Designs, Codes and Cryptography, Volume 88 (original) (raw)



default search action
- combined dblp search
- author search
- venue search
- publication search
Authors:
- no matches

Venues:
- no matches

Publications:
- no matches



jump to

SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Volume 88, Number 1, January 2020

José Gómez-Torrecillas
, Erik Hieta-aho
, Francisco Javier Lobillo
, Sergio R. López-Permouth
, Gabriel Navarro
:
Some remarks on non projective Frobenius algebras and linear codes. 1-15

Simeon Ball
, Michel Lavrauw
:
Arcs and tensors. 17-31

Susan G. Barwick
, Alice M. W. Hui, Wen-Ai Jackson, Jeroen Schillewaert:
Characterising hyperbolic hyperplanes of a non-singular quadric in PG(4, q). 33-39

Jasvinder Singh, Manish Gupta
, Jaskarn Singh Bhullar:
Construction of girth-8 (3, L)-QC-LDPC codes of smallest CPM size using column multipliers. 41-49

Sihem Mesnager
, Kwang Ho Kim, Dujin Jo, Junyop Choe, Munhyon Han, Dok Nam Lee:
A proof of the Beierle-Kranz-Leander conjecture related to lightweight multiplication in mathbbF2n\mathbb {F}_{2^n}mathbbF2n. 51-62

Sergey Bereg
, Peter J. Dukes
:
A lower bound on permutation codes of distance n-1. 63-72

Tai Do Duc
:
Necessary conditions for the existence of group-invariant Butson Hadamard matrices and a new family of perfect arrays. 73-90

Stefan Kölbl, Elmar Tischhauser
, Patrick Derbez
, Andrey Bogdanov
:
Troika: a ternary cryptographic hash function. 91-117

Rong Pan, Tao Feng
, Lidong Wang, Xiaomiao Wang
:
Optimal optical orthogonal signature pattern codes with weight three and cross-correlation constraint one. 119-131

Kenza Guenda, T. Aaron Gulliver, Somphong Jitman
, Satanan Thipworawimon:
Linear ℓ-intersection pairs of codes and their applications. 133-152

Xiao-Xin Zhao, Wen-Feng Qi, Jia-Min Zhang:
Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs. 153-171

Abhishek Kesarwani
, Dibyendu Roy, Santanu Sarkar
, Willi Meier:
New cube distinguishers on NFSR-based stream ciphers. 173-199

Aleksandr Kutsenko
:
Metrical properties of self-dual bent functions. 201-222

Rohit Gupta
:
Several new permutation quadrinomials over finite fields of odd characteristic. 223-239
Volume 88, Number 2, February 2020

Hongwei Liu, Xu Pan
:
Galois hulls of linear codes over finite fields. 241-255

José Martínez-Bernal, Miguel A. Valencia-Bucio, Rafael H. Villarreal
:
Linear codes over signed graphs. 273-296

Yan Liu, Xiwang Cao, Wei Lu:
On some conjectures about optimal ternary cyclic codes. 297-309

Sergey Bereg
, Luis Gerardo Mojica, Linda Morales, Ivan Hal Sudborough:
Constructing permutation arrays using partition and extension. 311-339

Jun Xu, Lei Hu, Santanu Sarkar
:
Cryptanalysis of elliptic curve hidden number problem from PKC 2017. 341-361

Tim van de Kamp
, Andreas Peter
, Willem Jonker:
A multi-authority approach to various predicate encryption types. 363-390

Luca Mariot
, Maximilien Gadouleau, Enrico Formenti
, Alberto Leporati:
Mutually orthogonal latin squares based on cellular automata. 391-411

Xin Ling, Sihem Mesnager, Yanfeng Qi, Chunming Tang
:
A class of narrow-sense BCH codes over mathbbFq\mathbb {F}_qmathbbFq of length fracqm−12\frac{q^m-1}{2}fracqm−12. 413-427

Bart De Bruyn, Mou Gao:
On four codes with automorphism group PΣ L(3, 4) and pseudo-embeddings of the large Witt designs. 429-452

Jong Yoon Hyun, Jungyun Lee, Yoonjin Lee
:
Ramanujan graphs and expander families constructed from p-ary bent functions. 453-470
Volume 88, Number 3, March 2020

Ana Salagean
:
Discrete antiderivatives for functions over mathopmathbbFpn\mathop {{\mathbb {F}}}_p^nmathopmathbbFpn. 471-486

Xiang Wang
, Fang-Wei Fu:
Snake-in-the-box codes under the ℓ ∞ -metric for rank modulation. 487-503

Dipayan Das
, Jeffrey Hoffstein
, Jill Pipher, William Whyte, Zhenfei Zhang:
Modular lattice signatures, revisited. 505-532

Yubo Li
, Zhichao Yang, Kangquan Li, Longjiang Qu
:
A new algorithm on the minimal rational fraction representation of feedback with carry shift registers. 533-552

Saban Alaca, Goldwyn Millar
:
Shift-inequivalent decimations of the Sidelnikov-Lempel-Cohn-Eastman sequences. 567-583

Raphael Yuster
:
Perfect sequence covering arrays. 585-593

Sascha Kurz
:
Subspaces intersecting in at most a point. 595-599

Samir Hodzic
, Enes Pasalic, Sugata Gangopadhyay:
Generic constructions of mathbbZ\mathbb {Z}mathbbZ-bent functions. 601-623
Volume 88, Number 4, April 2020

Cunsheng Ding, Chunming Tang
, Vladimir D. Tonchev:
Linear codes of 2-designs associated with subcodes of the ternary generalized Reed-Muller codes. 625-641

Nicolas Aragon, Olivier Blazy, Jean-Christophe Deneuville
, Philippe Gaborit, Terry Shue Chien Lau
, Chik How Tan, Keita Xagawa
:
Cryptanalysis of a rank-based signature with short public keys. 643-653

John Sheekey
, Geertrui Van de Voorde
:
Rank-metric codes, linear sets, and their duality. 655-675

Liang Feng Zhang
, Reihaneh Safavi-Naini:
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions. 677-709

Alessandro Neri
, Anna-Lena Horlemann-Trautmann
:
Random construction of partial MDS codes. 711-725

Xiusheng Liu, Hualu Liu:
σ-LCD codes over finite chain rings. 727-746

Hans-Joachim Kroll, Rita Vincenti
:
Linear codes from ruled sets in finite projective spaces. 747-754

Ka Hin Leung, Qi Wang
:
New nonexistence results on (m, n)-generalized bent functions. 755-770

Sam Adriaensen
, Lins Denaux
, Leo Storme
, Zsuzsa Weiner:
Small weight code words arising from the incidence of points and hyperplanes in PG(n, q). 771-788
Volume 88, Number 5, May 2020

Heiko Dietrich, Jeroen Schillewaert:
On a duality for codes over non-abelian groups. 789-805

Zenghui Fang, Junling Zhou
:
The sizes of maximal (v, k, k-2, k-1) optical orthogonal codes. 807-824

Sanjit Bhowmick, Alexandre Fotue Tabue, Edgar Martínez-Moro
, Ramakrishna Bandi
, Satya Bagchi
:
Do non-free LCD codes over finite commutative Frobenius rings exist? 825-840

Yue Zhou
:
On equivalence of maximum additive symmetric rank-distance codes. 841-850

Jing Jiang
, Yujie Gu
, Minquan Cheng:
Multimedia IPP codes with efficient tracing. 851-866

Andrea Ferraguti
, Giacomo Micheli
:
Full classification of permutation rational functions and complete rational functions of degree three over finite fields. 867-886

Gaoli Wang
, Fukang Liu, Binbin Cui, Florian Mendel
, Christoph Dobraunig
:
Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160. 887-930

Elena Kirshanova
, Huyen Nguyen, Damien Stehlé, Alexandre Wallet
:
On the smoothing parameter and last minimum of random orthogonal lattices. 931-950

Bohua Zhu, Junling Zhou, Yanxun Chang
:
2-(v, 5; m) spontaneous emission error designs. 951-970

Seyed Hassan Alavi
, Mohsen Bayat
, Jalal Choulaki, Ashraf Daneshkhah
:
Flag-transitive block designs with prime replication number and almost simple groups. 971-992
Volume 88, Number 6, June 2020

Brett Hemenway Falk
, Nadia Heninger, Michael Rudow
:
Properties of constacyclic codes under the Schur product. 993-1021

Ryann Cartor
, Daniel Smith-Tone:
All in the C* family. 1023-1036

Minjia Shi
, Li Xu, Denis S. Krotov
:
On the number of resolvable Steiner triple systems of small 3-rank. 1037-1046

Aurore Guillevic
, Simon Masson
, Emmanuel Thomé
:
Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation. 1047-1081

Hong-Yu Sun, Xuan-Yong Zhu, Qun-Xiong Zheng
:
Predicting truncated multiple recursive generators with unknown parameters. 1083-1102

Boxin Zhao, Xiaoyang Dong
, Willi Meier, Keting Jia, Gaoli Wang:
Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT. 1103-1126

Xiaolei Fang, Khawla Lebed, Hongwei Liu, Jinquan Luo
:
New MDS self-dual codes over finite fields of odd characteristic. 1127-1138

Wei Lu, Xia Wu, Xiwang Cao, Ming Chen:
Six constructions of asymptotically optimal codebooks via the character sums. 1139-1158

Lilya Budaghyan, Nikolay S. Kaleyski, Constanza Riera, Pantelimon Stanica
:
Partially APN functions with APN-like polynomial representations. 1159-1177

Xiaoyang Dong
, Bingyou Dong, Xiaoyun Wang:
Quantum attacks on some feistel block ciphers. 1179-1203

Xiao-Xin Zhao, Qun-Xiong Zheng, Zhong-Xiao Wang, Wen-Feng Qi:
On a class of isomorphic NFSRs. 1205-1226

María Chara, Ricardo A. Podestá, Ricardo Toledano
:
Block transitive codes attaining the Tsfasman-Vladut-Zink bound. 1227-1253

Yanan Wu, Nian Li
, Xiangyong Zeng:
Linear codes with few weights from cyclotomic classes and weakly regular bent functions. 1255-1272

Mrinmoy Datta:
Relative generalized Hamming weights of affine Cartesian codes. 1273-1284
Volume 88, Number 7, July 2020

Julien Lavauzelle, Julian Renner:
Cryptanalysis of a system based on twisted Reed-Solomon codes. 1285-1300

Alexandru Chirvasitu
, Thomas W. Cusick:
Affine equivalence for quadratic rotation symmetric Boolean functions. 1301-1329

Tovohery Hajatiana Randrianarisoa
:
A geometric approach to rank metric codes and a classification of constant weight codes. 1331-1348

Minfeng Shao, Ying Miao:
On optimal weak algebraic manipulation detection codes and weighted external difference families. 1349-1369

Dingding Jia
, Yamin Liu, Bao Li:
IBE with tight security against selective opening and chosen-ciphertext attacks. 1371-1400

Lorenzo Grassi
, Christian Rechberger
:
Revisiting Gilbert's known-key distinguisher. 1401-1445

Xuanlong Ma
, Min Feng
, Kaishun Wang:
Subgroup perfect codes in Cayley sum graphs. 1447-1461

Yupeng Jiang
, Dongdai Lin:
Longest subsequences shared by two de Bruijn sequences. 1463-1475
Volume 88, Number 8, August 2020
Special Issue: Codes, Cryptology and Curves (in honour of Ruud Pellikaan)

Peter Beelen
, Olav Geil
, Edgar Martínez-Moro
, Xin-Wen Wu
:
Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan. 1477-1478

Mojtaba Fadavi, Reza Rezaeian Farashahi
:
Uniform encodings to elliptic curves and indistinguishable point representation. 1479-1502

Thomas Britz
, Adam Mammoliti
, Keisuke Shiromoto
:
Wei-type duality theorems for rank metric codes. 1503-1519

Umberto Martínez-Peñas
:
Hamming and simplex codes for the sum-rank metric. 1521-1539

Lucky Galvez, Jon-Lark Kim:
Construction of self-dual matrix codes. 1541-1560

Alain Couvreur, Isabella Panaccione:
Power error locating pairs. 1561-1593

Alonso Sepúlveda Castellanos
, Maria Bras-Amorós
:
Weierstrass semigroup at m+1 rational points in maximal curves which cannot be covered by the Hermitian curve. 1595-1616

Maria Bras-Amorós
, Iwan M. Duursma, Euijin Hong:
Isometry-dual flags of AG codes. 1617-1638

René Bødker Christensen
, Olav Geil
:
Steane-enlargement of quantum codes from the Hermitian function field. 1639-1652

Ignacio García-Marco
, Irene Márquez-Corbella
, Diego Ruano
:
High dimensional affine codes whose square has a designed minimum distance. 1653-1672

Hiram H. López
, Gretchen L. Matthews
, Ivan Soprunov
:
Monomial-Cartesian codes and their duals, with applications to LCD codes, quantum codes, and locally recoverable codes. 1673-1685

Irene Márquez-Corbella
, Edgar Martínez-Moro
, Carlos Munuera:
Computing sharp recovery structures for locally recoverable codes. 1687-1698
Volume 88, Number 9, September 2020
Special Issue: Coding and Cryptography 2019

Anne Canteaut, Gohar M. Kyureghyan, Alexander Pott, Felix Ulmer:
Editorial: Coding and Cryptography 2019. 1699

Alexandr Polujan
, Alexander Pott:
Cubic bent functions outside the completed Maiorana-McFarland class. 1701-1722

Daniel Gerike
, Gohar M. Kyureghyan:
Permutations on finite fields with invariant cycle structure on lines. 1723-1740

Pan Tan, Zhengchun Zhou, Vladimir Sidorenko, Udaya Parampalli:
Two classes of optimal LRCs with information (r, t)-locality. 1741-1757

Jian Liu, Sihem Mesnager
, Deng Tang:
Constructions of optimal locally recoverable codes via Dickson polynomials. 1759-1780

Tuvi Etzion, Sascha Kurz, Kamil Otal, Ferruh Özbudak
:
Subspace packings: constructions and bounds. 1781-1810

Peter G. Boyvalenkov
, Peter D. Dragnev
, Douglas P. Hardin
, Edward B. Saff, Maya Stoyanova
:
Upper bounds for energies of spherical codes of given cardinality and separation. 1811-1826

Sabyasachi Dey
, Santanu Sarkar
:
Proving the biases of Salsa and ChaCha in differential attack. 1827-1856

Jean-Christophe Deneuville
, Philippe Gaborit:
Cryptanalysis of a code-based one-time signature. 1857-1866

Ana Salagean
, Ferruh Özbudak
:
Counting Boolean functions with faster points. 1867-1883

Elena Egorova
, Marcel Fernandez, Grigory Kabatiansky:
On non-binary traceability set systems. 1885-1892

Ryutaroh Matsumoto
:
Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets. 1893-1907

Gretchen L. Matthews
, Fernando Piñero
:
Codes with locality from cyclic extensions of Deligne-Lusztig curves. 1909-1924

Assia Rousseva
, Ivan N. Landjev:
The geometric approach to the existence of some quaternary Griesmer codes. 1925-1940

Daniel Coggia, Alain Couvreur:
On the security of a Loidreau rank metric code based encryption scheme. 1941-1957

Shizhu Tian, Christina Boura
, Léo Perrin:
Boomerang uniformity of popular S-box constructions. 1959-1989

Delphine Boucher
:
An algorithm for decoding skew Reed-Solomon codes with respect to the skew metric. 1991-2005
Volume 88, Number 10, October 2020

Samir Hodzic, Enes Pasalic, Yongzhuang Wei
:
A general framework for secondary constructions of bent and plateaued functions. 2007-2035

Vladimir N. Potapov
:
On q-ary bent and plateaued functions. 2037-2049

Kai Lin Ong
, Ang Miin Huey:
On equivalency of zero-divisor codes via classifying their idempotent generator. 2051-2065

Yujie Gu, Shohei Satake
:
On 2-parent-identifying set systems of block size 4. 2067-2076

Masaya Yasuda
, Satoshi Nakamura, Junpei Yamaguchi:
Analysis of DeepBKZ reduction for finding short lattice vectors. 2077-2100

Yan Zhu, Naoki Watamura
:
Relative t-designs in Johnson association schemes for P-polynomial structure. 2101-2118

Mengna Wu, Chengju Li, Zilong Wang:
Characterizations and constructions of triple-cycle permutations of the form xrh(xs). 2119-2132

Christian Elsholtz
, Péter Pál Pach:
Caps and progression-free sets in mathbbZmn{{\mathbb {Z}}}_m^nmathbbZmn. 2133-2170

Lijing Zheng, Jie Peng
, Haibin Kan, Yanjun Li
, Juan Luo:
On constructions and properties of (n, m)-functions with maximal number of bent components. 2171-2186

Simona Boyadzhiyska
, Shagnik Das
, Tibor Szabó:
Enumerating extensions of mutually orthogonal Latin squares. 2187-2206

Baptiste Lambin
, Patrick Derbez
, Pierre-Alain Fouque
:
Linearly equivalent S-boxes and the division property. 2207-2231

Sihem Mesnager, Chunming Tang
, Maosheng Xiong:
On the boomerang uniformity of quadratic permutations. 2233-2246

Boran Kim, Yoonjin Lee
:
Classification of self-dual cyclic codes over the chain ring ℤp[u]/ u3 >. 2247-2273
Volume 88, Number 11, November 2020

Yanyan Gao, Qin Yue
, Yansheng Wu
:
LCD codes and self-orthogonal codes in generalized dihedral group algebras. 2275-2287

Yunwen Liu
, Wenying Zhang, Bing Sun, Vincent Rijmen
, Guoqiang Liu, Chao Li, Shaojing Fu, Meichun Cao:
The phantom of differential characteristics. 2289-2311

Martin Ekerå
:
On post-processing in the quantum algorithm for computing short discrete logarithms. 2313-2335

Seyed Hassan Alavi
, Ashraf Daneshkhah
, Cheryl E. Praeger
:
Symmetries of biplanes. 2337-2359

Yeow Meng Chee
, Charles J. Colbourn
, Hoang Dau
, Ryan Gabrys, Alan C. H. Ling, Dylan Lusi, Olgica Milenkovic:
Access balancing in storage systems by labeling partial Steiner systems. 2361-2376

Juanjuan Xu, Jingjun Bao, Lijun Ji:
Doubly resolvable Steiner quadruple systems of orders 22n+1. 2377-2386

Khodakhast Bibak
:
Deletion correcting codes meet the Littlewood-Offord problem. 2387-2396

Cem Güneri, Edgar Martínez-Moro
, Selcen Sayici:
Linear complementary pair of group codes over finite chain rings. 2397-2405

Xinxin Gong
, Bin Zhang:
Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G. 2407-2431

Youngkyung Lee, Dong Hoon Lee, Jong Hwan Park:
Tightly CCA-secure encryption scheme in a multi-user setting with corruptions. 2433-2452
Volume 88, Number 12, December 2020

Xinmei Huang
, Qin Yue, Yansheng Wu
, Xiaoping Shi, Jerod Michel:
Binary primitive LCD BCH codes. 2453-2473

Jong Yoon Hyun, Hyun Kwang Kim, Yansheng Wu
, Qin Yue
:
Optimal minimal linear codes from posets. 2475-2492

Minjia Shi
, Wang Xuan
, Patrick Solé:
Two families of two-weight codes over mathbbZ_4\mathbb {Z}_4mathbbZ_4. 2493-2505

Junling Zhou
, Wenling Zhou:
Wide-sense 2-frameproof codes. 2507-2519

Petr Lisonek
:
Maximal nonassociativity via fields. 2521-2530

Sudhir R. Ghorpade
, Trygve Johnsen
:
A polymatroid approach to generalized weights of rank metric codes. 2531-2546

Minjia Shi
, Li Xu, Patrick Solé:
Construction of isodual codes from polycirculant matrices. 2547-2560

Juliane Capaverde
, Ariane M. Masuda
, Virginia M. Rodrigues
:
Rédei permutations with cycles of the same length. 2561-2579

Whan-Hyuk Choi
, Hyun Jin Kim
, Yoonjin Lee
:
Construction of single-deletion-correcting DNA codes using CIS codes. 2581-2596

Lukas Kölsch
:
On the inverses of Kasami and Bracken-Leander exponents. 2597-2621

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
load links from unpaywall.org
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
load content from archive.org
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
load data from openalex.org
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
dblp was originally created in 1993 at:
since 2018, dblp has been operated and maintained by:






