Last update:
Sat Aug 10 07:40:13 MDT 2024
Claude Carlet Editorial: \booktitleCryptography and
Communications, Volume 1, Issue 1 . . . 1--2
Fang-Wei Fu and
Harald Niederreiter and
Ferruh Özbudak Joint linear complexity of
multisequences consisting of linear
recurring sequences . . . . . . . . . . 3--29
Charles J. Colbourn and
Yuichiro Fujiwara Small stopping sets in Steiner triple
systems . . . . . . . . . . . . . . . . 31--46
Joan Daemen and
Vincent Rijmen New criteria for linear maps in AES-like
ciphers . . . . . . . . . . . . . . . . 47--69
Martin Hell and
Thomas Johansson and
Lennart Brynielsson An overview of distinguishing attacks on
stream ciphers . . . . . . . . . . . . . 71--94
Ramakanth Kavuluru and
Andrew Klapper Lower bounds on error complexity
measures for periodic LFSR and FCSR
sequences . . . . . . . . . . . . . . . 95--116
Wilfried Meidl How to determine linear complexity and
$k$-error linear complexity in some
classes of linear recurring sequences 117--133
Somitra Kumar Sanadhya and
Palash Sarkar A combinatorial analysis of recent
attacks on step reduced SHA-2 family . . 135--173
Nicholas Kolokotronis and
Konstantinos Limniotis and
Nicholas Kalouptsidis Factorization of determinants over
finite fields and application in stream
ciphers . . . . . . . . . . . . . . . . 175--205
Hong Xu and
Wen-Feng Qi and
Yong-Hui Zheng Autocorrelations of $l$-sequences with
prime connection integer . . . . . . . . 207--223
Goutam Paul and
Subhamoy Maitra On biases of permutation and keystream
bytes of RC4 towards the secret key . . 225--268
Aleksandar Kircanski and
Rabeah Al-Zaidy and
Amr M. Youssef A new distinguishing and key recovery
attack on NGG stream cipher . . . . . . 269--282
Aleksandar Kircanski and
Amr M. Youssef On the structural weakness of the GGHN
stream cipher . . . . . . . . . . . . . 1--17
Robert Rolland The second weight of generalized
Reed-Muller codes in most cases . . . . 19--40
Mikko Pelto New bounds for $ (r, \leq 2)
$-identifying codes in the infinite king
grid . . . . . . . . . . . . . . . . . . 41--47
Alina Ostafe and
Igor E. Shparlinski Pseudorandom numbers and hash functions
from iterations of multivariate
polynomials . . . . . . . . . . . . . . 49--67
Ruchi Gode and
Sugata Gangopadhyay Third-order nonlinearities of a subclass
of Kasami functions . . . . . . . . . . 69--83
Tor Helleseth and
Alexander Kholosha \boldmath $ x^{2^l + 1} + x + a $ and
related affine polynomials over $ {\rm
GF}(2^k) $ . . . . . . . . . . . . . . . 85--109
E. Rodney Canfield and
Zhicheng Gao and
Catherine Greenhill and
Brendan D. McKay and
Robert W. Robinson Asymptotic enumeration of
correlation-immune Boolean functions . . 111--126
Dane L. Flannery and
Kathryn J. Horadam Guest editorial for the special issue on
design theory . . . . . . . . . . . . . 127--128
K. J. Horadam Hadamard matrices and their
applications: Progress 2007--2010 . . . 129--154
Krishnasamy Thiru Arasu and
Alex J. Gutman Circulant weighing matrices . . . . . . 155--171
Michael Huber Combinatorial bounds and
characterizations of splitting
authentication codes . . . . . . . . . . 173--185
Ferenc Szöll\Hosi Exotic complex Hadamard matrices and
their equivalence . . . . . . . . . . . 187--198
Darcy Best and
Hadi Kharaghani Unbiased complex Hadamard matrices and
bases . . . . . . . . . . . . . . . . . 199--209
Philippe Jaming and
Máté Matolcsi and
Péter Móra The problem of mutually unbiased bases
in dimension $6$ . . . . . . . . . . . . 211--220
Asha Rao and
Diane Donovan and
Joanne L. Hall Mutually orthogonal Latin squares and
mutually unbiased bases in dimensions of
odd prime power MOLS and MUBs in odd
prime power dimensions . . . . . . . . . 221--231
Warwick de Launey and
Daniel M. Gordon On the density of the set of known
Hadamard orders . . . . . . . . . . . . 233--246
José Andrés Armario On an inequivalence criterion for
cocyclic Hadamard matrices . . . . . . . 247--259
Padraig Ó Catháin and
Richard M. Stafford On twin prime power Hadamard matrices 261--269
J. F. Dillon Some REALLY beautiful Hadamard matrices 271--292
Jennifer Seberry and
Marilena Mitrouli Some remarks on Hadamard matrices . . . 293--306
Warwick de Launey and
David A. Levin A Fourier-analytic approach to counting
partial Hadamard matrices . . . . . . . 307--334
Lilya Budaghyan and
Tor Helleseth New commutative semifields defined by
new PN multinomials . . . . . . . . . . 1--16
D. G. Farmer and
K. J. Horadam Equivalence classes of multiplicative
central $ (p^n, p^n, p^n, 1) $-relative
difference sets . . . . . . . . . . . . 17--28
Li-Ping Wang A lattice-based minimal partial
realization algorithm for matrix
sequences of varying length . . . . . . 29--42
Carl Bracken and
Eimear Byrne and
Nadya Markin and
Gary McGuire A few more quadratic APN functions . . . 43--53
Zheng Yang and
Pinhui Ke Construction of quaternary sequences of
length $ p q $ with low autocorrelation 55--64
Keith M. Martin and
Maura B. Paterson and
Douglas R. Stinson Error decodable secret sharing and
one-round perfectly secure message
transmission for general adversary
structures . . . . . . . . . . . . . . . 65--86
Khmaies Ouahada and
Theo G. Swart and
Hendrik C. Ferreira Permutation sequences and coded PAM
signals with spectral nulls at rational
submultiples of the symbol frequency . . 87--108
François Arnault and
Thierry P. Berger and
Benjamin Pousse A matrix approach for FCSR automata . . 109--139
Jiali Choy and
Guanhan Chew and
Khoongming Khoo and
Huihui Yap Cryptographic properties and application
of a Generalized Unbalanced Feistel
Network structure . . . . . . . . . . . 141--164
Hassan Aly and
Arne Winterhof Boolean functions derived from Fermat
quotients . . . . . . . . . . . . . . . 165--174
Yongqiang Li and
Mingsheng Wang Permutation polynomials EA-equivalent to
the inverse function over $ {\rm
GF}(2^n) $ . . . . . . . . . . . . . . . 175--186
Laurent Poinsot Non Abelian bent functions . . . . . . . 1--23
Enes Pasalic A design of Boolean functions resistant
to (fast) algebraic cryptanalysis with
efficient implementation . . . . . . . . 25--45
Miia Hermelin and
Kaisa Nyberg Multidimensional linear distinguishing
attacks and Boolean functions . . . . . 47--64
Peter Beelen and
Gregor Leander A new construction of highly nonlinear
S-boxes . . . . . . . . . . . . . . . . 65--77
Wenpei Si and
Cunsheng Ding A simple stream cipher with proven
properties . . . . . . . . . . . . . . . 79--104
Maxwell L. Bileschi and
Thomas W. Cusick and
Daniel Padgett Weights of Boolean cubic monomial
rotation symmetric functions . . . . . . 105--130
Abdel Alim Kamal and
Amr M. Youssef Fault analysis of the NTRUSign digital
signature scheme . . . . . . . . . . . . 131--144
Subhamoy Maitra and
Palash Sarkar Guest editorial . . . . . . . . . . . . 145--146
Anne Canteaut and
María Naya-Plasencia Correlation attacks on combination
generators . . . . . . . . . . . . . . . 147--171
Martin Ågren and
Carl Löndahl and
Martin Hell and
Thomas Johansson A survey on fast correlation attacks . . 173--202
Simon Knellwolf and
Willi Meier High order differential attacks on
stream ciphers . . . . . . . . . . . . . 203--215
Itai Dinur and
Adi Shamir Applying cube attacks to stream ciphers
in realistic scenarios . . . . . . . . . 217--232
Meltem Sönmez Turan On the nonlinearity of maximum-length
NFSR feedbacks . . . . . . . . . . . . . 233--243
Leonie Simpson and
Serdar Boztas State cycles, initialization and the
Trivium stream cipher . . . . . . . . . 245--258
Yi Lu and
Serge Vaudenay and
Willi Meier Synthetic linear analysis with
applications to CubeHash and Rabbit . . 259--276
Mohammad Ali Orumiehchiha and
Josef Pieprzyk and
Ron Steinfeld Cryptanalysis of WG-7: a lightweight
stream cipher . . . . . . . . . . . . . 277--285
Wenhao Wang and
Meicheng Liu and
Yin Zhang Comments on ``A design of Boolean
functions resistant to (fast) algebraic
cryptanalysis with efficient
implementation'' . . . . . . . . . . . . 1--6
Thomas W. Cusick Finding Hamming weights without looking
at truth tables . . . . . . . . . . . . 7--18
Sourav Sen Gupta and
Anupam Chattopadhyay and
Ayesha Khalid Designing integrated accelerator for
stream ciphers with structural
similarities . . . . . . . . . . . . . . 19--47
Zoubida Jadda and
Patrice Parraud and
Soukayna Qarboua Quaternary cryptographic bent functions
and their binary projection . . . . . . 49--65
Romar dela Cruz and
Huaxiong Wang Cheating-immune secret sharing schemes
from codes and cumulative arrays . . . . 67--83
Alyssa Brown and
Thomas W. Cusick Equivalence classes for cubic rotation
symmetric functions . . . . . . . . . . 85--118
Ir\`ene Charon and
Iiro Honkala and
Olivier Hudry and
Antoine Lobstein Minimum sizes of identifying codes in
graphs differing by one vertex . . . . . 119--136
Sourav Das and
Dipanwita RoyChowdhury \it CAR30: a new scalable stream cipher
with rule $ 30 $ . . . . . . . . . . . . 137--162
Ana S\ual\uagean and
Alex J. Burrage and
Raphael C.-W. Phan Computing the linear complexity for
sequences with characteristic polynomial
$ f^v $ . . . . . . . . . . . . . . . . 163--177
Konstantinos Limniotis and
Nicholas Kolokotronis and
Nicholas Kalouptsidis Secondary constructions of Boolean
functions with maximum algebraic
immunity . . . . . . . . . . . . . . . . 179--199
K. T. Arasu and
Simone Severini and
Edmund Velten Block weighing matrices . . . . . . . . 201--207
Cunsheng Ding and
Keqin Feng and
Rongquan Feng and
Maosheng Xiong and
Aixian Zhang Unit time-phase signal sets: Bounds and
constructions . . . . . . . . . . . . . 209--227
Maura B. Paterson and
Douglas R. Stinson A simple combinatorial treatment of
constructions and threshold gaps of ramp
schemes . . . . . . . . . . . . . . . . 229--240
Elodie Leducq Second weight codewords of generalized
Reed-Muller codes . . . . . . . . . . . 241--276
Guang Gong and
Mark Aagaard and
Xinxin Fan Resilience to distinguishing attacks on
\sf WG-7 cipher and their
generalizations . . . . . . . . . . . . 277--289
Tor Helleseth and
Jonathan Jedwab Special issue editorial: Sequences and
their applications . . . . . . . . . . . 1--2
Gaofei Wu and
Matthew Geoffrey Parker A complementary construction using
mutually unbiased bases . . . . . . . . 3--25
Dragana Bajic and
Tatjana Loncar-Turukalo A simple suboptimal construction of
cross-bifix-free codes . . . . . . . . . 27--37
Rema Hariharan New near perfect sequences of even
lengths . . . . . . . . . . . . . . . . 39--46
Santiago Barrera Acevedo and
Nathan Jolly Perfect arrays of unbounded sizes over
the basic quaternions . . . . . . . . . 47--57
S. Z. Budi\vsin and
P. Spasojevi\'c Paraunitary generation/correlation of
QAM complementary sequence pairs . . . . 59--102
Stéphanie Dib Asymptotic nonlinearity of vectorial
Boolean functions . . . . . . . . . . . 103--115
Kalikinkar Mandal and
Guang Gong and
Xinxin Fan and
Mark Aagaard Optimal parameters for the WG stream
cipher family . . . . . . . . . . . . . 117--135
Ying Gao and
Romar dela Cruz Secret sharing schemes based on
graphical codes . . . . . . . . . . . . 137--155
Ir\`ene Charon and
Iiro Honkala and
Olivier Hudry and
Antoine Lobstein Minimum sizes of identifying codes in
graphs differing by one edge . . . . . . 157--170
Sareh Emami and
San Ling and
Ivica Nikoli\'c and
Josef Pieprzyk and
Huaxiong Wang The resistance of PRESENT-80 against
related-key differential attacks . . . . 171--187
Palash Sarkar Modes of operations for encryption and
authentication using stream ciphers
supporting an initialisation vector . . 189--231
Jinyong Shan and
Lei Hu and
Xiangyong Zeng Cryptographic properties of nested
functions and algebraic immunity of the
Boolean function in Hitag2 stream cipher 233--254
Pavol Zajac and
Matú\vs Jókay Multiplicative complexity of bijective $
4 \times 4 $ S-boxes . . . . . . . . . . 255--277
Asl\i Bay and
Atefeh Mashatan and
Serge Vaudenay Revisiting iterated attacks in the
context of decorrelation theory . . . . 279--311
Bo Zhu and
Guang Gong Multidimensional meet-in-the-middle
attack and its applications to
KATAN32/48/64 . . . . . . . . . . . . . 313--333
Xinxin Gong and
Bin Zhang and
Wenling Wu and
Dengguo Feng Computing Walsh coefficients from the
algebraic normal form of a Boolean
function . . . . . . . . . . . . . . . . 335--358
Antonio Bernini and
Stefano Bilotta and
Renzo Pinzani and
Ahmad Sabri and
Vincent Vajnovszki Prefix partitioned gray codes for
particular cross-bifix-free sets . . . . 359--369
Claude Carlet and
Pierre-Alain Fouque Guest Editorial . . . . . . . . . . . . 1--2
Begül Bilgin and
Svetla Nikova and
Ventzislav Nikov and
Vincent Rijmen and
Natalia Tokareva and
Valeriya Vitkup Threshold implementations of small
S-boxes . . . . . . . . . . . . . . . . 3--33
Bodhisatwa Mazumdar and
Debdeep Mukhopadhyay and
Indranil Sengupta Construction of RSBFs with improved
cryptographic properties to resist
differential fault attack on grain
family of stream ciphers . . . . . . . . 35--69
Michael Tunstall and
Marc Joye The distributions of individual bits in
the output of multiplicative operations 71--90
Aurélie Bauer and
Eliane Jaulmes and
Emmanuel Prouff and
Jean-René Reinhard and
Justine Wild Horizontal collision correlation attack
on elliptic curves---extended version 91--119
Christophe Clavier and
Quentin Isorez and
Damien Marion and
Antoine Wurcker Complete reverse-engineering of AES-like
block ciphers by SCARE and FIRE attacks 121--162
Sonia Bela\"\id and
Vincent Grosso and
François-Xavier Standaert Masking and leakage-resilient
primitives: One, the other(s) or both? 163--184
Nadia El Mrabet and
Jacques J. A. Fournier and
Louis Goubin and
Ronan Lashermes A survey of fault attacks in pairing
based cryptography . . . . . . . . . . . 185--205
Mingchao Li and
Miao Liang and
Beiliang Du A construction of $t$-fold perfect
splitting authentication codes with
equal deception probabilities . . . . . 207--215
Chengju Li and
Qin Yue The Walsh transform of a class of
monomial functions and cyclic codes . . 217--228
Anuradha Sharma Repeated-root constacyclic codes of
length $ \ell^t p^s $ and their dual
codes . . . . . . . . . . . . . . . . . 229--255
Kishan Chand Gupta and
Indranil Ghosh Ray Cryptographically significant MDS
matrices based on circulant and
circulant-like matrices for lightweight
applications . . . . . . . . . . . . . . 257--287
Yiyuan Luo and
Xuejia Lai and
Tiejun Jia Attacks on a double length
blockcipher-based hash proposal . . . . 289--295
Yuan Li Characterization of robust immune
symmetric boolean functions . . . . . . 297--315
Santanu Sarkar Further non-randomness in RC4, RC4A and
VMPC . . . . . . . . . . . . . . . . . . 317--330
Ivica Nikoli\'c and
Lei Wang and
Shuang Wu The parallel-cut meet-in-the-middle
attack . . . . . . . . . . . . . . . . . 331--345
Zhi Hu and
Lin Wang Injectivity of compressing maps on the
set of primitive sequences modulo
square-free odd integers . . . . . . . . 347--361
Nathan Jolly An algebra of arrays and almost perfect
watermarks . . . . . . . . . . . . . . . 363--377
Francis N. Castro and
Oscar E. González and
Luis A. Medina A divisibility approach to the open
boundary cases of
Cusick--Li--St\uanic\ua's conjecture . . 379--402
José Ortiz-Ubarri New families of asymptotically optimal
doubly periodic arrays with ideal
correlation constraints . . . . . . . . 403--414
Colleen M. Swanson and
Douglas R. Stinson Extended results on privacy against
coalitions of users in user-private
information retrieval protocols . . . . 415--437
Debrup Chakraborty and
Vicente Hernandez-Jimenez and
Palash Sarkar Another look at XCB . . . . . . . . . . 439--468
S. Hod\vzi\'c and
E. Pasalic Generalized Bent Functions --- Some
General Construction Methods and Related
Necessary and Sufficient Conditions . . 469--483
Vladimir Edemskiy and
Andrey Ivanov The linear complexity of balanced
quaternary sequences with optimal
autocorrelation value . . . . . . . . . 485--496
Jing Jane He and
Daniel Panario and
Qiang Wang and
Arne Winterhof Linear complexity profile and
correlation measure of interleaved
sequences . . . . . . . . . . . . . . . 497--508
Chun Guo and
Dongdai Lin Improved domain extender for the ideal
cipher . . . . . . . . . . . . . . . . . 509--533
A. R. Rahimipour and
A. R. Ashrafi and
A. Gholami The existence of minimal logarithmic
signatures for the sporadic Suzuki and
simple Suzuki groups . . . . . . . . . . 535--542
Mingxing Wang and
Yupeng Jiang and
Dongdai Lin Further results on the nonlinearity of
maximum-length NFSR feedbacks . . . . . 1--6
Adel Alahmadi and
Hussain Alhazmi and
Tor Helleseth and
Rola Hijazi and
Najat Muthana and
Patrick Solé On the lifted Melas code . . . . . . . . 7--18
Maura B. Paterson and
Douglas R. Stinson and
Yongge Wang On encoding symbol degrees of array
BP-XOR codes . . . . . . . . . . . . . . 19--32
Qiuyan Wang and
Yupeng Jiang and
Dongdai Lin Linear complexity of Ding-Helleseth
sequences of order 2 over $ {\rm GF}(l)
$ . . . . . . . . . . . . . . . . . . . 33--49
Jian Gao and
Linzhi Shen and
Fang-Wei Fu A Chinese remainder theorem approach to
skew generalized quasi-cyclic codes over
finite fields . . . . . . . . . . . . . 51--66
Thomas W. Cusick and
Pantelimon St\uanic\ua Counting equivalence classes for
monomial rotation symmetric Boolean
functions with prime dimension . . . . . 67--81
Anuradha Sharma and
Amit K. Sharma Construction of self-dual codes over $
\mathbb {Z}_{2^m} $ . . . . . . . . . . 83--101
Chuan Lv and
Tongjiang Yan and
Guozhen Xiao New developments in $q$-polynomial codes 103--112
Subhadeep Banik Conditional differential cryptanalysis
of $ 105 $ round Grain v1 . . . . . . . 113--137
Iiro Honkala and
Olivier Hudry and
Antoine Lobstein On the ensemble of optimal identifying
codes in a twin-free graph . . . . . . . 139--153
Guangkui Xu and
Xiwang Cao and
Shanding Xu Constructing new APN functions and bent
functions over finite fields of odd
characteristic via the switching method 155--171
Lilya Budaghyan and
Tor Helleseth and
Alexander Kholosha Editorial: Special issue on Boolean
functions and their applications . . . . 173--174
Daniel J. Katz and
Philippe Langevin New open problems related to old
conjectures by Helleseth . . . . . . . . 175--189
Canan Ka\csìkcì and
Wilfried Meidl and
Alev Topuzo\uglu Spectra of a class of quadratic
functions: Average behaviour and
counting functions . . . . . . . . . . . 191--214
Chunlei Li and
Tor Helleseth Quasi-perfect linear codes from planar
and APN functions . . . . . . . . . . . 215--227
Sihem Mesnager Further constructions of infinite
families of bent functions from new
permutations and their duals . . . . . . 229--246
Georgi Ivanov and
Nikolay Nikolov and
Svetla Nikova Reversed genetic algorithms for
generation of bijective S-boxes with
good cryptographic properties . . . . . 247--276
Oleksandr Kazymyrov and
Roman Oliynykov and
Håvard Raddum Influence of addition modulo $ 2^n $ on
algebraic attacks . . . . . . . . . . . 277--289
Yin Tan and
Guang Gong and
Bo Zhu Enhanced criteria on differential
uniformity and nonlinearity of
cryptographically significant functions 291--311
Joan Boyar and
Magnus Gausdal Find and
René Peralta On various nonlinearity measures for
boolean functions . . . . . . . . . . . 313--330
Sonia Bogos and
Florian Tram\`er and
Serge Vaudenay On solving \sf LPN using \sf BKW and
variants: implementation and analysis 331--369
Yuan Cheng and
Wen-Feng Qi and
Qun-Xiong Zheng and
Dong Yang On the distinctness of primitive
sequences over $ \mathbf {Z} / (p^e q) $
modulo $2$ . . . . . . . . . . . . . . . 371--381
Ting Gu and
Andrew Klapper Statistical properties of half-$ \ell
$-sequences . . . . . . . . . . . . . . 383--400
Kaushik Chakraborty and
Subhamoy Maitra Application of Grover's algorithm to
check non-resiliency of a Boolean
function . . . . . . . . . . . . . . . . 401--413
Torleiv Klòve On covering sets for limited-magnitude
errors . . . . . . . . . . . . . . . . . 415--433
Yi Lu and
Yvo Desmedt Walsh transforms and cryptographic
applications in bias computing . . . . . 435--453
Debrup Chakraborty and
Palash Sarkar On modes of operations of a block cipher
for authentication and authenticated
encryption . . . . . . . . . . . . . . . 455--511
Fulin Li and
Shixin Zhu and
Honggang Hu and
Ting Jiang Determining the $k$-error joint linear
complexity spectrum for a binary
multisequence with period $ p^n$ . . . . 513--523
Can Xiang Linear codes from a generic construction 525--539
Guangkui Xu and
Xiwang Cao and
Shanding Xu Optimal $p$-ary cyclic codes with
minimum distance four from monomials . . 541--554
Brandon Dravie and
Jérémy Parriaux and
Philippe Guillot and
Gilles Millérioux Matrix representations of vectorial
Boolean functions and eigenanalysis . . 555--577
Ji-Jian Chin and
Syh-Yuan Tan and
Swee-Huay Heng and
Raphael C.-W. Phan Twin-Beth: Security under active and
concurrent attacks for the Beth
identity-based identification scheme . . 579--591
Ji-Woong Jang and
Dae-Woon Lim Large low probability of intercept
properties of the quaternary sequence
with optimal correlation property
constructed by Legendre sequences . . . 593--604
Qiuyan Wang and
Dongdai Lin Generalized cyclotomic numbers of order
two and their applications . . . . . . . 605--616
Anuradha Sharma and
Saroj Rani On constacyclic codes over finite fields 617--636
Kai-Uwe Schmidt Nonlinearity measures of random Boolean
functions . . . . . . . . . . . . . . . 637--645
Cunsheng Ding and
Zhengchun Zhou Preface: Special functions and codes . . 1--2
Kanat Abdukhalikov and
Sihem Mesnager Bent functions linear on elements of
some classical spreads and presemifields
spreads . . . . . . . . . . . . . . . . 3--21
Sergey Bezzateev and
Natalia Shekhunova Quasi-cyclic Goppa codes with special
Goppa polynomials and matched location
sets . . . . . . . . . . . . . . . . . . 23--39
Ziling Heng and
Qin Yue Optimal codebooks achieving the
Levenshtein bound from generalized bent
functions over $ \mathbb {Z}_4 $ . . . . 41--53
Chengju Li and
Sunghan Bae and
Haode Yan A construction of codes with linearity
from two linear codes . . . . . . . . . 55--69
Sihem Mesnager Linear codes with few weights from
weakly regular bent functions based on a
generic construction . . . . . . . . . . 71--84
Qi Wang Some cyclic codes with prime length from
cyclotomy of order $4$ . . . . . . . . . 85--92
Can Xiang and
Chunming Tang and
Keqin Feng A class of linear codes with a few
weights . . . . . . . . . . . . . . . . 93--116
Guangkui Xu and
Xiwang Cao and
Shanding Xu Two classes of $p$-ary bent functions
and linear codes with three or four
weights . . . . . . . . . . . . . . . . 117--131
Shudi Yang and
Zheng-An Yao and
Chang-An Zhao A class of three-weight linear codes and
their complete weight enumerators . . . 133--149
Dan Zhang and
Cuiling Fan and
Daiyuan Peng and
Xiaohu Tang Complete weight enumerators of some
linear codes from quadratic forms . . . 151--163
Yue Zhou and
Longjiang Qu Constructions of negabent functions over
finite fields . . . . . . . . . . . . . 165--180
Xin Li and
Zihui Liu On the second relative greedy weight . . 181--197
Lisha Wang and
Xiaohu Tang On the correlation distribution of the
generalized maximal length $ \mathbb
{Z}_4 $-sequences . . . . . . . . . . . 199--215
Ana S\ual\uagean and
Matei Mandache-S\ual\uagean Counting and characterising functions
with ``fast points'' for differential
attacks . . . . . . . . . . . . . . . . 217--239
Rama Krishna Bandi and
Maheshanand Bhaintwal and
Nuh Aydin A mass formula for negacyclic codes of
length $ 2^k $ and some good negacyclic
codes over $ \mathbb {Z}_4 + u \mathbb
{Z}_4 $ . . . . . . . . . . . . . . . . 241--272
Elena Dubrova and
Martin Hell Espresso: A stream cipher for $5$G
wireless communication systems . . . . . 273--289
Tingting Wu and
Jian Gao and
Fang-Wei Fu $1$-generator generalized quasi-cyclic
codes over $ \mathbb {Z}_4 $ . . . . . . 291--299
Sugata Gangopadhyay and
Aditi Kar Gangopadhyay and
Spyridon Pollatos and
Pantelimon St\uanic\ua Cryptographic Boolean functions with
biased inputs . . . . . . . . . . . . . 301--314
Qiuyan Wang and
Kelan Ding and
Dongdai Lin and
Rui Xue A kind of three-weight linear codes . . 315--322
Ziling Heng and
Qin Yue Complete weight distributions of two
classes of cyclic codes . . . . . . . . 323--343
Jian Liu and
Sihem Mesnager and
Lusheng Chen On the nonlinearity of S-boxes and
linear codes . . . . . . . . . . . . . . 345--361
Jie Peng and
Chik How Tan New differentially $4$-uniform
permutations by modifying the inverse
function on subfields . . . . . . . . . 363--378
M. Esmaeili and
M. Moosavi and
T. A. Gulliver A new class of Fibonacci sequence based
error correcting codes . . . . . . . . . 379--396
Minquan Cheng and
Jing Jiang and
Xiaohu Tang Asymptotically optimal $ \overline
{2}$-separable codes with length $4$ . . 397--405
Miao Liang and
Lijun Ji and
Jingcai Zhang Some new classes of $2$-fold optimal or
perfect splitting authentication codes 407--430
Zhiqiang Lin and
Dongdai Lin and
Dingyi Pei Practical construction of ring LFSRs and
ring FCSRs with low diffusion delay for
hardware cryptographic applications . . 431--443
Zhixiong Chen Linear complexity and trace
representation of quaternary sequences
over $ \mathbb {Z}_4 $ based on
generalized cyclotomic classes modulo $
p q $ . . . . . . . . . . . . . . . . . 445--458
Madhu Raka and
Leetika Kathuria and
Mokshi Goyal $ (1 - 2 u^3)$-constacyclic codes and
quadratic residue codes over $ \mathbb
{F}_p[u] \slash \langle u^4 - u \rangle
$ . . . . . . . . . . . . . . . . . . . 459--473
Pramod Kumar Kewat and
Priti Kumari Cyclic codes from the second class
two-prime Whiteman's generalized
cyclotomic sequence with order $6$ . . . 475--499
László Mérai and
Harald Niederreiter and
Arne Winterhof Expansion complexity and linear
complexity of sequences over finite
fields . . . . . . . . . . . . . . . . . 501--509
Hongyu Han and
Daiyuan Peng and
Udaya Parampalli New sets of optimal low-hit-zone
frequency-hopping sequences based on
$m$-sequences . . . . . . . . . . . . . 511--522
Santanu Sarkar and
Prakash Dey and
Avishek Adhikari and
Subhamoy Maitra Probabilistic signature based
generalized framework for differential
fault analysis of stream ciphers . . . . 523--543
Xianfang Wang and
Jian Gao and
Fang-Wei Fu Complete weight enumerators of two
classes of linear codes . . . . . . . . 545--562
Shuai Xue and
Wen-Feng Qi and
Xiao-Yuan Yang On the best linear approximation of
addition modulo $ 2^n $ . . . . . . . . 563--580
Thalia M. Laing and
Keith M. Martin and
Maura B. Paterson and
Douglas R. Stinson Localised multisecret sharing . . . . . 581--597
Yuan Cao and
Qingguo Li Cyclic codes of odd length over $ Z_4
[u] \slash \langle u^k \rangle $ . . . . 599--624
Xianfang Wang and
Can Xiang and
Fang-Wei Fu Secret sharing schemes for compartmented
access structures . . . . . . . . . . . 625--635
Minjia Shi and
Rongsheng Wu and
Yan Liu and
Patrick Solé Two and three weight codes over $
\mathbb {F}_p + u \mathbb {F}_p $ . . . 637--646
Chunming Tang and
Yanfeng Qi A class of hyper-bent functions and
Kloosterman sums . . . . . . . . . . . . 647--664
Saban Alaca and
Goldwyn Millar Character values of the
Sidelnikov--Lempel--Cohn--Eastman
sequences . . . . . . . . . . . . . . . 665--682
Vladimir Edemskiy and
Xiaoni Du Design sequences with high linear
complexity over finite fields using
generalized cyclotomy . . . . . . . . . 683--691
Nian Li and
Tor Helleseth Several classes of permutation
trinomials from Niho exponents . . . . . 693--705
Limengnan Zhou and
Daiyuan Peng and
Hongbin Liang and
Changyuan Wang and
Hongyu Han Generalized methods to construct
low-hit-zone frequency-hopping sequence
sets and optimal constructions . . . . . 707--728
J. Wolfmann Sequences of bent functions and
near-bent functions . . . . . . . . . . 729--736
Heiko Dietrich and
Nathan Jolly A new family of arrays with low
autocorrelation . . . . . . . . . . . . 737--748
Eric Férard On the irreducibility of the hyperplane
sections of Fermat varieties in $
\mathbb {P}^3 $ in characteristic $2$.
II . . . . . . . . . . . . . . . . . . . 749--767
Tor Helleseth and
Bart Preneel Editorial: Special issue on recent
trends in cryptography . . . . . . . . . 1--3
Michael Scott Missing a trick: Karatsuba variations 5--15
Houda Ferradi and
Rémi Géraud and
Diana Maimut and
David Naccache and
Hang Zhou Backtracking-assisted multiplication . . 17--26
Sonia Bogos and
John Gaspoz and
Serge Vaudenay Cryptanalysis of a homomorphic
encryption scheme . . . . . . . . . . . 27--39
Marie-Sarah Lacharité Security of BLS and BGLS signatures in a
multi-user setting . . . . . . . . . . . 41--58
Valérie Nachef and
Jacques Patarin and
Emmanuel Volte Generic attacks with standard deviation
analysis on $a$-Feistel schemes . . . . 59--77
Brett Hemenway and
Rafail Ostrovsky Efficient robust secret sharing from
expander graphs . . . . . . . . . . . . 79--99
Éloi de Chérisey and
Sylvain Guilley and
Annelie Heuser and
Olivier Rioul On the optimality and practicability of
mutual information analysis in some
scenarios . . . . . . . . . . . . . . . 101--121
Gregory G. Rose KISS: A bit too simple . . . . . . . . . 123--137
Geong Sen Poh and
Moesfa Soeheila Mohamad and
Ji-Jian Chin Searchable symmetric encryption over
multiple servers . . . . . . . . . . . . 139--158
Tomás Fabsic and
Otokar Grosek and
Karol Nemoga and
Pavol Zajac On generating invertible circulant
binary matrices with a prescribed number
of ones . . . . . . . . . . . . . . . . 159--175
Christian Forler and
Eik List and
Stefan Lucks and
Jakob Wenzel POEx: A beyond-birthday-bound-secure
on-line cipher . . . . . . . . . . . . . 177--193
Tingting Cui and
Huaifeng Chen and
Long Wen and
Meiqin Wang Statistical integral attack on CAST-256
and IDEA . . . . . . . . . . . . . . . . 195--209
Cécile Pierrot and
Benjamin Wesolowski Malleability of the blockchain's entropy 211--233
Nurdagül Anbar and
Wilfried Meidl Modified planar functions and their
components . . . . . . . . . . . . . . . 235--249
Zuling Chang and
Martianus Frederic Ezerman and
San Ling and
Huaxiong Wang Construction of de Bruijn sequences from
product of two irreducible polynomials 251--275
Lin Sok and
MinJia Shi and
Patrick Solé Classification and Construction of
quaternary self-dual bent functions . . 277--289
Pan Tan and
Zhengchun Zhou and
Deng Tang and
Tor Helleseth The weight distribution of a class of
two-weight linear codes derived from
Kloosterman sums . . . . . . . . . . . . 291--299
Gaojun Luo and
Xiwang Cao and
Shanding Xu and
Jiafu Mi Binary linear codes with two or three
weights from Niho exponents . . . . . . 301--318
Cunsheng Ding A sequence construction of cyclic codes
over finite fields . . . . . . . . . . . 319--341
Mokshi Goyal and
Madhu Raka Quadratic residue codes over the ring $
\mathbb {F}_p[u] / \langle u^m - u
\rangle $ and their Gray images . . . . 343--355
Santiago Barrera Acevedo and
Heiko Dietrich Perfect sequences over the quaternions
and $ (4 n, 2, 4 n, 2 n)$-relative
difference sets in $ C_n \times Q_8$ . . 357--368
Andrew Klapper Matrix parametrized shift registers . . 369--382
Elena Dubrova and
Mats Näslund and
Göran Selander and
Fredrik Lindqvist Message Authentication Based on
Cryptographically Secure CRC without
Polynomial Irreducibility Test . . . . . 383--399
Anuradha Sharma and
Taranjot Kaur Enumeration formulae for self-dual,
self-orthogonal and complementary-dual
quasi-cyclic codes over finite fields 401--435
Shanding Xu and
Xiwang Cao and
Guangkui Xu and
Gaojun Luo Two classes of near-optimal
frequency-hopping sequence sets with
prime-power period . . . . . . . . . . . 437--454
Li-Ping Wang and
Daqing Wan On lattice-based algebraic feedback
shift registers synthesis for
multisequences . . . . . . . . . . . . . 455--465
Yuhua Sun and
Qiang Wang and
Tongjiang Yan The exact autocorrelation distribution
and $2$-adic complexity of a class of
binary sequences with almost optimal
autocorrelation . . . . . . . . . . . . 467--477
Amit Jana and
Goutam Paul Revisiting RC4 key collision: Faster
search algorithm and new $ 22$-byte
colliding key pairs . . . . . . . . . . 479--508
Serdar Boztas and
Ferruh Özbudak and
Eda Tekin Generalized nonbinary sequences with
perfect autocorrelation, flexible
alphabets and new periods . . . . . . . 509--517
R. Sobhani Cyclic codes over a non-commutative
finite chain ring . . . . . . . . . . . 519--530
Kangquan Li and
Longjiang Qu and
Xi Chen and
Chao Li Permutation polynomials of the form $ c
x + \hbox {Tr}_{q^l / q}(x^a) $ and
permutation trinomials over finite
fields with even characteristic . . . . 531--554
Xuli Zhang and
Jing Jiang and
Minquan Cheng Bounds and constructions for $ \overline
{3}$-strongly separable codes with
length $3$ . . . . . . . . . . . . . . . 555--565
Zhengbang Zha and
Lei Hu and
Zhizheng Zhang New results on permutation polynomials
of the form $ (x^{p m} - x + \delta)^s +
x^{p m} + x $ over $ \mathbb {F} p^{2 m}
$ . . . . . . . . . . . . . . . . . . . 567--578
Xiusheng Liu and
Hai Q. Dinh and
Hualu Liu and
Long Yu On new quantum codes from matrix product
codes . . . . . . . . . . . . . . . . . 579--589
Zongxiang Yi and
Zhiqiang Lin and
Lishan Ke A generic method to construct
zero-difference balanced functions . . . 591--609
Yousuf Alsalami Constructions with high algebraic degree
of differentially $4$-uniform $ (n, n -
1)$-functions and differentially
$8$-uniform $ (n, n - 2)$-functions . . 611--628
Kalikinkar Mandal and
Bo Yang and
Guang Gong and
Mark Aagaard On ideal $t$-tuple distribution of
filtering de Bruijn sequence generators 629--641
Zhonghua Sun and
Shixin Zhu and
Liqi Wang The symbol-pair distance distribution of
a class of repeated-root cyclic codes
over $ \mathbb {F}_{p^m} $ . . . . . . . 643--653
Francis N. Castro and
Luis A. Medina and
Ivelisse M. Rubio Exact $2$-divisibility of exponential
sums associated to boolean functions . . 655--666
Elena Barcucci and
Antonio Bernini and
Stefano Bilotta and
Renzo Pinzani A $2$D non-overlapping code over a
$q$-ary alphabet . . . . . . . . . . . . 667--683
Somphong Jitman Good integers and some applications in
coding theory . . . . . . . . . . . . . 685--704
Aleksandr Tuxanidy and
Qiang Wang Characteristic digit-sum sequences . . . 705--717
Lucky Galvez and
Jon-Lark Kim and
Nari Lee and
Young Gun Roe and
Byung-Sun Won Some bounds on binary LCD codes . . . . 719--728
Subhamoy Maitra Guest editorial . . . . . . . . . . . . 729--730
Ashwin Jha and
Mridul Nandi On rate-1 and beyond-the-birthday bound
secure online ciphers using tweakable
block ciphers . . . . . . . . . . . . . 731--753
Tingting Cui and
Huaifeng Chen and
Sihem Mesnager and
Ling Sun and
Meiqin Wang Statistical integral distinguisher with
multi-structure and its application on
AES-like ciphers . . . . . . . . . . . . 755--776
Kenneth G. Paterson and
Jacob C. N. Schuldt Statistical attacks on cookie masking
for RC4 . . . . . . . . . . . . . . . . 777--801
Matthias Hamann and
Matthias Krause and
Willi Meier and
Bin Zhang Design and analysis of small-state
grain-like stream ciphers . . . . . . . 803--834
Subhabrata Samajder and
Palash Sarkar Success probability of
multiple/multidimensional linear
cryptanalysis under general key
randomisation hypotheses . . . . . . . . 835--879
Goutam Paul and
Souvik Ray Analysis of burn-in period for RC4 state
transition . . . . . . . . . . . . . . . 881--908
Claude Carlet and
Sylvain Guilley Statistical properties of side-channel
and fault injection attacks using coding
theory . . . . . . . . . . . . . . . . . 909--933
Srimanta Bhattacharya and
Mridul Nandi A note on the chi-square method: A tool
for proving cryptographic security . . . 935--957
Matthias Hamann and
Matthias Krause On stream ciphers with provable
beyond-the-birthday-bound security
against time-memory-data tradeoff
attacks . . . . . . . . . . . . . . . . 959--1012
László Mérai and
Arne Winterhof On the pseudorandomness of automatic
sequences . . . . . . . . . . . . . . . 1013--1022
Tao Bai and
Yongbo Xia A new class of permutation trinomials
constructed from Niho exponents . . . . 1023--1036
Wilfried Meidl and
Ísabel Pirsic On the normality of $p$-ary bent
functions . . . . . . . . . . . . . . . 1037--1049
Claude Carlet On the nonlinearity of monotone Boolean
functions . . . . . . . . . . . . . . . 1051--1061
Ting Gu and
Zhixiong Chen and
Andrew Klapper Correlation immune functions with
respect to the $q$-transform . . . . . . 1063--1073
Sartaj Ul Hasan and
Daniel Panario and
Qiang Wang Nonlinear vectorial primitive recursive
sequences . . . . . . . . . . . . . . . 1075--1090
Gaojun Luo and
Xiwang Cao Complete weight enumerators of three
classes of linear codes . . . . . . . . 1091--1108
Rong Luo and
Udaya Parampalli Cyclic codes over $ M_2 (\mathbb {F}_2 +
u \mathbb {F}_2) $ . . . . . . . . . . . 1109--1117
Gaojun Luo and
Xiwang Cao Five classes of optimal two-weight
linear codes . . . . . . . . . . . . . . 1119--1135
Subhabrata Samajder and
Palash Sarkar Multiple (Truncated) Differential
Cryptanalysis: Explicit Upper Bounds on
Data Complexity . . . . . . . . . . . . 1137--1163
Xueying Shi and
Qin Yue and
Yaotsu Chang Some quantum MDS codes with large
minimum distance from generalized
Reed--Solomon codes . . . . . . . . . . 1165--1182
Zuling Chang and
Martianus Frederic Ezerman and
San Ling and
Huaxiong Wang The cycle structure of LFSR with
arbitrary characteristic polynomial over
finite fields . . . . . . . . . . . . . 1183--1202
Somphong Jitman Correction to: Good integers and some
applications in coding theory . . . . . 1203--1203
Lilya Budaghyan and
Claude Carlet and
Tor Helleseth Editorial: Special Issue on Boolean
functions and their applications . . . . 1--2
Irene Villa On APN functions $ L_1 (x^3) + L_2 (x^9)
$ with linear $ L_1 $ and $ L_2 $ . . . 3--20
Valeriya Idrisova On an algorithm generating $2$-to-$1$
APN functions and its applications to
``the big APN problem'' . . . . . . . . 21--39
Luca Mariot and
Stjepan Picek and
Alberto Leporati and
Domagoj Jakobovic Cellular automata based S-boxes . . . . 41--62
Sihem Mesnager and
Zhengchun Zhou and
Cunsheng Ding On the nonlinearity of Boolean functions
with restricted input . . . . . . . . . 63--76
Bimal Mandal and
Pantelimon Stanica and
Sugata Gangopadhyay New classes of $p$-ary bent functions 77--92
Çagdas Çalik and
Meltem Sönmez Turan and
René Peralta The multiplicative complexity of
$6$-variable Boolean functions . . . . . 93--107
Joan Boyar and
Magnus Gausdal Find and
René Peralta Small low-depth circuits for
cryptographic applications . . . . . . . 109--127
Nian Li and
Tor Helleseth New permutation trinomials from Niho
exponents over finite fields with even
characteristic . . . . . . . . . . . . . 129--136
Hongwei Liu and
Youcef Maouche Several new classes of linear codes with
few weights . . . . . . . . . . . . . . 137--146
Umberto Martínez-Peñas Universal secure rank-metric coding
schemes with optimal communication
overheads . . . . . . . . . . . . . . . 147--166
Lin Wang and
Zhi Hu Injectivity on distribution of elements
in the compressed sequences derived from
primitive sequences over $ \mathbb
{Z_{p^e}} $ . . . . . . . . . . . . . . 167--189
Jerod Michel and
Qi Wang Some new balanced and almost balanced
quaternary sequences with low
autocorrelation . . . . . . . . . . . . 191--206
Enes Pasalic and
Samir Hod\vzi\'c and
Fengrong Zhang and
Yongzhuang Wei Bent functions from nonlinear
permutations and conversely . . . . . . 207--225
Huali Deng and
Dabin Zheng More classes of permutation trinomials
with Niho exponents . . . . . . . . . . 227--236
Olav Geil and
Ferruh Özbudak On affine variety codes from the Klein
quartic . . . . . . . . . . . . . . . . 237--257
Haode Yan A note on the constructions of MDS
self-dual codes . . . . . . . . . . . . 259--268
Qichun Wang and
Pantelimon Stanica New bounds on the covering radius of the
second order Reed--Muller code of length
$ 128 $ . . . . . . . . . . . . . . . . 269--277
Kangquan Li and
Longjiang Qu and
Qiang Wang Compositional inverses of permutation
polynomials of the form $ x^r h(x^s) $
over finite fields . . . . . . . . . . . 279--298
Zhe Gao and
Chao Li and
Yue Zhou Upper bounds and constructions of
complete Asynchronous channel hopping
systems . . . . . . . . . . . . . . . . 299--312
Gaofei Wu and
Nian Li Several classes of permutation
trinomials over $ \mathbb {F}_{5^n} $
from Niho exponents . . . . . . . . . . 313--324
Mohammad Ashraf and
Ghulam Mohammad Quantum codes over $ F_p $ from cyclic
codes over $ F_p[u, v] / \langle u^2 -
1, v^3 - v, u v - v u \rangle $ . . . . 325--335
Yuhua Sun and
Qiang Wang and
Tongjiang Yan A lower bound on the $2$-adic complexity
of the modified Jacobi sequence . . . . 337--349
Saeed Rostami and
Elham Shakour and
Mohammad Ali Orumiehchiha and
Josef Pieprzyk Cryptanalysis of WG-8 and WG-16 stream
ciphers . . . . . . . . . . . . . . . . 351--362
Lilya Budaghyan and
Chunlei Li and
Matthew G. Parker Editorial: Special Issue on Mathematical
Methods for Cryptography . . . . . . . . 363--365
Kaisa Nyberg Affine linear cryptanalysis . . . . . . 367--377
Svetla Nikova and
Ventzislav Nikov and
Vincent Rijmen Decomposition of permutations in a
finite field . . . . . . . . . . . . . . 379--384
Kerem Varici and
Svetla Nikova and
Ventzislav Nikov and
Vincent Rijmen Constructions of S-boxes with uniform
sharing . . . . . . . . . . . . . . . . 385--398
László Csirmaz and
Péter Ligeti Secret sharing on large girth graphs . . 399--410
Yao Chen and
Benjamin M. Case and
Shuhong Gao and
Guang Gong Error analysis of weak Poly--LWE
instances . . . . . . . . . . . . . . . 411--426
Patrick Felke On the security of biquadratic $ C^* $
public-key cryptosystems and its
generalizations . . . . . . . . . . . . 427--442
Håvard Raddum and
Srimathi Varadharajan Factorization using binary decision
diagrams . . . . . . . . . . . . . . . . 443--460
V. A. Zinoviev On classical Kloosterman sums . . . . . 461--496
Assen Bojilov and
Lyubomir Borissov and
Yuri Borissov Computing the number of finite field
elements with prescribed absolute trace
and co-trace . . . . . . . . . . . . . . 497--507
Nian Li and
Xiangyong Zeng A survey on the applications of Niho
exponents . . . . . . . . . . . . . . . 509--548
Torleiv Klòve Codes of length two correcting single
errors of limited size . . . . . . . . . 549--555
Marco Buratti Hadamard partitioned difference families
and their descendants . . . . . . . . . 557--562
Ziran Tu and
Xiangyong Zeng A class of permutation trinomials over
finite fields of odd characteristic . . 563--583
Diego Napp and
Ricardo Pereira and
Raquel Pinto and
Paula Rocha Periodic state-space representations of
periodic convolutional codes . . . . . . 585--595
Masaaki Harada Singly even self-dual codes of length $
24 k + 10 $ and minimum weight $ 4 k + 2
$ . . . . . . . . . . . . . . . . . . . 597--608
Shudi Yang and
Qin Yue and
Yansheng Wu and
Xiangli Kong Complete weight enumerators of a class
of two-weight linear codes . . . . . . . 609--620
Ville Junnila and
Tero Laihonen and
Gabrielle Paris Optimal bounds on codes for location in
circulant graphs . . . . . . . . . . . . 621--640
Selçuk Kavut and
Sevdenur Baloglu Results on symmetric S-boxes constructed
by concatenation of RSSBs . . . . . . . 641--660
Limengnan Zhou and
Daiyuan Peng and
Xing Liu and
Hongyu Han and
Zheng Ma Frequency-hopping sequence sets with
good aperiodic Hamming correlation
property . . . . . . . . . . . . . . . . 661--675
Masaaki Harada and
Ken Saito Binary linear complementary dual codes 677--696
Sabyasachi Dey and
Santanu Sarkar Settling the mystery of $ Z_r = r $ in
RC4 . . . . . . . . . . . . . . . . . . 697--715
Liqin Qian and
Minjia Shi and
Patrick Solé On self-dual and LCD quasi-twisted codes
of index two over a special chain ring 717--734
Zibi Xiao and
Xiangyong Zeng and
Chaoyun Li and
Yupeng Jiang Binary sequences with period $N$ and
nonlinear complexity $ N - 2$ . . . . . 735--757
Gang Wang and
Min-Yao Niu and
Fang-Wei Fu Deterministic constructions of
compressed sensing matrices based on
codes . . . . . . . . . . . . . . . . . 759--775
Alexey Oblaukhov A lower bound on the size of the largest
metrically regular subset of the Boolean
cube . . . . . . . . . . . . . . . . . . 777--791
Anastasiya Gorodilova On the differential equivalence of APN
functions . . . . . . . . . . . . . . . 793--813
Yu Li and
Tongjiang Yan and
Chuan Lv Construction of a Near-Optimal
Quasi-Complementary Sequence Set from
Almost Difference Set . . . . . . . . . 815--824
Gaojun Luo and
Xiwang Cao Two constructions of asymptotically
optimal codebooks . . . . . . . . . . . 825--838
Joan-Josep Climent and
Verónica Requena and
Xaro Soler-Escriv\`a A construction of Abelian non-cyclic
orbit codes . . . . . . . . . . . . . . 839--852
Gaofei Wu and
Matthew Geoffrey Parker On Boolean functions with several flat
spectra . . . . . . . . . . . . . . . . 853--880
Antti Laaksonen and
Patric R. J. Östergård New lower bounds on $q$-ary
error-correcting codes . . . . . . . . . 881--889
Nuh Aydin and
Ghada Bakbouk and
Jonathan G. G. Lambrinos New linear codes over non-prime fields 891--902
Daniele Bartoli and
Alexander A. Davydov and
Massimo Giulietti and
Stefano Marcugini and
Fernanda Pambianco New bounds for linear codes of covering
radii 2 and 3 . . . . . . . . . . . . . 903--920
Muhiddin Uguz and
Ali Doganaksoy and
Fatih Sulak and
Onur Koçak R-2 composition tests: a family of
statistical randomness tests for a
collection of binary sequences . . . . . 921--949
Lin Wang and
Zhi Hu New explicit injective compressing
mappings on primitive sequences over $
\mathbb {Z}_{p^e} $ . . . . . . . . . . 951--963
Hila Rabii and
Osnat Keren A new class of security oriented error
correcting robust codes . . . . . . . . 965--978
Ying Gao and
Zihui Liu and
Yiwei Liu The separation of binary relative
three-weight codes and its applications 979--992
Richard Hofer and
Arne Winterhof $r$-th order nonlinearity, correlation
measure and least significant bit of the
discrete logarithm . . . . . . . . . . . 993--997
Avaz Naghipour New classes of quantum codes on closed
orientable surfaces . . . . . . . . . . 999--1008
Trygve Johnsen and
Hugues Verdure Relative profiles and extended weight
polynomials of almost affine codes . . . 1009--1020
Ismael Gutiérrez Garc\'ìa and
Daladier Jabba Molinares and
Ivan Molina Naizir A novel maximum distance separable code
to generate universal identifiers . . . 1021--1035
Yana Liang and
Jiali Cao and
Xingfa Chen and
Shiping Cai and
Xiang Fan Linear complexity of Ding--Helleseth
generalized cyclotomic sequences of
order eight . . . . . . . . . . . . . . 1037--1056
Libo Wang and
Baofeng Wu and
Xiaoqiang Yue and
Yanbin Zheng Further results on permutation
trinomials with Niho exponents . . . . . 1057--1068
Aleksandar Radonjic and
Vladimir Vujicic Integer codes correcting sparse byte
errors . . . . . . . . . . . . . . . . . 1069--1077
S. Hod\vzi\'c and
E. Pasalic and
A. Chattopadhyay An iterative method for linear
decomposition of index generating
functions . . . . . . . . . . . . . . . 1079--1102
Cem Güneri and
Ferruh Özbudak and
Elif Saçikara A concatenated construction of linear
complementary pair of codes . . . . . . 1103--1114
Allison Beemer and
Kathryn Haymaker and
Christine A. Kelley Absorbing sets of codes from finite
geometries . . . . . . . . . . . . . . . 1115--1131
Chunming Tang and
Yanfeng Qi and
Dongmei Huang Regular $p$-ary bent functions with five
terms and Kloosterman sums . . . . . . . 1133--1144
Lilya Budaghyan and
Claude Carlet and
Tor Helleseth Editorial: Special issue on Boolean
functions and their applications 2018 1145--1146
Anne Canteaut and
Léo Perrin and
Shizhu Tian If a generalised butterfly is APN then
it operates on 6 bits . . . . . . . . . 1147--1164
Nikolay S. Kaleyski Changing APN functions at two points . . 1165--1184
Deng Tang and
Jian Liu A family of weightwise (almost)
perfectly balanced boolean functions
with optimal algebraic immunity . . . . 1185--1197
Xiang-dong Hou On a class of permutation trinomials in
characteristic 2 . . . . . . . . . . . . 1199--1210
Claude Gravel and
Daniel Panario and
David Thomson Unicyclic strong permutations . . . . . 1211--1231
Wilfried Meidl and
Alexander Pott Generalized bent functions into $
\mathbb {Z}_{p^k} $ from the partial
spread and the Maiorana--McFarland class 1233--1245
Sihem Mesnager and
Constanza Riera and
Pantelimon Stanica Multiple characters transforms and
generalized Boolean functions . . . . . 1247--1260
Gaojun Luo and
Xiwang Cao and
Sihem Mesnager Several new classes of self-dual bent
functions derived from involutions . . . 1261--1273
N. Cepak and
E. Pasalic and
A. Muratovi\'c-Ribi\'c Frobenius linear translators giving rise
to new infinite classes of permutations
and bent functions . . . . . . . . . . . 1275--1295
Ferruh Özbudak and
RumI MelIh Pelen Strongly regular graphs arising from
non-weakly regular bent functions . . . 1297--1306
Patrick G. Cesarz and
Robert S. Coulter Image sets with regularity of
differences . . . . . . . . . . . . . . 1307--1337
Luís T. A. N. Brandão and
Çagdas Çalik and
Meltem Sönmez Turan and
René Peralta Upper bounds on the multiplicative
complexity of symmetric Boolean
functions . . . . . . . . . . . . . . . 1339--1362
Yun Gao and
Weijun Fang and
Fang-Wei Fu On the algebraic structure of
quasi-cyclic codes of index $ 1 \frac
{1}{2} $ . . . . . . . . . . . . . . . . 1--18
Sihem Mesnager and
Kwang Ho Kim and
Junyop Choe and
Chunming Tang On the Menezes--Teske--Weng conjecture 19--27
Zexia Shi and
Fang-Wei Fu The primitive idempotents of irreducible
constacyclic codes and LCD cyclic codes 29--52
Minjia Shi and
Hongwei Zhu and
Liqin Qian and
Lin Sok and
Patrick Solé On self-dual and LCD double circulant
and double negacirculant codes over $
\mathbb {F}_q + u \mathbb {F}_q $ . . . 53--70
Moshe Milshtein A new two-error-correcting binary code
of length 16 . . . . . . . . . . . . . . 71--75
Deng Tang and
Haode Yan and
Zhengchun Zhou and
Xiaosong Zhang A new lower bound on the second-order
nonlinearity of a class of monomial bent
functions . . . . . . . . . . . . . . . 77--83
L. Budaghyan and
Marco Calderini and
I. Villa On relations between CCZ- and
EA-equivalences . . . . . . . . . . . . 85--100
Adel Alahmadi and
Cem Güneri and
Buket Özkaya and
Hatoon Shoaib and
Patrick Solé On complementary dual multinegacirculant
codes . . . . . . . . . . . . . . . . . 101--113
Suman Roy and
Srinivasan Krishnaswamy On the frequency of symbols in sequences
generated by nonlinear Feedforward
generators . . . . . . . . . . . . . . . 115--126
Steven T. Dougherty and
Joseph Gildea and
Abidin Kaya Quadruple bordered constructions of
self-dual codes from group rings . . . . 127--146
Fengwei Li and
Qin Yue and
Yansheng Wu Designed distances and parameters of new
LCD BCH codes over finite fields . . . . 147--163
Tailin Niu and
Kangquan Li and
Longjiang Qu and
Qiang Wang New constructions of involutions over
finite fields . . . . . . . . . . . . . 165--185
Guanmin Guo and
Ruihu Li and
Yang Liu and
Junli Wang A family of negacyclic BCH codes of
length $ n = \frac {q^{2m} - 1}{2} $ . . 187--203
Li Shuai and
Lina Wang and
Li Miao and
Xianwei Zhou Differential uniformity of the
composition of two functions . . . . . . 205--220
Aleksandar Radonjic and
Vladimir Vujicic Integer codes correcting burst
asymmetric within a byte and double
asymmetric errors . . . . . . . . . . . 221--230
Aleksandar Radonjic and
Vladimir Vujicic Correction to: Integer codes correcting
burst asymmetric errors within a byte
and double asymmetric errors . . . . . . 231--231
Zhongxiao Wang and
Qunxiong Zheng and
Wenfeng Qi The cycle structure of NFSR($ f^d$) and
its applications . . . . . . . . . . . . 233--252
Ting Yao and
Shixin Zhu $ \mathbb {Z}_p \mathbb {Z}_{p^s}
$-additive cyclic codes are
asymptotically good . . . . . . . . . . 253--264
Zhonghua Sun and
Shixin Zhu and
Liqi Wang A class of constacyclic BCH codes . . . 265--284
Makoto Araya and
Masaaki Harada On the minimum weights of binary linear
complementary dual codes . . . . . . . . 285--300
Yuan Cao and
Yonglin Cao Complete classification for simple root
cyclic codes over the local ring $
\mathbb {Z}_4 [v] \slash \langle v^2 + 2
v \rangle $ . . . . . . . . . . . . . . 301--319
Tor Helleseth and
Wai Ho Mow and
Zhengchun Zhou Editorial: Special issue on sequences
and their applications 2018 . . . . . . 321--323
Dan Zhang and
Matthew Geoffrey Parker and
Tor Helleseth Polyphase zero correlation zone
sequences from generalised bent
functions . . . . . . . . . . . . . . . 325--335
Evgeny Krengel One construction of perfect ternary
sequences . . . . . . . . . . . . . . . 337--347
Yajing Zhou and
Zhengchun Zhou and
Yong Wang Two constructions for $ 16$-QAM
complementary sequence sets with
non-power-of-two length . . . . . . . . 349--362
Yang Yang and
Chunlei Li New quaternary sequences with optimal
odd-periodic autocorrelation magnitude 363--374
Deng Tang and
Xia Li A note on the minimal binary linear code 375--388
Domingo Gómez-Pérez and
Ana I. Gómez and
Andrew Tirkel Large families of sequences for CDMA,
frequency hopping, and UWB . . . . . . . 389--403
Hongyu Han and
Sheng Zhang and
Xing Liu Decimated $m$-sequences families with
optimal partial Hamming correlation . . 405--413
Zhimin Sun and
Xiangyong Zeng and
Da Lin On the $N$-th maximum order complexity
and the expansion complexity of a
Rudin--Shapiro-like sequence . . . . . . 415--426
Chunlei Li and
Yang Yang On three conjectures of binary sequences
with low odd-periodic autocorrelation 427--442
Minjia Shi and
Chenchen Wang and
Yaoqiang Chang One-weight and two-weight $ \mathbb
{Z}_2 \mathbb {Z}_2 [u, v] $ -additive
codes . . . . . . . . . . . . . . . . . 443--454
Sihem Mesnager On generalized hyper-bent functions . . 455--468
Shuxing Li and
Alexander Pott A direct construction of primitive
formally dual pairs having subsets with
unequal sizes . . . . . . . . . . . . . 469--483
Limengnan Zhou and
Hongyu Han and
Xing Liu Frequency-hopping sequence sets with
no-hit-zone through Cartesian product 485--497
Malcolm Egan Properties of tight frames that are
regular schemes . . . . . . . . . . . . 499--510
Yansheng Wu and
Qin Yue and
Xiaomeng Zhu Binary and ternary sequences with a few
cross correlations . . . . . . . . . . . 511--525
Lilya Budaghyan and
Nikolay S. Kaleyski and
Pantelimon Stanica Partially APN Boolean functions and
classes of functions that are not APN
infinitely often . . . . . . . . . . . . 527--545
Xiwang Cao and
Gaojun Luo and
Guangkui Xu Three deterministic constructions of
compressed sensing matrices with low
coherence . . . . . . . . . . . . . . . 547--558
Xia Li and
Cuiling Fan and
Xiaoni Du A family of distance-optimal minimal
linear codes with flexible parameters 559--567
Chengju Li and
Qin Yue and
Wei Peng A class of exponential sums and sequence
families . . . . . . . . . . . . . . . . 569--584
Zilong Wang and
Jinjin Chai and
Guang Gong The Fourier spectral characterization
for the correlation-immune functions
over $ \mathbb {F}_p $ . . . . . . . . . 585--595
Ch. Srikanth Certain sequence of arithmetic
progressions and a new key sharing
method . . . . . . . . . . . . . . . . . 597--612
Krishna Gopal Benerjee and
Manish K. Gupta On non-uniform flower codes . . . . . . 613--643
Zihui Liu and
Jinliang Wang Notes on generalized Hamming weights of
some classes of binary codes . . . . . . 645--657
Sihem Mesnager and
Kwang Ho Kim and
Myong Song Jo On the number of the rational zeros of
linearized polynomials and the
second-order nonlinearity of cubic
Boolean functions . . . . . . . . . . . 659--674
Yuhua Sun and
Tongjiang Yan and
Lianhai Wang The $2$-adic complexity of a class of
binary sequences with optimal
autocorrelation magnitude . . . . . . . 675--683
Christof Beierle and
Alex Biryukov and
Aleksei Udovenko On degree-$d$ zero-sum sets of full rank 685--710
Jasvinder Singh and
Manish Gupta and
Jaskarn Singh Bhullar On the search of smallest QC-LDPC code
with girth six and eight . . . . . . . . 711--723
Lu Zhao About the linear complexity of
quaternary sequences with even length 725--741
Binbin Pang and
Shixin Zhu and
Xiaoshan Kai Some new bounds on LCD codes over finite
fields . . . . . . . . . . . . . . . . . 743--755
J. A. Armario and
D. L. Flannery Almost supplementary difference sets and
quaternary sequences with optimal
autocorrelation . . . . . . . . . . . . 757--768
Joe Gildea and
Rhian Taylor and
A. Tylyshchak Double bordered constructions of
self-dual codes from group rings over
Frobenius rings . . . . . . . . . . . . 769--784
José Ortiz-Ubarri New asymptotically optimal
three-dimensional wave-length/space/time
optical orthogonal codes for OCDMA
systems . . . . . . . . . . . . . . . . 785--794
Liqin Hu and
Keqin Feng The minimum distance of new
generalisations of the punctured binary
Reed--Muller codes . . . . . . . . . . . 795--808
Sihem Mesnager and
Kwang Ho Kim and
Dae Song Go Solving $ x + x^{2^l} + \cdots +
x^{2^{ml}} = a $ over $ \mathbb
{F}_{2^n} $ . . . . . . . . . . . . . . 809--817
Lilya Budaghyan and
Tor Helleseth Editorial: Special issue on Boolean
functions and their applications . . . . 819--820
Marco Calderini On the EA-classes of known APN functions
in small dimensions . . . . . . . . . . 821--840
Patrick Felke The multivariate method strikes again:
New power functions with low
differential uniformity in odd
characteristic . . . . . . . . . . . . . 841--857
A. Musukwa and
M. Sala On the linear structures of balanced
functions and quadratic APN functions 859--880
Aleksandr Kutsenko The group of automorphisms of the set of
self-dual bent functions . . . . . . . . 881--898
Ayça Çesmelioglu and
Wilfried Meidl and
Alexander Pott Vectorial bent functions in odd
characteristic and their components . . 899--912
Tekgül Kalayci and
Henning Stichtenoth and
Alev Topuzoglu Permutation polynomials and
factorization . . . . . . . . . . . . . 913--934
Çagdas Çalik and
Meltem Sönmez Turan and
René Peralta Boolean functions with multiplicative
complexity 3 and 4 . . . . . . . . . . . 935--946
Pavol Zajac and
Matús Jókay Cryptographic properties of small
bijective $S$-boxes with respect to
modular addition . . . . . . . . . . . . 947--963
Nian Li and
Sihem Mesnager Recent results and problems on
constructions of linear codes from
cryptographic functions . . . . . . . . 965--986
Wrya K. Kadir and
Chunlei Li On decoding additive generalized twisted
Gabidulin codes . . . . . . . . . . . . 987--1009
Cunsheng Ding and
Chunming Tang Combinatorial $t$-designs from special
functions . . . . . . . . . . . . . . . 1011--1033
Luis A. Medina and
Matthew G. Parker and
Pantelimon Stanica Root-Hadamard transforms and
complementary sequences . . . . . . . . 1035--1049
Yuri Borissov and
Lyubomir Borissov A note on the distinctness of some
Kloosterman sums . . . . . . . . . . . . 1051--1056
Büsra Özden and
Oguz Yayla Almost $p$-ary sequences . . . . . . . . 1057--1069
Jing Jiang and
Minquan Cheng Regular $ (k, R, 1) $-packings with $
\max (R) = 3 $ and their locally
repairable codes . . . . . . . . . . . . 1071--1089
Nurdagül Anbar and
Canan Kasikçi and
Alev Topuzoglu Shifted plateaued functions and their
differential properties . . . . . . . . 1091--1105
Yuan Cao and
Yonglin Cao and
Fang-Wei Fu Correcting mistakes in the paper ``A
mass formula for negacyclic codes of
length $ 2^k $ and some good negacyclic
codes over $ \mathbb {Z}_4 + u \mathbb
{Z}_4 $'' [Cryptogr. Commun. (2017)
9:241--272] . . . . . . . . . . . . . . 1107--1110
Xiaoqiang Wang and
Dabin Zheng The subfield codes of several classes of
linear codes . . . . . . . . . . . . . . 1111--1131
Christof Beierle and
Gregor Leander $4$-uniform permutations with null
nonlinearity . . . . . . . . . . . . . . 1133--1141
Lijing Zheng and
Jie Peng and
Yanjun Li Several new infinite families of bent
functions via second order derivatives 1143--1160
Marco Calderini and
Irene Villa On the boomerang uniformity of some
permutation polynomials . . . . . . . . 1161--1178
Faruk Göloglu Inverse function is not component-wise
uniform . . . . . . . . . . . . . . . . 1179--1194
Xia Wu and
Wei Lu and
Xiwang Cao Two constructions of asymptotically
optimal codebooks via the trace
functions . . . . . . . . . . . . . . . 1195--1211
Xiaolei Fang and
Meiqing Liu and
Jinquan Luo On Euclidean Hulls of MDS Codes . . . . 1--14
Ming Yan and
Tongjiang Yan and
Yu Li Computing the $2$-adic complexity of two
classes of Ding--Helleseth generalized
cyclotomic sequences of periods of twin
prime products . . . . . . . . . . . . . 15--26
Wateekorn Sriwirach and
Chakkrid Klin-eam Repeated-root constacyclic codes of
length $ 2 p^s $ over $ \mathbb
{F}_{p^m} + u \mathbb {F}_{p^m} + u^2
\mathbb {F}_{p^m} $ . . . . . . . . . . 27--52
Minfeng Shao and
Ying Miao Algebraic manipulation detection codes
via highly nonlinear functions . . . . . 53--69
Swapan Maiti and
Dipanwita Roy Chowdhury Design of fault-resilient S-boxes for
AES-like block ciphers . . . . . . . . . 71--100
Junru Ma and
Jinquan Luo On symbol-pair weight distribution of
MDS codes and simplex codes over finite
fields . . . . . . . . . . . . . . . . . 101--115
Can Xiang and
Wenjuan Yin Two families of subfield codes with a
few weights . . . . . . . . . . . . . . 117--127
Refia Aksoy and
Fatma Çaliskan Self-dual codes over $ \mathbb {F}_2
\times (\mathbb {F}_2 + v \mathbb {F}_2)
$ . . . . . . . . . . . . . . . . . . . 129--141
Krishna Gopal Benerjee and
Sourav Deb and
Manish K. Gupta On conflict free DNA codes . . . . . . . 143--171
Xiaoqiang Wang and
Dabin Zheng and
Yan Zhang A class of subfield codes of linear
codes and their duals . . . . . . . . . 173--196
B. Rega and
Z. H. Liu and
C. Durairajan The $t$-wise intersection and trellis of
relative four-weight codes . . . . . . . 197--223
Liqin Qian and
Xiwang Cao and
Sihem Mesnager Linear codes with one-dimensional hull
associated with Gaussian sums . . . . . 225--243
He Zhang and
Xiwang Cao Further constructions of cyclic subspace
codes . . . . . . . . . . . . . . . . . 245--262
Iliya Bouyukliev and
Stefka Bouyuklieva and
Paskal Piperkov Characteristic vector and weight
distribution of a linear code . . . . . 263--282
Nurdagül Anbar and
Canan Kasikci Permutations polynomials of the form $
G(X)^k - L(X) $ and curves over finite
fields . . . . . . . . . . . . . . . . . 283--294
Pantelimon Stanica and
Aaron Geary The $c$-differential behavior of the
inverse function under the
EA-equivalence . . . . . . . . . . . . . 295--306
Fanghui Ma and
Jian Gao and
Fang-Wei Fu $ (\sigma, \delta)$-Skew quasi-cyclic
codes over the ring $ \mathbb {Z}_4 + u
\mathbb {Z}_4$ . . . . . . . . . . . . . 307--320
Ajeet Kumar and
Subhamoy Maitra and
Chandra Sekhar Mukherjee On approximate real mutually unbiased
bases in square dimension . . . . . . . 321--329
Sophie Huczynska and
Christopher Jefferson and
Silvia Nepsinská Strong external difference families in
abelian and non-abelian groups . . . . . 331--341
Jingwei Zhang and
Chuangqiang Hu and
Chang-An Zhao Trace representation of the binary $ p
q^2$-periodic sequences derived from
Euler quotients . . . . . . . . . . . . 343--359
Refia Aksoy and
Fatma Çaliskan Correction to: Self-dual codes over $
\mathbb {F}_2 \times (\mathbb {F}_2 + v
\mathbb {F}_2) $ . . . . . . . . . . . . 361--362
Mustafa Faraj and
Catherine Gebotys Quiescent photonics side channel
analysis: Low cost SRAM readout attack 363--376
Faruk Göloglu and
Jirí Pavl\du On CCZ-inequivalence of some families of
almost perfect nonlinear functions to
permutations . . . . . . . . . . . . . . 377--391
Wengang Jin and
Xiaoni Du and
Cuiling Fan Boolean functions with six-valued Walsh
spectra and their application . . . . . 393--405
Zhiwen He and
Jiejing Wen Linear codes of 2-designs as subcodes of
the generalized Reed--Muller codes . . . 407--423
Briji J. Chathely and
Rajendra P. Deore Construction of binary Hadamard codes
and their $s$-PD sets . . . . . . . . . 425--438
Daniele Bartoli and
Matteo Bonini and
Burçin Günes An inductive construction of minimal
codes . . . . . . . . . . . . . . . . . 439--449
Aniruddha Biswas and
Palash Sarkar Separation results for boolean function
classes . . . . . . . . . . . . . . . . 451--458
Yubo Li and
Kangquan Li and
Longjiang Qu More permutations and involutions for
constructing bent functions . . . . . . 459--473
Yves Aubry and
Pierre Barthélémy and
Nadia El Mrabet Special issue from mathematics to
embedded devices . . . . . . . . . . . . 475--477
Dmitrii Koshelev Hashing to elliptic curves of
$j$-invariant 1728 . . . . . . . . . . . 479--494
Stéphane Ballet and
Alexis Bonnecaze and
Thanh-Hung Dang Optimization of the scalar complexity of
Chudnovsky$^2$ multiplication algorithms
in finite fields . . . . . . . . . . . . 495--517
Sarah Bordage and
Julien Lavauzelle On the privacy of a code-based
single-server computational PIR scheme 519--526
Wei Cheng and
Sylvain Guilley and
Jean-Luc Danger Categorizing all linear codes of IPM
over $ \mathbb {F}_{2^8} $ . . . . . . . 527--542
Simon Landry and
Yanis Linge and
Emmanuel Prouff Monomial evaluation of polynomial
functions protected by threshold
implementations --- with an illustration
on AES . . . . . . . . . . . . . . . . . 543--572
Charles-Henry Bertrand Van Ouytsel and
Olivier Bronchain and
François-Xavier Standaert How to fool a black box machine learning
based side-channel security evaluation 573--585
Charles Momin and
Olivier Bronchain and
François-Xavier Standaert A stealthy Hardware Trojan based on a
Statistical Fault Attack . . . . . . . . 587--600
S. T. Dougherty and
Joe Gildea and
Serap Sahinkaya $G$-codes, self-dual $G$-codes and
reversible $G$-codes over the ring $
\mathscr {B}_{j, k}$ . . . . . . . . . . 601--616
Yanhong Fan and
Sihem Mesnager and
Meiqin Wang Investigation for 8-bit SKINNY-like
S-boxes, analysis and applications . . . 617--636
Enes Pasalic and
René Rodríguez and
Yongzhuang Wei Several classes of minimal binary linear
codes violating the Ashikhmin--Barg
bound . . . . . . . . . . . . . . . . . 637--659
Jingjie Lv and
Ruihu Li and
Yu Yao Quasi-cyclic constructions of asymmetric
quantum error-correcting codes . . . . . 661--680
Xiang-dong Hou A power sum formula by Carlitz and its
applications to permutation rational
functions of finite fields . . . . . . . 681--694
Pavan Kumar and
Noor Mohammad Khan A class of linear codes with their
complete weight enumerators over finite
fields . . . . . . . . . . . . . . . . . 695--725
Xiaoping Shi and
Qin Yue and
Xinmei Huang Quantum synchronizable codes from the
Whiteman's generalized cyclotomy . . . . 727--739
Pierrick Méaux On the fast algebraic immunity of
threshold functions . . . . . . . . . . 741--762
Chen Liu and
Shuaijun Liu and
Zhengchun Zhou Three-phase $Z$-complementary triads and
almost complementary triads . . . . . . 763--773
K. T. Arasu and
Daniel M. Gordon and
Yiran Zhang New nonexistence results on circulant
weighing matrices . . . . . . . . . . . 775--789
Damien Jamet and
Pierre Popoli and
Thomas Stoll Maximum order complexity of the sum of
digits function in Zeckendorf base and
polynomial subsequences . . . . . . . . 791--814
Lukas Kölsch and
Robert Schüler Formal self duality . . . . . . . . . . 815--836
Kamil Otal and
Eda Tekin Efficient generation of quadratic
cyclotomic classes for shortest
quadratic decompositions of polynomials 837--845
Ge Yao and
Udaya Parampalli Cryptanalysis of the class of maximum
period Galois NLFSR-based stream ciphers 847--864
Zibi Xiao and
Xiangyong Zeng 2-Adic complexity of two constructions
of binary sequences with period $ 4 N $
and optimal autocorrelation magnitude 865--885
Lilya Budaghyan and
Claude Carlet and
Kaisa Nyberg Editorial: Special issue on Boolean
functions and their applications 2020 887--889
Pantelimon Stanica and
Constanza Riera and
Anton Tkachenko Characters, Weil sums and
$c$-differential uniformity with an
application to the perturbed Gold
function . . . . . . . . . . . . . . . . 891--907
Nikolay Kolomeec Some general properties of modified bent
functions through addition of indicator
functions . . . . . . . . . . . . . . . 909--926
Cunsheng Ding and
Chunming Tang The linear codes of $t$-designs held in
the Reed--Muller and Simplex codes . . . 927--949
Sihem Mesnager and
Sihong Su On constructions of weightwise perfectly
balanced Boolean functions . . . . . . . 951--979
Benjamin Chase and
Petr Lisonek Kim-type APN functions are affine
equivalent to Gold functions . . . . . . 981--993
Nikolay S. Kaleyski Invariants for EA- and CCZ-equivalence
of APN and AB functions . . . . . . . . 995--1023
Jian Ding and
Changlu Lin and
Sihem Mesnager Secret sharing schemes based on the dual
of Golay codes . . . . . . . . . . . . . 1025--1041
Dandan Wang and
Xiwang Cao A family of optimal ternary cyclic codes
with minimum distance five and their
duals . . . . . . . . . . . . . . . . . 1--13
A. Allahmadi and
A. AlKenani and
P. Solé New constructions of
entanglement-assisted quantum codes . . 15--37
A. Allahmadi and
A. AlKenani and
P. Solé Correction to: New constructions of
entanglement-assisted quantum codes . . 39--39
Siemen Dhooghe and
Svetla Nikova Resilient uniformity: applying
resiliency in masking . . . . . . . . . 41--58
Habibul Islam and
Om Prakash Construction of LCD and new quantum
codes from cyclic codes over a finite
non-chain ring . . . . . . . . . . . . . 59--73
Kwang Ho Kim and
Sihem Mesnager and
Dok Nam Lee Preimages of $p$-Linearized Polynomials
over $ \mathbb {F}_p$ . . . . . . . . . 75--86
Huimin Lao and
Hao Chen and
Xiaoqing Tan New constant dimension subspace codes
from block inserting constructions . . . 87--99
S. Kudin and
E. Pasalic and
F. Zhang Permutations without linear structures
inducing bent functions outside the
completed Maiorana--McFarland class . . 101--116
Vishnupriya Anupindi and
László Mérai Linear complexity of some sequences
derived from hyperelliptic curves of
genus 2 . . . . . . . . . . . . . . . . 117--134
Zhi Gu and
Zhengchun Zhou and
Udaya Parampalli A new family of polyphase sequences with
low correlation . . . . . . . . . . . . 135--144
Xiaolei Fang and
Renjie Jin and
Wen Ma New Galois Hulls of GRS Codes and
Application to EAQECCs . . . . . . . . . 145--159
Qianhong Wan and
Chao Li On equivalence between two known
families of APN polynomial functions and
APN power functions . . . . . . . . . . 161--182
Vladimir Edemskiy and
Yuhua Sun The symmetric 2-adic complexity of
sequences with optimal autocorrelation
magnitude and length $ 8 q $ . . . . . . 183--199
Yongfeng Niu and
Qin Yue and
Daitao Huang New constant dimension subspace codes
from parallel linkage construction and
multilevel construction . . . . . . . . 201--214
Yan Liu and
Xiwang Cao A class of affine-invariant codes and
their support 2-designs . . . . . . . . 215--227
Ge Yao and
Udaya Parampalli Improved transformation algorithms for
generalized Galois NLFSRs . . . . . . . 229--258
Heqian Xu and
Wei Du Hermitian LCD codes over $ \mathbb
{F}_{q^2} + u \mathbb {F}_{q^2} $ and
their applications to maximal
entanglement EAQECCs . . . . . . . . . . 259--269
Nikolay Kaleyski Deciding EA-equivalence via invariants 271--290
Limengnan Zhou and
Xing Liu and
Changyuan Wang Classes of optimal low-hit-zone
frequency-hopping sequence sets with new
parameters . . . . . . . . . . . . . . . 291--306
Limengnan Zhou and
Hanzhou Wu Multi-party watermark embedding with
frequency-hopping sequences . . . . . . 307--318
Lilya Budaghyan and
Nikolay Kaleyski and
Pantelimon Stanica On the behavior of some APN permutations
under swapping points . . . . . . . . . 319--345
Xing Liu and
Shaofang Hong and
Limengnan Zhou NHZ frequency hopping sequence sets
under aperiodic Hamming correlation:
Tighter bound and optimal constructions 347--356
Haode Yan On $ ( - 1)$-differential uniformity of
ternary APN power functions . . . . . . 357--369
Sha Jiang and
Kangquan Li and
Longjiang Qu Differential and boomerang spectrums of
some power permutations . . . . . . . . 371--393
Vladimir Edemskiy and
Nikita Sokolovskiy The estimate of the linear complexity of
generalized cyclotomic binary and
quaternary sequences with periods $ p^n
$ and $ 2 p^n $ . . . . . . . . . . . . 395--414
Guangkui Xu and
Longjiang Qu and
Gaojun Luo Minimal linear codes from weakly regular
bent functions . . . . . . . . . . . . . 415--431
Michael Vielhaber and
Mónica del Pilar Canales Chacón and
Sergio Jara Ceballos Rational complexity of binary sequences,
F$ \mathbb {Q} $SRs, and
pseudo-ultrametric continued fractions
in $ \mathbb {R} $ . . . . . . . . . . . 433--457
Ana Salagean and
Pantelimon Stanica Improving bounds on probabilistic affine
tests to estimate the nonlinearity of
Boolean functions . . . . . . . . . . . 459--481
Haitao Li and
Yang Liu and
Gang Wang Jump and hop randomness tests for binary
sequences . . . . . . . . . . . . . . . 483--502
Ángela Barbero and
Vitaly Skachek and
Òyvind Ytrehus Preface of special issue on coding
theory and applications . . . . . . . . 503--503
Jaime Gutierrez Attacking the linear congruential
generator on elliptic curves via lattice
techniques . . . . . . . . . . . . . . . 505--525
Ajeet Kumar and
Subhamoy Maitra Resolvable block designs in construction
of approximate real MUBs that are sparse 527--549
Raj Kumar and
Maheshanand Bhaintwal Repeated root cyclic codes over $
\mathbb {Z}_{p^2} + u \mathbb {Z}_{p^2}
$ and their Lee distances . . . . . . . 551--577
Fengwei Li The Hermitian dual-containing LCD BCH
codes and related quantum codes . . . . 579--596
Huicong Liang and
Sihem Mesnager and
Meiqin Wang Cryptanalysis of the AEAD and hash
algorithm DryGASCON . . . . . . . . . . 597--625
Minjia Shi and
Shitao Li and
Patrick Solé LCD and ACD codes over a noncommutative
non-unital ring with four elements . . . 627--640
Can Xiang Some $t$-designs from BCH codes . . . . 641--652
Xia Li and
Qin Yue and
Deng Tang The second-order zero differential
spectra of almost perfect nonlinear
functions and the inverse function in
odd characteristic . . . . . . . . . . . 653--662
Kaiqiang Liu and
Qi Wang and
Haode Yan A class of binary cyclic codes with
optimal parameters . . . . . . . . . . . 663--675
Weijun Fang and
Jun Zhang and
Fang-Wei Fu New constructions of self-dual
generalized Reed--Solomon codes . . . . 677--690
Sihem Mesnager and
Bimal Mandal and
Mounira Msahli Survey on recent trends towards
generalized differential and boomerang
uniformities . . . . . . . . . . . . . . 691--735
Wilfried Meidl A survey on $p$-ary and generalized bent
functions . . . . . . . . . . . . . . . 737--782
László Mérai and
Arne Winterhof Pseudorandom sequences derived from
automatic sequences . . . . . . . . . . 783--815
Bingsheng Shen and
Yang Yang and
Zhengchun Zhou New $z$-complementary/complementary
sequence sets with non-power-of-two
length and low PAPR . . . . . . . . . . 817--832
Makoto Araya and
Masaaki Harada On the classification of quaternary
optimal Hermitian LCD codes . . . . . . 833--847
Yongjin Jeon and
Seungjun Baek and
Jongsung Kim Differential uniformity and linearity of
S-boxes by multiplicative complexity . . 849--874
Xia Wu and
Wei Lu and
Xiwang Cao Minimal linear codes constructed from
functions . . . . . . . . . . . . . . . 875--895
Ravi B. D. Figueiredo and
Juliano B. Lima Tangent-Chebyshev maps over finite
fields: New properties and functional
graphs . . . . . . . . . . . . . . . . . 897--908
Hai Q. Dinh and
Narendra Kumar and
Abhay Kumar Singh A study of quantum codes obtained from
cyclic codes over a non-chain ring . . . 909--923
Daniele Bartoli and
Marco Timpanella On a conjecture on APN permutations . . 925--931
Seyda Köse and
Ferruh Özbudak Factorization of some polynomials over
finite local commutative rings and
applications to certain self-dual and
LCD codes . . . . . . . . . . . . . . . 933--948
Lin Sok MDS linear codes with one-dimensional
hull . . . . . . . . . . . . . . . . . . 949--971
Maryam Izadi and
Arezoo Soufi Karbaski and
Rashid Rezaei and
Karim Samei Isodual codes over $ \mathbb {F}_q $
from a multiplier . . . . . . . . . . . 973--982
Shanding Xu Optimal frequency-hopping sequences
based on the decimated $m$-sequences . . 983--998
Lei Sun and
Zexia Shi and
Jian Liu and
Fang-Wei Fu Results on the nonexistence of
bent-negabent rotation symmetric Boolean
functions . . . . . . . . . . . . . . . 999--1008
Reguia Lamia Bouzara and
Kenza Guenda and
Edgar Martínez-Moro Lifted codes and lattices from codes
over finite chain rings . . . . . . . . 1009--1020
Shikha Patel and
Om Prakash and
Habibul Islam Cyclic codes over $ M_4 (\mathbb {F}_2 +
u \mathbb {F}_2) $ . . . . . . . . . . . 1021--1034
Shikha Patel and
Om Prakash and
Habibul Islam Correction to: Cyclic codes over $ M_4
(\mathbb {F}_2 + u \mathbb {F}_2) $ . . 1035--1037
Fulin Li and
Yang Liu and
Jiayun Yan and
Shixin Zhu A new fair multi-secret sharing scheme
based on asymmetric bivariate polynomial 1039--1053
Kezia Saini and
Manish Garg On the higher-order nonlinearity of a
Boolean bent function class (Constructed
via Niho power functions) . . . . . . . 1055--1066
George Petrides A number theoretic view on binary shift
registers . . . . . . . . . . . . . . . 1067--1080
Haode Yan and
Zhen Li A note on the differential spectrum of a
class of power mappings with Niho
exponent . . . . . . . . . . . . . . . . 1081--1089
Alexandru Chirvasitu and
Thomas Cusick Symbolic dynamics and rotation symmetric
Boolean functions . . . . . . . . . . . 1091--1115
Yuan Cao and
Yonglin Cao and
San Ling and
Guidong Wang On the construction of self-dual cyclic
codes over $ \mathbb {Z}_4 $ with
arbitrary even length . . . . . . . . . 1117--1143
Yu Long Chen and
Avijit Dutta and
Mridul Nandi Multi-user BBB security of public
permutations based MAC . . . . . . . . . 1145--1177
Boran Kim Quantum codes from one-point codes on
norm-trace curves . . . . . . . . . . . 1179--1188
Ziteng Huang and
Weijun Fang and
Fang-Wei Fu Linear $l$-intersection pairs of MDS
codes and their applications to AEAQECCs 1189--1206
Lilya Budaghyan and
Claude Carlet and
Cunsheng Ding and
Tor Helleseth Editorial: Special issue on Boolean
functions and their applications 2021 1207--1209
Daniele Bartoli and
Marco Calderini and
Constanza Riera and
Pantelimon St\uanic\ua Low $c$-differential uniformity for
functions modified on subfields . . . . 1211--1227
Amar Bapi\'c and
Enes Pasalic and
Fengrong Zhang and
Samir Hod\vzi\'c Constructing new superclasses of bent
functions from known ones . . . . . . . 1229--1256
Sartaj Ul Hasan and
Mohit Pal and
Pantelimon Stanica The binary Gold function and its
$c$-boomerang connectivity table . . . . 1257--1280
Wrya K. Kadir and
Chunlei Li and
Ferdinando Zullo Encoding and decoding of several optimal
rank metric codes . . . . . . . . . . . 1281--1300
Said Eddahmani and
Sihem Mesnager Explicit values of the DDT, the BCT, the
FBCT, and the FBDT of the inverse, the
gold, and the Bracken--Leander S-boxes 1301--1344
Benjamin Chase and
Petr Lisonek Construction of APN permutations via
Walsh zero spaces . . . . . . . . . . . 1345--1357
Yuyin Yu and
Léo Perrin Constructing more quadratic APN
functions with the QAM method . . . . . 1359--1369
Sihem Mesnager and
Sihong Su and
Jingjing Li and
Linya Zhu Concrete constructions of weightwise
perfectly balanced (2-rotation
symmetric) functions with optimal
algebraic immunity and high weightwise
nonlinearity . . . . . . . . . . . . . . 1371--1389
Xiaoqin Hong and
Xiwang Cao Generalized block inserting for
constructing new constant dimension
codes . . . . . . . . . . . . . . . . . 1--15
Sandeep Sharma and
Anuradha Sharma Multi-twisted additive codes over finite
fields are asymptotically good . . . . . 17--33
Lilya Budaghyan and
Ivana Ivkovic and
Nikolay Kaleyski Triplicate functions . . . . . . . . . . 35--83
Praveen Kumar and
Palash Sarkar and
Sudhan Majhi and
Subhabrata Paul A direct construction of even length
ZCPs with large ZCZ ratio . . . . . . . 85--94
Min Li and
Yajing Zhou and
Wei Su and
Yang Yang Constructions of almost complementary
pairs based on non-standard Golay
sequences . . . . . . . . . . . . . . . 95--110
Indibar Debnath and
Om Prakash and
Habibul Islam Galois hulls of constacyclic codes over
finite fields . . . . . . . . . . . . . 111--127
Indibar Debnath and
Om Prakash and
Habibul Islam Correction to: Galois hulls of
constacyclic codes over finite fields 129--130
Xiang Wang Reconstruction of permutations distorted
by single Kendall $ \tau $-errors . . . 131--144
Yu Wang and
Xiaoshan Kai and
Zhonghua Sun and
Shixin Zhu Hermitian dual-containing constacyclic
codes over $ \mathbb {F}_{q^2} + v_1
\mathbb {F}_{q^2} + \cdots + v_r \mathbb
{F}_{q^2} $ and new quantum codes . . . 145--158
Wenjuan Yin and
Can Xiang and
Fang-Wei Fu New frequency-hopping sequence sets with
good parameters under aperiodic Hamming
correlation . . . . . . . . . . . . . . 159--169
Hai Q. Dinh and
Tushar Bag and
Kanat Abdukhalikov and
Sachin Pathak and
Ashish K. Upadhyay and
Ramakrishna Bandi and
Warattaya Chinnakum On a class of skew constacyclic codes
over mixed alphabets and applications in
constructing optimal and quantum codes 171--198
George Petrides On decompositions of permutation
polynomials into quadratic and cubic
power permutations . . . . . . . . . . . 199--207
Youcef Maouche Symbol-pair weight distribution of some
irreducible cyclic codes . . . . . . . . 209--220
Daitao Huang and
Qin Yue and
Yongfeng Niu MDS or NMDS LCD codes from twisted
Reed--Solomon codes . . . . . . . . . . 221--237
Konstantin Kalgin and
Valeriya Idrisova The classification of quadratic APN
functions in 7 variables and
combinatorial approaches to search for
APN functions . . . . . . . . . . . . . 239--256
G. Gong and
Z. L. Wang Status of three classes of sequences . . 257--308
Jeffrey Shallit Note on a Fibonacci parity sequence . . 309--315
Gerardo Vega and
Félix Hernández The complete weight distribution of a
subclass of optimal three-weight cyclic
codes . . . . . . . . . . . . . . . . . 317--330
Qian Guo and
Erik Mårtensson and
Paul Stankovski Wagner Modeling and simulating the sample
complexity of solving LWE using
BKW-style algorithms . . . . . . . . . . 331--350
Chenmiao Shi and
Jie Peng and
Lijing Zheng and
Shihao Lu On the equivalence between a new family
of APN quadrinomials and the power APN
functions . . . . . . . . . . . . . . . 351--363
Xiaoshan Quan and
Qin Yue and
Xia Li and
Chengju Li Two classes of 2-weight and 3-weight
linear codes in terms of Kloosterman
sums . . . . . . . . . . . . . . . . . . 365--380
Xiaoshan Quan and
Qin Yue and
Xia Li and
Chengju Li Correction: Two classes of 2-weight and
3-weight linear codes in terms of
Kloosterman sums . . . . . . . . . . . . 381--381
Guanmin Guo and
Ruihu Li and
Yang Liu and
Hao Song Duality of generalized twisted
Reed--Solomon codes and Hermitian
self-dual MDS or NMDS codes . . . . . . 383--395
Jiabo Wang and
Cong Ling Polar coding for Ring--LWE-based public
key encryption . . . . . . . . . . . . . 397--431
Selçuk Kavut Improved cryptographic properties of
Boolean functions obtained from the
neighbourhood of Patterson--Wiedemann
functions . . . . . . . . . . . . . . . 433--442
Moshe Milshtein A new binary $ (17, 4, 5) $ constant
weight code . . . . . . . . . . . . . . 443--453
Keita Ishizuka Construction of quaternary Hermitian LCD
codes . . . . . . . . . . . . . . . . . 455--467
Whan-Hyuk Choi and
Cem Güneri and
Jon-Lark Kim and
Ferruh Özbudak Optimal Binary Linear Complementary
Pairs of Codes . . . . . . . . . . . . . 469--486
René Rodríguez and
Yongzhuang Wei and
Enes Pasalic A theoretical analysis of generalized
invariants of bijective S-boxes . . . . 487--512
Fagang Li and
Hao Chen and
Huimin Lao and
Shanxiang Lyu New upper bounds and constructions of
multi-erasure locally recoverable codes 513--528
Hai Q. Dinh and
Bhanu Pratap Yadav and
Tushar Bag and
Daniel Panario and
Ashish Kumar Upadhyay Self-dual and LCD double circulant and
double negacirculant codes over a family
of finite rings $ \mathbb {F}_q [v_1,
v_2, \ldots, v_t] $ . . . . . . . . . . 529--551
Xiaoru Li and
Ziling Heng A construction of optimal locally
recoverable codes . . . . . . . . . . . 553--563
Yang Li and
Shixin Zhu and
Ping Li On MDS codes with Galois hulls of
arbitrary dimensions . . . . . . . . . . 565--587
Brahim Boudine and
Jamal Laaouine and
Mohammed Elhassani Charkani On the classification of ideals over $
R[X] \slash \langle f(X)^{p^s} \rangle $
when $ R = \mathbb {F}_{p^m} + u \mathbb
{F}_{p^m} + \ldots + u^n \mathbb
{F}_{p^m} $ . . . . . . . . . . . . . . 589--598
Vidya Sagar and
Ritumoni Sarma Octanary linear codes using simplicial
complexes . . . . . . . . . . . . . . . 599--616
Kaisa Nyberg Modifications of bijective S-boxes with
linear structures . . . . . . . . . . . 617--625
Hiroaki Taniguchi D-property for APN functions from $
\mathbb {F}_2^n $ to $ \mathbb {F}_2^{n
+ 1} $ . . . . . . . . . . . . . . . . . 627--647
Daitao Huang and
Qin Yue and
Fengwei Li Two classes of quasi-cyclic codes via
irreducible polynomials . . . . . . . . 649--659
Ruikai Chen and
Sihem Mesnager Evaluation of Weil sums for some
polynomials and associated quadratic
forms . . . . . . . . . . . . . . . . . 661--673
Daniel Panario and
Lucas Pandolfo Perin and
Brett Stevens Comparing balanced sequences obtained
from ElGamal function to random balanced
sequences . . . . . . . . . . . . . . . 675--707
Zhi Gu and
Zhengchun Zhou and
Avik Ranjan Adhikary and
Pingzhi Fan Two-dimensional Golay complementary
array pairs with flexible size and large
zero correlation zone . . . . . . . . . 709--717
Somantika Datta Welch bound equality sets with few
distinct inner products from
Delsarte--Goethals sets . . . . . . . . 719--729
Phil Hebborn and
Gregor Leander and
Aleksei Udovenko Mathematical aspects of division
property . . . . . . . . . . . . . . . . 731--774
Ferruh Özbudak and
Burcu Gülmez Temür Complete characterization of some
permutation polynomials of the form $
x^r (1 + a x^{s_1(q - 1)} + b x^{s_2(q -
1)}) $ over $ \mathbb {F}_{q^2} $ . . . 775--793
Monika Bishnoi and
Pankaj Kumar Weight enumerators of some irreducible
cyclic codes of odd length . . . . . . . 795--809
Amritanshu Rai and
Rohit Gupta Further results on a class of
permutation trinomials . . . . . . . . . 811--820
Sampada Tiwari and
Deepmala Sharma On higher order nonlinearities of
Boolean functions . . . . . . . . . . . 821--830
Yanjun Li and
Haibin Kan and
Jie Peng and
Lijing Zheng Cryptographic functions with interesting
properties from CCZ-equivalence . . . . 831--844
Basri Çaliskan and
Nuh Aydin and
Peihan Liu Skew cyclic codes over $ \mathbb {Z}_4 +
u \mathbb {Z}_4 + v \mathbb {Z}_4 $ . . 845--858
Moshe Milshtein Correction: A new binary $ (17, 4, 5) $
constant weight code . . . . . . . . . . 859--859
Jyotirmoy Basak and
Subhamoy Maitra and
Prabal Paul and
Animesh Roy Analysis of boolean functions related to
binary input binary output two-party
nonlocal games . . . . . . . . . . . . . 861--890
Alireza Abdollahi and
Javad Bagherian and
Fatemeh Jafari and
Maryam Khatami and
Farzad Parvaresh and
Reza Sobhani New upper bounds on the size of
permutation codes under Kendall $ \tau
$-metric . . . . . . . . . . . . . . . . 891--903
Yajing Zhou and
Xiaoshan Kai and
Shixin Zhu Two classes of ternary LCD constacyclic
BCH codes . . . . . . . . . . . . . . . 905--919
Zhiye Yang and
Zibi Xiao and
Xiangyong Zeng Linear complexity and trace
representation of balanced quaternary
cyclotomic sequences of prime period $p$ 921--940
Jaziel Torres and
Ivelisse Rubio Circular Costas maps: A multidimensional
analog of circular Costas sequences . . 941--958
Junzhen Sui and
Qin Yue and
Fuqing Sun New constructions of self-dual codes via
twisted generalized Reed--Solomon codes 959--978
Gobinda Ghosh and
Sudhan Majhi and
Subhabrata Paul Construction of Optimal Binary
$Z$-Complementary Code Sets with New
Lengths Using Generalized Boolean
Function . . . . . . . . . . . . . . . . 979--993
François Rodier and
Florian Caullery and
Eric Férard Distribution of the autocorrelation of
random Boolean functions . . . . . . . . 995--1009
Xianhong Xie and
Yi Ouyang and
Ming Mao Vectorial bent functions and linear
codes from quadratic forms . . . . . . . 1011--1029
Kanat Abdukhalikov and
Duy Ho Hyperbent functions from hyperovals . . 1031--1048
Lilya Budaghyan and
Claude Carlet and
Tor Helleseth and
Wilfried Meidl Editorial: Special issue on Boolean
functions and their applications 2022 1049--1051
Robert Christian Subroto An algebraic approach to symmetric
linear layers in cryptographic
primitives . . . . . . . . . . . . . . . 1053--1067
Li-An Chen and
Robert S. Coulter Bounds on the differential uniformity of
the Wan--Lidl polynomials . . . . . . . 1069--1085
Silvia Mella and
Alireza Mehrdad and
Joan Daemen Differential and Linear properties of
vectorial boolean functions based on chi 1087--1116
Ana Salagean and
Ferruh Özbudak Further constructions and
characterizations of generalized almost
perfect nonlinear functions . . . . . . 1117--1127
Valérie Gillot and
Philippe Langevin Classification of some cosets of the
Reed--Muller code . . . . . . . . . . . 1129--1137
Nikolay Kaleyski and
Kjetil Nesheim and
Pantelimon Stanica An infinite family of 0-APN monomials
with two parameters . . . . . . . . . . 1139--1169
Marko Djurasevic and
Domagoj Jakobovic and
Luca Mariot and
Stjepan Picek A survey of metaheuristic algorithms for
the design of cryptographic Boolean
functions . . . . . . . . . . . . . . . 1171--1197
Ana Salagean and
Percy Reyes-Paredes Probabilistic estimation of the
algebraic degree of Boolean functions 1199--1215
Nurdagül Anbar and
Tekgül Kalayci and
Wilfried Meidl On generalized spread bent partitions 1217--1234
Sihem Mesnager Special Issue on Contemporary
interactions between codes,
cryptographic functions and/or sequences 1--2
Fulin Li and
Hang Hu and
Shixin Zhu and
Jiayun Yan A fully dynamic multi-secret sharing
scheme with redundant authorization . . 3--20
Xiaoqiang Wang and
Cunsheng Ding and
Hongwei Liu and
Dabin Zheng MDS constacyclic codes of length $q$ + 1
over $ {\rm GF}(q) $ . . . . . . . . . . 21--48
Ruipan Yang and
Ruihu Li and
Qiang Fu and
Sen Yang and
Yi Rao On locality of binary distance-optimal
codes . . . . . . . . . . . . . . . . . 49--69
Bingsheng Shen and
Yang Yang and
Pingzhi Fan Preferred $Z$-complementary pairs and
their application in Doppler resilient
waveform design . . . . . . . . . . . . 71--87
Shilu Liu and
Zhengchun Zhou and
Avik Ranjan Adhikary and
Yang Yang New supersets of Zadoff--Chu sequences
via the Weil bound . . . . . . . . . . . 89--108
Eda Tekin and
Oliver Wilhelm Gnilke and
Ferruh Özbudak and
Bernhard Blümich and
Marcus Greferath Almost perfect autocorrelation sequences
with small number of pauses for
applications in magnetic resonance . . . 109--127
N. Zidari\vc and
K. Mandal and
G. Gong and
M. Aagaard The Welch--Gong stream cipher ---
evolutionary path . . . . . . . . . . . 129--165
Hongyang Xiao and
Xiwang Cao New constructions of mutually orthogonal
complementary sets and Z-complementary
code sets based on extended Boolean
functions . . . . . . . . . . . . . . . 167--184
Xia Li and
Qin Yue and
Daitao Huang Factorization of invariant polynomials
under actions of projective linear
groups and its applications in coding
theory . . . . . . . . . . . . . . . . . 185--207
Zheng Wang and
Zhifan Ye and
Chunming Tang and
Yang Yang New construction of optimal ZCZ sequence
sets with inter-set zero
cross-correlation zone . . . . . . . . . 209--228
Abhishek Roy and
Sudhan Majhi Lower bounds on the maximum
cross-correlations of $2$-D
quasi-complementary array sets . . . . . 229--247
Kishan Chand Gupta and
Sumit Kumar Pandey and
Susanta Samanta On the construction of near-MDS matrices 249--283
Matthias Johann Steiner A lower bound for differential
uniformity by multiplicative complexity &
bijective functions of multiplicative
complexity 1 over finite fields . . . . 285--308
Cheng Che and
Tian Tian Further Results on Affine Sub--Families
of NFSR Sequences . . . . . . . . . . . 309--321
J. A. Armario and
R. Egan and
D. L. Flannery Generalized partially bent functions,
generalized perfect arrays, and cocyclic
Butson matrices . . . . . . . . . . . . 323--337
Xinxin Lv and
Cuiling Fan and
Yanyan Wang The cross-correlation spectrum of
ternary perfect sequences and their
decimations . . . . . . . . . . . . . . 339--349
Changhui Chen and
Haibin Kan and
Jie Peng and
Lijing Zheng and
Yanjun Li Three classes of permutation
quadrinomials in odd characteristic . . 351--365
Gobinda Ghosh and
Sudhan Majhi and
Shubhabrata Paul A direct construction of optimal
2D-ZCACS with flexible array size and
large set size . . . . . . . . . . . . . 367--385
Rohit Gupta and
Luciane Quoos and
Qiang Wang Some classes of permutation binomials
and trinomials of index $ q - 1 $ over $
\mathbb {F}_{q^n} $ . . . . . . . . . . 387--402
Nishant Kumar and
Sudhan Majhi and
Ashish K. Upadhyay A direct construction of complete
complementary code with zero correlation
zone property for prime-power length . . 403--426
Xiaoshan Kai and
Jiayuan Zhang and
Ping Li and
Shixin Zhu Construction of binary self-orthogonal
codes . . . . . . . . . . . . . . . . . 427--444
François Rodier and
Florian Caullery and
Eric Férard Periodic autocorrelation of sequences 445--458
Xiaopan Han and
Guojun Han and
Han Cai and
Linxin Yin Locally repairable codes with multiple
repair sets based on packings of block
size 4 . . . . . . . . . . . . . . . . . 459--479
Marcel Fernandez and
John Livieratos and
Sebasti\`a Martín Frameproof codes, separable codes and $
B_2 $ codes: Bounds and constructions 481--506
Meng Cao and
Jing Yang and
Fuchuan Wei On the $ \sigma $ duals and $ \sigma $
hulls of linear codes . . . . . . . . . 507--530
Hamidreza Eyvazi and
Karim Samei and
Batoul Savari The Homogeneous Gray image of linear
codes over the Galois ring $ G R(4, m) $ 531--540
Nishant Kumar and
Sudhan Majhi and
Sushant K. Jha A new construction of almost-optimal
multiple ZCZ sequence sets for
multi-cell QS--CDMA system . . . . . . . 541--556
Harshdeep Singh and
Kapish Chand Meena MDS multi-twisted Reed--Solomon codes
with small dimensional hull . . . . . . 557--578
Jong Yoon Hyun and
Nayoung Han and
Yoonjin Lee The Griesmer codes of Belov type and
optimal quaternary codes via
multi-variable functions . . . . . . . . 579--600
Xia Wu and
Wei Lu and
Xiwang Cao and
Gaojun Luo Minimal linear codes constructed from
partial spreads . . . . . . . . . . . . 601--611
Xiaoyan Jing and
Zhefeng Xu The 4-adic complexity of interleaved
quaternary sequences of even period with
optimal autocorrelation . . . . . . . . 613--628
Xing Liu Low-hit-zone frequency hopping sequence
sets under aperiodic Hamming correlation 629--645
Xing Liu Correction: Low-hit-zone frequency
hopping sequence sets under aperiodic
Hamming correlation . . . . . . . . . . 647--647
Shuhui Shen and
Xiaojun Zhang A class of balanced binary sequences
with two-valued non-zero autocorrelation
sum and good crosscorrelation sum . . . 649--663
Prity Kumari and
Karam Ratan Singh Re-keying analysis in group key
management of wireless sensor networks 665--677
Xiao-Juan Wang and
Tian Tian and
Wen-Feng Qi GL-S-NFSR: a new NFSR structure and its
period properties . . . . . . . . . . . 679--698
Jinghui Zhao and
Xiuling Shan and
Zihong Tian Combinatorial constructions of
repairable ramp schemes . . . . . . . . 699--719
Pierrick Méaux and
Dibyendu Roy Theoretical differential fault attacks
on FLIP and FiLIP . . . . . . . . . . . 721--744
Hanglong Zhang and
Xiwang Cao On the parameters of some LCD BCH codes
over $ \mathbb {F}_q $ with length $
(q^m + 1) \slash \lambda $ . . . . . . . 745--765
Praveen Kumar and
Sudhan Majhi and
Subhabrata Paul A direct construction of cross
$z$-complementary sequence sets with
large set size . . . . . . . . . . . . . 767--777
Shitao Li and
Minjia Shi and
Huizhou Liu Several constructions of optimal LCD
codes over small finite fields . . . . . 779--800
Tingting Wu and
Shixin Zhu and
Li Liu and
Lanqiang Li Optimal quinary cyclic codes with three
zeros . . . . . . . . . . . . . . . . . 801--823
Markus Grassl and
Ferruh Özbudak and
Buket Özkaya and
Burcu Gülmez Temür Complete characterization of a class of
permutation trinomials in characteristic
five . . . . . . . . . . . . . . . . . . 825--841
Erzhong Xue and
Zilong Wang and
Jinjin Chai Boolean functions of binary Type-II and
Type-III/II complementary array pairs 843--855
Canze Zhu and
Qunying Liao The $ [1, 0]$-twisted generalized
Reed--Solomon code . . . . . . . . . . . 857--878
Fengwei Li and
Fanhui Meng and
Ziling Heng and
Qin Yue An improvement on Weil bounds for
character sums of polynomials over
finite fields . . . . . . . . . . . . . 879--887
Gülsüm Gözde Yilmazgüç and
Javier de la Cruz and
Edgar Martínez-Moro Abelian and consta-Abelian polyadic
codes over affine algebras with a finite
commutative chain coefficient ring . . . 889--907