default search action
Cryptography and Communications, Volume 16
Volume 16, Number 1, January 2024
- Sihem Mesnager:
Special Issue on Contemporary interactions between codes, cryptographic functions and/or sequences. 1-2 - Fulin Li, Hang Hu, Shixin Zhu, Jiayun Yan:
A fully dynamic multi-secret sharing scheme with redundant authorization. 3-20 - Xiaoqiang Wang, Cunsheng Ding, Hongwei Liu, Dabin Zheng:
MDS constacyclic codes of length q + 1 over GF(q). 21-48 - Ruipan Yang, Ruihu Li, Qiang Fu, Sen Yang, Yi Rao:
On locality of binary distance-optimal codes. 49-69 - Bingsheng Shen, Yang Yang, Pingzhi Fan:
Preferred Z-complementary pairs and their application in doppler resilient waveform design. 71-87 - Shilu Liu, Zhengchun Zhou, Avik Ranjan Adhikary, Yang Yang:
New supersets of Zadoff-Chu sequences via the Weil bound. 89-108 - Eda Tekin, Oliver Wilhelm Gnilke, Ferruh Özbudak, Bernhard Blümich, Marcus Greferath:
Almost perfect autocorrelation sequences with small number of pauses for applications in magnetic resonance. 109-127 - Nusa Zidaric, Kalikinkar Mandal, Guang Gong, Mark D. Aagaard:
The welch-gong stream cipher - evolutionary path. 129-165 - Hongyang Xiao, Xiwang Cao:
New constructions of mutually orthogonal complementary sets and Z-complementary code sets based on extended Boolean functions. 167-184 - Xia Li, Qin Yue, Daitao Huang:
Factorization of invariant polynomials under actions of projective linear groups and its applications in coding theory. 185-207 - Zheng Wang, Zhifan Ye, Chunming Tang, Yang Yang:
New construction of optimal ZCZ sequence sets with inter-set zero cross-correlation zone. 209-228
Volume 16, Number 2, March 2024
- Abhishek Roy, Sudhan Majhi:
Lower bounds on the maximum cross-correlations of 2-D quasi-complementary array sets. 229-247 - Kishan Chand Gupta, Sumit Kumar Pandey, Susanta Samanta:
On the construction of near-MDS matrices. 249-283 - Matthias Johann Steiner:
A lower bound for differential uniformity by multiplicative complexity & bijective functions of multiplicative complexity 1 over finite fields. 285-308 - Cheng Che, Tian Tian:
Further Results on Affine Sub-Families of NFSR Sequences. 309-321 - José Andrés Armario, Ronan Egan, Dane L. Flannery:
Generalized partially bent functions, generalized perfect arrays, and cocyclic Butson matrices. 323-337 - Xinxin Lv, Cuiling Fan, Yanyan Wang:
The cross-correlation spectrum of ternary perfect sequences and their decimations. 339-349 - Changhui Chen, Haibin Kan, Jie Peng, Lijing Zheng, Yanjun Li:
Three classes of permutation quadrinomials in odd characteristic. 351-365 - Gobinda Ghosh, Sudhan Majhi, Shubhabrata Paul:
A direct construction of optimal 2d-zcacs with flexible array size and large set size. 367-385 - Rohit Gupta, Luciane Quoos, Qiang Wang:
Some classes of permutation binomials and trinomials of index q-1 over ${\mathbb {F}_{q^n}}$. 387-402 - Nishant Kumar, Sudhan Majhi, Ashish Kumar Upadhyay:
A direct construction of complete complementary code with zero correlation zone property for prime-power length. 403-426 - Xiaoshan Kai, Jiayuan Zhang, Ping Li, Shixin Zhu:
Construction of binary self-orthogonal codes. 427-444 - François Rodier, Florian Caullery, Eric Férard:
Periodic autocorrelation of sequences. 445-458
Volume 16, Number 3, May 2024
- Xiaopan Han, Guojun Han, Han Cai, Linxin Yin:
Locally repairable codes with multiple repair sets based on packings of block size 4. 459-479 - Marcel Fernandez, John Livieratos, Sebastià Martín:
Frameproof codes, separable codes and B2 codes: Bounds and constructions. 481-506 - Meng Cao, Jing Yang, Fuchuan Wei:
On the σ duals and σ hulls of linear codes. 507-530 - Hamidreza Eyvazi, Karim Samei, Batoul Savari:
The Homogeneous Gray image of linear codes over the Galois ring GR(4, m). 531-540 - Nishant Kumar, Sudhan Majhi, Sushant Kumar:
A new construction of almost-optimal multiple ZCZ sequence sets for multi-cell QS-CDMA system. 541-556 - Harshdeep Singh, Kapish Chand Meena:
MDS multi-twisted Reed-Solomon codes with small dimensional hull. 557-578 - Jong Yoon Hyun, Nayoung Han, Yoonjin Lee:
The Griesmer codes of Belov type and optimal quaternary codes via multi-variable functions. 579-600 - Xia Wu, Wei Lu, Xiwang Cao, Gaojun Luo:
Minimal linear codes constructed from partial spreads. 601-611 - Xiaoyan Jing, Zhefeng Xu:
The 4-adic complexity of interleaved quaternary sequences of even period with optimal autocorrelation. 613-628 - Xing Liu:
Low-hit-zone frequency hopping sequence sets under aperiodic Hamming correlation. 629-645 - Xing Liu:
Correction: Low-hit-zone frequency hopping sequence sets under aperiodic Hamming correlation. 647 - Shuhui Shen, Xiaojun Zhang:
A class of balanced binary sequences with two-valued non-zero autocorrelation sum and good crosscorrelation sum. 649-663 - Prity Kumari, Karam Ratan Singh:
Re-keying analysis in group key management of wireless sensor networks. 665-677
Volume 16, Number 4, July 2024
- Xiao-Juan Wang, Tian Tian, Wen-Feng Qi:
GL-S-NFSR: A new NFSR structure and its period properties. 679-698 - Jinghui Zhao, Xiuling Shan, Zihong Tian:
Combinatorial constructions of repairable ramp schemes. 699-719 - Pierrick Méaux, Dibyendu Roy:
Theoretical differential fault attacks on FLIP and FiLIP. 721-744 - Hanglong Zhang, Xiwang Cao:
On the parameters of some LCD BCH codes over $\mathbb {F}_q$ with length (qm+1)/λ. 745-765 - Praveen Kumar, Sudhan Majhi, Subhabrata Paul:
A direct construction of cross z-complementary sequence sets with large set size. 767-777 - Shitao Li, Minjia Shi, Huizhou Liu:
Several constructions of optimal LCD codes over small finite fields. 779-800 - Tingting Wu, Shixin Zhu, Li Liu, Lanqiang Li:
Optimal quinary cyclic codes with three zeros. 801-823 - Markus Grassl, Ferruh Özbudak, Buket Özkaya, Burcu Gülmez Temür:
Complete characterization of a class of permutation trinomials in characteristic five. 825-841 - Erzhong Xue, Zilong Wang, Jinjin Chai:
Boolean functions of binary Type-II and Type-III/II complementary array pairs. 843-855 - Canze Zhu, Qunying Liao:
The [1, 0]-twisted generalized Reed-Solomon code. 857-878 - Fengwei Li, Fanhui Meng, Ziling Heng, Qin Yue:
An improvement on Weil bounds for character sums of polynomials over finite fields. 879-887 - Gülsüm Gözde Yilmazgüç, Javier de la Cruz, Edgar Martínez-Moro:
Abelian and consta-Abelian polyadic codes over affine algebras with a finite commutative chain coefficient ring. 889-907
Volume 16, Number 5, September 2024
- Hongyang Xiao, Xiwang Cao:
Sequences with ideal auto-correlation derived from group actions. 909-920 - Zhichao Xu, Hong Xu, Lin Tan, Wen-Feng Qi:
New linear approximation of modular addition and improved differential-linear cryptanalysis of SPARX-64/128. 921-947 - Giovanni Falcone, Giuseppe Filippone:
Mumford representation and Riemann-Roch space of a divisor on a hyperelliptic curve. 949-959 - Aleksandar Radonjic, Pankaj Kumar Das, Vladimir Vujicic:
Integer codes correcting burst errors within one byte and single errors within two bytes. 961-974 - Denis S. Krotov:
Equitable [[2, 10], [6, 6]]-partitions of the 12-cube. 975-996 - Joan Daemen, Daniël Kuijsters, Silvia Mella, Denise Verbakel:
Propagation properties of a non-linear mapping based on squaring in odd characteristic. 997-1011 - Astha Agrawal, Rajendra Kumar Sharma:
ACD codes over skew-symmetric dualities. 1013-1032 - Xiang Wang, Elena V. Konstantinova:
The sequence reconstruction problem for permutations with the Hamming distance. 1033-1057 - Nishant Kumar, Palash Sarkar, Sudhan Majhi:
Construction of spectrally-null-constrained zero-correlation zone sequences with flexible support. 1059-1075 - Daniel Panario, Murat Sahin, Qiang Wang:
Additive codes with few weights. 1077-1102 - Vlad-Florin Dragoi, Brice Colombier, Pierre-Louis Cayrel, Vincent Grosso:
Integer syndrome decoding in the presence of noise. 1103-1134 - Siddhartha Siddhiprada Bhoi, Udaya Parampalli, Abhay Kumar Singh:
Construction of DNA codes with multiple constrained properties. 1135-1149 - Deepmala Sharma, Mayasar Ahmad Dar:
On Generalized Nega-Hadamard Transform and Nega-crosscorrelation. 1151-1162 - Alessandro Budroni, Erik Mårtensson:
Further improvements of the estimation of key enumeration with applications to solving LWE. 1163-1182
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.