Table of contents for issues of Designs, Codes, and Cryptography

Last update: Thu Mar 22 11:25:31 MDT 2018                Valid HTML 3.2!

Volume 1, Number 1, May, 1991
Volume 1, Number 2, June, 1991
Volume 1, Number 3, September, 1991
Volume 1, Number 4, December, 1991
Volume 2, Number 1, March, 1992
Volume 2, Number 2, June, 1992
Volume 2, Number 3, September, 1992
Volume 2, Number 4, 1992
Volume 3, Number 1, March, 1993
Volume 3, Number 2, May, 1993
Volume 3, Number 3, 1993
Volume 3, Number 4, October, 1993
Volume 4, Number 1, January, 1994
Volume 4, Number 2, April, 1994
Volume 4, Number 3, 1994
Volume 4, Number 4, 1994
Volume 5, Number 1, January, 1995
Volume 5, Number 2, March, 1995
Volume 5, Number 3, May, 1995
Volume 6, Number 1, July, 1995
Volume 6, Number 2, September, 1995
Volume 6, Number 3, November, 1995
Volume 7, Number 1--2, January, 1996
Volume 7, Number 3, March, 1996
Volume 8, Number 1--2, May, 1996
Volume 8, Number 3, June, 1996
Volume 9, Number 1, August, 1996
Volume 9, Number 2, October, 1996
Volume 9, Number 3, November, 1996
Volume 10, Number 1, January, 1997
Volume 10, Number 2, February, 1997
Volume 10, Number 3, March, 1997
Volume 11, Number 1, April, 1997
Volume 11, Number 2, May, 1997
Volume 11, Number 3, July, 1997
Volume 12, Number 1, September, 1997
Volume 12, Number 2, October, 1997
Volume 12, Number 3, November, 1997
Volume 13, Number 1, January, 1998
Volume 13, Number 2, February, 1998
Volume 13, Number 3, March, 1998
Volume 14, Number 1, April, 1998
Volume 14, Number 2, May, 1998
Volume 14, Number 3, September, 1998
Volume 15, Number 1, October, 1998
Volume 15, Number 2, 1998
Volume 15, Number 3, December, 1998
Volume 16, Number 1, January, 1999
Volume 16, Number 2, February, 1999
Volume 16, Number 3, May, 1999
Volume 17, Number 1--3, September, 1999
Volume 18, Number 1--3, December, 1999
Volume 19, Number 1, January, 2000
Volume 19, Number 2--3, March, 2000
Volume 20, Number 1, April, 2000
Volume 20, Number 2, June, 2000
Volume 20, Number 3, July, 2000
Volume 21, Number 1--3, October, 2000
Volume 22, Number 1, January, 2001
Volume 22, Number 2, March, 2001
Volume 22, Number 3, January, 2001
Volume 23, Number 1, May, 2001
Volume 23, Number 2, July, 2001
Volume 23, Number 3, August, 2001
Volume 24, Number 1, September, 2001
Volume 24, Number 2, October, 2001
Volume 24, Number 3, December, 2001
Volume 25, Number 1, January, 2002
Volume 25, Number 2, February, 2002
Volume 25, Number 3, March, 2002
Volume 26, Number 1--3, June / July / August, 2002
Volume 27, Number 1--2, October / November, 2002
Volume 27, Number 3, December, 2002
Volume 28, Number 1, January, 2003
Volume 28, Number 2, March, 2003
Volume 28, Number 3, April, 2003
Volume 29, Number 1--3, May / June / July, 2003
Volume 30, Number 1, August, 2003
Volume 30, Number 2, September, 2003
Volume 30, Number 3, November, 2003
Volume 31, Number 1, January, 2004
Volume 31, Number 2, February, 2004
Volume 31, Number 3, March, 2004
Volume 32, Number 1--3, May / July, 2004
Volume 33, Number 1, August, 2004
Volume 33, Number 2, September, 2004
Volume 33, Number 3, November, 2004
Volume 34, Number 1, January, 2005
Volume 34, Number 2--3, February, 2005
Volume 35, Number 1, April, 2005
Volume 35, Number 2, May, 2005
Volume 35, Number 3, June, 2005
Volume 36, Number 1, July, 2005
Volume 36, Number 2, August, 2005
Volume 36, Number 3, September, 2005
Volume 37, Number 1, October, 2005
Volume 37, Number 2, November, 2005
Volume 37, Number 3, December, 2005
Volume 38, Number 1, January, 2006
Volume 38, Number 2, February, 2006
Volume 38, Number 3, March, 2006
Volume 39, Number 1, April, 2006
Volume 39, Number 2, May, 2006
Volume 39, Number 3, June, 2006
Volume 40, Number 1, July, 2006
Volume 40, Number 2, August, 2006
Volume 40, Number 3, September, 2006
Volume 41, Number 1, October, 2006
Volume 41, Number 2, November, 2006
Volume 41, Number 3, December, 2006
Volume 42, Number 1, January, 2007
Volume 42, Number 2, February, 2007
Volume 42, Number 3, March, 2007
Volume 43, Number 1, April, 2007
Volume 43, Number 2--3, June, 2007
Volume 44, Number 1--3, September, 2007
Volume 45, Number 1, October, 2007
Volume 45, Number 2, November, 2007
Volume 45, Number 3, December, 2007
Volume 46, Number 1, January, 2008
Volume 46, Number 2, February, 2008
Volume 46, Number 3, March, 2008
Volume 47, Number 1--3, June, 2008
Volume 48, Number 1, July, 2008
Volume 48, Number 2, August, 2008
Volume 48, Number 3, September, 2008
Volume 49, Number 1--3, December, 2008
Volume 50, Number 1, January, 2009
Volume 50, Number 2, February, 2009
Volume 50, Number 3, March, 2009
Volume 51, Number 1, April, 2009
Volume 51, Number 2, May, 2009
Volume 51, Number 3, June, 2009
Volume 52, Number 1, July, 2009
Volume 52, Number 2, August, 2009
Volume 52, Number 3, September, 2009
Volume 53, Number 1, October, 2009
Volume 53, Number 2, November, 2009
Volume 53, Number 3, December, 2009
Volume 54, Number 1, January, 2010
Volume 54, Number 2, February, 2010
Volume 54, Number 3, March, 2010
Volume 55, Number 1, April, 2010
Volume 55, Number 2--3, May, 2010
Volume 56, Number 1, July, 2010
Volume 56, Number 2--3, August, 2010
Volume 57, Number 1, October, 2010
Volume 57, Number 2, November, 2010
Volume 57, Number 3, December, 2010
Volume 58, Number 1, January, 2011
Volume 58, Number 2, February, 2011
Volume 58, Number 3, March, 2011
Volume 59, Number 1--3, April, 2011
Volume 60, Number 1, July, 2011
Volume 60, Number 2, August, 2011
Volume 60, Number 3, September, 2011
Volume 61, Number 1, October, 2011
Volume 61, Number 2, November, 2011
Volume 61, Number 3, December, 2011
Volume 62, Number 1, January, 2012
Volume 62, Number 2, February, 2012
Volume 62, Number 3, March, 2012
Volume 63, Number 1, April, 2012
Volume 63, Number 2, May, 2012
Volume 63, Number 3, June, 2012
Volume 64, Number 1--2, July, 2012
Volume 64, Number 3, September, 2012
Volume 65, Number 1--2, October, 2012
Volume 65, Number 3, December, 2012
Volume 66, Number 1--3, January, 2013
Volume 67, Number 1, April, 2013
Volume 67, Number 2, May, 2013
Volume 67, Number 3, June, 2013
Volume 68, Number 1--3, July, 2013
Volume 69, Number 1, October, 2013
Volume 69, Number 2, November, 2013
Volume 69, Number 3, December, 2013
Volume 70, Number 1--2, January, 2014
Volume 70, Number 3, March, 2014
Volume 71, Number 1, April, 2014
Volume 71, Number 2, May, 2014
Volume 71, Number 3, June, 2014
Volume 72, Number 1, July, 2014
Volume 72, Number 2, August, 2014
Volume 72, Number 3, September, 2014
Volume 73, Number 1, October, 2014
Volume 73, Number 2, November, 2014
Volume 73, Number 3, December, 2014
Volume 74, Number 1, January, 2015
Volume 74, Number 2, February, 2015
Volume 74, Number 3, March, 2015
Volume 75, Number 1, April, 2015
Volume 75, Number 2, May, 2015
Volume 75, Number 3, June, 2015
Volume 76, Number 1, July, 2015
Volume 76, Number 2, August, 2015
Volume 76, Number 3, September, 2015
Volume 77, Number 1, October, 2015
Volume 77, Number 2--3, December, 2015
Volume 78, Number 1, January, 2016
Volume 78, Number 2, February, 2016
Volume 78, Number 3, March, 2016
Volume 79, Number 1, April, 2016
Volume 79, Number 2, May, 2016
Volume 79, Number 3, June, 2016
Volume 80, Number 1, July, 2016
Volume 80, Number 2, August, 2016
Volume 80, Number 3, September, 2016
Volume 81, Number 1, October, 2016
Volume 81, Number 2, November, 2016
Volume 81, Number 3, December, 2016
Volume 82, Number 1--2, January, 2017
Volume 82, Number 3, March, 2017
Volume 83, Number 1, April, 2017
Volume 83, Number 2, May, 2017
Volume 83, Number 3, June, 2017
Volume 84, Number 1--2, July, 2017
Volume 84, Number 3, September, 2017
Volume 85, Number 1, October, 2017
Volume 85, Number 2, November, 2017
Volume 85, Number 3, December, 2017
Volume 86, Number 1, January, 2018
Volume 86, Number 2, February, 2018
Volume 86, Number 3, March, 2018


Designs, Codes, and Cryptography
Volume 1, Number 1, May, 1991

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 5
              G. Eric Moorhouse   Bruck nets, codes, and characters of
                                  loops  . . . . . . . . . . . . . . . . . 7--29
       A. Tietäväinen   Covering radius and dual distance  . . . 31--46
            B. A. LaMacchia and   
                  A. M. Odlyzko   Computation of discrete logarithms in
                                  prime fields . . . . . . . . . . . . . . 47--62
               E. R. Lamken and   
                W. H. Mills and   
                   R. M. Wilson   Four pairwise balanced designs . . . . . 63--68
                    Chat Yin Ho   Some remarks on orders of projective
                                  planes, planar difference sets and
                                  multipliers  . . . . . . . . . . . . . . 69--75
            Juriaan Simonis and   
             Cornelis de Vroedt   A simple proof of the Delsarte
                                  inequalities . . . . . . . . . . . . . . 77--82
                K. T. Arasu and   
                 Alexander Pott   On quasiregular collineation groups of
                                  projective planes  . . . . . . . . . . . 83--92

Designs, Codes, and Cryptography
Volume 1, Number 2, June, 1991

                   Klaus Metsch   Improvement of Bruck's completion
                                  theorem  . . . . . . . . . . . . . . . . 99--116
                 James A. Davis   A note on products of relative
                                  difference sets  . . . . . . . . . . . . 117--119
                  Helmut Siemon   Cyclic Steiner quadruple systems and
                                  Köhler's orbit graphs . . . . . . . . . . 121--132
              David J. Peterson   Fractal properties of the singular
                                  function $s(u)$  . . . . . . . . . . . . 133--139
     Jürgen Bierbrauer and   
                 Tran Van Trung   Halving ${\rm PGL}(2,2^f), f$ odd: a
                                  series of cryptocodes  . . . . . . . . . 141--148
             B. A. Anderson and   
                  P. A. Leonard   A class of self-orthogonal
                                  $2$-sequencings  . . . . . . . . . . . . 149--181
             Douglas A. Leonard   Linear cyclic codes of wordlength $v$
                                  over ${\rm GF}(q^s)$ which are also
                                  linear cyclic codes of wordlength $sv$
                                  over ${\rm GF}(q)$ . . . . . . . . . . . 183--189

Designs, Codes, and Cryptography
Volume 1, Number 3, September, 1991

                A. A. Bruen and   
                   J. C. Fisher   The Jamison method in Galois geometries  199--205
                   Oliver Pfaff   The classification of doubly transitive
                                  affine designs . . . . . . . . . . . . . 207--217
              Dirk Hachenberger   Constructions of large translation nets
                                  with nonabelian translation groups . . . 219--236
              Anne Delandtsheer   Dimensional linear spaces whose
                                  automorphism group is (line,
                                  hyperplane)-flag transitive  . . . . . . 237--245
              D. Jungnickel and   
            Vladimir D. Tonchev   Exponential number of quasi-symmetric
                                  SDP designs and codes meeting the
                                  Grey-Rankin bound  . . . . . . . . . . . 247--253
                      J. D. Key   Hermitian varieties as codewords . . . . 255--259
                  E. W. Lambeck   A remark on the intersection arrays of
                                  distance regular graphs and the distance
                                  regular graphs of diameter $d=3i-1$ with
                                  $b_i=1$ and $k>2$ . . . . . . . . . . . . 261--266

Designs, Codes, and Cryptography
Volume 1, Number 4, December, 1991

                 Antonio Pasini   Diagram geometries for sharply
                                  $n$-transitive sets of permutations or
                                  of mappings  . . . . . . . . . . . . . . 275--297
           H. Van Maldeghem and   
                 J. A. Thas and   
                    S. E. Payne   Desarguesian finite generalized
                                  quadrangles are classical or dual
                                  classical  . . . . . . . . . . . . . . . 299--305
     Jürgen Bierbrauer and   
                 Tran Van Trung   Some highly symmetric authentication
                                  perpendicular arrays . . . . . . . . . . 307--319
                       S. L. Ma   McFarland's conjecture on abelian
                                  difference sets with multiplier $-1$ . . 321--332
               Ka Hin Leung and   
                 Siu Lun Ma and   
                   Yan Loi Wong   Difference sets in dihedral groups . . . 333--338


Designs, Codes, and Cryptography
Volume 2, Number 1, March, 1992

           Tomik Yaghoobian and   
                   Ian F. Blake   Hermitian codes as generalized
                                  Reed--Solomon codes  . . . . . . . . . . 5--17
                Jonathan Jedwab   Generalized perfect arrays and Menon
                                  difference sets  . . . . . . . . . . . . 19--68
                 Bhaskar Bagchi   On quasi-symmetric designs . . . . . . . 69--79
            P. P. Greenough and   
                        R. Hill   Optimal ternary quasi-cyclic codes . . . 81--91
            Jonathan Jedwab and   
                 Sheelagh Lloyd   A note on the nonexistence of Barker
                                  sequences  . . . . . . . . . . . . . . . 93--97

Designs, Codes, and Cryptography
Volume 2, Number 2, June, 1992

           Whitfield Diffie and   
       Paul C. van Oorschot and   
              Michael J. Wiener   Authentication and authenticated key
                                  exchanges  . . . . . . . . . . . . . . . 107--125
                  Edward Spence   A complete classification of symmetric
                                  $(31,10,3)$ designs  . . . . . . . . . . 127--136
                    R. Hill and   
                   D. E. Newton   Optimal ternary linear codes . . . . . . 137--157
               Darryn E. Bryant   Varieties of quasigroups arising from
                                  $2$-perfect $m$-cycle systems  . . . . . 159--168
               Stephen D. Cohen   The explicit construction of irreducible
                                  polynomials over finite fields . . . . . 169--174
                  D. R. Stinson   Combinatorial characterizations of
                                  authentication codes . . . . . . . . . . 175--187
                A. Blokhuis and   
               A. R. Calderbank   Quasi-symmetric designs and the Smith
                                  normal form  . . . . . . . . . . . . . . 189--206

Designs, Codes, and Cryptography
Volume 2, Number 3, September, 1992

                 Xiang Dong Hou   Some inequalities about the covering
                                  radius of Reed--Muller codes . . . . . . 215--224
              Noboru Hamada and   
              Tor Helleseth and   
          Òyvind Ytrehus   On the construction of
                                  $[q^4+q^2-q,5,q^4-q^3+q^2-2q;q]$-codes
                                  meeting the Griesmer bound . . . . . . . 225--229
         Michael R. Fellows and   
                   Neal Koblitz   Self-witnessing polynomial-time
                                  complexity and prime factorization . . . 231--235
        Charles J. Colbourn and   
            Eric Mendelsohn and   
          Cheryl E. Praeger and   
            Vladimir D. Tonchev   Concerning multiplier automorphisms of
                                  cyclic Steiner triple systems  . . . . . 237--251
                    Ronald Shaw   A characterization of the primals in
                                  ${\rm PG}(m,2)$  . . . . . . . . . . . . 253--256
                K. T. Arasu and   
                     Qing Xiang   On the existence of periodic
                                  complementary binary sequences . . . . . 257--262
                 Alexander Pott   On abelian difference set codes  . . . . 263--271
             Peter Landrock and   
                      Olaf Manz   Classical codes as ideals in group
                                  algebras . . . . . . . . . . . . . . . . 273--285
                Thomas Beth and   
                    Volker Hatz   Design machines: algebraically well
                                  described interconnection networks . . . 287--298

Designs, Codes, and Cryptography
Volume 2, Number 4, 1992

              Nicola Melone and   
                        Udo Ott   On the rank of truncated incidence
                                  matrices of linear spaces  . . . . . . . 307--313
                Shuhong Gao and   
        Hendrik W. Lenstra, Jr.   Optimal normal bases . . . . . . . . . . 315--323
              W.-A. Jackson and   
                     P. R. Wild   Relations between two perfect ternary
                                  sequence constructions . . . . . . . . . 325--332
                   Zhe Xian Wan   Construction of Cartesian authentication
                                  codes from unitary geometry  . . . . . . 333--356
                  D. R. Stinson   An explication of secret sharing schemes 357--390
                 D. de Caen and   
               C. D. Godsil and   
                    G. F. Royle   On the $p$-rank of incidence matrices
                                  and a bound of Bruen and Ott . . . . . . 391--394
               Bernhard Schmidt   Note on a question by S. Bagchi and B.
                                  Bagchi: ``Designs from pairs of finite
                                  fields. I. A cyclic unital $U(6)$ and
                                  other regular Steiner $2$-designs'' [J.
                                  Combin. Theory Ser. A 52 (1989), no. 1,
                                  51--61; MR 90k:05025]  . . . . . . . . . 395--395


Designs, Codes, and Cryptography
Volume 3, Number 1, March, 1993

            Donovan R. Hare and   
                William McCuaig   The connectivity of the
                                  block-intersection graphs of designs . . 5--8
               W. D. Wallis and   
                J. L. Yucas and   
                    G.-H. Zhang   Single change covering designs . . . . . 9--19
                Charles Laywine   Subsquares in orthogonal Latin squares
                                  as subspaces in affine geometries: a
                                  generalization of an equivalence of Bose 21--28
           Levon H. Khachatrian   The lower bound of the quadratic spans
                                  of de Bruijn sequences . . . . . . . . . 29--32
                   E. R. Lamken   Existence results for generalized
                                  balanced tournament designs with block
                                  size $3$ . . . . . . . . . . . . . . . . 33--61
               Chris M. Skinner   Nonsymmetric $2$-designs modulo $2$  . . 63--68
              Peter Boyvalenkov   Nonexistence of certain symmetric
                                  spherical codes  . . . . . . . . . . . . 69--74
               W. de Launey and   
                  K. J. Horadam   A weak difference set construction for
                                  higher-dimensional designs . . . . . . . 75--87

Designs, Codes, and Cryptography
Volume 3, Number 2, May, 1993

              A. E. Brouwer and   
          L. M. G. M. Tolhuizen   A sharpening of the Johnson bound for
                                  binary linear codes and the nonexistence
                                  of linear codes with Preparata
                                  parameters . . . . . . . . . . . . . . . 95--98
               V. C. Mavron and   
                   W. D. Wallis   Cubic arcs in cubic nets . . . . . . . . 99--104
                 Alexander Barg   Incomplete sums, dc-constrained codes,
                                  and codes that maintain synchronization  105--116
                  J. D. Key and   
                 F. E. Sullivan   Codes of Steiner triple and quadruple
                                  systems  . . . . . . . . . . . . . . . . 117--125
     Albrecht Beutelspacher and   
                   Ferenc Wettl   On $2$-level secret sharing  . . . . . . 127--134
                  Claude Carlet   Partially-bent functions . . . . . . . . 135--145
                     W. K. Chan   Necessary conditions for Menon
                                  difference sets  . . . . . . . . . . . . 147--154
                 S. S. Sane and   
               M. S. Shrikhande   Some characterizations of
                                  quasi-symmetric designs with a spread    155--166
                 Xiang Dong Hou   Further results on the covering radii of
                                  the Reed--Muller codes . . . . . . . . . 167--177

Designs, Codes, and Cryptography
Volume 3, Number 3, 1993

              Aart Blokhuis and   
                   Klaus Metsch   On the size of a maximal partial spread  187--191
               Edwin R. van Dam   Classification of spreads of ${\rm
                                  PG}(3,4)\sbs{\rm PG}(3,2)$ . . . . . . . 193--198
                    Thomas Beth   The ${\rm GF}(p)$-dimension of the codes
                                  generated by the classical point-line
                                  geometries over ${\rm GF}(p)$  . . . . . 199--207
        Charles J. Colbourn and   
             Alexander Rosa and   
           \vStefan Znám   The spectrum of maximal partial Steiner
                                  triple systems . . . . . . . . . . . . . 209--219
              Josep Rif\`a-Coma   How to avoid the cheaters succeeding in
                                  the key sharing scheme . . . . . . . . . 221--228
       Christine M. O'Keefe and   
                   Alan Rahilly   Spreads and group divisible designs  . . 229--235
                  Claude Carlet   The automorphism groups of the
                                  Delsarte-Goethals codes  . . . . . . . . 237--249
Heikki O. Hämäläinen and   
            Iiro S. Honkala and   
        Markku K. Kaikkonen and   
                Simon N. Litsyn   Bounds for binary multiple covering
                                  codes  . . . . . . . . . . . . . . . . . 251--275

Designs, Codes, and Cryptography
Volume 3, Number 4, October, 1993

                 Sara Bitan and   
                    Tuvi Etzion   The last packing number of quadruples,
                                  and cyclic SQS . . . . . . . . . . . . . 283--313
               Steven Dougherty   Nets and their codes . . . . . . . . . . 315--331
           Willi Geiselmann and   
                Dieter Gollmann   Self-dual bases in ${\bf F}_{q^n}$ . . . 333--345
                     A. Klapper   Cross-correlations of geometric
                                  sequences in characteristic two  . . . . 347--377
             James A. Davis and   
                Jonathan Jedwab   A note on new semi-regular divisible
                                  difference sets  . . . . . . . . . . . . 379--381


Designs, Codes, and Cryptography
Volume 4, Number 1, January, 1994

                  Luc Teirlinck   Some new $2$-resolvable Steiner
                                  quadruple systems  . . . . . . . . . . . 5--10
          Chris J. Mitchell and   
            Kenneth G. Paterson   Decoding perfect maps  . . . . . . . . . 11--30
               J. H. Conway and   
                N. J. A. Sloane   Quaternary constructions for the binary
                                  single-error-correcting codes of Julin,
                                  Best and others  . . . . . . . . . . . . 31--42
          George T. Kennedy and   
                     Vera Pless   On designs and formally self-dual codes  43--55
        Stefan M. Dodunekov and   
          Silvia B. Encheva and   
             Stoyan N. Kapralov   On the $[28, 7, 12]$ binary
                                  self-complementary codes and their
                                  residuals  . . . . . . . . . . . . . . . 57--67
               Thomas Johansson   A shift register construction of
                                  unconditionally secure authentication
                                  codes  . . . . . . . . . . . . . . . . . 69--81
             Wen-Ai Jackson and   
                Keith M. Martin   Geometric secret sharing schemes and
                                  their duals  . . . . . . . . . . . . . . 83--95

Designs, Codes, and Cryptography
Volume 4, Number 2, April, 1994

                   U. Dempwolff   Translation planes of order $27$ . . . . 105--121
            Steven T. Dougherty   A coding-theoretic solution to the $36$
                                  officer problem  . . . . . . . . . . . . 123--128
              Dirk Hachenberger   On completely free elements in finite
                                  fields . . . . . . . . . . . . . . . . . 129--143
            Roberta Evans Sabin   On row-cyclic codes with algebraic
                                  structure  . . . . . . . . . . . . . . . 145--155
                    Attila Sali   On the rigidity of spherical $t$-designs
                                  that are orbits of finite reflection
                                  groups . . . . . . . . . . . . . . . . . 157--170
 Gérald E. Séguin   A counter-example to a recent result on
                                  the $q$-ary image of a $q^s$-ary cyclic
                                  code . . . . . . . . . . . . . . . . . . 171--175
           Kathleen A. S. Quinn   Some constructions for key distribution
                                  patterns . . . . . . . . . . . . . . . . 177--191
                 Alfred Menezes   Book review  . . . . . . . . . . . . . . 193

Designs, Codes, and Cryptography
Volume 4, Number 3, 1994

           A. R. Calderbank and   
                 P. C. Fishburn   Maximal three-independent subsets of
                                  $\{0,1,2\}^n$  . . . . . . . . . . . . . 203--211
                     Olof Heden   A binary perfect code of length $15$ and
                                  codimension $0$  . . . . . . . . . . . . 213--220
                       S. L. Ma   A survey of partial difference sets  . . 221--261
               M. J. B. Robshaw   On evaluating the linear complexity of a
                                  sequence of least period $2^n$ . . . . . 263--269
               M. van Eupen and   
                        R. Hill   An optimal ternary $[69,5,45]$ code and
                                  related codes  . . . . . . . . . . . . . 271--282
                   Zhe Xian Wan   The weight hierarchies of the projective
                                  codes from nondegenerate quadrics  . . . 283--300

Designs, Codes, and Cryptography
Volume 4, Number 4, 1994

                R. D. Baker and   
                    G. L. Ebert   A Bruen chain for $q=19$ . . . . . . . . 307--312
               Yu Qing Chen and   
                 Qing Xiang and   
             Surinder K. Sehgal   An exponent bound on skew Hadamard
                                  abelian difference sets  . . . . . . . . 313--317
          Dieter Jungnickel and   
                 Alexander Pott   A new class of symmetric
                                  $(v,k,\lambda)$-designs  . . . . . . . . 319--325
             C. Koukouvinos and   
                 S. Kounias and   
                 J. Seberry and   
                 C. H. Yang and   
                        J. Yang   On sequences with zero autocorrelation   327--340
              Chris J. Mitchell   Constructing $c$-ary perfect factors . . 341--368
                  D. R. Stinson   Universal hashing and authentication
                                  codes  . . . . . . . . . . . . . . . . . 369--380
            Gilles Zémor   Hash functions and Cayley graphs . . . . 381--394


Designs, Codes, and Cryptography
Volume 5, Number 1, January, 1995

                K. T. Arasu and   
             Surinder K. Sehgal   Difference Sets in Abelian Groups of
                                  $p$-Rank Two . . . . . . . . . . . . . . 5--12
                  Marco Buratti   A Powerful Method for Constructing
                                  Difference Families and Optimal Optical
                                  Orthogonal Codes . . . . . . . . . . . . 13--25
               M. J. Coster and   
                  W. H. Haemers   Quasi-Symmetric Designs Related to the
                                  Triangular Graph . . . . . . . . . . . . 27--42
                Clement Lam and   
                Larry Thiel and   
            Vladimir D. Tonchev   On quasi-symmetric $2$-$(28,12,11)$ and
                                  $2$-$(36,16,12)$ designs . . . . . . . . 43--55
              Rudolf Mathon and   
                Gordon F. Royle   The Translation Planes of Order $49$ . . 57--72
             David Naccache and   
           David M'Ra\"\ihi and   
                   Dan Raphaeli   Can Montgomery Parasites Be Avoided? A
                                  Design Methodology Based on Key and
                                  Cryptosystem Modifications . . . . . . . 73--80
                   U. Dempwolff   Correction to: ``Translation planes of
                                  order $27$'' [Des. Codes Cryptogr. 4
                                  (1994), no. 2, 105--121; MR 95a:51012]   81--81

Designs, Codes, and Cryptography
Volume 5, Number 2, March, 1995

                 Ahmed M. Assaf   On Covering Designs with Block Size $5$
                                  and Index $5$  . . . . . . . . . . . . . 91--107
              David Gillman and   
               Ronald L. Rivest   Complete Variable-Length ``Fix-Free''
                                  Codes  . . . . . . . . . . . . . . . . . 109--114
            Kenneth G. Paterson   Perfect Factors in the de Bruijn Graph   115--138
            René Peeters   On the $p$-Ranks of Net Graphs . . . . . 139--153
            Stephan J. Suchower   Nonisomorphic Complete Sets of
                                  $F$-Rectangles with Prime Power
                                  Dimensions . . . . . . . . . . . . . . . 155--174

Designs, Codes, and Cryptography
Volume 5, Number 3, May, 1995

              Marco Carpentieri   A Perfect Threshold Secret Sharing
                                  Scheme to Identify Cheaters  . . . . . . 183--187
        Charles J. Colbourn and   
          Jeffrey H. Dinitz and   
             Mieczys\law Wojtas   Thwarts in Transversal Designs . . . . . 189--197
                     R. Craigen   The Structure of Weighing Matrices
                                  having Large Weights . . . . . . . . . . 199--216
                Tuvi Etzion and   
                 Victor Wei and   
                     Zhen Zhang   Bounds on the Sizes of Constant Weight
                                  Covering Codes . . . . . . . . . . . . . 217--239
          K. Gopalakrishnan and   
                  D. R. Stinson   Three Characterizations of Non-binary
                                  Correlation-Immune and Resilient
                                  Functions  . . . . . . . . . . . . . . . 241--251
               Akihiro Munemasa   On Perfect $t$-Shift Codes in Abelian
                                  Groups . . . . . . . . . . . . . . . . . 253--259
           Christine M. O'Keefe   Key Distribution Patterns using
                                  Minkowski Planes . . . . . . . . . . . . 261--267
                 Tran Van Trung   On the Construction of Authentication
                                  and Secrecy Codes  . . . . . . . . . . . 269--280
                  J. D. Key and   
                 F. E. Sullivan   Erratum: ``Codes of Steiner triple and
                                  quadruple systems'' [Des. Codes
                                  Cryptogr. \bf 3 (1993), no. 2, 117--125;
                                  MR 94e:05050]  . . . . . . . . . . . . . 281--281


Designs, Codes, and Cryptography
Volume 6, Number 1, July, 1995

            Patrick A. H. Bours   On the Construction of Perfect
                                  Deletion-Correcting Codes using Design
                                  Theory . . . . . . . . . . . . . . . . . 5--20
           A. R. Calderbank and   
                N. J. A. Sloane   Modular and $p$-adic Cyclic Codes  . . . 21--35
                   J. K. Gibson   Severely Denting the Gabidulin Version
                                  of the McEliece Public Key Cryptosystem  37--45
             Glenn Hurlbert and   
                    Garth Isaak   New Constructions for de Bruijn Tori . . 47--56
                   S. L. Ma and   
               Bernhard Schmidt   On $(p^a,p,p^a,p^{a-1})$-relative
                                  difference sets  . . . . . . . . . . . . 57--71
               W. J. Martin and   
                      X. J. Zhu   Anticodes for the Grassman and bilinear
                                  forms graphs . . . . . . . . . . . . . . 73--79

Designs, Codes, and Cryptography
Volume 6, Number 2, September, 1995

             Masaaki Harada and   
                 Hiroshi Kimura   New Extremal Doubly-Even $[64, 32, 12]$
                                  Codes  . . . . . . . . . . . . . . . . . 91--96
            W. Cary Huffman and   
            Vladimir D. Tonchev   The existence of extremal self-dual
                                  $[50,25,10]$ codes and quasi-symmetric
                                  $2$-$(49,9,6)$ designs . . . . . . . . . 97--106
                    Helmut Meyn   Explicit $N$-Polynomials of $2$-Power
                                  Degree over Finite Fields, I . . . . . . 107--116
           Renate Scheidler and   
               Hugh C. Williams   A Public-Key Cryptosystem Utilizing
                                  Cyclotomic Fields  . . . . . . . . . . . 117--131
                 N. Shalaby and   
                         J. Yin   Directed packings with block size $5$
                                  and even $\nu$ . . . . . . . . . . . . . 133--142
                Marten van Dijk   On the Information Rate of Perfect
                                  Secret Sharing Schemes . . . . . . . . . 143--169

Designs, Codes, and Cryptography
Volume 6, Number 3, November, 1995

                     P. Dey and   
                   J. L. Hayden   On Symmetric Incidence Matrices of
                                  Projective Planes  . . . . . . . . . . . 179--188
                D. G. Glynn and   
            J. W. P. Hirschfeld   On the Classification of Geometric Codes
                                  by Polynomial Functions  . . . . . . . . 189--204
               Thomas Johansson   Authentication Codes for Nontrusting
                                  Parties Obtained from Rank Metric Codes  205--218
                Yaron Klein and   
               Simon Litsyn and   
                Alexander Vardy   Two New Bounds on the Size of Binary
                                  Codes with a Minimum Distance of Three   219--227
               Tim Penttila and   
                Gordon F. Royle   Sets of Type $(m, n)$ in the Affine and
                                  Projective Planes of Order Nine  . . . . 229--245
            Kevin T. Phelps and   
                     Mike Levan   Kernels of Nonlinear Hamming Codes . . . 247--257


Designs, Codes, and Cryptography
Volume 7, Number 1--2, January, 1996

                      Anonymous   Foreword to this issue . . . . . . . . . 7--8
               Whitfield Diffie   The National Security Establishment and
                                  the Development of Public-Key
                                  Cryptography . . . . . . . . . . . . . . 9--12
                   Mary Fischer   ``And Now For Something Completely
                                  Different'' (The Egyptologist and the
                                  Cryptographer: a Personal Reminiscence)  13--15
                    Thomas Beth   Watching the Bhang Meter and Flying
                                  through Dirt . . . . . . . . . . . . . . 17--25
              Paul Syverson and   
              Catherine Meadows   A Formal Language for Cryptographic
                                  Protocol Requirements  . . . . . . . . . 27--59
               Kaisa Nyberg and   
              Rainer A. Rueppel   Message Recovery for Signature Schemes
                                  Based on the Discrete Logarithm Problem  61--81
            R. Safavi-Naini and   
                      L. Tombak   Authentication Codes in Plaintext and
                                  Chosen-Content Attacks . . . . . . . . . 83--99
             C. J. Mitchell and   
                F. C. Piper and   
                  M. Walker and   
                        P. Wild   Authentication Schemes, Perfect Local
                                  Randomizers, Perfect Secrecy and Secret
                                  Sharing Schemes  . . . . . . . . . . . . 101--110
              Xian-Mo Zhang and   
                  Yuliang Zheng   Characterizing the Structures of
                                  Cryptographic Functions Satisfying the
                                  Propagation Criterion for Almost All
                                  Vectors  . . . . . . . . . . . . . . . . 111--134
            Dieter Gollmann and   
                Yongfei Han and   
              Chris J. Mitchell   Redundant Integer Representations and
                                  Fast Exponentiation  . . . . . . . . . . 135--151
               R. Scheidler and   
                   A. Stein and   
               Hugh C. Williams   Key-Exchange in Real Quadratic
                                  Congruence Function Fields . . . . . . . 153--174
                  J. D. Key and   
                 F. E. Sullivan   Correction to: ``Codes of Steiner triple
                                  and quadruple systems'' [Des. Codes
                                  Cryptogr. \bf 3 (1993), no. 2, 117--125;
                                  MR 94e:05050]  . . . . . . . . . . . . . 175--175

Designs, Codes, and Cryptography
Volume 7, Number 3, March, 1996

        Alexey E. Ashikhmin and   
                Simon N. Litsyn   Fast Decoding Algorithms for First Order
                                  Reed--Muller and Related Codes . . . . . 187--214
              Thierry P. Berger   On the Automorphism Groups of
                                  Affine-Invariant Codes . . . . . . . . . 215--221
          T. Aaron Gulliver and   
              Vijay K. Bhargava   New Good Rate $(m-1)/pm$ Ternary and
                                  Quaternary Quasi-Cyclic Codes  . . . . . 223--233
           Marijn Van Eupen and   
              Noboru Hamada and   
                  Yoko Watamori   The Nonexistence of Ternary $[50,5,32]$
                                  Codes  . . . . . . . . . . . . . . . . . 235--237
               Rolf S. Rees and   
             Douglas R. Stinson   Combinatorial characterizations of
                                  authentication codes. II . . . . . . . . 239--259


Designs, Codes, and Cryptography
Volume 8, Number 1--2, May, 1996

          Dieter Jungnickel and   
            Günter Pickert   A Life's Work in Geometry: An Homage to
                                  Hanfried Lenz  . . . . . . . . . . . . . 9--22
                K. T. Arasu and   
                 Alexander Pott   Impossibility of a Certain Cyclotomic
                                  Equation with Applications to Difference
                                  Sets . . . . . . . . . . . . . . . . . . 23--27
         Alphonse Baartmans and   
               Ivan Landjev and   
            Vladimir D. Tonchev   On the Binary Codes of Steiner Triple
                                  Systems  . . . . . . . . . . . . . . . . 29--43
                   R. A. Bailey   Orthogonal Partitions in Designed
                                  Experiments  . . . . . . . . . . . . . . 45--77
                R. D. Baker and   
                    G. L. Ebert   Regulus-free spreads of ${\rm PG}(3, q)$ 79--89
                    Thomas Beth   Designs, Codes and Crypts --- a Puzzle
                                  Altogether . . . . . . . . . . . . . . . 91--101
           Darryn E. Bryant and   
              D. G. Hoffman and   
                   C. A. Rodger   $5$-Cycle Systems with Holes . . . . . . 103--108
               Peter J. Cameron   Stories about Groups and Sequences . . . 109--133
              Dirk Hachenberger   Groups Admitting a Kantor Family and a
                                  Factorized Normal Subgroup . . . . . . . 135--143
          Willem H. Haemers and   
            Vladimir D. Tonchev   Spreads in Strongly Regular Graphs . . . 145--157
          Dieter Jungnickel and   
   Marialuisa J. de Resmini and   
              Scott A. Vanstone   Codes Based on Complete Graphs . . . . . 159--165
               Ka Hin Leung and   
                     Siu Lun Ma   A construction of partial difference
                                  sets in $Z_{p^2}\times
                                  Z_{p^2}\times\cdots\times Z_{p^2}$ . . . 167--172
         Arlene A. Pascasio and   
          Cheryl E. Praeger and   
            Blessilda P. Raposa   On the characterisation of ${\rm
                                  AG}(n,q)$ by its parameters as a nearly
                                  triply regular design  . . . . . . . . . 173--179
                    S. E. Payne   The fundamental theorem of $q$-clan
                                  geometry . . . . . . . . . . . . . . . . 181--202
            Günter Pickert   Extension of Gravity Centers
                                  Configuration to Steiner Triple Systems  203--214
        D. K. Ray-Chaudhuri and   
                     Qing Xiang   Constructions of Partial Difference Sets
                                  and Relative Difference Sets Using
                                  Galois Rings . . . . . . . . . . . . . . 215--227
                E. E. Shult and   
                     J. A. Thas   $m$-systems and partial $m$-systems of
                                  polar spaces . . . . . . . . . . . . . . 229--238
                  Helmut Siemon   Piotrowski's Infinite Series of Steiner
                                  Quadruple Systems Revisited  . . . . . . 239--254

Designs, Codes, and Cryptography
Volume 8, Number 3, June, 1996

                   R. A. Bailey   Orthogonal partitions in designed
                                  experiments. Corrected reprint . . . . . 45--77
               Peter J. Cameron   Stories about groups and sequences.
                                  Corrected reprint of ``Stories about
                                  groups and sequences'' [Des. Codes
                                  Cryptogr. \bf 8 (1996), no. 1--2,
                                  109--133; MR 97f:20004a] . . . . . . . . 109--133
           Josep Domingo-Ferrer   Achieving Rights Untransferability with
                                  Client-Independent Servers . . . . . . . 263--271
                 Masaaki Harada   Existence of New Extremal Doubly-Even
                                  Codes and Extremal Singly-Even Codes . . 273--283
                 Xiang-dong Hou   The Covering Radius of $R(1,9)$ in
                                  $R(4,9)$ . . . . . . . . . . . . . . . . 285--292
             Heeralal Janwa and   
                   Oscar Moreno   McEliece Public Key Cryptosystems Using
                                  Algebraic-Geometric Codes  . . . . . . . 293--307
                Ivan N. Landgev   Constructions of Group Divisible Designs 309--318
                  D. B. Meisner   New Classes of Groups Containing Menon
                                  Difference Sets  . . . . . . . . . . . . 319--325
       Tamás Szönyi   On Cyclic Caps in Projective Spaces  . . 327--332


Designs, Codes, and Cryptography
Volume 9, Number 1, August, 1996

               Vladimir Tonchev   Preface  . . . . . . . . . . . . . . . . 5--6
          E. F. Assmus, Jr. and   
                      J. D. Key   Designs and codes: an update . . . . . . 7--27
     Jürgen Bierbrauer and   
              Stephen Black and   
                      Yves Edel   Some $t$-homogeneous sets of
                                  permutations . . . . . . . . . . . . . . 29--38
                Jeffrey T. Bonn   Forcing Linearity on Greedy Codes  . . . 39--49
            Laurel L. Carpenter   Oval Designs in Desarguesian Projective
                                  Planes . . . . . . . . . . . . . . . . . 51--59
        Charles J. Colbourn and   
               Donald L. Kreher   Concerning Difference Matrices . . . . . 61--70
                 Hiroshi Kimura   Hadamard Matrices and Dihedral Groups    71--77
                   Laura Monroe   Self-Orthogonal Greedy Codes . . . . . . 79--83
                  Iosif Pinelis   On the Minimal Number of Even
                                  Submatrices of $0$-$1$ Matrices  . . . . 85--93
                     J. A. Thas   $k$-arcs, hyperovals, partial flocks and
                                  flocks . . . . . . . . . . . . . . . . . 95--104
                 Tran Van Trung   A Generalization of a Theorem of Dehon
                                  for Simple $t$-Designs . . . . . . . . . 105--114
                 Judy L. Walker   A New Approach to the Main Conjecture on
                                  Algebraic-Geometric MDS Codes  . . . . . 115--120

Designs, Codes, and Cryptography
Volume 9, Number 2, October, 1996

          Stefka Buyuklieva and   
                  Vassil Yorgov   Singly-Even Self-Dual Codes of Length
                                  $40$ . . . . . . . . . . . . . . . . . . 131--141
               Mario A. de Boer   Almost MDS Codes . . . . . . . . . . . . 143--155
            Chang-Seop Park and   
             Gui-Liang Feng and   
               Kenneth K. Tzeng   The New Minimum Distance Bounds of Goppa
                                  Codes and Their Decoding . . . . . . . . 157--176
                    Ron M. Roth   Spectral-Null Codes and Null Spaces of
                                  Hadamard Submatrices . . . . . . . . . . 177--191
              Alfred Scheerhorn   Dickson Polynomials, Completely Normal
                                  Polynomials and the Cyclic Module
                                  Structure of Specific Extensions of
                                  Finite Fields  . . . . . . . . . . . . . 193--202
              M. A. Shokrollahi   Stickelberger Codes  . . . . . . . . . . 203--213
             A. N. Skorobogatov   On the Number of Representations of
                                  Matroids Over Finite Fields  . . . . . . 215--226

Designs, Codes, and Cryptography
Volume 9, Number 3, November, 1996

       Pier Vittorio Ceccherini   Giuseppe Tallini (1930--1995)  . . . . . 237--245
               Giuseppe Tallini   Combinatorial Problems in Infinite
                                  Spaces . . . . . . . . . . . . . . . . . 247--249
                S. R. Blackburn   A Note on Sequences with the Shift and
                                  Add Property . . . . . . . . . . . . . . 251--256
              Tor Helleseth and   
             P. Vijay Kumar and   
               Abhijit Shanbhag   Codes with the Same Weight Distributions
                                  as the Goethals Codes and the
                                  Delsarte-Goethals Codes  . . . . . . . . 257--266
             Wen-Ai Jackson and   
                Keith M. Martin   Perfect Secret Sharing Schemes on Five
                                  Participants . . . . . . . . . . . . . . 267--286
             Wen-Ai Jackson and   
            Keith M. Martin and   
           Christine M. O'Keefe   A Construction for Multisecret Threshold
                                  Schemes  . . . . . . . . . . . . . . . . 287--303
             Ueli M. Maurer and   
                   Yacov Yacobi   A Non-interactive Public-Key
                                  Distribution System  . . . . . . . . . . 305--316
   Cécile Huybrechts and   
                 Antonio Pasini   On $c^{n-2}.c^*$ geometries of order $2$ 317--330


Designs, Codes, and Cryptography
Volume 10, Number 1, January, 1997

               Stephen D. Cohen   The Length of Primitive BCH Codes with
                                  Minimal Covering Radius  . . . . . . . . 5--16
                     Jean Conan   On the enumeration and generation of
                                  nonweight equivalent rate $\frac 12$
                                  convolutional codes  . . . . . . . . . . 17--27
  András Gács and   
       Péter Sziklai and   
          Tamás Sz\Honyi   Two Remarks on Blocking Sets and Nuclei
                                  in Planes of Prime Order . . . . . . . . 29--39
                  Noboru Hamada   A Necessary and Sufficient Condition for
                                  the Existence of Some Ternary $[n, k,
                                  d]$ Codes Meeting the Greismer Bound . . 41--56
                   Gerhard Hiss   On the Incidence Matrix of the Ree
                                  Unital . . . . . . . . . . . . . . . . . 57--62
           Marijn van Eupen and   
                 Petr Lison\vek   Classification of Some Optimal Ternary
                                  Linear Codes of Small Length . . . . . . 63--84
               A. J. van Zanten   Lexicographic Order and Linearity  . . . 85--97

Designs, Codes, and Cryptography
Volume 10, Number 2, February, 1997

              Dieter Jungnickel   Preface  . . . . . . . . . . . . . . . . 107--107
            Arrigo Bonisoli and   
Gábor Korchmáros and   
       Tamás Szönyi   Some Multiply Derived Translation Planes
                                  with ${\rm SL}(2,5)$ as an Inherited
                                  Collineation Group in the Translation
                                  Complement . . . . . . . . . . . . . . . 109--114
            Sabine Bouzette and   
         Francis Buekenhout and   
                Edmond Dony and   
              Alain Gottcheiner   A Theory of Nets for Polyhedra and
                                  Polytopes Related to Incidence
                                  Geometries . . . . . . . . . . . . . . . 115--136
           Claudia Broecker and   
         Ralph-Hardo Schulz and   
                  Gernot Stroth   Check Character Systems Using Chevalley
                                  Groups . . . . . . . . . . . . . . . . . 137--143
             Aiden A. Bruen and   
                David L. Wehlau   Partitioning Quadrics, Symmetric Group
                                  Divisible Designs and Caps . . . . . . . 145--155
           A. R. Calderbank and   
                Gary M. McGuire   Construction of a $(64,2^{37},12)$ code
                                  via Galois rings . . . . . . . . . . . . 157--165
          Robert S. Coulter and   
                Rex W. Matthews   Planar Functions and Planes of
                                  Lenz-Barlotti Class II . . . . . . . . . 167--184
             Wen-Ai Jackson and   
                  Peter R. Wild   On GMW Designs and Cyclic Hadamard
                                  Designs  . . . . . . . . . . . . . . . . 185--191
          Norman L. Johnson and   
             Guglielmo Lunardon   Maximal Partial Spreads and Flocks . . . 193--202
            Alan C. H. Ling and   
                Xiaojun Zhu and   
        Charles J. Colbourn and   
               Ronald C. Mullin   Pairwise Balanced Designs with
                                  Consecutive Block Sizes  . . . . . . . . 203--222
                 Siu Lun Ma and   
               Bernhard Schmidt   Difference Sets Corresponding to a Class
                                  of Symmetric Designs . . . . . . . . . . 223--236
              Rudolf Mathon and   
                 Tran Van Trung   Unitals and Unitary Polarities in
                                  Symmetric Designs  . . . . . . . . . . . 237--250
                   Klaus Metsch   Embedding the Linear Structure of Planar
                                  Spaces into Projective Spaces  . . . . . 251--263

Designs, Codes, and Cryptography
Volume 10, Number 3, March, 1997

              R. J. R. Abel and   
        Charles J. Colbourn and   
               Jianxing Yin and   
                   Hantao Zhang   Existence of incomplete transversal
                                  designs with block size five and any
                                  index $\lambda$  . . . . . . . . . . . . 275--307
       Lynn Margaret Batten and   
              Kris Coolsaet and   
            Anne Penfold Street   Blocking sets in $(v,\{2,4\},1)$-designs 309--314
       Margaret Ann Bernard and   
                 Bhu Dev Sharma   Linear Codes with Non-Uniform Error
                                  Correction Capability  . . . . . . . . . 315--323
              Diane Erdmann and   
                    Sean Murphy   An Approximate Distribution for the
                                  Maximum Order Complexity . . . . . . . . 325--339
                  A. Faldum and   
                     W. Willems   Codes of Small Defect  . . . . . . . . . 341--350
            Alice E. D. Houston   On the limit of maximal density of
                                  sequences with a Perfect Linear
                                  Complexity Profile . . . . . . . . . . . 351--359
                   Zhe-Xian Wan   State Spaces of Convolutional Codes  . . 361--369


Designs, Codes, and Cryptography
Volume 11, Number 1, April, 1997

                  Marco Buratti   From a $(G, k, 1)$ to a $(Ck \oplus G,
                                  k, 1)$ difference family . . . . . . . . 5--9
                  Marco Buratti   On Resolvable Difference Families  . . . 11--23
          T. Aaron Gulliver and   
                 Masaaki Harada   Classification of Extremal Double
                                  Circulant Formally Self-Dual Even Codes  25--35
                   E. R. Lamken   The Existence of Partitioned Generalized
                                  Balanced Tournament Designs with Block
                                  Size $3$ . . . . . . . . . . . . . . . . 37--71
                 Siu Lun Ma and   
             Surinder K. Sehgal   A Family of Semi-Regular Divisible
                                  Difference Sets  . . . . . . . . . . . . 73--78
              Stephanie Perkins   Codes with a Disparity Property  . . . . 79--97

Designs, Codes, and Cryptography
Volume 11, Number 2, May, 1997

               Carlo Blundo and   
          Alfredo de Santis and   
          Roberto de Simone and   
                    Ugo Vaccaro   Tight Bounds on the Information Rate of
                                  Secret Sharing Schemes . . . . . . . . . 107--122
              Malcolm Greig and   
                    Julian Abel   Resolvable Balanced Incomplete Block
                                  Designs with Block Size $8$  . . . . . . 123--140
          T. Aaron Gulliver and   
                 Masaaki Harada   Weight Enumerators of Double Circulant
                                  Codes and New Extremal Self-Dual Codes   141--150
Patric R. J. Östergård and   
Heikki O. Hämäläinen   A New Table of Binary/Ternary Mixed
                                  Covering Codes . . . . . . . . . . . . . 151--178
            Eric R. Verheul and   
         Henk C. A. van Tilborg   Constructions and properties of $k$ out
                                  of $n$ visual secret sharing schemes . . 179--196

Designs, Codes, and Cryptography
Volume 11, Number 3, July, 1997

         Jürgen Bierbrauer   Universal Hashing and Geometric Codes    207--221
             Simon R. Blackburn   A Generalized Rational Interpolation
                                  Problem and the Solution of the
                                  Welch-Berlekamp Key Equation . . . . . . 223--234
                  C. Blundo and   
          A. Giorgio Gaggia and   
                  D. R. Stinson   On the Dealer's Randomness Required in
                                  Secret Sharing Schemes . . . . . . . . . 235--259
              A. E. Brouwer and   
                   M. van Eupen   The Correspondence Between Projective
                                  Codes and $2$-weight Codes . . . . . . . 261--266
             James A. Davis and   
             Surinder K. Sehgal   Using the Simplex Code to Construct
                                  Relative Difference Sets in $2$-groups   267--277
         G. B. Khosrovshahi and   
          A. Nowzari-Dalini and   
                      R. Torabi   Trading Signed Designs and Some New
                                  $4-(12, 5, 4)$ Designs . . . . . . . . . 279--288
                     A. Klapper   Cross-Correlations of Quadratic Form
                                  Sequences in Odd Characteristic  . . . . 289--305


Designs, Codes, and Cryptography
Volume 12, Number 1, September, 1997

                 Iliya Boukliev   Some New Optimal Ternary Linear Codes    5--11
             Mike Burmester and   
             Yvo G. Desmedt and   
                 Fred Piper and   
                 Michael Walker   A General Zero-Knowledge Scheme  . . . . 13--37
              Stefka Buyuklieva   On the Binary Self-Dual Codes with an
                                  Automorphism of Order $2$  . . . . . . . 39--48
                 R. Craigen and   
                  H. Kharaghani   Hadamard Matrices from Weighing Matrices
                                  via Signed Groups  . . . . . . . . . . . 49--58
                  F. Franek and   
                    A. Rosa and   
                   T. S. Griggs   Large Sets of Mutually Almost Disjoint
                                  Steiner Triple Systems Not From Steiner
                                  Quadruple Systems  . . . . . . . . . . . 59--67
                   J. L. Hayden   Generalized Hadamard Matrices  . . . . . 69--73
                 Xiang-Dong Hou   The Reed--Muller code $R(1,7)$ is normal 75--82
                 Tatsuya Maruta   On the Achievement of the Griesmer Bound 83--87
                      L. Storme   Normal Rational Curves Over Prime Fields 89--96

Designs, Codes, and Cryptography
Volume 12, Number 2, October, 1997

              Hanno Lefmann and   
        Pavel Pudlák and   
                 Petr Savick\'y   On Sparse Parity Check Matrices  . . . . 107--130
        Vladimir I. Levenshtein   Split Orthogonal Arrays and Maximum
                                  Independent Resilient Systems of
                                  Functions  . . . . . . . . . . . . . . . 131--160
                Marten van Dijk   A Linear Construction of Secret Sharing
                                  Schemes  . . . . . . . . . . . . . . . . 161--201

Designs, Codes, and Cryptography
Volume 12, Number 3, November, 1997

         Evangelos Kranakis and   
           Paul C. Van Oorschot   Introduction . . . . . . . . . . . . . . 213--213
                Doug R. Stinson   On Some Methods for Unconditionally
                                  Secure Key Distribution and Broadcast
                                  Encryption . . . . . . . . . . . . . . . 215--243
                  N. Rogier and   
                Pascal Chauvaud   ${\rm MD}2$ is not secure without the
                                  checksum byte  . . . . . . . . . . . . . 245--251
             Vincent Rijmen and   
               Bart Preneel and   
                    Erik De Win   On Weaknesses of Non-surjective Round
                                  Functions  . . . . . . . . . . . . . . . 253--266
                     J. Lee and   
                 H. M. Heys and   
                  S. E. Tavares   Resistance of a CAST-Like Encryption
                                  Algorithm to Linear and Differential
                                  Cryptanalysis  . . . . . . . . . . . . . 267--282
              Carlisle M. Adams   Constructing Symmetric Ciphers Using the
                                  CAST Design Procedure  . . . . . . . . . 283--316


Designs, Codes, and Cryptography
Volume 13, Number 1, January, 1998

          R. Julian R. Abel and   
                  Malcolm Greig   Balanced Incomplete Block Designs with
                                  Block Size $7$ . . . . . . . . . . . . . 5--30
              E. F. Assmus, Jr.   Linearly Derived Steiner Triple Systems  31--49
                Aiden Bruen and   
              Lucien Haddad and   
                   David Wehlau   Caps and Colouring Steiner Triple
                                  Systems  . . . . . . . . . . . . . . . . 51--55
               Gary McGuire and   
        Vladimir D. Tonchev and   
                 Harold N. Ward   Characterizing the Hermitian and Ree
                                  Unitals on $28$ Points . . . . . . . . . 57--61
                  Helmut Siemon   A number-theoretic conjecture and the
                                  existence of $S$-cyclic Steiner
                                  quadruple systems  . . . . . . . . . . . 63--94

Designs, Codes, and Cryptography
Volume 13, Number 2, February, 1998

           Darryn E. Bryant and   
                     A. Khodkar   On Orthogonal Double Covers of Graphs    103--105
             L. R. A. Casse and   
               K. M. Martin and   
                     P. R. Wild   Bounds and Characterizations of
                                  Authentication/Secrecy Schemes . . . . . 107--129
             James A. Davis and   
            Jonathan Jedwab and   
                Miranda Mowbray   New Families of Semi-Regular Relative
                                  Difference Sets  . . . . . . . . . . . . 131--146
              J. Fitzgerald and   
                      R. F. Lax   Decoding affine variety codes using
                                  Gröbner bases . . . . . . . . . . . . . . 147--158
      Kirsten Mackenzie-Fleming   A Recursive Construction for $2$-Designs 159--164
              Noboru Hamada and   
               Marijn van Eupen   The Nonexistence of Ternary $[38, 6,
                                  23]$ Codes . . . . . . . . . . . . . . . 165--172
              T. S. Michael and   
                   W. D. Wallis   Skew-Hadamard Matrices and the Smith
                                  Normal Form  . . . . . . . . . . . . . . 173--176
                Ilene H. Morgan   Equiorthogonal Frequency Hypercubes:
                                  Preliminary Theory . . . . . . . . . . . 177--185
              Pratima Panigrahi   The collinearity graph of the $O^-(8,2)$
                                  quadric is not geometrisable . . . . . . 187--198
                Corrado Zanella   Linear sections of the finite Veronese
                                  varieties and authentication systems
                                  defined using geometry . . . . . . . . . 199--212

Designs, Codes, and Cryptography
Volume 13, Number 3, March, 1998

      Tsonka Stefanova Baicheva   The Covering Radius of Ternary Cyclic
                                  Codes with Length up to $25$ . . . . . . 223--227
              J. J. Brennan and   
                    Bruce Geist   Analysis of iterated modular
                                  exponentiation: the orbits of
                                  $x^\alpha\bmod N$  . . . . . . . . . . . 229--245
                   Yu Qing Chen   A Construction of Difference Sets  . . . 247--250
    Dragomir \vZ. \Dbarokovi\'c   Note on Periodic Complementary Sets of
                                  Binary Sequences . . . . . . . . . . . . 251--256
          T. Aaron Gulliver and   
                 Masaaki Harada   Classification of Extremal Double
                                  Circulant Self-Dual Codes of Lengths
                                  $64$ to $72$ . . . . . . . . . . . . . . 257--269
                 Masaaki Harada   New extremal type II codes over $\bold
                                  Z_4$ . . . . . . . . . . . . . . . . . . 271--284
              Ilia Krasikov and   
                   Simon Litsyn   Bounds on Spectra of Codes with Known
                                  Dual Distance  . . . . . . . . . . . . . 285--297
                R. Safavi-Naini   Three Systems for Threshold Generation
                                  of Authenticators  . . . . . . . . . . . 299--312
                 A. A. Zain and   
                B. Sundar Rajan   Quasideterminant Characterization of MDS
                                  Group Codes over Abelian Groups  . . . . 313--330


Designs, Codes, and Cryptography
Volume 14, Number 1, April, 1998

              F. E. Bennett and   
                     J. Yin and   
                   H. Zhang and   
                  R. J. R. Abel   Perfect Mendelsohn Packing Designs with
                                  Block Size Five  . . . . . . . . . . . . 5--22
        Sergei V. Bezzateev and   
          Natalia A. Shekhunova   A Subclass of Binary Goppa Codes With
                                  Improved Estimation of the Code
                                  Dimension  . . . . . . . . . . . . . . . 23--38
             David B. Jaffe and   
            Vladimir D. Tonchev   Computing Linear Codes and Unitals . . . 39--52
                  Marc Joye and   
        Jean-Jacques Quisquater   Reducing the Elliptic Curve Cryptosystem
                                  of Meyer-Müller to the Cryptosystem of
                                  Rabin-Williams . . . . . . . . . . . . . 53--56
 Çetin K. Koç and   
                     Tolga Acar   Montgomery multiplication in ${\rm
                                  GF}(2^k)$  . . . . . . . . . . . . . . . 57--69
              Tero Laihonen and   
                   Simon Litsyn   On Upper Bounds for Minimum Distance and
                                  Covering Radius of Non-binary Codes  . . 71--80
                    A. Mahmoodi   Existence of Perfect
                                  $3$-Deletion-Correcting Codes  . . . . . 81--87
             Antonio Maschietti   Difference Sets and Hyperovals . . . . . 89--98

Designs, Codes, and Cryptography
Volume 14, Number 2, May, 1998

               Alexei Ashikhmin   On Generalized Hamming Weights for
                                  Galois Ring Linear Codes . . . . . . . . 107--126
             Aiden A. Bruen and   
                  Keldon Drudge   On the non-existence of certain
                                  Cameron-Liebler line classes in ${\rm
                                  PG}(3, q)$ . . . . . . . . . . . . . . . 127--132
              Claude Carlet and   
               Philippe Guillot   An Alternate Characterization of the
                                  Bentness of Binary Functions, with
                                  Uniqueness . . . . . . . . . . . . . . . 133--140
        Charles J. Colbourn and   
                Alan C. H. Ling   Point Code Minimum Steiner Triple
                                  Systems  . . . . . . . . . . . . . . . . 141--146
                  Yury J. Ionin   A Technique for Constructing Symmetric
                                  Designs  . . . . . . . . . . . . . . . . 147--158
         Volker Müller and   
             Scott Vanstone and   
              Robert Zuccherato   Discrete Logarithm Based Cryptosystems
                                  in Quadratic Function Fields of
                                  Characteristic $2$ . . . . . . . . . . . 159--178
            Juriaan Simonis and   
               Alexei Ashikhmin   Almost Affine Codes  . . . . . . . . . . 179--197

Designs, Codes, and Cryptography
Volume 14, Number 3, September, 1998

        Amir H. Banihashemi and   
               Amir K. Khandani   An Inequality on the Coding Gain of
                                  Densest Lattice Packings in Successive
                                  Dimensions . . . . . . . . . . . . . . . 207--212
            Harald Fripertinger   Enumeration, Construction and Random
                                  Generation of Block Codes  . . . . . . . 213--219
                 Jingmin He and   
                      Ed Dawson   Shared Secret Reconstruction . . . . . . 221--237
              Philippe Langevin   Weights of Abelian Codes . . . . . . . . 239--245
            Kenneth G. Paterson   Root Counting, the DFT and the Linear
                                  Complexity of Nonlinear Filtering  . . . 247--259
            Doug R. Stinson and   
                 Tran Van Trung   Some New Results on Key Distribution
                                  Patterns and Broadcast Encryption  . . . 261--279
            Marten van Dijk and   
         Christian Gehrmann and   
                     Ben Smeets   Unconditionally Secure Group
                                  Authentication . . . . . . . . . . . . . 281--296
                  Helmut Siemon   Erratum: ``A number-theoretic conjecture
                                  and the existence of $S$-cyclic Steiner
                                  quadruple systems'' [Des. Codes
                                  Cryptogr. \bf 13 (1998), no. 1, 63--94;
                                  1 600 695] . . . . . . . . . . . . . . . 297--297


Designs, Codes, and Cryptography
Volume 15, Number 1, October, 1998

               Anton Betten and   
            Adalbert Kerber and   
              Reinhard Laue and   
              Alfred Wassermann   Simple $8$-Designs with Small Parameters 5--27
          Roberto De Prisco and   
              Alfredo De Santis   On Lower Bounds for the Redundancy of
                                  Optimal Codes  . . . . . . . . . . . . . 29--45
                 Wende Chen and   
           Torleiv Klòve   Weight Hierarchies of Linear Codes
                                  Satisfying the Chain Condition . . . . . 47--66
             Christian Gehrmann   Multiround Unconditionally Secure
                                  Authentication . . . . . . . . . . . . . 67--86
             Kaoru Kurosawa and   
                 Koji Okada and   
               Hajime Saido and   
             Douglas R. Stinson   New Combinatorial Bounds for
                                  Authentication Codes and Key
                                  Predistribution Schemes  . . . . . . . . 87--100

Designs, Codes, and Cryptography
Volume 15, Number 2, 1998

              Ross Anderson and   
              Cunsheng Ding and   
              Tor Helleseth and   
           Torleiv Klòve   How to build robust shared control
                                  systems  . . . . . . . . . . . . . . . . 111--124
              Claude Carlet and   
            Pascale Charpin and   
                Victor Zinoviev   Codes, bent functions and permutations
                                  suitable for DES-like cryptosystems  . . 125--156
                 Wende Chen and   
                   Zhi Chen and   
           Torleiv Klòve   New constructions of disjoint distinct
                                  difference sets  . . . . . . . . . . . . 157--165
                    K. Chen and   
                         L. Zhu   Existence of $(q,6,1)$ difference
                                  families with $q$ a prime power  . . . . 167--173
              Tor Helleseth and   
             P. Vijay Kumar and   
               Kyeongcheol Yang   An infinite family of $3$-designs from
                                  Preparata codes over ${Z}_4$ . . . . . . 175--181
               Markku Kaikkonen   Codes from affine permutation groups . . 183--186
            A. A. I. Perera and   
                  K. J. Horadam   Cocyclic generalised Hadamard matrices
                                  and central relative difference sets . . 187--200
           Kyeongcheol Yang and   
                  Tor Helleseth   Two new infinite families of $3$-designs
                                  from Kerdock codes over ${Z}_4$  . . . . 201--214

Designs, Codes, and Cryptography
Volume 15, Number 3, December, 1998

                K. T. Arasu and   
                       S. L. Ma   Abelian Difference Sets Without
                                  Self-conjugacy . . . . . . . . . . . . . 223--230
                    Simeon Ball   Partial Unitals and Related Structures
                                  in Desarguesian Planes . . . . . . . . . 231--236
             M. C. Bhandari and   
          K. K. P. Chanduka and   
                      A. K. Lal   On Lower Bounds For Covering Codes . . . 237--243
                Ivan N. Landjev   The Nonexistence of Some Optimal Ternary
                                  Codes of Dimension Five  . . . . . . . . 245--258
            Hiroyuki Ohmori and   
               Takashi Miyamoto   Construction of Weighing Matrices
                                  $(17,9)$ Having the Intersection Number
                                  $8$  . . . . . . . . . . . . . . . . . . 259--269
              Nabil Shalaby and   
                   Jianxing Yin   Nested Optimal $\lambda$-Packings and
                                  $\lambda$-Coverings of Pairs with
                                  Triples  . . . . . . . . . . . . . . . . 271--278
              Brett Stevens and   
                Lucia Moura and   
                Eric Mendelsohn   Lower Bounds for Transversal Covers  . . 279--299
            Marten van Dijk and   
             Wen-Ai Jackson and   
                Keith M. Martin   A General Decomposition Construction for
                                  Incomplete Secret Sharing Schemes  . . . 301--321


Designs, Codes, and Cryptography
Volume 16, Number 1, January, 1999

             M. C. Bhandari and   
                M. K. Gupta and   
                      A. K. Lal   Some Results on NQR Codes  . . . . . . . 5--9
         Simon Blake-Wilson and   
                Kevin T. Phelps   Constant Weight Codes and Group
                                  Divisible Designs  . . . . . . . . . . . 11--27
       Alexander A. Davydov and   
        Patric R. J. Ostergaard   New Linear Codes with Covering Radius
                                  $2$ and Odd Basis  . . . . . . . . . . . 29--39
                 Vikram Jha and   
                 Norman Johnson   Cyclic Ostrom Spreads  . . . . . . . . . 41--51
             Kaoru Kurosawa and   
                   Wakaha Ogata   Efficient Rabin-type Digital Signature
                                  Scheme . . . . . . . . . . . . . . . . . 53--64
Patric R. J. Ostergård and   
             William D. Weakley   Constructing Covering Codes with Given
                                  Automorphisms  . . . . . . . . . . . . . 65--73
               Carles Padro and   
  Germán Sáez and   
              Jorge Luis Villar   Detection of Cheaters in Vector Space
                                  Secret Sharing Schemes . . . . . . . . . 75--85
              Keisuke Shiromoto   The Weight Enumerator of Linear Codes
                                  over GF$(qm)$ Having Generator Matrix
                                  over GF$(q)$ . . . . . . . . . . . . . . 87--92

Designs, Codes, and Cryptography
Volume 16, Number 2, February, 1999

                    A. Barg and   
                   A. Ashikhmin   Binomial Moments of the Distance
                                  Distribution and the Probability of
                                  Undetected Error . . . . . . . . . . . . 103--116
                  Marco Buratti   Some $(17q, 17, 2)$ and $(25q, 25, 3)$
                                  BIBD Constructions . . . . . . . . . . . 117--120
                Paul Camion and   
                  Anne Canteaut   Correlation-Immune and Resilient
                                  Functions Over a Finite Alphabet and
                                  Their Applications in Cryptography . . . 121--149
                  Yves Edel and   
         Jürgen Bierbrauer   $41$ is the Largest Size of a Cap in
                                  ${\rm PG}(4,4)$  . . . . . . . . . . . . 151--160
                  Graham Norton   On Minimal Realization Over a Finite
                                  Chain Ring . . . . . . . . . . . . . . . 161--178
            Kevin T. Phelps and   
                     Mike LeVan   Switching Equivalence Classes of Perfect
                                  Codes  . . . . . . . . . . . . . . . . . 179--184
           A. J. van Zanten and   
                   Agung Lukito   Construction of Certain Cyclic
                                  Distance-Preserving Codes Having
                                  Linear-Algebraic Characteristics . . . . 185--199

Designs, Codes, and Cryptography
Volume 16, Number 3, May, 1999

               L. M. Batten and   
                    J. M. Dover   Some Sets of Type in Cubic Order Planes  211--213
           Alexis Bonnecaze and   
           Bernard Mourrain and   
            Patrick Solé   Jacobi Polynomials, Type II Codes, and
                                  Designs  . . . . . . . . . . . . . . . . 215--234
          M. A. Chateauneuf and   
        Charles J. Colbourn and   
                   D. L. Kreher   Covering Arrays of Strength Three  . . . 235--242
            Sebastian Egner and   
                    Thomas Beth   How to Play $M_{13}$?  . . . . . . . . . 243--247
           John Friedlander and   
             Michael Larsen and   
              Daniel Lieman and   
               Igor Shparlinski   On The Correlation Of Binary
                                  $M$-sequences  . . . . . . . . . . . . . 249--256
           Philippe Gaborit and   
                 Masaaki Harada   Construction of Extremal Type II Codes
                                  over ${\bf Z}_4$ . . . . . . . . . . . . 257--269
              William J. Martin   Designs in Product Association Schemes   271--289
     Deirdre Longacher Smeltzer   Properties of Codes from Difference Sets
                                  in $2$-Groups  . . . . . . . . . . . . . 291--306


Designs, Codes, and Cryptography
Volume 17, Number 1--3, September, 1999

                      Anonymous   Guest Editorial  . . . . . . . . . . . . 5--6
                  J. D. Key and   
             H. F. Mattson, Jr.   Edward F. Assmus, Jr. (1931--1998) . . . 7--11
                      Anonymous   Ed Assmus  . . . . . . . . . . . . . . . 13--14
             Aiden A. Bruen and   
                David L. Wehlau   Long Binary Linear Codes and Large Caps
                                  in Projective Space  . . . . . . . . . . 37--60
               Bernhard Schmidt   Williamson Matrices and a Conjecture of
                                  Ito's  . . . . . . . . . . . . . . . . . 61--68
                   Yu Qing Chen   On a Family of Covering Extended
                                  Building Sets  . . . . . . . . . . . . . 69--72
                 Harold N. Ward   An Introduction to Divisible Codes . . . 73--79
            Pascale Charpin and   
 Aimo Tietäväinen and   
                Victor Zinoviev   On the Minimum Distances of Non-Binary
                                  Cyclic Codes . . . . . . . . . . . . . . 81--85
                   G. Cohen and   
                  J. Rif\`a and   
                    J. Tena and   
                G. Zémor   On the Characterization of Linear
                                  Uniquely Decodable Codes . . . . . . . . 87--96
             Joseph A. Thas and   
          Hendrik Van Maldeghem   On Embeddings of the Flag Geometries of
                                  Projective Planes in Finite Projective
                                  Spaces . . . . . . . . . . . . . . . . . 97--104
             Neil J. Calkin and   
                  J. D. Key and   
               M. J. De Resmini   Minimum Weight and Dimension Formulas
                                  for Some Geometric Codes . . . . . . . . 105--120
            Vladimir D. Tonchev   Linear Perfect Codes and a
                                  Characterization of the Classical
                                  Designs  . . . . . . . . . . . . . . . . 121--128
              Jörg Eisfeld   The Eigenspaces of the
                                  Bose--Mesner-Algebras of the Association
                                  Schemes corresponding to Projective
                                  Spaces and Polar Spaces  . . . . . . . . 129--150
                       Ray Hill   An Extension Theorem for Linear Codes    151--157
                  Yury J. Ionin   Building Symmetric Designs With Building
                                  Sets . . . . . . . . . . . . . . . . . . 159--175
                 Hans Dobbertin   Another Proof of Kasami's Theorem  . . . 177--180
               Anton Betten and   
              Reinhard Laue and   
              Alfred Wassermann   A Steiner $5$-Design on $36$ Points  . . 181--186
          Willem H. Haemers and   
        René Peeters and   
     Jeroen M. van Rijckevorsel   Binary Codes of Strongly Regular Graphs  187--209
                     Qing Xiang   Maximally Nonlinear Functions and Bent
                                  Functions  . . . . . . . . . . . . . . . 211--218
                   Klaus Metsch   A Bose-Burton Theorem for Elliptic Polar
                                  Spaces . . . . . . . . . . . . . . . . . 219--224
                   J. F. Dillon   Multiplicative Difference Sets via
                                  Additive Characters  . . . . . . . . . . 225--235
                Simeon Ball and   
              Aart Blokhuis and   
           Christine M. O'Keefe   On Unitals with Many Baer Sublines . . . 237--252
                G. L. Ebert and   
            J. W. P. Hirschfeld   Complete Systems of Lines on a Hermitian
                                  Surface over a Finite Field  . . . . . . 253--268
              Tor Helleseth and   
                Victor Zinoviev   On $Z_4$-Linear Goethals Codes and
                                  Kloosterman Sums . . . . . . . . . . . . 269--288
              Richard M. Wilson   Signed Hypergraph Designs and Diagonal
                                  Forms for Some Incidence Matrices  . . . 289--297
                A. Blokhuis and   
                  A. E. Brouwer   The Universal Embedding Dimension of the
                                  Near Polygon on the $1$-Factors of a
                                  Complete Graph . . . . . . . . . . . . . 299--303
             James A. Davis and   
                Jonathan Jedwab   A New Family of Relative Difference Sets
                                  in $2$-Groups  . . . . . . . . . . . . . 305--312


Designs, Codes, and Cryptography
Volume 18, Number 1--3, December, 1999

          Dieter Jungnickel and   
                  Jack van Lint   Editorial  . . . . . . . . . . . . . . . 5--6
                K. T. Arasu and   
                     N. J. Voss   Answering a Question of Pott on Almost
                                  Perfect Sequences  . . . . . . . . . . . 7--10
               Christine Bachoc   On Harmonic Weight Enumerators of Binary
                                  Codes  . . . . . . . . . . . . . . . . . 11--28
          Thierry P. Berger and   
                Pascale Charpin   The Automorphism Groups of BCH Codes and
                                  of Some Affine-Invariant Codes Over
                                  Extension Fields . . . . . . . . . . . . 29--53
            Wayne Broughton and   
                   Gary McGuire   Some Observations on Quasi-$3$ Designs
                                  and Hadamard Matrices  . . . . . . . . . 55--61
           Matthew R. Brown and   
       Christine M. O'Keefe and   
                   Tim Penttila   Triads, Flocks of Conics and
                                  $Q^{-(5,1)}$ . . . . . . . . . . . . . . 63--70
     Gérard D. Cohen and   
          Sylvia B. Encheva and   
            Gilles Zémor   Antichain Codes  . . . . . . . . . . . . 71--80
          Charles A. Cusack and   
           Spyros S. Magliveras   Semiregular Large Sets . . . . . . . . . 81--87
                 D. de Caen and   
                  E. R. van Dam   Association Schemes Related to Kasami
                                  Codes and Kerdock Sets . . . . . . . . . 89--102
               Iwan Duursma and   
              Tor Helleseth and   
              Chunming Rong and   
               Kyeongcheol Yang   Split Weight Enumerators for the
                                  Preparata Codes with Applications to
                                  Designs  . . . . . . . . . . . . . . . . 103--124
               J. E. Fields and   
                 P. Gaborit and   
              W. C. Huffman and   
                       V. Pless   On the Classification of Extremal Even
                                  Formally Self-Dual Codes . . . . . . . . 125--148
                Shuhong Gao and   
                   Jason Howell   A General Polynomial Sieve . . . . . . . 149--157
                    Chat Yin Ho   Incidence Matrices and Collineations of
                                  Finite Projective Planes . . . . . . . . 159--162
                   H. Janwa and   
             H. F. Mattson, Jr.   Some Upper Bounds on the Covering Radii
                                  of Linear Codes Over and Their
                                  Applications . . . . . . . . . . . . . . 163--181
         G. B. Khosrovshahi and   
                  Reza Naserasr   Hypergraphical Codes Arising from Binary
                                  Trades . . . . . . . . . . . . . . . . . 183--186
              Rudolf Mathon and   
                 Tran van Trung   Directed $t$-Packings and Directed
                                  $t$-Steiner Systems  . . . . . . . . . . 187--198
               Klaus Metsch and   
                      L. Storme   Partial $t$-Spreads in
                                  $\mbox{PG}(2t+1,q)$  . . . . . . . . . . 199--216
                 Alan R. Prince   Flag-Transitive Affine Planes of Order
                                  $64$ . . . . . . . . . . . . . . . . . . 217--221
         Mattias Svanström   A Class of Perfect Ternary
                                  Constant-Weight Codes  . . . . . . . . . 223--229
              Jack van Lint and   
                 Ludo Tolhuizen   On Perfect Ternary Constant Weight Codes 231--234
           Tamás Szhonyi   On the Embedding of $(k,p)$-Arcs is
                                  Maximal Arcs . . . . . . . . . . . . . . 235--246


Designs, Codes, and Cryptography
Volume 19, Number 1, January, 2000

               J. H. Dinitz and   
                   E. R. Lamken   HOPs and COPs: Room frames with
                                  partitionable transversals . . . . . . . 5--26
                  Todd D. Vance   A Gap in GRM Code Weight Distributions   27--43
              Xian-Mo Zhang and   
              Yuliang Zheng and   
                    Hideki Imai   Relating Differential Distribution
                                  Tables to Other Properties of
                                  Substitution Boxes . . . . . . . . . . . 45--63

Designs, Codes, and Cryptography
Volume 19, Number 2--3, March, 2000

                   Neal Koblitz   Guest Editorial  . . . . . . . . . . . . 75--76
             Simon Blake-Wilson   Information Security, Mathematics, and
                                  Public-Key Cryptography  . . . . . . . . 77--99
               Arjen K. Lenstra   Integer Factoring  . . . . . . . . . . . 101--128
                 Andrew Odlyzko   Discrete Logarithms: The Past and the
                                  Future . . . . . . . . . . . . . . . . . 129--145
             Ueli M. Maurer and   
                    Stefan Wolf   The Diffie--Hellman Protocol . . . . . . 147--171
               Neal Koblitz and   
             Alfred Menezes and   
                 Scott Vanstone   The State of Elliptic Curve Cryptography 173--193
              Jerome A. Solinas   Efficient Arithmetic on Koblitz Curves   195--249


Designs, Codes, and Cryptography
Volume 20, Number 1, April, 2000

            Joseph H. Silverman   The Xedni Calculus and the Elliptic
                                  Curve Discrete Logarithm Problem . . . . 5--40
        Michael J. Jacobson and   
               Neal Koblitz and   
        Joseph H. Silverman and   
              Andreas Stein and   
                    Edlyn Teske   Analysis of the Xedni Calculus Attack    41--64
             James M. McQuillan   Pencils of Hyperconics in Projective
                                  Planes of Characteristic Two . . . . . . 65--71
               Jacques Wolfmann   Difference Sets in $Z_4^m$ and
                                  $F_2^{2m}$ . . . . . . . . . . . . . . . 73--88
         Ralph-Hardo Schulz and   
         Antonino Giorgio Spera   Automorphisms of Constant Weight Codes
                                  and of Divisible Designs . . . . . . . . 89--97

Designs, Codes, and Cryptography
Volume 20, Number 2, June, 2000

    Grégoire Bommier and   
               Francis Blanchet   Binary Quasi-Cyclic Goppa Codes  . . . . 107--124
           Graham H. Norton and   
          Ana Salagean-Mandache   On the Key Equation Over a Commutative
                                  Ring . . . . . . . . . . . . . . . . . . 125--141
            Arrigo Bonisoli and   
             Antonio Cossidente   Mixed Partitions of Projective
                                  Geometries . . . . . . . . . . . . . . . 143--154
          A. Halbutogullari and   
                      C. K. Koc   Parallel Multiplication in using
                                  Polynomial Residue Arithmetic  . . . . . 155--173
                Jacques Patarin   Cryptanalysis of the Matsumoto and Imai
                                  Public Key Scheme of Eurocrypt'98  . . . 175--209

Designs, Codes, and Cryptography
Volume 20, Number 3, July, 2000

        Charles J. Colbourn and   
                    Sufang Zhao   Maximum Kirkman Signal Sets for
                                  Synchronous Uni-Polar Multi-User
                                  Communication Systems  . . . . . . . . . 219--227
          Sylvia B. Encheva and   
         Gérard D. Cohen   Linear Codes and Their Coordinate
                                  Ordering . . . . . . . . . . . . . . . . 229--250
                 Xiang-dong Hou   Bent Functions, Partial Difference Sets,
                                  and Quasi-Frobenius Local Rings  . . . . 251--268
                  Ari Juels and   
                 Marcus Peinado   Hiding Cliques for Cryptographic
                                  Security . . . . . . . . . . . . . . . . 269--280
              Satoshi Obana and   
                 Kaoru Kurosawa   Combinatorial Classification of Optimal
                                  Authentication Codes with Arbitration    281--305
              Pratima Panigrahi   The Non-Collinearity Graph of the
                                  $(8,2)$ Quadric Is Uniquely
                                  Geometrisable  . . . . . . . . . . . . . 307--317
                 Olga Polverino   Small Blocking Sets in $\mbox{PG}(2, p)$ 319--324
            Ching-Nung Yang and   
                  Chi-Sung Laih   New Colored Visual Secret Sharing
                                  Schemes  . . . . . . . . . . . . . . . . 325--336


Designs, Codes, and Cryptography
Volume 21, Number 1--3, October, 2000

              Aart Blokhuis and   
              Willem H. Haemers   Preface  . . . . . . . . . . . . . . . . 5--5
                N. G. de Bruijn   Jaap Seidel 80 . . . . . . . . . . . . . 7--10
             Béla Bajnok   Spherical Designs and Generalized
                                  Sum-Free Sets in Abelian Groups  . . . . 11--18
                R. D. Baker and   
                J. M. Dover and   
                G. L. Ebert and   
                    K. L. Wantz   Perfect Baer Subplane Partitions and
                                  Three-Dimensional Flag-Transitive Planes 19--39
               Peter Beelen and   
                 Ruud Pellikaan   The Newton Polygon of Plane Curves with
                                  Many Rational Points . . . . . . . . . . 41--67
                  A. E. Brouwer   Locally Paley Graphs . . . . . . . . . . 69--76
        Frans C. Bussemaker and   
          Willem H. Haemers and   
                  Edward Spence   The Search for Pseudo Orthogonal Latin
                                  Squares of Order Six . . . . . . . . . . 77--82
               Edwin R. van Dam   A Characterization of Association
                                  Schemes from Affine Spaces . . . . . . . 83--86
            Frank De Clerck and   
                 Mario Delanote   Two-Weight Codes, Partial Geometries and
                                  Steiner Systems  . . . . . . . . . . . . 87--98
              Ralf Gramlich and   
          Hendrik Van Maldeghem   Epimorphisms of Generalized Polygons
                                  Part 1: Geometrical Characterizations    99--111
              Yury J. Ionin and   
               M. S. Shrikhande   Strongly Regular Graphs and Designs with
                                  Three Intersection Numbers . . . . . . . 113--125
        Aleksandar Jurivsic and   
                    Jack Koolen   A Local Approach to $1$-Homogeneous
                                  Graphs . . . . . . . . . . . . . . . . . 127--147
                Jack Koolen and   
            Monique Laurent and   
            Alexander Schrijver   Equilateral Dimension of the Rectilinear
                                  Space  . . . . . . . . . . . . . . . . . 149--164
              Johannes Maks and   
                Juriaan Simonis   Optimal Subcodes of Second Order
                                  Reed--Muller Codes and Maximal Linear
                                  Spaces of Bivectors of Maximal Rank  . . 165--180
              William J. Martin   Minimum Distance Bounds for $s$-Regular
                                  Codes  . . . . . . . . . . . . . . . . . 181--187
         Bernhard Mühlherr   On Isomorphisms between Coxeter Groups   189--189
              L. J. Rylands and   
                   D. E. Taylor   Constructions for Octonion and
                                  Exceptional Jordan Algebras  . . . . . . 191--203
                    Akos Seress   Large Families of Cospectral Graphs  . . 205--208
                       Ron Shaw   Subsets of $\mbox{PG}(n,2)$ and Maximal
                                  Partial Spreads in $\mbox{PG}(4,2)$  . . 209--222
                 Irfan Siap and   
         Dijen K. Ray-Chaudhuri   New Linear Codes Over and Improvements
                                  on Bounds  . . . . . . . . . . . . . . . 223--233
                  L. Storme and   
                     Zs. Weiner   On $1$-Blocking Sets in $\mbox{PG}(n,q),
                                  n\geq 3$ . . . . . . . . . . . . . . . . 235--251


Designs, Codes, and Cryptography
Volume 22, Number 1, January, 2001

                    Akos Seress   All Lambda-Designs With $\lambda = 2^p$
                                  are Type-1 . . . . . . . . . . . . . . . 5--17
         Antonio Cossidente and   
           Domenico Labbate and   
           Alessandro Siciliano   Veronese Varieties Over Finite Fields
                                  and Their Projections  . . . . . . . . . 19--32
                   Sylvie Dubuc   Characterization of Linear Structures    33--45
              Satoshi Obana and   
                 Kaoru Kurosawa   Bounds and Combinatorial Structure of
                                  $(k,n)$ Multi-Receiver $A$-Codes . . . . 47--63
                Joan Daemen and   
            Lars R. Knudsen and   
                 Vincent Rijmen   Linear Frameworks for Block Ciphers  . . 65--87
          T. Aaron Gulliver and   
                 Masaaki Harada   Codes over and Improvements to the
                                  Bounds on Ternary Linear Codes . . . . . 89--96
               Andreas Enge and   
              Dieter Jungnickel   Review . . . . . . . . . . . . . . . . . 97--99

Designs, Codes, and Cryptography
Volume 22, Number 2, March, 2001

           Gretchen L. Matthews   Weierstrass Pairs and Minimum Distance
                                  of Goppa Codes . . . . . . . . . . . . . 107--121
                 Arne Winterhof   Some Estimates for Character Sums and
                                  Applications . . . . . . . . . . . . . . 123--131
                  D. R. Stinson   Something About All or Nothing
                                  (Transforms) . . . . . . . . . . . . . . 133--138
                 Harold N. Ward   The Nonexistence of a $[207,4,165]$ Code
                                  over ${\rm GF}(5)$ . . . . . . . . . . . 139--148
               Kenichiro Tanabe   A New Proof of the Assmus--Mattson
                                  Theorem for Non-Binary Codes . . . . . . 149--155
    Agnes V. Dizon-Garciano and   
                Yutaka Hiramine   On Sylow Subgroups of Abelian Affine
                                  Difference Sets  . . . . . . . . . . . . 157--163
                 Tatsuya Maruta   On the Nonexistence of $q$-ary Linear
                                  Codes of Dimension Five  . . . . . . . . 165--177
              Norman L. Johnson   Two-Transitive Parallelisms  . . . . . . 179--189
                   U. Dempwolff   Primitive Rank $3$ Groups on Symmetric
                                  Designs  . . . . . . . . . . . . . . . . 191--207

Designs, Codes, and Cryptography
Volume 22, Number 3, January, 2001

                 Michel Sebille   There Exists a Simple Non Trivial
                                  $t$-design with an Arbitrarily Large
                                  Automorphism Group for Every $t$ . . . . 215--219
                R. Ahlswede and   
             H. K. Aydinian and   
              L. H. Khachatrian   On Perfect Codes and Related Concepts    221--237
                   R. Scheidler   Cryptography in Quadratic Function
                                  Fields . . . . . . . . . . . . . . . . . 239--264
             Kaoru Kurosawa and   
                  Satoshi Obana   Combinatorial Bounds on Authentication
                                  Codes with Arbitration . . . . . . . . . 265--281
                 Vikram Jha and   
              Norman L. Johnson   Almost Desarguesian Maximal Partial
                                  Spreads  . . . . . . . . . . . . . . . . 283--304
           Alexander A. Davydov   New Constructions of Covering Codes  . . 305--316
                   Karl Brincat   On the Use of RSA as a Secret Key
                                  Cryptosystem . . . . . . . . . . . . . . 317--329
                     Olof Heden   A Maximal Partial Spread of Size $45$ in
                                  ${\rm PG}(3,7)$  . . . . . . . . . . . . 331--334


Designs, Codes, and Cryptography
Volume 23, Number 1, May, 2001

               Igor Shparlinski   On the Linear Complexity of the Power
                                  Generator  . . . . . . . . . . . . . . . 5--10
           Koichi Betsumiya and   
                 Masaaki Harada   Binary Optimal Odd Formally Self-Dual
                                  Codes  . . . . . . . . . . . . . . . . . 11--22
           Tadashi Wadayama and   
                  Toru Hada and   
          Koichiro Wakasugi and   
                 Masao Kasahara   Upper and Lower Bounds on Maximum
                                  Nonlinearity of $n$-input $m$-output
                                  Boolean Function . . . . . . . . . . . . 23--34
            Blessilda P. Raposa   Some Triple Block Intersection Numbers
                                  of Paley $2$-Designs of QN-type  . . . . 35--52
                   Andreas Enge   The Extended Euclidian Algorithm on
                                  Polynomials, and the Computational
                                  Efficiency of Hyperelliptic
                                  Cryptosystems  . . . . . . . . . . . . . 53--74
                    J. E. Iiams   A Note on Certain 2-Groups with Hadamard
                                  Difference Sets  . . . . . . . . . . . . 75--80
          Christophe Mouaha and   
              Gerhard Schiffels   All $q^m$-ary Cyclic Codes with Cyclic
                                  $q$-ary Image Are Known  . . . . . . . . 81--98
                   Jianxing Yin   A Combinatorial Construction for Perfect
                                  Deletion-Correcting Codes  . . . . . . . 99--110

Designs, Codes, and Cryptography
Volume 23, Number 2, July, 2001

                 I. Honkala and   
                     A. Klapper   Bounds for the Multicovering Radii of
                                  Reed--Muller Codes with Applications to
                                  Stream Ciphers . . . . . . . . . . . . . 131--146
               Igor Shparlinski   On Some Properties of the Shrinking
                                  Generator  . . . . . . . . . . . . . . . 147--156
              Tor Helleseth and   
             P. Vijay Kumar and   
              Halvard Martinsen   A New Family of Ternary Sequences with
                                  Ideal Two-level Autocorrelation Function 157--166
          T. Aaron Gulliver and   
             Nikolai Senkevitch   Optimal Ternary Linear Rate $1/2$ Codes  167--172
                  Luke O'Connor   On String Replacement Exponentiation . . 173--184
              B. N. Cooperstein   Hyperplane Sections of Kantor's Unitary
                                  Ovoids . . . . . . . . . . . . . . . . . 185--196
                  Yves Edel and   
         Jürgen Bierbrauer   Large Caps in Small Spaces . . . . . . . 197--212
                  Kenzi Akiyama   On Certain Schur Rings of Dimension $4$  213--222
              Ilia Krasikov and   
                   Simon Litsyn   On the Distance Distributions of BCH
                                  Codes and Their Duals  . . . . . . . . . 223--232
              Marco Buratti and   
                  Fulvio Zuanni   Perfect Cayley Designs as
                                  Generalizations of Perfect Mendelsohn
                                  Designs  . . . . . . . . . . . . . . . . 233--248
                     J. A. Thas   Characterizations of Translation
                                  Generalized Quadrangles  . . . . . . . . 249--258

Designs, Codes, and Cryptography
Volume 23, Number 3, August, 2001

             C. Koukouvinos and   
                M. Mitrouli and   
               Jennifer Seberry   Values of Minors of $(1,-1)$ Incidence
                                  Matrices of SBIBDs and Their Application
                                  to the Growth Problem  . . . . . . . . . 267--282
      N. A. Howgrave-Graham and   
                    N. P. Smart   Lattice Attacks on Digital Signature
                                  Schemes  . . . . . . . . . . . . . . . . 283--290
                    Sharad Sane   A Proof of the Jungnickel-Tonchev
                                  Conjecture on Quasi-Multiple
                                  Quasi-Symmetric Designs  . . . . . . . . 291--296
                  Marc Joye and   
    Jean-Jacques Quisquater and   
                Tsuyoshi Takagi   How to Choose Secret Parameters for
                                  RSA-Type Cryptosystems over Elliptic
                                  Curves . . . . . . . . . . . . . . . . . 297--316
                K. T. Arasu and   
                   Yu Qing Chen   A Difference Set in $(\mathbb{Z}/4
                                  \mathbb{Z})^3 \times
                                  \mathbb{Z}/5\mathbb{Z}$  . . . . . . . . 317--324
           Koichi Betsumiya and   
                 Masaaki Harada   Classification of Formally Self-Dual
                                  Even Codes of Lengths up to $16$ . . . . 325--332
        Galina T. Bogdanova and   
         Andries E. Brouwer and   
         Stoian N. Kapralov and   
Patric R. J. Östergård   Error-Correcting Codes over an Alphabet
                                  of Four Elements . . . . . . . . . . . . 333--342
          Kanat S. Abdukhalikov   Affine Invariant and Cyclic Codes over
                                  $p$-adic Numbers and Finite Rings  . . . 343--370


Designs, Codes, and Cryptography
Volume 24, Number 1, September, 2001

                      G. Hughes   Structure Theorems for Group Ring Codes
                                  with an Application to Self-Dual Codes   5--14
               Houshou Chen and   
                 John T. Coffey   Trellis Structure and Higher Weights of
                                  Extremal Self-Dual Codes . . . . . . . . 15--36
    István Kovács   On the Internal Nuclei of Sets in ${\rm
                                  PG}(n,q)$, $q$ is Odd  . . . . . . . . . 37--42
                    Chris Boner   Maximal Weight Divisors of Projective
                                  Reed--Muller Codes . . . . . . . . . . . 43--47
               Siaw-Lynn Ng and   
                 Michael Walker   On the Composition of Matroids and Ideal
                                  Secret Sharing Schemes . . . . . . . . . 49--67
                      D. Wu and   
                         L. Zhu   Generalized Steiner Systems with a Prime
                                  Power  . . . . . . . . . . . . . . . . . 69--80
                P. Véron   True Dimension of Some Binary Quadratic
                                  Trace Goppa Codes  . . . . . . . . . . . 81--97
              Gabriele Nebe and   
                E. M. Rains and   
                N. J. A. Sloane   The Invariants of the Clifford Groups    99--122

Designs, Codes, and Cryptography
Volume 24, Number 2, October, 2001

                  Martin Bokler   Minimal Blocking Sets in Projective
                                  Spaces of Square Order . . . . . . . . . 131--144
           Amir K. Khandani and   
                    M. Esmaeili   Successive Minimization of the State
                                  Complexity of the Self-dual Lattices
                                  Using Korkin--Zolotarev Reduced Basis    145--158
              Sönke Blunck   On the Existence and Construction of
                                  Tight Fourth Order Quadrature Rules for
                                  the Sphere . . . . . . . . . . . . . . . 159--169
                      A. Baliga   Cocyclic Codes of Length $40$  . . . . . 171--179
               Kwok Yan Lam and   
                 Francesco Sica   The Weight Distribution of . . . . . . . 181--191
               Iiro Honkala and   
              Tero Laihonen and   
                    Sanna Ranto   On Codes Identifying Sets of Vertices in
                                  Hamming Spaces . . . . . . . . . . . . . 193--204
                Simeon Ball and   
                   Ray Hill and   
               Ivan Landjev and   
                    Harold Ward   On $(q^2 + q + 2, q + 2)$-arcs in the
                                  Projective Plane . . . . . . . . . . . . 205--224
             Zvonimir Janko and   
            Hadi Kharaghani and   
            Vladimir D. Tonchev   The Existence of a Bush-Type Hadamard
                                  Matrix of Order $324$ and Two New
                                  Infinite Classes of Symmetric Designs    225--232
                 E. Ballico and   
                  A. Cossidente   Curves in Projective Spaces and Almost
                                  MDS Codes  . . . . . . . . . . . . . . . 233--237

Designs, Codes, and Cryptography
Volume 24, Number 3, December, 2001

              Mariko Hagita and   
               Bernhard Schmidt   Bijections Between Group Rings
                                  Preserving Character Sums  . . . . . . . 243--254
               Carlo Blundo and   
          Annalisa De Bonis and   
              Alfredo De Santis   Improved Schemes for Visual Cryptography 255--278
        Igor E. Shparlinski and   
            Joseph H. Silverman   On the Linear Complexity of the
                                  Naor--Reingold Pseudo-random Function
                                  from Elliptic Curves . . . . . . . . . . 279--289
                Clement Lam and   
                      Ying Miao   Difference Families  . . . . . . . . . . 291--304
          H. Tapia-Recillas and   
                        G. Vega   An Upper Bound on the Number of
                                  Iterations for Transforming a Boolean
                                  Function of Degree Greater or Equal Than
                                  $4$ to a Function of Degree $3$  . . . . 305--312
                  Nuh Aydin and   
                 Irfan Siap and   
         Dijen K. Ray-Chaudhuri   The Structure of $1$-Generator
                                  Quasi-Twisted Codes and New Linear Codes 313--326
                      Wenbo Mao   Verifiable Partial Escrow of Integer
                                  Factors  . . . . . . . . . . . . . . . . 327--342
             Jeong-Heon Kim and   
                 Hong-Yeop Song   Trace Representation of Legendre
                                  Sequences  . . . . . . . . . . . . . . . 343--348


Designs, Codes, and Cryptography
Volume 25, Number 1, January, 2002

             Stefka Bouyuklieva   On the Automorphisms of Order $2$ with
                                  Fixed Points for the Extremal Self-Dual
                                  Codes of Length  . . . . . . . . . . . . 5--13
            Philip A. Eisen and   
             Douglas R. Stinson   Threshold Visual Cryptography Schemes
                                  with Specified Whiteness Levels of
                                  Reconstructed Pixels . . . . . . . . . . 15--61
                 Arne Winterhof   Polynomial Interpolation of the Discrete
                                  Logarithm  . . . . . . . . . . . . . . . 63--72
              Etsuko Bannai and   
               Mitsuhiro Sawano   Symmetric Designs Attached to
                                  Four-Weight Spin Models  . . . . . . . . 73--90
                D. Brozovic and   
                      C. Ho and   
                    A. Munemasa   A Correction to ``Incidence Matrices and
                                  Collineations of Finite Projective
                                  Planes'' by Chat Yin Ho, Designs, Codes
                                  and Cryptography, 18 (1999), 159--162    91--93
               T. Blackmore and   
                   G. H. Norton   Lower Bounds on the State Complexity of
                                  Geometric Goppa Codes  . . . . . . . . . 95--115

Designs, Codes, and Cryptography
Volume 25, Number 2, February, 2002

                K. T. Arasu and   
          Warwick de Launey and   
                       S. L. Ma   On Circulant Complex Hadamard Matrices   123--142
                  S. Ferret and   
                      L. Storme   Minihypers and Linear Codes Meeting the
                                  Griesmer Bound: Improvements to Results
                                  of Hamada, Helleseth and Maekawa . . . . 143--162
           Stelios Georgiou and   
             Masaaki Harada and   
           Christos Koukouvinos   Orthogonal Designs and Type II Codes
                                  over $\mathbb{Z}_{2k}$ . . . . . . . . . 163--174
             Sergio Cabello and   
        Carles Padró and   
      Germán Sáez   Secret Sharing Schemes with Detection of
                                  Cheaters for a General Access Structure  175--188
         Jürgen Bierbrauer   The Theory of Cyclic Codes and a
                                  Generalization to Additive Codes . . . . 189--206
             Jorge Guajardo and   
                  Christof Paar   Itoh--Tsujii Inversion in Standard Basis
                                  and Its Application in Cryptography and
                                  Codes  . . . . . . . . . . . . . . . . . 207--216

Designs, Codes, and Cryptography
Volume 25, Number 3, March, 2002

               Ingrid Biehl and   
          Johannes Buchmann and   
               Safuat Hamdy and   
                  Andreas Meyer   A Signature Scheme Based on the
                                  Intractability of Computing Roots  . . . 223--236
          Massimo Giulietti and   
         Fernanda Pambianco and   
            Fernando Torres and   
                  Emanuela Ughi   On Complete Arcs Arising from Plane
                                  Curves . . . . . . . . . . . . . . . . . 237--246
                      Koen Thas   A Theorem Concerning Nets Arising from
                                  Generalized Quadrangles with a Regular
                                  Point  . . . . . . . . . . . . . . . . . 247--253
       Luis Martínez and   
      Antonio Vera-López   Ring-Valued Assignments to the Points of
                                  a $t$-Design . . . . . . . . . . . . . . 255--262
                  C. Carlet and   
                 Yu. Tarannikov   Covering Sequences of Boolean Functions
                                  and Their Cryptographic Significance . . 263--279
        Carles Padró and   
             Ignacio Gracia and   
Sebasti\`a Martín Molleví and   
                    Paz Morillo   Linear Key Predistribution Schemes . . . 281--298
                John B. Polhill   Constructions of Nested Partial
                                  Difference Sets with Galois Rings  . . . 299--309
            Edoardo Ballico and   
             Antonio Cossidente   Hermitian Veronesean Schemes . . . . . . 311--317


Designs, Codes, and Cryptography
Volume 26, Number 1--3, June / July / August, 2002

        Charles J. Colbourn and   
         Douglas R. Stinson and   
            G. H. John van Rees   Preface: In Honour of Ronald C. Mullin   5--6
          R. Julian R. Abel and   
              F. E. Bennett and   
                          G. Ge   The Existence of Four HMOLS with Equal
                                  Sized Holes  . . . . . . . . . . . . . . 7--31
          R. Julian R. Abel and   
              Iliya Bluskov and   
                  Malcolm Greig   Balanced Incomplete Block Designs with
                                  Block Size $9$ and $\lambda=2,4,8$ . . . 33--59
               R. T. Bilous and   
              G. H. J. van Rees   An Enumeration of Binary Self-Dual Codes
                                  of Length $32$ . . . . . . . . . . . . . 61--86
               Ian F. Blake and   
         Theodoulos Garefalakis   On the Security of the Digital Signature
                                  Algorithm  . . . . . . . . . . . . . . . 87--96
                  C. Blundo and   
                 B. Masucci and   
              D. R. Stinson and   
                         R. Wei   Constructions and Bounds for
                                  Unconditionally Secure Non-Interactive
                                  Commitment Schemes . . . . . . . . . . . 97--110
                  Marco Buratti   Cyclic Designs with Block Size $4$ and
                                  Related Optimal Optical Orthogonal Codes 111--125
                     H. Cao and   
                         L. Zhu   Kirkman Packing Designs KPD$(3, 5*,v)$   127--138
              Chris Charnes and   
       Martin Rötteler and   
                    Thomas Beth   Homogeneous Bent Functions, Invariants,
                                  and Designs  . . . . . . . . . . . . . . 139--154
               Yanxun Chang and   
                      Ying Miao   General Constructions for Double Group
                                  Divisible Designs and Double Frames  . . 155--168
        Charles J. Colbourn and   
               E. R. Lamken and   
            Alan C. H. Ling and   
                    W. H. Mills   The Existence of Kirkman Squares ---
                                  Doubly Resolvable $(v,3,1)$-BIBDs  . . . 169--196
                  Peng Ding and   
                Jennifer D. Key   Subcodes of the Projective Generalized
                                  Reed--Muller Codes Spanned by
                                  Minimum-Weight Vectors . . . . . . . . . 197--211
   Marialuisa J. de Resmini and   
              Dina Ghinelli and   
              Dieter Jungnickel   Arcs and Ovals from Abelian Groups . . . 213--228
             Michael Drmota and   
                 Daniel Panario   A Rigorous Proof of the Waterloo
                                  Algorithm for the Discrete Logarithm
                                  Problem  . . . . . . . . . . . . . . . . 229--241
                  F. Franek and   
             M. J. Grannell and   
               T. S. Griggs and   
                        A. Rosa   On Large Sets of $v-1$ L-Intersecting
                                  Steiner Triple Systems of Order $v$  . . 243--256
             Ryoh Fuji-Hara and   
                      Ying Miao   A Note on Geometric Structures of Linear
                                  Ordered Orthogonal Arrays and
                                  (T,M,S)-Nets of Low Strength . . . . . . 257--263


Designs, Codes, and Cryptography
Volume 27, Number 1--2, October / November, 2002

                      G. Ge and   
                     R. S. Rees   On Group-Divisible Designs with Block
                                  Size Four and Group-Type gum1  . . . . . 5--24
                  Malcolm Greig   Finite Linear Spaces II  . . . . . . . . 25--47
 Hans-Dietrich O. F. Gronau and   
Martin Grüttmüller and   
              Sven Hartmann and   
                   Uwe Leck and   
                    Volker Leck   On Orthogonal Double Covers of Graphs    49--91
        M. J. Jacobson, Jr. and   
                 H. C. Williams   Modular Arithmetic on Elements of Small
                                  Norm in Quadratic Fields . . . . . . . . 93--110
                Clement Lam and   
            Vladimir D. Tonchev   A New Bound on the Number of Designs
                                  with Classical Affine Parameters . . . . 111--117
              Rudolf Mathon and   
            Anne Penfold Street   Partitioning Sets of Triples into Small
                                  Planes . . . . . . . . . . . . . . . . . 119--130
Patric R. J. Östergård and   
                  Petteri Kaski   Enumeration of $2-(9, 3, \lambda)$
                                  Designs and Their Resolutions  . . . . . 131--137
            Kevin T. Phelps and   
             Merc\`e Villanueva   Ranks of $q$-Ary $1$-Perfect Codes . . . 139--144
              Nabil Shalaby and   
               Jianmin Wang and   
                   Jianxing Yin   Existence of Perfect
                                  $4$-Deletion-Correcting Codes with
                                  Length Six . . . . . . . . . . . . . . . 145--156
            Gustavus J. Simmons   Parity Encoding of Binary Sequences  . . 157--164
              Brett Stevens and   
                Eric Mendelsohn   Packing Arrays and Packing Designs . . . 165--176

Designs, Codes, and Cryptography
Volume 27, Number 3, December, 2002

            Kevin T. Phelps and   
             Merc\`e Villanueva   On Perfect Codes: Rank and Kernel  . . . 183--194
                 Vikram Jha and   
              Norman L. Johnson   Transversal-Free Translation Nets  . . . 195--205
             Wen-Guey Tzeng and   
                    Chi-Ming Hu   A New Approach for Visual Cryptography   207--227
                  S. Murphy and   
               M. J. B. Robshaw   Key-Dependent S-Boxes and Differential
                                  Cryptanalysis  . . . . . . . . . . . . . 229--255
Patric R. J. Östergård   A $2-(22, 8, 4)$ Design Cannot Have a
                                  $2-(10, 4, 4)$ Subdesign . . . . . . . . 257--260
               A. Ashikhmin and   
                        A. Barg   Bounds on the Covering Radius of Linear
                                  Codes  . . . . . . . . . . . . . . . . . 261--269
                Fang-Wei Fu and   
               Victor K.-W. Wei   Self-Complementary Balanced Codes and
                                  Quasi-Symmetric Designs  . . . . . . . . 271--279
              K. J. Horadam and   
                       P. Udaya   A New Construction of Central Relative
                                  $(p^a, p^a, p^a, 1)$-Difference Sets . . 281--295
Patric R. J. Östergård   Classifying Subspaces of Hamming Spaces  297--305


Designs, Codes, and Cryptography
Volume 28, Number 1, January, 2003

          David Pointcheval and   
              Guillaume Poupard   A New \mathcalNP-Complete Problem and
                                  Public-Key Identification  . . . . . . . 5--31
          Simon Joseph Agou and   
      Marc Deléglise and   
             Jean-Louis Nicolas   Short Polynomial Representations for
                                  Square Roots Modulo $p$  . . . . . . . . 33--44
             Emily H. Moore and   
              Harriet Pollatsek   Looking for Difference Sets in Groups
                                  with Dihedral Images . . . . . . . . . . 45--50
                P. Govaerts and   
                      L. Storme   On a Particular Class of Minihypers and
                                  Its Applications. I. The Result for
                                  General $q$  . . . . . . . . . . . . . . 51--63
              V. Abatangelo and   
                      B. Larato   Doubly $\beta$-Derived Translation
                                  Planes . . . . . . . . . . . . . . . . . 65--74
                K. T. Arasu and   
                Kevin J. Player   A New Family of Cyclic Difference Sets
                                  with Singer Parameters in Characteristic
                                  Three  . . . . . . . . . . . . . . . . . 75--91
                 Xiang-dong Hou   On Binary Resilient Functions  . . . . . 93--112

Designs, Codes, and Cryptography
Volume 28, Number 2, March, 2003

                 Laurie Law and   
             Alfred Menezes and   
                 Minghua Qu and   
              Jerry Solinas and   
                 Scott Vanstone   An Efficient Protocol for Authenticated
                                  Key Agreement  . . . . . . . . . . . . . 119--134
            Sergei Konyagin and   
                Tanja Lange and   
               Igor Shparlinski   Linear Complexity of the Discrete
                                  Logarithm  . . . . . . . . . . . . . . . 135--146
               V. C. Mavron and   
            T. P. McDonough and   
               M. S. Shrikhande   Quasi-Symmetric Designs with Good Blocks
                                  and Intersection Number One  . . . . . . 147--162
         Stefka Bouyuklieva and   
                 Masaaki Harada   Extremal Self-Dual $[50, 25, 10]$ Codes
                                  with Automorphisms of Order $3$ and
                                  Quasi-Symmetric $2-(49, 9, 6)$ Designs   163--169
           Koichi Betsumiya and   
          T. Aaron Gulliver and   
                 Masaaki Harada   Extremal Self-Dual Codes over
                                  $\mathbb{F}_2 \times \mathbb{F}_2$ . . . 171--186
                Sheng-bo Xu and   
              Jeroen Doumen and   
               Henk van Tilborg   On the Security of Digital Signature
                                  Schemes Based on Error-Correcting Codes  187--199
              Svetla Nikova and   
               Ventzislav Nikov   Improvement of the Delsarte Bound for
                                  $\theta$-Designs When It Is Not the Best
                                  Bound Possible . . . . . . . . . . . . . 201--222

Designs, Codes, and Cryptography
Volume 28, Number 3, April, 2003

             Mida Guillermo and   
            Keith M. Martin and   
           Christine M. O'Keefe   Providing Anonymity in Unconditionally
                                  Secure Secret Sharing Schemes  . . . . . 227--245
             Dong-Joon Shin and   
             P. Vijay Kumar and   
                  Tor Helleseth   $3$-Designs from the $Z_4$-Goethals
                                  Codes via a New Kloosterman Sum Identity 247--263
              Tor Helleseth and   
       Torleiv Klòve and   
        Vladimir I. Levenshtein   Hypercubic $4$ and $5$-Designs from
                                  Double-Error-Correcting BCH Codes  . . . 265--282
                   David Masson   Designs and Representation of the
                                  Symmetric Group  . . . . . . . . . . . . 283--302
                    Klaus Huber   Taking $p$th Roots Modulo Polynomials
                                  over Finite Fields . . . . . . . . . . . 303--311


Designs, Codes, and Cryptography
Volume 29, Number 1--3, May / June / July, 2003

                A. Blokhuis and   
        J. W. P. Hirschfeld and   
              D. Jungnickel and   
                     J. A. Thas   Finite Geometries  . . . . . . . . . . . 5--5
                 A. Aguglia and   
              A. Cossidente and   
                    G. L. Ebert   Complete Spans on Hermitian Varieties    7--15
                R. Ahlswede and   
                H. Aydinian and   
              L. H. Khachatrian   Forbidden $(0,1)$-Vectors in Hyperplanes
                                  of $\mathbb{R}^n$: The Restricted Case   17--28
            Rudolf Ahlswede and   
              Levon Khachatrian   Cone Dependence --- a Basic
                                  Combinatorial Concept  . . . . . . . . . 29--40
                Laura Bader and   
             Nicola Durante and   
                  Maska Law and   
         Guglielmo Lunardon and   
                   Tim Penttila   Symmetries of BLT-Sets . . . . . . . . . 41--50
                Thomas Beth and   
        Christopher Charnes and   
              Markus Grassl and   
               Gernot Alber and   
               Aldo Delgado and   
              Michael Mussinger   A New Class of Designs Which Protect
                                  against Quantum Jumps  . . . . . . . . . 51--70
     Jürgen Bierbrauer and   
          Stefano Marcugini and   
             Fernanda Pambianco   Projective Planes, Coverings and a
                                  Network Problem  . . . . . . . . . . . . 71--89
              Aart Blokhuis and   
      Tamás Sz\Honyi and   
                  Zsuzsa Weiner   On Sets without Tangents in Galois
                                  Planes of Even Order . . . . . . . . . . 91--98
                  Yves Edel and   
         Jürgen Bierbrauer   The Largest Cap in AG$(4, 4)$ and Its
                                  Uniqueness . . . . . . . . . . . . . . . 99--104
                  S. Ferret and   
                      L. Storme   Results on Maximal Partial Spreads in
                                  PG$(3, p^3)$ and on Related Minihypers   105--122
  András Gács and   
          Tamás Sz\Honyi   On Maximal Partial Spreads in PG$(n, q)$ 123--129
  András Gács and   
                  Zsuzsa Weiner   On $(q + t, t)$-Arcs of Type $(0, 2, t)$ 131--139
                P. Govaerts and   
              D. Jungnickel and   
                  L. Storme and   
                     J. A. Thas   Some New Maximal Sets of Mutually
                                  Orthogonal Latin Squares . . . . . . . . 141--147
        Gohar M. Kyureghyan and   
                 Alexander Pott   On the Linear Complexity of the
                                  Sidelnikov-Lempel-Cohn-Eastman Sequences 149--164
                 I. Landjev and   
                A. Rousseva and   
                  T. Maruta and   
                        R. Hill   On Optimal Codes Over the Field with
                                  Five Elements  . . . . . . . . . . . . . 165--175
                Dimitri Leemans   The Residually Weakly Primitive
                                  Geometries of M$_{22}$ . . . . . . . . . 177--178
                  D. Luyckx and   
                     J. A. Thas   On $1$-Systems of Q$(6, q)$, $q$ Even    179--197
          Hendrik van Maldeghem   Some Remarks on Steiner Systems  . . . . 199--213
                   Klaus Metsch   On the Characterization of the Folded
                                  Halved Cubes by Their Intersection
                                  Arrays . . . . . . . . . . . . . . . . . 215--225
                      Koen Thas   Symmetry in Generalized Quadrangles  . . 227--245
            Vladimir D. Tonchev   A Note on MDS Codes, $n$-Arcs and
                                  Complete Designs . . . . . . . . . . . . 247--250


Designs, Codes, and Cryptography
Volume 30, Number 1, August, 2003

                   Siaw-Lynn Ng   A Representation of a Family of Secret
                                  Sharing Matroids . . . . . . . . . . . . 5--19
            Maria Axenovich and   
      Zoltán Füredi   Exact Bounds on the Sizes of Covering
                                  Codes  . . . . . . . . . . . . . . . . . 21--38
                Shengli Liu and   
     Henk C. A. Van Tilborg and   
                Marten Van Dijk   A Practical Protocol for Advantage
                                  Distillation and Information
                                  Reconciliation . . . . . . . . . . . . . 39--62
             Keith E. Mellinger   A Geometric Relationship Between
                                  Equivalent Spreads . . . . . . . . . . . 63--71
              Cunsheng Ding and   
             Mordecai Golin and   
           Torleiv Klòve   Meeting the Welch and Karystinos-Pados
                                  Bounds on DS-CDMA Binary Signature Sets  73--84
              Antonia W. Bluher   On $x^6 + x + a$ in Characteristic Three 85--95
           Iliya Bouyukliev and   
                Juriaan Simonis   Some New Results on Optimal Codes Over
                                  $F^5$  . . . . . . . . . . . . . . . . . 97--111
                   San Ling and   
            Patrick Solé   On the Algebraic Structure of
                                  Quasi-cyclic Codes II: Chain Rings . . . 113--130

Designs, Codes, and Cryptography
Volume 30, Number 2, September, 2003

                  H. Kharaghani   On a Class of Symmetric Balanced
                                  Generalized Weighing Matrices  . . . . . 139--149
                Daniel B. Dalan   New Extremal Type I Codes of Lengths
                                  $40$, $42$, and $44$ . . . . . . . . . . 151--157
              Massimiliano Sala   Upper Bounds on the Dual Distance of
                                  BCH$(255, k)$  . . . . . . . . . . . . . 159--168
               Kenichiro Tanabe   A Criterion for Designs in $Z_4$-codes
                                  on the Symmetrized Weight Enumerator . . 169--185
               Jon-Lark Kim and   
                     Vera Pless   Designs in Additive Codes over GF$(4)$   187--199
            Phong Q. Nguyen and   
            Igor E. Shparlinski   The Insecurity of the Elliptic Curve
                                  Digital Signature Algorithm with
                                  Partially Known Nonces . . . . . . . . . 201--217
               I. Cardinali and   
               O. Polverino and   
                   R. Trombetti   On the Sporadic Semifield Flock  . . . . 219--226

Designs, Codes, and Cryptography
Volume 30, Number 3, November, 2003

              Palash Sarkar and   
           Paul J. Schellenberg   Construction of Symmetric Balanced
                                  Squares with Blocksize More than One . . 235--280
       Detlef Hühnlein and   
   Michael J. Jacobson, Jr. and   
                   Damian Weber   Towards Practical Non-Interactive
                                  Public-Key Cryptosystems Using
                                  Non-Maximal Imaginary Quadratic Orders   281--299
              Ederlina G. Nocon   On the Construction of Some Type II
                                  Codes over $Z_4 \times Z_4$  . . . . . . 301--323
          David B. Chandler and   
                     Qing Xiang   Cyclic Relative Difference Sets and
                                  their $p$-Ranks  . . . . . . . . . . . . 325--343


Designs, Codes, and Cryptography
Volume 31, Number 1, January, 2004

                      Yves Edel   Extensions of Generalized Product Caps   5--14
            J. Barát and   
                 A. Del Fra and   
              S. Innamorati and   
                      L. Storme   Minimal Blocking Sets in PG$(2, 8)$ and
                                  Maximal Partial Spreads in PG$(3, 8)$    15--26
           Hans Georg Schaathun   A Lower Bound on the Greedy Weights of
                                  Product Codes  . . . . . . . . . . . . . 27--42
                 David G. Glynn   On the Orthogonality of Geometric Codes  43--50
          Jovan Dj. Goli\'c and   
               Renato Menicocci   Correlation Analysis of the Alternating
                                  Step Generator . . . . . . . . . . . . . 51--74
             Dong-Joon Shin and   
             P. Vijay Kumar and   
                  Tor Helleseth   An Assmus--Mattson-Type Approach for
                                  Identifying $3$-Designs from Linear
                                  Codes over Z$_4$ . . . . . . . . . . . . 75--92

Designs, Codes, and Cryptography
Volume 31, Number 2, February, 2004

               Ingrid Biehl and   
              Sacher Paulus and   
                Tsuyoshi Takagi   Efficient Undeniable Signature Schemes
                                  Based on Ideal Arithmetic in Quadratic
                                  Orders . . . . . . . . . . . . . . . . . 99--123
             Tran Van Trung and   
             Sosina Martirosyan   On a Class of Traceability Codes . . . . 125--132
                  S. Rajola and   
             M. Scafati Tallini   Affine Planes and Flag Linear Spaces . . 133--137
          T. Aaron Gulliver and   
                 Masaaki Harada   On the Minimum Weight of Codes over
                                  $F_5$ Constructed from Certain
                                  Conference Matrices  . . . . . . . . . . 139--145
     Pantelimon St\uanic\ua and   
                   Soo Hak Sung   Boolean Functions with Five Controllable
                                  Cryptographic Properties . . . . . . . . 147--157
                   U. Dempwolff   Affine Rank $3$ Groups on Symmetric
                                  Designs  . . . . . . . . . . . . . . . . 159--168
          Michael E. O'Sullivan   On Koetter's Algorithm and the
                                  Computation of Error Values  . . . . . . 169--188

Designs, Codes, and Cryptography
Volume 31, Number 3, March, 2004

             David A. Drake and   
                  Kevin Keating   Ovals and Hyperovals in Desarguesian
                                  Nets . . . . . . . . . . . . . . . . . . 195--212
                      Peter Sin   The $p$-Rank of the Incidence Matrix of
                                  Intersecting Linear Subspaces  . . . . . 213--220
                  Andreas Klein   Partial Ovoids in Classical Finite Polar
                                  Spaces . . . . . . . . . . . . . . . . . 221--226
             Andrew Klapper and   
                    Jinzhong Xu   Register Synthesis for Algebraic
                                  Feedback Shift Registers Based on
                                  Non-Primes . . . . . . . . . . . . . . . 227--250
           Matthew R. Brown and   
       Christine M. O'Keefe and   
                S. E. Payne and   
               Tim Penttila and   
                Gordon F. Royle   Spreads of $T_2(o)$, $\alpha$-flocks and
                                  Ovals  . . . . . . . . . . . . . . . . . 251--282
                   Klaus Metsch   Small Point Sets that Meet All
                                  Generators of $W(2 n +1, q)$ . . . . . . 283--288
                 Gloria Rinaldi   Key Distribution Patterns Using Tangent
                                  Circle Structures  . . . . . . . . . . . 289--300
             Siguna Müller   On the Computation of Square Roots in
                                  Finite Fields  . . . . . . . . . . . . . 301--312
    Sergey V. Avgustinovich and   
                 Olof Heden and   
             Faina I. Solov'eva   The Classification of Some Perfect Codes 313--318


Designs, Codes, and Cryptography
Volume 32, Number 1--3, May / July, 2004

                      Anonymous   Preface  . . . . . . . . . . . . . . . . 5--6
                      Anonymous   List of Participants . . . . . . . . . . 7--8
                Simeon Ball and   
               John Bamberg and   
             Michel Lavrauw and   
                   Tim Penttila   Symplectic Spreads . . . . . . . . . . . 9--14
               Carlo Blundo and   
               Paolo D'Arco and   
          Alfredo De Santis and   
             Massimiliano Listo   Design of Self-Healing Key Distribution
                                  Schemes  . . . . . . . . . . . . . . . . 15--44
              Julia M. N. Brown   On the Action of the Groups
                                  $\mbox{GL}(n+1,q)$, $\mbox{PGL}(n + 1,
                                  q)$, $\mbox{SL}(n + 1, q)$ and
                                  $\mbox{PSL}(n + 1, q)$ on $\mbox{PG}(n,
                                  q^t)$  . . . . . . . . . . . . . . . . . 45--50
                Wensong Chu and   
        Charles J. Colbourn and   
                    Peter Dukes   Constructions for Permutation Codes in
                                  Powerline Communications . . . . . . . . 51--64
        Charles J. Colbourn and   
            Alan C. H. Ling and   
             Violet R. Syrotiuk   Cover-Free Families and
                                  Topology-Transparent Scheduling for
                                  MANETs . . . . . . . . . . . . . . . . . 65--95
              A. Cossidente and   
               M. J. de Resmini   Remarks on Singer Cyclic Groups and
                                  Their Normalizers  . . . . . . . . . . . 97--102
               F. De Clerck and   
                    M. Delanote   On $(0,\alpha)$-Geometries and Dual
                                  Semipartial Geometries Fully Embedded in
                                  an Affine Space  . . . . . . . . . . . . 103--110
               Nikias de Feyter   Planar Oval Sets in Desarguesian Planes
                                  of Even Order  . . . . . . . . . . . . . 111--119
                    D. Deng and   
              D. R. Stinson and   
                         R. Wei   The Lovász Local Lemma and Its
                                  Applications to some Combinatorial
                                  Arrays . . . . . . . . . . . . . . . . . 121--134
               A. De Santis and   
                     B. Masucci   Anonymous Membership Broadcast Schemes   135--151
               S. De Winter and   
                     J. A. Thas   SPG-Reguli Satisfying the Polar Property
                                  and a New Semipartial Geometry . . . . . 153--166
             David A. Drake and   
                  Wendy Myrvold   Nets of Small Degree Without Ovals . . . 167--183
                  Z. Eslami and   
         G. B. Khosrovshahi and   
                    M. M. Noori   Enumeration of $t$-Designs Through
                                  Intersection Matrices  . . . . . . . . . 185--191
                S. Georgiou and   
                 C. Koukouvinos   Self-Orthogonal and Self-Dual Codes
                                  Constructed via Combinatorial Designs
                                  and Diophantine Equations  . . . . . . . 193--206
M. I. González Vasco and   
                D. Hofheinz and   
         C. Martínez and   
                  R. Steinwandt   On the Security of Two Public Key
                                  Cryptosystems Using Non-Abelian Groups   207--216
            Otokar Gro\vsek and   
         Peter Horák and   
                 Tran van Trung   On Non-Polynomial Latin Squares  . . . . 217--226
                  Yury J. Ionin   Regular Hadamard Matrices Generating
                                  Infinite Families of Symmetric Designs   227--233
         G. B. Khosrovshahi and   
               B. Tayfeh-Rezaie   Some Indecomposable $t$-Designs  . . . . 235--238
       G. Korchmáros and   
                     A. Sonnino   Hyperbolic Ovals in Finite Planes  . . . 239--249
Selda Kücçükcçìfcçì and   
                  C. C. Lindner   Minimum Covering for Hexagon Triple
                                  Systems  . . . . . . . . . . . . . . . . 251--265
               Domenico Labbate   Amalgams of Cubic Bipartite Graphs . . . 267--275
                  Reinhard Laue   Resolvable $t$-Designs . . . . . . . . . 277--301
                      X. Ma and   
                         R. Wei   On a Bound of Cover-Free Families  . . . 303--321
         Sosina Martirosyan and   
                 Tran van Trung   On $t$-Covering Arrays . . . . . . . . . 323--339
             Keith E. Mellinger   LDPC Codes from Triangle-Free Line Sets  341--350
                 Alan Offer and   
          Hendrik Van Maldeghem   Spreads and Ovoids Translation with
                                  Respect to Disjoint Flags  . . . . . . . 351--367
            Tanya E. Seidel and   
               Daniel Socek and   
                  Michal Sramka   Parallel Symmetric Attack on NTRU using
                                  Non-Deterministic Lattice Reduction  . . 369--379
                    R. Shaw and   
                   N. A. Gordon   The Quintic Grassmannian $G_{1, 4, 2}$
                                  in $\mbox{PG}(9, 2)$ . . . . . . . . . . 381--396


Designs, Codes, and Cryptography
Volume 33, Number 1, August, 2004

  János Barát and   
                     Leo Storme   Multiple Blocking Sets in
                                  $\mbox{PG}(n,q), n > 3$ . . . . . . . . . 5--21
               Jong-Seon No and   
             Dong-Joon Shin and   
                  Tor Helleseth   On the $p$-Ranks and Characteristic
                                  Polynomials of Cyclic Difference Sets    23--37
              Tor Helleseth and   
           Johannes Mykkeltveit   A Proof of Simmons' Conjecture . . . . . 39--43
        Steven T. Dougherty and   
              Keisuke Shiromoto   Maximum Distance Codes in
                                  $\mbox{Mat}_{n,s} (Z_k)$ with a
                                  Non-Hamming Metric and Uniform
                                  Distributions  . . . . . . . . . . . . . 45--61
             David A. Drake and   
                  Wendy Myrvold   The Non-Existence of Maximal Sets of
                                  Four Mutually Orthogonal Latin Squares
                                  of Order $8$ . . . . . . . . . . . . . . 63--69
                 Harold N. Ward   A Sequence of Unique Quaternary Griesmer
                                  Codes  . . . . . . . . . . . . . . . . . 71--85

Designs, Codes, and Cryptography
Volume 33, Number 2, September, 2004

Conchita Martínez-Pérez and   
               Wolfgang Willems   On the Weight Hierarchy of Product Codes 95--108
                 Wilfried Meidl   How Many Bits have to be Changed to
                                  Decrease the Linear Complexity?  . . . . 109--122
               Mark Goresky and   
                 Andrew Klapper   Periodicity and Correlation Properties
                                  of $d$-FCSR Sequences  . . . . . . . . . 123--148
             Masaaki Harada and   
               Michio Ozeki and   
               Kenichiro Tanabe   On the Covering Radius of Ternary
                                  Extremal Self-Dual Codes . . . . . . . . 149--158
                   J. L. Hayden   Eigenvalues of Finite Projective Planes
                                  with an Abelian Cartesian Group  . . . . 159--172
               Lucio Guerra and   
                  Rita Vincenti   On the Linear Codes Arising from
                                  Schubert Varieties . . . . . . . . . . . 173--180

Designs, Codes, and Cryptography
Volume 33, Number 3, November, 2004

          Wiebke S. Diestelkamp   Parameter Inequalities for Orthogonal
                                  Arrays with Mixed Levels . . . . . . . . 187--197
                   Jong-Seon No   New Cyclic Difference Sets with Singer
                                  Parameters Constructed from
                                  $d$-Homogeneous Functions  . . . . . . . 199--213
María Isabel González Vasco and   
   Consuelo Martínez and   
              Rainer Steinwandt   Towards a Uniform Description of Several
                                  Group Based Cryptographic Primitives . . 215--226
              Cunsheng Ding and   
                  Xiaojian Tian   Three Constructions of Authentication
                                  Codes with Perfect Secrecy . . . . . . . 227--239
               Carlo Blundo and   
   Sebasti\`a Martín and   
            Barbara Masucci and   
            CarlEs Padró   A Linear Algebraic Approach to Metering
                                  Schemes  . . . . . . . . . . . . . . . . 241--260
             Alfred Menezes and   
                    Nigel Smart   Security of Signature Schemes in a
                                  Multi-User Setting . . . . . . . . . . . 261--274
            Joseph L. Yucas and   
                 Gary L. Mullen   Self-Reciprocal Irreducible Polynomials
                                  Over Finite Fields . . . . . . . . . . . 275--281


Designs, Codes, and Cryptography
Volume 34, Number 1, January, 2005

             Tatsuya Maruta and   
            Ivan N. Landjev and   
                 Assya Rousseva   On the Minimum Size of Some Minihypers
                                  and Related Linear Codes . . . . . . . . 5--15
Jaume Martí-Farré and   
            Carles Padró   Secret Sharing Schemes with Three or
                                  Four Minimal Qualified Subsets . . . . . 17--34
            Ferruh Özbudak   Elements of Prescribed Order, Prescribed
                                  Traces and Systems of Rational Functions
                                  Over Finite Fields . . . . . . . . . . . 35--54
              Michael Braun and   
            Adalbert Kerber and   
                  Reinhard Laue   Systematic Construction of $q$-Analogs
                                  of $t-(v, k,\lambda)$-Designs  . . . . . 55--70
             Masaaki Harada and   
                Clement Lam and   
            Vladimir D. Tonchev   Symmetric $(4,4)$-Nets and Generalized
                                  Hadamard Matrices Over Groups of Order
                                  $4$  . . . . . . . . . . . . . . . . . . 71--87
           Bikash Kumar Dey and   
                B. Sundar Rajan   $F_q$-linear Cyclic Codes over $F^m_q$:
                                  DFT Approach . . . . . . . . . . . . . . 89--116
                 Gennian Ge and   
                Alan C. H. Ling   Group Divisible Designs with Block Size
                                  Four and Group Type $g^u m^1$ with
                                  Minimum $m$  . . . . . . . . . . . . . . 117--126

Designs, Codes, and Cryptography
Volume 34, Number 2--3, February, 2005

              Aart Blokhuis and   
                 Willem Haemers   Preface  . . . . . . . . . . . . . . . . 135--135
               Edwin R. Van Dam   The Combinatorics of Dom de Caen . . . . 137--148
                 D. De Caen and   
              D. Fon-Der-Flaass   Distance Regular Covers of Complete
                                  Graphs from Latin Squares  . . . . . . . 149--153
                K. Coolsaet and   
                     J. Degraer   A Computer-Assisted Proof of the
                                  Uniqueness of the Perkel Graph . . . . . 155--171
               Bang Sejeong and   
                   J. H. Koolen   Some Interlacing Results for the
                                  Eigenvalues of Distance-regular graphs   173--186
                       Hirasaka   On Meta-Thin Association Schemes . . . . 187--201
                   Ron Shaw and   
           Johannes G. Maks and   
                 Neil A. Gordon   The Classification of Flats in which are
                                  External to the Grassmannian . . . . . . 203--227
         Dragos Cvetkovi\'c and   
            Peter Rowlinson and   
            Slobodan K. Simi\'c   Graphs With Least Eigenvalue $-2$: a New
                                  Proof of the $31$ Forbidden Subgraphs
                                  Theorem  . . . . . . . . . . . . . . . . 229--240
                   Brian Curtin   Algebraic Characterizations of Graph
                                  Regularity Conditions  . . . . . . . . . 241--248
           Mikhail Muzychuk and   
    István Kovács   A Solution of a Problem of A. E. Brouwer 249--264
             Ákos Seress   Square-Free Non-Cayley Numbers. On
                                  Vertex-Transitive Non-Cayley Graphs of
                                  Square-Free Order  . . . . . . . . . . . 265--281
             Joseph A. Thas and   
          Hendrik Van Maldeghem   Some Characterizations of Finite
                                  Hermitian Veroneseans  . . . . . . . . . 283--293
                R. D. Baker and   
                G. L. Ebert and   
                   Tim Penttila   Hyperbolic Fibrations and $q$-Clans  . . 295--305
               Paul Terwilliger   Two Linear Transformations each
                                  Tridiagonal with Respect to an
                                  Eigenbasis of the other; Comments on the
                                  Parameter Array  . . . . . . . . . . . . 307--332
                   Hans Cuypers   A Note on the Tight Spherical $7$-Design
                                  in and $5$-Design in . . . . . . . . . . 333--337
                   Klaus Metsch   Blocking Structures of Hermitian
                                  Varieties  . . . . . . . . . . . . . . . 339--360


Designs, Codes, and Cryptography
Volume 35, Number 1, April, 2005

          Jovan Dj. Goli\'c and   
                  Philip Hawkes   Vectorial Approach to Fast Correlation
                                  Attacks  . . . . . . . . . . . . . . . . 5--19
           John P. Mcsorley and   
          N. C. K. Phillips and   
               W. D. Wallis and   
                         others   Double Arrays, Triple Arrays and
                                  Balanced Grids . . . . . . . . . . . . . 21--45
             Wen-Guey Tzeng and   
                  Zhi-Jia Tzeng   A Public-Key Traitor Tracing Scheme with
                                  Revocation Using Dynamic Shares  . . . . 47--61
          Thierry P. Berger and   
                Pierre Loidreau   How to Mask the Structure of Codes for a
                                  Cryptographic Use  . . . . . . . . . . . 63--79
              Olgica Milenkovic   Support Weight Enumerators and Coset
                                  Weight Distributions of Isodual Codes    81--109
               Florian Hess and   
            Igor E. Shparlinski   On the Linear Complexity and
                                  Multidimensional Distribution of
                                  Congruential Generators over Elliptic
                                  Curves . . . . . . . . . . . . . . . . . 111--117
             Daniel R. L. Brown   Generic Groups, Collision Resistance,
                                  and ECDSA  . . . . . . . . . . . . . . . 119--152

Designs, Codes, and Cryptography
Volume 35, Number 2, May, 2005

            Rafa\l Bia\lota and   
                  Grzegorz Kawa   Modified Alternating
                                  $\stackrel{\rightarrow}{k}$ generators   159--174
                 Tatsuya Maruta   Extendability of Ternary Linear Codes    175--190
               Mingyuan Xia and   
               Tianbing Xia and   
               Jennifer Seberry   A New Method for Constructing Williamson
                                  Matrices . . . . . . . . . . . . . . . . 191--209
     Cícero Carvalho and   
                Fernando Torres   On Goppa Codes and Weierstrass Gaps at
                                  Several Points . . . . . . . . . . . . . 211--225
             Tran Van Trung and   
             Sosina Martirosyan   New Constructions for IPP Codes  . . . . 227--239
Patric R. J. Östergård and   
        Jörn Quistorff and   
              Alfred Wassermann   New Results on Codes with Covering
                                  Radius $1$ and Minimum Distance $2$  . . 241--250

Designs, Codes, and Cryptography
Volume 35, Number 3, June, 2005

               Petr Lisonek and   
           Mahadad Khatirinejad   A Family of Complete Caps in ${\rm
                                  PG}(n,2)$  . . . . . . . . . . . . . . . 259--270
    Harri Haanpää and   
                  Petteri Kaski   The Near Resolvable $2-(13, 4, 3)$
                                  Designs and Thirteen-Player Whist
                                  Tournaments  . . . . . . . . . . . . . . 271--285
              G. E. Gennian and   
               C. W. H. Lam and   
            Alan C. H. Ling and   
                         others   Resolvable Maximum Packings with
                                  Quadruples . . . . . . . . . . . . . . . 287--302
              Yury J. Ionin and   
                Hadi Kharaghani   A Recursive Construction for New
                                  Symmetric Designs  . . . . . . . . . . . 303--310
             Stelvio Cimato and   
          Roberto De Prisco and   
              Alfredo De Santis   Optimal Colored Threshold Visual
                                  Cryptography Schemes . . . . . . . . . . 311--335
                  D. Luyckx and   
                     J. A. Thas   Trialities and $1$-Systems of $Q^+(7,q)$ 337--352


Designs, Codes, and Cryptography
Volume 36, Number 1, July, 2005

              S. G. Barwick and   
             Wen-Ai Jackson and   
                Keith M. Martin   A General Approach to Robust Web
                                  Metering . . . . . . . . . . . . . . . . 5--27
                 John C. Galati   On the Non-existence of Semiregular
                                  Relative Difference Sets in Groups with
                                  All Sylow Subgroups Cyclic . . . . . . . 29--31
               Mathieu Ciet and   
                      Marc Joye   Elliptic Curve Cryptosystems in the
                                  Presence of Permanent and Transient
                                  Faults . . . . . . . . . . . . . . . . . 33--43
               Carl Bracken and   
                   Gary Mcguire   Characterization of SDP Designs That
                                  Yield Certain Spin Models  . . . . . . . 45--52
             Iuon-Chang Lin and   
           Min-Shiang Hwang and   
                Chin-Chen Chang   The General Pay-Word: a Micro-payment
                                  Scheme Based on $n$-dimension One-way
                                  Hash Chain . . . . . . . . . . . . . . . 53--67
             J. Löfvenberg   Binary Fingerprinting Codes  . . . . . . 69--81
                      L. Ji and   
                      D. Wu and   
                         L. Zhu   Existence of Generalized Steiner Systems
                                  $\mathrm{GS}(2,4,\nu,2)$ . . . . . . . . 83--99
                 J. Eisfeld and   
                  L. Storme and   
                     P. Sziklai   On the Spectrum of the Sizes of Maximal
                                  Partial Line Spreads in
                                  $\mathrm{PG}(2n,q), n \geq 3$  . . . . . 101--110

Designs, Codes, and Cryptography
Volume 36, Number 2, August, 2005

                     J. De Kaey   On a More General Characterisation of
                                  Steiner Systems  . . . . . . . . . . . . 117--129
                P. Langevin and   
                  J.-P. Zanotti   Nonlinearity of Some Invariant Boolean
                                  Functions  . . . . . . . . . . . . . . . 131--146
                   F. L. Chiera   Type II Codes over $ \mathbb{Z} / 2 k
                                  \mathbb{Z} $, Invariant Rings and Theta
                                  Series . . . . . . . . . . . . . . . . . 147--158
                  Shenglin Zhou   Block Primitive $2-(v,k,1)$ Designs
                                  Admitting a Ree Group of Characteristic
                                  Two  . . . . . . . . . . . . . . . . . . 159--169
               Ka Hin Leung and   
               Bernhard Schmidt   The Field Descent Method . . . . . . . . 171--188
                  Claude Carlet   Concatenating Indicators of Flats for
                                  Designing Cryptographic Functions  . . . 189--202
                     Vikram Jha   Local Schur's Lemma and Commutative
                                  Semifields . . . . . . . . . . . . . . . 203--216

Designs, Codes, and Cryptography
Volume 36, Number 3, September, 2005

            Manish K. Gupta and   
         Mahesh C. Bhandari and   
                  Arbind K. Lal   On Linear Codes over $\mathbb{Z}_2^s$    227--244
                 Ezra Brown and   
             Bruce T. Myers and   
              Jerome A. Solinas   Hyperelliptic Curves with Compact
                                  Parameters . . . . . . . . . . . . . . . 245--261
            Keith M. Martin and   
           Rei Safavi-Naini and   
              Huaxiong Wang and   
                  Peter R. Wild   Distributing the Encryption and
                                  Decryption of a Block Cipher . . . . . . 263--287
                E. J. Cheon and   
                    T. Kato and   
                      S. J. Kim   Nonexistence of $[n, 5, d]_q$ Codes
                                  Attaining the Griesmer Bound for $q^4 -
                                  2 q^2 - 2 q + 1 \leq d \leq q^4 - 2 q^2
                                  - q$ . . . . . . . . . . . . . . . . . . 289--299
 Juan Manuel Gonzalez Nieto and   
                 Colin Boyd and   
                      Ed Dawson   A Public Key Cryptosystem Based On a
                                  Subgroup Membership Problem  . . . . . . 301--316
                P. Véron   Proof of Conjectures on the True
                                  Dimension of Some Binary Goppa Codes . . 317--325
Patric R. J. Östergård   Two New Four-Error-Correcting Binary
                                  Codes  . . . . . . . . . . . . . . . . . 327--329
               Stephen D. Cohen   Finite Field Elements with Specified
                                  Order and Traces . . . . . . . . . . . . 331--340
                      Anonymous   Volume Table of Contents: Volume 36  . . 341--342


Designs, Codes, and Cryptography
Volume 37, Number 1, October, 2005

               Anka Golemac and   
            Tanja Vucici\'c and   
                 Josko Mandi\'c   One $(96,20,4)$-symmetric Design and
                                  related Nonabelian Difference Sets . . . 5--13
           A. J. van Zanten and   
              I. Nengah Suparta   On the Construction of Linear $q$-ary
                                  Lexicodes  . . . . . . . . . . . . . . . 15--29
          Philippe Langevin and   
            Pascal Véron   On the Non-linearity of Power Functions  31--43
        Gerzson Kéri and   
Patric R. J. Östergård   Bounds for Covering Codes over Large
                                  Alphabets  . . . . . . . . . . . . . . . 45--60
       Alexander A. Davydov and   
              Giorgio Faina and   
             Fernanda Pambianco   Constructions of Small Complete Caps in
                                  Binary Projective Spaces . . . . . . . . 61--80
                John Malone-Lee   Signcryption with Non-interactive
                                  Non-repudiation  . . . . . . . . . . . . 81--109
              Masaaki Homma and   
                 Seon Jeong Kim   Toward the Determination of the Minimum
                                  Distance of Two--Point Codes on a
                                  Hermitian Curve  . . . . . . . . . . . . 111--132
         Friederike Brezing and   
                  Annegret Weng   Elliptic Curves Suitable for Pairing
                                  Based Cryptography . . . . . . . . . . . 133--141
               B. Tayfeh-Rezaie   On the Existence of Large Sets of
                                  $t$-designs of Prime Sizes . . . . . . . 143--149
                R. Ahlswede and   
                H. Aydinian and   
              L. H. Khachatrian   Forbidden (0,1)-vectors in Hyperplanes
                                  of $\mathbb{R}^n$: The unrestricted case 151--167

Designs, Codes, and Cryptography
Volume 37, Number 2, November, 2005

              Miin Huey Ang and   
                     Siu Lun Ma   Symmetric Weighing Matrices Constructed
                                  using Group Matrices . . . . . . . . . . 195--210
     Jürgen Bierbrauer and   
                      Yves Edel   A Family of Binary $(t, m, s)$-Nets of
                                  Strength $5$ . . . . . . . . . . . . . . 211--214
          G. B. Belyavskaya and   
               V. I. Izbash and   
                   G. L. Mullen   Check Character Systems using
                                  Quasigroups: I . . . . . . . . . . . . . 215--227
            R. Safavi-naini and   
                     C. Charnes   MRD Hashing  . . . . . . . . . . . . . . 229--242
               K. T. Phelps and   
                  J. Rif\`a and   
                  M. Villanueva   Kernels and $p$-Kernels of $p^r$-ary
                                  1-Perfect Codes  . . . . . . . . . . . . 243--261
                  Bart De Bruyn   Slim Near Polygons . . . . . . . . . . . 263--280
                   Jianxing Yin   Cyclic Difference Packing and Covering
                                  Arrays . . . . . . . . . . . . . . . . . 281--292
                Chihiro Suetake   The Classification of Symmetric
                                  Transversal Designs STD$_4[12;3]$'s  . . 293--304
         Antonino Giorgio Spera   Asymptotically Good Codes from
                                  Generalized Algebraic--Geometry Codes    305--312
               John P. Mcsorley   Double Arrays, Triple Arrays and
                                  Balanced Grids with $v = r + c - 1$  . . 313--318

Designs, Codes, and Cryptography
Volume 37, Number 3, December, 2005

              S. G. Barwick and   
                 Wen-Ai Jackson   An Optimal Multisecret Threshold Scheme
                                  Construction . . . . . . . . . . . . . . 367--389
            A. Ya. Dorofeev and   
              L. S. Kazarin and   
           V. M. Sidelnikov and   
                 M. E. Tuzhilin   Matrix Groups Related to the Quaternion
                                  Group and Spherical Orbit Codes  . . . . 391--404
          G. B. Belyavskaya and   
               V. I. Izbash and   
                   G. L. Mullen   Check Character Systems Using
                                  Quasigroups: II  . . . . . . . . . . . . 405--419
                E. J. Cheon and   
                    T. Kato and   
                      S. J. Kim   On the Minimum Length of some Linear
                                  Codes of Dimension $5$ . . . . . . . . . 421--434
              A. Wispelaere and   
                   H. Maldeghem   Codes from Generalized Hexagons  . . . . 435--448
              Claude Carlet and   
                Joseph L. Yucas   Piecewise Constructions of Bent and
                                  Almost Optimal Boolean Functions . . . . 449--464
          T. Aaron Gulliver and   
             Masaaki Harada and   
           Takuji Nishimura and   
Patric R. J. Östergård   Near-Extremal Formally Self-Dual Even
                                  Codes of Lengths $24$ and $32$ . . . . . 465--471
           Gretchen L. Matthews   Weierstrass Semigroups and Codes from a
                                  Quotient of the Hermitian Curve  . . . . 473--492
               Omran Ahmadi and   
                 Alfred Menezes   On the Number of Trace-One Elements in
                                  Polynomial Bases for $\mathbb{F}_2^n$    493--507
        Jens-Matthias Bohli and   
          Rainer Steinwandt and   
María Isabel González Vasco and   
       Consuelo Martínez   Weak Keys in MST$_1$ . . . . . . . . . . 509--524


Designs, Codes, and Cryptography
Volume 38, Number 1, January, 2006

                 Masaaki Harada   Self-Orthogonal $3-(56,12,65)$ Designs
                                  and Extremal Doubly-Even Self-Dual Codes
                                  of Length $56$ . . . . . . . . . . . . . 5--16
                Mehmet Ozen and   
                     Irfan Siap   Linear Codes over $\mathbb{F}_q[u] /
                                  (u^s)$ with Respect to the
                                  Rosenbloom--Tsfasman Metric  . . . . . . 17--29
                 T. L. Alderson   $(6,3)$-MDS Codes over an Alphabet of
                                  Size $4$ . . . . . . . . . . . . . . . . 31--40
Jean-Sébastien Coron and   
             David Naccache and   
                Yvo Desmedt and   
             Andrew Odlyzko and   
                Julien P. Stern   Index Calculation Attacks on RSA
                                  Signature and Encryption . . . . . . . . 41--53
              Masaaki Homma and   
                 Seon Jeong Kim   The Two-Point Codes on a Hermitian Curve
                                  with the Designed Minimum Distance . . . 55--81
                          L. Ji   Asymptotic Determination of the Last
                                  Packing Number of Quadruples . . . . . . 83--95
        Steven T. Dougherty and   
         T. Aaron. Gulliver and   
                    Manabu Oura   Higher Weights for Ternary and
                                  Quaternary Self-Dual Codes . . . . . . . 97--112
                 Michel Lavrauw   Sublines of Prime Order Contained in the
                                  Set of Internal Points of a Conic  . . . 113--123
                     Olof Heden   A Full Rank Perfect Code of Length $31$  125--129
                Simeon Ball and   
           Patrick Govaerts and   
                     Leo Storme   On Ovoids of Parabolic Quadrics  . . . . 131--145

Designs, Codes, and Cryptography
Volume 38, Number 2, February, 2006

             Wilfried Meidl and   
                 Arne Winterhof   Some Notes on the Linear Complexity of
                                  Sidel'nikov--Lempel--Cohn--Eastman
                                  Sequences  . . . . . . . . . . . . . . . 159--178
            Frank de Clerck and   
          Stefaan de Winter and   
          Elisabeth Kuijken and   
                Cristina Tonesi   Distance-Regular $(0, \alpha)$-Reguli    179--194
                   Sara Cauchie   A Characterization of the Complement of
                                  a Hyperbolic Quadric in ${\rm PG}(3,q)$,
                                  for $q$ Odd  . . . . . . . . . . . . . . 195--208
              Michael Scott and   
         Paulo S. L. M. Barreto   Generating More MNT Elliptic Curves  . . 209--217
               Gwoboa Horng and   
              Tzungher Chen and   
                  Du-shiau Tsai   Cheating in Visual Cryptography  . . . . 219--236
                  Ari Juels and   
                    Madhu Sudan   A Fuzzy Vault Scheme . . . . . . . . . . 237--257
                  D. R. Stinson   Some Observations on the Theory of
                                  Cryptographic Hash Functions . . . . . . 259--277
            Khoongming Khoo and   
                 Guang Gong and   
             Douglas R. Stinson   A New Characterization of Semi-bent and
                                  Bent Functions on Finite Fields* . . . . 279--295
                  Eric Merchant   Exponentially Many Hadamard Designs  . . 297--308

Designs, Codes, and Cryptography
Volume 38, Number 3, March, 2006

            Norifumi Kamiya and   
           Marc P. C. Fossorier   Quasi-Cyclic Codes from a Finite Affine
                                  Plane  . . . . . . . . . . . . . . . . . 311--329
                Petri Rosendahl   A Generalization of Niho's Theorem . . . 331--336
                   San Ling and   
        Harald Niederreiter and   
            Patrick Solé   On the Algebraic Structure of
                                  Quasi-cyclic Codes IV: Repeated Roots    337--361
                 Vince Grolmusz   Co-Orthogonal Codes  . . . . . . . . . . 363--372
                    Jinhua Wang   A New Class of Optimal $3$-splitting
                                  Authentication Codes . . . . . . . . . . 373--381
                  Annegret Weng   A Low-Memory Algorithm for Point
                                  Counting on Picard Curves  . . . . . . . 383--393
                   Omran Ahmadi   Self-Reciprocal Irreducible Pentanomials
                                  Over $\mathbb{F}_2$  . . . . . . . . . . 395--397
                 Benjamin Arazi   Communication-Computation Trade-off in
                                  Executing ECDSA in a Contactless
                                  Smartcard  . . . . . . . . . . . . . . . 399--415


Designs, Codes, and Cryptography
Volume 39, Number 1, April, 2006

                   Jeremy Dover   Subregular Spreads of Hermitian Unitals  5--15
        Mahdad Khatirinejad and   
                   Petr Lisonek   Classification and Constructions of
                                  Complete Caps in Binary Spaces . . . . . 17--31
              A. Cossidente and   
                   A. Siciliano   The Automorphism Group of Plane
                                  Algebraic Curves with Singer
                                  Automorphisms  . . . . . . . . . . . . . 33--37
                   Tao Feng and   
                   Yanxun Chang   Existence of Z-cyclic ${\rm 3PTWh}(p)$
                                  for any Prime $p \equiv 1$ (mod $4$) . . 39--49
          Agnes D. Garciano and   
            Yutaka Hiramine and   
                 Takeo Yokonuma   On Relative Difference Sets in Dihedral
                                  Groups . . . . . . . . . . . . . . . . . 51--63
        Steven T. Dougherty and   
                  Young Ho Park   Codes Over the $p$-adic Integers . . . . 65--80
               S. De Winter and   
                        K. Thas   Generalized Quadrangles with an Abelian
                                  Singer Group . . . . . . . . . . . . . . 81--87
                Barbara Masucci   Sharing Multiple Secrets: Models,
                                  Schemes and Analysis . . . . . . . . . . 89--111
            Igor E. Shparlinski   On RSA Moduli with Prescribed Bit
                                  Patterns . . . . . . . . . . . . . . . . 113--122

Designs, Codes, and Cryptography
Volume 39, Number 2, May, 2006

        Steven T. Dougherty and   
                       San Ling   Cyclic Codes Over $\mathbb{Z}_4$ of Even
                                  Length . . . . . . . . . . . . . . . . . 127--153
                 Hassan Aly and   
                 Arne Winterhof   On the Linear Complexity Profile of
                                  Nonlinear Congruential Pseudorandom
                                  Number Generators with Dickson
                                  Polynomials  . . . . . . . . . . . . . . 155--162
                Michael Giudici   Codes with a Certain Weight-preserving
                                  Transitive Group of Automorphisms  . . . 163--172
                 Kejun Chen and   
                   Ruizhong Wei   Super-simple $(\nu, 5, 5)$ Designs . . . 173--187
               Mathieu Ciet and   
                  Marc Joye and   
             Kristin Lauter and   
            Peter L. Montgomery   Trading Inversions for Multiplications
                                  in Elliptic Curve Cryptography . . . . . 189--206
                  Gilberto Bini   $A$-Codes from Rational Functions over
                                  Galois Rings . . . . . . . . . . . . . . 207--214
            Cem Güneri and   
            Ferruh Özbudak   Improvements on Generalized Hamming
                                  Weights of Some Trace Codes  . . . . . . 215--231
                   Gilles Piret   Luby--Rackoff Revisited: On the Use of
                                  Permutations as Inner Functions of a
                                  Feistel Scheme . . . . . . . . . . . . . 233--245
                Dean Crnkovi\'c   A Series of Regular Hadamard Matrices    247--251
            Marten Van Dijk and   
              Dwaine Clarke and   
             Blaise Gassend and   
              G. Edward Suh and   
               Srinivas Devadas   Speeding up Exponentiation using an
                                  Untrusted Computational Resource . . . . 253--273

Designs, Codes, and Cryptography
Volume 39, Number 3, June, 2006

                M. R. Darafsheh   Designs from the Group ${\rm PSL}_2(q)$,
                                  $q$ Even . . . . . . . . . . . . . . . . 311--316
    Sergey V. Avgustinovich and   
                 Olof Heden and   
             Faina I. Solov'eva   On Intersection Problem for Perfect
                                  Binary Codes . . . . . . . . . . . . . . 317--322
               Jan De Beule and   
                     Leo Storme   Blocking All Generators of $Q^+(2 n +
                                  1,3)$, $n \geq 4$  . . . . . . . . . . . 323--333
                 Jen-Chun Chang   New Algorithms of Distance-Increasing
                                  Mappings from Binary Vectors to
                                  Permutations by Swaps  . . . . . . . . . 335--345
                  Samuel Maffre   A Weak Key Test for Braid Based
                                  Cryptography . . . . . . . . . . . . . . 347--373
              Masaaki Homma and   
                 Seon Jeong Kim   The Two-Point Codes with the Designed
                                  Distance on a Hermitian Curve in Even
                                  Characteristic . . . . . . . . . . . . . 375--386
           Katie M. O'Brien and   
            Patrick Fitzpatrick   Bounds on Codes Derived by Counting
                                  Components in Varshamov Graphs . . . . . 387--396
             Angela Aguglia and   
              Massimo Giulietti   Blocking Sets of Certain Line Sets
                                  Related to a Conic . . . . . . . . . . . 397--405


Designs, Codes, and Cryptography
Volume 40, Number 1, July, 2006

              Masaaki Homma and   
                 Seon Jeong Kim   The Complete Determination of the
                                  Minimum Distance of Two-Point Codes on a
                                  Hermitian Curve  . . . . . . . . . . . . 5--24
           Peter J. Grabner and   
              Clemens Heuberger   On the Number of Optimal Base $2$
                                  Representations of Integers  . . . . . . 25--39
         Deepak Kumar Dalai and   
            Subhamoy Maitra and   
                 Sumanta Sarkar   Basic Theory in Construction of Boolean
                                  Functions with Maximum Possible
                                  Annihilator Immunity . . . . . . . . . . 41--58
         François Rodier   Asymptotic Nonlinearity of Boolean
                                  Functions  . . . . . . . . . . . . . . . 59--70
              Claude Carlet and   
              Cunsheng Ding and   
            Harald Niederreiter   Authentication Schemes from Highly
                                  Nonlinear Functions  . . . . . . . . . . 71--79
                Hiroki Koga and   
                    Etsuyo Ueda   Basic Properties of the
                                  $(t,n)$-Threshold Visual Secret Sharing
                                  Scheme with Perfect Reconstruction of
                                  Black Pixels . . . . . . . . . . . . . . 81--102
             Javier Herranz and   
      Germán Sáez   Distributed Ring Signatures from General
                                  Dual Access Structures . . . . . . . . . 103--120
               Anthony B. Evans   Latin Squares without Orthogonal Mates   121--130
             Ian M. Wanless and   
                Bridget S. Webb   The Existence of Latin Squares without
                                  Orthogonal Mates . . . . . . . . . . . . 131--135

Designs, Codes, and Cryptography
Volume 40, Number 2, August, 2006

             Yen-Ying Huang and   
              Shi-Chun Tsai and   
                   Hsin-Lung Wu   On the Construction of Permutation
                                  Arrays via Mappings from Binary Vectors
                                  to Permutations  . . . . . . . . . . . . 139--155
              Cunsheng Ding and   
                   Jianxing Yin   A Construction of Optimal Constant
                                  Composition Codes  . . . . . . . . . . . 157--165
               Yanxun Chang and   
                  Cunsheng Ding   Constructions of External Difference
                                  Families and Disjoint Difference
                                  Families . . . . . . . . . . . . . . . . 167--185
      Octavio Páez Osuna   There are $1239$ Steiner Triple Systems
                                  ${\rm STS}(31)$ of $2$-rank $27$ . . . . 187--190
               Shoulun Long and   
             Josef Pieprzyk and   
              Huaxiong Wang and   
                 Duncan S. Wong   Generalised Cumulative Arrays in Secret
                                  Sharing  . . . . . . . . . . . . . . . . 191--209
              R. J. R. Abel and   
                  F. E. Bennett   The Existence of $(\nu, 6,
                                  \lambda)$-Perfect Mendelsohn Designs
                                  with $\lambda > 1$  . . . . . . . . . . . 211--224
           Mike J. Grannell and   
            Terry S. Griggs and   
            Anne Penfold Street   A Flaw in the Use of Minimal Defining
                                  Sets for Secret Sharing Schemes  . . . . 225--236
             Andreas Faldum and   
             Julio Lafuente and   
              Gustavo Ochoa and   
               Wolfgang Willems   Error Probabilities for Bounded Distance
                                  Decoding . . . . . . . . . . . . . . . . 237--252

Designs, Codes, and Cryptography
Volume 40, Number 3, September, 2006

               Mausumi Bose and   
                 Rahul Mukerjee   Optimal $(2,n)$ visual cryptographic
                                  schemes  . . . . . . . . . . . . . . . . 255--267
           Brendan D. McKay and   
         Jeanette C. McLeod and   
                 Ian M. Wanless   The number of transversals in a Latin
                                  square . . . . . . . . . . . . . . . . . 269--284
           Christopher Wolf and   
                 An Braeken and   
                   Bart Preneel   On the security of stepwise triangular
                                  systems  . . . . . . . . . . . . . . . . 285--302
                 Gennian Ge and   
                  Ying Miao and   
                         L. Zhu   GOB designs for authentication codes
                                  with arbitration . . . . . . . . . . . . 303--317
                 Olof Heden and   
                 Martin Hessler   On the classification of perfect codes:
                                  side class structures  . . . . . . . . . 319--333
             David G. Glynn and   
           Johannes G. Maks and   
                      Rey Casse   The polynomial degree of the
                                  Grassmannian $G(1,n,q)$ of lines in
                                  finite projective space ${\rm PG}(n,q)$  335--341
              Sean V. Droms and   
         Keith E. Mellinger and   
                    Chris Meyer   LDPC codes generated by conics in the
                                  classical projective plane . . . . . . . 343--356
                Peter Horak and   
              Bader F. AlBdaiwi   Fast decoding of quasi-perfect Lee
                                  distance codes . . . . . . . . . . . . . 357--367
                 Hassan Aly and   
                 Arne Winterhof   On the $k$-error linear complexity over
                                  $\mathbb{F}_p$ of Legendre and
                                  Sidelnikov sequences . . . . . . . . . . 369--374


Designs, Codes, and Cryptography
Volume 41, Number 1, October, 2006

           Rei Safavi-Naini and   
                  Huaxiong Wang   Secret sharing schemes with partial
                                  broadcast channels . . . . . . . . . . . 5--22
                  Julien Moncel   Constructing codes identifying sets of
                                  vertices . . . . . . . . . . . . . . . . 23--31
        Charles J. Colbourn and   
      Sosina S. Martirosyan and   
             Tran Van Trung and   
               Robert A. Walker   Roux-type constructions for covering
                                  arrays of strengths three and four . . . 33--57
           Iliya Bouyukliev and   
                Veerle Fack and   
           Wolfgang Willems and   
                    Joost Winne   Projective two-weight codes with small
                                  parameters and their corresponding
                                  graphs . . . . . . . . . . . . . . . . . 59--78
              Peter Keevash and   
                  Cheng Yeaw Ku   A random construction for permutation
                                  codes and the covering radius  . . . . . 79--86
                 Vince Grolmusz   Pairs of codes with prescribed Hamming
                                  distances and coincidences . . . . . . . 87--99
         Stefka Bouyuklieva and   
Patric R. J. Östergård   New constructions of optimal self-dual
                                  binary codes of length $54$  . . . . . . 101--109
                K. T. Arasu and   
               Ka Hin Leung and   
                 Siu Lun Ma and   
                 Ali Nabavi and   
            D. K. Ray-Chaudhuri   Circulant weighing matrices of weight
                                  $2^{2 t}$  . . . . . . . . . . . . . . . 111--123

Designs, Codes, and Cryptography
Volume 41, Number 2, November, 2006

                 Vikram Jha and   
              Norman L. Johnson   Subregular planes admitting elations . . 125--145
                  Marcelo Muniz   Isometric embeddings of $\mathbb{Z}_p^k$
                                  in the Hamming space $\mathbb{F}_p^N$
                                  and $\mathbb{Z}_p^k$-linear codes  . . . 147--152
               Robert F. Bailey   Uncoverings-by-bases for base-transitive
                                  permutation groups . . . . . . . . . . . 153--176
                 Zhenfu Cao and   
                 Gennian Ge and   
                      Ying Miao   Combinatorial characterizations of
                                  one-coincidence frequency-hopping
                                  sequences  . . . . . . . . . . . . . . . 177--184
            Stefko Miklavic and   
                Primoz Potocnik   Distance-transitive dihedrants . . . . . 185--193
               Carl Bracken and   
               Gary McGuire and   
                    Harold Ward   New quasi-symmetric designs constructed
                                  using mutually orthogonal Latin squares
                                  and Hadamard matrices  . . . . . . . . . 195--198
                 C. Galindo and   
                     M. Sanchis   Evaluation codes and plane valuations    199--219
                  Lihua Liu and   
                       Hao Shen   Explicit constructions of separating
                                  hash families from algebraic curves over
                                  finite fields  . . . . . . . . . . . . . 221--233

Designs, Codes, and Cryptography
Volume 41, Number 3, December, 2006

        Steven T. Dougherty and   
          T. Aaron Gulliver and   
                      John Wong   Self-dual codes over $\mathbb{Z}_8$ and
                                  $\mathbb{Z}_9$ . . . . . . . . . . . . . 235--249
          Takehiro Hasegawa and   
              Shoichi Kondo and   
                Hidekazu Kurusu   A sequence of one-point codes from a
                                  tower of function fields . . . . . . . . 251--267
                   Jun Shen and   
                       Hao Shen   Embeddings of resolvable group divisible
                                  designs with block size $3$  . . . . . . 269--298
               Soonhak Kwon and   
             Chang Hoon Kim and   
                  Chun Pyo Hong   Sparse polynomials, redundant bases,
                                  Gauss periods, and efficient
                                  exponentiation of primitive elements for
                                  small characteristic finite fields . . . 299--306
                   Ali Miri and   
              Monica Nevins and   
            Terasan Niyomsataya   Applications of representation theory to
                                  wireless communications  . . . . . . . . 307--318
                   Carl Bracken   New classes of self-complementary codes
                                  and quasi-symmetric designs  . . . . . . 319--323
         Pascal O. Vontobel and   
                 Ashwin Ganesan   On universally decodable matrices for
                                  space-time coding  . . . . . . . . . . . 325--342
        Ferruh Özbudak and   
       Zülfükar Saygi   Some constructions of systematic
                                  authentication codes using Galois rings  343--357


Designs, Codes, and Cryptography
Volume 42, Number 1, January, 2007

              Andrea Blunck and   
              Hans Havlicek and   
                Corrado Zanella   Lifting of divisible designs . . . . . . 1--14
              Chong-Dao Lee and   
               Yaotsu Chang and   
              Trieu-Kien Truong   A result on the weight distributions of
                                  binary quadratic residue codes . . . . . 15--20
                   Peter Roelse   The design of composite permutations
                                  with applications to DES-like S-boxes    21--42
               Nevine Ebeid and   
                 M. Anwar Hasan   On binary signed digit representations
                                  of integers  . . . . . . . . . . . . . . 43--65
               Simon Litsyn and   
               Beniamin Mounits   Improved lower bounds on sizes of
                                  single-error correcting codes  . . . . . 67--72
               Jon-Lark Kim and   
         Keith E. Mellinger and   
                     Leo Storme   Small weight codewords in LDPC codes
                                  defined by (dual) classical generalized
                                  quadrangles  . . . . . . . . . . . . . . 73--92
              Naoki Chigira and   
             Masaaki Harada and   
               Masaaki Kitazume   Extremal self-dual codes of length $64$
                                  through neighbors and covering radii . . 93--101
         Antonio Cossidente and   
                Giuseppe Marino   Veronese embedding and two-character
                                  sets . . . . . . . . . . . . . . . . . . 103--107

Designs, Codes, and Cryptography
Volume 42, Number 2, February, 2007

               Bessie C. Hu and   
             Duncan S. Wong and   
             Zhenfeng Zhang and   
                   Xiaotie Deng   Certificateless signature: a new
                                  security model and an improved generic
                                  construction . . . . . . . . . . . . . . 109--126
         Jürgen Bierbrauer   A direct approach to linear programming
                                  bounds for codes and tms-nets  . . . . . 127--143
          Sanjeevani Gharge and   
                    Sharad Sane   Quasi-affine symmetric designs . . . . . 145--166
            Amir J. Salomon and   
                    Ofer Amrani   Reed--Muller codes and Barnes--Wall
                                  lattices: Generalized multilevel
                                  constructions and representation over
                                  ${\rm GF}(2^q)$  . . . . . . . . . . . . 167--180
             Wilfried Meidl and   
         Ayineedi Venkateswarlu   Remarks on the $k$-error linear
                                  complexity of $p^n$-periodic sequences   181--193
                 Maura Paterson   Sliding-window dynamic frameproof codes  195--212
         S. González and   
         C. Martínez and   
               I. F. Rúa   Symplectic spread-based generalized
                                  Kerdock codes  . . . . . . . . . . . . . 213--226
              Dongvu Tonien and   
          Reihaneh Safavi-Naini   Construction of deletion correcting
                                  codes using generalized Reed--Solomon
                                  codes and their subcodes . . . . . . . . 227--237

Designs, Codes, and Cryptography
Volume 42, Number 3, March, 2007

     Paulo S. L. M. Barreto and   
        Steven D. Galbraith and   
Colm Ó'hÉigeartaigh and   
                  Michael Scott   Efficient pairing computation on
                                  supersingular Abelian varieties  . . . . 239--271
             Taher Abualrub and   
                     Irfan Siap   Cyclic codes over the rings $Z_2 + u
                                  Z_2$ and $Z_2 + u Z_2 + u^2 Z_2$ . . . . 273--287
               Eimear Byrne and   
           Marcus Greferath and   
          Michael E. O'Sullivan   The linear programming bound for codes
                                  over finite Frobenius rings  . . . . . . 289--301
                 Valentina Pepe   LDPC codes from the Hermitian curve  . . 303--315
                 Maura Paterson   Sequential and dynamic frameproof codes  317--326
               Gerardo Vega and   
               Jacques Wolfmann   New classes of $2$-weight cyclic codes   327--334
         Thomas Westerbäck   Maximal partial packings of $Z_2^n$ with
                                  perfect codes  . . . . . . . . . . . . . 335--355


Designs, Codes, and Cryptography
Volume 43, Number 1, April, 2007

                    Shane Kelly   Constructions of intriguing sets of
                                  polar spaces from field reduction and
                                  derivation . . . . . . . . . . . . . . . 1--8
                Fang-Wei Fu and   
                    Shu-Tao Xia   The characterization of binary constant
                                  weight codes meeting the bound of Fu and
                                  Shen . . . . . . . . . . . . . . . . . . 9--20
               Nikias De Feyter   Classification of $(0,2)$-geometries
                                  embedded in ${\rm AG}(3,q)$  . . . . . . 21--32
             Andrea Caggegi and   
               Giovanni Falcone   On $2-(n^2, 2 n, 2n-1)$ designs with
                                  three intersection numbers . . . . . . . 33--40
               Sabine Giese and   
             Ralph-Hardo Schulz   Divisible designs with dual translation
                                  group  . . . . . . . . . . . . . . . . . 41--45
                Tetsuya Izu and   
                 Jun Kogure and   
            Takeshi Koshiba and   
              Takeshi Shimoyama   Low-density attack revisited . . . . . . 47--59

Designs, Codes, and Cryptography
Volume 43, Number 2--3, June, 2007

            Aggelos Kiayias and   
                      Moti Yung   Cryptanalyzing the
                                  polynomial-reconstruction based
                                  public-key system under optimal
                                  parameter choice . . . . . . . . . . . . 61--78
            Jonathan Jedwab and   
              Matthew G. Parker   There are no Barker arrays having more
                                  than two dimensions  . . . . . . . . . . 79--84
                 I. Gashkov and   
            J. A. O. Ekberg and   
                        D. Taub   A geometric approach to finding new
                                  lower bounds of $A(n, d, w)$ . . . . . . 85--91
              Ji-Woong Jang and   
               Jong-Seon No and   
                   Habong Chung   Butson Hadamard matrices with partially
                                  cyclic core  . . . . . . . . . . . . . . 93--101
                     John Arhin   On the structure of $1$-designs with at
                                  most two block intersection numbers  . . 103--114
                       Lijun Ji   A construction for large sets of
                                  disjoint Kirkman triple systems  . . . . 115--122
                E. J. Cheon and   
                      T. Maruta   On the minimum length of some linear
                                  codes  . . . . . . . . . . . . . . . . . 123--135
       Maria Bras-Amorós   Algebraic-geometry codes, one-point
                                  codes, and evaluation codes  . . . . . . 137--145
                Bahattin Yildiz   Weights modulo $p^e$ of linear codes
                                  over rings . . . . . . . . . . . . . . . 147--165
             Wen-Ai Jackson and   
                      S. Murphy   Projective aspects of the AES inversion  167--179


Designs, Codes, and Cryptography
Volume 44, Number 1--3, September, 2007

              Dina Ghinelli and   
           James Hirschfeld and   
              Dieter Jungnickel   Preface  . . . . . . . . . . . . . . . . 1--2
                     J. A. Thas   The uniqueness of $1$-systems of
                                  $W_5(q)$ satisfying the BLT-property,
                                  with $q$ odd . . . . . . . . . . . . . . 3--10
              P. J. Cameron and   
                    A. Rudvalis   A design and a geometry for the group
                                  ${\rm Fi}_{22}$  . . . . . . . . . . . . 11--14
              Gary L. Ebert and   
             Keith E. Mellinger   Mixed partitions and related designs . . 15--23
                 Alan R. Prince   A translation plane of order $19^2$
                                  admitting ${\rm SL}(2,5)$, obtained by
                                  $12$-nest replacement  . . . . . . . . . 25--30
                 Antonio Pasini   A characterization of truncated
                                  projective geometries as flag-transitive
                                  ${\rm PG}^*.{\rm PG}$-geometries . . . . 31--38
             Guglielmo Lunardon   Simplectic spreads and finite semifields 39--48
               Guobiao Weng and   
               Weisheng Qiu and   
                Zeying Wang and   
                     Qing Xiang   Pseudo-Paley graphs and skew Hadamard
                                  difference sets from presemifields . . . 49--62
                Simeon Ball and   
                 Michel Lavrauw   On the Hughes--Kleinfeld and Knuth's
                                  semifields two-dimensional over a weak
                                  nucleus  . . . . . . . . . . . . . . . . 63--67
                M. Biliotti and   
                     V. Jha and   
              N. L. Johnson and   
                   A. Montinaro   Translation planes of order $q^2$
                                  admitting a two-transitive orbit of
                                  length $q + 1$ on the line at infinity   69--86


Designs, Codes, and Cryptography
Volume 45, Number 1, October, 2007

              Michael Dewar and   
                Lucia Moura and   
             Daniel Panario and   
              Brett Stevens and   
                     Qiang Wang   Division of trinomials by pentanomials
                                  and orthogonal arrays  . . . . . . . . . 1--17
Francisco Rodríguez-Henríquez and   
     Guillermo Morales-Luna and   
             Nazar A. Saqib and   
      Nareli Cruz-Cortés   Parallel Itoh--Tsujii multiplicative
                                  inversion algorithm for a special class
                                  of trinomials  . . . . . . . . . . . . . 19--37
                       Lijun Ji   Constructions for large sets of
                                  $L$-intersecting Steiner triple systems  39--49
           Morteza Esmaeili and   
                 Morteza Hivadi   $G$-projectable and
                                  $\Lambda$-projectable binary linear
                                  block codes  . . . . . . . . . . . . . . 51--64
                   Yu Xiong and   
                     Jun Ma and   
                       Hao Shen   On optimal codes with $w$-identifiable
                                  parent property  . . . . . . . . . . . . 65--90
            Esa Antero Seuranen   New lower bounds for multiple coverings  91--94
           Susan G. Barwick and   
                 Wen-Ai Jackson   A sequence approach to linear perfect
                                  hash families  . . . . . . . . . . . . . 95--121
                 I. Landjev and   
                      L. Storme   A weighted version of a result of Hamada
                                  on minihypers and on linear codes
                                  meeting the Griesmer bound . . . . . . . 123--138
               Xiande Zhang and   
                     Gennian Ge   Existence of $Z$-cyclic ${\rm
                                  3PDTWh}(p)$ for Prime $p \equiv 1$ (mod
                                  $4$) . . . . . . . . . . . . . . . . . . 139--155

Designs, Codes, and Cryptography
Volume 45, Number 2, November, 2007

                 Gennian Ge and   
                  Rolf Rees and   
                  Nabil Shalaby   Kirkman frames having hole type $h^u
                                  m^1$ for small $h$ . . . . . . . . . . . 157--184
                 Haitao Cao and   
                   Lijun Ji and   
                        Lie Zhu   Constructions for generalized Steiner
                                  systems ${\rm GS}(3, 4, v, 2)$ . . . . . 185--197
            Jaime Gutierrez and   
             Álvar Ibeas   Inferring sequences produced by a linear
                                  congruential generator on elliptic
                                  curves missing high-order bits . . . . . 199--212
             Tsvetan Asamov and   
                      Nuh Aydin   A search algorithm for linear codes:
                                  progressive dimension growth . . . . . . 213--217
    E. Martínez-Moro and   
               I. F. Rúa   On repeated-root multivariable codes
                                  over a finite chain ring . . . . . . . . 219--227
                       Ron Shaw   The $\psi$-associate $X^\#$ of a flat
                                  $X$ in ${\rm PG}(n, 2)$  . . . . . . . . 229--246
               Jon-Lark Kim and   
                    Yoonjin Lee   Construction of MDS self-dual codes over
                                  Galois rings . . . . . . . . . . . . . . 247--258
           Csaba Mengyán   On the number of pairwise non-isomorphic
                                  minimal blocking sets in ${\rm PG}(2,
                                  q)$  . . . . . . . . . . . . . . . . . . 259--267
               Eimear Byrne and   
           Marcus Greferath and   
          Michael E. O'Sullivan   Errata for ``The linear programming
                                  bound for codes over finite Frobenius
                                  rings''  . . . . . . . . . . . . . . . . 269--270

Designs, Codes, and Cryptography
Volume 45, Number 3, December, 2007

       Nevine Maurice Ebeid and   
                 M. Anwar Hasan   On $\tau$-adic representations of
                                  integers . . . . . . . . . . . . . . . . 271--296
                   San Ling and   
            Ferruh Özbudak   Constructions and bounds on linear
                                  error-block codes  . . . . . . . . . . . 297--316
               Ki Hyoung Ko and   
               Jang Won Lee and   
                    Tony Thomas   Towards generating secure keys for braid
                                  cryptography . . . . . . . . . . . . . . 317--333
              Radka Russeva and   
                 Nikolay Yankov   On binary self-dual codes of lengths
                                  $60$, $62$, $64$ and $66$ having an
                                  automorphism of order $9$  . . . . . . . 335--346
                  D. R. Stinson   Generalized mix functions and orthogonal
                                  equitable rectangles . . . . . . . . . . 347--357
     Cícero Carvalho and   
                     Takao Kato   Codes from curves with total inflection
                                  points . . . . . . . . . . . . . . . . . 359--364
          Gert Monstad Hana and   
                 Trygve Johnsen   Scroll codes . . . . . . . . . . . . . . 365--377
                  Koji Momihara   Necessary and sufficient conditions for
                                  tight equi-difference conflict-avoiding
                                  codes of weight three  . . . . . . . . . 379--390
                    Jinhua Wang   A new class of optimal $3$-splitting
                                  authentication codes . . . . . . . . . . 391--391


Designs, Codes, and Cryptography
Volume 46, Number 1, January, 2008

                Jinhua Wang and   
                       Hao Shen   Existence of $(v,K_{1(3)} \cup
                                  \{w^*\})$-PBDs and its applications  . . 1--16
             Vitaly Skachek and   
                    Ron M. Roth   Probabilistic algorithm for finding
                                  roots of linearized polynomials  . . . . 17--23
                Veerle Fack and   
       Szabolcs L. Fancsali and   
                  L. Storme and   
      Geetrui Van de Voorde and   
                    Joost Winne   Small weight codewords in the codes
                                  arising from Desarguesian projective
                                  planes . . . . . . . . . . . . . . . . . 25--43
                     Olof Heden   On perfect $p$-ary codes of length $p +
                                  1$ . . . . . . . . . . . . . . . . . . . 45--56
                 Wilfried Meidl   Reducing the calculation of the linear
                                  complexity of $u 2^v$-periodic binary
                                  sequences to Games--Chan algorithm . . . 57--65
              Weiming Zhang and   
                       Shiqu Li   A coding problem in steganography  . . . 67--81
             James A. Davis and   
                Laurent Poinsot   $G$-Perfect nonlinear functions  . . . . 83--96
         Sosina Martirosyan and   
                 Tran van Trung   Explicit constructions for perfect hash
                                  families . . . . . . . . . . . . . . . . 97--112
              Cunsheng Ding and   
                       Tao Feng   Codebooks from almost difference sets    113--126

Designs, Codes, and Cryptography
Volume 46, Number 2, February, 2008

              Norman L. Johnson   $m$th-Root subgeometry partitions  . . . 127--136
             Boris Skori\'c and   
       Stefan Katzenbeisser and   
                Mehmet U. Celik   Symmetric Tardos fingerprinting codes
                                  for arbitrary alphabet sizes . . . . . . 137--166
            Vito Abatangelo and   
                 Bambina Larato   Elliptic near-MDS codes over
                                  $\mathbb{F}_5$ . . . . . . . . . . . . . 167--174
               Thomas Britz and   
              Keisuke Shiromoto   Designs from subcode supports of linear
                                  codes  . . . . . . . . . . . . . . . . . 175--189
            Gerzson Kéri   The covering radius of extreme binary
                                  $2$-surjective codes . . . . . . . . . . 191--198
           Alessandro Montinaro   On the Ree Unital  . . . . . . . . . . . 199--209
               Jianxing Yin and   
                    Jie Yan and   
                  Chengmin Wang   Generalized balanced tournament designs
                                  and related codes  . . . . . . . . . . . 211--230
         Antonio Cossidente and   
             Nicola Durante and   
            Giuseppe Marino and   
               Tim Penttila and   
           Alessandro Siciliano   The geometry of some two-character sets  231--241

Designs, Codes, and Cryptography
Volume 46, Number 3, March, 2008

                 Aaron Potechin   Maximal caps in ${\rm AG}(6, 3)$ . . . . 243--259
             Giorgio Donati and   
                 Nicola Durante   On the intersection of two subgeometries
                                  of ${\rm PG}(n, q)$  . . . . . . . . . . 261--267
     Jürgen Bierbrauer and   
            Gohar M. Kyureghyan   Crooked binomials  . . . . . . . . . . . 269--301
    Maria Cristeta Cuaresma and   
            Michael Giudici and   
              Cheryl E. Praeger   Homogeneous factorisations of Johnson
                                  graphs . . . . . . . . . . . . . . . . . 303--327
               Berkant Ustaoglu   Obtaining a secure and efficient key
                                  agreement protocol from (H)MQV and NAXOS 329--342
             W. H. Holzmann and   
              H. Kharaghani and   
               B. Tayfeh-Rezaie   Williamson matrices up to order $59$ . . 343--352
          Nicholas Kolokotronis   Cryptographic properties of nonlinear
                                  pseudorandom number generators . . . . . 353--363
                   John Polhill   New negative Latin square type partial
                                  difference sets in nonelementary abelian
                                  $2$-groups and $3$-groups  . . . . . . . 365--377


Designs, Codes, and Cryptography
Volume 47, Number 1--3, June, 2008

                A. Blokhuis and   
        J. W. P. Hirschfeld and   
              D. Jungnickel and   
                     J. A. Thas   Finite geometries  . . . . . . . . . . . 1--2
                   S. De Winter   Non-isomorphic semipartial geometries    3--9
              Andrea Blunck and   
              Hans Havlicek and   
                Corrado Zanella   Divisible designs from twisted dual
                                  numbers  . . . . . . . . . . . . . . . . 11--20
                J. De Beule and   
                   A. Klein and   
                  K. Metsch and   
                      L. Storme   Partial ovoids and partial spreads in
                                  Hermitian polar spaces . . . . . . . . . 21--34
          B. N. Cooperstein and   
                    B. De Bruyn   The combinatorial properties of the
                                  hyperplanes of ${\rm DW}(5, q)$ arising
                                  from embedding . . . . . . . . . . . . . 35--51
           A. De Wispelaere and   
               H. Van Maldeghem   Regular partitions of (weak) finite
                                  generalized polygons . . . . . . . . . . 53--73
                  Kris Coolsaet   A $51$-dimensional embedding of the
                                  Ree--Tits generalized octagon  . . . . . 75--97
          Cheryl E. Praeger and   
                  Shenglin Zhou   Classification of line-transitive
                                  point-imprimitive linear spaces with
                                  line size at most $12$ . . . . . . . . . 99--111
             T. L. Alderson and   
                    A. A. Bruen   Coprimitive sets and inextendable codes  113--124
                      Yves Edel   Sequences in abelian groups $G$ of odd
                                  order without zero-sum subsequences of
                                  length $\exp(G)$ . . . . . . . . . . . . 125--134


Designs, Codes, and Cryptography
Volume 48, Number 1, July, 2008

               Eimear Byrne and   
           Marcus Greferath and   
                  Thomas Honold   Ring geometries, two-weight codes, and
                                  strongly regular graphs  . . . . . . . . 1--16
                Dameng Deng and   
                  Rolf Rees and   
                       Hao Shen   On the existence of nearly Kirkman
                                  triple systems with subsystems . . . . . 17--33
               Landang Yuan and   
                    Qingde Kang   Another construction for large sets of
                                  Kirkman triple systems . . . . . . . . . 35--42
                Sunghyu Han and   
                   Jon-Lark Kim   On self-dual codes over $\mathbb{F}_5$   43--58
                          L. Ji   $2$-idempotent $3$-quasigroups with a
                                  conjugate invariant subgroup consisting
                                  of a single cycle of length four . . . . 59--68
               A. D. Blinco and   
            S. I. El-Zanati and   
            G. F. Seelinger and   
             P. A. Sissokho and   
               L. E. Spence and   
               C. Vanden Eynden   On vector space partitions and uniformly
                                  resolvable designs . . . . . . . . . . . 69--77
                Oded Blayer and   
                    Tamir Tassa   Improved versions of Tardos'
                                  fingerprinting scheme  . . . . . . . . . 79--103
                      Koen Thas   Note on the existence of translation
                                  nets . . . . . . . . . . . . . . . . . . 105--107

Designs, Codes, and Cryptography
Volume 48, Number 2, August, 2008

              Cunsheng Ding and   
              Tor Helleseth and   
          Òyvind Ytrehus   Preface  . . . . . . . . . . . . . . . . 109--110
                  Zihui Liu and   
                 Wende Chen and   
                       Yuan Luo   The relative generalized Hamming weight
                                  of linear $q$-ary codes and their
                                  subcodes . . . . . . . . . . . . . . . . 111--123
                Shu-Tao Xia and   
                    Fang-Wei Fu   Undetected error probability of $q$-ary
                                  constant weight codes  . . . . . . . . . 125--140
            Khmaies Ouahada and   
              Theo G. Swart and   
        Hendrik C. Ferreira and   
                     Ling Cheng   Binary permutation sequences as subsets
                                  of Levenshtein codes, spectral null
                                  codes, run-length limited codes and
                                  constant weight codes  . . . . . . . . . 141--154
            Radinka Yorgova and   
              Alfred Wassermann   Binary self-dual codes with
                                  automorphisms of order $23$  . . . . . . 155--164
        Gerzson Kéri and   
Patric R. J. Östergård   On the minimum size of binary codes with
                                  length $2R + 4$ and covering radius $R$  165--169
             Ernst M. Gabidulin   Attacks and counter-attacks on the GPT
                                  public key cryptosystem  . . . . . . . . 171--177
            Constanza Riera and   
      Stéphane Jacob and   
              Matthew G. Parker   From graph states to two-graph states    179--206

Designs, Codes, and Cryptography
Volume 48, Number 3, September, 2008

           A. J. van Zanten and   
                 Loeky Haryanto   Sets of disjoint snakes based on a
                                  Reed--Muller code and covering the
                                  hypercube  . . . . . . . . . . . . . . . 207--229
             Michel Lavrauw and   
                 Leo Storme and   
         Geertrui Van de Voorde   On the code generated by the incidence
                                  matrix of points and hyperplanes in
                                  ${\rm PG}(n, q)$ and its dual  . . . . . 231--245
             Jong Yoon Hyun and   
                 Hyun Kwang Kim   Maximum distance separable poset codes   247--261
                 Alan R. Prince   Further translation planes of order
                                  $19^2$ admitting ${\rm SL}(2,5)$,
                                  obtained by nest replacement . . . . . . 263--267
                  Andreas Klein   Attacks on the RC4 stream cipher . . . . 269--286
           Hans Ludwig de Vries   On orthogonal resolutions of the
                                  classical Steiner quadruple system ${\rm
                                  SQS}(16)$  . . . . . . . . . . . . . . . 287--292
                 Zheng Gong and   
                 Xuejia Lai and   
                     Kefei Chen   A synthetic indifferentiability analysis
                                  of some block-cipher-based hash
                                  functions  . . . . . . . . . . . . . . . 293--305
           Ulrich Dempwolff and   
              William M. Kantor   Distorting symmetric designs . . . . . . 307--322
                      Olav Geil   On the second weight of generalized
                                  Reed--Muller codes . . . . . . . . . . . 323--330
                   Jianmin Wang   Some combinatorial constructions for
                                  optimal perfect deletion-correcting
                                  codes  . . . . . . . . . . . . . . . . . 331--347


Designs, Codes, and Cryptography
Volume 49, Number 1--3, December, 2008

            Pascale Charpin and   
                  Tor Helleseth   Editorial: In memory of Hans Dobbertin   1--2
             Hans Dobbertin and   
                 Gregor Leander   Bent functions embedded into the
                                  recursive framework of $\mathbb{Z}$-bent
                                  functions  . . . . . . . . . . . . . . . 3--22
                   J. F. Dillon   More DD difference sets  . . . . . . . . 23--32
        Harald Niederreiter and   
         Ayineedi Venkateswarlu   Periodic multisequences with large error
                                  linear complexity  . . . . . . . . . . . 33--45
                    Igor Semaev   On solving sparse algebraic equations
                                  over finite fields . . . . . . . . . . . 47--60
        Ferruh Özbudak and   
       Zülfükar Saygi   Systematic authentication codes using
                                  additive polynomials . . . . . . . . . . 61--77
              K. J. Horadam and   
                   D. G. Farmer   Bundles, presemifields and nonlinear
                                  functions  . . . . . . . . . . . . . . . 79--94
             Sumanta Sarkar and   
                Subhamoy Maitra   Idempotents in the neighbourhood of
                                  Patterson--Wiedemann functions having
                                  Walsh spectra zeros  . . . . . . . . . . 95--103
         Ernst M. Gabidulin and   
              Nina I. Pilipchuk   Error and erasure correcting algorithms
                                  for rank codes . . . . . . . . . . . . . 105--122
                Goutam Paul and   
          Siddheshwar Rathi and   
                Subhamoy Maitra   On non-negligible bias of the first
                                  output byte of RC4 towards the first
                                  three bytes of the secret key  . . . . . 123--134
               Jon-Lark Kim and   
            Patrick Solé   Skew Hadamard designs and their codes    135--145
        Håvard Raddum and   
                    Igor Semaev   Solving Multiple Right Hand Sides linear
                                  equations  . . . . . . . . . . . . . . . 147--160
       Lars Eirik Danielsen and   
              Matthew G. Parker   Edge local complementation and
                                  equivalence of binary linear codes . . . 161--170
    Reza Rezaeian Farashahi and   
             Ruud Pellikaan and   
               Andrey Sidorenko   Extractors for binary elliptic curves    171--186
                J. De Beule and   
                  K. Metsch and   
                      L. Storme   Characterization results on arbitrary
                                  non-weighted minihypers and on linear
                                  codes meeting the Griesmer bound . . . . 187--197
        Maria Christopoulou and   
           Theo Garefalakis and   
             Daniel Panario and   
                  David Thomson   The trace of an optimal normal element
                                  and low complexity normal bases  . . . . 199--215
            Mariusz Czapski and   
                 Maciej Nikodem   Error detection and error correction
                                  procedures for the Advanced Encryption
                                  Standard . . . . . . . . . . . . . . . . 217--232
               Haifeng Qian and   
                  Yuan Zhou and   
                  Zhibin Li and   
               Zecheng Wang and   
                     Bing Zhang   Efficient public key encryption with
                                  smallest ciphertext expansion from
                                  factoring  . . . . . . . . . . . . . . . 233--249
            George Petrides and   
           Johannes Mykkeltveit   Composition of recursions and nonlinear
                                  complexity of periodic binary sequences  251--264
                Danyo Danev and   
               Stefan Dodunekov   A family of ternary quasi-perfect BCH
                                  codes  . . . . . . . . . . . . . . . . . 265--271
           Marcus Brinkmann and   
                 Gregor Leander   On the classification of APN functions
                                  up to dimension five . . . . . . . . . . 273--288
                 Ryo Nojima and   
                Hideki Imai and   
            Kazukuni Kobara and   
                 Kirill Morozov   Semantic security for the McEliece
                                  cryptosystem without random oracles  . . 289--305
 Rogério M. Siqueira and   
              Sueli I. R. Costa   Flat tori, lattices and bounds for
                                  commutative group codes  . . . . . . . . 307--321
       Rafaël Fourquet and   
        Cédric Tavernier   An improved list decoding algorithm for
                                  the second order Reed--Muller codes and
                                  its applications . . . . . . . . . . . . 323--340
              Christian Bey and   
            Gohar M. Kyureghyan   On Boolean functions with the sum of
                                  every two of them being bent . . . . . . 341--346
          Kseniya Garaschuk and   
                   Petr Lisonek   On binary Kloosterman sums divisible by
                                  $3$  . . . . . . . . . . . . . . . . . . 347--357


Designs, Codes, and Cryptography
Volume 50, Number 1, January, 2009

              Masaaki Homma and   
                 Seon Jeong Kim   The second generalized Hamming weight
                                  for two-point codes on a Hermitian curve 1--40
            J. Schillewaert and   
                     J. A. Thas   Characterizations of Hermitian varieties
                                  by intersection numbers  . . . . . . . . 41--60
                    Jie Yan and   
                   Jianxing Yin   A class of optimal constant composition
                                  codes from GDRPs . . . . . . . . . . . . 61--76
        Steven T. Dougherty and   
               Jon-Lark Kim and   
                 Hamid Kulosman   MDS codes over finite principal ideal
                                  rings  . . . . . . . . . . . . . . . . . 77--92
               Guobiao Weng and   
                         Lei Hu   Some results on skew Hadamard difference
                                  sets . . . . . . . . . . . . . . . . . . 93--105
                Weidong Guo and   
                     Gennian Ge   The existence of generalized mix
                                  functions  . . . . . . . . . . . . . . . 107--113
    Jean-Sébastien Coron   A variant of Boneh--Franklin IBE with a
                                  tight reduction in the random oracle
                                  model  . . . . . . . . . . . . . . . . . 115--133
Frédéric A. B. Edoukou   Codes defined by forms of degree $2$ on
                                  non-degenerate Hermitian varieties in
                                  $\mathbb{P}^4 (\mathbb{F}_q)
                                  \mathbb{P}^4(\mathbb{F}_q)$  . . . . . . 135--146

Designs, Codes, and Cryptography
Volume 50, Number 2, February, 2009

                  Young Ho Park   Modular independence and generator
                                  matrices for codes over $\mathbb{Z}_m$   147--162
                Shu-Tao Xia and   
                    Fang-Wei Fu   Johnson type bounds on constant
                                  dimension codes  . . . . . . . . . . . . 163--172
                 Jong Yoon Hyun   Generalized MacWilliams identities and
                                  their applications to perfect binary
                                  codes  . . . . . . . . . . . . . . . . . 173--185
               Jan De Beule and   
           Patrick Govaerts and   
                Anja Hallez and   
                     Leo Storme   Tight sets, weighted $m$-covers,
                                  weighted $m$-ovoids, and minihypers  . . 187--201
                 Wenqing Fu and   
                       Tao Feng   On self-orthogonal group ring codes  . . 203--214
                   Feng Liu and   
               Chuan Kun Wu and   
                     Xi Jun Lin   The alignment problem of visual
                                  cryptography schemes . . . . . . . . . . 215--227
                  Horst Trinker   A simple derivation of the MacWilliams
                                  identity for linear ordered codes and
                                  orthogonal arrays  . . . . . . . . . . . 229--234
         Jürgen Bierbrauer   A family of crooked functions  . . . . . 235--241
                 Keqin Feng and   
               Qunying Liao and   
                      Jing Yang   Maximal values of generalized algebraic
                                  immunity . . . . . . . . . . . . . . . . 243--252
                Yiwei Huang and   
               Bernhard Schmidt   Uniqueness of some cyclic projective
                                  planes . . . . . . . . . . . . . . . . . 253--266

Designs, Codes, and Cryptography
Volume 50, Number 3, March, 2009

           Lionel Chaussade and   
            Pierre Loidreau and   
                    Felix Ulmer   Skew codes of prescribed distance or
                                  rank . . . . . . . . . . . . . . . . . . 267--284
                Yutaka Hiramine   A two-to-one map and abelian affine
                                  difference sets  . . . . . . . . . . . . 285--290
             Kiyoshi Nagata and   
              Fidel Nemenzo and   
                     Hideo Wada   The number of self-dual codes over
                                  $Z_{p^3}$  . . . . . . . . . . . . . . . 291--303
        Steven D. Galbraith and   
                      Xibin Lin   Computing pairings using $x$-coordinates
                                  only . . . . . . . . . . . . . . . . . . 305--324
               Gilles Piret and   
François-Xavier Standaert   Provable security of block ciphers
                                  against linear cryptanalysis: a mission
                                  impossible? An experimental review of
                                  the practical security approach and the
                                  key equivalence hypothesis in linear
                                  cryptanalysis  . . . . . . . . . . . . . 325--338
                    Yang Li and   
                   Lijun Ji and   
                   Jianxing Yin   Covering arrays of strength $3$ and $4$
                                  from holey difference matrices . . . . . 339--350
                 D. Panario and   
                     D. Thomson   Efficient $p$th root computations in
                                  finite fields of characteristic $p$  . . 351--358
       Alexander A. Davydov and   
          Stefano Marcugini and   
             Fernanda Pambianco   Complete $(q^2 + q + 8)/2$-caps in the
                                  spaces $PG(3, q ), q \equiv 2 (mod 3)$
                                  an odd prime, and a complete $20$-cap in
                                  $PG(3, 5)$ . . . . . . . . . . . . . . . 359--372


Designs, Codes, and Cryptography
Volume 51, Number 1, April, 2009

                  Tian Tian and   
                    Wen-Feng Qi   A note on the crosscorrelation of
                                  maximal length FCSR sequences  . . . . . 1--8
                    E. J. Cheon   A class of optimal linear codes of
                                  length one above the Griesmer bound  . . 9--20
                 Yu. I. Lyubich   On tight projective designs  . . . . . . 21--31
                 Wilfried Meidl   Remarks on a cyclotomic sequence . . . . 33--43
        Krzysztof Petelczyc and   
         Ma\lgorzata Prazmowska   $103$-configurations and projective
                                  realizability of multiplied
                                  configurations . . . . . . . . . . . . . 45--54
        Steven T. Dougherty and   
                    Hongwei Liu   Independence of vectors in codes over
                                  rings  . . . . . . . . . . . . . . . . . 55--68
                Sunghyu Han and   
                   Jon-Lark Kim   The nonexistence of near-extremal
                                  formally self-dual codes . . . . . . . . 69--77
          R. Julian R. Abel and   
          Norman J. Finizio and   
              Malcolm Greig and   
                Luis B. Morales   Existence of $(2, 8)$GWhD($v$) and $(4,
                                  8)$GWhD($v$) with $v \equiv 0, 1 \pmod
                                  8$ . . . . . . . . . . . . . . . . . . . 79--97
             Dimitrios Poulakis   A variant of Digital Signature Algorithm 99--104

Designs, Codes, and Cryptography
Volume 51, Number 2, May, 2009

           Iliya Bouyukliev and   
                Veerle Fack and   
                    Joost Winne   $2-(31,15,7)$, $2-(35,17,8)$ and
                                  $2-(36,15,6)$ designs with automorphisms
                                  of odd prime order, and their related
                                  Hadamard matrices and codes  . . . . . . 105--122
             Antonio Cossidente   Some constructions on the Hermitian
                                  surface  . . . . . . . . . . . . . . . . 123--129
          Dieter Jungnickel and   
            Vladimir D. Tonchev   Polarities, quasi-symmetric designs, and
                                  Hamada's conjecture  . . . . . . . . . . 131--140
                   Ron Shaw and   
                 Neil A. Gordon   The cubic Segre variety in PG$(5, 2)$    141--156
               John Bamberg and   
            Frank De Clerck and   
                 Nicola Durante   A hemisystem of a nonclassical
                                  generalised quadrangle . . . . . . . . . 157--165
             Michael J. Collins   Upper bounds for parent-identifying set
                                  systems  . . . . . . . . . . . . . . . . 167--173
                       Tao Feng   Difference sets with $n = 5 p^r$ . . . . 175--194
               Jooyoung Lee and   
                   Yongjin Yeom   Efficient RFID authentication protocols
                                  based on pseudorandom sequence
                                  generators . . . . . . . . . . . . . . . 195--210
            M. R. Darafsheh and   
              A. Iranmanesh and   
                  R. Kahkeshani   Some designs and codes invariant under
                                  the groups $S_9$ and A$_8$ . . . . . . . 211--223

Designs, Codes, and Cryptography
Volume 51, Number 3, June, 2009

                     H. Cao and   
                  J. Dinitz and   
                  D. Kreher and   
              D. R. Stinson and   
                         R. Wei   On orthogonal generalized equitable
                                  rectangles . . . . . . . . . . . . . . . 225--230
             Derek H. Smith and   
            Richard P. Ward and   
              Stephanie Perkins   Gold codes, Hadamard partitions and the
                                  security of CDMA systems . . . . . . . . 231--243
         Sarah Spence Adams and   
           Matthew Crawford and   
            Caitlin Greeley and   
                  Bryce Lee and   
         Mathav Kishore Murugan   Multilevel and multidimensional Hadamard
                                  matrices . . . . . . . . . . . . . . . . 245--252
                  Koji Momihara   Strong difference families, difference
                                  covers, and their applications for
                                  relative difference families . . . . . . 253--273
             Silvia Boumova and   
          Peter Boyvalenkov and   
            Hristina Kulina and   
                 Maya Stoyanova   Polynomial techniques for investigation
                                  of spherical designs . . . . . . . . . . 275--288
José Joaquín Bernal and   
Ángel del Río and   
       Juan Jacobo Simón   An intrinsical description of group
                                  codes  . . . . . . . . . . . . . . . . . 289--300
        Jessica F. Burkhart and   
             Neil J. Calkin and   
                Shuhong Gao and   
      Justine C. Hyde-Volpe and   
                Kevin James and   
                         others   Finite field elements of high order
                                  arising from modular curves  . . . . . . 301--314
              Thomas Martin and   
            Keith M. Martin and   
                     Peter Wild   Establishing the broadcast efficiency of
                                  the Subset Difference Revocation Scheme  315--334


Designs, Codes, and Cryptography
Volume 52, Number 1, July, 2009

Jaume Martí-Farré and   
            Carles Padró   Ideal secret sharing schemes whose
                                  minimal qualified subsets have at most
                                  three participants . . . . . . . . . . . 1--14
                  Lein Harn and   
                    Changlu Lin   Detection and identification of cheaters
                                  in $(t, n)$ secret sharing scheme  . . . 15--24
        Charles J. Colbourn and   
                Alan C. H. Ling   Linear hash families and forbidden
                                  configurations . . . . . . . . . . . . . 25--55
              Markus Grassl and   
              T. Aaron Gulliver   On circulant self-dual codes over small
                                  fields . . . . . . . . . . . . . . . . . 57--81
                  Yu-Ru Liu and   
               Craig V. Spencer   A generalization of Meshulam's theorem
                                  on subsets of finite abelian groups with
                                  no $3$-term arithmetic progression . . . 83--91
              Darryn Bryant and   
                Judith Egan and   
           Barbara Maenhaut and   
                 Ian M. Wanless   Indivisible plexes in latin squares  . . 93--105
                    Bin Wen and   
               Jianmin Wang and   
                   Jianxing Yin   Optimal grid holey packings with block
                                  size $3$ and $4$ . . . . . . . . . . . . 107--124
             Masaaki Harada and   
               Akihiro Munemasa   There exists no self-dual $[24, 12, 10]$
                                  code over $\mathbb{F}_5$ . . . . . . . . 125--127

Designs, Codes, and Cryptography
Volume 52, Number 2, August, 2009

                Tamir Tassa and   
                Jorge L. Villar   On proper secrets, $(t, k)$-bases and
                                  linear codes . . . . . . . . . . . . . . 129--154
             Bader AlBdaiwi and   
                Peter Horak and   
                Lorenzo Milazzo   Enumerating and decoding perfect linear
                                  Lee codes  . . . . . . . . . . . . . . . 155--162
                   John Polhill   Paley type partial difference sets in
                                  non $p$-groups . . . . . . . . . . . . . 163--169
                E. J. Cheon and   
                      T. Maruta   A new extension theorem for $3$-weight
                                  modulo $q$ linear codes over
                                  $\mathbb{F}_q$ . . . . . . . . . . . . . 171--183
          Clemens Heuberger and   
                  James A. Muir   Unbalanced digit sets and the closest
                                  choice strategy for minimal weight
                                  integer representations  . . . . . . . . 185--208
                Paul Dorbec and   
            Sylvain Gravier and   
               Iiro Honkala and   
                 Michel Mollard   Weighted codes in Lee metrics  . . . . . 209--218
        Kenneth G. Paterson and   
      Sriramkrishnan Srinivasan   On the relations between non-interactive
                                  key distribution, identity-based
                                  encryption and trapdoor discrete log
                                  groups . . . . . . . . . . . . . . . . . 219--241
                 Alan R. Prince   Pure partial planes of order $6$ with
                                  $25$ lines . . . . . . . . . . . . . . . 243--247

Designs, Codes, and Cryptography
Volume 52, Number 3, September, 2009

                  Tian Tian and   
                    Wen-Feng Qi   Linearity properties of binary FCSR
                                  sequences  . . . . . . . . . . . . . . . 249--262
               Brian Curtin and   
                  Ibtisam Daqqa   The subconstituent algebra of strongly
                                  regular graphs associated with a Latin
                                  square . . . . . . . . . . . . . . . . . 263--274
             Miwako Mishima and   
                Hung-Lin Fu and   
                  Shoichi Uruno   Optimal conflict-avoiding codes of
                                  length $n \equiv 0 \pmod 16$ and weight
                                  $3$  . . . . . . . . . . . . . . . . . . 275--291
                 A. Caranti and   
      Francesca Dalla Volta and   
                        M. Sala   An application of the O'Nan--Scott
                                  theorem to the group generated by the
                                  round functions of an AES-like cipher    293--301
              Claude Carlet and   
             Xiangyong Zeng and   
                 Chunlei Li and   
                         Lei Hu   Further properties of several classes of
                                  Boolean functions with optimum algebraic
                                  immunity . . . . . . . . . . . . . . . . 303--338
                 Koji Nuida and   
            Satoshi Fujitsu and   
            Manabu Hagiwara and   
           Takashi Kitagawa and   
            Hajime Watanabe and   
                         others   An improvement of discrete Tardos
                                  fingerprinting codes . . . . . . . . . . 339--362
               Jon-Lark Kim and   
                     Xiaoyu Liu   A generalized Gleason--Pierce--Ward
                                  theorem  . . . . . . . . . . . . . . . . 363--380
                   Dustin Moody   The Diffie--Hellman problem and
                                  generalization of Verheul's theorem  . . 381--390


Designs, Codes, and Cryptography
Volume 53, Number 1, October, 2009

          Robert S. Coulter and   
                 Todd Gutekunst   Special subsets of difference sets with
                                  particular emphasis on skew Hadamard
                                  difference sets  . . . . . . . . . . . . 1--12
                  Aidan Roy and   
                    A. J. Scott   Unitary designs and codes  . . . . . . . 13--31
                 Siman Yang and   
                        Lulu Qi   On improved asymptotic bounds for codes
                                  from global function fields  . . . . . . 33--43
         Andrzej Owsiejczuk and   
         Ma\lgorzata Prazmowska   Combinatorial generalizations of
                                  generalized quadrangles of order $(2,
                                  2)$  . . . . . . . . . . . . . . . . . . 45--57
             T. L. Alderson and   
      András Gács   On the maximality of linear codes  . . . 59--68

Designs, Codes, and Cryptography
Volume 53, Number 2, November, 2009

                     Olof Heden   Necessary and sufficient conditions for
                                  the existence of a class of partitions
                                  of a finite vector space . . . . . . . . 69--73
             Ramakanth Kavuluru   Characterization of $2^n$-periodic
                                  binary sequences with fixed $2$-error or
                                  $3$-error linear complexity  . . . . . . 75--97
     Cícero Carvalho and   
           Ercílio Silva   On algebras admitting a complete set of
                                  near weights, evaluation codes, and
                                  Goppa codes  . . . . . . . . . . . . . . 99--110
       Maria Bras-Amorós   On numerical semigroups and the
                                  redundancy of improved codes correcting
                                  generic errors . . . . . . . . . . . . . 111--118
                Simeon Ball and   
           Szabolcs L. Fancsali   Multiple blocking sets in finite
                                  projective spaces and improvements to
                                  the Griesmer bound for linear codes  . . 119--136

Designs, Codes, and Cryptography
Volume 53, Number 3, December, 2009

                Xiaohu Tang and   
              Tor Helleseth and   
                    Pingzhi Fan   A new optimal quaternary sequence family
                                  of length $2(2^n - 1)$ obtained from the
                                  orthogonal transformation of Families
                                  \mathcalB and \mathcalC  . . . . . . . . 137--148
         Michael J. Mossinghoff   Wieferich pairs and Barker sequences . . 149--163
            Stefania Fanali and   
              Massimo Giulietti   On maximal curves with Frobenius
                                  dimension $3$  . . . . . . . . . . . . . 165--174
            Alexandre Pinto and   
         André Souto and   
              Armando Matos and   
            Luís Antunes   Commitment and authentication systems    175--193
   László Csirmaz   An impossibility result on graph secret
                                  sharing  . . . . . . . . . . . . . . . . 195--209


Designs, Codes, and Cryptography
Volume 54, Number 1, January, 2010

             Antonio Cossidente   The classical $1$-system of $Q^-(7, q )$
                                  and two-character sets . . . . . . . . . 1--9
                  Zihui Liu and   
                     Wende Chen   Notes on the value function  . . . . . . 11--19
                 Guoxin Zuo and   
                   Mingyuan Xia   A special class of $T$-matrices  . . . . 21--28
Françoise Levy-dit-Vehel and   
                 Ludovic Perret   Security analysis of word problem-based
                                  cryptosystems  . . . . . . . . . . . . . 29--41
               Jianmin Wang and   
               Xiuling Shan and   
                   Jianxing Yin   On constructions for optimal
                                  two-dimensional optical orthogonal codes 43--60
            Bahattin Yildiz and   
                 Suat Karadeniz   Linear codes over $\mathbb{F}_2 + u
                                  \mathbb{F}_2 + v \mathbb{F}_2 + u v
                                  \mathbb{F}_2$  . . . . . . . . . . . . . 61--81
    Reza Rezaeian Farashahi and   
            Igor E. Shparlinski   On the number of distinct elliptic
                                  curves in some families  . . . . . . . . 83--99

Designs, Codes, and Cryptography
Volume 54, Number 2, February, 2010

               S. El-Zanati and   
                  H. Jordon and   
               G. Seelinger and   
                P. Sissokho and   
                      L. Spence   The maximum size of a partial 3-spread
                                  in a finite vector space over GF$(2)$    101--107
               Sophie Huczynska   Equidistant frequency permutation arrays
                                  and related constant composition codes   109--120
                Changshe Ma and   
                  Jian Weng and   
                 Yingjiu Li and   
                    Robert Deng   Efficient discrete logarithm based
                                  multi-signature scheme in the plain
                                  public key model . . . . . . . . . . . . 121--133
               Ivan Landjev and   
                     Leo Storme   A study of $(x(q + 1), x ; 2,
                                  q)$-minihypers . . . . . . . . . . . . . 135--147
      Maheshanand Bhaintwal and   
             Siri Krishan Wasan   Generalized Reed--Muller codes over
                                  $\mathbb{Z}_q$ . . . . . . . . . . . . . 149--166
                  J. Borges and   
C. Fernández-Córdoba and   
                   J. Pujol and   
                  J. Rif\`a and   
                  M. Villanueva   $\mathbb{Z}_2 \mathbb{Z}_4$-linear
                                  codes: generator matrices and duality    167--179
               Nathan Drake and   
           Gretchen L. Matthews   Parameter choices and a better bound on
                                  the list size in the Guruswami--Sudan
                                  algorithm for algebraic geometry codes   181--187

Designs, Codes, and Cryptography
Volume 54, Number 3, March, 2010

         Jürgen Bierbrauer   New semifields, PN and APN functions . . 189--200
      Dragomir Z. \Dbarokovi\'c   A new Yang number and consequences . . . 201--204
               Masayuki Abe and   
                   Yang Cui and   
                Hideki Imai and   
                     Eike Kiltz   Efficient hybrid encryption from
                                  ID-based encryption  . . . . . . . . . . 205--240
        Krzysztof Petelczyc and   
         Ma\lgorzata Prazmowska   Twisted Fano spaces and their
                                  classification, linear completions of
                                  systems of triangle perspectives . . . . 241--251
       Alexander A. Davydov and   
Patric R. J. Östergård   Linear codes with covering radius $3$    253--271
            J. Schillewaert and   
                  L. Storme and   
                     J. A. Thas   Minimal codewords in Reed--Muller codes  273--286
          Peter Vandendriessche   Some low-density parity-check codes
                                  derived from finite geometries . . . . . 287--297


Designs, Codes, and Cryptography
Volume 55, Number 1, April, 2010

               Junling Zhou and   
                   Yanxun Chang   New results on large sets of Kirkman
                                  triple systems . . . . . . . . . . . . . 1--7
              Norbert Knarr and   
                Markus Stroppel   Polarities and unitals in the
                                  Coulter--Matthews planes . . . . . . . . 9--18
               Mausumi Bose and   
                 Rahul Mukerjee   Optimal $(k, n)$ visual cryptographic
                                  schemes for general $k$  . . . . . . . . 19--35
             Antonio Maschietti   The group fixing a completely regular
                                  line-oval  . . . . . . . . . . . . . . . 37--43
               Hongsong Shi and   
             Shaoquan Jiang and   
                   Zhiguang Qin   More efficient DDH pseudorandom
                                  generators . . . . . . . . . . . . . . . 45--64
                  Tian Tian and   
                    Wen-Feng Qi   Expected values for the rational
                                  complexity of finite binary sequences    65--79
               Xiande Zhang and   
                     Gennian Ge   Existence of resolvable $H$-designs with
                                  group sizes $2$, $3$, $4$ and $6$  . . . 81--101

Designs, Codes, and Cryptography
Volume 55, Number 2--3, May, 2010

           Ronald C. Mullin and   
              Rainer Steinwandt   Special issue dedicated to Spyros
                                  Magliveras on the occasion of his 70th
                                  birthday . . . . . . . . . . . . . . . . 103--105
       C. Rößing and   
                      L. Storme   A spectrum result on minimal blocking
                                  sets with respect to the planes of
                                  $PG(3, q)$, $q$ odd  . . . . . . . . . . 107--119
           A. De Wispelaere and   
                 J. A. Thas and   
               H. Van Maldeghem   A characterization of the Grassmann
                                  embedding of $H(q)$, with $q$ even . . . 121--130
          Dieter Jungnickel and   
            Vladimir D. Tonchev   The number of designs with geometric
                                  parameters grows exponentially . . . . . 131--140
          Sanjit Chatterjee and   
           Darrel Hankerson and   
               Edward Knapp and   
                 Alfred Menezes   Comparing two pairing-based aggregate
                                  signature schemes  . . . . . . . . . . . 141--167
            Atefeh Mashatan and   
             Douglas R. Stinson   Practical unconditionally secure
                                  two-channel message authentication . . . 169--188
María Isabel González Vasco and   
Angel L. Pérez del Pozo and   
           Pedro Taborda Duarte   A note on the security of MST$_3$  . . . 189--200
            Charles J. Colbourn   Covering arrays from cyclotomy . . . . . 201--219
                   M. Abreu and   
                C. Balbuena and   
                     D. Labbate   Adjacency matrices of polarity graphs
                                  and of other $C_4$-free graphs of large
                                  size . . . . . . . . . . . . . . . . . . 221--233
                  Michael Huber   Block-transitive designs in affine
                                  spaces . . . . . . . . . . . . . . . . . 235--242
               Nidhi Singhi and   
              Nikhil Singhi and   
              Spyros Magliveras   Minimal logarithmic signatures for
                                  finite groups of Lie type  . . . . . . . 243--260
                R. D. Baker and   
                G. L. Ebert and   
                    K. L. Wantz   Enumeration of orthogonal Buekenhout
                                  unitals  . . . . . . . . . . . . . . . . 261--283
Gábor Korchmáros and   
                    Nicola Pace   Infinite family of large complete arcs
                                  in PG$(2, q^n)$, with $q$ odd and $n > 1$
                                  odd  . . . . . . . . . . . . . . . . . . 285--296
               N. A. Newman and   
                   C. A. Rodger   Enclosings of $\lambda$-fold 4-cycle
                                  systems  . . . . . . . . . . . . . . . . 297--310


Designs, Codes, and Cryptography
Volume 56, Number 1, July, 2010

              Marco Buratti and   
                  Anita Pasotti   Further progress on difference families
                                  with block size $4$ or $5$ . . . . . . . 1--20
                Yutaka Hiramine   Modified generalized Hadamard matrices
                                  and constructions for transversal
                                  designs  . . . . . . . . . . . . . . . . 21--33
                Lev Glebsky and   
            Igor E. Shparlinski   Short cycles in repeated exponentiation
                                  modulo a prime . . . . . . . . . . . . . 35--42
Cristina Fernández-Córdoba and   
                Jaume Pujol and   
             Merc\`e Villanueva   $\mathbb{Z}_2 \mathbb{Z}_4$-linear
                                  codes: rank and kernel . . . . . . . . . 43--59
      Eugenia O'Reilly-Regueiro   Reduction for primitive flag-transitive
                                  $(v, k, 4)$-symmetric designs  . . . . . 61--63
              Monica Nevins and   
       Camelia KarimianPour and   
                       Ali Miri   NTRU over rings beyond $\mathbb{Z}$  . . 65--78
               Ka Hin Leung and   
                 Siu Lun Ma and   
               Bernhard Schmidt   On Lander's conjecture for difference
                                  sets whose order is a power of $2$ or
                                  $3$  . . . . . . . . . . . . . . . . . . 79--84

Designs, Codes, and Cryptography
Volume 56, Number 2--3, August, 2010

               Jan De Beule and   
                  Yves Edel and   
         Emilia Käsper and   
              Andreas Klein and   
              Svetla Nikova and   
                         others   Galois geometries and applications . . . 85--86
                Simeon Ball and   
               Jan De Beule and   
                 Leo Storme and   
              Peter Sziklai and   
           Tamás Sz'onyi   In memoriam, András Gács . . . . . . . . . 87--88
                 M. Lavrauw and   
               G. Van de Voorde   On linear sets on a projective line  . . 89--104
         Antonio Cossidente and   
                 Oliver H. King   Some two-character sets  . . . . . . . . 105--113
                  G. Marino and   
                   O. Polverino   Ovoidal blocking sets and maximal
                                  partial ovoids of Hermitian varieties    115--130
            Stefania Fanali and   
              Massimo Giulietti   On some open problems on maximal curves  131--139
              Paulo Barreto and   
           Ventzislav Nikov and   
              Svetla Nikova and   
             Vincent Rijmen and   
              Elmar Tischhauser   Whirlwind: a new cryptographic hash
                                  function . . . . . . . . . . . . . . . . 141--162
                  Yves Edel and   
                   Ivan Landjev   On multiple caps in finite projective
                                  spaces . . . . . . . . . . . . . . . . . 163--175
             Angela Aguglia and   
 Gábor Korchmáros   Multiple blocking sets and multisets in
                                  Desarguesian planes  . . . . . . . . . . 177--181
                  Bart De Bruyn   On hyperovals of polar spaces  . . . . . 183--195
               Satoshi Yoshiara   Notes on APN functions, semibiplanes and
                                  dimensional dual hyperovals  . . . . . . 197--218
           F. A. B. Edoukou and   
                  A. Hallez and   
                  F. Rodier and   
                      L. Storme   The small weight codewords of the
                                  functional codes associated to
                                  non-singular Hermitian varieties . . . . 219--233
     Nóra V. Harrach and   
                   Klaus Metsch   Small point sets of $PG(n, q^3)$
                                  intersecting each $k$-subspace in $1
                                  \bmod q$ points  . . . . . . . . . . . . 235--248


Designs, Codes, and Cryptography
Volume 57, Number 1, October, 2010

            Kenneth W. Shum and   
                Wing Shing Wong   A tight asymptotic bound on the size of
                                  constant-weight conflict-avoiding codes  1--14
             John Fuelberth and   
         Athula Gunawardena and   
               C. David Shaffer   On incidence structures of nonsingular
                                  points and hyperbolic lines of ovoids in
                                  finite orthogonal spaces . . . . . . . . 15--33
                      Yves Edel   On quadratic APN functions and
                                  dimensional dual hyperovals  . . . . . . 35--44
             Ernst Schuster and   
                     Gennian Ge   On uniformly resolvable designs with
                                  block sizes $3$ and $4$  . . . . . . . . 45--69
                Amin Sakzad and   
      Mohammad-Reza Sadeghi and   
                 Daniel Panario   Codes with girth $8$ Tanner graph
                                  representation . . . . . . . . . . . . . 71--81
              Zhengjun Zhao and   
                     Xiwang Cao   A note on the reducibility of binary
                                  affine polynomials . . . . . . . . . . . 83--90
              H. B. Walikar and   
              B. D. Acharya and   
            Shailaja S. Shirkol   Designs associated with maximum
                                  independent sets of a graph  . . . . . . 91--105
                Tohru Nakashima   AG codes from vector bundles . . . . . . 107--115

Designs, Codes, and Cryptography
Volume 57, Number 2, November, 2010

              Shenglin Zhou and   
                     Huili Dong   Alternating groups and flag-transitive
                                  triplanes  . . . . . . . . . . . . . . . 117--126
         Vladimir Blinovsky and   
                   Uri Erez and   
                   Simon Litsyn   Weight distribution moments of random
                                  linear/coset codes . . . . . . . . . . . 127--138
       Gregory M. Zaverucha and   
             Douglas R. Stinson   Anonymity in shared symmetric key
                                  primitives . . . . . . . . . . . . . . . 139--160
C. Fernández-Córdoba and   
                   K. T. Phelps   On the minimum distance graph of an
                                  extended Preparata code  . . . . . . . . 161--168
               Eimear Byrne and   
           Marcus Greferath and   
               Axel Kohnert and   
                 Vitaly Skachek   New bounds for codes over finite
                                  Frobenius rings  . . . . . . . . . . . . 169--179
                Denis S. Krotov   On the binary codes with parameters of
                                  doubly-shortened 1-perfect codes . . . . 181--194
                 Seungkook Park   Minimum distance of Hermitian two-point
                                  codes  . . . . . . . . . . . . . . . . . 195--213
             Zhengchun Zhou and   
                    Xiaohu Tang   Optimal and perfect difference systems
                                  of sets from $q$-ary sequences with
                                  difference-balanced property . . . . . . 215--223

Designs, Codes, and Cryptography
Volume 57, Number 3, December, 2010

               Xiande Zhang and   
                     Gennian Ge   $H$-designs with the properties of
                                  resolvability or $(1, 2)$-resolvability  225--256
                 E. Pasalic and   
                     P. Charpin   Some results concerning
                                  cryptographically significant mappings
                                  over GF$(2^n)$ . . . . . . . . . . . . . 257--269
             Chun-peng Wang and   
                 Xiao-song Chen   On extended algebraic immunity . . . . . 271--281
        Panagiotis Rizomiliotis   On the security of the Feng--Liao--Yang
                                  Boolean functions with optimal algebraic
                                  immunity against fast algebraic attacks  283--292
                       Jin Hong   The cost of false alarms in Hellman and
                                  rainbow tradeoffs  . . . . . . . . . . . 293--327
                   Hyun Jin Kim   Self-dual codes with automorphism of
                                  order $3$ having $8$ cycles  . . . . . . 329--346
             Giorgio Donati and   
                 Nicola Durante   On the intersection of a Hermitian curve
                                  with a conic . . . . . . . . . . . . . . 347--360
              Rasha Shaheen and   
                 Arne Winterhof   Permutations of finite fields for check
                                  digit systems  . . . . . . . . . . . . . 361--371
           Ulrich Dempwolff and   
                   Timo Neumann   Geometric and design-theoretic aspects
                                  of semibent functions I  . . . . . . . . 373--381
              R. J. R. Abel and   
                  F. E. Bennett   Existence of directed BIBDs with block
                                  size $7$ and related perfect
                                  $5$-deletion-correcting codes of length
                                  $7$  . . . . . . . . . . . . . . . . . . 383--397


Designs, Codes, and Cryptography
Volume 58, Number 1, January, 2011

                     Xiaoyu Liu   An equivalence of Ward's bound and its
                                  application  . . . . . . . . . . . . . . 1--9
                    Tamir Tassa   Generalized oblivious transfer by secret
                                  sharing  . . . . . . . . . . . . . . . . 11--21
                    Jie Cui and   
                    Junying Pei   Quaternary 1-generator quasi-cyclic
                                  codes  . . . . . . . . . . . . . . . . . 23--33
              Chang-An Zhao and   
               Dongqing Xie and   
              Fangguo Zhang and   
              Jingwei Zhang and   
                 Bing-Long Chen   Computing bilinear pairings on elliptic
                                  curves with automorphisms  . . . . . . . 35--44
                  Aaram Yun and   
               Je Hong Park and   
                   Jooyoung Lee   On Lai--Massey and quasi-Feistel ciphers 45--72
Padraig Ó Catháin and   
                Marc Röder   The cocyclic Hadamard matrices of order
                                  less than $40$ . . . . . . . . . . . . . 73--88
              Marco Buratti and   
              Koji Momihara and   
                  Anita Pasotti   New results on optimal $(v, 4, 2, 1)$
                                  optical orthogonal codes . . . . . . . . 89--109

Designs, Codes, and Cryptography
Volume 58, Number 2, February, 2011

             Rajendra M. Pawale   Quasi-symmetric designs with the
                                  difference of block intersection numbers
                                  two  . . . . . . . . . . . . . . . . . . 111--121
         Sudhir R. Ghorpade and   
            Sartaj Ul Hasan and   
                   Meena Kumari   Primitive polynomials, Singer cycles and
                                  word-oriented linear feedback shift
                                  registers  . . . . . . . . . . . . . . . 123--134
                Jianguo Lei and   
                    Cuiling Fan   Optimal difference systems of sets and
                                  partition-type cyclic difference
                                  packings . . . . . . . . . . . . . . . . 135--153
                 David G. Glynn   An invariant for matrices and sets of
                                  points in prime characteristic . . . . . 155--172
             Roberto Avanzi and   
          Clemens Heuberger and   
               Helmut Prodinger   Redundant $\tau$-adic expansions I:
                                  non-adjacent digit sets and their
                                  applications to scalar multiplication    173--202
           Koichi Betsumiya and   
             Masaaki Harada and   
                 Hiroshi Kimura   Hadamard matrices of order $32$ and
                                  extremal ternary self-dual codes . . . . 203--214
                 David G. Glynn   A condition for arcs and MDS codes . . . 215--218
             Dimitrios Poulakis   Erratum to: A Variant of Digital
                                  Signature Algorithm  . . . . . . . . . . 219--219

Designs, Codes, and Cryptography
Volume 58, Number 3, March, 2011

            Bahattin Yildiz and   
                 Suat Karadeniz   Cyclic codes over $F_2 + u F_2 + v F_2 +
                                  u v F_2$ . . . . . . . . . . . . . . . . 221--234
                 Jong Hwan Park   Inner-product encryption under standard
                                  assumptions  . . . . . . . . . . . . . . 235--257
               Yongqiang Li and   
                 Mingsheng Wang   On EA-equivalence of certain
                                  permutations to power mappings . . . . . 259--269
                  Palash Sarkar   A trade-off between collision
                                  probability and key size in universal
                                  hashing using polynomials  . . . . . . . 271--278
                   Jianqin Zhou   On the $k$-error linear complexity of
                                  sequences with period $2 p^n$ over
                                  $\mathrm{GF}(q)$ . . . . . . . . . . . . 279--296
                Kwangsu Lee and   
                  Dong Hoon Lee   Improved hidden vector encryption with
                                  short ciphertexts and tokens . . . . . . 297--319
                  Hui Zhang and   
                     Gennian Ge   Completely reducible super-simple
                                  designs with block size four and related
                                  super-simple packings  . . . . . . . . . 321--346


Designs, Codes, and Cryptography
Volume 59, Number 1--3, April, 2011

    Matthew Geoffrey Parker and   
             Sasha Kholosha and   
            Pascale Charpin and   
                   Eirik Rosnes   Editorial  . . . . . . . . . . . . . . . 1--1
     Céline Blondeau and   
    Beno\^\it Gérard and   
            Jean-Pierre Tillich   Accurate estimates of the data
                                  complexity and success probability for
                                  various cryptanalyses  . . . . . . . . . 3--34
                Andrey Bogdanov   On unbalanced Feistel networks with
                                  contracting MDS diffusion  . . . . . . . 35--58
     Nina Brandstätter and   
            Gottlieb Pirsic and   
                 Arne Winterhof   Correlation of the two-prime Sidel'nikov
                                  sequence . . . . . . . . . . . . . . . . 59--68
            Lilya Budaghyan and   
                  Claude Carlet   CCZ-equivalence of bent vectorial
                                  functions and related constructions  . . 69--87
                  Claude Carlet   Relating three nonlinearity parameters
                                  of vectorial functions and building APN
                                  functions from bent functions  . . . . . 89--109
                Danyo Danev and   
           Stefan Dodunekov and   
                  Diana Radkova   A family of constacyclic ternary
                                  quasi-perfect codes with covering radius
                                  $3$  . . . . . . . . . . . . . . . . . . 111--118
       Lars Eirik Danielsen and   
              Matthew G. Parker   Directed graph representation of
                                  half-rate additive codes over
                                  $\mathrm{GF}(4)$ . . . . . . . . . . . . 119--130
          Richard G. Gibson and   
                Jonathan Jedwab   Quaternary Golay sequence pairs I: even
                                  length . . . . . . . . . . . . . . . . . 131--146
          Richard G. Gibson and   
                Jonathan Jedwab   Quaternary Golay sequence pairs II: odd
                                  length . . . . . . . . . . . . . . . . . 147--157
                David G. Harris   Critique of the related-key attack
                                  concept  . . . . . . . . . . . . . . . . 159--168
                      Marc Joye   How (Not) to design strong-RSA
                                  signatures . . . . . . . . . . . . . . . 169--182
           Torleiv Klòve   Lower bounds on the size of spheres of
                                  permutations under the Chebychev
                                  distance . . . . . . . . . . . . . . . . 183--191
          Philippe Langevin and   
                 Gregor Leander   Counting all bent functions in dimension
                                  eight $99270589265934370305785861242880$
                                  [$\approx 2^{106}$]  . . . . . . . . . . 193--205
             Gregor Leander and   
         François Rodier   Bounds on the degree of APN polynomials:
                                  the case of $x^{-1} + g(x)$  . . . . . . 207--222
               Petr Lisonek and   
                   Marko Moisio   On zeros of Kloosterman sums . . . . . . 223--230
            Subhamoy Maitra and   
                Goutam Paul and   
           Shashwat Raizada and   
             Subhabrata Sen and   
              Rudradev Sengupta   Some observations on HC-128  . . . . . . 231--245
         Stéphane Manuel   Classification and generation of
                                  disturbance vectors for collision
                                  attacks against SHA-1  . . . . . . . . . 247--263
                 Sihem Mesnager   A new class of bent and hyper-bent
                                  Boolean functions in polynomial forms    265--279
Patric R. J. Östergård and   
                  Olli Pottonen   Two optimal one-error-correcting codes
                                  of length $13$ that are not doubly
                                  shortened perfect codes  . . . . . . . . 281--285
 Elif Kurtaran Özbudak and   
        Ferruh Özbudak and   
       Zülfükar Saygi   A class of authentication codes with
                                  secrecy  . . . . . . . . . . . . . . . . 287--318
             Alexander Pott and   
                    Yin Tan and   
                   Tao Feng and   
                       San Ling   Association schemes arising from bent
                                  functions  . . . . . . . . . . . . . . . 319--331
                Kai-Uwe Schmidt   On the correlation distribution of
                                  Delsarte--Goethals sequences . . . . . . 333--347
                    Igor Semaev   Sparse Boolean equations and circuit
                                  lattices . . . . . . . . . . . . . . . . 349--364


Designs, Codes, and Cryptography
Volume 60, Number 1, July, 2011

                   Ziran Tu and   
                    Yingpu Deng   A conjecture about binary strings and
                                  its applications on constructing Boolean
                                  functions with optimal algebraic
                                  immunity . . . . . . . . . . . . . . . . 1--14
               Jongsung Kim and   
               Jaechul Sung and   
            Ermaliza Razali and   
         Raphael C.-W. Phan and   
                      Marc Joye   Notions and relations for RKA-secure
                                  permutation and function families  . . . 15--35
               Yanxun Chang and   
             Yeow Meng Chee and   
                   Junling Zhou   A pair of disjoint $3$-GDDs of type $g^t
                                  u^1$ . . . . . . . . . . . . . . . . . . 37--62
                Hossein Ghodosi   Comments on Harn--Lin's cheating
                                  detection scheme . . . . . . . . . . . . 63--66
                    Yonglin Cao   Structural properties and enumeration of
                                  $1$-generator generalized quasi-cyclic
                                  codes  . . . . . . . . . . . . . . . . . 67--79
                    Sanna Ranto   On binary linear $r$-identifying codes   81--89
                Yutaka Hiramine   A family of non class-regular symmetric
                                  transversal designs of spread type . . . 91--99

Designs, Codes, and Cryptography
Volume 60, Number 2, August, 2011

                  Horst Trinker   Cubic and higher degree bounds for codes
                                  and $(t, m, s)$-nets . . . . . . . . . . 101--121
                     Jiqiang Lu   The (related-key) impossible boomerang
                                  attack and its application to the AES
                                  block cipher . . . . . . . . . . . . . . 123--143
                 Wenping Ma and   
                    Shaohui Sun   New designs of frequency hopping
                                  sequences with low hit zone  . . . . . . 145--153
              Abbas Alhakim and   
              Mufutau Akinwande   A recursive construction of nonbinary de
                                  Bruijn sequences . . . . . . . . . . . . 155--169
                     Yin Li and   
            Gong-liang Chen and   
                    Jian-hua Li   An alternative class of irreducible
                                  polynomials for optimal extension fields 171--182
              Nikhil Singhi and   
                   Nidhi Singhi   Minimal logarithmic signatures for
                                  classical groups . . . . . . . . . . . . 183--195
       Theo Grundhöfer and   
                Boris Krinn and   
                Markus Stroppel   Non-existence of isomorphisms between
                                  certain unitals  . . . . . . . . . . . . 197--201

Designs, Codes, and Cryptography
Volume 60, Number 3, September, 2011

            V. A. Menegatto and   
             C. P. Oliveira and   
                    A. P. Peron   Exact point-distributions over the
                                  complex sphere . . . . . . . . . . . . . 203--223
              D. M. Donovan and   
                 M. J. Grannell   Designs having the parameters of
                                  projective and affine spaces . . . . . . 225--240
             Zhengchun Zhou and   
                    Xiaohu Tang   Generalized modified Gold sequences  . . 241--253
             Jong Hwan Park and   
                  Dong Hoon Lee   Fully collusion-resistant traitor
                                  tracing scheme with shorter ciphertexts  255--276
                   Klaus Metsch   A generalization of a result of
                                  Dembowski and Wagner . . . . . . . . . . 277--282
                 Miao Liang and   
                    Beiliang Du   A new class of splitting $3$-designs . . 283--290
Jesús Carrillo-Pacheco and   
                Felipe Zaldivar   On Lagrangian--Grassmannian codes  . . . 291--298


Designs, Codes, and Cryptography
Volume 61, Number 1, October, 2011

              Chia-Jung Lee and   
               Te-Tsung Lin and   
            Min-Zheng Shieh and   
              Shi-Chun Tsai and   
                   Hsin-Lung Wu   Decoding permutation arrays with ternary
                                  vectors  . . . . . . . . . . . . . . . . 1--9
            Giuseppe Marino and   
             Olga Polverino and   
                Rocco Trombetti   Towards the classification of rank $2$
                                  semifields $6$-dimensional over their
                                  center . . . . . . . . . . . . . . . . . 11--29
                   M. Bilal and   
                  J. Borges and   
            S. T. Dougherty and   
C. Fernández-Córdoba   Maximum distance separable codes over
                                  $\mathbb{Z}_4$ and $\mathbb{Z}_2 \times
                                  \mathbb{Z}_4$  . . . . . . . . . . . . . 31--40
               Sudhir Batra and   
                    S. K. Arora   Some cyclic codes of length $2 p^n$  . . 41--69
             Roberto Avanzi and   
         Waldyr Dias Benits and   
        Steven D. Galbraith and   
                    James McKee   On the distribution of the coefficients
                                  of normal forms for Frobenius expansions 71--89
     Ma\lgorzata Prazmowska and   
           Krzysztof Prazmowski   Semi-Pappus configurations;
                                  combinatorial generalizations of the
                                  Pappus configuration . . . . . . . . . . 91--103
               Alain Plagne and   
             Wolfgang A. Schmid   An application of coding theory to
                                  estimating Davenport constants . . . . . 105--118

Designs, Codes, and Cryptography
Volume 61, Number 2, November, 2011

                  Zihui Liu and   
                 Wende Chen and   
                 Zhimin Sun and   
                 Xiangyong Zeng   Further results on support weights of
                                  certain subcodes . . . . . . . . . . . . 119--129
                    E. J. Cheon   The non-existence of Griesmer codes with
                                  parameters close to codes of Belov type  131--139
                Sunghyu Han and   
                Heisook Lee and   
                    Yoonjin Lee   Binary formally self-dual odd codes  . . 141--150
             Yeow Meng Chee and   
                 Gennian Ge and   
                   Lijun Ji and   
                   San Ling and   
                   Jianxing Yin   List decodability at small radii . . . . 151--166
Jaume Martí-Farré and   
        Carles Padró and   
          Leonor Vázquez   Optimal complexity of secret sharing
                                  schemes with four minimal qualified
                                  subsets  . . . . . . . . . . . . . . . . 167--186
         Jürgen Bierbrauer   Commutative semifields from projection
                                  mappings . . . . . . . . . . . . . . . . 187--196
            Minerva Cordero and   
                     Vikram Jha   Fractional dimensions in semifields of
                                  odd order  . . . . . . . . . . . . . . . 197--221
                Hiroki Koga and   
                Takeru Ishihara   A general method for construction of
                                  $(t, n)$-threshold visual secret sharing
                                  schemes for color images . . . . . . . . 223--249

Designs, Codes, and Cryptography
Volume 61, Number 3, December, 2011

              Vladimir Edemskiy   About computation of the linear
                                  complexity of generalized cyclotomic
                                  sequences with period $p^{n + 1}$  . . . 251--260
               Carl Bracken and   
               Eimear Byrne and   
               Gary McGuire and   
                  Gabriele Nebe   On the equivalence of quadratic APN
                                  functions  . . . . . . . . . . . . . . . 261--272
                  B. Hanson and   
                 D. Panario and   
                     D. Thomson   Swan-like results for binomials and
                                  trinomials over finite fields of odd
                                  characteristic . . . . . . . . . . . . . 273--283
          R. Julian R. Abel and   
           Nigel H. N. Chan and   
                Diana Combe and   
              William D. Palmer   Existence of GBRDs with block size $4$
                                  and BRDs with block size $5$ . . . . . . 285--300
        Melsik K. Kyuregyan and   
            Gohar M. Kyureghyan   Irreducible compositions of polynomials
                                  over finite fields . . . . . . . . . . . 301--314
                Denis S. Krotov   On weight distributions of perfect
                                  colorings and completely regular codes   315--329
                        Qi Wang   The linear span of the frequency hopping
                                  sequences in optimal sets  . . . . . . . 331--344
            Andrew T. Jesso and   
              David A. Pike and   
                  Nabil Shalaby   Hamilton cycles in restricted
                                  block-intersection graphs  . . . . . . . 345--353


Designs, Codes, and Cryptography
Volume 62, Number 1, January, 2012

            Mario Lamberger and   
             Florian Mendel and   
             Vincent Rijmen and   
                   Koen Simoens   Memoryless near-collisions via coding
                                  theory . . . . . . . . . . . . . . . . . 1--18
                    Yun Fan and   
                 Guanghui Zhang   On the existence of self-dual
                                  permutation codes of finite groups . . . 19--29
                   Kenza Guenda   New MDS self-dual codes over finite
                                  fields . . . . . . . . . . . . . . . . . 31--42
           M. Christopoulou and   
             T. Garefalakis and   
                 D. Panario and   
                     D. Thomson   Gauss periods as constructions of low
                                  complexity normal bases  . . . . . . . . 43--62
           Simona Bonvicini and   
              Marco Buratti and   
             Gloria Rinaldi and   
                Tommaso Traetta   Some progress on the existence of
                                  $1$-rotational Steiner triple systems    63--78
              Wolfgang Lang and   
             Ekkehard Schneider   Turyn type Williamson matrices up to
                                  order $99$ . . . . . . . . . . . . . . . 79--84
          Maheshanand Bhaintwal   Skew quasi-cyclic codes over Galois
                                  rings  . . . . . . . . . . . . . . . . . 85--101
      Tamás Sz\Honyi and   
                  Zsuzsa Weiner   A stability theorem for lines in Galois
                                  planes of prime order  . . . . . . . . . 103--108
                 Miao Liang and   
                    Beiliang Du   A new class of $3$-fold perfect
                                  splitting authentication codes . . . . . 109--119
             Tatsuya Maruta and   
                   Yuri Yoshida   A generalized extension theorem for
                                  linear codes . . . . . . . . . . . . . . 121--130

Designs, Codes, and Cryptography
Volume 62, Number 2, February, 2012

                     Ce Shi and   
                    Yu Tang and   
                   Jianxing Yin   The equivalence between optimal
                                  detecting arrays and super-simple OAs    131--142
               Xiande Zhang and   
                  Hui Zhang and   
                     Gennian Ge   Optimal constant weight covering codes
                                  and nonuniform group divisible
                                  $3$-designs with block size four . . . . 143--160
               Xiaoshan Kai and   
                     Shixin Zhu   Negacyclic self-dual codes over finite
                                  chain rings  . . . . . . . . . . . . . . 161--174
                 David G. Glynn   The factorization of the permanent of a
                                  matrix with minimal rank in prime
                                  characteristic . . . . . . . . . . . . . 175--177
              Dongyoung Roh and   
                 Sang Geun Hahn   The square root Diffie--Hellman problem  179--187
        Ferruh Özbudak and   
                 Elif Saygi and   
       Zülfükar Saygi   A new class of quaternary LCZ sequence
                                  sets . . . . . . . . . . . . . . . . . . 189--198
                   Lijun Ji and   
                    Yang Li and   
                   Jianxing Yin   Constructions of covering arrays of
                                  strength five  . . . . . . . . . . . . . 199--208
                  J. Rif\`a and   
            F. I. Solov'eva and   
                  M. Villanueva   Intersection of Hamming codes avoiding
                                  Hamming subcodes . . . . . . . . . . . . 209--223
                   Ron Shaw and   
                Neil Gordon and   
                  Hans Havlicek   Aspects of the Segre variety
                                  $S_{1,1,1}(2) \mathcal{S}_{1,1,1}(2)$    225--239
               Ulrich Dempwolff   Geometric and design-theoretic aspects
                                  of semibent functions II . . . . . . . . 241--252

Designs, Codes, and Cryptography
Volume 62, Number 3, March, 2012

                       Tao Feng   On cyclic codes of length $2^{2^r} - 1$
                                  with two zeros whose dual codes have
                                  three weights  . . . . . . . . . . . . . 253--258
            Hossein Ghodosi and   
             Josef Pieprzyk and   
                  Ron Steinfeld   Multi-party computation with conversion
                                  of secret sharing  . . . . . . . . . . . 259--272
                K. T. Arasu and   
                     Siu Lun Ma   Nonexistence of ${\rm CW}(110, 100)$ . . 273--278
                Yutaka Hiramine   A construction for modified generalized
                                  Hadamard matrices using QGH matrices . . 279--288
                    Yupu Hu and   
                 Juntao Gao and   
                   Qing Liu and   
                    Yiwei Zhang   Fault analysis of Trivium  . . . . . . . 289--311
                    Lin Tan and   
                Wen-Feng Qi and   
                        Hong Xu   Asymptotic analysis on the normalized
                                  $k$-error linear complexity of binary
                                  sequences  . . . . . . . . . . . . . . . 313--321
              Petteri Kaski and   
        Mahdad Khatirinejad and   
Patric R. J. Östergård   Steiner triple systems satisfying the
                                  $4$-vertex condition . . . . . . . . . . 323--330
               Thomas Britz and   
             Trygve Johnsen and   
              Dillon Mayhew and   
              Keisuke Shiromoto   Wei-type duality theorems for matroids   331--341
              Hans Havlicek and   
              Boris Odehnal and   
                   Metod Saniga   On invariant notions of Segre varieties
                                  in binary projective spaces  . . . . . . 343--356
              Jordan D. Webster   Using rational idempotents to show
                                  Turyn's bound is sharp . . . . . . . . . 357--365


Designs, Codes, and Cryptography
Volume 63, Number 1, April, 2012

              Gaetan Bisson and   
           Andrew V. Sutherland   A low-memory algorithm for finding short
                                  product representations in finite groups 1--13
              D. M. Donovan and   
                 M. J. Grannell   On the number of designs with affine
                                  parameters . . . . . . . . . . . . . . . 15--27
                 Ian McLoughlin   A group ring construction of the
                                  $[48,24,12]$ type II linear block code   29--41
                   Hyun Jin Kim   The binary extremal self-dual codes of
                                  lengths $38$ and $40$  . . . . . . . . . 43--57
                   Alina Ostafe   Pseudorandom vector sequences of maximal
                                  period generated by triangular
                                  polynomial dynamical systems . . . . . . 59--72
               V. C. Mavron and   
            T. P. McDonough and   
               M. S. Shrikhande   On quasi-symmetric designs with
                                  intersection difference three  . . . . . 73--86
                Liping Wang and   
                     Qiang Wang   On explicit factors of cyclotomic
                                  polynomials over finite fields . . . . . 87--104
               Han Mao Kiah and   
               Ka Hin Leung and   
                       San Ling   A note on cyclic codes over ${\rm
                                  GR}(p^2, m)$ of length $p^k$ . . . . . . 105--112
        Steven T. Dougherty and   
             Suat Karadeniz and   
                Bahattin Yildiz   Cyclic codes over ${\rm R}_k$  . . . . . 113--126
László Csirmaz and   
            Gábor Tardos   On-line secret sharing . . . . . . . . . 127--147

Designs, Codes, and Cryptography
Volume 63, Number 2, May, 2012

        Manohar L. Aggarwal and   
              Andreas Klein and   
                     Leo Storme   The characterisation of the smallest two
                                  fold blocking sets in ${\rm PG}(n, 2)$   149--157
                J. De Beule and   
                  A. Hallez and   
                      L. Storme   A characterisation result on a
                                  particular class of non-weighted
                                  minihypers . . . . . . . . . . . . . . . 159--170
                    M. De Boeck   Small weight codewords in the dual code
                                  of points and hyperplanes in ${\rm
                                  PG}(n, q)$, $q$ even . . . . . . . . . . 171--182
                 Xiang-Dong Hou   Classification of self dual quadratic
                                  bent functions . . . . . . . . . . . . . 183--198
                 Kaoru Kurosawa   Round-efficient perfectly secure message
                                  transmission scheme against general
                                  adversary  . . . . . . . . . . . . . . . 199--207
               Aixian Zhang and   
                     Keqin Feng   Construction of cyclotomic codebooks
                                  nearly meeting the Welch bound . . . . . 209--224
            Paul Stankovski and   
               Sushmita Ruj and   
                Martin Hell and   
               Thomas Johansson   Improved distinguishers for HC-128 . . . 225--240
             Derek H. Smith and   
             Roberto Montemanni   A new table of permutation codes . . . . 241--253
             Oriol Farr\`as and   
Jessica Ruth Metcalf-Burton and   
        Carles Padró and   
          Leonor Vázquez   On the optimization of bipartite secret
                                  sharing schemes  . . . . . . . . . . . . 255--271
           Thomas W. Cusick and   
                 Younhwan Cheon   Affine equivalence for rotation
                                  symmetric Boolean functions with $2^k$
                                  variables  . . . . . . . . . . . . . . . 273--294

Designs, Codes, and Cryptography
Volume 63, Number 3, June, 2012

             Jong Yoon Hyun and   
                Heisook Lee and   
                    Yoonjin Lee   MacWilliams duality and a Gleason-type
                                  theorem on self-dual bent functions  . . 295--304
                   Kun Wang and   
                   Jianmin Wang   Semicyclic $4$-GDDs and related
                                  two-dimensional optical orthogonal codes 305--319
       Relinde P. M. J. Jurrius   Weight enumeration of codes from finite
                                  spaces . . . . . . . . . . . . . . . . . 321--330
                     Zhi Hu and   
              Patrick Longa and   
                      Maozhi Xu   Implementing the $4$-dimensional GLV
                                  method on GLS elliptic curves with
                                  $j$-invariant $0$  . . . . . . . . . . . 331--343
           Daniela Silvesan and   
                  Nabil Shalaby   Cyclic block designs with block size $3$
                                  from Skolem-type sequences . . . . . . . 345--355
               Yuemei Huang and   
                   Yanxun Chang   Two classes of optimal two-dimensional
                                  OOCs . . . . . . . . . . . . . . . . . . 357--363
                     E. Ballico   Scroll codes over curves of higher
                                  genus: reducible and superstable vector
                                  bundles  . . . . . . . . . . . . . . . . 365--377
            Antonino Simone and   
                 Boris Skori\'c   Accusation probabilities in Tardos
                                  codes: beyond the Gaussian approximation 379--412
               Guobiao Weng and   
                 Xiangyong Zeng   Further results on planar DO functions
                                  and commutative semifields . . . . . . . 413--423
             Daniel Panario and   
             Olga Sosnovski and   
              Brett Stevens and   
                     Qiang Wang   Divisibility of polynomials over finite
                                  fields and combinatorial applications    425--445


Designs, Codes, and Cryptography
Volume 64, Number 1--2, July, 2012

            Arrigo Bonisoli and   
           James Hirschfeld and   
              Spyros Magliveras   Preface: geometry, combinatorial designs
                                  and cryptology . . . . . . . . . . . . . 1--2
Gábor Korchmáros and   
          Valentino Lanzone and   
                 Angelo Sonnino   Projective $k$-arcs and $2$-level
                                  secret-sharing schemes . . . . . . . . . 3--15
            Frank De Clerck and   
          Stefaan De Winter and   
                    Thomas Maes   Singer $8$-arcs of Mathon type in PG$(2,
                                  2^7)$  . . . . . . . . . . . . . . . . . 17--31
               Lucia Indaco and   
 Gábor Korchmáros   $42$-arcs in PG$(2, q)$ left invariant
                                  by PSL$(2, 7)$ . . . . . . . . . . . . . 33--46
           Ilaria Cardinali and   
                 Antonio Pasini   Two forms related to the symplectic dual
                                  polar space in odd characteristic  . . . 47--60
              B. Temmermans and   
                 J. A. Thas and   
               H. Van Maldeghem   Collineations of polar spaces with
                                  restricted displacements . . . . . . . . 61--80
                  Bart De Bruyn   A decomposition of the universal
                                  embedding space for the near polygon
                                  \mathbb H$_n$  . . . . . . . . . . . . . 81--91
                S. E. Payne and   
                     J. A. Thas   An essay on self-dual generalized
                                  quadrangles  . . . . . . . . . . . . . . 93--103
              Philippe Cara and   
            Alice Devillers and   
            Michael Giudici and   
              Cheryl E. Praeger   Quotients of incidence geometries  . . . 105--128
             S. D. Georgiou and   
                      E. Lappas   Self-dual codes from circulant matrices  129--141
               Ka Hin Leung and   
               Bernhard Schmidt   New restrictions on possible orders of
                                  circulant Hadamard matrices  . . . . . . 143--151
        Marién Abreu and   
           Domenico Labbate and   
                   John Sheehan   Irreducible pseudo $2$-factor isomorphic
                                  cubic bipartite graphs . . . . . . . . . 153--160
Madeline González Muñiz and   
              Rainer Steinwandt   Security of message authentication codes
                                  in the presence of key-dependent
                                  messages . . . . . . . . . . . . . . . . 161--169
         Simon R. Blackburn and   
         Douglas R. Stinson and   
                 Jalaj Upadhyay   On the complexity of the herding attack
                                  and some related attacks on hash
                                  functions  . . . . . . . . . . . . . . . 171--193
          Rainer Steinwandt and   
   Adriana Suárez Corona   Identity-based non-interactive key
                                  distribution with forward security . . . 195--208
           Pascal Marquardt and   
                Pavol Svaba and   
                 Tran van Trung   Pseudorandom number generators based on
                                  random covers for finite groups  . . . . 209--220
              Otokar Grosek and   
             Peter Horák   On quasigroups with few associative
                                  triples  . . . . . . . . . . . . . . . . 221--227

Designs, Codes, and Cryptography
Volume 64, Number 3, September, 2012

                 Xiwang Cao and   
                         Lei Hu   On the reducibility of some composite
                                  polynomials over finite fields . . . . . 229--239
                Shaojing Fu and   
             Kanta Matsuura and   
                    Chao Li and   
                   Longjiang Qu   Construction of highly nonlinear
                                  resilient S-boxes with given degree  . . 241--253
                Anna Y. Pun and   
              Philip P. W. Wong   A geometric proof of a theorem on
                                  antiregularity of generalized
                                  quadrangles  . . . . . . . . . . . . . . 255--263
                 Olof Heden and   
            Juliane Lehmann and   
          Esmeralda Nastase and   
                  Papa Sissokho   Extremal sizes of subspace partitions    265--274
                Denis S. Krotov   On the binary codes with parameters of
                                  triply-shortened $1$-perfect codes . . . 275--283
                   Jianqin Zhou   A counterexample concerning the
                                  $3$-error linear complexity of
                                  $2^n$-periodic binary sequences  . . . . 285--286
             Mahdi Sajadieh and   
       Mohammad Dakhilalian and   
                 Hamid Mala and   
                  Behnaz Omoomi   On construction of involutory MDS
                                  matrices from Vandermonde Matrices in
                                  GF$(2^q)$  . . . . . . . . . . . . . . . 287--308
         Antonio Cossidente and   
                Giuseppe Marino   Hyperovals of Hermitian polar spaces . . 309--314


Designs, Codes, and Cryptography
Volume 65, Number 1--2, October, 2012

           Edwin R. van Dam and   
              Willem H. Haemers   Preface: Geometric and algebraic
                                  combinatorics  . . . . . . . . . . . . . 1--3
                Simeon Ball and   
                   Jan De Beule   On sets of vectors of a finite vector
                                  space in which every subset of basis
                                  size is a basis II . . . . . . . . . . . 5--14
          Dieter Jungnickel and   
            Vladimir D. Tonchev   A Hamada type characterization of the
                                  classical geometric designs  . . . . . . 15--28
       Aleksandar Jurisi\'c and   
                   Janos Vidali   Extremal $1$-codes in distance-regular
                                  graphs of diameter $3$ . . . . . . . . . 29--47
     Alexander L. Gavrilyuk and   
           Alexander A. Makhnev   Distance-regular graphs with
                                  intersection arrays $\{52, 35, 16; 1, 4,
                                  28\}$ and $\{69, 48, 24; 1, 4, 46\}$ do
                                  not exist  . . . . . . . . . . . . . . . 49--54
             Jack H. Koolen and   
                  Jongyook Park   A relationship between the diameter and
                                  the intersection number $c_2$ for a
                                  distance-regular graph . . . . . . . . . 55--63
                A. Blokhuis and   
                  A. E. Brouwer   Spectral characterization of a graph on
                                  the flags of the eleven point biplane    65--69
              Aart Blokhuis and   
         Andries E. Brouwer and   
              Willem H. Haemers   The graph with spectrum $14^1 2^{40}
                                  (-4)^{10} (-6)^9$  . . . . . . . . . . . 71--75
                      Hyonju Yu   On the limit points of the smallest
                                  eigenvalues of regular graphs  . . . . . 77--88
              Hirotake Kurihara   An excess theorem for spherical
                                  $2$-designs  . . . . . . . . . . . . . . 89--98
               Takuya Ikuta and   
               Akihiro Munemasa   Nomura algebras of nonsymmetric Hadamard
                                  models . . . . . . . . . . . . . . . . . 99--106
            Andries Brouwer and   
 Çiçek Güven   The generating rank of the space of
                                  short vectors in the Leech lattice mod
                                  $2$  . . . . . . . . . . . . . . . . . . 107--113
          Hendrik Van Maldeghem   Symplectic polarities of buildings of
                                  type E$_6$ . . . . . . . . . . . . . . . 115--125
                  Bart De Bruyn   The pseudo-hyperplanes and homogeneous
                                  pseudo-embeddings of AG$(n, 4)$ and
                                  PG$(n, 4)$ . . . . . . . . . . . . . . . 127--156
          William M. Kantor and   
                   Tim Penttila   Planes in which every quadrangle lies on
                                  a unique Baer subplane . . . . . . . . . 157--161

Designs, Codes, and Cryptography
Volume 65, Number 3, December, 2012

                K. T. Arasu and   
                 Xiaoyu Liu and   
                   Gary McGuire   Preface: Richard M. Wilson, Special
                                  issue honoring his 65th birthday . . . . 163--164
               Steve Butler and   
                     Ron Graham   A note on marking lines in $[k]^n$ in
                                  honor of Rick Wilson's 65th birthday . . 165--175
                Bahattin Yildiz   A lemma on binomial coefficients and
                                  applications to Lee weights modulo $2^e$
                                  of codes over $\mathbb {Z}_4$  . . . . . 177--185
                A. Blokhuis and   
              A. E. Brouwer and   
                    T. Sz\Honyi   On the chromatic number of $q$-Kneser
                                  graphs . . . . . . . . . . . . . . . . . 187--197
        Charles J. Colbourn and   
             Daniel Horsley and   
                  Chengmin Wang   Trails of triples in partial triple
                                  systems  . . . . . . . . . . . . . . . . 199--212
                 Peter J. Dukes   Coding with injections . . . . . . . . . 213--222
              W. H. Haemers and   
               M. J. P. Peeters   The maximum order of adjacency matrices
                                  of graphs with a given rank  . . . . . . 223--232
                  Noga Alon and   
         Keith E. Mellinger and   
               Dhruv Mubayi and   
        Jacques Verstraëte   The de Bruijn--Erd\Hos theorem for
                                  hypergraphs  . . . . . . . . . . . . . . 233--245
                   Tao Feng and   
                     Fan Wu and   
                     Qing Xiang   Pseudocyclic and non-amorphic fusion
                                  schemes of the cyclotomic association
                                  schemes  . . . . . . . . . . . . . . . . 247--257
         Tom Hòholdt and   
                 Heeralal Janwa   Eigenvalues and expansion of bipartite
                                  graphs . . . . . . . . . . . . . . . . . 259--273
          Fernando Hernando and   
                   Gary McGuire   Proof of a conjecture of Segre and
                                  Bartocci on monomial hyperovals in
                                  projective planes  . . . . . . . . . . . 275--289
                 Daniel J. Katz   On theorems of Delsarte--McEliece and
                                  Chevalley--Warning--Ax--Katz . . . . . . 291--324
          Jeffrey H. Dinitz and   
          Maura B. Paterson and   
         Douglas R. Stinson and   
                   Ruizhong Wei   Constructions for retransmission
                                  permutation arrays . . . . . . . . . . . 325--351
          Niranjan Balachandran   Forbidden configurations and Steiner
                                  designs  . . . . . . . . . . . . . . . . 353--364
               Navin Singhi and   
            D. K. Ray-Chaudhuri   Studying designs via multisets . . . . . 365--381
                       P. Baldi   Boolean autoencoders and hypercube
                                  clustering complexity  . . . . . . . . . 383--403


Designs, Codes, and Cryptography
Volume 66, Number 1--3, January, 2013

               Daniel Augot and   
              Anne Canteaut and   
               Gohar Kyureghyan   Editorial  . . . . . . . . . . . . . . . 1--2
               Eimear Byrne and   
           Marcus Greferath and   
                   Jaume Pernas   Algebraic decoding of negacyclic codes
                                  over $\mathbb{Z}_4$  . . . . . . . . . . 3--16
        Patrick Solé and   
           Jean-Claude Belfiore   Constructive spherical codes near the
                                  Shannon bound  . . . . . . . . . . . . . 17--26
              Thomas Honold and   
                   Ivan Landjev   Non-free extensions of the simplex codes
                                  over a chain ring with four elements . . 27--38
          Michael Kiermaier and   
              Johannes Zwanzger   New ring-linear codes from dualization
                                  in projective Hjelmslev geometries . . . 39--55
        Antonia Wachter-Zeh and   
            Valentin Afanassiev   Fast decoding of Gabidulin codes . . . . 57--73
            Andrey Bogdanov and   
                Kyoji Shibutani   Generalized Feistel networks revisited   75--97
             Alexander Pott and   
                       Yue Zhou   CCZ and EA equivalence between mappings
                                  over finite Abelian groups . . . . . . . 99--109
            Ernst Schulte-Geers   On CCZ-equivalence of addition $ \bmod
                                  2^n $  . . . . . . . . . . . . . . . . . 111--127
            L. A. Bassalygo and   
                 V. A. Zinoviev   On divisibility of exponential sums of
                                  polynomials of special type over fields
                                  of characteristic $2$  . . . . . . . . . 129--143
           Marcus Greferath and   
            Cathy Mc Fadden and   
            Jens Zumbrägel   Characteristics of invariant weights
                                  related to code equivalence over rings   145--156
             Santanu Sarkar and   
                Subhamoy Maitra   Cryptanalytic results on `Dual CRT' and
                                  `Common Prime' RSA . . . . . . . . . . . 157--174
           Andrea Röck and   
                   Kaisa Nyberg   Generalization of Matsui's Algorithm $1$
                                  to linear hull for key-alternating block
                                  ciphers  . . . . . . . . . . . . . . . . 175--193
                  Olav Geil and   
                 Casper Thomsen   Weighted Reed--Muller codes revisited    195--220
               Peter Beelen and   
                    Diego Ruano   Bounding the number of points on a curve
                                  using a generalization of Weierstrass
                                  semigroups . . . . . . . . . . . . . . . 221--230
Ayça Çesmelioglu and   
                 Wilfried Meidl   A construction of bent functions from
                                  plateaued functions  . . . . . . . . . . 231--242
        Sugata Gangopadhyay and   
                Anand Joshi and   
                 Gregor Leander   A new construction of bent functions
                                  based on $\mathbb{Z}$-bent functions . . 243--256
             Wilfried Meidl and   
                 Alev Topuzoglu   Quadratic functions with prescribed
                                  spectra  . . . . . . . . . . . . . . . . 257--273
          Joachim Rosenthal and   
            Anna-Lena Trautmann   A complete characterization of
                                  irreducible cyclic orbit codes and their
                                  Plücker embedding . . . . . . . . . . . . 275--289
             Alain Couvreur and   
                   Iwan Duursma   Evaluation codes from smooth quadric
                                  surfaces and twisted Segr\`e varieties   291--303


Designs, Codes, and Cryptography
Volume 67, Number 1, April, 2013

                Shuhong Gao and   
                 Raymond Heindl   Multivariate public key cryptosystems
                                  from Diophantine equations . . . . . . . 1--18
                     Jie Li and   
             Xiangyong Zeng and   
                Xiaohu Tang and   
                     Chunlei Li   A family of quadriphase sequences of
                                  period $ 4(2^n - 1) $ with low
                                  correlation and large linear span  . . . 19--35
                   Mieko Yamada   Difference sets over Galois rings with
                                  odd extension degrees and characteristic
                                  an even power of $2$ . . . . . . . . . . 37--57
                Yonglin Cao and   
                       Jian Gao   Constructing quasi-cyclic codes from
                                  linear algebra theory  . . . . . . . . . 59--75
                  Deng Tang and   
               Weiguo Zhang and   
                    Xiaohu Tang   Construction of balanced Boolean
                                  functions with high nonlinearity and
                                  good autocorrelation properties  . . . . 77--91
            Dimitri Leemans and   
                B. G. Rodrigues   Binary codes of some strongly regular
                                  subgraphs of the McLaughlin graph  . . . 93--109
               Mausumi Bose and   
                  Aloke Dey and   
                 Rahul Mukerjee   Key predistribution schemes for
                                  distributed sensor networks via block
                                  designs  . . . . . . . . . . . . . . . . 111--136
               John Bamberg and   
            Michael Giudici and   
                Gordon F. Royle   Hemisystems of small flock generalized
                                  quadrangles  . . . . . . . . . . . . . . 137--157

Designs, Codes, and Cryptography
Volume 67, Number 2, May, 2013

              Dina Ghinelli and   
        J. W. P. Hirschfeld and   
              Dieter Jungnickel   Obituary: Daniel R. Hughes (1927--2012)  159--162
              Dina Ghinelli and   
              Dieter Jungnickel   Obituary: Marialuisa J. de Resmini
                                  (1939--2012) . . . . . . . . . . . . . . 163--167
         Motahhareh Gharahi and   
        Massoud Hadian Dehkordi   The complexity of the graph access
                                  structures on six participants . . . . . 169--173
                Huajin Chen and   
                  Tian Tian and   
                     Wenfeng Qi   On the affine equivalence relation
                                  between two classes of Boolean functions
                                  with optimal algebraic immunity  . . . . 175--185
          Ibrahim Özen and   
                      Eda Tekin   Moments of the support weight
                                  distribution of linear codes . . . . . . 187--196
              Fangguo Zhang and   
                      Ping Wang   Speeding up elliptic curve discrete
                                  logarithm computations with point
                                  halving  . . . . . . . . . . . . . . . . 197--208
         Frederik Armknecht and   
       Stefan Katzenbeisser and   
                  Andreas Peter   Group homomorphic encryption:
                                  characterizations, impossibility
                                  results, and applications  . . . . . . . 209--232
                   Kun Wang and   
                   Jianxing Yin   Further results on the existence of
                                  nested orthogonal arrays . . . . . . . . 233--243
               Ian Goldberg and   
            Douglas Stebila and   
               Berkant Ustaoglu   Anonymity and one-way authentication in
                                  key exchange protocols . . . . . . . . . 245--269
                  Hoon Hong and   
               Eunjeong Lee and   
             Hyang-Sook Lee and   
                 Cheol-Min Park   Simple and exact formula for minimum
                                  loop length in Ate$_i$ pairing based on
                                  Brezing--Weng curves . . . . . . . . . . 271--292

Designs, Codes, and Cryptography
Volume 67, Number 3, June, 2013

             Kiyoshi Nagata and   
              Fidel Nemenzo and   
                     Hideo Wada   Mass formula and structure of self-dual
                                  codes over Z2s ${\bf Z}_{2^s}$ . . . . . 293--316
              Zhixiong Chen and   
                      Xiaoni Du   On the linear complexity of binary
                                  threshold sequences derived from Fermat
                                  quotients  . . . . . . . . . . . . . . . 317--323
                  Pinhui Ke and   
                  Jie Zhang and   
                Shengyuan Zhang   On the linear complexity and the
                                  autocorrelation of generalized
                                  cyclotomic binary sequences of length $
                                  2 p^m $  . . . . . . . . . . . . . . . . 325--339
             Kristin Lauter and   
                     Ning Shang   Generating pairing-friendly parameters
                                  for the CM construction of genus $2$
                                  curves over prime fields . . . . . . . . 341--355
              Orr Dunkelman and   
                  Nathan Keller   Cryptanalysis of the Stream Cipher LEX   357--373
                Luca Giuzzi and   
                 Valentina Pepe   Families of twisted tensor product codes 375--384
          Neil I. Gillespie and   
              Cheryl E. Praeger   Neighbour transitivity on codes in
                                  Hamming graphs . . . . . . . . . . . . . 385--393
            Jaime Gutierrez and   
         Álvar Ibeas and   
Domingo Gómez-Pérez and   
            Igor E. Shparlinski   Predicting masked linear pseudorandom
                                  number generators over finite fields . . 395--402


Designs, Codes, and Cryptography
Volume 68, Number 1--3, July, 2013

                D. Ghinelli and   
        J. W. P. Hirschfeld and   
              D. Jungnickel and   
                     J. A. Thas   Editorial: Finite geometries . . . . . . 1--2
                   Jan De Beule   On large maximal partial ovoids of the
                                  parabolic quadric $ Q(4, q) $  . . . . . 3--10
               L. Beukemann and   
                      K. Metsch   Small tight sets of hyperbolic quadrics  11--24
              Peter Sziklai and   
         Geertrui Van de Voorde   A small minimal blocking set in $ {\rm
                                  PG}(n, p^t) $, spanning a $ (t - 1)
                                  $-space, is linear . . . . . . . . . . . 25--32
                 Morgan Rodgers   Cameron--Liebler line classes  . . . . . 33--37
                 David G. Glynn   Permanent formulae from the Veronesean   39--47
               Anton Betten and   
               Eun Ju Cheon and   
             Seon Jeong Kim and   
                 Tatsuya Maruta   Three families of multiple blocking sets
                                  in Desarguesian projective planes of
                                  even order . . . . . . . . . . . . . . . 49--59
          Massimo Giulietti and   
 Gábor Korchmáros   Arcs in $ {\rm AG} (2, q) $ determining
                                  few directions . . . . . . . . . . . . . 61--72
          Massimo Giulietti and   
Gábor Korchmáros and   
          Stefano Marcugini and   
             Fernanda Pambianco   Transitive $ A_6 $-invariant $k$-arcs in
                                  $ {\rm PG}(2, q) $ . . . . . . . . . . . 73--79
               Ulrich Dempwolff   More translation planes and semifields
                                  from Dembowski--Ostrom polynomials . . . 81--103
              Thomas Honold and   
              Michael Kiermaier   The existence of maximal $ (q^2, 2)
                                  $-arcs in projective Hjelmslev planes
                                  over chain rings of length $2$ and odd
                                  prime characteristic . . . . . . . . . . 105--126
              Carmen Amarra and   
            Michael Giudici and   
              Cheryl E. Praeger   Symmetric diameter two graphs with
                                  affine-type vertex-quasiprimitive
                                  automorphism group . . . . . . . . . . . 127--139
               Yu Qing Chen and   
                       Tao Feng   Abelian and non-abelian Paley type group
                                  schemes  . . . . . . . . . . . . . . . . 141--154
               John Polhill and   
             James A. Davis and   
                      Ken Smith   A new product construction for partial
                                  difference sets  . . . . . . . . . . . . 155--161
          Dieter Jungnickel and   
            Vladimir D. Tonchev   New invariants for incidence structures  163--177
                  Kris Coolsaet   On the classification of nonsingular $ 2
                                  \times 2 \times 2 \times 2 $ hypercubes  179--194
                 David G. Glynn   Nonfactorizable nonsingular hypercubes   195--203
                 Michel Lavrauw   Finite semifields and nonsingular
                                  tensors  . . . . . . . . . . . . . . . . 205--227
           Ilaria Cardinali and   
                 Antonio Pasini   On certain forms and quadrics related to
                                  symplectic dual polar spaces in
                                  characteristic $2$ . . . . . . . . . . . 229--258
                  Bart De Bruyn   The pseudo-hyperplanes and homogeneous
                                  pseudo-embeddings of the generalized
                                  quadrangles of order $ (3, t) $  . . . . 259--284


Designs, Codes, and Cryptography
Volume 69, Number 1, October, 2013

                Luk Bettale and   
     Jean-Charles Faug\`ere and   
                 Ludovic Perret   Cryptanalysis of HFE, multi-HFE and
                                  variants for odd and even characteristic 1--52
                  Gang Chen and   
                       Ruihu Li   Ternary self-orthogonal codes of dual
                                  distance three and ternary quantum codes
                                  of distance three  . . . . . . . . . . . 53--63
               Xiande Zhang and   
                     Gennian Ge   A new existence proof for Steiner
                                  quadruple systems  . . . . . . . . . . . 65--76
         Pantelimon Stanica and   
             Thor Martinsen and   
        Sugata Gangopadhyay and   
            Brajesh Kumar Singh   Bent and generalized bent Boolean
                                  functions  . . . . . . . . . . . . . . . 77--94
             Derek H. Smith and   
             Roberto Montemanni   Permutation codes with specified packing
                                  radius . . . . . . . . . . . . . . . . . 95--106
                 Todd D. Mateer   Simple algorithms for decoding
                                  systematic Reed--Solomon codes . . . . . 107--121
                 C. Munuera and   
        A. Sepúlveda and   
                      F. Torres   Generalized Hermitian codes  . . . . . . 123--130
          Fernando Hernando and   
              Kyle Marshall and   
          Michael E. O'Sullivan   The dimension of subcode-subfields of
                                  shortened generalized Reed--Solomon
                                  codes  . . . . . . . . . . . . . . . . . 131--142

Designs, Codes, and Cryptography
Volume 69, Number 2, November, 2013

                G. Lunardon and   
                  G. Marino and   
               O. Polverino and   
                   R. Trombetti   A remark on symplectic semifield planes
                                  and $ Z_4 $-linear codes . . . . . . . . 143--149
                 Nikolay Yankov   New optimal $ [52, 26, 10] $ self-dual
                                  codes  . . . . . . . . . . . . . . . . . 151--159
    E. Martínez-Moro and   
A. Piñera-Nicolás and   
               I. F. Rúa   Additive semisimple multivariable codes
                                  over $ {\mathbb {F}_4} $ . . . . . . . . 161--180
            Sylvain Gravier and   
               Matjaz Kovse and   
             Michel Mollard and   
              Julien Moncel and   
                  Aline Parreau   New results on variants of covering
                                  codes in Sierpi\'nski graphs . . . . . . 181--188
          R. Julian R. Abel and   
                Diana Combe and   
           Adrian M. Nelson and   
              William D. Palmer   GBRDs over supersolvable groups and
                                  solvable groups of order prime to $3$    189--201
         Aleksandr Tuxanidy and   
                     Qiang Wang   Composed products and factors of
                                  cyclotomic polynomials over finite
                                  fields . . . . . . . . . . . . . . . . . 203--231
                   Liqin Hu and   
                        Qin Yue   Gauss periods and codebooks from
                                  generalized cyclotomic sets of order
                                  four . . . . . . . . . . . . . . . . . . 233--246
                   Fang Liu and   
               Daiyuan Peng and   
             Zhengchun Zhou and   
                    Xiaohu Tang   A new frequency-hopping sequence set
                                  based upon generalized cyclotomy . . . . 247--259

Designs, Codes, and Cryptography
Volume 69, Number 3, December, 2013

              Dieter Jungnickel   Obituary: Hanfried Lenz (1916--2013) . . 261--263
                  Tengyu Ma and   
               Xiaoming Sun and   
                    Huacheng Yu   On a conjecture of Butler and Graham . . 265--274
             Zhuojun Zhuang and   
                   Yuan Luo and   
                        Bin Dai   Code constructions and existence bounds
                                  for relative generalized Hamming weight  275--297
                 Ichiro Shimada   A note on rational normal curves totally
                                  tangent to a Hermitian variety . . . . . 299--303
                   O. Heden and   
                 J. Lehmann and   
                 E. Nastase and   
                    P. Sissokho   The supertail of a subspace partition    305--316
           N. Rajesh Pillai and   
                     S. S. Bedi   Algebraic attacks on a class of stream
                                  ciphers with unknown output function . . 317--330
           Alexis Bonnecaze and   
             Pierre Liardet and   
              Alexandre Venelli   AES side-channel countermeasure using
                                  random tower field constructions . . . . 331--349
                  Palash Sarkar   A new multi-linear universal hash family 351--367
          Marjan Bazrafshan and   
                 Tran van Trung   Improved bounds for separating hash
                                  families . . . . . . . . . . . . . . . . 369--382


Designs, Codes, and Cryptography
Volume 70, Number 1--2, January, 2014

             Joaquim Borges and   
         Merc\`e Villanueva and   
                Victor Zinoviev   Editorial: 3rd International Castle
                                  Meeting on Coding Theory and
                                  Applications . . . . . . . . . . . . . . 1--2
                David Auger and   
        Gérard Cohen and   
                 Sihem Mesnager   Sphere coverings and identifying codes   3--7
                   Sabine Kampf   Bounds on collaborative decoding of
                                  interleaved Hermitian codes and virtual
                                  extension  . . . . . . . . . . . . . . . 9--25
          Padmapani Seneviratne   Codes associated with circulant graphs
                                  and permutation decoding . . . . . . . . 27--33
                D. Ghinelli and   
                  J. D. Key and   
                T. P. McDonough   Hulls of codes from incidence matrices
                                  of connected regular graphs  . . . . . . 35--54
         Vladimir Sidorenko and   
                 Martin Bossert   Fast skew-feedback shift-register
                                  synthesis  . . . . . . . . . . . . . . . 55--67
             Anton Malevich and   
               Wolfgang Willems   On the classification of the extremal
                                  self-dual codes over small fields with
                                  $2$-transitive automorphism groups . . . 69--76
                  C. Araujo and   
                  I. Dejter and   
                       P. Horak   A generalization of Lee codes  . . . . . 77--90
           Kathryn Haymaker and   
            Christine A. Kelley   Geometric WOM codes and coding
                                  strategies for multilevel flash memories 91--104
               Jaume Pernas and   
                Jaume Pujol and   
             Merc\`e Villanueva   Characterization of the automorphism
                                  group of quaternary linear Hadamard
                                  codes  . . . . . . . . . . . . . . . . . 105--115
   Maria Bras-Amorós and   
               Albert Vico-Oton   On the Geil--Matsumoto bound and the
                                  length of AG codes . . . . . . . . . . . 117--125
                 Thomas Feulner   Classification and nonexistence results
                                  for linear codes with prescribed minimum
                                  distances  . . . . . . . . . . . . . . . 127--138
             Joaquim Borges and   
               Josep Rif\`a and   
                Victor Zinoviev   New families of completely regular codes
                                  and their corresponding distance regular
                                  coset graphs . . . . . . . . . . . . . . 139--148
               M. Tomlinson and   
                  M. Jibril and   
                   C. Tjhai and   
                  M. Grassl and   
                    M. Z. Ahmed   New binary codes from extended Goppa
                                  codes  . . . . . . . . . . . . . . . . . 149--156
     Fernando Piñero and   
                 Heeralal Janwa   On the subfield subcodes of Hermitian
                                  codes  . . . . . . . . . . . . . . . . . 157--173
José Joaquín Bernal and   
       Juan Jacobo Simón   Information sets in abelian codes:
                                  defining sets and Groebner basis . . . . 175--188
                 C. Galindo and   
                   F. Monserrat   Evaluation codes defined by finite
                                  families of plane valuations at infinity 189--213
Irene Márquez-Corbella and   
 Edgar Martínez-Moro and   
                 Ruud Pellikaan   On the unique representation of very
                                  strong algebraic geometry codes  . . . . 215--230
                  Eraj Khan and   
            Ernst Gabidulin and   
              Bahram Honary and   
                   Hassan Ahmed   Modified Niederreiter type of GPT
                                  cryptosystem based on reducible rank
                                  codes  . . . . . . . . . . . . . . . . . 231--239
                Telma Pinho and   
               Raquel Pinto and   
                    Paula Rocha   Realization of $2$D convolutional codes
                                  of rate $ \frac {1}{n} $ by separable
                                  Roesser models . . . . . . . . . . . . . 241--250

Designs, Codes, and Cryptography
Volume 70, Number 3, March, 2014

              Kota Ideguchi and   
          Elmar Tischhauser and   
                   Bart Preneel   Internal differential collision attacks
                                  on the reduced-round Gròstl-0 hash
                                  function . . . . . . . . . . . . . . . . 251--271
                      Junhua Wu   Proofs of two conjectures on the
                                  dimensions of binary codes . . . . . . . 273--304
                Soohak Choi and   
             Jong Yoon Hyun and   
                 Hyun Kwang Kim   Local duality theorem for $q$-ary
                                  $1$-perfect codes  . . . . . . . . . . . 305--311
              Myung-Kyu Lee and   
               Kyeongcheol Yang   The exponent of a polarizing matrix
                                  constructed from the Kronecker product   313--322
             Javier Herranz and   
             Alexandre Ruiz and   
      Germán Sáez   Signcryption schemes with threshold
                                  unsigncryption, and applications . . . . 323--345
               Aicha Batoul and   
               Kenza Guenda and   
              T. Aaron Gulliver   On self-dual cyclic codes over finite
                                  chain rings  . . . . . . . . . . . . . . 347--358
            Qun-Xiong Zheng and   
                Wen-Feng Qi and   
                      Tian Tian   On the distinctness of modular
                                  reductions of primitive sequences over $
                                  Z / (2^{32} - 1) $ . . . . . . . . . . . 359--368
            Andrey Bogdanov and   
                 Vincent Rijmen   Linear hulls with correlation zero and
                                  linear cryptanalysis of block ciphers    369--383
        Ferruh Özbudak and   
   Burcu Gülmez Temür   Finite number of fibre products of
                                  Kummer covers and curves with many
                                  points over finite fields  . . . . . . . 385--404
                 D. Boucher and   
                       F. Ulmer   Linear codes using skew polynomials with
                                  automorphisms and derivations  . . . . . 405--431


Designs, Codes, and Cryptography
Volume 71, Number 1, April, 2014

              Aart Blokhuis and   
         Andries E. Brouwer and   
                    Attila Sali   Note on the size of binary Armstrong
                                  codes  . . . . . . . . . . . . . . . . . 1--4
      Hiram H. López and   
Carlos Rentería-Márquez and   
           Rafael H. Villarreal   Affine cartesian codes . . . . . . . . . 5--19
                 D. Bartoli and   
                M. De Boeck and   
                  S. Fanali and   
                      L. Storme   On the functional codes defined by
                                  quadrics and Hermitian varieties . . . . 21--46
                 Guangfu Wu and   
            Hsin-Chiu Chang and   
                   Lin Wang and   
                   T. K. Truong   Constructing rate $ 1 / p $ systematic
                                  binary quasi-cyclic codes based on the
                                  matroid theory . . . . . . . . . . . . . 47--56
                N. P. Smart and   
                 F. Vercauteren   Fully homomorphic SIMD operations  . . . 57--81
            Thijs Laarhoven and   
                 Benne de Weger   Optimal symmetric Tardos traitor tracing
                                  schemes  . . . . . . . . . . . . . . . . 83--103
                    P. Loidreau   Asymptotic behaviour of codes in rank
                                  metric over finite fields  . . . . . . . 105--118
            Anuradha Sharma and   
                 Amit K. Sharma   On some new $m$-spotty Lee weight
                                  enumerators  . . . . . . . . . . . . . . 119--152
                S. Arumugam and   
              R. Lakshmanan and   
                Atulya K. Nagar   On ( $k$, n )*-visual cryptography
                                  scheme . . . . . . . . . . . . . . . . . 153--162
                  Tian Tian and   
                    Wen-Feng Qi   On the largest affine sub-families of a
                                  family of NFSR sequences . . . . . . . . 163--181

Designs, Codes, and Cryptography
Volume 71, Number 2, May, 2014

                  Sihong Su and   
                    Xiaohu Tang   Construction of rotation symmetric
                                  Boolean functions with optimal algebraic
                                  immunity and high nonlinearity . . . . . 183--199
                    Yun Fan and   
                   San Ling and   
                    Hongwei Liu   Matrix product codes over finite
                                  commutative Frobenius rings  . . . . . . 201--227
              Alexander Zeh and   
               Sergey Bezzateev   A new bound on the minimum distance of
                                  cyclic codes using
                                  small-minimum-distance cyclic codes  . . 229--246
               Tomas Nilson and   
                  Pia Heidtmann   Inner balance of symmetric designs . . . 247--260
        Antonia Wachter-Zeh and   
              Alexander Zeh and   
                 Martin Bossert   Decoding interleaved Reed--Solomon codes
                                  beyond their joint error-correcting
                                  capability . . . . . . . . . . . . . . . 261--281
                Peter Dukes and   
                    Leah Howard   Group divisible designs in MOLS of order
                                  ten  . . . . . . . . . . . . . . . . . . 283--291
                Reza Sepahi and   
              Ron Steinfeld and   
                 Josef Pieprzyk   Lattice-based completely non-malleable
                                  public-key encryption in the standard
                                  model  . . . . . . . . . . . . . . . . . 293--313
                 Peipei Dai and   
               Jianmin Wang and   
                   Jianxing Yin   Combinatorial constructions for optimal
                                  $2$-D optical orthogonal codes with
                                  AM--OPPTS property . . . . . . . . . . . 315--330
                Caixue Zhou and   
                   Wan Zhou and   
                     Xiwei Dong   Provable certificateless generalized
                                  signcryption scheme  . . . . . . . . . . 331--346
                   Jie Chen and   
               Hoon Wei Lim and   
                   San Ling and   
                  Huaxiong Wang   The relation and transformation between
                                  hierarchical inner product encryption
                                  and spatial encryption . . . . . . . . . 347--364

Designs, Codes, and Cryptography
Volume 71, Number 3, June, 2014

                Mingzhi Zhu and   
                     Gennian Ge   Room squares with super-simple property  365--381
           Vladimir Anashin and   
          Andrei Khrennikov and   
               Ekaterina Yurova   $T$-functions revisited: new criteria
                                  for bijectivity/transitivity . . . . . . 383--407
               Christophe Petit   Towards factoring in $ {\rm SL}(2,
                                  \mathbb {F}_{2^n}) $ . . . . . . . . . . 409--431
          Maura B. Paterson and   
             Douglas R. Stinson   A unified approach to combinatorial key
                                  predistribution schemes for sensor
                                  networks . . . . . . . . . . . . . . . . 433--457
             Johannes Braun and   
          Johannes Buchmann and   
              Ciaran Mullan and   
                 Alex Wiesmaier   Long term confidentiality: a survey  . . 459--478
               Anthony B. Evans   Mutually orthogonal Latin squares based
                                  on general linear groups . . . . . . . . 479--492
                 Nam Yul Yu and   
                 Keqin Feng and   
                   Aixian Zhang   A new class of near-optimal partial
                                  Fourier codebooks from an almost
                                  difference set . . . . . . . . . . . . . 493--501
               Klara Stokes and   
                 Oriol Farr\`as   Linear spaces and transversal designs:
                                  $k$-anonymous combinatorial
                                  configurations for anonymous database
                                  search notes . . . . . . . . . . . . . . 503--524
               Klara Stokes and   
                 Oriol Farr\`as   Erratum to: Linear spaces and
                                  transversal designs: $ (k)$-anonymous
                                  combinatorial configurations for
                                  anonymous database search  . . . . . . . 525--525
               Wakaha Ogata and   
                 Hiroshi Eguchi   Cheating detectable threshold scheme
                                  against most powerful cheaters for long
                                  secrets  . . . . . . . . . . . . . . . . 527--539
              S. G. Barwick and   
                 Wen-Ai Jackson   A characterisation of tangent subplanes
                                  of $ {\rm PG}(2, q^3) $  . . . . . . . . 541--545


Designs, Codes, and Cryptography
Volume 72, Number 1, July, 2014

               John Bamberg and   
               Jan De Beule and   
             Nicola Durante and   
                 Michel Lavrauw   Editorial: Special issue on finite
                                  geometries in honor of Frank De Clerck   1--5
              Dina Ghinelli and   
          Dieter Jungnickel and   
                   Klaus Metsch   Remarks on polarity designs  . . . . . . 7--19
                A. Blokhuis and   
                M. De Boeck and   
                F. Mazzocca and   
                      L. Storme   The Kakeya problem: a gap in the
                                  spectrum and classification of the
                                  smallest examples  . . . . . . . . . . . 21--31
                  S. Rottey and   
                      L. Storme   Maximal partial line spreads of
                                  non-singular quadrics  . . . . . . . . . 33--51
Gábor Korchmáros and   
                    Nicola Pace   Coset intersection of irreducible plane
                                  cubics . . . . . . . . . . . . . . . . . 53--75
               Maarten De Boeck   The largest Erd\Hos--Ko--Rado sets of
                                  planes in finite projective and finite
                                  classical polar spaces . . . . . . . . . 77--117
                  Kris Coolsaet   Some large partial ovoids of $ (Q^{-(5,
                                  q)}) $ for odd $q$ . . . . . . . . . . . 119--128
            Daniele Bartoli and   
          Stefano Marcugini and   
             Fernanda Pambianco   The non-existence of some NMDS codes and
                                  the extremal sizes of complete $ (n,
                                  3)$-arcs in $ {\rm PG}(2, 16)$ . . . . . 129--134
             Giorgio Donati and   
             Nicola Durante and   
           Alessandro Siciliano   On unitals in $ {\rm PG}(2, q^2) $
                                  stabilized by a homology group . . . . . 135--139
        Max Neunhöffer and   
              Cheryl E. Praeger   Sporadic neighbour-transitive codes in
                                  Johnson graphs . . . . . . . . . . . . . 141--152
           Gábor P. Nagy   Linear groups as right multiplication
                                  groups of quasifields  . . . . . . . . . 153--164
            Dean Crnkovi\'c and   
              Willem H. Haemers   Walk-regular divisible design graphs . . 165--175
                    Simeon Ball   A $p$-adic condition on the weight of a
                                  codeword of a linear code  . . . . . . . 177--183
             Nicola Durante and   
           Alessandro Siciliano   Some blocking semiovals of homology type
                                  in planes of square order  . . . . . . . 185--193

Designs, Codes, and Cryptography
Volume 72, Number 2, August, 2014

                     Alan J. Aw   The multicovering radius problem for
                                  some types of discrete structures  . . . 195--209
         Antonio Cossidente and   
            Giuseppe Marino and   
                   Tim Penttila   Relative symplectic subquadrangle
                                  hemisystems of the Hermitian surface . . 211--217
             Zhuojun Zhuang and   
                    Bin Dai and   
                   Yuan Luo and   
                A. J. Han Vinck   On the relative profiles of a linear
                                  code and a subcode . . . . . . . . . . . 219--247
               Yongqiang Li and   
                 Mingsheng Wang   Constructing differentially $4$-uniform
                                  permutations over $ {\rm GF}(2^{2m})$
                                  from quadratic APN permutations over $
                                  {\rm GF}(2^{2 m + 1})$ . . . . . . . . . 249--264
              Stanley Payne and   
                 Morgan Rodgers   Double $k$-sets in symplectic
                                  generalized quadrangles  . . . . . . . . 265--271
             Jong Yoon Hyun and   
                Heisook Lee and   
                    Yoonjin Lee   Boolean functions with MacWilliams
                                  duality  . . . . . . . . . . . . . . . . 273--287
                Hung-Lin Fu and   
               Yuan-Hsun Lo and   
                Kenneth W. Shum   Optimal conflict-avoiding codes of odd
                                  length and weight three  . . . . . . . . 289--309
         Ferdinand Ihringer and   
                   Klaus Metsch   On the maximum size of Erd\Hos--Ko--Rado
                                  sets in $ H(2 d + 1, q^2) $  . . . . . . 311--316
               Carl Bracken and   
             Faruk Göloglu   A non-cyclic triple-error-correcting
                                  BCH-like code and some minimum distance
                                  results  . . . . . . . . . . . . . . . . 317--330
                    Jay A. Wood   Relative one-weight linear codes . . . . 331--344
              C. M. Swanson and   
                  D. R. Stinson   Combinatorial solutions providing
                                  improved security for the generalized
                                  Russian cards problem  . . . . . . . . . 345--367
                     Ce Shi and   
                   Jianxing Yin   Existence of super-simple $ {\rm
                                  OA}_\lambda (3, 5, v)^\prime s $ . . . . 369--380
                Megan Adams and   
                      Junhua Wu   $2$-Ranks of incidence matrices
                                  associated with conics in finite
                                  projective planes  . . . . . . . . . . . 381--404
                    Tuvi Etzion   Covering of subspaces by subspaces . . . 405--421
                  Wenli Ren and   
                Fang-Wei Fu and   
                 Zhengchun Zhou   New sets of frequency-hopping sequences
                                  with optimal Hamming correlation . . . . 423--434
            S. T. Dougherty and   
C. Fernández-Córdoba   $ \mathbb {Z}_2 \mathbb {Z}_4 $-Additive
                                  formally self-dual codes . . . . . . . . 435--453
                 Angelo Sonnino   Transitive $ {\rm PSL}(2, 7) $-invariant
                                  $ 42$-arcs in $3$-dimensional projective
                                  spaces . . . . . . . . . . . . . . . . . 455--463
           Vedran Krcadinac and   
            Anamari Naki\'c and   
         Mario Osvin Pavcevi\'c   Equations for coefficients of tactical
                                  decomposition matrices for $t$-designs   465--469
             Trygve Johnsen and   
                 Hugues Verdure   Stanley--Reisner resolution of constant
                                  weight linear codes  . . . . . . . . . . 471--481

Designs, Codes, and Cryptography
Volume 72, Number 3, September, 2014

                    Yonglin Cao   A class of $1$-generator repeated root
                                  quasi-cyclic codes . . . . . . . . . . . 483--496
                Hengjia Wei and   
                     Gennian Ge   Kirkman frames having hole type $ h^u
                                  m^1 $ for $ h \equiv 0 \bmod 12 $  . . . 497--510
                 Maosheng Xiong   The weight distributions of a class of
                                  cyclic codes II  . . . . . . . . . . . . 511--528
          Naoyuki Horiguchi and   
           Tsuyoshi Miezaki and   
              Hiroyuki Nakasora   On the support designs of extremal
                                  binary doubly even self-dual codes . . . 529--537
               Ka Hin Leung and   
                     Siu Lun Ma   Proper circulant weighing matrices of
                                  weight $ p^2 $ . . . . . . . . . . . . . 539--550
               Ivan Landjev and   
                 Assia Rousseva   On the sharpness of Bruen's bound for
                                  intersection sets in Desarguesian affine
                                  spaces . . . . . . . . . . . . . . . . . 551--558
       Yasemin Cengellenmis and   
            Abdullah Dertli and   
                S. T. Dougherty   Codes over an infinite family of rings
                                  with a Gray map  . . . . . . . . . . . . 559--580
              Cunsheng Ding and   
             Alexander Pott and   
                        Qi Wang   Constructions of almost difference sets
                                  from finite fields . . . . . . . . . . . 581--592
                   Siyu Liu and   
         Felice Manganiello and   
           Frank R. Kschischang   Kötter interpolation in skew polynomial
                                  rings  . . . . . . . . . . . . . . . . . 593--608
                 James Berg and   
                  Max Wakefield   Skeleton simplicial evaluation codes . . 609--625
                Yutaka Hiramine   On the non-existence of maximal
                                  difference matrices of deficiency $1$    627--635
             Victoria Horan and   
                 Glenn Hurlbert   $1$-Overlap cycles for Steiner triple
                                  systems  . . . . . . . . . . . . . . . . 637--651
                  Sihong Su and   
                Xiaohu Tang and   
                 Xiangyong Zeng   A systematic method of constructing
                                  Boolean functions with optimal algebraic
                                  immunity based on the generator matrix
                                  of the Reed--Muller code . . . . . . . . 653--673
                     Vikram Jha   The Ubiquity of the Orders of Fractional
                                  Semifields of Even Characteristic  . . . 675--686
                 Nicholas Coxon   List decoding of number field codes  . . 687--711
                 Tran van Trung   A tight bound for frameproof codes
                                  viewed in terms of separating hash
                                  families . . . . . . . . . . . . . . . . 713--718
           Christoph Hering and   
              Andreas Krebs and   
                   Thomas Edgar   Naive configurations . . . . . . . . . . 719--731
     Jürgen Bierbrauer and   
            Daniele Bartoli and   
              Giorgio Faina and   
          Stefano Marcugini and   
         Fernanda Pambianco and   
                      Yves Edel   The structure of quaternary quantum caps 733--747
               Kenza Guenda and   
          T. Aaron Gulliver and   
         S. Arash Sheikholeslam   Lexicodes over rings . . . . . . . . . . 749--763


Designs, Codes, and Cryptography
Volume 73, Number 1, October, 2014

          Robert A. Liebler and   
              Cheryl E. Praeger   Neighbour-transitive codes in Johnson
                                  graphs . . . . . . . . . . . . . . . . . 1--25
            Henning Stichtenoth   A note on composed products of
                                  polynomials over finite fields . . . . . 27--32
              Naoki Chigira and   
             Masaaki Harada and   
               Masaaki Kitazume   On the classification of extremal doubly
                                  even self-dual codes with $2$-transitive
                                  automorphism groups  . . . . . . . . . . 33--35
               Hui-Chuan Lu and   
                    Hung-Lin Fu   The exact values of the optimal average
                                  information ratio of perfect
                                  secret-sharing schemes for tree-based
                                  access structures  . . . . . . . . . . . 37--46
                Tohru Nakashima   Construction of codes from Arakelov
                                  geometry . . . . . . . . . . . . . . . . 47--54
               Jianqin Zhou and   
                    Wanquan Liu   The $k$-error linear complexity
                                  distribution for $ 2^n$-periodic binary
                                  sequences  . . . . . . . . . . . . . . . 55--75
                Wayne Broughton   Admissible parameters of symmetric
                                  designs satisfying $ v = 4 (k - \lambda)
                                  + 2 $ and symmetric designs with inner
                                  balance  . . . . . . . . . . . . . . . . 77--83
               Jialin Huang and   
                     Xuejia Lai   Revisiting key schedule's diffusion in
                                  relation with round function's diffusion 85--103
           Bernhard Schmidt and   
                  Ming Ming Tan   Construction of relative difference sets
                                  and Hadamard groups  . . . . . . . . . . 105--119
                   Bart Mennink   On the collision and preimage security
                                  of MDC-4 in the ideal cipher model . . . 121--150
        Steven T. Dougherty and   
      Esengül Saltürk   Counting codes over rings  . . . . . . . 151--165
                   Xing Liu and   
               Daiyuan Peng and   
                     Hongyu Han   Low-hit-zone frequency hopping sequence
                                  sets with optimal partial Hamming
                                  correlation properties . . . . . . . . . 167--176
               Bogdan Groza and   
               Bogdan Warinschi   Cryptographic puzzles and DoS
                                  resilience, revisited  . . . . . . . . . 177--207
               Petr Lisonek and   
                      Hui Yi Lu   Bent functions on partial spreads  . . . 209--216
         Antonio Cossidente and   
               Francesco Pavese   New infinite families of hyperovals on $
                                  \mathcal H(3, q^2), q $ odd  . . . . . . 217--222
              Jianying Fang and   
               Junling Zhou and   
                   Yanxun Chang   Nonexistence of some quantum jump codes
                                  with specified parameters  . . . . . . . 223--235
                    Nian Li and   
                Xiaohu Tang and   
                  Tor Helleseth   New $M$-ary sequences with low
                                  autocorrelation from interleaved
                                  technique  . . . . . . . . . . . . . . . 237--249
                    Huaning Liu   A family of elliptic curve pseudorandom
                                  binary sequences . . . . . . . . . . . . 251--265
                      Olav Geil   Erratum to: On the second weight of
                                  generalized Reed--Muller codes . . . . . 267--267

Designs, Codes, and Cryptography
Volume 73, Number 2, November, 2014

            Lilya Budaghyan and   
              Tor Helleseth and   
                 Matthew Parker   Editorial: special issue on coding and
                                  cryptography . . . . . . . . . . . . . . 269--269
     Stéphane Ballet and   
                 Robert Rolland   On low weight codewords of generalized
                                  affine and projective Reed--Muller codes 271--297
              Claude Carlet and   
                 Andrew Klapper   On the arithmetic Walsh coefficients of
                                  Boolean functions  . . . . . . . . . . . 299--318
     Gottlieb Isabel Pirsic and   
                 Arne Winterhof   On discrete Fourier transform,
                                  ambiguity, and Hamming-autocorrelation
                                  of pseudorandom sequences  . . . . . . . 319--328
       Torleiv Klòve and   
                 Moshe Schwartz   Linear covering codes and
                                  error-correcting codes for
                                  limited-magnitude errors . . . . . . . . 329--354
              Felix Fontein and   
          Michael Schneider and   
                     Urs Wagner   PotLLL: a polynomial time version of LLL
                                  with deep insertions . . . . . . . . . . 355--368
             Hyun Kwang Kim and   
                Phan Thanh Toan   New inequalities for $q$-ary
                                  constant-weight codes  . . . . . . . . . 369--381
                 Santanu Sarkar   Small secret exponent attack on RSA
                                  variant with modulus $ N = p^r q $ . . . 383--392
          Joachim Rosenthal and   
        Natalia Silberstein and   
            Anna-Lena Trautmann   On the geometry of balls in the
                                  Grassmannian and list decoding of lifted
                                  Gabidulin codes  . . . . . . . . . . . . 393--416
               Petr Lisonek and   
               Vijaykumar Singh   Quantum codes from nearly
                                  self-orthogonal quaternary linear codes  417--424
             Soon Sheng Ong and   
Frédérique Oggier   Wiretap lattice codes from number fields
                                  with no small norm elements  . . . . . . 425--440
  Wittawat Kositwattanarerk and   
Frédérique Oggier   Connections between Construction $D$ and
                                  related constructions of lattices  . . . 441--455
        Ferruh Özbudak and   
       Zülfükar Saygi   On the exact number of solutions of
                                  certain linearized equations . . . . . . 457--468
                  Elena Dubrova   Generation of full cycles by a
                                  composition of NLFSRs  . . . . . . . . . 469--486
     Céline Blondeau and   
              Léo Perrin   More differentially $6$-uniform power
                                  functions  . . . . . . . . . . . . . . . 487--505
        Johan S. R. Nielsen and   
                  Alexander Zeh   Multi-trial Guruswami--Sudan decoding
                                  for generalised Reed--Solomon codes  . . 507--527
     Mahabir Prasad Jhanwar and   
     Ayineedi Venkateswarlu and   
          Reihaneh Safavi-Naini   Paillier-based publicly verifiable
                                  (non-interactive) secret sharing . . . . 529--546
        Antonia Wachter-Zeh and   
                  Alexander Zeh   List and unique error-erasure decoding
                                  of interleaved Gabidulin codes with
                                  interpolation techniques . . . . . . . . 547--570
                  Wenhui Li and   
         Vladimir Sidorenko and   
                   Danilo Silva   On transform-domain error and erasure
                                  correction by Gabidulin codes  . . . . . 571--586
                   Yuyin Yu and   
             Mingsheng Wang and   
                   Yongqiang Li   A matrix approach for constructing
                                  quadratic APN functions  . . . . . . . . 587--600

Designs, Codes, and Cryptography
Volume 73, Number 3, December, 2014

                 Weiwei Cao and   
                         Lei Hu   Projective interpolation of polynomial
                                  vectors and improved key recovery attack
                                  on SFLASH  . . . . . . . . . . . . . . . 719--730
                   Jie Chen and   
               Hoon Wei Lim and   
                   San Ling and   
                      Le Su and   
                  Huaxiong Wang   Spatial encryption supporting
                                  non-monotone access structure  . . . . . 731--746
               Xiaogang Liu and   
                       Yuan Luo   The weight distributions of some cyclic
                                  codes with three or four nonzeros over $
                                  \mathbb F_3 $  . . . . . . . . . . . . . 747--768
              Jianying Fang and   
                   Yanxun Chang   Mutually disjoint $t$-designs and
                                  $t$-SEEDs from extremal doubly-even
                                  self-dual codes  . . . . . . . . . . . . 769--780
                 Miao Liang and   
                Mingchao Li and   
                    Beiliang Du   A construction for $t$-fold perfect
                                  authentication codes with arbitration    781--790
                 Wenping Ma and   
                Chun-e Zhao and   
                    Dongsu Shen   New optimal constructions of
                                  conflict-avoiding codes of odd length
                                  and weight $3$ . . . . . . . . . . . . . 791--804
                 Yiling Lin and   
                 Masakazu Jimbo   Extremal properties of $t$-SEEDs and
                                  recursive constructions  . . . . . . . . 805--823
                   Tao Feng and   
                 Sihuang Hu and   
                 Shuxing Li and   
                     Gennian Ge   Difference sets with few character
                                  values . . . . . . . . . . . . . . . . . 825--839
             Javier Herranz and   
             Alexandre Ruiz and   
      Germán Sáez   New results and applications for
                                  multi-secret sharing schemes . . . . . . 841--864
               Avishek Adhikari   Linear algebraic techniques to construct
                                  monochrome visual cryptographic schemes
                                  for general access structure and its
                                  applications to color images . . . . . . 865--895
              Koji Momihara and   
                   Mieko Yamada   Divisible difference families from
                                  Galois rings $ {\rm GR}(4, n) $ and
                                  Hadamard matrices  . . . . . . . . . . . 897--909
                   Jie Chen and   
               Hoon Wei Lim and   
                   San Ling and   
              Huaxiong Wang and   
                    Hoeteck Wee   Shorter identity-based encryption via
                                  asymmetric pairings  . . . . . . . . . . 911--947
        Sebastian Raaphorst and   
                Lucia Moura and   
                  Brett Stevens   A construction for strength-3 covering
                                  arrays from linear feedback shift
                                  register sequences . . . . . . . . . . . 949--968
     Alexander L. Gavrilyuk and   
             Ivan Yu. Mogilnykh   Cameron-Liebler line classes in $ P G(n,
                                  4) $ . . . . . . . . . . . . . . . . . . 969--982
             Nikolay Yankov and   
                    Moon Ho Lee   New binary self-dual codes of lengths $
                                  50$--$ 60$ . . . . . . . . . . . . . . . 983--996
          Stanislav Bulygin and   
             Michael Walter and   
              Johannes Buchmann   Full analysis of PRINTcipher with
                                  respect to invariant subspace attack:
                                  efficient key recovery and
                                  countermeasures  . . . . . . . . . . . . 997--1022
                Edoardo Ballico   Any network code comes from an algebraic
                                  curve taking osculating spaces . . . . . 1023--1026
          Naoyuki Horiguchi and   
           Tsuyoshi Miezaki and   
              Hiroyuki Nakasora   Erratum to: On the support designs of
                                  extremal binary doubly even self-dual
                                  codes  . . . . . . . . . . . . . . . . . 1027--1028
       Torleiv Klòve and   
                 Moshe Schwartz   Erratum to: Linear covering codes and
                                  error-correcting codes for
                                  limited-magnitude errors . . . . . . . . 1029--1029


Designs, Codes, and Cryptography
Volume 74, Number 1, January, 2015

          Abhay Kumar Singh and   
             Pramod Kumar Kewat   On cyclic codes over the ring $ \mathbb
                                  Z_p[u] / \langle u^k \rangle $ . . . . . 1--13
                 Peipei Dai and   
               Jianmin Wang and   
                   Jianxing Yin   Two series of equitable symbol weight
                                  codes meeting the Plotkin bound  . . . . 15--29
              Minquan Cheng and   
                Hung-Lin Fu and   
                 Jing Jiang and   
               Yuan-Hsun Lo and   
                      Ying Miao   New bounds on $ \bar {2}$-separable
                                  codes of length $2$  . . . . . . . . . . 31--40
                   Hui Wang and   
            Paul Stankovski and   
               Thomas Johansson   A generalized birthday approach for
                                  efficiently finding linear relations in
                                  $ \ell $-sequences . . . . . . . . . . . 41--57
               Eun Ju Cheon and   
                 Seon Jeong Kim   On the minimum number of points covered
                                  by a set of lines in $ {\rm PG}(2, q) $  59--74
             Boris Skori\'c and   
            Jan-Jaap Oosterwijk   Binary and $q$-ary Tardos codes,
                                  revisited  . . . . . . . . . . . . . . . 75--111
Andrés Cordón-Franco and   
         Hans van Ditmarsch and   
David Fernández-Duque and   
         Fernando Soler-Toscano   A geometric protocol for cryptography
                                  with cards . . . . . . . . . . . . . . . 113--125
                Hengjia Wei and   
                     Gennian Ge   Spectrum of sizes for perfect
                                  $2$-deletion-correcting codes of length
                                  $4$  . . . . . . . . . . . . . . . . . . 127--151
               Ulrich Dempwolff   Symmetric doubly dual hyperovals have an
                                  odd rank . . . . . . . . . . . . . . . . 153--157
            Antonino Simone and   
                 Boris Skori\'c   False Negative probabilities in Tardos
                                  codes  . . . . . . . . . . . . . . . . . 159--182
                Cas Cremers and   
                Mich\`ele Feltz   Beyond eCK: perfect forward secrecy
                                  under actor compromise and ephemeral-key
                                  reveal . . . . . . . . . . . . . . . . . 183--218
           Katherine Jarvis and   
                  Monica Nevins   ETRU: NTRU over the Eisenstein integers  219--242
                Hengjia Wei and   
                     Gennian Ge   Group divisible designs with block size
                                  four and group type $ g^u m^1 $  . . . . 243--282
                  J. Rif\`a and   
            F. I. Solov'eva and   
                  M. Villanueva   Erratum to: Intersection of Hamming
                                  codes avoiding Hamming subcodes  . . . . 283--283

Designs, Codes, and Cryptography
Volume 74, Number 2, February, 2015

                Bocong Chen and   
                Hongwei Liu and   
                 Guanghui Zhang   A class of minimal cyclic codes over
                                  finite fields  . . . . . . . . . . . . . 285--300
                   Tao Feng and   
              Xiaomiao Wang and   
                   Yanxun Chang   Semi-cyclic holey group divisible
                                  designs with block size three  . . . . . 301--324
         Martin R. Albrecht and   
                 Carlos Cid and   
     Jean-Charles Faug\`ere and   
         Robert Fitzpatrick and   
                 Ludovic Perret   On the complexity of the BKW algorithm
                                  on LWE . . . . . . . . . . . . . . . . . 325--354
             Yiansheng Yang and   
                    Wenchao Cai   On self-dual constacyclic codes over
                                  finite fields  . . . . . . . . . . . . . 355--364
  Dragomir Z. \Dbarokovi\'c and   
             Ilias S. Kotsireas   Compression of periodic complementary
                                  sequences and applications . . . . . . . 365--377
         Cristiano Torezzan and   
  João E. Strapasson and   
          Sueli I. R. Costa and   
            Rogerio M. Siqueira   Optimum commutative group codes  . . . . 379--394
                Kwangsu Lee and   
             Jong Hwan Park and   
                  Dong Hoon Lee   Anonymous HIBE with short ciphertexts:
                                  full security in prime order groups  . . 395--425
             Michel Lavrauw and   
               John Sheekey and   
                Corrado Zanella   On embeddings of minimum dimension of $
                                  \mathrm {PG}(n, q) \times \mathrm
                                  {PG}(n, q) $ . . . . . . . . . . . . . . 427--440
            Hugues Randriam and   
                    Lin Sok and   
            Patrick Solé   Lower bounds on the minimum distance of
                                  long codes in the Lee metric . . . . . . 441--452
                  R. Alfaro and   
                K. Dhul-Qarnayn   Constructing self-dual codes over $
                                  \mathbb {F}_q[u] / (u^t) $ . . . . . . . 453--465
                  Dong Yang and   
                Wen-Feng Qi and   
                Qun-Xiong Zheng   Further results on the distinctness of
                                  modulo $2$ reductions of primitive
                                  sequences over $ \mathbf {Z} (2^{32} -
                                  1)$  . . . . . . . . . . . . . . . . . . 467--480
            Francis H. Hunt and   
          Stephanie Perkins and   
                 Derek H. Smith   Decoding mixed errors and erasures in
                                  permutation codes  . . . . . . . . . . . 481--493
             Oriol Farr\`as and   
            Carles Padró   Extending Brickell--Davenport theorem to
                                  non-perfect secret sharing schemes . . . 495--510

Designs, Codes, and Cryptography
Volume 74, Number 3, March, 2015

            Somphong Jitman and   
                       San Ling   Quasi-abelian codes  . . . . . . . . . . 511--531
               Xiaogang Liu and   
                       Yuan Luo   On the bounds and achievability about
                                  the ODPC of $ \mathcal {GRM} (2, m)^* $
                                  over prime fields for increasing message
                                  length . . . . . . . . . . . . . . . . . 533--557
            Javad Doliskani and   
             Éric Schost   Computing in degree $ 2^k $-extensions
                                  of finite fields of odd characteristic   559--569
             Nikolay Yankov and   
                    Moon Ho Lee   Classification of self-dual codes of
                                  length $ 50 $ with an automorphism of
                                  odd prime order  . . . . . . . . . . . . 571--579
               Yu Qing Chen and   
                       Tao Feng   Paley type sets from cyclotomic classes
                                  and Arasu--Dillon-Player difference sets 581--600
       Lars Eirik Danielsen and   
          Matthew G. Parker and   
                Constanza Riera   On graphs and codes preserved by edge
                                  local complementation  . . . . . . . . . 601--621
                   Qiang Li and   
               Xiang Xue Li and   
                Xue Jia Lai and   
                    Ke Fei Chen   Optimal assignment schemes for general
                                  access structures based on linear
                                  programming  . . . . . . . . . . . . . . 623--644
             Kazuhiko Minematsu   Building blockcipher from small-block
                                  tweakable blockcipher  . . . . . . . . . 645--663
                Kai-Uwe Schmidt   Highly nonlinear functions . . . . . . . 665--672
             Suat Karadeniz and   
                Bahattin Yildiz   New extremal binary self-dual codes of
                                  length $ 64 $ from $ R_3 $-lifts of the
                                  extended binary Hamming code . . . . . . 673--680
                  Hajime Matsui   On generator matrices and parity check
                                  matrices of generalized integer codes    681--701
                        Ming Su   On the linear complexity of
                                  Legendre--Sidelnikov sequences . . . . . 703--717
   László Csirmaz   Secret sharing on the $d$-dimensional
                                  cube . . . . . . . . . . . . . . . . . . 719--729


Designs, Codes, and Cryptography
Volume 75, Number 1, April, 2015

                 Xi Jun Lin and   
                    Ran Ren and   
               Zhengang Wei and   
                        Lin Sun   Comment on ``Identity-based
                                  non-interactive key distribution with
                                  forward security'' . . . . . . . . . . . 1--7
          Svetlana Topalova and   
                Stela Zhelezova   On point-transitive and transitive
                                  deficiency one parallelisms of PG $ (3,
                                  4) $ . . . . . . . . . . . . . . . . . . 9--19
 Martianus Frederic Ezerman and   
            Somphong Jitman and   
            Patrick Solé   Xing-Ling codes, duals of their
                                  subcodes, and good asymmetric quantum
                                  codes  . . . . . . . . . . . . . . . . . 21--42
                 Chengju Li and   
                    Qin Yue and   
                    Yiwei Huang   Two families of nearly optimal codebooks 43--57
                Nelly Fazio and   
                  Kevin Iga and   
        Antonio R. Nicolosi and   
             Ludovic Perret and   
          William E. Skeith III   Hardness of learning problems over
                                  Burnside groups of exponent $3$  . . . . 59--70
               Michael E. Zieve   Planar functions and perfect nonlinear
                                  monomials over finite fields . . . . . . 71--80
         Mladen Kovacevi\'c and   
           Dejan Vukobratovi\'c   Perfect codes in the discrete simplex    81--95
               Thomas Britz and   
          Keisuke Shiromoto and   
         Thomas Westerbäck   Demi-matroids from codes over finite
                                  Frobenius rings  . . . . . . . . . . . . 97--107
                Kenneth W. Shum   Optimal three-dimensional optical
                                  orthogonal codes of weight three . . . . 109--126
                  Zihui Liu and   
                     Xin-Wen Wu   On relative constant-weight codes  . . . 127--144
                     S. Ugolini   Sequences of irreducible polynomials
                                  without prescribed coefficients over odd
                                  prime fields . . . . . . . . . . . . . . 145--155
                 Hongyu Han and   
               Daiyuan Peng and   
                       Xing Liu   New lower bounds on the aperiodic
                                  Hamming correlations of frequency
                                  hopping sequences with low hit zone  . . 157--174
                Peter Horak and   
                     Zsolt Tuza   Speeding up deciphering by hypergraph
                                  ordering . . . . . . . . . . . . . . . . 175--185

Designs, Codes, and Cryptography
Volume 75, Number 2, May, 2015

              Chih-Yen Yang and   
                  Chung-Chin Lu   One-point Klein codes and their
                                  serial-in-serial-out systematic encoding 187--197
                    Zhen Ma and   
                Wen-Feng Qi and   
                      Tian Tian   On affine sub-families of the NFSR in
                                  Grain  . . . . . . . . . . . . . . . . . 199--212
             Antonio Cossidente   A new family of relative hemisystems on
                                  the Hermitian surface  . . . . . . . . . 213--221
                   N. A. Newman   $4$-Cycle decompositions of $ (\lambda +
                                  m) K_{v + u \setminus } \lambda K_v$ . . 223--235
                    Eric Swartz   A construction of a partial difference
                                  set in the extraspecial groups of order
                                  $ p^3 $ with exponent $ p^2 $  . . . . . 237--242
              Javier de la Cruz   On extremal self-dual codes of length $
                                  120 $  . . . . . . . . . . . . . . . . . 243--252
                    Sunghyu Han   A method for constructing self-dual
                                  codes over $ \mathbb {Z}_{2^m} $ . . . . 253--262
                Dabin Zheng and   
             Xiaoqiang Wang and   
             Xiangyong Zeng and   
                         Lei Hu   The weight distribution of a family of
                                  $p$-ary cyclic codes . . . . . . . . . . 263--275
             Yuuki Kageyama and   
                 Tatsuya Maruta   On the construction of Griesmer codes of
                                  dimension $5$  . . . . . . . . . . . . . 277--280
                  Elodie Leducq   Functions which are PN on infinitely
                                  many extensions of $ \mathbb{F}_p, p $
                                  odd  . . . . . . . . . . . . . . . . . . 281--299
                    Samrith Ram   Enumeration of linear transformation
                                  shift registers  . . . . . . . . . . . . 301--314
           A. J. van Zanten and   
                 A. Bojilov and   
                S. M. Dodunekov   Generalized residue and $t$-residue
                                  codes and their idempotent generators    315--334
                Elisa Gorla and   
                Maike Massierer   Point compression for the trace zero
                                  subgroup over a small degree extension
                                  field  . . . . . . . . . . . . . . . . . 335--357

Designs, Codes, and Cryptography
Volume 75, Number 3, June, 2015

           Gabriela Olteanu and   
              Inneke Van Gelder   Construction of minimal non-abelian left
                                  group codes  . . . . . . . . . . . . . . 359--373
               Yupeng Jiang and   
                    Yingpu Deng   New results on nonexistence of
                                  generalized bent functions . . . . . . . 375--385
             Yeow Meng Chee and   
                 Gennian Ge and   
                  Hui Zhang and   
                   Xiande Zhang   Hanani triple packings and optimal
                                  $q$-ary codes of constant weight three   387--403
               Josep Rif\`a and   
         Faina I. Solov'eva and   
             Merc\`e Villanueva   Self-embeddings of Hamming Steiner
                                  triple systems of small order and APN
                                  permutations . . . . . . . . . . . . . . 405--427
               Tomas Nilson and   
         Lars-Daniel Öhman   Triple arrays and Youden squares . . . . 429--451
          Peter Vandendriessche   On small line sets with few odd-points   453--463
               Maarten De Boeck   The largest Erd\Hos--Ko--Rado sets in $
                                  2 - (v, k, 1) $ designs  . . . . . . . . 465--481
               Gook Hwa Cho and   
                 Namhun Koo and   
                  Eunhye Ha and   
                   Soonhak Kwon   New cube root algorithm based on the
                                  third order linear recurrence relations
                                  in finite fields . . . . . . . . . . . . 483--495
            Ingo Janiszczak and   
           Wolfgang Lempken and   
Patric R. J. Östergård and   
              Reiner Staszewski   Permutation codes invariant under
                                  isometries . . . . . . . . . . . . . . . 497--507
            Yutaka Hiramine and   
                Chihiro Suetake   Difference matrices related to Sophie
                                  Germain primes $p$ using functions on
                                  the fields $ F_{2 p + 1}$  . . . . . . . 509--518
            Antonino Simone and   
                 Boris Skori\'c   False positive probabilities in $q$-ary
                                  Tardos codes: comparison of attacks  . . 519--542
        Heide Gluesing-Luerssen   Fourier-reflexive partitions and
                                  MacWilliams identities for additive
                                  codes  . . . . . . . . . . . . . . . . . 543--563
           Adeline Langlois and   
           Damien Stehlé   Worst-case to average-case reductions
                                  for module lattices  . . . . . . . . . . 565--599


Designs, Codes, and Cryptography
Volume 76, Number 1, July, 2015

               I. Kotsireas and   
     Edgar Martínez-Moro   Foreword: Computer Algebra in Coding
                                  Theory and Cryptography  . . . . . . . . 1--2
         Merc\`e Villanueva and   
               Fanxuan Zeng and   
                    Jaume Pujol   Efficient representation of binary
                                  nonlinear codes: constructions and
                                  minimum distance computation . . . . . . 3--21
          Natalia Dück and   
          Karl-Heinz Zimmermann   Heuristic decoding of linear codes using
                                  commutative algebra  . . . . . . . . . . 23--35
         Tom Hòholdt and   
     Fernando Piñero and   
                      Peng Zeng   Optimal codes as Tanner codes with
                                  cyclic component codes . . . . . . . . . 37--47
                  Olav Geil and   
                 Stefano Martin   An improvement of the Feng--Rao bound
                                  for primary codes  . . . . . . . . . . . 49--79
   Wilson Olaya-León and   
 Claudia Granados-Pinzón   The second generalized Hamming weight of
                                  certain Castle codes . . . . . . . . . . 81--87
             Carlos Galindo and   
              Fernando Hernando   Quantum codes from affine variety codes
                                  and their subfield-subcodes  . . . . . . 89--100
                 Carlos Munuera   Hamming codes for wet paper
                                  steganography  . . . . . . . . . . . . . 101--111
           Thomas W. Cusick and   
                    Bryan Johns   Theory of $2$-rotation symmetric cubic
                                  Boolean functions  . . . . . . . . . . . 113--133

Designs, Codes, and Cryptography
Volume 76, Number 2, August, 2015

             Mauro Biliotti and   
       Alessandro Montinaro and   
                 Eliana Francot   2- $ (v, k, 1) $ Designs with a
                                  point-primitive rank 3 automorphism
                                  group of affine type . . . . . . . . . . 135--171
        Ferruh Özbudak and   
              Seher Tutdere and   
                     Oguz Yayla   On some bounds on the minimum distance
                                  of cyclic codes over finite fields . . . 173--178
               Jooyoung Lee and   
                   Martijn Stam   MJH: a faster alternative to MDC-2 . . . 179--205
  Tamás Héger and   
Balázs Patkós and   
         Marcella Takáts   Search problems in vector spaces . . . . 207--216
                  T. Shaska and   
                        C. Shor   Theta functions and symmetric weight
                                  enumerators for codes over imaginary
                                  quadratic fields . . . . . . . . . . . . 217--235
                    D. Best and   
              H. Kharaghani and   
                        H. Ramp   Mutually unbiased weighing matrices  . . 237--256
                  Edward Dobson   Monomial isomorphisms of cyclic codes    257--267
José Joaquín Bernal and   
             Joaquim Borges and   
Cristina Fernández-Córdoba and   
             Merc\`e Villanueva   Permutation decoding of $ \mathbb{Z}_2
                                  \mathbb{Z}_4$-linear codes . . . . . . . 269--277
                    Jiao Li and   
              Claude Carlet and   
             Xiangyong Zeng and   
                 Chunlei Li and   
                     Lei Hu and   
                   Jinyong Shan   Two constructions of balanced Boolean
                                  functions with optimal algebraic
                                  immunity, high nonlinearity and good
                                  behavior against fast algebraic attacks  279--305
                  Eric Zhi Chen   A new iterative computer search
                                  algorithm for good quasi-twisted codes   307--323
            Thomas Plantard and   
               Willy Susilo and   
                  Zhenfei Zhang   LLL for ideal lattices: re-evaluation of
                                  the security of Gentry--Halevi's FHE
                                  scheme . . . . . . . . . . . . . . . . . 325--344
                 Sihuang Hu and   
                 Shuxing Li and   
                  Tao Zhang and   
                   Tao Feng and   
                     Gennian Ge   New pseudo-planar binomials in
                                  characteristic two and related schemes   345--360
               Yuan-Hsun Lo and   
                Hung-Lin Fu and   
                    Yi-Hean Lin   Weighted maximum matchings and optimal
                                  equi-difference conflict-avoiding codes  361--372

Designs, Codes, and Cryptography
Volume 76, Number 3, September, 2015

                 Masaaki Harada   On a $5$-design related to a putative
                                  extremal doubly even self-dual code of
                                  length a multiple of $ 24$ . . . . . . . 373--384
              Guo-Qiang Liu and   
                   Chen-Hui Jin   Differential cryptanalysis of
                                  PRESENT-like cipher  . . . . . . . . . . 385--408
                    Bangteng Xu   Bentness and nonlinearity of functions
                                  on finite groups . . . . . . . . . . . . 409--430
              Orr Dunkelman and   
              Nathan Keller and   
                     Adi Shamir   Almost universal forgery attacks on
                                  AES-based MAC's  . . . . . . . . . . . . 431--449
              S. G. Barwick and   
                 Wen-Ai Jackson   An investigation of the tangent splash
                                  of a subplane of $ \mathrm {PG}(2, q^3)
                                  $  . . . . . . . . . . . . . . . . . . . 451--468
            Atsushi Fujioka and   
            Koutarou Suzuki and   
               Keita Xagawa and   
                Kazuki Yoneyama   Strongly secure authenticated key
                                  exchange from factoring, codes, and
                                  lattices . . . . . . . . . . . . . . . . 469--504
                    Tung Le and   
                  Jamshid Moori   On the automorphisms of designs
                                  constructed from finite simple groups    505--517
           Steven Dougherty and   
               Jon-Lark Kim and   
                    Yoonjin Lee   Codes over rings and Hermitian lattices  519--535
                    Oktay Olmez   Plateaued functions and one-and-half
                                  difference sets  . . . . . . . . . . . . 537--549
           Anthony B. Evans and   
                 David Fear and   
              Rebecca J. Stones   Diagonally cyclic equitable rectangles   551--569
              Claude Carlet and   
                      Deng Tang   Enhanced Boolean functions suitable for
                                  the filter model of pseudo-random
                                  generator  . . . . . . . . . . . . . . . 571--587
                Hengjia Wei and   
                  Hui Zhang and   
                     Gennian Ge   Completely reducible super-simple
                                  designs with block size five and index
                                  two  . . . . . . . . . . . . . . . . . . 589--600
              Orr Dunkelman and   
                  Nathan Keller   Practical-time attacks against reduced
                                  variants of MISTY1 . . . . . . . . . . . 601--627


Designs, Codes, and Cryptography
Volume 77, Number 1, October, 2015

                    Yan Liu and   
                  Haode Yan and   
                    Chunlei Liu   A class of six-weight cyclic codes and
                                  their weight distribution  . . . . . . . 1--9
                     Jiqiang Lu   A methodology for differential-linear
                                  cryptanalysis and its applications . . . 11--48
            Anamari Naki\'c and   
         Mario Osvin Pavcevi\'c   Tactical decompositions of designs over
                                  finite fields  . . . . . . . . . . . . . 49--60
              Ryo Nishimaki and   
                   Keita Xagawa   Verifiably encrypted signatures with
                                  short keys based on the decisional
                                  linear problem and obfuscation for
                                  encrypted VES  . . . . . . . . . . . . . 61--98
                 Sihem Mesnager   Bent vectorial functions and linear
                                  codes from $o$-polynomials . . . . . . . 99--116
                  Deng Tang and   
              Claude Carlet and   
                    Xiaohu Tang   Differentially $4$-uniform bijections by
                                  permuting the inverse function . . . . . 117--141
               Sungwook Kim and   
                 Jung Hee Cheon   Fixed argument pairing inversion on
                                  elliptic curves  . . . . . . . . . . . . 143--152
                Yonglin Cao and   
                   Jian Gao and   
                    Fang-Wei Fu   Semisimple multivariable $ \mathbb {F}_q
                                  $-linear codes over $ \mathbb {F}_{q^l}
                                  $  . . . . . . . . . . . . . . . . . . . 153--177
                 Haibo Hong and   
               Licheng Wang and   
                    Yixian Yang   Minimal logarithmic signatures for the
                                  unitary group $ U_n(q) $ . . . . . . . . 179--191
                Jianfa Qian and   
                     Lina Zhang   Entanglement-assisted quantum codes from
                                  arbitrary binary linear codes  . . . . . 193--202
          Stefaan De Winter and   
                Sara Rottey and   
         Geertrui Van de Voorde   Linear representations of subgeometries  203--215
                Jingjun Bao and   
                       Lijun Ji   The completion determination of optimal
                                  $ (3, 4)$-packings . . . . . . . . . . . 217--229
             Santanu Sarkar and   
           Sourav Sen Gupta and   
                    Goutam Paul   Proving TLS-attack related open biases
                                  of RC4 . . . . . . . . . . . . . . . . . 231--253
                   Min Zeng and   
                   Yuan Luo and   
                     Guang Gong   Sequences with good correlation property
                                  based on depth and interleaving
                                  techniques . . . . . . . . . . . . . . . 255--275
Fabio Enrique Brochero Martínez   Explicit factorization of $ x^{n - 1}
                                  \in \mathbb {F}_q[x] $ . . . . . . . . . 277--286

Designs, Codes, and Cryptography
Volume 77, Number 2--3, December, 2015

                  Ian Blake and   
             Alfred Menezes and   
                   Doug Stinson   Guest Editorial: Special Issue in Honor
                                  of Scott A. Vanstone . . . . . . . . . . 287--299
                  Chuan Guo and   
         Douglas R. Stinson and   
                 Tran van Trung   On tight bounds for binary frameproof
                                  codes  . . . . . . . . . . . . . . . . . 301--319
         Charles C. Lindner and   
             Mariusz Meszka and   
                 Alexander Rosa   Almost $2$-perfect $6$-cycle systems . . 321--333
              Dirk Hachenberger   Primitive normal bases for quartic and
                                  cubic extensions: a geometric approach   335--350
                 Ryoh Fuji-Hara   Perfect hash families of strength three
                                  with three rows from varieties on finite
                                  projective geometries  . . . . . . . . . 351--356
                   Kevin Phelps   Enumeration of Kerdock codes of length $
                                  64 $ . . . . . . . . . . . . . . . . . . 357--363
          Dieter Jungnickel and   
            Vladimir D. Tonchev   Maximal arcs and quasi-symmetric designs 365--374
            Thijs Laarhoven and   
              Michele Mosca and   
                Joop van de Pol   Finding shortest lattice vectors faster
                                  using quantum search . . . . . . . . . . 375--400
             Sonia Chiasson and   
             P. C. van Oorschot   Quantifying the security advantage of
                                  password expiration policies . . . . . . 401--408
           D. S. Archdeacon and   
               J. H. Dinitz and   
                  D. M. Donovan   Square integer Heffter arrays with empty
                                  cells  . . . . . . . . . . . . . . . . . 409--426
           Alice Silverberg and   
                 Yuri G. Zarhin   Isogenies of abelian varieties over
                                  finite fields  . . . . . . . . . . . . . 427--439
           Beno\^\it Libert and   
              Thomas Peters and   
                  Marc Joye and   
                      Moti Yung   Linearly homomorphic
                                  structure-preserving signatures and
                                  their applications . . . . . . . . . . . 441--477
             Yeow Meng Chee and   
        Charles J. Colbourn and   
             Alan Chi Hung Ling   Optimal low-power coding for error
                                  correction and crosstalk avoidance in
                                  on-chip data buses . . . . . . . . . . . 479--491
          Michael Düll and   
           Björn Haase and   
       Gesine Hinterwälder   High-speed Curve25519 on $8$-bit, $
                                  16$-bit, and $ 32$-bit microcontrollers  493--514
             E. L. Roettger and   
             H. C. Williams and   
                      R. K. Guy   Some primality tests that eluded Lucas   515--539
          Jeffrey Hoffstein and   
            Joseph H. Silverman   PASS-Encrypt: a public key cryptosystem
                                  based on partial evaluation of
                                  polynomials  . . . . . . . . . . . . . . 541--552
                   E. R. Lamken   The asymptotic existence of DR$ (v, k, k
                                  - 1) $ $ (v, k, k - 1)$-BIBDs  . . . . . 553--562
           Liang Feng Zhang and   
          Reihaneh Safavi-Naini   Batch verifiable computation of
                                  outsourced functions . . . . . . . . . . 563--585
               Neal Koblitz and   
              Alfred J. Menezes   The random oracle model: a twenty-year
                                  retrospective  . . . . . . . . . . . . . 587--610
             Elena Andreeva and   
               Bart Mennink and   
                   Bart Preneel   Open problems in hash function security  611--631
                 Itai Dinur and   
              Orr Dunkelman and   
              Nathan Keller and   
                     Adi Shamir   Reflections on slide with a twist
                                  attacks  . . . . . . . . . . . . . . . . 633--651
               Gary McGuire and   
            Emrah Sercan Yilmaz   Further results on the number of
                                  rational points of hyperelliptic
                                  supersingular curves in characteristic 2 653--662
                    Ueli Maurer   Zero-knowledge proofs of knowledge for
                                  group homomorphisms  . . . . . . . . . . 663--676
               Gerhard Frey and   
                     Ernst Kani   Normal forms of hyperelliptic curves of
                                  genus $3$  . . . . . . . . . . . . . . . 677--712
                 Peter Landrock   Power map permutations and the discrete
                                  log problem  . . . . . . . . . . . . . . 713--724
           Tatsuaki Okamoto and   
            Katsuyuki Takashima   Achieving short ciphertexts or short
                                  secret-keys for adaptively secure
                                  general inner-product encryption . . . . 725--771


Designs, Codes, and Cryptography
Volume 78, Number 1, January, 2016

          Dieter Jungnickel and   
               Jennifer Key and   
                 Chris Mitchell   Editorial for the 25th anniversary issue 1--3
              Claude Carlet and   
                 Sihem Mesnager   Four decades of research on bent
                                  functions  . . . . . . . . . . . . . . . 5--50
        Steven D. Galbraith and   
                Pierrick Gaudry   Recent progress on the elliptic curve
                                  discrete logarithm problem . . . . . . . 51--72
               Antoine Joux and   
          Cécile Pierrot   Technical history of discrete logarithms
                                  in small characteristic finite fields    73--85
               Neal Koblitz and   
              Alfred J. Menezes   Cryptocash, cryptocurrencies, and
                                  cryptocontracts  . . . . . . . . . . . . 87--102
               Siaw-Lynn Ng and   
            Maura Beth Paterson   Disjoint difference families and their
                                  applications . . . . . . . . . . . . . . 103--127
            Harald Niederreiter   A survey of some applications of finite
                                  fields . . . . . . . . . . . . . . . . . 129--139
                 Alexander Pott   Almost perfect and planar functions  . . 141--195
                Lucia Moura and   
             Gary L. Mullen and   
                 Daniel Panario   Finite field constructions of
                                  combinatorial arrays . . . . . . . . . . 197--219
           Daniel M. Gordon and   
               Bernhard Schmidt   A survey of the multiplier conjecture    221--236
                Kai-Uwe Schmidt   Sequences with small correlation . . . . 237--267
         Christina Fragouli and   
                 Emina Soljanin   (Secure) Linear network coding multicast 269--310
                  T. Etzion and   
                      L. Storme   Galois geometries and coding theory  . . 311--350
             Anne Broadbent and   
            Christian Schaffner   Quantum cryptography beyond quantum key
                                  distribution . . . . . . . . . . . . . . 351--382

Designs, Codes, and Cryptography
Volume 78, Number 2, February, 2016

                  Michael Braun   $q$-Analogs of $t$-wise balanced designs
                                  from Borel subgroups . . . . . . . . . . 383--390
               Longjiang Qu and   
                    Yin Tan and   
                    Chao Li and   
                     Guang Gong   More constructions of differentially
                                  $4$-uniform permutations on $ \mathbb
                                  {F}_{2^{2k}}$  . . . . . . . . . . . . . 391--408
        Natalia Silberstein and   
                Anna Gál   Optimal combinatorial batch codes based
                                  on block designs . . . . . . . . . . . . 409--424
            Christina Delfs and   
            Steven D. Galbraith   Computing isogenies between
                                  supersingular elliptic curves over $
                                  \mathbb {F}_p $  . . . . . . . . . . . . 425--440
   Özgür Dagdelen and   
              David Galindo and   
            Pascal Véron   Extended security arguments for
                                  signature schemes  . . . . . . . . . . . 441--461
                       Sho Suda   A two-fold cover of strongly regular
                                  graphs with spreads and association
                                  schemes of class five  . . . . . . . . . 463--471
          Adonus L. Madison and   
                      Junhua Wu   Conics arising from external points and
                                  their binary codes . . . . . . . . . . . 473--491
                    Yu Chen and   
                Jiang Zhang and   
                Dongdai Lin and   
                 Zhenfeng Zhang   Generic constructions of integrated PKE
                                  and PEKS . . . . . . . . . . . . . . . . 493--526
         Antonio Cossidente and   
               Francesco Pavese   On subspace codes  . . . . . . . . . . . 527--531
                      Di Wu and   
                 Wenfeng Qi and   
                    Huajin Chen   On the spectral immunity of periodic
                                  sequences restricted to binary
                                  annihilators . . . . . . . . . . . . . . 533--545
         Praveen Gauravaram and   
             Nasour Bagheri and   
                Lars R. Knudsen   Building indifferentiable compression
                                  functions from the PGV compression
                                  functions  . . . . . . . . . . . . . . . 547--581

Designs, Codes, and Cryptography
Volume 78, Number 3, March, 2016

             Michel Lavrauw and   
                   John Sheekey   On BEL-configurations and finite
                                  semifields . . . . . . . . . . . . . . . 583--603
           Florian Caullery and   
            Kai-Uwe Schmidt and   
                       Yue Zhou   Exceptional planar polynomials . . . . . 605--613
           Martin Steinbach and   
              Dirk Hachenberger   A class of quaternary linear codes
                                  improving known minimum distances  . . . 615--627
              Claude Carlet and   
                 Guang Gong and   
                        Yin Tan   Quadratic zero-difference balanced
                                  functions, APN functions and strongly
                                  regular graphs . . . . . . . . . . . . . 629--654
               Jan De Beule and   
             Jeroen Demeyer and   
               Klaus Metsch and   
                 Morgan Rodgers   A new family of tight sets in $ \mathcal
                                  {Q}^+(5, q) $  . . . . . . . . . . . . . 655--678
               Yuan-Hsun Lo and   
            Wing Shing Wong and   
                    Hung-Lin Fu   Partially user-irrepressible sequence
                                  sets and conflict-avoiding codes . . . . 679--691
          Javier de la Cruz and   
          Michael Kiermaier and   
              Alfred Wassermann   The automorphism group of an extremal $
                                  [120, 60, 24] $ code does not contain
                                  elements of order $ 29 $ . . . . . . . . 693--702
                      Anonymous   Weight enumerator of some irreducible
                                  cyclic codes . . . . . . . . . . . . . . ??


Designs, Codes, and Cryptography
Volume 79, Number 1, April, 2016

               Andrea Montanari   Effective compression maps for
                                  torus-based cryptography . . . . . . . . 1--17
                   Lijun Ji and   
                   Zhengwu Dong   Existence of optimal strong partially
                                  balanced $3$-designs with block size
                                  four . . . . . . . . . . . . . . . . . . 19--36
           Tsuyoshi Miezaki and   
              Hiroyuki Nakasora   An upper bound of the value of $t$ of
                                  the support $t$-designs of extremal
                                  binary doubly even self-dual codes . . . 37--46
        Heide Gluesing-Luerssen   The homogeneous weight partition and its
                                  character-theoretic dual . . . . . . . . 47--61
             Jong Hwan Park and   
                  Dong Hoon Lee   An efficient IBE scheme with tight
                                  security reduction in the random oracle
                                  model  . . . . . . . . . . . . . . . . . 63--85
     Jean-Charles Faug\`ere and   
               Ayoub Otmani and   
             Ludovic Perret and   
Frédéric de Portzamparc and   
            Jean-Pierre Tillich   Structural cryptanalysis of McEliece
                                  schemes with compact keys  . . . . . . . 87--112
            Dean Crnkovi\'c and   
                 Sanja Rukavina   Self-dual codes from extended orbit
                                  matrices of symmetric designs  . . . . . 113--120
                    Kwangsu Lee   Self-updatable encryption with short
                                  public parameters and its extensions . . 121--161
          Binod Kumar Sahoo and   
         N. S. Narasimha Sastry   Binary codes of the symplectic
                                  generalized quadrangle of even order . . 163--170
         Stefka Bouyuklieva and   
           Wolfgang Willems and   
                 Nikolay Yankov   On the automorphisms of order $ 15 $ for
                                  a binary self-dual $ [96, 48, 20] $ code 171--182
         Jürgen Bierbrauer   Projective polynomials, a projection
                                  construction and a family of semifields  183--200

Designs, Codes, and Cryptography
Volume 79, Number 2, May, 2016

               Eimear Byrne and   
                   Alison Sneyd   Two-weight codes, graphs and orthogonal
                                  arrays . . . . . . . . . . . . . . . . . 201--217
                 B. Compton and   
                 R. Craigen and   
                   W. de Launey   Unreal $ B H(n, 6) $'s and Hadamard
                                  matrices . . . . . . . . . . . . . . . . 219--229
              Ibrahim Özen   Generalized weights and the
                                  Ball--Blokhuis congruence  . . . . . . . 231--235
               Dustin Moody and   
            Souradyuti Paul and   
              Daniel Smith-Tone   Improved indifferentiability security
                                  bound for the JH mode  . . . . . . . . . 237--259
         Martin R. Albrecht and   
     Jean-Charles Faug\`ere and   
              Pooya Farshim and   
           Gottfried Herold and   
                 Ludovic Perret   Polly Cracker, revisited . . . . . . . . 261--302
                 Jing Jiang and   
              Minquan Cheng and   
                      Ying Miao   Strongly separable codes . . . . . . . . 303--318
                Yutaka Hiramine   On automorphism groups of divisible
                                  designs acting regularly on the set of
                                  point classes  . . . . . . . . . . . . . 319--335
         Seyed Hassan Alavi and   
               Mohsen Bayat and   
              Ashraf Daneshkhah   Symmetric designs admitting
                                  flag-transitive and point-primitive
                                  automorphism groups associated to two
                                  dimensional projective special groups    337--351
                    Yan Liu and   
                      Haode Yan   A class of five-weight cyclic codes and
                                  their weight distribution  . . . . . . . 353--366
                Yijin Zhang and   
               Yuan-Hsun Lo and   
                Wing Shing Wong   Optimal strongly conflict-avoiding codes
                                  of even length and weight three  . . . . 367--382
                    Igor Semaev   MaxMinMax problem and sparse equations
                                  over finite fields . . . . . . . . . . . 383--404

Designs, Codes, and Cryptography
Volume 79, Number 3, June, 2016

              Dina Ghinelli and   
          Dieter Jungnickel and   
             Michel Lavrauw and   
                 Alexander Pott   Editorial: Finite geometries . . . . . . 405--406
            Anamari Naki\'c and   
                     Leo Storme   On the extendability of particular
                                  classes of constant dimension codes  . . 407--422
               Ayhan Cosgun and   
        Ferruh Özbudak and   
       Zülfükar Saygi   Further results on rational points of
                                  the curve $ y^{q^n} - y = \gamma x^{q^h
                                  + 1} - \alpha $ over $ \mathbb {F}_{q^m}
                                  $  . . . . . . . . . . . . . . . . . . . 423--441
Gábor Korchmáros and   
           Gábor P. Nagy   $3$-Nets realizing a diassociative loop
                                  in a projective plane  . . . . . . . . . 443--449
               Peter Beelen and   
         Fernando Piñero   The structure of dual Grassmann codes    451--470
          Stefaan De Winter and   
            Ellen Kamischke and   
                    Zeying Wang   Automorphisms of strongly regular graphs
                                  with applications to partial difference
                                  sets . . . . . . . . . . . . . . . . . . 471--485
            Daniele Bartoli and   
          Massimo Giulietti and   
                  Giovanni Zini   Complete $ (k, 3)$-arcs from quartic
                                  curves . . . . . . . . . . . . . . . . . 487--505
                  Bart De Bruyn   Hyperplanes of Hermitian dual polar
                                  spaces of rank $3$ containing a quad . . 507--533
               Ivan Landjev and   
             Assia Rousseva and   
                     Leo Storme   On the extendability of quasidivisible
                                  Griesmer arcs  . . . . . . . . . . . . . 535--547
          Neil I. Gillespie and   
            Michael Giudici and   
           Daniel R. Hawtin and   
              Cheryl E. Praeger   Entry-faithful $2$-neighbour transitive
                                  codes  . . . . . . . . . . . . . . . . . 549--564
              Katharina Kusejko   Simultaneous diagonalization of conics
                                  in $ P G(2, q) $ . . . . . . . . . . . . 565--581
                   Anton Betten   The packings of $ \mathrm {PG}(3, 3) $   583--595
         Antonio Cossidente and   
            Giuseppe Marino and   
               Francesco Pavese   Non-linear maximum rank distance codes   597--609
                Alice M. W. Hui   Extending some induced substructures of
                                  an inversive plane . . . . . . . . . . . 611--617
         Benjamin C. Cooper and   
                   Tim Penttila   Transitive hyperovals  . . . . . . . . . 619--623
       Szabolcs L. Fancsali and   
           Péter Sziklai   Higgledy-piggledy subspaces and uniform
                                  subspace designs . . . . . . . . . . . . 625--645


Designs, Codes, and Cryptography
Volume 80, Number 1, July, 2016

                  Eric Zhi Chen   New binary $h$-generator quasi-cyclic
                                  codes by augmentation and new minimum
                                  distance bounds  . . . . . . . . . . . . 1--10
        José Moreira and   
    Marcel Fernández and   
            Grigory Kabatiansky   Almost separating and almost secure
                                  frameproof codes over $q$-ary alphabets  11--28
            Dennis Hofheinz and   
                    Tibor Jager   Tightly secure signatures and public-key
                                  encryption . . . . . . . . . . . . . . . 29--61
            Igor E. Shparlinski   On small gaps between the elements of
                                  multiplicative subgroups of finite
                                  fields . . . . . . . . . . . . . . . . . 63--71
            Jonathan Jedwab and   
                      Amy Wiebe   Constructions of complex equiangular
                                  lines from mutually unbiased bases . . . 73--89
                Denis S. Krotov   Perfect codes in Doob graphs . . . . . . 91--102
                 Fuchun Guo and   
               Willy Susilo and   
                          Yi Mu   Generalized closest substring encryption 103--124
       Alexander A. Davydov and   
              Giorgio Faina and   
          Massimo Giulietti and   
          Stefano Marcugini and   
             Fernanda Pambianco   On constructions and parameters of
                                  symmetric configurations $ v_k $ . . . . 125--147
               Yanling Chen and   
           Markku Niemenmaa and   
                A. J. Han Vinck   A general check digit system based on
                                  finite groups  . . . . . . . . . . . . . 149--163
           Sabyasachi Dutta and   
     Raghvendra Singh Rohit and   
               Avishek Adhikari   Constructions and analysis of some
                                  efficient $t$-$ (k, n)^*$-visual
                                  cryptographic schemes using linear
                                  algebraic techniques . . . . . . . . . . 165--196
              Alberto Ravagnani   Rank-metric codes and their duality
                                  theory . . . . . . . . . . . . . . . . . 197--216

Designs, Codes, and Cryptography
Volume 80, Number 2, August, 2016

             Xiang-dong Hou and   
        Ferruh Özbudak and   
                       Yue Zhou   Switchings of semifield multiplications  217--239
                        Udo Ott   On Jacobi sums, difference sets and
                                  partial difference sets in Galois
                                  domains  . . . . . . . . . . . . . . . . 241--281
               Kohei Yamada and   
                Nobuko Miyamoto   A construction and decomposition of
                                  orthogonal arrays with non-prime-power
                                  numbers of symbols on the complement of
                                  a Baer subplane  . . . . . . . . . . . . 283--294
                 Chengju Li and   
                    Qin Yue and   
                    Fang-Wei Fu   Complete weight enumerators of some
                                  cyclic codes . . . . . . . . . . . . . . 295--315
              S. G. Barwick and   
                 Wen-Ai Jackson   Characterising pointsets in $ \mathrm
                                  {{PG}}(4, q) $ that correspond to conics 317--332
          Yarkin Doröz and   
                     Yin Hu and   
                     Berk Sunar   Homomorphic AES evaluation using the
                                  modified LTV scheme  . . . . . . . . . . 333--358
          Carl Löndahl and   
           Thomas Johansson and   
Masoumeh Koochak Shooshtari and   
    Mahmoud Ahmadian-Attari and   
             Mohammad Reza Aref   Squaring attacks on McEliece public-key
                                  cryptosystems using quasi-cyclic codes
                                  of even dimension  . . . . . . . . . . . 359--377
             Aysegul Bayram and   
           Elif Segah Oztas and   
                     Irfan Siap   Codes over $ F_4 + v F_4 $ and some DNA
                                  applications . . . . . . . . . . . . . . 379--393
              Marion Candau and   
             Roland Gautier and   
               Johannes Huisman   Convolutional block codes with
                                  cryptographic properties over the
                                  semi-direct product $ \mathbb {Z} / N
                                  \mathbb {Z} \rtimes \mathbb {Z} / M
                                  \mathbb {Z} $  . . . . . . . . . . . . . 395--407
            Kai-Uwe Schmidt and   
             Jürgen Willms   Barker sequences of odd length . . . . . 409--414
                   John Sheekey   Dimensional dual hyperovals in classical
                                  polar spaces . . . . . . . . . . . . . . 415--420

Designs, Codes, and Cryptography
Volume 80, Number 3, September, 2016

            Jason T. LeGrow and   
              David A. Pike and   
                Jonathan Poulin   Hamiltonicity and cycle extensions in
                                  $0$-block-intersection graphs of
                                  balanced incomplete block designs  . . . 421--433
             Kathleen Nowak and   
                    Oktay Olmez   Partial geometric designs with
                                  prescribed automorphisms . . . . . . . . 435--451
                     E. Ballico   Non-special subsets of the set of points
                                  of a curve defined over a finite field   453--457
                 Rongjia Li and   
                    Chenhui Jin   Meet-in-the-middle attacks on $
                                  10$-round AES-256  . . . . . . . . . . . 459--471
                 Ga Won Lee and   
                       Jin Hong   Comparison of perfect table
                                  cryptanalytic tradeoff algorithms  . . . 473--523
               Junqing Gong and   
                 Zhenfu Cao and   
               Shaohua Tang and   
                       Jie Chen   Extended dual system group and shorter
                                  unbounded hierarchical identity based
                                  encryption . . . . . . . . . . . . . . . 525--559
              Adel Alahmadi and   
            Hussain Alhazmi and   
              Tor Helleseth and   
                Rola Hijazi and   
              Najat Muthana and   
            Patrick Solé   On the lifted Zetterberg code  . . . . . 561--576
              Dirk Hachenberger   Asymptotic existence results for
                                  primitive completely normal elements in
                                  extensions of Galois fields  . . . . . . 577--586
                   Jian Guo and   
  Jérémy Jean and   
            Ivica Nikoli\'c and   
                      Yu Sasaki   Extended meet-in-the-middle attacks on
                                  some Feistel constructions . . . . . . . 587--618
      Juan Carlos Ku-Cauich and   
         Guillermo Morales-Luna   Authentication codes based on resilient
                                  Boolean maps . . . . . . . . . . . . . . 619--633
          Rebecca J. Stones and   
                    Ming Su and   
              Xiaoguang Liu and   
                  Gang Wang and   
                      Sheng Lin   A Latin square autotopism secret sharing
                                  scheme . . . . . . . . . . . . . . . . . 635--650


Designs, Codes, and Cryptography
Volume 81, Number 1, October, 2016

                  Haode Yan and   
                    Chunlei Liu   Two classes of cyclic codes and their
                                  weight enumerator  . . . . . . . . . . . 1--9
           Michelle Kendall and   
                Keith M. Martin   Graph-theoretic design and analysis of
                                  key predistribution schemes  . . . . . . 11--34
                 Aida Abiad and   
              Willem H. Haemers   Switched symplectic graphs and their
                                  $2$-ranks  . . . . . . . . . . . . . . . 35--41
             Shantian Cheng and   
                Khoa Nguyen and   
                  Huaxiong Wang   Policy-based signature scheme from
                                  lattices . . . . . . . . . . . . . . . . 43--74
                Matan Banin and   
                    Boaz Tsaban   A reduction of Semigroup DLP to classic
                                  DLP  . . . . . . . . . . . . . . . . . . 75--82
              Ciaran Mullan and   
                    Boaz Tsaban   $ {\rm SL}_2 $ homomorphic hash
                                  functions: worst case to average case
                                  reduction and short collision search . . 83--107
                   Chun Guo and   
                    Dongdai Lin   Separating invertible key derivations
                                  from non-invertible ones: sequential
                                  indifferentiability of $3$-round
                                  Even--Mansour  . . . . . . . . . . . . . 109--129
               John Bamberg and   
                Melissa Lee and   
                    Eric Swartz   A note on relative hemisystems of
                                  Hermitian generalised quadrangles  . . . 131--144
                  Michael Braun   New infinite series of $2$-designs over
                                  the binary and ternary field . . . . . . 145--152
                 Chengju Li and   
                Sunghan Bae and   
                Jaehyun Ahn and   
                 Shudi Yang and   
                   Zheng-An Yao   Complete weight enumerators of some
                                  linear codes and their applications  . . 153--168
             Trygve Johnsen and   
          Keisuke Shiromoto and   
                 Hugues Verdure   A generalization of Kung's theorem . . . 169--178

Designs, Codes, and Cryptography
Volume 81, Number 2, November, 2016

                   Alfredo Rial   Blind attribute-based encryption and
                                  oblivious transfer with fine-grained
                                  access control . . . . . . . . . . . . . 179--223
                    Yan Liu and   
                    Chunlei Liu   A class of cyclic codes whose duals have
                                  five zeros . . . . . . . . . . . . . . . 225--238
                  Boran Kim and   
                    Yoonjin Lee   Construction of extremal self-dual codes
                                  over $ {\mathbb {Z}}_8 $ and $ {\mathbb
                                  {Z}}_{16} $  . . . . . . . . . . . . . . 239--257
László Mérai and   
                 Arne Winterhof   On the linear complexity profile of some
                                  sequences derived from elliptic curves   259--267
       Bence Csajbók and   
                Corrado Zanella   On the equivalence of linear sets  . . . 269--281
             Zhengchun Zhou and   
                    Nian Li and   
                Cuiling Fan and   
                  Tor Helleseth   Linear codes with two or three weights
                                  from quadratic Bent functions  . . . . . 283--295
                  Zihui Liu and   
                     Xin-Wen Wu   The fullrank value function  . . . . . . 297--315
              Minquan Cheng and   
                 Jing Jiang and   
                  Haiyan Li and   
                  Ying Miao and   
                    Xiaohu Tang   Bounds and constructions for $
                                  {\overline {3}}$-separable codes with
                                  length $3$ . . . . . . . . . . . . . . . 317--335
             Wilfried Meidl and   
            Harald Niederreiter   Multisequences with high joint nonlinear
                                  complexity . . . . . . . . . . . . . . . 337--346
        Steven T. Dougherty and   
Cristina Fernández-Córdoba   Kernels and ranks of cyclic and
                                  negacyclic quaternary codes  . . . . . . 347--364
          R. Julian R. Abel and   
           Robert F. Bailey and   
          Andrea C. Burgess and   
             Peter Danziger and   
                Eric Mendelsohn   On generalized Howell designs with block
                                  size three . . . . . . . . . . . . . . . 365--391

Designs, Codes, and Cryptography
Volume 81, Number 3, December, 2016

               Yanfeng Wang and   
                     Wenling Wu   New criterion for diffusion property and
                                  applications to improved GFS and EGFN    393--412
                Abdulla Eid and   
               Hilaf Hasson and   
                   Amy Ksir and   
                 Justin Peachey   Suzuki-invariant codes from the Suzuki
                                  curve  . . . . . . . . . . . . . . . . . 413--425
     Cícero Carvalho and   
             Rafael Peixoto and   
                Fernando Torres   Near weights on higher dimensional
                                  varieties  . . . . . . . . . . . . . . . 427--443
         Antonio Cossidente and   
               Francesco Pavese   Veronese subspace codes  . . . . . . . . 445--457
                 Daqing Wan and   
                     Qiang Wang   Index bounds for character sums of
                                  polynomials over finite fields . . . . . 459--468
             Yuuki Kageyama and   
                 Tatsuya Maruta   On the geometric constructions of
                                  optimal linear codes . . . . . . . . . . 469--480
               Xiaoqin Zhan and   
                  Shenglin Zhou   Flag-transitive non-symmetric
                                  $2$-designs with $ (r, \lambda) = 1 $
                                  and sporadic socle . . . . . . . . . . . 481--487
                   Sanming Zhou   Total perfect codes in Cayley graphs . . 489--504
               Yanbin Zheng and   
               Pingzhi Yuan and   
                     Dingyi Pei   Large classes of permutation polynomials
                                  over $ \mathbb {F}_{q^2} $ . . . . . . . 505--521
              Huaifeng Chen and   
               Tingting Cui and   
                    Meiqin Wang   Improving algorithm 2 in
                                  multidimensional (zero-correlation)
                                  linear cryptanalysis using $
                                  \chi^2$-method . . . . . . . . . . . . . 523--540
               Hyun Jin Kim and   
                    Yoonjin Lee   Complementary information set codes over
                                  $ {\rm GF}(p) $  . . . . . . . . . . . . 541--555


Designs, Codes, and Cryptography
Volume 82, Number 1--2, January, 2017

            Pascale Charpin and   
           Thomas Johansson and   
           Gohar Kyureghyan and   
           Nicolas Sendrier and   
            Jean-Pierre Tillich   Editorial: Special issue on coding and
                                  cryptography . . . . . . . . . . . . . . 1--2
            Christina Boura and   
              Anne Canteaut and   
            Lars R. Knudsen and   
                 Gregor Leander   Reflection ciphers . . . . . . . . . . . 3--25
           Sondre Rònjom   Improving algebraic attacks on stream
                                  ciphers based on linear feedback shift
                                  register over $ \mathbb {F}_{2^k} $  . . 27--41
                    Pavol Zajac   Upper bounds on the complexity of
                                  algebraic cryptanalysis of ciphers with
                                  a low multiplicative complexity  . . . . 43--56
                  Serhii Dyshko   MacWilliams Extension Theorem for MDS
                                  codes over a vector space alphabet . . . 57--67
           Sergey Bezzateev and   
             Natalia Shekhunova   Lower bound of covering radius of binary
                                  irreducible Goppa codes  . . . . . . . . 69--76
         Kishan Chand Gupta and   
         Sumit Kumar Pandey and   
         Ayineedi Venkateswarlu   On the direct construction of recursive
                                  MDS matrices . . . . . . . . . . . . . . 77--94
        Kaushik Chakraborty and   
             Sumanta Sarkar and   
            Subhamoy Maitra and   
        Bodhisatwa Mazumdar and   
       Debdeep Mukhopadhyay and   
                Emmanuel Prouff   Redefining the transparency order  . . . 95--115
                  Marine Minier   Improving impossible-differential
                                  attacks against Rijndael-160 and
                                  Rijndael-224 . . . . . . . . . . . . . . 117--129
             Santanu Sarkar and   
         Ayineedi Venkateswarlu   Revisiting (nested) Roos bias in RC4 key
                                  scheduling algorithm . . . . . . . . . . 131--148
      Srimanta Bhattacharya and   
                 Sumanta Sarkar   On some permutation binomials and
                                  trinomials over $ \mathbb {F}_{2^n} $    149--160
             Mehdi Tibouchi and   
                    Taechan Kim   Improved elliptic curve hashing and
                                  point representation . . . . . . . . . . 161--177
         Kishan Chand Gupta and   
         Sumit Kumar Pandey and   
         Ayineedi Venkateswarlu   Towards a general construction of
                                  recursive MDS diffusion layers . . . . . 179--195
            A. G. D'yachkov and   
             I. V. Vorobyev and   
           N. A. Polyanskii and   
                V. Yu. Shchukin   Cover-free codes and separating system
                                  codes  . . . . . . . . . . . . . . . . . 197--209
            A. G. D'yachkov and   
             I. V. Vorobyev and   
           N. A. Polyanskii and   
                V. Yu. Shchukin   Symmetric disjunctive list-decoding
                                  codes  . . . . . . . . . . . . . . . . . 211--229
          Arkadii D'yachkov and   
              Ilya Vorobyev and   
          Nikita Polyanskii and   
             Vladislav Shchukin   Almost cover-free codes and designs  . . 231--247
            Cem Güneri and   
        Ferruh Özbudak and   
             Funda Özdemir   Hasse--Weil bound for additive cyclic
                                  codes  . . . . . . . . . . . . . . . . . 249--263
        Nurdagül Anbar and   
             Wilfried Meidl and   
                 Alev Topuzoglu   Idempotent and $p$-potent quadratic
                                  functions: distribution of nonlinearity
                                  and co-dimension . . . . . . . . . . . . 265--291
         Vladimir Gritsenko and   
        Grigory Kabatiansky and   
           Vladimir Lebedev and   
                Alexey Maevskiy   Signature codes for noisy multiple
                                  access adder channel . . . . . . . . . . 293--299
          Jeremy Maitin-Shepard   Optimal software-implemented
                                  Itoh--Tsujii inversion for $ \mathbb
                                  {F}_{2^m} $  . . . . . . . . . . . . . . 301--318

Designs, Codes, and Cryptography
Volume 82, Number 3, March, 2017

               Jerod Michel and   
                    Baokun Ding   A generalization of combinatorial
                                  designs and related codes  . . . . . . . 511--529
               Yupeng Jiang and   
                    Dongdai Lin   On affine sub-families of Grain-like
                                  structures . . . . . . . . . . . . . . . 531--542
                    Yun Fan and   
                    Bangteng Xu   Fourier transforms and bent functions on
                                  faithful actions of finite abelian
                                  groups . . . . . . . . . . . . . . . . . 543--558
             Kaoru Kurosawa and   
              Hiroyuki Ohta and   
                   Kenji Kakuta   How to make a linear network code
                                  (strongly) secure  . . . . . . . . . . . 559--582
                 Shuxing Li and   
                Hengjia Wei and   
                     Gennian Ge   Generic constructions for partitioned
                                  difference families with applications: a
                                  unified combinatorial approach . . . . . 583--599
              Palash Sarkar and   
                 Shashank Singh   A new method for decomposition in the
                                  Jacobian of small genus hyperelliptic
                                  curves . . . . . . . . . . . . . . . . . 601--616
             Moises Delgado and   
                 Heeralal Janwa   On the conjecture on APN functions and
                                  absolute irreducibility of polynomials   617--627
              R. Lakshmanan and   
                    S. Arumugam   Construction of a $ (k, n)$-visual
                                  cryptography scheme  . . . . . . . . . . 629--645
                Haiying Liu and   
                 Keqin Feng and   
                  Rongquan Feng   Nonexistence of generalized bent
                                  functions from $ \mathbb {Z}_2^n $ to $
                                  \mathbb {Z}_m $  . . . . . . . . . . . . 647--662
                 Shudi Yang and   
                   Zheng-An Yao   Complete weight enumerators of a family
                                  of three-weight linear codes . . . . . . 663--674
                  M. Huggan and   
               G. L. Mullen and   
                 B. Stevens and   
                     D. Thomson   Sudoku-like arrays, codes and
                                  orthogonality  . . . . . . . . . . . . . 675--693
                    Ming Li and   
               Yupeng Jiang and   
                    Dongdai Lin   The adjacency graphs of some feedback
                                  shift registers  . . . . . . . . . . . . 695--713


Designs, Codes, and Cryptography
Volume 83, Number 1, April, 2017

               Liqiang Peng and   
                     Lei Hu and   
                     Yao Lu and   
                     Jun Xu and   
                 Zhangjie Huang   Cryptanalysis of Dual RSA  . . . . . . . 1--21
                  Hao Zheng and   
               Yanxun Chang and   
                   Junling Zhou   Direct constructions of large sets of
                                  Kirkman triple systems . . . . . . . . . 23--32
                Xiao-Nan Lu and   
                 Masakazu Jimbo   Affine-invariant strictly cyclic Steiner
                                  quadruple systems  . . . . . . . . . . . 33--69
              Minquan Cheng and   
                Hung-Lin Fu and   
                 Jing Jiang and   
               Yuan-Hsun Lo and   
                      Ying Miao   Codes with the identifiable parent
                                  property for multimedia fingerprinting   71--82
                Jaehyun Ahn and   
                Dongseok Ka and   
                     Chengju Li   Complete weight enumerators of a class
                                  of linear codes  . . . . . . . . . . . . 83--99
                 Diego Napp and   
               Raquel Pinto and   
                   Marisa Toste   On MDS convolutional codes over $
                                  \mathbb {Z}_{p^r} $  . . . . . . . . . . 101--114
                Nicola Pace and   
                 Angelo Sonnino   On linear codes admitting large
                                  automorphism groups  . . . . . . . . . . 115--143
        Esteban Landerreche and   
   David Fernández-Duque   A case study in almost-perfect security
                                  for unconditionally secure communication 145--168
                Denis S. Krotov   On the automorphism groups of the $ Z_2
                                  Z_4 $-linear $1$-perfect and
                                  Preparata-like codes . . . . . . . . . . 169--177
              Xiaotian Chen and   
                       Yue Zhou   Asynchronous channel hopping systems
                                  from difference sets . . . . . . . . . . 179--196
                Hongfeng Wu and   
                     Li Zhu and   
              Rongquan Feng and   
                     Siman Yang   Explicit factorizations of cyclotomic
                                  polynomials over finite fields . . . . . 197--217
                Bocong Chen and   
                  Liren Lin and   
                   San Ling and   
                    Hongwei Liu   Three new classes of optimal
                                  frequency-hopping sequence sets  . . . . 219--232

Designs, Codes, and Cryptography
Volume 83, Number 2, May, 2017

            Daniele Bartoli and   
          Stefano Marcugini and   
             Fernanda Pambianco   On the completeness of plane cubic
                                  curves over finite fields  . . . . . . . 233--267
             Angela Aguglia and   
                    Luca Giuzzi   Intersection sets, three-character
                                  multisets and associated codes . . . . . 269--282
                 M. Kuijper and   
                       R. Pinto   An iterative algorithm for
                                  parametrization of shortest length
                                  linear shift registers over finite chain
                                  rings  . . . . . . . . . . . . . . . . . 283--305
                Ziling Heng and   
                        Qin Yue   Evaluation of the Hamming weights of a
                                  class of linear codes based on Gauss
                                  sums . . . . . . . . . . . . . . . . . . 307--326
             Mahdi Sajadieh and   
              Arash Mirzaei and   
                 Hamid Mala and   
                 Vincent Rijmen   A new counting method to bound the
                                  number of active S-boxes in Rijndael and
                                  $3$D . . . . . . . . . . . . . . . . . . 327--343
               I. F. Rúa   Primitive semifields of order $ 2^{4e} $ 345--356
                   Bart Mennink   Optimal collision security in double
                                  block length hashing with single length
                                  key  . . . . . . . . . . . . . . . . . . 357--406
                 Yiyuan Luo and   
                 Xuejia Lai and   
                     Yujie Zhou   Generic attacks on the Lai--Massey
                                  scheme . . . . . . . . . . . . . . . . . 407--423
                 Jingxue Ma and   
                  Tao Zhang and   
                   Tao Feng and   
                     Gennian Ge   Some new results on permutation
                                  polynomials over finite fields . . . . . 425--443
               Yupeng Jiang and   
                Jiangshuai Yang   On the number of irreducible linear
                                  transformation shift registers . . . . . 445--454
                 Xiang Wang and   
                    Fang-Wei Fu   On the snake-in-the-box codes for rank
                                  modulation under Kendall's $ \tau
                                  $-metric . . . . . . . . . . . . . . . . 455--465
                Yonglin Hao and   
                    Willi Meier   Truncated differential based known-key
                                  attacks on round-reduced SIMON . . . . . 467--492

Designs, Codes, and Cryptography
Volume 83, Number 3, June, 2017

                 Tran van Trung   Simple $t$-designs: a recursive
                                  construction for arbitrary $t$ . . . . . 493--502
                  Tao Zhang and   
                     Gennian Ge   Quantum MDS codes with large minimum
                                  distance . . . . . . . . . . . . . . . . 503--517
                Elisa Gorla and   
                Maike Massierer   An optimal representation for the trace
                                  zero subgroup  . . . . . . . . . . . . . 519--548
          Esmeralda Nastase and   
                  Papa Sissokho   The structure of the minimum size
                                  supertail of a subspace partition  . . . 549--563
                 Xinxin Fan and   
           Adilet Otemissov and   
             Francesco Sica and   
               Andrey Sidorenko   Multiple point compression on elliptic
                                  curves . . . . . . . . . . . . . . . . . 565--588
               Jon-Lark Kim and   
                       Nari Lee   A projection decoding of a binary
                                  extremal self-dual code of length $ 40 $ 589--609
         Aras Erzurumluoglu and   
                  David A. Pike   Twofold triple systems without
                                  $2$-intersecting Gray codes  . . . . . . 611--631
                Lingfei Jin and   
                     Haibin Kan   Construction of binary linear codes via
                                  rational function fields . . . . . . . . 633--638
Umberto Martínez-Peñas   On the roots and minimum rank distance
                                  of skew cyclic codes . . . . . . . . . . 639--660
               Sergey Bereg and   
              Linda Morales and   
              I. Hal Sudborough   Extending permutation arrays: improving
                                  MOLS bounds  . . . . . . . . . . . . . . 661--683
           Victor J. W. Guo and   
                    Yiting Yang   Proof of a conjecture of Klòve on
                                  permutation codes under the Chebychev
                                  distance . . . . . . . . . . . . . . . . 685--690
              Chunming Tang and   
                  Can Xiang and   
                     Keqin Feng   Linear codes with few weights from
                                  inhomogeneous quadratic functions  . . . 691--714
                      Anonymous   Editor's note  . . . . . . . . . . . . . 715--716


Designs, Codes, and Cryptography
Volume 84, Number 1--2, July, 2017

              Aart Blokhuis and   
           Edwin R. van Dam and   
          Willem H. Haemers and   
                 Jack H. Koolen   Preface to the special issue dedicated
                                  to Andries E. Brouwer  . . . . . . . . . 1--2
                Jack Koolen and   
                       Zhi Qiao   Light tails and the Hermitian dual polar
                                  graphs . . . . . . . . . . . . . . . . . 3--12
            K. Ashik Mathew and   
Patric R. J. Östergård   New lower bounds for the Shannon
                                  capacity of odd cycles . . . . . . . . . 13--22
              Eiichi Bannai and   
              Etsuko Bannai and   
                        Yan Zhu   Relative $t$-designs in binary Hamming
                                  association scheme $ H(n, 2)$  . . . . . 23--53
                   V. Diego and   
                     M. A. Fiol   Distance mean-regular graphs . . . . . . 55--71
          Alireza Abdollahi and   
           Edwin R. van Dam and   
                Mojtaba Jazaeri   Distance-regular Cayley graphs with
                                  least eigenvalue $ - 2 $ . . . . . . . . 73--85
               Bart Litjens and   
                 Sven Polak and   
            Alexander Schrijver   Semidefinite bounds for nonbinary codes
                                  based on quadruples  . . . . . . . . . . 87--100
             Leonard H. Soicher   The uniqueness of a distance-regular
                                  graph with intersection array $ \{ 32,
                                  27, 8, 1; 1, 4, 27, 32 \} $ and related
                                  results  . . . . . . . . . . . . . . . . 101--108
           Peter J. Cameron and   
           Josephine Kusuma and   
            Patrick Solé   $ \mathbb {Z}_4 $-codes and their Gray
                                  map images as orthogonal arrays  . . . . 109--114
             Anurag Bishnoi and   
                  Bart De Bruyn   Characterizations of the Suzuki tower
                                  near polygons  . . . . . . . . . . . . . 115--133
              Xi-Ming Cheng and   
                 Jack H. Koolen   A generalization of a theorem of
                                  Neumaier . . . . . . . . . . . . . . . . 135--142
       Jozefien D'haeseleer and   
               Klaus Metsch and   
                 Leo Storme and   
         Geertrui Van de Voorde   On the maximality of a set of mutually
                                  orthogonal Sudoku latin Squares  . . . . 143--152
        Sebastian M. Cioaba and   
          Willem H. Haemers and   
              Jason R. Vermette   The graphs with all but two eigenvalues
                                  equal to $ - 2 $ or $0$  . . . . . . . . 153--163
            Vladimir D. Tonchev   On resolvable Steiner $2$-designs and
                                  maximal arcs in projective planes  . . . 165--172
               Akihiro Munemasa   Godsil--McKay switching and twisted
                                  Grassmann graphs . . . . . . . . . . . . 173--179
István Kovács and   
            Klavdija Kutnar and   
          János Ruff and   
          Tamás Sz\Honyi   Integral automorphisms of affine spaces
                                  over finite fields . . . . . . . . . . . 181--188
               Ebrahim Ghorbani   On eigenvalues of Seidel matrices and
                                  Haemers' conjecture  . . . . . . . . . . 189--195
                A. Blokhuis and   
                  G. Marino and   
                F. Mazzocca and   
                   O. Polverino   On almost small and almost large
                                  super-Vandermonde sets in $ {\rm GF}(q)
                                  $  . . . . . . . . . . . . . . . . . . . 197--201
               Mikhail Klin and   
                   Matan Ziv-Av   A non-Schurian coherent configuration on
                                  $ 14 $ points exists . . . . . . . . . . 203--221
              Nathann Cohen and   
           Dmitrii V. Pasechnik   Implementing Brouwer's database of
                                  strongly regular graphs  . . . . . . . . 223--235
                Arnold Neumaier   Bounding basis reduction properties  . . 237--259
Umberto Martínez-Peñas and   
                 Ruud Pellikaan   Rank error-correcting pairs  . . . . . . 261--281
          David B. Chandler and   
                  Peter Sin and   
                     Qing Xiang   The Smith group of the hypercube graph   283--294
                   Tom Verhoeff   The spurs of D. H. Lehmer  . . . . . . . 295--310

Designs, Codes, and Cryptography
Volume 84, Number 3, September, 2017

                 Huiwen Jia and   
                        Yupu Hu   Cryptanalysis of multilinear maps from
                                  ideal lattices: revisited  . . . . . . . 311--324
                  Zhaoping Meng   Doubly resolvable Steiner quadruple
                                  systems and related designs  . . . . . . 325--343
             Michel Lavrauw and   
                   John Sheekey   The BEL-rank of finite semifields  . . . 345--358
                 Shuxing Li and   
                     Gennian Ge   Constructions of maximum distance
                                  separable symbol-pair codes using cyclic
                                  and constacyclic codes . . . . . . . . . 359--372
             Angelo De Caro and   
                Vincenzo Iovino   On the power of rewinding simulators in
                                  functional encryption  . . . . . . . . . 373--399
                 Hongyu Han and   
               Daiyuan Peng and   
           Udaya Parampalli and   
                   Zheng Ma and   
                  Hongbin Liang   Construction of low-hit-zone frequency
                                  hopping sequences with optimal partial
                                  Hamming correlation by interleaving
                                  techniques . . . . . . . . . . . . . . . 401--414
             James A. Davis and   
           Sophie Huczynska and   
                 Gary L. Mullen   Near-complete external difference
                                  families . . . . . . . . . . . . . . . . 415--424
               Ana Salagean and   
                  R. Winter and   
    Matei Mandache-Salagean and   
             Raphael C.-W. Phan   Higher order differentiation over finite
                                  fields with applications to generalising
                                  the cube attack  . . . . . . . . . . . . 425--449
          Stefaan De Winter and   
                    Zeying Wang   Classification of partial difference
                                  sets in Abelian groups of order $ 4 p^2
                                  $  . . . . . . . . . . . . . . . . . . . 451--461
                Lingfei Jin and   
                 Haibin Kan and   
                        Jie Wen   Quantum MDS codes with relatively large
                                  minimum distance from Hermitian
                                  self-orthogonal codes  . . . . . . . . . 463--471
                    Yun Fan and   
                    Liang Zhang   Galois self-dual constacyclic codes  . . 473--492


Designs, Codes, and Cryptography
Volume 85, Number 1, October, 2017

             Thor Martinsen and   
             Wilfried Meidl and   
             Pantelimon Stanica   Partial spread and vectorial generalized
                                  bent functions . . . . . . . . . . . . . 1--13
                  Gang Shen and   
                   Feng Liu and   
                Zhengxin Fu and   
                         Bin Yu   Perfect contrast XOR-based visual
                                  cryptography schemes via linear algebra  15--37
                Kwangsu Lee and   
              Dong Hoon Lee and   
                 Jong Hwan Park   Efficient revocable identity-based
                                  encryption via subset difference methods 39--76
            Eleonesio Strey and   
              Sueli I. R. Costa   Lattices from codes over $ \mathbb {Z}_q
                                  $: generalization of constructions $D$,
                                  $ D'$ and $ \overline {D}$ . . . . . . . 77--95
                    Sascha Kurz   Improved upper bounds for partial
                                  spreads  . . . . . . . . . . . . . . . . 97--106
         Günter F. Steinke   Collineations of finite $2$-affine
                                  planes . . . . . . . . . . . . . . . . . 107--120
                 Leyla Isik and   
             Alev Topuzoglu and   
                 Arne Winterhof   Complete mappings and Carlitz rank . . . 121--128
                Peter Horak and   
                Igor Semaev and   
                     Zsolt Tuza   A combinatorial problem related to
                                  sparse systems of equations  . . . . . . 129--144
               Rongmao Chen and   
                      Yi Mu and   
                Guomin Yang and   
               Willy Susilo and   
                     Fuchun Guo   Strong authenticated key exchange with
                                  auxiliary inputs . . . . . . . . . . . . 145--173
               Rongmao Chen and   
                      Yi Mu and   
                Guomin Yang and   
               Willy Susilo and   
                 Fuchun Guo and   
                     Yang Zheng   A note on the strong authenticated key
                                  exchange with auxiliary inputs . . . . . 175--178
                  Jian Yuan and   
                 Shixin Zhu and   
               Xiaoshan Kai and   
                        Ping Li   On the construction of quantum
                                  constacyclic codes . . . . . . . . . . . 179--190

Designs, Codes, and Cryptography
Volume 85, Number 2, November, 2017

                 Kamil Otal and   
            Ferruh Özbudak   Cyclic subspace codes via subspace
                                  polynomials  . . . . . . . . . . . . . . 191--204
               Satoshi Yoshiara   Equivalences among plateaued APN
                                  functions  . . . . . . . . . . . . . . . 205--217
             Limengnan Zhou and   
               Daiyuan Peng and   
              Hongbin Liang and   
             Changyuan Wang and   
                       Zheng Ma   Constructions of optimal low-hit-zone
                                  frequency hopping sequence sets  . . . . 219--232
            Vladimir D. Tonchev   Linearly embeddable designs  . . . . . . 233--247
               Junling Zhou and   
                   Yanxun Chang   Bounds and constructions of
                                  $t$-spontaneous emission error designs   249--271
             Kaoru Kurosawa and   
                 Le Trieu Phong   Anonymous and leakage resilient IBE and
                                  IPE  . . . . . . . . . . . . . . . . . . 273--298
              Jingyuan Chen and   
                   Lijun Ji and   
                         Yun Li   New optical orthogonal signature pattern
                                  codes with maximum collision parameter
                                  $2$ and weight $4$ . . . . . . . . . . . 299--318
                    Yun Fan and   
                    Bangteng Xu   Nonlinear functions and difference sets
                                  on group actions . . . . . . . . . . . . 319--341
                 Junwu Dong and   
                     Dingyi Pei   Construction for de Bruijn sequences
                                  with large stage . . . . . . . . . . . . 343--358
Luis Felipe Tapia Cuitiño and   
            Andrea Luigi Tironi   Some properties of skew codes over
                                  finite fields  . . . . . . . . . . . . . 359--380
              Abbas Alhakim and   
                 Maher Nouiehed   Stretching de Bruijn sequences . . . . . 381--394

Designs, Codes, and Cryptography
Volume 85, Number 3, December, 2017

               Nikolay Kolomeec   The graph of minimal distances of bent
                                  functions and its properties . . . . . . 395--410
                  Hao Zheng and   
               Yanxun Chang and   
                   Junling Zhou   Large sets of Kirkman triple systems of
                                  prime power sizes  . . . . . . . . . . . 411--423
              Zongchen Chen and   
                        Da Zhao   On symmetric BIBDs with the same
                                  $3$-concurrence  . . . . . . . . . . . . 425--436
          Georgios Tzanakis and   
                Lucia Moura and   
             Daniel Panario and   
                  Brett Stevens   Covering arrays from m-sequences and
                                  character sums . . . . . . . . . . . . . 437--456
         Antonio Cossidente and   
               Francesco Pavese   Strongly regular graphs from classical
                                  generalized quadrangles  . . . . . . . . 457--470
                 Jianing Li and   
                    Yingpu Deng   Nonexistence of two classes of
                                  generalized bent functions . . . . . . . 471--482
            Manabu Hagiwara and   
                    Justin Kong   Consolidation for compact constraints
                                  and Kendall tau LP decodable permutation
                                  codes  . . . . . . . . . . . . . . . . . 483--521
                     Ronan Egan   On equivalence of negaperiodic Golay
                                  pairs  . . . . . . . . . . . . . . . . . 523--532
                   Xin Wang and   
                Yiwei Zhang and   
                Yiting Yang and   
                     Gennian Ge   New bounds of permutation codes under
                                  Hamming metric and Kendall's $ \tau
                                  $-metric . . . . . . . . . . . . . . . . 533--545
                 Amir Rubin and   
                     Gera Weiss   Mapping prefer-opposite to prefer-one de
                                  Bruijn sequences . . . . . . . . . . . . 547--555
             Joaquim Borges and   
Cristina Fernández-Córdoba   There is exactly one $ \mathbb {Z}_2
                                  \mathbb {Z}_4 $-cyclic $1$-perfect code  557--566


Designs, Codes, and Cryptography
Volume 86, Number 1, January, 2018

          Javier de la Cruz and   
                Elisa Gorla and   
      Hiram H. López and   
              Alberto Ravagnani   Weight distribution of rank-metric codes 1--16
             Yohei Watanabe and   
                  Junji Shikata   Timed-release computational secret
                                  sharing and threshold encryption . . . . 17--54
           Gottfried Herold and   
           Elena Kirshanova and   
                  Alexander May   On the asymptotic complexity of solving
                                  LWE  . . . . . . . . . . . . . . . . . . 55--83
      Oliver Wilhelm Gnilke and   
           Marcus Greferath and   
         Mario Osvin Pavcevi\'c   Mosaics of combinatorial designs . . . . 85--95
                Jongkil Kim and   
               Willy Susilo and   
                 Fuchun Guo and   
                      Man Ho Au   Functional encryption for computational
                                  hiding in prime order groups via pair
                                  encodings  . . . . . . . . . . . . . . . 97--120
               Kenza Guenda and   
            Somphong Jitman and   
              T. Aaron Gulliver   Constructions of good
                                  entanglement-assisted quantum error
                                  correcting codes . . . . . . . . . . . . 121--136
           Léo Ducas and   
       Wessel P. J. van Woerden   The closest vector problem in tensored
                                  root lattices of type A and in their
                                  duals  . . . . . . . . . . . . . . . . . 137--150
                Qichun Wang and   
               Chik How Tan and   
           Theo Fanuela Prabowo   On the covering radius of the third
                                  order Reed--Muller code $ {\rm RM}(3, 7)
                                  $  . . . . . . . . . . . . . . . . . . . 151--159
            Daniele Bartoli and   
           Maria Montanucci and   
                  Giovanni Zini   Multi point AG codes on the GK maximal
                                  curve  . . . . . . . . . . . . . . . . . 161--177
            Alice M. W. Hui and   
                B. G. Rodrigues   Switched graphs of some strongly regular
                                  graphs related to the symplectic graph   179--194
         Douglas R. Stinson and   
                   Ruizhong Wei   Combinatorial repairability for
                                  threshold schemes  . . . . . . . . . . . 195--210
             Chuangqiang Hu and   
                     Shudi Yang   Multi-point codes over Kummer extensions 211--230
     Alexander L. Gavrilyuk and   
                Ilia Matkin and   
                   Tim Penttila   Derivation of Cameron--Liebler line
                                  classes  . . . . . . . . . . . . . . . . 231--236

Designs, Codes, and Cryptography
Volume 86, Number 2, February, 2018

         Simon R. Blackburn and   
           Marcus Greferath and   
           Camilla Hollanti and   
     Mario Osvin Pavcevi\'c and   
          Joachim Rosenthal and   
                 Leo Storme and   
Ángeles Vázquez-Castro and   
              Alfred Wassermann   Preface to the special issue on network
                                  coding and designs . . . . . . . . . . . 237--238
          Michael Kiermaier and   
                Sascha Kurz and   
              Alfred Wassermann   The order of the automorphism group of a
                                  binary $ {\vec{q}} $-analog of the Fano
                                  plane is at most two . . . . . . . . . . 239--250
          Michael Kiermaier and   
              Reinhard Laue and   
              Alfred Wassermann   A new series of large sets of subspace
                                  designs over the binary field  . . . . . 251--268
              Dirk Liebhold and   
              Gabriele Nebe and   
         Angeles Vazquez-Castro   Network coding with flags  . . . . . . . 269--284
              Paulo Almeida and   
                 Diego Napp and   
                   Raquel Pinto   MDS 2D convolutional codes with optimal
                                  1D horizontal projections  . . . . . . . 285--302
                    D. Napp and   
                   R. Pinto and   
                   V. Sidorenko   Concatenation of convolutional codes and
                                  rank metric codes for multi-shot network
                                  coding . . . . . . . . . . . . . . . . . 303--318
Anna-Lena Horlemann-Trautmann and   
              Kyle Marshall and   
              Joachim Rosenthal   Extension of Overbeck's attack for
                                  Gabidulin-based cryptosystems  . . . . . 319--340
            Alessandro Neri and   
Anna-Lena Horlemann-Trautmann and   
    Tovohery Randrianarisoa and   
              Joachim Rosenthal   On the genericity of maximum rank
                                  distance and Gabidulin codes . . . . . . 341--363
  Anna-Lena Horlemann-Trautmann   Message encoding and retrieval for
                                  spread and cyclic orbit codes  . . . . . 365--386
              Netanel Raviv and   
              Eitan Yaakobi and   
           Muriel Médard   Coding for locality in reconstructing
                                  permutations . . . . . . . . . . . . . . 387--418
        Natalia Silberstein and   
                  Alexander Zeh   Anticode-based locally repairable codes
                                  with high availability . . . . . . . . . 419--445

Designs, Codes, and Cryptography
Volume 86, Number 3, March, 2018

                      Anonymous   Editor's note  . . . . . . . . . . . . . 447--447
          Dieter Jungnickel and   
            Vladimir D. Tonchev   On Bonisoli's theorem and the block
                                  codes of Steiner triple systems  . . . . 449--462
             Joaquim Borges and   
Cristina Fernández-Córdoba and   
                Roger Ten-Valls   $ {{\mathbb {Z}}}_2$-double cyclic codes 463--479
            Mich\`ele Feltz and   
                    Cas Cremers   Strengthening the security of
                                  authenticated key exchange against bad
                                  randomness . . . . . . . . . . . . . . . 481--516
                  Shuai Han and   
                Shengli Liu and   
                Baodong Qin and   
                        Dawu Gu   Tightly CCA-secure identity-based
                                  encryption with ciphertext
                                  pseudorandomness . . . . . . . . . . . . 517--554
         Ales Drápal and   
                  Viliam Valent   Few associative triples, isotopisms and
                                  groups . . . . . . . . . . . . . . . . . 555--568
       Roland D. Barrolleta and   
             Merc\`e Villanueva   Partial permutation decoding for binary
                                  linear and $ Z_4 $-linear Hadamard codes 569--586
          Dieter Jungnickel and   
                   Yue Zhou and   
            Vladimir D. Tonchev   Extension sets, affine designs, and
                                  Hamada's conjecture  . . . . . . . . . . 587--610
     Jürgen Bierbrauer and   
            Daniele Bartoli and   
              Giorgio Faina and   
          Stefano Marcugini and   
             Fernanda Pambianco   A family of semifields in odd
                                  characteristic . . . . . . . . . . . . . 611--621
               Jooyoung Lee and   
                 Atul Luykx and   
               Bart Mennink and   
             Kazuhiko Minematsu   Connecting tweakable and multi-key
                                  blockcipher security . . . . . . . . . . 623--640
            Seung Geol Choi and   
         Dana Dachman-Soled and   
                 Tal Malkin and   
                    Hoeteck Wee   Improved, black-box, non-malleable
                                  encryption from semantic security  . . . 641--663
               Ulrich Dempwolff   CCZ equivalence of power functions . . . 665--692
     Rafael A. Arce-Nazario and   
          Francis N. Castro and   
   Oscar E. González and   
             Luis A. Medina and   
              Ivelisse M. Rubio   New families of balanced symmetric
                                  functions and a generalization of
                                  Cusick, Li and St\uanic\ua's conjecture  693--701
                  Cunsheng Ding   Infinite families of $3$-designs from a
                                  type of five-weight code . . . . . . . . 703--719