Journal: Des. Codes Cryptography

Volume 93, Issue 9

3463 -- 3479B. G. Rodrigues, Patrick Solé. Primitive rank 3 groups, binary codes, and 3-designs
3481 -- 3505Niklas Gassner, Julia Lieb, Abhinaba Mazumder, Michael Schaller. Information-set decoding for convolutional codes
3507 -- 3519Sergey Bezzateev, Natalia A. Shekhunova. Self-reversible generalized (L,G)-codes
3521 -- 3541Antonio Corbo Esposito, Rosa Fera, Francesco Romeo. Hilbert series and degrees of regularity of Oil & Vinegar and mixed quadratic systems
3543 -- 3563Javier Herranz, Germán Sáez. (k, n)-Consecutive access structures
3565 -- 3573R. Julian R. Abel, Ingo Janiszczak, Reiner Staszewski. Improvements for lower bounds of mutually orthogonal Latin squares of sizes 54, 96 and 108
3575 -- 3591Hajime Matsui, Kakeru Kaneko. Entanglement-assisted quantum error-correcting codes via quasi-cyclic codes with complementary duals
3593 -- 3618Giulia Cavicchioni, Eleonora Guerrini, Alessio Meneghetti. A class of locally recoverable codes over finite chain rings
3619 -- 3640Frederique Oggier, Shengwei Liu, Hongwei Liu. About the Rankin and Bergé-Martinet constants from a coding theory view point
3641 -- 3669Kamel Mohamed Faraoun, Nadia El Mrabet. Optimizing and securing GLV multiplication over BLS pairings-friendly curves
3671 -- 3687Yuehui Cui, Jinquan Luo. Differential uniformity and constacyclic code from some power mapping
3689 -- 3705Søren Fuglede Jørgensen. On the clique covering numbers of Johnson graphs
3707 -- 3731Yanyan Zhou, SenPeng Wang, Yunong Wu, Bin Hu. Improved method of searching for boomerang distinguishers on Feistel structures-applications to WARP, TWINE, LBlock, LBlock-s, and ALLPC
3733 -- 3760Shakir Ali, Nuh Aydin, Pushpendra Sharma, Elif Segah Oztas, Atif Ahmad Khan. Constacyclic codes over general mixed alphabets and their applications
3761 -- 3808Xiaoen Lin, Le He, Zhengrong Lu, Yantian Shen, Chongxu Ren, Hongbo Yu. Internal differential structure: preimage attacks on up to 5-round Keccak
3809 -- 3861Danilo Francati, Daniele Venturi 0001. Evolving secret sharing revisited: computational security and succinctness
3863 -- 3874Marco Buratti, Anita Pasotti. Shiftable Heffter spaces
3875 -- 3902Sergiy V. Borodachov, Peter G. Boyvalenkov, Peter D. Dragnev, Douglas P. Hardin, Edward B. Saff, Maya Stoyanova. Bounds on discrete potentials of spherical (k, k)-designs
3903 -- 3932Mrinal Kanti Bose, Udaya Parampalli, Abhay Kumar Singh. Binary cyclic codes from permutation polynomials over ${\mathbb {F}}_{2^m}$
3933 -- 3953Danyao Wu, Pingzhi Yuan. The compositional inverses of the permutation polynomials from trace functions over finite fields
3955 -- 4017Hao Lin 0012, Mingqiang Wang, Weiqiang Wen, Shifeng Sun 0001, Kaitai Liang. Generic construction of threshold ring signatures and lattice-based instantiations
4019 -- 4042Hiroki Kajiura, Koji Momihara, Utano Ogata. Divisible pre-difference sets for approximating integrations over finite groups
4043 -- 4081Yong Liu, Zejun Xiang 0001, Xiangyong Zeng, Shasha Zhang. A novel algorithm for the k-XOR problem
4083 -- 4112Tongliang Zhang, Haibin Kan, Lijing Zheng, Jie Peng 0001, Hanbing Zhao. Further results on permutation pentanomials over finite fields with characteristic two
4113 -- 4115Simeon Ball, Michel Lavrauw, Tabriz Popatia. Correction to: Griesmer type bounds for additive codes over finite fields, integral and fractional MDS codes

Volume 93, Issue 8

2897 -- 2918Julia Lieb, Raquel Pinto, Carlos Vela. A new method for erasure decoding of convolutional codes
2919 -- 2930Eric Kubischta, Ian Teixeira. Quantum codes and irreducible products of characters
2931 -- 2945Giacomo Micheli, Vincenzo Pallozzi Lavorante, Abhi Shukul, Noah Smith. Constructions of locally recoverable codes with large availability
2947 -- 2969Joonas Ahola, Iván Blanco-Chacón, Wilmar Bolaños, Antti Haavikko, Camilla Hollanti, Rodrigo Martín Sánchez-Ledesma. Fast multiplication and the PLWE-RLWE equivalence for an infinite family of maximal real subfields of cyclotomic fields
2971 -- 2992Hai Liu, Chunyu Gan, Chengju Li, Xueying Shi. Constructions of binary cyclic codes with minimum weights exceeding the square-root lower bound
2993 -- 3009Matteo Bonini, Martino Borello, Eimear Byrne. The geometry of covering codes in the sum-rank metric
3011 -- 3027Yuqing Zhu 0003, Chang Lv, Jiqiang Liu. Utilizing two subfields to accelerate individual logarithm computation in extended tower number field sieve
3029 -- 3068Altan Berdan Kilic, Anne Nijsten, Ruud Pellikaan, Alberto Ravagnani. Knot theory and error-correcting codes
3069 -- 3082Chengyu Sun, Xin Wang. New upper bounds for wide-sense frameproof codes
3083 -- 3105Axel Lemoine, Rocco Mora, Jean-Pierre Tillich. Understanding the new distinguisher of alternant codes at degree 2
3107 -- 3133Xue Jia, Qin Yue 0001, Huan Sun. Coding properties and automorphism groups of two classes of twisted generalized Reed-Solomon codes
3135 -- 3142Joshua Cooper, Jack Hyatt. Permutations minimizing the number of collinear triples
3143 -- 3157Max Schulz. Rational transformations over finite fields that are never irreducible
3159 -- 3179Andrea C. Burgess, Nicholas J. Cavenagh, Peter Danziger, David A. Pike. Weak colourings of Kirkman triple systems
3181 -- 3205Shuiyin Liu, Amin Sakzad. Lattice codes for CRYSTALS-Kyber
3207 -- 3225Gustave Tchoffo Saah, Tako Boris Fouotsa, Emmanuel Fouotsa, Celestin Nkuimi Jugnia. Avoiding trusted setup in isogeny-based commitments
3227 -- 3241Zibi Xiao, Yaya Ye, Zhiye Yang, Xiangyong Zeng. n
3243 -- 3281Jules Baudrin, Christof Beierle, Patrick Felke, Gregor Leander, Patrick Neumann 0004, Léo Perrin, Lukas Stennes. Commutative cryptanalysis as a generalization of differential cryptanalysis
3283 -- 3302Lev Yohananov, Moshe Schwartz 0001. On the coding capacity of reverse-complement and palindromic duplication-correcting codes
3303 -- 3335Makhan Maji, Sihem Mesnager, Santanu Sarkar 0001, Kalyan Hansda. Characterizations for minimal codes: graph theory approach and algebraic approach over finite chain rings
3337 -- 3359Seyed Hassan Alavi. On flag-transitive symmetric (v, k, 4) designs
3361 -- 3373Barbara Gatti, Gábor Korchmáros, Gábor Péter Nagy, Vincenzo Pallozzi Lavorante, Gioia Schulte. Evaluation codes arising from symmetric polynomials
3375 -- 3412Chun Guo 0002, Xiao Wang 0012, Kang Yang 0002, Yu Yu 0001. On tweakable correlation robust hashing against key leakages
3413 -- 3436Gretchen L. Matthews, Emily McMillon. A combinatorial approach to avoiding weak keys in the BIKE cryptosystem
3437 -- 3462Zuo Ye, Omer Sabary, Ryan Gabrys, Eitan Yaakobi, Ohad Elishco. More on codes for combinatorial composite DNA

Volume 93, Issue 7

2317 -- 2332Bastien Pacifico. Introducing locality in some generalized AG codes
2333 -- 2347Hai Q. Dinh, Hieu V. Ha, Bac Trong Nguyen, Thieu N. Vo. A new family of AMDS symbol-pair constacyclic codes of length bf4p and symbol-pair distance bf9
2349 -- 2367Daniel Gabric, Joe Sawada. Constructing k-ary orientable sequences with asymptotically optimal length
2369 -- 2393Kapish Chand Meena, Piyush Pachauri, Ambrish Awasthi, Maheshanand Bhaintwal. A class of triple-twisted GRS codes
2395 -- 2414Kaimin Cheng. A class of ternary codes with few weights
2415 -- 2457Tung Chou, Edoardo Persichetti, Paolo Santini. On linear equivalence, canonical forms, and digital signatures
2459 -- 2486Wenya Li, Kai Zhang, Bin Hu. A framework for constructing impossible differential distinguishers and its applications
2487 -- 2502Miroslav Markov, Yuri L. Borissov. The weight distribution of the fourth-order Reed-Muller code of length 512
2503 -- 2519Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May 0001, Antonia Wachter-Zeh. How to lose some weight: a practical template syndrome decoding attack
2521 -- 2542Hugo Sauerbier Couvée, Thomas Jerkovits, Jessica Bariffi. Bounds on sphere sizes in the sum-rank metric and coordinate-additive metrics
2543 -- 2559Chang Lv, Yuqing Zhu. Nonexistence of generalized bent functions and the quadratic norm form equations
2561 -- 2589John Baena, Daniel Cabarcas, Sharwan K. Tiwari, Javier A. Verbel, Luis Villota. Admissible parameters for the Crossbred algorithm and semi-regular sequences over finite fields
2591 -- 2610Carlos Agrinsoni, Heeralal Janwa, Moises Delgado. Resolution of the exceptional APN conjecture in the Gold degree case
2611 -- 2655Ling Song 0001, Qinggan Fu, Qianqian Yang 0003, Yin Lv, Lei Hu. Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY
2657 -- 2670Arianna Dionigi, Barbara Gatti. Galois subcovers of the Hermitian curve in characteristic p with respect to subgroups of order dp with $d\not =p$ prime
2671 -- 2693Xiaopeng Zheng, Hongbo Li, DingKang Wang. A new framework for fast homomorphic matrix multiplication
2695 -- 2716Chi Zhang. An attack on p-adic lattice public-key encryption cryptosystems and signature schemes
2717 -- 2740Marco Buratti, Francesca Merola, Anamari Nakic. Additive combinatorial designs
2741 -- 2760Javad Ebrahimi Boroojeni, Mehri Oghbaei Bonab. Binary stretch embedding of weighted graphs
2761 -- 2778Madhura Pathegama, Alexander Barg. Limitations of the decoding-to-LPN reduction via code smoothing
2779 -- 2802Canze Zhu. The complete weight enumerator of the square of one-weight irreducible cyclic codes
2803 -- 2822William D. Carey, Matthew Kearney, Rachel Kirsch, Stefan Popescu. Universal partial tori
2823 -- 2853Jingtao Xiong, Jianghua Zhong, Dongdai Lin. Studying the isomorphism of NFSRs via a general framework of bijections
2855 -- 2871Xiao-Juan Wang, Tian Tian 0004, Wen-Feng Qi 0001. On the cycle structure of a class of Galois NFSRs: component sequences possessing identical periods
2873 -- 2894Eduardo Camps-Moreno, Hiram H. López, Gretchen L. Matthews, Rodrigo San-José. The weight hierarchy of decreasing norm-trace codes
2895 -- 2896Lukas Kölsch, Gohar M. Kyureghyan. Correction: The classifications of o-monomials and of 2-to-1 binomials are equivalent

Volume 93, Issue 6

1549 -- 1573Yongbo Xia, Chunlei Li 0001, Furong Bao, Shaoping Chen, Tor Helleseth. Further investigation on differential properties of the generalized Ness-Helleseth function
1575 -- 1595Cunsheng Ding, Zhonghua Sun 0001, Qianqian Yan. The support designs of several families of lifted linear codes
1597 -- 1609Giacomo Micheli, Vincenzo Pallozzi Lavorante, Phillip Waitkevich. m-invariant polynomials
1611 -- 1644Lynn Engelberts, Simona Etinski, Johanna Loyer. Quantum sieving for code-based cryptanalysis and its limitations for ISD
1645 -- 1669Carlos Aguilar Melchor, Victor Dyseryn, Philippe Gaborit. Somewhat homomorphic encryption based on random codes
1671 -- 1685Minjia Shi, Ruowen Liu, Dean Crnkovic, Patrick Solé, Andrea Svob. Ternary isodual codes and 3-designs
1687 -- 1724Reza Dastbasteh, Petr Lisonek. Additive twisted codes: new distance bounds and infinite families of quantum codes
1725 -- 1737Xiang Wang 0005, Fang-Wei Fu 0001. Rate-improved multi-permutation codes for correcting a single burst of stable deletions
1739 -- 1760Bart De Bruyn, Puspendu Pradhan, Binod Kumar Sahoo. Blocking sets of secant and tangent lines with respect to a quadric of PG (n,q)
1761 -- 1775Mark Pankov, Krzysztof Petelczyc, Mariusz Zynel. Symmetric (15, 8, 4)-designs in terms of the geometry of binary simplex codes of dimension 4
1777 -- 1793Pavol Zajac. Polynomial reduction from syndrome decoding problem to regular decoding problem
1795 -- 1807Fabio Enrique Brochero Martínez, Lucas Reis, Sávio Ribas. On polynomials over finite fields that are free of binomials
1809 -- 1836Rudong Min, Jiale Han, Shouliang Li, Zhen Yang, Yi Yang. A public key encryption algorithm based on multi-dimensional general Chebyshev polynomial
1837 -- 1861Jin Sima, Chao Pan 0003, Olgica Milenkovic. Perturbation-resilient sets for dynamic service balancing
1863 -- 1888Francisco Javier Lobillo, José Manuel Muñoz. Linear complementary pairs of skew constacyclic codes
1889 -- 1910Xianhong Xie 0001, Yi Ouyang 0004, Honggang Hu. On vectorial functions with maximal number of bent components
1911 -- 1933Soumya Sahoo, Raghavendra Patil, Sandip Kumar Mondal, Santanu Sarkar 0001, Chester Rebeiro. Improved Side Channel Attacks on TRIVIUM, GRAIN-128-AEAD, ACORN-128 v3 and ASCON-128a
1935 -- 1949Zuling Chang, Qiang Wang 0012. Efficient generation of odd order de Bruijn sequence with the same complement and reverse sequences
1951 -- 1984Kirpa Garg, Sartaj Ul Hasan, Constanza Riera, Pantelimon Stanica. The revised boomerang connectivity tables and their connection to the difference distribution table
1985 -- 2012Sophie Huczynska, Sophie Hume. New results on non-disjoint and classical strong external difference families
2013 -- 2054Yuhan Zhang, Lei Zhang, Yafei Zheng, Wenling Wu. A new automatic framework for searching rotational-XOR differential characteristics in ARX ciphers
2055 -- 2072Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher. New models for the cryptanalysis of ASCON
2073 -- 2105Chunghun Baek, Taechan Kim. Can we beat three halves lower bound? (Im)possibility of reducing communication cost for garbled circuits
2107 -- 2118Xinyue Ming, Tao Feng 0002, Menglong Zhang. The asymptotic existence of BIBDs having a nesting
2119 -- 2136Shuangqing Liu, Shuhui Yu, Lijun Ji. Construction of optimal flag codes by MRD codes
2137 -- 2157Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau. Secret and shared keys recovery on hamming quasi-cyclic with SASCA
2159 -- 2175Mahak, Maheshanand Bhaintwal. On equidistant single-orbit cyclic and quasi-cyclic subspace codes
2177 -- 2189Alexander L. Gavrilyuk, Vladislav V. Kabanov. Strongly regular graphs decomposable into a divisible design graph and a Delsarte clique
2191 -- 2203Zhixiong Chen, Arne Winterhof. Probabilistic results on the 2-adic complexity
2205 -- 2228Kangquan Li. Constructions of complete permutations in multiplication
2229 -- 2243Chunyan Qin, Gaojun Luo. A generalized construction of variable-length non-overlapping codes
2245 -- 2262Matthias Johann Steiner. A note on the Walsh spectrum of the Flystel
2263 -- 2296Hengming Zhao, Rongcun Qin, Minquan Cheng, Dianhua Wu. Optimal two-dimensional multilength optical orthogonal codes via compatible mixed difference packing set systems
2297 -- 2316Mengzhen Zhao, Yanxun Chang. Bounds and constructions of optimal symbol-pair codes with constant pair-weight

Volume 93, Issue 5

1255 -- 1270Gustavo Terra Bastos, Angelynn Álvarez, Zachary Flores, Adriana Salerno. A construction of optimal quasi-cyclic locally recoverable codes using constituent codes
1271 -- 1282Jicheng Ma, Guiying Yan. On automorphism groups of binary cyclic codes
1283 -- 1293Prachi Gupta, P. R. Mishra 0001, Atul Gaur. A class of permutations on ${\mathbb {Z}}_{p}$ with differential uniformity at most 3
1295 -- 1310José Gustavo Coelho, Fabio Enrique Brochero Martínez. Low-weight codewords in cyclic codes
1311 -- 1336Zhonghua Sun 0001, Xinyue Liu. Several families of negacyclic BCH codes and their duals
1337 -- 1355Wei Lu, Qingyao Wang, Xiaoqiang Wang 0001, Dabin Zheng. The weight hierarchies of three classes of linear codes
1357 -- 1374Chunzhi Zhao, Jinzheng Cao, Junqi Zhang, Qingfeng Cheng. Fault attacks on multi-prime RSA signatures
1375 -- 1400Alonso Sepúlveda Castellanos, Erik A. R. Mendoza, Guilherme C. Tizziotti. The set of pure gaps at several rational places in function fields
1401 -- 1424Bart De Bruyn, Sergey Goryainov, Willem H. Haemers, Leonid Shalaginov. Divisible design graphs from the symplectic graph
1425 -- 1449Dingding Jia, Haiyang Xue, Bao Li 0001. Fully selective opening secure IBE from LWE
1451 -- 1486Loïc Bidoux, Jesús-Javier Chi-Domínguez, Thibauld Feneuil, Philippe Gaborit, Antoine Joux, Matthieu Rivain, Adrien Vinçotte. RYDE: a digital signature scheme based on rank syndrome decoding problem with MPC-in-the-Head paradigm
1487 -- 1499Mohammed El Badry, Abdelfattah Haily, Ayoub Mounir. On LCD skew group codes
1501 -- 1530Junru Li, Pengzhen Ke, Liang Feng Zhang. Efficient information-theoretic distributed point functions with general output groups
1531 -- 1547Siwei Chen, Kai Hu 0001, Guozhen Liu, Zhongfeng Niu, Quan Quan Tan, Shichang Wang. Meet-in-the-middle attack on round-reduced SCARF under single pair-of-tweaks setting

Volume 93, Issue 4

825 -- 829Jonathan Jedwab, Alexander Pott, Yue Zhou 0001. Sequences, codes, and Boolean functions: in memory of Kai-Uwe Schmidt
831 -- 870Qiang Wang. A survey of compositional inverses of permutation polynomials over finite fields
871 -- 878Geyang Wang, Qi Wang. On the maximum size of variable-length non-overlapping codes
879 -- 888James A. Davis, John B. Polhill, Ken Smith, Eric Swartz, Jordan Webster. New spence difference sets
889 -- 897Javier de la Cruz, Wolfgang Willems. Around LCD group codes
899 -- 921Nurdagül Anbar, Sadmir Kudin, Wilfried Meidl, Enes Pasalic, Alexandr Polujan. Vectorial negabent concepts: similarities, differences, and generalizations
923 -- 935Robert S. Coulter, Bradley Fain. A class of functions and their application in constructing semisymmetric designs
937 -- 959Tor Helleseth, Chunlei Li 0001, Yongbo Xia. Investigation of the permutation and linear codes from the Welch APN function
961 -- 970Lukas Kölsch, Gohar M. Kyureghyan. The classifications of o-monomials and of 2-to-1 binomials are equivalent
971 -- 981Charlene Weiß. Nontrivial t-designs in polar spaces exist for all t
983 -- 995Ruikai Chen, Sihem Mesnager. Involutions of finite abelian groups with explicit constructions on finite fields
997 -- 1020Radi Abubaker, Guang Gong. Frequency distance sequences for packet detection in physical-layer security
1021 -- 1065Daniel J. Katz, Miriam E. Ramirez. Moments of autocorrelation demerit factors of binary sequences
1067 -- 1088Lilya Budaghyan, Mohit Pal. Arithmetization-oriented APN permutations
1089 -- 1111Shuxing Li, Maosheng Xiong. Intersection distribution of degree four polynomials over finite fields
1113 -- 1126Jozefien D'haeseleer, Ferdinand Ihringer, Kai-Uwe Schmidt. A common generalization of hypercube partitions and ovoids in polar spaces
1127 -- 1141John Bamberg, Michael Giudici, Jesse Lansdown, Gordon F. Royle. Tactical decompositions in finite polar spaces and non-spreading classical group actions
1143 -- 1162Michael Kiermaier, Kai-Uwe Schmidt, Alfred Wassermann. Designs in finite classical polar spaces
1163 -- 1177Jan De Beule, Jonathan Mannaert, Leo Storme. On two non-existence results for Cameron-Liebler k-sets in ${{\,\mathrm{\textrm{PG}}\,}}(n,q)$
1179 -- 1216Sam Adriaensen, Maarten De Boeck. Association schemes and orthogonality graphs on anisotropic points of polar spaces
1217 -- 1236Daniele Bartoli, Francesco Ghiandoni. 2t,G(X) >
1237 -- 1254Claude Carlet. On the vector subspaces of $\mathbb {F}_{2^n}$ over which the multiplicative inverse function sums to zero

Volume 93, Issue 3

443 -- 465Sihong Su, Xiaoyan Chen. A new method of constructing (k+s)-variable bent functions based on a family of s-plateaued functions on k variables
467 -- 502Andrea Di Giusto, Chiara Marcolla. Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings
503 -- 551Zhedong Wang, Qiqi Lai, Feng-Hao Liu. Almost tight security in lattices with polynomial moduli - PRF, IBE, all-but-many LTF, and more
553 -- 590Yin-Song Xu, Yi-Bo Luo, Zheng Yuan, Xuan Zhou, Qi-di You, Fei Gao, Xiaoyang Dong 0001. Quantum rectangle attack and its application on Deoxys-BC
591 -- 614Lukas Kölsch, Lucas Krompholz, Gohar M. Kyureghyan. Factorization and irreducibility of composed products
615 -- 632Li Xu, Cuiling Fan, Chunming Tang 0001, Zhengchun Zhou. Derivative descendants of cyclic codes and constacyclic codes
633 -- 644Josline Freed. Codes over $\mathbb {F}_4$ and $\mathbb {F}_2 \times \mathbb {F}_2$ and theta series of the corresponding lattices in quadratic fields
645 -- 665Shikang Yu, Tao Feng, Menglong Zhang. A pair of orthogonal orthomorphisms of finite nilpotent groups
667 -- 682Xin Wei, Xiande Zhang, Gennian Ge. On set systems with strongly restricted intersections
683 -- 699Nathan Kaplan, Jon-Lark Kim. Hulls of projective Reed-Muller codes
701 -- 723Huck Bennett, Kaung Myat Htay Win. Relating code equivalence to other isomorphism problems
725 -- 736Xingyu Zheng, Shukai Wang, Cuiling Fan. Optimal combinatorial neural codes via symmetric designs
737 -- 768Ying Xu, Xiaoni Du, Jian Zou. Quantum security of Trojan message attacks on Merkle-Damgård hash construction
769 -- 786Gaofei Wu, Zhuohui You, Zhengbang Zha, Yuqing Zhang 0001. Several new classes of optimal ternary cyclic codes with two or three zeros
787 -- 822Federico Canale, María Naya-Plasencia. Guessing less and better: improved attacks on GIFT-64
823 -- 0Bingsheng Shen, Tao Yu, Zhengchun Zhou, Yang Yang 0005. Correction: Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions

Volume 93, Issue 2

265 -- 266Ilaria Cardinali, Michel Lavrauw, Klaus Metsch, Alexander Pott. Finite geometries
267 -- 296Nour Alnajjarine, Michel Lavrauw. A classification of planes intersecting the Veronese surface over finite fields of even order
297 -- 307Jake Faulkner, Geertrui Van de Voorde. On the equivalence, stabilisers, and feet of Buekenhout-Tits unitals
309 -- 329Kanat Abdukhalikov, Duy Ho. Linear codes from arcs and quadrics
331 -- 357John Bamberg, Yuval Filmus, Ferdinand Ihringer, Sascha Kurz. Affine vector space partitions
359 -- 372Sascha Kurz, Ivan N. Landjev, Francesco Pavese, Assia Rousseva. The geometry of $(t\mod q)$-arcs
373 -- 390Ivan N. Landjev, Emiliyan Rogachev. Sperner's theorem for non-free modules over finite chain rings
391 -- 407Bart De Bruyn. Families of quadratic sets on the Klein quadric
409 -- 421Sascha Kurz. Capacity of an infinite family of networks related to the diamond network for fixed alphabet sizes
423 -- 428Máté Gyarmati, Péter Ligeti, Péter Sziklai, Marcella Takáts. Conjunctive hierarchical secret sharing by finite geometry
429 -- 442Kevin Allen, John Sheekey. On translation hyperovals in semifield planes

Volume 93, Issue 12

5099 -- 5113Diane M. Donovan, Mike J. Grannell, Emine Sule Yazici. On maximal orthogonal partial Latin squares and minimal codes with specified length, minimum distance and covering radius
5115 -- 5129Tianrun Liu, Zihui Liu. The enumeration and generalizations for relative one-weight codes
5131 -- 5142Chi Hoi Yip. Exact values and improved bounds on the clique number of cyclotomic graphs
5143 -- 5157Ka Hin Leung, Jun Heng Edmil Chue, Meng Zhao. On vanishing sums and cyclic Butson matrices
5159 -- 5177Rod Gow, Gary McGuire. Linearization of polynomials in prime characteristic, with applications to the Golay code and Steiner system
5179 -- 5229Antoine Joux, Rocco Mora. The regular multivariate quadratic problem
5231 -- 5255Abdoulaye Maïga, Damien Robert 0001, Djiby Sow. Towards computing canonical lifts of ordinary elliptic curves in medium characteristic
5257 -- 5269Amber E. Gentle, Daniel Horsley, Ian M. Wanless. Excess coverage arrays and Levenshtein's conjecture
5271 -- 5301Gustavo Terra Bastos, Maiara F. Bollauf, Agnaldo J. Ferreira, Øyvind Ytrehus. Linearity of $\mathbb {Z}_{2^L}$-linear codes via Schur product
5303 -- 5304Gustavo Terra Bastos, Maiara F. Bollauf, Agnaldo José Ferrari, Øyvind Ytrehus. Correction: Linearity of $\mathbb {Z}_{2^L}$-linear codes via Schur product
5305 -- 5326Umberto Martínez-Peñas, Rubén Rodríguez-Ballesteros. Linear codes in the folded Hamming distance and the quasi MDS property
5327 -- 5356Xiujing Zheng, Liqi Wang, Shixin Zhu. Several new classes of MDS symbol-pair codes
5357 -- 5365Xiao-Xin Zhao, Zhong-Xiao Wang, Deng Tang, Qun-Xiong Zheng. The expectation and the variance of the weights of de Bruijn sequences
5367 -- 5380Bart De Bruyn, Mou Gao, Dibyayoti Jena. The homogeneous pseudo-embeddings of rmPG(2,8)
5381 -- 5421Eduardo Brandani da Silva, Douglas Fernando Copatti, Waldir Silva Soares Jr., Evandro Mazetto Brizola. Surface and color codes from semi-regular tessellations on non-orientable surfaces
5423 -- 5444Gang Wang, Ming Xu, You Gao. New constructions of cyclic constant-dimension subspace codes based on Sidon spaces and subspace polynomials
5445 -- 5471Yeow Meng Chee, Tuvi Etzion, Hoang Ta 0001, Van Khu Vu. Constructions of covering sequences and 2D-sequences
5473 -- 5485Ka Hin Leung, Bernhard Schmidt 0001, Tao Zhang 0030. Semiregular relative difference sets related to Gauss sums and projective planes
5487 -- 5516Xavier Caruso, Fabrice Drain. Selfdual skew cyclic codes
5517 -- 5533Yanxun Chang, Tommaso Traetta, Junling Zhou. The existence of pyramidal Steiner triple systems over abelian groups
5535 -- 5550Amin Bahmanian. Ryser's theorem for simple multi-Latin rectangles

Volume 93, Issue 11

4659 -- 4670Patric R. J. Östergård. Classifying generalized Howell designs
4671 -- 4682Yaqian Zhang. New centralized multi-node repair schemes for distributed storage
4683 -- 4719Seyed Hassan Alavi, Carmen Amarra, Ashraf Daneshkhah, Alice Devillers, Cheryl E. Praeger. Higher-dimensional grid-imprimitive block-transitive designs
4721 -- 4755Henk D. L. Hollmann, Junming Ke, Ago-Erik Riet. An optimal binary linear functional-repair storage code with efficient repair related to rmPG(2,8)
4757 -- 4763Patrick Bennett. Asymptotically optimal constant weight codes with even distance
4765 -- 4778Kanat Abdukhalikov, Simeon Ball, Duy Ho, Tabriz Popatia. Ovoids in the cyclic presentation of rmPG(3, q )
4779 -- 4798Kirill V. Vedenev. On the security of two IKKR-type code-based cryptosystems
4799 -- 4832Claude Carlet, Serge Feukoua, Ana Salagean. The stability of the algebraic degree of Boolean functions when restricted to affine spaces
4833 -- 4856Gang Wang 0035, Xuan Gao, Sihem Mesnager, Fang-Wei Fu 0001. Multilevel inserting constructions for constant dimension subspace codes
4857 -- 4886Rongxing Qiu, Weijun Fang. New constructions of MDS symbol-pair codes via simple-root cyclic codes
4887 -- 4909Tianling Weng, Gaoli Wang, Keting Jia, Xiaoyang Dong 0001, Siwei Sun, Tingting Cui. Exploiting output bits and the χ operation in MitM preimage attacks on Keccak
4911 -- 4923Jie Liu, Peng Hu, Xiusheng Liu. Galois LCD subspace codes
4925 -- 4936Yueying Lou, Qichun Wang. Determining the weight spectrum of the Reed-Muller codes RM(m-6,m)
4937 -- 4950Denis S. Krotov, Ferruh Özbudak, Vladimir N. Potapov. Generalizing the Bierbrauer-Friedman bound for orthogonal arrays
4951 -- 4980Decai Wen, Guoyuan Li, Zihui Liu. On the support weight distributions of relative subcodes of some classes of codes
4981 -- 4997Claude Carlet, Xiang-dong Hou. More on the sum-freedom of the multiplicative inverse function
4999 -- 5013Angela Aguglia, Luca Giuzzi, Viola Siconolfi. On mutually μ-intersecting quasi-Hermitian varieties with some applications
5015 -- 5038Donald L. Kreher, Maura B. Paterson, Douglas R. Stinson. Near-factorizations of dihedral groups
5039 -- 5054Daiki Kawabata, Tatsuya Maruta, Keita Yasufuku. A conjecture on the minimum length of linear codes over finite fields
5055 -- 5078Sihem Mesnager, Huawei Wu. q+2 over $\mathbb {F}_{q^2}$
5079 -- 5096Fengwei Li, Ruiyuan Jiang, Yuting Liu. New MDS and self-dual generalized Roth-Lempel codes as well as their deep holes
5097 -- 5098Seyed Hassan Alavi. Correction: On flag-transitive symmetric (v, k, 4) designs

Volume 93, Issue 10

4117 -- 4140Yuli Tan, Junling Zhou. Steiner quadruple systems with minimum colorable derived designs: constructions and applications
4141 -- 4171Yagmur Çakiroglu, Jade Nardi, Mesut Sahin. Codes on weighted projective planes
4173 -- 4208Lorenzo Grassi 0001. On generalizations of the Lai-Massey scheme
4209 -- 4221Rajeev Anand Sahu, Jim Jean-Pierre Barthel, Razvan Rosie. A simple inner-product functional encryption scheme from the inverse-DDH assumption
4223 -- 4234Klaus Metsch. On the treewidth of generalized q-Kneser graphs
4235 -- 4273Makoto Araya, Masaaki Harada, Hadi Kharaghani, Sho Suda, Wei-Hsuan Yu. Unbiased weighing matrices of weight 9
4275 -- 4292Zheng Gao Chen, Jing Jian Li, Jun-Yang Zhang. Subgroup perfect codes in lie type simple groups of rank one
4293 -- 4312Xing Lin. Distributed repair schemes for Reed-Solomon codes with multiple erasures
4313 -- 4322Ivan N. Landjev, Konstantin V. Vorob'ev. On binary codes with distances d and d+2
4323 -- 4353Michele Battagliola, Riccardo Longo, Federico Pintore, Edoardo Signorini, Giovanni Tognolini. Security of fixed-weight repetitions of special-sound multi-round interactive proofs
4355 -- 4402Céline Chevalier, Ehsan Ebrahimi 0001, Quoc Huy Vu. On security notions for encryption in a quantum world
4403 -- 4432Benedek Kovács, Zoltán Lóránt Nagy, Dávid R. Szabó. Blocking planes by lines in ${{\,\textrm{PG}\,}}(n,q)$
4433 -- 4459Clementa Alonso-González, Miguel Ángel Navarro-Pérez. Distance distribution of cyclic orbit flag codes
4461 -- 4472Shamil Asgarli, Chi Hoi Yip. Mutual position of two smooth quadrics over finite fields
4473 -- 4500Meng Cao, Fuchuan Wei, Gaojun Luo. Entanglement-assisted quantum error-correcting codes using matrix-product codes
4501 -- 4514Haoran Xiong, Guanghui Wang 0002, Zhiming Ma, Guiying Yan. On the lifting degree of girth-8 QC-LDPC codes
4515 -- 4523Kaimin Cheng. The inverse stability of Artin-Schreier polynomials over finite fields
4525 -- 4543Thinh Hung Dang 0001, Dustin Moody. New types of formula for isogenies between elliptic curves
4545 -- 4565Adrián Fidalgo-Díaz, Umberto Martínez-Peñas. Distributed matrix multiplication with straggler tolerance over very small fields
4567 -- 4594Dipak K. Bhunia, Cristina Fernández-Córdoba, Mercè Villanueva. Linearity and classification of $\mathbb {Z}_2\mathbb {Z}_4\mathbb {Z}_8$-linear Hadamard codes
4595 -- 4625Chenmiao Shi, Jie Peng 0001, Haibin Kan, Jinjie Gao. On CCZ-equivalence of two new APN functions in trivariate form
4627 -- 4658Avijit Dutta, Eik List. Forking sums of permutations for highly secure and efficient PRFs

Volume 93, Issue 1

1 -- 10Vassili C. Mavron, Harold N. Ward. Designer of codes: a tribute to Jennifer Key
11 -- 37Xiang Wang 0005, Fang-Wei Fu 0001, Elena V. Konstantinova. The sequence reconstruction of permutations with Hamming metric
39 -- 50Christof Beierle. Revisiting products of the form X times a linearized polynomial L(X)
51 -- 77Chin Hei Chan, Fang-Wei Fu 0001, Maosheng Xiong. Decoding error probability of random parity-check matrix ensemble over the erasure channel
79 -- 93Reza Dastbasteh, Farzad Padashnick, Pedro M. Crespo, Markus Grassl, Javad Sharafi. Equivalence of constacyclic codes with shift constants of different orders
95 -- 110Cain Álvarez-García, Carlos Alberto Castillo-Guillén, Mohamed Badaoui, Andriy Kryvko. DNA codes over groups
111 -- 132Kathryn Haymaker, Beth Malmskog, Gretchen L. Matthews. Algebraic hierarchical locally recoverable codes with nested affine subspace recovery
133 -- 174Sahiba Suryawanshi, Shibam Ghosh, Dhiman Saha, Prathamesh Ram. Simple vs. vectorial: exploiting structural symmetry to beat the ZeroSum distinguisher
175 -- 196Simeon Ball, Michel Lavrauw, Tabriz Popatia. Griesmer type bounds for additive codes over finite fields, integral and fractional MDS codes
197 -- 225Xiaoqin Hong, Xiwang Cao, Gaojun Luo. Generalized bilateral multilevel construction for constant dimension codes
227 -- 241Xianmang He, Zusheng Zhang, Si Tian, Jingli Wang, Yindong Chen. Parallel construction for constant dimension codes from mixed dimension construction
243 -- 262Sabyasachi Dey 0001, Gregor Leander, Nitin Kumar Sharma 0001. Improved key recovery attacks on reduced-round Salsa20
263 -- 0Tran van Trung. Retraction Note: Constructions for t-designs and s-resolvable t-designs