Volume 14, Number 4, November 2020
Some group-theoretical results on Feistel Networks in a long-key scenario.

Riccardo Aragona Marco Calderini Roberto Civino

Speeding up regular elliptic curve scalar multiplication without precomputation.

Kwang Ho Kim Junyop Choe Song Yun Kim Namsu Kim Sekung Hong

Composite constructions of self-dual codes from group rings and new extremal self-dual binary codes of length 68.

Steven T. Dougherty Joe Gildea Adrian Korban Abidin Kaya

Three parameters of Boolean functions related to their constancy on affine spaces.

Claude Carlet Serge Feukoua

Abelian non-cyclic orbit codes and multishot subspace codes.

Gustavo Terra Bastos Reginaldo Palazzo Júnior Marinês Guerreiro

New and updated semidefinite programming bounds for subspace codes.

Daniel Heinlein Ferdinand Ihringer

Designs from maximal subgroups and conjugacy classes of Ree groups.

Jamshid Moori Bernardo Gabriel Rodrigues Amin Saeidi Seiran Zandi

Self-orthogonal codes from orbit matrices of Seidel and Laplacian matrices of strongly regular graphs.

Dean Crnkovic Ronan Egan Andrea Svob

New classes of strictly optimal low hit zone frequency hopping sequence sets.

Hongyu Han Sheng Zhang

Giophantus distinguishing attack is a low dimensional learning with errors problem.

Jintai Ding Joshua Deaton Kurt Schmidt

Some results on ℤpℤp[v]-additive cyclic codes.

Lingyu Diao Jian Gao Jiyong Lu

Group signature from lattices preserving forward security in dynamic setting.

Meenakshi Kansal Ratna Dutta Sourav Mukhopadhyay


Volume 14, Number 3, August 2020
The weight distribution of families of reducible cyclic codes through the weight distribution of some irreducible cyclic codes.

Gerardo Vega Jesús E. Cuén-Ramos

Isogeny formulas for Jacobi intersection and twisted hessian curves.

João Paulo da Silva Julio César López-Hernández Ricardo Dahab

Challenge codes for physically unclonable functions with Gaussian delays: A maximum entropy problem.

Alexander Schaub Olivier Rioul Jean-Luc Danger Sylvain Guilley Joseph Boutros

On perfect poset codes.

Luciano Panek Jerry Anderson Pinheiro Marcelo Muniz Silva Alves Marcelo Firer

A shape-gain approach for vector quantization based on flat tori.

Fabiano Boaventura de Miranda Cristiano Torezzan

On polycyclic codes over a finite chain ring.

Alexandre Fotue Tabue Edgar Martínez-Moro J. Thomas Blackford

A construction of 픽2-linear cyclic, MDS codes.

Sara D. Cardell Joan-Josep Climent Daniel Panario Brett Stevens

On the non-Abelian group code capacity of memoryless channels.

Jorge Pedraza Arpasi

A generalized quantum relative entropy.

Luiza Helena Félix de Andrade Rui Facundo Vigelis Charles C. Cavalcante

QC-LDPC construction free of small size elementary trapping sets based on multiplicative subgroups of a finite field.

Farzane Amirzade Mohammad-Reza Sadeghi Daniel Panario

Preface.

Marcelo Firer Sueli I. R. Costa Vinay A. Vaishampayan


Volume 14, Number 2, May 2020
Additive Toeplitz codes over 픽4.

Murat Sahin Hayrullah ÖzImamoglu

Repeated-root constacyclic codes of length 3ℓmps.

Yan Liu Minjia Shi Hai Q. Dinh Songsak Sriboonchitta

Linear programming bounds for distributed storage codes.

Mohammad Ali Tebbi Terence Chan Chi Wan Sung

Quaternary group ring codes: Ranks, kernels and self-dual codes.

Steven T. Dougherty Cristina Fernández-Córdoba Roger Ten-Valls Bahattin Yildiz

Algebraic dependence in generating functions and expansion complexity.

Domingo Gómez-Pérez László Mérai

Dual-Ouroboros: An improvement of the McNie scheme.

Philippe Gaborit Lucky Galvez Adrien Hauteville Jon-Lark Kim Myeong Jae Kim Young-Sik Kim

Multi-point codes from the GGS curves.

Chuangqiang Hu Shudi Yang

Locally recoverable codes from algebraic curves with separated variables.

Carlos Munuera Wanderson Tenório Fernando Torres

Constructing 1-resilient rotation symmetric functions over 픽p with q variables through special orthogonal arrays.

Jiao Du Longjiang Qu Chao Li Xin Liao

Cyclic codes of length 2pn over finite chain rings.

Anderson Silva César Polcino Milies

Efficient traceable ring signature scheme without pairings.

Ke Gu Xinying Dong Linyu Wang

Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations.

Sanjit Chatterjee Berkant Ustaoglu


Volume 14, Number 1, February 2020
Giophantus distinguishing attack is a low dimensional learning with errors problem.

Jintai Ding Joshua Deaton Kurt Schmidt

New mission and opportunity for mathematics researchers: Cryptography in the quantum era.

Lidong Chen Dustin Moody

Letters for post-quantum cryptography standard evaluation.

Jintai Ding Sihem Mesnager Lih-Chung Wang

Certified lattice reduction.

Thomas Espitau Antoine Joux

Highly nonlinear (vectorial) Boolean functions that are symmetric under some permutations.

Selçuk Kavut Seher Tutdere

A note on the fast algebraic immunity and its consequences on modified majority functions.

Deng Tang

Two classes of differentially 4-uniform permutations over 픽2n with n even.

Guangkui Xu Longjiang Qu

New doubly even self-dual codes having minimum weight 20.

Masaaki Harada

A complete classification of partial MDS (maximally recoverable) codes with one global parity.

Anna-Lena Horlemann-Trautmann Alessandro Neri

Skew constacyclic codes over the local Frobenius non-chain rings of order 16.

Nuh Aydin Yasemin Cengellenmis Abdullah Dertli Steven T. Dougherty Esengül Saltürk

Some generalizations of good integers and their applications in the study of self-dual negacyclic codes.

Somphong Jitman Supawadee Prugsapitak Madhu Raka

A construction of bent functions with optimal algebraic degree and large symmetric group.

Wenying Zhang Zhaohui Xing Keqin Feng

New self-dual and formally self-dual codes from group ring constructions.

Steven T. Dougherty Joe Gildea Abidin Kaya Bahattin Yildiz

Construction and assignment of orthogonal sequences and zero correlation zone sequences for applications in CDMA systems.

Chunlei Xie Yujuan Sun