Journal: Des. Codes Cryptography

Volume 87, Issue 9

1945 -- 1960Jerod Michel, Qi Wang 0012. Almost designs and their links with balanced incomplete block designs
1961 -- 1972Ching-Yi Lai, Kai-Min Chung. Quantum encryption and generalized Shannon impossibility
1973 -- 1983Hiroaki Taniguchi. On some quadratic APN functions
1985 -- 2002Antonio Cossidente, Francesco Pavese. On line covers of finite projective and polar spaces
2003 -- 2026Miao Liang, Lijun Ji. On (t, L)-fold perfect authentication and secrecy codes with arbitration
2027 -- 2042Cícero Carvalho, Xavier Ramírez-Mondragón, Victor G. L. Neumann, Horacio Tapia-Recillas. Projective Reed-Muller type codes on higher dimensional scrolls
2043 -- 2059Qichun Wang, Pantelimon Stanica. Transparency order for Boolean functions: analysis and construction
2061 -- 2090Yanwei Zhou, Bo Yang 0003, Yi Mu 0001. Continuous leakage-resilient identity-based encryption with leakage amplification
2091 -- 2101Minjia Shi, Denis S. Krotov, Patrick Solé. A new distance-regular graph of diameter 3 on 1024 vertices
2103 -- 0Minjia Shi, Denis S. Krotov, Patrick Solé. Correction to: A new distance-regular graph of diameter 3 on 1024 vertices
2105 -- 2128Sergey Bereg, Zevi Miller, Luis Gerardo Mojica, Linda Morales, Ivan Hal Sudborough. New lower bounds for permutation arrays using contraction
2129 -- 2137Peter Vandendriessche. On KM-arcs in non-Desarguesian projective planes
2139 -- 2164Gregory Maxwell, Andrew Poelstra, Yannick Seurin, Pieter Wuille. Simple Schnorr multi-signatures with applications to Bitcoin
2165 -- 2183Xueying Shi, Qin Yue, Yansheng Wu. The dual-containing primitive BCH codes with the maximum designed distance and their applications to quantum codes

Volume 87, Issue 8

1713 -- 1733Xing Liu 0004, Liang Zhou 0003. Improved Singleton bound on frequency hopping sequences and optimal constructions
1735 -- 1736Xing Liu 0004, Liang Zhou 0003. Correction to: Improved Singleton bound on frequency hopping sequences and optimal constructions
1737 -- 1748Léo Ducas, Cécile Pierrot. Polynomial time bounded distance decoding near Minkowski's bound in discrete logarithm lattices
1749 -- 1763Qichun Wang, Pantelimon Stanica. A trigonometric sum sharp estimate and new bounds on the nonlinearity of some cryptographic Boolean functions
1765 -- 1776Keisuke Shiromoto. Codes with the rank metric and matroids
1777 -- 1796Mahdi Cheraghchi. Nearly optimal robust secret sharing
1797 -- 1813Jian Liu 0004, Sihem Mesnager. Weightwise perfectly balanced functions with high weightwise nonlinearity profile
1815 -- 1838Xiang-dong Hou. Optimal binary constant weight codes and affine linear groups over finite fields
1839 -- 1856Aart Blokhuis, Maarten De Boeck, Jozefien D'haeseleer. Cameron-Liebler sets of k-spaces in $${{\mathrm{PG}}}(n, q)$$ PG ( n , q )
1857 -- 1869Minjia Shi, Daitao Huang, Denis S. Krotov. Additive perfect codes in Doob graphs
1871 -- 1879Torger Olson, Eric Swartz. Transitive PSL(2, 11)-invariant k-arcs in PG(4, q)
1881 -- 1895Andries E. Brouwer, Sven C. Polak. Uniqueness of codes using semidefinite programming
1897 -- 1926Itai Dinur. An algorithmic framework for the generalized birthday problem
1927 -- 1943Yansheng Wu, Qin Yue, Xueying Shi. At most three-weight binary linear codes from generalized Moisio's exponential sums

Volume 87, Issue 7

1459 -- 1480Giorgos Kapetanakis, Lucas Reis. Variations of the Primitive Normal Basis Theorem
1481 -- 1498Shihui Fu, Xiutao Feng, Dongdai Lin, Qiang Wang. 2 with odd characteristic related to Rédei functions
1499 -- 1520Tao Feng, Lidong Wang, Xiaomiao Wang. Optimal 2-D (n × m , 3 , 2 , 1)-optical orthogonal codes and related equi-difference conflict avoiding codes
1521 -- 1540Tran van Trung. On existence theorems for simple t-designs
1541 -- 1575Julien Lavauzelle. Lifted projective Reed-Solomon codes
1577 -- 1599Claude Carlet, Xi Chen 0013, Longjiang Qu. Constructing infinite families of low differential uniformity (n, m)-functions with m > n / 2
1601 -- 1620Keju Meng, Fuyou Miao, Yue Yu. A secure and efficient on-line/off-line group key distribution protocol
1621 -- 1638Benoît Cogliati, Titouan Tanguy. Multi-user security bound for filter permutators in the random oracle model
1639 -- 1646John B. Polhill. A new family of partial difference sets in 3-groups
1647 -- 1656Dongdong Jia, Sumei Zhang, Gengsheng Zhang. Erasure combinatorial batch codes based on nonadaptive group testing
1657 -- 1671Lucas Reis. Factorization of a class of composed polynomials
1673 -- 1697Matthew Fickus, John Jasper. Equiangular tight frames from group divisible designs
1699 -- 1711Sabyasachi Dutta, Avishek Adhikari, Sushmita Ruj. Maximal contrast color visual secret sharing schemes

Volume 87, Issue 6

1199 -- 1225A. J. van Zanten. Primitive idempotent tables of cyclic and constacyclic codes
1227 -- 1235Hiroki Koike, István Kovács, Dragan Marusic, Mikhail E. Muzychuk. Cyclic groups are CI-groups for balanced configurations
1237 -- 1242Tsuyoshi Miezaki, Manabu Oura. On the cycle index and the weight enumerator
1243 -- 1251Jerod Michel, Qi Wang. Almost difference sets in nonabelian groups
1253 -- 1269Serhii Dyshko. The extension theorem for Lee and Euclidean weight codes over integer residue rings
1271 -- 1296Wenquan Bi, Xiaoyang Dong, Zheng Li, Rui Zong, Xiaoyun Wang. MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes
1297 -- 1322Chun Guo, Yaobin Shen, Lei Wang 0031, Dawu Gu. Beyond-birthday secure domain-preserving PRFs from a single permutation
1323 -- 1344Oriol Farràs, Jordi Ribes-González, Sara Ricci. Local bounds for the optimal information ratio of secret sharing schemes
1345 -- 1371Zhengan Huang, Junzuo Lai, Wenbin Chen 0003, Man Ho Au, Zhen Peng, Jin Li 0002. Simulation-based selective opening security for receivers under chosen-ciphertext attacks
1373 -- 1413David Derler, Daniel Slamanig. Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
1415 -- 1431Yanxun Chang, Hao Zheng, Junling Zhou. Existence of frame-derived H-designs
1433 -- 1445Daniele Bartoli, Matteo Bonini. Minimum weight codewords in dual algebraic-geometric codes from the Giulietti-Korchmáros curve
1447 -- 1455Minjia Shi, Yan Liu, Hugues Randriam, Lin Sok, Patrick Solé. 4, and Boolean functions
1457 -- 0Ferdinand Ihringer, Karen Meagher. Correction to: Miklós-Manickam-Singhi conjectures on partial geometries

Volume 87, Issue 5

955 -- 956Pascale Charpin, Philippe Langevin. Obituary of Jacques Wolfmann (1932-2018)
957 -- 970Alice M. W. Hui, Muhammad Adib Surani, Sanming Zhou. The vertex-isoperimetric number of the incidence and non-incidence graphs of unitals
971 -- 986Yuqing Zhu 0003, Jincheng Zhuang, Hairong Yi, Chang Lv, Dongdai Lin. A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity
987 -- 993Mariusz Meszka, Magdalena Tyniec. Orthogonal one-factorizations of complete multipartite graphs
995 -- 1003Alexander M. Romanov. On non-full-rank perfect codes over finite fields
1005 -- 1033Junji Shikata, Yohei Watanabe 0001. Identity-based encryption with hierarchical key-insulation in the standard model
1035 -- 1058Yanbin Li, Meiqin Wang. Cryptanalysis of MORUS
1059 -- 1068Shoko Chisaki, Yui Kimura, Nobuko Miyamoto. A recursive construction for difference systems of sets
1069 -- 1086Giacomo Micheli, Violetta Weger. Cryptanalysis of the CLR-cryptosystem
1087 -- 1108Ziling Heng, Cunsheng Ding. A construction of q-ary linear codes with irreducible cyclic codes
1109 -- 1136Darcy Best, Trent G. Marbach, Rebecca J. Stones, Ian M. Wanless. Covers and partial transversals of Latin squares
1137 -- 1160Zuling Chang, Martianus Frederic Ezerman, San Ling, Huaxiong Wang. On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials
1161 -- 1182Huiqin Xie, Li Yang. Using Bernstein-Vazirani algorithm to attack block ciphers
1183 -- 1197Vladimir Edemskiy, Chunlei Li, Xiangyong Zeng, Tor Helleseth. n

Volume 87, Issue 4

715 -- 716Ilaria Cardinali, Michel Lavrauw, Klaus Metsch, Alexander Pott. Preface to the special issue on finite geometries
717 -- 744Karen Meagher. An Erdős-Ko-Rado theorem for the group $$\hbox {PSU}(3, q)$$ PSU ( 3 , q )
745 -- 755Marco Buratti. On disjoint (v, k, k-1) difference families
757 -- 768Stefaan De Winter, Zeying Wang. Non-existence of partial difference sets in Abelian groups of order $$8p^3$$ 8 p 3
769 -- 784Marco Buratti, Francesca Merola. Fano Kaleidoscopes and their generalizations
785 -- 794Ivan N. Landjev, Nevyana Georgieva. Conditions for the existence of spreads in projective Hjelmslev spaces
795 -- 806Daniele Bartoli, Massimo Giulietti, Maria Montanucci. Linear codes from Denniston maximal arcs
807 -- 816Stefaan De Winter, Cunsheng Ding, Vladimir D. Tonchev. Maximal arcs and extended cyclic codes
817 -- 830Fernando Piñero, Prasant Singh. The weight spectrum of certain affine Grassmann codes
831 -- 839Dieter Jungnickel, Spyros S. Magliveras, Vladimir D. Tonchev, Alfred Wassermann. The classification of Steiner triple systems on 27 points with 3-rank 24
841 -- 854Assia Rousseva, Ivan N. Landjev. Linear codes close to the Griesmer bound and the related geometric structures
855 -- 863Igor E. Shparlinski, Arne Winterhof. Codes correcting restricted errors
865 -- 877Aart Blokhuis, Leo Storme, Tamás Szonyi. Relative blocking sets of unions of Baer subplanes
879 -- 893Jan De Beule, Jeroen Demeyer, Sam Mattheus, Péter Sziklai. On the cylinder conjecture
895 -- 908Hiroaki Taniguchi. c using presemifields
909 -- 929Bart De Bruyn. Three homogeneous embeddings of DW (2n-1, 2)
931 -- 953Anton Betten, Fatma Karaoglu. Cubic surfaces over small finite fields

Volume 87, Issue 2-3

183 -- 184Faina I. Solov'eva, Daniel Augot, Thomas Johansson, Marine Minier, Victor A. Zinoviev. Editorial: Special issue on coding and cryptography
185 -- 202Christina Boura, Anne Canteaut, Jérémy Jean, Valentin Suder. Two notions of differential equivalence on Sboxes
203 -- 224Claude Carlet. On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures
225 -- 247Roberto Civino, Céline Blondeau, Massimiliano Sala. Differential attacks: using alternative operations
249 -- 260Victor Cauchois, Pierre Loidreau. On circulant involutory MDS matrices
261 -- 276Selçuk Kavut, Subhamoy Maitra, Deng Tang. Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile
277 -- 298Andreas Lenz, Antonia Wachter-Zeh, Eitan Yaakobi. Duplication-correcting codes
299 -- 315Peter Boyvalenkov, Peter D. Dragnev, Douglas P. Hardin, Edward B. Saff, Maya Stoyanova. On spherical codes with inner products in a prescribed interval
317 -- 325Selçuk Kavut, Seher Tutdere. The covering radii of a class of binary cyclic codes and some BCH codes
327 -- 340Jerry Anderson Pinheiro, Roberto Assis Machado, Marcelo Firer. Combinatorial metrics: MacWilliams-type identities, isometries and extension property
341 -- 347Patric R. J. Östergård. The sextuply shortened binary Golay code is optimal
349 -- 364Sabyasachi Dey, Tapabrata Roy, Santanu Sarkar 0001. Some results on Fruit
365 -- 374Tsonka Baicheva, Svetlana Topalova. Classification of optimal (v, k, 1) binary cyclically permutable constant weight codes with $$k=5, $$ k = 5 , 6 and 7 and small lengths
375 -- 391Daniel Heinlein, Thomas Honold, Michael Kiermaier, Sascha Kurz, Alfred Wassermann. Classifying optimal binary subspace codes of length 8, constant dimension 4 and minimum distance 6
393 -- 416Claudio Qureshi, Daniel Panario. The graph structure of Chebyshev polynomials over finite fields and applications
417 -- 435Cristina Fernández-Córdoba, Carlos Vela, Mercè Villanueva. On $$\mathbb {Z}_{2^s}$$ Z 2 s -linear Hadamard codes: kernel and partial classification
437 -- 453Daniel Panario, Lucas Reis. The functional graph of linear maps over finite fields and applications
455 -- 462Elena Egorova, Marcel Fernandez, Grigory Kabatiansky, Moon Ho Lee. Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing
463 -- 480Sihem Mesnager, Ferruh Özbudak, Ahmet Sinak. Linear codes from weakly regular plateaued functions and their secret sharing schemes
481 -- 493Rafael G. L. D'Oliveira, Marcelo Firer. A distance between channels: the average error of mismatched channels
495 -- 507Svetlana Topalova, Stela Zhelezova. Types of spreads and duality of the parallelisms of PG(3, 5) with automorphisms of order 13
509 -- 516Anastasia Vasil'eva. Local distributions for eigenfunctions and perfect colorings of q-ary Hamming graph
517 -- 525Stéphane Ballet, Alexey Zykin. Dense families of modular curves, prime numbers and uniform symmetric tensor rank of multiplication in certain finite fields
527 -- 546Sebati Ghosh, Palash Sarkar 0001. Evaluating Bernstein-Rabin-Winograd polynomials
547 -- 567Hannes Bartz, Vladimir Sidorenko. Improved syndrome decoding of lifted $$L$$ L -interleaved Gabidulin codes
569 -- 587Sergey Bezzateev, Natalia A. Shekhunova. Totally decomposed cumulative Goppa codes with improved estimations
589 -- 607Sven Puchinger, Johan Rosenkilde, Irene I. Bouw. Improved power decoding of interleaved one-point Hermitian codes
609 -- 626Kishan Chand Gupta, Sumit Kumar Pandey, Ayineedi Venkateswarlu. Almost involutory recursive MDS diffusion layers
627 -- 645Hugues Randriam. Gaps between prime numbers and tensor rank of multiplication in finite fields
647 -- 664Lukas Holzbaur, Hannes Bartz, Antonia Wachter-Zeh. Improved decoding and error floor analysis of staircase codes
665 -- 677Oliver W. Gnilke, Marcus Greferath, Camilla Hollanti, Guillermo Nuñez Ponasso, Padraig Ó Catháin, Eric Swartz. Improved user-private information retrieval via finite geometry
679 -- 683S. Alabdullah, J. W. P. Hirschfeld. A new lower bound for the smallest complete (k, n)-arc in $$\mathrm {PG}(2, q)$$ PG ( 2 , q )
685 -- 713Kevin Carrier, Jean-Pierre Tillich. Identifying an unknown code by partial Gaussian elimination

Volume 87, Issue 12

2729 -- 2751Peter J. Dukes, Esther R. Lamken. Constructions and uses of incomplete pairwise balanced designs
2753 -- 2770Chong Shangguan, Gennian Ge. A new piggybacking design for systematic MDS storage codes
2771 -- 2792Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco. New covering codes of radius R, codimension tR and $$tR+\frac{R}{2}$$, and saturating sets in projective spaces
2793 -- 2811Chunming Tang, Cunsheng Ding, Maosheng Xiong. Steiner systems $$S(2, 4, \frac{3^m-1}{2})$$ and 2-designs from ternary linear codes of length $$\frac{3^m-1}{2}$$
2813 -- 2834Claude Carlet, Chengju Li, Sihem Mesnager. Some (almost) optimally extendable linear codes
2835 -- 2845Tran van Trung. Recursive constructions for s-resolvable t-designs
2847 -- 2884Ron Steinfeld, Amin Sakzad, Raymond K. Zhao. Practical $$\mathsf {MP} \text{- }\mathsf {LWE} $$ -based encryption balancing security-risk versus efficiency
2885 -- 2911Guomin Yang, Rongmao Chen, Yi Mu 0001, Willy Susilo, Fuchun Guo, Jie Li. Strongly leakage resilient authenticated key exchange, revisited
2913 -- 2940Qi Chen, Chunming Tang, Zhiqiang Lin. Efficient explicit constructions of compartmented secret sharing schemes
2941 -- 2965San Ling, Buket Özkaya. Multidimensional quasi-twisted codes: equivalent characterizations and their relation to multidimensional convolutional codes
2967 -- 2978Dávid Mezofi, Gábor P. Nagy. On the geometry of full points of abstract unitals
2979 -- 2999Terry Shue Chien Lau, Chik-How Tan. New rank codes based encryption scheme using partial circulant matrices
3001 -- 3018Qian Wang 0013, Chenhui Jin. More accurate results on the provable security of AES against impossible differential cryptanalysis
3019 -- 3043Julia Lieb. Necessary field size and probability for MDP and complete MDP convolutional codes
3045 -- 3062Yujuan Sun, Jia-Fang Zhang, Sugata Gangopadhyay. Construction of resilient Boolean functions in odd variables with strictly almost optimal nonlinearity
3063 -- 3075Claude Carlet, Chengju Li, Sihem Mesnager. Linear codes with small hulls in semi-primitive case
3077 -- 3086Zihui Liu, Jinliang Wang. Linear complementary dual codes over rings

Volume 87, Issue 11

2461 -- 2467Marco Buratti, Dieter Jungnickel. Partitioned difference families versus zero-difference balanced functions
2469 -- 2488Ana-Isabel Gómez, Domingo Gómez-Pérez, Guénaël Renault. A probabilistic analysis on a lattice attack against DSA
2489 -- 2505Masaya Yasuda, Junpei Yamaguchi. A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths
2507 -- 2536Iwan M. Duursma. Matrix theory for minimal trellises
2537 -- 2551Min Kyu Song, Hong-Yeop Song. Hamming correlation properties of the array structure of Sidelnikov sequences
2553 -- 2570Yupu Hu, Huiwen Jia. A new Gaussian sampling for trapdoor lattices with arbitrary modulus
2571 -- 2583John Sheekey. Binary additive MRD codes with minimum distance n-1 must contain a semifield spread set
2585 -- 2596Yi Ouyang, Xianhong Xie. m
2597 -- 2610Sihem Mesnager, Fengrong Zhang, Chunming Tang, Yong Zhou 0003. Further study on the maximum number of bent components of vectorial functions
2611 -- 2623YiWei Zhang, Gennian Ge. A general private information retrieval scheme for MDS coded databases with colluding servers
2625 -- 2637Zixiang Xu, YiWei Zhang, Gennian Ge. New theoretical bounds and constructions of permutation codes under block permutation metric
2639 -- 2654Theodoulos Garefalakis, Giorgos Kapetanakis. Further Results on the Morgan-Mullen Conjecture
2655 -- 2670Jerod Michel, Qi Wang 0012. Partial geometric designs from group actions
2671 -- 2681Kevin M. Byrnes. The maximum length of circuit codes with long bit runs and a new characterization theorem
2683 -- 2700Dong Yang, Wen-Feng Qi, Hua-Jin Chen. Provable security against impossible differential and zero correlation linear cryptanalysis of some feistel structures
2701 -- 2722Siaw-Lynn Ng, Maura B. Paterson. Functional repair codes: a view from projective geometry
2723 -- 2728Xiaoqin Zhan, Suyun Ding, Shuyi Bai. Flag-transitive 2-designs from PSL(2, q) with block size 4

Volume 87, Issue 10

2185 -- 2197Xin Wang, Jie Cui, Lijun Ji. Linear (2, p, p)-AONTs exist for all primes p
2199 -- 2212Nuh Aydin, Jonathan G. G. Lambrinos, Oliver VandenBerg. On equivalence of cyclic codes, generalization of a quasi-twisted search algorithm, and new linear codes
2213 -- 2230Liang Bai, Zihui Liu. On the third greedy weight of 4-dimensional codes
2231 -- 2250Matvei Kotov, Anton Menshov, Alexander Ushakov. An attack on the Walnut digital signature algorithm
2251 -- 2265Junying Liu, Yupeng Jiang, Qunxiong Zheng, Dongdai Lin. A new construction of zero-difference balanced functions and two applications
2267 -- 2294Tian Tian 0004, Jia-Min Zhang, Wen-Feng Qi. On the uniqueness of a type of cascade connection representations for NFSRs
2295 -- 2320Umberto Martínez-Peñas. Theory of supports for linear codes endowed with the sum-rank metric
2321 -- 2333Qichun Wang. Hadamard matrices, d-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights
2335 -- 2340R. Sobhani, A. Abdollahi, J. Bagherian, M. Khatami. A note on good permutation codes from Reed-Solomon codes
2341 -- 2360Hadi Kharaghani, Sho Suda. Linked systems of symmetric group divisible designs of type II
2361 -- 2374Jon-Lark Kim, Junyong Park, Soohak Choi. Steganographic schemes from perfect codes on Cayley graphs
2375 -- 2389Bhaskar Bagchi. A coding theoretic approach to the uniqueness conjecture for projective planes of prime order
2391 -- 2393Minglong Qi, Shengwu Xiong. A correction to: on the linear complexity of the Sidelnikov-Lempel-Cohn-Eastman sequences
2395 -- 2404Minjia Shi, Patrick Solé. Three-weight codes, triple sum sets, and strongly walk regular graphs
2405 -- 2417José Ándrés Armario, D. L. Flannery. Generalized binary arrays from quasi-orthogonal cocycles
2419 -- 2446Yuan Cao 0001, Yonglin Cao, Steven T. Dougherty, San Ling. 4 of oddly even length
2447 -- 2460Shuxing Li. On the weight distribution of second order Reed-Muller codes and their relatives

Volume 87, Issue 1

1 -- 13Xinxin Fan, Guang Gong, Berry Schoenmakers, Francesco Sica, Andrey Sidorenko. Secure simultaneous bit extraction from Koblitz curves
15 -- 29Haibo Liu, Qunying Liao. Several classes of linear codes with a few weights from defining sets over $$\mathbb {F}_p+u\mathbb {F}_p$$ F p + u F p
31 -- 56Shihui Fu, Xiutao Feng. Involutory differentially 4-uniform permutations from known constructions
57 -- 65John T. Ethier, Gary L. Mullen. Sets of mutually orthogonal Sudoku frequency squares
67 -- 74Ronan Egan. Phased unitary Golay pairs, Butson Hadamard matrices and a conjecture of Ito's
75 -- 85Thierry Mefenza, Damien Vergnaud. Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions
87 -- 95Minjia Shi, Hongwei Zhu, Patrick Solé, Gérard D. Cohen. How many weights can a linear code have?
97 -- 106Minquan Cheng, Jing Jiang, Qiang Wang. Improved bounds on 2-frameproof codes with length 4
107 -- 121Tao Zhang, Gennian Ge. Constructions of optimal Ferrers diagram rank metric codes
123 -- 147Azam Soleimanian, Shahram Khazaei. Publicly verifiable searchable symmetric encryption based on efficient cryptographic components
149 -- 162Shiyong Zhang, Gongliang Chen. New results on the state cycles of Trivium
163 -- 171Zhixiong Chen, Ting Gu, Andrew Klapper. On the q-bentness of Boolean functions
173 -- 182Alp Bassa, Henning Stichtenoth. Self-dual codes better than the Gilbert-Varshamov bound