuai, Miao Li. A method to calculate differential uniformity for permutations
1565 -- 1572Jianfa Qian, Lina Zhang. On MDS linear complementary dual codes and entanglement-assisted quantum codes
1573 -- 1588Hadi Kharaghani, Sho Suda. Unbiased orthogonal designs

Volume 86, Issue 6

1175 -- 1184Giorgio Donati, Nicola Durante. n) and its associated non-linear MRD codes
1185 -- 1200Tran van Trung. A recursive construction for simple t-designs using resolutions
1201 -- 1209Minjia Shi, Zahra Sepasdar, Adel Alahmadi, Patrick Solé. k -codes
1211 -- 1247Goutam Paul 0001, Souvik Ray. On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers
1249 -- 1255Nuh Aydin, Yasemin Cengellenmis, Abdullah Dertli. 4 images, and new codes
1257 -- 1265Adel Alahmadi, Funda Özdemir, Patrick Solé. On self-dual double circulant codes
1267 -- 1279Bocong Chen, Hongwei Liu. Constructions of cyclic constant dimension codes
1281 -- 1293Chong-Dao Lee, Yaotsu Chang, Chia-an Liu. A construction of group divisible designs with block sizes 3 to 7
1295 -- 1310Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li 0006, Xiaoyun Wang. Conditional cube attack on round-reduced River Keyak
1311 -- 1327Ferdinand Ihringer, Karen Meagher. Miklós-Manickam-Singhi conjectures on partial geometries
1329 -- 1338Wei Su, Yang Yang 0005, Cuiling Fan. New optimal binary sequences with period 4p via interleaving Ding-Helleseth-Lam sequences
1339 -- 1366Jie Zhang 0040, Jie Chen, Junqing Gong, Aijun Ge, Chuangui Ma. Leakage-resilient attribute based encryption in prime-order groups via predicate encodings
1367 -- 1375James A. Davis, Oktay Olmez. A framework for constructing partial geometric difference sets

Volume 86, Issue 5

955 -- 988Jooyoung Lee. Key alternating ciphers based on involutions
989 -- 995Boris Ryabko. Properties of two Shannon's ciphers
997 -- 1006John Bamberg, Jesse Lansdown, Melissa Lee. On m-ovoids of regular near polygons
1007 -- 1022Dabin Zheng, Jingjun Bao. Four classes of linear codes from cyclotomic cosets
1023 -- 1038Weihua Liu, Andrew Klapper, Zhixiong Chen. Solving the FCSR synthesis problem for multi-sequences by lattice basis reduction
1039 -- 1062John Vincent S. Morales, Hajime Tanaka. An Assmus-Mattson theorem for codes over commutative association schemes
1063 -- 1083Liantao Lan, Yanxun Chang, Lidong Wang. Constructions of cyclic quaternary constant-weight codes of weight three and distance four
1085 -- 1094Masaaki Harada. Binary extremal self-dual codes of length 60 and related codes
1095 -- 1111Sergey Bereg, Avi Levy, Ivan Hal Sudborough. Constructing permutation arrays from groups
1113 -- 1129László Mérai. On the elliptic curve endomorphism generator
1131 -- 1148Sugata Gangopadhyay, Bimal Mandal, Pantelimon Stanica. 3 norm of some classes of bent Boolean functions
1149 -- 1159Jiejing Wen, Minghui Yang, Fangwei Fu, Keqin Feng. Cyclotomic construction of strong external difference families in finite fields
1161 -- 1174Antonio Cossidente, Francesco Pavese. On intriguing sets of finite symplectic spaces

Volume 86, Issue 4

721 -- 741Li Lin, Wenling Wu. Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
743 -- 770Remi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla Van der Merwe. Analysing and exploiting the Mantin biases in RC4
771 -- 784Fengwei Li, Qin Yue. The primitive idempotents and weight distributions of irreducible constacyclic codes
785 -- 802José Moreira, Marcel Fernández, Grigory Kabatiansky. Constructions of almost secure frameproof codes with applications to fingerprinting schemes
803 -- 815Tao Zhang, Gennian Ge. Combinatorial constructions of packings in Grassmannian spaces
817 -- 833Oktay Olmez. A link between combinatorial designs and three-weight linear codes
835 -- 840Gerardo Vega. A correction on the determination of the weight enumerator polynomial of some irreducible cyclic codes
841 -- 859Baokun Ding, Gennian Ge, Jun Zhang, Tao Zhang, YiWei Zhang. New constructions of MDS symbol-pair codes
861 -- 874Sven C. Polak. New nonbinary code bounds based on divisibility arguments
875 -- 892Irrinki Gnana Sudha, R. S. Selvaraj. Codes with a pomset metric and constructions
893 -- 905Xiang-dong Hou. Complexities of normal bases constructed from Gauss periods
907 -- 937Charles J. Colbourn, Erin Lanus, Kaushik Sarkar. Asymptotic and constructive methods for covering perfect hash families and covering arrays
939 -- 953Zhiqiang Lin, Dingyi Pei, Dongdai Lin, Xiaolei Zhang. Fast construction of binary ring FCSRs for hardware stream ciphers

Volume 86, Issue 3

447 -- 0. Editor's note
449 -- 462Dieter Jungnickel, Vladimir D. Tonchev. On Bonisoli's theorem and the block codes of Steiner triple systems
463 -- 479Joaquim Borges, Cristina Fernández-Córdoba, Roger Ten-Valls. 2-double cyclic codes
481 -- 516Michèle Feltz, Cas Cremers. Strengthening the security of authenticated key exchange against bad randomness
517 -- 554Shuai Han, Shengli Liu, Baodong Qin, Dawu Gu. Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness
555 -- 568Ales Drápal, Viliam Valent. Few associative triples, isotopisms and groups
569 -- 586Roland D. Barrolleta, Mercè Villanueva. Partial permutation decoding for binary linear and $$Z_4$$ Z 4 -linear Hadamard codes
587 -- 610Dieter Jungnickel, Yue Zhou, Vladimir D. Tonchev. Extension sets, affine designs, and Hamada's conjecture
611 -- 621Jürgen Bierbrauer, Daniele Bartoli, Giorgio Faina, Stefano Marcugini, Fernanda Pambianco. A family of semifields in odd characteristic
623 -- 640Jooyoung Lee, Atul Luykx, Bart Mennink, Kazuhiko Minematsu. Connecting tweakable and multi-key blockcipher security
641 -- 663Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee. Improved, black-box, non-malleable encryption from semantic security
665 -- 692Ulrich Dempwolff. CCZ equivalence of power functions
693 -- 701Rafael A. Arce-Nazario, Francis N. Castro, Oscar E. González, Luis A. Medina, Ivelisse M. Rubio. New families of balanced symmetric functions and a generalization of Cusick, Li and Stǎnicǎ's conjecture
703 -- 719Cunsheng Ding. Infinite families of 3-designs from a type of five-weight code

Volume 86, Issue 2

237 -- 238Simon R. Blackburn, Marcus Greferath, Camilla Hollanti, Mario-Osvin Pavcevic, Joachim Rosenthal, Leo Storme, Angeles Vazquez-Castro, Alfred Wassermann. Preface to the special issue on network coding and designs
239 -- 250Michael Kiermaier, Sascha Kurz, Alfred Wassermann. The order of the automorphism group of a binary q -analog of the Fano plane is at most two
251 -- 268Michael Kiermaier, Reinhard Laue, Alfred Wassermann. A new series of large sets of subspace designs over the binary field
269 -- 284Dirk Liebhold, Gabriele Nebe, Angeles Vazquez-Castro. Network coding with flags
285 -- 302Paulo Almeida, Diego Napp, Raquel Pinto. MDS 2D convolutional codes with optimal 1D horizontal projections
303 -- 318Diego Napp Avelli, Raquel Pinto, V. Sidorenko. Concatenation of convolutional codes and rank metric codes for multi-shot network coding
319 -- 340Anna-Lena Horlemann-Trautmann, Kyle Marshall, Joachim Rosenthal. Extension of Overbeck's attack for Gabidulin-based cryptosystems
341 -- 363Alessandro Neri, Anna-Lena Horlemann-Trautmann, Tovohery Randrianarisoa, Joachim Rosenthal. On the genericity of maximum rank distance and Gabidulin codes
365 -- 386Anna-Lena Horlemann-Trautmann. Message encoding and retrieval for spread and cyclic orbit codes
387 -- 418Netanel Raviv, Eitan Yaakobi, Muriel Médard. Coding for locality in reconstructing permutations
419 -- 445Natalia Silberstein, Alexander Zeh. Anticode-based locally repairable codes with high availability

Volume 86, Issue 12

2677 -- 2702Ming Ming Tan. Group invariant weighing matrices
2703 -- 2723Benoît Cogliati, Yannick Seurin. Analysis of the single-permutation encrypted Davies-Meyer construction
2725 -- 2745Simone Costa, Tao Feng, Xiaomiao Wang. Frame difference families and resolvable balanced incomplete block designs
2747 -- 2763Benoît Cogliati. Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model
2765 -- 2773Xiaoqin Zhan, Shenglin Zhou. Non-symmetric 2-designs admitting a two-dimensional projective linear group
2775 -- 2790Xiao-Xin Zhao, Tian Tian 0004, Wen-Feng Qi. A ring-like cascade connection and a class of NFSRs with the same cycle structures
2791 -- 2805Wittawat Kositwattanarerk. Pseudocodeword-free criterion for codes with cycle-free Tanner graph
2807 -- 2823Neriman Gamze Orhon, Hüseyin Hisil. Speeding up Huff form of elliptic curves
2825 -- 2836Fernando L. Piñero, Prasant Singh. α(2, m)
2837 -- 2855Jin Li, Aixian Zhang, Keqin Feng. 2, m) reaching the Griesmer bound
2857 -- 2868Xiaojuan Lu, Xiaolei Niu, Haitao Cao 0001. Some results on generalized strong external difference families
2869 -- 2892Xiaofang Xu, Chunlei Li, Xiangyong Zeng, Tor Helleseth. Constructions of complete permutation polynomials
2893 -- 2916José Ignacio Farrán, Pedro A. García-Sánchez, Benjamín A. Heredia. On the second Feng-Rao distance of Algebraic Geometry codes related to Arf semigroups

Volume 86, Issue 11

2451 -- 2468Song Tian, Bao Li, Kunpeng Wang, Wei Yu 0008. Cover attacks for elliptic curves with cofactor two
2469 -- 2484Yunwen Liu, Vincent Rijmen, Gregor Leander. Nonlinear diffusion layers
2485 -- 2494Minjia Shi, Liqin Qian, Patrick Solé. On self-dual negacirculant codes of index two and four
2495 -- 2512Yunhua Wen, Shengli Liu, Shuai Han. Reusable fuzzy extractor from the decisional Diffie-Hellman assumption
2513 -- 2523Zhengchun Zhou. Three-weight ternary linear codes from a family of cyclic difference sets
2525 -- 2547David Derler, Daniel Slamanig. Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs
2549 -- 2586Jia Liu, Tibor Jager, Saqib A. Kakvi, Bogdan Warinschi. How to build time-lock encryption
2587 -- 2603Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang, Yunqing Shi. A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
2605 -- 2618Claude Carlet, Sihem Mesnager, Chunming Tang, Yanfeng Qi. Euclidean and Hermitian LCD MDS codes
2619 -- 2627Ivan Yu. Mogilnykh, Faina I. Solov'eva. On explicit minimum weight bases for extended cyclic codes related to Gold functions
2629 -- 2643Jose Torres-Jimenez, Idelfonso Izquierdo-Marquez. Covering arrays of strength three from extended permutation vectors
2645 -- 2660Hui Zhang 0030, Eitan Yaakobi, Natalia Silberstein. Multiset combinatorial batch codes
2661 -- 2676Jared Antrobus, Heide Gluesing-Luerssen. Lexicodes over finite principal ideal rings

Volume 86, Issue 10

2139 -- 2165Shixin Zhu, Zhonghua Sun, Ping Li. A class of negacyclic BCH codes and its application to quantum codes
2167 -- 2181Seunghwan Chang, Jong Yoon Hyun. Linear codes from simplicial complexes
2183 -- 2195Jezerca Hodaj, Melissa S. Keranen, Donald L. Kreher, Leah Tollefson. Some new Kirkman signal sets
2197 -- 2246Dario Catalano, Dario Fiore, Luca Nizzardo. Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions
2247 -- 2254Ramakrishna Bandi, Alexandre Fotue Tabue, Edgar Martínez-Moro. On counting subring-submodules of free modules over finite commutative frobenius rings
2255 -- 2260Lijun Ji. Group divisible designs with large block sizes
2261 -- 2278Chengju Li. Hermitian LCD codes from cyclic codes
2279 -- 2314Jean-Charles Faugère, Alexandre Wallet. The point decomposition problem over hyperelliptic curves - Toward efficient computation of discrete logarithms in even characteristic
2315 -- 2344Daniele Bartoli, Maria Montanucci, Giovanni Zini. AG codes and AG quantum codes from the GGS curve
2345 -- 2377Khadijeh Bagheri, Mohammad-Reza Sadeghi 0001, Daniel Panario. A non-commutative cryptosystem based on quaternion algebras
2379 -- 2405Kangquan Li, Longjiang Qu, Qiang Wang. 2
2407 -- 2440Kwangsu Lee, Seunghwan Park. Revocable hierarchical identity-based encryption with shorter private keys and update keys
2441 -- 2450Cuiling Fan. The linear complexity of a class of binary sequences with optimal autocorrelation

Volume 86, Issue 1

1 -- 16Javier de la Cruz, Elisa Gorla, Hiram H. López, Alberto Ravagnani. Weight distribution of rank-metric codes
17 -- 54Yohei Watanabe 0001, Junji Shikata. Timed-release computational secret sharing and threshold encryption
55 -- 83Gottfried Herold, Elena Kirshanova, Alexander May 0001. On the asymptotic complexity of solving LWE
85 -- 95Oliver Wilhelm Gnilke, Marcus Greferath, Mario-Osvin Pavcevic. Mosaics of combinatorial designs
97 -- 120Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au. Functional encryption for computational hiding in prime order groups via pair encodings
121 -- 136Kenza Guenda, Somphong Jitman, T. Aaron Gulliver. Constructions of good entanglement-assisted quantum error correcting codes
137 -- 150Léo Ducas, Wessel P. J. van Woerden. The closest vector problem in tensored root lattices of type A and in their duals
151 -- 159Qichun Wang, Chik-How Tan, Theo Fanuela Prabowo. On the covering radius of the third order Reed-Muller code RM(3, 7)
161 -- 177Daniele Bartoli, Maria Montanucci, Giovanni Zini. Multi point AG codes on the GK maximal curve
179 -- 194Alice M. W. Hui, B. G. Rodrigues. Switched graphs of some strongly regular graphs related to the symplectic graph
195 -- 210Douglas R. Stinson, Ruizhong Wei. Combinatorial repairability for threshold schemes
211 -- 230Chuangqiang Hu, Shudi Yang. Multi-point codes over Kummer extensions
231 -- 236Alexander L. Gavrilyuk, Ilia Matkin, Tim Penttila. Derivation of Cameron-Liebler line classes