default search action
Designs, Codes and Cryptography, Volume 86
Volume 86, Number 1, January 2018
- Javier de la Cruz, Elisa Gorla, Hiram H. López, Alberto Ravagnani:
Weight distribution of rank-metric codes. 1-16 - Yohei Watanabe, Junji Shikata:
Timed-release computational secret sharing and threshold encryption. 17-54 - Gottfried Herold, Elena Kirshanova, Alexander May:
On the asymptotic complexity of solving LWE. 55-83 - Oliver Wilhelm Gnilke, Marcus Greferath, Mario-Osvin Pavcevic:
Mosaics of combinatorial designs. 85-95 - Jongkil Kim, Willy Susilo, Fuchun Guo, Man Ho Au:
Functional encryption for computational hiding in prime order groups via pair encodings. 97-120 - Kenza Guenda, Somphong Jitman, T. Aaron Gulliver:
Constructions of good entanglement-assisted quantum error correcting codes. 121-136 - Léo Ducas, Wessel P. J. van Woerden:
The closest vector problem in tensored root lattices of type A and in their duals. 137-150 - Qichun Wang, Chik How Tan, Theo Fanuela Prabowo:
On the covering radius of the third order Reed-Muller code RM(3, 7). 151-159 - Daniele Bartoli, Maria Montanucci, Giovanni Zini:
Multi point AG codes on the GK maximal curve. 161-177 - Alice M. W. Hui, Bernardo Gabriel Rodrigues:
Switched graphs of some strongly regular graphs related to the symplectic graph. 179-194 - Douglas R. Stinson, Ruizhong Wei:
Combinatorial repairability for threshold schemes. 195-210 - Chuangqiang Hu, Shudi Yang:
Multi-point codes over Kummer extensions. 211-230 - Alexander L. Gavrilyuk, Ilia Matkin, Tim Penttila:
Derivation of Cameron-Liebler line classes. 231-236
Volume 86, Number 2, February 2018
- Simon R. Blackburn, Marcus Greferath, Camilla Hollanti, Mario-Osvin Pavcevic, Joachim Rosenthal, Leo Storme, Ángeles Vázquez-Castro, Alfred Wassermann:
Preface to the special issue on network coding and designs. 237-238 - Michael Kiermaier, Sascha Kurz, Alfred Wassermann:
The order of the automorphism group of a binary q -analog of the Fano plane is at most two. 239-250 - Michael Kiermaier, Reinhard Laue, Alfred Wassermann:
A new series of large sets of subspace designs over the binary field. 251-268 - Dirk Liebhold, Gabriele Nebe, Ángeles Vázquez-Castro:
Network coding with flags. 269-284 - Paulo José Fernandes Almeida, Diego Napp, Raquel Pinto:
MDS 2D convolutional codes with optimal 1D horizontal projections. 285-302 - Diego Napp Avelli, Raquel Pinto, Vladimir Sidorenko:
Concatenation of convolutional codes and rank metric codes for multi-shot network coding. 303-318 - Anna-Lena Horlemann-Trautmann, Kyle Marshall, Joachim Rosenthal:
Extension of Overbeck's attack for Gabidulin-based cryptosystems. 319-340 - Alessandro Neri, Anna-Lena Horlemann-Trautmann, Tovohery Randrianarisoa, Joachim Rosenthal:
On the genericity of maximum rank distance and Gabidulin codes. 341-363 - Anna-Lena Horlemann-Trautmann:
Message encoding and retrieval for spread and cyclic orbit codes. 365-386 - Netanel Raviv, Eitan Yaakobi, Muriel Médard:
Coding for locality in reconstructing permutations. 387-418 - Natalia Silberstein, Alexander Zeh:
Anticode-based locally repairable codes with high availability. 419-445
Volume 86, Number 3, March 2018
- Editor's note. 447
- Dieter Jungnickel, Vladimir D. Tonchev:
On Bonisoli's theorem and the block codes of Steiner triple systems. 449-462 - Joaquim Borges, Cristina Fernández-Córdoba, Roger Ten-Valls:
Z2-double cyclic codes. 463-479 - Michèle Feltz, Cas Cremers:
Strengthening the security of authenticated key exchange against bad randomness. 481-516 - Shuai Han, Shengli Liu, Baodong Qin, Dawu Gu:
Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness. 517-554 - Ales Drápal, Viliam Valent:
Few associative triples, isotopisms and groups. 555-568 - Roland D. Barrolleta, Mercè Villanueva:
Partial permutation decoding for binary linear and $$Z_4$$ Z 4 -linear Hadamard codes. 569-586 - Dieter Jungnickel, Yue Zhou, Vladimir D. Tonchev:
Extension sets, affine designs, and Hamada's conjecture. 587-610 - Jürgen Bierbrauer, Daniele Bartoli, Giorgio Faina, Stefano Marcugini, Fernanda Pambianco:
A family of semifields in odd characteristic. 611-621 - Jooyoung Lee, Atul Luykx, Bart Mennink, Kazuhiko Minematsu:
Connecting tweakable and multi-key blockcipher security. 623-640 - Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee:
Improved, black-box, non-malleable encryption from semantic security. 641-663 - Ulrich Dempwolff:
CCZ equivalence of power functions. 665-692 - Rafael A. Arce-Nazario, Francis N. Castro, Oscar E. González, Luis A. Medina, Ivelisse M. Rubio:
New families of balanced symmetric functions and a generalization of Cusick, Li and Stǎnicǎ's conjecture. 693-701 - Cunsheng Ding:
Infinite families of 3-designs from a type of five-weight code. 703-719
Volume 86, Number 4, April 2018
- Li Lin, Wenling Wu:
Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512. 721-741 - Rémi Bricout, Sean Murphy, Kenneth G. Paterson, Thyla van der Merwe:
Analysing and exploiting the Mantin biases in RC4. 743-770 - Fengwei Li, Qin Yue:
The primitive idempotents and weight distributions of irreducible constacyclic codes. 771-784 - José Moreira, Marcel Fernández, Grigory Kabatiansky:
Constructions of almost secure frameproof codes with applications to fingerprinting schemes. 785-802 - Tao Zhang, Gennian Ge:
Combinatorial constructions of packings in Grassmannian spaces. 803-815 - Oktay Olmez:
A link between combinatorial designs and three-weight linear codes. 817-833 - Gerardo Vega:
A correction on the determination of the weight enumerator polynomial of some irreducible cyclic codes. 835-840 - Baokun Ding, Gennian Ge, Jun Zhang, Tao Zhang, Yiwei Zhang:
New constructions of MDS symbol-pair codes. 841-859 - Sven C. Polak:
New nonbinary code bounds based on divisibility arguments. 861-874 - Irrinki Gnana Sudha, R. S. Selvaraj:
Codes with a pomset metric and constructions. 875-892 - Xiang-Dong Hou:
Complexities of normal bases constructed from Gauss periods. 893-905 - Charles J. Colbourn, Erin Lanus, Kaushik Sarkar:
Asymptotic and constructive methods for covering perfect hash families and covering arrays. 907-937 - Zhiqiang Lin, Dingyi Pei, Dongdai Lin, Xiaolei Zhang:
Fast construction of binary ring FCSRs for hardware stream ciphers. 939-953
Volume 86, Number 5, May 2018
- Jooyoung Lee:
Key alternating ciphers based on involutions. 955-988 - Boris Ryabko:
Properties of two Shannon's ciphers. 989-995 - John Bamberg, Jesse Lansdown, Melissa Lee:
On m-ovoids of regular near polygons. 997-1006 - Dabin Zheng, Jingjun Bao:
Four classes of linear codes from cyclotomic cosets. 1007-1022 - Weihua Liu, Andrew Klapper, Zhixiong Chen:
Solving the FCSR synthesis problem for multi-sequences by lattice basis reduction. 1023-1038 - John Vincent S. Morales, Hajime Tanaka:
An Assmus-Mattson theorem for codes over commutative association schemes. 1039-1062 - Liantao Lan, Yanxun Chang, Lidong Wang:
Constructions of cyclic quaternary constant-weight codes of weight three and distance four. 1063-1083 - Masaaki Harada:
Binary extremal self-dual codes of length 60 and related codes. 1085-1094 - Sergey Bereg, Avi Levy, Ivan Hal Sudborough:
Constructing permutation arrays from groups. 1095-1111 - László Mérai:
On the elliptic curve endomorphism generator. 1113-1129 - Sugata Gangopadhyay, Bimal Mandal, Pantelimon Stanica:
Gowers U3 norm of some classes of bent Boolean functions. 1131-1148 - Jiejing Wen, Minghui Yang, Fang-Wei Fu, Keqin Feng:
Cyclotomic construction of strong external difference families in finite fields. 1149-1159 - Antonio Cossidente, Francesco Pavese:
On intriguing sets of finite symplectic spaces. 1161-1174
Volume 86, Number 6, June 2018
- Giorgio Donati, Nicola Durante:
A generalization of the normal rational curve in PG(d, qn) and its associated non-linear MRD codes. 1175-1184 - Tran van Trung:
A recursive construction for simple t-designs using resolutions. 1185-1200 - Minjia Shi, Zahra Sepasdar, Adel Alahmadi, Patrick Solé:
On two-weight Z2k -codes. 1201-1209 - Goutam Paul, Souvik Ray:
On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers. 1211-1247 - Nuh Aydin, Yasemin Cengellenmis, Abdullah Dertli:
On some constacyclic codes over $$\mathbb {Z}_{4}\left[ u\right] /\left\langle u^{2}-1\right\rangle $$ , their $Z4 images, and new codes. 1249-1255 - Adel Alahmadi, Funda Özdemir, Patrick Solé:
On self-dual double circulant codes. 1257-1265 - Bocong Chen, Hongwei Liu:
Constructions of cyclic constant dimension codes. 1267-1279 - Chong-Dao Lee, Yaotsu Chang, Chia-an Liu:
A construction of group divisible designs with block sizes 3 to 7. 1281-1293 - Wenquan Bi, Zheng Li, Xiaoyang Dong, Lu Li, Xiaoyun Wang:
Conditional cube attack on round-reduced River Keyak. 1295-1310 - Ferdinand Ihringer, Karen Meagher:
Miklós-Manickam-Singhi conjectures on partial geometries. 1311-1327 - Wei Su, Yang Yang, Cuiling Fan:
New optimal binary sequences with period 4p via interleaving Ding-Helleseth-Lam sequences. 1329-1338 - Jie Zhang, Jie Chen, Junqing Gong, Aijun Ge, Chuangui Ma:
Leakage-resilient attribute based encryption in prime-order groups via predicate encodings. 1339-1366 - James A. Davis, Oktay Ölmez:
A framework for constructing partial geometric difference sets. 1367-1375
Volume 86, Number 7, July 2018
- Joaquim Borges, Cristina Fernández-Córdoba:
A characterization of ℤ2ℤ2[u]-linear codes. 1377-1389 - Philippe Gaborit, Ayoub Otmani, Hervé Talé Kalachi:
Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes. 1391-1403 - David Clayton:
A note on almost difference sets in nonabelian groups. 1405-1410 - Shuai Han, Shengli Liu, Lin Lyu:
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system. 1411-1449 - Hai Q. Dinh, Abhay Kumar Singh, Sukhamoy Pattanayak, Songsak Sriboonchitta:
Cyclic DNA codes over the ring 𝔽2+u𝔽2+v𝔽2+uv𝔽2+v2𝔽2+uv2𝔽2. 1451-1467 - Kai-Uwe Schmidt:
Hermitian rank distance codes. 1469-1481 - Zibi Xiao, Xiangyong Zeng, Chunlei Li, Tor Helleseth:
New generalized cyclotomic binary sequences of period p2. 1483-1497 - Jingyuan Chen, Lijun Ji, Yun Li:
Combinatorial constructions of optimal (m, n, 4, 2) optical orthogonal signature pattern codes. 1499-1525 - SenPeng Wang, Bin Hu, Yan Liu:
The autocorrelation properties of single cycle polynomial T-functions. 1527-1540 - Qian Wang, Chenhui Jin:
Upper bound of the length of truncated impossible differentials for AES. 1541-1552 - Shuai Li, Li Miao:
A method to calculate differential uniformity for permutations. 1553-1563 - Jianfa Qian, Lina Zhang:
On MDS linear complementary dual codes and entanglement-assisted quantum codes. 1565-1572 - Hadi Kharaghani, Sho Suda:
Unbiased orthogonal designs. 1573-1588
Volume 86, Number 8, August 2018
- Daniele Bartoli, Luciane Quoos:
Permutation polynomials of the type g(xs) over 𝔽q2n. 1589-1599 - Maosheng Xiong, Haode Yan, Pingzhi Yuan:
On a conjecture of differentially 8-uniform power functions. 1601-1621 - Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada:
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems. 1623-1683 - Konstantinos Limniotis, Nicholas Kolokotronis:
Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction. 1685-1706 - Neranga Fernando:
Self-reciprocal polynomials and coterm polynomials. 1707-1726 - Chong Shangguan, Jingxue Ma, Gennian Ge:
New upper bounds for parent-identifying codes and traceability codes. 1727-1737 - Mingchao Li, Miao Liang, Beiliang Du, Jingyuan Chen:
A construction for optimal c-splitting authentication and secrecy codes. 1739-1755 - Hongxue Liang, Shenglin Zhou:
Flag-transitive point-primitive automorphism groups of non-symmetric 2-(v, k, 3) designs. 1757-1766 - Iván Blanco-Chacón, Eimear Byrne, Iwan M. Duursma, John Sheekey:
Rank metric codes and zeta functions. 1767-1792 - Maki Yoshida, Satoshi Obana:
On the (in)efficiency of non-interactive secure multiparty computation. 1793-1805 - Daniel Augot, Pierre Loidreau, Gwezheneg Robert:
Generalized Gabidulin codes over fields of any characteristic. 1807-1848 - José Ignacio Farrán, Pedro A. García-Sánchez, Benjamín A. Heredia, Micah J. Leamer:
The second Feng-Rao number for codes coming from telescopic semigroups. 1849-1864 - Sihem Mesnager, Ferruh Özbudak, Ahmet Sinak:
On the p-ary (cubic) bent and plateaued (vectorial) functions. 1865-1892
Volume 86, Number 9, September 2018
- Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan:
Unweighted linear congruences with distinct coordinates and the Varshamov-Tenengolts codes. 1893-1904 - Josep Rifà, Emilio Suárez-Canedo:
Hadamard full propelinear codes of type Q; rank and kernel. 1905-1921 - Ling Sun, Huaifeng Chen, Meiqin Wang:
Zero-correlation attacks: statistical models independent of the number of approximations. 1923-1945 - Yoshitaka Koga, Tatsuya Maruta, Keisuke Shiromoto:
On critical exponents of Dowling matroids. 1947-1962 - Zhilin Zhang, Shenglin Zhou:
Flag-transitive point-quasiprimitive 2-(v, k, 2) designs. 1963-1971 - Kai-Uwe Schmidt, Yue Zhou:
On the number of inequivalent Gabidulin codes. 1973-1982 - Ayoub Otmani, Hervé Talé Kalachi, Sélestin Ndjeya:
Improved cryptanalysis of rank metric schemes based on Gabidulin codes. 1983-1996 - Jun Xu, Santanu Sarkar, Lei Hu, Zhangjie Huang, Liqiang Peng:
Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator. 1997-2033 - Alberto Ravagnani:
Duality of codes supported on regular lattices, with an application to enumerative combinatorics. 2035-2063 - Javier de la Cruz, Wolfgang Willems:
On group codes with complementary duals. 2065-2073 - Trygve Johnsen, Hugues Verdure:
Flags of almost affine codes and the two-party wire-tap channel of type II. 2075-2090 - Yun Fan, Bangteng Xu:
Fourier transforms and bent functions on finite groups. 2091-2113 - Steven T. Dougherty, Joe Gildea, Rhian Taylor, Alexander Tylyshchak:
Group rings, G-codes and constructions of self-dual and formally self-dual codes. 2115-2138
Volume 86, Number 10, October 2018
- Shixin Zhu, Zhonghua Sun, Ping Li:
A class of negacyclic BCH codes and its application to quantum codes. 2139-2165 - Seunghwan Chang, Jong Yoon Hyun:
Linear codes from simplicial complexes. 2167-2181 - Jezerca Hodaj, Melissa S. Keranen, Donald L. Kreher, Leah Tollefson:
Some new Kirkman signal sets. 2183-2195 - Dario Catalano, Dario Fiore, Luca Nizzardo:
Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions. 2197-2246 - Ramakrishna Bandi, Alexandre Fotue Tabue, Edgar Martínez-Moro:
On counting subring-submodules of free modules over finite commutative frobenius rings. 2247-2254 - Lijun Ji:
Group divisible designs with large block sizes. 2255-2260 - Chengju Li:
Hermitian LCD codes from cyclic codes. 2261-2278 - Jean-Charles Faugère, Alexandre Wallet:
The point decomposition problem over hyperelliptic curves - Toward efficient computation of discrete logarithms in even characteristic. 2279-2314 - Daniele Bartoli, Maria Montanucci, Giovanni Zini:
AG codes and AG quantum codes from the GGS curve. 2315-2344 - Khadijeh Bagheri, Mohammad-Reza Sadeghi, Daniel Panario:
A non-commutative cryptosystem based on quaternion algebras. 2345-2377 - Kangquan Li, Longjiang Qu, Qiang Wang:
New constructions of permutation polynomials of the form xr h(x q - 1) over 𝔽q2. 2379-2405 - Kwangsu Lee, Seunghwan Park:
Revocable hierarchical identity-based encryption with shorter private keys and update keys. 2407-2440 - Cuiling Fan:
The linear complexity of a class of binary sequences with optimal autocorrelation. 2441-2450
Volume 86, Number 11, November 2018
- Song Tian, Bao Li, Kunpeng Wang, Wei Yu:
Cover attacks for elliptic curves with cofactor two. 2451-2468 - Yunwen Liu, Vincent Rijmen, Gregor Leander:
Nonlinear diffusion layers. 2469-2484 - Minjia Shi, Liqin Qian, Patrick Solé:
On self-dual negacirculant codes of index two and four. 2485-2494 - Yunhua Wen, Shengli Liu, Shuai Han:
Reusable fuzzy extractor from the decisional Diffie-Hellman assumption. 2495-2512 - Zhengchun Zhou:
Three-weight ternary linear codes from a family of cyclic difference sets. 2513-2523 - David Derler, Daniel Slamanig:
Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs. 2525-2547 - Jia Liu, Tibor Jager, Saqib A. Kakvi, Bogdan Warinschi:
How to build time-lock encryption. 2549-2586 - Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang, Yunqing Shi:
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. 2587-2603 - Claude Carlet, Sihem Mesnager, Chunming Tang, Yanfeng Qi:
Euclidean and Hermitian LCD MDS codes. 2605-2618 - Ivan Yu. Mogilnykh, Faina I. Solov'eva:
On explicit minimum weight bases for extended cyclic codes related to Gold functions. 2619-2627 - Jose Torres-Jimenez, Idelfonso Izquierdo-Marquez:
Covering arrays of strength three from extended permutation vectors. 2629-2643 - Hui Zhang, Eitan Yaakobi, Natalia Silberstein:
Multiset combinatorial batch codes. 2645-2660 - Jared Antrobus, Heide Gluesing-Luerssen:
Lexicodes over finite principal ideal rings. 2661-2676
Volume 86, Number 12, December 2018
- Ming Ming Tan:
Group invariant weighing matrices. 2677-2702 - Benoît Cogliati, Yannick Seurin:
Analysis of the single-permutation encrypted Davies-Meyer construction. 2703-2723 - Simone Costa, Tao Feng, Xiaomiao Wang:
Frame difference families and resolvable balanced incomplete block designs. 2725-2745 - Benoît Cogliati:
Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model. 2747-2763 - Xiaoqin Zhan, Shenglin Zhou:
Non-symmetric 2-designs admitting a two-dimensional projective linear group. 2765-2773 - Xiao-Xin Zhao, Tian Tian, Wen-Feng Qi:
A ring-like cascade connection and a class of NFSRs with the same cycle structures. 2775-2790 - Wittawat Kositwattanarerk:
Pseudocodeword-free criterion for codes with cycle-free Tanner graph. 2791-2805 - Neriman Gamze Orhon, Hüseyin Hisil:
Speeding up Huff form of elliptic curves. 2807-2823 - Fernando L. Piñero, Prasant Singh:
A note on the weight spectrum of the Schubert code Cα(2, m). 2825-2836 - Jin Li, Aixian Zhang, Keqin Feng:
Linear codes over Fq[x]/(x2) and GR(p2, m) reaching the Griesmer bound. 2837-2855 - Xiaojuan Lu, Xiaolei Niu, Haitao Cao:
Some results on generalized strong external difference families. 2857-2868 - Xiaofang Xu, Chunlei Li, Xiangyong Zeng, Tor Helleseth:
Constructions of complete permutation polynomials. 2869-2892 - José Ignacio Farrán, Pedro A. García-Sánchez, Benjamín A. Heredia:
On the second Feng-Rao distance of Algebraic Geometry codes related to Arf semigroups. 2893-2916
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.