Journal: Des. Codes Cryptography

Volume 90, Issue 9

1959 -- 1961Simeon Ball, Michel Lavrauw, Tamás Szonyi. Contributions by Aart Blokhuis to finite geometry, discrete mathematics, and combinatorics
1963 -- 1981Bart De Bruyn, Mou Gao. A characterization of the Coxeter cap
1983 -- 1990Willem H. Haemers, Leila Parsaei Majd. Spectral symmetry in conference matrices
1991 -- 2001Oliver Janzer, Zoltán Lóránt Nagy. Coloring linear hypergraphs: the Erdős-Faber-Lovász conjecture and the Combinatorial Nullstellensatz
2003 -- 2019Aida Abiad, Bart De Bruyn, Jozefien D'haeseleer, Jack H. Koolen. Neumaier graphs with few eigenvalues
2021 -- 2067Michel Lavrauw, Tomasz Popiel, John Sheekey. Combinatorial invariants for nets of conics in $\mathrm {PG}(2, q)$
2069 -- 2080Rosemary A. Bailey, Peter J. Cameron, Michael Kinyon, Cheryl E. Praeger. Diagonal groups and arcs over groups
2081 -- 2099Giovanni Longobardi, Leo Storme, Rocco Trombetti. On sets of subspaces with two intersection dimensions and a geometrical junta bound
2101 -- 2111Aart Blokhuis, Maarten De Boeck, Jozefien D'haeseleer. On the sunflower bound for k-spaces, pairwise intersecting in a point
2113 -- 2144Lins Denaux. Constructing saturating sets in projective spaces using subgeometries
2145 -- 2157William M. Kantor. Automorphism subgroups for designs with λ =1
2159 -- 2180Anton Betten, Fatma Karaoglu. The Eckardt point configuration of cubic surfaces revisited
2181 -- 2204Xinyu Tan, Narayanan Rengaswamy, A. Robert Calderbank. Approximate unitary 3-designs from transvection Markov chains
2205 -- 2221Carmen Amarra, Alice Devillers, Cheryl E. Praeger. Delandtsheer-Doyen parameters for block-transitive point-imprimitive 2-designs
2223 -- 2247Aart Blokhuis, Ruud Pellikaan, Tamás Szonyi. The extended coset leader weight enumerator of a twisted cubic code

Volume 90, Issue 8

1695 -- 1712Yan Wang, Xilin Han, Weiqiong Wang, Ziling Heng. Linear complexity over ${\mathbb {F}_{{q}}}$ and 2-adic complexity of a class of binary generalized cyclotomic sequences with good autocorrelation
1713 -- 1719Alexander M. Romanov 0001. On the number of q-ary quasi-perfect codes with covering radius 2
1721 -- 1734Khodakhast Bibak, Behrouz Zolfaghari. The Modular Subset-Sum Problem and the size of deletion correcting codes
1735 -- 1760Jung Hee Cheon, Wonhee Cho, Jeong Han Kim, Jiseung Kim 0001. Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions
1761 -- 1782Samaneh Mashahdi, Bagher Bagherpour, Ali Zaghian. A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme
1783 -- 1796Sadmir Kudin, Enes Pasalic. #
1797 -- 1855Seyyed Arash Azimi, Adrián Ranea, Mahmoud Salmasizadeh, Javad Mohajeri, Mohammad Reza Aref, Vincent Rijmen. A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis
1857 -- 1879Lidong Wang, Lulu Cai, Tao Feng 0002, Zihong Tian, Xiaomiao Wang. Geometric orthogonal codes and geometrical difference packings
1881 -- 1897Marién Abreu, Martin Funk, Vedran Krcadinac, Domenico Labbate. Strongly regular configurations
1899 -- 1936Katharina Boudgoust, Amin Sakzad, Ron Steinfeld. Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems
1937 -- 1958Junzhen Sui, Xiaomeng Zhu, Xueying Shi. MDS and near-MDS codes via twisted Reed-Solomon codes

Volume 90, Issue 7

1537 -- 1556Ferruh Özbudak, Burcu Gülmez Temür. 3+bx+c and $b, c \in {\mathbb F}_q^*$
1557 -- 1565Simeon Ball, James Dixon. The equivalence of linear codes implies semi-linear equivalence
1567 -- 1583Tran van Trung. A method of constructing 2-resolvable t-designs for t=3, 4
1585 -- 1593Dean Crnkovic, Andrea Svob. Switching for 2-designs
1595 -- 1597Vladimir D. Tonchev. Book Review: "Designs from Linear Codes", second edition, by Cunsheng Ding and Chunming Tang, World Scientific, 2022
1599 -- 1609Jingjun Bao, Lijun Ji. Large sets of t-designs over finite fields exist for all t
1611 -- 1628Menglong Zhang, Tao Feng 0002, Xiaomiao Wang. The existence of cyclic (v, 4, 1)-designs
1629 -- 1647Xia Li, Qin Yue. Non-binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codes
1649 -- 1658Jun Zhang 0031, Zhengchun Zhou, Chunming Tang 0001. A class of twisted generalized Reed-Solomon codes
1659 -- 1677Sergey Bereg, Brian Malouf, Linda Morales, Thomas Stanley, Ivan Hal Sudborough. Using permutation rational functions to obtain permutation arrays with large hamming distance
1679 -- 1694Adrian Korban, Serap Sahinkaya, Deniz Ustun. k-codes with applications to DNA codes

Volume 90, Issue 6

1319 -- 1333Can Xiang, Chunming Tang 0001, Qi Liu. m+1)
1335 -- 1345Michael Kiermaier. On α-points of q-analogs of the Fano plane
1347 -- 1368Valerio Dose, Pietro Mercuri, Ankan Pal, Claudio Stirpe. High order elements in finite fields arising from recursive towers
1369 -- 1379Engin Senel, Figen Öke. On the automorphisms of generalized algebraic geometry codes
1381 -- 1425Arghya Bhattacharjee, Avijit Dutta, Eik List, Mridul Nandi. *: beyond-birthday-secure encryption from public permutations
1427 -- 1436Austin Dukes, Andrea Ferraguti, Giacomo Micheli. Optimal selection for good polynomials of degree up to five
1437 -- 1461Kwang Ho Kim, Sihem Mesnager, Jong Hyok Choe, Dok Nam Lee, Sengsan Lee, Myong Chol Jo. On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity
1463 -- 1484Jinming Wen, Xiao-Wen Chang. Sharper bounds on four lattice constants
1485 -- 1502Tsuyoshi Miezaki, Hiroyuki Nakasora. A note on the Assmus-Mattson theorem for some binary codes
1503 -- 1519Angela Aguglia, Michela Ceria, Luca Giuzzi. Some hypersurfaces over finite fields, minimal codes and secret sharing schemes
1521 -- 1533Dean Crnkovic, Daniel R. Hawtin, Andrea Svob. Neighbour-transitive codes and partial spreads in generalised quadrangles
1535 -- 0Luka Music, Céline Chevalier, Elham Kashefi. Correction to: Dispelling myths on superposition attacks: formal security model and attack analyses

Volume 90, Issue 5

1103 -- 1112Carlos Galindo 0001, Fernando Hernando. On the generalization of the construction of quantum codes from Hermitian self-orthogonal codes
1113 -- 1125Hongwei Zhu, Minjia Shi, Ferruh Özbudak. Complete b-symbol weight distribution of some irreducible cyclic codes
1127 -- 1138Kai Lin Ong, Ang Miin Huey. On equivalence of cyclic and dihedral zero-divisor codes having nilpotents of nilpotency degree two as generators
1139 -- 1156WeiGuo Zhang 0001, Enes Pasalic, Liupiao Zhang. Phase orthogonal sequence sets for (QS)CDMA communications
1157 -- 1177Fucai Luo, Saif Al-Kuwari. Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security
1179 -- 1202Zhenyu Lu, Sihem Mesnager, Tingting Cui, Yanhong Fan, Meiqin Wang. An STP-based model toward designing S-boxes with good cryptographic properties
1203 -- 1219Felix Lazebnik, Lorinda Leshock. On Pappus configurations in Hall planes
1221 -- 1239Hui Zhang, Cuiling Fan, Sihem Mesnager. Constructions of two-dimensional Z-complementary array pairs with large ZCZ ratio
1241 -- 1269Nuh Aydin, Peihan Liu, Bryan Yoshino. Polycyclic codes associated with trinomials: good codes and open questions
1271 -- 1287Gaojun Luo, San Ling. Application of optimal p-ary linear codes to alphabet-optimal locally repairable codes
1289 -- 1318Fengrong Zhang, Enes Pasalic, René Rodríguez, Yongzhuang Wei. Minimal binary linear codes: a general framework based on bent concatenation

Volume 90, Issue 4

835 -- 850Kevin M. Byrnes. Isomorphism of maximum length circuit codes
851 -- 862Liantao Lan, Yanxun Chang, Lidong Wang. The completion of optimal cyclic quaternary codes of weight 3 and distance 3
863 -- 869Yanwei Zhao, Shenglin Zhou. Flag-transitive 2-(v, k, λ ) designs with r>λ (k-3)
871 -- 879Rajendra M. Pawale, Mohan S. Shrikhande, Kusum S. Rajbhar. Non-existence of quasi-symmetric designs with restricted block graphs
881 -- 920Luka Music, Céline Chevalier, Elham Kashefi. Dispelling myths on superposition attacks: formal security model and attack analyses
921 -- 937Yi Zhao, Kaitai Liang, Yanqi Zhao, Bo Yang 0003, Yang Ming, Emmanouil Panaousis. Practical algorithm substitution attack on extractable signatures
939 -- 945Alexander Barg, Zitan Chen, Itzhak Tamo. A construction of maximally recoverable codes
947 -- 956Daiki Kawabata, Tatsuya Maruta. On the nonexistence of ternary linear codes attaining the Griesmer bound
957 -- 982Paolo Santonastaso, Ferdinando Zullo. On the list decodability of rank-metric codes containing Gabidulin codes
983 -- 1007Orr Dunkelman, Maria Eichlseder, Daniel Kales, Nathan Keller, Gaëtan Leurent, Markus Schofnegger. Practical key recovery attacks on FlexAEAD
1009 -- 1036Christof Beierle, Gregor Leander, Léo Perrin. Trims and extensions of quadratic APN functions
1037 -- 1058Dipak K. Bhunia, Cristina Fernández-Córdoba, Mercè Villanueva. On the linearity and classification of ${\mathbb {Z}}_{p^s}$-linear generalized hadamard codes
1059 -- 1079Janaka Alawatugoda, Tatsuaki Okamoto. Standard model leakage-resilient authenticated key exchange using inner-product extractors
1081 -- 1101Nurdagül Anbar, Wilfried Meidl. Bent partitions

Volume 90, Issue 3

489 -- 521Deepak Kumar Dalai, Santu Pal, Santanu Sarkar 0001. A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a
523 -- 543Olav Geil. From primary to dual affine variety codes over the Klein quartic
545 -- 575Xiaofang Xu, Xiangyong Zeng, Shasha Zhang. Regular complete permutation polynomials over ${\mathbb {F}}_{2^{n}}$
577 -- 591Jiang Liu, Qin Li 0009, Junyu Quan, Can Wang, Jinjing Shi, Haozhen Situ. Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation
593 -- 632Moritz Wiese, Holger Boche. Mosaics of combinatorial designs for information-theoretic security
633 -- 651Jan De Beule, Jonathan Mannaert, Leo Storme. Cameron-Liebler k-sets in subspaces and non-existence conditions
653 -- 679H. Zhao, Yongzhuang Wei, Fengrong Zhang, Enes Pasalic, Nastja Cepak. Two secondary constructions of bent functions without initial conditions
681 -- 693Pan Tan, Cuiling Fan, Sihem Mesnager, Wei Guo. Linear codes from support designs of ternary cyclic codes
695 -- 717Terry Shue Chien Lau, Chik-How Tan. On the design and security of Lee metric McEliece cryptosystems
719 -- 758Quan Yuan, Mehdi Tibouchi, Masayuki Abe. On subset-resilient hash function families
759 -- 777Charul Rajput, Maheshanand Bhaintwal. On the locality of quasi-cyclic codes over finite fields
779 -- 799Dibyayoti Jena, Geertrui Van de Voorde. The geometric field of linearity of linear sets
801 -- 812Dmitrii Koshelev. Indifferentiable hashing to ordinary elliptic ${\mathbb {F}}_{\!q}$-curves of j=0 with the cost of one exponentiation in ${\mathbb {F}}_{\!q}$
813 -- 826Mengzhen Zhao, Cuiling Fan, Zihong Tian. Nearly optimal balanced quaternary sequence pairs of prime period N=uiv 5±od 8
827 -- 834Tim Penttila. Uniqueness of the inversive plane of order sixty-four

Volume 90, Issue 2

265 -- 276Nian Li, Zhao Hu, Maosheng Xiong, Xiangyong Zeng. A note on "Cryptographically strong permutations from the butterfly structure"
277 -- 316Keisuke Hara, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka. Generic transformation from broadcast encryption to round-optimal deniable ring authentication
317 -- 342Joe Gildea, Adrian Korban, Adam Michael Roberts. New binary self-dual codes of lengths 80, 84 and 96 from composite matrices
343 -- 366Soumak Biswas, Maheshanand Bhaintwal. Quantum codes from $\mathbb {Z}_2\mathbb {Z}_2[u]/\langle u^4 \rangle $-cyclic codes
367 -- 386Rong Pan, R. Julian R. Abel, Yudhistira A. Bunjamin, Tao Feng 0002, Tiana J. Tsang Ung, Xiaomiao Wang. Difference matrices with five rows over finite abelian groups
387 -- 408Xiao-Juan Wang, Tian Tian 0004, Wen-Feng Qi. A generic method for investigating nonsingular Galois NFSRs
409 -- 425Steven T. Dougherty. The neighbor graph of binary self-dual codes
427 -- 442Marcel Fernandez, Jorge Jiménez Urroz. A study of the separating property in Reed-Solomon codes by bounding the minimum distance
443 -- 472Fatih Demirbas, Orhun Kara. Integral characteristics by keyspace partitioning
473 -- 475Ulrich Dempwolff. Correction to: CCZ equivalence of power functions
477 -- 487Aart Blokhuis, Maarten De Boeck, Jozefien D'haeseleer. Correction to: Cameron-Liebler sets of k-spaces in ${{\, \mathrm{PG}\, }}(n, q)$

Volume 90, Issue 12

2783 -- 2811Stéphane Ballet, Nicolas Baudru, Alexis Bonnecaze, Mila Tukumuli. Construction of asymmetric Chudnovsky-type algorithms for multiplication in finite fields
2813 -- 2821Yansheng Wu, Yoonjin Lee, Qiang Wang 0012. Further improvement on index bounds
2823 -- 2839Lin Sok. A new construction of linear codes with one-dimensional hull
2841 -- 2859Fatemeh Jafari, Alireza Abdollahi, Javad Bagherian, Maryam Khatami, Reza Sobhani. Equidistant permutation group codes
2861 -- 2891Edoukou Berenger Ayebie, El Mamoun Souidi. New code-based cryptographic accumulator and fully dynamic group signature
2893 -- 2922Hokuto Takahashi, Manabu Hagiwara. Decoding algorithms of monotone codes and azinv codes and their unified view
2923 -- 2941Iwan M. Duursma, Xiao Li. Johnson graph codes
2943 -- 2966Jessica Bariffi, Sam Mattheus, Alessandro Neri 0002, Joachim Rosenthal. Moderate-density parity-check codes from projective bundles
2967 -- 2989Jon-Lark Kim, Junyong Park 0004. Steganography from perfect codes on Cayley graphs over Gaussian integers, Eisenstein-Jacobi integers and Lipschitz integers
2991 -- 3001Xianmang He, Yindong Chen, Zusheng Zhang, Kunxiao Zhou. Parallel sub-code construction for constant-dimension codes
3003 -- 3010Adel Alahmadi, Amani Alkathiry, Alaa Altassan, Alexis Bonnecaze, Hatoon Shoaib, Patrick Solé. The build-up construction over a commutative non-unital ring
3011 -- 3044Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Yann Connan, Philippe Gaborit. A gapless code-based hash proof system based on RQC and its applications

Volume 90, Issue 11

2517 -- 2527W. Cary Huffman, Jon-Lark Kim, Patrick Solé. Guest editorial: On coding theory and combinatorics - in memory of Vera Pless
2529 -- 2549Jian Gao 0001, Xiangrui Meng, Fang-Wei Fu 0001. Weight distribution of double cyclic codes over Galois rings
2551 -- 2562Rongsheng Wu, Minjia Shi. On $\mathbb {Z}_2\mathbb {Z}_4$-additive polycyclic codes and their Gray images
2563 -- 2581Federico N. Martínez. Symmetric functions and spherical t-designs in $\pmb {\mathbb {R}^2}$
2583 -- 2597Himadri Shekhar Chakraborty, Tsuyoshi Miezaki. Variants of Jacobi polynomials in coding theory
2599 -- 2611Minjia Shi, Shukai Wang, Tor Helleseth, Patrick Solé. Quadratic residue codes, rank three groups and PBIBDs
2613 -- 2645Rongcun Qin, Hengming Zhao, Huangsheng Yu. Compatible difference packing set systems and their applications to multilength variable-weight OOCs
2647 -- 2661Martino Borello, Cem Güneri, Elif Saçikara, Patrick Solé. The concatenated structure of quasi-abelian codes
2663 -- 2682Liqin Qian, Xiwang Cao, Wei Lu, Patrick Solé. A new method for constructing linear codes with small hulls
2683 -- 2701Serhii Dyshko, Jay A. Wood. MacWilliams extension property for arbitrary weights on linear codes over module alphabets
2703 -- 2733Yuqing Fu, Hongwei Liu 0003. Galois self-orthogonal constacyclic codes over finite fields
2735 -- 2751Whan-Hyuk Choi, Jon-Lark Kim. An improved upper bound on self-dual codes over finite fields GF(11), GF(19), and GF(23)
2753 -- 2762Vladimir D. Tonchev. On Pless symmetry codes, ternary QR codes, and related Hadamard matrices and designs
2763 -- 2781Shikha Patel, Om Prakash 0004. θ )-Cyclic codes over $\mathbb {F}_q[u, v]/\langle u^2-u, v^2-v, uv-vu \rangle $

Volume 90, Issue 10

2249 -- 2269Hyun Kwang Kim, Jieun Kwon. Classification of weighted posets and digraphs admitting the extended Hamming code to be a perfect code
2271 -- 2299Masayuki Abe, Miguel Ambrona. Blind key-generation attribute-based encryption for general predicates
2301 -- 2318Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada 0001. Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013
2319 -- 2335Abbas Alhakim. Designing preference functions for de Bruijn sequences with forbidden words
2337 -- 2359Junru Ma, Jinquan Luo. Constructions of MDS symbol-pair codes with minimum distance seven or eight
2361 -- 2373Hamidreza Eyvazi, Karim Samei, Batoul Savari. The linearity of Carlet's Gray image of linear codes over ${\mathbb {Z}}_{8}$
2375 -- 2383Daniel Horsley, Padraig Ó Catháin. Block avoiding point sequencings of partial Steiner systems
2385 -- 2405Haode Yan, Kun Zhang. On the c-differential spectrum of power functions over finite fields
2407 -- 2417Yagmur Çakiroglu, Oguz Yayla, Emrah Sercan Yilmaz. The number of irreducible polynomials over finite fields with vanishing trace and reciprocal trace
2419 -- 2448Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang. Improved key-recovery attacks on reduced-round WEM-8
2449 -- 2479Zhaocun Zhou, Dengguo Feng, Bin Zhang 0003. Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V
2481 -- 2489Gerald J. Janusz. Covering polynomials and projections of self-dual codes
2491 -- 2515Lijun Ji, Miao Liang, Yanting Wang. Combinational constructions of splitting authentication codes with perfect secrecy

Volume 90, Issue 1

1 -- 15Xia Li, Qin Yue, Deng Tang. A family of linear codes from constant dimension subspace codes
17 -- 47Kwangsu Lee, Minhye Seo. Functional encryption for set intersection in the multi-client setting
49 -- 66Fei Li, Xiumei Li. Weight distributions and weight hierarchies of a family of p-ary linear codes
67 -- 85Ville Junnila, Tero Laihonen, Tuomo Lehtilä. Improved lower bound for locating-dominating codes in binary Hamming spaces
87 -- 106Yuwen Huang, Chengju Li, Qi Wang, Zongrun Du. Parameters and characterizations of hulls of some projective narrow-sense BCH codes
107 -- 119Haoxuan Wu, Jincheng Zhuang. Improving the Gaudry-Schost algorithm for multidimensional discrete logarithms
121 -- 137Junru Ma, Jinquan Luo. MDS symbol-pair codes from repeated-root cyclic codes
139 -- 153Vitaly Roman'kov. An improvement of the Diffie-Hellman noncommutative protocol
155 -- 198Shiyao Chen, Yanhong Fan, Ling Sun 0001, Yong Fu, Haibo Zhou, Yongqing Li, Meiqin Wang, Weijia Wang, Chun Guo 0002. SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations
199 -- 213Bart De Bruyn, Mou Gao. Pseudo-embeddings and quadratic sets of quadrics
215 -- 238Anirban Ghatak. Extending Coggia-Couvreur attack on Loidreau's rank-metric cryptosystem
239 -- 263Qi Cheng, Jun Zhang, Jincheng Zhuang. LWE from non-commutative group rings