Journal: Des. Codes Cryptography

Volume 89, Issue 9

2033 -- 2050Hadi Kharaghani, Thomas Pender, Sho Suda. Balancedly splittable orthogonal designs and equiangular tight frames
2051 -- 2065Hongwei Liu, Shengwei Liu. Construction of MDS twisted Reed-Solomon codes and LCD MDS codes
2067 -- 2078Péter Ligeti, Péter Sziklai, Marcella Takáts. Generalized threshold secret sharing and finite geometry
2079 -- 2096Fatemeh Ghasemi, Reza Kaboli, Shahram Khazaei, Maghsoud Parviz, Mohammad-Mahdi Rafiei. On ideal homomorphic secret sharing schemes and their decomposition
2097 -- 2112Nicolas Aragon, Marco Baldi, Jean-Christophe Deneuville, Karan Khathuria, Edoardo Persichetti, Paolo Santini. Cryptanalysis of a code-based full-time signature
2113 -- 2155Sadegh Sadeghi, Vincent Rijmen, Nasour Bagheri. Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK
2157 -- 2162Edoardo Ballico. Locally Recoverable Codes correcting many erasures over small fields
2163 -- 2177Trygve Johnsen, Hugues Verdure. Möbius and coboundary polynomials for matroids
2179 -- 2193Xiaojing Chen 0002, Shixin Zhu, Wan Jiang, Gaojun Luo. A new family of EAQMDS codes constructed from constacyclic codes
2195 -- 2209Daitao Huang, Qin Yue, Yongfeng Niu, Xia Li. MDS or NMDS self-dual codes from twisted generalized Reed-Solomon codes

Volume 89, Issue 8

1757 -- 1786Junqing Gong, Haifeng Qian. Simple and efficient FE for quadratic functions
1787 -- 1837Varsha Chauhan, Anuradha Sharma, Sandeep Sharma, Monika Yadav. Hamming weight distributions of multi-twisted codes over finite fields
1839 -- 1852Shoko Chisaki, Ryoh Fuji-Hara, Nobuko Miyamoto. A construction for circulant type dropout designs
1853 -- 1873Giovanni Zini, Ferdinando Zullo. Scattered subspaces and related codes
1875 -- 1905Ling Song 0001, Yi Tu, Danping Shi, Lei Hu. Security analysis of Subterranean 2.0
1907 -- 1926Sebati Ghosh, Palash Sarkar 0001. Breaking tweakable enciphering schemes using Simon's algorithm
1927 -- 1963Atsushi Takayasu. Tag-based ABE in prime-order groups via pair encoding
1965 -- 1992Atsushi Takayasu. Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity
1993 -- 2007Ziling Heng, Dexiang Li, Jiao Du, Fuling Chen. A family of projective two-weight linear codes
2009 -- 2030Xiaoqiang Wang 0001, Dabin Zheng, Yan Zhang. Binary linear codes with few weights from Boolean functions
2031 -- 0Ruikai Chen, Sihem Mesnager, Chang-An Zhao. Correction to: Good polynomials for optimal LRC of low locality

Volume 89, Issue 7

1367 -- 1403Hiram H. López, Ivan Soprunov, Rafael H. Villarreal. The dual of an evaluation code
1405 -- 1432Tairong Shi, Wenling Wu, Bin Hu 0011, Jie Guan, Sengpeng Wang. Breaking LWC candidates: sESTATE and Elephant in quantum setting
1433 -- 1452Mahdi Sajadieh, Mohsen Mousavi. Construction of MDS matrices from generalized Feistel structures
1453 -- 1483Yumeng Yang, Xiangyong Zeng, Shi Wang. Construction of lightweight involutory MDS matrices
1485 -- 1507Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei. Wide minimal binary linear codes from the general Maiorana-McFarland class
1509 -- 1534Kanat S. Abdukhalikov. Equivalence classes of Niho bent functions
1535 -- 1574Keita Emura, Atsushi Takayasu, Yohei Watanabe 0001. Adaptively secure revocable hierarchical IBE from k-linear assumption
1575 -- 1614Yanwei Zhou, Bo Yang 0003, Zhe Xia, Mingwu Zhang, Yi Mu 0001. Novel generic construction of leakage-resilient PKE scheme with CCA security
1615 -- 1638Steven T. Dougherty, Joe Gildea, Adrian Korban, Abidin Kaya. Composite matrices from group rings, composite G-codes and constructions of self-dual codes
1639 -- 1660Ruikai Chen, Sihem Mesnager, Chang-An Zhao. Good polynomials for optimal LRC of low locality
1661 -- 1690Tuvi Etzion, Junling Zhou. Large sets with multiplicity
1691 -- 1712Huaning Liu, Xi Liu. m
1713 -- 1734Cunsheng Ding, Chunming Tang 0001, Vladimir D. Tonchev. m+1
1735 -- 1756Oriol Farràs, Jordi Ribes-González, Sara Ricci. Privacy-preserving data splitting: a combinatorial approach

Volume 89, Issue 6

1111 -- 1145Hanwen Feng 0001, Jianwei Liu 0001, Dawei Li, Ya-Nan Li 0007, Qianhong Wu. Traceable ring signatures: general framework and post-quantum security
1147 -- 1157Huili Dong. Flag-transitive 4-designs and PSL(2, q) groups
1159 -- 1180Jun Guo 0004. Cameron-Liebler sets in bilinear forms graphs
1181 -- 1191Haode Yan, Chengju Li. Differential spectra of a class of power permutations with characteristic 5
1193 -- 1210Zhengbang Zha, Lei Hu. Some classes of power functions with low c-differential uniformity over finite fields
1211 -- 1220Daniel R. Hawtin. s-Elusive codes in Hamming graphs
1221 -- 1239Daniele Bartoli, Maria Montanucci, Giovanni Zini. On certain self-orthogonal AG codes with applications to Quantum error-correcting codes
1241 -- 1254Himadri Shekhar Chakraborty, Tsuyoshi Miezaki. Average of complete joint weight enumerators and self-dual codes
1255 -- 1260Jianfu Chen, Shenglin Zhou. Flag-transitive, point-imprimitive 2-(v, k, λ ) symmetric designs with k and λ prime powers
1261 -- 1277Giovanni Falcone, Marco Pavone. Binary Hamming codes and Boolean designs
1279 -- 1319Julian Renner, Sven Puchinger, Antonia Wachter-Zeh. LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding
1321 -- 1333Jonathan S. Turner, Ilias S. Kotsireas, Dursun A. Bulutoglu, Andrew J. Geyer. A Legendre pair of length 77 using complementary binary matrices with fixed marginals
1335 -- 1364Olive Chakraborty, Jean-Charles Faugère, Ludovic Perret. Cryptanalysis of the extension field cancellation cryptosystem
1365 -- 1366Alexandr A. Polujan, Alexander Pott. Correction to: Cubic bent functions outside the completed Maiorana-McFarland class

Volume 89, Issue 5

763 -- 780Tsuyoshi Miezaki. Design-theoretic analogies between codes, lattices, and vertex operator algebras
781 -- 795Zhaoping Meng, Bin Zhang, Zhanggui Wu. Constructions of doubly resolvable Steiner quadruple systems
797 -- 809Hualu Liu, Peng Hu, Xiusheng Liu. Asymmetric entanglement-assisted quantum codes: bound and constructions
811 -- 821Simeon Ball. Some constructions of quantum MDS codes
823 -- 841Lin Sok. New families of self-dual codes
843 -- 858Tsuyoshi Miezaki, Akihiro Munemasa, Hiroyuki Nakasora. A note on Assmus-Mattson type theorems
859 -- 893Bart Mennink, Samuel Neves. On the Resilience of Even-Mansour to Invariant Permutations
895 -- 923Dingding Jia, Benoît Libert. SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions
925 -- 963Veronika Kuchta, Amin Sakzad, Ron Steinfeld, Joseph K. Liu. Lattice-based zero-knowledge arguments for additive and multiplicative relations
965 -- 972Angela Aguglia, Luca Giuzzi, Angelo Sonnino. Near-MDS codes from elliptic curves
973 -- 1016Wonhee Cho, Jiseung Kim 0001, Changmin Lee. (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps
1017 -- 1059Nan Cui, Shengli Liu, Dawu Gu, Jian Weng 0001. Robustly reusable fuzzy extractor with imperfect randomness
1061 -- 1090Masoumeh Shafieinejad, Navid Nasr Esfahani. A scalable post-quantum hash-based group signature
1091 -- 1109Ankur, Pramod Kumar Kewat. Self-dual codes over ${\mathbb {F}}_2[u]/\langle u^4 \rangle $ and Jacobi forms over a totally real subfield of ${\mathbb {Q}}(\zeta _8)$

Volume 89, Issue 4

599 -- 615José Ándrés Armario, Iván Bailera, Ronan Egan. Generalized Hadamard full propelinear codes
617 -- 640Makoto Araya, Masaaki Harada, Ken Saito. Characterization and classification of optimal LCD codes
641 -- 678Tania Sidana, Anuradha Sharma. Roulette games and depths of words over finite commutative rings
679 -- 693Zhongxiao Wang, Qunxiong Zheng, Xiao-Xin Zhao, Xiutao Feng. Grain-like structures with minimal and maximal period sequences
695 -- 707Yuhua Sun, Tongjiang Yan, Qiuyan Wang. The 2-adic complexity of Yu-Gong sequences with interleaved structure and optimal autocorrelation magnitude
709 -- 736Sebati Ghosh, Palash Sarkar 0001. Variants of Wegman-Carter message authentication code supporting variable tag lengths
737 -- 761Kangquan Li, Chunlei Li 0001, Tor Helleseth, Longjiang Qu. Cryptographically strong permutations from the butterfly structure

Volume 89, Issue 3

407 -- 440Chun Guo 0002, Guoyan Zhang. Beyond-birthday security for permutation-based Feistel networks
441 -- 446Claude Carlet, Kwang Ho Kim, Sihem Mesnager. A direct proof of APN-ness of the Kasami functions
447 -- 470Heide Gluesing-Luerssen, Hunter Lehmann. Distance Distributions of Cyclic Orbit Codes
471 -- 487Daniele Bartoli, Matteo Bonini, Marco Timpanella. On the weight distribution of some minimal codes
489 -- 496Stefano Innamorati, Fulvio Zuanni. 2 in PG(r, q), $r\ge 3$
497 -- 515Hiram H. López, Beth Malmskog, Gretchen L. Matthews, Fernando Piñero-González, Mary Wootters. Hermitian-lifted codes
517 -- 523James A. Davis, J. J. Hoo, Connor Kissane, Ziming Liu, Calvin Reedy, Kartikey Sharma, Ken Smith, Yiwei Sun. Abelian difference sets with the symmetric difference property
525 -- 558Nicholas J. Cavenagh, Adam Mammoliti, Ian M. Wanless. Maximal sets of mutually orthogonal frequency squares
559 -- 587Sascha Kurz, Eitan Yaakobi. PIR Codes with Short Block Length
589 -- 597Tran van Trung. An extending theorem for s-resolvable t-designs

Volume 89, Issue 2

199 -- 219Edoardo Ballico, Giuseppe Favacchio, Elena Guardo, Lorenzo Milazzo 0001. Steiner systems and configurations of points
221 -- 239Sartaj Ul Hasan, Mohit Pal, Constanza Riera, Pantelimon Stanica. On the c-differential uniformity of certain maps over finite fields
241 -- 253Xiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao. Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity
255 -- 268Jingkun Zhou, Zhiwen He, Zhao Chai. Two kinds of constructions of directed strongly regular graphs
269 -- 300Delio Jaramillo, Maria Vaz Pinto, Rafael H. Villarreal. Evaluation codes and their basic parameters
301 -- 315Cícero Carvalho, Victor G. L. Neumann. Towards the Complete Determination of Next-to-Minimal Weights of Projective Reed-Muller Codes
317 -- 339Chen-Dong Ye, Tian Tian 0004, Fan-Yang Zeng. The MILP-aided conditional differential attack and its application to Trivium
341 -- 350Eiichi Bannai, Manabu Oura, Da Zhao. The complex conjugate invariants of Clifford groups
351 -- 386Julian Renner, Alessandro Neri 0002, Sven Puchinger. Low-rank parity-check codes over Galois rings
387 -- 405Trygve Johnsen, Hugues Verdure. Greedy weights for matroids

Volume 89, Issue 12

2653 -- 2662Laura Monroe. Binary signed-digit integers and the Stern diatomic sequence
2663 -- 2677Jinjin Chai, Zilong Wang, Erzhong Xue. Walsh spectrum and nega spectrum of complementary arrays
2679 -- 2696Binbin Pang, Shixin Zhu, Xiaoshan Kai. Five families of the narrow-sense primitive BCH codes over finite fields
2697 -- 2714WeiGuo Zhang 0001, Yujuan Sun, Enes Pasalic. Three classes of balanced vectorial semi-bent functions
2715 -- 2723M. H. Ahmadi, N. Akhlaghinia, Gholamreza B. Khosrovshahi, S. Sadri. New partitionings of complete designs
2725 -- 2757Simona Bonvicini, Marco Buratti, Martino Garonzi, Gloria Rinaldi, Tommaso Traetta. The first families of highly symmetric Kirkman Triple Systems whose orders fill a congruence class
2759 -- 2785Sascha Kurz. Bounds for flag codes
2787 -- 2806Chen-Dong Ye, Tian Tian 0004. An improved degree evaluation method of NFSR-based cryptosystems
2807 -- 2839Yiming Li, Shengli Liu, Shuai Han 0001, Dawu Gu. Pseudorandom functions in NC class from the standard LWE assumption
2841 -- 2855Hariom Sharma, R. K. Sharma. Existence of primitive normal pairs with one prescribed trace over finite fields
2857 -- 2867Navid Nasr Esfahani, Douglas R. Stinson. On security properties of all-or-nothing transforms
2869 -- 2888Ziran Tu, Xiangyong Zeng, Yupeng Jiang, Yan Li. Binomial permutations over finite fields with even characteristic

Volume 89, Issue 11

2433 -- 2443Michail I. Rozhkov, Alexander V. Sorokin. Some conditions for absence of affine functions in NFSR output stream
2445 -- 2461Stefka Bouyuklieva. Optimal binary LCD codes
2463 -- 2475Amar Bapic, Enes Pasalic. A new method for secondary constructions of vectorial bent functions
2477 -- 2493Qian Wang 0013, Chenhui Jin. Bounding the length of impossible differentials for SPN block ciphers
2495 -- 2509Peng Hu, Xiusheng Liu. Linear complementary pairs of codes over rings
2511 -- 2531Xiang Wang, Yuanjie Wang, Wenjuan Yin, Fang-Wei Fu 0001. Nonexistence of perfect permutation codes under the Kendall τ-metric
2533 -- 2551Xiaojing Chen 0002, Shixin Zhu, Wan Jiang. Cyclic codes and some new entanglement-assisted quantum MDS codes
2553 -- 2576Matthew Fickus, Joseph W. Iverson, John Jasper, Emily J. King. Grassmannian codes from paired difference sets
2577 -- 2626Junichi Tomida, Yuto Kawahara, Ryo Nishimaki. Fast, compact, and expressive attribute-based encryption
2627 -- 2636Sartaj Ul Hasan, Mohit Pal, Pantelimon Stanica. Boomerang uniformity of a class of power maps
2637 -- 2651Yanan Wu, Nian Li, Xiangyong Zeng. New PcN and APcN functions over finite fields

Volume 89, Issue 10

2211 -- 2233Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco. Twisted cubic and point-line incidence matrix in $\mathrm {PG}(3, q)$
2235 -- 2254Gianira N. Alfarano, Julia Lieb, Joachim Rosenthal. Construction of LDPC convolutional codes via difference triangle sets
2255 -- 2281Ritam Bhaumik, Mridul Nandi, Anik Raychaudhuri. Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff
2283 -- 2294Kanat S. Abdukhalikov, Duy Ho. Extended cyclic codes, maximal arcs and ovoids
2295 -- 2312Masaaki Harada. Construction of binary LCD codes, ternary LCD codes and quaternary Hermitian LCD codes
2313 -- 2330Ayça Çesmelioglu, Wilfried Meidl, Isabel Pirsic. Vectorial bent functions and partial difference sets
2331 -- 2356Clementa Alonso-González, Miguel Ángel Navarro-Pérez. Cyclic orbit flag codes
2357 -- 2372Yu-Chi Chen, Xin Xie, Hung-Yu Tsao, Raylin Tso. Public key encryption with filtered equality test revisited
2373 -- 2395Charles J. Colbourn. Egalitarian Steiner triple systems for data popularity
2397 -- 2431Keita Emura, Atsushi Takayasu, Yohei Watanabe 0001. Efficient identity-based encryption with Hierarchical key-insulation from HIBE

Volume 89, Issue 1

1 -- 17Sihem Mesnager, Sihong Su, Hui Zhang. A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity
19 -- 32Lilya Budaghyan, Marco Calderini, Claude Carlet, Robert S. Coulter, Irene Villa. Generalized isotopic shift construction for APN functions
33 -- 52Marco Calderini. Differentially low uniform permutations from known 4-uniform functions
53 -- 73Paulo José Fernandes Almeida, Diego Napp Avelli. A new rank metric for convolutional codes
75 -- 89Wilfried Meidl, Isabel Pirsic. Bent and ${{\mathbb {Z}}}_{2^k}$-Bent functions from spread-like partitions
91 -- 104Xin Wang 0065. Improved upper bounds for parent-identifying set systems and separable codes
105 -- 125Matthias Grezet, Camilla Hollanti. The complete hierarchical locality of the punctured Simplex code
127 -- 141Pranab Chakraborty, Subhamoy Maitra. Further clarification on Mantin's Digraph Repetition Bias in RC4
143 -- 166Michael Bamiloshin, Aner Ben-Efraim, Oriol Farràs, Carles Padró. Common information, matroid representation, and secret sharing for matroid ports
167 -- 197Alexey Oblaukhov. On metric regularity of Reed-Muller codes