Volume 13, Number 4, November 2019
Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results.

Kishan Chand Gupta Sumit Kumar Pandey Indranil Ghosh Ray Susanta Samanta

Identity-based key aggregate cryptosystem from multilinear maps.

Sikhar Patranabis Debdeep Mukhopadhyay

The secure link prediction problem.

Laltu Sardar Sushmita Ruj

sfDWCDM+: A BBB secure nonce based MAC.

Nilanjan Datta Avijit Dutta Mridul Nandi Kan Yasuda

Revisiting design principles of Salsa and ChaCha.

Sabyasachi Dey Tapabrata Roy Santanu Sarkar

Another look at success probability of linear cryptanalysis.

Subhabrata Samajder Palash Sarkar

Embedding cover-free families and cryptographical applications.

Thaís Bardini Idalino Lucia Moura

Landscape Boolean functions.

Constanza Riera Pantelimon Stanica

A network reliability approach to the analysis of combinatorial repairable threshold schemes.

Bailey Kacsmar Douglas R. Stinson

Differential uniformity and the associated codes of cryptographic functions.

Pascale Charpin Jie Peng

Some cryptanalytic and coding-theoretic applications of a soft stern algorithm.

Qian Guo Thomas Johansson Erik Mårtensson Paul Stankovski Wagner

Critical perspectives on provable security: Fifteen years of "another look" papers.

Neal Koblitz Alfred Menezes

Guest editorial.

Subhamoy Maitra


Volume 13, Number 3, August 2019
Galois extensions, positive involutions and an application to unitary space-time coding.

Vincent Astier Thomas Unger

A conjecture on permutation trinomials over finite fields of characteristic two.

Nian Li Qiaoyu Hu

A spectral characterisation of t-designs and its applications.

Eun-Kyung Cho Cunsheng Ding Jong Yoon Hyun

A subspace code of size 333 in the setting of a binary q-analog of the Fano plane.

Daniel Heinlein Michael Kiermaier Sascha Kurz Alfred Wassermann

A unified polynomial selection method for the (tower) number field sieve algorithm.

Palash Sarkar Shashank Singh

New non-binary quantum codes from constacyclic codes over $ \mathbb{F}_q[u, v]/\langle u^{2}-1, v^{2}-v, uv-vu\rangle $.

Fanghui Ma Jian Gao Fang-Wei Fu

Exponential generalised network descriptors.

Suzana Antunovic Tonci Kokan Tanja Vojkovic Damir Vukicevic

Optimal subspace codes in $ {{\rm{PG}}}(4, q) $.

Antonio Cossidente Francesco Pavese Leo Storme

More cyclotomic constructions of optimal frequency-hopping sequences.

Shanding Xu Xiwang Cao Jiafu Mi Chunming Tang


Volume 13, Number 2, May 2019
Efficient public-key operation in multivariate schemes.

Felipe Cabarcas Daniel Cabarcas John Baena

Constructions of optimal balanced (m, n, 4, 5, 1)-OOSPCs.

Wei Li Hengming Zhao Rongcun Qin Dianhua Wu

Symmetries of weight enumerators and applications to Reed-Muller codes.

Martino Borello Olivier Mila

Further results on optimal (n, {3,4,5}, Λa, 1, Q)-OOCs.

Huangsheng Yu Feifei Xie Dianhua Wu Hengming Zhao

Some new constructions of isodual and LCD codes over finite fields.

Fatma-Zohra Benahmed Kenza Guenda Aicha Batoul Thomas Aaron Gulliver

Some classes of LCD codes and self-orthogonal codes over finite fields.

Xia Li Feng Cheng Chunming Tang Zhengchun Zhou

A new construction of rotation symmetric bent functions with maximal algebraic degree.

Sihong Su

Type-preserving matrices and security of block ciphers.

Riccardo Aragona Alessio Meneghetti

Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants.

Xinwei Gao

Self-dual additive 픽4-codes of lengths up to 40 represented by circulant graphs.

Ken Saito


Volume 13, Number 1, February 2019
Some two-weight and three-weight linear codes.

Chengju Li Sunghan Bae Shudi Yang

On the security of the WOTS-PRF signature scheme.

Philip Lafrance Alfred Menezes

Double circulant self-dual and LCD codes over Galois rings.

Minjia Shi Daitao Huang Lin Sok Patrick Solé

New 2-designs over finite fields from derived and residual designs.

Michael Braun Michael Kiermaier Reinhard Laue

Cyclic DNA codes over 픽2[u, v]/ u3, v2-v, vu-uv>.

Minjia Shi Yaqi Lu

The weight distribution of a class of p-ary cyclic codes and their applications.

Lanqiang Li Shixin Zhu Li Liu

Further improvement of factoring N = pr qs with partial known bits.

Shixiong Wang Longjiang Qu Chao Li Huaxiong Wang

Maximum weight spectrum codes.

Tim L. Alderson Alessandro Neri

Optimal information ratio of secret sharing schemes on Dutch windmill graphs.

Bagher Bagherpour Shahrooz Janbaz Ali Zaghian

Wave-shaped round functions and primitive groups.

Riccardo Aragona Marco Calderini Roberto Civino Massimiliano Sala Ilaria Zappatore

Connecting Legendre with Kummer and Edwards.

Sabyasachi Karati Palash Sarkar

The secrecy capacity of the arbitrarily varying wiretap channel under list decoding.

Ahmed S. Mansour Holger Boche Rafael F. Schaefer

Strongly secure quantum ramp secret sharing constructed from algebraic curves over finite fields.

Ryutaroh Matsumoto