Journal: Des. Codes Cryptography

Volume 91, Issue 9

2809 -- 2810Rongquan Feng. Obituary of Professor Zhexian Wan
2811 -- 2819Junyang Zhang. Characterizing subgroup perfect codes by 2-subgroups
2821 -- 2843Zhonghua Sun 0001, Xiaoqiang Wang 0001, Cunsheng Ding. Several families of irreducible constacyclic and cyclic codes
2845 -- 2878Kai Zhang 0026, Xuejia Lai, Lei Wang 0031, Jie Guan, Bin Hu 0011, SenPeng Wang, Tairong Shi. Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework
2879 -- 2891S. P. Glasby, Ferdinand Ihringer, Sam Mattheus. The proportion of non-degenerate complementary subspaces in classical spaces
2893 -- 2915Yu Zhan, Ziqian Zhang, Qian Liu, Baocang Wang. Hiding the input-size in multi-party private set intersection
2917 -- 3034Pratish Datta, Tapas Pal. (Compact) Adaptively secure FE for attribute-weighted sums from k-Lin
3035 -- 3079Aurélien Dupin, Pierrick Méaux, Mélissa Rossi. On the algebraic immunity - resiliency trade-off, implications for Goldreich's pseudorandom generator
3081 -- 3114Hyung Tae Lee, Jae Hong Seo. On the security of functional encryption in the generic group model

Volume 91, Issue 8

2627 -- 2647Wei Lu 0022, Xia Wu, Yufei Wang, Xiwang Cao. A general construction of regular complete permutation polynomials
2649 -- 2663Isabel Byrne, Natalie Dodson, Ryan Lynch, Eric Pabón-Cancel, Fernando Piñero-González. Improving the minimum distance bound of Trace Goppa codes
2665 -- 2676Hao Chen. New MDS entanglement-assisted quantum codes from MDS Hermitian self-orthogonal codes
2677 -- 2686Yan Liu, Jianguo Lei. More results on large sets of Kirkman triple systems
2687 -- 2704Zhongya Zhang, Wenling Wu, Han Sui, Bolin Wang. Post-quantum security on the Lai-Massey scheme
2705 -- 2721Jaap-Henk Hoepman. Two faces of blindness
2723 -- 2735Bagher Bagherpour. A bivariate polynomial-based cryptographic hard problem and its applications
2737 -- 2754Yan Zhu. Optimal and extremal graphical designs on regular graphs associated with classical parameters
2755 -- 2768Xiantong Tan, Haode Yan. Differential spectrum of a class of APN power functions
2769 -- 2778Erzhong Xue, Zilong Wang 0001. The q-ary Golay arrays of size 2˟ 2˟ ... ˟ 2 are standard
2779 -- 2789Jiseung Kim 0001, Changmin Lee 0001. A polynomial time algorithm for breaking NTRU encryption with multiple keys
2791 -- 2807Ting Lan, Weijun Liu, Fugang Yin. Block-transitive 3-(v, k, 1) designs associated with alternating groups

Volume 91, Issue 7

2365 -- 2393Enes Pasalic, Amar Bapic, Fengrong Zhang, Yongzhuang Wei. Explicit infinite families of bent functions outside the completed Maiorana-McFarland class
2395 -- 2420Xiaoqiang Wang 0001, Zhonghua Sun 0001, Cunsheng Ding. Two families of negacyclic BCH codes
2421 -- 2447Jian Ding, Changlu Lin, Fuchun Lin, Huaxiong Wang. Full threshold change range of threshold changeable secret sharing
2449 -- 2472Mima Stanojkovski. Submodule codes as spherical codes in buildings
2473 -- 2479Igor E. Shparlinski. Fixed points of the subset sum pseudorandom number generators
2481 -- 2495Moises Delgado, Heeralal Janwa, Carlos Agrinsoni. Some new techniques and progress towards the resolution of the conjecture of exceptional APN functions and absolutely irreducibility of a class of polynomials
2497 -- 2508Tran van Trung. Point-missing s-resolvable t-designs: infinite series of 4-designs with constant index
2509 -- 2522Eiichi Bannai, Tsuyoshi Miezaki, Hiroyuki Nakasora. A note on the Assmus-Mattson theorem for some binary codes II
2523 -- 2562Hirokazu Kobayashi, Yohei Watanabe 0001, Kazuhiko Minematsu, Junji Shikata. Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication
2563 -- 2583Shitao Li, Minjia Shi, Juan Wang. An improved method for constructing formally self-dual codes with small hulls
2585 -- 2603Marco Pavone 0002. Subset sums and block designs in a finite vector space
2605 -- 2625Guangzhou Chen, Xiaodong Niu. Constructions for new orthogonal arrays based on large sets of orthogonal arrays

Volume 91, Issue 6

2117 -- 2140Rupert Li. Unique optima of the Delsarte linear program
2141 -- 2200Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, Federico Pintore. Group signatures and more from isogenies and lattices: generic, simple, and efficient
2201 -- 2212Boris Ryabko. Unconditionally secure short key ciphers based on data compression and randomization
2213 -- 2221Gerardo Vega. The b-symbol weight distributions of all semiprimitive irreducible cyclic codes
2223 -- 2236Himadri Shekhar Chakraborty, Tsuyoshi Miezaki, Manabu Oura. Harmonic Tutte polynomials of matroids
2237 -- 2254Nam-Su Jho, Jooyoung Lee 0001. Partition and mix: generalizing the swap-or-not shuffle
2255 -- 2271Zihan Zhang. A new metric on symmetric groups and applications to block permutation codes
2273 -- 2307Xiaoni Du, Wengang Jin, Sihem Mesnager. Several classes of new weakly regular bent functions outside ℛℱ, their duals and some related (minimal) codes with few weights
2309 -- 2322James M. Hammer, John Lorch. Diagonal cellular factor pair Latin squares
2323 -- 2346Abílio Lemos, Victor G. L. Neumann, Sávio Ribas. On arithmetic progressions in finite fields
2347 -- 2364Tao Feng 0001, Jianbing Lu. On finite generalized quadrangles with rmPSL(2, q) as an automorphism group

Volume 91, Issue 5

1581 -- 1593Susan G. Barwick, Alice M. W. Hui, Wen-Ai Jackson. A geometric description of the Figueroa plane
1595 -- 1605Henk D. L. Hollmann, Karan Khathuria, Ago-Erik Riet, Vitaly Skachek. On some batch code properties of the simplex code
1607 -- 1625Alexander Shaporenko. Derivatives of bent functions in connection with the bent sum decomposition problem
1627 -- 1644Jérôme Ducoat, Frédérique E. Oggier. Rank weight hierarchy of some classes of polynomial codes
1645 -- 1684Nuttapong Attrapadung, Goichiro Hanaoka, Ryo Hiromasa, Takahiro Matsuda 0002, Jacob C. N. Schuldt. Maliciously circuit-private multi-key FHE and MPC based on LWE
1685 -- 1694Simeon Ball. Grassl-Rötteler cyclic and consta-cyclic MDS codes are generalised Reed-Solomon codes
1695 -- 1711Zhao Hu, Nian Li, Linjie Xu, Xiangyong Zeng, Xiaohu Tang. The differential spectrum and boomerang spectrum of a class of locally-APN functions
1713 -- 1736Han-Bing Yu, Qun-Xiong Zheng, Yi-jian Liu, Jingguo Bi, Yu-Fei Duan, Jing-Wen Xue, You Wu, Yue Cao, Rong Cheng, Lin Wang, Bai-Shun Sun. An improved method for predicting truncated multiple recursive generators with unknown parameters
1737 -- 1750Hopein Christofen Tang, Djoko Suprijanto. A general family of Plotkin-optimal two-weight codes over $\mathbb {Z}_4$
1751 -- 1778Reo Eriguchi, Noboru Kunihiro, Koji Nuida. Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures
1779 -- 1811Jiabo Wang, Cong Ling 0001. Polar sampler: A novel Bernoulli sampler using polar codes with application to integer Gaussian sampling
1813 -- 1843Makoto Araya, Masaaki Harada. Some restrictions on the weight enumerators of near-extremal ternary self-dual codes and quaternary Hermitian self-dual codes
1845 -- 1872Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay. Short attribute-based signatures for arbitrary Turing machines from standard assumptions
1873 -- 1888Fengwei Li. Cyclic codes of length 5p with MDS symbol-pair
1889 -- 1910Zhongxiao Wang, Xiaoxin Zhao, Qunxiong Zheng, Xiutao Feng, Zehao Sun. The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited
1911 -- 1921Nicola Durante, Giovanni Longobardi, Valentina Pepe. $(d,\varvec{\sigma })$-Veronese variety and some applications
1923 -- 1934Hui Han 0002, Jianjun Mu, Xiaopeng Jiao, Yu-Cheng He, Zhanzhan Zhao. Constructions of multi-permutation codes correcting a single burst of deletions
1935 -- 1949Michel Lavrauw, John Sheekey. 4
1951 -- 1971Máté Gyarmati. Secret sharing on regular bipartite access structures
1973 -- 2003Monika Yadav, Anuradha Sharma. A recursive method for the construction and enumeration of self-orthogonal and self-dual codes over the quasi-Galois ring $\mathbb {F}_{2^r}[u]/$
2005 -- 2020Elisa Gorla, Cristina Landolina. Quasi optimal anticodes: structure and invariants
2021 -- 2055Lin Jiao, Yonglin Hao, Yongqiang Li 0001. Guess-and-determine attacks on SNOW-Vi stream cipher
2057 -- 2075Wenxiao Qiao, Hailun Yan, Siwei Sun, Lei Hu, Jiwu Jing. New cryptanalysis of LowMC with algebraic techniques
2077 -- 2105María Chara, Sam Kottler, Beth Malmskog, Bianca Thompson, Mckenzie West. Minimum distance and parameter ranges of locally recoverable codes with availability from fiber products of curves
2107 -- 2115Daniel M. Gordon. Signed difference sets

Volume 91, Issue 4

1165 -- 1181Yanbin Zheng, Yuyin Yu, Zhengbang Zha, Xingchen Zhou. On inverses of permutation polynomials of the form $x\left( x^{s} -a\right) ^{(q^m-1)/s}$ over $\mathbb {F}_{q^n}$
1183 -- 1191Ilya Vorobyev. Complete traceability multimedia fingerprinting codes resistant to averaging attack and adversarial noise with optimal rate
1193 -- 1207Yun Li, Hongwei Liu 0003. Cyclic constant dimension subspace codes via the sum of Sidon spaces
1209 -- 1232Weijun Fang, Bin Chen 0011, Shu-Tao Xia, Fang-Wei Fu 0001, Xiangyu Chen. Perfect LRCs and k-optimal LRCs
1233 -- 1259Zhengan Huang, Junzuo Lai, Gongxian Zeng, Xin Mu. Receiver selective opening security for identity-based encryption in the multi-challenge setting
1261 -- 1292Bangteng Xu. Characterizations and constructions of plateaued functions on finite abelian groups
1293 -- 1313Michael J. Gill, Ian M. Wanless. Pairs of MOLS of order ten satisfying non-trivial relations
1315 -- 1333Shohei Satake, Yujie Gu. Cayley sum graphs and their applications to codebooks
1335 -- 1349Songbao Mo. Ideal hierarchical secret sharing and lattice path matroids
1351 -- 1372Rocco Mora, Jean-Pierre Tillich. On the dimension and structure of the square of the dual of a Goppa code
1373 -- 1400Dan Zeng, Xiangyong Zeng, Lisha Li, Yunge Xu. The cycle structure of a class of permutation polynomials
1401 -- 1426Shifeng Sun 0001, Ron Steinfeld, Amin Sakzad. Incremental symmetric puncturable encryption with support for unbounded number of punctures
1427 -- 1441Vincenzo Pallozzi Lavorante. External points to a conic from a Baer subplane
1443 -- 1452Christian Elsholtz, Benjamin Klahn, Gabriel F. Lipnik. Large subsets of $\mathbb {Z}_m^n$ without arithmetic progressions
1453 -- 1474Minjia Shi, Yaya Li, Wei Cheng 0003, Dean Crnkovic, Denis S. Krotov, Patrick Solé. Self-dual bent sequences for complex Hadamard matrices
1475 -- 1485Giusy Monzillo, Tim Penttila, Alessandro Siciliano. Eggs in finite projective spaces and unitals in translation planes
1487 -- 1494Enrico Iurlano. Growth of the perfect sequence covering array number
1495 -- 1526Li Xu, Zhengchun Zhou, Jun Zhang, Sihem Mesnager. Optimal quaternary (r,δ )-locally recoverable codes: their structures and complete classification
1527 -- 1558Zhonghua Sun 0001, Sujuan Huang, Shixin Zhu. Optimal quaternary Hermitian LCD codes and their related codes
1559 -- 1580Sihong Su, Xiaoqi Guo. A further study on the construction methods of bent functions and self-dual bent functions based on Rothaus's bent function

Volume 91, Issue 3

695 -- 708Xiusheng Liu, Hualu Liu. LCP of group codes over finite Frobenius rings
709 -- 717Jiaxin Shen, Jianfu Chen, Shenglin Zhou. Flag-transitive 2-designs with prime square replication number and alternating groups
719 -- 746Sihem Mesnager, Liqin Qian, Xiwang Cao. Further projective binary linear codes derived from two-to-one functions and their duals
747 -- 761Mrinmoy Datta, Trygve Johnsen. Codes from symmetric polynomials
763 -- 777Dev Akre, Nuh Aydin, Matthew J. Harrington, Saurav R. Pandey. A generalization of cyclic code equivalence algorithm to constacyclic codes
779 -- 794Bill Correll Jr., Christopher N. Swanson. Difference-based structural properties of costas arrays
795 -- 805Makoto Araya, Masaaki Harada, Koji Momihara. Hadamard matrices related to a certain series of ternary self-dual codes
807 -- 830Xiangrui Meng, Jian Gao 0001, Fang-Wei Fu 0001, Fanghui Ma. Weight distributions of Q2DC codes over finite fields
831 -- 851Maria Montanucci, Guilherme C. Tizziotti. Generalized Weierstrass semigroups at several points on certain maximal curves which cannot be covered by the Hermitian curve
853 -- 893Hyoseung Kim 0002, Olivier Sanders, Michel Abdalla, Jong Hwan Park. Practical dynamic group signatures without knowledge extractors
895 -- 920Maarten De Boeck, Geertrui Van de Voorde. 2
921 -- 949Yan Tong, Xiangyong Zeng, Shasha Zhang, Shiwei Xu, Zhengwei Ren. The estimates of trigonometric sums and new bounds on a mean value, a sequence and a cryptographic function
951 -- 970Jingzhou Na, Jonathan Jedwab, Shuxing Li. A group-based structure for perfect sequence covering arrays
971 -- 995Fei Guo, Zilong Wang 0001, Guang Gong. Several secondary methods for constructing bent-negabent functions
997 -- 1033Clémence Bouvier, Anne Canteaut, Léo Perrin. On the algebraic degree of iterated power functions
1035 -- 1052Zhongliang Zhang, Zhen Qin, Chun Guo 0002. Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher
1053 -- 1093Kwangsu Lee. Decentralized multi-client functional encryption for set intersection with improved efficiency
1095 -- 1110Michela Ceria, Antonio Cossidente, Giuseppe Marino 0002, Francesco Pavese. On near-MDS codes and caps
1111 -- 1151Daniel Augot, Sarah Bordage, Jade Nardi. Efficient multivariate low-degree tests via interactive oracle proofs of proximity for polynomial codes
1153 -- 1163Wanbao Zhang, Shenglin Zhou. Extremely line-primitive automorphism groups of finite linear spaces

Volume 91, Issue 2

309 -- 332Xi Xie, Nian Li, Xiangyong Zeng, Xiaohu Tang, Yao Yao. Several classes of bent functions over finite fields
333 -- 351José Andrés Armario, Iván Bailera, Ronan Egan. Butson full propelinear codes
353 -- 371Bingsheng Shen, Hua Meng, Yang Yang 0005, Zhengchun Zhou. New constructions of Z-complementary code sets and mutually orthogonal complementary sequence sets
373 -- 389WeiGuo Zhang 0001, Enes Pasalic, Yiran Liu, Liupiao Zhang, Chunlei Xie. A design and flexible assignment of orthogonal binary sequence sets for (QS)-CDMA systems
391 -- 431Shuichi Katsumata, Toi Tomita, Shota Yamada 0001. Direct computation of branching programs and its applications to more efficient lattice-based cryptography
433 -- 449Christof Beierle, Claude Carlet. Gold functions and switched cube functions are not 0-extendable in dimension n > 5
451 -- 473Eimear Byrne, Michela Ceria, Sorina Ionica, Relinde P. M. J. Jurrius, Elif Saçikara. Constructions of new matroids and designs over ${\mathbb {F}}_q$
475 -- 495Xiaoqin Hong, Xiwang Cao. Improved generalized block inserting construction of constant dimension codes
497 -- 544Loïc Bidoux, Philippe Gaborit, Mukul Kulkarni, Víctor Mateu. Code-based signatures from new proofs of knowledge for the syndrome decoding problem
545 -- 562Nurdagül Anbar, Tekgül Kalayci, Wilfried Meidl. Generalized semifield spreads
563 -- 608Thibauld Feneuil, Antoine Joux, Matthieu Rivain. Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature
609 -- 643Emmanouil Doulgerakis, Thijs Laarhoven, Benne de Weger. The irreducible vectors of a lattice
645 -- 675Michael Kiermaier, Sascha Kurz, Patrick Solé, Michael Stoll, Alfred Wassermann. On strongly walk regular graphs, triple sum sets and their codes
677 -- 689Minjia Shi, Shukai Wang, Jon-Lark Kim, Patrick Solé. Self-orthogonal codes over a non-unital ring and combinatorial matrices
691 -- 0Minjia Shi, Shukai Wang, Jon-Lark Kim, Patrick Solé. Correction: Self-orthogonal codes over a non-unital ring and combinatorial matrices
693 -- 0Minjia Shi, Shukai Wang, Xiaoxiao Li. RETRACTED ARTICLE: $\mathbb {Z}_p\mathbb {Z}_{p^2}$-linear codes: rank and kernel

Volume 91, Issue 12

3825 -- 3835Xuan Pang, Xiaoqin Zhan. Block-transitive 3-(v,4,λ ) designs with sporadic or alternating socle
3837 -- 3855Subhabrata Samajder, Palash Sarkar 0001. Another look at key randomisation hypotheses
3857 -- 3879Somayyeh Golalizadeh, Nasrin Soltankhah. On the fourth weight of generalized Reed-Muller codes
3881 -- 3899Xiaofeng Xie, Tian Tian 0004. Structural evaluation of AES-like ciphers against mixture differential cryptanalysis
3901 -- 3913Hexiang Huang, Qing Xiang. Construction of storage codes of rate approaching one on triangle-free graphs
3915 -- 3932Kazumasa Shinagawa, Reo Eriguchi, Shohei Satake, Koji Nuida. Private simultaneous messages based on quadratic residues
3933 -- 3951Binbin Pang, Shixin Zhu, Tian Yang, Jun Gao. BCH codes with larger dimensional hull
3953 -- 3976Ziling Heng, Dexiang Li, Fenjin Liu. Ternary self-orthogonal codes from weakly regular bent functions and their application in LCD Codes
3977 -- 3993Shuangqing Liu. Optimal Ferrers diagram rank-metric codes from MRD codes
3995 -- 4017José Gómez-Torrecillas, Francisco Javier Lobillo, Gabriel Navarro 0001. Skew differential Goppa codes and their application to Mceliece cryptosystem
4019 -- 4058Haider Al Kim, Sven Puchinger, Ludo Tolhuizen, Antonia Wachter-Zeh. Coding and bounds for partially defective memory cells
4059 -- 4091Haetham Al Aswad, Cécile Pierrot. Individual discrete logarithm with sublattice reduction
4093 -- 4106Yeow Meng Chee, Alan Chi Hung Ling, Van Khu Vu, Hui Zhang 0030. Scheduling to reduce close contacts: resolvable grid graph decomposition and packing
4107 -- 4142Qiang Li, Qun-Xiong Zheng, Wenfeng Qi. Practical attacks on small private exponent RSA: new records and new insights
4143 -- 4151Hongwei Liu, Shengwei Liu. A class of constacyclic codes are generalized Reed-Solomon codes

Volume 91, Issue 11

3331 -- 3332Steven D. Galbraith, Rosario Gennaro, Carla Ràfols, Ron Steinfeld. Guest editorial: Special issue on Mathematics of Zero-Knowledge
3333 -- 3378Diego F. Aranha, Youssef El Housni, Aurore Guillevic. A survey of elliptic curves for proof systems
3379 -- 3424Scott Ames, Carmit Hazay, Yuval Ishai, Muthuramakrishnan Venkitasubramaniam. Ligero: lightweight sublinear arguments without a trusted setup
3425 -- 3456Ward Beullens, Luca De Feo, Steven D. Galbraith, Christophe Petit 0001. Proving knowledge of isogenies: a survey
3457 -- 3525Daniel Benarroch, Matteo Campanelli, Dario Fiore 0001, Kobi Gurkan, Dimitris Kolonelos. Zero-knowledge proofs for set membership: efficient, succinct, modular
3527 -- 3561Carsten Baum, Samuel Dittmer, Peter Scholl, Xiao Wang 0012. Sok: vector OLE-based zero-knowledge protocols
3563 -- 3580André Guerino Castoldi, Anderson Novaes Martinhão, Emerson L. Monte Carmelo, Otávio J. N. T. N. dos Santos. Covering schemes of strength t
3581 -- 3602Congming Wei, Bingyou Dong, Jialiang Hua, Xiaoyang Dong, Guoyan Zhang. Improved attacks against reduced-round Whirlwind
3603 -- 3642SenPeng Wang, Dengguo Feng, Bin Hu 0011, Jie Guan, Kai Zhang 0026, Tairong Shi. New method for combining Matsui's bounding conditions with sequential encoding method
3643 -- 3669Shamil Asgarli, Dragos Ghioca, Chi Hoi Yip. Plane curves giving rise to blocking sets over finite fields
3671 -- 3707Magali Bardet, Pierre Briaud, Maxime Bros, Philippe Gaborit, Jean-Pierre Tillich. Revisiting algebraic attacks on MinRank and on the rank decoding problem
3709 -- 3739Shizhu Tian, Yitong Liu, Xiangyong Zeng. A further study on bridge structures and constructing bijective S-boxes for low-latency masking
3741 -- 3755Jingjun Bao. Constructions of column-orthogonal strong orthogonal arrays via matchings of bipartite graphs
3757 -- 3801Yanwei Zhou, Bo Yang 0003, Zirui Qiao, Zhe Xia, Mingwu Zhang, Yi Mu 0001. Leakage-resilient identity-based cryptography from minimal assumptions
3803 -- 3823Jinzheng Cao, Jian Weng 0001, Yanbin Pan, Qingfeng Cheng. Generalized attack on ECDSA: known bits in arbitrary positions

Volume 91, Issue 10

3115 -- 3139Kaiqiang Liu, Zhengchun Zhou, Avik Ranjan Adhikary, Rong Luo. New sets of non-orthogonal spreading sequences with low correlation and low PAPR using extended Boolean functions
3141 -- 3166Yu Dai 0003, Kaizhan Lin, Chang-An Zhao, Zijian Zhou. Fast subgroup membership testings for $\mathbb {G}_1$, $\mathbb {G}_2$ and $\mathbb {G}_T$ on pairing-friendly curves
3167 -- 3186Daniele Bartoli, Giuliana Fatabbi, Francesco Ghiandoni. On the exceptionality of rational APN functions
3187 -- 3214Kai Zhang 0026, Xuejia Lai, Jie Guan, Bin Hu 0011. Weak rotational property and its application
3215 -- 3226Dean Crnkovic, Andrea Svob. LCD subspace codes
3227 -- 3240Melissa Lee, Gabriel Verret. Extremely primitive groups and linear spaces
3241 -- 3262Pin-Chieh Tseng, Ching-Yi Lai, Wei-Hsuan Yu. Semidefinite programming bounds for binary codes from a split Terwilliger algebra
3263 -- 3284Wen Ma, Jinquan Luo. Block codes in pomset metric over ${\mathbb {Z}}_m$
3285 -- 3292Lucas Reis. The average density of K-normal elements over finite fields
3293 -- 3303Denis S. Krotov. Projective tilings and full-rank perfect codes
3305 -- 3319Livia Betti, Jim Brown, Fernando Gaitan, Aiyana Spear, Japheth Varlack. 2
3321 -- 3330Jie Xu, Zhiyong Zheng, Kun Tian, Man Chen. Two properties of prefix codes and uniquely decodable codes

Volume 91, Issue 1

1 -- 27Lukas Kölsch, Björn Kriepke, Gohar M. M. Kyureghyan. Image sets of perfectly nonlinear maps
29 -- 44He Zhang, Chunming Tang. Constructions of large cyclic constant dimension codes via Sidon spaces
45 -- 54Hadi Kharaghani, Sho Suda, Vlad Zaitsev. On a class of optimal constant weight ternary codes
55 -- 61Yasamin Khaefi, Zeinab Akhlaghi, Behrooz Khosravi. On the subgroup perfect codes in Cayley graphs
63 -- 82Maximilien Gadouleau, Luca Mariot, Stjepan Picek. Bent functions in the partial spread class generated by linear recurring sequences
83 -- 114Pan Tan, Cuiling Fan, Cunsheng Ding, Chunming Tang 0001, Zhengchun Zhou. The minimum locality of linear codes
115 -- 126Josimar J. R. Aguirre, Cícero Carvalho, Victor G. L. Neumann. About r-primitive and k-normal elements in finite fields
127 -- 149Jiaxin Wang, Fang-Wei Fu 0001. New results on vectorial dual-bent functions and partial difference sets
151 -- 163Claude Carlet, Rebeka Kiss, Gábor Péter Nagy. Simplicity conditions for binary orthogonal arrays
165 -- 220Marloes Venema, Greg Alpár, Jaap-Henk Hoepman. Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice
221 -- 239Ming Li 0033, Yupeng Jiang, Dongdai Lin. Properties of the cycles that contain all vectors of weight $\le k$
241 -- 271Xavier Caruso, Amaury Durand. Duals of linearized Reed-Solomon codes
273 -- 284Minjia Shi, Na Liu, Jon-Lark Kim, Patrick Solé. Additive complementary dual codes over $\mathbb {F}_4$
285 -- 291Yupeng Jiang. A relation between sequences generated by Golomb's preference algorithm
293 -- 307Vincenzo Pallozzi Lavorante, Valentino Smaldore. New hemisystems of the Hermitian surface