Journal: Des. Codes Cryptography

Volume 88, Issue 9

1699 -- 0Anne Canteaut, Gohar M. M. Kyureghyan, Alexander Pott, Felix Ulmer. Editorial: Coding and Cryptography 2019
1701 -- 1722Alexandr Polujan, Alexander Pott. Cubic bent functions outside the completed Maiorana-McFarland class
1723 -- 1740Daniel Gerike, Gohar M. M. Kyureghyan. Permutations on finite fields with invariant cycle structure on lines
1741 -- 1757Pan Tan, Zhengchun Zhou, Vladimir Sidorenko, Udaya Parampalli. Two classes of optimal LRCs with information (r, t)-locality
1759 -- 1780Jian Liu 0004, Sihem Mesnager, Deng Tang. Constructions of optimal locally recoverable codes via Dickson polynomials
1781 -- 1810Tuvi Etzion, Sascha Kurz, Kamil Otal, Ferruh Özbudak. Subspace packings: constructions and bounds
1811 -- 1826Peter Boyvalenkov, Peter D. Dragnev, Douglas P. Hardin, Edward B. Saff, Maya Stoyanova. Upper bounds for energies of spherical codes of given cardinality and separation
1827 -- 1856Sabyasachi Dey 0001, Santanu Sarkar 0001. Proving the biases of Salsa and ChaCha in differential attack
1857 -- 1866Jean-Christophe Deneuville, Philippe Gaborit. Cryptanalysis of a code-based one-time signature
1867 -- 1883Ana Salagean, Ferruh Özbudak. Counting Boolean functions with faster points
1885 -- 1892Elena Egorova, Marcel Fernandez, Grigory Kabatiansky. On non-binary traceability set systems
1893 -- 1907Ryutaroh Matsumoto. Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets
1909 -- 1924Gretchen L. Matthews, Fernando Piñero. Codes with locality from cyclic extensions of Deligne-Lusztig curves
1925 -- 1940Assia Rousseva, Ivan N. Landjev. The geometric approach to the existence of some quaternary Griesmer codes
1941 -- 1957Daniel Coggia, Alain Couvreur. On the security of a Loidreau rank metric code based encryption scheme
1959 -- 1989Shizhu Tian, Christina Boura, Léo Perrin. Boomerang uniformity of popular S-box constructions
1991 -- 2005Delphine Boucher. An algorithm for decoding skew Reed-Solomon codes with respect to the skew metric

Volume 88, Issue 8

1477 -- 1478Peter Beelen, Olav Geil, Edgar Martínez-Moro, Xin-Wen Wu. Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan
1479 -- 1502Mojtaba Fadavi, Reza Rezaeian Farashahi. Uniform encodings to elliptic curves and indistinguishable point representation
1503 -- 1519Thomas Britz, Adam Mammoliti, Keisuke Shiromoto. Wei-type duality theorems for rank metric codes
1521 -- 1539Umberto Martínez-Peñas. Hamming and simplex codes for the sum-rank metric
1541 -- 1560Lucky Galvez, Jon-Lark Kim. Construction of self-dual matrix codes
1561 -- 1593Alain Couvreur, Isabella Panaccione. Power error locating pairs
1595 -- 1616Alonso Sepúlveda Castellanos, Maria Bras-Amorós. Weierstrass semigroup at m+1 rational points in maximal curves which cannot be covered by the Hermitian curve
1617 -- 1638Maria Bras-Amorós, Iwan M. Duursma, Euijin Hong. Isometry-dual flags of AG codes
1639 -- 1652René Bødker Christensen, Olav Geil. Steane-enlargement of quantum codes from the Hermitian function field
1653 -- 1672Ignacio García-Marco, Irene Márquez Corbella, Diego Ruano. High dimensional affine codes whose square has a designed minimum distance
1673 -- 1685Hiram H. López, Gretchen L. Matthews, Ivan Soprunov. Monomial-Cartesian codes and their duals, with applications to LCD codes, quantum codes, and locally recoverable codes
1687 -- 1698Irene Márquez Corbella, Edgar Martínez-Moro, Carlos Munuera. Computing sharp recovery structures for locally recoverable codes

Volume 88, Issue 7

1285 -- 1300Julien Lavauzelle, Julian Renner. Cryptanalysis of a system based on twisted Reed-Solomon codes
1301 -- 1329Alexandru Chirvasitu, Thomas W. Cusick. Affine equivalence for quadratic rotation symmetric Boolean functions
1331 -- 1348Tovohery Hajatiana Randrianarisoa. A geometric approach to rank metric codes and a classification of constant weight codes
1349 -- 1369Minfeng Shao, Ying Miao. On optimal weak algebraic manipulation detection codes and weighted external difference families
1371 -- 1400Dingding Jia, Yamin Liu, Bao Li. IBE with tight security against selective opening and chosen-ciphertext attacks
1401 -- 1445Lorenzo Grassi 0001, Christian Rechberger. Revisiting Gilbert's known-key distinguisher
1447 -- 1461Xuanlong Ma, Min Feng 0004, Kaishun Wang. Subgroup perfect codes in Cayley sum graphs
1463 -- 1475Yupeng Jiang, Dongdai Lin. Longest subsequences shared by two de Bruijn sequences

Volume 88, Issue 6

993 -- 1021Brett Hemenway Falk, Nadia Heninger, Michael Rudow. Properties of constacyclic codes under the Schur product
1023 -- 1036Ryann Cartor, Daniel Smith-Tone. * family
1037 -- 1046Minjia Shi, Li Xu, Denis S. Krotov. On the number of resolvable Steiner triple systems of small 3-rank
1047 -- 1081Aurore Guillevic, Simon Masson, Emmanuel Thomé. Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation
1083 -- 1102Hong-Yu Sun, Xuan Yong Zhu, Qun-Xiong Zheng. Predicting truncated multiple recursive generators with unknown parameters
1103 -- 1126Boxin Zhao, Xiaoyang Dong, Willi Meier, Keting Jia, Gaoli Wang. Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT
1127 -- 1138Xiaolei Fang, Khawla Lebed, Hongwei Liu, Jinquan Luo. New MDS self-dual codes over finite fields of odd characteristic
1139 -- 1158Wei Lu, Xia Wu, Xiwang Cao, Ming Chen. Six constructions of asymptotically optimal codebooks via the character sums
1159 -- 1177Lilya Budaghyan, Nikolay S. Kaleyski, Constanza Riera, Pantelimon Stanica. Partially APN functions with APN-like polynomial representations
1179 -- 1203Xiaoyang Dong, Bingyou Dong, Xiaoyun Wang. Quantum attacks on some feistel block ciphers
1205 -- 1226Xiao-Xin Zhao, Qun-Xiong Zheng, Zhong-Xiao Wang, Wen-Feng Qi. On a class of isomorphic NFSRs
1227 -- 1253María Chara, Ricardo A. Podestá, Ricardo Toledano. Block transitive codes attaining the Tsfasman-Vladut-Zink bound
1255 -- 1272Yanan Wu, Nian Li, Xiangyong Zeng. Linear codes with few weights from cyclotomic classes and weakly regular bent functions
1273 -- 1284Mrinmoy Datta. Relative generalized Hamming weights of affine Cartesian codes

Volume 88, Issue 5

789 -- 805Heiko Dietrich, Jeroen Schillewaert. On a duality for codes over non-abelian groups
807 -- 824Zenghui Fang, Junling Zhou. The sizes of maximal (v, k, k-2, k-1) optical orthogonal codes
825 -- 840Sanjit Bhowmick, Alexandre Fotue Tabue, Edgar Martínez-Moro, Ramakrishna Bandi, Satya Bagchi. Do non-free LCD codes over finite commutative Frobenius rings exist?
841 -- 850Yue Zhou 0001. On equivalence of maximum additive symmetric rank-distance codes
851 -- 866Jing Jiang 0003, Yujie Gu, Minquan Cheng. Multimedia IPP codes with efficient tracing
867 -- 886Andrea Ferraguti, Giacomo Micheli. Full classification of permutation rational functions and complete rational functions of degree three over finite fields
887 -- 930Gaoli Wang, Fukang Liu, Binbin Cui, Florian Mendel, Christoph Dobraunig. Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160
931 -- 950Elena Kirshanova, Huyen Nguyen, Damien Stehlé, Alexandre Wallet. On the smoothing parameter and last minimum of random orthogonal lattices
951 -- 970Bohua Zhu, Junling Zhou, Yanxun Chang. 2-(v, 5; m) spontaneous emission error designs
971 -- 992Seyed Hassan Alavi, Mohsen Bayat, Jalal Choulaki, Ashraf Daneshkhah. Flag-transitive block designs with prime replication number and almost simple groups

Volume 88, Issue 4

625 -- 641Cunsheng Ding, Chunming Tang, Vladimir D. Tonchev. Linear codes of 2-designs associated with subcodes of the ternary generalized Reed-Muller codes
643 -- 653Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville, Philippe Gaborit, Terry Shue Chien Lau, Chik-How Tan, Keita Xagawa. Cryptanalysis of a rank-based signature with short public keys
655 -- 675John Sheekey, Geertrui Van de Voorde. Rank-metric codes, linear sets, and their duality
677 -- 709Liang Feng Zhang, Reihaneh Safavi-Naini. Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions
711 -- 725Alessandro Neri 0002, Anna-Lena Horlemann-Trautmann. Random construction of partial MDS codes
727 -- 746Xiusheng Liu, Hualu Liu. σ-LCD codes over finite chain rings
747 -- 754Hans-Joachim Kroll, Rita Vincenti. Linear codes from ruled sets in finite projective spaces
755 -- 770Ka Hin Leung, Qi Wang 0012. New nonexistence results on (m, n)-generalized bent functions
771 -- 788Sam Adriaensen, Lins Denaux, Leo Storme, Zsuzsa Weiner. Small weight code words arising from the incidence of points and hyperplanes in PG(n, q)

Volume 88, Issue 3

471 -- 486Ana Salagean. Discrete antiderivatives for functions over $\mathop {{\mathbb {F}}}_p^n$
487 -- 503Xiang Wang, Fang-Wei Fu. ∞ -metric for rank modulation
505 -- 532Dipayan Das, Jeffrey Hoffstein, Jill Pipher, William Whyte, Zhenfei Zhang. Modular lattice signatures, revisited
533 -- 552Yubo Li, Zhichao Yang, Kangquan Li, Longjiang Qu. A new algorithm on the minimal rational fraction representation of feedback with carry shift registers
553 -- 565Can Xiang, Xin Ling, Qi Wang. Combinatorial t-designs from quadratic functions
567 -- 583Saban Alaca, Goldwyn Millar. Shift-inequivalent decimations of the Sidelnikov-Lempel-Cohn-Eastman sequences
585 -- 593Raphael Yuster. Perfect sequence covering arrays
595 -- 599Sascha Kurz. Subspaces intersecting in at most a point
601 -- 623Samir Hodzic, Enes Pasalic, Sugata Gangopadhyay. Generic constructions of $\mathbb {Z}$-bent functions

Volume 88, Issue 2

241 -- 255Hongwei Liu, Xu Pan. Galois hulls of linear codes over finite fields
257 -- 271Xia Li, Qin Yue. max<1/2 derived from Boolean functions
273 -- 296José Martínez-Bernal, Miguel A. Valencia-Bucio, Rafael H. Villarreal. Linear codes over signed graphs
297 -- 309Yan Liu, Xiwang Cao, Wei Lu. On some conjectures about optimal ternary cyclic codes
311 -- 339Sergey Bereg, Luis Gerardo Mojica, Linda Morales, Ivan Hal Sudborough. Constructing permutation arrays using partition and extension
341 -- 361Jun Xu 0022, Lei Hu, Santanu Sarkar 0001. Cryptanalysis of elliptic curve hidden number problem from PKC 2017
363 -- 390Tim van de Kamp, Andreas Peter, Willem Jonker. A multi-authority approach to various predicate encryption types
391 -- 411Luca Mariot, Maximilien Gadouleau, Enrico Formenti, Alberto Leporati. Mutually orthogonal latin squares based on cellular automata
413 -- 427Xin Ling, Sihem Mesnager, Yanfeng Qi, Chunming Tang. A class of narrow-sense BCH codes over $\mathbb {F}_q$ of length $\frac{q^m-1}{2}$
429 -- 452Bart De Bruyn, Mou Gao. On four codes with automorphism group PΣ L(3, 4) and pseudo-embeddings of the large Witt designs
453 -- 470Jong Yoon Hyun, Jungyun Lee, Yoonjin Lee. Ramanujan graphs and expander families constructed from p-ary bent functions

Volume 88, Issue 12

2453 -- 2473Xinmei Huang, Qin Yue, Yansheng Wu, Xiaoping Shi, Jerod Michel. Binary primitive LCD BCH codes
2475 -- 2492Jong Yoon Hyun, Hyun Kwang Kim, Yansheng Wu, Qin Yue. Optimal minimal linear codes from posets
2493 -- 2505Minjia Shi, Wang Xuan, Patrick Solé. Two families of two-weight codes over $\mathbb {Z}_4$
2507 -- 2519Junling Zhou, Wenling Zhou. Wide-sense 2-frameproof codes
2521 -- 2530Petr Lisonek. Maximal nonassociativity via fields
2531 -- 2546Sudhir R. Ghorpade, Trygve Johnsen. A polymatroid approach to generalized weights of rank metric codes
2547 -- 2560Minjia Shi, Li Xu, Patrick Solé. Construction of isodual codes from polycirculant matrices
2561 -- 2579Juliane Capaverde, Ariane M. Masuda, Virginia M. Rodrigues. Rédei permutations with cycles of the same length
2581 -- 2596Whan-Hyuk Choi, Hyun Jin Kim 0002, Yoonjin Lee. Construction of single-deletion-correcting DNA codes using CIS codes
2597 -- 2621Lukas Kölsch. On the inverses of Kasami and Bracken-Leander exponents

Volume 88, Issue 11

2275 -- 2287Yanyan Gao, Qin Yue, Yansheng Wu. LCD codes and self-orthogonal codes in generalized dihedral group algebras
2289 -- 2311Yunwen Liu, Wenying Zhang, Bing Sun, Vincent Rijmen, Guoqiang Liu, Chao Li 0002, Shaojing Fu, Meichun Cao. The phantom of differential characteristics
2313 -- 2335Martin Ekerå. On post-processing in the quantum algorithm for computing short discrete logarithms
2337 -- 2359Seyed Hassan Alavi, Ashraf Daneshkhah, Cheryl E. Praeger. Symmetries of biplanes
2361 -- 2376Yeow Meng Chee, Charles J. Colbourn, Hoang Dau, Ryan Gabrys, Alan C. H. Ling, Dylan Lusi, Olgica Milenkovic. Access balancing in storage systems by labeling partial Steiner systems
2377 -- 2386Juanjuan Xu, Jingjun Bao, Lijun Ji. 2n+1
2387 -- 2396Khodakhast Bibak. Deletion correcting codes meet the Littlewood-Offord problem
2397 -- 2405Cem Güneri, Edgar Martínez-Moro, Selcen Sayici. Linear complementary pair of group codes over finite chain rings
2407 -- 2431Xinxin Gong, Bin Zhang 0003. Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G
2433 -- 2452Youngkyung Lee, Dong Hoon Lee 0001, Jong Hwan Park. Tightly CCA-secure encryption scheme in a multi-user setting with corruptions

Volume 88, Issue 10

2007 -- 2035Samir Hodzic, Enes Pasalic, Yongzhuang Wei. A general framework for secondary constructions of bent and plateaued functions
2037 -- 2049Vladimir N. Potapov. On q-ary bent and plateaued functions
2051 -- 2065Kai Lin Ong, Ang Miin Huey. On equivalency of zero-divisor codes via classifying their idempotent generator
2067 -- 2076Yujie Gu, Shohei Satake. On 2-parent-identifying set systems of block size 4
2077 -- 2100Masaya Yasuda, Satoshi Nakamura, Junpei Yamaguchi. Analysis of DeepBKZ reduction for finding short lattice vectors
2101 -- 2118Yan Zhu, Naoki Watamura. Relative t-designs in Johnson association schemes for P-polynomial structure
2119 -- 2132Mengna Wu, Chengju Li, Zilong Wang. s)
2133 -- 2170Christian Elsholtz, Péter Pál Pach. Caps and progression-free sets in ${{\mathbb {Z}}}_m^n$
2171 -- 2186Lijing Zheng, Jie Peng, Haibin Kan, Yanjun Li, Juan Luo. On constructions and properties of (n, m)-functions with maximal number of bent components
2187 -- 2206Simona Boyadzhiyska, Shagnik Das, Tibor Szabó. Enumerating extensions of mutually orthogonal Latin squares
2207 -- 2231Baptiste Lambin, Patrick Derbez, Pierre-Alain Fouque. Linearly equivalent S-boxes and the division property
2233 -- 2246Sihem Mesnager, Chunming Tang, Maosheng Xiong. On the boomerang uniformity of quadratic permutations
2247 -- 2273Boran Kim, Yoonjin Lee. 3 >

Volume 88, Issue 1

1 -- 15José Gómez-Torrecillas, Erik Hieta-aho, F. J. Lobillo, Sergio R. López-Permouth, Gabriel Navarro 0001. Some remarks on non projective Frobenius algebras and linear codes
17 -- 31Simeon Ball, Michel Lavrauw. Arcs and tensors
33 -- 39Susan G. Barwick, Alice M. W. Hui, Wen-Ai Jackson, Jeroen Schillewaert. Characterising hyperbolic hyperplanes of a non-singular quadric in PG(4, q)
41 -- 49Jasvinder Singh, Manish Gupta, Jaskarn Singh Bhullar. Construction of girth-8 (3, L)-QC-LDPC codes of smallest CPM size using column multipliers
51 -- 62Sihem Mesnager, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee. A proof of the Beierle-Kranz-Leander conjecture related to lightweight multiplication in $\mathbb {F}_{2^n}$
63 -- 72Sergey Bereg, Peter J. Dukes. A lower bound on permutation codes of distance n-1
73 -- 90Tai Do Duc. Necessary conditions for the existence of group-invariant Butson Hadamard matrices and a new family of perfect arrays
91 -- 117Stefan Kölbl, Elmar Tischhauser, Patrick Derbez, Andrey Bogdanov. Troika: a ternary cryptographic hash function
119 -- 131Rong Pan, Tao Feng 0002, Lidong Wang, Xiaomiao Wang. Optimal optical orthogonal signature pattern codes with weight three and cross-correlation constraint one
133 -- 152Kenza Guenda, T. Aaron Gulliver, Somphong Jitman, Satanan Thipworawimon. Linear ℓ-intersection pairs of codes and their applications
153 -- 171Xiao-Xin Zhao, Wen-Feng Qi, Jia-Min Zhang. Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs
173 -- 199Abhishek Kesarwani, Dibyendu Roy 0003, Santanu Sarkar 0001, Willi Meier. New cube distinguishers on NFSR-based stream ciphers
201 -- 222Aleksandr Kutsenko. Metrical properties of self-dual bent functions
223 -- 239Rohit Gupta. Several new permutation quadrinomials over finite fields of odd characteristic