Journal: Des. Codes Cryptography

Volume 92, Issue 5

1113 -- 1125José Alves Oliveira, Fabio Enrique Brochero Martínez. Dynamics of polynomial maps over finite fields
1127 -- 1142Elena Kirshanova, Ekaterina Malygina. Construction-D lattice from Garcia-Stichtenoth tower code
1143 -- 1161Cícero Carvalho, Hiram H. López, Gretchen L. Matthews. Decreasing norm-trace codes
1163 -- 1174Xiaojing Chen 0002, Xingbo Lu, Shixin Zhu, Wan Jiang, Xindi Wang. New entanglement-assisted quantum error-correcting codes from negacyclic codes
1175 -- 1199Lei Zhang 0186. Observations on the branch number and differential analysis of SPEEDY
1201 -- 1218Mesut Sahin, Oguz Yayla. Codes on subgroups of weighted projective tori
1219 -- 1242Alonso Sepúlveda Castellanos, Erik A. R. Mendoza, Luciane Quoos. Weierstrass semigroups, pure gaps and codes on function fields
1243 -- 1250Sara Ban, Sanja Rukavina. Construction of self-orthogonal $\mathbb {Z}_{2^k}$-codes
1251 -- 1265Wenqin Zhang, Yuan Luo 0003, Lele Wang. Optimal binary and ternary locally repairable codes with minimum distance 6
1267 -- 1278Kenji Yasunaga. Improved bounds for codes correcting insertions and deletions
1279 -- 1297Thomas Britz, Himadri Shekhar Chakraborty, Reina Ishikawa, Tsuyoshi Miezaki, Hopein Christofen Tang. Harmonic Tutte polynomials of matroids II
1299 -- 1326Lidija Stanovnik, Miha Moskon, Miha Mraz. In search of maximum non-overlapping codes
1327 -- 1339Ruikai Chen, Sihem Mesnager. On a class of permutation rational functions involving trace maps
1341 -- 1378Semira Einsele, Kenneth G. Paterson. Average case error estimates of the strong Lucas test
1379 -- 1391Alexander L. Gavrilyuk, Vladislav V. Kabanov. Strongly regular graphs decomposable into a divisible design graph and a Hoffman coclique
1393 -- 1421Jan Schoone, Joan Daemen. The state diagram of χ
1423 -- 1437Yun Li, Hongwei Liu 0003, Sihem Mesnager. New constructions of constant dimension subspace codes with large sizes
1439 -- 1454Matthew Kreitzer, Mihai Nica, Rajesh Pereira. Using alternating de Bruijn sequences to construct de Bruijn tori

Volume 92, Issue 4

885 -- 907Qianqian Yan, Junling Zhou. Mutually disjoint Steiner systems from BCH codes
909 -- 916Léo Ducas. Provable lattice reduction of $\mathbb {Z}^n$ with blocksize n/2
917 -- 939Shanxiang Lyu, Ling Liu 0003, Cong Ling 0001, Junzuo Lai, Hao Chen 0029. Lattice codes for lattice-based PKE
941 -- 956Shannon Veitch, Douglas R. Stinson. Unconditionally secure non-malleable secret sharing and circular external difference families
957 -- 973Jiqiang Lu, Wenchang Zhou. Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
975 -- 998Moritz Wiese, Holger Boche. ε-Almost collision-flat universal hash functions and mosaics of designs
999 -- 1022Dipak K. Bhunia, Cristina Fernández-Córdoba, Carlos Vela, Mercè Villanueva. On the equivalence of $\mathbb {Z}_{p^s}$-linear generalized Hadamard codes
1023 -- 1039Sergey Bereg, Mohammadreza Haghpanah, Brian Malouf, Ivan Hal Sudborough. Improved bounds for permutation arrays under Chebyshev distance
1041 -- 1049Tsuyoshi Miezaki, Akihiro Munemasa. Jacobi polynomials and harmonic weight enumerators of the first-order Reed-Muller codes and the extended Hamming codes
1051 -- 1073Deng-Ming Xu, Gang Wang, Sihem Mesnager, You Gao, Fang-Wei Fu 0001. Jacobi sums over Galois rings of arbitrary characters and their applications in constructing asymptotically optimal codebooks
1075 -- 1093Nicolas Aragon, Victor Dyseryn, Philippe Gaborit, Pierre Loidreau, Julian Renner, Antonia Wachter-Zeh. LowMS: a new rank metric code-based KEM without ideal structure
1095 -- 1112Guangkui Xu, Gaojun Luo, Xiwang Cao, Heqian Xu. Hulls of linear codes from simplex codes

Volume 92, Issue 3

507 -- 530Marco Timpanella, Giovanni Zini. q
531 -- 552Amar Bapic, Enes Pasalic, Alexandr Polujan, Alexander Pott. Vectorial Boolean functions with the maximum number of bent components beyond the Nyberg's bound
553 -- 586Felicitas Hörmann, Hannes Bartz. Interpolation-based decoding of folded variants of linearized and skew Reed-Solomon codes
587 -- 608Agathe Cheriere, Lina Mortajine, Tania Richmond, Nadia El Mrabet. Exploiting ROLLO's constant-time implementations with a single-trace analysis
609 -- 637Anina Gruica, Anna-Lena Horlemann, Alberto Ravagnani, Nadja Willenborg. Densities of codes of various linearity degrees in translation-invariant metric spaces
639 -- 651Vladimir N. Potapov, Anna A. Taranenko, Yuriy V. Tarannikov. An asymptotic lower bound on the number of bent functions
653 -- 666Selçuk Kavut. Modified Patterson-Wiedemann construction
667 -- 680Cem Güneri, Ferruh Özbudak, Selcen Sayici. On subfield subcodes obtained from restricted evaluation codes
681 -- 694Faruk Göloglu, Lukas Kölsch. Counting the number of non-isotopic Taniguchi semifields
695 -- 708Anna-Maurin Graner, Gohar M. Kyureghyan. Constructing irreducible polynomials recursively with a reverse composition method
709 -- 722Rafael A. Arce-Nazario, Carlos Hernández, José R. Ortiz-Ubarri, Ivelisse Rubio, Jaziel Torres. Analysis and computation of multidimensional linear complexity of periodic arrays
723 -- 751Nicolas David 0001, María Naya-Plasencia, André Schrottenloher. Quantum impossible differential attacks: applications to AES and SKINNY
753 -- 769Rakhi Pratihar, Tovohery Hajatiana Randrianarisoa. Antipodal two-weight rank metric codes
771 -- 785Akihiro Munemasa, Rowena Alma L. Betty. Classification of extremal type II $\mathbb {Z}_4$-codes of length 24
787 -- 801Reza Dastbasteh, Petr Lisonek. New quantum codes from self-dual codes over $\mathbb {F}_4$

Volume 92, Issue 2

227 -- 257Samir Hodzic, Arnab Roy 0005, Elena Andreeva 0001. Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks
259 -- 266Ziwei Lu, Shenglin Zhou. Flag-transitive symmetric 2-designs of prime order
267 -- 276Danyao Wu, Pingzhi Yuan. Permutation polynomials and their compositional inverses over finite fields by a local method
277 -- 301Kota Takahashi, Keitaro Hashimoto, Wakaha Ogata. Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
303 -- 339Monika Yadav, Anuradha Sharma. Construction and enumeration of self-orthogonal and self-dual codes over Galois rings of even characteristic
341 -- 363Wen Ma, Jinquan Luo. Codes with respect to weighted poset block metric
365 -- 395Xiaowei Su, Zihong Tian, Guohui Hao. Determination of the sizes of optimal geometric orthogonal codes with parameters (n˟ m,k,λ ,k-1)
397 -- 418Cuiling Fan, an Wang, Li Xu. New classes of NMDS codes with dimension 3
419 -- 433Diane M. Donovan, Mike J. Grannell, Emine Sule Yazici. On maximal partial Latin hypercubes
435 -- 465Hannes Bartz, Thomas Jerkovits, Johan Rosenkilde. Fast Kötter-Nielsen-Høholdt interpolation over skew polynomial rings and its application in coding theory
467 -- 476Nikolay Kolomeec, Denis Bykov. On the image of an affine subspace under the inverse function within a finite field
477 -- 494Mahir Bilen Can, Roy Joshua, Girivaru V. Ravindra. Defects of codes from higher dimensional algebraic varieties
495 -- 503John Bamberg. On the 430-cap of rmPG(6,4) having two intersection sizes with respect to hyperplanes

Volume 92, Issue 1

1 -- 12Hai Liu, Chengju Li, Haifeng Qian. Parameters of several families of binary duadic codes and their related codes
13 -- 49Arghya Bhattacharjee, Ritam Bhaumik, Avijit Dutta, Mridul Nandi, Anik Raychaudhuri. BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers
51 -- 92Jiaxin Pan, Chen Qian 0002, Benedikt Wagner. Generic constructions of master-key KDM secure attribute-based encryption
93 -- 112Kris Coolsaet. Nonsingular hypercubes and nonintersecting hyperboloids
113 -- 144Aleksandr Kutsenko. Decomposing self-dual bent functions
145 -- 157Vidya Sagar, Ritumoni Sarma. D-construction over the non-unital ring I
159 -- 177Orr Dunkelman, Nathan Keller, Eyal Ronen, Adi Shamir. Quantum time/memory/data tradeoff attacks
179 -- 204Michela Ceria, Teo Mora. Towards a Gröbner-free approach to coding
205 -- 209Alexander L. Gavrilyuk, Sho Suda. Uniqueness of an association scheme related to the Witt design on 11 points
211 -- 225Boyi He, Qunying Liao. The properties and the error-correcting pair for lengthened GRS codes