Journal: Des. Codes Cryptography

Volume 92, Issue 9

2423 -- 2449Xiaoli Dong, Jun Liu, Yongzhuang Wei, Wen Gao 0010, Jie Chen 0055. Meet-in-the-middle attacks on AES with value constraints
2451 -- 2472Sam Adriaensen, Lins Denaux. Small weight codewords of projective geometric codes II
2473 -- 2489Bo Yang, Kangkang He, Xiangyong Zeng, Zibi Xiao. Symmetric 2-adic complexity of Tang-Gong interleaved sequences from generalized GMW sequence pair
2491 -- 2510Carmen Amarra, Alice Devillers, Cheryl E. Praeger. Chain-imprimitive, flag-transitive 2-designs
2511 -- 2525Santiago Barrera Acevedo, Heiko Dietrich, Corey Lionis. New families of quaternionic Hadamard matrices
2527 -- 2548Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco. Further results on covering codes with radius R and codimension tR+1
2549 -- 2586Carlos Galindo 0001, Fernando Hernando, Helena Martín-Cruz. Optimal (r,δ )-LRCs from monomial-Cartesian codes and their subfield-subcodes
2587 -- 2597Gergely Kiss, Gábor Somlai. Special directions on the finite affine plane
2599 -- 2613Xiaomeng Wang, Lina Wei, Shou-Jun Xu, Sanming Zhou. Subgroup total perfect codes in Cayley sum graphs
2655 -- 2684Le Dong, Danxun Zhang, Wenya Li, Wenling Wu. Yoyo attack on 4-round Lai-Massey scheme with secret round functions
2685 -- 2704Jie Hao 0001, Shu-Tao Xia, Kenneth W. Shum, Bin Chen 0011, Fang-Wei Fu 0001, Yixian Yang. Optimal ternary locally repairable codes

Volume 92, Issue 8

2103 -- 2129Chun Guo 0002, Ling Song 0001. CCA security for contracting (quasi-)Feistel constructions with tight round complexity
2131 -- 2157Slim Bettaieb, Loïc Bidoux, Victor Dyseryn, Andre Esser 0001, Philippe Gaborit, Mukul Kulkarni, Marco Palumbi. PERK: compact signature scheme based on a new variant of the permuted kernel problem
2159 -- 2182Ka Hin Leung, Bernhard Schmidt 0001, Tao Zhang 0030. Classification of semiregular relative difference sets with $\gcd (\lambda ,n)=1$ attaining Turyn's bound
2183 -- 2196Giusy Monzillo, Tim Penttila, Alessandro Siciliano. Classifying pseudo-ovals, translation generalized quadrangles, and elation Laguerre planes of small order
2197 -- 2217Seungjun Baek 0002, Giyoon Kim, Jongsung Kim. Preimage attacks on reduced-round Ascon-Xof
2219 -- 2234Cong Yu, Shixin Zhu, Fuyin Tian. Construction of quantum codes from multivariate polynomial rings
2235 -- 2252Shuangqing Liu, Lijun Ji. Combinatorial constructions of optimal low-power error-correcting cooling codes
2253 -- 2265Geyang Wang, Qi Wang 0012. On the size distribution of the fixed-length Levenshtein balls with radius one
2267 -- 2285Juanjuan Xu, Lijun Ji. Special overlarge sets of Kirkman triple systems
2287 -- 2306Daniele Bartoli, Nicola Durante, Giovanni Giuseppe Grimaldi. Ovoids of Q(6, q) of low degree
2307 -- 2321Ryosuke Yamaguchi. Jacobi polynomials for the first-order generalized Reed-Muller codes
2323 -- 2340Zhiwen He, Tingting Chen, Gennian Ge. New constructions of signed difference sets
2341 -- 2365Jan Schoone, Joan Daemen. n
2367 -- 2378Sascha Kurz. Lengths of divisible codes: the missing cases
2379 -- 2421Hannes Bartz, Sven Puchinger. Fast decoding of lifted interleaved linearized Reed-Solomon codes for multishot network coding

Volume 92, Issue 7

1879 -- 1902Liqin Qian, Xiwang Cao, Xia Wu 0002, Wei Lu 0022. MDS codes with l-Galois hulls of arbitrary dimensions
1903 -- 1924Delphine Boucher, Kayodé Epiphane Nouetowa. Some constructions and existence conditions for Hermitian self-dual skew codes
1947 -- 1959Ebru Adiguzel-Goktas, Enver Ozdemir. Square root computation in finite fields
1961 -- 1982Giuseppe D'Alconzo. Monomial isomorphism for tensors and applications to code equivalence problems
1983 -- 2009Benjamin Fuller 0001. Impossibility of efficient information-theoretic fuzzy extraction
2011 -- 2029Rongsheng Wu, Xiande Zhang. Balanced reconstruction codes for single edits
2031 -- 2053Chunyu Gan, Chengju Li, Haifeng Qian, Xueying Shi. On Bose distance of a class of BCH codes with two types of designed distances
2055 -- 2083Yuxin Tong, Xiang Xie, Kang Yang, Rui Zhang, Rui Xue. Efficient secure multi-party computation for proof of custody in Ethereum sharding
2085 -- 2101Zhonghua Sun 0001, Xinyue Liu, Shixin Zhu, Yongsheng Tang. Negacyclic BCH codes of length $\frac{q^{2m}-1}{q+1}$ and their duals

Volume 92, Issue 6

1455 -- 1475Xiaoni Du, René Rodríguez, Hao Wu. Infinite families of minimal binary codes via Krawtchouk polynomials
1477 -- 1500Yi-Fan Tseng, Zi-Yuan Liu, Raylin Tso. Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives
1501 -- 1516Laura Monroe. Optimal binary signed-digit representations of integers and the Stern polynomial
1517 -- 1531Zhaoping Meng, Qingling Gao, Zhanggui Wu. A recursive construction of doubly resolvable Steiner quadruple systems
1533 -- 1540Haode Yan, Yanan Yin. On the parameters of extended primitive cyclic codes and the related designs
1541 -- 1597Qiqi Lai, Feng-Hao Liu, Zhedong Wang. Leakage-resilient sf IBE/sf ABE with optimal leakage rates from lattices
1599 -- 1617Adam Michael Roberts. Self-dual codes from a block matrix construction characterised by group rings
1619 -- 1635Kanchan Singh, Ritesh Kumar Pathak, Sheo Kumar Singh. Linear codes associated to determinantal varieties in the space of hermitian matrices
1637 -- 1661Chun Guo, Yiyuan Luo, Chenyu Xiao. On the sequential indifferentiability of the Lai-Massey construction
1663 -- 1728Xinxin Gong, Yonglin Hao, Qingju Wang 0001. Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW
1729 -- 1746Yu-Chi Chen. A conceptually simple and generic construction of plaintext checkable encryption in the standard model
1747 -- 1759Alexander M. Romanov 0001. Perfect mixed codes from generalized Reed-Muller codes
1761 -- 1802Sabrina Kunzweiler. n)-isogenies
1803 -- 1821Angelot Behajaina, Martino Borello, Javier de la Cruz, Wolfgang Willems. Twisted skew G-codes
1823 -- 1843Kaizhan Lin, Jianming Lin, Shiping Cai, Weize Wang, Chang-An Zhao. Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees

Volume 92, Issue 5

1113 -- 1125José Alves Oliveira, Fabio Enrique Brochero Martínez. Dynamics of polynomial maps over finite fields
1127 -- 1142Elena Kirshanova, Ekaterina Malygina. Construction-D lattice from Garcia-Stichtenoth tower code
1143 -- 1161Cícero Carvalho, Hiram H. López, Gretchen L. Matthews. Decreasing norm-trace codes
1163 -- 1174Xiaojing Chen 0002, Xingbo Lu, Shixin Zhu, Wan Jiang, Xindi Wang. New entanglement-assisted quantum error-correcting codes from negacyclic codes
1175 -- 1199Lei Zhang 0186. Observations on the branch number and differential analysis of SPEEDY
1201 -- 1218Mesut Sahin, Oguz Yayla. Codes on subgroups of weighted projective tori
1219 -- 1242Alonso Sepúlveda Castellanos, Erik A. R. Mendoza, Luciane Quoos. Weierstrass semigroups, pure gaps and codes on function fields
1243 -- 1250Sara Ban, Sanja Rukavina. Construction of self-orthogonal $\mathbb {Z}_{2^k}$-codes
1251 -- 1265Wenqin Zhang, Yuan Luo 0003, Lele Wang. Optimal binary and ternary locally repairable codes with minimum distance 6
1267 -- 1278Kenji Yasunaga. Improved bounds for codes correcting insertions and deletions
1279 -- 1297Thomas Britz, Himadri Shekhar Chakraborty, Reina Ishikawa, Tsuyoshi Miezaki, Hopein Christofen Tang. Harmonic Tutte polynomials of matroids II
1299 -- 1326Lidija Stanovnik, Miha Moskon, Miha Mraz. In search of maximum non-overlapping codes
1327 -- 1339Ruikai Chen, Sihem Mesnager. On a class of permutation rational functions involving trace maps
1341 -- 1378Semira Einsele, Kenneth G. Paterson. Average case error estimates of the strong Lucas test
1379 -- 1391Alexander L. Gavrilyuk, Vladislav V. Kabanov. Strongly regular graphs decomposable into a divisible design graph and a Hoffman coclique
1393 -- 1421Jan Schoone, Joan Daemen. The state diagram of χ
1423 -- 1437Yun Li, Hongwei Liu 0003, Sihem Mesnager. New constructions of constant dimension subspace codes with large sizes
1439 -- 1454Matthew Kreitzer, Mihai Nica, Rajesh Pereira. Using alternating de Bruijn sequences to construct de Bruijn tori

Volume 92, Issue 4

885 -- 907Qianqian Yan, Junling Zhou. Mutually disjoint Steiner systems from BCH codes
909 -- 916Léo Ducas. Provable lattice reduction of $\mathbb {Z}^n$ with blocksize n/2
917 -- 939Shanxiang Lyu, Ling Liu 0003, Cong Ling 0001, Junzuo Lai, Hao Chen 0029. Lattice codes for lattice-based PKE
941 -- 956Shannon Veitch, Douglas R. Stinson. Unconditionally secure non-malleable secret sharing and circular external difference families
957 -- 973Jiqiang Lu, Wenchang Zhou. Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
975 -- 998Moritz Wiese, Holger Boche. ε-Almost collision-flat universal hash functions and mosaics of designs
999 -- 1022Dipak K. Bhunia, Cristina Fernández-Córdoba, Carlos Vela, Mercè Villanueva. On the equivalence of $\mathbb {Z}_{p^s}$-linear generalized Hadamard codes
1023 -- 1039Sergey Bereg, Mohammadreza Haghpanah, Brian Malouf, Ivan Hal Sudborough. Improved bounds for permutation arrays under Chebyshev distance
1041 -- 1049Tsuyoshi Miezaki, Akihiro Munemasa. Jacobi polynomials and harmonic weight enumerators of the first-order Reed-Muller codes and the extended Hamming codes
1051 -- 1073Deng-Ming Xu, Gang Wang, Sihem Mesnager, You Gao, Fang-Wei Fu 0001. Jacobi sums over Galois rings of arbitrary characters and their applications in constructing asymptotically optimal codebooks
1075 -- 1093Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Pierre Loidreau, Julian Renner, Antonia Wachter-Zeh. LowMS: a new rank metric code-based KEM without ideal structure
1095 -- 1112Guangkui Xu, Gaojun Luo, Xiwang Cao, Heqian Xu. Hulls of linear codes from simplex codes

Volume 92, Issue 3

507 -- 530Marco Timpanella, Giovanni Zini. q
531 -- 552Amar Bapic, Enes Pasalic, Alexandr Polujan, Alexander Pott. Vectorial Boolean functions with the maximum number of bent components beyond the Nyberg's bound
553 -- 586Felicitas Hörmann, Hannes Bartz. Interpolation-based decoding of folded variants of linearized and skew Reed-Solomon codes
587 -- 608Agathe Cheriere, Lina Mortajine, Tania Richmond, Nadia El Mrabet. Exploiting ROLLO's constant-time implementations with a single-trace analysis
609 -- 637Anina Gruica, Anna-Lena Horlemann, Alberto Ravagnani, Nadja Willenborg. Densities of codes of various linearity degrees in translation-invariant metric spaces
639 -- 651Vladimir N. Potapov, Anna A. Taranenko, Yuriy V. Tarannikov. An asymptotic lower bound on the number of bent functions
653 -- 666Selçuk Kavut. Modified Patterson-Wiedemann construction
667 -- 680Cem Güneri, Ferruh Özbudak, Selcen Sayici. On subfield subcodes obtained from restricted evaluation codes
681 -- 694Faruk Göloglu, Lukas Kölsch. Counting the number of non-isotopic Taniguchi semifields
695 -- 708Anna-Maurin Graner, Gohar M. Kyureghyan. Constructing irreducible polynomials recursively with a reverse composition method
709 -- 722Rafael A. Arce-Nazario, Carlos Hernández, José R. Ortiz-Ubarri, Ivelisse Rubio, Jaziel Torres. Analysis and computation of multidimensional linear complexity of periodic arrays
723 -- 751Nicolas David 0001, María Naya-Plasencia, André Schrottenloher. Quantum impossible differential attacks: applications to AES and SKINNY
753 -- 769Rakhi Pratihar, Tovohery Hajatiana Randrianarisoa. Antipodal two-weight rank metric codes
771 -- 785Akihiro Munemasa, Rowena Alma L. Betty. Classification of extremal type II $\mathbb {Z}_4$-codes of length 24
787 -- 801Reza Dastbasteh, Petr Lisonek. New quantum codes from self-dual codes over $\mathbb {F}_4$
803 -- 832André Chailloux, Simona Etinski. On the (in)security of optimized Stern-like signature schemes
833 -- 862Krijn Reijnders, Simona Samardjiska, Monika Trimoska. Hardness estimates of the code equivalence problem in the rank metric

Volume 92, Issue 2

227 -- 257Samir Hodzic, Arnab Roy 0005, Elena Andreeva 0001. Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks
259 -- 266Ziwei Lu, Shenglin Zhou. Flag-transitive symmetric 2-designs of prime order
267 -- 276Danyao Wu, Pingzhi Yuan. Permutation polynomials and their compositional inverses over finite fields by a local method
277 -- 301Kota Takahashi, Keitaro Hashimoto, Wakaha Ogata. Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
303 -- 339Monika Yadav, Anuradha Sharma. Construction and enumeration of self-orthogonal and self-dual codes over Galois rings of even characteristic
341 -- 363Wen Ma, Jinquan Luo. Codes with respect to weighted poset block metric
365 -- 395Xiaowei Su, Zihong Tian, Guohui Hao. Determination of the sizes of optimal geometric orthogonal codes with parameters (n˟ m,k,λ ,k-1)
397 -- 418Cuiling Fan, an Wang, Li Xu. New classes of NMDS codes with dimension 3
419 -- 433Diane M. Donovan, Mike J. Grannell, Emine Sule Yazici. On maximal partial Latin hypercubes
435 -- 465Hannes Bartz, Thomas Jerkovits, Johan Rosenkilde. Fast Kötter-Nielsen-Høholdt interpolation over skew polynomial rings and its application in coding theory
467 -- 476Nikolay Kolomeec, Denis Bykov. On the image of an affine subspace under the inverse function within a finite field
477 -- 494Mahir Bilen Can, Roy Joshua, Girivaru V. Ravindra. Defects of codes from higher dimensional algebraic varieties
495 -- 503John Bamberg. On the 430-cap of rmPG(6,4) having two intersection sizes with respect to hyperplanes

Volume 92, Issue 12

3859 -- 3875Yi Li, Xiutao Feng, Qiang Wang. i+ax over ${\mathbb {F}}_{2^n}$
3877 -- 3894Haiyan Guan, Shenglin Zhou. 2,k,λ ) designs
3895 -- 3918Shi Bai 0001, Hansraj Jangir, Tran Ngo, William Youmans. An algebraic algorithm for breaking NTRU with multiple keys
3919 -- 3953Jinrui Sha, Shengli Liu, Shuai Han 0001. Functional commitments for arbitrary circuits of bounded sizes
3955 -- 3979Yue Gao 0001, Weijun Fang, Jingke Xu, Dong Wang, Sihuang Hu. Optimal (2,δ ) locally repairable codes via punctured simplex codes
3981 -- 4009Ferruh Özbudak, Buket Özkaya. New distance bounds for quasi-cyclic codes
4011 -- 4033Deepak Agrawal, Srinivasan Krishnaswamy, Smarajit Das. On Boolean functions derived from linear maps over $\mathbb {Z}_4$ and their application to secret sharing
4035 -- 4055Noy Soffer Aranov, Angelot Behajaina. On the maximum size of ultrametric orthogonal sets over discrete valued fields
4057 -- 4083Robert Christian Subroto. An algebraic approach to circulant column parity mixers
4085 -- 4097Melek Çil, Baris Bülent Kirlar. On the construction of certain odd degree irreducible polynomials over finite fields
4099 -- 4129Feixiang Zhao, Jian Weng 0001, Wenli Xie, Lin Hou, Ming Li 0049. Time-based attribute-based proxy re-encryption with decryption key update
4131 -- 4143Simon Masson, Antonio Sanso, Zhenfei Zhang. Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field
4145 -- 4168Alexander Barg, Ohad Elishco, Ryan Gabrys, Geyang Wang, Eitan Yaakobi. Storage codes and recoverable systems on lines and grids
4169 -- 4187Yiwen Gao, Yuan Li, Haibin Kan. On the uniqueness of balanced complex orthogonal design
4189 -- 4194Zoltán Füredi, Alexandr V. Kostochka, Mohit Kumbhat. Minimal abundant packings and choosability with separation
4195 -- 4211Nicola Durante, Giovanni Giuseppe Grimaldi, Giovanni Longobardi. Non-linear MRD codes from cones over exterior sets
4213 -- 4230Bingsheng Shen, Tao Yu, Zhengchun Zhou, Yang Yang 0005. Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions
4231 -- 4245Ajani De Vas Gunasekara, Alice Devillers. Transitive path decompositions of Cartesian products of complete graphs
4247 -- 4277Birenjith Sasidharan, Emanuele Viterbo, Son Hoang Dau. Binary cyclic-gap constant weight codes with low-complexity encoding and decoding
4279 -- 4285Zhiguo Ding 0005, Michael E. Zieve. Two classes of exceptional m-to-1 rational functions
4287 -- 4311Yingyin Pan, Jianghua Zhong, Dongdai Lin. Generalized cycle joining method and its application to the construction of long-period Galois NFSRs
4313 -- 4333Ákos K. Matszangosz, Ferenc Szöllosi. A characterization of complex Hadamard matrices appearing in families of MUB triplets
4335 -- 4352Rong Luo, Mingliang Yan, Sihem Mesnager, Dongchun Han. On Abelian one-dimensional hull codes in group algebras
4353 -- 4422Yadi Wei, Jiaxin Wang, Fang-Wei Fu. Association schemes arising from non-weakly regular bent functions
4423 -- 4451Kazuhiko Minematsu, Shingo Sato, Junji Shikata. Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing
4453 -- 4486Shuping Mao, Tingting Guo, Peng Wang 0009, Ruozhou Xu, Yuchao Chen, Lei Hu. A quantum-secure partial parallel MAC QPCBC
4487 -- 4509Guangkui Xu, Xiwang Cao, Gaojun Luo, Huawei Wu. Infinite families of 3-designs from special symmetric polynomials
4511 -- 4530Carlos Aguilar Melchor, Nicolas Aragon, Jean-Christophe Deneuville, Philippe Gaborit, Jérôme Lacan, Gilles Zémor. Efficient error-correcting codes for the HQC post-quantum cryptosystem
4531 -- 4548Shuyu Luo, Weiqiong Wang, Qi Zhang, Zhenjie Song. Constructions of plateaued correctors with high correction order and good nonlinearity via Walsh spectral neutralization technique
4549 -- 4591Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia. Truncated differential cryptanalysis: new insights and application to QARMAv1-n and QARMAv2-64

Volume 92, Issue 11

3317 -- 3353Manuel González Sarabia, Humberto Muñoz-George, Jorge A. Ordaz, Eduardo Sáenz-de-Cabezón, Rafael H. Villarreal. Indicator functions, v-numbers and Gorenstein rings in the theory of projective Reed-Muller-type codes
3355 -- 3369Frank R. Kschischang, Felice Manganiello, Alberto Ravagnani, Kristen Savary. External codes for multiple unicast networks via interference alignment
3371 -- 3375Jürgen Bierbrauer, Stefano Marcugini, Fernanda Pambianco. An asymptotic property of quaternary additive codes
3377 -- 3390Huawei Wu, Jing Yang, Keqin Feng. Circular external difference families: construction and non-existence
3391 -- 3427Isaac Andrés Canales Martinez, Igor Semaev. Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers
3429 -- 3446Xinyue Ming, Tao Feng 0002, Guojing Jia, Xiaomiao Wang. The existence of $(\mathbb {Z}_v,4,1)$-disjoint difference families
3447 -- 3493Sarah Arpin, James Clements, Pierrick Dartois, Jonathan Komada Eriksen, Péter Kutas, Benjamin Wesolowski. Finding orientations of supersingular elliptic curves and quaternion orders
3495 -- 3502Somi Gupta, Francesco Pavese. Affine vector space partitions and spreads of quadrics
3503 -- 3514Tran van Trung. Constructions for t-designs and s-resolvable t-designs
3515 -- 3532Woohyuk Chung, Hwigyeom Kim, Jooyoung Lee 0001, Yeongmin Lee. Security analysis of the ISO standard sfOFB-sfDRBG
3533 -- 3559Xu Pan, Hao Chen, Hongwei Liu. Some self-dual codes and isodual codes constructed by matrix product codes
3561 -- 3572Marco Buratti, Anamari Nakic. Additivity of symmetric and subspace 2-designs
3573 -- 3585Dongchun Han, Hanbin Zhang. Explicit constructions of NMDS self-dual codes
3587 -- 3643Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, Ling Qin. CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist
3645 -- 3664Gretchen L. Matthews, Travis Morrison, Aidan W. Murphy. Curve-lifted codes for local recovery using lines
3665 -- 3675Sergey Goryainov, Elena V. Konstantinova. Non-canonical maximum cliques without a design structure in the block graphs of 2-designs
3677 -- 3721Héctor Masip Ardevol, Jordi Baylina Melé, Marc Guzmán-Albiol, Jose Luis Muñoz-Tapia. eSTARK: extending STARKs with arguments
3723 -- 3751Yang Li, Shitao Li, Shixin Zhu. New and improved formally self-dual codes with small hulls from polynomial four Toeplitz codes
3753 -- 3782Bolin Wang, Wenling Wu. Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes
3783 -- 3798Lei Li, Xinchun Yu, Chenhao Ying, Liang Chen, Yuanyuan Dong, Yuan Luo. MDS array codes with efficient repair and small sub-packetization level
3799 -- 3811Shuhui Yu, Lijun Ji. Two new constructions of cyclic subspace codes via Sidon spaces
3813 -- 3842Yin Lv, Danping Shi, Lei Hu, Yi Guo. Utilizing FWT in linear cryptanalysis of block ciphers with various structures
3843 -- 3858Huawei Huang, Changgen Peng, Lunzhi Deng. Cryptanalysis of a key exchange protocol based on a modified tropical structure

Volume 92, Issue 10

2705 -- 2729Ang Xiao, Yue Zhou 0001. On the packing density of Lee spheres
2731 -- 2741Jong Yoon Hyun, Jungyun Lee, Yoonjin Lee. Characterization of weakly regular p-ary bent functions of ℓ-form
2743 -- 2767María Chara, Ricardo A. Podestá, Luciane Quoos, Ricardo Toledano. Lifting iso-dual algebraic geometry codes
2769 -- 2789Song Tian. Computing gluing and splitting (ℓ ,ℓ )-isogenies
2791 -- 2799Hadi Kharaghani, Thomas Pender, Vladimir D. Tonchev. On optimal constant weight codes derived from ømega-circulant balanced generalized weighing matrices
2801 -- 2823Elena Berardini, Alessio Caminata, Alberto Ravagnani. Structure of CSS and CSS-T quantum codes
2825 -- 2843Muhammad Imran 0022, Gábor Ivanyos. Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem
2845 -- 2861Wenjun Yu, Moshe Schwartz 0001. On duplication-free codes for disjoint or equal-length errors
2863 -- 2879Joanne Hall, Daniel Horsley, Douglas R. Stinson. Bounds on data limits for all-to-all comparison from combinatorial designs
2881 -- 2899Rajendra Prasad Rajpurohit, Maheshanand Bhaintwal, Charul Rajput. Locally maximal recoverable codes and LMR-LCD codes
2901 -- 2926Xinran Wang, Ziling Heng, Fengwei Li, Qin Yue. LCD codes and almost optimally extendable codes from self-orthogonal codes
2927 -- 2948Masaaki Harada. A method for constructing quaternary Hermitian self-dual codes and an application to quantum codes
2949 -- 2970Jing Jiang 0003, Fenggui Pei, Cailin Wen, Minquan Cheng, Henk D. L. Hollmann. Constructions of t-strongly multimedia IPP codes with length t+1
2971 -- 2991Jing Qiu, Fang-Wei Fu 0001. Some new constructions of optimal linear codes and alphabet-optimal (r,δ )-locally repairable codes
2993 -- 3016Hongwei Liu, Zihao Yu. Linear codes from simplicial complexes over ${\mathbb {F}}_{2^n}$
3017 -- 3032Yupeng Jiang, Ming Li, Ying Gao, Dongdai Lin. On prefer-one sequences
3033 -- 3048Horacio Navarro. Bases for Riemann-Roch spaces of linearized function fields with applications to generalized algebraic geometry codes
3049 -- 3062Makoto Araya, Masaaki Harada, Hadi Kharaghani, Ali Mohammadian, Behruz Tayfeh-Rezaie. On the classification of skew Hadamard matrices of order $\varvec{36}$ and related structures
3063 -- 3083Xiaoshan Quan, Qin Yue, Fuqing Sun. Hulls of cyclic codes with respect to the regular permutation inner product
3085 -- 3124Sven Schäge. sf TOPAS2-pass key exchange with full perfect forward secrecy and optimal communication complexity
3125 -- 3131Stefan Steinerberger. A note on approximate Hadamard matrices
3133 -- 3154Fabio Enrique Brochero Martínez, Daniela Oliveira. On the number of rational points of Artin-Schreier's curves and hypersurfaces
3155 -- 3235Pratish Datta, Tapas Pal, Katsuyuki Takashima. Compact FE for unbounded attribute-weighted sums for logspace from SXDH
3237 -- 3259Jin Li, Huilian Zhu, Shan Huang. Some constacyclic BCH codes with good parameters
3261 -- 3316Wonseok Choi 0002, Seongha Hwang, ByeongHak Lee, Jooyoung Lee 0001. ZLR: a fast online authenticated encryption scheme achieving full security

Volume 92, Issue 1

1 -- 12Hai Liu, Chengju Li, Haifeng Qian. Parameters of several families of binary duadic codes and their related codes
13 -- 49Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Mridul Nandi, Anik Raychaudhuri. BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
51 -- 92Jiaxin Pan, Chen Qian 0002, Benedikt Wagner. Generic constructions of master-key KDM secure attribute-based encryption
93 -- 112Kris Coolsaet. Nonsingular hypercubes and nonintersecting hyperboloids
113 -- 144Aleksandr Kutsenko. Decomposing self-dual bent functions
145 -- 157Vidya Sagar, Ritumoni Sarma. D-construction over the non-unital ring I
159 -- 177Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir. Quantum time/memory/data tradeoff attacks
179 -- 204Michela Ceria, Teo Mora. Towards a Gröbner-free approach to coding
205 -- 209Alexander L. Gavrilyuk, Sho Suda. Uniqueness of an association scheme related to the Witt design on 11 points
211 -- 225Boyi He, Qunying Liao. The properties and the error-correcting pair for lengthened GRS codes