Volume 15, Number 4, November 2021
Several new classes of (balanced) Boolean functions with few Walsh transform values.

Tingting Pang Nian Li Li Zhang Xiangyong Zeng

ℤ4ℤ4[u]-additive cyclic and constacyclic codes.

Habibul Islam Om Prakash Patrick Solé

A generic construction of rotation symmetric bent functions.

Junchao Zhou Nian Li Xiangyong Zeng Yunge Xu

On finite length nonbinary sequences with large nonlinear complexity over the residue ring ℤm.

Lin Yi Xiangyong Zeng Zhimin Sun

Information set decoding in the Lee metric with applications to cryptography.

Anna-Lena Horlemann-Trautmann Violetta Weger

Infinite families of 2-designs from a class of non-binary Kasami cyclic codes.

Rong Wang Xiaoni Du Cuiling Fan

Correlation distribution of a sequence family generalizing some sequences of Trachtenberg.

Ferruh Özbudak Eda Tekin

Quasi-symmetric designs on 56 points.

Vedran Krcadinac Renata Vlahovic Kruc

An overview on skew constacyclic codes and their subclass of LCD codes.

Ranya Djihad Boulanouar Aicha Batoul Delphine Boucher

Involutory-Multiple-Lightweight MDS Matrices based on Cauchy-type Matrices.

Mohsen Mousavi Ali Zaghian Morteza Esmaeili

Rank weights for arbitrary finite field extensions.

Grégory Berhuy Jean Fasel Odile Garotta

Infinite families of 3-designs from o-polynomials.

Cunsheng Ding Chunming Tang


Volume 15, Number 3, August 2021
Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack.

Nishant Sinha

The differential spectrum of a class of power functions over finite fields.

Lei Lei Wenli Ren Cuiling Fan

Binary codes from m-ary n-cubes Qmn.

Jennifer D. Key Bernardo Gabriel Rodrigues

New optimal error-correcting codes for crosstalk avoidance in on-chip data buses.

Muhammad Ajmal Xiande Zhang

Constructing self-dual codes from group rings and reverse circulant matrices.

Joe Gildea Adrian Korban Abidin Kaya Bahattin Yildiz

Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem.

Shixiong Wang Longjiang Qu Chao Li Shaojing Fu Hao Chen

$ s $-PD-sets for codes from projective planes $ \mathrm{PG}(2, 2^h) $, $ 5 \leq h\leq 9 $.

Dean Crnkovic Nina Mostarac Bernardo Gabriel Rodrigues Leo Storme

The [46, 9, 20]2 code is unique.

Sascha Kurz

Ironwood meta key agreement and authentication protocol.

Iris Anshel Derek Atkins Dorian Goldfeld Paul E. Gunnells

Some optimal cyclic 픽q-linear 픽qt-codes.

Yun Gao Shilin Yang Fang-Wei Fu


Volume 15, Number 2, May 2021
Secure and efficient multiparty private set intersection cardinality.

Sumit Kumar Debnath Pantelimon Stanica Nibedita Kundu Tanmay Choudhury

Capacity-achieving private information retrieval scheme with a smaller sub-packetization.

Wenqin Zhang Zhengchun Zhou Udaya Parampalli Vladimir Sidorenko

A note on generalization of bent boolean functions.

Bimal Mandal Aditi Kar Gangopadhyay

Cryptographic properties of cyclic binary matrices.

Akbar Mahmoodi Rishakani Seyed Mojtaba Dehnavi Mohammad Reza Mirzaee Shamsabad Nasour Bagheri

An explicit representation and enumeration for negacyclic codes of length 2kn over ℤ4+uℤ4.

Yuan Cao Yonglin Cao Hai Q. Dinh Ramakrishna Bandi Fang-Wei Fu

Two classes of near-optimal codebooks with respect to the Welch bound.

Gaojun Luo Xiwang Cao

On the existence of PD-sets: Algorithms arising from automorphism groups of codes.

Nicola Pace Angelo Sonnino

Verifying solutions to LWE with implications for concrete security.

Palash Sarkar Subhadip Singha

Gowers U2 norm as a measure of nonlinearity for Boolean functions and their generalizations.

Sugata Gangopadhyay Constanza Riera Pantelimon Stanica

Construction of minimal linear codes from multi-variable functions.

Jong Yoon Hyun Boran Kim Minwon Na

On the dimension of the subfield subcodes of 1-point Hermitian codes.

Sabira El Khalfaoui Gábor Péter Nagy

Encryption scheme based on expanded Reed-Solomon codes.

Karan Khathuria Joachim Rosenthal Violetta Weger


Volume 15, Number 1, February 2021
Properties of sets of Subspaces with Constant Intersection Dimension.

Lisa Hernandez Lucas

Repeated-root constacyclic codes of length 6lps.

Tingting Wu Li Liu Lanqiang Li Shixin Zhu

Some properties of the cycle decomposition of WG-NLFSR.

Yujuan Li Huaifu Wang Peipei Zhou Guoshuang Zhang

The values of two classes of Gaussian periods in index 2 case and weight distributions of linear codes.

Fengwei Li Qin Yue Xiaoming Sun

A post-quantum UC-commitment scheme in the global random oracle model from code-based assumptions.

Pedro Branco

Complete weight enumerators of a class of linear codes over finite fields.

Shudi Yang Xiangli Kong Xueying Shi

A class of linear codes and their complete weight enumerators.

Dandan Wang Xiwang Cao Gaojun Luo

The singularity attack to the multivariate signature scheme HIMQ-3.

Jintai Ding Zheng Zhang Joshua Deaton

A new class of p-ary regular bent functions.

Chunming Tang Maozhi Xu Yanfeng Qi Mingshuo Zhou

On Hadamard full propelinear codes with associated group C2t˟ C2.

Iván Bailera Joaquim Borges Josep Rifà

Golay complementary sets with large zero odd-periodic correlation zones.

Tinghua Hu Yang Yang Zhengchun Zhou

A construction of p-ary linear codes with two or three weights.

Hongming Ru Chunming Tang Yanfeng Qi Yuxiao Deng

New bounds on the minimum distance of cyclic codes.

San Ling Buket Özkaya