Table of contents for issues of Cryptography and Communications

Last update: Wed May 17 09:56:35 MDT 2023                Valid HTML 3.2!

Volume 1, Number 1, April, 2009
Volume 1, Number 2, September, 2009
Volume 2, Number 1, April, 2010
Volume 2, Number 2, September, 2010
Volume 3, Number 1, March, 2011
Volume 3, Number 2, June, 2011
Volume 3, Number 3, September, 2011
Volume 4, Number 1, March, 2012
Volume 4, Number 2, June, 2012
Volume 4, Number 3--4, December, 2012
Volume 5, Number 1, March, 2013
Volume 5, Number 2, June, 2013
Volume 5, Number 3, September, 2013
Volume 5, Number 4, December, 2013
Volume 6, Number 1, March, 2014
Volume 6, Number 2, June, 2014
Volume 6, Number 3, September, 2014
Volume 6, Number 4, December, 2014
Volume 7, Number 1, March, 2015
Volume 7, Number 2, June, 2015
Volume 7, Number 3, September, 2015
Volume 7, Number 4, December, 2015
Volume 8, Number 1, January, 2016
Volume 8, Number 2, April, 2016
Volume 8, Number 3, July, 2016
Volume 8, Number 4, October, 2016
Volume 9, Number 1, January, 2017
Volume 9, Number 2, March, 2017
Volume 9, Number 3, May, 2017
Volume 9, Number 4, July, 2017
Volume 9, Number 5, September, 2017
Volume 9, Number 6, November, 2017
Volume 10, Number 1, January, 2018
Volume 10, Number 2, March, 2018
Volume 10, Number 3, May, 2018
Volume 10, Number 4, July, 2018
Volume 10, Number 5, September, 2018
Volume 10, Number 6, November, 2018
Volume 11, Number 1, 2019
Volume 11, Number 2, 2019
Volume 11, Number 3, 2019
Volume 11, Number 4, 2019
Volume 11, Number 5, 2019
Volume 11, Number 6, November, 2019
Volume 12, Number 1, January, 2020
Volume 12, Number 2, March, 2020
Volume 12, Number 3, May, 2020
Volume 12, Number 4, July, 2020
Volume 12, Number 5, September, 2020
Volume 12, Number 6, November, 2020
Volume 13, Number 1, January, 2021
Volume 13, Number 2, March, 2021
Volume 13, Number 3, May, 2021
Volume 13, Number 4, July, 2021
Volume 13, Number 5, September, 2021
Volume 13, Number 6, November, 2021
Volume 14, Number 1, January, 2022
Volume 14, Number 2, March, 2022
Volume 14, Number 3, May, 2022
Volume 14, Number 4, July, 2022


Cryptography and Communications
Volume 1, Number 1, April, 2009

                  Claude Carlet   Editorial: \booktitleCryptography and
                                  Communications, Volume 1, Issue 1  . . . 1--2
                Fang-Wei Fu and   
        Harald Niederreiter and   
            Ferruh Özbudak   Joint linear complexity of
                                  multisequences consisting of linear
                                  recurring sequences  . . . . . . . . . . 3--29
        Charles J. Colbourn and   
              Yuichiro Fujiwara   Small stopping sets in Steiner triple
                                  systems  . . . . . . . . . . . . . . . . 31--46
                Joan Daemen and   
                 Vincent Rijmen   New criteria for linear maps in AES-like
                                  ciphers  . . . . . . . . . . . . . . . . 47--69
                Martin Hell and   
           Thomas Johansson and   
            Lennart Brynielsson   An overview of distinguishing attacks on
                                  stream ciphers . . . . . . . . . . . . . 71--94
         Ramakanth Kavuluru and   
                 Andrew Klapper   Lower bounds on error complexity
                                  measures for periodic LFSR and FCSR
                                  sequences  . . . . . . . . . . . . . . . 95--116
                 Wilfried Meidl   How to determine linear complexity and
                                  $k$-error linear complexity in some
                                  classes of linear recurring sequences    117--133

Cryptography and Communications
Volume 1, Number 2, September, 2009

     Somitra Kumar Sanadhya and   
                  Palash Sarkar   A combinatorial analysis of recent
                                  attacks on step reduced SHA-2 family . . 135--173
      Nicholas Kolokotronis and   
     Konstantinos Limniotis and   
          Nicholas Kalouptsidis   Factorization of determinants over
                                  finite fields and application in stream
                                  ciphers  . . . . . . . . . . . . . . . . 175--205
                    Hong Xu and   
                Wen-Feng Qi and   
                 Yong-Hui Zheng   Autocorrelations of $l$-sequences with
                                  prime connection integer . . . . . . . . 207--223
                Goutam Paul and   
                Subhamoy Maitra   On biases of permutation and keystream
                                  bytes of RC4 towards the secret key  . . 225--268
       Aleksandar Kircanski and   
            Rabeah Al-Zaidy and   
                 Amr M. Youssef   A new distinguishing and key recovery
                                  attack on NGG stream cipher  . . . . . . 269--282


Cryptography and Communications
Volume 2, Number 1, April, 2010

       Aleksandar Kircanski and   
                 Amr M. Youssef   On the structural weakness of the GGHN
                                  stream cipher  . . . . . . . . . . . . . 1--17
                 Robert Rolland   The second weight of generalized
                                  Reed-Muller codes in most cases  . . . . 19--40
                    Mikko Pelto   New bounds for $ (r, \leq 2)
                                  $-identifying codes in the infinite king
                                  grid . . . . . . . . . . . . . . . . . . 41--47
               Alina Ostafe and   
            Igor E. Shparlinski   Pseudorandom numbers and hash functions
                                  from iterations of multivariate
                                  polynomials  . . . . . . . . . . . . . . 49--67
                 Ruchi Gode and   
            Sugata Gangopadhyay   Third-order nonlinearities of a subclass
                                  of Kasami functions  . . . . . . . . . . 69--83
              Tor Helleseth and   
             Alexander Kholosha   \boldmath $ x^{2^l + 1} + x + a $ and
                                  related affine polynomials over $ {\rm
                                  GF}(2^k) $ . . . . . . . . . . . . . . . 85--109
         E. Rodney Canfield and   
               Zhicheng Gao and   
        Catherine Greenhill and   
           Brendan D. McKay and   
             Robert W. Robinson   Asymptotic enumeration of
                                  correlation-immune Boolean functions . . 111--126

Cryptography and Communications
Volume 2, Number 2, September, 2010

           Dane L. Flannery and   
             Kathryn J. Horadam   Guest editorial for the special issue on
                                  design theory  . . . . . . . . . . . . . 127--128
                  K. J. Horadam   Hadamard matrices and their
                                  applications: Progress 2007--2010  . . . 129--154
    Krishnasamy Thiru Arasu and   
                 Alex J. Gutman   Circulant weighing matrices  . . . . . . 155--171
                  Michael Huber   Combinatorial bounds and
                                  characterizations of splitting
                                  authentication codes . . . . . . . . . . 173--185
         Ferenc Szöll\Hosi   Exotic complex Hadamard matrices and
                                  their equivalence  . . . . . . . . . . . 187--198
                 Darcy Best and   
                Hadi Kharaghani   Unbiased complex Hadamard matrices and
                                  bases  . . . . . . . . . . . . . . . . . 199--209
            Philippe Jaming and   
Máté Matolcsi and   
       Péter Móra   The problem of mutually unbiased bases
                                  in dimension $6$ . . . . . . . . . . . . 211--220
                   Asha Rao and   
              Diane Donovan and   
                 Joanne L. Hall   Mutually orthogonal Latin squares and
                                  mutually unbiased bases in dimensions of
                                  odd prime power MOLS and MUBs in odd
                                  prime power dimensions . . . . . . . . . 221--231
          Warwick de Launey and   
               Daniel M. Gordon   On the density of the set of known
                                  Hadamard orders  . . . . . . . . . . . . 233--246
José Andrés Armario   On an inequivalence criterion for
                                  cocyclic Hadamard matrices . . . . . . . 247--259
Padraig Ó Catháin and   
            Richard M. Stafford   On twin prime power Hadamard matrices    261--269
                   J. F. Dillon   Some REALLY beautiful Hadamard matrices  271--292
           Jennifer Seberry and   
              Marilena Mitrouli   Some remarks on Hadamard matrices  . . . 293--306
          Warwick de Launey and   
                 David A. Levin   A Fourier-analytic approach to counting
                                  partial Hadamard matrices  . . . . . . . 307--334


Cryptography and Communications
Volume 3, Number 1, March, 2011

            Lilya Budaghyan and   
                  Tor Helleseth   New commutative semifields defined by
                                  new PN multinomials  . . . . . . . . . . 1--16
               D. G. Farmer and   
                  K. J. Horadam   Equivalence classes of multiplicative
                                  central $ (p^n, p^n, p^n, 1) $-relative
                                  difference sets  . . . . . . . . . . . . 17--28
                   Li-Ping Wang   A lattice-based minimal partial
                                  realization algorithm for matrix
                                  sequences of varying length  . . . . . . 29--42
               Carl Bracken and   
               Eimear Byrne and   
               Nadya Markin and   
                   Gary McGuire   A few more quadratic APN functions . . . 43--53

Cryptography and Communications
Volume 3, Number 2, June, 2011

                 Zheng Yang and   
                      Pinhui Ke   Construction of quaternary sequences of
                                  length $ p q $ with low autocorrelation  55--64
            Keith M. Martin and   
          Maura B. Paterson and   
             Douglas R. Stinson   Error decodable secret sharing and
                                  one-round perfectly secure message
                                  transmission for general adversary
                                  structures . . . . . . . . . . . . . . . 65--86
            Khmaies Ouahada and   
              Theo G. Swart and   
            Hendrik C. Ferreira   Permutation sequences and coded PAM
                                  signals with spectral nulls at rational
                                  submultiples of the symbol frequency . . 87--108
    François Arnault and   
          Thierry P. Berger and   
                Benjamin Pousse   A matrix approach for FCSR automata  . . 109--139

Cryptography and Communications
Volume 3, Number 3, September, 2011

                 Jiali Choy and   
               Guanhan Chew and   
            Khoongming Khoo and   
                     Huihui Yap   Cryptographic properties and application
                                  of a Generalized Unbalanced Feistel
                                  Network structure  . . . . . . . . . . . 141--164
                 Hassan Aly and   
                 Arne Winterhof   Boolean functions derived from Fermat
                                  quotients  . . . . . . . . . . . . . . . 165--174
               Yongqiang Li and   
                 Mingsheng Wang   Permutation polynomials EA-equivalent to
                                  the inverse function over $ {\rm
                                  GF}(2^n) $ . . . . . . . . . . . . . . . 175--186


Cryptography and Communications
Volume 4, Number 1, March, 2012

                Laurent Poinsot   Non Abelian bent functions . . . . . . . 1--23
                   Enes Pasalic   A design of Boolean functions resistant
                                  to (fast) algebraic cryptanalysis with
                                  efficient implementation . . . . . . . . 25--45
              Miia Hermelin and   
                   Kaisa Nyberg   Multidimensional linear distinguishing
                                  attacks and Boolean functions  . . . . . 47--64
               Peter Beelen and   
                 Gregor Leander   A new construction of highly nonlinear
                                  S-boxes  . . . . . . . . . . . . . . . . 65--77

Cryptography and Communications
Volume 4, Number 2, June, 2012

                  Wenpei Si and   
                  Cunsheng Ding   A simple stream cipher with proven
                                  properties . . . . . . . . . . . . . . . 79--104
        Maxwell L. Bileschi and   
           Thomas W. Cusick and   
                 Daniel Padgett   Weights of Boolean cubic monomial
                                  rotation symmetric functions . . . . . . 105--130
           Abdel Alim Kamal and   
                 Amr M. Youssef   Fault analysis of the NTRUSign digital
                                  signature scheme . . . . . . . . . . . . 131--144

Cryptography and Communications
Volume 4, Number 3--4, December, 2012

            Subhamoy Maitra and   
                  Palash Sarkar   Guest editorial  . . . . . . . . . . . . 145--146
              Anne Canteaut and   
    María Naya-Plasencia   Correlation attacks on combination
                                  generators . . . . . . . . . . . . . . . 147--171
         Martin Ågren and   
          Carl Löndahl and   
                Martin Hell and   
               Thomas Johansson   A survey on fast correlation attacks . . 173--202
            Simon Knellwolf and   
                    Willi Meier   High order differential attacks on
                                  stream ciphers . . . . . . . . . . . . . 203--215
                 Itai Dinur and   
                     Adi Shamir   Applying cube attacks to stream ciphers
                                  in realistic scenarios . . . . . . . . . 217--232
       Meltem Sönmez Turan   On the nonlinearity of maximum-length
                                  NFSR feedbacks . . . . . . . . . . . . . 233--243
             Leonie Simpson and   
                  Serdar Boztas   State cycles, initialization and the
                                  Trivium stream cipher  . . . . . . . . . 245--258
                      Yi Lu and   
             Serge Vaudenay and   
                    Willi Meier   Synthetic linear analysis with
                                  applications to CubeHash and Rabbit  . . 259--276
  Mohammad Ali Orumiehchiha and   
             Josef Pieprzyk and   
                  Ron Steinfeld   Cryptanalysis of WG-7: a lightweight
                                  stream cipher  . . . . . . . . . . . . . 277--285


Cryptography and Communications
Volume 5, Number 1, March, 2013

                Wenhao Wang and   
               Meicheng Liu and   
                      Yin Zhang   Comments on ``A design of Boolean
                                  functions resistant to (fast) algebraic
                                  cryptanalysis with efficient
                                  implementation'' . . . . . . . . . . . . 1--6
               Thomas W. Cusick   Finding Hamming weights without looking
                                  at truth tables  . . . . . . . . . . . . 7--18
           Sourav Sen Gupta and   
       Anupam Chattopadhyay and   
                  Ayesha Khalid   Designing integrated accelerator for
                                  stream ciphers with structural
                                  similarities . . . . . . . . . . . . . . 19--47
              Zoubida Jadda and   
            Patrice Parraud and   
               Soukayna Qarboua   Quaternary cryptographic bent functions
                                  and their binary projection  . . . . . . 49--65
            Romar dela Cruz and   
                  Huaxiong Wang   Cheating-immune secret sharing schemes
                                  from codes and cumulative arrays . . . . 67--83

Cryptography and Communications
Volume 5, Number 2, June, 2013

               Alyssa Brown and   
               Thomas W. Cusick   Equivalence classes for cubic rotation
                                  symmetric functions  . . . . . . . . . . 85--118
             Ir\`ene Charon and   
               Iiro Honkala and   
              Olivier Hudry and   
               Antoine Lobstein   Minimum sizes of identifying codes in
                                  graphs differing by one vertex . . . . . 119--136
                 Sourav Das and   
         Dipanwita RoyChowdhury   \it CAR30: a new scalable stream cipher
                                  with rule $ 30 $ . . . . . . . . . . . . 137--162
           Ana S\ual\uagean and   
            Alex J. Burrage and   
             Raphael C.-W. Phan   Computing the linear complexity for
                                  sequences with characteristic polynomial
                                  $ f^v $  . . . . . . . . . . . . . . . . 163--177

Cryptography and Communications
Volume 5, Number 3, September, 2013

     Konstantinos Limniotis and   
      Nicholas Kolokotronis and   
          Nicholas Kalouptsidis   Secondary constructions of Boolean
                                  functions with maximum algebraic
                                  immunity . . . . . . . . . . . . . . . . 179--199
                K. T. Arasu and   
            Simone Severini and   
                  Edmund Velten   Block weighing matrices  . . . . . . . . 201--207
              Cunsheng Ding and   
                 Keqin Feng and   
              Rongquan Feng and   
             Maosheng Xiong and   
                   Aixian Zhang   Unit time-phase signal sets: Bounds and
                                  constructions  . . . . . . . . . . . . . 209--227

Cryptography and Communications
Volume 5, Number 4, December, 2013

          Maura B. Paterson and   
             Douglas R. Stinson   A simple combinatorial treatment of
                                  constructions and threshold gaps of ramp
                                  schemes  . . . . . . . . . . . . . . . . 229--240
                  Elodie Leducq   Second weight codewords of generalized
                                  Reed-Muller codes  . . . . . . . . . . . 241--276
                 Guang Gong and   
               Mark Aagaard and   
                     Xinxin Fan   Resilience to distinguishing attacks on
                                  \sf WG-7 cipher and their
                                  generalizations  . . . . . . . . . . . . 277--289


Cryptography and Communications
Volume 6, Number 1, March, 2014

              Tor Helleseth and   
                Jonathan Jedwab   Special issue editorial: Sequences and
                                  their applications . . . . . . . . . . . 1--2
                  Gaofei Wu and   
        Matthew Geoffrey Parker   A complementary construction using
                                  mutually unbiased bases  . . . . . . . . 3--25
              Dragana Bajic and   
        Tatjana Loncar-Turukalo   A simple suboptimal construction of
                                  cross-bifix-free codes . . . . . . . . . 27--37
                 Rema Hariharan   New near perfect sequences of even
                                  lengths  . . . . . . . . . . . . . . . . 39--46
   Santiago Barrera Acevedo and   
                   Nathan Jolly   Perfect arrays of unbounded sizes over
                                  the basic quaternions  . . . . . . . . . 47--57
            S. Z. Budi\vsin and   
                P. Spasojevi\'c   Paraunitary generation/correlation of
                                  QAM complementary sequence pairs . . . . 59--102

Cryptography and Communications
Volume 6, Number 2, June, 2014

           Stéphanie Dib   Asymptotic nonlinearity of vectorial
                                  Boolean functions  . . . . . . . . . . . 103--115
          Kalikinkar Mandal and   
                 Guang Gong and   
                 Xinxin Fan and   
                   Mark Aagaard   Optimal parameters for the WG stream
                                  cipher family  . . . . . . . . . . . . . 117--135
                   Ying Gao and   
                Romar dela Cruz   Secret sharing schemes based on
                                  graphical codes  . . . . . . . . . . . . 137--155
             Ir\`ene Charon and   
               Iiro Honkala and   
              Olivier Hudry and   
               Antoine Lobstein   Minimum sizes of identifying codes in
                                  graphs differing by one edge . . . . . . 157--170

Cryptography and Communications
Volume 6, Number 3, September, 2014

                Sareh Emami and   
                   San Ling and   
            Ivica Nikoli\'c and   
             Josef Pieprzyk and   
                  Huaxiong Wang   The resistance of PRESENT-80 against
                                  related-key differential attacks . . . . 171--187
                  Palash Sarkar   Modes of operations for encryption and
                                  authentication using stream ciphers
                                  supporting an initialisation vector  . . 189--231
               Jinyong Shan and   
                     Lei Hu and   
                 Xiangyong Zeng   Cryptographic properties of nested
                                  functions and algebraic immunity of the
                                  Boolean function in Hitag2 stream cipher 233--254
                Pavol Zajac and   
    Matú\vs Jókay   Multiplicative complexity of bijective $
                                  4 \times 4 $ S-boxes . . . . . . . . . . 255--277

Cryptography and Communications
Volume 6, Number 4, December, 2014

                  Asl\i Bay and   
            Atefeh Mashatan and   
                 Serge Vaudenay   Revisiting iterated attacks in the
                                  context of decorrelation theory  . . . . 279--311
                     Bo Zhu and   
                     Guang Gong   Multidimensional meet-in-the-middle
                                  attack and its applications to
                                  KATAN32/48/64  . . . . . . . . . . . . . 313--333
                Xinxin Gong and   
                  Bin Zhang and   
                 Wenling Wu and   
                   Dengguo Feng   Computing Walsh coefficients from the
                                  algebraic normal form of a Boolean
                                  function . . . . . . . . . . . . . . . . 335--358
            Antonio Bernini and   
            Stefano Bilotta and   
              Renzo Pinzani and   
                Ahmad Sabri and   
             Vincent Vajnovszki   Prefix partitioned gray codes for
                                  particular cross-bifix-free sets . . . . 359--369


Cryptography and Communications
Volume 7, Number 1, March, 2015

              Claude Carlet and   
            Pierre-Alain Fouque   Guest Editorial  . . . . . . . . . . . . 1--2
          Begül Bilgin and   
              Svetla Nikova and   
           Ventzislav Nikov and   
             Vincent Rijmen and   
           Natalia Tokareva and   
                Valeriya Vitkup   Threshold implementations of small
                                  S-boxes  . . . . . . . . . . . . . . . . 3--33
        Bodhisatwa Mazumdar and   
       Debdeep Mukhopadhyay and   
              Indranil Sengupta   Construction of RSBFs with improved
                                  cryptographic properties to resist
                                  differential fault attack on grain
                                  family of stream ciphers . . . . . . . . 35--69
           Michael Tunstall and   
                      Marc Joye   The distributions of individual bits in
                                  the output of multiplicative operations  71--90
       Aurélie Bauer and   
             Eliane Jaulmes and   
            Emmanuel Prouff and   
  Jean-René Reinhard and   
                   Justine Wild   Horizontal collision correlation attack
                                  on elliptic curves---extended version    91--119
         Christophe Clavier and   
             Quentin Isorez and   
              Damien Marion and   
                Antoine Wurcker   Complete reverse-engineering of AES-like
                                  block ciphers by SCARE and FIRE attacks  121--162
            Sonia Bela\"\id and   
             Vincent Grosso and   
François-Xavier Standaert   Masking and leakage-resilient
                                  primitives: One, the other(s) or both?   163--184
            Nadia El Mrabet and   
     Jacques J. A. Fournier and   
               Louis Goubin and   
                Ronan Lashermes   A survey of fault attacks in pairing
                                  based cryptography . . . . . . . . . . . 185--205

Cryptography and Communications
Volume 7, Number 2, June, 2015

                Mingchao Li and   
                 Miao Liang and   
                    Beiliang Du   A construction of $t$-fold perfect
                                  splitting authentication codes with
                                  equal deception probabilities  . . . . . 207--215
                 Chengju Li and   
                        Qin Yue   The Walsh transform of a class of
                                  monomial functions and cyclic codes  . . 217--228
                Anuradha Sharma   Repeated-root constacyclic codes of
                                  length $ \ell^t p^s $ and their dual
                                  codes  . . . . . . . . . . . . . . . . . 229--255
         Kishan Chand Gupta and   
             Indranil Ghosh Ray   Cryptographically significant MDS
                                  matrices based on circulant and
                                  circulant-like matrices for lightweight
                                  applications . . . . . . . . . . . . . . 257--287

Cryptography and Communications
Volume 7, Number 3, September, 2015

                 Yiyuan Luo and   
                 Xuejia Lai and   
                     Tiejun Jia   Attacks on a double length
                                  blockcipher-based hash proposal  . . . . 289--295
                        Yuan Li   Characterization of robust immune
                                  symmetric boolean functions  . . . . . . 297--315
                 Santanu Sarkar   Further non-randomness in RC4, RC4A and
                                  VMPC . . . . . . . . . . . . . . . . . . 317--330
            Ivica Nikoli\'c and   
                   Lei Wang and   
                      Shuang Wu   The parallel-cut meet-in-the-middle
                                  attack . . . . . . . . . . . . . . . . . 331--345

Cryptography and Communications
Volume 7, Number 4, December, 2015

                     Zhi Hu and   
                       Lin Wang   Injectivity of compressing maps on the
                                  set of primitive sequences modulo
                                  square-free odd integers . . . . . . . . 347--361
                   Nathan Jolly   An algebra of arrays and almost perfect
                                  watermarks . . . . . . . . . . . . . . . 363--377
          Francis N. Castro and   
   Oscar E. González and   
                 Luis A. Medina   A divisibility approach to the open
                                  boundary cases of
                                  Cusick--Li--St\uanic\ua's conjecture . . 379--402
       José Ortiz-Ubarri   New families of asymptotically optimal
                                  doubly periodic arrays with ideal
                                  correlation constraints  . . . . . . . . 403--414
         Colleen M. Swanson and   
             Douglas R. Stinson   Extended results on privacy against
                                  coalitions of users in user-private
                                  information retrieval protocols  . . . . 415--437
         Debrup Chakraborty and   
  Vicente Hernandez-Jimenez and   
                  Palash Sarkar   Another look at XCB  . . . . . . . . . . 439--468
              S. Hod\vzi\'c and   
                     E. Pasalic   Generalized Bent Functions --- Some
                                  General Construction Methods and Related
                                  Necessary and Sufficient Conditions  . . 469--483
          Vladimir Edemskiy and   
                  Andrey Ivanov   The linear complexity of balanced
                                  quaternary sequences with optimal
                                  autocorrelation value  . . . . . . . . . 485--496
               Jing Jane He and   
             Daniel Panario and   
                 Qiang Wang and   
                 Arne Winterhof   Linear complexity profile and
                                  correlation measure of interleaved
                                  sequences  . . . . . . . . . . . . . . . 497--508
                   Chun Guo and   
                    Dongdai Lin   Improved domain extender for the ideal
                                  cipher . . . . . . . . . . . . . . . . . 509--533
           A. R. Rahimipour and   
              A. R. Ashrafi and   
                     A. Gholami   The existence of minimal logarithmic
                                  signatures for the sporadic Suzuki and
                                  simple Suzuki groups . . . . . . . . . . 535--542


Cryptography and Communications
Volume 8, Number 1, January, 2016

              Mingxing Wang and   
               Yupeng Jiang and   
                    Dongdai Lin   Further results on the nonlinearity of
                                  maximum-length NFSR feedbacks  . . . . . 1--6
              Adel Alahmadi and   
            Hussain Alhazmi and   
              Tor Helleseth and   
                Rola Hijazi and   
              Najat Muthana and   
            Patrick Solé   On the lifted Melas code . . . . . . . . 7--18
          Maura B. Paterson and   
         Douglas R. Stinson and   
                    Yongge Wang   On encoding symbol degrees of array
                                  BP-XOR codes . . . . . . . . . . . . . . 19--32
                Qiuyan Wang and   
               Yupeng Jiang and   
                    Dongdai Lin   Linear complexity of Ding-Helleseth
                                  sequences of order 2 over $ {\rm GF}(l)
                                  $  . . . . . . . . . . . . . . . . . . . 33--49
                   Jian Gao and   
                Linzhi Shen and   
                    Fang-Wei Fu   A Chinese remainder theorem approach to
                                  skew generalized quasi-cyclic codes over
                                  finite fields  . . . . . . . . . . . . . 51--66
           Thomas W. Cusick and   
         Pantelimon St\uanic\ua   Counting equivalence classes for
                                  monomial rotation symmetric Boolean
                                  functions with prime dimension . . . . . 67--81
            Anuradha Sharma and   
                 Amit K. Sharma   Construction of self-dual codes over $
                                  \mathbb {Z}_{2^m} $  . . . . . . . . . . 83--101
                   Chuan Lv and   
              Tongjiang Yan and   
                   Guozhen Xiao   New developments in $q$-polynomial codes 103--112
                Subhadeep Banik   Conditional differential cryptanalysis
                                  of $ 105 $ round Grain v1  . . . . . . . 113--137
               Iiro Honkala and   
              Olivier Hudry and   
               Antoine Lobstein   On the ensemble of optimal identifying
                                  codes in a twin-free graph . . . . . . . 139--153
                Guangkui Xu and   
                 Xiwang Cao and   
                    Shanding Xu   Constructing new APN functions and bent
                                  functions over finite fields of odd
                                  characteristic via the switching method  155--171

Cryptography and Communications
Volume 8, Number 2, April, 2016

            Lilya Budaghyan and   
              Tor Helleseth and   
             Alexander Kholosha   Editorial: Special issue on Boolean
                                  functions and their applications . . . . 173--174
             Daniel J. Katz and   
              Philippe Langevin   New open problems related to old
                                  conjectures by Helleseth . . . . . . . . 175--189
Canan Ka\csìkcì and   
             Wilfried Meidl and   
               Alev Topuzo\uglu   Spectra of a class of quadratic
                                  functions: Average behaviour and
                                  counting functions . . . . . . . . . . . 191--214
                 Chunlei Li and   
                  Tor Helleseth   Quasi-perfect linear codes from planar
                                  and APN functions  . . . . . . . . . . . 215--227
                 Sihem Mesnager   Further constructions of infinite
                                  families of bent functions from new
                                  permutations and their duals . . . . . . 229--246
              Georgi Ivanov and   
            Nikolay Nikolov and   
                  Svetla Nikova   Reversed genetic algorithms for
                                  generation of bijective S-boxes with
                                  good cryptographic properties  . . . . . 247--276
        Oleksandr Kazymyrov and   
            Roman Oliynykov and   
            Håvard Raddum   Influence of addition modulo $ 2^n $ on
                                  algebraic attacks  . . . . . . . . . . . 277--289
                    Yin Tan and   
                 Guang Gong and   
                         Bo Zhu   Enhanced criteria on differential
                                  uniformity and nonlinearity of
                                  cryptographically significant functions  291--311

Cryptography and Communications
Volume 8, Number 3, July, 2016

                 Joan Boyar and   
        Magnus Gausdal Find and   
            René Peralta   On various nonlinearity measures for
                                  boolean functions  . . . . . . . . . . . 313--330
                Sonia Bogos and   
           Florian Tram\`er and   
                 Serge Vaudenay   On solving \sf LPN using \sf BKW and
                                  variants: implementation and analysis    331--369
                 Yuan Cheng and   
                Wen-Feng Qi and   
            Qun-Xiong Zheng and   
                      Dong Yang   On the distinctness of primitive
                                  sequences over $ \mathbf {Z} / (p^e q) $
                                  modulo $2$ . . . . . . . . . . . . . . . 371--381
                    Ting Gu and   
                 Andrew Klapper   Statistical properties of half-$ \ell
                                  $-sequences  . . . . . . . . . . . . . . 383--400
        Kaushik Chakraborty and   
                Subhamoy Maitra   Application of Grover's algorithm to
                                  check non-resiliency of a Boolean
                                  function . . . . . . . . . . . . . . . . 401--413
           Torleiv Klòve   On covering sets for limited-magnitude
                                  errors . . . . . . . . . . . . . . . . . 415--433
                      Yi Lu and   
                    Yvo Desmedt   Walsh transforms and cryptographic
                                  applications in bias computing . . . . . 435--453

Cryptography and Communications
Volume 8, Number 4, October, 2016

         Debrup Chakraborty and   
                  Palash Sarkar   On modes of operations of a block cipher
                                  for authentication and authenticated
                                  encryption . . . . . . . . . . . . . . . 455--511
                   Fulin Li and   
                 Shixin Zhu and   
                Honggang Hu and   
                     Ting Jiang   Determining the $k$-error joint linear
                                  complexity spectrum for a binary
                                  multisequence with period $ p^n$ . . . . 513--523
                      Can Xiang   Linear codes from a generic construction 525--539
                Guangkui Xu and   
                 Xiwang Cao and   
                    Shanding Xu   Optimal $p$-ary cyclic codes with
                                  minimum distance four from monomials . . 541--554
             Brandon Dravie and   
Jérémy Parriaux and   
           Philippe Guillot and   
       Gilles Millérioux   Matrix representations of vectorial
                                  Boolean functions and eigenanalysis  . . 555--577
               Ji-Jian Chin and   
               Syh-Yuan Tan and   
             Swee-Huay Heng and   
             Raphael C.-W. Phan   Twin-Beth: Security under active and
                                  concurrent attacks for the Beth
                                  identity-based identification scheme . . 579--591
              Ji-Woong Jang and   
                   Dae-Woon Lim   Large low probability of intercept
                                  properties of the quaternary sequence
                                  with optimal correlation property
                                  constructed by Legendre sequences  . . . 593--604
                Qiuyan Wang and   
                    Dongdai Lin   Generalized cyclotomic numbers of order
                                  two and their applications . . . . . . . 605--616
            Anuradha Sharma and   
                     Saroj Rani   On constacyclic codes over finite fields 617--636
                Kai-Uwe Schmidt   Nonlinearity measures of random Boolean
                                  functions  . . . . . . . . . . . . . . . 637--645


Cryptography and Communications
Volume 9, Number 1, January, 2017

              Cunsheng Ding and   
                 Zhengchun Zhou   Preface: Special functions and codes . . 1--2
         Kanat Abdukhalikov and   
                 Sihem Mesnager   Bent functions linear on elements of
                                  some classical spreads and presemifields
                                  spreads  . . . . . . . . . . . . . . . . 3--21
           Sergey Bezzateev and   
             Natalia Shekhunova   Quasi-cyclic Goppa codes with special
                                  Goppa polynomials and matched location
                                  sets . . . . . . . . . . . . . . . . . . 23--39
                Ziling Heng and   
                        Qin Yue   Optimal codebooks achieving the
                                  Levenshtein bound from generalized bent
                                  functions over $ \mathbb {Z}_4 $ . . . . 41--53
                 Chengju Li and   
                Sunghan Bae and   
                      Haode Yan   A construction of codes with linearity
                                  from two linear codes  . . . . . . . . . 55--69
                 Sihem Mesnager   Linear codes with few weights from
                                  weakly regular bent functions based on a
                                  generic construction . . . . . . . . . . 71--84
                        Qi Wang   Some cyclic codes with prime length from
                                  cyclotomy of order $4$ . . . . . . . . . 85--92
                  Can Xiang and   
              Chunming Tang and   
                     Keqin Feng   A class of linear codes with a few
                                  weights  . . . . . . . . . . . . . . . . 93--116
                Guangkui Xu and   
                 Xiwang Cao and   
                    Shanding Xu   Two classes of $p$-ary bent functions
                                  and linear codes with three or four
                                  weights  . . . . . . . . . . . . . . . . 117--131
                 Shudi Yang and   
               Zheng-An Yao and   
                  Chang-An Zhao   A class of three-weight linear codes and
                                  their complete weight enumerators  . . . 133--149
                  Dan Zhang and   
                Cuiling Fan and   
               Daiyuan Peng and   
                    Xiaohu Tang   Complete weight enumerators of some
                                  linear codes from quadratic forms  . . . 151--163

Cryptography and Communications
Volume 9, Number 2, March, 2017

                   Yue Zhou and   
                   Longjiang Qu   Constructions of negabent functions over
                                  finite fields  . . . . . . . . . . . . . 165--180
                     Xin Li and   
                      Zihui Liu   On the second relative greedy weight . . 181--197
                 Lisha Wang and   
                    Xiaohu Tang   On the correlation distribution of the
                                  generalized maximal length $ \mathbb
                                  {Z}_4 $-sequences  . . . . . . . . . . . 199--215
           Ana S\ual\uagean and   
    Matei Mandache-S\ual\uagean   Counting and characterising functions
                                  with ``fast points'' for differential
                                  attacks  . . . . . . . . . . . . . . . . 217--239
         Rama Krishna Bandi and   
      Maheshanand Bhaintwal and   
                      Nuh Aydin   A mass formula for negacyclic codes of
                                  length $ 2^k $ and some good negacyclic
                                  codes over $ \mathbb {Z}_4 + u \mathbb
                                  {Z}_4 $  . . . . . . . . . . . . . . . . 241--272
              Elena Dubrova and   
                    Martin Hell   Espresso: A stream cipher for $5$G
                                  wireless communication systems . . . . . 273--289
                Tingting Wu and   
                   Jian Gao and   
                    Fang-Wei Fu   $1$-generator generalized quasi-cyclic
                                  codes over $ \mathbb {Z}_4 $ . . . . . . 291--299
        Sugata Gangopadhyay and   
     Aditi Kar Gangopadhyay and   
          Spyridon Pollatos and   
         Pantelimon St\uanic\ua   Cryptographic Boolean functions with
                                  biased inputs  . . . . . . . . . . . . . 301--314

Cryptography and Communications
Volume 9, Number 3, May, 2017

                Qiuyan Wang and   
                 Kelan Ding and   
                Dongdai Lin and   
                        Rui Xue   A kind of three-weight linear codes  . . 315--322
                Ziling Heng and   
                        Qin Yue   Complete weight distributions of two
                                  classes of cyclic codes  . . . . . . . . 323--343
                   Jian Liu and   
             Sihem Mesnager and   
                   Lusheng Chen   On the nonlinearity of S-boxes and
                                  linear codes . . . . . . . . . . . . . . 345--361
                   Jie Peng and   
                   Chik How Tan   New differentially $4$-uniform
                                  permutations by modifying the inverse
                                  function on subfields  . . . . . . . . . 363--378
                M. Esmaeili and   
                 M. Moosavi and   
                 T. A. Gulliver   A new class of Fibonacci sequence based
                                  error correcting codes . . . . . . . . . 379--396
              Minquan Cheng and   
                 Jing Jiang and   
                    Xiaohu Tang   Asymptotically optimal $ \overline
                                  {2}$-separable codes with length $4$ . . 397--405
                 Miao Liang and   
                   Lijun Ji and   
                  Jingcai Zhang   Some new classes of $2$-fold optimal or
                                  perfect splitting authentication codes   407--430

Cryptography and Communications
Volume 9, Number 4, July, 2017

               Zhiqiang Lin and   
                Dongdai Lin and   
                     Dingyi Pei   Practical construction of ring LFSRs and
                                  ring FCSRs with low diffusion delay for
                                  hardware cryptographic applications  . . 431--443
                  Zhixiong Chen   Linear complexity and trace
                                  representation of quaternary sequences
                                  over $ \mathbb {Z}_4 $ based on
                                  generalized cyclotomic classes modulo $
                                  p q $  . . . . . . . . . . . . . . . . . 445--458
                 Madhu Raka and   
           Leetika Kathuria and   
                   Mokshi Goyal   $ (1 - 2 u^3)$-constacyclic codes and
                                  quadratic residue codes over $ \mathbb
                                  {F}_p[u] \slash \langle u^4 - u \rangle
                                  $  . . . . . . . . . . . . . . . . . . . 459--473
         Pramod Kumar Kewat and   
                   Priti Kumari   Cyclic codes from the second class
                                  two-prime Whiteman's generalized
                                  cyclotomic sequence with order $6$ . . . 475--499
László Mérai and   
        Harald Niederreiter and   
                 Arne Winterhof   Expansion complexity and linear
                                  complexity of sequences over finite
                                  fields . . . . . . . . . . . . . . . . . 501--509
                 Hongyu Han and   
               Daiyuan Peng and   
               Udaya Parampalli   New sets of optimal low-hit-zone
                                  frequency-hopping sequences based on
                                  $m$-sequences  . . . . . . . . . . . . . 511--522
             Santanu Sarkar and   
                Prakash Dey and   
           Avishek Adhikari and   
                Subhamoy Maitra   Probabilistic signature based
                                  generalized framework for differential
                                  fault analysis of stream ciphers . . . . 523--543

Cryptography and Communications
Volume 9, Number 5, September, 2017

              Xianfang Wang and   
                   Jian Gao and   
                    Fang-Wei Fu   Complete weight enumerators of two
                                  classes of linear codes  . . . . . . . . 545--562
                  Shuai Xue and   
                Wen-Feng Qi and   
                 Xiao-Yuan Yang   On the best linear approximation of
                                  addition modulo $ 2^n $  . . . . . . . . 563--580
            Thalia M. Laing and   
            Keith M. Martin and   
          Maura B. Paterson and   
             Douglas R. Stinson   Localised multisecret sharing  . . . . . 581--597
                   Yuan Cao and   
                     Qingguo Li   Cyclic codes of odd length over $ Z_4
                                  [u] \slash \langle u^k \rangle $ . . . . 599--624
              Xianfang Wang and   
                  Can Xiang and   
                    Fang-Wei Fu   Secret sharing schemes for compartmented
                                  access structures  . . . . . . . . . . . 625--635
                 Minjia Shi and   
               Rongsheng Wu and   
                    Yan Liu and   
            Patrick Solé   Two and three weight codes over $
                                  \mathbb {F}_p + u \mathbb {F}_p $  . . . 637--646
              Chunming Tang and   
                     Yanfeng Qi   A class of hyper-bent functions and
                                  Kloosterman sums . . . . . . . . . . . . 647--664

Cryptography and Communications
Volume 9, Number 6, November, 2017

                Saban Alaca and   
                 Goldwyn Millar   Character values of the
                                  Sidelnikov--Lempel--Cohn--Eastman
                                  sequences  . . . . . . . . . . . . . . . 665--682
          Vladimir Edemskiy and   
                      Xiaoni Du   Design sequences with high linear
                                  complexity over finite fields using
                                  generalized cyclotomy  . . . . . . . . . 683--691
                    Nian Li and   
                  Tor Helleseth   Several classes of permutation
                                  trinomials from Niho exponents . . . . . 693--705
             Limengnan Zhou and   
               Daiyuan Peng and   
              Hongbin Liang and   
             Changyuan Wang and   
                     Hongyu Han   Generalized methods to construct
                                  low-hit-zone frequency-hopping sequence
                                  sets and optimal constructions . . . . . 707--728
                    J. Wolfmann   Sequences of bent functions and
                                  near-bent functions  . . . . . . . . . . 729--736
             Heiko Dietrich and   
                   Nathan Jolly   A new family of arrays with low
                                  autocorrelation  . . . . . . . . . . . . 737--748
             Eric Férard   On the irreducibility of the hyperplane
                                  sections of Fermat varieties in $
                                  \mathbb {P}^3 $ in characteristic $2$.
                                  II . . . . . . . . . . . . . . . . . . . 749--767


Cryptography and Communications
Volume 10, Number 1, January, 2018

              Tor Helleseth and   
                   Bart Preneel   Editorial: Special issue on recent
                                  trends in cryptography . . . . . . . . . 1--3
                  Michael Scott   Missing a trick: Karatsuba variations    5--15
              Houda Ferradi and   
  Rémi Géraud and   
               Diana Maimut and   
             David Naccache and   
                      Hang Zhou   Backtracking-assisted multiplication . . 17--26
                Sonia Bogos and   
                John Gaspoz and   
                 Serge Vaudenay   Cryptanalysis of a homomorphic
                                  encryption scheme  . . . . . . . . . . . 27--39
   Marie-Sarah Lacharité   Security of BLS and BGLS signatures in a
                                  multi-user setting . . . . . . . . . . . 41--58
      Valérie Nachef and   
            Jacques Patarin and   
                 Emmanuel Volte   Generic attacks with standard deviation
                                  analysis on $a$-Feistel schemes  . . . . 59--77
             Brett Hemenway and   
               Rafail Ostrovsky   Efficient robust secret sharing from
                                  expander graphs  . . . . . . . . . . . . 79--99
Éloi de Chérisey and   
            Sylvain Guilley and   
             Annelie Heuser and   
                  Olivier Rioul   On the optimality and practicability of
                                  mutual information analysis in some
                                  scenarios  . . . . . . . . . . . . . . . 101--121
                Gregory G. Rose   KISS: A bit too simple . . . . . . . . . 123--137
              Geong Sen Poh and   
    Moesfa Soeheila Mohamad and   
                   Ji-Jian Chin   Searchable symmetric encryption over
                                  multiple servers . . . . . . . . . . . . 139--158
        Tomás Fabsic and   
              Otokar Grosek and   
               Karol Nemoga and   
                    Pavol Zajac   On generating invertible circulant
                                  binary matrices with a prescribed number
                                  of ones  . . . . . . . . . . . . . . . . 159--175
           Christian Forler and   
                   Eik List and   
               Stefan Lucks and   
                   Jakob Wenzel   POEx: A beyond-birthday-bound-secure
                                  on-line cipher . . . . . . . . . . . . . 177--193
               Tingting Cui and   
              Huaifeng Chen and   
                   Long Wen and   
                    Meiqin Wang   Statistical integral attack on CAST-256
                                  and IDEA . . . . . . . . . . . . . . . . 195--209
      Cécile Pierrot and   
            Benjamin Wesolowski   Malleability of the blockchain's entropy 211--233

Cryptography and Communications
Volume 10, Number 2, March, 2018

        Nurdagül Anbar and   
                 Wilfried Meidl   Modified planar functions and their
                                  components . . . . . . . . . . . . . . . 235--249
               Zuling Chang and   
 Martianus Frederic Ezerman and   
                   San Ling and   
                  Huaxiong Wang   Construction of de Bruijn sequences from
                                  product of two irreducible polynomials   251--275
                    Lin Sok and   
                 MinJia Shi and   
            Patrick Solé   Classification and Construction of
                                  quaternary self-dual bent functions  . . 277--289
                    Pan Tan and   
             Zhengchun Zhou and   
                  Deng Tang and   
                  Tor Helleseth   The weight distribution of a class of
                                  two-weight linear codes derived from
                                  Kloosterman sums . . . . . . . . . . . . 291--299
                 Gaojun Luo and   
                 Xiwang Cao and   
                Shanding Xu and   
                       Jiafu Mi   Binary linear codes with two or three
                                  weights from Niho exponents  . . . . . . 301--318
                  Cunsheng Ding   A sequence construction of cyclic codes
                                  over finite fields . . . . . . . . . . . 319--341
               Mokshi Goyal and   
                     Madhu Raka   Quadratic residue codes over the ring $
                                  \mathbb {F}_p[u] / \langle u^m - u
                                  \rangle $ and their Gray images  . . . . 343--355
   Santiago Barrera Acevedo and   
                 Heiko Dietrich   Perfect sequences over the quaternions
                                  and $ (4 n, 2, 4 n, 2 n)$-relative
                                  difference sets in $ C_n \times Q_8$ . . 357--368
                 Andrew Klapper   Matrix parametrized shift registers  . . 369--382
              Elena Dubrova and   
          Mats Näslund and   
        Göran Selander and   
              Fredrik Lindqvist   Message Authentication Based on
                                  Cryptographically Secure CRC without
                                  Polynomial Irreducibility Test . . . . . 383--399

Cryptography and Communications
Volume 10, Number 3, May, 2018

            Anuradha Sharma and   
                  Taranjot Kaur   Enumeration formulae for self-dual,
                                  self-orthogonal and complementary-dual
                                  quasi-cyclic codes over finite fields    401--435
                Shanding Xu and   
                 Xiwang Cao and   
                Guangkui Xu and   
                     Gaojun Luo   Two classes of near-optimal
                                  frequency-hopping sequence sets with
                                  prime-power period . . . . . . . . . . . 437--454
               Li-Ping Wang and   
                     Daqing Wan   On lattice-based algebraic feedback
                                  shift registers synthesis for
                                  multisequences . . . . . . . . . . . . . 455--465
                  Yuhua Sun and   
                 Qiang Wang and   
                  Tongjiang Yan   The exact autocorrelation distribution
                                  and $2$-adic complexity of a class of
                                  binary sequences with almost optimal
                                  autocorrelation  . . . . . . . . . . . . 467--477
                  Amit Jana and   
                    Goutam Paul   Revisiting RC4 key collision: Faster
                                  search algorithm and new $ 22$-byte
                                  colliding key pairs  . . . . . . . . . . 479--508
              Serdar Boztas and   
        Ferruh Özbudak and   
                      Eda Tekin   Generalized nonbinary sequences with
                                  perfect autocorrelation, flexible
                                  alphabets and new periods  . . . . . . . 509--517
                     R. Sobhani   Cyclic codes over a non-commutative
                                  finite chain ring  . . . . . . . . . . . 519--530
                Kangquan Li and   
               Longjiang Qu and   
                    Xi Chen and   
                        Chao Li   Permutation polynomials of the form $ c
                                  x + \hbox {Tr}_{q^l / q}(x^a) $ and
                                  permutation trinomials over finite
                                  fields with even characteristic  . . . . 531--554
                 Xuli Zhang and   
                 Jing Jiang and   
                  Minquan Cheng   Bounds and constructions for $ \overline
                                  {3}$-strongly separable codes with
                                  length $3$ . . . . . . . . . . . . . . . 555--565
              Zhengbang Zha and   
                     Lei Hu and   
                 Zhizheng Zhang   New results on permutation polynomials
                                  of the form $ (x^{p m} - x + \delta)^s +
                                  x^{p m} + x $ over $ \mathbb {F} p^{2 m}
                                  $  . . . . . . . . . . . . . . . . . . . 567--578

Cryptography and Communications
Volume 10, Number 4, July, 2018

               Xiusheng Liu and   
                Hai Q. Dinh and   
                  Hualu Liu and   
                        Long Yu   On new quantum codes from matrix product
                                  codes  . . . . . . . . . . . . . . . . . 579--589
               Zongxiang Yi and   
               Zhiqiang Lin and   
                      Lishan Ke   A generic method to construct
                                  zero-difference balanced functions . . . 591--609
                Yousuf Alsalami   Constructions with high algebraic degree
                                  of differentially $4$-uniform $ (n, n -
                                  1)$-functions and differentially
                                  $8$-uniform $ (n, n - 2)$-functions  . . 611--628
          Kalikinkar Mandal and   
                    Bo Yang and   
                 Guang Gong and   
                   Mark Aagaard   On ideal $t$-tuple distribution of
                                  filtering de Bruijn sequence generators  629--641
               Zhonghua Sun and   
                 Shixin Zhu and   
                      Liqi Wang   The symbol-pair distance distribution of
                                  a class of repeated-root cyclic codes
                                  over $ \mathbb {F}_{p^m} $ . . . . . . . 643--653
          Francis N. Castro and   
             Luis A. Medina and   
              Ivelisse M. Rubio   Exact $2$-divisibility of exponential
                                  sums associated to boolean functions . . 655--666
             Elena Barcucci and   
            Antonio Bernini and   
            Stefano Bilotta and   
                  Renzo Pinzani   A $2$D non-overlapping code over a
                                  $q$-ary alphabet . . . . . . . . . . . . 667--683
                Somphong Jitman   Good integers and some applications in
                                  coding theory  . . . . . . . . . . . . . 685--704
         Aleksandr Tuxanidy and   
                     Qiang Wang   Characteristic digit-sum sequences . . . 705--717
               Lucky Galvez and   
               Jon-Lark Kim and   
                   Nari Lee and   
              Young Gun Roe and   
                  Byung-Sun Won   Some bounds on binary LCD codes  . . . . 719--728

Cryptography and Communications
Volume 10, Number 5, September, 2018

                Subhamoy Maitra   Guest editorial  . . . . . . . . . . . . 729--730
                 Ashwin Jha and   
                   Mridul Nandi   On rate-1 and beyond-the-birthday bound
                                  secure online ciphers using tweakable
                                  block ciphers  . . . . . . . . . . . . . 731--753
               Tingting Cui and   
              Huaifeng Chen and   
             Sihem Mesnager and   
                   Ling Sun and   
                    Meiqin Wang   Statistical integral distinguisher with
                                  multi-structure and its application on
                                  AES-like ciphers . . . . . . . . . . . . 755--776
        Kenneth G. Paterson and   
            Jacob C. N. Schuldt   Statistical attacks on cookie masking
                                  for RC4  . . . . . . . . . . . . . . . . 777--801
            Matthias Hamann and   
            Matthias Krause and   
                Willi Meier and   
                      Bin Zhang   Design and analysis of small-state
                                  grain-like stream ciphers  . . . . . . . 803--834
        Subhabrata Samajder and   
                  Palash Sarkar   Success probability of
                                  multiple/multidimensional linear
                                  cryptanalysis under general key
                                  randomisation hypotheses . . . . . . . . 835--879
                Goutam Paul and   
                     Souvik Ray   Analysis of burn-in period for RC4 state
                                  transition . . . . . . . . . . . . . . . 881--908
              Claude Carlet and   
                Sylvain Guilley   Statistical properties of side-channel
                                  and fault injection attacks using coding
                                  theory . . . . . . . . . . . . . . . . . 909--933
      Srimanta Bhattacharya and   
                   Mridul Nandi   A note on the chi-square method: A tool
                                  for proving cryptographic security . . . 935--957
            Matthias Hamann and   
                Matthias Krause   On stream ciphers with provable
                                  beyond-the-birthday-bound security
                                  against time-memory-data tradeoff
                                  attacks  . . . . . . . . . . . . . . . . 959--1012

Cryptography and Communications
Volume 10, Number 6, November, 2018

László Mérai and   
                 Arne Winterhof   On the pseudorandomness of automatic
                                  sequences  . . . . . . . . . . . . . . . 1013--1022
                    Tao Bai and   
                     Yongbo Xia   A new class of permutation trinomials
                                  constructed from Niho exponents  . . . . 1023--1036
             Wilfried Meidl and   
           Ísabel Pirsic   On the normality of $p$-ary bent
                                  functions  . . . . . . . . . . . . . . . 1037--1049
                  Claude Carlet   On the nonlinearity of monotone Boolean
                                  functions  . . . . . . . . . . . . . . . 1051--1061
                    Ting Gu and   
              Zhixiong Chen and   
                 Andrew Klapper   Correlation immune functions with
                                  respect to the $q$-transform . . . . . . 1063--1073
            Sartaj Ul Hasan and   
             Daniel Panario and   
                     Qiang Wang   Nonlinear vectorial primitive recursive
                                  sequences  . . . . . . . . . . . . . . . 1075--1090
                 Gaojun Luo and   
                     Xiwang Cao   Complete weight enumerators of three
                                  classes of linear codes  . . . . . . . . 1091--1108
                   Rong Luo and   
               Udaya Parampalli   Cyclic codes over $ M_2 (\mathbb {F}_2 +
                                  u \mathbb {F}_2) $ . . . . . . . . . . . 1109--1117
                 Gaojun Luo and   
                     Xiwang Cao   Five classes of optimal two-weight
                                  linear codes . . . . . . . . . . . . . . 1119--1135
        Subhabrata Samajder and   
                  Palash Sarkar   Multiple (Truncated) Differential
                                  Cryptanalysis: Explicit Upper Bounds on
                                  Data Complexity  . . . . . . . . . . . . 1137--1163
                Xueying Shi and   
                    Qin Yue and   
                   Yaotsu Chang   Some quantum MDS codes with large
                                  minimum distance from generalized
                                  Reed--Solomon codes  . . . . . . . . . . 1165--1182
               Zuling Chang and   
 Martianus Frederic Ezerman and   
                   San Ling and   
                  Huaxiong Wang   The cycle structure of LFSR with
                                  arbitrary characteristic polynomial over
                                  finite fields  . . . . . . . . . . . . . 1183--1202
                Somphong Jitman   Correction to: Good integers and some
                                  applications in coding theory  . . . . . 1203--1203


Cryptography and Communications
Volume 11, Number 1, 2019

            Lilya Budaghyan and   
              Claude Carlet and   
                  Tor Helleseth   Editorial: Special Issue on Boolean
                                  functions and their applications . . . . 1--2
                    Irene Villa   On APN functions $ L_1 (x^3) + L_2 (x^9)
                                  $ with linear $ L_1 $ and $ L_2 $  . . . 3--20
              Valeriya Idrisova   On an algorithm generating $2$-to-$1$
                                  APN functions and its applications to
                                  ``the big APN problem''  . . . . . . . . 21--39
                Luca Mariot and   
              Stjepan Picek and   
           Alberto Leporati and   
              Domagoj Jakobovic   Cellular automata based S-boxes  . . . . 41--62
             Sihem Mesnager and   
             Zhengchun Zhou and   
                  Cunsheng Ding   On the nonlinearity of Boolean functions
                                  with restricted input  . . . . . . . . . 63--76
               Bimal Mandal and   
         Pantelimon Stanica and   
            Sugata Gangopadhyay   New classes of $p$-ary bent functions    77--92
 Çagdas Çalik and   
   Meltem Sönmez Turan and   
            René Peralta   The multiplicative complexity of
                                  $6$-variable Boolean functions . . . . . 93--107
                 Joan Boyar and   
        Magnus Gausdal Find and   
            René Peralta   Small low-depth circuits for
                                  cryptographic applications . . . . . . . 109--127
                    Nian Li and   
                  Tor Helleseth   New permutation trinomials from Niho
                                  exponents over finite fields with even
                                  characteristic . . . . . . . . . . . . . 129--136

Cryptography and Communications
Volume 11, Number 2, 2019

                Hongwei Liu and   
                 Youcef Maouche   Several new classes of linear codes with
                                  few weights  . . . . . . . . . . . . . . 137--146
Umberto Martínez-Peñas   Universal secure rank-metric coding
                                  schemes with optimal communication
                                  overheads  . . . . . . . . . . . . . . . 147--166
                   Lin Wang and   
                         Zhi Hu   Injectivity on distribution of elements
                                  in the compressed sequences derived from
                                  primitive sequences over $ \mathbb
                                  {Z_{p^e}} $  . . . . . . . . . . . . . . 167--189
               Jerod Michel and   
                        Qi Wang   Some new balanced and almost balanced
                                  quaternary sequences with low
                                  autocorrelation  . . . . . . . . . . . . 191--206
               Enes Pasalic and   
           Samir Hod\vzi\'c and   
             Fengrong Zhang and   
                 Yongzhuang Wei   Bent functions from nonlinear
                                  permutations and conversely  . . . . . . 207--225
                 Huali Deng and   
                    Dabin Zheng   More classes of permutation trinomials
                                  with Niho exponents  . . . . . . . . . . 227--236
                  Olav Geil and   
            Ferruh Özbudak   On affine variety codes from the Klein
                                  quartic  . . . . . . . . . . . . . . . . 237--257
                      Haode Yan   A note on the constructions of MDS
                                  self-dual codes  . . . . . . . . . . . . 259--268
                Qichun Wang and   
             Pantelimon Stanica   New bounds on the covering radius of the
                                  second order Reed--Muller code of length
                                  $ 128 $  . . . . . . . . . . . . . . . . 269--277
                Kangquan Li and   
               Longjiang Qu and   
                     Qiang Wang   Compositional inverses of permutation
                                  polynomials of the form $ x^r h(x^s) $
                                  over finite fields . . . . . . . . . . . 279--298
                    Zhe Gao and   
                    Chao Li and   
                       Yue Zhou   Upper bounds and constructions of
                                  complete Asynchronous channel hopping
                                  systems  . . . . . . . . . . . . . . . . 299--312
                  Gaofei Wu and   
                        Nian Li   Several classes of permutation
                                  trinomials over $ \mathbb {F}_{5^n} $
                                  from Niho exponents  . . . . . . . . . . 313--324
            Mohammad Ashraf and   
                Ghulam Mohammad   Quantum codes over $ F_p $ from cyclic
                                  codes over $ F_p[u, v] / \langle u^2 -
                                  1, v^3 - v, u v - v u \rangle $  . . . . 325--335
                  Yuhua Sun and   
                 Qiang Wang and   
                  Tongjiang Yan   A lower bound on the $2$-adic complexity
                                  of the modified Jacobi sequence  . . . . 337--349
              Saeed Rostami and   
              Elham Shakour and   
  Mohammad Ali Orumiehchiha and   
                 Josef Pieprzyk   Cryptanalysis of WG-8 and WG-16 stream
                                  ciphers  . . . . . . . . . . . . . . . . 351--362

Cryptography and Communications
Volume 11, Number 3, 2019

            Lilya Budaghyan and   
                 Chunlei Li and   
              Matthew G. Parker   Editorial: Special Issue on Mathematical
                                  Methods for Cryptography . . . . . . . . 363--365
                   Kaisa Nyberg   Affine linear cryptanalysis  . . . . . . 367--377
              Svetla Nikova and   
           Ventzislav Nikov and   
                 Vincent Rijmen   Decomposition of permutations in a
                                  finite field . . . . . . . . . . . . . . 379--384
               Kerem Varici and   
              Svetla Nikova and   
           Ventzislav Nikov and   
                 Vincent Rijmen   Constructions of S-boxes with uniform
                                  sharing  . . . . . . . . . . . . . . . . 385--398
László Csirmaz and   
            Péter Ligeti   Secret sharing on large girth graphs . . 399--410
                   Yao Chen and   
           Benjamin M. Case and   
                Shuhong Gao and   
                     Guang Gong   Error analysis of weak Poly--LWE
                                  instances  . . . . . . . . . . . . . . . 411--426
                  Patrick Felke   On the security of biquadratic $ C^* $
                                  public-key cryptosystems and its
                                  generalizations  . . . . . . . . . . . . 427--442
        Håvard Raddum and   
          Srimathi Varadharajan   Factorization using binary decision
                                  diagrams . . . . . . . . . . . . . . . . 443--460
                 V. A. Zinoviev   On classical Kloosterman sums  . . . . . 461--496
              Assen Bojilov and   
          Lyubomir Borissov and   
                  Yuri Borissov   Computing the number of finite field
                                  elements with prescribed absolute trace
                                  and co-trace . . . . . . . . . . . . . . 497--507
                    Nian Li and   
                 Xiangyong Zeng   A survey on the applications of Niho
                                  exponents  . . . . . . . . . . . . . . . 509--548
           Torleiv Klòve   Codes of length two correcting single
                                  errors of limited size . . . . . . . . . 549--555

Cryptography and Communications
Volume 11, Number 4, 2019

                  Marco Buratti   Hadamard partitioned difference families
                                  and their descendants  . . . . . . . . . 557--562
                   Ziran Tu and   
                 Xiangyong Zeng   A class of permutation trinomials over
                                  finite fields of odd characteristic  . . 563--583
                 Diego Napp and   
            Ricardo Pereira and   
               Raquel Pinto and   
                    Paula Rocha   Periodic state-space representations of
                                  periodic convolutional codes . . . . . . 585--595
                 Masaaki Harada   Singly even self-dual codes of length $
                                  24 k + 10 $ and minimum weight $ 4 k + 2
                                  $  . . . . . . . . . . . . . . . . . . . 597--608
                 Shudi Yang and   
                    Qin Yue and   
                Yansheng Wu and   
                   Xiangli Kong   Complete weight enumerators of a class
                                  of two-weight linear codes . . . . . . . 609--620
              Ville Junnila and   
              Tero Laihonen and   
                Gabrielle Paris   Optimal bounds on codes for location in
                                  circulant graphs . . . . . . . . . . . . 621--640
        Selçuk Kavut and   
               Sevdenur Baloglu   Results on symmetric S-boxes constructed
                                  by concatenation of RSSBs  . . . . . . . 641--660
             Limengnan Zhou and   
               Daiyuan Peng and   
                   Xing Liu and   
                 Hongyu Han and   
                       Zheng Ma   Frequency-hopping sequence sets with
                                  good aperiodic Hamming correlation
                                  property . . . . . . . . . . . . . . . . 661--675
             Masaaki Harada and   
                      Ken Saito   Binary linear complementary dual codes   677--696
             Sabyasachi Dey and   
                 Santanu Sarkar   Settling the mystery of $ Z_r = r $ in
                                  RC4  . . . . . . . . . . . . . . . . . . 697--715
                 Liqin Qian and   
                 Minjia Shi and   
            Patrick Solé   On self-dual and LCD quasi-twisted codes
                                  of index two over a special chain ring   717--734
                  Zibi Xiao and   
             Xiangyong Zeng and   
                 Chaoyun Li and   
                   Yupeng Jiang   Binary sequences with period $N$ and
                                  nonlinear complexity $ N - 2$  . . . . . 735--757
                  Gang Wang and   
                Min-Yao Niu and   
                    Fang-Wei Fu   Deterministic constructions of
                                  compressed sensing matrices based on
                                  codes  . . . . . . . . . . . . . . . . . 759--775
               Alexey Oblaukhov   A lower bound on the size of the largest
                                  metrically regular subset of the Boolean
                                  cube . . . . . . . . . . . . . . . . . . 777--791
          Anastasiya Gorodilova   On the differential equivalence of APN
                                  functions  . . . . . . . . . . . . . . . 793--813
                      Yu Li and   
              Tongjiang Yan and   
                       Chuan Lv   Construction of a Near-Optimal
                                  Quasi-Complementary Sequence Set from
                                  Almost Difference Set  . . . . . . . . . 815--824
                 Gaojun Luo and   
                     Xiwang Cao   Two constructions of asymptotically
                                  optimal codebooks  . . . . . . . . . . . 825--838

Cryptography and Communications
Volume 11, Number 5, 2019

         Joan-Josep Climent and   
    Verónica Requena and   
           Xaro Soler-Escriv\`a   A construction of Abelian non-cyclic
                                  orbit codes  . . . . . . . . . . . . . . 839--852
                  Gaofei Wu and   
        Matthew Geoffrey Parker   On Boolean functions with several flat
                                  spectra  . . . . . . . . . . . . . . . . 853--880
            Antti Laaksonen and   
Patric R. J. Östergård   New lower bounds on $q$-ary
                                  error-correcting codes . . . . . . . . . 881--889
                  Nuh Aydin and   
              Ghada Bakbouk and   
       Jonathan G. G. Lambrinos   New linear codes over non-prime fields   891--902
            Daniele Bartoli and   
       Alexander A. Davydov and   
          Massimo Giulietti and   
          Stefano Marcugini and   
             Fernanda Pambianco   New bounds for linear codes of covering
                                  radii 2 and 3  . . . . . . . . . . . . . 903--920
              Muhiddin Uguz and   
             Ali Doganaksoy and   
                Fatih Sulak and   
              Onur Koçak   R-2 composition tests: a family of
                                  statistical randomness tests for a
                                  collection of binary sequences . . . . . 921--949
                   Lin Wang and   
                         Zhi Hu   New explicit injective compressing
                                  mappings on primitive sequences over $
                                  \mathbb {Z}_{p^e} $  . . . . . . . . . . 951--963
                 Hila Rabii and   
                    Osnat Keren   A new class of security oriented error
                                  correcting robust codes  . . . . . . . . 965--978
                   Ying Gao and   
                  Zihui Liu and   
                      Yiwei Liu   The separation of binary relative
                                  three-weight codes and its applications  979--992
              Richard Hofer and   
                 Arne Winterhof   $r$-th order nonlinearity, correlation
                                  measure and least significant bit of the
                                  discrete logarithm . . . . . . . . . . . 993--997
                 Avaz Naghipour   New classes of quantum codes on closed
                                  orientable surfaces  . . . . . . . . . . 999--1008
             Trygve Johnsen and   
                 Hugues Verdure   Relative profiles and extended weight
                                  polynomials of almost affine codes . . . 1009--1020
Ismael Gutiérrez Garc\'ìa and   
   Daladier Jabba Molinares and   
             Ivan Molina Naizir   A novel maximum distance separable code
                                  to generate universal identifiers  . . . 1021--1035
                 Yana Liang and   
                  Jiali Cao and   
                Xingfa Chen and   
                Shiping Cai and   
                      Xiang Fan   Linear complexity of Ding--Helleseth
                                  generalized cyclotomic sequences of
                                  order eight  . . . . . . . . . . . . . . 1037--1056
                  Libo Wang and   
                 Baofeng Wu and   
              Xiaoqiang Yue and   
                   Yanbin Zheng   Further results on permutation
                                  trinomials with Niho exponents . . . . . 1057--1068
        Aleksandar Radonjic and   
               Vladimir Vujicic   Integer codes correcting sparse byte
                                  errors . . . . . . . . . . . . . . . . . 1069--1077
              S. Hod\vzi\'c and   
                 E. Pasalic and   
               A. Chattopadhyay   An iterative method for linear
                                  decomposition of index generating
                                  functions  . . . . . . . . . . . . . . . 1079--1102
            Cem Güneri and   
        Ferruh Özbudak and   
           Elif Saçikara   A concatenated construction of linear
                                  complementary pair of codes  . . . . . . 1103--1114
             Allison Beemer and   
           Kathryn Haymaker and   
            Christine A. Kelley   Absorbing sets of codes from finite
                                  geometries . . . . . . . . . . . . . . . 1115--1131
              Chunming Tang and   
                 Yanfeng Qi and   
                  Dongmei Huang   Regular $p$-ary bent functions with five
                                  terms and Kloosterman sums . . . . . . . 1133--1144

Cryptography and Communications
Volume 11, Number 6, November, 2019

            Lilya Budaghyan and   
              Claude Carlet and   
                  Tor Helleseth   Editorial: Special issue on Boolean
                                  functions and their applications 2018    1145--1146
              Anne Canteaut and   
          Léo Perrin and   
                    Shizhu Tian   If a generalised butterfly is APN then
                                  it operates on 6 bits  . . . . . . . . . 1147--1164
            Nikolay S. Kaleyski   Changing APN functions at two points . . 1165--1184
                  Deng Tang and   
                       Jian Liu   A family of weightwise (almost)
                                  perfectly balanced boolean functions
                                  with optimal algebraic immunity  . . . . 1185--1197
                 Xiang-dong Hou   On a class of permutation trinomials in
                                  characteristic 2 . . . . . . . . . . . . 1199--1210
              Claude Gravel and   
             Daniel Panario and   
                  David Thomson   Unicyclic strong permutations  . . . . . 1211--1231
             Wilfried Meidl and   
                 Alexander Pott   Generalized bent functions into $
                                  \mathbb {Z}_{p^k} $ from the partial
                                  spread and the Maiorana--McFarland class 1233--1245
             Sihem Mesnager and   
            Constanza Riera and   
             Pantelimon Stanica   Multiple characters transforms and
                                  generalized Boolean functions  . . . . . 1247--1260
                 Gaojun Luo and   
                 Xiwang Cao and   
                 Sihem Mesnager   Several new classes of self-dual bent
                                  functions derived from involutions . . . 1261--1273
                   N. Cepak and   
                 E. Pasalic and   
         A. Muratovi\'c-Ribi\'c   Frobenius linear translators giving rise
                                  to new infinite classes of permutations
                                  and bent functions . . . . . . . . . . . 1275--1295
        Ferruh Özbudak and   
               RumI MelIh Pelen   Strongly regular graphs arising from
                                  non-weakly regular bent functions  . . . 1297--1306
          Patrick G. Cesarz and   
              Robert S. Coulter   Image sets with regularity of
                                  differences  . . . . . . . . . . . . . . 1307--1337
Luís T. A. N. Brandão and   
 Çagdas Çalik and   
   Meltem Sönmez Turan and   
            René Peralta   Upper bounds on the multiplicative
                                  complexity of symmetric Boolean
                                  functions  . . . . . . . . . . . . . . . 1339--1362


Cryptography and Communications
Volume 12, Number 1, January, 2020

                    Yun Gao and   
                Weijun Fang and   
                    Fang-Wei Fu   On the algebraic structure of
                                  quasi-cyclic codes of index $ 1 \frac
                                  {1}{2} $ . . . . . . . . . . . . . . . . 1--18
             Sihem Mesnager and   
               Kwang Ho Kim and   
                Junyop Choe and   
                  Chunming Tang   On the Menezes--Teske--Weng conjecture   19--27
                  Zexia Shi and   
                    Fang-Wei Fu   The primitive idempotents of irreducible
                                  constacyclic codes and LCD cyclic codes  29--52
                 Minjia Shi and   
                Hongwei Zhu and   
                 Liqin Qian and   
                    Lin Sok and   
            Patrick Solé   On self-dual and LCD double circulant
                                  and double negacirculant codes over $
                                  \mathbb {F}_q + u \mathbb {F}_q $  . . . 53--70
                Moshe Milshtein   A new two-error-correcting binary code
                                  of length 16 . . . . . . . . . . . . . . 71--75
                  Deng Tang and   
                  Haode Yan and   
             Zhengchun Zhou and   
                 Xiaosong Zhang   A new lower bound on the second-order
                                  nonlinearity of a class of monomial bent
                                  functions  . . . . . . . . . . . . . . . 77--83
               L. Budaghyan and   
            Marco Calderini and   
                       I. Villa   On relations between CCZ- and
                                  EA-equivalences  . . . . . . . . . . . . 85--100
              Adel Alahmadi and   
            Cem Güneri and   
          Buket Özkaya and   
              Hatoon Shoaib and   
            Patrick Solé   On complementary dual multinegacirculant
                                  codes  . . . . . . . . . . . . . . . . . 101--113
                  Suman Roy and   
        Srinivasan Krishnaswamy   On the frequency of symbols in sequences
                                  generated by nonlinear Feedforward
                                  generators . . . . . . . . . . . . . . . 115--126
        Steven T. Dougherty and   
              Joseph Gildea and   
                    Abidin Kaya   Quadruple bordered constructions of
                                  self-dual codes from group rings . . . . 127--146
                 Fengwei Li and   
                    Qin Yue and   
                    Yansheng Wu   Designed distances and parameters of new
                                  LCD BCH codes over finite fields . . . . 147--163

Cryptography and Communications
Volume 12, Number 2, March, 2020

                 Tailin Niu and   
                Kangquan Li and   
               Longjiang Qu and   
                     Qiang Wang   New constructions of involutions over
                                  finite fields  . . . . . . . . . . . . . 165--185
                Guanmin Guo and   
                   Ruihu Li and   
                   Yang Liu and   
                     Junli Wang   A family of negacyclic BCH codes of
                                  length $ n = \frac {q^{2m} - 1}{2} $ . . 187--203
                   Li Shuai and   
                  Lina Wang and   
                    Li Miao and   
                   Xianwei Zhou   Differential uniformity of the
                                  composition of two functions . . . . . . 205--220
        Aleksandar Radonjic and   
               Vladimir Vujicic   Integer codes correcting burst
                                  asymmetric within a byte and double
                                  asymmetric errors  . . . . . . . . . . . 221--230
        Aleksandar Radonjic and   
               Vladimir Vujicic   Correction to: Integer codes correcting
                                  burst asymmetric errors within a byte
                                  and double asymmetric errors . . . . . . 231--231
             Zhongxiao Wang and   
             Qunxiong Zheng and   
                     Wenfeng Qi   The cycle structure of NFSR($ f^d$) and
                                  its applications . . . . . . . . . . . . 233--252
                   Ting Yao and   
                     Shixin Zhu   $ \mathbb {Z}_p \mathbb {Z}_{p^s}
                                  $-additive cyclic codes are
                                  asymptotically good  . . . . . . . . . . 253--264
               Zhonghua Sun and   
                 Shixin Zhu and   
                      Liqi Wang   A class of constacyclic BCH codes  . . . 265--284
               Makoto Araya and   
                 Masaaki Harada   On the minimum weights of binary linear
                                  complementary dual codes . . . . . . . . 285--300
                   Yuan Cao and   
                    Yonglin Cao   Complete classification for simple root
                                  cyclic codes over the local ring $
                                  \mathbb {Z}_4 [v] \slash \langle v^2 + 2
                                  v \rangle $  . . . . . . . . . . . . . . 301--319

Cryptography and Communications
Volume 12, Number 3, May, 2020

              Tor Helleseth and   
                 Wai Ho Mow and   
                 Zhengchun Zhou   Editorial: Special issue on sequences
                                  and their applications 2018  . . . . . . 321--323
                  Dan Zhang and   
    Matthew Geoffrey Parker and   
                  Tor Helleseth   Polyphase zero correlation zone
                                  sequences from generalised bent
                                  functions  . . . . . . . . . . . . . . . 325--335
                 Evgeny Krengel   One construction of perfect ternary
                                  sequences  . . . . . . . . . . . . . . . 337--347
                Yajing Zhou and   
             Zhengchun Zhou and   
                      Yong Wang   Two constructions for $ 16$-QAM
                                  complementary sequence sets with
                                  non-power-of-two length  . . . . . . . . 349--362
                  Yang Yang and   
                     Chunlei Li   New quaternary sequences with optimal
                                  odd-periodic autocorrelation magnitude   363--374
                  Deng Tang and   
                         Xia Li   A note on the minimal binary linear code 375--388
Domingo Gómez-Pérez and   
        Ana I. Gómez and   
                  Andrew Tirkel   Large families of sequences for CDMA,
                                  frequency hopping, and UWB . . . . . . . 389--403
                 Hongyu Han and   
                Sheng Zhang and   
                       Xing Liu   Decimated $m$-sequences families with
                                  optimal partial Hamming correlation  . . 405--413
                 Zhimin Sun and   
             Xiangyong Zeng and   
                         Da Lin   On the $N$-th maximum order complexity
                                  and the expansion complexity of a
                                  Rudin--Shapiro-like sequence . . . . . . 415--426
                 Chunlei Li and   
                      Yang Yang   On three conjectures of binary sequences
                                  with low odd-periodic autocorrelation    427--442
                 Minjia Shi and   
              Chenchen Wang and   
                 Yaoqiang Chang   One-weight and two-weight $ \mathbb
                                  {Z}_2 \mathbb {Z}_2 [u, v] $ -additive
                                  codes  . . . . . . . . . . . . . . . . . 443--454
                 Sihem Mesnager   On generalized hyper-bent functions  . . 455--468
                 Shuxing Li and   
                 Alexander Pott   A direct construction of primitive
                                  formally dual pairs having subsets with
                                  unequal sizes  . . . . . . . . . . . . . 469--483
             Limengnan Zhou and   
                 Hongyu Han and   
                       Xing Liu   Frequency-hopping sequence sets with
                                  no-hit-zone through Cartesian product    485--497
                   Malcolm Egan   Properties of tight frames that are
                                  regular schemes  . . . . . . . . . . . . 499--510
                Yansheng Wu and   
                    Qin Yue and   
                   Xiaomeng Zhu   Binary and ternary sequences with a few
                                  cross correlations . . . . . . . . . . . 511--525
            Lilya Budaghyan and   
        Nikolay S. Kaleyski and   
             Pantelimon Stanica   Partially APN Boolean functions and
                                  classes of functions that are not APN
                                  infinitely often . . . . . . . . . . . . 527--545
                 Xiwang Cao and   
                 Gaojun Luo and   
                    Guangkui Xu   Three deterministic constructions of
                                  compressed sensing matrices with low
                                  coherence  . . . . . . . . . . . . . . . 547--558
                     Xia Li and   
                Cuiling Fan and   
                      Xiaoni Du   A family of distance-optimal minimal
                                  linear codes with flexible parameters    559--567
                 Chengju Li and   
                    Qin Yue and   
                       Wei Peng   A class of exponential sums and sequence
                                  families . . . . . . . . . . . . . . . . 569--584
                Zilong Wang and   
                Jinjin Chai and   
                     Guang Gong   The Fourier spectral characterization
                                  for the correlation-immune functions
                                  over $ \mathbb {F}_p $ . . . . . . . . . 585--595
                   Ch. Srikanth   Certain sequence of arithmetic
                                  progressions and a new key sharing
                                  method . . . . . . . . . . . . . . . . . 597--612
     Krishna Gopal Benerjee and   
                Manish K. Gupta   On non-uniform flower codes  . . . . . . 613--643

Cryptography and Communications
Volume 12, Number 4, July, 2020

                  Zihui Liu and   
                  Jinliang Wang   Notes on generalized Hamming weights of
                                  some classes of binary codes . . . . . . 645--657
             Sihem Mesnager and   
               Kwang Ho Kim and   
                  Myong Song Jo   On the number of the rational zeros of
                                  linearized polynomials and the
                                  second-order nonlinearity of cubic
                                  Boolean functions  . . . . . . . . . . . 659--674
                  Yuhua Sun and   
              Tongjiang Yan and   
                   Lianhai Wang   The $2$-adic complexity of a class of
                                  binary sequences with optimal
                                  autocorrelation magnitude  . . . . . . . 675--683
           Christof Beierle and   
              Alex Biryukov and   
               Aleksei Udovenko   On degree-$d$ zero-sum sets of full rank 685--710
            Jasvinder Singh and   
               Manish Gupta and   
          Jaskarn Singh Bhullar   On the search of smallest QC-LDPC code
                                  with girth six and eight . . . . . . . . 711--723
                        Lu Zhao   About the linear complexity of
                                  quaternary sequences with even length    725--741
                Binbin Pang and   
                 Shixin Zhu and   
                   Xiaoshan Kai   Some new bounds on LCD codes over finite
                                  fields . . . . . . . . . . . . . . . . . 743--755
              J. A. Armario and   
                 D. L. Flannery   Almost supplementary difference sets and
                                  quaternary sequences with optimal
                                  autocorrelation  . . . . . . . . . . . . 757--768
                 Joe Gildea and   
               Rhian Taylor and   
                  A. Tylyshchak   Double bordered constructions of
                                  self-dual codes from group rings over
                                  Frobenius rings  . . . . . . . . . . . . 769--784
       José Ortiz-Ubarri   New asymptotically optimal
                                  three-dimensional wave-length/space/time
                                  optical orthogonal codes for OCDMA
                                  systems  . . . . . . . . . . . . . . . . 785--794
                   Liqin Hu and   
                     Keqin Feng   The minimum distance of new
                                  generalisations of the punctured binary
                                  Reed--Muller codes . . . . . . . . . . . 795--808
             Sihem Mesnager and   
               Kwang Ho Kim and   
                    Dae Song Go   Solving $ x + x^{2^l} + \cdots +
                                  x^{2^{ml}} = a $ over $ \mathbb
                                  {F}_{2^n} $  . . . . . . . . . . . . . . 809--817

Cryptography and Communications
Volume 12, Number 5, September, 2020

            Lilya Budaghyan and   
                  Tor Helleseth   Editorial: Special issue on Boolean
                                  functions and their applications . . . . 819--820
                Marco Calderini   On the EA-classes of known APN functions
                                  in small dimensions  . . . . . . . . . . 821--840
                  Patrick Felke   The multivariate method strikes again:
                                  New power functions with low
                                  differential uniformity in odd
                                  characteristic . . . . . . . . . . . . . 841--857
                 A. Musukwa and   
                        M. Sala   On the linear structures of balanced
                                  functions and quadratic APN functions    859--880
             Aleksandr Kutsenko   The group of automorphisms of the set of
                                  self-dual bent functions . . . . . . . . 881--898
Ayça Çesmelioglu and   
             Wilfried Meidl and   
                 Alexander Pott   Vectorial bent functions in odd
                                  characteristic and their components  . . 899--912
        Tekgül Kalayci and   
        Henning Stichtenoth and   
                 Alev Topuzoglu   Permutation polynomials and
                                  factorization  . . . . . . . . . . . . . 913--934
 Çagdas Çalik and   
   Meltem Sönmez Turan and   
            René Peralta   Boolean functions with multiplicative
                                  complexity 3 and 4 . . . . . . . . . . . 935--946
                Pavol Zajac and   
      Matús Jókay   Cryptographic properties of small
                                  bijective $S$-boxes with respect to
                                  modular addition . . . . . . . . . . . . 947--963
                    Nian Li and   
                 Sihem Mesnager   Recent results and problems on
                                  constructions of linear codes from
                                  cryptographic functions  . . . . . . . . 965--986
              Wrya K. Kadir and   
                     Chunlei Li   On decoding additive generalized twisted
                                  Gabidulin codes  . . . . . . . . . . . . 987--1009
              Cunsheng Ding and   
                  Chunming Tang   Combinatorial $t$-designs from special
                                  functions  . . . . . . . . . . . . . . . 1011--1033
             Luis A. Medina and   
          Matthew G. Parker and   
             Pantelimon Stanica   Root-Hadamard transforms and
                                  complementary sequences  . . . . . . . . 1035--1049
              Yuri Borissov and   
              Lyubomir Borissov   A note on the distinctness of some
                                  Kloosterman sums . . . . . . . . . . . . 1051--1056

Cryptography and Communications
Volume 12, Number 6, November, 2020

      Büsra Özden and   
                     Oguz Yayla   Almost $p$-ary sequences . . . . . . . . 1057--1069
                 Jing Jiang and   
                  Minquan Cheng   Regular $ (k, R, 1) $-packings with $
                                  \max (R) = 3 $ and their locally
                                  repairable codes . . . . . . . . . . . . 1071--1089
        Nurdagül Anbar and   
       Canan Kasikçi and   
                 Alev Topuzoglu   Shifted plateaued functions and their
                                  differential properties  . . . . . . . . 1091--1105
                   Yuan Cao and   
                Yonglin Cao and   
                    Fang-Wei Fu   Correcting mistakes in the paper ``A
                                  mass formula for negacyclic codes of
                                  length $ 2^k $ and some good negacyclic
                                  codes over $ \mathbb {Z}_4 + u \mathbb
                                  {Z}_4 $'' [Cryptogr. Commun. (2017)
                                  9:241--272]  . . . . . . . . . . . . . . 1107--1110
             Xiaoqiang Wang and   
                    Dabin Zheng   The subfield codes of several classes of
                                  linear codes . . . . . . . . . . . . . . 1111--1131
           Christof Beierle and   
                 Gregor Leander   $4$-uniform permutations with null
                                  nonlinearity . . . . . . . . . . . . . . 1133--1141
               Lijing Zheng and   
                   Jie Peng and   
                      Yanjun Li   Several new infinite families of bent
                                  functions via second order derivatives   1143--1160
            Marco Calderini and   
                    Irene Villa   On the boomerang uniformity of some
                                  permutation polynomials  . . . . . . . . 1161--1178
             Faruk Göloglu   Inverse function is not component-wise
                                  uniform  . . . . . . . . . . . . . . . . 1179--1194
                     Xia Wu and   
                     Wei Lu and   
                     Xiwang Cao   Two constructions of asymptotically
                                  optimal codebooks via the trace
                                  functions  . . . . . . . . . . . . . . . 1195--1211


Cryptography and Communications
Volume 13, Number 1, January, 2021

               Xiaolei Fang and   
                Meiqing Liu and   
                    Jinquan Luo   On Euclidean Hulls of MDS Codes  . . . . 1--14
                   Ming Yan and   
              Tongjiang Yan and   
                          Yu Li   Computing the $2$-adic complexity of two
                                  classes of Ding--Helleseth generalized
                                  cyclotomic sequences of periods of twin
                                  prime products . . . . . . . . . . . . . 15--26
        Wateekorn Sriwirach and   
              Chakkrid Klin-eam   Repeated-root constacyclic codes of
                                  length $ 2 p^s $ over $ \mathbb
                                  {F}_{p^m} + u \mathbb {F}_{p^m} + u^2
                                  \mathbb {F}_{p^m} $  . . . . . . . . . . 27--52
               Minfeng Shao and   
                      Ying Miao   Algebraic manipulation detection codes
                                  via highly nonlinear functions . . . . . 53--69
               Swapan Maiti and   
        Dipanwita Roy Chowdhury   Design of fault-resilient S-boxes for
                                  AES-like block ciphers . . . . . . . . . 71--100
                   Junru Ma and   
                    Jinquan Luo   On symbol-pair weight distribution of
                                  MDS codes and simplex codes over finite
                                  fields . . . . . . . . . . . . . . . . . 101--115
                  Can Xiang and   
                    Wenjuan Yin   Two families of subfield codes with a
                                  few weights  . . . . . . . . . . . . . . 117--127
                Refia Aksoy and   
          Fatma Çaliskan   Self-dual codes over $ \mathbb {F}_2
                                  \times (\mathbb {F}_2 + v \mathbb {F}_2)
                                  $  . . . . . . . . . . . . . . . . . . . 129--141
     Krishna Gopal Benerjee and   
                 Sourav Deb and   
                Manish K. Gupta   On conflict free DNA codes . . . . . . . 143--171
             Xiaoqiang Wang and   
                Dabin Zheng and   
                      Yan Zhang   A class of subfield codes of linear
                                  codes and their duals  . . . . . . . . . 173--196

Cryptography and Communications
Volume 13, Number 2, March, 2021

                    B. Rega and   
                  Z. H. Liu and   
                  C. Durairajan   The $t$-wise intersection and trellis of
                                  relative four-weight codes . . . . . . . 197--223
                 Liqin Qian and   
                 Xiwang Cao and   
                 Sihem Mesnager   Linear codes with one-dimensional hull
                                  associated with Gaussian sums  . . . . . 225--243
                   He Zhang and   
                     Xiwang Cao   Further constructions of cyclic subspace
                                  codes  . . . . . . . . . . . . . . . . . 245--262
           Iliya Bouyukliev and   
         Stefka Bouyuklieva and   
                Paskal Piperkov   Characteristic vector and weight
                                  distribution of a linear code  . . . . . 263--282
        Nurdagül Anbar and   
                  Canan Kasikci   Permutations polynomials of the form $
                                  G(X)^k - L(X) $ and curves over finite
                                  fields . . . . . . . . . . . . . . . . . 283--294
         Pantelimon Stanica and   
                    Aaron Geary   The $c$-differential behavior of the
                                  inverse function under the
                                  EA-equivalence . . . . . . . . . . . . . 295--306
                 Fanghui Ma and   
                   Jian Gao and   
                    Fang-Wei Fu   $ (\sigma, \delta)$-Skew quasi-cyclic
                                  codes over the ring $ \mathbb {Z}_4 + u
                                  \mathbb {Z}_4$ . . . . . . . . . . . . . 307--320
                Ajeet Kumar and   
            Subhamoy Maitra and   
       Chandra Sekhar Mukherjee   On approximate real mutually unbiased
                                  bases in square dimension  . . . . . . . 321--329
           Sophie Huczynska and   
      Christopher Jefferson and   
        Silvia Nepsinská   Strong external difference families in
                                  abelian and non-abelian groups . . . . . 331--341
              Jingwei Zhang and   
             Chuangqiang Hu and   
                  Chang-An Zhao   Trace representation of the binary $ p
                                  q^2$-periodic sequences derived from
                                  Euler quotients  . . . . . . . . . . . . 343--359
                Refia Aksoy and   
          Fatma Çaliskan   Correction to: Self-dual codes over $
                                  \mathbb {F}_2 \times (\mathbb {F}_2 + v
                                  \mathbb {F}_2) $ . . . . . . . . . . . . 361--362

Cryptography and Communications
Volume 13, Number 3, May, 2021

              Mustafa Faraj and   
              Catherine Gebotys   Quiescent photonics side channel
                                  analysis: Low cost SRAM readout attack   363--376
         Faruk Göloglu and   
            Jirí Pavl\du   On CCZ-inequivalence of some families of
                                  almost perfect nonlinear functions to
                                  permutations . . . . . . . . . . . . . . 377--391
                Wengang Jin and   
                  Xiaoni Du and   
                    Cuiling Fan   Boolean functions with six-valued Walsh
                                  spectra and their application  . . . . . 393--405
                  Zhiwen He and   
                    Jiejing Wen   Linear codes of 2-designs as subcodes of
                                  the generalized Reed--Muller codes . . . 407--423
          Briji J. Chathely and   
              Rajendra P. Deore   Construction of binary Hadamard codes
                                  and their $s$-PD sets  . . . . . . . . . 425--438
            Daniele Bartoli and   
              Matteo Bonini and   
       Burçin Günes   An inductive construction of minimal
                                  codes  . . . . . . . . . . . . . . . . . 439--449
           Aniruddha Biswas and   
                  Palash Sarkar   Separation results for boolean function
                                  classes  . . . . . . . . . . . . . . . . 451--458
                    Yubo Li and   
                Kangquan Li and   
                   Longjiang Qu   More permutations and involutions for
                                  constructing bent functions  . . . . . . 459--473

Cryptography and Communications
Volume 13, Number 4, July, 2021

                 Yves Aubry and   
Pierre Barthélémy and   
                Nadia El Mrabet   Special issue from mathematics to
                                  embedded devices . . . . . . . . . . . . 475--477
               Dmitrii Koshelev   Hashing to elliptic curves of
                                  $j$-invariant 1728 . . . . . . . . . . . 479--494
     Stéphane Ballet and   
           Alexis Bonnecaze and   
                Thanh-Hung Dang   Optimization of the scalar complexity of
                                  Chudnovsky$^2$ multiplication algorithms
                                  in finite fields . . . . . . . . . . . . 495--517
              Sarah Bordage and   
              Julien Lavauzelle   On the privacy of a code-based
                                  single-server computational PIR scheme   519--526
                  Wei Cheng and   
            Sylvain Guilley and   
                Jean-Luc Danger   Categorizing all linear codes of IPM
                                  over $ \mathbb {F}_{2^8} $ . . . . . . . 527--542
               Simon Landry and   
                Yanis Linge and   
                Emmanuel Prouff   Monomial evaluation of polynomial
                                  functions protected by threshold
                                  implementations --- with an illustration
                                  on AES . . . . . . . . . . . . . . . . . 543--572
Charles-Henry Bertrand Van Ouytsel and   
          Olivier Bronchain and   
François-Xavier Standaert   How to fool a black box machine learning
                                  based side-channel security evaluation   573--585
              Charles Momin and   
          Olivier Bronchain and   
François-Xavier Standaert   A stealthy Hardware Trojan based on a
                                  Statistical Fault Attack . . . . . . . . 587--600

Cryptography and Communications
Volume 13, Number 5, September, 2021

            S. T. Dougherty and   
                 Joe Gildea and   
                Serap Sahinkaya   $G$-codes, self-dual $G$-codes and
                                  reversible $G$-codes over the ring $
                                  \mathscr {B}_{j, k}$ . . . . . . . . . . 601--616
                Yanhong Fan and   
             Sihem Mesnager and   
                    Meiqin Wang   Investigation for 8-bit SKINNY-like
                                  S-boxes, analysis and applications . . . 617--636
               Enes Pasalic and   
René Rodríguez and   
                 Yongzhuang Wei   Several classes of minimal binary linear
                                  codes violating the Ashikhmin--Barg
                                  bound  . . . . . . . . . . . . . . . . . 637--659
                 Jingjie Lv and   
                   Ruihu Li and   
                         Yu Yao   Quasi-cyclic constructions of asymmetric
                                  quantum error-correcting codes . . . . . 661--680
                 Xiang-dong Hou   A power sum formula by Carlitz and its
                                  applications to permutation rational
                                  functions of finite fields . . . . . . . 681--694
                Pavan Kumar and   
             Noor Mohammad Khan   A class of linear codes with their
                                  complete weight enumerators over finite
                                  fields . . . . . . . . . . . . . . . . . 695--725
               Xiaoping Shi and   
                    Qin Yue and   
                   Xinmei Huang   Quantum synchronizable codes from the
                                  Whiteman's generalized cyclotomy . . . . 727--739
          Pierrick Méaux   On the fast algebraic immunity of
                                  threshold functions  . . . . . . . . . . 741--762
                   Chen Liu and   
               Shuaijun Liu and   
                 Zhengchun Zhou   Three-phase $Z$-complementary triads and
                                  almost complementary triads  . . . . . . 763--773
                K. T. Arasu and   
           Daniel M. Gordon and   
                    Yiran Zhang   New nonexistence results on circulant
                                  weighing matrices  . . . . . . . . . . . 775--789
               Damien Jamet and   
              Pierre Popoli and   
                   Thomas Stoll   Maximum order complexity of the sum of
                                  digits function in Zeckendorf base and
                                  polynomial subsequences  . . . . . . . . 791--814
          Lukas Kölsch and   
            Robert Schüler   Formal self duality  . . . . . . . . . . 815--836
                 Kamil Otal and   
                      Eda Tekin   Efficient generation of quadratic
                                  cyclotomic classes for shortest
                                  quadratic decompositions of polynomials  837--845
                     Ge Yao and   
               Udaya Parampalli   Cryptanalysis of the class of maximum
                                  period Galois NLFSR-based stream ciphers 847--864
                  Zibi Xiao and   
                 Xiangyong Zeng   2-Adic complexity of two constructions
                                  of binary sequences with period $ 4 N $
                                  and optimal autocorrelation magnitude    865--885

Cryptography and Communications
Volume 13, Number 6, November, 2021

            Lilya Budaghyan and   
              Claude Carlet and   
                   Kaisa Nyberg   Editorial: Special issue on Boolean
                                  functions and their applications 2020    887--889
         Pantelimon Stanica and   
            Constanza Riera and   
                Anton Tkachenko   Characters, Weil sums and
                                  $c$-differential uniformity with an
                                  application to the perturbed Gold
                                  function . . . . . . . . . . . . . . . . 891--907
               Nikolay Kolomeec   Some general properties of modified bent
                                  functions through addition of indicator
                                  functions  . . . . . . . . . . . . . . . 909--926
              Cunsheng Ding and   
                  Chunming Tang   The linear codes of $t$-designs held in
                                  the Reed--Muller and Simplex codes . . . 927--949
             Sihem Mesnager and   
                      Sihong Su   On constructions of weightwise perfectly
                                  balanced Boolean functions . . . . . . . 951--979
             Benjamin Chase and   
                   Petr Lisonek   Kim-type APN functions are affine
                                  equivalent to Gold functions . . . . . . 981--993
            Nikolay S. Kaleyski   Invariants for EA- and CCZ-equivalence
                                  of APN and AB functions  . . . . . . . . 995--1023
                  Jian Ding and   
                Changlu Lin and   
                 Sihem Mesnager   Secret sharing schemes based on the dual
                                  of Golay codes . . . . . . . . . . . . . 1025--1041


Cryptography and Communications
Volume 14, Number 1, January, 2022

                Dandan Wang and   
                     Xiwang Cao   A family of optimal ternary cyclic codes
                                  with minimum distance five and their
                                  duals  . . . . . . . . . . . . . . . . . 1--13
               A. Allahmadi and   
                A. AlKenani and   
                 P. Solé   New constructions of
                                  entanglement-assisted quantum codes  . . 15--37
               A. Allahmadi and   
                A. AlKenani and   
                 P. Solé   Correction to: New constructions of
                                  entanglement-assisted quantum codes  . . 39--39
             Siemen Dhooghe and   
                  Svetla Nikova   Resilient uniformity: applying
                                  resiliency in masking  . . . . . . . . . 41--58
              Habibul Islam and   
                     Om Prakash   Construction of LCD and new quantum
                                  codes from cyclic codes over a finite
                                  non-chain ring . . . . . . . . . . . . . 59--73
               Kwang Ho Kim and   
             Sihem Mesnager and   
                    Dok Nam Lee   Preimages of $p$-Linearized Polynomials
                                  over $ \mathbb {F}_p$  . . . . . . . . . 75--86
                 Huimin Lao and   
                   Hao Chen and   
                   Xiaoqing Tan   New constant dimension subspace codes
                                  from block inserting constructions . . . 87--99
                   S. Kudin and   
                 E. Pasalic and   
                       F. Zhang   Permutations without linear structures
                                  inducing bent functions outside the
                                  completed Maiorana--McFarland class  . . 101--116
       Vishnupriya Anupindi and   
László Mérai   Linear complexity of some sequences
                                  derived from hyperelliptic curves of
                                  genus 2  . . . . . . . . . . . . . . . . 117--134
                     Zhi Gu and   
             Zhengchun Zhou and   
               Udaya Parampalli   A new family of polyphase sequences with
                                  low correlation  . . . . . . . . . . . . 135--144
               Xiaolei Fang and   
                 Renjie Jin and   
                         Wen Ma   New Galois Hulls of GRS Codes and
                                  Application to EAQECCs . . . . . . . . . 145--159
               Qianhong Wan and   
                        Chao Li   On equivalence between two known
                                  families of APN polynomial functions and
                                  APN power functions  . . . . . . . . . . 161--182

Cryptography and Communications
Volume 14, Number 2, March, 2022

          Vladimir Edemskiy and   
                      Yuhua Sun   The symmetric 2-adic complexity of
                                  sequences with optimal autocorrelation
                                  magnitude and length $ 8 q $ . . . . . . 183--199
               Yongfeng Niu and   
                    Qin Yue and   
                   Daitao Huang   New constant dimension subspace codes
                                  from parallel linkage construction and
                                  multilevel construction  . . . . . . . . 201--214
                    Yan Liu and   
                     Xiwang Cao   A class of affine-invariant codes and
                                  their support 2-designs  . . . . . . . . 215--227
                     Ge Yao and   
               Udaya Parampalli   Improved transformation algorithms for
                                  generalized Galois NLFSRs  . . . . . . . 229--258
                  Heqian Xu and   
                         Wei Du   Hermitian LCD codes over $ \mathbb
                                  {F}_{q^2} + u \mathbb {F}_{q^2} $ and
                                  their applications to maximal
                                  entanglement EAQECCs . . . . . . . . . . 259--269
               Nikolay Kaleyski   Deciding EA-equivalence via invariants   271--290
             Limengnan Zhou and   
                   Xing Liu and   
                 Changyuan Wang   Classes of optimal low-hit-zone
                                  frequency-hopping sequence sets with new
                                  parameters . . . . . . . . . . . . . . . 291--306
             Limengnan Zhou and   
                     Hanzhou Wu   Multi-party watermark embedding with
                                  frequency-hopping sequences  . . . . . . 307--318
            Lilya Budaghyan and   
           Nikolay Kaleyski and   
             Pantelimon Stanica   On the behavior of some APN permutations
                                  under swapping points  . . . . . . . . . 319--345
                   Xing Liu and   
              Shaofang Hong and   
                 Limengnan Zhou   NHZ frequency hopping sequence sets
                                  under aperiodic Hamming correlation:
                                  Tighter bound and optimal constructions  347--356
                      Haode Yan   On $ ( - 1)$-differential uniformity of
                                  ternary APN power functions  . . . . . . 357--369
                  Sha Jiang and   
                Kangquan Li and   
                   Longjiang Qu   Differential and boomerang spectrums of
                                  some power permutations  . . . . . . . . 371--393
          Vladimir Edemskiy and   
             Nikita Sokolovskiy   The estimate of the linear complexity of
                                  generalized cyclotomic binary and
                                  quaternary sequences with periods $ p^n
                                  $ and $ 2 p^n $  . . . . . . . . . . . . 395--414
                Guangkui Xu and   
               Longjiang Qu and   
                     Gaojun Luo   Minimal linear codes from weakly regular
                                  bent functions . . . . . . . . . . . . . 415--431
          Michael Vielhaber and   
Mónica del Pilar Canales Chacón and   
           Sergio Jara Ceballos   Rational complexity of binary sequences,
                                  F$ \mathbb {Q} $SRs, and
                                  pseudo-ultrametric continued fractions
                                  in $ \mathbb {R} $ . . . . . . . . . . . 433--457
               Ana Salagean and   
             Pantelimon Stanica   Improving bounds on probabilistic affine
                                  tests to estimate the nonlinearity of
                                  Boolean functions  . . . . . . . . . . . 459--481
                  Haitao Li and   
                   Yang Liu and   
                      Gang Wang   Jump and hop randomness tests for binary
                                  sequences  . . . . . . . . . . . . . . . 483--502

Cryptography and Communications
Volume 14, Number 3, May, 2022

      Ángela Barbero and   
             Vitaly Skachek and   
          Òyvind Ytrehus   Preface of special issue on coding
                                  theory and applications  . . . . . . . . 503--503
                Jaime Gutierrez   Attacking the linear congruential
                                  generator on elliptic curves via lattice
                                  techniques . . . . . . . . . . . . . . . 505--525
                Ajeet Kumar and   
                Subhamoy Maitra   Resolvable block designs in construction
                                  of approximate real MUBs that are sparse 527--549
                  Raj Kumar and   
          Maheshanand Bhaintwal   Repeated root cyclic codes over $
                                  \mathbb {Z}_{p^2} + u \mathbb {Z}_{p^2}
                                  $ and their Lee distances  . . . . . . . 551--577
                     Fengwei Li   The Hermitian dual-containing LCD BCH
                                  codes and related quantum codes  . . . . 579--596
              Huicong Liang and   
             Sihem Mesnager and   
                    Meiqin Wang   Cryptanalysis of the AEAD and hash
                                  algorithm DryGASCON  . . . . . . . . . . 597--625
                 Minjia Shi and   
                  Shitao Li and   
            Patrick Solé   LCD and ACD codes over a noncommutative
                                  non-unital ring with four elements . . . 627--640
                      Can Xiang   Some $t$-designs from BCH codes  . . . . 641--652
                     Xia Li and   
                    Qin Yue and   
                      Deng Tang   The second-order zero differential
                                  spectra of almost perfect nonlinear
                                  functions and the inverse function in
                                  odd characteristic . . . . . . . . . . . 653--662
               Kaiqiang Liu and   
                    Qi Wang and   
                      Haode Yan   A class of binary cyclic codes with
                                  optimal parameters . . . . . . . . . . . 663--675
                Weijun Fang and   
                  Jun Zhang and   
                    Fang-Wei Fu   New constructions of self-dual
                                  generalized Reed--Solomon codes  . . . . 677--690

Cryptography and Communications
Volume 14, Number 4, July, 2022

             Sihem Mesnager and   
               Bimal Mandal and   
                 Mounira Msahli   Survey on recent trends towards
                                  generalized differential and boomerang
                                  uniformities . . . . . . . . . . . . . . 691--735
                 Wilfried Meidl   A survey on $p$-ary and generalized bent
                                  functions  . . . . . . . . . . . . . . . 737--782
László Mérai and   
                 Arne Winterhof   Pseudorandom sequences derived from
                                  automatic sequences  . . . . . . . . . . 783--815
             Bingsheng Shen and   
                  Yang Yang and   
                 Zhengchun Zhou   New $z$-complementary/complementary
                                  sequence sets with non-power-of-two
                                  length and low PAPR  . . . . . . . . . . 817--832
               Makoto Araya and   
                 Masaaki Harada   On the classification of quaternary
                                  optimal Hermitian LCD codes  . . . . . . 833--847
               Yongjin Jeon and   
              Seungjun Baek and   
                   Jongsung Kim   Differential uniformity and linearity of
                                  S-boxes by multiplicative complexity . . 849--874
                     Xia Wu and   
                     Wei Lu and   
                     Xiwang Cao   Minimal linear codes constructed from
                                  functions  . . . . . . . . . . . . . . . 875--895
      Ravi B. D. Figueiredo and   
                Juliano B. Lima   Tangent-Chebyshev maps over finite
                                  fields: New properties and functional
                                  graphs . . . . . . . . . . . . . . . . . 897--908
                Hai Q. Dinh and   
             Narendra Kumar and   
              Abhay Kumar Singh   A study of quantum codes obtained from
                                  cyclic codes over a non-chain ring . . . 909--923
            Daniele Bartoli and   
               Marco Timpanella   On a conjecture on APN permutations  . . 925--931
            Seyda Köse and   
            Ferruh Özbudak   Factorization of some polynomials over
                                  finite local commutative rings and
                                  applications to certain self-dual and
                                  LCD codes  . . . . . . . . . . . . . . . 933--948