Last update: Sat Nov 23 14:40:09 MST 2024
Volume 1, Number 1, May, 1991Anonymous Editorial . . . . . . . . . . . . . . . 5 G. Eric Moorhouse Bruck nets, codes, and characters of loops . . . . . . . . . . . . . . . . . 7--29 A. Tietäväinen Covering radius and dual distance . . . 31--46 B. A. LaMacchia and A. M. Odlyzko Computation of discrete logarithms in prime fields . . . . . . . . . . . . . . 47--62 E. R. Lamken and W. H. Mills and R. M. Wilson Four pairwise balanced designs . . . . . 63--68 Chat Yin Ho Some remarks on orders of projective planes, planar difference sets and multipliers . . . . . . . . . . . . . . 69--75 Juriaan Simonis and Cornelis de Vroedt A simple proof of the Delsarte inequalities . . . . . . . . . . . . . . 77--82 K. T. Arasu and Alexander Pott On quasiregular collineation groups of projective planes . . . . . . . . . . . 83--92
Klaus Metsch Improvement of Bruck's completion theorem . . . . . . . . . . . . . . . . 99--116 James A. Davis A note on products of relative difference sets . . . . . . . . . . . . 117--119 Helmut Siemon Cyclic Steiner quadruple systems and Köhler's orbit graphs . . . . . . . . . . 121--132 David J. Peterson Fractal properties of the singular function $s(u)$ . . . . . . . . . . . . 133--139 Jürgen Bierbrauer and Tran Van Trung Halving ${\rm PGL}(2,2^f), f$ odd: a series of cryptocodes . . . . . . . . . 141--148 B. A. Anderson and P. A. Leonard A class of self-orthogonal $2$-sequencings . . . . . . . . . . . . 149--181 Douglas A. Leonard Linear cyclic codes of wordlength $v$ over ${\rm GF}(q^s)$ which are also linear cyclic codes of wordlength $sv$ over ${\rm GF}(q)$ . . . . . . . . . . . 183--189
A. A. Bruen and J. C. Fisher The Jamison method in Galois geometries 199--205 Oliver Pfaff The classification of doubly transitive affine designs . . . . . . . . . . . . . 207--217 Dirk Hachenberger Constructions of large translation nets with nonabelian translation groups . . . 219--236 Anne Delandtsheer Dimensional linear spaces whose automorphism group is (line, hyperplane)-flag transitive . . . . . . 237--245 D. Jungnickel and Vladimir D. Tonchev Exponential number of quasi-symmetric SDP designs and codes meeting the Grey-Rankin bound . . . . . . . . . . . 247--253 J. D. Key Hermitian varieties as codewords . . . . 255--259 E. W. Lambeck A remark on the intersection arrays of distance regular graphs and the distance regular graphs of diameter $d=3i-1$ with $b_i=1$ and $k>2$ . . . . . . . . . . . . 261--266
Antonio Pasini Diagram geometries for sharply $n$-transitive sets of permutations or of mappings . . . . . . . . . . . . . . 275--297 H. Van Maldeghem and J. A. Thas and S. E. Payne Desarguesian finite generalized quadrangles are classical or dual classical . . . . . . . . . . . . . . . 299--305 Jürgen Bierbrauer and Tran Van Trung Some highly symmetric authentication perpendicular arrays . . . . . . . . . . 307--319 S. L. Ma McFarland's conjecture on abelian difference sets with multiplier $-1$ . . 321--332 Ka Hin Leung and Siu Lun Ma and Yan Loi Wong Difference sets in dihedral groups . . . 333--338
Tomik Yaghoobian and Ian F. Blake Hermitian codes as generalized Reed--Solomon codes . . . . . . . . . . 5--17 Jonathan Jedwab Generalized perfect arrays and Menon difference sets . . . . . . . . . . . . 19--68 Bhaskar Bagchi On quasi-symmetric designs . . . . . . . 69--79 P. P. Greenough and R. Hill Optimal ternary quasi-cyclic codes . . . 81--91 Jonathan Jedwab and Sheelagh Lloyd A note on the nonexistence of Barker sequences . . . . . . . . . . . . . . . 93--97
Whitfield Diffie and Paul C. van Oorschot and Michael J. Wiener Authentication and authenticated key exchanges . . . . . . . . . . . . . . . 107--125 Edward Spence A complete classification of symmetric $(31,10,3)$ designs . . . . . . . . . . 127--136 R. Hill and D. E. Newton Optimal ternary linear codes . . . . . . 137--157 Darryn E. Bryant Varieties of quasigroups arising from $2$-perfect $m$-cycle systems . . . . . 159--168 Stephen D. Cohen The explicit construction of irreducible polynomials over finite fields . . . . . 169--174 D. R. Stinson Combinatorial characterizations of authentication codes . . . . . . . . . . 175--187 A. Blokhuis and A. R. Calderbank Quasi-symmetric designs and the Smith normal form . . . . . . . . . . . . . . 189--206
Xiang Dong Hou Some inequalities about the covering radius of Reed--Muller codes . . . . . . 215--224 Noboru Hamada and Tor Helleseth and Òyvind Ytrehus On the construction of $[q^4+q^2-q,5,q^4-q^3+q^2-2q;q]$-codes meeting the Griesmer bound . . . . . . . 225--229 Michael R. Fellows and Neal Koblitz Self-witnessing polynomial-time complexity and prime factorization . . . 231--235 Charles J. Colbourn and Eric Mendelsohn and Cheryl E. Praeger and Vladimir D. Tonchev Concerning multiplier automorphisms of cyclic Steiner triple systems . . . . . 237--251 Ronald Shaw A characterization of the primals in ${\rm PG}(m,2)$ . . . . . . . . . . . . 253--256 K. T. Arasu and Qing Xiang On the existence of periodic complementary binary sequences . . . . . 257--262 Alexander Pott On abelian difference set codes . . . . 263--271 Peter Landrock and Olaf Manz Classical codes as ideals in group algebras . . . . . . . . . . . . . . . . 273--285 Thomas Beth and Volker Hatz Design machines: algebraically well described interconnection networks . . . 287--298
Nicola Melone and Udo Ott On the rank of truncated incidence matrices of linear spaces . . . . . . . 307--313 Shuhong Gao and Hendrik W. Lenstra, Jr. Optimal normal bases . . . . . . . . . . 315--323 W.-A. Jackson and P. R. Wild Relations between two perfect ternary sequence constructions . . . . . . . . . 325--332 Zhe Xian Wan Construction of Cartesian authentication codes from unitary geometry . . . . . . 333--356 D. R. Stinson An explication of secret sharing schemes 357--390 D. de Caen and C. D. Godsil and G. F. Royle On the $p$-rank of incidence matrices and a bound of Bruen and Ott . . . . . . 391--394 Bernhard Schmidt Note on a question by S. Bagchi and B. Bagchi: ``Designs from pairs of finite fields. I. A cyclic unital $U(6)$ and other regular Steiner $2$-designs'' [J. Combin. Theory Ser. A 52 (1989), no. 1, 51--61; MR 90k:05025] . . . . . . . . . 395--395
Donovan R. Hare and William McCuaig The connectivity of the block-intersection graphs of designs . . 5--8 W. D. Wallis and J. L. Yucas and G.-H. Zhang Single change covering designs . . . . . 9--19 Charles Laywine Subsquares in orthogonal Latin squares as subspaces in affine geometries: a generalization of an equivalence of Bose 21--28 Levon H. Khachatrian The lower bound of the quadratic spans of de Bruijn sequences . . . . . . . . . 29--32 E. R. Lamken Existence results for generalized balanced tournament designs with block size $3$ . . . . . . . . . . . . . . . . 33--61 Chris M. Skinner Nonsymmetric $2$-designs modulo $2$ . . 63--68 Peter Boyvalenkov Nonexistence of certain symmetric spherical codes . . . . . . . . . . . . 69--74 W. de Launey and K. J. Horadam A weak difference set construction for higher-dimensional designs . . . . . . . 75--87
A. E. Brouwer and L. M. G. M. Tolhuizen A sharpening of the Johnson bound for binary linear codes and the nonexistence of linear codes with Preparata parameters . . . . . . . . . . . . . . . 95--98 V. C. Mavron and W. D. Wallis Cubic arcs in cubic nets . . . . . . . . 99--104 Alexander Barg Incomplete sums, dc-constrained codes, and codes that maintain synchronization 105--116 J. D. Key and F. E. Sullivan Codes of Steiner triple and quadruple systems . . . . . . . . . . . . . . . . 117--125 Albrecht Beutelspacher and Ferenc Wettl On $2$-level secret sharing . . . . . . 127--134 Claude Carlet Partially-bent functions . . . . . . . . 135--145 W. K. Chan Necessary conditions for Menon difference sets . . . . . . . . . . . . 147--154 S. S. Sane and M. S. Shrikhande Some characterizations of quasi-symmetric designs with a spread 155--166 Xiang Dong Hou Further results on the covering radii of the Reed--Muller codes . . . . . . . . . 167--177
Aart Blokhuis and Klaus Metsch On the size of a maximal partial spread 187--191 Edwin R. van Dam Classification of spreads of ${\rm PG}(3,4)\sbs{\rm PG}(3,2)$ . . . . . . . 193--198 Thomas Beth The ${\rm GF}(p)$-dimension of the codes generated by the classical point-line geometries over ${\rm GF}(p)$ . . . . . 199--207 Charles J. Colbourn and Alexander Rosa and \vStefan Znám The spectrum of maximal partial Steiner triple systems . . . . . . . . . . . . . 209--219 Josep Rif\`a-Coma How to avoid the cheaters succeeding in the key sharing scheme . . . . . . . . . 221--228 Christine M. O'Keefe and Alan Rahilly Spreads and group divisible designs . . 229--235 Claude Carlet The automorphism groups of the Delsarte-Goethals codes . . . . . . . . 237--249 Heikki O. Hämäläinen and Iiro S. Honkala and Markku K. Kaikkonen and Simon N. Litsyn Bounds for binary multiple covering codes . . . . . . . . . . . . . . . . . 251--275
Sara Bitan and Tuvi Etzion The last packing number of quadruples, and cyclic SQS . . . . . . . . . . . . . 283--313 Steven Dougherty Nets and their codes . . . . . . . . . . 315--331 Willi Geiselmann and Dieter Gollmann Self-dual bases in ${\bf F}_{q^n}$ . . . 333--345 A. Klapper Cross-correlations of geometric sequences in characteristic two . . . . 347--377 James A. Davis and Jonathan Jedwab A note on new semi-regular divisible difference sets . . . . . . . . . . . . 379--381
Luc Teirlinck Some new $2$-resolvable Steiner quadruple systems . . . . . . . . . . . 5--10 Chris J. Mitchell and Kenneth G. Paterson Decoding perfect maps . . . . . . . . . 11--30 J. H. Conway and N. J. A. Sloane Quaternary constructions for the binary single-error-correcting codes of Julin, Best and others . . . . . . . . . . . . 31--42 George T. Kennedy and Vera Pless On designs and formally self-dual codes 43--55 Stefan M. Dodunekov and Silvia B. Encheva and Stoyan N. Kapralov On the $[28, 7, 12]$ binary self-complementary codes and their residuals . . . . . . . . . . . . . . . 57--67 Thomas Johansson A shift register construction of unconditionally secure authentication codes . . . . . . . . . . . . . . . . . 69--81 Wen-Ai Jackson and Keith M. Martin Geometric secret sharing schemes and their duals . . . . . . . . . . . . . . 83--95
U. Dempwolff Translation planes of order $27$ . . . . 105--121 Steven T. Dougherty A coding-theoretic solution to the $36$ officer problem . . . . . . . . . . . . 123--128 Dirk Hachenberger On completely free elements in finite fields . . . . . . . . . . . . . . . . . 129--143 Roberta Evans Sabin On row-cyclic codes with algebraic structure . . . . . . . . . . . . . . . 145--155 Attila Sali On the rigidity of spherical $t$-designs that are orbits of finite reflection groups . . . . . . . . . . . . . . . . . 157--170 Gérald E. Séguin A counter-example to a recent result on the $q$-ary image of a $q^s$-ary cyclic code . . . . . . . . . . . . . . . . . . 171--175 Kathleen A. S. Quinn Some constructions for key distribution patterns . . . . . . . . . . . . . . . . 177--191 Alfred Menezes Book review . . . . . . . . . . . . . . 193
A. R. Calderbank and P. C. Fishburn Maximal three-independent subsets of $\{0,1,2\}^n$ . . . . . . . . . . . . . 203--211 Olof Heden A binary perfect code of length $15$ and codimension $0$ . . . . . . . . . . . . 213--220 S. L. Ma A survey of partial difference sets . . 221--261 M. J. B. Robshaw On evaluating the linear complexity of a sequence of least period $2^n$ . . . . . 263--269 M. van Eupen and R. Hill An optimal ternary $[69,5,45]$ code and related codes . . . . . . . . . . . . . 271--282 Zhe Xian Wan The weight hierarchies of the projective codes from nondegenerate quadrics . . . 283--300
R. D. Baker and G. L. Ebert A Bruen chain for $q=19$ . . . . . . . . 307--312 Yu Qing Chen and Qing Xiang and Surinder K. Sehgal An exponent bound on skew Hadamard abelian difference sets . . . . . . . . 313--317 Dieter Jungnickel and Alexander Pott A new class of symmetric $(v,k,\lambda)$-designs . . . . . . . . 319--325 C. Koukouvinos and S. Kounias and J. Seberry and C. H. Yang and J. Yang On sequences with zero autocorrelation 327--340 Chris J. Mitchell Constructing $c$-ary perfect factors . . 341--368 D. R. Stinson Universal hashing and authentication codes . . . . . . . . . . . . . . . . . 369--380 Gilles Zémor Hash functions and Cayley graphs . . . . 381--394
K. T. Arasu and Surinder K. Sehgal Difference Sets in Abelian Groups of $p$-Rank Two . . . . . . . . . . . . . . 5--12 Marco Buratti A Powerful Method for Constructing Difference Families and Optimal Optical Orthogonal Codes . . . . . . . . . . . . 13--25 M. J. Coster and W. H. Haemers Quasi-Symmetric Designs Related to the Triangular Graph . . . . . . . . . . . . 27--42 Clement Lam and Larry Thiel and Vladimir D. Tonchev On quasi-symmetric $2$-$(28,12,11)$ and $2$-$(36,16,12)$ designs . . . . . . . . 43--55 Rudolf Mathon and Gordon F. Royle The Translation Planes of Order $49$ . . 57--72 David Naccache and David M'Ra\"\ihi and Dan Raphaeli Can Montgomery Parasites Be Avoided? A Design Methodology Based on Key and Cryptosystem Modifications . . . . . . . 73--80 U. Dempwolff Correction to: ``Translation planes of order $27$'' [Des. Codes Cryptogr. 4 (1994), no. 2, 105--121; MR 95a:51012] 81--81
Ahmed M. Assaf On Covering Designs with Block Size $5$ and Index $5$ . . . . . . . . . . . . . 91--107 David Gillman and Ronald L. Rivest Complete Variable-Length ``Fix-Free'' Codes . . . . . . . . . . . . . . . . . 109--114 Kenneth G. Paterson Perfect Factors in the de Bruijn Graph 115--138 René Peeters On the $p$-Ranks of Net Graphs . . . . . 139--153 Stephan J. Suchower Nonisomorphic Complete Sets of $F$-Rectangles with Prime Power Dimensions . . . . . . . . . . . . . . . 155--174
Marco Carpentieri A Perfect Threshold Secret Sharing Scheme to Identify Cheaters . . . . . . 183--187 Charles J. Colbourn and Jeffrey H. Dinitz and Mieczys\law Wojtas Thwarts in Transversal Designs . . . . . 189--197 R. Craigen The Structure of Weighing Matrices having Large Weights . . . . . . . . . . 199--216 Tuvi Etzion and Victor Wei and Zhen Zhang Bounds on the Sizes of Constant Weight Covering Codes . . . . . . . . . . . . . 217--239 K. Gopalakrishnan and D. R. Stinson Three Characterizations of Non-binary Correlation-Immune and Resilient Functions . . . . . . . . . . . . . . . 241--251 Akihiro Munemasa On Perfect $t$-Shift Codes in Abelian Groups . . . . . . . . . . . . . . . . . 253--259 Christine M. O'Keefe Key Distribution Patterns using Minkowski Planes . . . . . . . . . . . . 261--267 Tran Van Trung On the Construction of Authentication and Secrecy Codes . . . . . . . . . . . 269--280 J. D. Key and F. E. Sullivan Erratum: ``Codes of Steiner triple and quadruple systems'' [Des. Codes Cryptogr. \bf 3 (1993), no. 2, 117--125; MR 94e:05050] . . . . . . . . . . . . . 281--281
Patrick A. H. Bours On the Construction of Perfect Deletion-Correcting Codes using Design Theory . . . . . . . . . . . . . . . . . 5--20 A. R. Calderbank and N. J. A. Sloane Modular and $p$-adic Cyclic Codes . . . 21--35 J. K. Gibson Severely Denting the Gabidulin Version of the McEliece Public Key Cryptosystem 37--45 Glenn Hurlbert and Garth Isaak New Constructions for de Bruijn Tori . . 47--56 S. L. Ma and Bernhard Schmidt On $(p^a,p,p^a,p^{a-1})$-relative difference sets . . . . . . . . . . . . 57--71 W. J. Martin and X. J. Zhu Anticodes for the Grassman and bilinear forms graphs . . . . . . . . . . . . . . 73--79
Masaaki Harada and Hiroshi Kimura New Extremal Doubly-Even $[64, 32, 12]$ Codes . . . . . . . . . . . . . . . . . 91--96 W. Cary Huffman and Vladimir D. Tonchev The existence of extremal self-dual $[50,25,10]$ codes and quasi-symmetric $2$-$(49,9,6)$ designs . . . . . . . . . 97--106 Helmut Meyn Explicit $N$-Polynomials of $2$-Power Degree over Finite Fields, I . . . . . . 107--116 Renate Scheidler and Hugh C. Williams A Public-Key Cryptosystem Utilizing Cyclotomic Fields . . . . . . . . . . . 117--131 N. Shalaby and J. Yin Directed packings with block size $5$ and even $\nu$ . . . . . . . . . . . . . 133--142 Marten van Dijk On the Information Rate of Perfect Secret Sharing Schemes . . . . . . . . . 143--169
P. Dey and J. L. Hayden On Symmetric Incidence Matrices of Projective Planes . . . . . . . . . . . 179--188 D. G. Glynn and J. W. P. Hirschfeld On the Classification of Geometric Codes by Polynomial Functions . . . . . . . . 189--204 Thomas Johansson Authentication Codes for Nontrusting Parties Obtained from Rank Metric Codes 205--218 Yaron Klein and Simon Litsyn and Alexander Vardy Two New Bounds on the Size of Binary Codes with a Minimum Distance of Three 219--227 Tim Penttila and Gordon F. Royle Sets of Type $(m, n)$ in the Affine and Projective Planes of Order Nine . . . . 229--245 Kevin T. Phelps and Mike Levan Kernels of Nonlinear Hamming Codes . . . 247--257
Anonymous Foreword to this issue . . . . . . . . . 7--8 Whitfield Diffie The National Security Establishment and the Development of Public-Key Cryptography . . . . . . . . . . . . . . 9--12 Mary Fischer ``And Now For Something Completely Different'' (The Egyptologist and the Cryptographer: a Personal Reminiscence) 13--15 Thomas Beth Watching the Bhang Meter and Flying through Dirt . . . . . . . . . . . . . . 17--25 Paul Syverson and Catherine Meadows A Formal Language for Cryptographic Protocol Requirements . . . . . . . . . 27--59 Kaisa Nyberg and Rainer A. Rueppel Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem 61--81 R. Safavi-Naini and L. Tombak Authentication Codes in Plaintext and Chosen-Content Attacks . . . . . . . . . 83--99 C. J. Mitchell and F. C. Piper and M. Walker and P. Wild Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes . . . . . . . . . . . . 101--110 Xian-Mo Zhang and Yuliang Zheng Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors . . . . . . . . . . . . . . . . 111--134 Dieter Gollmann and Yongfei Han and Chris J. Mitchell Redundant Integer Representations and Fast Exponentiation . . . . . . . . . . 135--151 R. Scheidler and A. Stein and Hugh C. Williams Key-Exchange in Real Quadratic Congruence Function Fields . . . . . . . 153--174 J. D. Key and F. E. Sullivan Correction to: ``Codes of Steiner triple and quadruple systems'' [Des. Codes Cryptogr. \bf 3 (1993), no. 2, 117--125; MR 94e:05050] . . . . . . . . . . . . . 175--175
Alexey E. Ashikhmin and Simon N. Litsyn Fast Decoding Algorithms for First Order Reed--Muller and Related Codes . . . . . 187--214 Thierry P. Berger On the Automorphism Groups of Affine-Invariant Codes . . . . . . . . . 215--221 T. Aaron Gulliver and Vijay K. Bhargava New Good Rate $(m-1)/pm$ Ternary and Quaternary Quasi-Cyclic Codes . . . . . 223--233 Marijn Van Eupen and Noboru Hamada and Yoko Watamori The Nonexistence of Ternary $[50,5,32]$ Codes . . . . . . . . . . . . . . . . . 235--237 Rolf S. Rees and Douglas R. Stinson Combinatorial characterizations of authentication codes. II . . . . . . . . 239--259
Dieter Jungnickel and Günter Pickert A Life's Work in Geometry: An Homage to Hanfried Lenz . . . . . . . . . . . . . 9--22 K. T. Arasu and Alexander Pott Impossibility of a Certain Cyclotomic Equation with Applications to Difference Sets . . . . . . . . . . . . . . . . . . 23--27 Alphonse Baartmans and Ivan Landjev and Vladimir D. Tonchev On the Binary Codes of Steiner Triple Systems . . . . . . . . . . . . . . . . 29--43 R. A. Bailey Orthogonal Partitions in Designed Experiments . . . . . . . . . . . . . . 45--77 R. D. Baker and G. L. Ebert Regulus-free spreads of ${\rm PG}(3, q)$ 79--89 Thomas Beth Designs, Codes and Crypts --- a Puzzle Altogether . . . . . . . . . . . . . . . 91--101 Darryn E. Bryant and D. G. Hoffman and C. A. Rodger $5$-Cycle Systems with Holes . . . . . . 103--108 Peter J. Cameron Stories about Groups and Sequences . . . 109--133 Dirk Hachenberger Groups Admitting a Kantor Family and a Factorized Normal Subgroup . . . . . . . 135--143 Willem H. Haemers and Vladimir D. Tonchev Spreads in Strongly Regular Graphs . . . 145--157 Dieter Jungnickel and Marialuisa J. de Resmini and Scott A. Vanstone Codes Based on Complete Graphs . . . . . 159--165 Ka Hin Leung and Siu Lun Ma A construction of partial difference sets in $Z_{p^2}\times Z_{p^2}\times\cdots\times Z_{p^2}$ . . . 167--172 Arlene A. Pascasio and Cheryl E. Praeger and Blessilda P. Raposa On the characterisation of ${\rm AG}(n,q)$ by its parameters as a nearly triply regular design . . . . . . . . . 173--179 S. E. Payne The fundamental theorem of $q$-clan geometry . . . . . . . . . . . . . . . . 181--202 Günter Pickert Extension of Gravity Centers Configuration to Steiner Triple Systems 203--214 D. K. Ray-Chaudhuri and Qing Xiang Constructions of Partial Difference Sets and Relative Difference Sets Using Galois Rings . . . . . . . . . . . . . . 215--227 E. E. Shult and J. A. Thas $m$-systems and partial $m$-systems of polar spaces . . . . . . . . . . . . . . 229--238 Helmut Siemon Piotrowski's Infinite Series of Steiner Quadruple Systems Revisited . . . . . . 239--254
R. A. Bailey Orthogonal partitions in designed experiments. Corrected reprint . . . . . 45--77 Peter J. Cameron Stories about groups and sequences. Corrected reprint of ``Stories about groups and sequences'' [Des. Codes Cryptogr. \bf 8 (1996), no. 1--2, 109--133; MR 97f:20004a] . . . . . . . . 109--133 Josep Domingo-Ferrer Achieving Rights Untransferability with Client-Independent Servers . . . . . . . 263--271 Masaaki Harada Existence of New Extremal Doubly-Even Codes and Extremal Singly-Even Codes . . 273--283 Xiang-dong Hou The Covering Radius of $R(1,9)$ in $R(4,9)$ . . . . . . . . . . . . . . . . 285--292 Heeralal Janwa and Oscar Moreno McEliece Public Key Cryptosystems Using Algebraic-Geometric Codes . . . . . . . 293--307 Ivan N. Landgev Constructions of Group Divisible Designs 309--318 D. B. Meisner New Classes of Groups Containing Menon Difference Sets . . . . . . . . . . . . 319--325 Tamás Szönyi On Cyclic Caps in Projective Spaces . . 327--332
Vladimir Tonchev Preface . . . . . . . . . . . . . . . . 5--6 E. F. Assmus, Jr. and J. D. Key Designs and codes: an update . . . . . . 7--27 Jürgen Bierbrauer and Stephen Black and Yves Edel Some $t$-homogeneous sets of permutations . . . . . . . . . . . . . . 29--38 Jeffrey T. Bonn Forcing Linearity on Greedy Codes . . . 39--49 Laurel L. Carpenter Oval Designs in Desarguesian Projective Planes . . . . . . . . . . . . . . . . . 51--59 Charles J. Colbourn and Donald L. Kreher Concerning Difference Matrices . . . . . 61--70 Hiroshi Kimura Hadamard Matrices and Dihedral Groups 71--77 Laura Monroe Self-Orthogonal Greedy Codes . . . . . . 79--83 Iosif Pinelis On the Minimal Number of Even Submatrices of $0$-$1$ Matrices . . . . 85--93 J. A. Thas $k$-arcs, hyperovals, partial flocks and flocks . . . . . . . . . . . . . . . . . 95--104 Tran Van Trung A Generalization of a Theorem of Dehon for Simple $t$-Designs . . . . . . . . . 105--114 Judy L. Walker A New Approach to the Main Conjecture on Algebraic-Geometric MDS Codes . . . . . 115--120
Stefka Buyuklieva and Vassil Yorgov Singly-Even Self-Dual Codes of Length $40$ . . . . . . . . . . . . . . . . . . 131--141 Mario A. de Boer Almost MDS Codes . . . . . . . . . . . . 143--155 Chang-Seop Park and Gui-Liang Feng and Kenneth K. Tzeng The New Minimum Distance Bounds of Goppa Codes and Their Decoding . . . . . . . . 157--176 Ron M. Roth Spectral-Null Codes and Null Spaces of Hadamard Submatrices . . . . . . . . . . 177--191 Alfred Scheerhorn Dickson Polynomials, Completely Normal Polynomials and the Cyclic Module Structure of Specific Extensions of Finite Fields . . . . . . . . . . . . . 193--202 M. A. Shokrollahi Stickelberger Codes . . . . . . . . . . 203--213 A. N. Skorobogatov On the Number of Representations of Matroids Over Finite Fields . . . . . . 215--226
Pier Vittorio Ceccherini Giuseppe Tallini (1930--1995) . . . . . 237--245 Giuseppe Tallini Combinatorial Problems in Infinite Spaces . . . . . . . . . . . . . . . . . 247--249 S. R. Blackburn A Note on Sequences with the Shift and Add Property . . . . . . . . . . . . . . 251--256 Tor Helleseth and P. Vijay Kumar and Abhijit Shanbhag Codes with the Same Weight Distributions as the Goethals Codes and the Delsarte-Goethals Codes . . . . . . . . 257--266 Wen-Ai Jackson and Keith M. Martin Perfect Secret Sharing Schemes on Five Participants . . . . . . . . . . . . . . 267--286 Wen-Ai Jackson and Keith M. Martin and Christine M. O'Keefe A Construction for Multisecret Threshold Schemes . . . . . . . . . . . . . . . . 287--303 Ueli M. Maurer and Yacov Yacobi A Non-interactive Public-Key Distribution System . . . . . . . . . . 305--316 Cécile Huybrechts and Antonio Pasini On $c^{n-2}.c^*$ geometries of order $2$ 317--330
Stephen D. Cohen The Length of Primitive BCH Codes with Minimal Covering Radius . . . . . . . . 5--16 Jean Conan On the enumeration and generation of nonweight equivalent rate $\frac 12$ convolutional codes . . . . . . . . . . 17--27 András Gács and Péter Sziklai and Tamás Sz\Honyi Two Remarks on Blocking Sets and Nuclei in Planes of Prime Order . . . . . . . . 29--39 Noboru Hamada A Necessary and Sufficient Condition for the Existence of Some Ternary $[n, k, d]$ Codes Meeting the Greismer Bound . . 41--56 Gerhard Hiss On the Incidence Matrix of the Ree Unital . . . . . . . . . . . . . . . . . 57--62 Marijn van Eupen and Petr Lison\vek Classification of Some Optimal Ternary Linear Codes of Small Length . . . . . . 63--84 A. J. van Zanten Lexicographic Order and Linearity . . . 85--97
Dieter Jungnickel Preface . . . . . . . . . . . . . . . . 107--107 Arrigo Bonisoli and Gábor Korchmáros and Tamás Szönyi Some Multiply Derived Translation Planes with ${\rm SL}(2,5)$ as an Inherited Collineation Group in the Translation Complement . . . . . . . . . . . . . . . 109--114 Sabine Bouzette and Francis Buekenhout and Edmond Dony and Alain Gottcheiner A Theory of Nets for Polyhedra and Polytopes Related to Incidence Geometries . . . . . . . . . . . . . . . 115--136 Claudia Broecker and Ralph-Hardo Schulz and Gernot Stroth Check Character Systems Using Chevalley Groups . . . . . . . . . . . . . . . . . 137--143 Aiden A. Bruen and David L. Wehlau Partitioning Quadrics, Symmetric Group Divisible Designs and Caps . . . . . . . 145--155 A. R. Calderbank and Gary M. McGuire Construction of a $(64,2^{37},12)$ code via Galois rings . . . . . . . . . . . . 157--165 Robert S. Coulter and Rex W. Matthews Planar Functions and Planes of Lenz-Barlotti Class II . . . . . . . . . 167--184 Wen-Ai Jackson and Peter R. Wild On GMW Designs and Cyclic Hadamard Designs . . . . . . . . . . . . . . . . 185--191 Norman L. Johnson and Guglielmo Lunardon Maximal Partial Spreads and Flocks . . . 193--202 Alan C. H. Ling and Xiaojun Zhu and Charles J. Colbourn and Ronald C. Mullin Pairwise Balanced Designs with Consecutive Block Sizes . . . . . . . . 203--222 Siu Lun Ma and Bernhard Schmidt Difference Sets Corresponding to a Class of Symmetric Designs . . . . . . . . . . 223--236 Rudolf Mathon and Tran Van Trung Unitals and Unitary Polarities in Symmetric Designs . . . . . . . . . . . 237--250 Klaus Metsch Embedding the Linear Structure of Planar Spaces into Projective Spaces . . . . . 251--263
R. J. R. Abel and Charles J. Colbourn and Jianxing Yin and Hantao Zhang Existence of incomplete transversal designs with block size five and any index $\lambda$ . . . . . . . . . . . . 275--307 Lynn Margaret Batten and Kris Coolsaet and Anne Penfold Street Blocking sets in $(v,\{2,4\},1)$-designs 309--314 Margaret Ann Bernard and Bhu Dev Sharma Linear Codes with Non-Uniform Error Correction Capability . . . . . . . . . 315--323 Diane Erdmann and Sean Murphy An Approximate Distribution for the Maximum Order Complexity . . . . . . . . 325--339 A. Faldum and W. Willems Codes of Small Defect . . . . . . . . . 341--350 Alice E. D. Houston On the limit of maximal density of sequences with a Perfect Linear Complexity Profile . . . . . . . . . . . 351--359 Zhe-Xian Wan State Spaces of Convolutional Codes . . 361--369
Marco Buratti From a $(G, k, 1)$ to a $(Ck \oplus G, k, 1)$ difference family . . . . . . . . 5--9 Marco Buratti On Resolvable Difference Families . . . 11--23 T. Aaron Gulliver and Masaaki Harada Classification of Extremal Double Circulant Formally Self-Dual Even Codes 25--35 E. R. Lamken The Existence of Partitioned Generalized Balanced Tournament Designs with Block Size $3$ . . . . . . . . . . . . . . . . 37--71 Siu Lun Ma and Surinder K. Sehgal A Family of Semi-Regular Divisible Difference Sets . . . . . . . . . . . . 73--78 Stephanie Perkins Codes with a Disparity Property . . . . 79--97
Carlo Blundo and Alfredo de Santis and Roberto de Simone and Ugo Vaccaro Tight Bounds on the Information Rate of Secret Sharing Schemes . . . . . . . . . 107--122 Malcolm Greig and Julian Abel Resolvable Balanced Incomplete Block Designs with Block Size $8$ . . . . . . 123--140 T. Aaron Gulliver and Masaaki Harada Weight Enumerators of Double Circulant Codes and New Extremal Self-Dual Codes 141--150 Patric R. J. Östergård and Heikki O. Hämäläinen A New Table of Binary/Ternary Mixed Covering Codes . . . . . . . . . . . . . 151--178 Eric R. Verheul and Henk C. A. van Tilborg Constructions and properties of $k$ out of $n$ visual secret sharing schemes . . 179--196
Jürgen Bierbrauer Universal Hashing and Geometric Codes 207--221 Simon R. Blackburn A Generalized Rational Interpolation Problem and the Solution of the Welch-Berlekamp Key Equation . . . . . . 223--234 C. Blundo and A. Giorgio Gaggia and D. R. Stinson On the Dealer's Randomness Required in Secret Sharing Schemes . . . . . . . . . 235--259 A. E. Brouwer and M. van Eupen The Correspondence Between Projective Codes and $2$-weight Codes . . . . . . . 261--266 James A. Davis and Surinder K. Sehgal Using the Simplex Code to Construct Relative Difference Sets in $2$-groups 267--277 G. B. Khosrovshahi and A. Nowzari-Dalini and R. Torabi Trading Signed Designs and Some New $4-(12, 5, 4)$ Designs . . . . . . . . . 279--288 A. Klapper Cross-Correlations of Quadratic Form Sequences in Odd Characteristic . . . . 289--305
Iliya Boukliev Some New Optimal Ternary Linear Codes 5--11 Mike Burmester and Yvo G. Desmedt and Fred Piper and Michael Walker A General Zero-Knowledge Scheme . . . . 13--37 Stefka Buyuklieva On the Binary Self-Dual Codes with an Automorphism of Order $2$ . . . . . . . 39--48 R. Craigen and H. Kharaghani Hadamard Matrices from Weighing Matrices via Signed Groups . . . . . . . . . . . 49--58 F. Franek and A. Rosa and T. S. Griggs Large Sets of Mutually Almost Disjoint Steiner Triple Systems Not From Steiner Quadruple Systems . . . . . . . . . . . 59--67 J. L. Hayden Generalized Hadamard Matrices . . . . . 69--73 Xiang-Dong Hou The Reed--Muller code $R(1,7)$ is normal 75--82 Tatsuya Maruta On the Achievement of the Griesmer Bound 83--87 L. Storme Normal Rational Curves Over Prime Fields 89--96
Hanno Lefmann and Pavel Pudlák and Petr Savick\'y On Sparse Parity Check Matrices . . . . 107--130 Vladimir I. Levenshtein Split Orthogonal Arrays and Maximum Independent Resilient Systems of Functions . . . . . . . . . . . . . . . 131--160 Marten van Dijk A Linear Construction of Secret Sharing Schemes . . . . . . . . . . . . . . . . 161--201
Evangelos Kranakis and Paul C. Van Oorschot Introduction . . . . . . . . . . . . . . 213--213 Doug R. Stinson On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption . . . . . . . . . . . . . . . 215--243 N. Rogier and Pascal Chauvaud ${\rm MD}2$ is not secure without the checksum byte . . . . . . . . . . . . . 245--251 Vincent Rijmen and Bart Preneel and Erik De Win On Weaknesses of Non-surjective Round Functions . . . . . . . . . . . . . . . 253--266 J. Lee and H. M. Heys and S. E. Tavares Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis . . . . . . . . . . . . . 267--282 Carlisle M. Adams Constructing Symmetric Ciphers Using the CAST Design Procedure . . . . . . . . . 283--316
R. Julian R. Abel and Malcolm Greig Balanced Incomplete Block Designs with Block Size $7$ . . . . . . . . . . . . . 5--30 E. F. Assmus, Jr. Linearly Derived Steiner Triple Systems 31--49 Aiden Bruen and Lucien Haddad and David Wehlau Caps and Colouring Steiner Triple Systems . . . . . . . . . . . . . . . . 51--55 Gary McGuire and Vladimir D. Tonchev and Harold N. Ward Characterizing the Hermitian and Ree Unitals on $28$ Points . . . . . . . . . 57--61 Helmut Siemon A number-theoretic conjecture and the existence of $S$-cyclic Steiner quadruple systems . . . . . . . . . . . 63--94
Darryn E. Bryant and A. Khodkar On Orthogonal Double Covers of Graphs 103--105 L. R. A. Casse and K. M. Martin and P. R. Wild Bounds and Characterizations of Authentication/Secrecy Schemes . . . . . 107--129 James A. Davis and Jonathan Jedwab and Miranda Mowbray New Families of Semi-Regular Relative Difference Sets . . . . . . . . . . . . 131--146 J. Fitzgerald and R. F. Lax Decoding affine variety codes using Gröbner bases . . . . . . . . . . . . . . 147--158 Kirsten Mackenzie-Fleming A Recursive Construction for $2$-Designs 159--164 Noboru Hamada and Marijn van Eupen The Nonexistence of Ternary $[38, 6, 23]$ Codes . . . . . . . . . . . . . . . 165--172 T. S. Michael and W. D. Wallis Skew-Hadamard Matrices and the Smith Normal Form . . . . . . . . . . . . . . 173--176 Ilene H. Morgan Equiorthogonal Frequency Hypercubes: Preliminary Theory . . . . . . . . . . . 177--185 Pratima Panigrahi The collinearity graph of the $O^-(8,2)$ quadric is not geometrisable . . . . . . 187--198 Corrado Zanella Linear sections of the finite Veronese varieties and authentication systems defined using geometry . . . . . . . . . 199--212
Tsonka Stefanova Baicheva The Covering Radius of Ternary Cyclic Codes with Length up to $25$ . . . . . . 223--227 J. J. Brennan and Bruce Geist Analysis of iterated modular exponentiation: the orbits of $x^\alpha\bmod N$ . . . . . . . . . . . 229--245 Yu Qing Chen A Construction of Difference Sets . . . 247--250 Dragomir \vZ. \Dbarokovi\'c Note on Periodic Complementary Sets of Binary Sequences . . . . . . . . . . . . 251--256 T. Aaron Gulliver and Masaaki Harada Classification of Extremal Double Circulant Self-Dual Codes of Lengths $64$ to $72$ . . . . . . . . . . . . . . 257--269 Masaaki Harada New extremal type II codes over $\bold Z_4$ . . . . . . . . . . . . . . . . . . 271--284 Ilia Krasikov and Simon Litsyn Bounds on Spectra of Codes with Known Dual Distance . . . . . . . . . . . . . 285--297 R. Safavi-Naini Three Systems for Threshold Generation of Authenticators . . . . . . . . . . . 299--312 A. A. Zain and B. Sundar Rajan Quasideterminant Characterization of MDS Group Codes over Abelian Groups . . . . 313--330
F. E. Bennett and J. Yin and H. Zhang and R. J. R. Abel Perfect Mendelsohn Packing Designs with Block Size Five . . . . . . . . . . . . 5--22 Sergei V. Bezzateev and Natalia A. Shekhunova A Subclass of Binary Goppa Codes With Improved Estimation of the Code Dimension . . . . . . . . . . . . . . . 23--38 David B. Jaffe and Vladimir D. Tonchev Computing Linear Codes and Unitals . . . 39--52 Marc Joye and Jean-Jacques Quisquater Reducing the Elliptic Curve Cryptosystem of Meyer-Müller to the Cryptosystem of Rabin-Williams . . . . . . . . . . . . . 53--56 Çetin K. Koç and Tolga Acar Montgomery multiplication in ${\rm GF}(2^k)$ . . . . . . . . . . . . . . . 57--69 Tero Laihonen and Simon Litsyn On Upper Bounds for Minimum Distance and Covering Radius of Non-binary Codes . . 71--80 A. Mahmoodi Existence of Perfect $3$-Deletion-Correcting Codes . . . . . 81--87 Antonio Maschietti Difference Sets and Hyperovals . . . . . 89--98
Alexei Ashikhmin On Generalized Hamming Weights for Galois Ring Linear Codes . . . . . . . . 107--126 Aiden A. Bruen and Keldon Drudge On the non-existence of certain Cameron-Liebler line classes in ${\rm PG}(3, q)$ . . . . . . . . . . . . . . . 127--132 Claude Carlet and Philippe Guillot An Alternate Characterization of the Bentness of Binary Functions, with Uniqueness . . . . . . . . . . . . . . . 133--140 Charles J. Colbourn and Alan C. H. Ling Point Code Minimum Steiner Triple Systems . . . . . . . . . . . . . . . . 141--146 Yury J. Ionin A Technique for Constructing Symmetric Designs . . . . . . . . . . . . . . . . 147--158 Volker Müller and Scott Vanstone and Robert Zuccherato Discrete Logarithm Based Cryptosystems in Quadratic Function Fields of Characteristic $2$ . . . . . . . . . . . 159--178 Juriaan Simonis and Alexei Ashikhmin Almost Affine Codes . . . . . . . . . . 179--197
Amir H. Banihashemi and Amir K. Khandani An Inequality on the Coding Gain of Densest Lattice Packings in Successive Dimensions . . . . . . . . . . . . . . . 207--212 Harald Fripertinger Enumeration, Construction and Random Generation of Block Codes . . . . . . . 213--219 Jingmin He and Ed Dawson Shared Secret Reconstruction . . . . . . 221--237 Philippe Langevin Weights of Abelian Codes . . . . . . . . 239--245 Kenneth G. Paterson Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering . . . 247--259 Doug R. Stinson and Tran Van Trung Some New Results on Key Distribution Patterns and Broadcast Encryption . . . 261--279 Marten van Dijk and Christian Gehrmann and Ben Smeets Unconditionally Secure Group Authentication . . . . . . . . . . . . . 281--296 Helmut Siemon Erratum: ``A number-theoretic conjecture and the existence of $S$-cyclic Steiner quadruple systems'' [Des. Codes Cryptogr. \bf 13 (1998), no. 1, 63--94; 1 600 695] . . . . . . . . . . . . . . . 297--297
Anton Betten and Adalbert Kerber and Reinhard Laue and Alfred Wassermann Simple $8$-Designs with Small Parameters 5--27 Roberto De Prisco and Alfredo De Santis On Lower Bounds for the Redundancy of Optimal Codes . . . . . . . . . . . . . 29--45 Wende Chen and Torleiv Klòve Weight Hierarchies of Linear Codes Satisfying the Chain Condition . . . . . 47--66 Christian Gehrmann Multiround Unconditionally Secure Authentication . . . . . . . . . . . . . 67--86 Kaoru Kurosawa and Koji Okada and Hajime Saido and Douglas R. Stinson New Combinatorial Bounds for Authentication Codes and Key Predistribution Schemes . . . . . . . . 87--100
Ross Anderson and Cunsheng Ding and Tor Helleseth and Torleiv Klòve How to build robust shared control systems . . . . . . . . . . . . . . . . 111--124 Claude Carlet and Pascale Charpin and Victor Zinoviev Codes, bent functions and permutations suitable for DES-like cryptosystems . . 125--156 Wende Chen and Zhi Chen and Torleiv Klòve New constructions of disjoint distinct difference sets . . . . . . . . . . . . 157--165 K. Chen and L. Zhu Existence of $(q,6,1)$ difference families with $q$ a prime power . . . . 167--173 Tor Helleseth and P. Vijay Kumar and Kyeongcheol Yang An infinite family of $3$-designs from Preparata codes over ${Z}_4$ . . . . . . 175--181 Markku Kaikkonen Codes from affine permutation groups . . 183--186 A. A. I. Perera and K. J. Horadam Cocyclic generalised Hadamard matrices and central relative difference sets . . 187--200 Kyeongcheol Yang and Tor Helleseth Two new infinite families of $3$-designs from Kerdock codes over ${Z}_4$ . . . . 201--214
K. T. Arasu and S. L. Ma Abelian Difference Sets Without Self-conjugacy . . . . . . . . . . . . . 223--230 Simeon Ball Partial Unitals and Related Structures in Desarguesian Planes . . . . . . . . . 231--236 M. C. Bhandari and K. K. P. Chanduka and A. K. Lal On Lower Bounds For Covering Codes . . . 237--243 Ivan N. Landjev The Nonexistence of Some Optimal Ternary Codes of Dimension Five . . . . . . . . 245--258 Hiroyuki Ohmori and Takashi Miyamoto Construction of Weighing Matrices $(17,9)$ Having the Intersection Number $8$ . . . . . . . . . . . . . . . . . . 259--269 Nabil Shalaby and Jianxing Yin Nested Optimal $\lambda$-Packings and $\lambda$-Coverings of Pairs with Triples . . . . . . . . . . . . . . . . 271--278 Brett Stevens and Lucia Moura and Eric Mendelsohn Lower Bounds for Transversal Covers . . 279--299 Marten van Dijk and Wen-Ai Jackson and Keith M. Martin A General Decomposition Construction for Incomplete Secret Sharing Schemes . . . 301--321
M. C. Bhandari and M. K. Gupta and A. K. Lal Some Results on NQR Codes . . . . . . . 5--9 Simon Blake-Wilson and Kevin T. Phelps Constant Weight Codes and Group Divisible Designs . . . . . . . . . . . 11--27 Alexander A. Davydov and Patric R. J. Ostergaard New Linear Codes with Covering Radius $2$ and Odd Basis . . . . . . . . . . . 29--39 Vikram Jha and Norman Johnson Cyclic Ostrom Spreads . . . . . . . . . 41--51 Kaoru Kurosawa and Wakaha Ogata Efficient Rabin-type Digital Signature Scheme . . . . . . . . . . . . . . . . . 53--64 Patric R. J. Ostergård and William D. Weakley Constructing Covering Codes with Given Automorphisms . . . . . . . . . . . . . 65--73 Carles Padro and Germán Sáez and Jorge Luis Villar Detection of Cheaters in Vector Space Secret Sharing Schemes . . . . . . . . . 75--85 Keisuke Shiromoto The Weight Enumerator of Linear Codes over GF$(qm)$ Having Generator Matrix over GF$(q)$ . . . . . . . . . . . . . . 87--92
A. Barg and A. Ashikhmin Binomial Moments of the Distance Distribution and the Probability of Undetected Error . . . . . . . . . . . . 103--116 Marco Buratti Some $(17q, 17, 2)$ and $(25q, 25, 3)$ BIBD Constructions . . . . . . . . . . . 117--120 Paul Camion and Anne Canteaut Correlation-Immune and Resilient Functions Over a Finite Alphabet and Their Applications in Cryptography . . . 121--149 Yves Edel and Jürgen Bierbrauer $41$ is the Largest Size of a Cap in ${\rm PG}(4,4)$ . . . . . . . . . . . . 151--160 Graham Norton On Minimal Realization Over a Finite Chain Ring . . . . . . . . . . . . . . . 161--178 Kevin T. Phelps and Mike LeVan Switching Equivalence Classes of Perfect Codes . . . . . . . . . . . . . . . . . 179--184 A. J. van Zanten and Agung Lukito Construction of Certain Cyclic Distance-Preserving Codes Having Linear-Algebraic Characteristics . . . . 185--199
L. M. Batten and J. M. Dover Some Sets of Type in Cubic Order Planes 211--213 Alexis Bonnecaze and Bernard Mourrain and Patrick Solé Jacobi Polynomials, Type II Codes, and Designs . . . . . . . . . . . . . . . . 215--234 M. A. Chateauneuf and Charles J. Colbourn and D. L. Kreher Covering Arrays of Strength Three . . . 235--242 Sebastian Egner and Thomas Beth How to Play $M_{13}$? . . . . . . . . . 243--247 John Friedlander and Michael Larsen and Daniel Lieman and Igor Shparlinski On The Correlation Of Binary $M$-sequences . . . . . . . . . . . . . 249--256 Philippe Gaborit and Masaaki Harada Construction of Extremal Type II Codes over ${\bf Z}_4$ . . . . . . . . . . . . 257--269 William J. Martin Designs in Product Association Schemes 271--289 Deirdre Longacher Smeltzer Properties of Codes from Difference Sets in $2$-Groups . . . . . . . . . . . . . 291--306
Anonymous Guest Editorial . . . . . . . . . . . . 5--6 J. D. Key and H. F. Mattson, Jr. Edward F. Assmus, Jr. (1931--1998) . . . 7--11 Anonymous Ed Assmus . . . . . . . . . . . . . . . 13--14 Aiden A. Bruen and David L. Wehlau Long Binary Linear Codes and Large Caps in Projective Space . . . . . . . . . . 37--60 Bernhard Schmidt Williamson Matrices and a Conjecture of Ito's . . . . . . . . . . . . . . . . . 61--68 Yu Qing Chen On a Family of Covering Extended Building Sets . . . . . . . . . . . . . 69--72 Harold N. Ward An Introduction to Divisible Codes . . . 73--79 Pascale Charpin and Aimo Tietäväinen and Victor Zinoviev On the Minimum Distances of Non-Binary Cyclic Codes . . . . . . . . . . . . . . 81--85 G. Cohen and J. Rif\`a and J. Tena and G. Zémor On the Characterization of Linear Uniquely Decodable Codes . . . . . . . . 87--96 Joseph A. Thas and Hendrik Van Maldeghem On Embeddings of the Flag Geometries of Projective Planes in Finite Projective Spaces . . . . . . . . . . . . . . . . . 97--104 Neil J. Calkin and J. D. Key and M. J. De Resmini Minimum Weight and Dimension Formulas for Some Geometric Codes . . . . . . . . 105--120 Vladimir D. Tonchev Linear Perfect Codes and a Characterization of the Classical Designs . . . . . . . . . . . . . . . . 121--128 Jörg Eisfeld The Eigenspaces of the Bose--Mesner-Algebras of the Association Schemes corresponding to Projective Spaces and Polar Spaces . . . . . . . . 129--150 Ray Hill An Extension Theorem for Linear Codes 151--157 Yury J. Ionin Building Symmetric Designs With Building Sets . . . . . . . . . . . . . . . . . . 159--175 Hans Dobbertin Another Proof of Kasami's Theorem . . . 177--180 Anton Betten and Reinhard Laue and Alfred Wassermann A Steiner $5$-Design on $36$ Points . . 181--186 Willem H. Haemers and René Peeters and Jeroen M. van Rijckevorsel Binary Codes of Strongly Regular Graphs 187--209 Qing Xiang Maximally Nonlinear Functions and Bent Functions . . . . . . . . . . . . . . . 211--218 Klaus Metsch A Bose-Burton Theorem for Elliptic Polar Spaces . . . . . . . . . . . . . . . . . 219--224 J. F. Dillon Multiplicative Difference Sets via Additive Characters . . . . . . . . . . 225--235 Simeon Ball and Aart Blokhuis and Christine M. O'Keefe On Unitals with Many Baer Sublines . . . 237--252 G. L. Ebert and J. W. P. Hirschfeld Complete Systems of Lines on a Hermitian Surface over a Finite Field . . . . . . 253--268 Tor Helleseth and Victor Zinoviev On $Z_4$-Linear Goethals Codes and Kloosterman Sums . . . . . . . . . . . . 269--288 Richard M. Wilson Signed Hypergraph Designs and Diagonal Forms for Some Incidence Matrices . . . 289--297 A. Blokhuis and A. E. Brouwer The Universal Embedding Dimension of the Near Polygon on the $1$-Factors of a Complete Graph . . . . . . . . . . . . . 299--303 James A. Davis and Jonathan Jedwab A New Family of Relative Difference Sets in $2$-Groups . . . . . . . . . . . . . 305--312
Dieter Jungnickel and Jack van Lint Editorial . . . . . . . . . . . . . . . 5--6 K. T. Arasu and N. J. Voss Answering a Question of Pott on Almost Perfect Sequences . . . . . . . . . . . 7--10 Christine Bachoc On Harmonic Weight Enumerators of Binary Codes . . . . . . . . . . . . . . . . . 11--28 Thierry P. Berger and Pascale Charpin The Automorphism Groups of BCH Codes and of Some Affine-Invariant Codes Over Extension Fields . . . . . . . . . . . . 29--53 Wayne Broughton and Gary McGuire Some Observations on Quasi-$3$ Designs and Hadamard Matrices . . . . . . . . . 55--61 Matthew R. Brown and Christine M. O'Keefe and Tim Penttila Triads, Flocks of Conics and $Q^{-(5,1)}$ . . . . . . . . . . . . . . 63--70 Gérard D. Cohen and Sylvia B. Encheva and Gilles Zémor Antichain Codes . . . . . . . . . . . . 71--80 Charles A. Cusack and Spyros S. Magliveras Semiregular Large Sets . . . . . . . . . 81--87 D. de Caen and E. R. van Dam Association Schemes Related to Kasami Codes and Kerdock Sets . . . . . . . . . 89--102 Iwan Duursma and Tor Helleseth and Chunming Rong and Kyeongcheol Yang Split Weight Enumerators for the Preparata Codes with Applications to Designs . . . . . . . . . . . . . . . . 103--124 J. E. Fields and P. Gaborit and W. C. Huffman and V. Pless On the Classification of Extremal Even Formally Self-Dual Codes . . . . . . . . 125--148 Shuhong Gao and Jason Howell A General Polynomial Sieve . . . . . . . 149--157 Chat Yin Ho Incidence Matrices and Collineations of Finite Projective Planes . . . . . . . . 159--162 H. Janwa and H. F. Mattson, Jr. Some Upper Bounds on the Covering Radii of Linear Codes Over and Their Applications . . . . . . . . . . . . . . 163--181 G. B. Khosrovshahi and Reza Naserasr Hypergraphical Codes Arising from Binary Trades . . . . . . . . . . . . . . . . . 183--186 Rudolf Mathon and Tran van Trung Directed $t$-Packings and Directed $t$-Steiner Systems . . . . . . . . . . 187--198 Klaus Metsch and L. Storme Partial $t$-Spreads in $\mbox{PG}(2t+1,q)$ . . . . . . . . . . 199--216 Alan R. Prince Flag-Transitive Affine Planes of Order $64$ . . . . . . . . . . . . . . . . . . 217--221 Mattias Svanström A Class of Perfect Ternary Constant-Weight Codes . . . . . . . . . 223--229 Jack van Lint and Ludo Tolhuizen On Perfect Ternary Constant Weight Codes 231--234 Tamás Szhonyi On the Embedding of $(k,p)$-Arcs is Maximal Arcs . . . . . . . . . . . . . . 235--246
J. H. Dinitz and E. R. Lamken HOPs and COPs: Room frames with partitionable transversals . . . . . . . 5--26 Todd D. Vance A Gap in GRM Code Weight Distributions 27--43 Xian-Mo Zhang and Yuliang Zheng and Hideki Imai Relating Differential Distribution Tables to Other Properties of Substitution Boxes . . . . . . . . . . . 45--63
Neal Koblitz Guest Editorial . . . . . . . . . . . . 75--76 Simon Blake-Wilson Information Security, Mathematics, and Public-Key Cryptography . . . . . . . . 77--99 Arjen K. Lenstra Integer Factoring . . . . . . . . . . . 101--128 Andrew Odlyzko Discrete Logarithms: The Past and the Future . . . . . . . . . . . . . . . . . 129--145 Ueli M. Maurer and Stefan Wolf The Diffie--Hellman Protocol . . . . . . 147--171 Neal Koblitz and Alfred Menezes and Scott Vanstone The State of Elliptic Curve Cryptography 173--193 Jerome A. Solinas Efficient Arithmetic on Koblitz Curves 195--249
Joseph H. Silverman The Xedni Calculus and the Elliptic Curve Discrete Logarithm Problem . . . . 5--40 Michael J. Jacobson and Neal Koblitz and Joseph H. Silverman and Andreas Stein and Edlyn Teske Analysis of the Xedni Calculus Attack 41--64 James M. McQuillan Pencils of Hyperconics in Projective Planes of Characteristic Two . . . . . . 65--71 Jacques Wolfmann Difference Sets in $Z_4^m$ and $F_2^{2m}$ . . . . . . . . . . . . . . . 73--88 Ralph-Hardo Schulz and Antonino Giorgio Spera Automorphisms of Constant Weight Codes and of Divisible Designs . . . . . . . . 89--97
Grégoire Bommier and Francis Blanchet Binary Quasi-Cyclic Goppa Codes . . . . 107--124 Graham H. Norton and Ana Salagean-Mandache On the Key Equation Over a Commutative Ring . . . . . . . . . . . . . . . . . . 125--141 Arrigo Bonisoli and Antonio Cossidente Mixed Partitions of Projective Geometries . . . . . . . . . . . . . . . 143--154 A. Halbutogullari and C. K. Koc Parallel Multiplication in using Polynomial Residue Arithmetic . . . . . 155--173 Jacques Patarin Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt'98 . . . 175--209
Charles J. Colbourn and Sufang Zhao Maximum Kirkman Signal Sets for Synchronous Uni-Polar Multi-User Communication Systems . . . . . . . . . 219--227 Sylvia B. Encheva and Gérard D. Cohen Linear Codes and Their Coordinate Ordering . . . . . . . . . . . . . . . . 229--250 Xiang-dong Hou Bent Functions, Partial Difference Sets, and Quasi-Frobenius Local Rings . . . . 251--268 Ari Juels and Marcus Peinado Hiding Cliques for Cryptographic Security . . . . . . . . . . . . . . . . 269--280 Satoshi Obana and Kaoru Kurosawa Combinatorial Classification of Optimal Authentication Codes with Arbitration 281--305 Pratima Panigrahi The Non-Collinearity Graph of the $(8,2)$ Quadric Is Uniquely Geometrisable . . . . . . . . . . . . . 307--317 Olga Polverino Small Blocking Sets in $\mbox{PG}(2, p)$ 319--324 Ching-Nung Yang and Chi-Sung Laih New Colored Visual Secret Sharing Schemes . . . . . . . . . . . . . . . . 325--336
Aart Blokhuis and Willem H. Haemers Preface . . . . . . . . . . . . . . . . 5--5 N. G. de Bruijn Jaap Seidel 80 . . . . . . . . . . . . . 7--10 Béla Bajnok Spherical Designs and Generalized Sum-Free Sets in Abelian Groups . . . . 11--18 R. D. Baker and J. M. Dover and G. L. Ebert and K. L. Wantz Perfect Baer Subplane Partitions and Three-Dimensional Flag-Transitive Planes 19--39 Peter Beelen and Ruud Pellikaan The Newton Polygon of Plane Curves with Many Rational Points . . . . . . . . . . 41--67 A. E. Brouwer Locally Paley Graphs . . . . . . . . . . 69--76 Frans C. Bussemaker and Willem H. Haemers and Edward Spence The Search for Pseudo Orthogonal Latin Squares of Order Six . . . . . . . . . . 77--82 Edwin R. van Dam A Characterization of Association Schemes from Affine Spaces . . . . . . . 83--86 Frank De Clerck and Mario Delanote Two-Weight Codes, Partial Geometries and Steiner Systems . . . . . . . . . . . . 87--98 Ralf Gramlich and Hendrik Van Maldeghem Epimorphisms of Generalized Polygons Part 1: Geometrical Characterizations 99--111 Yury J. Ionin and M. S. Shrikhande Strongly Regular Graphs and Designs with Three Intersection Numbers . . . . . . . 113--125 Aleksandar Jurivsic and Jack Koolen A Local Approach to $1$-Homogeneous Graphs . . . . . . . . . . . . . . . . . 127--147 Jack Koolen and Monique Laurent and Alexander Schrijver Equilateral Dimension of the Rectilinear Space . . . . . . . . . . . . . . . . . 149--164 Johannes Maks and Juriaan Simonis Optimal Subcodes of Second Order Reed--Muller Codes and Maximal Linear Spaces of Bivectors of Maximal Rank . . 165--180 William J. Martin Minimum Distance Bounds for $s$-Regular Codes . . . . . . . . . . . . . . . . . 181--187 Bernhard Mühlherr On Isomorphisms between Coxeter Groups 189--189 L. J. Rylands and D. E. Taylor Constructions for Octonion and Exceptional Jordan Algebras . . . . . . 191--203 Akos Seress Large Families of Cospectral Graphs . . 205--208 Ron Shaw Subsets of $\mbox{PG}(n,2)$ and Maximal Partial Spreads in $\mbox{PG}(4,2)$ . . 209--222 Irfan Siap and Dijen K. Ray-Chaudhuri New Linear Codes Over and Improvements on Bounds . . . . . . . . . . . . . . . 223--233 L. Storme and Zs. Weiner On $1$-Blocking Sets in $\mbox{PG}(n,q), n\geq 3$ . . . . . . . . . . . . . . . . 235--251
Akos Seress All Lambda-Designs With $\lambda = 2^p$ are Type-1 . . . . . . . . . . . . . . . 5--17 Antonio Cossidente and Domenico Labbate and Alessandro Siciliano Veronese Varieties Over Finite Fields and Their Projections . . . . . . . . . 19--32 Sylvie Dubuc Characterization of Linear Structures 33--45 Satoshi Obana and Kaoru Kurosawa Bounds and Combinatorial Structure of $(k,n)$ Multi-Receiver $A$-Codes . . . . 47--63 Joan Daemen and Lars R. Knudsen and Vincent Rijmen Linear Frameworks for Block Ciphers . . 65--87 T. Aaron Gulliver and Masaaki Harada Codes over and Improvements to the Bounds on Ternary Linear Codes . . . . . 89--96 Andreas Enge and Dieter Jungnickel Review . . . . . . . . . . . . . . . . . 97--99
Gretchen L. Matthews Weierstrass Pairs and Minimum Distance of Goppa Codes . . . . . . . . . . . . . 107--121 Arne Winterhof Some Estimates for Character Sums and Applications . . . . . . . . . . . . . . 123--131 D. R. Stinson Something About All or Nothing (Transforms) . . . . . . . . . . . . . . 133--138 Harold N. Ward The Nonexistence of a $[207,4,165]$ Code over ${\rm GF}(5)$ . . . . . . . . . . . 139--148 Kenichiro Tanabe A New Proof of the Assmus--Mattson Theorem for Non-Binary Codes . . . . . . 149--155 Agnes V. Dizon-Garciano and Yutaka Hiramine On Sylow Subgroups of Abelian Affine Difference Sets . . . . . . . . . . . . 157--163 Tatsuya Maruta On the Nonexistence of $q$-ary Linear Codes of Dimension Five . . . . . . . . 165--177 Norman L. Johnson Two-Transitive Parallelisms . . . . . . 179--189 U. Dempwolff Primitive Rank $3$ Groups on Symmetric Designs . . . . . . . . . . . . . . . . 191--207
Michel Sebille There Exists a Simple Non Trivial $t$-design with an Arbitrarily Large Automorphism Group for Every $t$ . . . . 215--219 R. Ahlswede and H. K. Aydinian and L. H. Khachatrian On Perfect Codes and Related Concepts 221--237 R. Scheidler Cryptography in Quadratic Function Fields . . . . . . . . . . . . . . . . . 239--264 Kaoru Kurosawa and Satoshi Obana Combinatorial Bounds on Authentication Codes with Arbitration . . . . . . . . . 265--281 Vikram Jha and Norman L. Johnson Almost Desarguesian Maximal Partial Spreads . . . . . . . . . . . . . . . . 283--304 Alexander A. Davydov New Constructions of Covering Codes . . 305--316 Karl Brincat On the Use of RSA as a Secret Key Cryptosystem . . . . . . . . . . . . . . 317--329 Olof Heden A Maximal Partial Spread of Size $45$ in ${\rm PG}(3,7)$ . . . . . . . . . . . . 331--334
Igor Shparlinski On the Linear Complexity of the Power Generator . . . . . . . . . . . . . . . 5--10 Koichi Betsumiya and Masaaki Harada Binary Optimal Odd Formally Self-Dual Codes . . . . . . . . . . . . . . . . . 11--22 Tadashi Wadayama and Toru Hada and Koichiro Wakasugi and Masao Kasahara Upper and Lower Bounds on Maximum Nonlinearity of $n$-input $m$-output Boolean Function . . . . . . . . . . . . 23--34 Blessilda P. Raposa Some Triple Block Intersection Numbers of Paley $2$-Designs of QN-type . . . . 35--52 Andreas Enge The Extended Euclidian Algorithm on Polynomials, and the Computational Efficiency of Hyperelliptic Cryptosystems . . . . . . . . . . . . . 53--74 J. E. Iiams A Note on Certain 2-Groups with Hadamard Difference Sets . . . . . . . . . . . . 75--80 Christophe Mouaha and Gerhard Schiffels All $q^m$-ary Cyclic Codes with Cyclic $q$-ary Image Are Known . . . . . . . . 81--98 Jianxing Yin A Combinatorial Construction for Perfect Deletion-Correcting Codes . . . . . . . 99--110
I. Honkala and A. Klapper Bounds for the Multicovering Radii of Reed--Muller Codes with Applications to Stream Ciphers . . . . . . . . . . . . . 131--146 Igor Shparlinski On Some Properties of the Shrinking Generator . . . . . . . . . . . . . . . 147--156 Tor Helleseth and P. Vijay Kumar and Halvard Martinsen A New Family of Ternary Sequences with Ideal Two-level Autocorrelation Function 157--166 T. Aaron Gulliver and Nikolai Senkevitch Optimal Ternary Linear Rate $1/2$ Codes 167--172 Luke O'Connor On String Replacement Exponentiation . . 173--184 B. N. Cooperstein Hyperplane Sections of Kantor's Unitary Ovoids . . . . . . . . . . . . . . . . . 185--196 Yves Edel and Jürgen Bierbrauer Large Caps in Small Spaces . . . . . . . 197--212 Kenzi Akiyama On Certain Schur Rings of Dimension $4$ 213--222 Ilia Krasikov and Simon Litsyn On the Distance Distributions of BCH Codes and Their Duals . . . . . . . . . 223--232 Marco Buratti and Fulvio Zuanni Perfect Cayley Designs as Generalizations of Perfect Mendelsohn Designs . . . . . . . . . . . . . . . . 233--248 J. A. Thas Characterizations of Translation Generalized Quadrangles . . . . . . . . 249--258
C. Koukouvinos and M. Mitrouli and Jennifer Seberry Values of Minors of $(1,-1)$ Incidence Matrices of SBIBDs and Their Application to the Growth Problem . . . . . . . . . 267--282 N. A. Howgrave-Graham and N. P. Smart Lattice Attacks on Digital Signature Schemes . . . . . . . . . . . . . . . . 283--290 Sharad Sane A Proof of the Jungnickel-Tonchev Conjecture on Quasi-Multiple Quasi-Symmetric Designs . . . . . . . . 291--296 Marc Joye and Jean-Jacques Quisquater and Tsuyoshi Takagi How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves . . . . . . . . . . . . . . . . . 297--316 K. T. Arasu and Yu Qing Chen A Difference Set in $(\mathbb{Z}/4 \mathbb{Z})^3 \times \mathbb{Z}/5\mathbb{Z}$ . . . . . . . . 317--324 Koichi Betsumiya and Masaaki Harada Classification of Formally Self-Dual Even Codes of Lengths up to $16$ . . . . 325--332 Galina T. Bogdanova and Andries E. Brouwer and Stoian N. Kapralov and Patric R. J. Östergård Error-Correcting Codes over an Alphabet of Four Elements . . . . . . . . . . . . 333--342 Kanat S. Abdukhalikov Affine Invariant and Cyclic Codes over $p$-adic Numbers and Finite Rings . . . 343--370
G. Hughes Structure Theorems for Group Ring Codes with an Application to Self-Dual Codes 5--14 Houshou Chen and John T. Coffey Trellis Structure and Higher Weights of Extremal Self-Dual Codes . . . . . . . . 15--36 István Kovács On the Internal Nuclei of Sets in ${\rm PG}(n,q)$, $q$ is Odd . . . . . . . . . 37--42 Chris Boner Maximal Weight Divisors of Projective Reed--Muller Codes . . . . . . . . . . . 43--47 Siaw-Lynn Ng and Michael Walker On the Composition of Matroids and Ideal Secret Sharing Schemes . . . . . . . . . 49--67 D. Wu and L. Zhu Generalized Steiner Systems with a Prime Power . . . . . . . . . . . . . . . . . 69--80 P. Véron True Dimension of Some Binary Quadratic Trace Goppa Codes . . . . . . . . . . . 81--97 Gabriele Nebe and E. M. Rains and N. J. A. Sloane The Invariants of the Clifford Groups 99--122
Martin Bokler Minimal Blocking Sets in Projective Spaces of Square Order . . . . . . . . . 131--144 Amir K. Khandani and M. Esmaeili Successive Minimization of the State Complexity of the Self-dual Lattices Using Korkin--Zolotarev Reduced Basis 145--158 Sönke Blunck On the Existence and Construction of Tight Fourth Order Quadrature Rules for the Sphere . . . . . . . . . . . . . . . 159--169 A. Baliga Cocyclic Codes of Length $40$ . . . . . 171--179 Kwok Yan Lam and Francesco Sica The Weight Distribution of . . . . . . . 181--191 Iiro Honkala and Tero Laihonen and Sanna Ranto On Codes Identifying Sets of Vertices in Hamming Spaces . . . . . . . . . . . . . 193--204 Simeon Ball and Ray Hill and Ivan Landjev and Harold Ward On $(q^2 + q + 2, q + 2)$-arcs in the Projective Plane . . . . . . . . . . . . 205--224 Zvonimir Janko and Hadi Kharaghani and Vladimir D. Tonchev The Existence of a Bush-Type Hadamard Matrix of Order $324$ and Two New Infinite Classes of Symmetric Designs 225--232 E. Ballico and A. Cossidente Curves in Projective Spaces and Almost MDS Codes . . . . . . . . . . . . . . . 233--237
Mariko Hagita and Bernhard Schmidt Bijections Between Group Rings Preserving Character Sums . . . . . . . 243--254 Carlo Blundo and Annalisa De Bonis and Alfredo De Santis Improved Schemes for Visual Cryptography 255--278 Igor E. Shparlinski and Joseph H. Silverman On the Linear Complexity of the Naor--Reingold Pseudo-random Function from Elliptic Curves . . . . . . . . . . 279--289 Clement Lam and Ying Miao Difference Families . . . . . . . . . . 291--304 H. Tapia-Recillas and G. Vega An Upper Bound on the Number of Iterations for Transforming a Boolean Function of Degree Greater or Equal Than $4$ to a Function of Degree $3$ . . . . 305--312 Nuh Aydin and Irfan Siap and Dijen K. Ray-Chaudhuri The Structure of $1$-Generator Quasi-Twisted Codes and New Linear Codes 313--326 Wenbo Mao Verifiable Partial Escrow of Integer Factors . . . . . . . . . . . . . . . . 327--342 Jeong-Heon Kim and Hong-Yeop Song Trace Representation of Legendre Sequences . . . . . . . . . . . . . . . 343--348
Stefka Bouyuklieva On the Automorphisms of Order $2$ with Fixed Points for the Extremal Self-Dual Codes of Length . . . . . . . . . . . . 5--13 Philip A. Eisen and Douglas R. Stinson Threshold Visual Cryptography Schemes with Specified Whiteness Levels of Reconstructed Pixels . . . . . . . . . . 15--61 Arne Winterhof Polynomial Interpolation of the Discrete Logarithm . . . . . . . . . . . . . . . 63--72 Etsuko Bannai and Mitsuhiro Sawano Symmetric Designs Attached to Four-Weight Spin Models . . . . . . . . 73--90 D. Brozovic and C. Ho and A. Munemasa A Correction to ``Incidence Matrices and Collineations of Finite Projective Planes'' by Chat Yin Ho, Designs, Codes and Cryptography, 18 (1999), 159--162 91--93 T. Blackmore and G. H. Norton Lower Bounds on the State Complexity of Geometric Goppa Codes . . . . . . . . . 95--115
K. T. Arasu and Warwick de Launey and S. L. Ma On Circulant Complex Hadamard Matrices 123--142 S. Ferret and L. Storme Minihypers and Linear Codes Meeting the Griesmer Bound: Improvements to Results of Hamada, Helleseth and Maekawa . . . . 143--162 Stelios Georgiou and Masaaki Harada and Christos Koukouvinos Orthogonal Designs and Type II Codes over $\mathbb{Z}_{2k}$ . . . . . . . . . 163--174 Sergio Cabello and Carles Padró and Germán Sáez Secret Sharing Schemes with Detection of Cheaters for a General Access Structure 175--188 Jürgen Bierbrauer The Theory of Cyclic Codes and a Generalization to Additive Codes . . . . 189--206 Jorge Guajardo and Christof Paar Itoh--Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes . . . . . . . . . . . . . . . . . 207--216
Ingrid Biehl and Johannes Buchmann and Safuat Hamdy and Andreas Meyer A Signature Scheme Based on the Intractability of Computing Roots . . . 223--236 Massimo Giulietti and Fernanda Pambianco and Fernando Torres and Emanuela Ughi On Complete Arcs Arising from Plane Curves . . . . . . . . . . . . . . . . . 237--246 Koen Thas A Theorem Concerning Nets Arising from Generalized Quadrangles with a Regular Point . . . . . . . . . . . . . . . . . 247--253 Luis Martínez and Antonio Vera-López Ring-Valued Assignments to the Points of a $t$-Design . . . . . . . . . . . . . . 255--262 C. Carlet and Yu. Tarannikov Covering Sequences of Boolean Functions and Their Cryptographic Significance . . 263--279 Carles Padró and Ignacio Gracia and Sebasti\`a Martín Molleví and Paz Morillo Linear Key Predistribution Schemes . . . 281--298 John B. Polhill Constructions of Nested Partial Difference Sets with Galois Rings . . . 299--309 Edoardo Ballico and Antonio Cossidente Hermitian Veronesean Schemes . . . . . . 311--317
Charles J. Colbourn and Douglas R. Stinson and G. H. John van Rees Preface: In Honour of Ronald C. Mullin 5--6 R. Julian R. Abel and F. E. Bennett and G. Ge The Existence of Four HMOLS with Equal Sized Holes . . . . . . . . . . . . . . 7--31 R. Julian R. Abel and Iliya Bluskov and Malcolm Greig Balanced Incomplete Block Designs with Block Size $9$ and $\lambda=2,4,8$ . . . 33--59 R. T. Bilous and G. H. J. van Rees An Enumeration of Binary Self-Dual Codes of Length $32$ . . . . . . . . . . . . . 61--86 Ian F. Blake and Theodoulos Garefalakis On the Security of the Digital Signature Algorithm . . . . . . . . . . . . . . . 87--96 C. Blundo and B. Masucci and D. R. Stinson and R. Wei Constructions and Bounds for Unconditionally Secure Non-Interactive Commitment Schemes . . . . . . . . . . . 97--110 Marco Buratti Cyclic Designs with Block Size $4$ and Related Optimal Optical Orthogonal Codes 111--125 H. Cao and L. Zhu Kirkman Packing Designs KPD$(3, 5*,v)$ 127--138 Chris Charnes and Martin Rötteler and Thomas Beth Homogeneous Bent Functions, Invariants, and Designs . . . . . . . . . . . . . . 139--154 Yanxun Chang and Ying Miao General Constructions for Double Group Divisible Designs and Double Frames . . 155--168 Charles J. Colbourn and E. R. Lamken and Alan C. H. Ling and W. H. Mills The Existence of Kirkman Squares --- Doubly Resolvable $(v,3,1)$-BIBDs . . . 169--196 Peng Ding and Jennifer D. Key Subcodes of the Projective Generalized Reed--Muller Codes Spanned by Minimum-Weight Vectors . . . . . . . . . 197--211 Marialuisa J. de Resmini and Dina Ghinelli and Dieter Jungnickel Arcs and Ovals from Abelian Groups . . . 213--228 Michael Drmota and Daniel Panario A Rigorous Proof of the Waterloo Algorithm for the Discrete Logarithm Problem . . . . . . . . . . . . . . . . 229--241 F. Franek and M. J. Grannell and T. S. Griggs and A. Rosa On Large Sets of $v-1$ L-Intersecting Steiner Triple Systems of Order $v$ . . 243--256 Ryoh Fuji-Hara and Ying Miao A Note on Geometric Structures of Linear Ordered Orthogonal Arrays and (T,M,S)-Nets of Low Strength . . . . . . 257--263
G. Ge and R. S. Rees On Group-Divisible Designs with Block Size Four and Group-Type gum1 . . . . . 5--24 Malcolm Greig Finite Linear Spaces II . . . . . . . . 25--47 Hans-Dietrich O. F. Gronau and Martin Grüttmüller and Sven Hartmann and Uwe Leck and Volker Leck On Orthogonal Double Covers of Graphs 49--91 M. J. Jacobson, Jr. and H. C. Williams Modular Arithmetic on Elements of Small Norm in Quadratic Fields . . . . . . . . 93--110 Clement Lam and Vladimir D. Tonchev A New Bound on the Number of Designs with Classical Affine Parameters . . . . 111--117 Rudolf Mathon and Anne Penfold Street Partitioning Sets of Triples into Small Planes . . . . . . . . . . . . . . . . . 119--130 Patric R. J. Östergård and Petteri Kaski Enumeration of $2-(9, 3, \lambda)$ Designs and Their Resolutions . . . . . 131--137 Kevin T. Phelps and Merc\`e Villanueva Ranks of $q$-Ary $1$-Perfect Codes . . . 139--144 Nabil Shalaby and Jianmin Wang and Jianxing Yin Existence of Perfect $4$-Deletion-Correcting Codes with Length Six . . . . . . . . . . . . . . . 145--156 Gustavus J. Simmons Parity Encoding of Binary Sequences . . 157--164 Brett Stevens and Eric Mendelsohn Packing Arrays and Packing Designs . . . 165--176
Kevin T. Phelps and Merc\`e Villanueva On Perfect Codes: Rank and Kernel . . . 183--194 Vikram Jha and Norman L. Johnson Transversal-Free Translation Nets . . . 195--205 Wen-Guey Tzeng and Chi-Ming Hu A New Approach for Visual Cryptography 207--227 S. Murphy and M. J. B. Robshaw Key-Dependent S-Boxes and Differential Cryptanalysis . . . . . . . . . . . . . 229--255 Patric R. J. Östergård A $2-(22, 8, 4)$ Design Cannot Have a $2-(10, 4, 4)$ Subdesign . . . . . . . . 257--260 A. Ashikhmin and A. Barg Bounds on the Covering Radius of Linear Codes . . . . . . . . . . . . . . . . . 261--269 Fang-Wei Fu and Victor K.-W. Wei Self-Complementary Balanced Codes and Quasi-Symmetric Designs . . . . . . . . 271--279 K. J. Horadam and P. Udaya A New Construction of Central Relative $(p^a, p^a, p^a, 1)$-Difference Sets . . 281--295 Patric R. J. Östergård Classifying Subspaces of Hamming Spaces 297--305
David Pointcheval and Guillaume Poupard A New $\mathcal{NP}$-Complete Problem and Public-Key Identification . . . . . 5--31 Simon Joseph Agou and Marc Deléglise and Jean-Louis Nicolas Short Polynomial Representations for Square Roots Modulo $p$ . . . . . . . . 33--44 Emily H. Moore and Harriet Pollatsek Looking for Difference Sets in Groups with Dihedral Images . . . . . . . . . . 45--50 P. Govaerts and L. Storme On a Particular Class of Minihypers and Its Applications. I. The Result for General $q$ . . . . . . . . . . . . . . 51--63 V. Abatangelo and B. Larato Doubly $\beta$-Derived Translation Planes . . . . . . . . . . . . . . . . . 65--74 K. T. Arasu and Kevin J. Player A New Family of Cyclic Difference Sets with Singer Parameters in Characteristic Three . . . . . . . . . . . . . . . . . 75--91 Xiang-dong Hou On Binary Resilient Functions . . . . . 93--112
Laurie Law and Alfred Menezes and Minghua Qu and Jerry Solinas and Scott Vanstone An Efficient Protocol for Authenticated Key Agreement . . . . . . . . . . . . . 119--134 Sergei Konyagin and Tanja Lange and Igor Shparlinski Linear Complexity of the Discrete Logarithm . . . . . . . . . . . . . . . 135--146 V. C. Mavron and T. P. McDonough and M. S. Shrikhande Quasi-Symmetric Designs with Good Blocks and Intersection Number One . . . . . . 147--162 Stefka Bouyuklieva and Masaaki Harada Extremal Self-Dual $[50, 25, 10]$ Codes with Automorphisms of Order $3$ and Quasi-Symmetric $2-(49, 9, 6)$ Designs 163--169 Koichi Betsumiya and T. Aaron Gulliver and Masaaki Harada Extremal Self-Dual Codes over $\mathbb{F}_2 \times \mathbb{F}_2$ . . . 171--186 Sheng-bo Xu and Jeroen Doumen and Henk van Tilborg On the Security of Digital Signature Schemes Based on Error-Correcting Codes 187--199 Svetla Nikova and Ventzislav Nikov Improvement of the Delsarte Bound for $\theta$-Designs When It Is Not the Best Bound Possible . . . . . . . . . . . . . 201--222
Mida Guillermo and Keith M. Martin and Christine M. O'Keefe Providing Anonymity in Unconditionally Secure Secret Sharing Schemes . . . . . 227--245 Dong-Joon Shin and P. Vijay Kumar and Tor Helleseth $3$-Designs from the $Z_4$-Goethals Codes via a New Kloosterman Sum Identity 247--263 Tor Helleseth and Torleiv Klòve and Vladimir I. Levenshtein Hypercubic $4$ and $5$-Designs from Double-Error-Correcting BCH Codes . . . 265--282 David Masson Designs and Representation of the Symmetric Group . . . . . . . . . . . . 283--302 Klaus Huber Taking $p$th Roots Modulo Polynomials over Finite Fields . . . . . . . . . . . 303--311
A. Blokhuis and J. W. P. Hirschfeld and D. Jungnickel and J. A. Thas Finite Geometries . . . . . . . . . . . 5--5 A. Aguglia and A. Cossidente and G. L. Ebert Complete Spans on Hermitian Varieties 7--15 R. Ahlswede and H. Aydinian and L. H. Khachatrian Forbidden $(0,1)$-Vectors in Hyperplanes of $\mathbb{R}^n$: The Restricted Case 17--28 Rudolf Ahlswede and Levon Khachatrian Cone Dependence --- a Basic Combinatorial Concept . . . . . . . . . 29--40 Laura Bader and Nicola Durante and Maska Law and Guglielmo Lunardon and Tim Penttila Symmetries of BLT-Sets . . . . . . . . . 41--50 Thomas Beth and Christopher Charnes and Markus Grassl and Gernot Alber and Aldo Delgado and Michael Mussinger A New Class of Designs Which Protect against Quantum Jumps . . . . . . . . . 51--70 Jürgen Bierbrauer and Stefano Marcugini and Fernanda Pambianco Projective Planes, Coverings and a Network Problem . . . . . . . . . . . . 71--89 Aart Blokhuis and Tamás Sz\Honyi and Zsuzsa Weiner On Sets without Tangents in Galois Planes of Even Order . . . . . . . . . . 91--98 Yves Edel and Jürgen Bierbrauer The Largest Cap in AG$(4, 4)$ and Its Uniqueness . . . . . . . . . . . . . . . 99--104 S. Ferret and L. Storme Results on Maximal Partial Spreads in PG$(3, p^3)$ and on Related Minihypers 105--122 András Gács and Tamás Sz\Honyi On Maximal Partial Spreads in PG$(n, q)$ 123--129 András Gács and Zsuzsa Weiner On $(q + t, t)$-Arcs of Type $(0, 2, t)$ 131--139 P. Govaerts and D. Jungnickel and L. Storme and J. A. Thas Some New Maximal Sets of Mutually Orthogonal Latin Squares . . . . . . . . 141--147 Gohar M. Kyureghyan and Alexander Pott On the Linear Complexity of the Sidelnikov--Lempel--Cohn--Eastman Sequences . . . . . . . . . . . . . . . 149--164 I. Landjev and A. Rousseva and T. Maruta and R. Hill On Optimal Codes Over the Field with Five Elements . . . . . . . . . . . . . 165--175 Dimitri Leemans The Residually Weakly Primitive Geometries of M$_{22}$ . . . . . . . . . 177--178 D. Luyckx and J. A. Thas On $1$-Systems of Q$(6, q)$, $q$ Even 179--197 Hendrik van Maldeghem Some Remarks on Steiner Systems . . . . 199--213 Klaus Metsch On the Characterization of the Folded Halved Cubes by Their Intersection Arrays . . . . . . . . . . . . . . . . . 215--225 Koen Thas Symmetry in Generalized Quadrangles . . 227--245 Vladimir D. Tonchev A Note on MDS Codes, $n$-Arcs and Complete Designs . . . . . . . . . . . . 247--250
Siaw-Lynn Ng A Representation of a Family of Secret Sharing Matroids . . . . . . . . . . . . 5--19 Maria Axenovich and Zoltán Füredi Exact Bounds on the Sizes of Covering Codes . . . . . . . . . . . . . . . . . 21--38 Shengli Liu and Henk C. A. Van Tilborg and Marten Van Dijk A Practical Protocol for Advantage Distillation and Information Reconciliation . . . . . . . . . . . . . 39--62 Keith E. Mellinger A Geometric Relationship Between Equivalent Spreads . . . . . . . . . . . 63--71 Cunsheng Ding and Mordecai Golin and Torleiv Klòve Meeting the Welch and Karystinos-Pados Bounds on DS-CDMA Binary Signature Sets 73--84 Antonia W. Bluher On $x^6 + x + a$ in Characteristic Three 85--95 Iliya Bouyukliev and Juriaan Simonis Some New Results on Optimal Codes Over $F^5$ . . . . . . . . . . . . . . . . . 97--111 San Ling and Patrick Solé On the Algebraic Structure of Quasi-cyclic Codes II: Chain Rings . . . 113--130
H. Kharaghani On a Class of Symmetric Balanced Generalized Weighing Matrices . . . . . 139--149 Daniel B. Dalan New Extremal Type I Codes of Lengths $40$, $42$, and $44$ . . . . . . . . . . 151--157 Massimiliano Sala Upper Bounds on the Dual Distance of BCH$(255, k)$ . . . . . . . . . . . . . 159--168 Kenichiro Tanabe A Criterion for Designs in $Z_4$-codes on the Symmetrized Weight Enumerator . . 169--185 Jon-Lark Kim and Vera Pless Designs in Additive Codes over GF$(4)$ 187--199 Phong Q. Nguyen and Igor E. Shparlinski The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces . . . . . . . . . 201--217 I. Cardinali and O. Polverino and R. Trombetti On the Sporadic Semifield Flock . . . . 219--226
Palash Sarkar and Paul J. Schellenberg Construction of Symmetric Balanced Squares with Blocksize More than One . . 235--280 Detlef Hühnlein and Michael J. Jacobson, Jr. and Damian Weber Towards Practical Non-Interactive Public-Key Cryptosystems Using Non-Maximal Imaginary Quadratic Orders 281--299 Ederlina G. Nocon On the Construction of Some Type II Codes over $Z_4 \times Z_4$ . . . . . . 301--323 David B. Chandler and Qing Xiang Cyclic Relative Difference Sets and their $p$-Ranks . . . . . . . . . . . . 325--343
Yves Edel Extensions of Generalized Product Caps 5--14 J. Barát and A. Del Fra and S. Innamorati and L. Storme Minimal Blocking Sets in PG$(2, 8)$ and Maximal Partial Spreads in PG$(3, 8)$ 15--26 Hans Georg Schaathun A Lower Bound on the Greedy Weights of Product Codes . . . . . . . . . . . . . 27--42 David G. Glynn On the Orthogonality of Geometric Codes 43--50 Jovan Dj. Goli\'c and Renato Menicocci Correlation Analysis of the Alternating Step Generator . . . . . . . . . . . . . 51--74 Dong-Joon Shin and P. Vijay Kumar and Tor Helleseth An Assmus--Mattson-Type Approach for Identifying $3$-Designs from Linear Codes over Z$_4$ . . . . . . . . . . . . 75--92
Ingrid Biehl and Sacher Paulus and Tsuyoshi Takagi Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders . . . . . . . . . . . . . . . . . 99--123 Tran Van Trung and Sosina Martirosyan On a Class of Traceability Codes . . . . 125--132 S. Rajola and M. Scafati Tallini Affine Planes and Flag Linear Spaces . . 133--137 T. Aaron Gulliver and Masaaki Harada On the Minimum Weight of Codes over $F_5$ Constructed from Certain Conference Matrices . . . . . . . . . . 139--145 Pantelimon St\uanic\ua and Soo Hak Sung Boolean Functions with Five Controllable Cryptographic Properties . . . . . . . . 147--157 U. Dempwolff Affine Rank $3$ Groups on Symmetric Designs . . . . . . . . . . . . . . . . 159--168 Michael E. O'Sullivan On Koetter's Algorithm and the Computation of Error Values . . . . . . 169--188
David A. Drake and Kevin Keating Ovals and Hyperovals in Desarguesian Nets . . . . . . . . . . . . . . . . . . 195--212 Peter Sin The $p$-Rank of the Incidence Matrix of Intersecting Linear Subspaces . . . . . 213--220 Andreas Klein Partial Ovoids in Classical Finite Polar Spaces . . . . . . . . . . . . . . . . . 221--226 Andrew Klapper and Jinzhong Xu Register Synthesis for Algebraic Feedback Shift Registers Based on Non-Primes . . . . . . . . . . . . . . . 227--250 Matthew R. Brown and Christine M. O'Keefe and S. E. Payne and Tim Penttila and Gordon F. Royle Spreads of $T_2(o)$, $\alpha$-flocks and Ovals . . . . . . . . . . . . . . . . . 251--282 Klaus Metsch Small Point Sets that Meet All Generators of $W(2 n +1, q)$ . . . . . . 283--288 Gloria Rinaldi Key Distribution Patterns Using Tangent Circle Structures . . . . . . . . . . . 289--300 Siguna Müller On the Computation of Square Roots in Finite Fields . . . . . . . . . . . . . 301--312 Sergey V. Avgustinovich and Olof Heden and Faina I. Solov'eva The Classification of Some Perfect Codes 313--318
Anonymous Preface . . . . . . . . . . . . . . . . 5--6 Anonymous List of Participants . . . . . . . . . . 7--8 Simeon Ball and John Bamberg and Michel Lavrauw and Tim Penttila Symplectic Spreads . . . . . . . . . . . 9--14 Carlo Blundo and Paolo D'Arco and Alfredo De Santis and Massimiliano Listo Design of Self-Healing Key Distribution Schemes . . . . . . . . . . . . . . . . 15--44 Julia M. N. Brown On the Action of the Groups $\mbox{GL}(n+1,q)$, $\mbox{PGL}(n + 1, q)$, $\mbox{SL}(n + 1, q)$ and $\mbox{PSL}(n + 1, q)$ on $\mbox{PG}(n, q^t)$ . . . . . . . . . . . . . . . . . 45--50 Wensong Chu and Charles J. Colbourn and Peter Dukes Constructions for Permutation Codes in Powerline Communications . . . . . . . . 51--64 Charles J. Colbourn and Alan C. H. Ling and Violet R. Syrotiuk Cover-Free Families and Topology-Transparent Scheduling for MANETs . . . . . . . . . . . . . . . . . 65--95 A. Cossidente and M. J. de Resmini Remarks on Singer Cyclic Groups and Their Normalizers . . . . . . . . . . . 97--102 F. De Clerck and M. Delanote On $(0,\alpha)$-Geometries and Dual Semipartial Geometries Fully Embedded in an Affine Space . . . . . . . . . . . . 103--110 Nikias de Feyter Planar Oval Sets in Desarguesian Planes of Even Order . . . . . . . . . . . . . 111--119 D. Deng and D. R. Stinson and R. Wei The Lovász Local Lemma and Its Applications to some Combinatorial Arrays . . . . . . . . . . . . . . . . . 121--134 A. De Santis and B. Masucci Anonymous Membership Broadcast Schemes 135--151 S. De Winter and J. A. Thas SPG-Reguli Satisfying the Polar Property and a New Semipartial Geometry . . . . . 153--166 David A. Drake and Wendy Myrvold Nets of Small Degree Without Ovals . . . 167--183 Z. Eslami and G. B. Khosrovshahi and M. M. Noori Enumeration of $t$-Designs Through Intersection Matrices . . . . . . . . . 185--191 S. Georgiou and C. Koukouvinos Self-Orthogonal and Self-Dual Codes Constructed via Combinatorial Designs and Diophantine Equations . . . . . . . 193--206 M. I. González Vasco and D. Hofheinz and C. Martínez and R. Steinwandt On the Security of Two Public Key Cryptosystems Using Non-Abelian Groups 207--216 Otokar Gro\vsek and Peter Horák and Tran van Trung On Non-Polynomial Latin Squares . . . . 217--226 Yury J. Ionin Regular Hadamard Matrices Generating Infinite Families of Symmetric Designs 227--233 G. B. Khosrovshahi and B. Tayfeh-Rezaie Some Indecomposable $t$-Designs . . . . 235--238 G. Korchmáros and A. Sonnino Hyperbolic Ovals in Finite Planes . . . 239--249 Selda Kücçükcçìfcçì and C. C. Lindner Minimum Covering for Hexagon Triple Systems . . . . . . . . . . . . . . . . 251--265 Domenico Labbate Amalgams of Cubic Bipartite Graphs . . . 267--275 Reinhard Laue Resolvable $t$-Designs . . . . . . . . . 277--301 X. Ma and R. Wei On a Bound of Cover-Free Families . . . 303--321 Sosina Martirosyan and Tran van Trung On $t$-Covering Arrays . . . . . . . . . 323--339 Keith E. Mellinger LDPC Codes from Triangle-Free Line Sets 341--350 Alan Offer and Hendrik Van Maldeghem Spreads and Ovoids Translation with Respect to Disjoint Flags . . . . . . . 351--367 Tanya E. Seidel and Daniel Socek and Michal Sramka Parallel Symmetric Attack on NTRU using Non-Deterministic Lattice Reduction . . 369--379 R. Shaw and N. A. Gordon The Quintic Grassmannian $G_{1, 4, 2}$ in $\mbox{PG}(9, 2)$ . . . . . . . . . . 381--396
János Barát and Leo Storme Multiple Blocking Sets in $\mbox{PG}(n,q), n > 3$ . . . . . . . . . 5--21 Jong-Seon No and Dong-Joon Shin and Tor Helleseth On the $p$-Ranks and Characteristic Polynomials of Cyclic Difference Sets 23--37 Tor Helleseth and Johannes Mykkeltveit A Proof of Simmons' Conjecture . . . . . 39--43 Steven T. Dougherty and Keisuke Shiromoto Maximum Distance Codes in $\mbox{Mat}_{n,s} (Z_k)$ with a Non-Hamming Metric and Uniform Distributions . . . . . . . . . . . . . 45--61 David A. Drake and Wendy Myrvold The Non-Existence of Maximal Sets of Four Mutually Orthogonal Latin Squares of Order $8$ . . . . . . . . . . . . . . 63--69 Harold N. Ward A Sequence of Unique Quaternary Griesmer Codes . . . . . . . . . . . . . . . . . 71--85
Conchita Martínez-Pérez and Wolfgang Willems On the Weight Hierarchy of Product Codes 95--108 Wilfried Meidl How Many Bits have to be Changed to Decrease the Linear Complexity? . . . . 109--122 Mark Goresky and Andrew Klapper Periodicity and Correlation Properties of $d$-FCSR Sequences . . . . . . . . . 123--148 Masaaki Harada and Michio Ozeki and Kenichiro Tanabe On the Covering Radius of Ternary Extremal Self-Dual Codes . . . . . . . . 149--158 J. L. Hayden Eigenvalues of Finite Projective Planes with an Abelian Cartesian Group . . . . 159--172 Lucio Guerra and Rita Vincenti On the Linear Codes Arising from Schubert Varieties . . . . . . . . . . . 173--180
Wiebke S. Diestelkamp Parameter Inequalities for Orthogonal Arrays with Mixed Levels . . . . . . . . 187--197 Jong-Seon No New Cyclic Difference Sets with Singer Parameters Constructed from $d$-Homogeneous Functions . . . . . . . 199--213 María Isabel González Vasco and Consuelo Martínez and Rainer Steinwandt Towards a Uniform Description of Several Group Based Cryptographic Primitives . . 215--226 Cunsheng Ding and Xiaojian Tian Three Constructions of Authentication Codes with Perfect Secrecy . . . . . . . 227--239 Carlo Blundo and Sebasti\`a Martín and Barbara Masucci and CarlEs Padró A Linear Algebraic Approach to Metering Schemes . . . . . . . . . . . . . . . . 241--260 Alfred Menezes and Nigel Smart Security of Signature Schemes in a Multi-User Setting . . . . . . . . . . . 261--274 Joseph L. Yucas and Gary L. Mullen Self-Reciprocal Irreducible Polynomials Over Finite Fields . . . . . . . . . . . 275--281
Tatsuya Maruta and Ivan N. Landjev and Assya Rousseva On the Minimum Size of Some Minihypers and Related Linear Codes . . . . . . . . 5--15 Jaume Martí-Farré and Carles Padró Secret Sharing Schemes with Three or Four Minimal Qualified Subsets . . . . . 17--34 Ferruh Özbudak Elements of Prescribed Order, Prescribed Traces and Systems of Rational Functions Over Finite Fields . . . . . . . . . . . 35--54 Michael Braun and Adalbert Kerber and Reinhard Laue Systematic Construction of $q$-Analogs of $t-(v, k,\lambda)$-Designs . . . . . 55--70 Masaaki Harada and Clement Lam and Vladimir D. Tonchev Symmetric $(4,4)$-Nets and Generalized Hadamard Matrices Over Groups of Order $4$ . . . . . . . . . . . . . . . . . . 71--87 Bikash Kumar Dey and B. Sundar Rajan $F_q$-linear Cyclic Codes over $F^m_q$: DFT Approach . . . . . . . . . . . . . . 89--116 Gennian Ge and Alan C. H. Ling Group Divisible Designs with Block Size Four and Group Type $g^u m^1$ with Minimum $m$ . . . . . . . . . . . . . . 117--126
Aart Blokhuis and Willem Haemers Preface . . . . . . . . . . . . . . . . 135--135 Edwin R. Van Dam The Combinatorics of Dom de Caen . . . . 137--148 D. De Caen and D. Fon-Der-Flaass Distance Regular Covers of Complete Graphs from Latin Squares . . . . . . . 149--153 K. Coolsaet and J. Degraer A Computer-Assisted Proof of the Uniqueness of the Perkel Graph . . . . . 155--171 Bang Sejeong and J. H. Koolen Some Interlacing Results for the Eigenvalues of Distance-regular graphs 173--186 Hirasaka On Meta-Thin Association Schemes . . . . 187--201 Ron Shaw and Johannes G. Maks and Neil A. Gordon The Classification of Flats in which are External to the Grassmannian . . . . . . 203--227 Dragos Cvetkovi\'c and Peter Rowlinson and Slobodan K. Simi\'c Graphs With Least Eigenvalue $-2$: a New Proof of the $31$ Forbidden Subgraphs Theorem . . . . . . . . . . . . . . . . 229--240 Brian Curtin Algebraic Characterizations of Graph Regularity Conditions . . . . . . . . . 241--248 Mikhail Muzychuk and István Kovács A Solution of a Problem of A. E. Brouwer 249--264 Ákos Seress Square-Free Non-Cayley Numbers. On Vertex-Transitive Non-Cayley Graphs of Square-Free Order . . . . . . . . . . . 265--281 Joseph A. Thas and Hendrik Van Maldeghem Some Characterizations of Finite Hermitian Veroneseans . . . . . . . . . 283--293 R. D. Baker and G. L. Ebert and Tim Penttila Hyperbolic Fibrations and $q$-Clans . . 295--305 Paul Terwilliger Two Linear Transformations each Tridiagonal with Respect to an Eigenbasis of the other; Comments on the Parameter Array . . . . . . . . . . . . 307--332 Hans Cuypers A Note on the Tight Spherical $7$-Design in and $5$-Design in . . . . . . . . . . 333--337 Klaus Metsch Blocking Structures of Hermitian Varieties . . . . . . . . . . . . . . . 339--360
Jovan Dj. Goli\'c and Philip Hawkes Vectorial Approach to Fast Correlation Attacks . . . . . . . . . . . . . . . . 5--19 John P. Mcsorley and N. C. K. Phillips and W. D. Wallis and others Double Arrays, Triple Arrays and Balanced Grids . . . . . . . . . . . . . 21--45 Wen-Guey Tzeng and Zhi-Jia Tzeng A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares . . . . 47--61 Thierry P. Berger and Pierre Loidreau How to Mask the Structure of Codes for a Cryptographic Use . . . . . . . . . . . 63--79 Olgica Milenkovic Support Weight Enumerators and Coset Weight Distributions of Isodual Codes 81--109 Florian Hess and Igor E. Shparlinski On the Linear Complexity and Multidimensional Distribution of Congruential Generators over Elliptic Curves . . . . . . . . . . . . . . . . . 111--117 Daniel R. L. Brown Generic Groups, Collision Resistance, and ECDSA . . . . . . . . . . . . . . . 119--152
Rafa\l Bia\lota and Grzegorz Kawa Modified Alternating $\stackrel{\rightarrow}{k}$ generators 159--174 Tatsuya Maruta Extendability of Ternary Linear Codes 175--190 Mingyuan Xia and Tianbing Xia and Jennifer Seberry A New Method for Constructing Williamson Matrices . . . . . . . . . . . . . . . . 191--209 Cícero Carvalho and Fernando Torres On Goppa Codes and Weierstrass Gaps at Several Points . . . . . . . . . . . . . 211--225 Tran Van Trung and Sosina Martirosyan New Constructions for IPP Codes . . . . 227--239 Patric R. J. Östergård and Jörn Quistorff and Alfred Wassermann New Results on Codes with Covering Radius $1$ and Minimum Distance $2$ . . 241--250
Petr Lisonek and Mahadad Khatirinejad A Family of Complete Caps in ${\rm PG}(n,2)$ . . . . . . . . . . . . . . . 259--270 Harri Haanpää and Petteri Kaski The Near Resolvable $2-(13, 4, 3)$ Designs and Thirteen-Player Whist Tournaments . . . . . . . . . . . . . . 271--285 G. E. Gennian and C. W. H. Lam and Alan C. H. Ling and others Resolvable Maximum Packings with Quadruples . . . . . . . . . . . . . . . 287--302 Yury J. Ionin and Hadi Kharaghani A Recursive Construction for New Symmetric Designs . . . . . . . . . . . 303--310 Stelvio Cimato and Roberto De Prisco and Alfredo De Santis Optimal Colored Threshold Visual Cryptography Schemes . . . . . . . . . . 311--335 D. Luyckx and J. A. Thas Trialities and $1$-Systems of $Q^+(7,q)$ 337--352
S. G. Barwick and Wen-Ai Jackson and Keith M. Martin A General Approach to Robust Web Metering . . . . . . . . . . . . . . . . 5--27 John C. Galati On the Non-existence of Semiregular Relative Difference Sets in Groups with All Sylow Subgroups Cyclic . . . . . . . 29--31 Mathieu Ciet and Marc Joye Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults . . . . . . . . . . . . . . . . . 33--43 Carl Bracken and Gary Mcguire Characterization of SDP Designs That Yield Certain Spin Models . . . . . . . 45--52 Iuon-Chang Lin and Min-Shiang Hwang and Chin-Chen Chang The General Pay-Word: a Micro-payment Scheme Based on $n$-dimension One-way Hash Chain . . . . . . . . . . . . . . . 53--67 J. Löfvenberg Binary Fingerprinting Codes . . . . . . 69--81 L. Ji and D. Wu and L. Zhu Existence of Generalized Steiner Systems $\mathrm{GS}(2,4,\nu,2)$ . . . . . . . . 83--99 J. Eisfeld and L. Storme and P. Sziklai On the Spectrum of the Sizes of Maximal Partial Line Spreads in $\mathrm{PG}(2n,q), n \geq 3$ . . . . . 101--110
J. De Kaey On a More General Characterisation of Steiner Systems . . . . . . . . . . . . 117--129 P. Langevin and J.-P. Zanotti Nonlinearity of Some Invariant Boolean Functions . . . . . . . . . . . . . . . 131--146 F. L. Chiera Type II Codes over $ \mathbb{Z} / 2 k \mathbb{Z} $, Invariant Rings and Theta Series . . . . . . . . . . . . . . . . . 147--158 Shenglin Zhou Block Primitive $2-(v,k,1)$ Designs Admitting a Ree Group of Characteristic Two . . . . . . . . . . . . . . . . . . 159--169 Ka Hin Leung and Bernhard Schmidt The Field Descent Method . . . . . . . . 171--188 Claude Carlet Concatenating Indicators of Flats for Designing Cryptographic Functions . . . 189--202 Vikram Jha Local Schur's Lemma and Commutative Semifields . . . . . . . . . . . . . . . 203--216
Manish K. Gupta and Mahesh C. Bhandari and Arbind K. Lal On Linear Codes over $\mathbb{Z}_2^s$ 227--244 Ezra Brown and Bruce T. Myers and Jerome A. Solinas Hyperelliptic Curves with Compact Parameters . . . . . . . . . . . . . . . 245--261 Keith M. Martin and Rei Safavi-Naini and Huaxiong Wang and Peter R. Wild Distributing the Encryption and Decryption of a Block Cipher . . . . . . 263--287 E. J. Cheon and T. Kato and S. J. Kim Nonexistence of $[n, 5, d]_q$ Codes Attaining the Griesmer Bound for $q^4 - 2 q^2 - 2 q + 1 \leq d \leq q^4 - 2 q^2 - q$ . . . . . . . . . . . . . . . . . . 289--299 Juan Manuel Gonzalez Nieto and Colin Boyd and Ed Dawson A Public Key Cryptosystem Based On a Subgroup Membership Problem . . . . . . 301--316 P. Véron Proof of Conjectures on the True Dimension of Some Binary Goppa Codes . . 317--325 Patric R. J. Östergård Two New Four-Error-Correcting Binary Codes . . . . . . . . . . . . . . . . . 327--329 Stephen D. Cohen Finite Field Elements with Specified Order and Traces . . . . . . . . . . . . 331--340 Anonymous Volume Table of Contents: Volume 36 . . 341--342
Anka Golemac and Tanja Vucici\'c and Josko Mandi\'c One $(96,20,4)$-symmetric Design and related Nonabelian Difference Sets . . . 5--13 A. J. van Zanten and I. Nengah Suparta On the Construction of Linear $q$-ary Lexicodes . . . . . . . . . . . . . . . 15--29 Philippe Langevin and Pascal Véron On the Non-linearity of Power Functions 31--43 Gerzson Kéri and Patric R. J. Östergård Bounds for Covering Codes over Large Alphabets . . . . . . . . . . . . . . . 45--60 Alexander A. Davydov and Giorgio Faina and Fernanda Pambianco Constructions of Small Complete Caps in Binary Projective Spaces . . . . . . . . 61--80 John Malone-Lee Signcryption with Non-interactive Non-repudiation . . . . . . . . . . . . 81--109 Masaaki Homma and Seon Jeong Kim Toward the Determination of the Minimum Distance of Two--Point Codes on a Hermitian Curve . . . . . . . . . . . . 111--132 Friederike Brezing and Annegret Weng Elliptic Curves Suitable for Pairing Based Cryptography . . . . . . . . . . . 133--141 B. Tayfeh-Rezaie On the Existence of Large Sets of $t$-designs of Prime Sizes . . . . . . . 143--149 R. Ahlswede and H. Aydinian and L. H. Khachatrian Forbidden (0,1)-vectors in Hyperplanes of $\mathbb{R}^n$: The unrestricted case 151--167
Miin Huey Ang and Siu Lun Ma Symmetric Weighing Matrices Constructed using Group Matrices . . . . . . . . . . 195--210 Jürgen Bierbrauer and Yves Edel A Family of Binary $(t, m, s)$-Nets of Strength $5$ . . . . . . . . . . . . . . 211--214 G. B. Belyavskaya and V. I. Izbash and G. L. Mullen Check Character Systems using Quasigroups: I . . . . . . . . . . . . . 215--227 R. Safavi-naini and C. Charnes MRD Hashing . . . . . . . . . . . . . . 229--242 K. T. Phelps and J. Rif\`a and M. Villanueva Kernels and $p$-Kernels of $p^r$-ary 1-Perfect Codes . . . . . . . . . . . . 243--261 Bart De Bruyn Slim Near Polygons . . . . . . . . . . . 263--280 Jianxing Yin Cyclic Difference Packing and Covering Arrays . . . . . . . . . . . . . . . . . 281--292 Chihiro Suetake The Classification of Symmetric Transversal Designs STD$_4[12;3]$'s . . 293--304 Antonino Giorgio Spera Asymptotically Good Codes from Generalized Algebraic--Geometry Codes 305--312 John P. Mcsorley Double Arrays, Triple Arrays and Balanced Grids with $v = r + c - 1$ . . 313--318
S. G. Barwick and Wen-Ai Jackson An Optimal Multisecret Threshold Scheme Construction . . . . . . . . . . . . . . 367--389 A. Ya. Dorofeev and L. S. Kazarin and V. M. Sidelnikov and M. E. Tuzhilin Matrix Groups Related to the Quaternion Group and Spherical Orbit Codes . . . . 391--404 G. B. Belyavskaya and V. I. Izbash and G. L. Mullen Check Character Systems Using Quasigroups: II . . . . . . . . . . . . 405--419 E. J. Cheon and T. Kato and S. J. Kim On the Minimum Length of some Linear Codes of Dimension $5$ . . . . . . . . . 421--434 A. Wispelaere and H. Maldeghem Codes from Generalized Hexagons . . . . 435--448 Claude Carlet and Joseph L. Yucas Piecewise Constructions of Bent and Almost Optimal Boolean Functions . . . . 449--464 T. Aaron Gulliver and Masaaki Harada and Takuji Nishimura and Patric R. J. Östergård Near-Extremal Formally Self-Dual Even Codes of Lengths $24$ and $32$ . . . . . 465--471 Gretchen L. Matthews Weierstrass Semigroups and Codes from a Quotient of the Hermitian Curve . . . . 473--492 Omran Ahmadi and Alfred Menezes On the Number of Trace-One Elements in Polynomial Bases for $\mathbb{F}_2^n$ 493--507 Jens-Matthias Bohli and Rainer Steinwandt and María Isabel González Vasco and Consuelo Martínez Weak Keys in MST$_1$ . . . . . . . . . . 509--524
Masaaki Harada Self-Orthogonal $3-(56,12,65)$ Designs and Extremal Doubly-Even Self-Dual Codes of Length $56$ . . . . . . . . . . . . . 5--16 Mehmet Ozen and Irfan Siap Linear Codes over $\mathbb{F}_q[u] / (u^s)$ with Respect to the Rosenbloom--Tsfasman Metric . . . . . . 17--29 T. L. Alderson $(6,3)$-MDS Codes over an Alphabet of Size $4$ . . . . . . . . . . . . . . . . 31--40 Jean-Sébastien Coron and David Naccache and Yvo Desmedt and Andrew Odlyzko and Julien P. Stern Index Calculation Attacks on RSA Signature and Encryption . . . . . . . . 41--53 Masaaki Homma and Seon Jeong Kim The Two-Point Codes on a Hermitian Curve with the Designed Minimum Distance . . . 55--81 L. Ji Asymptotic Determination of the Last Packing Number of Quadruples . . . . . . 83--95 Steven T. Dougherty and T. Aaron. Gulliver and Manabu Oura Higher Weights for Ternary and Quaternary Self-Dual Codes . . . . . . . 97--112 Michel Lavrauw Sublines of Prime Order Contained in the Set of Internal Points of a Conic . . . 113--123 Olof Heden A Full Rank Perfect Code of Length $31$ 125--129 Simeon Ball and Patrick Govaerts and Leo Storme On Ovoids of Parabolic Quadrics . . . . 131--145
Wilfried Meidl and Arne Winterhof Some Notes on the Linear Complexity of Sidel'nikov--Lempel--Cohn--Eastman Sequences . . . . . . . . . . . . . . . 159--178 Frank de Clerck and Stefaan de Winter and Elisabeth Kuijken and Cristina Tonesi Distance-Regular $(0, \alpha)$-Reguli 179--194 Sara Cauchie A Characterization of the Complement of a Hyperbolic Quadric in ${\rm PG}(3,q)$, for $q$ Odd . . . . . . . . . . . . . . 195--208 Michael Scott and Paulo S. L. M. Barreto Generating More MNT Elliptic Curves . . 209--217 Gwoboa Horng and Tzungher Chen and Du-shiau Tsai Cheating in Visual Cryptography . . . . 219--236 Ari Juels and Madhu Sudan A Fuzzy Vault Scheme . . . . . . . . . . 237--257 D. R. Stinson Some Observations on the Theory of Cryptographic Hash Functions . . . . . . 259--277 Khoongming Khoo and Guang Gong and Douglas R. Stinson A New Characterization of Semi-bent and Bent Functions on Finite Fields* . . . . 279--295 Eric Merchant Exponentially Many Hadamard Designs . . 297--308
Norifumi Kamiya and Marc P. C. Fossorier Quasi-Cyclic Codes from a Finite Affine Plane . . . . . . . . . . . . . . . . . 311--329 Petri Rosendahl A Generalization of Niho's Theorem . . . 331--336 San Ling and Harald Niederreiter and Patrick Solé On the Algebraic Structure of Quasi-cyclic Codes IV: Repeated Roots 337--361 Vince Grolmusz Co-Orthogonal Codes . . . . . . . . . . 363--372 Jinhua Wang A New Class of Optimal $3$-splitting Authentication Codes . . . . . . . . . . 373--381 Annegret Weng A Low-Memory Algorithm for Point Counting on Picard Curves . . . . . . . 383--393 Omran Ahmadi Self-Reciprocal Irreducible Pentanomials Over $\mathbb{F}_2$ . . . . . . . . . . 395--397 Benjamin Arazi Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard . . . . . . . . . . . . . . . 399--415
Jeremy Dover Subregular Spreads of Hermitian Unitals 5--15 Mahdad Khatirinejad and Petr Lisonek Classification and Constructions of Complete Caps in Binary Spaces . . . . . 17--31 A. Cossidente and A. Siciliano The Automorphism Group of Plane Algebraic Curves with Singer Automorphisms . . . . . . . . . . . . . 33--37 Tao Feng and Yanxun Chang Existence of Z-cyclic ${\rm 3PTWh}(p)$ for any Prime $p \equiv 1$ (mod $4$) . . 39--49 Agnes D. Garciano and Yutaka Hiramine and Takeo Yokonuma On Relative Difference Sets in Dihedral Groups . . . . . . . . . . . . . . . . . 51--63 Steven T. Dougherty and Young Ho Park Codes Over the $p$-adic Integers . . . . 65--80 S. De Winter and K. Thas Generalized Quadrangles with an Abelian Singer Group . . . . . . . . . . . . . . 81--87 Barbara Masucci Sharing Multiple Secrets: Models, Schemes and Analysis . . . . . . . . . . 89--111 Igor E. Shparlinski On RSA Moduli with Prescribed Bit Patterns . . . . . . . . . . . . . . . . 113--122
Steven T. Dougherty and San Ling Cyclic Codes Over $\mathbb{Z}_4$ of Even Length . . . . . . . . . . . . . . . . . 127--153 Hassan Aly and Arne Winterhof On the Linear Complexity Profile of Nonlinear Congruential Pseudorandom Number Generators with Dickson Polynomials . . . . . . . . . . . . . . 155--162 Michael Giudici Codes with a Certain Weight-preserving Transitive Group of Automorphisms . . . 163--172 Kejun Chen and Ruizhong Wei Super-simple $(\nu, 5, 5)$ Designs . . . 173--187 Mathieu Ciet and Marc Joye and Kristin Lauter and Peter L. Montgomery Trading Inversions for Multiplications in Elliptic Curve Cryptography . . . . . 189--206 Gilberto Bini $A$-Codes from Rational Functions over Galois Rings . . . . . . . . . . . . . . 207--214 Cem Güneri and Ferruh Özbudak Improvements on Generalized Hamming Weights of Some Trace Codes . . . . . . 215--231 Gilles Piret Luby--Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme . . . . . . . . . . . . . 233--245 Dean Crnkovi\'c A Series of Regular Hadamard Matrices 247--251 Marten Van Dijk and Dwaine Clarke and Blaise Gassend and G. Edward Suh and Srinivas Devadas Speeding up Exponentiation using an Untrusted Computational Resource . . . . 253--273
M. R. Darafsheh Designs from the Group ${\rm PSL}_2(q)$, $q$ Even . . . . . . . . . . . . . . . . 311--316 Sergey V. Avgustinovich and Olof Heden and Faina I. Solov'eva On Intersection Problem for Perfect Binary Codes . . . . . . . . . . . . . . 317--322 Jan De Beule and Leo Storme Blocking All Generators of $Q^+(2 n + 1,3)$, $n \geq 4$ . . . . . . . . . . . 323--333 Jen-Chun Chang New Algorithms of Distance-Increasing Mappings from Binary Vectors to Permutations by Swaps . . . . . . . . . 335--345 Samuel Maffre A Weak Key Test for Braid Based Cryptography . . . . . . . . . . . . . . 347--373 Masaaki Homma and Seon Jeong Kim The Two-Point Codes with the Designed Distance on a Hermitian Curve in Even Characteristic . . . . . . . . . . . . . 375--386 Katie M. O'Brien and Patrick Fitzpatrick Bounds on Codes Derived by Counting Components in Varshamov Graphs . . . . . 387--396 Angela Aguglia and Massimo Giulietti Blocking Sets of Certain Line Sets Related to a Conic . . . . . . . . . . . 397--405
Masaaki Homma and Seon Jeong Kim The Complete Determination of the Minimum Distance of Two-Point Codes on a Hermitian Curve . . . . . . . . . . . . 5--24 Peter J. Grabner and Clemens Heuberger On the Number of Optimal Base $2$ Representations of Integers . . . . . . 25--39 Deepak Kumar Dalai and Subhamoy Maitra and Sumanta Sarkar Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity . . . . . . . . . . 41--58 François Rodier Asymptotic Nonlinearity of Boolean Functions . . . . . . . . . . . . . . . 59--70 Claude Carlet and Cunsheng Ding and Harald Niederreiter Authentication Schemes from Highly Nonlinear Functions . . . . . . . . . . 71--79 Hiroki Koga and Etsuyo Ueda Basic Properties of the $(t,n)$-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels . . . . . . . . . . . . . . 81--102 Javier Herranz and Germán Sáez Distributed Ring Signatures from General Dual Access Structures . . . . . . . . . 103--120 Anthony B. Evans Latin Squares without Orthogonal Mates 121--130 Ian M. Wanless and Bridget S. Webb The Existence of Latin Squares without Orthogonal Mates . . . . . . . . . . . . 131--135
Yen-Ying Huang and Shi-Chun Tsai and Hsin-Lung Wu On the Construction of Permutation Arrays via Mappings from Binary Vectors to Permutations . . . . . . . . . . . . 139--155 Cunsheng Ding and Jianxing Yin A Construction of Optimal Constant Composition Codes . . . . . . . . . . . 157--165 Yanxun Chang and Cunsheng Ding Constructions of External Difference Families and Disjoint Difference Families . . . . . . . . . . . . . . . . 167--185 Octavio Páez Osuna There are $1239$ Steiner Triple Systems ${\rm STS}(31)$ of $2$-rank $27$ . . . . 187--190 Shoulun Long and Josef Pieprzyk and Huaxiong Wang and Duncan S. Wong Generalised Cumulative Arrays in Secret Sharing . . . . . . . . . . . . . . . . 191--209 R. J. R. Abel and F. E. Bennett The Existence of $(\nu, 6, \lambda)$-Perfect Mendelsohn Designs with $\lambda > 1$ . . . . . . . . . . . 211--224 Mike J. Grannell and Terry S. Griggs and Anne Penfold Street A Flaw in the Use of Minimal Defining Sets for Secret Sharing Schemes . . . . 225--236 Andreas Faldum and Julio Lafuente and Gustavo Ochoa and Wolfgang Willems Error Probabilities for Bounded Distance Decoding . . . . . . . . . . . . . . . . 237--252
Mausumi Bose and Rahul Mukerjee Optimal $(2,n)$ visual cryptographic schemes . . . . . . . . . . . . . . . . 255--267 Brendan D. McKay and Jeanette C. McLeod and Ian M. Wanless The number of transversals in a Latin square . . . . . . . . . . . . . . . . . 269--284 Christopher Wolf and An Braeken and Bart Preneel On the security of stepwise triangular systems . . . . . . . . . . . . . . . . 285--302 Gennian Ge and Ying Miao and L. Zhu GOB designs for authentication codes with arbitration . . . . . . . . . . . . 303--317 Olof Heden and Martin Hessler On the classification of perfect codes: side class structures . . . . . . . . . 319--333 David G. Glynn and Johannes G. Maks and Rey Casse The polynomial degree of the Grassmannian $G(1,n,q)$ of lines in finite projective space ${\rm PG}(n,q)$ 335--341 Sean V. Droms and Keith E. Mellinger and Chris Meyer LDPC codes generated by conics in the classical projective plane . . . . . . . 343--356 Peter Horak and Bader F. AlBdaiwi Fast decoding of quasi-perfect Lee distance codes . . . . . . . . . . . . . 357--367 Hassan Aly and Arne Winterhof On the $k$-error linear complexity over $\mathbb{F}_p$ of Legendre and Sidelnikov sequences . . . . . . . . . . 369--374
Rei Safavi-Naini and Huaxiong Wang Secret sharing schemes with partial broadcast channels . . . . . . . . . . . 5--22 Julien Moncel Constructing codes identifying sets of vertices . . . . . . . . . . . . . . . . 23--31 Charles J. Colbourn and Sosina S. Martirosyan and Tran Van Trung and Robert A. Walker Roux-type constructions for covering arrays of strengths three and four . . . 33--57 Iliya Bouyukliev and Veerle Fack and Wolfgang Willems and Joost Winne Projective two-weight codes with small parameters and their corresponding graphs . . . . . . . . . . . . . . . . . 59--78 Peter Keevash and Cheng Yeaw Ku A random construction for permutation codes and the covering radius . . . . . 79--86 Vince Grolmusz Pairs of codes with prescribed Hamming distances and coincidences . . . . . . . 87--99 Stefka Bouyuklieva and Patric R. J. Östergård New constructions of optimal self-dual binary codes of length $54$ . . . . . . 101--109 K. T. Arasu and Ka Hin Leung and Siu Lun Ma and Ali Nabavi and D. K. Ray-Chaudhuri Circulant weighing matrices of weight $2^{2 t}$ . . . . . . . . . . . . . . . 111--123
Vikram Jha and Norman L. Johnson Subregular planes admitting elations . . 125--145 Marcelo Muniz Isometric embeddings of $\mathbb{Z}_p^k$ in the Hamming space $\mathbb{F}_p^N$ and $\mathbb{Z}_p^k$-linear codes . . . 147--152 Robert F. Bailey Uncoverings-by-bases for base-transitive permutation groups . . . . . . . . . . . 153--176 Zhenfu Cao and Gennian Ge and Ying Miao Combinatorial characterizations of one-coincidence frequency-hopping sequences . . . . . . . . . . . . . . . 177--184 Stefko Miklavic and Primoz Potocnik Distance-transitive dihedrants . . . . . 185--193 Carl Bracken and Gary McGuire and Harold Ward New quasi-symmetric designs constructed using mutually orthogonal Latin squares and Hadamard matrices . . . . . . . . . 195--198 C. Galindo and M. Sanchis Evaluation codes and plane valuations 199--219 Lihua Liu and Hao Shen Explicit constructions of separating hash families from algebraic curves over finite fields . . . . . . . . . . . . . 221--233
Steven T. Dougherty and T. Aaron Gulliver and John Wong Self-dual codes over $\mathbb{Z}_8$ and $\mathbb{Z}_9$ . . . . . . . . . . . . . 235--249 Takehiro Hasegawa and Shoichi Kondo and Hidekazu Kurusu A sequence of one-point codes from a tower of function fields . . . . . . . . 251--267 Jun Shen and Hao Shen Embeddings of resolvable group divisible designs with block size $3$ . . . . . . 269--298 Soonhak Kwon and Chang Hoon Kim and Chun Pyo Hong Sparse polynomials, redundant bases, Gauss periods, and efficient exponentiation of primitive elements for small characteristic finite fields . . . 299--306 Ali Miri and Monica Nevins and Terasan Niyomsataya Applications of representation theory to wireless communications . . . . . . . . 307--318 Carl Bracken New classes of self-complementary codes and quasi-symmetric designs . . . . . . 319--323 Pascal O. Vontobel and Ashwin Ganesan On universally decodable matrices for space-time coding . . . . . . . . . . . 325--342 Ferruh Özbudak and Zülfükar Saygi Some constructions of systematic authentication codes using Galois rings 343--357
Andrea Blunck and Hans Havlicek and Corrado Zanella Lifting of divisible designs . . . . . . 1--14 Chong-Dao Lee and Yaotsu Chang and Trieu-Kien Truong A result on the weight distributions of binary quadratic residue codes . . . . . 15--20 Peter Roelse The design of composite permutations with applications to DES-like S-boxes 21--42 Nevine Ebeid and M. Anwar Hasan On binary signed digit representations of integers . . . . . . . . . . . . . . 43--65 Simon Litsyn and Beniamin Mounits Improved lower bounds on sizes of single-error correcting codes . . . . . 67--72 Jon-Lark Kim and Keith E. Mellinger and Leo Storme Small weight codewords in LDPC codes defined by (dual) classical generalized quadrangles . . . . . . . . . . . . . . 73--92 Naoki Chigira and Masaaki Harada and Masaaki Kitazume Extremal self-dual codes of length $64$ through neighbors and covering radii . . 93--101 Antonio Cossidente and Giuseppe Marino Veronese embedding and two-character sets . . . . . . . . . . . . . . . . . . 103--107
Bessie C. Hu and Duncan S. Wong and Zhenfeng Zhang and Xiaotie Deng Certificateless signature: a new security model and an improved generic construction . . . . . . . . . . . . . . 109--126 Jürgen Bierbrauer A direct approach to linear programming bounds for codes and tms-nets . . . . . 127--143 Sanjeevani Gharge and Sharad Sane Quasi-affine symmetric designs . . . . . 145--166 Amir J. Salomon and Ofer Amrani Reed--Muller codes and Barnes--Wall lattices: Generalized multilevel constructions and representation over ${\rm GF}(2^q)$ . . . . . . . . . . . . 167--180 Wilfried Meidl and Ayineedi Venkateswarlu Remarks on the $k$-error linear complexity of $p^n$-periodic sequences 181--193 Maura Paterson Sliding-window dynamic frameproof codes 195--212 S. González and C. Martínez and I. F. Rúa Symplectic spread-based generalized Kerdock codes . . . . . . . . . . . . . 213--226 Dongvu Tonien and Reihaneh Safavi-Naini Construction of deletion correcting codes using generalized Reed--Solomon codes and their subcodes . . . . . . . . 227--237
Paulo S. L. M. Barreto and Steven D. Galbraith and Colm Ó'hÉigeartaigh and Michael Scott Efficient pairing computation on supersingular Abelian varieties . . . . 239--271 Taher Abualrub and Irfan Siap Cyclic codes over the rings $Z_2 + u Z_2$ and $Z_2 + u Z_2 + u^2 Z_2$ . . . . 273--287 Eimear Byrne and Marcus Greferath and Michael E. O'Sullivan The linear programming bound for codes over finite Frobenius rings . . . . . . 289--301 Valentina Pepe LDPC codes from the Hermitian curve . . 303--315 Maura Paterson Sequential and dynamic frameproof codes 317--326 Gerardo Vega and Jacques Wolfmann New classes of $2$-weight cyclic codes 327--334 Thomas Westerbäck Maximal partial packings of $Z_2^n$ with perfect codes . . . . . . . . . . . . . 335--355
Shane Kelly Constructions of intriguing sets of polar spaces from field reduction and derivation . . . . . . . . . . . . . . . 1--8 Fang-Wei Fu and Shu-Tao Xia The characterization of binary constant weight codes meeting the bound of Fu and Shen . . . . . . . . . . . . . . . . . . 9--20 Nikias De Feyter Classification of $(0,2)$-geometries embedded in ${\rm AG}(3,q)$ . . . . . . 21--32 Andrea Caggegi and Giovanni Falcone On $2-(n^2, 2 n, 2n-1)$ designs with three intersection numbers . . . . . . . 33--40 Sabine Giese and Ralph-Hardo Schulz Divisible designs with dual translation group . . . . . . . . . . . . . . . . . 41--45 Tetsuya Izu and Jun Kogure and Takeshi Koshiba and Takeshi Shimoyama Low-density attack revisited . . . . . . 47--59
Aggelos Kiayias and Moti Yung Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice . . . . . . . . . . . . 61--78 Jonathan Jedwab and Matthew G. Parker There are no Barker arrays having more than two dimensions . . . . . . . . . . 79--84 I. Gashkov and J. A. O. Ekberg and D. Taub A geometric approach to finding new lower bounds of $A(n, d, w)$ . . . . . . 85--91 Ji-Woong Jang and Jong-Seon No and Habong Chung Butson Hadamard matrices with partially cyclic core . . . . . . . . . . . . . . 93--101 John Arhin On the structure of $1$-designs with at most two block intersection numbers . . 103--114 Lijun Ji A construction for large sets of disjoint Kirkman triple systems . . . . 115--122 E. J. Cheon and T. Maruta On the minimum length of some linear codes . . . . . . . . . . . . . . . . . 123--135 Maria Bras-Amorós Algebraic-geometry codes, one-point codes, and evaluation codes . . . . . . 137--145 Bahattin Yildiz Weights modulo $p^e$ of linear codes over rings . . . . . . . . . . . . . . . 147--165 Wen-Ai Jackson and S. Murphy Projective aspects of the AES inversion 167--179
Dina Ghinelli and James Hirschfeld and Dieter Jungnickel Preface . . . . . . . . . . . . . . . . 1--2 J. A. Thas The uniqueness of $1$-systems of $W_5(q)$ satisfying the BLT-property, with $q$ odd . . . . . . . . . . . . . . 3--10 P. J. Cameron and A. Rudvalis A design and a geometry for the group ${\rm Fi}_{22}$ . . . . . . . . . . . . 11--14 Gary L. Ebert and Keith E. Mellinger Mixed partitions and related designs . . 15--23 Alan R. Prince A translation plane of order $19^2$ admitting ${\rm SL}(2,5)$, obtained by $12$-nest replacement . . . . . . . . . 25--30 Antonio Pasini A characterization of truncated projective geometries as flag-transitive ${\rm PG}^*.{\rm PG}$-geometries . . . . 31--38 Guglielmo Lunardon Simplectic spreads and finite semifields 39--48 Guobiao Weng and Weisheng Qiu and Zeying Wang and Qing Xiang Pseudo-Paley graphs and skew Hadamard difference sets from presemifields . . . 49--62 Simeon Ball and Michel Lavrauw On the Hughes--Kleinfeld and Knuth's semifields two-dimensional over a weak nucleus . . . . . . . . . . . . . . . . 63--67 M. Biliotti and V. Jha and N. L. Johnson and A. Montinaro Translation planes of order $q^2$ admitting a two-transitive orbit of length $q + 1$ on the line at infinity 69--86
Michael Dewar and Lucia Moura and Daniel Panario and Brett Stevens and Qiang Wang Division of trinomials by pentanomials and orthogonal arrays . . . . . . . . . 1--17 Francisco Rodríguez-Henríquez and Guillermo Morales-Luna and Nazar A. Saqib and Nareli Cruz-Cortés Parallel Itoh--Tsujii multiplicative inversion algorithm for a special class of trinomials . . . . . . . . . . . . . 19--37 Lijun Ji Constructions for large sets of $L$-intersecting Steiner triple systems 39--49 Morteza Esmaeili and Morteza Hivadi $G$-projectable and $\Lambda$-projectable binary linear block codes . . . . . . . . . . . . . . 51--64 Yu Xiong and Jun Ma and Hao Shen On optimal codes with $w$-identifiable parent property . . . . . . . . . . . . 65--90 Esa Antero Seuranen New lower bounds for multiple coverings 91--94 Susan G. Barwick and Wen-Ai Jackson A sequence approach to linear perfect hash families . . . . . . . . . . . . . 95--121 I. Landjev and L. Storme A weighted version of a result of Hamada on minihypers and on linear codes meeting the Griesmer bound . . . . . . . 123--138 Xiande Zhang and Gennian Ge Existence of $Z$-cyclic ${\rm 3PDTWh}(p)$ for Prime $p \equiv 1$ (mod $4$) . . . . . . . . . . . . . . . . . . 139--155
Gennian Ge and Rolf Rees and Nabil Shalaby Kirkman frames having hole type $h^u m^1$ for small $h$ . . . . . . . . . . . 157--184 Haitao Cao and Lijun Ji and Lie Zhu Constructions for generalized Steiner systems ${\rm GS}(3, 4, v, 2)$ . . . . . 185--197 Jaime Gutierrez and Álvar Ibeas Inferring sequences produced by a linear congruential generator on elliptic curves missing high-order bits . . . . . 199--212 Tsvetan Asamov and Nuh Aydin A search algorithm for linear codes: progressive dimension growth . . . . . . 213--217 E. Martínez-Moro and I. F. Rúa On repeated-root multivariable codes over a finite chain ring . . . . . . . . 219--227 Ron Shaw The $\psi$-associate $X^\#$ of a flat $X$ in ${\rm PG}(n, 2)$ . . . . . . . . 229--246 Jon-Lark Kim and Yoonjin Lee Construction of MDS self-dual codes over Galois rings . . . . . . . . . . . . . . 247--258 Csaba Mengyán On the number of pairwise non-isomorphic minimal blocking sets in ${\rm PG}(2, q)$ . . . . . . . . . . . . . . . . . . 259--267 Eimear Byrne and Marcus Greferath and Michael E. O'Sullivan Errata for ``The linear programming bound for codes over finite Frobenius rings'' . . . . . . . . . . . . . . . . 269--270
Nevine Maurice Ebeid and M. Anwar Hasan On $\tau$-adic representations of integers . . . . . . . . . . . . . . . . 271--296 San Ling and Ferruh Özbudak Constructions and bounds on linear error-block codes . . . . . . . . . . . 297--316 Ki Hyoung Ko and Jang Won Lee and Tony Thomas Towards generating secure keys for braid cryptography . . . . . . . . . . . . . . 317--333 Radka Russeva and Nikolay Yankov On binary self-dual codes of lengths $60$, $62$, $64$ and $66$ having an automorphism of order $9$ . . . . . . . 335--346 D. R. Stinson Generalized mix functions and orthogonal equitable rectangles . . . . . . . . . . 347--357 Cícero Carvalho and Takao Kato Codes from curves with total inflection points . . . . . . . . . . . . . . . . . 359--364 Gert Monstad Hana and Trygve Johnsen Scroll codes . . . . . . . . . . . . . . 365--377 Koji Momihara Necessary and sufficient conditions for tight equi-difference conflict-avoiding codes of weight three . . . . . . . . . 379--390 Jinhua Wang A new class of optimal $3$-splitting authentication codes . . . . . . . . . . 391--391
Jinhua Wang and Hao Shen Existence of $(v,K_{1(3)} \cup \{w^*\})$-PBDs and its applications . . 1--16 Vitaly Skachek and Ron M. Roth Probabilistic algorithm for finding roots of linearized polynomials . . . . 17--23 Veerle Fack and Szabolcs L. Fancsali and L. Storme and Geetrui Van de Voorde and Joost Winne Small weight codewords in the codes arising from Desarguesian projective planes . . . . . . . . . . . . . . . . . 25--43 Olof Heden On perfect $p$-ary codes of length $p + 1$ . . . . . . . . . . . . . . . . . . . 45--56 Wilfried Meidl Reducing the calculation of the linear complexity of $u 2^v$-periodic binary sequences to Games--Chan algorithm . . . 57--65 Weiming Zhang and Shiqu Li A coding problem in steganography . . . 67--81 James A. Davis and Laurent Poinsot $G$-Perfect nonlinear functions . . . . 83--96 Sosina Martirosyan and Tran van Trung Explicit constructions for perfect hash families . . . . . . . . . . . . . . . . 97--112 Cunsheng Ding and Tao Feng Codebooks from almost difference sets 113--126
Norman L. Johnson $m$th-Root subgeometry partitions . . . 127--136 Boris Skori\'c and Stefan Katzenbeisser and Mehmet U. Celik Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes . . . . . . 137--166 Vito Abatangelo and Bambina Larato Elliptic near-MDS codes over $\mathbb{F}_5$ . . . . . . . . . . . . . 167--174 Thomas Britz and Keisuke Shiromoto Designs from subcode supports of linear codes . . . . . . . . . . . . . . . . . 175--189 Gerzson Kéri The covering radius of extreme binary $2$-surjective codes . . . . . . . . . . 191--198 Alessandro Montinaro On the Ree Unital . . . . . . . . . . . 199--209 Jianxing Yin and Jie Yan and Chengmin Wang Generalized balanced tournament designs and related codes . . . . . . . . . . . 211--230 Antonio Cossidente and Nicola Durante and Giuseppe Marino and Tim Penttila and Alessandro Siciliano The geometry of some two-character sets 231--241
Aaron Potechin Maximal caps in ${\rm AG}(6, 3)$ . . . . 243--259 Giorgio Donati and Nicola Durante On the intersection of two subgeometries of ${\rm PG}(n, q)$ . . . . . . . . . . 261--267 Jürgen Bierbrauer and Gohar M. Kyureghyan Crooked binomials . . . . . . . . . . . 269--301 Maria Cristeta Cuaresma and Michael Giudici and Cheryl E. Praeger Homogeneous factorisations of Johnson graphs . . . . . . . . . . . . . . . . . 303--327 Berkant Ustaoglu Obtaining a secure and efficient key agreement protocol from (H)MQV and NAXOS 329--342 W. H. Holzmann and H. Kharaghani and B. Tayfeh-Rezaie Williamson matrices up to order $59$ . . 343--352 Nicholas Kolokotronis Cryptographic properties of nonlinear pseudorandom number generators . . . . . 353--363 John Polhill New negative Latin square type partial difference sets in nonelementary abelian $2$-groups and $3$-groups . . . . . . . 365--377
A. Blokhuis and J. W. P. Hirschfeld and D. Jungnickel and J. A. Thas Finite geometries . . . . . . . . . . . 1--2 S. De Winter Non-isomorphic semipartial geometries 3--9 Andrea Blunck and Hans Havlicek and Corrado Zanella Divisible designs from twisted dual numbers . . . . . . . . . . . . . . . . 11--20 J. De Beule and A. Klein and K. Metsch and L. Storme Partial ovoids and partial spreads in Hermitian polar spaces . . . . . . . . . 21--34 B. N. Cooperstein and B. De Bruyn The combinatorial properties of the hyperplanes of ${\rm DW}(5, q)$ arising from embedding . . . . . . . . . . . . . 35--51 A. De Wispelaere and H. Van Maldeghem Regular partitions of (weak) finite generalized polygons . . . . . . . . . . 53--73 Kris Coolsaet A $51$-dimensional embedding of the Ree--Tits generalized octagon . . . . . 75--97 Cheryl E. Praeger and Shenglin Zhou Classification of line-transitive point-imprimitive linear spaces with line size at most $12$ . . . . . . . . . 99--111 T. L. Alderson and A. A. Bruen Coprimitive sets and inextendable codes 113--124 Yves Edel Sequences in abelian groups $G$ of odd order without zero-sum subsequences of length $\exp(G)$ . . . . . . . . . . . . 125--134
Eimear Byrne and Marcus Greferath and Thomas Honold Ring geometries, two-weight codes, and strongly regular graphs . . . . . . . . 1--16 Dameng Deng and Rolf Rees and Hao Shen On the existence of nearly Kirkman triple systems with subsystems . . . . . 17--33 Landang Yuan and Qingde Kang Another construction for large sets of Kirkman triple systems . . . . . . . . . 35--42 Sunghyu Han and Jon-Lark Kim On self-dual codes over $\mathbb{F}_5$ 43--58 L. Ji $2$-idempotent $3$-quasigroups with a conjugate invariant subgroup consisting of a single cycle of length four . . . . 59--68 A. D. Blinco and S. I. El-Zanati and G. F. Seelinger and P. A. Sissokho and L. E. Spence and C. Vanden Eynden On vector space partitions and uniformly resolvable designs . . . . . . . . . . . 69--77 Oded Blayer and Tamir Tassa Improved versions of Tardos' fingerprinting scheme . . . . . . . . . 79--103 Koen Thas Note on the existence of translation nets . . . . . . . . . . . . . . . . . . 105--107
Cunsheng Ding and Tor Helleseth and Òyvind Ytrehus Preface . . . . . . . . . . . . . . . . 109--110 Zihui Liu and Wende Chen and Yuan Luo The relative generalized Hamming weight of linear $q$-ary codes and their subcodes . . . . . . . . . . . . . . . . 111--123 Shu-Tao Xia and Fang-Wei Fu Undetected error probability of $q$-ary constant weight codes . . . . . . . . . 125--140 Khmaies Ouahada and Theo G. Swart and Hendrik C. Ferreira and Ling Cheng Binary permutation sequences as subsets of Levenshtein codes, spectral null codes, run-length limited codes and constant weight codes . . . . . . . . . 141--154 Radinka Yorgova and Alfred Wassermann Binary self-dual codes with automorphisms of order $23$ . . . . . . 155--164 Gerzson Kéri and Patric R. J. Östergård On the minimum size of binary codes with length $2R + 4$ and covering radius $R$ 165--169 Ernst M. Gabidulin Attacks and counter-attacks on the GPT public key cryptosystem . . . . . . . . 171--177 Constanza Riera and Stéphane Jacob and Matthew G. Parker From graph states to two-graph states 179--206
A. J. van Zanten and Loeky Haryanto Sets of disjoint snakes based on a Reed--Muller code and covering the hypercube . . . . . . . . . . . . . . . 207--229 Michel Lavrauw and Leo Storme and Geertrui Van de Voorde On the code generated by the incidence matrix of points and hyperplanes in ${\rm PG}(n, q)$ and its dual . . . . . 231--245 Jong Yoon Hyun and Hyun Kwang Kim Maximum distance separable poset codes 247--261 Alan R. Prince Further translation planes of order $19^2$ admitting ${\rm SL}(2,5)$, obtained by nest replacement . . . . . . 263--267 Andreas Klein Attacks on the RC4 stream cipher . . . . 269--286 Hans Ludwig de Vries On orthogonal resolutions of the classical Steiner quadruple system ${\rm SQS}(16)$ . . . . . . . . . . . . . . . 287--292 Zheng Gong and Xuejia Lai and Kefei Chen A synthetic indifferentiability analysis of some block-cipher-based hash functions . . . . . . . . . . . . . . . 293--305 Ulrich Dempwolff and William M. Kantor Distorting symmetric designs . . . . . . 307--322 Olav Geil On the second weight of generalized Reed--Muller codes . . . . . . . . . . . 323--330 Jianmin Wang Some combinatorial constructions for optimal perfect deletion-correcting codes . . . . . . . . . . . . . . . . . 331--347
Pascale Charpin and Tor Helleseth Editorial: In memory of Hans Dobbertin 1--2 Hans Dobbertin and Gregor Leander Bent functions embedded into the recursive framework of $\mathbb{Z}$-bent functions . . . . . . . . . . . . . . . 3--22 J. F. Dillon More DD difference sets . . . . . . . . 23--32 Harald Niederreiter and Ayineedi Venkateswarlu Periodic multisequences with large error linear complexity . . . . . . . . . . . 33--45 Igor Semaev On solving sparse algebraic equations over finite fields . . . . . . . . . . . 47--60 Ferruh Özbudak and Zülfükar Saygi Systematic authentication codes using additive polynomials . . . . . . . . . . 61--77 K. J. Horadam and D. G. Farmer Bundles, presemifields and nonlinear functions . . . . . . . . . . . . . . . 79--94 Sumanta Sarkar and Subhamoy Maitra Idempotents in the neighbourhood of Patterson--Wiedemann functions having Walsh spectra zeros . . . . . . . . . . 95--103 Ernst M. Gabidulin and Nina I. Pilipchuk Error and erasure correcting algorithms for rank codes . . . . . . . . . . . . . 105--122 Goutam Paul and Siddheshwar Rathi and Subhamoy Maitra On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key . . . . . 123--134 Jon-Lark Kim and Patrick Solé Skew Hadamard designs and their codes 135--145 Håvard Raddum and Igor Semaev Solving Multiple Right Hand Sides linear equations . . . . . . . . . . . . . . . 147--160 Lars Eirik Danielsen and Matthew G. Parker Edge local complementation and equivalence of binary linear codes . . . 161--170 Reza Rezaeian Farashahi and Ruud Pellikaan and Andrey Sidorenko Extractors for binary elliptic curves 171--186 J. De Beule and K. Metsch and L. Storme Characterization results on arbitrary non-weighted minihypers and on linear codes meeting the Griesmer bound . . . . 187--197 Maria Christopoulou and Theo Garefalakis and Daniel Panario and David Thomson The trace of an optimal normal element and low complexity normal bases . . . . 199--215 Mariusz Czapski and Maciej Nikodem Error detection and error correction procedures for the Advanced Encryption Standard . . . . . . . . . . . . . . . . 217--232 Haifeng Qian and Yuan Zhou and Zhibin Li and Zecheng Wang and Bing Zhang Efficient public key encryption with smallest ciphertext expansion from factoring . . . . . . . . . . . . . . . 233--249 George Petrides and Johannes Mykkeltveit Composition of recursions and nonlinear complexity of periodic binary sequences 251--264 Danyo Danev and Stefan Dodunekov A family of ternary quasi-perfect BCH codes . . . . . . . . . . . . . . . . . 265--271 Marcus Brinkmann and Gregor Leander On the classification of APN functions up to dimension five . . . . . . . . . . 273--288 Ryo Nojima and Hideki Imai and Kazukuni Kobara and Kirill Morozov Semantic security for the McEliece cryptosystem without random oracles . . 289--305 Rogério M. Siqueira and Sueli I. R. Costa Flat tori, lattices and bounds for commutative group codes . . . . . . . . 307--321 Rafaël Fourquet and Cédric Tavernier An improved list decoding algorithm for the second order Reed--Muller codes and its applications . . . . . . . . . . . . 323--340 Christian Bey and Gohar M. Kyureghyan On Boolean functions with the sum of every two of them being bent . . . . . . 341--346 Kseniya Garaschuk and Petr Lisonek On binary Kloosterman sums divisible by $3$ . . . . . . . . . . . . . . . . . . 347--357
Masaaki Homma and Seon Jeong Kim The second generalized Hamming weight for two-point codes on a Hermitian curve 1--40 J. Schillewaert and J. A. Thas Characterizations of Hermitian varieties by intersection numbers . . . . . . . . 41--60 Jie Yan and Jianxing Yin A class of optimal constant composition codes from GDRPs . . . . . . . . . . . . 61--76 Steven T. Dougherty and Jon-Lark Kim and Hamid Kulosman MDS codes over finite principal ideal rings . . . . . . . . . . . . . . . . . 77--92 Guobiao Weng and Lei Hu Some results on skew Hadamard difference sets . . . . . . . . . . . . . . . . . . 93--105 Weidong Guo and Gennian Ge The existence of generalized mix functions . . . . . . . . . . . . . . . 107--113 Jean-Sébastien Coron A variant of Boneh--Franklin IBE with a tight reduction in the random oracle model . . . . . . . . . . . . . . . . . 115--133 Frédéric A. B. Edoukou Codes defined by forms of degree $2$ on non-degenerate Hermitian varieties in $\mathbb{P}^4 (\mathbb{F}_q) \mathbb{P}^4(\mathbb{F}_q)$ . . . . . . 135--146
Young Ho Park Modular independence and generator matrices for codes over $\mathbb{Z}_m$ 147--162 Shu-Tao Xia and Fang-Wei Fu Johnson type bounds on constant dimension codes . . . . . . . . . . . . 163--172 Jong Yoon Hyun Generalized MacWilliams identities and their applications to perfect binary codes . . . . . . . . . . . . . . . . . 173--185 Jan De Beule and Patrick Govaerts and Anja Hallez and Leo Storme Tight sets, weighted $m$-covers, weighted $m$-ovoids, and minihypers . . 187--201 Wenqing Fu and Tao Feng On self-orthogonal group ring codes . . 203--214 Feng Liu and Chuan Kun Wu and Xi Jun Lin The alignment problem of visual cryptography schemes . . . . . . . . . . 215--227 Horst Trinker A simple derivation of the MacWilliams identity for linear ordered codes and orthogonal arrays . . . . . . . . . . . 229--234 Jürgen Bierbrauer A family of crooked functions . . . . . 235--241 Keqin Feng and Qunying Liao and Jing Yang Maximal values of generalized algebraic immunity . . . . . . . . . . . . . . . . 243--252 Yiwei Huang and Bernhard Schmidt Uniqueness of some cyclic projective planes . . . . . . . . . . . . . . . . . 253--266
Lionel Chaussade and Pierre Loidreau and Felix Ulmer Skew codes of prescribed distance or rank . . . . . . . . . . . . . . . . . . 267--284 Yutaka Hiramine A two-to-one map and abelian affine difference sets . . . . . . . . . . . . 285--290 Kiyoshi Nagata and Fidel Nemenzo and Hideo Wada The number of self-dual codes over $Z_{p^3}$ . . . . . . . . . . . . . . . 291--303 Steven D. Galbraith and Xibin Lin Computing pairings using $x$-coordinates only . . . . . . . . . . . . . . . . . . 305--324 Gilles Piret and François-Xavier Standaert Provable security of block ciphers against linear cryptanalysis: a mission impossible? An experimental review of the practical security approach and the key equivalence hypothesis in linear cryptanalysis . . . . . . . . . . . . . 325--338 Yang Li and Lijun Ji and Jianxing Yin Covering arrays of strength $3$ and $4$ from holey difference matrices . . . . . 339--350 D. Panario and D. Thomson Efficient $p$th root computations in finite fields of characteristic $p$ . . 351--358 Alexander A. Davydov and Stefano Marcugini and Fernanda Pambianco Complete $(q^2 + q + 8)/2$-caps in the spaces $PG(3, q ), q \equiv 2 (mod 3)$ an odd prime, and a complete $20$-cap in $PG(3, 5)$ . . . . . . . . . . . . . . . 359--372
Tian Tian and Wen-Feng Qi A note on the crosscorrelation of maximal length FCSR sequences . . . . . 1--8 E. J. Cheon A class of optimal linear codes of length one above the Griesmer bound . . 9--20 Yu. I. Lyubich On tight projective designs . . . . . . 21--31 Wilfried Meidl Remarks on a cyclotomic sequence . . . . 33--43 Krzysztof Petelczyc and Ma\lgorzata Prazmowska $103$-configurations and projective realizability of multiplied configurations . . . . . . . . . . . . . 45--54 Steven T. Dougherty and Hongwei Liu Independence of vectors in codes over rings . . . . . . . . . . . . . . . . . 55--68 Sunghyu Han and Jon-Lark Kim The nonexistence of near-extremal formally self-dual codes . . . . . . . . 69--77 R. Julian R. Abel and Norman J. Finizio and Malcolm Greig and Luis B. Morales Existence of $(2, 8)$GWhD($v$) and $(4, 8)$GWhD($v$) with $v \equiv 0, 1 \pmod 8$ . . . . . . . . . . . . . . . . . . . 79--97 Dimitrios Poulakis A variant of Digital Signature Algorithm 99--104
Iliya Bouyukliev and Veerle Fack and Joost Winne $2-(31,15,7)$, $2-(35,17,8)$ and $2-(36,15,6)$ designs with automorphisms of odd prime order, and their related Hadamard matrices and codes . . . . . . 105--122 Antonio Cossidente Some constructions on the Hermitian surface . . . . . . . . . . . . . . . . 123--129 Dieter Jungnickel and Vladimir D. Tonchev Polarities, quasi-symmetric designs, and Hamada's conjecture . . . . . . . . . . 131--140 Ron Shaw and Neil A. Gordon The cubic Segre variety in PG$(5, 2)$ 141--156 John Bamberg and Frank De Clerck and Nicola Durante A hemisystem of a nonclassical generalised quadrangle . . . . . . . . . 157--165 Michael J. Collins Upper bounds for parent-identifying set systems . . . . . . . . . . . . . . . . 167--173 Tao Feng Difference sets with $n = 5 p^r$ . . . . 175--194 Jooyoung Lee and Yongjin Yeom Efficient RFID authentication protocols based on pseudorandom sequence generators . . . . . . . . . . . . . . . 195--210 M. R. Darafsheh and A. Iranmanesh and R. Kahkeshani Some designs and codes invariant under the groups $S_9$ and A$_8$ . . . . . . . 211--223
H. Cao and J. Dinitz and D. Kreher and D. R. Stinson and R. Wei On orthogonal generalized equitable rectangles . . . . . . . . . . . . . . . 225--230 Derek H. Smith and Richard P. Ward and Stephanie Perkins Gold codes, Hadamard partitions and the security of CDMA systems . . . . . . . . 231--243 Sarah Spence Adams and Matthew Crawford and Caitlin Greeley and Bryce Lee and Mathav Kishore Murugan Multilevel and multidimensional Hadamard matrices . . . . . . . . . . . . . . . . 245--252 Koji Momihara Strong difference families, difference covers, and their applications for relative difference families . . . . . . 253--273 Silvia Boumova and Peter Boyvalenkov and Hristina Kulina and Maya Stoyanova Polynomial techniques for investigation of spherical designs . . . . . . . . . . 275--288 José Joaquín Bernal and Ángel del Río and Juan Jacobo Simón An intrinsical description of group codes . . . . . . . . . . . . . . . . . 289--300 Jessica F. Burkhart and Neil J. Calkin and Shuhong Gao and Justine C. Hyde-Volpe and Kevin James and others Finite field elements of high order arising from modular curves . . . . . . 301--314 Thomas Martin and Keith M. Martin and Peter Wild Establishing the broadcast efficiency of the Subset Difference Revocation Scheme 315--334
Jaume Martí-Farré and Carles Padró Ideal secret sharing schemes whose minimal qualified subsets have at most three participants . . . . . . . . . . . 1--14 Lein Harn and Changlu Lin Detection and identification of cheaters in $(t, n)$ secret sharing scheme . . . 15--24 Charles J. Colbourn and Alan C. H. Ling Linear hash families and forbidden configurations . . . . . . . . . . . . . 25--55 Markus Grassl and T. Aaron Gulliver On circulant self-dual codes over small fields . . . . . . . . . . . . . . . . . 57--81 Yu-Ru Liu and Craig V. Spencer A generalization of Meshulam's theorem on subsets of finite abelian groups with no $3$-term arithmetic progression . . . 83--91 Darryn Bryant and Judith Egan and Barbara Maenhaut and Ian M. Wanless Indivisible plexes in latin squares . . 93--105 Bin Wen and Jianmin Wang and Jianxing Yin Optimal grid holey packings with block size $3$ and $4$ . . . . . . . . . . . . 107--124 Masaaki Harada and Akihiro Munemasa There exists no self-dual $[24, 12, 10]$ code over $\mathbb{F}_5$ . . . . . . . . 125--127
Tamir Tassa and Jorge L. Villar On proper secrets, $(t, k)$-bases and linear codes . . . . . . . . . . . . . . 129--154 Bader AlBdaiwi and Peter Horak and Lorenzo Milazzo Enumerating and decoding perfect linear Lee codes . . . . . . . . . . . . . . . 155--162 John Polhill Paley type partial difference sets in non $p$-groups . . . . . . . . . . . . . 163--169 E. J. Cheon and T. Maruta A new extension theorem for $3$-weight modulo $q$ linear codes over $\mathbb{F}_q$ . . . . . . . . . . . . . 171--183 Clemens Heuberger and James A. Muir Unbalanced digit sets and the closest choice strategy for minimal weight integer representations . . . . . . . . 185--208 Paul Dorbec and Sylvain Gravier and Iiro Honkala and Michel Mollard Weighted codes in Lee metrics . . . . . 209--218 Kenneth G. Paterson and Sriramkrishnan Srinivasan On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups . . . . . . . . . . . . . . . . . 219--241 Alan R. Prince Pure partial planes of order $6$ with $25$ lines . . . . . . . . . . . . . . . 243--247
Tian Tian and Wen-Feng Qi Linearity properties of binary FCSR sequences . . . . . . . . . . . . . . . 249--262 Brian Curtin and Ibtisam Daqqa The subconstituent algebra of strongly regular graphs associated with a Latin square . . . . . . . . . . . . . . . . . 263--274 Miwako Mishima and Hung-Lin Fu and Shoichi Uruno Optimal conflict-avoiding codes of length $n \equiv 0 \pmod 16$ and weight $3$ . . . . . . . . . . . . . . . . . . 275--291 A. Caranti and Francesca Dalla Volta and M. Sala An application of the O'Nan--Scott theorem to the group generated by the round functions of an AES-like cipher 293--301 Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu Further properties of several classes of Boolean functions with optimum algebraic immunity . . . . . . . . . . . . . . . . 303--338 Koji Nuida and Satoshi Fujitsu and Manabu Hagiwara and Takashi Kitagawa and Hajime Watanabe and others An improvement of discrete Tardos fingerprinting codes . . . . . . . . . . 339--362 Jon-Lark Kim and Xiaoyu Liu A generalized Gleason--Pierce--Ward theorem . . . . . . . . . . . . . . . . 363--380 Dustin Moody The Diffie--Hellman problem and generalization of Verheul's theorem . . 381--390
Robert S. Coulter and Todd Gutekunst Special subsets of difference sets with particular emphasis on skew Hadamard difference sets . . . . . . . . . . . . 1--12 Aidan Roy and A. J. Scott Unitary designs and codes . . . . . . . 13--31 Siman Yang and Lulu Qi On improved asymptotic bounds for codes from global function fields . . . . . . 33--43 Andrzej Owsiejczuk and Ma\lgorzata Prazmowska Combinatorial generalizations of generalized quadrangles of order $(2, 2)$ . . . . . . . . . . . . . . . . . . 45--57 T. L. Alderson and András Gács On the maximality of linear codes . . . 59--68
Olof Heden Necessary and sufficient conditions for the existence of a class of partitions of a finite vector space . . . . . . . . 69--73 Ramakanth Kavuluru Characterization of $2^n$-periodic binary sequences with fixed $2$-error or $3$-error linear complexity . . . . . . 75--97 Cícero Carvalho and Ercílio Silva On algebras admitting a complete set of near weights, evaluation codes, and Goppa codes . . . . . . . . . . . . . . 99--110 Maria Bras-Amorós On numerical semigroups and the redundancy of improved codes correcting generic errors . . . . . . . . . . . . . 111--118 Simeon Ball and Szabolcs L. Fancsali Multiple blocking sets in finite projective spaces and improvements to the Griesmer bound for linear codes . . 119--136
Xiaohu Tang and Tor Helleseth and Pingzhi Fan A new optimal quaternary sequence family of length $2(2^n - 1)$ obtained from the orthogonal transformation of Families $\mathcal{B}$ and $\mathcal{C}$ . . . . 137--148 Michael J. Mossinghoff Wieferich pairs and Barker sequences . . 149--163 Stefania Fanali and Massimo Giulietti On maximal curves with Frobenius dimension $3$ . . . . . . . . . . . . . 165--174 Alexandre Pinto and André Souto and Armando Matos and Luís Antunes Commitment and authentication systems 175--193 László Csirmaz An impossibility result on graph secret sharing . . . . . . . . . . . . . . . . 195--209
Antonio Cossidente The classical $1$-system of $Q^-(7, q )$ and two-character sets . . . . . . . . . 1--9 Zihui Liu and Wende Chen Notes on the value function . . . . . . 11--19 Guoxin Zuo and Mingyuan Xia A special class of $T$-matrices . . . . 21--28 Françoise Levy-dit-Vehel and Ludovic Perret Security analysis of word problem-based cryptosystems . . . . . . . . . . . . . 29--41 Jianmin Wang and Xiuling Shan and Jianxing Yin On constructions for optimal two-dimensional optical orthogonal codes 43--60 Bahattin Yildiz and Suat Karadeniz Linear codes over $\mathbb{F}_2 + u \mathbb{F}_2 + v \mathbb{F}_2 + u v \mathbb{F}_2$ . . . . . . . . . . . . . 61--81 Reza Rezaeian Farashahi and Igor E. Shparlinski On the number of distinct elliptic curves in some families . . . . . . . . 83--99
S. El-Zanati and H. Jordon and G. Seelinger and P. Sissokho and L. Spence The maximum size of a partial 3-spread in a finite vector space over GF$(2)$ 101--107 Sophie Huczynska Equidistant frequency permutation arrays and related constant composition codes 109--120 Changshe Ma and Jian Weng and Yingjiu Li and Robert Deng Efficient discrete logarithm based multi-signature scheme in the plain public key model . . . . . . . . . . . . 121--133 Ivan Landjev and Leo Storme A study of $(x(q + 1), x; 2, q)$-minihypers . . . . . . . . . . . . . 135--147 Maheshanand Bhaintwal and Siri Krishan Wasan Generalized Reed--Muller codes over $\mathbb{Z}_q$ . . . . . . . . . . . . . 149--166 J. Borges and C. Fernández-Córdoba and J. Pujol and J. Rif\`a and M. Villanueva $\mathbb{Z}_2 \mathbb{Z}_4$-linear codes: generator matrices and duality 167--179 Nathan Drake and Gretchen L. Matthews Parameter choices and a better bound on the list size in the Guruswami--Sudan algorithm for algebraic geometry codes 181--187
Jürgen Bierbrauer New semifields, PN and APN functions . . 189--200 Dragomir Z. \Dbarokovi\'c A new Yang number and consequences . . . 201--204 Masayuki Abe and Yang Cui and Hideki Imai and Eike Kiltz Efficient hybrid encryption from ID-based encryption . . . . . . . . . . 205--240 Krzysztof Petelczyc and Ma\lgorzata Prazmowska Twisted Fano spaces and their classification, linear completions of systems of triangle perspectives . . . . 241--251 Alexander A. Davydov and Patric R. J. Östergård Linear codes with covering radius $3$ 253--271 J. Schillewaert and L. Storme and J. A. Thas Minimal codewords in Reed--Muller codes 273--286 Peter Vandendriessche Some low-density parity-check codes derived from finite geometries . . . . . 287--297
Junling Zhou and Yanxun Chang New results on large sets of Kirkman triple systems . . . . . . . . . . . . . 1--7 Norbert Knarr and Markus Stroppel Polarities and unitals in the Coulter--Matthews planes . . . . . . . . 9--18 Mausumi Bose and Rahul Mukerjee Optimal $(k, n)$ visual cryptographic schemes for general $k$ . . . . . . . . 19--35 Antonio Maschietti The group fixing a completely regular line-oval . . . . . . . . . . . . . . . 37--43 Hongsong Shi and Shaoquan Jiang and Zhiguang Qin More efficient DDH pseudorandom generators . . . . . . . . . . . . . . . 45--64 Tian Tian and Wen-Feng Qi Expected values for the rational complexity of finite binary sequences 65--79 Xiande Zhang and Gennian Ge Existence of resolvable $H$-designs with group sizes $2$, $3$, $4$ and $6$ . . . 81--101
Ronald C. Mullin and Rainer Steinwandt Special issue dedicated to Spyros Magliveras on the occasion of his 70th birthday . . . . . . . . . . . . . . . . 103--105 C. Rößing and L. Storme A spectrum result on minimal blocking sets with respect to the planes of $PG(3, q)$, $q$ odd . . . . . . . . . . 107--119 A. De Wispelaere and J. A. Thas and H. Van Maldeghem A characterization of the Grassmann embedding of $H(q)$, with $q$ even . . . 121--130 Dieter Jungnickel and Vladimir D. Tonchev The number of designs with geometric parameters grows exponentially . . . . . 131--140 Sanjit Chatterjee and Darrel Hankerson and Edward Knapp and Alfred Menezes Comparing two pairing-based aggregate signature schemes . . . . . . . . . . . 141--167 Atefeh Mashatan and Douglas R. Stinson Practical unconditionally secure two-channel message authentication . . . 169--188 María Isabel González Vasco and Angel L. Pérez del Pozo and Pedro Taborda Duarte A note on the security of MST$_3$ . . . 189--200 Charles J. Colbourn Covering arrays from cyclotomy . . . . . 201--219 M. Abreu and C. Balbuena and D. Labbate Adjacency matrices of polarity graphs and of other $C_4$-free graphs of large size . . . . . . . . . . . . . . . . . . 221--233 Michael Huber Block-transitive designs in affine spaces . . . . . . . . . . . . . . . . . 235--242 Nidhi Singhi and Nikhil Singhi and Spyros Magliveras Minimal logarithmic signatures for finite groups of Lie type . . . . . . . 243--260 R. D. Baker and G. L. Ebert and K. L. Wantz Enumeration of orthogonal Buekenhout unitals . . . . . . . . . . . . . . . . 261--283 Gábor Korchmáros and Nicola Pace Infinite family of large complete arcs in PG$(2, q^n)$, with $q$ odd and $n > 1$ odd . . . . . . . . . . . . . . . . . . 285--296 N. A. Newman and C. A. Rodger Enclosings of $\lambda$-fold 4-cycle systems . . . . . . . . . . . . . . . . 297--310
Marco Buratti and Anita Pasotti Further progress on difference families with block size $4$ or $5$ . . . . . . . 1--20 Yutaka Hiramine Modified generalized Hadamard matrices and constructions for transversal designs . . . . . . . . . . . . . . . . 21--33 Lev Glebsky and Igor E. Shparlinski Short cycles in repeated exponentiation modulo a prime . . . . . . . . . . . . . 35--42 Cristina Fernández-Córdoba and Jaume Pujol and Merc\`e Villanueva $\mathbb{Z}_2 \mathbb{Z}_4$-linear codes: rank and kernel . . . . . . . . . 43--59 Eugenia O'Reilly-Regueiro Reduction for primitive flag-transitive $(v, k, 4)$-symmetric designs . . . . . 61--63 Monica Nevins and Camelia KarimianPour and Ali Miri NTRU over rings beyond $\mathbb{Z}$ . . 65--78 Ka Hin Leung and Siu Lun Ma and Bernhard Schmidt On Lander's conjecture for difference sets whose order is a power of $2$ or $3$ . . . . . . . . . . . . . . . . . . 79--84
Jan De Beule and Yves Edel and Emilia Käsper and Andreas Klein and Svetla Nikova and others Galois geometries and applications . . . 85--86 Simeon Ball and Jan De Beule and Leo Storme and Peter Sziklai and Tamás Sz'onyi In memoriam, András Gács . . . . . . . . . 87--88 M. Lavrauw and G. Van de Voorde On linear sets on a projective line . . 89--104 Antonio Cossidente and Oliver H. King Some two-character sets . . . . . . . . 105--113 G. Marino and O. Polverino Ovoidal blocking sets and maximal partial ovoids of Hermitian varieties 115--130 Stefania Fanali and Massimo Giulietti On some open problems on maximal curves 131--139 Paulo Barreto and Ventzislav Nikov and Svetla Nikova and Vincent Rijmen and Elmar Tischhauser Whirlwind: a new cryptographic hash function . . . . . . . . . . . . . . . . 141--162 Yves Edel and Ivan Landjev On multiple caps in finite projective spaces . . . . . . . . . . . . . . . . . 163--175 Angela Aguglia and Gábor Korchmáros Multiple blocking sets and multisets in Desarguesian planes . . . . . . . . . . 177--181 Bart De Bruyn On hyperovals of polar spaces . . . . . 183--195 Satoshi Yoshiara Notes on APN functions, semibiplanes and dimensional dual hyperovals . . . . . . 197--218 F. A. B. Edoukou and A. Hallez and F. Rodier and L. Storme The small weight codewords of the functional codes associated to non-singular Hermitian varieties . . . . 219--233 Nóra V. Harrach and Klaus Metsch Small point sets of $PG(n, q^3)$ intersecting each $k$-subspace in $1 \bmod q$ points . . . . . . . . . . . . 235--248
Kenneth W. Shum and Wing Shing Wong A tight asymptotic bound on the size of constant-weight conflict-avoiding codes 1--14 John Fuelberth and Athula Gunawardena and C. David Shaffer On incidence structures of nonsingular points and hyperbolic lines of ovoids in finite orthogonal spaces . . . . . . . . 15--33 Yves Edel On quadratic APN functions and dimensional dual hyperovals . . . . . . 35--44 Ernst Schuster and Gennian Ge On uniformly resolvable designs with block sizes $3$ and $4$ . . . . . . . . 45--69 Amin Sakzad and Mohammad-Reza Sadeghi and Daniel Panario Codes with girth $8$ Tanner graph representation . . . . . . . . . . . . . 71--81 Zhengjun Zhao and Xiwang Cao A note on the reducibility of binary affine polynomials . . . . . . . . . . . 83--90 H. B. Walikar and B. D. Acharya and Shailaja S. Shirkol Designs associated with maximum independent sets of a graph . . . . . . 91--105 Tohru Nakashima AG codes from vector bundles . . . . . . 107--115
Shenglin Zhou and Huili Dong Alternating groups and flag-transitive triplanes . . . . . . . . . . . . . . . 117--126 Vladimir Blinovsky and Uri Erez and Simon Litsyn Weight distribution moments of random linear/coset codes . . . . . . . . . . . 127--138 Gregory M. Zaverucha and Douglas R. Stinson Anonymity in shared symmetric key primitives . . . . . . . . . . . . . . . 139--160 C. Fernández-Córdoba and K. T. Phelps On the minimum distance graph of an extended Preparata code . . . . . . . . 161--168 Eimear Byrne and Marcus Greferath and Axel Kohnert and Vitaly Skachek New bounds for codes over finite Frobenius rings . . . . . . . . . . . . 169--179 Denis S. Krotov On the binary codes with parameters of doubly-shortened 1-perfect codes . . . . 181--194 Seungkook Park Minimum distance of Hermitian two-point codes . . . . . . . . . . . . . . . . . 195--213 Zhengchun Zhou and Xiaohu Tang Optimal and perfect difference systems of sets from $q$-ary sequences with difference-balanced property . . . . . . 215--223
Xiande Zhang and Gennian Ge $H$-designs with the properties of resolvability or $(1, 2)$-resolvability 225--256 E. Pasalic and P. Charpin Some results concerning cryptographically significant mappings over GF$(2^n)$ . . . . . . . . . . . . . 257--269 Chun-peng Wang and Xiao-song Chen On extended algebraic immunity . . . . . 271--281 Panagiotis Rizomiliotis On the security of the Feng--Liao--Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks 283--292 Jin Hong The cost of false alarms in Hellman and rainbow tradeoffs . . . . . . . . . . . 293--327 Hyun Jin Kim Self-dual codes with automorphism of order $3$ having $8$ cycles . . . . . . 329--346 Giorgio Donati and Nicola Durante On the intersection of a Hermitian curve with a conic . . . . . . . . . . . . . . 347--360 Rasha Shaheen and Arne Winterhof Permutations of finite fields for check digit systems . . . . . . . . . . . . . 361--371 Ulrich Dempwolff and Timo Neumann Geometric and design-theoretic aspects of semibent functions I . . . . . . . . 373--381 R. J. R. Abel and F. E. Bennett Existence of directed BIBDs with block size $7$ and related perfect $5$-deletion-correcting codes of length $7$ . . . . . . . . . . . . . . . . . . 383--397
Xiaoyu Liu An equivalence of Ward's bound and its application . . . . . . . . . . . . . . 1--9 Tamir Tassa Generalized oblivious transfer by secret sharing . . . . . . . . . . . . . . . . 11--21 Jie Cui and Junying Pei Quaternary 1-generator quasi-cyclic codes . . . . . . . . . . . . . . . . . 23--33 Chang-An Zhao and Dongqing Xie and Fangguo Zhang and Jingwei Zhang and Bing-Long Chen Computing bilinear pairings on elliptic curves with automorphisms . . . . . . . 35--44 Aaram Yun and Je Hong Park and Jooyoung Lee On Lai--Massey and quasi-Feistel ciphers 45--72 Padraig Ó Catháin and Marc Röder The cocyclic Hadamard matrices of order less than $40$ . . . . . . . . . . . . . 73--88 Marco Buratti and Koji Momihara and Anita Pasotti New results on optimal $(v, 4, 2, 1)$ optical orthogonal codes . . . . . . . . 89--109
Rajendra M. Pawale Quasi-symmetric designs with the difference of block intersection numbers two . . . . . . . . . . . . . . . . . . 111--121 Sudhir R. Ghorpade and Sartaj Ul Hasan and Meena Kumari Primitive polynomials, Singer cycles and word-oriented linear feedback shift registers . . . . . . . . . . . . . . . 123--134 Jianguo Lei and Cuiling Fan Optimal difference systems of sets and partition-type cyclic difference packings . . . . . . . . . . . . . . . . 135--153 David G. Glynn An invariant for matrices and sets of points in prime characteristic . . . . . 155--172 Roberto Avanzi and Clemens Heuberger and Helmut Prodinger Redundant $\tau$-adic expansions I: non-adjacent digit sets and their applications to scalar multiplication 173--202 Koichi Betsumiya and Masaaki Harada and Hiroshi Kimura Hadamard matrices of order $32$ and extremal ternary self-dual codes . . . . 203--214 David G. Glynn A condition for arcs and MDS codes . . . 215--218 Dimitrios Poulakis Erratum to: A Variant of Digital Signature Algorithm . . . . . . . . . . 219--219
Bahattin Yildiz and Suat Karadeniz Cyclic codes over $F_2 + u F_2 + v F_2 + u v F_2$ . . . . . . . . . . . . . . . . 221--234 Jong Hwan Park Inner-product encryption under standard assumptions . . . . . . . . . . . . . . 235--257 Yongqiang Li and Mingsheng Wang On EA-equivalence of certain permutations to power mappings . . . . . 259--269 Palash Sarkar A trade-off between collision probability and key size in universal hashing using polynomials . . . . . . . 271--278 Jianqin Zhou On the $k$-error linear complexity of sequences with period $2 p^n$ over $\mathrm{GF}(q)$ . . . . . . . . . . . . 279--296 Kwangsu Lee and Dong Hoon Lee Improved hidden vector encryption with short ciphertexts and tokens . . . . . . 297--319 Hui Zhang and Gennian Ge Completely reducible super-simple designs with block size four and related super-simple packings . . . . . . . . . 321--346
Matthew Geoffrey Parker and Sasha Kholosha and Pascale Charpin and Eirik Rosnes Editorial . . . . . . . . . . . . . . . 1--1 Céline Blondeau and Beno\^\it Gérard and Jean-Pierre Tillich Accurate estimates of the data complexity and success probability for various cryptanalyses . . . . . . . . . 3--34 Andrey Bogdanov On unbalanced Feistel networks with contracting MDS diffusion . . . . . . . 35--58 Nina Brandstätter and Gottlieb Pirsic and Arne Winterhof Correlation of the two-prime Sidel'nikov sequence . . . . . . . . . . . . . . . . 59--68 Lilya Budaghyan and Claude Carlet CCZ-equivalence of bent vectorial functions and related constructions . . 69--87 Claude Carlet Relating three nonlinearity parameters of vectorial functions and building APN functions from bent functions . . . . . 89--109 Danyo Danev and Stefan Dodunekov and Diana Radkova A family of constacyclic ternary quasi-perfect codes with covering radius $3$ . . . . . . . . . . . . . . . . . . 111--118 Lars Eirik Danielsen and Matthew G. Parker Directed graph representation of half-rate additive codes over $\mathrm{GF}(4)$ . . . . . . . . . . . . 119--130 Richard G. Gibson and Jonathan Jedwab Quaternary Golay sequence pairs I: even length . . . . . . . . . . . . . . . . . 131--146 Richard G. Gibson and Jonathan Jedwab Quaternary Golay sequence pairs II: odd length . . . . . . . . . . . . . . . . . 147--157 David G. Harris Critique of the related-key attack concept . . . . . . . . . . . . . . . . 159--168 Marc Joye How (Not) to design strong-RSA signatures . . . . . . . . . . . . . . . 169--182 Torleiv Klòve Lower bounds on the size of spheres of permutations under the Chebychev distance . . . . . . . . . . . . . . . . 183--191 Philippe Langevin and Gregor Leander Counting all bent functions in dimension eight $99270589265934370305785861242880$ [$\approx 2^{106}$] . . . . . . . . . . 193--205 Gregor Leander and François Rodier Bounds on the degree of APN polynomials: the case of $x^{-1} + g(x)$ . . . . . . 207--222 Petr Lisonek and Marko Moisio On zeros of Kloosterman sums . . . . . . 223--230 Subhamoy Maitra and Goutam Paul and Shashwat Raizada and Subhabrata Sen and Rudradev Sengupta Some observations on HC-128 . . . . . . 231--245 Stéphane Manuel Classification and generation of disturbance vectors for collision attacks against SHA-1 . . . . . . . . . 247--263 Sihem Mesnager A new class of bent and hyper-bent Boolean functions in polynomial forms 265--279 Patric R. J. Östergård and Olli Pottonen Two optimal one-error-correcting codes of length $13$ that are not doubly shortened perfect codes . . . . . . . . 281--285 Elif Kurtaran Özbudak and Ferruh Özbudak and Zülfükar Saygi A class of authentication codes with secrecy . . . . . . . . . . . . . . . . 287--318 Alexander Pott and Yin Tan and Tao Feng and San Ling Association schemes arising from bent functions . . . . . . . . . . . . . . . 319--331 Kai-Uwe Schmidt On the correlation distribution of Delsarte--Goethals sequences . . . . . . 333--347 Igor Semaev Sparse Boolean equations and circuit lattices . . . . . . . . . . . . . . . . 349--364
Ziran Tu and Yingpu Deng A conjecture about binary strings and its applications on constructing Boolean functions with optimal algebraic immunity . . . . . . . . . . . . . . . . 1--14 Jongsung Kim and Jaechul Sung and Ermaliza Razali and Raphael C.-W. Phan and Marc Joye Notions and relations for RKA-secure permutation and function families . . . 15--35 Yanxun Chang and Yeow Meng Chee and Junling Zhou A pair of disjoint $3$-GDDs of type $g^t u^1$ . . . . . . . . . . . . . . . . . . 37--62 Hossein Ghodosi Comments on Harn--Lin's cheating detection scheme . . . . . . . . . . . . 63--66 Yonglin Cao Structural properties and enumeration of $1$-generator generalized quasi-cyclic codes . . . . . . . . . . . . . . . . . 67--79 Sanna Ranto On binary linear $r$-identifying codes 81--89 Yutaka Hiramine A family of non class-regular symmetric transversal designs of spread type . . . 91--99
Horst Trinker Cubic and higher degree bounds for codes and $(t, m, s)$-nets . . . . . . . . . . 101--121 Jiqiang Lu The (related-key) impossible boomerang attack and its application to the AES block cipher . . . . . . . . . . . . . . 123--143 Wenping Ma and Shaohui Sun New designs of frequency hopping sequences with low hit zone . . . . . . 145--153 Abbas Alhakim and Mufutau Akinwande A recursive construction of nonbinary de Bruijn sequences . . . . . . . . . . . . 155--169 Yin Li and Gong-liang Chen and Jian-hua Li An alternative class of irreducible polynomials for optimal extension fields 171--182 Nikhil Singhi and Nidhi Singhi Minimal logarithmic signatures for classical groups . . . . . . . . . . . . 183--195 Theo Grundhöfer and Boris Krinn and Markus Stroppel Non-existence of isomorphisms between certain unitals . . . . . . . . . . . . 197--201
V. A. Menegatto and C. P. Oliveira and A. P. Peron Exact point-distributions over the complex sphere . . . . . . . . . . . . . 203--223 D. M. Donovan and M. J. Grannell Designs having the parameters of projective and affine spaces . . . . . . 225--240 Zhengchun Zhou and Xiaohu Tang Generalized modified Gold sequences . . 241--253 Jong Hwan Park and Dong Hoon Lee Fully collusion-resistant traitor tracing scheme with shorter ciphertexts 255--276 Klaus Metsch A generalization of a result of Dembowski and Wagner . . . . . . . . . . 277--282 Miao Liang and Beiliang Du A new class of splitting $3$-designs . . 283--290 Jesús Carrillo-Pacheco and Felipe Zaldivar On Lagrangian--Grassmannian codes . . . 291--298
Chia-Jung Lee and Te-Tsung Lin and Min-Zheng Shieh and Shi-Chun Tsai and Hsin-Lung Wu Decoding permutation arrays with ternary vectors . . . . . . . . . . . . . . . . 1--9 Giuseppe Marino and Olga Polverino and Rocco Trombetti Towards the classification of rank $2$ semifields $6$-dimensional over their center . . . . . . . . . . . . . . . . . 11--29 M. Bilal and J. Borges and S. T. Dougherty and C. Fernández-Córdoba Maximum distance separable codes over $\mathbb{Z}_4$ and $\mathbb{Z}_2 \times \mathbb{Z}_4$ . . . . . . . . . . . . . 31--40 Sudhir Batra and S. K. Arora Some cyclic codes of length $2 p^n$ . . 41--69 Roberto Avanzi and Waldyr Dias Benits and Steven D. Galbraith and James McKee On the distribution of the coefficients of normal forms for Frobenius expansions 71--89 Ma\lgorzata Prazmowska and Krzysztof Prazmowski Semi-Pappus configurations; combinatorial generalizations of the Pappus configuration . . . . . . . . . . 91--103 Alain Plagne and Wolfgang A. Schmid An application of coding theory to estimating Davenport constants . . . . . 105--118
Zihui Liu and Wende Chen and Zhimin Sun and Xiangyong Zeng Further results on support weights of certain subcodes . . . . . . . . . . . . 119--129 E. J. Cheon The non-existence of Griesmer codes with parameters close to codes of Belov type 131--139 Sunghyu Han and Heisook Lee and Yoonjin Lee Binary formally self-dual odd codes . . 141--150 Yeow Meng Chee and Gennian Ge and Lijun Ji and San Ling and Jianxing Yin List decodability at small radii . . . . 151--166 Jaume Martí-Farré and Carles Padró and Leonor Vázquez Optimal complexity of secret sharing schemes with four minimal qualified subsets . . . . . . . . . . . . . . . . 167--186 Jürgen Bierbrauer Commutative semifields from projection mappings . . . . . . . . . . . . . . . . 187--196 Minerva Cordero and Vikram Jha Fractional dimensions in semifields of odd order . . . . . . . . . . . . . . . 197--221 Hiroki Koga and Takeru Ishihara A general method for construction of $(t, n)$-threshold visual secret sharing schemes for color images . . . . . . . . 223--249
Vladimir Edemskiy About computation of the linear complexity of generalized cyclotomic sequences with period $p^{n + 1}$ . . . 251--260 Carl Bracken and Eimear Byrne and Gary McGuire and Gabriele Nebe On the equivalence of quadratic APN functions . . . . . . . . . . . . . . . 261--272 B. Hanson and D. Panario and D. Thomson Swan-like results for binomials and trinomials over finite fields of odd characteristic . . . . . . . . . . . . . 273--283 R. Julian R. Abel and Nigel H. N. Chan and Diana Combe and William D. Palmer Existence of GBRDs with block size $4$ and BRDs with block size $5$ . . . . . . 285--300 Melsik K. Kyuregyan and Gohar M. Kyureghyan Irreducible compositions of polynomials over finite fields . . . . . . . . . . . 301--314 Denis S. Krotov On weight distributions of perfect colorings and completely regular codes 315--329 Qi Wang The linear span of the frequency hopping sequences in optimal sets . . . . . . . 331--344 Andrew T. Jesso and David A. Pike and Nabil Shalaby Hamilton cycles in restricted block-intersection graphs . . . . . . . 345--353
Mario Lamberger and Florian Mendel and Vincent Rijmen and Koen Simoens Memoryless near-collisions via coding theory . . . . . . . . . . . . . . . . . 1--18 Yun Fan and Guanghui Zhang On the existence of self-dual permutation codes of finite groups . . . 19--29 Kenza Guenda New MDS self-dual codes over finite fields . . . . . . . . . . . . . . . . . 31--42 M. Christopoulou and T. Garefalakis and D. Panario and D. Thomson Gauss periods as constructions of low complexity normal bases . . . . . . . . 43--62 Simona Bonvicini and Marco Buratti and Gloria Rinaldi and Tommaso Traetta Some progress on the existence of $1$-rotational Steiner triple systems 63--78 Wolfgang Lang and Ekkehard Schneider Turyn type Williamson matrices up to order $99$ . . . . . . . . . . . . . . . 79--84 Maheshanand Bhaintwal Skew quasi-cyclic codes over Galois rings . . . . . . . . . . . . . . . . . 85--101 Tamás Sz\Honyi and Zsuzsa Weiner A stability theorem for lines in Galois planes of prime order . . . . . . . . . 103--108 Miao Liang and Beiliang Du A new class of $3$-fold perfect splitting authentication codes . . . . . 109--119 Tatsuya Maruta and Yuri Yoshida A generalized extension theorem for linear codes . . . . . . . . . . . . . . 121--130
Ce Shi and Yu Tang and Jianxing Yin The equivalence between optimal detecting arrays and super-simple OAs 131--142 Xiande Zhang and Hui Zhang and Gennian Ge Optimal constant weight covering codes and nonuniform group divisible $3$-designs with block size four . . . . 143--160 Xiaoshan Kai and Shixin Zhu Negacyclic self-dual codes over finite chain rings . . . . . . . . . . . . . . 161--174 David G. Glynn The factorization of the permanent of a matrix with minimal rank in prime characteristic . . . . . . . . . . . . . 175--177 Dongyoung Roh and Sang Geun Hahn The square root Diffie--Hellman problem 179--187 Ferruh Özbudak and Elif Saygi and Zülfükar Saygi A new class of quaternary LCZ sequence sets . . . . . . . . . . . . . . . . . . 189--198 Lijun Ji and Yang Li and Jianxing Yin Constructions of covering arrays of strength five . . . . . . . . . . . . . 199--208 J. Rif\`a and F. I. Solov'eva and M. Villanueva Intersection of Hamming codes avoiding Hamming subcodes . . . . . . . . . . . . 209--223 Ron Shaw and Neil Gordon and Hans Havlicek Aspects of the Segre variety $S_{1,1,1}(2) \mathcal{S}_{1,1,1}(2)$ 225--239 Ulrich Dempwolff Geometric and design-theoretic aspects of semibent functions II . . . . . . . . 241--252
Tao Feng On cyclic codes of length $2^{2^r} - 1$ with two zeros whose dual codes have three weights . . . . . . . . . . . . . 253--258 Hossein Ghodosi and Josef Pieprzyk and Ron Steinfeld Multi-party computation with conversion of secret sharing . . . . . . . . . . . 259--272 K. T. Arasu and Siu Lun Ma Nonexistence of ${\rm CW}(110, 100)$ . . 273--278 Yutaka Hiramine A construction for modified generalized Hadamard matrices using QGH matrices . . 279--288 Yupu Hu and Juntao Gao and Qing Liu and Yiwei Zhang Fault analysis of Trivium . . . . . . . 289--311 Lin Tan and Wen-Feng Qi and Hong Xu Asymptotic analysis on the normalized $k$-error linear complexity of binary sequences . . . . . . . . . . . . . . . 313--321 Petteri Kaski and Mahdad Khatirinejad and Patric R. J. Östergård Steiner triple systems satisfying the $4$-vertex condition . . . . . . . . . . 323--330 Thomas Britz and Trygve Johnsen and Dillon Mayhew and Keisuke Shiromoto Wei-type duality theorems for matroids 331--341 Hans Havlicek and Boris Odehnal and Metod Saniga On invariant notions of Segre varieties in binary projective spaces . . . . . . 343--356 Jordan D. Webster Using rational idempotents to show Turyn's bound is sharp . . . . . . . . . 357--365
Gaetan Bisson and Andrew V. Sutherland A low-memory algorithm for finding short product representations in finite groups 1--13 D. M. Donovan and M. J. Grannell On the number of designs with affine parameters . . . . . . . . . . . . . . . 15--27 Ian McLoughlin A group ring construction of the $[48,24,12]$ type II linear block code 29--41 Hyun Jin Kim The binary extremal self-dual codes of lengths $38$ and $40$ . . . . . . . . . 43--57 Alina Ostafe Pseudorandom vector sequences of maximal period generated by triangular polynomial dynamical systems . . . . . . 59--72 V. C. Mavron and T. P. McDonough and M. S. Shrikhande On quasi-symmetric designs with intersection difference three . . . . . 73--86 Liping Wang and Qiang Wang On explicit factors of cyclotomic polynomials over finite fields . . . . . 87--104 Han Mao Kiah and Ka Hin Leung and San Ling A note on cyclic codes over ${\rm GR}(p^2, m)$ of length $p^k$ . . . . . . 105--112 Steven T. Dougherty and Suat Karadeniz and Bahattin Yildiz Cyclic codes over ${\rm R}_k$ . . . . . 113--126 László Csirmaz and Gábor Tardos On-line secret sharing . . . . . . . . . 127--147
Manohar L. Aggarwal and Andreas Klein and Leo Storme The characterisation of the smallest two fold blocking sets in ${\rm PG}(n, 2)$ 149--157 J. De Beule and A. Hallez and L. Storme A characterisation result on a particular class of non-weighted minihypers . . . . . . . . . . . . . . . 159--170 M. De Boeck Small weight codewords in the dual code of points and hyperplanes in ${\rm PG}(n, q)$, $q$ even . . . . . . . . . . 171--182 Xiang-Dong Hou Classification of self dual quadratic bent functions . . . . . . . . . . . . . 183--198 Kaoru Kurosawa Round-efficient perfectly secure message transmission scheme against general adversary . . . . . . . . . . . . . . . 199--207 Aixian Zhang and Keqin Feng Construction of cyclotomic codebooks nearly meeting the Welch bound . . . . . 209--224 Paul Stankovski and Sushmita Ruj and Martin Hell and Thomas Johansson Improved distinguishers for HC-128 . . . 225--240 Derek H. Smith and Roberto Montemanni A new table of permutation codes . . . . 241--253 Oriol Farr\`as and Jessica Ruth Metcalf-Burton and Carles Padró and Leonor Vázquez On the optimization of bipartite secret sharing schemes . . . . . . . . . . . . 255--271 Thomas W. Cusick and Younhwan Cheon Affine equivalence for rotation symmetric Boolean functions with $2^k$ variables . . . . . . . . . . . . . . . 273--294
Jong Yoon Hyun and Heisook Lee and Yoonjin Lee MacWilliams duality and a Gleason-type theorem on self-dual bent functions . . 295--304 Kun Wang and Jianmin Wang Semicyclic $4$-GDDs and related two-dimensional optical orthogonal codes 305--319 Relinde P. M. J. Jurrius Weight enumeration of codes from finite spaces . . . . . . . . . . . . . . . . . 321--330 Zhi Hu and Patrick Longa and Maozhi Xu Implementing the $4$-dimensional GLV method on GLS elliptic curves with $j$-invariant $0$ . . . . . . . . . . . 331--343 Daniela Silvesan and Nabil Shalaby Cyclic block designs with block size $3$ from Skolem-type sequences . . . . . . . 345--355 Yuemei Huang and Yanxun Chang Two classes of optimal two-dimensional OOCs . . . . . . . . . . . . . . . . . . 357--363 E. Ballico Scroll codes over curves of higher genus: reducible and superstable vector bundles . . . . . . . . . . . . . . . . 365--377 Antonino Simone and Boris Skori\'c Accusation probabilities in Tardos codes: beyond the Gaussian approximation 379--412 Guobiao Weng and Xiangyong Zeng Further results on planar DO functions and commutative semifields . . . . . . . 413--423 Daniel Panario and Olga Sosnovski and Brett Stevens and Qiang Wang Divisibility of polynomials over finite fields and combinatorial applications 425--445
Arrigo Bonisoli and James Hirschfeld and Spyros Magliveras Preface: geometry, combinatorial designs and cryptology . . . . . . . . . . . . . 1--2 Gábor Korchmáros and Valentino Lanzone and Angelo Sonnino Projective $k$-arcs and $2$-level secret-sharing schemes . . . . . . . . . 3--15 Frank De Clerck and Stefaan De Winter and Thomas Maes Singer $8$-arcs of Mathon type in PG$(2, 2^7)$ . . . . . . . . . . . . . . . . . 17--31 Lucia Indaco and Gábor Korchmáros $42$-arcs in PG$(2, q)$ left invariant by PSL$(2, 7)$ . . . . . . . . . . . . . 33--46 Ilaria Cardinali and Antonio Pasini Two forms related to the symplectic dual polar space in odd characteristic . . . 47--60 B. Temmermans and J. A. Thas and H. Van Maldeghem Collineations of polar spaces with restricted displacements . . . . . . . . 61--80 Bart De Bruyn A decomposition of the universal embedding space for the near polygon \mathbb H$_n$ . . . . . . . . . . . . . 81--91 S. E. Payne and J. A. Thas An essay on self-dual generalized quadrangles . . . . . . . . . . . . . . 93--103 Philippe Cara and Alice Devillers and Michael Giudici and Cheryl E. Praeger Quotients of incidence geometries . . . 105--128 S. D. Georgiou and E. Lappas Self-dual codes from circulant matrices 129--141 Ka Hin Leung and Bernhard Schmidt New restrictions on possible orders of circulant Hadamard matrices . . . . . . 143--151 Marién Abreu and Domenico Labbate and John Sheehan Irreducible pseudo $2$-factor isomorphic cubic bipartite graphs . . . . . . . . . 153--160 Madeline González Muñiz and Rainer Steinwandt Security of message authentication codes in the presence of key-dependent messages . . . . . . . . . . . . . . . . 161--169 Simon R. Blackburn and Douglas R. Stinson and Jalaj Upadhyay On the complexity of the herding attack and some related attacks on hash functions . . . . . . . . . . . . . . . 171--193 Rainer Steinwandt and Adriana Suárez Corona Identity-based non-interactive key distribution with forward security . . . 195--208 Pascal Marquardt and Pavol Svaba and Tran van Trung Pseudorandom number generators based on random covers for finite groups . . . . 209--220 Otokar Grosek and Peter Horák On quasigroups with few associative triples . . . . . . . . . . . . . . . . 221--227
Xiwang Cao and Lei Hu On the reducibility of some composite polynomials over finite fields . . . . . 229--239 Shaojing Fu and Kanta Matsuura and Chao Li and Longjiang Qu Construction of highly nonlinear resilient S-boxes with given degree . . 241--253 Anna Y. Pun and Philip P. W. Wong A geometric proof of a theorem on antiregularity of generalized quadrangles . . . . . . . . . . . . . . 255--263 Olof Heden and Juliane Lehmann and Esmeralda Nastase and Papa Sissokho Extremal sizes of subspace partitions 265--274 Denis S. Krotov On the binary codes with parameters of triply-shortened $1$-perfect codes . . . 275--283 Jianqin Zhou A counterexample concerning the $3$-error linear complexity of $2^n$-periodic binary sequences . . . . 285--286 Mahdi Sajadieh and Mohammad Dakhilalian and Hamid Mala and Behnaz Omoomi On construction of involutory MDS matrices from Vandermonde Matrices in GF$(2^q)$ . . . . . . . . . . . . . . . 287--308 Antonio Cossidente and Giuseppe Marino Hyperovals of Hermitian polar spaces . . 309--314
Edwin R. van Dam and Willem H. Haemers Preface: Geometric and algebraic combinatorics . . . . . . . . . . . . . 1--3 Simeon Ball and Jan De Beule On sets of vectors of a finite vector space in which every subset of basis size is a basis II . . . . . . . . . . . 5--14 Dieter Jungnickel and Vladimir D. Tonchev A Hamada type characterization of the classical geometric designs . . . . . . 15--28 Aleksandar Jurisi\'c and Janos Vidali Extremal $1$-codes in distance-regular graphs of diameter $3$ . . . . . . . . . 29--47 Alexander L. Gavrilyuk and Alexander A. Makhnev Distance-regular graphs with intersection arrays $\{52, 35, 16; 1, 4, 28\}$ and $\{69, 48, 24; 1, 4, 46\}$ do not exist . . . . . . . . . . . . . . . 49--54 Jack H. Koolen and Jongyook Park A relationship between the diameter and the intersection number $c_2$ for a distance-regular graph . . . . . . . . . 55--63 A. Blokhuis and A. E. Brouwer Spectral characterization of a graph on the flags of the eleven point biplane 65--69 Aart Blokhuis and Andries E. Brouwer and Willem H. Haemers The graph with spectrum $14^1 2^{40} (-4)^{10} (-6)^9$ . . . . . . . . . . . 71--75 Hyonju Yu On the limit points of the smallest eigenvalues of regular graphs . . . . . 77--88 Hirotake Kurihara An excess theorem for spherical $2$-designs . . . . . . . . . . . . . . 89--98 Takuya Ikuta and Akihiro Munemasa Nomura algebras of nonsymmetric Hadamard models . . . . . . . . . . . . . . . . . 99--106 Andries Brouwer and Çiçek Güven The generating rank of the space of short vectors in the Leech lattice mod $2$ . . . . . . . . . . . . . . . . . . 107--113 Hendrik Van Maldeghem Symplectic polarities of buildings of type E$_6$ . . . . . . . . . . . . . . . 115--125 Bart De Bruyn The pseudo-hyperplanes and homogeneous pseudo-embeddings of AG$(n, 4)$ and PG$(n, 4)$ . . . . . . . . . . . . . . . 127--156 William M. Kantor and Tim Penttila Planes in which every quadrangle lies on a unique Baer subplane . . . . . . . . . 157--161
K. T. Arasu and Xiaoyu Liu and Gary McGuire Preface: Richard M. Wilson, Special issue honoring his 65th birthday . . . . 163--164 Steve Butler and Ron Graham A note on marking lines in $[k]^n$ in honor of Rick Wilson's 65th birthday . . 165--175 Bahattin Yildiz A lemma on binomial coefficients and applications to Lee weights modulo $2^e$ of codes over $\mathbb {Z}_4$ . . . . . 177--185 A. Blokhuis and A. E. Brouwer and T. Sz\Honyi On the chromatic number of $q$-Kneser graphs . . . . . . . . . . . . . . . . . 187--197 Charles J. Colbourn and Daniel Horsley and Chengmin Wang Trails of triples in partial triple systems . . . . . . . . . . . . . . . . 199--212 Peter J. Dukes Coding with injections . . . . . . . . . 213--222 W. H. Haemers and M. J. P. Peeters The maximum order of adjacency matrices of graphs with a given rank . . . . . . 223--232 Noga Alon and Keith E. Mellinger and Dhruv Mubayi and Jacques Verstraëte The de Bruijn--Erd\Hos theorem for hypergraphs . . . . . . . . . . . . . . 233--245 Tao Feng and Fan Wu and Qing Xiang Pseudocyclic and non-amorphic fusion schemes of the cyclotomic association schemes . . . . . . . . . . . . . . . . 247--257 Tom Hòholdt and Heeralal Janwa Eigenvalues and expansion of bipartite graphs . . . . . . . . . . . . . . . . . 259--273 Fernando Hernando and Gary McGuire Proof of a conjecture of Segre and Bartocci on monomial hyperovals in projective planes . . . . . . . . . . . 275--289 Daniel J. Katz On theorems of Delsarte--McEliece and Chevalley--Warning--Ax--Katz . . . . . . 291--324 Jeffrey H. Dinitz and Maura B. Paterson and Douglas R. Stinson and Ruizhong Wei Constructions for retransmission permutation arrays . . . . . . . . . . . 325--351 Niranjan Balachandran Forbidden configurations and Steiner designs . . . . . . . . . . . . . . . . 353--364 Navin Singhi and D. K. Ray-Chaudhuri Studying designs via multisets . . . . . 365--381 P. Baldi Boolean autoencoders and hypercube clustering complexity . . . . . . . . . 383--403
Daniel Augot and Anne Canteaut and Gohar Kyureghyan Editorial . . . . . . . . . . . . . . . 1--2 Eimear Byrne and Marcus Greferath and Jaume Pernas Algebraic decoding of negacyclic codes over $\mathbb{Z}_4$ . . . . . . . . . . 3--16 Patrick Solé and Jean-Claude Belfiore Constructive spherical codes near the Shannon bound . . . . . . . . . . . . . 17--26 Thomas Honold and Ivan Landjev Non-free extensions of the simplex codes over a chain ring with four elements . . 27--38 Michael Kiermaier and Johannes Zwanzger New ring-linear codes from dualization in projective Hjelmslev geometries . . . 39--55 Antonia Wachter-Zeh and Valentin Afanassiev Fast decoding of Gabidulin codes . . . . 57--73 Andrey Bogdanov and Kyoji Shibutani Generalized Feistel networks revisited 75--97 Alexander Pott and Yue Zhou CCZ and EA equivalence between mappings over finite Abelian groups . . . . . . . 99--109 Ernst Schulte-Geers On CCZ-equivalence of addition $ \bmod 2^n $ . . . . . . . . . . . . . . . . . 111--127 L. A. Bassalygo and V. A. Zinoviev On divisibility of exponential sums of polynomials of special type over fields of characteristic $2$ . . . . . . . . . 129--143 Marcus Greferath and Cathy Mc Fadden and Jens Zumbrägel Characteristics of invariant weights related to code equivalence over rings 145--156 Santanu Sarkar and Subhamoy Maitra Cryptanalytic results on `Dual CRT' and `Common Prime' RSA . . . . . . . . . . . 157--174 Andrea Röck and Kaisa Nyberg Generalization of Matsui's Algorithm $1$ to linear hull for key-alternating block ciphers . . . . . . . . . . . . . . . . 175--193 Olav Geil and Casper Thomsen Weighted Reed--Muller codes revisited 195--220 Peter Beelen and Diego Ruano Bounding the number of points on a curve using a generalization of Weierstrass semigroups . . . . . . . . . . . . . . . 221--230 Ayça Çesmelioglu and Wilfried Meidl A construction of bent functions from plateaued functions . . . . . . . . . . 231--242 Sugata Gangopadhyay and Anand Joshi and Gregor Leander A new construction of bent functions based on $\mathbb{Z}$-bent functions . . 243--256 Wilfried Meidl and Alev Topuzoglu Quadratic functions with prescribed spectra . . . . . . . . . . . . . . . . 257--273 Joachim Rosenthal and Anna-Lena Trautmann A complete characterization of irreducible cyclic orbit codes and their Plücker embedding . . . . . . . . . . . . 275--289 Alain Couvreur and Iwan Duursma Evaluation codes from smooth quadric surfaces and twisted Segr\`e varieties 291--303
Shuhong Gao and Raymond Heindl Multivariate public key cryptosystems from Diophantine equations . . . . . . . 1--18 Jie Li and Xiangyong Zeng and Xiaohu Tang and Chunlei Li A family of quadriphase sequences of period $ 4(2^n - 1) $ with low correlation and large linear span . . . 19--35 Mieko Yamada Difference sets over Galois rings with odd extension degrees and characteristic an even power of $2$ . . . . . . . . . . 37--57 Yonglin Cao and Jian Gao Constructing quasi-cyclic codes from linear algebra theory . . . . . . . . . 59--75 Deng Tang and Weiguo Zhang and Xiaohu Tang Construction of balanced Boolean functions with high nonlinearity and good autocorrelation properties . . . . 77--91 Dimitri Leemans and B. G. Rodrigues Binary codes of some strongly regular subgraphs of the McLaughlin graph . . . 93--109 Mausumi Bose and Aloke Dey and Rahul Mukerjee Key predistribution schemes for distributed sensor networks via block designs . . . . . . . . . . . . . . . . 111--136 John Bamberg and Michael Giudici and Gordon F. Royle Hemisystems of small flock generalized quadrangles . . . . . . . . . . . . . . 137--157
Dina Ghinelli and J. W. P. Hirschfeld and Dieter Jungnickel Obituary: Daniel R. Hughes (1927--2012) 159--162 Dina Ghinelli and Dieter Jungnickel Obituary: Marialuisa J. de Resmini (1939--2012) . . . . . . . . . . . . . . 163--167 Motahhareh Gharahi and Massoud Hadian Dehkordi The complexity of the graph access structures on six participants . . . . . 169--173 Huajin Chen and Tian Tian and Wenfeng Qi On the affine equivalence relation between two classes of Boolean functions with optimal algebraic immunity . . . . 175--185 Ibrahim Özen and Eda Tekin Moments of the support weight distribution of linear codes . . . . . . 187--196 Fangguo Zhang and Ping Wang Speeding up elliptic curve discrete logarithm computations with point halving . . . . . . . . . . . . . . . . 197--208 Frederik Armknecht and Stefan Katzenbeisser and Andreas Peter Group homomorphic encryption: characterizations, impossibility results, and applications . . . . . . . 209--232 Kun Wang and Jianxing Yin Further results on the existence of nested orthogonal arrays . . . . . . . . 233--243 Ian Goldberg and Douglas Stebila and Berkant Ustaoglu Anonymity and one-way authentication in key exchange protocols . . . . . . . . . 245--269 Hoon Hong and Eunjeong Lee and Hyang-Sook Lee and Cheol-Min Park Simple and exact formula for minimum loop length in Ate$_i$ pairing based on Brezing--Weng curves . . . . . . . . . . 271--292
Kiyoshi Nagata and Fidel Nemenzo and Hideo Wada Mass formula and structure of self-dual codes over Z2s ${\bf Z}_{2^s}$ . . . . . 293--316 Zhixiong Chen and Xiaoni Du On the linear complexity of binary threshold sequences derived from Fermat quotients . . . . . . . . . . . . . . . 317--323 Pinhui Ke and Jie Zhang and Shengyuan Zhang On the linear complexity and the autocorrelation of generalized cyclotomic binary sequences of length $ 2 p^m $ . . . . . . . . . . . . . . . . 325--339 Kristin Lauter and Ning Shang Generating pairing-friendly parameters for the CM construction of genus $2$ curves over prime fields . . . . . . . . 341--355 Orr Dunkelman and Nathan Keller Cryptanalysis of the Stream Cipher LEX 357--373 Luca Giuzzi and Valentina Pepe Families of twisted tensor product codes 375--384 Neil I. Gillespie and Cheryl E. Praeger Neighbour transitivity on codes in Hamming graphs . . . . . . . . . . . . . 385--393 Jaime Gutierrez and Álvar Ibeas and Domingo Gómez-Pérez and Igor E. Shparlinski Predicting masked linear pseudorandom number generators over finite fields . . 395--402
D. Ghinelli and J. W. P. Hirschfeld and D. Jungnickel and J. A. Thas Editorial: Finite geometries . . . . . . 1--2 Jan De Beule On large maximal partial ovoids of the parabolic quadric $ Q(4, q) $ . . . . . 3--10 L. Beukemann and K. Metsch Small tight sets of hyperbolic quadrics 11--24 Peter Sziklai and Geertrui Van de Voorde A small minimal blocking set in $ {\rm PG}(n, p^t) $, spanning a $ (t - 1) $-space, is linear . . . . . . . . . . . 25--32 Morgan Rodgers Cameron--Liebler line classes . . . . . 33--37 David G. Glynn Permanent formulae from the Veronesean 39--47 Anton Betten and Eun Ju Cheon and Seon Jeong Kim and Tatsuya Maruta Three families of multiple blocking sets in Desarguesian projective planes of even order . . . . . . . . . . . . . . . 49--59 Massimo Giulietti and Gábor Korchmáros Arcs in $ {\rm AG} (2, q) $ determining few directions . . . . . . . . . . . . . 61--72 Massimo Giulietti and Gábor Korchmáros and Stefano Marcugini and Fernanda Pambianco Transitive $ A_6 $-invariant $k$-arcs in $ {\rm PG}(2, q) $ . . . . . . . . . . . 73--79 Ulrich Dempwolff More translation planes and semifields from Dembowski--Ostrom polynomials . . . 81--103 Thomas Honold and Michael Kiermaier The existence of maximal $ (q^2, 2) $-arcs in projective Hjelmslev planes over chain rings of length $2$ and odd prime characteristic . . . . . . . . . . 105--126 Carmen Amarra and Michael Giudici and Cheryl E. Praeger Symmetric diameter two graphs with affine-type vertex-quasiprimitive automorphism group . . . . . . . . . . . 127--139 Yu Qing Chen and Tao Feng Abelian and non-abelian Paley type group schemes . . . . . . . . . . . . . . . . 141--154 John Polhill and James A. Davis and Ken Smith A new product construction for partial difference sets . . . . . . . . . . . . 155--161 Dieter Jungnickel and Vladimir D. Tonchev New invariants for incidence structures 163--177 Kris Coolsaet On the classification of nonsingular $ 2 \times 2 \times 2 \times 2 $ hypercubes 179--194 David G. Glynn Nonfactorizable nonsingular hypercubes 195--203 Michel Lavrauw Finite semifields and nonsingular tensors . . . . . . . . . . . . . . . . 205--227 Ilaria Cardinali and Antonio Pasini On certain forms and quadrics related to symplectic dual polar spaces in characteristic $2$ . . . . . . . . . . . 229--258 Bart De Bruyn The pseudo-hyperplanes and homogeneous pseudo-embeddings of the generalized quadrangles of order $ (3, t) $ . . . . 259--284
Luk Bettale and Jean-Charles Faug\`ere and Ludovic Perret Cryptanalysis of HFE, multi-HFE and variants for odd and even characteristic 1--52 Gang Chen and Ruihu Li Ternary self-orthogonal codes of dual distance three and ternary quantum codes of distance three . . . . . . . . . . . 53--63 Xiande Zhang and Gennian Ge A new existence proof for Steiner quadruple systems . . . . . . . . . . . 65--76 Pantelimon St\uanic\ua and Thor Martinsen and Sugata Gangopadhyay and Brajesh Kumar Singh Bent and generalized bent Boolean functions . . . . . . . . . . . . . . . 77--94 Derek H. Smith and Roberto Montemanni Permutation codes with specified packing radius . . . . . . . . . . . . . . . . . 95--106 Todd D. Mateer Simple algorithms for decoding systematic Reed--Solomon codes . . . . . 107--121 C. Munuera and A. Sepúlveda and F. Torres Generalized Hermitian codes . . . . . . 123--130 Fernando Hernando and Kyle Marshall and Michael E. O'Sullivan The dimension of subcode-subfields of shortened generalized Reed--Solomon codes . . . . . . . . . . . . . . . . . 131--142
G. Lunardon and G. Marino and O. Polverino and R. Trombetti A remark on symplectic semifield planes and $ Z_4 $-linear codes . . . . . . . . 143--149 Nikolay Yankov New optimal $ [52, 26, 10] $ self-dual codes . . . . . . . . . . . . . . . . . 151--159 E. Martínez-Moro and A. Piñera-Nicolás and I. F. Rúa Additive semisimple multivariable codes over $ {\mathbb {F}_4} $ . . . . . . . . 161--180 Sylvain Gravier and Matjaz Kovse and Michel Mollard and Julien Moncel and Aline Parreau New results on variants of covering codes in Sierpi\'nski graphs . . . . . . 181--188 R. Julian R. Abel and Diana Combe and Adrian M. Nelson and William D. Palmer GBRDs over supersolvable groups and solvable groups of order prime to $3$ 189--201 Aleksandr Tuxanidy and Qiang Wang Composed products and factors of cyclotomic polynomials over finite fields . . . . . . . . . . . . . . . . . 203--231 Liqin Hu and Qin Yue Gauss periods and codebooks from generalized cyclotomic sets of order four . . . . . . . . . . . . . . . . . . 233--246 Fang Liu and Daiyuan Peng and Zhengchun Zhou and Xiaohu Tang A new frequency-hopping sequence set based upon generalized cyclotomy . . . . 247--259
Dieter Jungnickel Obituary: Hanfried Lenz (1916--2013) . . 261--263 Tengyu Ma and Xiaoming Sun and Huacheng Yu On a conjecture of Butler and Graham . . 265--274 Zhuojun Zhuang and Yuan Luo and Bin Dai Code constructions and existence bounds for relative generalized Hamming weight 275--297 Ichiro Shimada A note on rational normal curves totally tangent to a Hermitian variety . . . . . 299--303 O. Heden and J. Lehmann and E. Nastase and P. Sissokho The supertail of a subspace partition 305--316 N. Rajesh Pillai and S. S. Bedi Algebraic attacks on a class of stream ciphers with unknown output function . . 317--330 Alexis Bonnecaze and Pierre Liardet and Alexandre Venelli AES side-channel countermeasure using random tower field constructions . . . . 331--349 Palash Sarkar A new multi-linear universal hash family 351--367 Marjan Bazrafshan and Tran van Trung Improved bounds for separating hash families . . . . . . . . . . . . . . . . 369--382
Joaquim Borges and Merc\`e Villanueva and Victor Zinoviev Editorial: 3rd International Castle Meeting on Coding Theory and Applications . . . . . . . . . . . . . . 1--2 David Auger and Gérard Cohen and Sihem Mesnager Sphere coverings and identifying codes 3--7 Sabine Kampf Bounds on collaborative decoding of interleaved Hermitian codes and virtual extension . . . . . . . . . . . . . . . 9--25 Padmapani Seneviratne Codes associated with circulant graphs and permutation decoding . . . . . . . . 27--33 D. Ghinelli and J. D. Key and T. P. McDonough Hulls of codes from incidence matrices of connected regular graphs . . . . . . 35--54 Vladimir Sidorenko and Martin Bossert Fast skew-feedback shift-register synthesis . . . . . . . . . . . . . . . 55--67 Anton Malevich and Wolfgang Willems On the classification of the extremal self-dual codes over small fields with $2$-transitive automorphism groups . . . 69--76 C. Araujo and I. Dejter and P. Horak A generalization of Lee codes . . . . . 77--90 Kathryn Haymaker and Christine A. Kelley Geometric WOM codes and coding strategies for multilevel flash memories 91--104 Jaume Pernas and Jaume Pujol and Merc\`e Villanueva Characterization of the automorphism group of quaternary linear Hadamard codes . . . . . . . . . . . . . . . . . 105--115 Maria Bras-Amorós and Albert Vico-Oton On the Geil--Matsumoto bound and the length of AG codes . . . . . . . . . . . 117--125 Thomas Feulner Classification and nonexistence results for linear codes with prescribed minimum distances . . . . . . . . . . . . . . . 127--138 Joaquim Borges and Josep Rif\`a and Victor Zinoviev New families of completely regular codes and their corresponding distance regular coset graphs . . . . . . . . . . . . . . 139--148 M. Tomlinson and M. Jibril and C. Tjhai and M. Grassl and M. Z. Ahmed New binary codes from extended Goppa codes . . . . . . . . . . . . . . . . . 149--156 Fernando Piñero and Heeralal Janwa On the subfield subcodes of Hermitian codes . . . . . . . . . . . . . . . . . 157--173 José Joaquín Bernal and Juan Jacobo Simón Information sets in abelian codes: defining sets and Groebner basis . . . . 175--188 C. Galindo and F. Monserrat Evaluation codes defined by finite families of plane valuations at infinity 189--213 Irene Márquez-Corbella and Edgar Martínez-Moro and Ruud Pellikaan On the unique representation of very strong algebraic geometry codes . . . . 215--230 Eraj Khan and Ernst Gabidulin and Bahram Honary and Hassan Ahmed Modified Niederreiter type of GPT cryptosystem based on reducible rank codes . . . . . . . . . . . . . . . . . 231--239 Telma Pinho and Raquel Pinto and Paula Rocha Realization of $2$D convolutional codes of rate $ \frac {1}{n} $ by separable Roesser models . . . . . . . . . . . . . 241--250
Kota Ideguchi and Elmar Tischhauser and Bart Preneel Internal differential collision attacks on the reduced-round Gròstl-0 hash function . . . . . . . . . . . . . . . . 251--271 Junhua Wu Proofs of two conjectures on the dimensions of binary codes . . . . . . . 273--304 Soohak Choi and Jong Yoon Hyun and Hyun Kwang Kim Local duality theorem for $q$-ary $1$-perfect codes . . . . . . . . . . . 305--311 Myung-Kyu Lee and Kyeongcheol Yang The exponent of a polarizing matrix constructed from the Kronecker product 313--322 Javier Herranz and Alexandre Ruiz and Germán Sáez Signcryption schemes with threshold unsigncryption, and applications . . . . 323--345 Aicha Batoul and Kenza Guenda and T. Aaron Gulliver On self-dual cyclic codes over finite chain rings . . . . . . . . . . . . . . 347--358 Qun-Xiong Zheng and Wen-Feng Qi and Tian Tian On the distinctness of modular reductions of primitive sequences over $ Z / (2^{32} - 1) $ . . . . . . . . . . . 359--368 Andrey Bogdanov and Vincent Rijmen Linear hulls with correlation zero and linear cryptanalysis of block ciphers 369--383 Ferruh Özbudak and Burcu Gülmez Temür Finite number of fibre products of Kummer covers and curves with many points over finite fields . . . . . . . 385--404 D. Boucher and F. Ulmer Linear codes using skew polynomials with automorphisms and derivations . . . . . 405--431
Aart Blokhuis and Andries E. Brouwer and Attila Sali Note on the size of binary Armstrong codes . . . . . . . . . . . . . . . . . 1--4 Hiram H. López and Carlos Rentería-Márquez and Rafael H. Villarreal Affine cartesian codes . . . . . . . . . 5--19 D. Bartoli and M. De Boeck and S. Fanali and L. Storme On the functional codes defined by quadrics and Hermitian varieties . . . . 21--46 Guangfu Wu and Hsin-Chiu Chang and Lin Wang and T. K. Truong Constructing rate $ 1 / p $ systematic binary quasi-cyclic codes based on the matroid theory . . . . . . . . . . . . . 47--56 N. P. Smart and F. Vercauteren Fully homomorphic SIMD operations . . . 57--81 Thijs Laarhoven and Benne de Weger Optimal symmetric Tardos traitor tracing schemes . . . . . . . . . . . . . . . . 83--103 P. Loidreau Asymptotic behaviour of codes in rank metric over finite fields . . . . . . . 105--118 Anuradha Sharma and Amit K. Sharma On some new $m$-spotty Lee weight enumerators . . . . . . . . . . . . . . 119--152 S. Arumugam and R. Lakshmanan and Atulya K. Nagar On ( $k$, n )*-visual cryptography scheme . . . . . . . . . . . . . . . . . 153--162 Tian Tian and Wen-Feng Qi On the largest affine sub-families of a family of NFSR sequences . . . . . . . . 163--181
Sihong Su and Xiaohu Tang Construction of rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearity . . . . . 183--199 Yun Fan and San Ling and Hongwei Liu Matrix product codes over finite commutative Frobenius rings . . . . . . 201--227 Alexander Zeh and Sergey Bezzateev A new bound on the minimum distance of cyclic codes using small-minimum-distance cyclic codes . . 229--246 Tomas Nilson and Pia Heidtmann Inner balance of symmetric designs . . . 247--260 Antonia Wachter-Zeh and Alexander Zeh and Martin Bossert Decoding interleaved Reed--Solomon codes beyond their joint error-correcting capability . . . . . . . . . . . . . . . 261--281 Peter Dukes and Leah Howard Group divisible designs in MOLS of order ten . . . . . . . . . . . . . . . . . . 283--291 Reza Sepahi and Ron Steinfeld and Josef Pieprzyk Lattice-based completely non-malleable public-key encryption in the standard model . . . . . . . . . . . . . . . . . 293--313 Peipei Dai and Jianmin Wang and Jianxing Yin Combinatorial constructions for optimal $2$-D optical orthogonal codes with AM--OPPTS property . . . . . . . . . . . 315--330 Caixue Zhou and Wan Zhou and Xiwei Dong Provable certificateless generalized signcryption scheme . . . . . . . . . . 331--346 Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang The relation and transformation between hierarchical inner product encryption and spatial encryption . . . . . . . . . 347--364
Mingzhi Zhu and Gennian Ge Room squares with super-simple property 365--381 Vladimir Anashin and Andrei Khrennikov and Ekaterina Yurova $T$-functions revisited: new criteria for bijectivity/transitivity . . . . . . 383--407 Christophe Petit Towards factoring in $ {\rm SL}(2, \mathbb {F}_{2^n}) $ . . . . . . . . . . 409--431 Maura B. Paterson and Douglas R. Stinson A unified approach to combinatorial key predistribution schemes for sensor networks . . . . . . . . . . . . . . . . 433--457 Johannes Braun and Johannes Buchmann and Ciaran Mullan and Alex Wiesmaier Long term confidentiality: a survey . . 459--478 Anthony B. Evans Mutually orthogonal Latin squares based on general linear groups . . . . . . . . 479--492 Nam Yul Yu and Keqin Feng and Aixian Zhang A new class of near-optimal partial Fourier codebooks from an almost difference set . . . . . . . . . . . . . 493--501 Klara Stokes and Oriol Farr\`as Linear spaces and transversal designs: $k$-anonymous combinatorial configurations for anonymous database search notes . . . . . . . . . . . . . . 503--524 Klara Stokes and Oriol Farr\`as Erratum to: Linear spaces and transversal designs: $ (k)$-anonymous combinatorial configurations for anonymous database search . . . . . . . 525--525 Wakaha Ogata and Hiroshi Eguchi Cheating detectable threshold scheme against most powerful cheaters for long secrets . . . . . . . . . . . . . . . . 527--539 S. G. Barwick and Wen-Ai Jackson A characterisation of tangent subplanes of $ {\rm PG}(2, q^3) $ . . . . . . . . 541--545
John Bamberg and Jan De Beule and Nicola Durante and Michel Lavrauw Editorial: Special issue on finite geometries in honor of Frank De Clerck 1--5 Dina Ghinelli and Dieter Jungnickel and Klaus Metsch Remarks on polarity designs . . . . . . 7--19 A. Blokhuis and M. De Boeck and F. Mazzocca and L. Storme The Kakeya problem: a gap in the spectrum and classification of the smallest examples . . . . . . . . . . . 21--31 S. Rottey and L. Storme Maximal partial line spreads of non-singular quadrics . . . . . . . . . 33--51 Gábor Korchmáros and Nicola Pace Coset intersection of irreducible plane cubics . . . . . . . . . . . . . . . . . 53--75 Maarten De Boeck The largest Erd\Hos--Ko--Rado sets of planes in finite projective and finite classical polar spaces . . . . . . . . . 77--117 Kris Coolsaet Some large partial ovoids of $ (Q^{-(5, q)}) $ for odd $q$ . . . . . . . . . . . 119--128 Daniele Bartoli and Stefano Marcugini and Fernanda Pambianco The non-existence of some NMDS codes and the extremal sizes of complete $ (n, 3)$-arcs in $ {\rm PG}(2, 16)$ . . . . . 129--134 Giorgio Donati and Nicola Durante and Alessandro Siciliano On unitals in $ {\rm PG}(2, q^2) $ stabilized by a homology group . . . . . 135--139 Max Neunhöffer and Cheryl E. Praeger Sporadic neighbour-transitive codes in Johnson graphs . . . . . . . . . . . . . 141--152 Gábor P. Nagy Linear groups as right multiplication groups of quasifields . . . . . . . . . 153--164 Dean Crnkovi\'c and Willem H. Haemers Walk-regular divisible design graphs . . 165--175 Simeon Ball A $p$-adic condition on the weight of a codeword of a linear code . . . . . . . 177--183 Nicola Durante and Alessandro Siciliano Some blocking semiovals of homology type in planes of square order . . . . . . . 185--193
Alan J. Aw The multicovering radius problem for some types of discrete structures . . . 195--209 Antonio Cossidente and Giuseppe Marino and Tim Penttila Relative symplectic subquadrangle hemisystems of the Hermitian surface . . 211--217 Zhuojun Zhuang and Bin Dai and Yuan Luo and A. J. Han Vinck On the relative profiles of a linear code and a subcode . . . . . . . . . . . 219--247 Yongqiang Li and Mingsheng Wang Constructing differentially $4$-uniform permutations over $ {\rm GF}(2^{2m})$ from quadratic APN permutations over $ {\rm GF}(2^{2 m + 1})$ . . . . . . . . . 249--264 Stanley Payne and Morgan Rodgers Double $k$-sets in symplectic generalized quadrangles . . . . . . . . 265--271 Jong Yoon Hyun and Heisook Lee and Yoonjin Lee Boolean functions with MacWilliams duality . . . . . . . . . . . . . . . . 273--287 Hung-Lin Fu and Yuan-Hsun Lo and Kenneth W. Shum Optimal conflict-avoiding codes of odd length and weight three . . . . . . . . 289--309 Ferdinand Ihringer and Klaus Metsch On the maximum size of Erd\Hos--Ko--Rado sets in $ H(2 d + 1, q^2) $ . . . . . . 311--316 Carl Bracken and Faruk Göloglu A non-cyclic triple-error-correcting BCH-like code and some minimum distance results . . . . . . . . . . . . . . . . 317--330 Jay A. Wood Relative one-weight linear codes . . . . 331--344 C. M. Swanson and D. R. Stinson Combinatorial solutions providing improved security for the generalized Russian cards problem . . . . . . . . . 345--367 Ce Shi and Jianxing Yin Existence of super-simple $ {\rm OA}_\lambda (3, 5, v)^\prime s $ . . . . 369--380 Megan Adams and Junhua Wu $2$-Ranks of incidence matrices associated with conics in finite projective planes . . . . . . . . . . . 381--404 Tuvi Etzion Covering of subspaces by subspaces . . . 405--421 Wenli Ren and Fang-Wei Fu and Zhengchun Zhou New sets of frequency-hopping sequences with optimal Hamming correlation . . . . 423--434 S. T. Dougherty and C. Fernández-Córdoba $ \mathbb {Z}_2 \mathbb {Z}_4 $-Additive formally self-dual codes . . . . . . . . 435--453 Angelo Sonnino Transitive $ {\rm PSL}(2, 7) $-invariant $ 42$-arcs in $3$-dimensional projective spaces . . . . . . . . . . . . . . . . . 455--463 Vedran Krcadinac and Anamari Naki\'c and Mario Osvin Pavcevi\'c Equations for coefficients of tactical decomposition matrices for $t$-designs 465--469 Trygve Johnsen and Hugues Verdure Stanley--Reisner resolution of constant weight linear codes . . . . . . . . . . 471--481
Yonglin Cao A class of $1$-generator repeated root quasi-cyclic codes . . . . . . . . . . . 483--496 Hengjia Wei and Gennian Ge Kirkman frames having hole type $ h^u m^1 $ for $ h \equiv 0 \bmod 12 $ . . . 497--510 Maosheng Xiong The weight distributions of a class of cyclic codes II . . . . . . . . . . . . 511--528 Naoyuki Horiguchi and Tsuyoshi Miezaki and Hiroyuki Nakasora On the support designs of extremal binary doubly even self-dual codes . . . 529--537 Ka Hin Leung and Siu Lun Ma Proper circulant weighing matrices of weight $ p^2 $ . . . . . . . . . . . . . 539--550 Ivan Landjev and Assia Rousseva On the sharpness of Bruen's bound for intersection sets in Desarguesian affine spaces . . . . . . . . . . . . . . . . . 551--558 Yasemin Cengellenmis and Abdullah Dertli and S. T. Dougherty Codes over an infinite family of rings with a Gray map . . . . . . . . . . . . 559--580 Cunsheng Ding and Alexander Pott and Qi Wang Constructions of almost difference sets from finite fields . . . . . . . . . . . 581--592 Siyu Liu and Felice Manganiello and Frank R. Kschischang Kötter interpolation in skew polynomial rings . . . . . . . . . . . . . . . . . 593--608 James Berg and Max Wakefield Skeleton simplicial evaluation codes . . 609--625 Yutaka Hiramine On the non-existence of maximal difference matrices of deficiency $1$ 627--635 Victoria Horan and Glenn Hurlbert $1$-Overlap cycles for Steiner triple systems . . . . . . . . . . . . . . . . 637--651 Sihong Su and Xiaohu Tang and Xiangyong Zeng A systematic method of constructing Boolean functions with optimal algebraic immunity based on the generator matrix of the Reed--Muller code . . . . . . . . 653--673 Vikram Jha The Ubiquity of the Orders of Fractional Semifields of Even Characteristic . . . 675--686 Nicholas Coxon List decoding of number field codes . . 687--711 Tran van Trung A tight bound for frameproof codes viewed in terms of separating hash families . . . . . . . . . . . . . . . . 713--718 Christoph Hering and Andreas Krebs and Thomas Edgar Naive configurations . . . . . . . . . . 719--731 Jürgen Bierbrauer and Daniele Bartoli and Giorgio Faina and Stefano Marcugini and Fernanda Pambianco and Yves Edel The structure of quaternary quantum caps 733--747 Kenza Guenda and T. Aaron Gulliver and S. Arash Sheikholeslam Lexicodes over rings . . . . . . . . . . 749--763
Robert A. Liebler and Cheryl E. Praeger Neighbour-transitive codes in Johnson graphs . . . . . . . . . . . . . . . . . 1--25 Henning Stichtenoth A note on composed products of polynomials over finite fields . . . . . 27--32 Naoki Chigira and Masaaki Harada and Masaaki Kitazume On the classification of extremal doubly even self-dual codes with $2$-transitive automorphism groups . . . . . . . . . . 33--35 Hui-Chuan Lu and Hung-Lin Fu The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures . . . . . . . . . . . 37--46 Tohru Nakashima Construction of codes from Arakelov geometry . . . . . . . . . . . . . . . . 47--54 Jianqin Zhou and Wanquan Liu The $k$-error linear complexity distribution for $ 2^n$-periodic binary sequences . . . . . . . . . . . . . . . 55--75 Wayne Broughton Admissible parameters of symmetric designs satisfying $ v = 4 (k - \lambda) + 2 $ and symmetric designs with inner balance . . . . . . . . . . . . . . . . 77--83 Jialin Huang and Xuejia Lai Revisiting key schedule's diffusion in relation with round function's diffusion 85--103 Bernhard Schmidt and Ming Ming Tan Construction of relative difference sets and Hadamard groups . . . . . . . . . . 105--119 Bart Mennink On the collision and preimage security of MDC-4 in the ideal cipher model . . . 121--150 Steven T. Dougherty and Esengül Saltürk Counting codes over rings . . . . . . . 151--165 Xing Liu and Daiyuan Peng and Hongyu Han Low-hit-zone frequency hopping sequence sets with optimal partial Hamming correlation properties . . . . . . . . . 167--176 Bogdan Groza and Bogdan Warinschi Cryptographic puzzles and DoS resilience, revisited . . . . . . . . . 177--207 Petr Lisonek and Hui Yi Lu Bent functions on partial spreads . . . 209--216 Antonio Cossidente and Francesco Pavese New infinite families of hyperovals on $ \mathcal H(3, q^2), q $ odd . . . . . . 217--222 Jianying Fang and Junling Zhou and Yanxun Chang Nonexistence of some quantum jump codes with specified parameters . . . . . . . 223--235 Nian Li and Xiaohu Tang and Tor Helleseth New $M$-ary sequences with low autocorrelation from interleaved technique . . . . . . . . . . . . . . . 237--249 Huaning Liu A family of elliptic curve pseudorandom binary sequences . . . . . . . . . . . . 251--265 Olav Geil Erratum to: On the second weight of generalized Reed--Muller codes . . . . . 267--267
Lilya Budaghyan and Tor Helleseth and Matthew Parker Editorial: special issue on coding and cryptography . . . . . . . . . . . . . . 269--269 Stéphane Ballet and Robert Rolland On low weight codewords of generalized affine and projective Reed--Muller codes 271--297 Claude Carlet and Andrew Klapper On the arithmetic Walsh coefficients of Boolean functions . . . . . . . . . . . 299--318 Gottlieb Isabel Pirsic and Arne Winterhof On discrete Fourier transform, ambiguity, and Hamming-autocorrelation of pseudorandom sequences . . . . . . . 319--328 Torleiv Klòve and Moshe Schwartz Linear covering codes and error-correcting codes for limited-magnitude errors . . . . . . . . 329--354 Felix Fontein and Michael Schneider and Urs Wagner PotLLL: a polynomial time version of LLL with deep insertions . . . . . . . . . . 355--368 Hyun Kwang Kim and Phan Thanh Toan New inequalities for $q$-ary constant-weight codes . . . . . . . . . 369--381 Santanu Sarkar Small secret exponent attack on RSA variant with modulus $ N = p^r q $ . . . 383--392 Joachim Rosenthal and Natalia Silberstein and Anna-Lena Trautmann On the geometry of balls in the Grassmannian and list decoding of lifted Gabidulin codes . . . . . . . . . . . . 393--416 Petr Lisonek and Vijaykumar Singh Quantum codes from nearly self-orthogonal quaternary linear codes 417--424 Soon Sheng Ong and Frédérique Oggier Wiretap lattice codes from number fields with no small norm elements . . . . . . 425--440 Wittawat Kositwattanarerk and Frédérique Oggier Connections between Construction $D$ and related constructions of lattices . . . 441--455 Ferruh Özbudak and Zülfükar Saygi On the exact number of solutions of certain linearized equations . . . . . . 457--468 Elena Dubrova Generation of full cycles by a composition of NLFSRs . . . . . . . . . 469--486 Céline Blondeau and Léo Perrin More differentially $6$-uniform power functions . . . . . . . . . . . . . . . 487--505 Johan S. R. Nielsen and Alexander Zeh Multi-trial Guruswami--Sudan decoding for generalised Reed--Solomon codes . . 507--527 Mahabir Prasad Jhanwar and Ayineedi Venkateswarlu and Reihaneh Safavi-Naini Paillier-based publicly verifiable (non-interactive) secret sharing . . . . 529--546 Antonia Wachter-Zeh and Alexander Zeh List and unique error-erasure decoding of interleaved Gabidulin codes with interpolation techniques . . . . . . . . 547--570 Wenhui Li and Vladimir Sidorenko and Danilo Silva On transform-domain error and erasure correction by Gabidulin codes . . . . . 571--586 Yuyin Yu and Mingsheng Wang and Yongqiang Li A matrix approach for constructing quadratic APN functions . . . . . . . . 587--600
Weiwei Cao and Lei Hu Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH . . . . . . . . . . . . . . . 719--730 Jie Chen and Hoon Wei Lim and San Ling and Le Su and Huaxiong Wang Spatial encryption supporting non-monotone access structure . . . . . 731--746 Xiaogang Liu and Yuan Luo The weight distributions of some cyclic codes with three or four nonzeros over $ \mathbb F_3 $ . . . . . . . . . . . . . 747--768 Jianying Fang and Yanxun Chang Mutually disjoint $t$-designs and $t$-SEEDs from extremal doubly-even self-dual codes . . . . . . . . . . . . 769--780 Miao Liang and Mingchao Li and Beiliang Du A construction for $t$-fold perfect authentication codes with arbitration 781--790 Wenping Ma and Chun-e Zhao and Dongsu Shen New optimal constructions of conflict-avoiding codes of odd length and weight $3$ . . . . . . . . . . . . . 791--804 Yiling Lin and Masakazu Jimbo Extremal properties of $t$-SEEDs and recursive constructions . . . . . . . . 805--823 Tao Feng and Sihuang Hu and Shuxing Li and Gennian Ge Difference sets with few character values . . . . . . . . . . . . . . . . . 825--839 Javier Herranz and Alexandre Ruiz and Germán Sáez New results and applications for multi-secret sharing schemes . . . . . . 841--864 Avishek Adhikari Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images . . . . . . 865--895 Koji Momihara and Mieko Yamada Divisible difference families from Galois rings $ {\rm GR}(4, n) $ and Hadamard matrices . . . . . . . . . . . 897--909 Jie Chen and Hoon Wei Lim and San Ling and Huaxiong Wang and Hoeteck Wee Shorter identity-based encryption via asymmetric pairings . . . . . . . . . . 911--947 Sebastian Raaphorst and Lucia Moura and Brett Stevens A construction for strength-3 covering arrays from linear feedback shift register sequences . . . . . . . . . . . 949--968 Alexander L. Gavrilyuk and Ivan Yu. Mogilnykh Cameron-Liebler line classes in $ P G(n, 4) $ . . . . . . . . . . . . . . . . . . 969--982 Nikolay Yankov and Moon Ho Lee New binary self-dual codes of lengths $ 50$--$ 60$ . . . . . . . . . . . . . . . 983--996 Stanislav Bulygin and Michael Walter and Johannes Buchmann Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures . . . . . . . . . . . . 997--1022 Edoardo Ballico Any network code comes from an algebraic curve taking osculating spaces . . . . . 1023--1026 Naoyuki Horiguchi and Tsuyoshi Miezaki and Hiroyuki Nakasora Erratum to: On the support designs of extremal binary doubly even self-dual codes . . . . . . . . . . . . . . . . . 1027--1028 Torleiv Klòve and Moshe Schwartz Erratum to: Linear covering codes and error-correcting codes for limited-magnitude errors . . . . . . . . 1029--1029
Abhay Kumar Singh and Pramod Kumar Kewat On cyclic codes over the ring $ \mathbb Z_p[u] / \langle u^k \rangle $ . . . . . 1--13 Peipei Dai and Jianmin Wang and Jianxing Yin Two series of equitable symbol weight codes meeting the Plotkin bound . . . . 15--29 Minquan Cheng and Hung-Lin Fu and Jing Jiang and Yuan-Hsun Lo and Ying Miao New bounds on $ \bar {2}$-separable codes of length $2$ . . . . . . . . . . 31--40 Hui Wang and Paul Stankovski and Thomas Johansson A generalized birthday approach for efficiently finding linear relations in $ \ell $-sequences . . . . . . . . . . . 41--57 Eun Ju Cheon and Seon Jeong Kim On the minimum number of points covered by a set of lines in $ {\rm PG}(2, q) $ 59--74 Boris Skori\'c and Jan-Jaap Oosterwijk Binary and $q$-ary Tardos codes, revisited . . . . . . . . . . . . . . . 75--111 Andrés Cordón-Franco and Hans van Ditmarsch and David Fernández-Duque and Fernando Soler-Toscano A geometric protocol for cryptography with cards . . . . . . . . . . . . . . . 113--125 Hengjia Wei and Gennian Ge Spectrum of sizes for perfect $2$-deletion-correcting codes of length $4$ . . . . . . . . . . . . . . . . . . 127--151 Ulrich Dempwolff Symmetric doubly dual hyperovals have an odd rank . . . . . . . . . . . . . . . . 153--157 Antonino Simone and Boris Skori\'c False Negative probabilities in Tardos codes . . . . . . . . . . . . . . . . . 159--182 Cas Cremers and Mich\`ele Feltz Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal . . . . . . . . . . . . . . . . . 183--218 Katherine Jarvis and Monica Nevins ETRU: NTRU over the Eisenstein integers 219--242 Hengjia Wei and Gennian Ge Group divisible designs with block size four and group type $ g^u m^1 $ . . . . 243--282 J. Rif\`a and F. I. Solov'eva and M. Villanueva Erratum to: Intersection of Hamming codes avoiding Hamming subcodes . . . . 283--283
Bocong Chen and Hongwei Liu and Guanghui Zhang A class of minimal cyclic codes over finite fields . . . . . . . . . . . . . 285--300 Tao Feng and Xiaomiao Wang and Yanxun Chang Semi-cyclic holey group divisible designs with block size three . . . . . 301--324 Martin R. Albrecht and Carlos Cid and Jean-Charles Faug\`ere and Robert Fitzpatrick and Ludovic Perret On the complexity of the BKW algorithm on LWE . . . . . . . . . . . . . . . . . 325--354 Yiansheng Yang and Wenchao Cai On self-dual constacyclic codes over finite fields . . . . . . . . . . . . . 355--364 Dragomir Z. \Dbarokovi\'c and Ilias S. Kotsireas Compression of periodic complementary sequences and applications . . . . . . . 365--377 Cristiano Torezzan and João E. Strapasson and Sueli I. R. Costa and Rogerio M. Siqueira Optimum commutative group codes . . . . 379--394 Kwangsu Lee and Jong Hwan Park and Dong Hoon Lee Anonymous HIBE with short ciphertexts: full security in prime order groups . . 395--425 Michel Lavrauw and John Sheekey and Corrado Zanella On embeddings of minimum dimension of $ \mathrm {PG}(n, q) \times \mathrm {PG}(n, q) $ . . . . . . . . . . . . . . 427--440 Hugues Randriam and Lin Sok and Patrick Solé Lower bounds on the minimum distance of long codes in the Lee metric . . . . . . 441--452 R. Alfaro and K. Dhul-Qarnayn Constructing self-dual codes over $ \mathbb {F}_q[u] / (u^t) $ . . . . . . . 453--465 Dong Yang and Wen-Feng Qi and Qun-Xiong Zheng Further results on the distinctness of modulo $2$ reductions of primitive sequences over $ \mathbf {Z} (2^{32} - 1)$ . . . . . . . . . . . . . . . . . . 467--480 Francis H. Hunt and Stephanie Perkins and Derek H. Smith Decoding mixed errors and erasures in permutation codes . . . . . . . . . . . 481--493 Oriol Farr\`as and Carles Padró Extending Brickell--Davenport theorem to non-perfect secret sharing schemes . . . 495--510
Somphong Jitman and San Ling Quasi-abelian codes . . . . . . . . . . 511--531 Xiaogang Liu and Yuan Luo On the bounds and achievability about the ODPC of $ \mathcal {GRM} (2, m)^* $ over prime fields for increasing message length . . . . . . . . . . . . . . . . . 533--557 Javad Doliskani and Éric Schost Computing in degree $ 2^k $-extensions of finite fields of odd characteristic 559--569 Nikolay Yankov and Moon Ho Lee Classification of self-dual codes of length $ 50 $ with an automorphism of odd prime order . . . . . . . . . . . . 571--579 Yu Qing Chen and Tao Feng Paley type sets from cyclotomic classes and Arasu--Dillon-Player difference sets 581--600 Lars Eirik Danielsen and Matthew G. Parker and Constanza Riera On graphs and codes preserved by edge local complementation . . . . . . . . . 601--621 Qiang Li and Xiang Xue Li and Xue Jia Lai and Ke Fei Chen Optimal assignment schemes for general access structures based on linear programming . . . . . . . . . . . . . . 623--644 Kazuhiko Minematsu Building blockcipher from small-block tweakable blockcipher . . . . . . . . . 645--663 Kai-Uwe Schmidt Highly nonlinear functions . . . . . . . 665--672 Suat Karadeniz and Bahattin Yildiz New extremal binary self-dual codes of length $ 64 $ from $ R_3 $-lifts of the extended binary Hamming code . . . . . . 673--680 Hajime Matsui On generator matrices and parity check matrices of generalized integer codes 681--701 Ming Su On the linear complexity of Legendre--Sidelnikov sequences . . . . . 703--717 László Csirmaz Secret sharing on the $d$-dimensional cube . . . . . . . . . . . . . . . . . . 719--729
Xi Jun Lin and Ran Ren and Zhengang Wei and Lin Sun Comment on ``Identity-based non-interactive key distribution with forward security'' . . . . . . . . . . . 1--7 Svetlana Topalova and Stela Zhelezova On point-transitive and transitive deficiency one parallelisms of PG $ (3, 4) $ . . . . . . . . . . . . . . . . . . 9--19 Martianus Frederic Ezerman and Somphong Jitman and Patrick Solé Xing-Ling codes, duals of their subcodes, and good asymmetric quantum codes . . . . . . . . . . . . . . . . . 21--42 Chengju Li and Qin Yue and Yiwei Huang Two families of nearly optimal codebooks 43--57 Nelly Fazio and Kevin Iga and Antonio R. Nicolosi and Ludovic Perret and William E. Skeith III Hardness of learning problems over Burnside groups of exponent $3$ . . . . 59--70 Michael E. Zieve Planar functions and perfect nonlinear monomials over finite fields . . . . . . 71--80 Mladen Kovacevi\'c and Dejan Vukobratovi\'c Perfect codes in the discrete simplex 81--95 Thomas Britz and Keisuke Shiromoto and Thomas Westerbäck Demi-matroids from codes over finite Frobenius rings . . . . . . . . . . . . 97--107 Kenneth W. Shum Optimal three-dimensional optical orthogonal codes of weight three . . . . 109--126 Zihui Liu and Xin-Wen Wu On relative constant-weight codes . . . 127--144 S. Ugolini Sequences of irreducible polynomials without prescribed coefficients over odd prime fields . . . . . . . . . . . . . . 145--155 Hongyu Han and Daiyuan Peng and Xing Liu New lower bounds on the aperiodic Hamming correlations of frequency hopping sequences with low hit zone . . 157--174 Peter Horak and Zsolt Tuza Speeding up deciphering by hypergraph ordering . . . . . . . . . . . . . . . . 175--185
Chih-Yen Yang and Chung-Chin Lu One-point Klein codes and their serial-in-serial-out systematic encoding 187--197 Zhen Ma and Wen-Feng Qi and Tian Tian On affine sub-families of the NFSR in Grain . . . . . . . . . . . . . . . . . 199--212 Antonio Cossidente A new family of relative hemisystems on the Hermitian surface . . . . . . . . . 213--221 N. A. Newman $4$-Cycle decompositions of $ (\lambda + m) K_{v + u \setminus } \lambda K_v$ . . 223--235 Eric Swartz A construction of a partial difference set in the extraspecial groups of order $ p^3 $ with exponent $ p^2 $ . . . . . 237--242 Javier de la Cruz On extremal self-dual codes of length $ 120 $ . . . . . . . . . . . . . . . . . 243--252 Sunghyu Han A method for constructing self-dual codes over $ \mathbb {Z}_{2^m} $ . . . . 253--262 Dabin Zheng and Xiaoqiang Wang and Xiangyong Zeng and Lei Hu The weight distribution of a family of $p$-ary cyclic codes . . . . . . . . . . 263--275 Yuuki Kageyama and Tatsuya Maruta On the construction of Griesmer codes of dimension $5$ . . . . . . . . . . . . . 277--280 Elodie Leducq Functions which are PN on infinitely many extensions of $ \mathbb{F}_p, p $ odd . . . . . . . . . . . . . . . . . . 281--299 Samrith Ram Enumeration of linear transformation shift registers . . . . . . . . . . . . 301--314 A. J. van Zanten and A. Bojilov and S. M. Dodunekov Generalized residue and $t$-residue codes and their idempotent generators 315--334 Elisa Gorla and Maike Massierer Point compression for the trace zero subgroup over a small degree extension field . . . . . . . . . . . . . . . . . 335--357
Gabriela Olteanu and Inneke Van Gelder Construction of minimal non-abelian left group codes . . . . . . . . . . . . . . 359--373 Yupeng Jiang and Yingpu Deng New results on nonexistence of generalized bent functions . . . . . . . 375--385 Yeow Meng Chee and Gennian Ge and Hui Zhang and Xiande Zhang Hanani triple packings and optimal $q$-ary codes of constant weight three 387--403 Josep Rif\`a and Faina I. Solov'eva and Merc\`e Villanueva Self-embeddings of Hamming Steiner triple systems of small order and APN permutations . . . . . . . . . . . . . . 405--427 Tomas Nilson and Lars-Daniel Öhman Triple arrays and Youden squares . . . . 429--451 Peter Vandendriessche On small line sets with few odd-points 453--463 Maarten De Boeck The largest Erd\Hos--Ko--Rado sets in $ 2 - (v, k, 1) $ designs . . . . . . . . 465--481 Gook Hwa Cho and Namhun Koo and Eunhye Ha and Soonhak Kwon New cube root algorithm based on the third order linear recurrence relations in finite fields . . . . . . . . . . . . 483--495 Ingo Janiszczak and Wolfgang Lempken and Patric R. J. Östergård and Reiner Staszewski Permutation codes invariant under isometries . . . . . . . . . . . . . . . 497--507 Yutaka Hiramine and Chihiro Suetake Difference matrices related to Sophie Germain primes $p$ using functions on the fields $ F_{2 p + 1}$ . . . . . . . 509--518 Antonino Simone and Boris Skori\'c False positive probabilities in $q$-ary Tardos codes: comparison of attacks . . 519--542 Heide Gluesing-Luerssen Fourier-reflexive partitions and MacWilliams identities for additive codes . . . . . . . . . . . . . . . . . 543--563 Adeline Langlois and Damien Stehlé Worst-case to average-case reductions for module lattices . . . . . . . . . . 565--599
I. Kotsireas and Edgar Martínez-Moro Foreword: Computer Algebra in Coding Theory and Cryptography . . . . . . . . 1--2 Merc\`e Villanueva and Fanxuan Zeng and Jaume Pujol Efficient representation of binary nonlinear codes: constructions and minimum distance computation . . . . . . 3--21 Natalia Dück and Karl-Heinz Zimmermann Heuristic decoding of linear codes using commutative algebra . . . . . . . . . . 23--35 Tom Hòholdt and Fernando Piñero and Peng Zeng Optimal codes as Tanner codes with cyclic component codes . . . . . . . . . 37--47 Olav Geil and Stefano Martin An improvement of the Feng--Rao bound for primary codes . . . . . . . . . . . 49--79 Wilson Olaya-León and Claudia Granados-Pinzón The second generalized Hamming weight of certain Castle codes . . . . . . . . . . 81--87 Carlos Galindo and Fernando Hernando Quantum codes from affine variety codes and their subfield-subcodes . . . . . . 89--100 Carlos Munuera Hamming codes for wet paper steganography . . . . . . . . . . . . . 101--111 Thomas W. Cusick and Bryan Johns Theory of $2$-rotation symmetric cubic Boolean functions . . . . . . . . . . . 113--133
Mauro Biliotti and Alessandro Montinaro and Eliana Francot 2- $ (v, k, 1) $ Designs with a point-primitive rank 3 automorphism group of affine type . . . . . . . . . . 135--171 Ferruh Özbudak and Seher Tutdere and Oguz Yayla On some bounds on the minimum distance of cyclic codes over finite fields . . . 173--178 Jooyoung Lee and Martijn Stam MJH: a faster alternative to MDC-2 . . . 179--205 Tamás Héger and Balázs Patkós and Marcella Takáts Search problems in vector spaces . . . . 207--216 T. Shaska and C. Shor Theta functions and symmetric weight enumerators for codes over imaginary quadratic fields . . . . . . . . . . . . 217--235 D. Best and H. Kharaghani and H. Ramp Mutually unbiased weighing matrices . . 237--256 Edward Dobson Monomial isomorphisms of cyclic codes 257--267 José Joaquín Bernal and Joaquim Borges and Cristina Fernández-Córdoba and Merc\`e Villanueva Permutation decoding of $ \mathbb{Z}_2 \mathbb{Z}_4$-linear codes . . . . . . . 269--277 Jiao Li and Claude Carlet and Xiangyong Zeng and Chunlei Li and Lei Hu and Jinyong Shan Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks 279--305 Eric Zhi Chen A new iterative computer search algorithm for good quasi-twisted codes 307--323 Thomas Plantard and Willy Susilo and Zhenfei Zhang LLL for ideal lattices: re-evaluation of the security of Gentry--Halevi's FHE scheme . . . . . . . . . . . . . . . . . 325--344 Sihuang Hu and Shuxing Li and Tao Zhang and Tao Feng and Gennian Ge New pseudo-planar binomials in characteristic two and related schemes 345--360 Yuan-Hsun Lo and Hung-Lin Fu and Yi-Hean Lin Weighted maximum matchings and optimal equi-difference conflict-avoiding codes 361--372
Masaaki Harada On a $5$-design related to a putative extremal doubly even self-dual code of length a multiple of $ 24$ . . . . . . . 373--384 Guo-Qiang Liu and Chen-Hui Jin Differential cryptanalysis of PRESENT-like cipher . . . . . . . . . . 385--408 Bangteng Xu Bentness and nonlinearity of functions on finite groups . . . . . . . . . . . . 409--430 Orr Dunkelman and Nathan Keller and Adi Shamir Almost universal forgery attacks on AES-based MAC's . . . . . . . . . . . . 431--449 S. G. Barwick and Wen-Ai Jackson An investigation of the tangent splash of a subplane of $ \mathrm {PG}(2, q^3) $ . . . . . . . . . . . . . . . . . . . 451--468 Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama Strongly secure authenticated key exchange from factoring, codes, and lattices . . . . . . . . . . . . . . . . 469--504 Tung Le and Jamshid Moori On the automorphisms of designs constructed from finite simple groups 505--517 Steven Dougherty and Jon-Lark Kim and Yoonjin Lee Codes over rings and Hermitian lattices 519--535 Oktay Olmez Plateaued functions and one-and-half difference sets . . . . . . . . . . . . 537--549 Anthony B. Evans and David Fear and Rebecca J. Stones Diagonally cyclic equitable rectangles 551--569 Claude Carlet and Deng Tang Enhanced Boolean functions suitable for the filter model of pseudo-random generator . . . . . . . . . . . . . . . 571--587 Hengjia Wei and Hui Zhang and Gennian Ge Completely reducible super-simple designs with block size five and index two . . . . . . . . . . . . . . . . . . 589--600 Orr Dunkelman and Nathan Keller Practical-time attacks against reduced variants of MISTY1 . . . . . . . . . . . 601--627
Yan Liu and Haode Yan and Chunlei Liu A class of six-weight cyclic codes and their weight distribution . . . . . . . 1--9 Jiqiang Lu A methodology for differential-linear cryptanalysis and its applications . . . 11--48 Anamari Naki\'c and Mario Osvin Pavcevi\'c Tactical decompositions of designs over finite fields . . . . . . . . . . . . . 49--60 Ryo Nishimaki and Keita Xagawa Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES . . . . . . . . . . . . . 61--98 Sihem Mesnager Bent vectorial functions and linear codes from $o$-polynomials . . . . . . . 99--116 Deng Tang and Claude Carlet and Xiaohu Tang Differentially $4$-uniform bijections by permuting the inverse function . . . . . 117--141 Sungwook Kim and Jung Hee Cheon Fixed argument pairing inversion on elliptic curves . . . . . . . . . . . . 143--152 Yonglin Cao and Jian Gao and Fang-Wei Fu Semisimple multivariable $ \mathbb {F}_q $-linear codes over $ \mathbb {F}_{q^l} $ . . . . . . . . . . . . . . . . . . . 153--177 Haibo Hong and Licheng Wang and Yixian Yang Minimal logarithmic signatures for the unitary group $ U_n(q) $ . . . . . . . . 179--191 Jianfa Qian and Lina Zhang Entanglement-assisted quantum codes from arbitrary binary linear codes . . . . . 193--202 Stefaan De Winter and Sara Rottey and Geertrui Van de Voorde Linear representations of subgeometries 203--215 Jingjun Bao and Lijun Ji The completion determination of optimal $ (3, 4)$-packings . . . . . . . . . . . 217--229 Santanu Sarkar and Sourav Sen Gupta and Goutam Paul Proving TLS-attack related open biases of RC4 . . . . . . . . . . . . . . . . . 231--253 Min Zeng and Yuan Luo and Guang Gong Sequences with good correlation property based on depth and interleaving techniques . . . . . . . . . . . . . . . 255--275 Fabio Enrique Brochero Martínez Explicit factorization of $ x^{n - 1} \in \mathbb {F}_q[x] $ . . . . . . . . . 277--286
Ian Blake and Alfred Menezes and Doug Stinson Guest Editorial: Special Issue in Honor of Scott A. Vanstone . . . . . . . . . . 287--299 Chuan Guo and Douglas R. Stinson and Tran van Trung On tight bounds for binary frameproof codes . . . . . . . . . . . . . . . . . 301--319 Charles C. Lindner and Mariusz Meszka and Alexander Rosa Almost $2$-perfect $6$-cycle systems . . 321--333 Dirk Hachenberger Primitive normal bases for quartic and cubic extensions: a geometric approach 335--350 Ryoh Fuji-Hara Perfect hash families of strength three with three rows from varieties on finite projective geometries . . . . . . . . . 351--356 Kevin Phelps Enumeration of Kerdock codes of length $ 64 $ . . . . . . . . . . . . . . . . . . 357--363 Dieter Jungnickel and Vladimir D. Tonchev Maximal arcs and quasi-symmetric designs 365--374 Thijs Laarhoven and Michele Mosca and Joop van de Pol Finding shortest lattice vectors faster using quantum search . . . . . . . . . . 375--400 Sonia Chiasson and P. C. van Oorschot Quantifying the security advantage of password expiration policies . . . . . . 401--408 D. S. Archdeacon and J. H. Dinitz and D. M. Donovan Square integer Heffter arrays with empty cells . . . . . . . . . . . . . . . . . 409--426 Alice Silverberg and Yuri G. Zarhin Isogenies of abelian varieties over finite fields . . . . . . . . . . . . . 427--439 Beno\^\it Libert and Thomas Peters and Marc Joye and Moti Yung Linearly homomorphic structure-preserving signatures and their applications . . . . . . . . . . . 441--477 Yeow Meng Chee and Charles J. Colbourn and Alan Chi Hung Ling Optimal low-power coding for error correction and crosstalk avoidance in on-chip data buses . . . . . . . . . . . 479--491 Michael Düll and Björn Haase and Gesine Hinterwälder High-speed Curve25519 on $8$-bit, $ 16$-bit, and $ 32$-bit microcontrollers 493--514 E. L. Roettger and H. C. Williams and R. K. Guy Some primality tests that eluded Lucas 515--539 Jeffrey Hoffstein and Joseph H. Silverman PASS-Encrypt: a public key cryptosystem based on partial evaluation of polynomials . . . . . . . . . . . . . . 541--552 E. R. Lamken The asymptotic existence of DR$ (v, k, k - 1) $ $ (v, k, k - 1)$-BIBDs . . . . . 553--562 Liang Feng Zhang and Reihaneh Safavi-Naini Batch verifiable computation of outsourced functions . . . . . . . . . . 563--585 Neal Koblitz and Alfred J. Menezes The random oracle model: a twenty-year retrospective . . . . . . . . . . . . . 587--610 Elena Andreeva and Bart Mennink and Bart Preneel Open problems in hash function security 611--631 Itai Dinur and Orr Dunkelman and Nathan Keller and Adi Shamir Reflections on slide with a twist attacks . . . . . . . . . . . . . . . . 633--651 Gary McGuire and Emrah Sercan Yilmaz Further results on the number of rational points of hyperelliptic supersingular curves in characteristic 2 653--662 Ueli Maurer Zero-knowledge proofs of knowledge for group homomorphisms . . . . . . . . . . 663--676 Gerhard Frey and Ernst Kani Normal forms of hyperelliptic curves of genus $3$ . . . . . . . . . . . . . . . 677--712 Peter Landrock Power map permutations and the discrete log problem . . . . . . . . . . . . . . 713--724 Tatsuaki Okamoto and Katsuyuki Takashima Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption . . . . 725--771
Dieter Jungnickel and Jennifer Key and Chris Mitchell Editorial for the 25th anniversary issue 1--3 Claude Carlet and Sihem Mesnager Four decades of research on bent functions . . . . . . . . . . . . . . . 5--50 Steven D. Galbraith and Pierrick Gaudry Recent progress on the elliptic curve discrete logarithm problem . . . . . . . 51--72 Antoine Joux and Cécile Pierrot Technical history of discrete logarithms in small characteristic finite fields 73--85 Neal Koblitz and Alfred J. Menezes Cryptocash, cryptocurrencies, and cryptocontracts . . . . . . . . . . . . 87--102 Siaw-Lynn Ng and Maura Beth Paterson Disjoint difference families and their applications . . . . . . . . . . . . . . 103--127 Harald Niederreiter A survey of some applications of finite fields . . . . . . . . . . . . . . . . . 129--139 Alexander Pott Almost perfect and planar functions . . 141--195 Lucia Moura and Gary L. Mullen and Daniel Panario Finite field constructions of combinatorial arrays . . . . . . . . . . 197--219 Daniel M. Gordon and Bernhard Schmidt A survey of the multiplier conjecture 221--236 Kai-Uwe Schmidt Sequences with small correlation . . . . 237--267 Christina Fragouli and Emina Soljanin (Secure) Linear network coding multicast 269--310 T. Etzion and L. Storme Galois geometries and coding theory . . 311--350 Anne Broadbent and Christian Schaffner Quantum cryptography beyond quantum key distribution . . . . . . . . . . . . . . 351--382
Michael Braun $q$-Analogs of $t$-wise balanced designs from Borel subgroups . . . . . . . . . . 383--390 Longjiang Qu and Yin Tan and Chao Li and Guang Gong More constructions of differentially $4$-uniform permutations on $ \mathbb {F}_{2^{2k}}$ . . . . . . . . . . . . . 391--408 Natalia Silberstein and Anna Gál Optimal combinatorial batch codes based on block designs . . . . . . . . . . . . 409--424 Christina Delfs and Steven D. Galbraith Computing isogenies between supersingular elliptic curves over $ \mathbb {F}_p $ . . . . . . . . . . . . 425--440 Özgür Dagdelen and David Galindo and Pascal Véron Extended security arguments for signature schemes . . . . . . . . . . . 441--461 Sho Suda A two-fold cover of strongly regular graphs with spreads and association schemes of class five . . . . . . . . . 463--471 Adonus L. Madison and Junhua Wu Conics arising from external points and their binary codes . . . . . . . . . . . 473--491 Yu Chen and Jiang Zhang and Dongdai Lin and Zhenfeng Zhang Generic constructions of integrated PKE and PEKS . . . . . . . . . . . . . . . . 493--526 Antonio Cossidente and Francesco Pavese On subspace codes . . . . . . . . . . . 527--531 Di Wu and Wenfeng Qi and Huajin Chen On the spectral immunity of periodic sequences restricted to binary annihilators . . . . . . . . . . . . . . 533--545 Praveen Gauravaram and Nasour Bagheri and Lars R. Knudsen Building indifferentiable compression functions from the PGV compression functions . . . . . . . . . . . . . . . 547--581
Michel Lavrauw and John Sheekey On BEL-configurations and finite semifields . . . . . . . . . . . . . . . 583--603 Florian Caullery and Kai-Uwe Schmidt and Yue Zhou Exceptional planar polynomials . . . . . 605--613 Martin Steinbach and Dirk Hachenberger A class of quaternary linear codes improving known minimum distances . . . 615--627 Claude Carlet and Guang Gong and Yin Tan Quadratic zero-difference balanced functions, APN functions and strongly regular graphs . . . . . . . . . . . . . 629--654 Jan De Beule and Jeroen Demeyer and Klaus Metsch and Morgan Rodgers A new family of tight sets in $ \mathcal {Q}^+(5, q) $ . . . . . . . . . . . . . 655--678 Yuan-Hsun Lo and Wing Shing Wong and Hung-Lin Fu Partially user-irrepressible sequence sets and conflict-avoiding codes . . . . 679--691 Javier de la Cruz and Michael Kiermaier and Alfred Wassermann The automorphism group of an extremal $ [120, 60, 24] $ code does not contain elements of order $ 29 $ . . . . . . . . 693--702 Anonymous Weight enumerator of some irreducible cyclic codes . . . . . . . . . . . . . . ??
Andrea Montanari Effective compression maps for torus-based cryptography . . . . . . . . 1--17 Lijun Ji and Zhengwu Dong Existence of optimal strong partially balanced $3$-designs with block size four . . . . . . . . . . . . . . . . . . 19--36 Tsuyoshi Miezaki and Hiroyuki Nakasora An upper bound of the value of $t$ of the support $t$-designs of extremal binary doubly even self-dual codes . . . 37--46 Heide Gluesing-Luerssen The homogeneous weight partition and its character-theoretic dual . . . . . . . . 47--61 Jong Hwan Park and Dong Hoon Lee An efficient IBE scheme with tight security reduction in the random oracle model . . . . . . . . . . . . . . . . . 63--85 Jean-Charles Faug\`ere and Ayoub Otmani and Ludovic Perret and Frédéric de Portzamparc and Jean-Pierre Tillich Structural cryptanalysis of McEliece schemes with compact keys . . . . . . . 87--112 Dean Crnkovi\'c and Sanja Rukavina Self-dual codes from extended orbit matrices of symmetric designs . . . . . 113--120 Kwangsu Lee Self-updatable encryption with short public parameters and its extensions . . 121--161 Binod Kumar Sahoo and N. S. Narasimha Sastry Binary codes of the symplectic generalized quadrangle of even order . . 163--170 Stefka Bouyuklieva and Wolfgang Willems and Nikolay Yankov On the automorphisms of order $ 15 $ for a binary self-dual $ [96, 48, 20] $ code 171--182 Jürgen Bierbrauer Projective polynomials, a projection construction and a family of semifields 183--200
Eimear Byrne and Alison Sneyd Two-weight codes, graphs and orthogonal arrays . . . . . . . . . . . . . . . . . 201--217 B. Compton and R. Craigen and W. de Launey Unreal $ B H(n, 6) $'s and Hadamard matrices . . . . . . . . . . . . . . . . 219--229 Ibrahim Özen Generalized weights and the Ball--Blokhuis congruence . . . . . . . 231--235 Dustin Moody and Souradyuti Paul and Daniel Smith-Tone Improved indifferentiability security bound for the JH mode . . . . . . . . . 237--259 Martin R. Albrecht and Jean-Charles Faug\`ere and Pooya Farshim and Gottfried Herold and Ludovic Perret Polly Cracker, revisited . . . . . . . . 261--302 Jing Jiang and Minquan Cheng and Ying Miao Strongly separable codes . . . . . . . . 303--318 Yutaka Hiramine On automorphism groups of divisible designs acting regularly on the set of point classes . . . . . . . . . . . . . 319--335 Seyed Hassan Alavi and Mohsen Bayat and Ashraf Daneshkhah Symmetric designs admitting flag-transitive and point-primitive automorphism groups associated to two dimensional projective special groups 337--351 Yan Liu and Haode Yan A class of five-weight cyclic codes and their weight distribution . . . . . . . 353--366 Yijin Zhang and Yuan-Hsun Lo and Wing Shing Wong Optimal strongly conflict-avoiding codes of even length and weight three . . . . 367--382 Igor Semaev MaxMinMax problem and sparse equations over finite fields . . . . . . . . . . . 383--404
Dina Ghinelli and Dieter Jungnickel and Michel Lavrauw and Alexander Pott Editorial: Finite geometries . . . . . . 405--406 Anamari Naki\'c and Leo Storme On the extendability of particular classes of constant dimension codes . . 407--422 Ayhan Cosgun and Ferruh Özbudak and Zülfükar Saygi Further results on rational points of the curve $ y^{q^n} - y = \gamma x^{q^h + 1} - \alpha $ over $ \mathbb {F}_{q^m} $ . . . . . . . . . . . . . . . . . . . 423--441 Gábor Korchmáros and Gábor P. Nagy $3$-Nets realizing a diassociative loop in a projective plane . . . . . . . . . 443--449 Peter Beelen and Fernando Piñero The structure of dual Grassmann codes 451--470 Stefaan De Winter and Ellen Kamischke and Zeying Wang Automorphisms of strongly regular graphs with applications to partial difference sets . . . . . . . . . . . . . . . . . . 471--485 Daniele Bartoli and Massimo Giulietti and Giovanni Zini Complete $ (k, 3)$-arcs from quartic curves . . . . . . . . . . . . . . . . . 487--505 Bart De Bruyn Hyperplanes of Hermitian dual polar spaces of rank $3$ containing a quad . . 507--533 Ivan Landjev and Assia Rousseva and Leo Storme On the extendability of quasidivisible Griesmer arcs . . . . . . . . . . . . . 535--547 Neil I. Gillespie and Michael Giudici and Daniel R. Hawtin and Cheryl E. Praeger Entry-faithful $2$-neighbour transitive codes . . . . . . . . . . . . . . . . . 549--564 Katharina Kusejko Simultaneous diagonalization of conics in $ P G(2, q) $ . . . . . . . . . . . . 565--581 Anton Betten The packings of $ \mathrm {PG}(3, 3) $ 583--595 Antonio Cossidente and Giuseppe Marino and Francesco Pavese Non-linear maximum rank distance codes 597--609 Alice M. W. Hui Extending some induced substructures of an inversive plane . . . . . . . . . . . 611--617 Benjamin C. Cooper and Tim Penttila Transitive hyperovals . . . . . . . . . 619--623 Szabolcs L. Fancsali and Péter Sziklai Higgledy-piggledy subspaces and uniform subspace designs . . . . . . . . . . . . 625--645
Eric Zhi Chen New binary $h$-generator quasi-cyclic codes by augmentation and new minimum distance bounds . . . . . . . . . . . . 1--10 José Moreira and Marcel Fernández and Grigory Kabatiansky Almost separating and almost secure frameproof codes over $q$-ary alphabets 11--28 Dennis Hofheinz and Tibor Jager Tightly secure signatures and public-key encryption . . . . . . . . . . . . . . . 29--61 Igor E. Shparlinski On small gaps between the elements of multiplicative subgroups of finite fields . . . . . . . . . . . . . . . . . 63--71 Jonathan Jedwab and Amy Wiebe Constructions of complex equiangular lines from mutually unbiased bases . . . 73--89 Denis S. Krotov Perfect codes in Doob graphs . . . . . . 91--102 Fuchun Guo and Willy Susilo and Yi Mu Generalized closest substring encryption 103--124 Alexander A. Davydov and Giorgio Faina and Massimo Giulietti and Stefano Marcugini and Fernanda Pambianco On constructions and parameters of symmetric configurations $ v_k $ . . . . 125--147 Yanling Chen and Markku Niemenmaa and A. J. Han Vinck A general check digit system based on finite groups . . . . . . . . . . . . . 149--163 Sabyasachi Dutta and Raghvendra Singh Rohit and Avishek Adhikari Constructions and analysis of some efficient $t$-$ (k, n)^*$-visual cryptographic schemes using linear algebraic techniques . . . . . . . . . . 165--196 Alberto Ravagnani Rank-metric codes and their duality theory . . . . . . . . . . . . . . . . . 197--216
Xiang-dong Hou and Ferruh Özbudak and Yue Zhou Switchings of semifield multiplications 217--239 Udo Ott On Jacobi sums, difference sets and partial difference sets in Galois domains . . . . . . . . . . . . . . . . 241--281 Kohei Yamada and Nobuko Miyamoto A construction and decomposition of orthogonal arrays with non-prime-power numbers of symbols on the complement of a Baer subplane . . . . . . . . . . . . 283--294 Chengju Li and Qin Yue and Fang-Wei Fu Complete weight enumerators of some cyclic codes . . . . . . . . . . . . . . 295--315 S. G. Barwick and Wen-Ai Jackson Characterising pointsets in $ \mathrm {{PG}}(4, q) $ that correspond to conics 317--332 Yarkin Doröz and Yin Hu and Berk Sunar Homomorphic AES evaluation using the modified LTV scheme . . . . . . . . . . 333--358 Carl Löndahl and Thomas Johansson and Masoumeh Koochak Shooshtari and Mahmoud Ahmadian-Attari and Mohammad Reza Aref Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension . . . . . . . . . . . 359--377 Aysegul Bayram and Elif Segah Oztas and Irfan Siap Codes over $ F_4 + v F_4 $ and some DNA applications . . . . . . . . . . . . . . 379--393 Marion Candau and Roland Gautier and Johannes Huisman Convolutional block codes with cryptographic properties over the semi-direct product $ \mathbb {Z} / N \mathbb {Z} \rtimes \mathbb {Z} / M \mathbb {Z} $ . . . . . . . . . . . . . 395--407 Kai-Uwe Schmidt and Jürgen Willms Barker sequences of odd length . . . . . 409--414 John Sheekey Dimensional dual hyperovals in classical polar spaces . . . . . . . . . . . . . . 415--420
Jason T. LeGrow and David A. Pike and Jonathan Poulin Hamiltonicity and cycle extensions in $0$-block-intersection graphs of balanced incomplete block designs . . . 421--433 Kathleen Nowak and Oktay Olmez Partial geometric designs with prescribed automorphisms . . . . . . . . 435--451 E. Ballico Non-special subsets of the set of points of a curve defined over a finite field 453--457 Rongjia Li and Chenhui Jin Meet-in-the-middle attacks on $ 10$-round AES-256 . . . . . . . . . . . 459--471 Ga Won Lee and Jin Hong Comparison of perfect table cryptanalytic tradeoff algorithms . . . 473--523 Junqing Gong and Zhenfu Cao and Shaohua Tang and Jie Chen Extended dual system group and shorter unbounded hierarchical identity based encryption . . . . . . . . . . . . . . . 525--559 Adel Alahmadi and Hussain Alhazmi and Tor Helleseth and Rola Hijazi and Najat Muthana and Patrick Solé On the lifted Zetterberg code . . . . . 561--576 Dirk Hachenberger Asymptotic existence results for primitive completely normal elements in extensions of Galois fields . . . . . . 577--586 Jian Guo and Jérémy Jean and Ivica Nikoli\'c and Yu Sasaki Extended meet-in-the-middle attacks on some Feistel constructions . . . . . . . 587--618 Juan Carlos Ku-Cauich and Guillermo Morales-Luna Authentication codes based on resilient Boolean maps . . . . . . . . . . . . . . 619--633 Rebecca J. Stones and Ming Su and Xiaoguang Liu and Gang Wang and Sheng Lin A Latin square autotopism secret sharing scheme . . . . . . . . . . . . . . . . . 635--650
Haode Yan and Chunlei Liu Two classes of cyclic codes and their weight enumerator . . . . . . . . . . . 1--9 Michelle Kendall and Keith M. Martin Graph-theoretic design and analysis of key predistribution schemes . . . . . . 11--34 Aida Abiad and Willem H. Haemers Switched symplectic graphs and their $2$-ranks . . . . . . . . . . . . . . . 35--41 Shantian Cheng and Khoa Nguyen and Huaxiong Wang Policy-based signature scheme from lattices . . . . . . . . . . . . . . . . 43--74 Matan Banin and Boaz Tsaban A reduction of Semigroup DLP to classic DLP . . . . . . . . . . . . . . . . . . 75--82 Ciaran Mullan and Boaz Tsaban $ {\rm SL}_2 $ homomorphic hash functions: worst case to average case reduction and short collision search . . 83--107 Chun Guo and Dongdai Lin Separating invertible key derivations from non-invertible ones: sequential indifferentiability of $3$-round Even--Mansour . . . . . . . . . . . . . 109--129 John Bamberg and Melissa Lee and Eric Swartz A note on relative hemisystems of Hermitian generalised quadrangles . . . 131--144 Michael Braun New infinite series of $2$-designs over the binary and ternary field . . . . . . 145--152 Chengju Li and Sunghan Bae and Jaehyun Ahn and Shudi Yang and Zheng-An Yao Complete weight enumerators of some linear codes and their applications . . 153--168 Trygve Johnsen and Keisuke Shiromoto and Hugues Verdure A generalization of Kung's theorem . . . 169--178
Alfredo Rial Blind attribute-based encryption and oblivious transfer with fine-grained access control . . . . . . . . . . . . . 179--223 Yan Liu and Chunlei Liu A class of cyclic codes whose duals have five zeros . . . . . . . . . . . . . . . 225--238 Boran Kim and Yoonjin Lee Construction of extremal self-dual codes over $ {\mathbb {Z}}_8 $ and $ {\mathbb {Z}}_{16} $ . . . . . . . . . . . . . . 239--257 László Mérai and Arne Winterhof On the linear complexity profile of some sequences derived from elliptic curves 259--267 Bence Csajbók and Corrado Zanella On the equivalence of linear sets . . . 269--281 Zhengchun Zhou and Nian Li and Cuiling Fan and Tor Helleseth Linear codes with two or three weights from quadratic Bent functions . . . . . 283--295 Zihui Liu and Xin-Wen Wu The fullrank value function . . . . . . 297--315 Minquan Cheng and Jing Jiang and Haiyan Li and Ying Miao and Xiaohu Tang Bounds and constructions for $ {\overline {3}}$-separable codes with length $3$ . . . . . . . . . . . . . . . 317--335 Wilfried Meidl and Harald Niederreiter Multisequences with high joint nonlinear complexity . . . . . . . . . . . . . . . 337--346 Steven T. Dougherty and Cristina Fernández-Córdoba Kernels and ranks of cyclic and negacyclic quaternary codes . . . . . . 347--364 R. Julian R. Abel and Robert F. Bailey and Andrea C. Burgess and Peter Danziger and Eric Mendelsohn On generalized Howell designs with block size three . . . . . . . . . . . . . . . 365--391
Yanfeng Wang and Wenling Wu New criterion for diffusion property and applications to improved GFS and EGFN 393--412 Abdulla Eid and Hilaf Hasson and Amy Ksir and Justin Peachey Suzuki-invariant codes from the Suzuki curve . . . . . . . . . . . . . . . . . 413--425 Cícero Carvalho and Rafael Peixoto and Fernando Torres Near weights on higher dimensional varieties . . . . . . . . . . . . . . . 427--443 Antonio Cossidente and Francesco Pavese Veronese subspace codes . . . . . . . . 445--457 Daqing Wan and Qiang Wang Index bounds for character sums of polynomials over finite fields . . . . . 459--468 Yuuki Kageyama and Tatsuya Maruta On the geometric constructions of optimal linear codes . . . . . . . . . . 469--480 Xiaoqin Zhan and Shenglin Zhou Flag-transitive non-symmetric $2$-designs with $ (r, \lambda) = 1 $ and sporadic socle . . . . . . . . . . . 481--487 Sanming Zhou Total perfect codes in Cayley graphs . . 489--504 Yanbin Zheng and Pingzhi Yuan and Dingyi Pei Large classes of permutation polynomials over $ \mathbb {F}_{q^2} $ . . . . . . . 505--521 Huaifeng Chen and Tingting Cui and Meiqin Wang Improving algorithm 2 in multidimensional (zero-correlation) linear cryptanalysis using $ \chi^2$-method . . . . . . . . . . . . . 523--540 Hyun Jin Kim and Yoonjin Lee Complementary information set codes over $ {\rm GF}(p) $ . . . . . . . . . . . . 541--555
Pascale Charpin and Thomas Johansson and Gohar Kyureghyan and Nicolas Sendrier and Jean-Pierre Tillich Editorial: Special issue on coding and cryptography . . . . . . . . . . . . . . 1--2 Christina Boura and Anne Canteaut and Lars R. Knudsen and Gregor Leander Reflection ciphers . . . . . . . . . . . 3--25 Sondre Rònjom Improving algebraic attacks on stream ciphers based on linear feedback shift register over $ \mathbb {F}_{2^k} $ . . 27--41 Pavol Zajac Upper bounds on the complexity of algebraic cryptanalysis of ciphers with a low multiplicative complexity . . . . 43--56 Serhii Dyshko MacWilliams Extension Theorem for MDS codes over a vector space alphabet . . . 57--67 Sergey Bezzateev and Natalia Shekhunova Lower bound of covering radius of binary irreducible Goppa codes . . . . . . . . 69--76 Kishan Chand Gupta and Sumit Kumar Pandey and Ayineedi Venkateswarlu On the direct construction of recursive MDS matrices . . . . . . . . . . . . . . 77--94 Kaushik Chakraborty and Sumanta Sarkar and Subhamoy Maitra and Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Emmanuel Prouff Redefining the transparency order . . . 95--115 Marine Minier Improving impossible-differential attacks against Rijndael-160 and Rijndael-224 . . . . . . . . . . . . . . 117--129 Santanu Sarkar and Ayineedi Venkateswarlu Revisiting (nested) Roos bias in RC4 key scheduling algorithm . . . . . . . . . . 131--148 Srimanta Bhattacharya and Sumanta Sarkar On some permutation binomials and trinomials over $ \mathbb {F}_{2^n} $ 149--160 Mehdi Tibouchi and Taechan Kim Improved elliptic curve hashing and point representation . . . . . . . . . . 161--177 Kishan Chand Gupta and Sumit Kumar Pandey and Ayineedi Venkateswarlu Towards a general construction of recursive MDS diffusion layers . . . . . 179--195 A. G. D'yachkov and I. V. Vorobyev and N. A. Polyanskii and V. Yu. Shchukin Cover-free codes and separating system codes . . . . . . . . . . . . . . . . . 197--209 A. G. D'yachkov and I. V. Vorobyev and N. A. Polyanskii and V. Yu. Shchukin Symmetric disjunctive list-decoding codes . . . . . . . . . . . . . . . . . 211--229 Arkadii D'yachkov and Ilya Vorobyev and Nikita Polyanskii and Vladislav Shchukin Almost cover-free codes and designs . . 231--247 Cem Güneri and Ferruh Özbudak and Funda Özdemir Hasse--Weil bound for additive cyclic codes . . . . . . . . . . . . . . . . . 249--263 Nurdagül Anbar and Wilfried Meidl and Alev Topuzoglu Idempotent and $p$-potent quadratic functions: distribution of nonlinearity and co-dimension . . . . . . . . . . . . 265--291 Vladimir Gritsenko and Grigory Kabatiansky and Vladimir Lebedev and Alexey Maevskiy Signature codes for noisy multiple access adder channel . . . . . . . . . . 293--299 Jeremy Maitin-Shepard Optimal software-implemented Itoh--Tsujii inversion for $ \mathbb {F}_{2^m} $ . . . . . . . . . . . . . . 301--318
Jerod Michel and Baokun Ding A generalization of combinatorial designs and related codes . . . . . . . 511--529 Yupeng Jiang and Dongdai Lin On affine sub-families of Grain-like structures . . . . . . . . . . . . . . . 531--542 Yun Fan and Bangteng Xu Fourier transforms and bent functions on faithful actions of finite abelian groups . . . . . . . . . . . . . . . . . 543--558 Kaoru Kurosawa and Hiroyuki Ohta and Kenji Kakuta How to make a linear network code (strongly) secure . . . . . . . . . . . 559--582 Shuxing Li and Hengjia Wei and Gennian Ge Generic constructions for partitioned difference families with applications: a unified combinatorial approach . . . . . 583--599 Palash Sarkar and Shashank Singh A new method for decomposition in the Jacobian of small genus hyperelliptic curves . . . . . . . . . . . . . . . . . 601--616 Moises Delgado and Heeralal Janwa On the conjecture on APN functions and absolute irreducibility of polynomials 617--627 R. Lakshmanan and S. Arumugam Construction of a $ (k, n)$-visual cryptography scheme . . . . . . . . . . 629--645 Haiying Liu and Keqin Feng and Rongquan Feng Nonexistence of generalized bent functions from $ \mathbb {Z}_2^n $ to $ \mathbb {Z}_m $ . . . . . . . . . . . . 647--662 Shudi Yang and Zheng-An Yao Complete weight enumerators of a family of three-weight linear codes . . . . . . 663--674 M. Huggan and G. L. Mullen and B. Stevens and D. Thomson Sudoku-like arrays, codes and orthogonality . . . . . . . . . . . . . 675--693 Ming Li and Yupeng Jiang and Dongdai Lin The adjacency graphs of some feedback shift registers . . . . . . . . . . . . 695--713
Liqiang Peng and Lei Hu and Yao Lu and Jun Xu and Zhangjie Huang Cryptanalysis of Dual RSA . . . . . . . 1--21 Hao Zheng and Yanxun Chang and Junling Zhou Direct constructions of large sets of Kirkman triple systems . . . . . . . . . 23--32 Xiao-Nan Lu and Masakazu Jimbo Affine-invariant strictly cyclic Steiner quadruple systems . . . . . . . . . . . 33--69 Minquan Cheng and Hung-Lin Fu and Jing Jiang and Yuan-Hsun Lo and Ying Miao Codes with the identifiable parent property for multimedia fingerprinting 71--82 Jaehyun Ahn and Dongseok Ka and Chengju Li Complete weight enumerators of a class of linear codes . . . . . . . . . . . . 83--99 Diego Napp and Raquel Pinto and Marisa Toste On MDS convolutional codes over $ \mathbb {Z}_{p^r} $ . . . . . . . . . . 101--114 Nicola Pace and Angelo Sonnino On linear codes admitting large automorphism groups . . . . . . . . . . 115--143 Esteban Landerreche and David Fernández-Duque A case study in almost-perfect security for unconditionally secure communication 145--168 Denis S. Krotov On the automorphism groups of the $ Z_2 Z_4 $-linear $1$-perfect and Preparata-like codes . . . . . . . . . . 169--177 Xiaotian Chen and Yue Zhou Asynchronous channel hopping systems from difference sets . . . . . . . . . . 179--196 Hongfeng Wu and Li Zhu and Rongquan Feng and Siman Yang Explicit factorizations of cyclotomic polynomials over finite fields . . . . . 197--217 Bocong Chen and Liren Lin and San Ling and Hongwei Liu Three new classes of optimal frequency-hopping sequence sets . . . . 219--232
Daniele Bartoli and Stefano Marcugini and Fernanda Pambianco On the completeness of plane cubic curves over finite fields . . . . . . . 233--267 Angela Aguglia and Luca Giuzzi Intersection sets, three-character multisets and associated codes . . . . . 269--282 M. Kuijper and R. Pinto An iterative algorithm for parametrization of shortest length linear shift registers over finite chain rings . . . . . . . . . . . . . . . . . 283--305 Ziling Heng and Qin Yue Evaluation of the Hamming weights of a class of linear codes based on Gauss sums . . . . . . . . . . . . . . . . . . 307--326 Mahdi Sajadieh and Arash Mirzaei and Hamid Mala and Vincent Rijmen A new counting method to bound the number of active S-boxes in Rijndael and $3$D . . . . . . . . . . . . . . . . . . 327--343 I. F. Rúa Primitive semifields of order $ 2^{4e} $ 345--356 Bart Mennink Optimal collision security in double block length hashing with single length key . . . . . . . . . . . . . . . . . . 357--406 Yiyuan Luo and Xuejia Lai and Yujie Zhou Generic attacks on the Lai--Massey scheme . . . . . . . . . . . . . . . . . 407--423 Jingxue Ma and Tao Zhang and Tao Feng and Gennian Ge Some new results on permutation polynomials over finite fields . . . . . 425--443 Yupeng Jiang and Jiangshuai Yang On the number of irreducible linear transformation shift registers . . . . . 445--454 Xiang Wang and Fang-Wei Fu On the snake-in-the-box codes for rank modulation under Kendall's $ \tau $-metric . . . . . . . . . . . . . . . . 455--465 Yonglin Hao and Willi Meier Truncated differential based known-key attacks on round-reduced SIMON . . . . . 467--492
Tran van Trung Simple $t$-designs: a recursive construction for arbitrary $t$ . . . . . 493--502 Tao Zhang and Gennian Ge Quantum MDS codes with large minimum distance . . . . . . . . . . . . . . . . 503--517 Elisa Gorla and Maike Massierer An optimal representation for the trace zero subgroup . . . . . . . . . . . . . 519--548 Esmeralda Nastase and Papa Sissokho The structure of the minimum size supertail of a subspace partition . . . 549--563 Xinxin Fan and Adilet Otemissov and Francesco Sica and Andrey Sidorenko Multiple point compression on elliptic curves . . . . . . . . . . . . . . . . . 565--588 Jon-Lark Kim and Nari Lee A projection decoding of a binary extremal self-dual code of length $ 40 $ 589--609 Aras Erzurumluoglu and David A. Pike Twofold triple systems without $2$-intersecting Gray codes . . . . . . 611--631 Lingfei Jin and Haibin Kan Construction of binary linear codes via rational function fields . . . . . . . . 633--638 Umberto Martínez-Peñas On the roots and minimum rank distance of skew cyclic codes . . . . . . . . . . 639--660 Sergey Bereg and Linda Morales and I. Hal Sudborough Extending permutation arrays: improving MOLS bounds . . . . . . . . . . . . . . 661--683 Victor J. W. Guo and Yiting Yang Proof of a conjecture of Klòve on permutation codes under the Chebychev distance . . . . . . . . . . . . . . . . 685--690 Chunming Tang and Can Xiang and Keqin Feng Linear codes with few weights from inhomogeneous quadratic functions . . . 691--714 Anonymous Editor's note . . . . . . . . . . . . . 715--716
Aart Blokhuis and Edwin R. van Dam and Willem H. Haemers and Jack H. Koolen Preface to the special issue dedicated to Andries E. Brouwer . . . . . . . . . 1--2 Jack Koolen and Zhi Qiao Light tails and the Hermitian dual polar graphs . . . . . . . . . . . . . . . . . 3--12 K. Ashik Mathew and Patric R. J. Östergård New lower bounds for the Shannon capacity of odd cycles . . . . . . . . . 13--22 Eiichi Bannai and Etsuko Bannai and Yan Zhu Relative $t$-designs in binary Hamming association scheme $ H(n, 2)$ . . . . . 23--53 V. Diego and M. A. Fiol Distance mean-regular graphs . . . . . . 55--71 Alireza Abdollahi and Edwin R. van Dam and Mojtaba Jazaeri Distance-regular Cayley graphs with least eigenvalue $ - 2 $ . . . . . . . . 73--85 Bart Litjens and Sven Polak and Alexander Schrijver Semidefinite bounds for nonbinary codes based on quadruples . . . . . . . . . . 87--100 Leonard H. Soicher The uniqueness of a distance-regular graph with intersection array $ \{ 32, 27, 8, 1; 1, 4, 27, 32 \} $ and related results . . . . . . . . . . . . . . . . 101--108 Peter J. Cameron and Josephine Kusuma and Patrick Solé $ \mathbb {Z}_4 $-codes and their Gray map images as orthogonal arrays . . . . 109--114 Anurag Bishnoi and Bart De Bruyn Characterizations of the Suzuki tower near polygons . . . . . . . . . . . . . 115--133 Xi-Ming Cheng and Jack H. Koolen A generalization of a theorem of Neumaier . . . . . . . . . . . . . . . . 135--142 Jozefien D'haeseleer and Klaus Metsch and Leo Storme and Geertrui Van de Voorde On the maximality of a set of mutually orthogonal Sudoku latin Squares . . . . 143--152 Sebastian M. Cioaba and Willem H. Haemers and Jason R. Vermette The graphs with all but two eigenvalues equal to $ - 2 $ or $0$ . . . . . . . . 153--163 Vladimir D. Tonchev On resolvable Steiner $2$-designs and maximal arcs in projective planes . . . 165--172 Akihiro Munemasa Godsil--McKay switching and twisted Grassmann graphs . . . . . . . . . . . . 173--179 István Kovács and Klavdija Kutnar and János Ruff and Tamás Sz\Honyi Integral automorphisms of affine spaces over finite fields . . . . . . . . . . . 181--188 Ebrahim Ghorbani On eigenvalues of Seidel matrices and Haemers' conjecture . . . . . . . . . . 189--195 A. Blokhuis and G. Marino and F. Mazzocca and O. Polverino On almost small and almost large super-Vandermonde sets in $ {\rm GF}(q) $ . . . . . . . . . . . . . . . . . . . 197--201 Mikhail Klin and Matan Ziv-Av A non-Schurian coherent configuration on $ 14 $ points exists . . . . . . . . . . 203--221 Nathann Cohen and Dmitrii V. Pasechnik Implementing Brouwer's database of strongly regular graphs . . . . . . . . 223--235 Arnold Neumaier Bounding basis reduction properties . . 237--259 Umberto Martínez-Peñas and Ruud Pellikaan Rank error-correcting pairs . . . . . . 261--281 David B. Chandler and Peter Sin and Qing Xiang The Smith group of the hypercube graph 283--294 Tom Verhoeff The spurs of D. H. Lehmer . . . . . . . 295--310
Huiwen Jia and Yupu Hu Cryptanalysis of multilinear maps from ideal lattices: revisited . . . . . . . 311--324 Zhaoping Meng Doubly resolvable Steiner quadruple systems and related designs . . . . . . 325--343 Michel Lavrauw and John Sheekey The BEL-rank of finite semifields . . . 345--358 Shuxing Li and Gennian Ge Constructions of maximum distance separable symbol-pair codes using cyclic and constacyclic codes . . . . . . . . . 359--372 Angelo De Caro and Vincenzo Iovino On the power of rewinding simulators in functional encryption . . . . . . . . . 373--399 Hongyu Han and Daiyuan Peng and Udaya Parampalli and Zheng Ma and Hongbin Liang Construction of low-hit-zone frequency hopping sequences with optimal partial Hamming correlation by interleaving techniques . . . . . . . . . . . . . . . 401--414 James A. Davis and Sophie Huczynska and Gary L. Mullen Near-complete external difference families . . . . . . . . . . . . . . . . 415--424 Ana Salagean and R. Winter and Matei Mandache-Salagean and Raphael C.-W. Phan Higher order differentiation over finite fields with applications to generalising the cube attack . . . . . . . . . . . . 425--449 Stefaan De Winter and Zeying Wang Classification of partial difference sets in Abelian groups of order $ 4 p^2 $ . . . . . . . . . . . . . . . . . . . 451--461 Lingfei Jin and Haibin Kan and Jie Wen Quantum MDS codes with relatively large minimum distance from Hermitian self-orthogonal codes . . . . . . . . . 463--471 Yun Fan and Liang Zhang Galois self-dual constacyclic codes . . 473--492
Thor Martinsen and Wilfried Meidl and Pantelimon St\uanic\ua Partial spread and vectorial generalized bent functions . . . . . . . . . . . . . 1--13 Gang Shen and Feng Liu and Zhengxin Fu and Bin Yu Perfect contrast XOR-based visual cryptography schemes via linear algebra 15--37 Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park Efficient revocable identity-based encryption via subset difference methods 39--76 Eleonesio Strey and Sueli I. R. Costa Lattices from codes over $ \mathbb {Z}_q $: generalization of constructions $D$, $ D'$ and $ \overline {D}$ . . . . . . . 77--95 Sascha Kurz Improved upper bounds for partial spreads . . . . . . . . . . . . . . . . 97--106 Günter F. Steinke Collineations of finite $2$-affine planes . . . . . . . . . . . . . . . . . 107--120 Leyla Isik and Alev Topuzoglu and Arne Winterhof Complete mappings and Carlitz rank . . . 121--128 Peter Horak and Igor Semaev and Zsolt Tuza A combinatorial problem related to sparse systems of equations . . . . . . 129--144 Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo Strong authenticated key exchange with auxiliary inputs . . . . . . . . . . . . 145--173 Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Yang Zheng A note on the strong authenticated key exchange with auxiliary inputs . . . . . 175--178 Jian Yuan and Shixin Zhu and Xiaoshan Kai and Ping Li On the construction of quantum constacyclic codes . . . . . . . . . . . 179--190
Kamil Otal and Ferruh Özbudak Cyclic subspace codes via subspace polynomials . . . . . . . . . . . . . . 191--204 Satoshi Yoshiara Equivalences among plateaued APN functions . . . . . . . . . . . . . . . 205--217 Limengnan Zhou and Daiyuan Peng and Hongbin Liang and Changyuan Wang and Zheng Ma Constructions of optimal low-hit-zone frequency hopping sequence sets . . . . 219--232 Vladimir D. Tonchev Linearly embeddable designs . . . . . . 233--247 Junling Zhou and Yanxun Chang Bounds and constructions of $t$-spontaneous emission error designs 249--271 Kaoru Kurosawa and Le Trieu Phong Anonymous and leakage resilient IBE and IPE . . . . . . . . . . . . . . . . . . 273--298 Jingyuan Chen and Lijun Ji and Yun Li New optical orthogonal signature pattern codes with maximum collision parameter $2$ and weight $4$ . . . . . . . . . . . 299--318 Yun Fan and Bangteng Xu Nonlinear functions and difference sets on group actions . . . . . . . . . . . . 319--341 Junwu Dong and Dingyi Pei Construction for de Bruijn sequences with large stage . . . . . . . . . . . . 343--358 Luis Felipe Tapia Cuitiño and Andrea Luigi Tironi Some properties of skew codes over finite fields . . . . . . . . . . . . . 359--380 Abbas Alhakim and Maher Nouiehed Stretching de Bruijn sequences . . . . . 381--394
Nikolay Kolomeec The graph of minimal distances of bent functions and its properties . . . . . . 395--410 Hao Zheng and Yanxun Chang and Junling Zhou Large sets of Kirkman triple systems of prime power sizes . . . . . . . . . . . 411--423 Zongchen Chen and Da Zhao On symmetric BIBDs with the same $3$-concurrence . . . . . . . . . . . . 425--436 Georgios Tzanakis and Lucia Moura and Daniel Panario and Brett Stevens Covering arrays from m-sequences and character sums . . . . . . . . . . . . . 437--456 Antonio Cossidente and Francesco Pavese Strongly regular graphs from classical generalized quadrangles . . . . . . . . 457--470 Jianing Li and Yingpu Deng Nonexistence of two classes of generalized bent functions . . . . . . . 471--482 Manabu Hagiwara and Justin Kong Consolidation for compact constraints and Kendall tau LP decodable permutation codes . . . . . . . . . . . . . . . . . 483--521 Ronan Egan On equivalence of negaperiodic Golay pairs . . . . . . . . . . . . . . . . . 523--532 Xin Wang and Yiwei Zhang and Yiting Yang and Gennian Ge New bounds of permutation codes under Hamming metric and Kendall's $ \tau $-metric . . . . . . . . . . . . . . . . 533--545 Amir Rubin and Gera Weiss Mapping prefer-opposite to prefer-one de Bruijn sequences . . . . . . . . . . . . 547--555 Joaquim Borges and Cristina Fernández-Córdoba There is exactly one $ \mathbb {Z}_2 \mathbb {Z}_4 $-cyclic $1$-perfect code 557--566
Javier de la Cruz and Elisa Gorla and Hiram H. López and Alberto Ravagnani Weight distribution of rank-metric codes 1--16 Yohei Watanabe and Junji Shikata Timed-release computational secret sharing and threshold encryption . . . . 17--54 Gottfried Herold and Elena Kirshanova and Alexander May On the asymptotic complexity of solving LWE . . . . . . . . . . . . . . . . . . 55--83 Oliver Wilhelm Gnilke and Marcus Greferath and Mario Osvin Pavcevi\'c Mosaics of combinatorial designs . . . . 85--95 Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au Functional encryption for computational hiding in prime order groups via pair encodings . . . . . . . . . . . . . . . 97--120 Kenza Guenda and Somphong Jitman and T. Aaron Gulliver Constructions of good entanglement-assisted quantum error correcting codes . . . . . . . . . . . . 121--136 Léo Ducas and Wessel P. J. van Woerden The closest vector problem in tensored root lattices of type A and in their duals . . . . . . . . . . . . . . . . . 137--150 Qichun Wang and Chik How Tan and Theo Fanuela Prabowo On the covering radius of the third order Reed--Muller code $ {\rm RM}(3, 7) $ . . . . . . . . . . . . . . . . . . . 151--159 Daniele Bartoli and Maria Montanucci and Giovanni Zini Multi point AG codes on the GK maximal curve . . . . . . . . . . . . . . . . . 161--177 Alice M. W. Hui and B. G. Rodrigues Switched graphs of some strongly regular graphs related to the symplectic graph 179--194 Douglas R. Stinson and Ruizhong Wei Combinatorial repairability for threshold schemes . . . . . . . . . . . 195--210 Chuangqiang Hu and Shudi Yang Multi-point codes over Kummer extensions 211--230 Alexander L. Gavrilyuk and Ilia Matkin and Tim Penttila Derivation of Cameron--Liebler line classes . . . . . . . . . . . . . . . . 231--236
Simon R. Blackburn and Marcus Greferath and Camilla Hollanti and Mario Osvin Pavcevi\'c and Joachim Rosenthal and Leo Storme and Ángeles Vázquez-Castro and Alfred Wassermann Preface to the special issue on network coding and designs . . . . . . . . . . . 237--238 Michael Kiermaier and Sascha Kurz and Alfred Wassermann The order of the automorphism group of a binary $ {\vec{q}} $-analog of the Fano plane is at most two . . . . . . . . . . 239--250 Michael Kiermaier and Reinhard Laue and Alfred Wassermann A new series of large sets of subspace designs over the binary field . . . . . 251--268 Dirk Liebhold and Gabriele Nebe and Angeles Vazquez-Castro Network coding with flags . . . . . . . 269--284 Paulo Almeida and Diego Napp and Raquel Pinto MDS 2D convolutional codes with optimal 1D horizontal projections . . . . . . . 285--302 D. Napp and R. Pinto and V. Sidorenko Concatenation of convolutional codes and rank metric codes for multi-shot network coding . . . . . . . . . . . . . . . . . 303--318 Anna-Lena Horlemann-Trautmann and Kyle Marshall and Joachim Rosenthal Extension of Overbeck's attack for Gabidulin-based cryptosystems . . . . . 319--340 Alessandro Neri and Anna-Lena Horlemann-Trautmann and Tovohery Randrianarisoa and Joachim Rosenthal On the genericity of maximum rank distance and Gabidulin codes . . . . . . 341--363 Anna-Lena Horlemann-Trautmann Message encoding and retrieval for spread and cyclic orbit codes . . . . . 365--386 Netanel Raviv and Eitan Yaakobi and Muriel Médard Coding for locality in reconstructing permutations . . . . . . . . . . . . . . 387--418 Natalia Silberstein and Alexander Zeh Anticode-based locally repairable codes with high availability . . . . . . . . . 419--445
Anonymous Editor's note . . . . . . . . . . . . . 447--447 Dieter Jungnickel and Vladimir D. Tonchev On Bonisoli's theorem and the block codes of Steiner triple systems . . . . 449--462 Joaquim Borges and Cristina Fernández-Córdoba and Roger Ten-Valls $ {{\mathbb {Z}}}_2$-double cyclic codes 463--479 Mich\`ele Feltz and Cas Cremers Strengthening the security of authenticated key exchange against bad randomness . . . . . . . . . . . . . . . 481--516 Shuai Han and Shengli Liu and Baodong Qin and Dawu Gu Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness . . . . . . . . . . . . 517--554 Ales Drápal and Viliam Valent Few associative triples, isotopisms and groups . . . . . . . . . . . . . . . . . 555--568 Roland D. Barrolleta and Merc\`e Villanueva Partial permutation decoding for binary linear and $ Z_4 $-linear Hadamard codes 569--586 Dieter Jungnickel and Yue Zhou and Vladimir D. Tonchev Extension sets, affine designs, and Hamada's conjecture . . . . . . . . . . 587--610 Jürgen Bierbrauer and Daniele Bartoli and Giorgio Faina and Stefano Marcugini and Fernanda Pambianco A family of semifields in odd characteristic . . . . . . . . . . . . . 611--621 Jooyoung Lee and Atul Luykx and Bart Mennink and Kazuhiko Minematsu Connecting tweakable and multi-key blockcipher security . . . . . . . . . . 623--640 Seung Geol Choi and Dana Dachman-Soled and Tal Malkin and Hoeteck Wee Improved, black-box, non-malleable encryption from semantic security . . . 641--663 Ulrich Dempwolff CCZ equivalence of power functions . . . 665--692 Rafael A. Arce-Nazario and Francis N. Castro and Oscar E. González and Luis A. Medina and Ivelisse M. Rubio New families of balanced symmetric functions and a generalization of Cusick, Li and St\uanic\ua's conjecture 693--701 Cunsheng Ding Infinite families of $3$-designs from a type of five-weight code . . . . . . . . 703--719
Li Lin and Wenling Wu Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512 . . . . . . . . . . . . . 721--741 Remi Bricout and Sean Murphy and Kenneth G. Paterson and Thyla van der Merwe Analysing and exploiting the Mantin biases in RC4 . . . . . . . . . . . . . 743--770 Fengwei Li and Qin Yue The primitive idempotents and weight distributions of irreducible constacyclic codes . . . . . . . . . . . 771--784 José Moreira and Marcel Fernández and Grigory Kabatiansky Constructions of almost secure frameproof codes with applications to fingerprinting schemes . . . . . . . . . 785--802 Tao Zhang and Gennian Ge Combinatorial constructions of packings in Grassmannian spaces . . . . . . . . . 803--815 Oktay Olmez A link between combinatorial designs and three-weight linear codes . . . . . . . 817--833 Gerardo Vega A correction on the determination of the weight enumerator polynomial of some irreducible cyclic codes . . . . . . . . 835--840 Baokun Ding and Gennian Ge and Jun Zhang and Tao Zhang and Yiwei Zhang New constructions of MDS symbol-pair codes . . . . . . . . . . . . . . . . . 841--859 Sven C. Polak New nonbinary code bounds based on divisibility arguments . . . . . . . . . 861--874 Irrinki Gnana Sudha and R. S. Selvaraj Codes with a pomset metric and constructions . . . . . . . . . . . . . 875--892 Xiang-Dong Hou Complexities of normal bases constructed from Gauss periods . . . . . . . . . . . 893--905 Charles J. Colbourn and Erin Lanus and Kaushik Sarkar Asymptotic and constructive methods for covering perfect hash families and covering arrays . . . . . . . . . . . . 907--937 Zhiqiang Lin and Dingyi Pei and Dongdai Lin and Xiaolei Zhang Fast construction of binary ring FCSRs for hardware stream ciphers . . . . . . 939--953
Jooyoung Lee Key alternating ciphers based on involutions . . . . . . . . . . . . . . 955--988 Boris Ryabko Properties of two Shannon's ciphers . . 989--995 John Bamberg and Jesse Lansdown and Melissa Lee On $m$-ovoids of regular near polygons 997--1006 Dabin Zheng and Jingjun Bao Four classes of linear codes from cyclotomic cosets . . . . . . . . . . . 1007--1022 Weihua Liu and Andrew Klapper and Zhixiong Chen Solving the FCSR synthesis problem for multi-sequences by lattice basis reduction . . . . . . . . . . . . . . . 1023--1038 John Vincent S. Morales and Hajime Tanaka An Assmus--Mattson theorem for codes over commutative association schemes . . 1039--1062 Liantao Lan and Yanxun Chang and Lidong Wang Constructions of cyclic quaternary constant-weight codes of weight three and distance four . . . . . . . . . . . 1063--1083 Masaaki Harada Binary extremal self-dual codes of length 60 and related codes . . . . . . 1085--1094 Sergey Bereg and Avi Levy and I. Hal Sudborough Constructing permutation arrays from groups . . . . . . . . . . . . . . . . . 1095--1111 László Mérai On the elliptic curve endomorphism generator . . . . . . . . . . . . . . . 1113--1129 Sugata Gangopadhyay and Bimal Mandal and Pantelimon St\uanic\ua Gowers $ U_3 $ norm of some classes of bent Boolean functions . . . . . . . . . 1131--1148 Jiejing Wen and Minghui Yang and Fangwei Fu and Keqin Feng Cyclotomic construction of strong external difference families in finite fields . . . . . . . . . . . . . . . . . 1149--1159 Antonio Cossidente and Francesco Pavese On intriguing sets of finite symplectic spaces . . . . . . . . . . . . . . . . . 1161--1174
Giorgio Donati and Nicola Durante A generalization of the normal rational curve in $ \mathrm{PG}(d, q^n) $ and its associated non-linear MRD codes . . . . 1175--1184 Tran van Trung A recursive construction for simple $t$-designs using resolutions . . . . . 1185--1200 Minjia Shi and Zahra Sepasdar and Adel Alahmadi and Patrick Solé On two-weight $ \mathbb {Z}_{2^k} $-codes . . . . . . . . . . . . . . . . 1201--1209 Goutam Paul and Souvik Ray On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers . . . . . . . . . . . 1211--1247 Nuh Aydin and Yasemin Cengellenmis and Abdullah Dertli On some constacyclic codes over $ \mathbb {Z}_4 \left [u \right] / \left \langle u^2 - 1 \right \rangle $, their $ \mathbb {Z}_4 $ images, and new codes 1249--1255 Adel Alahmadi and Funda Özdemir and Patrick Solé On self-dual double circulant codes . . 1257--1265 Bocong Chen and Hongwei Liu Constructions of cyclic constant dimension codes . . . . . . . . . . . . 1267--1279 Chong-Dao Lee and Yaotsu Chang and Chia-an Liu A construction of group divisible designs with block sizes 3 to 7 . . . . 1281--1293 Wenquan Bi and Zheng Li and Xiaoyang Dong and Lu Li and Xiaoyun Wang Conditional cube attack on round-reduced River Keyak . . . . . . . . . . . . . . 1295--1310 Ferdinand Ihringer and Karen Meagher Miklós--Manickam--Singhi conjectures on partial geometries . . . . . . . . . . . 1311--1327 Wei Su and Yang Yang and Cuiling Fan New optimal binary sequences with period $ 4 p $ via interleaving Ding--Helleseth--Lam sequences . . . . . 1329--1338 Jie Zhang and Jie Chen and Junqing Gong and Aijun Ge and Chuangui Ma Leakage-resilient attribute based encryption in prime-order groups via predicate encodings . . . . . . . . . . 1339--1366 James A. Davis and Oktay Olmez A framework for constructing partial geometric difference sets . . . . . . . 1367--1375
Joaquim Borges and Cristina Fernández-Córdoba A characterization of $ \mathbb{Z}_2 \mathbb{Z}_2 [u] $-linear codes . . . . 1377--1389 Philippe Gaborit and Ayoub Otmani and Hervé Talé Kalachi Polynomial-time key recovery attack on the Faure--Loidreau scheme based on Gabidulin codes . . . . . . . . . . . . 1391--1403 David Clayton A note on almost difference sets in nonabelian groups . . . . . . . . . . . 1405--1410 Shuai Han and Shengli Liu and Lin Lyu Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system . . . . 1411--1449 Hai Q. Dinh and Abhay Kumar Singh and Sukhamoy Pattanayak and Songsak Sriboonchitta Cyclic DNA codes over the ring $ \mathbb{F}_2 + u \mathbb{F}_2 + v \mathbb{F}_2 + u v \mathbb{F}_2 + v^2 \mathbb{F}_2 + u v^2 \mathbb{F}_2 $ . . 1451--1467 Kai-Uwe Schmidt Hermitian rank distance codes . . . . . 1469--1481 Zibi Xiao and Xiangyong Zeng and Chunlei Li and Tor Helleseth New generalized cyclotomic binary sequences of period $ p^2 $ . . . . . . 1483--1497 Jingyuan Chen and Lijun Ji and Yun Li Combinatorial constructions of optimal $ (m, n, 4, 2) $ optical orthogonal signature pattern codes . . . . . . . . 1499--1525 SenPeng Wang and Bin Hu and Yan Liu The autocorrelation properties of single cycle polynomial $T$-functions . . . . . 1527--1540 Qian Wang and Chenhui Jin Upper bound of the length of truncated impossible differentials for AES . . . . 1541--1552 Li Shuai and Miao Li A method to calculate differential uniformity for permutations . . . . . . 1553--1563 Jianfa Qian and Lina Zhang On MDS linear complementary dual codes and entanglement-assisted quantum codes 1565--1572 Hadi Kharaghani and Sho Suda Unbiased orthogonal designs . . . . . . 1573--1588
Daniele Bartoli and Luciane Quoos Permutation polynomials of the type $ x^r g(x^s) $ over $ {\mathbb {F}}_{q^{2n}} $ . . . . . . . . . . . . 1589--1599 Maosheng Xiong and Haode Yan and Pingzhi Yuan On a conjecture of differentially $8$-uniform power functions . . . . . . 1601--1621 Keita Emura and Goichiro Hanaoka and Koji Nuida and Go Ohtake and Takahiro Matsuda and Shota Yamada Chosen ciphertext secure keyed-homomorphic public-key cryptosystems . . . . . . . . . . . . . 1623--1683 Konstantinos Limniotis and Nicholas Kolokotronis Boolean functions with maximum algebraic immunity: further extensions of the Carlet--Feng construction . . . . . . . 1685--1706 Neranga Fernando Self-reciprocal polynomials and coterm polynomials . . . . . . . . . . . . . . 1707--1726 Chong Shangguan and Jingxue Ma and Gennian Ge New upper bounds for parent-identifying codes and traceability codes . . . . . . 1727--1737 Mingchao Li and Miao Liang and Beiliang Du and Jingyuan Chen A construction for optimal $c$-splitting authentication and secrecy codes . . . . 1739--1755 Hongxue Liang and Shenglin Zhou Flag-transitive point-primitive automorphism groups of non-symmetric 2-$ (v, k, 3) $ designs . . . . . . . . . . 1757--1766 I. Blanco-Chacón and E. Byrne and I. Duursma and J. Sheekey Rank metric codes and zeta functions . . 1767--1792 Maki Yoshida and Satoshi Obana On the (in)efficiency of non-interactive secure multiparty computation . . . . . 1793--1805 Daniel Augot and Pierre Loidreau and Gwezheneg Robert Generalized Gabidulin codes over fields of any characteristic . . . . . . . . . 1807--1848 José I. Farrán and Pedro A. García-Sánchez and Benjamín A. Heredia and Micah J. Leamer The second Feng--Rao number for codes coming from telescopic semigroups . . . 1849--1864 Sihem Mesnager and Ferruh Özbudak and Ahmet Sinak On the $p$-ary (cubic) bent and plateaued (vectorial) functions . . . . 1865--1892
Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan Unweighted linear congruences with distinct coordinates and the Varshamov--Tenengolts codes . . . . . . 1893--1904 J. Rif\`a and Emilio Suárez Canedo Hadamard full propelinear codes of type $Q$; rank and kernel . . . . . . . . . . 1905--1921 Ling Sun and Huaifeng Chen and Meiqin Wang Zero-correlation attacks: statistical models independent of the number of approximations . . . . . . . . . . . . . 1923--1945 Yoshitaka Koga and Tatsuya Maruta and Keisuke Shiromoto On critical exponents of Dowling matroids . . . . . . . . . . . . . . . . 1947--1962 Zhilin Zhang and Shenglin Zhou Flag-transitive point-quasiprimitive 2-$ (v, k, 2) $ designs . . . . . . . . . . 1963--1971 Kai-Uwe Schmidt and Yue Zhou On the number of inequivalent Gabidulin codes . . . . . . . . . . . . . . . . . 1973--1982 Ayoub Otmani and Hervé Talé Kalachi and Sélestin Ndjeya Improved cryptanalysis of rank metric schemes based on Gabidulin codes . . . . 1983--1996 Jun Xu and Santanu Sarkar and Lei Hu and Zhangjie Huang and Liqiang Peng Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator . . . . 1997--2033 Alberto Ravagnani Duality of codes supported on regular lattices, with an application to enumerative combinatorics . . . . . . . 2035--2063 Javier de la Cruz and Wolfgang Willems On group codes with complementary duals 2065--2073 Trygve Johnsen and Hugues Verdure Flags of almost affine codes and the two-party wire-tap channel of type II 2075--2090 Yun Fan and Bangteng Xu Fourier transforms and bent functions on finite groups . . . . . . . . . . . . . 2091--2113 Steven T. Dougherty and Joseph Gildea and Rhian Taylor and Alexander Tylyshchak Group rings, $G$-codes and constructions of self-dual and formally self-dual codes . . . . . . . . . . . . . . . . . 2115--2138
Shixin Zhu and Zhonghua Sun and Ping Li A class of negacyclic BCH codes and its application to quantum codes . . . . . . 2139--2165 Seunghwan Chang and Jong Yoon Hyun Linear codes from simplicial complexes 2167--2181 Jezerca Hodaj and Melissa S. Keranen and Donald L. Kreher and Leah Tollefson Some new Kirkman signal sets . . . . . . 2183--2195 Dario Catalano and Dario Fiore and Luca Nizzardo Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions . . . . . . . . . . . . . 2197--2246 Ramakrishna Bandi and Alexandre Fotue Tabue and Edgar Martínez-Moro On counting subring-submodules of free modules over finite commutative Frobenius rings . . . . . . . . . . . . 2247--2254 Lijun Ji Group divisible designs with large block sizes . . . . . . . . . . . . . . . . . 2255--2260 Chengju Li Hermitian LCD codes from cyclic codes 2261--2278 Jean-Charles Faug\`ere and Alexandre Wallet The point decomposition problem over hyperelliptic curves . . . . . . . . . . 2279--2314 Daniele Bartoli and Maria Montanucci and Giovanni Zini AG codes and AG quantum codes from the GGS curve . . . . . . . . . . . . . . . 2315--2344 Khadijeh Bagheri and Mohammad-Reza Sadeghi and Daniel Panario A non-commutative cryptosystem based on quaternion algebras . . . . . . . . . . 2345--2377 Kangquan Li and Longjiang Qu and Qiang Wang New constructions of permutation polynomials of the form $ x^r h \left (x^{q - 1} \right) $ over $ {\mathbb F}_{q^2} $ . . . . . . . . . . . . . . . 2379--2405 Kwangsu Lee and Seunghwan Park Revocable hierarchical identity-based encryption with shorter private keys and update keys . . . . . . . . . . . . . . 2407--2440 Cuiling Fan The linear complexity of a class of binary sequences with optimal autocorrelation . . . . . . . . . . . . 2441--2450
Song Tian and Bao Li and Kunpeng Wang and Wei Yu Cover attacks for elliptic curves with cofactor two . . . . . . . . . . . . . . 2451--2468 Yunwen Liu and Vincent Rijmen and Gregor Leander Nonlinear diffusion layers . . . . . . . 2469--2484 Minjia Shi and Liqin Qian and Patrick Solé On self-dual negacirculant codes of index two and four . . . . . . . . . . . 2485--2494 Yunhua Wen and Shengli Liu and Shuai Han Reusable fuzzy extractor from the decisional Diffie--Hellman assumption 2495--2512 Zhengchun Zhou Three-weight ternary linear codes from a family of cyclic difference sets . . . . 2513--2523 David Derler and Daniel Slamanig Practical witness encryption for algebraic languages or how to encrypt under Groth--Sahai proofs . . . . . . . 2525--2547 Jia Liu and Tibor Jager and Saqib A. Kakvi and Bogdan Warinschi How to build time-lock encryption . . . 2549--2586 Chunpeng Ge and Willy Susilo and Liming Fang and Jiandong Wang and Yunqing Shi A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system . . . . . . . . . . . . . 2587--2603 Claude Carlet and Sihem Mesnager and Chunming Tang and Yanfeng Qi Euclidean and Hermitian LCD MDS codes 2605--2618 I. Yu. Mogilnykh and F. I. Solov'eva On explicit minimum weight bases for extended cyclic codes related to Gold functions . . . . . . . . . . . . . . . 2619--2627 Jose Torres-Jimenez and Idelfonso Izquierdo-Marquez Covering arrays of strength three from extended permutation vectors . . . . . . 2629--2643 Hui Zhang and Eitan Yaakobi and Natalia Silberstein Multiset combinatorial batch codes . . . 2645--2660 Jared Antrobus and Heide Gluesing-Luerssen Lexicodes over finite principal ideal rings . . . . . . . . . . . . . . . . . 2661--2676
Ming Ming Tan Group invariant weighing matrices . . . 2677--2702 Beno\^\it Cogliati and Yannick Seurin Analysis of the single-permutation encrypted Davies--Meyer construction . . 2703--2723 Simone Costa and Tao Feng and Xiaomiao Wang Frame difference families and resolvable balanced incomplete block designs . . . 2725--2745 Beno\^\it Cogliati Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model . . . . . . . . . . . . . 2747--2763 Xiaoqin Zhan and Shenglin Zhou Non-symmetric $2$-designs admitting a two-dimensional projective linear group 2765--2773 Xiao-Xin Zhao and Tian Tian and Wen-Feng Qi A ring-like cascade connection and a class of NFSRs with the same cycle structures . . . . . . . . . . . . . . . 2775--2790 Wittawat Kositwattanarerk Pseudocodeword-free criterion for codes with cycle-free Tanner graph . . . . . . 2791--2805 Neriman Gamze Orhon and Huseyin Hisil Speeding up Huff form of elliptic curves 2807--2823 Fernando L. Piñero and Prasant Singh A note on the weight spectrum of the Schubert code $ C_\alpha (2, m) $ . . . 2825--2836 Jin Li and Aixian Zhang and Keqin Feng Linear codes over $ \mathbb{F}_q[x] / (x^2) $ and $ G R(p^2, m) $ reaching the Griesmer bound . . . . . . . . . . . . . 2837--2855 Xiaojuan Lu and Xiaolei Niu and Haitao Cao Some results on generalized strong external difference families . . . . . . 2857--2868 Xiaofang Xu and Chunlei Li and Xiangyong Zeng and Tor Helleseth Constructions of complete permutation polynomials . . . . . . . . . . . . . . 2869--2892 José I. Farrán and Pedro A. García-Sánchez and Benjamín A. Heredia On the second Feng--Rao distance of Algebraic Geometry codes related to Arf semigroups . . . . . . . . . . . . . . . 2893--2916
Xinxin Fan and Guang Gong and Berry Schoenmakers and Francesco Sica and Andrey Sidorenko Secure simultaneous bit extraction from Koblitz curves . . . . . . . . . . . . . 1--13 Haibo Liu and Qunying Liao Several classes of linear codes with a few weights from defining sets over $ \mathbb{F}_p + u \mathbb{F}_p $ . . . . 15--29 Shihui Fu and Xiutao Feng Involutory differentially $4$-uniform permutations from known constructions 31--56 John T. Ethier and Gary L. Mullen Sets of mutually orthogonal Sudoku frequency squares . . . . . . . . . . . 57--65 Ronan Egan Phased unitary Golay pairs, Butson Hadamard matrices and a conjecture of Ito's . . . . . . . . . . . . . . . . . 67--74 Thierry Mefenza and Damien Vergnaud Polynomial interpolation of the generalized Diffie--Hellman and Naor--Reingold functions . . . . . . . . 75--85 Minjia Shi and Hongwei Zhu and Patrick Solé and Gérard D. Cohen How many weights can a linear code have? 87--95 Minquan Cheng and Jing Jiang and Qiang Wang Improved bounds on $2$-frameproof codes with length 4 . . . . . . . . . . . . . 97--106 Tao Zhang and Gennian Ge Constructions of optimal Ferrers diagram rank metric codes . . . . . . . . . . . 107--121 Azam Soleimanian and Shahram Khazaei Publicly verifiable searchable symmetric encryption based on efficient cryptographic components . . . . . . . . 123--147 Shiyong Zhang and Gongliang Chen New results on the state cycles of Trivium . . . . . . . . . . . . . . . . 149--162 Zhixiong Chen and Ting Gu and Andrew Klapper On the $q$-bentness of Boolean functions 163--171 Alp Bassa and Henning Stichtenoth Self-dual codes better than the Gilbert--Varshamov bound . . . . . . . . 173--182
Ilaria Cardinali and Michel Lavrauw and Klaus Metsch and Alexander Pott Preface to the special issue on finite geometries . . . . . . . . . . . . . . . 715--716 Karen Meagher An Erd\Hos--Ko--Rado theorem for the group $ {\rm PSU}(3, q) $ . . . . . . . 717--744 Marco Buratti On disjoint $ (v, k, k - 1) $ difference families . . . . . . . . . . . . . . . . 745--755 Stefaan De Winter and Zeying Wang Non-existence of partial difference sets in Abelian groups of order $ 8 p^3 $ . . 757--768 Marco Buratti and Francesca Merola Fano Kaleidoscopes and their generalizations . . . . . . . . . . . . 769--784 Ivan Landjev and Nevyana Georgieva Conditions for the existence of spreads in projective Hjelmslev spaces . . . . . 785--794 Daniele Bartoli and Massimo Giulietti and Maria Montanucci Linear codes from Denniston maximal arcs 795--806 Stefaan De Winter and Cunsheng Ding and Vladimir D. Tonchev Maximal arcs and extended cyclic codes 807--816 Fernando Piñero and Prasant Singh The weight spectrum of certain affine Grassmann codes . . . . . . . . . . . . 817--830 Dieter Jungnickel and Spyros S. Magliveras and Vladimir D. Tonchev and Alfred Wassermann The classification of Steiner triple systems on $ 27 $ points with $3$-rank $ 24$ . . . . . . . . . . . . . . . . . . 831--839 Assia Rousseva and Ivan Landjev Linear codes close to the Griesmer bound and the related geometric structures . . 841--854 Igor E. Shparlinski and Arne Winterhof Codes correcting restricted errors . . . 855--863 Aart Blokhuis and Leo Storme and Tamás Sz\Honyi Relative blocking sets of unions of Baer subplanes . . . . . . . . . . . . . . . 865--877 Jan De Beule and Jeroen Demeyer and Sam Mattheus and Péter Sziklai On the cylinder conjecture . . . . . . . 879--893 Hiroaki Taniguchi A variation of the dual hyperoval $ {\mathcal {S}}_c $ using presemifields 895--908 Bart De Bruyn Three homogeneous embeddings of $ \mathrm{DW}(2 n - 1, 2) $ . . . . . . . 909--929 Anton Betten and Fatma Karaoglu Cubic surfaces over small finite fields 931--953
Pascale Charpin and Philippe Langevin Obituary of Jacques Wolfmann (1932--2018) . . . . . . . . . . . . . . 955--956 Alice M. W. Hui and Muhammad Adib Surani and Sanming Zhou The vertex-isoperimetric number of the incidence and non-incidence graphs of unitals . . . . . . . . . . . . . . . . 957--970 Yuqing Zhu and Jincheng Zhuang and Hairong Yi and Chang Lv and Dongdai Lin A variant of the Galbraith--Ruprai algorithm for discrete logarithms with improved complexity . . . . . . . . . . 971--986 Mariusz Meszka and Magdalena Tyniec Orthogonal one-factorizations of complete multipartite graphs . . . . . . 987--993 Alexander M. Romanov On non-full-rank perfect codes over finite fields . . . . . . . . . . . . . 995--1003 Junji Shikata and Yohei Watanabe Identity-based encryption with hierarchical key-insulation in the standard model . . . . . . . . . . . . . 1005--1033 Yanbin Li and Meiqin Wang Cryptanalysis of MORUS . . . . . . . . . 1035--1058 Shoko Chisaki and Yui Kimura and Nobuko Miyamoto A recursive construction for difference systems of sets . . . . . . . . . . . . 1059--1068 Giacomo Micheli and Violetta Weger Cryptanalysis of the CLR-cryptosystem 1069--1086 Ziling Heng and Cunsheng Ding A construction of $q$-ary linear codes with irreducible cyclic codes . . . . . 1087--1108 Darcy Best and Trent Marbach and Rebecca J. Stones and Ian M. Wanless Covers and partial transversals of Latin squares . . . . . . . . . . . . . . . . 1109--1136 Zuling Chang and Martianus Frederic Ezerman and San Ling and Huaxiong Wang On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials . . . . . . . . . . . . . . 1137--1160 Huiqin Xie and Li Yang Using Bernstein--Vazirani algorithm to attack block ciphers . . . . . . . . . . 1161--1182 Vladimir Edemskiy and Chunlei Li and Xiangyong Zeng and Tor Helleseth The linear complexity of generalized cyclotomic binary sequences of period $ p^n $ . . . . . . . . . . . . . . . . . 1183--1197
A. J. van Zanten Primitive idempotent tables of cyclic and constacyclic codes . . . . . . . . . 1199--1225 Hiroki Koike and István Kovács and Dragan Maru\vsi\vc and Mikhail Muzychuk Cyclic groups are CI-groups for balanced configurations . . . . . . . . . . . . . 1227--1235 Tsuyoshi Miezaki and Manabu Oura On the cycle index and the weight enumerator . . . . . . . . . . . . . . . 1237--1242 Jerod Michel and Qi Wang Almost difference sets in nonabelian groups . . . . . . . . . . . . . . . . . 1243--1251 Serhii Dyshko The extension theorem for Lee and Euclidean weight codes over integer residue rings . . . . . . . . . . . . . 1253--1269 Wenquan Bi and Xiaoyang Dong and Zheng Li and Rui Zong and Xiaoyun Wang MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes . . 1271--1296 Chun Guo and Yaobin Shen and Lei Wang and Dawu Gu Beyond-birthday secure domain-preserving PRFs from a single permutation . . . . . 1297--1322 Oriol Farr\`as and Jordi Ribes-González and Sara Ricci Local bounds for the optimal information ratio of secret sharing schemes . . . . 1323--1344 Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li Simulation-based selective opening security for receivers under chosen-ciphertext attacks . . . . . . . 1345--1371 David Derler and Daniel Slamanig Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge . . . . . . . . . . . . . 1373--1413 Yanxun Chang and Hao Zheng and Junling Zhou Existence of frame-derived $H$-designs 1415--1431 Daniele Bartoli and Matteo Bonini Minimum weight codewords in dual algebraic-geometric codes from the Giulietti--Korchmáros curve . . . . . . . 1433--1445 Minjia Shi and Yan Liu and Hugues Randriam and Lin Sok and Patrick Solé Trace codes over $ {\mathbb {Z}}_4 $, and Boolean functions . . . . . . . . . 1447--1455 Ferdinand Ihringer and Karen Meagher Correction to: Miklós--Manickam--Singhi conjectures on partial geometries . . . 1457--1457
Giorgos Kapetanakis and Lucas Reis Variations of the Primitive Normal Basis Theorem . . . . . . . . . . . . . . . . 1459--1480 Shihui Fu and Xiutao Feng and Dongdai Lin and Qiang Wang A recursive construction of permutation polynomials over $ {\mathbb {F}}_{q^2} $ with odd characteristic related to Rédei functions . . . . . . . . . . . . . . . 1481--1498 Tao Feng and Lidong Wang and Xiaomiao Wang Optimal $2$-D $ (n \times m, 3, 2, 1)$-optical orthogonal codes and related equi-difference conflict avoiding codes 1499--1520 Tran van Trung On existence theorems for simple $t$-designs . . . . . . . . . . . . . . 1521--1540 Julien Lavauzelle Lifted projective Reed--Solomon codes 1541--1575 Claude Carlet and Xi Chen and Longjiang Qu Constructing infinite families of low differential uniformity $ (n, m)$-functions with $ m > n / 2$ . . . . . 1577--1599 Keju Meng and Fuyou Miao and Yue Yu A secure and efficient on-line/off-line group key distribution protocol . . . . 1601--1620 Beno\^\it Cogliati and Titouan Tanguy Multi-user security bound for filter permutators in the random oracle model 1621--1638 John Polhill A new family of partial difference sets in $3$-groups . . . . . . . . . . . . . 1639--1646 Dongdong Jia and Sumei Zhang and Gengsheng Zhang Erasure combinatorial batch codes based on nonadaptive group testing . . . . . . 1647--1656 Lucas Reis Factorization of a class of composed polynomials . . . . . . . . . . . . . . 1657--1671 Matthew Fickus and John Jasper Equiangular tight frames from group divisible designs . . . . . . . . . . . 1673--1697 Sabyasachi Dutta and Avishek Adhikari and Sushmita Ruj Maximal contrast color visual secret sharing schemes . . . . . . . . . . . . 1699--1711
Xing Liu and Liang Zhou Improved Singleton bound on frequency hopping sequences and optimal constructions . . . . . . . . . . . . . 1713--1733 Xing Liu and Liang Zhou Correction to: Improved Singleton bound on frequency hopping sequences and optimal constructions . . . . . . . . . 1735--1736 Léo Ducas and Cécile Pierrot Polynomial time bounded distance decoding near Minkowski's bound in discrete logarithm lattices . . . . . . 1737--1748 Qichun Wang and Pantelimon St\uanic\ua A trigonometric sum sharp estimate and new bounds on the nonlinearity of some cryptographic Boolean functions . . . . 1749--1763 Keisuke Shiromoto Codes with the rank metric and matroids 1765--1776 Mahdi Cheraghchi Nearly optimal robust secret sharing . . 1777--1796 Jian Liu and Sihem Mesnager Weightwise perfectly balanced functions with high weightwise nonlinearity profile . . . . . . . . . . . . . . . . 1797--1813 Xiang-Dong Hou Optimal binary constant weight codes and affine linear groups over finite fields 1815--1838 A. Blokhuis and M. De Boeck and J. D'haeseleer Cameron--Liebler sets of $k$-spaces in $ \mathrm {PG}(n, q) $ . . . . . . . . . . 1839--1856 Minjia Shi and Daitao Huang and Denis S. Krotov Additive perfect codes in Doob graphs 1857--1869 Torger Olson and Eric Swartz Transitive PSL(2,11)-invariant $k$-arcs in PG(4,q) . . . . . . . . . . . . . . . 1871--1879 Andries E. Brouwer and Sven C. Polak Uniqueness of codes using semidefinite programming . . . . . . . . . . . . . . 1881--1895 Itai Dinur An algorithmic framework for the generalized birthday problem . . . . . . 1897--1926 Yansheng Wu and Qin Yue and Xueying Shi At most three-weight binary linear codes from generalized Moisio's exponential sums . . . . . . . . . . . . . . . . . . 1927--1943
Jerod Michel and Qi Wang Almost designs and their links with balanced incomplete block designs . . . 1945--1960 Ching-Yi Lai and Kai-Min Chung Quantum encryption and generalized Shannon impossibility . . . . . . . . . 1961--1972 Hiroaki Taniguchi On some quadratic APN functions . . . . 1973--1983 Antonio Cossidente and Francesco Pavese On line covers of finite projective and polar spaces . . . . . . . . . . . . . . 1985--2002 Miao Liang and Lijun Ji On $ (t, L) $-fold perfect authentication and secrecy codes with arbitration . . . . . . . . . . . . . . 2003--2026 Cícero Carvalho and Xavier Ramírez-Mondragón and Victor G. L. Neumann and Horacio Tapia-Recillas Projective Reed--Muller type codes on higher dimensional scrolls . . . . . . . 2027--2042 Qichun Wang and Pantelimon St\uanic\ua Transparency order for Boolean functions: analysis and construction . . 2043--2059 Yanwei Zhou and Bo Yang and Yi Mu Continuous leakage-resilient identity-based encryption with leakage amplification . . . . . . . . . . . . . 2061--2090 Minjia Shi and Denis S. Krotov and Patrick Solé A new distance-regular graph of diameter $3$ on $ 1024$ vertices . . . . . . . . 2091--2101 Minjia Shi and Denis S. Krotov and Patrick Solé Correction to: A new distance-regular graph of diameter $3$ on $ 1024$ vertices . . . . . . . . . . . . . . . . 2103--2103 Sergey Bereg and Zevi Miller and Luis Gerardo Mojica and Linda Morales and I. H. Sudborough New lower bounds for permutation arrays using contraction . . . . . . . . . . . 2105--2128 Peter Vandendriessche On KM-arcs in non-Desarguesian projective planes . . . . . . . . . . . 2129--2137 Gregory Maxwell and Andrew Poelstra and Yannick Seurin and Pieter Wuille Simple Schnorr multi-signatures with applications to Bitcoin . . . . . . . . 2139--2164 Xueying Shi and Qin Yue and Yansheng Wu The dual-containing primitive BCH codes with the maximum designed distance and their applications to quantum codes . . 2165--2183
Xin Wang and Jie Cui and Lijun Ji Linear $ (2, p, p)$-AONTs exist for all primes $p$ . . . . . . . . . . . . . . . 2185--2197 Nuh Aydin and Jonathan Lambrinos and Oliver VandenBerg On equivalence of cyclic codes, generalization of a quasi-twisted search algorithm, and new linear codes . . . . 2199--2212 Liang Bai and Zihui Liu On the third greedy weight of $4$-dimensional codes . . . . . . . . . 2213--2230 Matvei Kotov and Anton Menshov and Alexander Ushakov An attack on the Walnut digital signature algorithm . . . . . . . . . . 2231--2250 Junying Liu and Yupeng Jiang and Qunxiong Zheng and Dongdai Lin A new construction of zero-difference balanced functions and two applications 2251--2265 Tian Tian and Jia-Min Zhang and Wen-Feng Qi On the uniqueness of a type of cascade connection representations for NFSRs . . 2267--2294 Umberto Martínez-Peñas Theory of supports for linear codes endowed with the sum-rank metric . . . . 2295--2320 Qichun Wang Hadamard matrices, $d$-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights . . . . . . . . . . . . . . . . 2321--2333 R. Sobhani and A. Abdollahi and J. Bagherian and M. Khatami A note on good permutation codes from Reed--Solomon codes . . . . . . . . . . 2335--2340 Hadi Kharaghani and Sho Suda Linked systems of symmetric group divisible designs of type II . . . . . . 2341--2360 Jon-Lark Kim and Junyong Park and Soohak Choi Steganographic schemes from perfect codes on Cayley graphs . . . . . . . . . 2361--2374 Bhaskar Bagchi A coding theoretic approach to the uniqueness conjecture for projective planes of prime order . . . . . . . . . 2375--2389 Minglong Qi and Shengwu Xiong A correction to: On the linear complexity of the Sidelnikov--Lempel--Cohn--Eastman sequences . . . . . . . . . . . . . . . 2391--2393 Minjia Shi and Patrick Solé Three-weight codes, triple sum sets, and strongly walk regular graphs . . . . . . 2395--2404 J. A. Armario and D. L. Flannery Generalized binary arrays from quasi-orthogonal cocycles . . . . . . . 2405--2417 Yuan Cao and Yonglin Cao and Steven T. Dougherty and San Ling Construction and enumeration for self-dual cyclic codes over $ \mathbb {Z}_4 $ of oddly even length . . . . . . 2419--2446 Shuxing Li On the weight distribution of second order Reed--Muller codes and their relatives . . . . . . . . . . . . . . . 2447--2460
Marco Buratti and Dieter Jungnickel Partitioned difference families versus zero-difference balanced functions . . . 2461--2467 Ana I. Gomez and Domingo Gomez-Perez and Guénaël Renault A probabilistic analysis on a lattice attack against DSA . . . . . . . . . . . 2469--2488 Masaya Yasuda and Junpei Yamaguchi A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram--Schmidt lengths . . 2489--2505 Iwan M. Duursma Matrix theory for minimal trellises . . 2507--2536 Min Kyu Song and Hong-Yeop Song Hamming correlation properties of the array structure of Sidelnikov sequences 2537--2551 Yupu Hu and Huiwen Jia A new Gaussian sampling for trapdoor lattices with arbitrary modulus . . . . 2553--2570 John Sheekey Binary additive MRD codes with minimum distance $ n - 1 $ must contain a semifield spread set . . . . . . . . . . 2571--2583 Yi Ouyang and Xianhong Xie Linear complexity of generalized cyclotomic sequences of period $ 2 p^m $ 2585--2596 Sihem Mesnager and Fengrong Zhang and Chunming Tang and Yong Zhou Further study on the maximum number of bent components of vectorial functions 2597--2610 Yiwei Zhang and Gennian Ge A general private information retrieval scheme for MDS coded databases with colluding servers . . . . . . . . . . . 2611--2623 Zixiang Xu and Yiwei Zhang and Gennian Ge New theoretical bounds and constructions of permutation codes under block permutation metric . . . . . . . . . . . 2625--2637 Theodoulos Garefalakis and Giorgos Kapetanakis Further Results on the Morgan--Mullen Conjecture . . . . . . . . . . . . . . . 2639--2654 Jerod Michel and Qi Wang Partial geometric designs from group actions . . . . . . . . . . . . . . . . 2655--2670 Kevin M. Byrnes The maximum length of circuit codes with long bit runs and a new characterization theorem . . . . . . . . . . . . . . . . 2671--2681 Dong Yang and Wen-Feng Qi and Hua-Jin Chen Provable security against impossible differential and zero correlation linear cryptanalysis of some Feistel structures 2683--2700 Siaw-Lynn Ng and Maura B. Paterson Functional repair codes: a view from projective geometry . . . . . . . . . . 2701--2722 Xiaoqin Zhan and Suyun Ding and Shuyi Bai Flag-transitive $2$-designs from $ {\rm PSL}(2, 40 q)$ with block size $4$ . . . 2723--2728
Peter J. Dukes and Esther R. Lamken Constructions and uses of incomplete pairwise balanced designs . . . . . . . 2729--2751 Chong Shangguan and Gennian Ge A new piggybacking design for systematic MDS storage codes . . . . . . . . . . . 2753--2770 Alexander A. Davydov and Stefano Marcugini and Fernanda Pambianco New covering codes of radius $R$, codimension tR and $ t R + \frac {R}{2}$, and saturating sets in projective spaces . . . . . . . . . . . 2771--2792 Chunming Tang and Cunsheng Ding and Maosheng Xiong Steiner systems $ S(2, 4, \frac {3^m - 1}{2}) $ and $2$-designs from ternary linear codes of length $ \frac {3^m - 1}{2}$ . . . . . . . . . . . . . . . . . 2793--2811 Claude Carlet and Chengju Li and Sihem Mesnager Some (almost) optimally extendable linear codes . . . . . . . . . . . . . . 2813--2834 Tran van Trung Recursive constructions for $s$-resolvable $t$-designs . . . . . . . 2835--2845 Ron Steinfeld and Amin Sakzad and Raymond K. Zhao Practical $ \mathsf {MP}$--$ \mathsf {LWE} $-based encryption balancing security-risk versus efficiency . . . . 2847--2884 Guomin Yang and Rongmao Chen and Yi Mu and Willy Susilo and Fuchun Guo and Jie Li Strongly leakage resilient authenticated key exchange, revisited . . . . . . . . 2885--2911 Qi Chen and Chunming Tang and Zhiqiang Lin Efficient explicit constructions of compartmented secret sharing schemes . . 2913--2940 San Ling and Buket Özkaya Multidimensional quasi-twisted codes: equivalent characterizations and their relation to multidimensional convolutional codes . . . . . . . . . . 2941--2965 Dávid Mez\Hofi and Gábor P. Nagy On the geometry of full points of abstract unitals . . . . . . . . . . . . 2967--2978 Terry Shue Chien Lau and Chik How Tan New rank codes based encryption scheme using partial circulant matrices . . . . 2979--2999 Qian Wang and Chenhui Jin More accurate results on the provable security of AES against impossible differential cryptanalysis . . . . . . . 3001--3018 Julia Lieb Necessary field size and probability for MDP and complete MDP convolutional codes 3019--3043 Yujuan Sun and Jiafang Zhang and Sugata Gangopadhyay Construction of resilient Boolean functions in odd variables with strictly almost optimal nonlinearity . . . . . . 3045--3062 Claude Carlet and Chengju Li and Sihem Mesnager Linear codes with small hulls in semi-primitive case . . . . . . . . . . 3063--3075 Zihui Liu and Jinliang Wang Linear complementary dual codes over rings . . . . . . . . . . . . . . . . . 3077--3086
José Gómez-Torrecillas and Erik Hieta-Aho and F. J. Lobillo and Sergio López-Permouth and Gabriel Navarro Some remarks on non projective Frobenius algebras and linear codes . . . . . . . 1--15 Simeon Ball and Michel Lavrauw Arcs and tensors . . . . . . . . . . . . 17--31 S. G. Barwick and Alice M. W. Hui and Wen-Ai Jackson and Jeroen Schillewaert Characterising hyperbolic hyperplanes of a non-singular quadric in $ \mathrm {PG}(4, q) $ . . . . . . . . . . . . . . 33--39 Jasvinder Singh and Manish Gupta and Jaskarn Singh Bhullar Construction of girth-8 $ (3, L)$-QC-LDPC codes of smallest CPM size using column multipliers . . . . . . . . 41--49 Sihem Mesnager and Kwang Ho Kim and Dujin Jo and Junyop Choe and Munhyon Han and Dok Nam Lee A proof of the Beierle--Kranz--Leander conjecture related to lightweight multiplication in $ \mathbb {F}_{2^n} $ 51--62 Sergey Bereg and Peter J. Dukes A lower bound on permutation codes of distance $ n - 1 $ . . . . . . . . . . . 63--72 Tai Do Duc Necessary conditions for the existence of group-invariant Butson Hadamard matrices and a new family of perfect arrays . . . . . . . . . . . . . . . . . 73--90 Stefan Kölbl and Elmar Tischhauser and Patrick Derbez and Andrey Bogdanov Troika: a ternary cryptographic hash function . . . . . . . . . . . . . . . . 91--117 Rong Pan and Tao Feng and Lidong Wang and Xiaomiao Wang Optimal optical orthogonal signature pattern codes with weight three and cross-correlation constraint one . . . . 119--131 Kenza Guenda and T. Aaron Gulliver and Somphong Jitman and Satanan Thipworawimon Linear $ \ell $-intersection pairs of codes and their applications . . . . . . 133--152 Xiao-Xin Zhao and Wen-Feng Qi and Jia-Min Zhang Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs 153--171 Abhishek Kesarwani and Dibyendu Roy and Santanu Sarkar and Willi Meier New cube distinguishers on NFSR-based stream ciphers . . . . . . . . . . . . . 173--199 Aleksandr Kutsenko Metrical properties of self-dual bent functions . . . . . . . . . . . . . . . 201--222 Rohit Gupta Several new permutation quadrinomials over finite fields of odd characteristic 223--239
Hongwei Liu and Xu Pan Galois hulls of linear codes over finite fields . . . . . . . . . . . . . . . . . 241--255 Xia Li and Qin Yue Four classes of minimal binary linear codes with $ w_{\rm min} / w_{\rm max} < 1 / 2 $ derived from Boolean functions 257--271 José Mart\'ìnez-Bernal and Miguel A. Valencia-Bucio and Rafael H. Villarreal Linear codes over signed graphs . . . . 273--296 Yan Liu and Xiwang Cao and Wei Lu On some conjectures about optimal ternary cyclic codes . . . . . . . . . . 297--309 Sergey Bereg and Luis Gerardo Mojica and Linda Morales and Hal Sudborough Constructing permutation arrays using partition and extension . . . . . . . . 311--339 Jun Xu and Lei Hu and Santanu Sarkar Cryptanalysis of elliptic curve hidden number problem from PKC 2017 . . . . . . 341--361 Tim van de Kamp and Andreas Peter and Willem Jonker A multi-authority approach to various predicate encryption types . . . . . . . 363--390 Luca Mariot and Maximilien Gadouleau and Enrico Formenti and Alberto Leporati Mutually orthogonal latin squares based on cellular automata . . . . . . . . . . 391--411 Xin Ling and Sihem Mesnager and Yanfeng Qi and Chunming Tang A class of narrow-sense BCH codes over $ \mathbb {F}_q$ of length $ \frac {q^m - 1}{2} $ . . . . . . . . . . . . . . . . 413--427 Bart De Bruyn and Mou Gao On four codes with automorphism group $ P \Sigma L(3, 4) $ and pseudo-embeddings of the large Witt designs . . . . . . . 429--452 Jong Yoon Hyun and Jungyun Lee and Yoonjin Lee Ramanujan graphs and expander families constructed from $p$-ary bent functions 453--470
Ana Salagean Discrete antiderivatives for functions over $\mathbb{F}_p^n$ . . . . . . . . . 471--486 Xiang Wang and Fang-Wei Fu Snake-in-the-box codes under the $ \ell_\infty $-metric for rank modulation 487--503 Dipayan Das and Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang Modular lattice signatures, revisited 505--532 Yubo Li and Zhichao Yang and Kangquan Li and Longjiang Qu A new algorithm on the minimal rational fraction representation of feedback with carry shift registers . . . . . . . . . 533--552 Can Xiang and Xin Ling and Qi Wang Combinatorial $t$-designs from quadratic functions . . . . . . . . . . . . . . . 553--565 Saban Alaca and Goldwyn Millar Shift-inequivalent decimations of the Sidelnikov--Lempel--Cohn--Eastman sequences . . . . . . . . . . . . . . . 567--583 Raphael Yuster Perfect sequence covering arrays . . . . 585--593 Sascha Kurz Subspaces intersecting in at most a point . . . . . . . . . . . . . . . . . 595--599 S. Hodzi\'c and E. Pasalic and S. Gangopadhyay Generic constructions of $ \mathbb {Z}$-bent functions . . . . . . . . . . 601--623
Cunsheng Ding and Chunming Tang and Vladimir D. Tonchev Linear codes of $2$-designs associated with subcodes of the ternary generalized Reed--Muller codes . . . . . . . . . . . 625--641 Nicolas Aragon and Olivier Blazy and Jean-Christophe Deneuville and Philippe Gaborit and Terry Shue Chien Lau and Chik How Tan and Keita Xagawa Cryptanalysis of a rank-based signature with short public keys . . . . . . . . . 643--653 John Sheekey and Geertrui Van de Voorde Rank-metric codes, linear sets, and their duality . . . . . . . . . . . . . 655--675 Liang Feng Zhang and Reihaneh Safavi-Naini Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions . . . . . . . . . . 677--709 Alessandro Neri and Anna-Lena Horlemann-Trautmann Random construction of partial MDS codes 711--725 Xiusheng Liu and Hualu Liu $ \sigma $-LCD codes over finite chain rings . . . . . . . . . . . . . . . . . 727--746 Hans-Joachim Kroll and Rita Vincenti Linear codes from ruled sets in finite projective spaces . . . . . . . . . . . 747--754 Ka Hin Leung and Qi Wang New nonexistence results on $ (m, 40 n)$-generalized bent functions . . . . . 755--770 Sam Adriaensen and Lins Denaux and Leo Storme and Zsuzsa Weiner Small weight code words arising from the incidence of points and hyperplanes in $ \mathrm {PG}(n, q) $ . . . . . . . . . . 771--788
Heiko Dietrich and Jeroen Schillewaert On a duality for codes over non-abelian groups . . . . . . . . . . . . . . . . . 789--805 Zenghui Fang and Junling Zhou The sizes of maximal $ (v, k, k - 2, k - 1) $ optical orthogonal codes . . . . . 807--824 Sanjit Bhowmick and Alexandre Fotue-Tabue and Edgar Mart\'ìnez-Moro and Ramakrishna Bandi and Satya Bagchi Do non-free LCD codes over finite commutative Frobenius rings exist? . . . 825--840 Yue Zhou On equivalence of maximum additive symmetric rank-distance codes . . . . . 841--850 Jing Jiang and Yujie Gu and Minquan Cheng Multimedia IPP codes with efficient tracing . . . . . . . . . . . . . . . . 851--866 Andrea Ferraguti and Giacomo Micheli Full classification of permutation rational functions and complete rational functions of degree three over finite fields . . . . . . . . . . . . . . . . . 867--886 Gaoli Wang and Fukang Liu and Binbin Cui and Florian Mendel and Christoph Dobraunig Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced RIPEMD-160 . . . . . . . . 887--930 Elena Kirshanova and Huyen Nguyen and Damien Stehlé and Alexandre Wallet On the smoothing parameter and last minimum of random orthogonal lattices 931--950 Bohua Zhu and Junling Zhou and Yanxun Chang $ 2 - (v, 405; 40 m) $ spontaneous emission error designs . . . . . . . . . 951--970 Seyed Hassan Alavi and Mohsen Bayat and Jalal Choulaki and Ashraf Daneshkhah Flag-transitive block designs with prime replication number and almost simple groups . . . . . . . . . . . . . . . . . 971--992
Brett Hemenway Falk and Nadia Heninger and Michael Rudow Properties of constacyclic codes under the Schur product . . . . . . . . . . . 993--1021 Ryann Cartor and Daniel Smith-Tone All in the $ C^* $ family . . . . . . . 1023--1036 Minjia Shi and Li Xu and Denis S. Krotov On the number of resolvable Steiner triple systems of small $3$-rank . . . . 1037--1046 Aurore Guillevic and Simon Masson and Emmanuel Thomé Cocks--Pinch curves of embedding degrees five to eight and optimal ate pairing computation . . . . . . . . . . . . . . 1047--1081 Hong-Yu Sun and Xuan-Yong Zhu and Qun-Xiong Zheng Predicting truncated multiple recursive generators with unknown parameters . . . 1083--1102 Boxin Zhao and Xiaoyang Dong and Willi Meier and Keting Jia and Gaoli Wang Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT . . . . . . . . . . . . . . . . . . 1103--1126 Xiaolei Fang and Khawla Lebed and Hongwei Liu and Jinquan Luo New MDS self-dual codes over finite fields of odd characteristic . . . . . . 1127--1138 Wei Lu and Xia Wu and Xiwang Cao and Ming Chen Six constructions of asymptotically optimal codebooks via the character sums 1139--1158 Lilya Budaghyan and Nikolay Kaleyski and Constanza Riera and Pantelimon St\uanic\ua Partially APN functions with APN-like polynomial representations . . . . . . . 1159--1177 Xiaoyang Dong and Bingyou Dong and Xiaoyun Wang Quantum attacks on some Feistel block ciphers . . . . . . . . . . . . . . . . 1179--1203 Xiao-Xin Zhao and Qun-Xiong Zheng and Zhong-Xiao Wang and Wen-Feng Qi On a class of isomorphic NFSRs . . . . . 1205--1226 María Chara and Ricardo Podestá and Ricardo Toledano Block transitive codes attaining the Tsfasman--Vladut--Zink bound . . . . . . 1227--1253 Yanan Wu and Nian Li and Xiangyong Zeng Linear codes with few weights from cyclotomic classes and weakly regular bent functions . . . . . . . . . . . . . 1255--1272 Mrinmoy Datta Relative generalized Hamming weights of affine Cartesian codes . . . . . . . . . 1273--1284
S. Hodzi\'c and E. Pasalic and Y. Wei A general framework for secondary constructions of bent and plateaued functions . . . . . . . . . . . . . . . 2007--2035 Vladimir N. Potapov On $q$-ary bent and plateaued functions 2037--2049 Kai Lin Ong and Miin Huey Ang On equivalency of zero-divisor codes via classifying their idempotent generator 2051--2065 Yujie Gu and Shohei Satake On $2$-parent-identifying set systems of block size 4 . . . . . . . . . . . . . . 2067--2076 Masaya Yasuda and Satoshi Nakamura and Junpei Yamaguchi Analysis of DeepBKZ reduction for finding short lattice vectors . . . . . 2077--2100 Yan Zhu and Naoki Watamura Relative $t$-designs in Johnson association schemes for $P$-polynomial structure . . . . . . . . . . . . . . . 2101--2118 Mengna Wu and Chengju Li and Zilong Wang Characterizations and constructions of triple-cycle permutations of the form $ x^r h(x^s) $ . . . . . . . . . . . . . . 2119--2132 Christian Elsholtz and Péter Pál Pach Caps and progression-free sets in $ \mathbb {Z}_m^n $ . . . . . . . . . . . 2133--2170 Lijing Zheng and Jie Peng and Haibin Kan and Yanjun Li and Juan Luo On constructions and properties of $ (n, m)$-functions with maximal number of bent components . . . . . . . . . . . . 2171--2186 Simona Boyadzhiyska and Shagnik Das and Tibor Szabó Enumerating extensions of mutually orthogonal Latin squares . . . . . . . . 2187--2206 Baptiste Lambin and Patrick Derbez and Pierre-Alain Fouque Linearly equivalent S-boxes and the division property . . . . . . . . . . . 2207--2231 Sihem Mesnager and Chunming Tang and Maosheng Xiong On the boomerang uniformity of quadratic permutations . . . . . . . . . . . . . . 2233--2246 Boran Kim and Yoonjin Lee Classification of self-dual cyclic codes over the chain ring $ \mathbb {Z}_p[u] / \langle u^3 \rangle $ . . . . . . . . . 2247--2273
Yanyan Gao and Qin Yue and Yansheng Wu LCD codes and self-orthogonal codes in generalized dihedral group algebras . . 2275--2287 Yunwen Liu and Wenying Zhang and Bing Sun and Vincent Rijmen and Guoqiang Liu and Chao Li and Shaojing Fu and Meichun Cao The phantom of differential characteristics . . . . . . . . . . . . 2289--2311 Martin Ekerå On post-processing in the quantum algorithm for computing short discrete logarithms . . . . . . . . . . . . . . . 2313--2335 Seyed Hassan Alavi and Ashraf Daneshkhah and Cheryl E. Praeger Symmetries of biplanes . . . . . . . . . 2337--2359 Yeow Meng Chee and Charles J. Colbourn and Hoang Dau and Ryan Gabrys and Alan C. H. Ling and Dylan Lusi and Olgica Milenkovic Access balancing in storage systems by labeling partial Steiner systems . . . . 2361--2376 Juanjuan Xu and Jingjun Bao and Lijun Ji Doubly resolvable Steiner quadruple systems of orders $ 2^{2n + 1} $ . . . . 2377--2386 Khodakhast Bibak Deletion correcting codes meet the Littlewood--Offord problem . . . . . . . 2387--2396 Cem Güneri and Edgar Martínez-Moro and Selcen Sayici Linear complementary pair of group codes over finite chain rings . . . . . . . . 2397--2405 Xinxin Gong and Bin Zhang Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G . . 2407--2431 Youngkyung Lee and Dong Hoon Lee and Jong Hwan Park Tightly CCA-secure encryption scheme in a multi-user setting with corruptions 2433--2452
Xinmei Huang and Qin Yue and Yansheng Wu and Xiaoping Shi and Jerod Michel Binary primitive LCD BCH codes . . . . . 2453--2473 Jong Yoon Hyun and Hyun Kwang Kim and Yansheng Wu and Qin Yue Optimal minimal linear codes from posets 2475--2492 Minjia Shi and Wang Xuan and Patrick Solé Two families of two-weight codes over $ \mathbb {Z}_4 $ . . . . . . . . . . . . 2493--2505 Junling Zhou and Wenling Zhou Wide-sense $2$-frameproof codes . . . . 2507--2519 Petr Lisonek Maximal nonassociativity via fields . . 2521--2530 Sudhir R. Ghorpade and Trygve Johnsen A polymatroid approach to generalized weights of rank metric codes . . . . . . 2531--2546 Minjia Shi and Li Xu and Patrick Solé Construction of isodual codes from polycirculant matrices . . . . . . . . . 2547--2560 Juliane Capaverde and Ariane M. Masuda and Virgínia M. Rodrigues Rédei permutations with cycles of the same length . . . . . . . . . . . . . . 2561--2579 Whan-Hyuk Choi and Hyun Jin Kim and Yoonjin Lee Construction of single-deletion-correcting DNA codes using CIS codes . . . . . . . . . . . . 2581--2596 Lukas Kölsch On the inverses of Kasami and Bracken--Leander exponents . . . . . . . 2597--2621
Julien Lavauzelle and Julian Renner Cryptanalysis of a system based on twisted Reed--Solomon codes . . . . . . 1285--1300 Alexandru Chirvasitu and Thomas W. Cusick Affine equivalence for quadratic rotation symmetric Boolean functions . . 1301--1329 Tovohery Hajatiana Randrianarisoa A geometric approach to rank metric codes and a classification of constant weight codes . . . . . . . . . . . . . . 1331--1348 Minfeng Shao and Ying Miao On optimal weak algebraic manipulation detection codes and weighted external difference families . . . . . . . . . . 1349--1369 Dingding Jia and Yamin Liu and Bao Li IBE with tight security against selective opening and chosen-ciphertext attacks . . . . . . . . . . . . . . . . 1371--1400 Lorenzo Grassi and Christian Rechberger Revisiting Gilbert's known-key distinguisher . . . . . . . . . . . . . 1401--1445 Xuanlong Ma and Min Feng and Kaishun Wang Subgroup perfect codes in Cayley sum graphs . . . . . . . . . . . . . . . . . 1447--1461 Yupeng Jiang and Dongdai Lin Longest subsequences shared by two de Bruijn sequences . . . . . . . . . . . . 1463--1475
Peter Beelen and Olav Geil and Edgar Martínez-Moro and Xin-Wen Wu Foreword-Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan . . . . . . . . . . . . . . . 1477--1478 Mojtaba Fadavi and Reza Rezaeian Farashahi Uniform encodings to elliptic curves and indistinguishable point representation 1479--1502 Thomas Britz and Adam Mammoliti and Keisuke Shiromoto Wei-type duality theorems for rank metric codes . . . . . . . . . . . . . . 1503--1519 Umberto Martínez-Peñas Hamming and simplex codes for the sum-rank metric . . . . . . . . . . . . 1521--1539 Lucky Erap Galvez and Jon-Lark Kim Construction of self-dual matrix codes 1541--1560 Alain Couvreur and Isabella Panaccione Power error locating pairs . . . . . . . 1561--1593 Alonso Sepúlveda Castellanos and Maria Bras-Amorós Weierstrass semigroup at $ m + 1 $ rational points in maximal curves which cannot be covered by the Hermitian curve 1595--1616 Maria Bras-Amorós and Iwan Duursma and Euijin Hong Isometry-dual flags of AG codes . . . . 1617--1638 René Bòdker Christensen and Olav Geil Steane-enlargement of quantum codes from the Hermitian function field . . . . . . 1639--1652 Ignacio García-Marco and Irene Márquez-Corbella and Diego Ruano High dimensional affine codes whose square has a designed minimum distance 1653--1672 Hiram H. López and Gretchen L. Matthews and Ivan Soprunov Monomial-Cartesian codes and their duals, with applications to LCD codes, quantum codes, and locally recoverable codes . . . . . . . . . . . . . . . . . 1673--1685 Irene Márquez-Corbella and Edgar Martínez-Moro and Carlos Munuera Computing sharp recovery structures for locally recoverable codes . . . . . . . 1687--1698
Anne Canteaut and Gohar Kyureghyan and Alexander Pott and Felix Ulmer Editorial: Coding and Cryptography 2019 1699--1699 Alexandr A. Polujan and Alexander Pott Cubic bent functions outside the completed Maiorana--McFarland class . . 1701--1722 Daniel Gerike and Gohar M. Kyureghyan Permutations on finite fields with invariant cycle structure on lines . . . 1723--1740 Pan Tan and Zhengchun Zhou and Vladimir Sidorenko and Udaya Parampalli Two classes of optimal LRCs with information $ (r, t)$-locality . . . . . 1741--1757 Jian Liu and Sihem Mesnager and Deng Tang Constructions of optimal locally recoverable codes via Dickson polynomials . . . . . . . . . . . . . . 1759--1780 Tuvi Etzion and Sascha Kurz and Kamil Otal and Ferruh Özbudak Subspace packings: constructions and bounds . . . . . . . . . . . . . . . . . 1781--1810 P. G. Boyvalenkov and P. D. Dragnev and D. P. Hardin and E. B. Saff and M. M. Stoyanova Upper bounds for energies of spherical codes of given cardinality and separation . . . . . . . . . . . . . . . 1811--1826 Sabyasachi Dey and Santanu Sarkar Proving the biases of Salsa and ChaCha in differential attack . . . . . . . . . 1827--1856 Jean-Christophe Deneuville and Philippe Gaborit Cryptanalysis of a code-based one-time signature . . . . . . . . . . . . . . . 1857--1866 Ana Salagean and Ferruh Özbudak Counting Boolean functions with faster points . . . . . . . . . . . . . . . . . 1867--1883 Elena Egorova and Marcel Fernandez and Grigory Kabatiansky On non-binary traceability set systems 1885--1892 Ryutaroh Matsumoto Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets . . 1893--1907 Gretchen L. Matthews and Fernando Piñero Codes with locality from cyclic extensions of Deligne--Lusztig curves 1909--1924 Assia Rousseva and Ivan Landjev The geometric approach to the existence of some quaternary Griesmer codes . . . 1925--1940 Daniel Coggia and Alain Couvreur On the security of a Loidreau rank metric code based encryption scheme . . 1941--1957 Shizhu Tian and Christina Boura and Léo Perrin Boomerang uniformity of popular S-box constructions . . . . . . . . . . . . . 1959--1989 Delphine Boucher An algorithm for decoding skew Reed--Solomon codes with respect to the skew metric . . . . . . . . . . . . . . 1991--2005
Sihem Mesnager and Sihong Su and Hui Zhang A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity . . . . . . . 1--17 Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert Coulter and Irene Villa Generalized isotopic shift construction for APN functions . . . . . . . . . . . 19--32 Marco Calderini Differentially low uniform permutations from known $4$-uniform functions . . . . 33--52 P. Almeida and D. Napp A new rank metric for convolutional codes . . . . . . . . . . . . . . . . . 53--73 Wilfried Meidl and Isabel Pirsic Bent and $ \mathbb {Z}_{2^k} $-Bent functions from spread-like partitions 75--89 Xin Wang Improved upper bounds for parent-identifying set systems and separable codes . . . . . . . . . . . . 91--104 Matthias Grezet and Camilla Hollanti The complete hierarchical locality of the punctured Simplex code . . . . . . . 105--125 Pranab Chakraborty and Subhamoy Maitra Further clarification on Mantin's Digraph Repetition Bias in RC4 . . . . . 127--141 Michael Bamiloshin and Aner Ben-Efraim and Oriol Farr\`as and Carles Padró Common information, matroid representation, and secret sharing for matroid ports . . . . . . . . . . . . . 143--166 Alexey Oblaukhov On metric regularity of Reed--Muller codes . . . . . . . . . . . . . . . . . 167--197
Edoardo Ballico and Giuseppe Favacchio and Elena Guardo and Lorenzo Milazzo Steiner systems and configurations of points . . . . . . . . . . . . . . . . . 199--219 Sartaj Ul Hasan and Mohit Pal and Constanza Riera and Pantelimon St\uanic\ua On the $c$-differential uniformity of certain maps over finite fields . . . . 221--239 Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao Extended Galbraith's test on the anonymity of IBE schemes from higher residuosity . . . . . . . . . . . . . . 241--253 Jingkun Zhou and Zhiwen He and Zhao Chai Two kinds of constructions of directed strongly regular graphs . . . . . . . . 255--268 Delio Jaramillo and Maria Vaz Pinto and Rafael H. Villarreal Evaluation codes and their basic parameters . . . . . . . . . . . . . . . 269--300 Cícero Carvalho and Victor G. L. Neumann Towards the Complete Determination of Next-to-Minimal Weights of Projective Reed--Muller Codes . . . . . . . . . . . 301--315 Chen-Dong Ye and Tian Tian and Fan-Yang Zeng The MILP-aided conditional differential attack and its application to Trivium 317--339 Eiichi Bannai and Manabu Oura and Da Zhao The complex conjugate invariants of Clifford groups . . . . . . . . . . . . 341--350 Julian Renner and Alessandro Neri and Sven Puchinger Low-rank parity-check codes over Galois rings . . . . . . . . . . . . . . . . . 351--386 Trygve Johnsen and Hugues Verdure Greedy weights for matroids . . . . . . 387--405
Chun Guo and Guoyan Zhang Beyond-birthday security for permutation-based Feistel networks . . . 407--440 Claude Carlet and Kwang Ho Kim and Sihem Mesnager A direct proof of APN-ness of the Kasami functions . . . . . . . . . . . . . . . 441--446 Heide Gluesing-Luerssen and Hunter Lehmann Distance Distributions of Cyclic Orbit Codes . . . . . . . . . . . . . . . . . 447--470 Daniele Bartoli and Matteo Bonini and Marco Timpanella On the weight distribution of some minimal codes . . . . . . . . . . . . . 471--487 Stefano Innamorati and Fulvio Zuanni Classifying sets of class $ [1, q + 1, 2 q + 1, q^2 + q + 1]_2 $ in $ {\rm PG}(r, q) $, $ r \ge 3 $ . . . . . . . . . . . 489--496 Hiram H. López and Beth Malmskog and Gretchen L. Matthews and Fernando Piñero-González and Mary Wootters Hermitian-lifted codes . . . . . . . . . 497--515 James A. Davis and J. J. Hoo and Connor Kissane and Ziming Liu and Calvin Reedy and Kartikey Sharma and Ken Smith and Yiwei Sun Abelian difference sets with the symmetric difference property . . . . . 517--523 Nicholas J. Cavenagh and Adam Mammoliti and Ian M. Wanless Maximal sets of mutually orthogonal frequency squares . . . . . . . . . . . 525--558 Sascha Kurz and Eitan Yaakobi PIR Codes with Short Block Length . . . 559--587 Tran van Trung An extending theorem for $s$-resolvable $t$-designs . . . . . . . . . . . . . . 589--597
José Andrés Armario and Ivan Bailera and Ronan Egan Generalized Hadamard full propelinear codes . . . . . . . . . . . . . . . . . 599--615 Makoto Araya and Masaaki Harada and Ken Saito Characterization and classification of optimal LCD codes . . . . . . . . . . . 617--640 Tania Sidana and Anuradha Sharma Roulette games and depths of words over finite commutative rings . . . . . . . . 641--678 Zhongxiao Wang and Qunxiong Zheng and Xiaoxin Zhao and Xiutao Feng Grain-like structures with minimal and maximal period sequences . . . . . . . . 679--693 Yuhua Sun and Tongjiang Yan and Qiuyan Wang The $2$-adic complexity of Yu--Gong sequences with interleaved structure and optimal autocorrelation magnitude . . . 695--707 Sebati Ghosh and Palash Sarkar Variants of Wegman--Carter message authentication code supporting variable tag lengths . . . . . . . . . . . . . . 709--736 Kangquan Li and Chunlei Li and Tor Helleseth and Longjiang Qu Cryptographically strong permutations from the butterfly structure . . . . . . 737--761
Tsuyoshi Miezaki Design-theoretic analogies between codes, lattices, and vertex operator algebras . . . . . . . . . . . . . . . . 763--780 Zhaoping Meng and Bin Zhang and Zhanggui Wu Constructions of doubly resolvable Steiner quadruple systems . . . . . . . 781--795 Hualu Liu and Peng Hu and Xiusheng Liu Asymmetric entanglement-assisted quantum codes: bound and constructions . . . . . 797--809 Simeon Ball Some constructions of quantum MDS codes 811--821 Lin Sok New families of self-dual codes . . . . 823--841 Tsuyoshi Miezaki and Akihiro Munemasa and Hiroyuki Nakasora A note on Assmus--Mattson type theorems 843--858 Bart Mennink and Samuel Neves On the Resilience of Even--Mansour to Invariant Permutations . . . . . . . . . 859--893 Dingding Jia and Beno\^\it Libert SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions 895--923 Veronika Kuchta and Amin Sakzad and Ron Steinfeld and Joseph K. Liu Lattice-based zero-knowledge arguments for additive and multiplicative relations . . . . . . . . . . . . . . . 925--963 Angela Aguglia and Luca Giuzzi and Angelo Sonnino Near-MDS codes from elliptic curves . . 965--972 Wonhee Cho and Jiseung Kim and Changmin Lee (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps . . . . . . 973--1016 Nan Cui and Shengli Liu and Dawu Gu and Jian Weng Robustly reusable fuzzy extractor with imperfect randomness . . . . . . . . . . 1017--1059 Masoumeh Shafieinejad and Navid Nasr Esfahani A scalable post-quantum hash-based group signature . . . . . . . . . . . . . . . 1061--1090 Ankur and Pramod Kumar Kewat Self-dual codes over $ \mathbb{F}_2[u] / \langle u^4 \rangle $ and Jacobi forms over a totally real subfield of $ \mathbb{Q}(\zeta_8) $ . . . . . . . . . 1091--1109
Hanwen Feng and Jianwei Liu and Qianhong Wu Traceable ring signatures: general framework and post-quantum security . . 1111--1145 Huili Dong Flag-transitive 4-designs and $ P S L(2, q) $ groups . . . . . . . . . . . . . . 1147--1157 Jun Guo Cameron--Liebler sets in bilinear forms graphs . . . . . . . . . . . . . . . . . 1159--1180 Haode Yan and Chengju Li Differential spectra of a class of power permutations with characteristic 5 . . . 1181--1191 Zhengbang Zha and Lei Hu Some classes of power functions with low $c$-differential uniformity over finite fields . . . . . . . . . . . . . . . . . 1193--1210 Daniel R. Hawtin $s$-Elusive codes in Hamming graphs . . 1211--1220 Daniele Bartoli and Maria Montanucci and Giovanni Zini On certain self-orthogonal AG codes with applications to quantum error-correcting codes . . . . . . . . . . . . . . . . . 1221--1239 Himadri Shekhar Chakraborty and Tsuyoshi Miezaki Average of complete joint weight enumerators and self-dual codes . . . . 1241--1254 Jianfu Chen and Shenglin Zhou Flag-transitive, point-imprimitive $ 2 - (v, k, \lambda) $ symmetric designs with $k$ and $ \lambda $ prime powers . . . . 1255--1260 Giovanni Falcone and Marco Pavone Binary Hamming codes and Boolean designs 1261--1277 Julian Renner and Sven Puchinger and Antonia Wachter-Zeh LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding . . . . . . . . . . 1279--1319 Jonathan S. Turner and Ilias S. Kotsireas and Andrew J. Geyer A Legendre pair of length 77 using complementary binary matrices with fixed marginals . . . . . . . . . . . . . . . 1321--1333 Olive Chakraborty and Jean-Charles Faug\`ere and Ludovic Perret Cryptanalysis of the extension field cancellation cryptosystem . . . . . . . 1335--1364 Alexandr A. Polujan and Alexander Pott Correction to: Cubic bent functions outside the completed Maiorana--McFarland class . . . . . . . 1365--1366
Hiram H. López and Ivan Soprunov and Rafael H. Villarreal The dual of an evaluation code . . . . . 1367--1403 Tairong Shi and Wenling Wu and Sengpeng Wang Breaking LWC candidates: sESTATE and Elephant in quantum setting . . . . . . 1405--1432 Mahdi Sajadieh and Mohsen Mousavi Construction of MDS matrices from generalized Feistel structures . . . . . 1433--1452 Yumeng Yang and Xiangyong Zeng and Shi Wang Construction of lightweight involutory MDS matrices . . . . . . . . . . . . . . 1453--1483 Fengrong Zhang and Enes Pasalic and Yongzhuang Wei Wide minimal binary linear codes from the general Maiorana--McFarland class 1485--1507 Kanat Abdukhalikov Equivalence classes of Niho bent functions . . . . . . . . . . . . . . . 1509--1534 Keita Emura and Atsushi Takayasu and Yohei Watanabe Adaptively secure revocable hierarchical IBE from $k$-linear assumption . . . . . 1535--1574 Yanwei Zhou and Bo Yang and Yi Mu Novel generic construction of leakage-resilient PKE scheme with CCA security . . . . . . . . . . . . . . . . 1575--1614 Steven T. Dougherty and Joe Gildea and Abidin Kaya Composite matrices from group rings, composite $G$-codes and constructions of self-dual codes . . . . . . . . . . . . 1615--1638 Ruikai Chen and Sihem Mesnager and Chang-An Zhao Good polynomials for optimal LRC of low locality . . . . . . . . . . . . . . . . 1639--1660 Tuvi Etzion and Junling Zhou Large sets with multiplicity . . . . . . 1661--1690 Huaning Liu and Xi Liu On the properties of generalized cyclotomic binary sequences of period $ 2 p^m $ . . . . . . . . . . . . . . . . 1691--1712 Cunsheng Ding and Chunming Tang and Vladimir D. Tonchev The projective general linear group $ \mathrm {PGL}(2, 2^m) $ and linear codes of length $ 2^m + 1 $ . . . . . . . . . 1713--1734 Oriol Farr\`as and Jordi Ribes-González and Sara Ricci Privacy-preserving data splitting: a combinatorial approach . . . . . . . . . 1735--1756
Junqing Gong and Haifeng Qian Simple and efficient FE for quadratic functions . . . . . . . . . . . . . . . 1757--1786 Varsha Chauhan and Anuradha Sharma and Monika Yadav Hamming weight distributions of multi-twisted codes over finite fields 1787--1837 Shoko Chisaki and Ryoh Fuji-Hara and Nobuko Miyamoto A construction for circulant type dropout designs . . . . . . . . . . . . 1839--1852 Giovanni Zini and Ferdinando Zullo Scattered subspaces and related codes 1853--1873 Ling Song and Yi Tu and Lei Hu Security analysis of Subterranean 2.0 1875--1905 Sebati Ghosh and Palash Sarkar Breaking tweakable enciphering schemes using Simon's algorithm . . . . . . . . 1907--1926 Atsushi Takayasu Tag-based ABE in prime-order groups via pair encoding . . . . . . . . . . . . . 1927--1963 Atsushi Takayasu Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity . . . . . . . . . . . . . . . 1965--1992 Ziling Heng and Dexiang Li and Fuling Chen A family of projective two-weight linear codes . . . . . . . . . . . . . . . . . 1993--2007 Xiaoqiang Wang and Dabin Zheng and Yan Zhang Binary linear codes with few weights from Boolean functions . . . . . . . . . 2009--2030 Ruikai Chen and Sihem Mesnager and Chang-An Zhao Correction to: Good polynomials for optimal LRC of low locality . . . . . . 2031--2031
Hadi Kharaghani and Thomas Pender and Sho Suda Balancedly splittable orthogonal designs and equiangular tight frames . . . . . . 2033--2050 Hongwei Liu and Shengwei Liu Construction of MDS twisted Reed--Solomon codes and LCD--MDS codes 2051--2065 Peter Ligeti and Peter Sziklai and Marcella Takáts Generalized threshold secret sharing and finite geometry . . . . . . . . . . . . 2067--2078 Fatemeh Ghasemi and Reza Kaboli and Mohammad-Mahdi Rafiei On ideal homomorphic secret sharing schemes and their decomposition . . . . 2079--2096 Nicolas Aragon and Marco Baldi and Paolo Santini Cryptanalysis of a code-based full-time signature . . . . . . . . . . . . . . . 2097--2112 Sadegh Sadeghi and Vincent Rijmen and Nasour Bagheri Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK . . . . . . . . . . . . . 2113--2155 E. Ballico Locally Recoverable Codes correcting many erasures over small fields . . . . 2157--2162 Trygve Johnsen and Hugues Verdure Möbius and coboundary polynomials for matroids . . . . . . . . . . . . . . . . 2163--2177 Xiaojing Chen and Shixin Zhu and Gaojun Luo A new family of EAQMDS codes constructed from constacyclic codes . . . . . . . . 2179--2193 Daitao Huang and Qin Yue and Xia Li MDS or NMDS self-dual codes from twisted generalized Reed--Solomon codes . . . . 2195--2209
Alexander A. Davydov and Stefano Marcugini and Fernanda Pambianco Twisted cubic and point-line incidence matrix in $ \mathrm {PG}(3, q) $ . . . . 2211--2233 Gianira N. Alfarano and Julia Lieb and Joachim Rosenthal Construction of LDPC convolutional codes via difference triangle sets . . . . . . 2235--2254 Ritam Bhaumik and Mridul Nandi and Anik Raychaudhuri Improved indifferentiability security proof for 3-round tweakable Luby--Rackoff . . . . . . . . . . . . . 2255--2281 Kanat Abdukhalikov and Duy Ho Extended cyclic codes, maximal arcs and ovoids . . . . . . . . . . . . . . . . . 2283--2294 Masaaki Harada Construction of binary LCD codes, ternary LCD codes and quaternary Hermitian LCD codes . . . . . . . . . . 2295--2312 Ayça Çesmelioglu and Wilfried Meidl and Isabel Pirsic Vectorial bent functions and partial difference sets . . . . . . . . . . . . 2313--2330 Clementa Alonso-González and Miguel Ángel Navarro-Pérez Cyclic orbit flag codes . . . . . . . . 2331--2356 Yu-Chi Chen and Xin Xie and Raylin Tso Public key encryption with filtered equality test revisited . . . . . . . . 2357--2372 Charles J. Colbourn Egalitarian Steiner triple systems for data popularity . . . . . . . . . . . . 2373--2395 Keita Emura and Atsushi Takayasu and Yohei Watanabe Efficient identity-based encryption with Hierarchical key-insulation from HIBE 2397--2431
Michail I. Rozhkov and Alexander V. Sorokin Some conditions for absence of affine functions in NFSR output stream . . . . 2433--2443 Stefka Bouyuklieva Optimal binary LCD codes . . . . . . . . 2445--2461 A. Bapi\'c and E. Pasalic A new method for secondary constructions of vectorial bent functions . . . . . . 2463--2475 Qian Wang and Chenhui Jin Bounding the length of impossible differentials for SPN block ciphers . . 2477--2493 Peng Hu and Xiusheng Liu Linear complementary pairs of codes over rings . . . . . . . . . . . . . . . . . 2495--2509 Xiang Wang and Yuanjie Wang and Fang-Wei Fu Nonexistence of perfect permutation codes under the Kendall $ \tau $ -metric 2511--2531 Xiaojing Chen and Shixin Zhu and Wan Jiang Cyclic codes and some new entanglement-assisted quantum MDS codes 2533--2551 Matthew Fickus and Joseph W. Iverson and Emily J. King Grassmannian codes from paired difference sets . . . . . . . . . . . . 2553--2576 Junichi Tomida and Yuto Kawahara and Ryo Nishimaki Fast, compact, and expressive attribute-based encryption . . . . . . . 2577--2626 Sartaj Ul Hasan and Mohit Pal and Pantelimon St\uanic\ua Boomerang uniformity of a class of power maps . . . . . . . . . . . . . . . . . . 2627--2636 Yanan Wu and Nian Li and Xiangyong Zeng New P$c$N and AP$c$N functions over finite fields . . . . . . . . . . . . . 2637--2651
Laura Monroe Binary signed-digit integers and the Stern diatomic sequence . . . . . . . . 2653--2662 Jinjin Chai and Zilong Wang and Erzhong Xue Walsh spectrum and nega spectrum of complementary arrays . . . . . . . . . . 2663--2677 Binbin Pang and Shixin Zhu and Xiaoshan Kai Five families of the narrow-sense primitive BCH codes over finite fields 2679--2696 WeiGuo Zhang and YuJuan Sun and Enes Pasalic Three classes of balanced vectorial semi-bent functions . . . . . . . . . . 2697--2714 M. H. Ahmadi and N. Akhlaghinia and S. Sadri New partitionings of complete designs 2715--2723 Simona Bonvicini and Marco Buratti and Tommaso Traetta The first families of highly symmetric Kirkman Triple Systems whose orders fill a congruence class . . . . . . . . . . . 2725--2757 Sascha Kurz Bounds for flag codes . . . . . . . . . 2759--2785 Chen-Dong Ye and Tian Tian An improved degree evaluation method of NFSR-based cryptosystems . . . . . . . . 2787--2806 Yiming Li and Shengli Liu and Dawu Gu Pseudorandom functions in NC class from the standard LWE assumption . . . . . . 2807--2839 Hariom Sharma and R. K. Sharma Existence of primitive normal pairs with one prescribed trace over finite fields 2841--2855 Navid Nasr Esfahani and Douglas R. Stinson On security properties of all-or-nothing transforms . . . . . . . . . . . . . . . 2857--2867 Ziran Tu and Xiangyong Zeng and Yan Li Binomial permutations over finite fields with even characteristic . . . . . . . . 2869--2888
Nian Li and Zhao Hu and Xiangyong Zeng A note on ``Cryptographically strong permutations from the butterfly structure'' . . . . . . . . . . . . . . 265--276 Keisuke Hara and Takahiro Matsuda and Keisuke Tanaka Generic transformation from broadcast encryption to round-optimal deniable ring authentication . . . . . . . . . . 277--316 Joe Gildea and Adrian Korban and Adam Michael Roberts New binary self-dual codes of lengths 80, 84 and 96 from composite matrices 317--342 Soumak Biswas and Maheshanand Bhaintwal Quantum codes from $ \mathbb {Z}_2 \mathbb {Z}_2 [u] / \langle u^4 \rangle $-cyclic codes . . . . . . . . . . . . . 343--366 Rong Pan and R. Julian R. Abel and Xiaomiao Wang Difference matrices with five rows over finite abelian groups . . . . . . . . . 367--386 Xiao-Juan Wang and Tian Tian and Wen-Feng Qi A generic method for investigating nonsingular Galois NFSRs . . . . . . . . 387--408 Steven T. Dougherty The neighbor graph of binary self-dual codes . . . . . . . . . . . . . . . . . 409--425 Marcel Fernandez and Jorge J. Urroz A study of the separating property in Reed--Solomon codes by bounding the minimum distance . . . . . . . . . . . . 427--442 Fatih Demirbas and Orhun Kara Integral characteristics by keyspace partitioning . . . . . . . . . . . . . . 443--472 Ulrich Dempwolff Correction to: CCZ equivalence of power functions . . . . . . . . . . . . . . . 473--475 A. Blokhuis and M. De Boeck and J. D'haeseleer Correction to: Cameron--Liebler sets of $k$-spaces in $ \mathrm {PG}(n, q) $ . . 477--487
Deepak Kumar Dalai and Santu Pal and Santanu Sarkar A state bit recovery algorithm with TMDTO attack on Lizard and Grain-128a 489--521 Olav Geil From primary to dual affine variety codes over the Klein quartic . . . . . . 523--543 Xiaofang Xu and Xiangyong Zeng and Shasha Zhang Regular complete permutation polynomials over $ \mathbb {F}_{2^n} $ . . . . . . . 545--575 Jiang Liu and Qin Li and Haozhen Situ Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation . . . . . . . . . . . . . . . 577--591 Moritz Wiese and Holger Boche Mosaics of combinatorial designs for information-theoretic security . . . . . 593--632 Jan De Beule and Jonathan Mannaert and Leo Storme Cameron--Liebler $k$-sets in subspaces and non-existence conditions . . . . . . 633--651 H. Zhao and Y. Wei and N. Cepak Two secondary constructions of bent functions without initial conditions . . 653--679 Pan Tan and Cuiling Fan and Wei Guo Linear codes from support designs of ternary cyclic codes . . . . . . . . . . 681--693 Terry Shue Chien Lau and Chik How Tan On the design and security of Lee metric McEliece cryptosystems . . . . . . . . . 695--717 Quan Yuan and Mehdi Tibouchi and Masayuki Abe On subset-resilient hash function families . . . . . . . . . . . . . . . . 719--758 Charul Rajput and Maheshanand Bhaintwal On the locality of quasi-cyclic codes over finite fields . . . . . . . . . . . 759--777 Dibyayoti Jena and Geertrui Van de Voorde The geometric field of linearity of linear sets . . . . . . . . . . . . . . 779--799 Dmitrii Koshelev Indifferentiable hashing to ordinary elliptic $ \mathbb {F}_q $-curves of $ j = 0 $ with the cost of one exponentiation in $ \mathbb {F}_q $ . . 801--812 Mengzhen Zhao and Cuiling Fan and Zihong Tian Nearly optimal balanced quaternary sequence pairs of prime period $ N \equiv 5 \pmod 8 $ . . . . . . . . . . . 813--826 Tim Penttila Uniqueness of the inversive plane of order sixty-four . . . . . . . . . . . . 827--834
Kevin M. Byrnes Isomorphism of maximum length circuit codes . . . . . . . . . . . . . . . . . 835--850 Liantao Lan and Yanxun Chang and Lidong Wang The completion of optimal cyclic quaternary codes of weight 3 and distance 3 . . . . . . . . . . . . . . . 851--862 Yanwei Zhao and Shenglin Zhou Flag-transitive $ 2 - (v, k, \lambda) $ designs with $ r > \lambda (k - 3) $ . . 863--869 Rajendra M. Pawale and Mohan S. Shrikhande and Kusum S. Rajbhar Non-existence of quasi-symmetric designs with restricted block graphs . . . . . . 871--879 Luka Music and Céline Chevalier and Elham Kashefi Dispelling myths on superposition attacks: formal security model and attack analyses . . . . . . . . . . . . 881--920 Yi Zhao and Kaitai Liang and Emmanouil Panaousis Practical algorithm substitution attack on extractable signatures . . . . . . . 921--937 Alexander Barg and Zitan Chen and Itzhak Tamo A construction of maximally recoverable codes . . . . . . . . . . . . . . . . . 939--945 Daiki Kawabata and Tatsuya Maruta On the nonexistence of ternary linear codes attaining the Griesmer bound . . . 947--956 Paolo Santonastaso and Ferdinando Zullo On the list decodability of rank-metric codes containing Gabidulin codes . . . . 957--982 Orr Dunkelman and Maria Eichlseder and Markus Schofnegger Practical key recovery attacks on FlexAEAD . . . . . . . . . . . . . . . . 983--1007 Christof Beierle and Gregor Leander and Léo Perrin Trims and extensions of quadratic APN functions . . . . . . . . . . . . . . . 1009--1036 Dipak K. Bhunia and Cristina Fernández-Córdoba and Merc\`e Villanueva On the linearity and classification of $ \mathbb {Z}_{p^s} $-linear generalized Hadamard codes . . . . . . . . . . . . . 1037--1058 Janaka Alawatugoda and Tatsuaki Okamoto Standard model leakage-resilient authenticated key exchange using inner-product extractors . . . . . . . . 1059--1079 Nurdagül Anbar and Wilfried Meidl Bent partitions . . . . . . . . . . . . 1081--1101
Carlos Galindo and Fernando Hernando On the generalization of the construction of quantum codes from Hermitian self-orthogonal codes . . . . 1103--1112 Hongwei Zhu and Minjia Shi and Ferruh Özbudak Complete $b$-symbol weight distribution of some irreducible cyclic codes . . . . 1113--1125 Kai Lin Ong and Miin Huey Ang On equivalence of cyclic and dihedral zero-divisor codes having nilpotents of nilpotency degree two as generators . . 1127--1138 WeiGuo Zhang and Enes Pasalic and LiuPiao Zhang Phase orthogonal sequence sets for (QS)CDMA communications . . . . . . . . 1139--1156 Fucai Luo and Saif Al-Kuwari Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security . . . . . . . . . 1157--1177 Zhenyu Lu and Sihem Mesnager and Meiqin Wang An STP-based model toward designing S-boxes with good cryptographic properties . . . . . . . . . . . . . . . 1179--1202 Felix Lazebnik and Lorinda Leshock On Pappus configurations in Hall planes 1203--1219 Hui Zhang and Cuiling Fan and Sihem Mesnager Constructions of two-dimensional Z-complementary array pairs with large ZCZ ratio . . . . . . . . . . . . . . . 1221--1239 Nuh Aydin and Peihan Liu and Bryan Yoshino Polycyclic codes associated with trinomials: good codes and open questions . . . . . . . . . . . . . . . 1241--1269 Gaojun Luo and San Ling Application of optimal $p$-ary linear codes to alphabet-optimal locally repairable codes . . . . . . . . . . . . 1271--1287 Fengrong Zhang and Enes Pasalic and Yongzhuang Wei Minimal binary linear codes: a general framework based on bent concatenation 1289--1318
Can Xiang and Chunming Tang and Qi Liu An infinite family of antiprimitive cyclic codes supporting Steiner systems $ S(3, 8, 7^m + 1) $ . . . . . . . . . . 1319--1333 Michael Kiermaier On $ \alpha $-points of $q$-analogs of the Fano plane . . . . . . . . . . . . . 1335--1345 Valerio Dose and Pietro Mercuri and Claudio Stirpe High order elements in finite fields arising from recursive towers . . . . . 1347--1368 Engin Senel and Figen Öke On the automorphisms of generalized algebraic geometry codes . . . . . . . . 1369--1379 Arghya Bhattacharjee and Avijit Dutta and Mridul Nandi $ \mathsf {CENCPP}^* $: beyond-birthday-secure encryption from public permutations . . . . . . . . . . 1381--1425 Austin Dukes and Andrea Ferraguti and Giacomo Micheli Optimal selection for good polynomials of degree up to five . . . . . . . . . . 1427--1436 Kwang Ho Kim and Sihem Mesnager and Myong Chol Jo On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity . . . . . . . . 1437--1461 Jinming Wen and Xiao-Wen Chang Sharper bounds on four lattice constants 1463--1484 Tsuyoshi Miezaki and Hiroyuki Nakasora A note on the Assmus--Mattson theorem for some binary codes . . . . . . . . . 1485--1502 Angela Aguglia and Michela Ceria and Luca Giuzzi Some hypersurfaces over finite fields, minimal codes and secret sharing schemes 1503--1519 Dean Crnkovi\'c and Daniel R. Hawtin and Andrea Svob Neighbour-transitive codes and partial spreads in generalised quadrangles . . . 1521--1533 Luka Music and Céline Chevalier and Elham Kashefi Correction to: Dispelling myths on superposition attacks: formal security model and attack analyses . . . . . . . 1535--1535
Hyun Kwang Kim and Jieun Kwon Classification of weighted posets and digraphs admitting the extended Hamming code to be a perfect code . . . . . . . 2249--2269 Masayuki Abe and Miguel Ambrona Blind key-generation attribute-based encryption for general predicates . . . 2271--2299 Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 . . . . . 2301--2318 Abbas Alhakim Designing preference functions for de Bruijn sequences with forbidden words 2319--2335 Junru Ma and Jinquan Luo Constructions of MDS symbol-pair codes with minimum distance seven or eight . . 2337--2359 Hamidreza Eyvazi and Karim Samei and Batoul Savari The linearity of Carlet's Gray image of linear codes over $ \mathbb {Z}_8 $ . . 2361--2373 Daniel Horsley and Padraig Ó Catháin Block avoiding point sequencings of partial Steiner systems . . . . . . . . 2375--2383 Haode Yan and Kun Zhang On the $c$-differential spectrum of power functions over finite fields . . . 2385--2405 Yagmur Çakiroglu and Oguz Yayla and Emrah Sercan Yilmaz The number of irreducible polynomials over finite fields with vanishing trace and reciprocal trace . . . . . . . . . . 2407--2417 Jun Liu and Dachao Wang and Yupu Hu and Jie Chen and Baocang Wang Improved key-recovery attacks on reduced-round WEM-8 . . . . . . . . . . 2419--2448 Zhaocun Zhou and Dengguo Feng and Bin Zhang Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V . . . . . . 2449--2479 Gerald J. Janusz Covering polynomials and projections of self-dual codes . . . . . . . . . . . . 2481--2489 Lijun Ji and Miao Liang and Yanting Wang Combinational constructions of splitting authentication codes with perfect secrecy . . . . . . . . . . . . . . . . 2491--2515
W. Cary Huffman and Jon-Lark Kim and Patrick Solé Guest editorial: On coding theory and combinatorics --- in memory of Vera Pless . . . . . . . . . . . . . . . . . 2517--2527 Jian Gao and Xiangrui Meng and Fang-Wei Fu Weight distribution of double cyclic codes over Galois rings . . . . . . . . 2529--2549 Rongsheng Wu and Minjia Shi On $ \mathbb {Z}_2 \mathbb {Z}_4 $-additive polycyclic codes and their Gray images . . . . . . . . . . . . . . 2551--2562 Federico N. Martínez Symmetric functions and spherical $t$-designs in $ \pm \mathbb {R}^2 $ . . 2563--2581 Himadri Shekhar Chakraborty and Tsuyoshi Miezaki Variants of Jacobi polynomials in coding theory . . . . . . . . . . . . . . . . . 2583--2597 Minjia Shi and Shukai Wang and Tor Helleseth and Patrick Solé Quadratic residue codes, rank three groups and PBIBDs . . . . . . . . . . . 2599--2611 Rongcun Qin and Hengming Zhao and Huangsheng Yu Compatible difference packing set systems and their applications to multilength variable-weight OOCs . . . . 2613--2645 Martino Borello and Cem Güneri and Elif Saçìkara and Patrick Solé The concatenated structure of quasi-abelian codes . . . . . . . . . . 2647--2661 Liqin Qian and Xiwang Cao and Wei Lu and Patrick Solé A new method for constructing linear codes with small hulls . . . . . . . . . 2663--2682 Serhii Dyshko and Jay A. Wood MacWilliams extension property for arbitrary weights on linear codes over module alphabets . . . . . . . . . . . . 2683--2701 Yuqing Fu and Hongwei Liu Galois self-orthogonal constacyclic codes over finite fields . . . . . . . . 2703--2733 Whan Hyuk Choi and Jon Lark Kim An improved upper bound on self-dual codes over finite fields $ {\rm GF} (11) $, $ {\rm GF} (19) $, and $ {\rm GF} (23) $ . . . . . . . . . . . . . . . . . 2735--2751 Vladimir D. Tonchev On Pless symmetry codes, ternary QR codes, and related Hadamard matrices and designs . . . . . . . . . . . . . . . . 2753--2762 Shikha Patel and Om Prakash $ (\theta, \delta_\theta)$-Cyclic codes over $ \mathbb {F}_q[u, v] \slash \langle u^2 - u, v^2 - v, u v - v u \rangle $ . . . . . . . . . . . . . . . 2763--2781
Stéphane Ballet and Nicolas Baudru and Alexis Bonnecaze and Mila Tukumuli Construction of asymmetric Chudnovsky-type algorithms for multiplication in finite fields . . . . 2783--2811 Yansheng Wu and Yoonjin Lee and Qiang Wang Further improvement on index bounds . . 2813--2821 Lin Sok A new construction of linear codes with one-dimensional hull . . . . . . . . . . 2823--2839 Fatemeh Jafari and Alireza Abdollahi and Javad Bagherian and Maryam Khatami and Reza Sobhani Equidistant permutation group codes . . 2841--2859 Edoukou Berenger Ayebie and El Mamoun Souidi New code-based cryptographic accumulator and fully dynamic group signature . . . 2861--2891 Hokuto Takahashi and Manabu Hagiwara Decoding algorithms of monotone codes and azinv codes and their unified view 2893--2922 Iwan Duursma and Xiao Li Johnson graph codes . . . . . . . . . . 2923--2941 Jessica Bariffi and Sam Mattheus and Alessandro Neri and Joachim Rosenthal Moderate-density parity-check codes from projective bundles . . . . . . . . . . . 2943--2966 Jon-Lark Kim and JunYong Park Steganography from perfect codes on Cayley graphs over Gaussian integers, Eisenstein--Jacobi integers and Lipschitz integers . . . . . . . . . . . 2967--2989 Xianmang He and Yindong Chen and Zusheng Zhang and Kunxiao Zhou Parallel sub-code construction for constant-dimension codes . . . . . . . . 2991--3001 Adel Alahmadi and Amani Alkathiry and Alaa Altassan and Alexis Bonnecaze and Hatoon Shoaib and Patrick Solé The build-up construction over a commutative non-unital ring . . . . . . 3003--3010 Slim Bettaieb and Lo\"\ic Bidoux and Olivier Blazy and Yann Connan and Philippe Gaborit A gapless code-based hash proof system based on RQC and its applications . . . 3011--3044
Ferruh Özbudak and Burcu Gülmez Temür Classification of permutation polynomials of the form $ x^3 g(x^{q - 1}) $ of $ \mathbb {F}_{q^2} $ where $ g(x) = x^3 + b x + c $ and $ b, c \in \mathbb {F}_q^* $ . . . . . . . . . . . 1537--1556 Simeon Ball and James Dixon The equivalence of linear codes implies semi-linear equivalence . . . . . . . . 1557--1565 Tran van Trung A method of constructing 2-resolvable $t$-designs for $ t = 3, 4$ . . . . . . 1567--1583 Dean Crnkovi\'c and Andrea Svob Switching for 2-designs . . . . . . . . 1585--1593 Vladimir D. Tonchev Book Review: \booktitleDesigns from Linear Codes, second edition, by Cunsheng Ding and Chunming Tang, World Scientific, 2022 . . . . . . . . . . . . 1595--1597 Jingjun Bao and Lijun Ji Large sets of $t$-designs over finite fields exist for all $t$ . . . . . . . . 1599--1609 Menglong Zhang and Tao Feng and Xiaomiao Wang The existence of cyclic $ (v, 4, 1)$-designs . . . . . . . . . . . . . . 1611--1628 Xia Li and Qin Yue Non-binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codes . . . . . . . . . . 1629--1647 Jun Zhang and Zhengchun Zhou and Chunming Tang A class of twisted generalized Reed--Solomon codes . . . . . . . . . . 1649--1658 Sergey Bereg and Brian Malouf and Linda Morales and Thomas Stanley and I. Hal Sudborough Using permutation rational functions to obtain permutation arrays with large Hamming distance . . . . . . . . . . . . 1659--1677 Adrian Korban and Serap Sahinkaya and Deniz Ustun Reversible $ G^k $-codes with applications to DNA codes . . . . . . . 1679--1694
Yan Wang and Xilin Han and Weiqiong Wang and Ziling Heng Linear complexity over $ \mathbb {F}_q $ and 2-adic complexity of a class of binary generalized cyclotomic sequences with good autocorrelation . . . . . . . 1695--1712 Alexander M. Romanov On the number of q -ary quasi-perfect codes with covering radius 2 . . . . . . 1713--1719 Khodakhast Bibak and Behrouz Zolfaghari The Modular Subset-Sum Problem and the size of deletion correcting codes . . . 1721--1734 Jung Hee Cheon and Wonhee Cho and Jeong Han Kim and Jiseung Kim Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions . . . . . . . . . 1735--1760 Samaneh Mashahdi and Bagher Bagherpour and Ali Zaghian A non-interactive $ (t, n)$-publicly verifiable multi-secret sharing scheme 1761--1782 Sadmir Kudin and Enes Pasalic A complete characterization of $ \mathcal {D}_0 \cap \mathcal {M}^\# $ and a general framework for specifying bent functions in $ \mathcal {C} $ outside $ \mathcal {M}^\# $ . . . . . . 1783--1796 Seyyed Arash Azimi and Adrián Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis 1797--1855 Lidong Wang and Lulu Cai and Tao Feng and Zihong Tian and Xiaomiao Wang Geometric orthogonal codes and geometrical difference packings . . . . 1857--1879 Marién Abreu and Martin Funk and Vedran Kr\vcadinac and Domenico Labbate Strongly regular configurations . . . . 1881--1897 Katharina Boudgoust and Amin Sakzad and Ron Steinfeld Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems . . . . . . . . . . 1899--1936 Junzhen Sui and Xiaomeng Zhu and Xueying Shi MDS and near-MDS codes via twisted Reed--Solomon codes . . . . . . . . . . 1937--1958
Simeon Ball and Michel Lavrauw and Tamás Sz\Honyi Contributions by Aart Blokhuis to finite geometry, discrete mathematics, and combinatorics . . . . . . . . . . . . . 1959--1961 B. De Bruyn and M. Gao A characterization of the Coxeter cap 1963--1981 Willem H. Haemers and Leila Parsaei Majd Spectral symmetry in conference matrices 1983--1990 Oliver Janzer and Zoltán Lóránt Nagy Coloring linear hypergraphs: the Erd\Hos--Faber--Lovász conjecture and the Combinatorial Nullstellensatz . . . . . 1991--2001 Aida Abiad and Bart De Bruyn and Jozefien D'haeseleer and Jack H. Koolen Neumaier graphs with few eigenvalues . . 2003--2019 Michel Lavrauw and Tomasz Popiel and John Sheekey Combinatorial invariants for nets of conics in $ \mathrm {PG}(2, q) $ . . . . 2021--2067 R. A. Bailey and Peter J. Cameron and Michael Kinyon and Cheryl E. Praeger Diagonal groups and arcs over groups . . 2069--2080 Giovanni Longobardi and Leo Storme and Rocco Trombetti On sets of subspaces with two intersection dimensions and a geometrical junta bound . . . . . . . . 2081--2099 A. Blokhuis and M. De Boeck and J. D'haeseleer On the sunflower bound for $k$-spaces, pairwise intersecting in a point . . . . 2101--2111 Lins Denaux Constructing saturating sets in projective spaces using subgeometries 2113--2144 William M. Kantor Automorphism subgroups for designs with $ \lambda = 1 $ . . . . . . . . . . . . 2145--2157 Anton Betten and Fatma Karaoglu The Eckardt point configuration of cubic surfaces revisited . . . . . . . . . . . 2159--2180 Xinyu Tan and Narayanan Rengaswamy and Robert Calderbank Approximate unitary 3-designs from transvection Markov chains . . . . . . . 2181--2204 Carmen Amarra and Alice Devillers and Cheryl E. Praeger Delandtsheer--Doyen parameters for block-transitive point-imprimitive 2-designs . . . . . . . . . . . . . . . 2205--2221 Aart Blokhuis and Ruud Pellikaan and Tamás Sz\Honyi The extended coset leader weight enumerator of a twisted cubic code . . . 2223--2247
Lukas Kölsch and Björn Kriepke and Gohar M. Kyureghyan Image sets of perfectly nonlinear maps 1--27 He Zhang and Chunming Tang Constructions of large cyclic constant dimension codes via Sidon spaces . . . . 29--44 Hadi Kharaghani and Sho Suda and Vlad Zaitsev On a class of optimal constant weight ternary codes . . . . . . . . . . . . . 45--54 Yasamin Khaefi and Zeinab Akhlaghi and Behrooz Khosravi On the subgroup perfect codes in Cayley graphs . . . . . . . . . . . . . . . . . 55--61 Maximilien Gadouleau and Luca Mariot and Stjepan Picek Bent functions in the partial spread class generated by linear recurring sequences . . . . . . . . . . . . . . . 63--82 Pan Tan and Cuiling Fan and Cunsheng Ding and Chunming Tang and Zhengchun Zhou The minimum locality of linear codes . . 83--114 Josimar J. R. Aguirre and Cícero Carvalho and Victor G. L. Neumann About $r$-primitive and $k$-normal elements in finite fields . . . . . . . 115--126 Jiaxin Wang and Fang-Wei Fu New results on vectorial dual-bent functions and partial difference sets 127--149 Claude Carlet and Rebeka Kiss and Gábor P. Nagy Simplicity conditions for binary orthogonal arrays . . . . . . . . . . . 151--163 Marloes Venema and Greg Alpár and Jaap-Henk Hoepman Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice . . 165--220 Ming Li and Yupeng Jiang and Dongdai Lin Properties of the cycles that contain all vectors of weight $ \le k $ . . . . 221--239 Xavier Caruso and Amaury Durand Duals of linearized Reed--Solomon codes 241--271 Minjia Shi and Na Liu and Jon-Lark Kim and Patrick Solé Additive complementary dual codes over $ \mathbb {F}_4 $ . . . . . . . . . . . . 273--284 Yupeng Jiang A relation between sequences generated by Golomb's preference algorithm . . . . 285--291 Vincenzo Pallozzi Lavorante and Valentino Smaldore New hemisystems of the Hermitian surface 293--307
Xi Xie and Nian Li and Xiangyong Zeng and Xiaohu Tang and Yao Yao Several classes of bent functions over finite fields . . . . . . . . . . . . . 309--332 José Andrés Armario and Ivan Bailera and Ronan Egan Butson full propelinear codes . . . . . 333--351 Bingsheng Shen and Hua Meng and Yang Yang and Zhengchun Zhou New constructions of $Z$-complementary code sets and mutually orthogonal complementary sequence sets . . . . . . 353--371 WeiGuo Zhang and Enes Pasalic and Yiran Liu and Liupiao Zhang and Chunlei Xie A design and flexible assignment of orthogonal binary sequence sets for (QS)-CDMA systems . . . . . . . . . . . 373--389 Shuichi Katsumata and Toi Tomita and Shota Yamada Direct computation of branching programs and its applications to more efficient lattice-based cryptography . . . . . . . 391--431 Christof Beierle and Claude Carlet Gold functions and switched cube functions are not 0-extendable in dimension $ n > 5 $ . . . . . . . . . . . 433--449 Eimear Byrne and Michela Ceria and Sorina Ionica and Relinde Jurrius and Elif Saçìkara Constructions of new matroids and designs over $ \mathbb {F}_q $ . . . . . 451--473 Xiaoqin Hong and Xiwang Cao Improved generalized block inserting construction of constant dimension codes 475--495 Lo\"\ic Bidoux and Philippe Gaborit and Mukul Kulkarni and Victor Mateu Code-based signatures from new proofs of knowledge for the syndrome decoding problem . . . . . . . . . . . . . . . . 497--544 Nurdagül Anbar and Tekgül Kalayci and Wilfried Meidl Generalized semifield spreads . . . . . 545--562 Thibauld Feneuil and Antoine Joux and Matthieu Rivain Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature . . . . . . . . 563--608 Emmanouil Doulgerakis and Thijs Laarhoven and Benne de Weger The irreducible vectors of a lattice: Some theory and applications . . . . . . 609--643 Michael Kiermaier and Sascha Kurz and Patrick Solé and Michael Stoll and Alfred Wassermann On strongly walk regular graphs, triple sum sets and their codes . . . . . . . . 645--675 Minjia Shi and Shukai Wang and Jon-Lark Kim and Patrick Solé Self-orthogonal codes over a non-unital ring and combinatorial matrices . . . . 677--689 Minjia Shi and Shukai Wang and Jon-Lark Kim and Patrick Solé Correction: Self-orthogonal codes over a non-unital ring and combinatorial matrices . . . . . . . . . . . . . . . . 691--691 Minjia Shi and Shukai Wang and Xiaoxiao Li Retracted Article: $ \mathbb {Z}_p \mathbb {Z}_{p^2} $-linear codes: rank and kernel . . . . . . . . . . . . . . . 693--693
Xiusheng Liu and Hualu Liu LCP of group codes over finite Frobenius rings . . . . . . . . . . . . . . . . . 695--708 Jiaxin Shen and Jianfu Chen and Shenglin Zhou Flag-transitive 2-designs with prime square replication number and alternating groups . . . . . . . . . . . 709--717 Sihem Mesnager and Liqin Qian and Xiwang Cao Further projective binary linear codes derived from two-to-one functions and their duals . . . . . . . . . . . . . . 719--746 Mrinmoy Datta and Trygve Johnsen Codes from symmetric polynomials . . . . 747--761 Dev Akre and Nuh Aydin and Matthew Harrington and Saurav Pandey A generalization of cyclic code equivalence algorithm to constacyclic codes . . . . . . . . . . . . . . . . . 763--777 Bill Correll, Jr. and Christopher N. Swanson Difference-based structural properties of Costas arrays . . . . . . . . . . . . 779--794 Makoto Araya and Masaaki Harada and Koji Momihara Hadamard matrices related to a certain series of ternary self-dual codes . . . 795--805 Xiangrui Meng and Jian Gao and Fang-Wei Fu and Fanghui Ma Weight distributions of Q2DC codes over finite fields . . . . . . . . . . . . . 807--830 M. Montanucci and G. Tizziotti Generalized Weierstrass semigroups at several points on certain maximal curves which cannot be covered by the Hermitian curve . . . . . . . . . . . . . . . . . 831--851 Hyoseung Kim and Olivier Sanders and Michel Abdalla and Jong Hwan Park Practical dynamic group signatures without knowledge extractors . . . . . . 853--893 Maarten De Boeck and Geertrui Van de Voorde Embedded antipodal planes and the minimum weight of the dual code of points and lines in projective planes of order $ p^2 $ . . . . . . . . . . . . . 895--920 Yan Tong and Xiangyong Zeng and Shasha Zhang and Shiwei Xu and Zhengwei Ren The estimates of trigonometric sums and new bounds on a mean value, a sequence and a cryptographic function . . . . . . 921--949 Jingzhou Na and Jonathan Jedwab and Shuxing Li A group-based structure for perfect sequence covering arrays . . . . . . . . 951--970 Fei Guo and Zilong Wang and Guang Gong Several secondary methods for constructing bent-negabent functions . . 971--995 Clémence Bouvier and Anne Canteaut and Léo Perrin On the algebraic degree of iterated power functions . . . . . . . . . . . . 997--1033 Zhongliang Zhang and Zhen Qin and Chun Guo Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher . . . . . . . . . . . . . . 1035--1052 Kwangsu Lee Decentralized multi-client functional encryption for set intersection with improved efficiency . . . . . . . . . . 1053--1093 Michela Ceria and Antonio Cossidente and Giuseppe Marino and Francesco Pavese On near-MDS codes and caps . . . . . . . 1095--1110 Daniel Augot and Sarah Bordage and Jade Nardi Efficient multivariate low-degree tests via interactive oracle proofs of proximity for polynomial codes . . . . . 1111--1151 Wanbao Zhang and Shenglin Zhou Extremely line-primitive automorphism groups of finite linear spaces . . . . . 1153--1163
Yanbin Zheng and Yuyin Yu and Zhengbang Zha and Xingchen Zhou On inverses of permutation polynomials of the form $ x \left (x^s - a \right)^{(q^m - 1) \slash s} $ over $ \mathbb {F}_{q^n} $ . . . . . . . . . . 1165--1181 Ilya Vorobyev Complete traceability multimedia fingerprinting codes resistant to averaging attack and adversarial noise with optimal rate . . . . . . . . . . . 1183--1191 Yun Li and Hongwei Liu Cyclic constant dimension subspace codes via the sum of Sidon spaces . . . . . . 1193--1207 Weijun Fang and Bin Chen and Shu-Tao Xia and Fang-Wei Fu and Xiangyu Chen Perfect LRCs and $k$-optimal LRCs . . . 1209--1232 Zhengan Huang and Junzuo Lai and Gongxian Zeng and Xin Mu Receiver selective opening security for identity-based encryption in the multi-challenge setting . . . . . . . . 1233--1259 Bangteng Xu Characterizations and constructions of plateaued functions on finite abelian groups . . . . . . . . . . . . . . . . . 1261--1292 Michael J. Gill and Ian M. Wanless Pairs of MOLS of order ten satisfying non-trivial relations . . . . . . . . . 1293--1313 Shohei Satake and Yujie Gu Cayley sum graphs and their applications to codebooks . . . . . . . . . . . . . . 1315--1333 Songbao Mo Ideal hierarchical secret sharing and lattice path matroids . . . . . . . . . 1335--1349 Rocco Mora and Jean-Pierre Tillich On the dimension and structure of the square of the dual of a Goppa code . . . 1351--1372 Dan Zeng and Xiangyong Zeng and Lisha Li and Yunge Xu The cycle structure of a class of permutation polynomials . . . . . . . . 1373--1400 Shi-Feng Sun and Ron Steinfeld and Amin Sakzad Incremental symmetric puncturable encryption with support for unbounded number of punctures . . . . . . . . . . 1401--1426 Vincenzo Pallozzi Lavorante External points to a conic from a Baer subplane . . . . . . . . . . . . . . . . 1427--1441 Christian Elsholtz and Benjamin Klahn and Gabriel F. Lipnik Large subsets of $ \mathbb {Z}_m^n $ without arithmetic progressions . . . . 1443--1452 Minjia Shi and Yaya Li and Wei Cheng and Dean Crnkovi\'c and Denis Krotov and Patrick Solé Self-dual bent sequences for complex Hadamard matrices . . . . . . . . . . . 1453--1474 Giusy Monzillo and Tim Penttila and Alessandro Siciliano Eggs in finite projective spaces and unitals in translation planes . . . . . 1475--1485 Enrico Iurlano Growth of the perfect sequence covering array number . . . . . . . . . . . . . . 1487--1494 Li Xu and Zhengchun Zhou and Jun Zhang and Sihem Mesnager Optimal quaternary $ (r, \delta)$-locally recoverable codes: their structures and complete classification . . . . . . . . . . . . . 1495--1526 Zhonghua Sun and Sujuan Huang and Shixin Zhu Optimal quaternary Hermitian LCD codes and their related codes . . . . . . . . 1527--1558 Sihong Su and Xiaoqi Guo A further study on the construction methods of bent functions and self-dual bent functions based on Rothaus's bent function . . . . . . . . . . . . . . . . 1559--1580
S. G. Barwick and Alice M. W. Hui and Wen-Ai Jackson A geometric description of the Figueroa plane . . . . . . . . . . . . . . . . . 1581--1593 Henk D. L. Hollmann and Karan Khathuria and Ago-Erik Riet and Vitaly Skachek On some batch code properties of the simplex code . . . . . . . . . . . . . . 1595--1605 Alexander Shaporenko Derivatives of bent functions in connection with the bent sum decomposition problem . . . . . . . . . 1607--1625 Jérôme Ducoat and Frédérique Oggier Rank weight hierarchy of some classes of polynomial codes . . . . . . . . . . . . 1627--1644 Nuttapong Attrapadung and Goichiro Hanaoka and Ryo Hiromasa and Takahiro Matsuda and Jacob C. N. Schuldt Maliciously circuit-private multi-key FHE and MPC based on LWE . . . . . . . . 1645--1684 Simeon Ball Grassl--Rötteler cyclic and consta-cyclic MDS codes are generalised Reed--Solomon codes . . . . . . . . . . . . . . . . . 1685--1694 Zhao Hu and Nian Li and Linjie Xu and Xiangyong Zeng and Xiaohu Tang The differential spectrum and boomerang spectrum of a class of locally-APN functions . . . . . . . . . . . . . . . 1695--1711 Han-Bing Yu and Qun-Xiong Zheng and Yi-Jian Liu and Jing-Guo Bi and Yu-Fei Duan and Jing-Wen Xue and You Wu and Yue Cao and Rong Cheng and Lin Wang and Bai-Shun Sun An improved method for predicting truncated multiple recursive generators with unknown parameters . . . . . . . . 1713--1736 Hopein Christofen Tang and Djoko Suprijanto A general family of Plotkin-optimal two-weight codes over $ \mathbb {Z}_4 $ 1737--1750 Reo Eriguchi and Noboru Kunihiro and Koji Nuida Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures . . . 1751--1778 Jiabo Wang and Cong Ling Polar sampler: A novel Bernoulli sampler using polar codes with application to integer Gaussian sampling . . . . . . . 1779--1811 Makoto Araya and Masaaki Harada Some restrictions on the weight enumerators of near-extremal ternary self-dual codes and quaternary Hermitian self-dual codes . . . . . . . . . . . . 1813--1843 Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay Short attribute-based signatures for arbitrary Turing machines from standard assumptions . . . . . . . . . . . . . . 1845--1872 Fengwei Li Cyclic codes of length $ 5 p $ with MDS symbol-pair . . . . . . . . . . . . . . 1873--1888 Zhongxiao Wang and Xiaoxin Zhao and Qunxiong Zheng and Xiutao Feng and Zehao Sun The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited . . . . . . . . . . . . . . . 1889--1910 N. Durante and G. Longobardi and V. Pepe $ (d, \sigma) $-Veronese variety and some applications . . . . . . . . . . . 1911--1921 Hui Han and Jianjun Mu and Xiaopeng Jiao and Yu-Cheng He and Zhanzhan Zhao Constructions of multi-permutation codes correcting a single burst of deletions 1923--1934 Michel Lavrauw and John Sheekey Symplectic 4-dimensional semifields of order $ 8^4 $ and $ 9^4 $ . . . . . . . 1935--1949 Máté Gyarmati Secret sharing on regular bipartite access structures . . . . . . . . . . . 1951--1971 Monika Yadav and Anuradha Sharma A recursive method for the construction and enumeration of self-orthogonal and self-dual codes over the quasi-Galois ring $ \mathbb {F}_{2^r}[u] \slash \langle u^e \rangle $ . . . . . . . . . 1973--2003 Elisa Gorla and Cristina Landolina Quasi optimal anticodes: structure and invariants . . . . . . . . . . . . . . . 2005--2020 Lin Jiao and Yonglin Hao and Yongqiang Li Guess-and-determine attacks on SNOW--VI stream cipher . . . . . . . . . . . . . 2021--2055 Wenxiao Qiao and Hailun Yan and Siwei Sun and Lei Hu and Jiwu Jing New cryptanalysis of LowMC with algebraic techniques . . . . . . . . . . 2057--2075 Mar\'ìa Chara and Sam Kottler and Beth Malmskog and Bianca Thompson and Mckenzie West Minimum distance and parameter ranges of locally recoverable codes with availability from fiber products of curves . . . . . . . . . . . . . . . . . 2077--2105 Daniel M. Gordon Signed difference sets . . . . . . . . . 2107--2115
Rupert Li Unique optima of the Delsarte linear program . . . . . . . . . . . . . . . . 2117--2140 Ward Beullens and Samuel Dobson and Shuichi Katsumata and Yi-Fu Lai and Federico Pintore Group signatures and more from isogenies and lattices: generic, simple, and efficient . . . . . . . . . . . . . . . 2141--2200 Boris Ryabko Unconditionally secure short key ciphers based on data compression and randomization . . . . . . . . . . . . . 2201--2212 Gerardo Vega The $b$-symbol weight distributions of all semiprimitive irreducible cyclic codes . . . . . . . . . . . . . . . . . 2213--2221 Himadri Shekhar Chakraborty and Tsuyoshi Miezaki and Manabu Oura Harmonic Tutte polynomials of matroids 2223--2236 Nam-Su Jho and Jooyoung Lee Partition and mix: generalizing the swap-or-not shuffle . . . . . . . . . . 2237--2254 Zihan Zhang A new metric on symmetric groups and applications to block permutation codes 2255--2271 Xiaoni Du and Wengang Jin and Sihem Mesnager Several classes of new weakly regular bent functions outside $ \mathcal {R} \mathcal {F} $, their duals and some related (minimal) codes with few weights 2273--2307 James Hammer and John Lorch Diagonal cellular factor pair Latin squares . . . . . . . . . . . . . . . . 2309--2322 Abílio Lemos and Victor G. L. Neumann and Sávio Ribas On arithmetic progressions in finite fields . . . . . . . . . . . . . . . . . 2323--2346 Tao Feng and Jianbing Lu On finite generalized quadrangles with $ {\rm PSL}(2, q) $ as an automorphism group . . . . . . . . . . . . . . . . . 2347--2364
Enes Pasalic and Amar Bapi\'c and Fengrong Zhang and Yongzhuang Wei Explicit infinite families of bent functions outside the completed Maiorana--McFarland class . . . . . . . 2365--2393 Xiaoqiang Wang and Zhonghua Sun and Cunsheng Ding Two families of negacyclic BCH codes . . 2395--2420 Jian Ding and Changlu Lin and Fuchun Lin and Huaxiong Wang Full threshold change range of threshold changeable secret sharing . . . . . . . 2421--2447 Mima Stanojkovski Submodule codes as spherical codes in buildings . . . . . . . . . . . . . . . 2449--2472 Igor E. Shparlinski Fixed points of the subset sum pseudorandom number generators . . . . . 2473--2479 Moises Delgado and Heeralal Janwa and Carlos Agrinsoni Some new techniques and progress towards the resolution of the conjecture of exceptional APN functions and absolutely irreducibility of a class of polynomials 2481--2495 Tran van Trung Point-missing $s$-resolvable $t$-designs: infinite series of 4-designs with constant index . . . . . 2497--2508 Eiichi Bannai and Tsuyoshi Miezaki and Hiroyuki Nakasora A note on the Assmus--Mattson theorem for some binary codes II . . . . . . . . 2509--2522 Hirokazu Kobayashi and Yohei Watanabe and Kazuhiko Minematsu and Junji Shikata Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication . . . . . 2523--2562 Shitao Li and Minjia Shi and Juan Wang An improved method for constructing formally self-dual codes with small hulls . . . . . . . . . . . . . . . . . 2563--2583 Marco Pavone Subset sums and block designs in a finite vector space . . . . . . . . . . 2585--2603 Guangzhou Chen and Xiaodong Niu Constructions for new orthogonal arrays based on large sets of orthogonal arrays 2605--2625
Wei Lu and Xia Wu and Yufei Wang and Xiwang Cao A general construction of regular complete permutation polynomials . . . . 2627--2647 Isabel Byrne and Natalie Dodson and Ryan Lynch and Eric Pabón\textendashCancel and Fernando Piñero-González Improving the minimum distance bound of Trace Goppa codes . . . . . . . . . . . 2649--2663 Hao Chen New MDS entanglement-assisted quantum codes from MDS Hermitian self-orthogonal codes . . . . . . . . . . . . . . . . . 2665--2676 Yan Liu and Jianguo Lei More results on large sets of Kirkman triple systems . . . . . . . . . . . . . 2677--2686 Zhongya Zhang and Wenling Wu and Han Sui and Bolin Wang Post-quantum security on the Lai--Massey scheme . . . . . . . . . . . . . . . . . 2687--2704 Jaap-Henk Hoepman Two faces of blindness . . . . . . . . . 2705--2721 Bagher Bagherpour A bivariate polynomial-based cryptographic hard problem and its applications . . . . . . . . . . . . . . 2723--2735 Yan Zhu Optimal and extremal graphical designs on regular graphs associated with classical parameters . . . . . . . . . . 2737--2754 Xiantong Tan and Haode Yan Differential spectrum of a class of APN power functions . . . . . . . . . . . . 2755--2768 Erzhong Xue and Zilong Wang The $q$-ary Golay arrays of size $ 2 \times 2 \times \cdots \times 2 $ are standard . . . . . . . . . . . . . . . . 2769--2778 Jiseung Kim and Changmin Lee A polynomial time algorithm for breaking NTRU encryption with multiple keys . . . 2779--2789 Ting Lan and Weijun Liu and Fu-Gang Yin Block-transitive 3-$ (v, k, 1) $ designs associated with alternating groups . . . 2791--2807
Rongquan Feng Obituary of Professor Zhexian Wan . . . 2809--2810 Junyang Zhang Characterizing subgroup perfect codes by 2-subgroups . . . . . . . . . . . . . . 2811--2819 Zhonghua Sun and Xiaoqiang Wang and Cunsheng Ding Several families of irreducible constacyclic and cyclic codes . . . . . 2821--2843 Kai Zhang and Xuejia Lai and Lei Wang and Jie Guan and Bin Hu and Senpeng Wang and Tairong Shi Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework . . . . . . . . . . 2845--2878 S. P. Glasby and Ferdinand Ihringer and Sam Mattheus The proportion of non-degenerate complementary subspaces in classical spaces . . . . . . . . . . . . . . . . . 2879--2891 Yu Zhan and Ziqian Zhang and Qian Liu and Baocang Wang Hiding the input-size in multi-party private set intersection . . . . . . . . 2893--2915 Pratish Datta and Tapas Pal (Compact) Adaptively secure FE for attribute-weighted sums from $k$--Lin 2917--3034 Aurélien Dupin and Pierrick Méaux and Mélissa Rossi On the algebraic immunity-resiliency trade-off, implications for Goldreich's pseudorandom generator . . . . . . . . . 3035--3079 Hyung Tae Lee and Jae Hong Seo On the security of functional encryption in the generic group model . . . . . . . 3081--3114
Kaiqiang Liu and Zhengchun Zhou and Avik Ranjan Adhikary and Rong Luo New sets of non-orthogonal spreading sequences with low correlation and low PAPR using extended Boolean functions 3115--3139 Yu Dai and Kaizhan Lin and Chang-An Zhao and Zijian Zhou Fast subgroup membership testings for $ \mathbb {G}_1 $, $ \mathbb {G}_2 $ and $ \mathbb {G}_T $ on pairing-friendly curves . . . . . . . . . . . . . . . . . 3141--3166 Daniele Bartoli and Giuliana Fatabbi and Francesco Ghiandoni On the exceptionality of rational APN functions . . . . . . . . . . . . . . . 3167--3186 Kai Zhang and Xuejia Lai and Jie Guan and Bin Hu Weak rotational property and its application . . . . . . . . . . . . . . 3187--3214 Dean Crnkovi\'c and Andrea Svob LCD subspace codes . . . . . . . . . . . 3215--3226 Melissa Lee and Gabriel Verret Extremely primitive groups and linear spaces . . . . . . . . . . . . . . . . . 3227--3240 Pin-Chieh Tseng and Ching-Yi Lai and Wei-Hsuan Yu Semidefinite programming bounds for binary codes from a split Terwilliger algebra . . . . . . . . . . . . . . . . 3241--3262 Wen Ma and Jinquan Luo Block codes in pomset metric over $ \mathbb {Z}_m $ . . . . . . . . . . . . 3263--3284 Lucas Reis The average density of $K$-normal elements over finite fields . . . . . . 3285--3292 Denis S. Krotov Projective tilings and full-rank perfect codes . . . . . . . . . . . . . . . . . 3293--3303 Livia Betti and Jim Brown and Fernando Gaitan and Aiyana Spear and Japheth Varlack Lattices in real quadratic fields and associated theta series arising from codes over $ \textbf {F}_4 $ and $ \textbf {F}_2 \times \textbf {F}_2 $ . . 3305--3319 Jie Xu and Zhiyong Zheng and Kun Tian and Man Chen Two properties of prefix codes and uniquely decodable codes . . . . . . . . 3321--3330
Steven Galbraith and Rosario Gennaro and Carla R\`afols and Ron Steinfeld Guest editorial: Special issue on Mathematics of Zero-Knowledge . . . . . 3331--3332 Diego F. Aranha and Youssef El Housni and Aurore Guillevic A survey of elliptic curves for proof systems . . . . . . . . . . . . . . . . 3333--3378 Scott Ames and Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam Ligero: lightweight sublinear arguments without a trusted setup . . . . . . . . 3379--3424 Ward Beullens and Luca De Feo and Steven D. Galbraith and Christophe Petit Proving knowledge of isogenies: a survey 3425--3456 Daniel Benarroch and Matteo Campanelli and Dario Fiore and Kobi Gurkan and Dimitris Kolonelos Zero-knowledge proofs for set membership: efficient, succinct, modular 3457--3525 Carsten Baum and Samuel Dittmer and Peter Scholl and Xiao Wang Sok: vector OLE-based zero-knowledge protocols . . . . . . . . . . . . . . . 3527--3561 André Guerino Castoldi and Anderson Novaes Martinhão and Emerson L. Monte Carmelo and Otávio J. N. T. N. dos Santos Covering schemes of strength $t$ . . . . 3563--3580 Congming Wei and Bingyou Dong and Jialiang Hua and Xiaoyang Dong and Guoyan Zhang Improved attacks against reduced-round Whirlwind . . . . . . . . . . . . . . . 3581--3602 Senpeng Wang and Dengguo Feng and Bin Hu and Jie Guan and Kai Zhang and Tairong Shi New method for combining Matsui's bounding conditions with sequential encoding method . . . . . . . . . . . . 3603--3642 Shamil Asgarli and Dragos Ghioca and Chi Hoi Yip Plane curves giving rise to blocking sets over finite fields . . . . . . . . 3643--3669 Magali Bardet and Pierre Briaud and Maxime Bros and Philippe Gaborit and Jean-Pierre Tillich Revisiting algebraic attacks on MinRank and on the rank decoding problem . . . . 3671--3707 Shizhu Tian and Yitong Liu and Xiangyong Zeng A further study on bridge structures and constructing bijective S-boxes for low-latency masking . . . . . . . . . . 3709--3739 Jingjun Bao Constructions of column-orthogonal strong orthogonal arrays via matchings of bipartite graphs . . . . . . . . . . 3741--3755 Yanwei Zhou and Bo Yang and Zirui Qiao and Zhe Xia and Mingwu Zhang and Yi Mu Leakage-resilient identity-based cryptography from minimal assumptions 3757--3801 Jinzheng Cao and Jian Weng and Yanbin Pan and Qingfeng Cheng Generalized attack on ECDSA: known bits in arbitrary positions . . . . . . . . . 3803--3823
Xuan Pang and Xiaoqin Zhan Block-transitive 3-$ (v, 4, \lambda) $ designs with sporadic or alternating socle . . . . . . . . . . . . . . . . . 3825--3835 Subhabrata Samajder and Palash Sarkar Another look at key randomisation hypotheses . . . . . . . . . . . . . . . 3837--3855 Somayyeh Golalizadeh and Nasrin Soltankhah On the fourth weight of generalized Reed--Muller codes . . . . . . . . . . . 3857--3879 Xiaofeng Xie and Tian Tian Structural evaluation of AES-like ciphers against mixture differential cryptanalysis . . . . . . . . . . . . . 3881--3899 Hexiang Huang and Qing Xiang Construction of storage codes of rate approaching one on triangle-free graphs 3901--3913 Kazumasa Shinagawa and Reo Eriguchi and Shohei Satake and Koji Nuida Private simultaneous messages based on quadratic residues . . . . . . . . . . . 3915--3932 Binbin Pang and Shixin Zhu and Tian Yang and Jun Gao BCH codes with larger dimensional hull 3933--3951 Ziling Heng and Dexiang Li and Fenjin Liu Ternary self-orthogonal codes from weakly regular bent functions and their application in LCD codes . . . . . . . . 3953--3976 Shuangqing Liu Optimal Ferrers diagram rank-metric codes from MRD codes . . . . . . . . . . 3977--3993 José Gómez-Torrecillas and F. J. Lobillo and Gabriel Navarro Skew differential Goppa codes and their application to Mceliece cryptosystem . . 3995--4017 Haider Al Kim and Sven Puchinger and Ludo Tolhuizen and Antonia Wachter-Zeh Coding and bounds for partially defective memory cells . . . . . . . . . 4019--4058 Haetham Al Aswad and Cécile Pierrot Individual discrete logarithm with sublattice reduction . . . . . . . . . . 4059--4091 Yeow Meng Chee and Alan Chi Hung Ling and Van Khu Vu and Hui Zhang Scheduling to reduce close contacts: resolvable grid graph decomposition and packing . . . . . . . . . . . . . . . . 4093--4106 Qiang Li and Qun-xiong Zheng and Wen-feng Qi Practical attacks on small private exponent RSA: new records and new insights . . . . . . . . . . . . . . . . 4107--4142 Hongwei Liu and Shengwei Liu A class of constacyclic codes are generalized Reed--Solomon codes . . . . 4143--4151
Hai Liu and Chengju Li and Haifeng Qian Parameters of several families of binary duadic codes and their related codes . . 1--12 Arghya Bhattacharjee and Ritam Bhaumik and Avijit Dutta and Mridul Nandi and Anik Raychaudhuri BBB security for 5-round even-Mansour-based key-alternating Feistel ciphers . . . . . . . . . . . . 13--49 Jiaxin Pan and Chen Qian and Benedikt Wagner Generic constructions of master-key KDM secure attribute-based encryption . . . 51--92 Kris Coolsaet Nonsingular hypercubes and nonintersecting hyperboloids . . . . . . 93--112 Aleksandr Kutsenko Decomposing self-dual bent functions . . 113--144 Vidya Sagar and Ritumoni Sarma Minimal and optimal binary codes obtained using $ C_D $-construction over the non-unital ring I . . . . . . . . . 145--157 Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir Quantum time/memory/data tradeoff attacks . . . . . . . . . . . . . . . . 159--177 Michela Ceria and Teo Mora Towards a Gröbner-free approach to coding 179--204 Alexander L. Gavrilyuk and Sho Suda Uniqueness of an association scheme related to the Witt design on 11 points 205--209 Boyi He and Qunying Liao The properties and the error-correcting pair for lengthened GRS codes . . . . . 211--225
S. Hodzi\'c and A. Roy and E. Andreeva Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks . . . . . . . . . . . . . . . . 227--257 Ziwei Lu and Shenglin Zhou Flag-transitive symmetric 2-designs of prime order . . . . . . . . . . . . . . 259--266 Danyao Wu and Pingzhi Yuan Permutation polynomials and their compositional inverses over finite fields by a local method . . . . . . . . 267--276 Kota Takahashi and Keitaro Hashimoto and Wakaha Ogata Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext . . . . . . . . . . . . 277--301 Monika Yadav and Anuradha Sharma Construction and enumeration of self-orthogonal and self-dual codes over Galois rings of even characteristic . . 303--339 Wen Ma and Jinquan Luo Codes with respect to weighted poset block metric . . . . . . . . . . . . . . 341--363 Xiaowei Su and Zihong Tian and Guohui Hao Determination of the sizes of optimal geometric orthogonal codes with parameters $ (n \times m, k, \lambda, k - 1) $ . . . . . . . . . . . . . . . . . 365--395 Cuiling Fan and An Wang and Li Xu New classes of NMDS codes with dimension 3 . . . . . . . . . . . . . . . . . . . 397--418 Diane M. Donovan and Mike J. Grannell and Emine Sule Yazici On maximal partial Latin hypercubes . . 419--433 Hannes Bartz and Thomas Jerkovits and Johan Rosenkilde Fast Kötter--Nielsen--Hòholdt interpolation over skew polynomial rings and its application in coding theory . . 435--465 Nikolay Kolomeec and Denis Bykov On the image of an affine subspace under the inverse function within a finite field . . . . . . . . . . . . . . . . . 467--476 Mahir Bilen Can and Roy Joshua and G. V. Ravindra Defects of codes from higher dimensional algebraic varieties . . . . . . . . . . 477--494 John Bamberg On the 430-cap of $ {\rm PG}(6, 4) $ having two intersection sizes with respect to hyperplanes . . . . . . . . . 495--503
Anonymous Editorial Note: Coding and Cryptography 2022 . . . . . . . . . . . . . . . . . . 505--505 Marco Timpanella and Giovanni Zini On a family of linear MRD codes with parameters $ [8 \times 8, 16, 7]_q $ . . 507--530 Amar Bapi\'c and Enes Pasalic and Alexandr Polujan and Alexander Pott Vectorial Boolean functions with the maximum number of bent components beyond the Nyberg's bound . . . . . . . . . . . 531--552 Felicitas Hörmann and Hannes Bartz Interpolation-based decoding of folded variants of linearized and skew Reed--Solomon codes . . . . . . . . . . 553--586 Agathe Cheriere and Lina Mortajine and Tania Richmond and Nadia El Mrabet Exploiting ROLLO's constant-time implementations with a single-trace analysis . . . . . . . . . . . . . . . . 587--608 Anina Gruica and Anna-Lena Horlemann and Alberto Ravagnani and Nadja Willenborg Densities of codes of various linearity degrees in translation-invariant metric spaces . . . . . . . . . . . . . . . . . 609--637 V. N. Potapov and A. A. Taranenko and Yu. V. Tarannikov An asymptotic lower bound on the number of bent functions . . . . . . . . . . . 639--651 Selçuk Kavut Modified Patterson--Wiedemann construction . . . . . . . . . . . . . . 653--666 Cem Güneri and Ferruh Özbudak and Selcen Sayici On subfield subcodes obtained from restricted evaluation codes . . . . . . 667--680 Faruk Göloglu and Lukas Kölsch Counting the number of non-isotopic Taniguchi semifields . . . . . . . . . . 681--694 Anna-Maurin Graner and Gohar M. Kyureghyan Constructing irreducible polynomials recursively with a reverse composition method . . . . . . . . . . . . . . . . . 695--708 Rafael Arce and Carlos Hernández and José Ortiz and Ivelisse Rubio and Jaziel Torres Analysis and computation of multidimensional linear complexity of periodic arrays . . . . . . . . . . . . 709--722 Nicolas David and María Naya-Plasencia and André Schrottenloher Quantum impossible differential attacks: applications to AES and SKINNY . . . . . 723--751 Rakhi Pratihar and Tovohery Hajatiana Randrianarisoa Antipodal two-weight rank metric codes 753--769 Akihiro Munemasa and Rowena Alma L. Betty Classification of extremal type II $ \mathbb {Z}_4 $-codes of length 24 . . . 771--785 Reza Dastbasteh and Petr Lisonek New quantum codes from self-dual codes over $ \mathbb {F}_4 $ . . . . . . . . . 787--801 André Chailloux and Simona Etinski On the (in)security of optimized Stern-like signature schemes . . . . . . 803--832 Krijn Reijnders and Simona Samardjiska and Monika Trimoska Hardness estimates of the code equivalence problem in the rank metric 833--862 Suman Dutta and Subhamoy Maitra Introducing nega-Forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra . . . 863--883
Qianqian Yan and Junling Zhou Mutually disjoint Steiner systems from BCH codes . . . . . . . . . . . . . . . 885--907 Léo Ducas Provable lattice reduction of $ \mathbb {Z}^n $ with blocksize $ n / 2 $ . . . . 909--916 Shanxiang Lyu and Ling Liu and Cong Ling and Junzuo Lai and Hao Chen Lattice codes for lattice-based PKE . . 917--939 Shannon Veitch and Douglas R. Stinson Unconditionally secure non-malleable secret sharing and circular external difference families . . . . . . . . . . 941--956 Jiqiang Lu and Wenchang Zhou Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher . . . 957--973 Moritz Wiese and Holger Boche $ \varepsilon $-Almost collision-flat universal hash functions and mosaics of designs . . . . . . . . . . . . . . . . 975--998 Dipak K. Bhunia and Cristina Fernández-Córdoba and Carlos Vela and Merc\`e Villanueva On the equivalence of $ \mathbb {Z}_{p^s} $-linear generalized Hadamard codes . . . . . . . . . . . . . . . . . 999--1022 Sergey Bereg and Mohammadreza Haghpanah and Brian Malouf and I. Hal Sudborough Improved bounds for permutation arrays under Chebyshev distance . . . . . . . . 1023--1039 Tsuyoshi Miezaki and Akihiro Munemasa Jacobi polynomials and harmonic weight enumerators of the first-order Reed--Muller codes and the extended Hamming codes . . . . . . . . . . . . . 1041--1049 Deng-Ming Xu and Gang Wang and Sihem Mesnager and You Gao and Fang-Wei Fu Jacobi sums over Galois rings of arbitrary characters and their applications in constructing asymptotically optimal codebooks . . . . 1051--1073 Nicolas Aragon and Victor Dyseryn and Philippe Gaborit and Pierre Loidreau and Julian Renner and Antonia Wachter-Zeh LowMS: a new rank metric code-based KEM without ideal structure . . . . . . . . 1075--1093 Guangkui Xu and Gaojun Luo and Xiwang Cao and Heqian Xu Hulls of linear codes from simplex codes 1095--1112
José Alves Oliveira and F. E. Brochero Martínez Dynamics of polynomial maps over finite fields . . . . . . . . . . . . . . . . . 1113--1125 Elena Kirshanova and Ekaterina Malygina Construction-D lattice from Garcia--Stichtenoth tower code . . . . . 1127--1142 Cícero Carvalho and Hiram H. López and Gretchen L. Matthews Decreasing norm-trace codes . . . . . . 1143--1161 Xiaojing Chen and Xingbo Lu and Shixin Zhu and Wan Jiang and Xindi Wang New entanglement-assisted quantum error-correcting codes from negacyclic codes . . . . . . . . . . . . . . . . . 1163--1174 Lei Zhang Observations on the branch number and differential analysis of SPEEDY . . . . 1175--1199 Mesut Sahin and Oguz Yayla Codes on subgroups of weighted projective tori . . . . . . . . . . . . 1201--1218 Alonso S. Castellanos and Erik A. R. Mendoza and Luciane Quoos Weierstrass semigroups, pure gaps and codes on function fields . . . . . . . . 1219--1242 Sara Ban and Sanja Rukavina Construction of self-orthogonal $ \mathbb {Z}_{2^k} $-codes . . . . . . . 1243--1250 Wenqin Zhang and Yuan Luo and Lele Wang Optimal binary and ternary locally repairable codes with minimum distance 6 1251--1265 Kenji Yasunaga Improved bounds for codes correcting insertions and deletions . . . . . . . . 1267--1278 Thomas Britz and Himadri Shekhar Chakraborty and Reina Ishikawa and Tsuyoshi Miezaki and Hopein Christofen Tang Harmonic Tutte polynomials of matroids II . . . . . . . . . . . . . . . . . . . 1279--1297 Lidija Stanovnik and Miha Moskon and Miha Mraz In search of maximum non-overlapping codes . . . . . . . . . . . . . . . . . 1299--1326 Ruikai Chen and Sihem Mesnager On a class of permutation rational functions involving trace maps . . . . . 1327--1339 Semira Einsele and Kenneth Paterson Average case error estimates of the strong Lucas test . . . . . . . . . . . 1341--1378 Alexander L. Gavrilyuk and Vladislav V. Kabanov Strongly regular graphs decomposable into a divisible design graph and a Hoffman coclique . . . . . . . . . . . . 1379--1391 Jan Schoone and Joan Daemen The state diagram of $ \chi $ . . . . . 1393--1421 Yun Li and Hongwei Liu and Sihem Mesnager New constructions of constant dimension subspace codes with large sizes . . . . 1423--1437 Matthew Kreitzer and Mihai Nica and Rajesh Pereira Using alternating de Bruijn sequences to construct de Bruijn tori . . . . . . . . 1439--1454
Xiaoni Du and René Rodríguez and Hao Wu Infinite families of minimal binary codes via Krawtchouk polynomials . . . . 1455--1475 Yi-Fan Tseng and Zi-Yuan Liu and Raylin Tso Predicate encryption with selective-opening security for receivers: formal definition, generic construction, and concrete instantiations for several primitives 1477--1500 Laura Monroe Optimal binary signed-digit representations of integers and the Stern polynomial . . . . . . . . . . . . 1501--1516 Zhaoping Meng and Qingling Gao and Zhanggui Wu A recursive construction of doubly resolvable Steiner quadruple systems . . 1517--1531 Haode Yan and Yanan Yin On the parameters of extended primitive cyclic codes and the related designs . . 1533--1540 Qiqi Lai and Feng-Hao Liu and Zhedong Wang Leakage-resilient \textsfIBE/ABE with optimal leakage rates from lattices . . 1541--1597 Adam Michael Roberts Self-dual codes from a block matrix construction characterised by group rings . . . . . . . . . . . . . . . . . 1599--1617 Kanchan Singh and Ritesh Kumar Pathak and Sheo Kumar Singh Linear codes associated to determinantal varieties in the space of Hermitian matrices . . . . . . . . . . . . . . . . 1619--1635 Chun Guo and Yiyuan Luo and Chenyu Xiao On the sequential indifferentiability of the Lai--Massey construction . . . . . . 1637--1661 Xinxin Gong and Yonglin Hao and Qingju Wang Combining MILP modeling with algebraic bias evaluation for linear mask search: improved fast correlation attacks on SNOW . . . . . . . . . . . . . . . . . . 1663--1728 Yu-Chi Chen A conceptually simple and generic construction of plaintext checkable encryption in the standard model . . . . 1729--1746 Alexander M. Romanov Perfect mixed codes from generalized Reed--Muller codes . . . . . . . . . . . 1747--1759 S. Kunzweiler Efficient computation of $ (2^n, 2^n)$-isogenies . . . . . . . . . . . . 1761--1802 Angelot Behajaina and Martino Borello and Javier de la Cruz and Wolfgang Willems Twisted skew $G$-codes . . . . . . . . . 1803--1821 Kaizhan Lin and Jianming Lin and Shiping Cai and Weize Wang and Chang-An Zhao Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees 1823--1843
Hao Chen Large Hermitian hull GRS codes of any given length . . . . . . . . . . . . . . 1845--1853 Hongna Yang and Yiwei Wang and Yiwei Zhang Extremal regular graphs and hypergraphs related to fractional repetition codes 1855--1878 Liqin Qian and Xiwang Cao and Xia Wu and Wei Lu MDS codes with $l$-Galois hulls of arbitrary dimensions . . . . . . . . . . 1879--1902 Delphine Boucher and Kayodé Epiphane Nouetowa Some constructions and existence conditions for Hermitian self-dual skew codes . . . . . . . . . . . . . . . . . 1903--1924 Tran Viet Xuan Phuong Anonymous attribute-based broadcast encryption with hidden multiple access structures . . . . . . . . . . . . . . . 1925--1945 Ebru Adiguzel-Goktas and Enver Ozdemir Square root computation in finite fields 1947--1959 Giuseppe D'Alconzo Monomial isomorphism for tensors and applications to code equivalence problems . . . . . . . . . . . . . . . . 1961--1982 Benjamin Fuller Impossibility of efficient information-theoretic fuzzy extraction 1983--2009 Rongsheng Wu and Xiande Zhang Balanced reconstruction codes for single edits . . . . . . . . . . . . . . . . . 2011--2029 Chunyu Gan and Chengju Li and Haifeng Qian and Xueying Shi On Bose distance of a class of BCH codes with two types of designed distances . . 2031--2053 Yuxin Tong and Xiang Xie and Kang Yang and Rui Zhang and Rui Xue Efficient secure multi-party computation for proof of custody in Ethereum sharding . . . . . . . . . . . . . . . . 2055--2083 Zhonghua Sun and Xinyue Liu and Shixin Zhu and Yongsheng Tang Negacyclic BCH codes of length $ \frac {q^{2m} - 1}{q + 1} $ and their duals 2085--2101
Chun Guo and Ling Song CCA security for contracting (quasi-)Feistel constructions with tight round complexity . . . . . . . . . . . . 2103--2129 Slim Bettaieb and Lo\"\ic Bidoux and Victor Dyseryn and Andre Esser and Philippe Gaborit and Mukul Kulkarni and Marco Palumbi PERK: compact signature scheme based on a new variant of the permuted kernel problem . . . . . . . . . . . . . . . . 2131--2157 Ka Hin Leung and Bernhard Schmidt and Tao Zhang Classification of semiregular relative difference sets with $ \gcd (\lambda, n) = 1 $ attaining Turyn's bound . . . . . 2159--2182 Giusy Monzillo and Tim Penttila and Alessandro Siciliano Classifying pseudo-ovals, translation generalized quadrangles, and elation Laguerre planes of small order . . . . . 2183--2196 Seungjun Baek and Giyoon Kim and Jongsung Kim Preimage attacks on reduced-round Ascon--Xof . . . . . . . . . . . . . . . 2197--2217 Cong Yu and Shixin Zhu and Fuyin Tian Construction of quantum codes from multivariate polynomial rings . . . . . 2219--2234 Shuangqing Liu and Lijun Ji Combinatorial constructions of optimal low-power error-correcting cooling codes 2235--2252 Geyang Wang and Qi Wang On the size distribution of the fixed-length Levenshtein balls with radius one . . . . . . . . . . . . . . . 2253--2265 Juanjuan Xu and Lijun Ji Special overlarge sets of Kirkman triple systems . . . . . . . . . . . . . . . . 2267--2285 Daniele Bartoli and Nicola Durante and Giovanni Giuseppe Grimaldi Ovoids of $ Q(6, q) $ of low degree . . 2287--2306 Ryosuke Yamaguchi Jacobi polynomials for the first-order generalized Reed--Muller codes . . . . . 2307--2321 Zhiwen He and Tingting Chen and Gennian Ge New constructions of signed difference sets . . . . . . . . . . . . . . . . . . 2323--2340 Jan Schoone and Joan Daemen Algebraic properties of the maps $ \chi_n $ . . . . . . . . . . . . . . . . 2341--2365 Sascha Kurz Lengths of divisible codes: the missing cases . . . . . . . . . . . . . . . . . 2367--2378 Hannes Bartz and Sven Puchinger Fast decoding of lifted interleaved linearized Reed--Solomon codes for multishot network coding . . . . . . . . 2379--2421
Xiaoli Dong and Jun Liu and Yongzhuang Wei and Wen Gao and Jie Chen Meet-in-the-middle attacks on AES with value constraints . . . . . . . . . . . 2423--2449 Sam Adriaensen and Lins Denaux Small weight codewords of projective geometric codes II . . . . . . . . . . . 2451--2472 Bo Yang and Kangkang He and Xiangyong Zeng and Zibi Xiao Symmetric 2-adic complexity of Tang--Gong interleaved sequences from generalized GMW sequence pair . . . . . 2473--2489 Carmen Amarra and Alice Devillers and Cheryl E. Praeger Chain-imprimitive, flag-transitive 2-designs . . . . . . . . . . . . . . . 2491--2510 Santiago Barrera Acevedo and Heiko Dietrich and Corey Lionis New families of quaternionic Hadamard matrices . . . . . . . . . . . . . . . . 2511--2525 Alexander A. Davydov and Stefano Marcugini and Fernanda Pambianco Further results on covering codes with radius $R$ and codimension $ t R + 1 $ 2527--2548 C. Galindo and F. Hernando and H. Martín-Cruz Optimal $ (r, \delta)$-LRCs from monomial-Cartesian codes and their subfield-subcodes . . . . . . . . . . . 2549--2586 Gergely Kiss and Gábor Somlai Special directions on the finite affine plane . . . . . . . . . . . . . . . . . 2587--2597 Xiaomeng Wang and Lina Wei and Shou-Jun Xu and Sanming Zhou Subgroup total perfect codes in Cayley sum graphs . . . . . . . . . . . . . . . 2599--2613 Mikhail Muzychuk and Grigory Ryabov Constructing linked systems of relative difference sets via Schur rings . . . . 2615--2637 Enes Pasalic and Amar Bapi\'c and Fengrong Zhang and Yongzhuang Wei Using $ P_\tau $ property for designing bent functions provably outside the completed Maiorana--McFarland class . . 2639--2654 Le Dong and Danxun Zhang and Wenya Li and Wenling Wu Yoyo attack on 4-round Lai--Massey scheme with secret round functions . . . 2655--2684 Jie Hao and Shu-Tao Xia and Kenneth W. Shum and Bin Chen and Fang-Wei Fu and Yixian Yang Optimal ternary locally repairable codes 2685--2704
Ang Xiao and Yue Zhou On the packing density of Lee spheres 2705--2729 Jong Yoon Hyun and Jungyun Lee and Yoonjin Lee Characterization of weakly regular $p$-ary bent functions of $ \ell $-form 2731--2741 María Chara and Ricardo Podestá and Luciane Quoos and Ricardo Toledano Lifting iso-dual algebraic geometry codes . . . . . . . . . . . . . . . . . 2743--2767 Song Tian Computing gluing and splitting $ (\ell, \ell) $-isogenies . . . . . . . . . . . 2769--2789 Hadi Kharaghani and Thomas Pender and Vladimir Tonchev On optimal constant weight codes derived from $ \omega $-circulant balanced generalized weighing matrices . . . . . 2791--2799 Elena Berardini and Alessio Caminata and Alberto Ravagnani Structure of CSS and CSS-T quantum codes 2801--2823 Muhammad Imran and Gábor Ivanyos Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem . . . . . . . . . . . 2825--2843 Wenjun Yu and Moshe Schwartz On duplication-free codes for disjoint or equal-length errors . . . . . . . . . 2845--2861 Joanne Hall and Daniel Horsley and Douglas R. Stinson Bounds on data limits for all-to-all comparison from combinatorial designs 2863--2879 Rajendra Prasad Rajpurohit and Maheshanand Bhaintwal and Charul Rajput Locally maximal recoverable codes and LMR--LCD codes . . . . . . . . . . . . . 2881--2899 Xinran Wang and Ziling Heng and Fengwei Li and Qin Yue LCD codes and almost optimally extendable codes from self-orthogonal codes . . . . . . . . . . . . . . . . . 2901--2926 Masaaki Harada A method for constructing quaternary Hermitian self-dual codes and an application to quantum codes . . . . . . 2927--2948 Jing Jiang and Fenggui Pei and Cailin Wen and Minquan Cheng and Henk D. L. Hollmann Constructions of $t$-strongly multimedia IPP codes with length $ t + 1 $ . . . . 2949--2970 Jing Qiu and Fang-Wei Fu Some new constructions of optimal linear codes and alphabet-optimal $ (r, \delta) $-locally repairable codes . . . . . . . 2971--2991 Hongwei Liu and Zihao Yu Linear codes from simplicial complexes over $ \mathbb {F}_{2^n} $ . . . . . . . 2993--3016 Yupeng Jiang and Ming Li and Ying Gao and Dongdai Lin On prefer-one sequences . . . . . . . . 3017--3032 Horacio Navarro Bases for Riemann--Roch spaces of linearized function fields with applications to generalized algebraic geometry codes . . . . . . . . . . . . . 3033--3048 Makoto Araya and Masaaki Harada and Hadi Kharaghani and Ali Mohammadian and Behruz Tayfeh-Rezaie On the classification of skew Hadamard matrices of order $ \varvec {36} $ and related structures . . . . . . . . . . . 3049--3062 Xiaoshan Quan and Qin Yue and Fuqing Sun Hulls of cyclic codes with respect to the regular permutation inner product 3063--3083 Sven Schäge \textsfTOPAS 2-pass key exchange with full perfect forward secrecy and optimal communication complexity . . . . . . . . 3085--3124 Stefan Steinerberger A note on approximate Hadamard matrices 3125--3131 F. E. Brochero Martínez and Daniela Oliveira On the number of rational points of Artin--Schreier's curves and hypersurfaces . . . . . . . . . . . . . 3133--3154 Pratish Datta and Tapas Pal and Katsuyuki Takashima Compact FE for unbounded attribute-weighted sums for logspace from SXDH . . . . . . . . . . . . . . . 3155--3235 Jin Li and Huilian Zhu and Shan Huang Some constacyclic BCH codes with good parameters . . . . . . . . . . . . . . . 3237--3259 Wonseok Choi and Seongha Hwang and Byeonghak Lee and Jooyoung Lee ZLR: a fast online authenticated encryption scheme achieving full security . . . . . . . . . . . . . . . . 3261--3316
Manuel González-Sarabia and Humberto Muñoz-George and Jorge A. Ordaz and Eduardo Sáenz-de-Cabezón and Rafael H. Villarreal Indicator functions, $v$-numbers and Gorenstein rings in the theory of projective Reed--Muller-type codes . . . 3317--3353 F. R. Kschischang and F. Manganiello and A. Ravagnani and K. Savary External codes for multiple unicast networks via interference alignment . . 3355--3369 Jürgen Bierbrauer and Stefano Marcugini and Fernanda Pambianco An asymptotic property of quaternary additive codes . . . . . . . . . . . . . 3371--3375 Huawei Wu and Jing Yang and Keqin Feng Circular external difference families: construction and non-existence . . . . . 3377--3390 Isaac A. Canales-Martínez and Igor Semaev Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers . . . . . . . . . . . . . . . . 3391--3427 Xinyue Ming and Tao Feng and Guojing Jia and Xiaomiao Wang The existence of $ (\mathbb {Z}_v, 4, 1) $-disjoint difference families . . . . . 3429--3446 Sarah Arpin and James Clements and Pierrick Dartois and Jonathan Komada Eriksen and Péter Kutas and Benjamin Wesolowski Finding orientations of supersingular elliptic curves and quaternion orders 3447--3493 Somi Gupta and Francesco Pavese Affine vector space partitions and spreads of quadrics . . . . . . . . . . 3495--3502 Tran van Trung Constructions for $t$-designs and $s$-resolvable $t$-designs . . . . . . . 3503--3514 Woohyuk Chung and Hwigyeom Kim and Jooyoung Lee and Yeongmin Lee Security analysis of the ISO standard OFB--DRBG . . . . . . . . . . . . . . . 3515--3532 Xu Pan and Hao Chen and Hongwei Liu Some self-dual codes and isodual codes constructed by matrix product codes . . 3533--3559 Marco Buratti and Anamari Naki\'c Additivity of symmetric and subspace 2-designs . . . . . . . . . . . . . . . 3561--3572 Dongchun Han and Hanbin Zhang Explicit constructions of NMDS self-dual codes . . . . . . . . . . . . . . . . . 3573--3585 Shuichi Katsumata and Yi-Fu Lai and Jason T. LeGrow and Ling Qin CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist . . . . . . . . . . 3587--3643 Gretchen L. Matthews and Travis Morrison and Aidan W. Murphy Curve-lifted codes for local recovery using lines . . . . . . . . . . . . . . 3645--3664 Sergey Goryainov and Elena V. Konstantinova Non-canonical maximum cliques without a design structure in the block graphs of 2-designs . . . . . . . . . . . . . . . 3665--3675 Héctor Masip-Ardevol and Jordi Baylina-Melé and Marc Guzmán-Albiol and Jose Luis Muñoz-Tapia eSTARK: extending STARKs with arguments 3677--3721 Yang Li and Shitao Li and Shixin Zhu New and improved formally self-dual codes with small hulls from polynomial four Toeplitz codes . . . . . . . . . . 3723--3751 Bolin Wang and Wenling Wu Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes . . . . . . . . . . . . 3753--3782 Lei Li and Xinchun Yu and Chenhao Ying and Liang Chen and Yuanyuan Dong and Yuan Luo MDS array codes with efficient repair and small sub-packetization level . . . 3783--3798 Shuhui Yu and Lijun Ji Two new constructions of cyclic subspace codes via Sidon spaces . . . . . . . . . 3799--3811 Yin Lv and Danping Shi and Lei Hu and Yi Guo Utilizing FWT in linear cryptanalysis of block ciphers with various structures 3813--3842 Huawei Huang and Changgen Peng and Lunzhi Deng Cryptanalysis of a key exchange protocol based on a modified tropical structure 3843--3858
Yi Li and Xiutao Feng and Qiang Wang Towards a classification of permutation binomials of the form $ x^i + a x $ over $ \mathbb {F}_{2^n} $ . . . . . . . . . 3859--3875 Haiyan Guan and Shenglin Zhou Reduction for block-transitive $t$--$ (k^2, k, \lambda) $ designs . . . . . . 3877--3894 Shi Bai and Hansraj Jangir and Tran Ngo and William Youmans An algebraic algorithm for breaking NTRU with multiple keys . . . . . . . . . . . 3895--3918 Jinrui Sha and Shengli Liu and Shuai Han Functional commitments for arbitrary circuits of bounded sizes . . . . . . . 3919--3953 Yuan Gao and Weijun Fang and Jingke Xu and Dong Wang and Sihuang Hu Optimal $ (2, \delta) $ locally repairable codes via punctured simplex codes . . . . . . . . . . . . . . . . . 3955--3979 Ferruh Özbudak and Buket Özkaya New distance bounds for quasi-cyclic codes . . . . . . . . . . . . . . . . . 3981--4009 Deepak Agrawal and Srinivasan Krishnaswamy and Smarajit Das On Boolean functions derived from linear maps over $ \mathbb {Z}_4 $ and their application to secret sharing . . . . . 4011--4033 Noy Soffer Aranov and Angelot Behajaina On the maximum size of ultrametric orthogonal sets over discrete valued fields . . . . . . . . . . . . . . . . . 4035--4055 Robert Christian Subroto An algebraic approach to circulant column parity mixers . . . . . . . . . . 4057--4083 Melek Çil and Baris Bülent Kirlar On the construction of certain odd degree irreducible polynomials over finite fields . . . . . . . . . . . . . 4085--4097 Feixiang Zhao and Jian Weng and Wenli Xie and Lin Hou and Ming Li Time-based attribute-based proxy re-encryption with decryption key update 4099--4129 Simon Masson and Antonio Sanso and Zhenfei Zhang Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field 4131--4143 Alexander Barg and Ohad Elishco and Ryan Gabrys and Geyang Wang and Eitan Yaakobi Storage codes and recoverable systems on lines and grids . . . . . . . . . . . . 4145--4168 Yiwen Gao and Yuan Li and Haibin Kan On the uniqueness of balanced complex orthogonal design . . . . . . . . . . . 4169--4187 Zoltán Füredi and Alexandr Kostochka and Mohit Kumbhat Minimal abundant packings and choosability with separation . . . . . . 4189--4194 Nicola Durante and Giovanni Giuseppe Grimaldi and Giovanni Longobardi Non-linear MRD codes from cones over exterior sets . . . . . . . . . . . . . 4195--4211 Bingsheng Shen and Tao Yu and Zhengchun Zhou and Yang Yang Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions . . . . . 4213--4230 Ajani De Vas Gunasekara and Alice Devillers Transitive path decompositions of Cartesian products of complete graphs 4231--4245 Birenjith Sasidharan and Emanuele Viterbo and Son Hoang Dau Binary cyclic-gap constant weight codes with low-complexity encoding and decoding . . . . . . . . . . . . . . . . 4247--4277 Zhiguo Ding and Michael E. Zieve Two classes of exceptional $m$-to-1 rational functions . . . . . . . . . . . 4279--4285 Yingyin Pan and Jianghua Zhong and Dongdai Lin Generalized cycle joining method and its application to the construction of long-period Galois NFSRs . . . . . . . . 4287--4311 Ákos K. Matszangosz and Ferenc Szöll\Hosi A characterization of complex Hadamard matrices appearing in families of MUB triplets . . . . . . . . . . . . . . . . 4313--4333 Rong Luo and Mingliang Yan and Sihem Mesnager and Dongchun Han On Abelian one-dimensional hull codes in group algebras . . . . . . . . . . . . . 4335--4352 Yadi Wei and Jiaxin Wang and Fang-Wei Fu Association schemes arising from non-weakly regular bent functions . . . 4353--4422 Kazuhiko Minematsu and Shingo Sato and Junji Shikata Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing . . . . . . . . . . . . . . . . 4423--4451 Shuping Mao and Tingting Guo and Peng Wang and Ruozhou Xu and Yuchao Chen and Lei Hu A quantum-secure partial parallel MAC QPCBC . . . . . . . . . . . . . . . . . 4453--4486 Guangkui Xu and Xiwang Cao and Gaojun Luo and Huawei Wu Infinite families of 3-designs from special symmetric polynomials . . . . . 4487--4509 Carlos Aguilar-Melchor and Nicolas Aragon and Jean-Christophe Deneuville and Philippe Gaborit and Jérôme Lacan and Gilles Zémor Efficient error-correcting codes for the HQC post-quantum cryptosystem . . . . . 4511--4530 Shuyu Luo and Weiqiong Wang and Qi Zhang and Zhenjie Song Constructions of plateaued correctors with high correction order and good nonlinearity via Walsh spectral neutralization technique . . . . . . . . 4531--4548 Zahra Ahmadian and Akram Khalesi and Dounia M'foukh and Hossein Moghimi and María Naya-Plasencia Truncated differential cryptanalysis: new insights and application to QARMAv1-$n$ and QARMAv2-64 . . . . . . . 4549--4591