Table of contents for issues of Designs, Codes, and Cryptography

Last update: Sat Nov 23 14:40:09 MST 2024                Valid HTML 3.2!

Volume 1, Number 1, May, 1991
Volume 1, Number 2, June, 1991
Volume 1, Number 3, September, 1991
Volume 1, Number 4, December, 1991
Volume 2, Number 1, March, 1992
Volume 2, Number 2, June, 1992
Volume 2, Number 3, September, 1992
Volume 2, Number 4, 1992
Volume 3, Number 1, March, 1993
Volume 3, Number 2, May, 1993
Volume 3, Number 3, 1993
Volume 3, Number 4, October, 1993
Volume 4, Number 1, January, 1994
Volume 4, Number 2, April, 1994
Volume 4, Number 3, 1994
Volume 4, Number 4, 1994
Volume 5, Number 1, January, 1995
Volume 5, Number 2, March, 1995
Volume 5, Number 3, May, 1995
Volume 6, Number 1, July, 1995
Volume 6, Number 2, September, 1995
Volume 6, Number 3, November, 1995
Volume 7, Number 1--2, January, 1996
Volume 7, Number 3, March, 1996
Volume 8, Number 1--2, May, 1996
Volume 8, Number 3, June, 1996
Volume 9, Number 1, August, 1996
Volume 9, Number 2, October, 1996
Volume 9, Number 3, November, 1996
Volume 10, Number 1, January, 1997
Volume 10, Number 2, February, 1997
Volume 10, Number 3, March, 1997
Volume 11, Number 1, April, 1997
Volume 11, Number 2, May, 1997
Volume 11, Number 3, July, 1997
Volume 12, Number 1, September, 1997
Volume 12, Number 2, October, 1997
Volume 12, Number 3, November, 1997
Volume 13, Number 1, January, 1998
Volume 13, Number 2, February, 1998
Volume 13, Number 3, March, 1998
Volume 14, Number 1, April, 1998
Volume 14, Number 2, May, 1998
Volume 14, Number 3, September, 1998
Volume 15, Number 1, October, 1998
Volume 15, Number 2, 1998
Volume 15, Number 3, December, 1998
Volume 16, Number 1, January, 1999
Volume 16, Number 2, February, 1999
Volume 16, Number 3, May, 1999
Volume 17, Number 1--3, September, 1999
Volume 18, Number 1--3, December, 1999
Volume 19, Number 1, January, 2000
Volume 19, Number 2--3, March, 2000
Volume 20, Number 1, April, 2000
Volume 20, Number 2, June, 2000
Volume 20, Number 3, July, 2000
Volume 21, Number 1--3, October, 2000
Volume 22, Number 1, January, 2001
Volume 22, Number 2, March, 2001
Volume 22, Number 3, January, 2001
Volume 23, Number 1, May, 2001
Volume 23, Number 2, July, 2001
Volume 23, Number 3, August, 2001
Volume 24, Number 1, September, 2001
Volume 24, Number 2, October, 2001
Volume 24, Number 3, December, 2001
Volume 25, Number 1, January, 2002
Volume 25, Number 2, February, 2002
Volume 25, Number 3, March, 2002
Volume 26, Number 1--3, June / July / August, 2002
Volume 27, Number 1--2, October / November, 2002
Volume 27, Number 3, December, 2002
Volume 28, Number 1, January, 2003
Volume 28, Number 2, March, 2003
Volume 28, Number 3, April, 2003
Volume 29, Number 1--3, May / June / July, 2003
Volume 30, Number 1, August, 2003
Volume 30, Number 2, September, 2003
Volume 30, Number 3, November, 2003
Volume 31, Number 1, January, 2004
Volume 31, Number 2, February, 2004
Volume 31, Number 3, March, 2004
Volume 32, Number 1--3, May / July, 2004
Volume 33, Number 1, August, 2004
Volume 33, Number 2, September, 2004
Volume 33, Number 3, November, 2004
Volume 34, Number 1, January, 2005
Volume 34, Number 2--3, February, 2005
Volume 35, Number 1, April, 2005
Volume 35, Number 2, May, 2005
Volume 35, Number 3, June, 2005
Volume 36, Number 1, July, 2005
Volume 36, Number 2, August, 2005
Volume 36, Number 3, September, 2005
Volume 37, Number 1, October, 2005
Volume 37, Number 2, November, 2005
Volume 37, Number 3, December, 2005
Volume 38, Number 1, January, 2006
Volume 38, Number 2, February, 2006
Volume 38, Number 3, March, 2006
Volume 39, Number 1, April, 2006
Volume 39, Number 2, May, 2006
Volume 39, Number 3, June, 2006
Volume 40, Number 1, July, 2006
Volume 40, Number 2, August, 2006
Volume 40, Number 3, September, 2006
Volume 41, Number 1, October, 2006
Volume 41, Number 2, November, 2006
Volume 41, Number 3, December, 2006
Volume 42, Number 1, January, 2007
Volume 42, Number 2, February, 2007
Volume 42, Number 3, March, 2007
Volume 43, Number 1, April, 2007
Volume 43, Number 2--3, June, 2007
Volume 44, Number 1--3, September, 2007
Volume 45, Number 1, October, 2007
Volume 45, Number 2, November, 2007
Volume 45, Number 3, December, 2007
Volume 46, Number 1, January, 2008
Volume 46, Number 2, February, 2008
Volume 46, Number 3, March, 2008
Volume 47, Number 1--3, June, 2008
Volume 48, Number 1, July, 2008
Volume 48, Number 2, August, 2008
Volume 48, Number 3, September, 2008
Volume 49, Number 1--3, December, 2008
Volume 50, Number 1, January, 2009
Volume 50, Number 2, February, 2009
Volume 50, Number 3, March, 2009
Volume 51, Number 1, April, 2009
Volume 51, Number 2, May, 2009
Volume 51, Number 3, June, 2009
Volume 52, Number 1, July, 2009
Volume 52, Number 2, August, 2009
Volume 52, Number 3, September, 2009
Volume 53, Number 1, October, 2009
Volume 53, Number 2, November, 2009
Volume 53, Number 3, December, 2009
Volume 54, Number 1, January, 2010
Volume 54, Number 2, February, 2010
Volume 54, Number 3, March, 2010
Volume 55, Number 1, April, 2010
Volume 55, Number 2--3, May, 2010
Volume 56, Number 1, July, 2010
Volume 56, Number 2--3, August, 2010
Volume 57, Number 1, October, 2010
Volume 57, Number 2, November, 2010
Volume 57, Number 3, December, 2010
Volume 58, Number 1, January, 2011
Volume 58, Number 2, February, 2011
Volume 58, Number 3, March, 2011
Volume 59, Number 1--3, April, 2011
Volume 60, Number 1, July, 2011
Volume 60, Number 2, August, 2011
Volume 60, Number 3, September, 2011
Volume 61, Number 1, October, 2011
Volume 61, Number 2, November, 2011
Volume 61, Number 3, December, 2011
Volume 62, Number 1, January, 2012
Volume 62, Number 2, February, 2012
Volume 62, Number 3, March, 2012
Volume 63, Number 1, April, 2012
Volume 63, Number 2, May, 2012
Volume 63, Number 3, June, 2012
Volume 64, Number 1--2, July, 2012
Volume 64, Number 3, September, 2012
Volume 65, Number 1--2, October, 2012
Volume 65, Number 3, December, 2012
Volume 66, Number 1--3, January, 2013
Volume 67, Number 1, April, 2013
Volume 67, Number 2, May, 2013
Volume 67, Number 3, June, 2013
Volume 68, Number 1--3, July, 2013
Volume 69, Number 1, October, 2013
Volume 69, Number 2, November, 2013
Volume 69, Number 3, December, 2013
Volume 70, Number 1--2, January, 2014
Volume 70, Number 3, March, 2014
Volume 71, Number 1, April, 2014
Volume 71, Number 2, May, 2014
Volume 71, Number 3, June, 2014
Volume 72, Number 1, July, 2014
Volume 72, Number 2, August, 2014
Volume 72, Number 3, September, 2014
Volume 73, Number 1, October, 2014
Volume 73, Number 2, November, 2014
Volume 73, Number 3, December, 2014
Volume 74, Number 1, January, 2015
Volume 74, Number 2, February, 2015
Volume 74, Number 3, March, 2015
Volume 75, Number 1, April, 2015
Volume 75, Number 2, May, 2015
Volume 75, Number 3, June, 2015
Volume 76, Number 1, July, 2015
Volume 76, Number 2, August, 2015
Volume 76, Number 3, September, 2015
Volume 77, Number 1, October, 2015
Volume 77, Number 2--3, December, 2015
Volume 78, Number 1, January, 2016
Volume 78, Number 2, February, 2016
Volume 78, Number 3, March, 2016
Volume 79, Number 1, April, 2016
Volume 79, Number 2, May, 2016
Volume 79, Number 3, June, 2016
Volume 80, Number 1, July, 2016
Volume 80, Number 2, August, 2016
Volume 80, Number 3, September, 2016
Volume 81, Number 1, October, 2016
Volume 81, Number 2, November, 2016
Volume 81, Number 3, December, 2016
Volume 82, Number 1--2, January, 2017
Volume 82, Number 3, March, 2017
Volume 83, Number 1, April, 2017
Volume 83, Number 2, May, 2017
Volume 83, Number 3, June, 2017
Volume 84, Number 1--2, July, 2017
Volume 84, Number 3, September, 2017
Volume 85, Number 1, October, 2017
Volume 85, Number 2, November, 2017
Volume 85, Number 3, December, 2017
Volume 86, Number 1, January, 2018
Volume 86, Number 2, February, 2018
Volume 86, Number 3, March, 2018
Volume 86, Number 4, April, 2018
Volume 86, Number 5, May, 2018
Volume 86, Number 6, June, 2018
Volume 86, Number 7, July, 2018
Volume 86, Number 8, August, 2018
Volume 86, Number 9, September, 2018
Volume 86, Number 10, October, 2018
Volume 86, Number 11, November, 2018
Volume 86, Number 12, December, 2018
Volume 87, Number 1, January, 2019
Volume 87, Number 4, April, 2019
Volume 87, Number 5, May, 2019
Volume 87, Number 6, June, 2019
Volume 87, Number 7, July, 2019
Volume 87, Number 8, August, 2019
Volume 87, Number 9, September, 2019
Volume 87, Number 10, October, 2019
Volume 87, Number 11, November, 2019
Volume 87, Number 12, December, 2019
Volume 88, Number 1, January, 2020
Volume 88, Number 2, February, 2020
Volume 88, Number 3, March, 2020
Volume 88, Number 4, April, 2020
Volume 88, Number 5, May, 2020
Volume 88, Number 6, June, 2020
Volume 88, Number 10, October, 2020
Volume 88, Number 11, November, 2020
Volume 88, Number 12, December, 2020
Volume 88, Number 7, July, 2020
Volume 88, Number 8, August, 2020
Volume 88, Number 9, September, 2020
Volume 89, Number 1, January, 2021
Volume 89, Number 2, February, 2021
Volume 89, Number 3, March, 2021
Volume 89, Number 4, April, 2021
Volume 89, Number 5, May, 2021
Volume 89, Number 6, June, 2021
Volume 89, Number 7, July, 2021
Volume 89, Number 8, August, 2021
Volume 89, Number 9, September, 2021
Volume 89, Number 10, October, 2021
Volume 89, Number 11, November, 2021
Volume 89, Number 12, December, 2021
Volume 90, Number 2, February, 2022
Volume 90, Number 3, March, 2022
Volume 90, Number 4, April, 2022
Volume 90, Number 5, May, 2022
Volume 90, Number 6, June, 2022
Volume 90, Number 10, October, 2022
Volume 90, Number 11, November, 2022
Volume 90, Number 12, December, 2022
Volume 90, Number 7, July, 2022
Volume 90, Number 8, August, 2022
Volume 90, Number 9, September, 2022
Volume 91, Number 1, January, 2023
Volume 91, Number 2, February, 2023
Volume 91, Number 3, March, 2023
Volume 91, Number 4, April, 2023
Volume 91, Number 5, May, 2023
Volume 91, Number 6, June, 2023
Volume 91, Number 7, July, 2023
Volume 91, Number 8, August, 2023
Volume 91, Number 9, September, 2023
Volume 91, Number 10, October, 2023
Volume 91, Number 11, November, 2023
Volume 91, Number 12, December, 2023
Volume 92, Number 1, January, 2024
Volume 92, Number 2, February, 2024
Volume 92, Number 3, March, 2024
Volume 92, Number 4, April, 2024
Volume 92, Number 5, May, 2024
Volume 92, Number 6, June, 2024
Volume 92, Number 7, July, 2024
Volume 92, Number 8, August, 2024
Volume 92, Number 9, September, 2024
Volume 92, Number 10, October, 2024
Volume 92, Number 11, November, 2024
Volume 92, Number 12, December, 2024


Designs, Codes, and Cryptography
Volume 1, Number 1, May, 1991

                      Anonymous   Editorial  . . . . . . . . . . . . . . . 5
              G. Eric Moorhouse   Bruck nets, codes, and characters of
                                  loops  . . . . . . . . . . . . . . . . . 7--29
       A. Tietäväinen   Covering radius and dual distance  . . . 31--46
            B. A. LaMacchia and   
                  A. M. Odlyzko   Computation of discrete logarithms in
                                  prime fields . . . . . . . . . . . . . . 47--62
               E. R. Lamken and   
                W. H. Mills and   
                   R. M. Wilson   Four pairwise balanced designs . . . . . 63--68
                    Chat Yin Ho   Some remarks on orders of projective
                                  planes, planar difference sets and
                                  multipliers  . . . . . . . . . . . . . . 69--75
            Juriaan Simonis and   
             Cornelis de Vroedt   A simple proof of the Delsarte
                                  inequalities . . . . . . . . . . . . . . 77--82
                K. T. Arasu and   
                 Alexander Pott   On quasiregular collineation groups of
                                  projective planes  . . . . . . . . . . . 83--92

Designs, Codes, and Cryptography
Volume 1, Number 2, June, 1991

                   Klaus Metsch   Improvement of Bruck's completion
                                  theorem  . . . . . . . . . . . . . . . . 99--116
                 James A. Davis   A note on products of relative
                                  difference sets  . . . . . . . . . . . . 117--119
                  Helmut Siemon   Cyclic Steiner quadruple systems and
                                  Köhler's orbit graphs . . . . . . . . . . 121--132
              David J. Peterson   Fractal properties of the singular
                                  function $s(u)$  . . . . . . . . . . . . 133--139
     Jürgen Bierbrauer and   
                 Tran Van Trung   Halving ${\rm PGL}(2,2^f), f$ odd: a
                                  series of cryptocodes  . . . . . . . . . 141--148
             B. A. Anderson and   
                  P. A. Leonard   A class of self-orthogonal
                                  $2$-sequencings  . . . . . . . . . . . . 149--181
             Douglas A. Leonard   Linear cyclic codes of wordlength $v$
                                  over ${\rm GF}(q^s)$ which are also
                                  linear cyclic codes of wordlength $sv$
                                  over ${\rm GF}(q)$ . . . . . . . . . . . 183--189

Designs, Codes, and Cryptography
Volume 1, Number 3, September, 1991

                A. A. Bruen and   
                   J. C. Fisher   The Jamison method in Galois geometries  199--205
                   Oliver Pfaff   The classification of doubly transitive
                                  affine designs . . . . . . . . . . . . . 207--217
              Dirk Hachenberger   Constructions of large translation nets
                                  with nonabelian translation groups . . . 219--236
              Anne Delandtsheer   Dimensional linear spaces whose
                                  automorphism group is (line,
                                  hyperplane)-flag transitive  . . . . . . 237--245
              D. Jungnickel and   
            Vladimir D. Tonchev   Exponential number of quasi-symmetric
                                  SDP designs and codes meeting the
                                  Grey-Rankin bound  . . . . . . . . . . . 247--253
                      J. D. Key   Hermitian varieties as codewords . . . . 255--259
                  E. W. Lambeck   A remark on the intersection arrays of
                                  distance regular graphs and the distance
                                  regular graphs of diameter $d=3i-1$ with
                                  $b_i=1$ and $k>2$ . . . . . . . . . . . . 261--266

Designs, Codes, and Cryptography
Volume 1, Number 4, December, 1991

                 Antonio Pasini   Diagram geometries for sharply
                                  $n$-transitive sets of permutations or
                                  of mappings  . . . . . . . . . . . . . . 275--297
           H. Van Maldeghem and   
                 J. A. Thas and   
                    S. E. Payne   Desarguesian finite generalized
                                  quadrangles are classical or dual
                                  classical  . . . . . . . . . . . . . . . 299--305
     Jürgen Bierbrauer and   
                 Tran Van Trung   Some highly symmetric authentication
                                  perpendicular arrays . . . . . . . . . . 307--319
                       S. L. Ma   McFarland's conjecture on abelian
                                  difference sets with multiplier $-1$ . . 321--332
               Ka Hin Leung and   
                 Siu Lun Ma and   
                   Yan Loi Wong   Difference sets in dihedral groups . . . 333--338


Designs, Codes, and Cryptography
Volume 2, Number 1, March, 1992

           Tomik Yaghoobian and   
                   Ian F. Blake   Hermitian codes as generalized
                                  Reed--Solomon codes  . . . . . . . . . . 5--17
                Jonathan Jedwab   Generalized perfect arrays and Menon
                                  difference sets  . . . . . . . . . . . . 19--68
                 Bhaskar Bagchi   On quasi-symmetric designs . . . . . . . 69--79
            P. P. Greenough and   
                        R. Hill   Optimal ternary quasi-cyclic codes . . . 81--91
            Jonathan Jedwab and   
                 Sheelagh Lloyd   A note on the nonexistence of Barker
                                  sequences  . . . . . . . . . . . . . . . 93--97

Designs, Codes, and Cryptography
Volume 2, Number 2, June, 1992

           Whitfield Diffie and   
       Paul C. van Oorschot and   
              Michael J. Wiener   Authentication and authenticated key
                                  exchanges  . . . . . . . . . . . . . . . 107--125
                  Edward Spence   A complete classification of symmetric
                                  $(31,10,3)$ designs  . . . . . . . . . . 127--136
                    R. Hill and   
                   D. E. Newton   Optimal ternary linear codes . . . . . . 137--157
               Darryn E. Bryant   Varieties of quasigroups arising from
                                  $2$-perfect $m$-cycle systems  . . . . . 159--168
               Stephen D. Cohen   The explicit construction of irreducible
                                  polynomials over finite fields . . . . . 169--174
                  D. R. Stinson   Combinatorial characterizations of
                                  authentication codes . . . . . . . . . . 175--187
                A. Blokhuis and   
               A. R. Calderbank   Quasi-symmetric designs and the Smith
                                  normal form  . . . . . . . . . . . . . . 189--206

Designs, Codes, and Cryptography
Volume 2, Number 3, September, 1992

                 Xiang Dong Hou   Some inequalities about the covering
                                  radius of Reed--Muller codes . . . . . . 215--224
              Noboru Hamada and   
              Tor Helleseth and   
          Òyvind Ytrehus   On the construction of
                                  $[q^4+q^2-q,5,q^4-q^3+q^2-2q;q]$-codes
                                  meeting the Griesmer bound . . . . . . . 225--229
         Michael R. Fellows and   
                   Neal Koblitz   Self-witnessing polynomial-time
                                  complexity and prime factorization . . . 231--235
        Charles J. Colbourn and   
            Eric Mendelsohn and   
          Cheryl E. Praeger and   
            Vladimir D. Tonchev   Concerning multiplier automorphisms of
                                  cyclic Steiner triple systems  . . . . . 237--251
                    Ronald Shaw   A characterization of the primals in
                                  ${\rm PG}(m,2)$  . . . . . . . . . . . . 253--256
                K. T. Arasu and   
                     Qing Xiang   On the existence of periodic
                                  complementary binary sequences . . . . . 257--262
                 Alexander Pott   On abelian difference set codes  . . . . 263--271
             Peter Landrock and   
                      Olaf Manz   Classical codes as ideals in group
                                  algebras . . . . . . . . . . . . . . . . 273--285
                Thomas Beth and   
                    Volker Hatz   Design machines: algebraically well
                                  described interconnection networks . . . 287--298

Designs, Codes, and Cryptography
Volume 2, Number 4, 1992

              Nicola Melone and   
                        Udo Ott   On the rank of truncated incidence
                                  matrices of linear spaces  . . . . . . . 307--313
                Shuhong Gao and   
        Hendrik W. Lenstra, Jr.   Optimal normal bases . . . . . . . . . . 315--323
              W.-A. Jackson and   
                     P. R. Wild   Relations between two perfect ternary
                                  sequence constructions . . . . . . . . . 325--332
                   Zhe Xian Wan   Construction of Cartesian authentication
                                  codes from unitary geometry  . . . . . . 333--356
                  D. R. Stinson   An explication of secret sharing schemes 357--390
                 D. de Caen and   
               C. D. Godsil and   
                    G. F. Royle   On the $p$-rank of incidence matrices
                                  and a bound of Bruen and Ott . . . . . . 391--394
               Bernhard Schmidt   Note on a question by S. Bagchi and B.
                                  Bagchi: ``Designs from pairs of finite
                                  fields. I. A cyclic unital $U(6)$ and
                                  other regular Steiner $2$-designs'' [J.
                                  Combin. Theory Ser. A 52 (1989), no. 1,
                                  51--61; MR 90k:05025]  . . . . . . . . . 395--395


Designs, Codes, and Cryptography
Volume 3, Number 1, March, 1993

            Donovan R. Hare and   
                William McCuaig   The connectivity of the
                                  block-intersection graphs of designs . . 5--8
               W. D. Wallis and   
                J. L. Yucas and   
                    G.-H. Zhang   Single change covering designs . . . . . 9--19
                Charles Laywine   Subsquares in orthogonal Latin squares
                                  as subspaces in affine geometries: a
                                  generalization of an equivalence of Bose 21--28
           Levon H. Khachatrian   The lower bound of the quadratic spans
                                  of de Bruijn sequences . . . . . . . . . 29--32
                   E. R. Lamken   Existence results for generalized
                                  balanced tournament designs with block
                                  size $3$ . . . . . . . . . . . . . . . . 33--61
               Chris M. Skinner   Nonsymmetric $2$-designs modulo $2$  . . 63--68
              Peter Boyvalenkov   Nonexistence of certain symmetric
                                  spherical codes  . . . . . . . . . . . . 69--74
               W. de Launey and   
                  K. J. Horadam   A weak difference set construction for
                                  higher-dimensional designs . . . . . . . 75--87

Designs, Codes, and Cryptography
Volume 3, Number 2, May, 1993

              A. E. Brouwer and   
          L. M. G. M. Tolhuizen   A sharpening of the Johnson bound for
                                  binary linear codes and the nonexistence
                                  of linear codes with Preparata
                                  parameters . . . . . . . . . . . . . . . 95--98
               V. C. Mavron and   
                   W. D. Wallis   Cubic arcs in cubic nets . . . . . . . . 99--104
                 Alexander Barg   Incomplete sums, dc-constrained codes,
                                  and codes that maintain synchronization  105--116
                  J. D. Key and   
                 F. E. Sullivan   Codes of Steiner triple and quadruple
                                  systems  . . . . . . . . . . . . . . . . 117--125
     Albrecht Beutelspacher and   
                   Ferenc Wettl   On $2$-level secret sharing  . . . . . . 127--134
                  Claude Carlet   Partially-bent functions . . . . . . . . 135--145
                     W. K. Chan   Necessary conditions for Menon
                                  difference sets  . . . . . . . . . . . . 147--154
                 S. S. Sane and   
               M. S. Shrikhande   Some characterizations of
                                  quasi-symmetric designs with a spread    155--166
                 Xiang Dong Hou   Further results on the covering radii of
                                  the Reed--Muller codes . . . . . . . . . 167--177

Designs, Codes, and Cryptography
Volume 3, Number 3, 1993

              Aart Blokhuis and   
                   Klaus Metsch   On the size of a maximal partial spread  187--191
               Edwin R. van Dam   Classification of spreads of ${\rm
                                  PG}(3,4)\sbs{\rm PG}(3,2)$ . . . . . . . 193--198
                    Thomas Beth   The ${\rm GF}(p)$-dimension of the codes
                                  generated by the classical point-line
                                  geometries over ${\rm GF}(p)$  . . . . . 199--207
        Charles J. Colbourn and   
             Alexander Rosa and   
           \vStefan Znám   The spectrum of maximal partial Steiner
                                  triple systems . . . . . . . . . . . . . 209--219
              Josep Rif\`a-Coma   How to avoid the cheaters succeeding in
                                  the key sharing scheme . . . . . . . . . 221--228
       Christine M. O'Keefe and   
                   Alan Rahilly   Spreads and group divisible designs  . . 229--235
                  Claude Carlet   The automorphism groups of the
                                  Delsarte-Goethals codes  . . . . . . . . 237--249
Heikki O. Hämäläinen and   
            Iiro S. Honkala and   
        Markku K. Kaikkonen and   
                Simon N. Litsyn   Bounds for binary multiple covering
                                  codes  . . . . . . . . . . . . . . . . . 251--275

Designs, Codes, and Cryptography
Volume 3, Number 4, October, 1993

                 Sara Bitan and   
                    Tuvi Etzion   The last packing number of quadruples,
                                  and cyclic SQS . . . . . . . . . . . . . 283--313
               Steven Dougherty   Nets and their codes . . . . . . . . . . 315--331
           Willi Geiselmann and   
                Dieter Gollmann   Self-dual bases in ${\bf F}_{q^n}$ . . . 333--345
                     A. Klapper   Cross-correlations of geometric
                                  sequences in characteristic two  . . . . 347--377
             James A. Davis and   
                Jonathan Jedwab   A note on new semi-regular divisible
                                  difference sets  . . . . . . . . . . . . 379--381


Designs, Codes, and Cryptography
Volume 4, Number 1, January, 1994

                  Luc Teirlinck   Some new $2$-resolvable Steiner
                                  quadruple systems  . . . . . . . . . . . 5--10
          Chris J. Mitchell and   
            Kenneth G. Paterson   Decoding perfect maps  . . . . . . . . . 11--30
               J. H. Conway and   
                N. J. A. Sloane   Quaternary constructions for the binary
                                  single-error-correcting codes of Julin,
                                  Best and others  . . . . . . . . . . . . 31--42
          George T. Kennedy and   
                     Vera Pless   On designs and formally self-dual codes  43--55
        Stefan M. Dodunekov and   
          Silvia B. Encheva and   
             Stoyan N. Kapralov   On the $[28, 7, 12]$ binary
                                  self-complementary codes and their
                                  residuals  . . . . . . . . . . . . . . . 57--67
               Thomas Johansson   A shift register construction of
                                  unconditionally secure authentication
                                  codes  . . . . . . . . . . . . . . . . . 69--81
             Wen-Ai Jackson and   
                Keith M. Martin   Geometric secret sharing schemes and
                                  their duals  . . . . . . . . . . . . . . 83--95

Designs, Codes, and Cryptography
Volume 4, Number 2, April, 1994

                   U. Dempwolff   Translation planes of order $27$ . . . . 105--121
            Steven T. Dougherty   A coding-theoretic solution to the $36$
                                  officer problem  . . . . . . . . . . . . 123--128
              Dirk Hachenberger   On completely free elements in finite
                                  fields . . . . . . . . . . . . . . . . . 129--143
            Roberta Evans Sabin   On row-cyclic codes with algebraic
                                  structure  . . . . . . . . . . . . . . . 145--155
                    Attila Sali   On the rigidity of spherical $t$-designs
                                  that are orbits of finite reflection
                                  groups . . . . . . . . . . . . . . . . . 157--170
 Gérald E. Séguin   A counter-example to a recent result on
                                  the $q$-ary image of a $q^s$-ary cyclic
                                  code . . . . . . . . . . . . . . . . . . 171--175
           Kathleen A. S. Quinn   Some constructions for key distribution
                                  patterns . . . . . . . . . . . . . . . . 177--191
                 Alfred Menezes   Book review  . . . . . . . . . . . . . . 193

Designs, Codes, and Cryptography
Volume 4, Number 3, 1994

           A. R. Calderbank and   
                 P. C. Fishburn   Maximal three-independent subsets of
                                  $\{0,1,2\}^n$  . . . . . . . . . . . . . 203--211
                     Olof Heden   A binary perfect code of length $15$ and
                                  codimension $0$  . . . . . . . . . . . . 213--220
                       S. L. Ma   A survey of partial difference sets  . . 221--261
               M. J. B. Robshaw   On evaluating the linear complexity of a
                                  sequence of least period $2^n$ . . . . . 263--269
               M. van Eupen and   
                        R. Hill   An optimal ternary $[69,5,45]$ code and
                                  related codes  . . . . . . . . . . . . . 271--282
                   Zhe Xian Wan   The weight hierarchies of the projective
                                  codes from nondegenerate quadrics  . . . 283--300

Designs, Codes, and Cryptography
Volume 4, Number 4, 1994

                R. D. Baker and   
                    G. L. Ebert   A Bruen chain for $q=19$ . . . . . . . . 307--312
               Yu Qing Chen and   
                 Qing Xiang and   
             Surinder K. Sehgal   An exponent bound on skew Hadamard
                                  abelian difference sets  . . . . . . . . 313--317
          Dieter Jungnickel and   
                 Alexander Pott   A new class of symmetric
                                  $(v,k,\lambda)$-designs  . . . . . . . . 319--325
             C. Koukouvinos and   
                 S. Kounias and   
                 J. Seberry and   
                 C. H. Yang and   
                        J. Yang   On sequences with zero autocorrelation   327--340
              Chris J. Mitchell   Constructing $c$-ary perfect factors . . 341--368
                  D. R. Stinson   Universal hashing and authentication
                                  codes  . . . . . . . . . . . . . . . . . 369--380
            Gilles Zémor   Hash functions and Cayley graphs . . . . 381--394


Designs, Codes, and Cryptography
Volume 5, Number 1, January, 1995

                K. T. Arasu and   
             Surinder K. Sehgal   Difference Sets in Abelian Groups of
                                  $p$-Rank Two . . . . . . . . . . . . . . 5--12
                  Marco Buratti   A Powerful Method for Constructing
                                  Difference Families and Optimal Optical
                                  Orthogonal Codes . . . . . . . . . . . . 13--25
               M. J. Coster and   
                  W. H. Haemers   Quasi-Symmetric Designs Related to the
                                  Triangular Graph . . . . . . . . . . . . 27--42
                Clement Lam and   
                Larry Thiel and   
            Vladimir D. Tonchev   On quasi-symmetric $2$-$(28,12,11)$ and
                                  $2$-$(36,16,12)$ designs . . . . . . . . 43--55
              Rudolf Mathon and   
                Gordon F. Royle   The Translation Planes of Order $49$ . . 57--72
             David Naccache and   
           David M'Ra\"\ihi and   
                   Dan Raphaeli   Can Montgomery Parasites Be Avoided? A
                                  Design Methodology Based on Key and
                                  Cryptosystem Modifications . . . . . . . 73--80
                   U. Dempwolff   Correction to: ``Translation planes of
                                  order $27$'' [Des. Codes Cryptogr. 4
                                  (1994), no. 2, 105--121; MR 95a:51012]   81--81

Designs, Codes, and Cryptography
Volume 5, Number 2, March, 1995

                 Ahmed M. Assaf   On Covering Designs with Block Size $5$
                                  and Index $5$  . . . . . . . . . . . . . 91--107
              David Gillman and   
               Ronald L. Rivest   Complete Variable-Length ``Fix-Free''
                                  Codes  . . . . . . . . . . . . . . . . . 109--114
            Kenneth G. Paterson   Perfect Factors in the de Bruijn Graph   115--138
            René Peeters   On the $p$-Ranks of Net Graphs . . . . . 139--153
            Stephan J. Suchower   Nonisomorphic Complete Sets of
                                  $F$-Rectangles with Prime Power
                                  Dimensions . . . . . . . . . . . . . . . 155--174

Designs, Codes, and Cryptography
Volume 5, Number 3, May, 1995

              Marco Carpentieri   A Perfect Threshold Secret Sharing
                                  Scheme to Identify Cheaters  . . . . . . 183--187
        Charles J. Colbourn and   
          Jeffrey H. Dinitz and   
             Mieczys\law Wojtas   Thwarts in Transversal Designs . . . . . 189--197
                     R. Craigen   The Structure of Weighing Matrices
                                  having Large Weights . . . . . . . . . . 199--216
                Tuvi Etzion and   
                 Victor Wei and   
                     Zhen Zhang   Bounds on the Sizes of Constant Weight
                                  Covering Codes . . . . . . . . . . . . . 217--239
          K. Gopalakrishnan and   
                  D. R. Stinson   Three Characterizations of Non-binary
                                  Correlation-Immune and Resilient
                                  Functions  . . . . . . . . . . . . . . . 241--251
               Akihiro Munemasa   On Perfect $t$-Shift Codes in Abelian
                                  Groups . . . . . . . . . . . . . . . . . 253--259
           Christine M. O'Keefe   Key Distribution Patterns using
                                  Minkowski Planes . . . . . . . . . . . . 261--267
                 Tran Van Trung   On the Construction of Authentication
                                  and Secrecy Codes  . . . . . . . . . . . 269--280
                  J. D. Key and   
                 F. E. Sullivan   Erratum: ``Codes of Steiner triple and
                                  quadruple systems'' [Des. Codes
                                  Cryptogr. \bf 3 (1993), no. 2, 117--125;
                                  MR 94e:05050]  . . . . . . . . . . . . . 281--281


Designs, Codes, and Cryptography
Volume 6, Number 1, July, 1995

            Patrick A. H. Bours   On the Construction of Perfect
                                  Deletion-Correcting Codes using Design
                                  Theory . . . . . . . . . . . . . . . . . 5--20
           A. R. Calderbank and   
                N. J. A. Sloane   Modular and $p$-adic Cyclic Codes  . . . 21--35
                   J. K. Gibson   Severely Denting the Gabidulin Version
                                  of the McEliece Public Key Cryptosystem  37--45
             Glenn Hurlbert and   
                    Garth Isaak   New Constructions for de Bruijn Tori . . 47--56
                   S. L. Ma and   
               Bernhard Schmidt   On $(p^a,p,p^a,p^{a-1})$-relative
                                  difference sets  . . . . . . . . . . . . 57--71
               W. J. Martin and   
                      X. J. Zhu   Anticodes for the Grassman and bilinear
                                  forms graphs . . . . . . . . . . . . . . 73--79

Designs, Codes, and Cryptography
Volume 6, Number 2, September, 1995

             Masaaki Harada and   
                 Hiroshi Kimura   New Extremal Doubly-Even $[64, 32, 12]$
                                  Codes  . . . . . . . . . . . . . . . . . 91--96
            W. Cary Huffman and   
            Vladimir D. Tonchev   The existence of extremal self-dual
                                  $[50,25,10]$ codes and quasi-symmetric
                                  $2$-$(49,9,6)$ designs . . . . . . . . . 97--106
                    Helmut Meyn   Explicit $N$-Polynomials of $2$-Power
                                  Degree over Finite Fields, I . . . . . . 107--116
           Renate Scheidler and   
               Hugh C. Williams   A Public-Key Cryptosystem Utilizing
                                  Cyclotomic Fields  . . . . . . . . . . . 117--131
                 N. Shalaby and   
                         J. Yin   Directed packings with block size $5$
                                  and even $\nu$ . . . . . . . . . . . . . 133--142
                Marten van Dijk   On the Information Rate of Perfect
                                  Secret Sharing Schemes . . . . . . . . . 143--169

Designs, Codes, and Cryptography
Volume 6, Number 3, November, 1995

                     P. Dey and   
                   J. L. Hayden   On Symmetric Incidence Matrices of
                                  Projective Planes  . . . . . . . . . . . 179--188
                D. G. Glynn and   
            J. W. P. Hirschfeld   On the Classification of Geometric Codes
                                  by Polynomial Functions  . . . . . . . . 189--204
               Thomas Johansson   Authentication Codes for Nontrusting
                                  Parties Obtained from Rank Metric Codes  205--218
                Yaron Klein and   
               Simon Litsyn and   
                Alexander Vardy   Two New Bounds on the Size of Binary
                                  Codes with a Minimum Distance of Three   219--227
               Tim Penttila and   
                Gordon F. Royle   Sets of Type $(m, n)$ in the Affine and
                                  Projective Planes of Order Nine  . . . . 229--245
            Kevin T. Phelps and   
                     Mike Levan   Kernels of Nonlinear Hamming Codes . . . 247--257


Designs, Codes, and Cryptography
Volume 7, Number 1--2, January, 1996

                      Anonymous   Foreword to this issue . . . . . . . . . 7--8
               Whitfield Diffie   The National Security Establishment and
                                  the Development of Public-Key
                                  Cryptography . . . . . . . . . . . . . . 9--12
                   Mary Fischer   ``And Now For Something Completely
                                  Different'' (The Egyptologist and the
                                  Cryptographer: a Personal Reminiscence)  13--15
                    Thomas Beth   Watching the Bhang Meter and Flying
                                  through Dirt . . . . . . . . . . . . . . 17--25
              Paul Syverson and   
              Catherine Meadows   A Formal Language for Cryptographic
                                  Protocol Requirements  . . . . . . . . . 27--59
               Kaisa Nyberg and   
              Rainer A. Rueppel   Message Recovery for Signature Schemes
                                  Based on the Discrete Logarithm Problem  61--81
            R. Safavi-Naini and   
                      L. Tombak   Authentication Codes in Plaintext and
                                  Chosen-Content Attacks . . . . . . . . . 83--99
             C. J. Mitchell and   
                F. C. Piper and   
                  M. Walker and   
                        P. Wild   Authentication Schemes, Perfect Local
                                  Randomizers, Perfect Secrecy and Secret
                                  Sharing Schemes  . . . . . . . . . . . . 101--110
              Xian-Mo Zhang and   
                  Yuliang Zheng   Characterizing the Structures of
                                  Cryptographic Functions Satisfying the
                                  Propagation Criterion for Almost All
                                  Vectors  . . . . . . . . . . . . . . . . 111--134
            Dieter Gollmann and   
                Yongfei Han and   
              Chris J. Mitchell   Redundant Integer Representations and
                                  Fast Exponentiation  . . . . . . . . . . 135--151
               R. Scheidler and   
                   A. Stein and   
               Hugh C. Williams   Key-Exchange in Real Quadratic
                                  Congruence Function Fields . . . . . . . 153--174
                  J. D. Key and   
                 F. E. Sullivan   Correction to: ``Codes of Steiner triple
                                  and quadruple systems'' [Des. Codes
                                  Cryptogr. \bf 3 (1993), no. 2, 117--125;
                                  MR 94e:05050]  . . . . . . . . . . . . . 175--175

Designs, Codes, and Cryptography
Volume 7, Number 3, March, 1996

        Alexey E. Ashikhmin and   
                Simon N. Litsyn   Fast Decoding Algorithms for First Order
                                  Reed--Muller and Related Codes . . . . . 187--214
              Thierry P. Berger   On the Automorphism Groups of
                                  Affine-Invariant Codes . . . . . . . . . 215--221
          T. Aaron Gulliver and   
              Vijay K. Bhargava   New Good Rate $(m-1)/pm$ Ternary and
                                  Quaternary Quasi-Cyclic Codes  . . . . . 223--233
           Marijn Van Eupen and   
              Noboru Hamada and   
                  Yoko Watamori   The Nonexistence of Ternary $[50,5,32]$
                                  Codes  . . . . . . . . . . . . . . . . . 235--237
               Rolf S. Rees and   
             Douglas R. Stinson   Combinatorial characterizations of
                                  authentication codes. II . . . . . . . . 239--259


Designs, Codes, and Cryptography
Volume 8, Number 1--2, May, 1996

          Dieter Jungnickel and   
            Günter Pickert   A Life's Work in Geometry: An Homage to
                                  Hanfried Lenz  . . . . . . . . . . . . . 9--22
                K. T. Arasu and   
                 Alexander Pott   Impossibility of a Certain Cyclotomic
                                  Equation with Applications to Difference
                                  Sets . . . . . . . . . . . . . . . . . . 23--27
         Alphonse Baartmans and   
               Ivan Landjev and   
            Vladimir D. Tonchev   On the Binary Codes of Steiner Triple
                                  Systems  . . . . . . . . . . . . . . . . 29--43
                   R. A. Bailey   Orthogonal Partitions in Designed
                                  Experiments  . . . . . . . . . . . . . . 45--77
                R. D. Baker and   
                    G. L. Ebert   Regulus-free spreads of ${\rm PG}(3, q)$ 79--89
                    Thomas Beth   Designs, Codes and Crypts --- a Puzzle
                                  Altogether . . . . . . . . . . . . . . . 91--101
           Darryn E. Bryant and   
              D. G. Hoffman and   
                   C. A. Rodger   $5$-Cycle Systems with Holes . . . . . . 103--108
               Peter J. Cameron   Stories about Groups and Sequences . . . 109--133
              Dirk Hachenberger   Groups Admitting a Kantor Family and a
                                  Factorized Normal Subgroup . . . . . . . 135--143
          Willem H. Haemers and   
            Vladimir D. Tonchev   Spreads in Strongly Regular Graphs . . . 145--157
          Dieter Jungnickel and   
   Marialuisa J. de Resmini and   
              Scott A. Vanstone   Codes Based on Complete Graphs . . . . . 159--165
               Ka Hin Leung and   
                     Siu Lun Ma   A construction of partial difference
                                  sets in $Z_{p^2}\times
                                  Z_{p^2}\times\cdots\times Z_{p^2}$ . . . 167--172
         Arlene A. Pascasio and   
          Cheryl E. Praeger and   
            Blessilda P. Raposa   On the characterisation of ${\rm
                                  AG}(n,q)$ by its parameters as a nearly
                                  triply regular design  . . . . . . . . . 173--179
                    S. E. Payne   The fundamental theorem of $q$-clan
                                  geometry . . . . . . . . . . . . . . . . 181--202
            Günter Pickert   Extension of Gravity Centers
                                  Configuration to Steiner Triple Systems  203--214
        D. K. Ray-Chaudhuri and   
                     Qing Xiang   Constructions of Partial Difference Sets
                                  and Relative Difference Sets Using
                                  Galois Rings . . . . . . . . . . . . . . 215--227
                E. E. Shult and   
                     J. A. Thas   $m$-systems and partial $m$-systems of
                                  polar spaces . . . . . . . . . . . . . . 229--238
                  Helmut Siemon   Piotrowski's Infinite Series of Steiner
                                  Quadruple Systems Revisited  . . . . . . 239--254

Designs, Codes, and Cryptography
Volume 8, Number 3, June, 1996

                   R. A. Bailey   Orthogonal partitions in designed
                                  experiments. Corrected reprint . . . . . 45--77
               Peter J. Cameron   Stories about groups and sequences.
                                  Corrected reprint of ``Stories about
                                  groups and sequences'' [Des. Codes
                                  Cryptogr. \bf 8 (1996), no. 1--2,
                                  109--133; MR 97f:20004a] . . . . . . . . 109--133
           Josep Domingo-Ferrer   Achieving Rights Untransferability with
                                  Client-Independent Servers . . . . . . . 263--271
                 Masaaki Harada   Existence of New Extremal Doubly-Even
                                  Codes and Extremal Singly-Even Codes . . 273--283
                 Xiang-dong Hou   The Covering Radius of $R(1,9)$ in
                                  $R(4,9)$ . . . . . . . . . . . . . . . . 285--292
             Heeralal Janwa and   
                   Oscar Moreno   McEliece Public Key Cryptosystems Using
                                  Algebraic-Geometric Codes  . . . . . . . 293--307
                Ivan N. Landgev   Constructions of Group Divisible Designs 309--318
                  D. B. Meisner   New Classes of Groups Containing Menon
                                  Difference Sets  . . . . . . . . . . . . 319--325
       Tamás Szönyi   On Cyclic Caps in Projective Spaces  . . 327--332


Designs, Codes, and Cryptography
Volume 9, Number 1, August, 1996

               Vladimir Tonchev   Preface  . . . . . . . . . . . . . . . . 5--6
          E. F. Assmus, Jr. and   
                      J. D. Key   Designs and codes: an update . . . . . . 7--27
     Jürgen Bierbrauer and   
              Stephen Black and   
                      Yves Edel   Some $t$-homogeneous sets of
                                  permutations . . . . . . . . . . . . . . 29--38
                Jeffrey T. Bonn   Forcing Linearity on Greedy Codes  . . . 39--49
            Laurel L. Carpenter   Oval Designs in Desarguesian Projective
                                  Planes . . . . . . . . . . . . . . . . . 51--59
        Charles J. Colbourn and   
               Donald L. Kreher   Concerning Difference Matrices . . . . . 61--70
                 Hiroshi Kimura   Hadamard Matrices and Dihedral Groups    71--77
                   Laura Monroe   Self-Orthogonal Greedy Codes . . . . . . 79--83
                  Iosif Pinelis   On the Minimal Number of Even
                                  Submatrices of $0$-$1$ Matrices  . . . . 85--93
                     J. A. Thas   $k$-arcs, hyperovals, partial flocks and
                                  flocks . . . . . . . . . . . . . . . . . 95--104
                 Tran Van Trung   A Generalization of a Theorem of Dehon
                                  for Simple $t$-Designs . . . . . . . . . 105--114
                 Judy L. Walker   A New Approach to the Main Conjecture on
                                  Algebraic-Geometric MDS Codes  . . . . . 115--120

Designs, Codes, and Cryptography
Volume 9, Number 2, October, 1996

          Stefka Buyuklieva and   
                  Vassil Yorgov   Singly-Even Self-Dual Codes of Length
                                  $40$ . . . . . . . . . . . . . . . . . . 131--141
               Mario A. de Boer   Almost MDS Codes . . . . . . . . . . . . 143--155
            Chang-Seop Park and   
             Gui-Liang Feng and   
               Kenneth K. Tzeng   The New Minimum Distance Bounds of Goppa
                                  Codes and Their Decoding . . . . . . . . 157--176
                    Ron M. Roth   Spectral-Null Codes and Null Spaces of
                                  Hadamard Submatrices . . . . . . . . . . 177--191
              Alfred Scheerhorn   Dickson Polynomials, Completely Normal
                                  Polynomials and the Cyclic Module
                                  Structure of Specific Extensions of
                                  Finite Fields  . . . . . . . . . . . . . 193--202
              M. A. Shokrollahi   Stickelberger Codes  . . . . . . . . . . 203--213
             A. N. Skorobogatov   On the Number of Representations of
                                  Matroids Over Finite Fields  . . . . . . 215--226

Designs, Codes, and Cryptography
Volume 9, Number 3, November, 1996

       Pier Vittorio Ceccherini   Giuseppe Tallini (1930--1995)  . . . . . 237--245
               Giuseppe Tallini   Combinatorial Problems in Infinite
                                  Spaces . . . . . . . . . . . . . . . . . 247--249
                S. R. Blackburn   A Note on Sequences with the Shift and
                                  Add Property . . . . . . . . . . . . . . 251--256
              Tor Helleseth and   
             P. Vijay Kumar and   
               Abhijit Shanbhag   Codes with the Same Weight Distributions
                                  as the Goethals Codes and the
                                  Delsarte-Goethals Codes  . . . . . . . . 257--266
             Wen-Ai Jackson and   
                Keith M. Martin   Perfect Secret Sharing Schemes on Five
                                  Participants . . . . . . . . . . . . . . 267--286
             Wen-Ai Jackson and   
            Keith M. Martin and   
           Christine M. O'Keefe   A Construction for Multisecret Threshold
                                  Schemes  . . . . . . . . . . . . . . . . 287--303
             Ueli M. Maurer and   
                   Yacov Yacobi   A Non-interactive Public-Key
                                  Distribution System  . . . . . . . . . . 305--316
   Cécile Huybrechts and   
                 Antonio Pasini   On $c^{n-2}.c^*$ geometries of order $2$ 317--330


Designs, Codes, and Cryptography
Volume 10, Number 1, January, 1997

               Stephen D. Cohen   The Length of Primitive BCH Codes with
                                  Minimal Covering Radius  . . . . . . . . 5--16
                     Jean Conan   On the enumeration and generation of
                                  nonweight equivalent rate $\frac 12$
                                  convolutional codes  . . . . . . . . . . 17--27
  András Gács and   
       Péter Sziklai and   
          Tamás Sz\Honyi   Two Remarks on Blocking Sets and Nuclei
                                  in Planes of Prime Order . . . . . . . . 29--39
                  Noboru Hamada   A Necessary and Sufficient Condition for
                                  the Existence of Some Ternary $[n, k,
                                  d]$ Codes Meeting the Greismer Bound . . 41--56
                   Gerhard Hiss   On the Incidence Matrix of the Ree
                                  Unital . . . . . . . . . . . . . . . . . 57--62
           Marijn van Eupen and   
                 Petr Lison\vek   Classification of Some Optimal Ternary
                                  Linear Codes of Small Length . . . . . . 63--84
               A. J. van Zanten   Lexicographic Order and Linearity  . . . 85--97

Designs, Codes, and Cryptography
Volume 10, Number 2, February, 1997

              Dieter Jungnickel   Preface  . . . . . . . . . . . . . . . . 107--107
            Arrigo Bonisoli and   
Gábor Korchmáros and   
       Tamás Szönyi   Some Multiply Derived Translation Planes
                                  with ${\rm SL}(2,5)$ as an Inherited
                                  Collineation Group in the Translation
                                  Complement . . . . . . . . . . . . . . . 109--114
            Sabine Bouzette and   
         Francis Buekenhout and   
                Edmond Dony and   
              Alain Gottcheiner   A Theory of Nets for Polyhedra and
                                  Polytopes Related to Incidence
                                  Geometries . . . . . . . . . . . . . . . 115--136
           Claudia Broecker and   
         Ralph-Hardo Schulz and   
                  Gernot Stroth   Check Character Systems Using Chevalley
                                  Groups . . . . . . . . . . . . . . . . . 137--143
             Aiden A. Bruen and   
                David L. Wehlau   Partitioning Quadrics, Symmetric Group
                                  Divisible Designs and Caps . . . . . . . 145--155
           A. R. Calderbank and   
                Gary M. McGuire   Construction of a $(64,2^{37},12)$ code
                                  via Galois rings . . . . . . . . . . . . 157--165
          Robert S. Coulter and   
                Rex W. Matthews   Planar Functions and Planes of
                                  Lenz-Barlotti Class II . . . . . . . . . 167--184
             Wen-Ai Jackson and   
                  Peter R. Wild   On GMW Designs and Cyclic Hadamard
                                  Designs  . . . . . . . . . . . . . . . . 185--191
          Norman L. Johnson and   
             Guglielmo Lunardon   Maximal Partial Spreads and Flocks . . . 193--202
            Alan C. H. Ling and   
                Xiaojun Zhu and   
        Charles J. Colbourn and   
               Ronald C. Mullin   Pairwise Balanced Designs with
                                  Consecutive Block Sizes  . . . . . . . . 203--222
                 Siu Lun Ma and   
               Bernhard Schmidt   Difference Sets Corresponding to a Class
                                  of Symmetric Designs . . . . . . . . . . 223--236
              Rudolf Mathon and   
                 Tran Van Trung   Unitals and Unitary Polarities in
                                  Symmetric Designs  . . . . . . . . . . . 237--250
                   Klaus Metsch   Embedding the Linear Structure of Planar
                                  Spaces into Projective Spaces  . . . . . 251--263

Designs, Codes, and Cryptography
Volume 10, Number 3, March, 1997

              R. J. R. Abel and   
        Charles J. Colbourn and   
               Jianxing Yin and   
                   Hantao Zhang   Existence of incomplete transversal
                                  designs with block size five and any
                                  index $\lambda$  . . . . . . . . . . . . 275--307
       Lynn Margaret Batten and   
              Kris Coolsaet and   
            Anne Penfold Street   Blocking sets in $(v,\{2,4\},1)$-designs 309--314
       Margaret Ann Bernard and   
                 Bhu Dev Sharma   Linear Codes with Non-Uniform Error
                                  Correction Capability  . . . . . . . . . 315--323
              Diane Erdmann and   
                    Sean Murphy   An Approximate Distribution for the
                                  Maximum Order Complexity . . . . . . . . 325--339
                  A. Faldum and   
                     W. Willems   Codes of Small Defect  . . . . . . . . . 341--350
            Alice E. D. Houston   On the limit of maximal density of
                                  sequences with a Perfect Linear
                                  Complexity Profile . . . . . . . . . . . 351--359
                   Zhe-Xian Wan   State Spaces of Convolutional Codes  . . 361--369


Designs, Codes, and Cryptography
Volume 11, Number 1, April, 1997

                  Marco Buratti   From a $(G, k, 1)$ to a $(Ck \oplus G,
                                  k, 1)$ difference family . . . . . . . . 5--9
                  Marco Buratti   On Resolvable Difference Families  . . . 11--23
          T. Aaron Gulliver and   
                 Masaaki Harada   Classification of Extremal Double
                                  Circulant Formally Self-Dual Even Codes  25--35
                   E. R. Lamken   The Existence of Partitioned Generalized
                                  Balanced Tournament Designs with Block
                                  Size $3$ . . . . . . . . . . . . . . . . 37--71
                 Siu Lun Ma and   
             Surinder K. Sehgal   A Family of Semi-Regular Divisible
                                  Difference Sets  . . . . . . . . . . . . 73--78
              Stephanie Perkins   Codes with a Disparity Property  . . . . 79--97

Designs, Codes, and Cryptography
Volume 11, Number 2, May, 1997

               Carlo Blundo and   
          Alfredo de Santis and   
          Roberto de Simone and   
                    Ugo Vaccaro   Tight Bounds on the Information Rate of
                                  Secret Sharing Schemes . . . . . . . . . 107--122
              Malcolm Greig and   
                    Julian Abel   Resolvable Balanced Incomplete Block
                                  Designs with Block Size $8$  . . . . . . 123--140
          T. Aaron Gulliver and   
                 Masaaki Harada   Weight Enumerators of Double Circulant
                                  Codes and New Extremal Self-Dual Codes   141--150
Patric R. J. Östergård and   
Heikki O. Hämäläinen   A New Table of Binary/Ternary Mixed
                                  Covering Codes . . . . . . . . . . . . . 151--178
            Eric R. Verheul and   
         Henk C. A. van Tilborg   Constructions and properties of $k$ out
                                  of $n$ visual secret sharing schemes . . 179--196

Designs, Codes, and Cryptography
Volume 11, Number 3, July, 1997

         Jürgen Bierbrauer   Universal Hashing and Geometric Codes    207--221
             Simon R. Blackburn   A Generalized Rational Interpolation
                                  Problem and the Solution of the
                                  Welch-Berlekamp Key Equation . . . . . . 223--234
                  C. Blundo and   
          A. Giorgio Gaggia and   
                  D. R. Stinson   On the Dealer's Randomness Required in
                                  Secret Sharing Schemes . . . . . . . . . 235--259
              A. E. Brouwer and   
                   M. van Eupen   The Correspondence Between Projective
                                  Codes and $2$-weight Codes . . . . . . . 261--266
             James A. Davis and   
             Surinder K. Sehgal   Using the Simplex Code to Construct
                                  Relative Difference Sets in $2$-groups   267--277
         G. B. Khosrovshahi and   
          A. Nowzari-Dalini and   
                      R. Torabi   Trading Signed Designs and Some New
                                  $4-(12, 5, 4)$ Designs . . . . . . . . . 279--288
                     A. Klapper   Cross-Correlations of Quadratic Form
                                  Sequences in Odd Characteristic  . . . . 289--305


Designs, Codes, and Cryptography
Volume 12, Number 1, September, 1997

                 Iliya Boukliev   Some New Optimal Ternary Linear Codes    5--11
             Mike Burmester and   
             Yvo G. Desmedt and   
                 Fred Piper and   
                 Michael Walker   A General Zero-Knowledge Scheme  . . . . 13--37
              Stefka Buyuklieva   On the Binary Self-Dual Codes with an
                                  Automorphism of Order $2$  . . . . . . . 39--48
                 R. Craigen and   
                  H. Kharaghani   Hadamard Matrices from Weighing Matrices
                                  via Signed Groups  . . . . . . . . . . . 49--58
                  F. Franek and   
                    A. Rosa and   
                   T. S. Griggs   Large Sets of Mutually Almost Disjoint
                                  Steiner Triple Systems Not From Steiner
                                  Quadruple Systems  . . . . . . . . . . . 59--67
                   J. L. Hayden   Generalized Hadamard Matrices  . . . . . 69--73
                 Xiang-Dong Hou   The Reed--Muller code $R(1,7)$ is normal 75--82
                 Tatsuya Maruta   On the Achievement of the Griesmer Bound 83--87
                      L. Storme   Normal Rational Curves Over Prime Fields 89--96

Designs, Codes, and Cryptography
Volume 12, Number 2, October, 1997

              Hanno Lefmann and   
        Pavel Pudlák and   
                 Petr Savick\'y   On Sparse Parity Check Matrices  . . . . 107--130
        Vladimir I. Levenshtein   Split Orthogonal Arrays and Maximum
                                  Independent Resilient Systems of
                                  Functions  . . . . . . . . . . . . . . . 131--160
                Marten van Dijk   A Linear Construction of Secret Sharing
                                  Schemes  . . . . . . . . . . . . . . . . 161--201

Designs, Codes, and Cryptography
Volume 12, Number 3, November, 1997

         Evangelos Kranakis and   
           Paul C. Van Oorschot   Introduction . . . . . . . . . . . . . . 213--213
                Doug R. Stinson   On Some Methods for Unconditionally
                                  Secure Key Distribution and Broadcast
                                  Encryption . . . . . . . . . . . . . . . 215--243
                  N. Rogier and   
                Pascal Chauvaud   ${\rm MD}2$ is not secure without the
                                  checksum byte  . . . . . . . . . . . . . 245--251
             Vincent Rijmen and   
               Bart Preneel and   
                    Erik De Win   On Weaknesses of Non-surjective Round
                                  Functions  . . . . . . . . . . . . . . . 253--266
                     J. Lee and   
                 H. M. Heys and   
                  S. E. Tavares   Resistance of a CAST-Like Encryption
                                  Algorithm to Linear and Differential
                                  Cryptanalysis  . . . . . . . . . . . . . 267--282
              Carlisle M. Adams   Constructing Symmetric Ciphers Using the
                                  CAST Design Procedure  . . . . . . . . . 283--316


Designs, Codes, and Cryptography
Volume 13, Number 1, January, 1998

          R. Julian R. Abel and   
                  Malcolm Greig   Balanced Incomplete Block Designs with
                                  Block Size $7$ . . . . . . . . . . . . . 5--30
              E. F. Assmus, Jr.   Linearly Derived Steiner Triple Systems  31--49
                Aiden Bruen and   
              Lucien Haddad and   
                   David Wehlau   Caps and Colouring Steiner Triple
                                  Systems  . . . . . . . . . . . . . . . . 51--55
               Gary McGuire and   
        Vladimir D. Tonchev and   
                 Harold N. Ward   Characterizing the Hermitian and Ree
                                  Unitals on $28$ Points . . . . . . . . . 57--61
                  Helmut Siemon   A number-theoretic conjecture and the
                                  existence of $S$-cyclic Steiner
                                  quadruple systems  . . . . . . . . . . . 63--94

Designs, Codes, and Cryptography
Volume 13, Number 2, February, 1998

           Darryn E. Bryant and   
                     A. Khodkar   On Orthogonal Double Covers of Graphs    103--105
             L. R. A. Casse and   
               K. M. Martin and   
                     P. R. Wild   Bounds and Characterizations of
                                  Authentication/Secrecy Schemes . . . . . 107--129
             James A. Davis and   
            Jonathan Jedwab and   
                Miranda Mowbray   New Families of Semi-Regular Relative
                                  Difference Sets  . . . . . . . . . . . . 131--146
              J. Fitzgerald and   
                      R. F. Lax   Decoding affine variety codes using
                                  Gröbner bases . . . . . . . . . . . . . . 147--158
      Kirsten Mackenzie-Fleming   A Recursive Construction for $2$-Designs 159--164
              Noboru Hamada and   
               Marijn van Eupen   The Nonexistence of Ternary $[38, 6,
                                  23]$ Codes . . . . . . . . . . . . . . . 165--172
              T. S. Michael and   
                   W. D. Wallis   Skew-Hadamard Matrices and the Smith
                                  Normal Form  . . . . . . . . . . . . . . 173--176
                Ilene H. Morgan   Equiorthogonal Frequency Hypercubes:
                                  Preliminary Theory . . . . . . . . . . . 177--185
              Pratima Panigrahi   The collinearity graph of the $O^-(8,2)$
                                  quadric is not geometrisable . . . . . . 187--198
                Corrado Zanella   Linear sections of the finite Veronese
                                  varieties and authentication systems
                                  defined using geometry . . . . . . . . . 199--212

Designs, Codes, and Cryptography
Volume 13, Number 3, March, 1998

      Tsonka Stefanova Baicheva   The Covering Radius of Ternary Cyclic
                                  Codes with Length up to $25$ . . . . . . 223--227
              J. J. Brennan and   
                    Bruce Geist   Analysis of iterated modular
                                  exponentiation: the orbits of
                                  $x^\alpha\bmod N$  . . . . . . . . . . . 229--245
                   Yu Qing Chen   A Construction of Difference Sets  . . . 247--250
    Dragomir \vZ. \Dbarokovi\'c   Note on Periodic Complementary Sets of
                                  Binary Sequences . . . . . . . . . . . . 251--256
          T. Aaron Gulliver and   
                 Masaaki Harada   Classification of Extremal Double
                                  Circulant Self-Dual Codes of Lengths
                                  $64$ to $72$ . . . . . . . . . . . . . . 257--269
                 Masaaki Harada   New extremal type II codes over $\bold
                                  Z_4$ . . . . . . . . . . . . . . . . . . 271--284
              Ilia Krasikov and   
                   Simon Litsyn   Bounds on Spectra of Codes with Known
                                  Dual Distance  . . . . . . . . . . . . . 285--297
                R. Safavi-Naini   Three Systems for Threshold Generation
                                  of Authenticators  . . . . . . . . . . . 299--312
                 A. A. Zain and   
                B. Sundar Rajan   Quasideterminant Characterization of MDS
                                  Group Codes over Abelian Groups  . . . . 313--330


Designs, Codes, and Cryptography
Volume 14, Number 1, April, 1998

              F. E. Bennett and   
                     J. Yin and   
                   H. Zhang and   
                  R. J. R. Abel   Perfect Mendelsohn Packing Designs with
                                  Block Size Five  . . . . . . . . . . . . 5--22
        Sergei V. Bezzateev and   
          Natalia A. Shekhunova   A Subclass of Binary Goppa Codes With
                                  Improved Estimation of the Code
                                  Dimension  . . . . . . . . . . . . . . . 23--38
             David B. Jaffe and   
            Vladimir D. Tonchev   Computing Linear Codes and Unitals . . . 39--52
                  Marc Joye and   
        Jean-Jacques Quisquater   Reducing the Elliptic Curve Cryptosystem
                                  of Meyer-Müller to the Cryptosystem of
                                  Rabin-Williams . . . . . . . . . . . . . 53--56
 Çetin K. Koç and   
                     Tolga Acar   Montgomery multiplication in ${\rm
                                  GF}(2^k)$  . . . . . . . . . . . . . . . 57--69
              Tero Laihonen and   
                   Simon Litsyn   On Upper Bounds for Minimum Distance and
                                  Covering Radius of Non-binary Codes  . . 71--80
                    A. Mahmoodi   Existence of Perfect
                                  $3$-Deletion-Correcting Codes  . . . . . 81--87
             Antonio Maschietti   Difference Sets and Hyperovals . . . . . 89--98

Designs, Codes, and Cryptography
Volume 14, Number 2, May, 1998

               Alexei Ashikhmin   On Generalized Hamming Weights for
                                  Galois Ring Linear Codes . . . . . . . . 107--126
             Aiden A. Bruen and   
                  Keldon Drudge   On the non-existence of certain
                                  Cameron-Liebler line classes in ${\rm
                                  PG}(3, q)$ . . . . . . . . . . . . . . . 127--132
              Claude Carlet and   
               Philippe Guillot   An Alternate Characterization of the
                                  Bentness of Binary Functions, with
                                  Uniqueness . . . . . . . . . . . . . . . 133--140
        Charles J. Colbourn and   
                Alan C. H. Ling   Point Code Minimum Steiner Triple
                                  Systems  . . . . . . . . . . . . . . . . 141--146
                  Yury J. Ionin   A Technique for Constructing Symmetric
                                  Designs  . . . . . . . . . . . . . . . . 147--158
         Volker Müller and   
             Scott Vanstone and   
              Robert Zuccherato   Discrete Logarithm Based Cryptosystems
                                  in Quadratic Function Fields of
                                  Characteristic $2$ . . . . . . . . . . . 159--178
            Juriaan Simonis and   
               Alexei Ashikhmin   Almost Affine Codes  . . . . . . . . . . 179--197

Designs, Codes, and Cryptography
Volume 14, Number 3, September, 1998

        Amir H. Banihashemi and   
               Amir K. Khandani   An Inequality on the Coding Gain of
                                  Densest Lattice Packings in Successive
                                  Dimensions . . . . . . . . . . . . . . . 207--212
            Harald Fripertinger   Enumeration, Construction and Random
                                  Generation of Block Codes  . . . . . . . 213--219
                 Jingmin He and   
                      Ed Dawson   Shared Secret Reconstruction . . . . . . 221--237
              Philippe Langevin   Weights of Abelian Codes . . . . . . . . 239--245
            Kenneth G. Paterson   Root Counting, the DFT and the Linear
                                  Complexity of Nonlinear Filtering  . . . 247--259
            Doug R. Stinson and   
                 Tran Van Trung   Some New Results on Key Distribution
                                  Patterns and Broadcast Encryption  . . . 261--279
            Marten van Dijk and   
         Christian Gehrmann and   
                     Ben Smeets   Unconditionally Secure Group
                                  Authentication . . . . . . . . . . . . . 281--296
                  Helmut Siemon   Erratum: ``A number-theoretic conjecture
                                  and the existence of $S$-cyclic Steiner
                                  quadruple systems'' [Des. Codes
                                  Cryptogr. \bf 13 (1998), no. 1, 63--94;
                                  1 600 695] . . . . . . . . . . . . . . . 297--297


Designs, Codes, and Cryptography
Volume 15, Number 1, October, 1998

               Anton Betten and   
            Adalbert Kerber and   
              Reinhard Laue and   
              Alfred Wassermann   Simple $8$-Designs with Small Parameters 5--27
          Roberto De Prisco and   
              Alfredo De Santis   On Lower Bounds for the Redundancy of
                                  Optimal Codes  . . . . . . . . . . . . . 29--45
                 Wende Chen and   
           Torleiv Klòve   Weight Hierarchies of Linear Codes
                                  Satisfying the Chain Condition . . . . . 47--66
             Christian Gehrmann   Multiround Unconditionally Secure
                                  Authentication . . . . . . . . . . . . . 67--86
             Kaoru Kurosawa and   
                 Koji Okada and   
               Hajime Saido and   
             Douglas R. Stinson   New Combinatorial Bounds for
                                  Authentication Codes and Key
                                  Predistribution Schemes  . . . . . . . . 87--100

Designs, Codes, and Cryptography
Volume 15, Number 2, 1998

              Ross Anderson and   
              Cunsheng Ding and   
              Tor Helleseth and   
           Torleiv Klòve   How to build robust shared control
                                  systems  . . . . . . . . . . . . . . . . 111--124
              Claude Carlet and   
            Pascale Charpin and   
                Victor Zinoviev   Codes, bent functions and permutations
                                  suitable for DES-like cryptosystems  . . 125--156
                 Wende Chen and   
                   Zhi Chen and   
           Torleiv Klòve   New constructions of disjoint distinct
                                  difference sets  . . . . . . . . . . . . 157--165
                    K. Chen and   
                         L. Zhu   Existence of $(q,6,1)$ difference
                                  families with $q$ a prime power  . . . . 167--173
              Tor Helleseth and   
             P. Vijay Kumar and   
               Kyeongcheol Yang   An infinite family of $3$-designs from
                                  Preparata codes over ${Z}_4$ . . . . . . 175--181
               Markku Kaikkonen   Codes from affine permutation groups . . 183--186
            A. A. I. Perera and   
                  K. J. Horadam   Cocyclic generalised Hadamard matrices
                                  and central relative difference sets . . 187--200
           Kyeongcheol Yang and   
                  Tor Helleseth   Two new infinite families of $3$-designs
                                  from Kerdock codes over ${Z}_4$  . . . . 201--214

Designs, Codes, and Cryptography
Volume 15, Number 3, December, 1998

                K. T. Arasu and   
                       S. L. Ma   Abelian Difference Sets Without
                                  Self-conjugacy . . . . . . . . . . . . . 223--230
                    Simeon Ball   Partial Unitals and Related Structures
                                  in Desarguesian Planes . . . . . . . . . 231--236
             M. C. Bhandari and   
          K. K. P. Chanduka and   
                      A. K. Lal   On Lower Bounds For Covering Codes . . . 237--243
                Ivan N. Landjev   The Nonexistence of Some Optimal Ternary
                                  Codes of Dimension Five  . . . . . . . . 245--258
            Hiroyuki Ohmori and   
               Takashi Miyamoto   Construction of Weighing Matrices
                                  $(17,9)$ Having the Intersection Number
                                  $8$  . . . . . . . . . . . . . . . . . . 259--269
              Nabil Shalaby and   
                   Jianxing Yin   Nested Optimal $\lambda$-Packings and
                                  $\lambda$-Coverings of Pairs with
                                  Triples  . . . . . . . . . . . . . . . . 271--278
              Brett Stevens and   
                Lucia Moura and   
                Eric Mendelsohn   Lower Bounds for Transversal Covers  . . 279--299
            Marten van Dijk and   
             Wen-Ai Jackson and   
                Keith M. Martin   A General Decomposition Construction for
                                  Incomplete Secret Sharing Schemes  . . . 301--321


Designs, Codes, and Cryptography
Volume 16, Number 1, January, 1999

             M. C. Bhandari and   
                M. K. Gupta and   
                      A. K. Lal   Some Results on NQR Codes  . . . . . . . 5--9
         Simon Blake-Wilson and   
                Kevin T. Phelps   Constant Weight Codes and Group
                                  Divisible Designs  . . . . . . . . . . . 11--27
       Alexander A. Davydov and   
        Patric R. J. Ostergaard   New Linear Codes with Covering Radius
                                  $2$ and Odd Basis  . . . . . . . . . . . 29--39
                 Vikram Jha and   
                 Norman Johnson   Cyclic Ostrom Spreads  . . . . . . . . . 41--51
             Kaoru Kurosawa and   
                   Wakaha Ogata   Efficient Rabin-type Digital Signature
                                  Scheme . . . . . . . . . . . . . . . . . 53--64
Patric R. J. Ostergård and   
             William D. Weakley   Constructing Covering Codes with Given
                                  Automorphisms  . . . . . . . . . . . . . 65--73
               Carles Padro and   
  Germán Sáez and   
              Jorge Luis Villar   Detection of Cheaters in Vector Space
                                  Secret Sharing Schemes . . . . . . . . . 75--85
              Keisuke Shiromoto   The Weight Enumerator of Linear Codes
                                  over GF$(qm)$ Having Generator Matrix
                                  over GF$(q)$ . . . . . . . . . . . . . . 87--92

Designs, Codes, and Cryptography
Volume 16, Number 2, February, 1999

                    A. Barg and   
                   A. Ashikhmin   Binomial Moments of the Distance
                                  Distribution and the Probability of
                                  Undetected Error . . . . . . . . . . . . 103--116
                  Marco Buratti   Some $(17q, 17, 2)$ and $(25q, 25, 3)$
                                  BIBD Constructions . . . . . . . . . . . 117--120
                Paul Camion and   
                  Anne Canteaut   Correlation-Immune and Resilient
                                  Functions Over a Finite Alphabet and
                                  Their Applications in Cryptography . . . 121--149
                  Yves Edel and   
         Jürgen Bierbrauer   $41$ is the Largest Size of a Cap in
                                  ${\rm PG}(4,4)$  . . . . . . . . . . . . 151--160
                  Graham Norton   On Minimal Realization Over a Finite
                                  Chain Ring . . . . . . . . . . . . . . . 161--178
            Kevin T. Phelps and   
                     Mike LeVan   Switching Equivalence Classes of Perfect
                                  Codes  . . . . . . . . . . . . . . . . . 179--184
           A. J. van Zanten and   
                   Agung Lukito   Construction of Certain Cyclic
                                  Distance-Preserving Codes Having
                                  Linear-Algebraic Characteristics . . . . 185--199

Designs, Codes, and Cryptography
Volume 16, Number 3, May, 1999

               L. M. Batten and   
                    J. M. Dover   Some Sets of Type in Cubic Order Planes  211--213
           Alexis Bonnecaze and   
           Bernard Mourrain and   
            Patrick Solé   Jacobi Polynomials, Type II Codes, and
                                  Designs  . . . . . . . . . . . . . . . . 215--234
          M. A. Chateauneuf and   
        Charles J. Colbourn and   
                   D. L. Kreher   Covering Arrays of Strength Three  . . . 235--242
            Sebastian Egner and   
                    Thomas Beth   How to Play $M_{13}$?  . . . . . . . . . 243--247
           John Friedlander and   
             Michael Larsen and   
              Daniel Lieman and   
               Igor Shparlinski   On The Correlation Of Binary
                                  $M$-sequences  . . . . . . . . . . . . . 249--256
           Philippe Gaborit and   
                 Masaaki Harada   Construction of Extremal Type II Codes
                                  over ${\bf Z}_4$ . . . . . . . . . . . . 257--269
              William J. Martin   Designs in Product Association Schemes   271--289
     Deirdre Longacher Smeltzer   Properties of Codes from Difference Sets
                                  in $2$-Groups  . . . . . . . . . . . . . 291--306


Designs, Codes, and Cryptography
Volume 17, Number 1--3, September, 1999

                      Anonymous   Guest Editorial  . . . . . . . . . . . . 5--6
                  J. D. Key and   
             H. F. Mattson, Jr.   Edward F. Assmus, Jr. (1931--1998) . . . 7--11
                      Anonymous   Ed Assmus  . . . . . . . . . . . . . . . 13--14
             Aiden A. Bruen and   
                David L. Wehlau   Long Binary Linear Codes and Large Caps
                                  in Projective Space  . . . . . . . . . . 37--60
               Bernhard Schmidt   Williamson Matrices and a Conjecture of
                                  Ito's  . . . . . . . . . . . . . . . . . 61--68
                   Yu Qing Chen   On a Family of Covering Extended
                                  Building Sets  . . . . . . . . . . . . . 69--72
                 Harold N. Ward   An Introduction to Divisible Codes . . . 73--79
            Pascale Charpin and   
 Aimo Tietäväinen and   
                Victor Zinoviev   On the Minimum Distances of Non-Binary
                                  Cyclic Codes . . . . . . . . . . . . . . 81--85
                   G. Cohen and   
                  J. Rif\`a and   
                    J. Tena and   
                G. Zémor   On the Characterization of Linear
                                  Uniquely Decodable Codes . . . . . . . . 87--96
             Joseph A. Thas and   
          Hendrik Van Maldeghem   On Embeddings of the Flag Geometries of
                                  Projective Planes in Finite Projective
                                  Spaces . . . . . . . . . . . . . . . . . 97--104
             Neil J. Calkin and   
                  J. D. Key and   
               M. J. De Resmini   Minimum Weight and Dimension Formulas
                                  for Some Geometric Codes . . . . . . . . 105--120
            Vladimir D. Tonchev   Linear Perfect Codes and a
                                  Characterization of the Classical
                                  Designs  . . . . . . . . . . . . . . . . 121--128
              Jörg Eisfeld   The Eigenspaces of the
                                  Bose--Mesner-Algebras of the Association
                                  Schemes corresponding to Projective
                                  Spaces and Polar Spaces  . . . . . . . . 129--150
                       Ray Hill   An Extension Theorem for Linear Codes    151--157
                  Yury J. Ionin   Building Symmetric Designs With Building
                                  Sets . . . . . . . . . . . . . . . . . . 159--175
                 Hans Dobbertin   Another Proof of Kasami's Theorem  . . . 177--180
               Anton Betten and   
              Reinhard Laue and   
              Alfred Wassermann   A Steiner $5$-Design on $36$ Points  . . 181--186
          Willem H. Haemers and   
        René Peeters and   
     Jeroen M. van Rijckevorsel   Binary Codes of Strongly Regular Graphs  187--209
                     Qing Xiang   Maximally Nonlinear Functions and Bent
                                  Functions  . . . . . . . . . . . . . . . 211--218
                   Klaus Metsch   A Bose-Burton Theorem for Elliptic Polar
                                  Spaces . . . . . . . . . . . . . . . . . 219--224
                   J. F. Dillon   Multiplicative Difference Sets via
                                  Additive Characters  . . . . . . . . . . 225--235
                Simeon Ball and   
              Aart Blokhuis and   
           Christine M. O'Keefe   On Unitals with Many Baer Sublines . . . 237--252
                G. L. Ebert and   
            J. W. P. Hirschfeld   Complete Systems of Lines on a Hermitian
                                  Surface over a Finite Field  . . . . . . 253--268
              Tor Helleseth and   
                Victor Zinoviev   On $Z_4$-Linear Goethals Codes and
                                  Kloosterman Sums . . . . . . . . . . . . 269--288
              Richard M. Wilson   Signed Hypergraph Designs and Diagonal
                                  Forms for Some Incidence Matrices  . . . 289--297
                A. Blokhuis and   
                  A. E. Brouwer   The Universal Embedding Dimension of the
                                  Near Polygon on the $1$-Factors of a
                                  Complete Graph . . . . . . . . . . . . . 299--303
             James A. Davis and   
                Jonathan Jedwab   A New Family of Relative Difference Sets
                                  in $2$-Groups  . . . . . . . . . . . . . 305--312


Designs, Codes, and Cryptography
Volume 18, Number 1--3, December, 1999

          Dieter Jungnickel and   
                  Jack van Lint   Editorial  . . . . . . . . . . . . . . . 5--6
                K. T. Arasu and   
                     N. J. Voss   Answering a Question of Pott on Almost
                                  Perfect Sequences  . . . . . . . . . . . 7--10
               Christine Bachoc   On Harmonic Weight Enumerators of Binary
                                  Codes  . . . . . . . . . . . . . . . . . 11--28
          Thierry P. Berger and   
                Pascale Charpin   The Automorphism Groups of BCH Codes and
                                  of Some Affine-Invariant Codes Over
                                  Extension Fields . . . . . . . . . . . . 29--53
            Wayne Broughton and   
                   Gary McGuire   Some Observations on Quasi-$3$ Designs
                                  and Hadamard Matrices  . . . . . . . . . 55--61
           Matthew R. Brown and   
       Christine M. O'Keefe and   
                   Tim Penttila   Triads, Flocks of Conics and
                                  $Q^{-(5,1)}$ . . . . . . . . . . . . . . 63--70
     Gérard D. Cohen and   
          Sylvia B. Encheva and   
            Gilles Zémor   Antichain Codes  . . . . . . . . . . . . 71--80
          Charles A. Cusack and   
           Spyros S. Magliveras   Semiregular Large Sets . . . . . . . . . 81--87
                 D. de Caen and   
                  E. R. van Dam   Association Schemes Related to Kasami
                                  Codes and Kerdock Sets . . . . . . . . . 89--102
               Iwan Duursma and   
              Tor Helleseth and   
              Chunming Rong and   
               Kyeongcheol Yang   Split Weight Enumerators for the
                                  Preparata Codes with Applications to
                                  Designs  . . . . . . . . . . . . . . . . 103--124
               J. E. Fields and   
                 P. Gaborit and   
              W. C. Huffman and   
                       V. Pless   On the Classification of Extremal Even
                                  Formally Self-Dual Codes . . . . . . . . 125--148
                Shuhong Gao and   
                   Jason Howell   A General Polynomial Sieve . . . . . . . 149--157
                    Chat Yin Ho   Incidence Matrices and Collineations of
                                  Finite Projective Planes . . . . . . . . 159--162
                   H. Janwa and   
             H. F. Mattson, Jr.   Some Upper Bounds on the Covering Radii
                                  of Linear Codes Over and Their
                                  Applications . . . . . . . . . . . . . . 163--181
         G. B. Khosrovshahi and   
                  Reza Naserasr   Hypergraphical Codes Arising from Binary
                                  Trades . . . . . . . . . . . . . . . . . 183--186
              Rudolf Mathon and   
                 Tran van Trung   Directed $t$-Packings and Directed
                                  $t$-Steiner Systems  . . . . . . . . . . 187--198
               Klaus Metsch and   
                      L. Storme   Partial $t$-Spreads in
                                  $\mbox{PG}(2t+1,q)$  . . . . . . . . . . 199--216
                 Alan R. Prince   Flag-Transitive Affine Planes of Order
                                  $64$ . . . . . . . . . . . . . . . . . . 217--221
         Mattias Svanström   A Class of Perfect Ternary
                                  Constant-Weight Codes  . . . . . . . . . 223--229
              Jack van Lint and   
                 Ludo Tolhuizen   On Perfect Ternary Constant Weight Codes 231--234
           Tamás Szhonyi   On the Embedding of $(k,p)$-Arcs is
                                  Maximal Arcs . . . . . . . . . . . . . . 235--246


Designs, Codes, and Cryptography
Volume 19, Number 1, January, 2000

               J. H. Dinitz and   
                   E. R. Lamken   HOPs and COPs: Room frames with
                                  partitionable transversals . . . . . . . 5--26
                  Todd D. Vance   A Gap in GRM Code Weight Distributions   27--43
              Xian-Mo Zhang and   
              Yuliang Zheng and   
                    Hideki Imai   Relating Differential Distribution
                                  Tables to Other Properties of
                                  Substitution Boxes . . . . . . . . . . . 45--63

Designs, Codes, and Cryptography
Volume 19, Number 2--3, March, 2000

                   Neal Koblitz   Guest Editorial  . . . . . . . . . . . . 75--76
             Simon Blake-Wilson   Information Security, Mathematics, and
                                  Public-Key Cryptography  . . . . . . . . 77--99
               Arjen K. Lenstra   Integer Factoring  . . . . . . . . . . . 101--128
                 Andrew Odlyzko   Discrete Logarithms: The Past and the
                                  Future . . . . . . . . . . . . . . . . . 129--145
             Ueli M. Maurer and   
                    Stefan Wolf   The Diffie--Hellman Protocol . . . . . . 147--171
               Neal Koblitz and   
             Alfred Menezes and   
                 Scott Vanstone   The State of Elliptic Curve Cryptography 173--193
              Jerome A. Solinas   Efficient Arithmetic on Koblitz Curves   195--249


Designs, Codes, and Cryptography
Volume 20, Number 1, April, 2000

            Joseph H. Silverman   The Xedni Calculus and the Elliptic
                                  Curve Discrete Logarithm Problem . . . . 5--40
        Michael J. Jacobson and   
               Neal Koblitz and   
        Joseph H. Silverman and   
              Andreas Stein and   
                    Edlyn Teske   Analysis of the Xedni Calculus Attack    41--64
             James M. McQuillan   Pencils of Hyperconics in Projective
                                  Planes of Characteristic Two . . . . . . 65--71
               Jacques Wolfmann   Difference Sets in $Z_4^m$ and
                                  $F_2^{2m}$ . . . . . . . . . . . . . . . 73--88
         Ralph-Hardo Schulz and   
         Antonino Giorgio Spera   Automorphisms of Constant Weight Codes
                                  and of Divisible Designs . . . . . . . . 89--97

Designs, Codes, and Cryptography
Volume 20, Number 2, June, 2000

    Grégoire Bommier and   
               Francis Blanchet   Binary Quasi-Cyclic Goppa Codes  . . . . 107--124
           Graham H. Norton and   
          Ana Salagean-Mandache   On the Key Equation Over a Commutative
                                  Ring . . . . . . . . . . . . . . . . . . 125--141
            Arrigo Bonisoli and   
             Antonio Cossidente   Mixed Partitions of Projective
                                  Geometries . . . . . . . . . . . . . . . 143--154
          A. Halbutogullari and   
                      C. K. Koc   Parallel Multiplication in using
                                  Polynomial Residue Arithmetic  . . . . . 155--173
                Jacques Patarin   Cryptanalysis of the Matsumoto and Imai
                                  Public Key Scheme of Eurocrypt'98  . . . 175--209

Designs, Codes, and Cryptography
Volume 20, Number 3, July, 2000

        Charles J. Colbourn and   
                    Sufang Zhao   Maximum Kirkman Signal Sets for
                                  Synchronous Uni-Polar Multi-User
                                  Communication Systems  . . . . . . . . . 219--227
          Sylvia B. Encheva and   
         Gérard D. Cohen   Linear Codes and Their Coordinate
                                  Ordering . . . . . . . . . . . . . . . . 229--250
                 Xiang-dong Hou   Bent Functions, Partial Difference Sets,
                                  and Quasi-Frobenius Local Rings  . . . . 251--268
                  Ari Juels and   
                 Marcus Peinado   Hiding Cliques for Cryptographic
                                  Security . . . . . . . . . . . . . . . . 269--280
              Satoshi Obana and   
                 Kaoru Kurosawa   Combinatorial Classification of Optimal
                                  Authentication Codes with Arbitration    281--305
              Pratima Panigrahi   The Non-Collinearity Graph of the
                                  $(8,2)$ Quadric Is Uniquely
                                  Geometrisable  . . . . . . . . . . . . . 307--317
                 Olga Polverino   Small Blocking Sets in $\mbox{PG}(2, p)$ 319--324
            Ching-Nung Yang and   
                  Chi-Sung Laih   New Colored Visual Secret Sharing
                                  Schemes  . . . . . . . . . . . . . . . . 325--336


Designs, Codes, and Cryptography
Volume 21, Number 1--3, October, 2000

              Aart Blokhuis and   
              Willem H. Haemers   Preface  . . . . . . . . . . . . . . . . 5--5
                N. G. de Bruijn   Jaap Seidel 80 . . . . . . . . . . . . . 7--10
             Béla Bajnok   Spherical Designs and Generalized
                                  Sum-Free Sets in Abelian Groups  . . . . 11--18
                R. D. Baker and   
                J. M. Dover and   
                G. L. Ebert and   
                    K. L. Wantz   Perfect Baer Subplane Partitions and
                                  Three-Dimensional Flag-Transitive Planes 19--39
               Peter Beelen and   
                 Ruud Pellikaan   The Newton Polygon of Plane Curves with
                                  Many Rational Points . . . . . . . . . . 41--67
                  A. E. Brouwer   Locally Paley Graphs . . . . . . . . . . 69--76
        Frans C. Bussemaker and   
          Willem H. Haemers and   
                  Edward Spence   The Search for Pseudo Orthogonal Latin
                                  Squares of Order Six . . . . . . . . . . 77--82
               Edwin R. van Dam   A Characterization of Association
                                  Schemes from Affine Spaces . . . . . . . 83--86
            Frank De Clerck and   
                 Mario Delanote   Two-Weight Codes, Partial Geometries and
                                  Steiner Systems  . . . . . . . . . . . . 87--98
              Ralf Gramlich and   
          Hendrik Van Maldeghem   Epimorphisms of Generalized Polygons
                                  Part 1: Geometrical Characterizations    99--111
              Yury J. Ionin and   
               M. S. Shrikhande   Strongly Regular Graphs and Designs with
                                  Three Intersection Numbers . . . . . . . 113--125
        Aleksandar Jurivsic and   
                    Jack Koolen   A Local Approach to $1$-Homogeneous
                                  Graphs . . . . . . . . . . . . . . . . . 127--147
                Jack Koolen and   
            Monique Laurent and   
            Alexander Schrijver   Equilateral Dimension of the Rectilinear
                                  Space  . . . . . . . . . . . . . . . . . 149--164
              Johannes Maks and   
                Juriaan Simonis   Optimal Subcodes of Second Order
                                  Reed--Muller Codes and Maximal Linear
                                  Spaces of Bivectors of Maximal Rank  . . 165--180
              William J. Martin   Minimum Distance Bounds for $s$-Regular
                                  Codes  . . . . . . . . . . . . . . . . . 181--187
         Bernhard Mühlherr   On Isomorphisms between Coxeter Groups   189--189
              L. J. Rylands and   
                   D. E. Taylor   Constructions for Octonion and
                                  Exceptional Jordan Algebras  . . . . . . 191--203
                    Akos Seress   Large Families of Cospectral Graphs  . . 205--208
                       Ron Shaw   Subsets of $\mbox{PG}(n,2)$ and Maximal
                                  Partial Spreads in $\mbox{PG}(4,2)$  . . 209--222
                 Irfan Siap and   
         Dijen K. Ray-Chaudhuri   New Linear Codes Over and Improvements
                                  on Bounds  . . . . . . . . . . . . . . . 223--233
                  L. Storme and   
                     Zs. Weiner   On $1$-Blocking Sets in $\mbox{PG}(n,q),
                                  n\geq 3$ . . . . . . . . . . . . . . . . 235--251


Designs, Codes, and Cryptography
Volume 22, Number 1, January, 2001

                    Akos Seress   All Lambda-Designs With $\lambda = 2^p$
                                  are Type-1 . . . . . . . . . . . . . . . 5--17
         Antonio Cossidente and   
           Domenico Labbate and   
           Alessandro Siciliano   Veronese Varieties Over Finite Fields
                                  and Their Projections  . . . . . . . . . 19--32
                   Sylvie Dubuc   Characterization of Linear Structures    33--45
              Satoshi Obana and   
                 Kaoru Kurosawa   Bounds and Combinatorial Structure of
                                  $(k,n)$ Multi-Receiver $A$-Codes . . . . 47--63
                Joan Daemen and   
            Lars R. Knudsen and   
                 Vincent Rijmen   Linear Frameworks for Block Ciphers  . . 65--87
          T. Aaron Gulliver and   
                 Masaaki Harada   Codes over and Improvements to the
                                  Bounds on Ternary Linear Codes . . . . . 89--96
               Andreas Enge and   
              Dieter Jungnickel   Review . . . . . . . . . . . . . . . . . 97--99

Designs, Codes, and Cryptography
Volume 22, Number 2, March, 2001

           Gretchen L. Matthews   Weierstrass Pairs and Minimum Distance
                                  of Goppa Codes . . . . . . . . . . . . . 107--121
                 Arne Winterhof   Some Estimates for Character Sums and
                                  Applications . . . . . . . . . . . . . . 123--131
                  D. R. Stinson   Something About All or Nothing
                                  (Transforms) . . . . . . . . . . . . . . 133--138
                 Harold N. Ward   The Nonexistence of a $[207,4,165]$ Code
                                  over ${\rm GF}(5)$ . . . . . . . . . . . 139--148
               Kenichiro Tanabe   A New Proof of the Assmus--Mattson
                                  Theorem for Non-Binary Codes . . . . . . 149--155
    Agnes V. Dizon-Garciano and   
                Yutaka Hiramine   On Sylow Subgroups of Abelian Affine
                                  Difference Sets  . . . . . . . . . . . . 157--163
                 Tatsuya Maruta   On the Nonexistence of $q$-ary Linear
                                  Codes of Dimension Five  . . . . . . . . 165--177
              Norman L. Johnson   Two-Transitive Parallelisms  . . . . . . 179--189
                   U. Dempwolff   Primitive Rank $3$ Groups on Symmetric
                                  Designs  . . . . . . . . . . . . . . . . 191--207

Designs, Codes, and Cryptography
Volume 22, Number 3, January, 2001

                 Michel Sebille   There Exists a Simple Non Trivial
                                  $t$-design with an Arbitrarily Large
                                  Automorphism Group for Every $t$ . . . . 215--219
                R. Ahlswede and   
             H. K. Aydinian and   
              L. H. Khachatrian   On Perfect Codes and Related Concepts    221--237
                   R. Scheidler   Cryptography in Quadratic Function
                                  Fields . . . . . . . . . . . . . . . . . 239--264
             Kaoru Kurosawa and   
                  Satoshi Obana   Combinatorial Bounds on Authentication
                                  Codes with Arbitration . . . . . . . . . 265--281
                 Vikram Jha and   
              Norman L. Johnson   Almost Desarguesian Maximal Partial
                                  Spreads  . . . . . . . . . . . . . . . . 283--304
           Alexander A. Davydov   New Constructions of Covering Codes  . . 305--316
                   Karl Brincat   On the Use of RSA as a Secret Key
                                  Cryptosystem . . . . . . . . . . . . . . 317--329
                     Olof Heden   A Maximal Partial Spread of Size $45$ in
                                  ${\rm PG}(3,7)$  . . . . . . . . . . . . 331--334


Designs, Codes, and Cryptography
Volume 23, Number 1, May, 2001

               Igor Shparlinski   On the Linear Complexity of the Power
                                  Generator  . . . . . . . . . . . . . . . 5--10
           Koichi Betsumiya and   
                 Masaaki Harada   Binary Optimal Odd Formally Self-Dual
                                  Codes  . . . . . . . . . . . . . . . . . 11--22
           Tadashi Wadayama and   
                  Toru Hada and   
          Koichiro Wakasugi and   
                 Masao Kasahara   Upper and Lower Bounds on Maximum
                                  Nonlinearity of $n$-input $m$-output
                                  Boolean Function . . . . . . . . . . . . 23--34
            Blessilda P. Raposa   Some Triple Block Intersection Numbers
                                  of Paley $2$-Designs of QN-type  . . . . 35--52
                   Andreas Enge   The Extended Euclidian Algorithm on
                                  Polynomials, and the Computational
                                  Efficiency of Hyperelliptic
                                  Cryptosystems  . . . . . . . . . . . . . 53--74
                    J. E. Iiams   A Note on Certain 2-Groups with Hadamard
                                  Difference Sets  . . . . . . . . . . . . 75--80
          Christophe Mouaha and   
              Gerhard Schiffels   All $q^m$-ary Cyclic Codes with Cyclic
                                  $q$-ary Image Are Known  . . . . . . . . 81--98
                   Jianxing Yin   A Combinatorial Construction for Perfect
                                  Deletion-Correcting Codes  . . . . . . . 99--110

Designs, Codes, and Cryptography
Volume 23, Number 2, July, 2001

                 I. Honkala and   
                     A. Klapper   Bounds for the Multicovering Radii of
                                  Reed--Muller Codes with Applications to
                                  Stream Ciphers . . . . . . . . . . . . . 131--146
               Igor Shparlinski   On Some Properties of the Shrinking
                                  Generator  . . . . . . . . . . . . . . . 147--156
              Tor Helleseth and   
             P. Vijay Kumar and   
              Halvard Martinsen   A New Family of Ternary Sequences with
                                  Ideal Two-level Autocorrelation Function 157--166
          T. Aaron Gulliver and   
             Nikolai Senkevitch   Optimal Ternary Linear Rate $1/2$ Codes  167--172
                  Luke O'Connor   On String Replacement Exponentiation . . 173--184
              B. N. Cooperstein   Hyperplane Sections of Kantor's Unitary
                                  Ovoids . . . . . . . . . . . . . . . . . 185--196
                  Yves Edel and   
         Jürgen Bierbrauer   Large Caps in Small Spaces . . . . . . . 197--212
                  Kenzi Akiyama   On Certain Schur Rings of Dimension $4$  213--222
              Ilia Krasikov and   
                   Simon Litsyn   On the Distance Distributions of BCH
                                  Codes and Their Duals  . . . . . . . . . 223--232
              Marco Buratti and   
                  Fulvio Zuanni   Perfect Cayley Designs as
                                  Generalizations of Perfect Mendelsohn
                                  Designs  . . . . . . . . . . . . . . . . 233--248
                     J. A. Thas   Characterizations of Translation
                                  Generalized Quadrangles  . . . . . . . . 249--258

Designs, Codes, and Cryptography
Volume 23, Number 3, August, 2001

             C. Koukouvinos and   
                M. Mitrouli and   
               Jennifer Seberry   Values of Minors of $(1,-1)$ Incidence
                                  Matrices of SBIBDs and Their Application
                                  to the Growth Problem  . . . . . . . . . 267--282
      N. A. Howgrave-Graham and   
                    N. P. Smart   Lattice Attacks on Digital Signature
                                  Schemes  . . . . . . . . . . . . . . . . 283--290
                    Sharad Sane   A Proof of the Jungnickel-Tonchev
                                  Conjecture on Quasi-Multiple
                                  Quasi-Symmetric Designs  . . . . . . . . 291--296
                  Marc Joye and   
    Jean-Jacques Quisquater and   
                Tsuyoshi Takagi   How to Choose Secret Parameters for
                                  RSA-Type Cryptosystems over Elliptic
                                  Curves . . . . . . . . . . . . . . . . . 297--316
                K. T. Arasu and   
                   Yu Qing Chen   A Difference Set in $(\mathbb{Z}/4
                                  \mathbb{Z})^3 \times
                                  \mathbb{Z}/5\mathbb{Z}$  . . . . . . . . 317--324
           Koichi Betsumiya and   
                 Masaaki Harada   Classification of Formally Self-Dual
                                  Even Codes of Lengths up to $16$ . . . . 325--332
        Galina T. Bogdanova and   
         Andries E. Brouwer and   
         Stoian N. Kapralov and   
Patric R. J. Östergård   Error-Correcting Codes over an Alphabet
                                  of Four Elements . . . . . . . . . . . . 333--342
          Kanat S. Abdukhalikov   Affine Invariant and Cyclic Codes over
                                  $p$-adic Numbers and Finite Rings  . . . 343--370


Designs, Codes, and Cryptography
Volume 24, Number 1, September, 2001

                      G. Hughes   Structure Theorems for Group Ring Codes
                                  with an Application to Self-Dual Codes   5--14
               Houshou Chen and   
                 John T. Coffey   Trellis Structure and Higher Weights of
                                  Extremal Self-Dual Codes . . . . . . . . 15--36
    István Kovács   On the Internal Nuclei of Sets in ${\rm
                                  PG}(n,q)$, $q$ is Odd  . . . . . . . . . 37--42
                    Chris Boner   Maximal Weight Divisors of Projective
                                  Reed--Muller Codes . . . . . . . . . . . 43--47
               Siaw-Lynn Ng and   
                 Michael Walker   On the Composition of Matroids and Ideal
                                  Secret Sharing Schemes . . . . . . . . . 49--67
                      D. Wu and   
                         L. Zhu   Generalized Steiner Systems with a Prime
                                  Power  . . . . . . . . . . . . . . . . . 69--80
                P. Véron   True Dimension of Some Binary Quadratic
                                  Trace Goppa Codes  . . . . . . . . . . . 81--97
              Gabriele Nebe and   
                E. M. Rains and   
                N. J. A. Sloane   The Invariants of the Clifford Groups    99--122

Designs, Codes, and Cryptography
Volume 24, Number 2, October, 2001

                  Martin Bokler   Minimal Blocking Sets in Projective
                                  Spaces of Square Order . . . . . . . . . 131--144
           Amir K. Khandani and   
                    M. Esmaeili   Successive Minimization of the State
                                  Complexity of the Self-dual Lattices
                                  Using Korkin--Zolotarev Reduced Basis    145--158
              Sönke Blunck   On the Existence and Construction of
                                  Tight Fourth Order Quadrature Rules for
                                  the Sphere . . . . . . . . . . . . . . . 159--169
                      A. Baliga   Cocyclic Codes of Length $40$  . . . . . 171--179
               Kwok Yan Lam and   
                 Francesco Sica   The Weight Distribution of . . . . . . . 181--191
               Iiro Honkala and   
              Tero Laihonen and   
                    Sanna Ranto   On Codes Identifying Sets of Vertices in
                                  Hamming Spaces . . . . . . . . . . . . . 193--204
                Simeon Ball and   
                   Ray Hill and   
               Ivan Landjev and   
                    Harold Ward   On $(q^2 + q + 2, q + 2)$-arcs in the
                                  Projective Plane . . . . . . . . . . . . 205--224
             Zvonimir Janko and   
            Hadi Kharaghani and   
            Vladimir D. Tonchev   The Existence of a Bush-Type Hadamard
                                  Matrix of Order $324$ and Two New
                                  Infinite Classes of Symmetric Designs    225--232
                 E. Ballico and   
                  A. Cossidente   Curves in Projective Spaces and Almost
                                  MDS Codes  . . . . . . . . . . . . . . . 233--237

Designs, Codes, and Cryptography
Volume 24, Number 3, December, 2001

              Mariko Hagita and   
               Bernhard Schmidt   Bijections Between Group Rings
                                  Preserving Character Sums  . . . . . . . 243--254
               Carlo Blundo and   
          Annalisa De Bonis and   
              Alfredo De Santis   Improved Schemes for Visual Cryptography 255--278
        Igor E. Shparlinski and   
            Joseph H. Silverman   On the Linear Complexity of the
                                  Naor--Reingold Pseudo-random Function
                                  from Elliptic Curves . . . . . . . . . . 279--289
                Clement Lam and   
                      Ying Miao   Difference Families  . . . . . . . . . . 291--304
          H. Tapia-Recillas and   
                        G. Vega   An Upper Bound on the Number of
                                  Iterations for Transforming a Boolean
                                  Function of Degree Greater or Equal Than
                                  $4$ to a Function of Degree $3$  . . . . 305--312
                  Nuh Aydin and   
                 Irfan Siap and   
         Dijen K. Ray-Chaudhuri   The Structure of $1$-Generator
                                  Quasi-Twisted Codes and New Linear Codes 313--326
                      Wenbo Mao   Verifiable Partial Escrow of Integer
                                  Factors  . . . . . . . . . . . . . . . . 327--342
             Jeong-Heon Kim and   
                 Hong-Yeop Song   Trace Representation of Legendre
                                  Sequences  . . . . . . . . . . . . . . . 343--348


Designs, Codes, and Cryptography
Volume 25, Number 1, January, 2002

             Stefka Bouyuklieva   On the Automorphisms of Order $2$ with
                                  Fixed Points for the Extremal Self-Dual
                                  Codes of Length  . . . . . . . . . . . . 5--13
            Philip A. Eisen and   
             Douglas R. Stinson   Threshold Visual Cryptography Schemes
                                  with Specified Whiteness Levels of
                                  Reconstructed Pixels . . . . . . . . . . 15--61
                 Arne Winterhof   Polynomial Interpolation of the Discrete
                                  Logarithm  . . . . . . . . . . . . . . . 63--72
              Etsuko Bannai and   
               Mitsuhiro Sawano   Symmetric Designs Attached to
                                  Four-Weight Spin Models  . . . . . . . . 73--90
                D. Brozovic and   
                      C. Ho and   
                    A. Munemasa   A Correction to ``Incidence Matrices and
                                  Collineations of Finite Projective
                                  Planes'' by Chat Yin Ho, Designs, Codes
                                  and Cryptography, 18 (1999), 159--162    91--93
               T. Blackmore and   
                   G. H. Norton   Lower Bounds on the State Complexity of
                                  Geometric Goppa Codes  . . . . . . . . . 95--115

Designs, Codes, and Cryptography
Volume 25, Number 2, February, 2002

                K. T. Arasu and   
          Warwick de Launey and   
                       S. L. Ma   On Circulant Complex Hadamard Matrices   123--142
                  S. Ferret and   
                      L. Storme   Minihypers and Linear Codes Meeting the
                                  Griesmer Bound: Improvements to Results
                                  of Hamada, Helleseth and Maekawa . . . . 143--162
           Stelios Georgiou and   
             Masaaki Harada and   
           Christos Koukouvinos   Orthogonal Designs and Type II Codes
                                  over $\mathbb{Z}_{2k}$ . . . . . . . . . 163--174
             Sergio Cabello and   
        Carles Padró and   
      Germán Sáez   Secret Sharing Schemes with Detection of
                                  Cheaters for a General Access Structure  175--188
         Jürgen Bierbrauer   The Theory of Cyclic Codes and a
                                  Generalization to Additive Codes . . . . 189--206
             Jorge Guajardo and   
                  Christof Paar   Itoh--Tsujii Inversion in Standard Basis
                                  and Its Application in Cryptography and
                                  Codes  . . . . . . . . . . . . . . . . . 207--216

Designs, Codes, and Cryptography
Volume 25, Number 3, March, 2002

               Ingrid Biehl and   
          Johannes Buchmann and   
               Safuat Hamdy and   
                  Andreas Meyer   A Signature Scheme Based on the
                                  Intractability of Computing Roots  . . . 223--236
          Massimo Giulietti and   
         Fernanda Pambianco and   
            Fernando Torres and   
                  Emanuela Ughi   On Complete Arcs Arising from Plane
                                  Curves . . . . . . . . . . . . . . . . . 237--246
                      Koen Thas   A Theorem Concerning Nets Arising from
                                  Generalized Quadrangles with a Regular
                                  Point  . . . . . . . . . . . . . . . . . 247--253
       Luis Martínez and   
      Antonio Vera-López   Ring-Valued Assignments to the Points of
                                  a $t$-Design . . . . . . . . . . . . . . 255--262
                  C. Carlet and   
                 Yu. Tarannikov   Covering Sequences of Boolean Functions
                                  and Their Cryptographic Significance . . 263--279
        Carles Padró and   
             Ignacio Gracia and   
Sebasti\`a Martín Molleví and   
                    Paz Morillo   Linear Key Predistribution Schemes . . . 281--298
                John B. Polhill   Constructions of Nested Partial
                                  Difference Sets with Galois Rings  . . . 299--309
            Edoardo Ballico and   
             Antonio Cossidente   Hermitian Veronesean Schemes . . . . . . 311--317


Designs, Codes, and Cryptography
Volume 26, Number 1--3, June / July / August, 2002

        Charles J. Colbourn and   
         Douglas R. Stinson and   
            G. H. John van Rees   Preface: In Honour of Ronald C. Mullin   5--6
          R. Julian R. Abel and   
              F. E. Bennett and   
                          G. Ge   The Existence of Four HMOLS with Equal
                                  Sized Holes  . . . . . . . . . . . . . . 7--31
          R. Julian R. Abel and   
              Iliya Bluskov and   
                  Malcolm Greig   Balanced Incomplete Block Designs with
                                  Block Size $9$ and $\lambda=2,4,8$ . . . 33--59
               R. T. Bilous and   
              G. H. J. van Rees   An Enumeration of Binary Self-Dual Codes
                                  of Length $32$ . . . . . . . . . . . . . 61--86
               Ian F. Blake and   
         Theodoulos Garefalakis   On the Security of the Digital Signature
                                  Algorithm  . . . . . . . . . . . . . . . 87--96
                  C. Blundo and   
                 B. Masucci and   
              D. R. Stinson and   
                         R. Wei   Constructions and Bounds for
                                  Unconditionally Secure Non-Interactive
                                  Commitment Schemes . . . . . . . . . . . 97--110
                  Marco Buratti   Cyclic Designs with Block Size $4$ and
                                  Related Optimal Optical Orthogonal Codes 111--125
                     H. Cao and   
                         L. Zhu   Kirkman Packing Designs KPD$(3, 5*,v)$   127--138
              Chris Charnes and   
       Martin Rötteler and   
                    Thomas Beth   Homogeneous Bent Functions, Invariants,
                                  and Designs  . . . . . . . . . . . . . . 139--154
               Yanxun Chang and   
                      Ying Miao   General Constructions for Double Group
                                  Divisible Designs and Double Frames  . . 155--168
        Charles J. Colbourn and   
               E. R. Lamken and   
            Alan C. H. Ling and   
                    W. H. Mills   The Existence of Kirkman Squares ---
                                  Doubly Resolvable $(v,3,1)$-BIBDs  . . . 169--196
                  Peng Ding and   
                Jennifer D. Key   Subcodes of the Projective Generalized
                                  Reed--Muller Codes Spanned by
                                  Minimum-Weight Vectors . . . . . . . . . 197--211
   Marialuisa J. de Resmini and   
              Dina Ghinelli and   
              Dieter Jungnickel   Arcs and Ovals from Abelian Groups . . . 213--228
             Michael Drmota and   
                 Daniel Panario   A Rigorous Proof of the Waterloo
                                  Algorithm for the Discrete Logarithm
                                  Problem  . . . . . . . . . . . . . . . . 229--241
                  F. Franek and   
             M. J. Grannell and   
               T. S. Griggs and   
                        A. Rosa   On Large Sets of $v-1$ L-Intersecting
                                  Steiner Triple Systems of Order $v$  . . 243--256
             Ryoh Fuji-Hara and   
                      Ying Miao   A Note on Geometric Structures of Linear
                                  Ordered Orthogonal Arrays and
                                  (T,M,S)-Nets of Low Strength . . . . . . 257--263


Designs, Codes, and Cryptography
Volume 27, Number 1--2, October / November, 2002

                      G. Ge and   
                     R. S. Rees   On Group-Divisible Designs with Block
                                  Size Four and Group-Type gum1  . . . . . 5--24
                  Malcolm Greig   Finite Linear Spaces II  . . . . . . . . 25--47
 Hans-Dietrich O. F. Gronau and   
Martin Grüttmüller and   
              Sven Hartmann and   
                   Uwe Leck and   
                    Volker Leck   On Orthogonal Double Covers of Graphs    49--91
        M. J. Jacobson, Jr. and   
                 H. C. Williams   Modular Arithmetic on Elements of Small
                                  Norm in Quadratic Fields . . . . . . . . 93--110
                Clement Lam and   
            Vladimir D. Tonchev   A New Bound on the Number of Designs
                                  with Classical Affine Parameters . . . . 111--117
              Rudolf Mathon and   
            Anne Penfold Street   Partitioning Sets of Triples into Small
                                  Planes . . . . . . . . . . . . . . . . . 119--130
Patric R. J. Östergård and   
                  Petteri Kaski   Enumeration of $2-(9, 3, \lambda)$
                                  Designs and Their Resolutions  . . . . . 131--137
            Kevin T. Phelps and   
             Merc\`e Villanueva   Ranks of $q$-Ary $1$-Perfect Codes . . . 139--144
              Nabil Shalaby and   
               Jianmin Wang and   
                   Jianxing Yin   Existence of Perfect
                                  $4$-Deletion-Correcting Codes with
                                  Length Six . . . . . . . . . . . . . . . 145--156
            Gustavus J. Simmons   Parity Encoding of Binary Sequences  . . 157--164
              Brett Stevens and   
                Eric Mendelsohn   Packing Arrays and Packing Designs . . . 165--176

Designs, Codes, and Cryptography
Volume 27, Number 3, December, 2002

            Kevin T. Phelps and   
             Merc\`e Villanueva   On Perfect Codes: Rank and Kernel  . . . 183--194
                 Vikram Jha and   
              Norman L. Johnson   Transversal-Free Translation Nets  . . . 195--205
             Wen-Guey Tzeng and   
                    Chi-Ming Hu   A New Approach for Visual Cryptography   207--227
                  S. Murphy and   
               M. J. B. Robshaw   Key-Dependent S-Boxes and Differential
                                  Cryptanalysis  . . . . . . . . . . . . . 229--255
Patric R. J. Östergård   A $2-(22, 8, 4)$ Design Cannot Have a
                                  $2-(10, 4, 4)$ Subdesign . . . . . . . . 257--260
               A. Ashikhmin and   
                        A. Barg   Bounds on the Covering Radius of Linear
                                  Codes  . . . . . . . . . . . . . . . . . 261--269
                Fang-Wei Fu and   
               Victor K.-W. Wei   Self-Complementary Balanced Codes and
                                  Quasi-Symmetric Designs  . . . . . . . . 271--279
              K. J. Horadam and   
                       P. Udaya   A New Construction of Central Relative
                                  $(p^a, p^a, p^a, 1)$-Difference Sets . . 281--295
Patric R. J. Östergård   Classifying Subspaces of Hamming Spaces  297--305


Designs, Codes, and Cryptography
Volume 28, Number 1, January, 2003

          David Pointcheval and   
              Guillaume Poupard   A New $\mathcal{NP}$-Complete Problem
                                  and Public-Key Identification  . . . . . 5--31
          Simon Joseph Agou and   
      Marc Deléglise and   
             Jean-Louis Nicolas   Short Polynomial Representations for
                                  Square Roots Modulo $p$  . . . . . . . . 33--44
             Emily H. Moore and   
              Harriet Pollatsek   Looking for Difference Sets in Groups
                                  with Dihedral Images . . . . . . . . . . 45--50
                P. Govaerts and   
                      L. Storme   On a Particular Class of Minihypers and
                                  Its Applications. I. The Result for
                                  General $q$  . . . . . . . . . . . . . . 51--63
              V. Abatangelo and   
                      B. Larato   Doubly $\beta$-Derived Translation
                                  Planes . . . . . . . . . . . . . . . . . 65--74
                K. T. Arasu and   
                Kevin J. Player   A New Family of Cyclic Difference Sets
                                  with Singer Parameters in Characteristic
                                  Three  . . . . . . . . . . . . . . . . . 75--91
                 Xiang-dong Hou   On Binary Resilient Functions  . . . . . 93--112

Designs, Codes, and Cryptography
Volume 28, Number 2, March, 2003

                 Laurie Law and   
             Alfred Menezes and   
                 Minghua Qu and   
              Jerry Solinas and   
                 Scott Vanstone   An Efficient Protocol for Authenticated
                                  Key Agreement  . . . . . . . . . . . . . 119--134
            Sergei Konyagin and   
                Tanja Lange and   
               Igor Shparlinski   Linear Complexity of the Discrete
                                  Logarithm  . . . . . . . . . . . . . . . 135--146
               V. C. Mavron and   
            T. P. McDonough and   
               M. S. Shrikhande   Quasi-Symmetric Designs with Good Blocks
                                  and Intersection Number One  . . . . . . 147--162
         Stefka Bouyuklieva and   
                 Masaaki Harada   Extremal Self-Dual $[50, 25, 10]$ Codes
                                  with Automorphisms of Order $3$ and
                                  Quasi-Symmetric $2-(49, 9, 6)$ Designs   163--169
           Koichi Betsumiya and   
          T. Aaron Gulliver and   
                 Masaaki Harada   Extremal Self-Dual Codes over
                                  $\mathbb{F}_2 \times \mathbb{F}_2$ . . . 171--186
                Sheng-bo Xu and   
              Jeroen Doumen and   
               Henk van Tilborg   On the Security of Digital Signature
                                  Schemes Based on Error-Correcting Codes  187--199
              Svetla Nikova and   
               Ventzislav Nikov   Improvement of the Delsarte Bound for
                                  $\theta$-Designs When It Is Not the Best
                                  Bound Possible . . . . . . . . . . . . . 201--222

Designs, Codes, and Cryptography
Volume 28, Number 3, April, 2003

             Mida Guillermo and   
            Keith M. Martin and   
           Christine M. O'Keefe   Providing Anonymity in Unconditionally
                                  Secure Secret Sharing Schemes  . . . . . 227--245
             Dong-Joon Shin and   
             P. Vijay Kumar and   
                  Tor Helleseth   $3$-Designs from the $Z_4$-Goethals
                                  Codes via a New Kloosterman Sum Identity 247--263
              Tor Helleseth and   
       Torleiv Klòve and   
        Vladimir I. Levenshtein   Hypercubic $4$ and $5$-Designs from
                                  Double-Error-Correcting BCH Codes  . . . 265--282
                   David Masson   Designs and Representation of the
                                  Symmetric Group  . . . . . . . . . . . . 283--302
                    Klaus Huber   Taking $p$th Roots Modulo Polynomials
                                  over Finite Fields . . . . . . . . . . . 303--311


Designs, Codes, and Cryptography
Volume 29, Number 1--3, May / June / July, 2003

                A. Blokhuis and   
        J. W. P. Hirschfeld and   
              D. Jungnickel and   
                     J. A. Thas   Finite Geometries  . . . . . . . . . . . 5--5
                 A. Aguglia and   
              A. Cossidente and   
                    G. L. Ebert   Complete Spans on Hermitian Varieties    7--15
                R. Ahlswede and   
                H. Aydinian and   
              L. H. Khachatrian   Forbidden $(0,1)$-Vectors in Hyperplanes
                                  of $\mathbb{R}^n$: The Restricted Case   17--28
            Rudolf Ahlswede and   
              Levon Khachatrian   Cone Dependence --- a Basic
                                  Combinatorial Concept  . . . . . . . . . 29--40
                Laura Bader and   
             Nicola Durante and   
                  Maska Law and   
         Guglielmo Lunardon and   
                   Tim Penttila   Symmetries of BLT-Sets . . . . . . . . . 41--50
                Thomas Beth and   
        Christopher Charnes and   
              Markus Grassl and   
               Gernot Alber and   
               Aldo Delgado and   
              Michael Mussinger   A New Class of Designs Which Protect
                                  against Quantum Jumps  . . . . . . . . . 51--70
     Jürgen Bierbrauer and   
          Stefano Marcugini and   
             Fernanda Pambianco   Projective Planes, Coverings and a
                                  Network Problem  . . . . . . . . . . . . 71--89
              Aart Blokhuis and   
      Tamás Sz\Honyi and   
                  Zsuzsa Weiner   On Sets without Tangents in Galois
                                  Planes of Even Order . . . . . . . . . . 91--98
                  Yves Edel and   
         Jürgen Bierbrauer   The Largest Cap in AG$(4, 4)$ and Its
                                  Uniqueness . . . . . . . . . . . . . . . 99--104
                  S. Ferret and   
                      L. Storme   Results on Maximal Partial Spreads in
                                  PG$(3, p^3)$ and on Related Minihypers   105--122
  András Gács and   
          Tamás Sz\Honyi   On Maximal Partial Spreads in PG$(n, q)$ 123--129
  András Gács and   
                  Zsuzsa Weiner   On $(q + t, t)$-Arcs of Type $(0, 2, t)$ 131--139
                P. Govaerts and   
              D. Jungnickel and   
                  L. Storme and   
                     J. A. Thas   Some New Maximal Sets of Mutually
                                  Orthogonal Latin Squares . . . . . . . . 141--147
        Gohar M. Kyureghyan and   
                 Alexander Pott   On the Linear Complexity of the
                                  Sidelnikov--Lempel--Cohn--Eastman
                                  Sequences  . . . . . . . . . . . . . . . 149--164
                 I. Landjev and   
                A. Rousseva and   
                  T. Maruta and   
                        R. Hill   On Optimal Codes Over the Field with
                                  Five Elements  . . . . . . . . . . . . . 165--175
                Dimitri Leemans   The Residually Weakly Primitive
                                  Geometries of M$_{22}$ . . . . . . . . . 177--178
                  D. Luyckx and   
                     J. A. Thas   On $1$-Systems of Q$(6, q)$, $q$ Even    179--197
          Hendrik van Maldeghem   Some Remarks on Steiner Systems  . . . . 199--213
                   Klaus Metsch   On the Characterization of the Folded
                                  Halved Cubes by Their Intersection
                                  Arrays . . . . . . . . . . . . . . . . . 215--225
                      Koen Thas   Symmetry in Generalized Quadrangles  . . 227--245
            Vladimir D. Tonchev   A Note on MDS Codes, $n$-Arcs and
                                  Complete Designs . . . . . . . . . . . . 247--250


Designs, Codes, and Cryptography
Volume 30, Number 1, August, 2003

                   Siaw-Lynn Ng   A Representation of a Family of Secret
                                  Sharing Matroids . . . . . . . . . . . . 5--19
            Maria Axenovich and   
      Zoltán Füredi   Exact Bounds on the Sizes of Covering
                                  Codes  . . . . . . . . . . . . . . . . . 21--38
                Shengli Liu and   
     Henk C. A. Van Tilborg and   
                Marten Van Dijk   A Practical Protocol for Advantage
                                  Distillation and Information
                                  Reconciliation . . . . . . . . . . . . . 39--62
             Keith E. Mellinger   A Geometric Relationship Between
                                  Equivalent Spreads . . . . . . . . . . . 63--71
              Cunsheng Ding and   
             Mordecai Golin and   
           Torleiv Klòve   Meeting the Welch and Karystinos-Pados
                                  Bounds on DS-CDMA Binary Signature Sets  73--84
              Antonia W. Bluher   On $x^6 + x + a$ in Characteristic Three 85--95
           Iliya Bouyukliev and   
                Juriaan Simonis   Some New Results on Optimal Codes Over
                                  $F^5$  . . . . . . . . . . . . . . . . . 97--111
                   San Ling and   
            Patrick Solé   On the Algebraic Structure of
                                  Quasi-cyclic Codes II: Chain Rings . . . 113--130

Designs, Codes, and Cryptography
Volume 30, Number 2, September, 2003

                  H. Kharaghani   On a Class of Symmetric Balanced
                                  Generalized Weighing Matrices  . . . . . 139--149
                Daniel B. Dalan   New Extremal Type I Codes of Lengths
                                  $40$, $42$, and $44$ . . . . . . . . . . 151--157
              Massimiliano Sala   Upper Bounds on the Dual Distance of
                                  BCH$(255, k)$  . . . . . . . . . . . . . 159--168
               Kenichiro Tanabe   A Criterion for Designs in $Z_4$-codes
                                  on the Symmetrized Weight Enumerator . . 169--185
               Jon-Lark Kim and   
                     Vera Pless   Designs in Additive Codes over GF$(4)$   187--199
            Phong Q. Nguyen and   
            Igor E. Shparlinski   The Insecurity of the Elliptic Curve
                                  Digital Signature Algorithm with
                                  Partially Known Nonces . . . . . . . . . 201--217
               I. Cardinali and   
               O. Polverino and   
                   R. Trombetti   On the Sporadic Semifield Flock  . . . . 219--226

Designs, Codes, and Cryptography
Volume 30, Number 3, November, 2003

              Palash Sarkar and   
           Paul J. Schellenberg   Construction of Symmetric Balanced
                                  Squares with Blocksize More than One . . 235--280
       Detlef Hühnlein and   
   Michael J. Jacobson, Jr. and   
                   Damian Weber   Towards Practical Non-Interactive
                                  Public-Key Cryptosystems Using
                                  Non-Maximal Imaginary Quadratic Orders   281--299
              Ederlina G. Nocon   On the Construction of Some Type II
                                  Codes over $Z_4 \times Z_4$  . . . . . . 301--323
          David B. Chandler and   
                     Qing Xiang   Cyclic Relative Difference Sets and
                                  their $p$-Ranks  . . . . . . . . . . . . 325--343


Designs, Codes, and Cryptography
Volume 31, Number 1, January, 2004

                      Yves Edel   Extensions of Generalized Product Caps   5--14
            J. Barát and   
                 A. Del Fra and   
              S. Innamorati and   
                      L. Storme   Minimal Blocking Sets in PG$(2, 8)$ and
                                  Maximal Partial Spreads in PG$(3, 8)$    15--26
           Hans Georg Schaathun   A Lower Bound on the Greedy Weights of
                                  Product Codes  . . . . . . . . . . . . . 27--42
                 David G. Glynn   On the Orthogonality of Geometric Codes  43--50
          Jovan Dj. Goli\'c and   
               Renato Menicocci   Correlation Analysis of the Alternating
                                  Step Generator . . . . . . . . . . . . . 51--74
             Dong-Joon Shin and   
             P. Vijay Kumar and   
                  Tor Helleseth   An Assmus--Mattson-Type Approach for
                                  Identifying $3$-Designs from Linear
                                  Codes over Z$_4$ . . . . . . . . . . . . 75--92

Designs, Codes, and Cryptography
Volume 31, Number 2, February, 2004

               Ingrid Biehl and   
              Sacher Paulus and   
                Tsuyoshi Takagi   Efficient Undeniable Signature Schemes
                                  Based on Ideal Arithmetic in Quadratic
                                  Orders . . . . . . . . . . . . . . . . . 99--123
             Tran Van Trung and   
             Sosina Martirosyan   On a Class of Traceability Codes . . . . 125--132
                  S. Rajola and   
             M. Scafati Tallini   Affine Planes and Flag Linear Spaces . . 133--137
          T. Aaron Gulliver and   
                 Masaaki Harada   On the Minimum Weight of Codes over
                                  $F_5$ Constructed from Certain
                                  Conference Matrices  . . . . . . . . . . 139--145
     Pantelimon St\uanic\ua and   
                   Soo Hak Sung   Boolean Functions with Five Controllable
                                  Cryptographic Properties . . . . . . . . 147--157
                   U. Dempwolff   Affine Rank $3$ Groups on Symmetric
                                  Designs  . . . . . . . . . . . . . . . . 159--168
          Michael E. O'Sullivan   On Koetter's Algorithm and the
                                  Computation of Error Values  . . . . . . 169--188

Designs, Codes, and Cryptography
Volume 31, Number 3, March, 2004

             David A. Drake and   
                  Kevin Keating   Ovals and Hyperovals in Desarguesian
                                  Nets . . . . . . . . . . . . . . . . . . 195--212
                      Peter Sin   The $p$-Rank of the Incidence Matrix of
                                  Intersecting Linear Subspaces  . . . . . 213--220
                  Andreas Klein   Partial Ovoids in Classical Finite Polar
                                  Spaces . . . . . . . . . . . . . . . . . 221--226
             Andrew Klapper and   
                    Jinzhong Xu   Register Synthesis for Algebraic
                                  Feedback Shift Registers Based on
                                  Non-Primes . . . . . . . . . . . . . . . 227--250
           Matthew R. Brown and   
       Christine M. O'Keefe and   
                S. E. Payne and   
               Tim Penttila and   
                Gordon F. Royle   Spreads of $T_2(o)$, $\alpha$-flocks and
                                  Ovals  . . . . . . . . . . . . . . . . . 251--282
                   Klaus Metsch   Small Point Sets that Meet All
                                  Generators of $W(2 n +1, q)$ . . . . . . 283--288
                 Gloria Rinaldi   Key Distribution Patterns Using Tangent
                                  Circle Structures  . . . . . . . . . . . 289--300
             Siguna Müller   On the Computation of Square Roots in
                                  Finite Fields  . . . . . . . . . . . . . 301--312
    Sergey V. Avgustinovich and   
                 Olof Heden and   
             Faina I. Solov'eva   The Classification of Some Perfect Codes 313--318


Designs, Codes, and Cryptography
Volume 32, Number 1--3, May / July, 2004

                      Anonymous   Preface  . . . . . . . . . . . . . . . . 5--6
                      Anonymous   List of Participants . . . . . . . . . . 7--8
                Simeon Ball and   
               John Bamberg and   
             Michel Lavrauw and   
                   Tim Penttila   Symplectic Spreads . . . . . . . . . . . 9--14
               Carlo Blundo and   
               Paolo D'Arco and   
          Alfredo De Santis and   
             Massimiliano Listo   Design of Self-Healing Key Distribution
                                  Schemes  . . . . . . . . . . . . . . . . 15--44
              Julia M. N. Brown   On the Action of the Groups
                                  $\mbox{GL}(n+1,q)$, $\mbox{PGL}(n + 1,
                                  q)$, $\mbox{SL}(n + 1, q)$ and
                                  $\mbox{PSL}(n + 1, q)$ on $\mbox{PG}(n,
                                  q^t)$  . . . . . . . . . . . . . . . . . 45--50
                Wensong Chu and   
        Charles J. Colbourn and   
                    Peter Dukes   Constructions for Permutation Codes in
                                  Powerline Communications . . . . . . . . 51--64
        Charles J. Colbourn and   
            Alan C. H. Ling and   
             Violet R. Syrotiuk   Cover-Free Families and
                                  Topology-Transparent Scheduling for
                                  MANETs . . . . . . . . . . . . . . . . . 65--95
              A. Cossidente and   
               M. J. de Resmini   Remarks on Singer Cyclic Groups and
                                  Their Normalizers  . . . . . . . . . . . 97--102
               F. De Clerck and   
                    M. Delanote   On $(0,\alpha)$-Geometries and Dual
                                  Semipartial Geometries Fully Embedded in
                                  an Affine Space  . . . . . . . . . . . . 103--110
               Nikias de Feyter   Planar Oval Sets in Desarguesian Planes
                                  of Even Order  . . . . . . . . . . . . . 111--119
                    D. Deng and   
              D. R. Stinson and   
                         R. Wei   The Lovász Local Lemma and Its
                                  Applications to some Combinatorial
                                  Arrays . . . . . . . . . . . . . . . . . 121--134
               A. De Santis and   
                     B. Masucci   Anonymous Membership Broadcast Schemes   135--151
               S. De Winter and   
                     J. A. Thas   SPG-Reguli Satisfying the Polar Property
                                  and a New Semipartial Geometry . . . . . 153--166
             David A. Drake and   
                  Wendy Myrvold   Nets of Small Degree Without Ovals . . . 167--183
                  Z. Eslami and   
         G. B. Khosrovshahi and   
                    M. M. Noori   Enumeration of $t$-Designs Through
                                  Intersection Matrices  . . . . . . . . . 185--191
                S. Georgiou and   
                 C. Koukouvinos   Self-Orthogonal and Self-Dual Codes
                                  Constructed via Combinatorial Designs
                                  and Diophantine Equations  . . . . . . . 193--206
M. I. González Vasco and   
                D. Hofheinz and   
         C. Martínez and   
                  R. Steinwandt   On the Security of Two Public Key
                                  Cryptosystems Using Non-Abelian Groups   207--216
            Otokar Gro\vsek and   
         Peter Horák and   
                 Tran van Trung   On Non-Polynomial Latin Squares  . . . . 217--226
                  Yury J. Ionin   Regular Hadamard Matrices Generating
                                  Infinite Families of Symmetric Designs   227--233
         G. B. Khosrovshahi and   
               B. Tayfeh-Rezaie   Some Indecomposable $t$-Designs  . . . . 235--238
       G. Korchmáros and   
                     A. Sonnino   Hyperbolic Ovals in Finite Planes  . . . 239--249
Selda Kücçükcçìfcçì and   
                  C. C. Lindner   Minimum Covering for Hexagon Triple
                                  Systems  . . . . . . . . . . . . . . . . 251--265
               Domenico Labbate   Amalgams of Cubic Bipartite Graphs . . . 267--275
                  Reinhard Laue   Resolvable $t$-Designs . . . . . . . . . 277--301
                      X. Ma and   
                         R. Wei   On a Bound of Cover-Free Families  . . . 303--321
         Sosina Martirosyan and   
                 Tran van Trung   On $t$-Covering Arrays . . . . . . . . . 323--339
             Keith E. Mellinger   LDPC Codes from Triangle-Free Line Sets  341--350
                 Alan Offer and   
          Hendrik Van Maldeghem   Spreads and Ovoids Translation with
                                  Respect to Disjoint Flags  . . . . . . . 351--367
            Tanya E. Seidel and   
               Daniel Socek and   
                  Michal Sramka   Parallel Symmetric Attack on NTRU using
                                  Non-Deterministic Lattice Reduction  . . 369--379
                    R. Shaw and   
                   N. A. Gordon   The Quintic Grassmannian $G_{1, 4, 2}$
                                  in $\mbox{PG}(9, 2)$ . . . . . . . . . . 381--396


Designs, Codes, and Cryptography
Volume 33, Number 1, August, 2004

  János Barát and   
                     Leo Storme   Multiple Blocking Sets in
                                  $\mbox{PG}(n,q), n > 3$ . . . . . . . . . 5--21
               Jong-Seon No and   
             Dong-Joon Shin and   
                  Tor Helleseth   On the $p$-Ranks and Characteristic
                                  Polynomials of Cyclic Difference Sets    23--37
              Tor Helleseth and   
           Johannes Mykkeltveit   A Proof of Simmons' Conjecture . . . . . 39--43
        Steven T. Dougherty and   
              Keisuke Shiromoto   Maximum Distance Codes in
                                  $\mbox{Mat}_{n,s} (Z_k)$ with a
                                  Non-Hamming Metric and Uniform
                                  Distributions  . . . . . . . . . . . . . 45--61
             David A. Drake and   
                  Wendy Myrvold   The Non-Existence of Maximal Sets of
                                  Four Mutually Orthogonal Latin Squares
                                  of Order $8$ . . . . . . . . . . . . . . 63--69
                 Harold N. Ward   A Sequence of Unique Quaternary Griesmer
                                  Codes  . . . . . . . . . . . . . . . . . 71--85

Designs, Codes, and Cryptography
Volume 33, Number 2, September, 2004

Conchita Martínez-Pérez and   
               Wolfgang Willems   On the Weight Hierarchy of Product Codes 95--108
                 Wilfried Meidl   How Many Bits have to be Changed to
                                  Decrease the Linear Complexity?  . . . . 109--122
               Mark Goresky and   
                 Andrew Klapper   Periodicity and Correlation Properties
                                  of $d$-FCSR Sequences  . . . . . . . . . 123--148
             Masaaki Harada and   
               Michio Ozeki and   
               Kenichiro Tanabe   On the Covering Radius of Ternary
                                  Extremal Self-Dual Codes . . . . . . . . 149--158
                   J. L. Hayden   Eigenvalues of Finite Projective Planes
                                  with an Abelian Cartesian Group  . . . . 159--172
               Lucio Guerra and   
                  Rita Vincenti   On the Linear Codes Arising from
                                  Schubert Varieties . . . . . . . . . . . 173--180

Designs, Codes, and Cryptography
Volume 33, Number 3, November, 2004

          Wiebke S. Diestelkamp   Parameter Inequalities for Orthogonal
                                  Arrays with Mixed Levels . . . . . . . . 187--197
                   Jong-Seon No   New Cyclic Difference Sets with Singer
                                  Parameters Constructed from
                                  $d$-Homogeneous Functions  . . . . . . . 199--213
María Isabel González Vasco and   
   Consuelo Martínez and   
              Rainer Steinwandt   Towards a Uniform Description of Several
                                  Group Based Cryptographic Primitives . . 215--226
              Cunsheng Ding and   
                  Xiaojian Tian   Three Constructions of Authentication
                                  Codes with Perfect Secrecy . . . . . . . 227--239
               Carlo Blundo and   
   Sebasti\`a Martín and   
            Barbara Masucci and   
            CarlEs Padró   A Linear Algebraic Approach to Metering
                                  Schemes  . . . . . . . . . . . . . . . . 241--260
             Alfred Menezes and   
                    Nigel Smart   Security of Signature Schemes in a
                                  Multi-User Setting . . . . . . . . . . . 261--274
            Joseph L. Yucas and   
                 Gary L. Mullen   Self-Reciprocal Irreducible Polynomials
                                  Over Finite Fields . . . . . . . . . . . 275--281


Designs, Codes, and Cryptography
Volume 34, Number 1, January, 2005

             Tatsuya Maruta and   
            Ivan N. Landjev and   
                 Assya Rousseva   On the Minimum Size of Some Minihypers
                                  and Related Linear Codes . . . . . . . . 5--15
Jaume Martí-Farré and   
            Carles Padró   Secret Sharing Schemes with Three or
                                  Four Minimal Qualified Subsets . . . . . 17--34
            Ferruh Özbudak   Elements of Prescribed Order, Prescribed
                                  Traces and Systems of Rational Functions
                                  Over Finite Fields . . . . . . . . . . . 35--54
              Michael Braun and   
            Adalbert Kerber and   
                  Reinhard Laue   Systematic Construction of $q$-Analogs
                                  of $t-(v, k,\lambda)$-Designs  . . . . . 55--70
             Masaaki Harada and   
                Clement Lam and   
            Vladimir D. Tonchev   Symmetric $(4,4)$-Nets and Generalized
                                  Hadamard Matrices Over Groups of Order
                                  $4$  . . . . . . . . . . . . . . . . . . 71--87
           Bikash Kumar Dey and   
                B. Sundar Rajan   $F_q$-linear Cyclic Codes over $F^m_q$:
                                  DFT Approach . . . . . . . . . . . . . . 89--116
                 Gennian Ge and   
                Alan C. H. Ling   Group Divisible Designs with Block Size
                                  Four and Group Type $g^u m^1$ with
                                  Minimum $m$  . . . . . . . . . . . . . . 117--126

Designs, Codes, and Cryptography
Volume 34, Number 2--3, February, 2005

              Aart Blokhuis and   
                 Willem Haemers   Preface  . . . . . . . . . . . . . . . . 135--135
               Edwin R. Van Dam   The Combinatorics of Dom de Caen . . . . 137--148
                 D. De Caen and   
              D. Fon-Der-Flaass   Distance Regular Covers of Complete
                                  Graphs from Latin Squares  . . . . . . . 149--153
                K. Coolsaet and   
                     J. Degraer   A Computer-Assisted Proof of the
                                  Uniqueness of the Perkel Graph . . . . . 155--171
               Bang Sejeong and   
                   J. H. Koolen   Some Interlacing Results for the
                                  Eigenvalues of Distance-regular graphs   173--186
                       Hirasaka   On Meta-Thin Association Schemes . . . . 187--201
                   Ron Shaw and   
           Johannes G. Maks and   
                 Neil A. Gordon   The Classification of Flats in which are
                                  External to the Grassmannian . . . . . . 203--227
         Dragos Cvetkovi\'c and   
            Peter Rowlinson and   
            Slobodan K. Simi\'c   Graphs With Least Eigenvalue $-2$: a New
                                  Proof of the $31$ Forbidden Subgraphs
                                  Theorem  . . . . . . . . . . . . . . . . 229--240
                   Brian Curtin   Algebraic Characterizations of Graph
                                  Regularity Conditions  . . . . . . . . . 241--248
           Mikhail Muzychuk and   
    István Kovács   A Solution of a Problem of A. E. Brouwer 249--264
             Ákos Seress   Square-Free Non-Cayley Numbers. On
                                  Vertex-Transitive Non-Cayley Graphs of
                                  Square-Free Order  . . . . . . . . . . . 265--281
             Joseph A. Thas and   
          Hendrik Van Maldeghem   Some Characterizations of Finite
                                  Hermitian Veroneseans  . . . . . . . . . 283--293
                R. D. Baker and   
                G. L. Ebert and   
                   Tim Penttila   Hyperbolic Fibrations and $q$-Clans  . . 295--305
               Paul Terwilliger   Two Linear Transformations each
                                  Tridiagonal with Respect to an
                                  Eigenbasis of the other; Comments on the
                                  Parameter Array  . . . . . . . . . . . . 307--332
                   Hans Cuypers   A Note on the Tight Spherical $7$-Design
                                  in and $5$-Design in . . . . . . . . . . 333--337
                   Klaus Metsch   Blocking Structures of Hermitian
                                  Varieties  . . . . . . . . . . . . . . . 339--360


Designs, Codes, and Cryptography
Volume 35, Number 1, April, 2005

          Jovan Dj. Goli\'c and   
                  Philip Hawkes   Vectorial Approach to Fast Correlation
                                  Attacks  . . . . . . . . . . . . . . . . 5--19
           John P. Mcsorley and   
          N. C. K. Phillips and   
               W. D. Wallis and   
                         others   Double Arrays, Triple Arrays and
                                  Balanced Grids . . . . . . . . . . . . . 21--45
             Wen-Guey Tzeng and   
                  Zhi-Jia Tzeng   A Public-Key Traitor Tracing Scheme with
                                  Revocation Using Dynamic Shares  . . . . 47--61
          Thierry P. Berger and   
                Pierre Loidreau   How to Mask the Structure of Codes for a
                                  Cryptographic Use  . . . . . . . . . . . 63--79
              Olgica Milenkovic   Support Weight Enumerators and Coset
                                  Weight Distributions of Isodual Codes    81--109
               Florian Hess and   
            Igor E. Shparlinski   On the Linear Complexity and
                                  Multidimensional Distribution of
                                  Congruential Generators over Elliptic
                                  Curves . . . . . . . . . . . . . . . . . 111--117
             Daniel R. L. Brown   Generic Groups, Collision Resistance,
                                  and ECDSA  . . . . . . . . . . . . . . . 119--152

Designs, Codes, and Cryptography
Volume 35, Number 2, May, 2005

            Rafa\l Bia\lota and   
                  Grzegorz Kawa   Modified Alternating
                                  $\stackrel{\rightarrow}{k}$ generators   159--174
                 Tatsuya Maruta   Extendability of Ternary Linear Codes    175--190
               Mingyuan Xia and   
               Tianbing Xia and   
               Jennifer Seberry   A New Method for Constructing Williamson
                                  Matrices . . . . . . . . . . . . . . . . 191--209
     Cícero Carvalho and   
                Fernando Torres   On Goppa Codes and Weierstrass Gaps at
                                  Several Points . . . . . . . . . . . . . 211--225
             Tran Van Trung and   
             Sosina Martirosyan   New Constructions for IPP Codes  . . . . 227--239
Patric R. J. Östergård and   
        Jörn Quistorff and   
              Alfred Wassermann   New Results on Codes with Covering
                                  Radius $1$ and Minimum Distance $2$  . . 241--250

Designs, Codes, and Cryptography
Volume 35, Number 3, June, 2005

               Petr Lisonek and   
           Mahadad Khatirinejad   A Family of Complete Caps in ${\rm
                                  PG}(n,2)$  . . . . . . . . . . . . . . . 259--270
    Harri Haanpää and   
                  Petteri Kaski   The Near Resolvable $2-(13, 4, 3)$
                                  Designs and Thirteen-Player Whist
                                  Tournaments  . . . . . . . . . . . . . . 271--285
              G. E. Gennian and   
               C. W. H. Lam and   
            Alan C. H. Ling and   
                         others   Resolvable Maximum Packings with
                                  Quadruples . . . . . . . . . . . . . . . 287--302
              Yury J. Ionin and   
                Hadi Kharaghani   A Recursive Construction for New
                                  Symmetric Designs  . . . . . . . . . . . 303--310
             Stelvio Cimato and   
          Roberto De Prisco and   
              Alfredo De Santis   Optimal Colored Threshold Visual
                                  Cryptography Schemes . . . . . . . . . . 311--335
                  D. Luyckx and   
                     J. A. Thas   Trialities and $1$-Systems of $Q^+(7,q)$ 337--352


Designs, Codes, and Cryptography
Volume 36, Number 1, July, 2005

              S. G. Barwick and   
             Wen-Ai Jackson and   
                Keith M. Martin   A General Approach to Robust Web
                                  Metering . . . . . . . . . . . . . . . . 5--27
                 John C. Galati   On the Non-existence of Semiregular
                                  Relative Difference Sets in Groups with
                                  All Sylow Subgroups Cyclic . . . . . . . 29--31
               Mathieu Ciet and   
                      Marc Joye   Elliptic Curve Cryptosystems in the
                                  Presence of Permanent and Transient
                                  Faults . . . . . . . . . . . . . . . . . 33--43
               Carl Bracken and   
                   Gary Mcguire   Characterization of SDP Designs That
                                  Yield Certain Spin Models  . . . . . . . 45--52
             Iuon-Chang Lin and   
           Min-Shiang Hwang and   
                Chin-Chen Chang   The General Pay-Word: a Micro-payment
                                  Scheme Based on $n$-dimension One-way
                                  Hash Chain . . . . . . . . . . . . . . . 53--67
             J. Löfvenberg   Binary Fingerprinting Codes  . . . . . . 69--81
                      L. Ji and   
                      D. Wu and   
                         L. Zhu   Existence of Generalized Steiner Systems
                                  $\mathrm{GS}(2,4,\nu,2)$ . . . . . . . . 83--99
                 J. Eisfeld and   
                  L. Storme and   
                     P. Sziklai   On the Spectrum of the Sizes of Maximal
                                  Partial Line Spreads in
                                  $\mathrm{PG}(2n,q), n \geq 3$  . . . . . 101--110

Designs, Codes, and Cryptography
Volume 36, Number 2, August, 2005

                     J. De Kaey   On a More General Characterisation of
                                  Steiner Systems  . . . . . . . . . . . . 117--129
                P. Langevin and   
                  J.-P. Zanotti   Nonlinearity of Some Invariant Boolean
                                  Functions  . . . . . . . . . . . . . . . 131--146
                   F. L. Chiera   Type II Codes over $ \mathbb{Z} / 2 k
                                  \mathbb{Z} $, Invariant Rings and Theta
                                  Series . . . . . . . . . . . . . . . . . 147--158
                  Shenglin Zhou   Block Primitive $2-(v,k,1)$ Designs
                                  Admitting a Ree Group of Characteristic
                                  Two  . . . . . . . . . . . . . . . . . . 159--169
               Ka Hin Leung and   
               Bernhard Schmidt   The Field Descent Method . . . . . . . . 171--188
                  Claude Carlet   Concatenating Indicators of Flats for
                                  Designing Cryptographic Functions  . . . 189--202
                     Vikram Jha   Local Schur's Lemma and Commutative
                                  Semifields . . . . . . . . . . . . . . . 203--216

Designs, Codes, and Cryptography
Volume 36, Number 3, September, 2005

            Manish K. Gupta and   
         Mahesh C. Bhandari and   
                  Arbind K. Lal   On Linear Codes over $\mathbb{Z}_2^s$    227--244
                 Ezra Brown and   
             Bruce T. Myers and   
              Jerome A. Solinas   Hyperelliptic Curves with Compact
                                  Parameters . . . . . . . . . . . . . . . 245--261
            Keith M. Martin and   
           Rei Safavi-Naini and   
              Huaxiong Wang and   
                  Peter R. Wild   Distributing the Encryption and
                                  Decryption of a Block Cipher . . . . . . 263--287
                E. J. Cheon and   
                    T. Kato and   
                      S. J. Kim   Nonexistence of $[n, 5, d]_q$ Codes
                                  Attaining the Griesmer Bound for $q^4 -
                                  2 q^2 - 2 q + 1 \leq d \leq q^4 - 2 q^2
                                  - q$ . . . . . . . . . . . . . . . . . . 289--299
 Juan Manuel Gonzalez Nieto and   
                 Colin Boyd and   
                      Ed Dawson   A Public Key Cryptosystem Based On a
                                  Subgroup Membership Problem  . . . . . . 301--316
                P. Véron   Proof of Conjectures on the True
                                  Dimension of Some Binary Goppa Codes . . 317--325
Patric R. J. Östergård   Two New Four-Error-Correcting Binary
                                  Codes  . . . . . . . . . . . . . . . . . 327--329
               Stephen D. Cohen   Finite Field Elements with Specified
                                  Order and Traces . . . . . . . . . . . . 331--340
                      Anonymous   Volume Table of Contents: Volume 36  . . 341--342


Designs, Codes, and Cryptography
Volume 37, Number 1, October, 2005

               Anka Golemac and   
            Tanja Vucici\'c and   
                 Josko Mandi\'c   One $(96,20,4)$-symmetric Design and
                                  related Nonabelian Difference Sets . . . 5--13
           A. J. van Zanten and   
              I. Nengah Suparta   On the Construction of Linear $q$-ary
                                  Lexicodes  . . . . . . . . . . . . . . . 15--29
          Philippe Langevin and   
            Pascal Véron   On the Non-linearity of Power Functions  31--43
        Gerzson Kéri and   
Patric R. J. Östergård   Bounds for Covering Codes over Large
                                  Alphabets  . . . . . . . . . . . . . . . 45--60
       Alexander A. Davydov and   
              Giorgio Faina and   
             Fernanda Pambianco   Constructions of Small Complete Caps in
                                  Binary Projective Spaces . . . . . . . . 61--80
                John Malone-Lee   Signcryption with Non-interactive
                                  Non-repudiation  . . . . . . . . . . . . 81--109
              Masaaki Homma and   
                 Seon Jeong Kim   Toward the Determination of the Minimum
                                  Distance of Two--Point Codes on a
                                  Hermitian Curve  . . . . . . . . . . . . 111--132
         Friederike Brezing and   
                  Annegret Weng   Elliptic Curves Suitable for Pairing
                                  Based Cryptography . . . . . . . . . . . 133--141
               B. Tayfeh-Rezaie   On the Existence of Large Sets of
                                  $t$-designs of Prime Sizes . . . . . . . 143--149
                R. Ahlswede and   
                H. Aydinian and   
              L. H. Khachatrian   Forbidden (0,1)-vectors in Hyperplanes
                                  of $\mathbb{R}^n$: The unrestricted case 151--167

Designs, Codes, and Cryptography
Volume 37, Number 2, November, 2005

              Miin Huey Ang and   
                     Siu Lun Ma   Symmetric Weighing Matrices Constructed
                                  using Group Matrices . . . . . . . . . . 195--210
     Jürgen Bierbrauer and   
                      Yves Edel   A Family of Binary $(t, m, s)$-Nets of
                                  Strength $5$ . . . . . . . . . . . . . . 211--214
          G. B. Belyavskaya and   
               V. I. Izbash and   
                   G. L. Mullen   Check Character Systems using
                                  Quasigroups: I . . . . . . . . . . . . . 215--227
            R. Safavi-naini and   
                     C. Charnes   MRD Hashing  . . . . . . . . . . . . . . 229--242
               K. T. Phelps and   
                  J. Rif\`a and   
                  M. Villanueva   Kernels and $p$-Kernels of $p^r$-ary
                                  1-Perfect Codes  . . . . . . . . . . . . 243--261
                  Bart De Bruyn   Slim Near Polygons . . . . . . . . . . . 263--280
                   Jianxing Yin   Cyclic Difference Packing and Covering
                                  Arrays . . . . . . . . . . . . . . . . . 281--292
                Chihiro Suetake   The Classification of Symmetric
                                  Transversal Designs STD$_4[12;3]$'s  . . 293--304
         Antonino Giorgio Spera   Asymptotically Good Codes from
                                  Generalized Algebraic--Geometry Codes    305--312
               John P. Mcsorley   Double Arrays, Triple Arrays and
                                  Balanced Grids with $v = r + c - 1$  . . 313--318

Designs, Codes, and Cryptography
Volume 37, Number 3, December, 2005

              S. G. Barwick and   
                 Wen-Ai Jackson   An Optimal Multisecret Threshold Scheme
                                  Construction . . . . . . . . . . . . . . 367--389
            A. Ya. Dorofeev and   
              L. S. Kazarin and   
           V. M. Sidelnikov and   
                 M. E. Tuzhilin   Matrix Groups Related to the Quaternion
                                  Group and Spherical Orbit Codes  . . . . 391--404
          G. B. Belyavskaya and   
               V. I. Izbash and   
                   G. L. Mullen   Check Character Systems Using
                                  Quasigroups: II  . . . . . . . . . . . . 405--419
                E. J. Cheon and   
                    T. Kato and   
                      S. J. Kim   On the Minimum Length of some Linear
                                  Codes of Dimension $5$ . . . . . . . . . 421--434
              A. Wispelaere and   
                   H. Maldeghem   Codes from Generalized Hexagons  . . . . 435--448
              Claude Carlet and   
                Joseph L. Yucas   Piecewise Constructions of Bent and
                                  Almost Optimal Boolean Functions . . . . 449--464
          T. Aaron Gulliver and   
             Masaaki Harada and   
           Takuji Nishimura and   
Patric R. J. Östergård   Near-Extremal Formally Self-Dual Even
                                  Codes of Lengths $24$ and $32$ . . . . . 465--471
           Gretchen L. Matthews   Weierstrass Semigroups and Codes from a
                                  Quotient of the Hermitian Curve  . . . . 473--492
               Omran Ahmadi and   
                 Alfred Menezes   On the Number of Trace-One Elements in
                                  Polynomial Bases for $\mathbb{F}_2^n$    493--507
        Jens-Matthias Bohli and   
          Rainer Steinwandt and   
María Isabel González Vasco and   
       Consuelo Martínez   Weak Keys in MST$_1$ . . . . . . . . . . 509--524


Designs, Codes, and Cryptography
Volume 38, Number 1, January, 2006

                 Masaaki Harada   Self-Orthogonal $3-(56,12,65)$ Designs
                                  and Extremal Doubly-Even Self-Dual Codes
                                  of Length $56$ . . . . . . . . . . . . . 5--16
                Mehmet Ozen and   
                     Irfan Siap   Linear Codes over $\mathbb{F}_q[u] /
                                  (u^s)$ with Respect to the
                                  Rosenbloom--Tsfasman Metric  . . . . . . 17--29
                 T. L. Alderson   $(6,3)$-MDS Codes over an Alphabet of
                                  Size $4$ . . . . . . . . . . . . . . . . 31--40
Jean-Sébastien Coron and   
             David Naccache and   
                Yvo Desmedt and   
             Andrew Odlyzko and   
                Julien P. Stern   Index Calculation Attacks on RSA
                                  Signature and Encryption . . . . . . . . 41--53
              Masaaki Homma and   
                 Seon Jeong Kim   The Two-Point Codes on a Hermitian Curve
                                  with the Designed Minimum Distance . . . 55--81
                          L. Ji   Asymptotic Determination of the Last
                                  Packing Number of Quadruples . . . . . . 83--95
        Steven T. Dougherty and   
         T. Aaron. Gulliver and   
                    Manabu Oura   Higher Weights for Ternary and
                                  Quaternary Self-Dual Codes . . . . . . . 97--112
                 Michel Lavrauw   Sublines of Prime Order Contained in the
                                  Set of Internal Points of a Conic  . . . 113--123
                     Olof Heden   A Full Rank Perfect Code of Length $31$  125--129
                Simeon Ball and   
           Patrick Govaerts and   
                     Leo Storme   On Ovoids of Parabolic Quadrics  . . . . 131--145

Designs, Codes, and Cryptography
Volume 38, Number 2, February, 2006

             Wilfried Meidl and   
                 Arne Winterhof   Some Notes on the Linear Complexity of
                                  Sidel'nikov--Lempel--Cohn--Eastman
                                  Sequences  . . . . . . . . . . . . . . . 159--178
            Frank de Clerck and   
          Stefaan de Winter and   
          Elisabeth Kuijken and   
                Cristina Tonesi   Distance-Regular $(0, \alpha)$-Reguli    179--194
                   Sara Cauchie   A Characterization of the Complement of
                                  a Hyperbolic Quadric in ${\rm PG}(3,q)$,
                                  for $q$ Odd  . . . . . . . . . . . . . . 195--208
              Michael Scott and   
         Paulo S. L. M. Barreto   Generating More MNT Elliptic Curves  . . 209--217
               Gwoboa Horng and   
              Tzungher Chen and   
                  Du-shiau Tsai   Cheating in Visual Cryptography  . . . . 219--236
                  Ari Juels and   
                    Madhu Sudan   A Fuzzy Vault Scheme . . . . . . . . . . 237--257
                  D. R. Stinson   Some Observations on the Theory of
                                  Cryptographic Hash Functions . . . . . . 259--277
            Khoongming Khoo and   
                 Guang Gong and   
             Douglas R. Stinson   A New Characterization of Semi-bent and
                                  Bent Functions on Finite Fields* . . . . 279--295
                  Eric Merchant   Exponentially Many Hadamard Designs  . . 297--308

Designs, Codes, and Cryptography
Volume 38, Number 3, March, 2006

            Norifumi Kamiya and   
           Marc P. C. Fossorier   Quasi-Cyclic Codes from a Finite Affine
                                  Plane  . . . . . . . . . . . . . . . . . 311--329
                Petri Rosendahl   A Generalization of Niho's Theorem . . . 331--336
                   San Ling and   
        Harald Niederreiter and   
            Patrick Solé   On the Algebraic Structure of
                                  Quasi-cyclic Codes IV: Repeated Roots    337--361
                 Vince Grolmusz   Co-Orthogonal Codes  . . . . . . . . . . 363--372
                    Jinhua Wang   A New Class of Optimal $3$-splitting
                                  Authentication Codes . . . . . . . . . . 373--381
                  Annegret Weng   A Low-Memory Algorithm for Point
                                  Counting on Picard Curves  . . . . . . . 383--393
                   Omran Ahmadi   Self-Reciprocal Irreducible Pentanomials
                                  Over $\mathbb{F}_2$  . . . . . . . . . . 395--397
                 Benjamin Arazi   Communication-Computation Trade-off in
                                  Executing ECDSA in a Contactless
                                  Smartcard  . . . . . . . . . . . . . . . 399--415


Designs, Codes, and Cryptography
Volume 39, Number 1, April, 2006

                   Jeremy Dover   Subregular Spreads of Hermitian Unitals  5--15
        Mahdad Khatirinejad and   
                   Petr Lisonek   Classification and Constructions of
                                  Complete Caps in Binary Spaces . . . . . 17--31
              A. Cossidente and   
                   A. Siciliano   The Automorphism Group of Plane
                                  Algebraic Curves with Singer
                                  Automorphisms  . . . . . . . . . . . . . 33--37
                   Tao Feng and   
                   Yanxun Chang   Existence of Z-cyclic ${\rm 3PTWh}(p)$
                                  for any Prime $p \equiv 1$ (mod $4$) . . 39--49
          Agnes D. Garciano and   
            Yutaka Hiramine and   
                 Takeo Yokonuma   On Relative Difference Sets in Dihedral
                                  Groups . . . . . . . . . . . . . . . . . 51--63
        Steven T. Dougherty and   
                  Young Ho Park   Codes Over the $p$-adic Integers . . . . 65--80
               S. De Winter and   
                        K. Thas   Generalized Quadrangles with an Abelian
                                  Singer Group . . . . . . . . . . . . . . 81--87
                Barbara Masucci   Sharing Multiple Secrets: Models,
                                  Schemes and Analysis . . . . . . . . . . 89--111
            Igor E. Shparlinski   On RSA Moduli with Prescribed Bit
                                  Patterns . . . . . . . . . . . . . . . . 113--122

Designs, Codes, and Cryptography
Volume 39, Number 2, May, 2006

        Steven T. Dougherty and   
                       San Ling   Cyclic Codes Over $\mathbb{Z}_4$ of Even
                                  Length . . . . . . . . . . . . . . . . . 127--153
                 Hassan Aly and   
                 Arne Winterhof   On the Linear Complexity Profile of
                                  Nonlinear Congruential Pseudorandom
                                  Number Generators with Dickson
                                  Polynomials  . . . . . . . . . . . . . . 155--162
                Michael Giudici   Codes with a Certain Weight-preserving
                                  Transitive Group of Automorphisms  . . . 163--172
                 Kejun Chen and   
                   Ruizhong Wei   Super-simple $(\nu, 5, 5)$ Designs . . . 173--187
               Mathieu Ciet and   
                  Marc Joye and   
             Kristin Lauter and   
            Peter L. Montgomery   Trading Inversions for Multiplications
                                  in Elliptic Curve Cryptography . . . . . 189--206
                  Gilberto Bini   $A$-Codes from Rational Functions over
                                  Galois Rings . . . . . . . . . . . . . . 207--214
            Cem Güneri and   
            Ferruh Özbudak   Improvements on Generalized Hamming
                                  Weights of Some Trace Codes  . . . . . . 215--231
                   Gilles Piret   Luby--Rackoff Revisited: On the Use of
                                  Permutations as Inner Functions of a
                                  Feistel Scheme . . . . . . . . . . . . . 233--245
                Dean Crnkovi\'c   A Series of Regular Hadamard Matrices    247--251
            Marten Van Dijk and   
              Dwaine Clarke and   
             Blaise Gassend and   
              G. Edward Suh and   
               Srinivas Devadas   Speeding up Exponentiation using an
                                  Untrusted Computational Resource . . . . 253--273

Designs, Codes, and Cryptography
Volume 39, Number 3, June, 2006

                M. R. Darafsheh   Designs from the Group ${\rm PSL}_2(q)$,
                                  $q$ Even . . . . . . . . . . . . . . . . 311--316
    Sergey V. Avgustinovich and   
                 Olof Heden and   
             Faina I. Solov'eva   On Intersection Problem for Perfect
                                  Binary Codes . . . . . . . . . . . . . . 317--322
               Jan De Beule and   
                     Leo Storme   Blocking All Generators of $Q^+(2 n +
                                  1,3)$, $n \geq 4$  . . . . . . . . . . . 323--333
                 Jen-Chun Chang   New Algorithms of Distance-Increasing
                                  Mappings from Binary Vectors to
                                  Permutations by Swaps  . . . . . . . . . 335--345
                  Samuel Maffre   A Weak Key Test for Braid Based
                                  Cryptography . . . . . . . . . . . . . . 347--373
              Masaaki Homma and   
                 Seon Jeong Kim   The Two-Point Codes with the Designed
                                  Distance on a Hermitian Curve in Even
                                  Characteristic . . . . . . . . . . . . . 375--386
           Katie M. O'Brien and   
            Patrick Fitzpatrick   Bounds on Codes Derived by Counting
                                  Components in Varshamov Graphs . . . . . 387--396
             Angela Aguglia and   
              Massimo Giulietti   Blocking Sets of Certain Line Sets
                                  Related to a Conic . . . . . . . . . . . 397--405


Designs, Codes, and Cryptography
Volume 40, Number 1, July, 2006

              Masaaki Homma and   
                 Seon Jeong Kim   The Complete Determination of the
                                  Minimum Distance of Two-Point Codes on a
                                  Hermitian Curve  . . . . . . . . . . . . 5--24
           Peter J. Grabner and   
              Clemens Heuberger   On the Number of Optimal Base $2$
                                  Representations of Integers  . . . . . . 25--39
         Deepak Kumar Dalai and   
            Subhamoy Maitra and   
                 Sumanta Sarkar   Basic Theory in Construction of Boolean
                                  Functions with Maximum Possible
                                  Annihilator Immunity . . . . . . . . . . 41--58
         François Rodier   Asymptotic Nonlinearity of Boolean
                                  Functions  . . . . . . . . . . . . . . . 59--70
              Claude Carlet and   
              Cunsheng Ding and   
            Harald Niederreiter   Authentication Schemes from Highly
                                  Nonlinear Functions  . . . . . . . . . . 71--79
                Hiroki Koga and   
                    Etsuyo Ueda   Basic Properties of the
                                  $(t,n)$-Threshold Visual Secret Sharing
                                  Scheme with Perfect Reconstruction of
                                  Black Pixels . . . . . . . . . . . . . . 81--102
             Javier Herranz and   
      Germán Sáez   Distributed Ring Signatures from General
                                  Dual Access Structures . . . . . . . . . 103--120
               Anthony B. Evans   Latin Squares without Orthogonal Mates   121--130
             Ian M. Wanless and   
                Bridget S. Webb   The Existence of Latin Squares without
                                  Orthogonal Mates . . . . . . . . . . . . 131--135

Designs, Codes, and Cryptography
Volume 40, Number 2, August, 2006

             Yen-Ying Huang and   
              Shi-Chun Tsai and   
                   Hsin-Lung Wu   On the Construction of Permutation
                                  Arrays via Mappings from Binary Vectors
                                  to Permutations  . . . . . . . . . . . . 139--155
              Cunsheng Ding and   
                   Jianxing Yin   A Construction of Optimal Constant
                                  Composition Codes  . . . . . . . . . . . 157--165
               Yanxun Chang and   
                  Cunsheng Ding   Constructions of External Difference
                                  Families and Disjoint Difference
                                  Families . . . . . . . . . . . . . . . . 167--185
      Octavio Páez Osuna   There are $1239$ Steiner Triple Systems
                                  ${\rm STS}(31)$ of $2$-rank $27$ . . . . 187--190
               Shoulun Long and   
             Josef Pieprzyk and   
              Huaxiong Wang and   
                 Duncan S. Wong   Generalised Cumulative Arrays in Secret
                                  Sharing  . . . . . . . . . . . . . . . . 191--209
              R. J. R. Abel and   
                  F. E. Bennett   The Existence of $(\nu, 6,
                                  \lambda)$-Perfect Mendelsohn Designs
                                  with $\lambda > 1$  . . . . . . . . . . . 211--224
           Mike J. Grannell and   
            Terry S. Griggs and   
            Anne Penfold Street   A Flaw in the Use of Minimal Defining
                                  Sets for Secret Sharing Schemes  . . . . 225--236
             Andreas Faldum and   
             Julio Lafuente and   
              Gustavo Ochoa and   
               Wolfgang Willems   Error Probabilities for Bounded Distance
                                  Decoding . . . . . . . . . . . . . . . . 237--252

Designs, Codes, and Cryptography
Volume 40, Number 3, September, 2006

               Mausumi Bose and   
                 Rahul Mukerjee   Optimal $(2,n)$ visual cryptographic
                                  schemes  . . . . . . . . . . . . . . . . 255--267
           Brendan D. McKay and   
         Jeanette C. McLeod and   
                 Ian M. Wanless   The number of transversals in a Latin
                                  square . . . . . . . . . . . . . . . . . 269--284
           Christopher Wolf and   
                 An Braeken and   
                   Bart Preneel   On the security of stepwise triangular
                                  systems  . . . . . . . . . . . . . . . . 285--302
                 Gennian Ge and   
                  Ying Miao and   
                         L. Zhu   GOB designs for authentication codes
                                  with arbitration . . . . . . . . . . . . 303--317
                 Olof Heden and   
                 Martin Hessler   On the classification of perfect codes:
                                  side class structures  . . . . . . . . . 319--333
             David G. Glynn and   
           Johannes G. Maks and   
                      Rey Casse   The polynomial degree of the
                                  Grassmannian $G(1,n,q)$ of lines in
                                  finite projective space ${\rm PG}(n,q)$  335--341
              Sean V. Droms and   
         Keith E. Mellinger and   
                    Chris Meyer   LDPC codes generated by conics in the
                                  classical projective plane . . . . . . . 343--356
                Peter Horak and   
              Bader F. AlBdaiwi   Fast decoding of quasi-perfect Lee
                                  distance codes . . . . . . . . . . . . . 357--367
                 Hassan Aly and   
                 Arne Winterhof   On the $k$-error linear complexity over
                                  $\mathbb{F}_p$ of Legendre and
                                  Sidelnikov sequences . . . . . . . . . . 369--374


Designs, Codes, and Cryptography
Volume 41, Number 1, October, 2006

           Rei Safavi-Naini and   
                  Huaxiong Wang   Secret sharing schemes with partial
                                  broadcast channels . . . . . . . . . . . 5--22
                  Julien Moncel   Constructing codes identifying sets of
                                  vertices . . . . . . . . . . . . . . . . 23--31
        Charles J. Colbourn and   
      Sosina S. Martirosyan and   
             Tran Van Trung and   
               Robert A. Walker   Roux-type constructions for covering
                                  arrays of strengths three and four . . . 33--57
           Iliya Bouyukliev and   
                Veerle Fack and   
           Wolfgang Willems and   
                    Joost Winne   Projective two-weight codes with small
                                  parameters and their corresponding
                                  graphs . . . . . . . . . . . . . . . . . 59--78
              Peter Keevash and   
                  Cheng Yeaw Ku   A random construction for permutation
                                  codes and the covering radius  . . . . . 79--86
                 Vince Grolmusz   Pairs of codes with prescribed Hamming
                                  distances and coincidences . . . . . . . 87--99
         Stefka Bouyuklieva and   
Patric R. J. Östergård   New constructions of optimal self-dual
                                  binary codes of length $54$  . . . . . . 101--109
                K. T. Arasu and   
               Ka Hin Leung and   
                 Siu Lun Ma and   
                 Ali Nabavi and   
            D. K. Ray-Chaudhuri   Circulant weighing matrices of weight
                                  $2^{2 t}$  . . . . . . . . . . . . . . . 111--123

Designs, Codes, and Cryptography
Volume 41, Number 2, November, 2006

                 Vikram Jha and   
              Norman L. Johnson   Subregular planes admitting elations . . 125--145
                  Marcelo Muniz   Isometric embeddings of $\mathbb{Z}_p^k$
                                  in the Hamming space $\mathbb{F}_p^N$
                                  and $\mathbb{Z}_p^k$-linear codes  . . . 147--152
               Robert F. Bailey   Uncoverings-by-bases for base-transitive
                                  permutation groups . . . . . . . . . . . 153--176
                 Zhenfu Cao and   
                 Gennian Ge and   
                      Ying Miao   Combinatorial characterizations of
                                  one-coincidence frequency-hopping
                                  sequences  . . . . . . . . . . . . . . . 177--184
            Stefko Miklavic and   
                Primoz Potocnik   Distance-transitive dihedrants . . . . . 185--193
               Carl Bracken and   
               Gary McGuire and   
                    Harold Ward   New quasi-symmetric designs constructed
                                  using mutually orthogonal Latin squares
                                  and Hadamard matrices  . . . . . . . . . 195--198
                 C. Galindo and   
                     M. Sanchis   Evaluation codes and plane valuations    199--219
                  Lihua Liu and   
                       Hao Shen   Explicit constructions of separating
                                  hash families from algebraic curves over
                                  finite fields  . . . . . . . . . . . . . 221--233

Designs, Codes, and Cryptography
Volume 41, Number 3, December, 2006

        Steven T. Dougherty and   
          T. Aaron Gulliver and   
                      John Wong   Self-dual codes over $\mathbb{Z}_8$ and
                                  $\mathbb{Z}_9$ . . . . . . . . . . . . . 235--249
          Takehiro Hasegawa and   
              Shoichi Kondo and   
                Hidekazu Kurusu   A sequence of one-point codes from a
                                  tower of function fields . . . . . . . . 251--267
                   Jun Shen and   
                       Hao Shen   Embeddings of resolvable group divisible
                                  designs with block size $3$  . . . . . . 269--298
               Soonhak Kwon and   
             Chang Hoon Kim and   
                  Chun Pyo Hong   Sparse polynomials, redundant bases,
                                  Gauss periods, and efficient
                                  exponentiation of primitive elements for
                                  small characteristic finite fields . . . 299--306
                   Ali Miri and   
              Monica Nevins and   
            Terasan Niyomsataya   Applications of representation theory to
                                  wireless communications  . . . . . . . . 307--318
                   Carl Bracken   New classes of self-complementary codes
                                  and quasi-symmetric designs  . . . . . . 319--323
         Pascal O. Vontobel and   
                 Ashwin Ganesan   On universally decodable matrices for
                                  space-time coding  . . . . . . . . . . . 325--342
        Ferruh Özbudak and   
       Zülfükar Saygi   Some constructions of systematic
                                  authentication codes using Galois rings  343--357


Designs, Codes, and Cryptography
Volume 42, Number 1, January, 2007

              Andrea Blunck and   
              Hans Havlicek and   
                Corrado Zanella   Lifting of divisible designs . . . . . . 1--14
              Chong-Dao Lee and   
               Yaotsu Chang and   
              Trieu-Kien Truong   A result on the weight distributions of
                                  binary quadratic residue codes . . . . . 15--20
                   Peter Roelse   The design of composite permutations
                                  with applications to DES-like S-boxes    21--42
               Nevine Ebeid and   
                 M. Anwar Hasan   On binary signed digit representations
                                  of integers  . . . . . . . . . . . . . . 43--65
               Simon Litsyn and   
               Beniamin Mounits   Improved lower bounds on sizes of
                                  single-error correcting codes  . . . . . 67--72
               Jon-Lark Kim and   
         Keith E. Mellinger and   
                     Leo Storme   Small weight codewords in LDPC codes
                                  defined by (dual) classical generalized
                                  quadrangles  . . . . . . . . . . . . . . 73--92
              Naoki Chigira and   
             Masaaki Harada and   
               Masaaki Kitazume   Extremal self-dual codes of length $64$
                                  through neighbors and covering radii . . 93--101
         Antonio Cossidente and   
                Giuseppe Marino   Veronese embedding and two-character
                                  sets . . . . . . . . . . . . . . . . . . 103--107

Designs, Codes, and Cryptography
Volume 42, Number 2, February, 2007

               Bessie C. Hu and   
             Duncan S. Wong and   
             Zhenfeng Zhang and   
                   Xiaotie Deng   Certificateless signature: a new
                                  security model and an improved generic
                                  construction . . . . . . . . . . . . . . 109--126
         Jürgen Bierbrauer   A direct approach to linear programming
                                  bounds for codes and tms-nets  . . . . . 127--143
          Sanjeevani Gharge and   
                    Sharad Sane   Quasi-affine symmetric designs . . . . . 145--166
            Amir J. Salomon and   
                    Ofer Amrani   Reed--Muller codes and Barnes--Wall
                                  lattices: Generalized multilevel
                                  constructions and representation over
                                  ${\rm GF}(2^q)$  . . . . . . . . . . . . 167--180
             Wilfried Meidl and   
         Ayineedi Venkateswarlu   Remarks on the $k$-error linear
                                  complexity of $p^n$-periodic sequences   181--193
                 Maura Paterson   Sliding-window dynamic frameproof codes  195--212
         S. González and   
         C. Martínez and   
               I. F. Rúa   Symplectic spread-based generalized
                                  Kerdock codes  . . . . . . . . . . . . . 213--226
              Dongvu Tonien and   
          Reihaneh Safavi-Naini   Construction of deletion correcting
                                  codes using generalized Reed--Solomon
                                  codes and their subcodes . . . . . . . . 227--237

Designs, Codes, and Cryptography
Volume 42, Number 3, March, 2007

     Paulo S. L. M. Barreto and   
        Steven D. Galbraith and   
Colm Ó'hÉigeartaigh and   
                  Michael Scott   Efficient pairing computation on
                                  supersingular Abelian varieties  . . . . 239--271
             Taher Abualrub and   
                     Irfan Siap   Cyclic codes over the rings $Z_2 + u
                                  Z_2$ and $Z_2 + u Z_2 + u^2 Z_2$ . . . . 273--287
               Eimear Byrne and   
           Marcus Greferath and   
          Michael E. O'Sullivan   The linear programming bound for codes
                                  over finite Frobenius rings  . . . . . . 289--301
                 Valentina Pepe   LDPC codes from the Hermitian curve  . . 303--315
                 Maura Paterson   Sequential and dynamic frameproof codes  317--326
               Gerardo Vega and   
               Jacques Wolfmann   New classes of $2$-weight cyclic codes   327--334
         Thomas Westerbäck   Maximal partial packings of $Z_2^n$ with
                                  perfect codes  . . . . . . . . . . . . . 335--355


Designs, Codes, and Cryptography
Volume 43, Number 1, April, 2007

                    Shane Kelly   Constructions of intriguing sets of
                                  polar spaces from field reduction and
                                  derivation . . . . . . . . . . . . . . . 1--8
                Fang-Wei Fu and   
                    Shu-Tao Xia   The characterization of binary constant
                                  weight codes meeting the bound of Fu and
                                  Shen . . . . . . . . . . . . . . . . . . 9--20
               Nikias De Feyter   Classification of $(0,2)$-geometries
                                  embedded in ${\rm AG}(3,q)$  . . . . . . 21--32
             Andrea Caggegi and   
               Giovanni Falcone   On $2-(n^2, 2 n, 2n-1)$ designs with
                                  three intersection numbers . . . . . . . 33--40
               Sabine Giese and   
             Ralph-Hardo Schulz   Divisible designs with dual translation
                                  group  . . . . . . . . . . . . . . . . . 41--45
                Tetsuya Izu and   
                 Jun Kogure and   
            Takeshi Koshiba and   
              Takeshi Shimoyama   Low-density attack revisited . . . . . . 47--59

Designs, Codes, and Cryptography
Volume 43, Number 2--3, June, 2007

            Aggelos Kiayias and   
                      Moti Yung   Cryptanalyzing the
                                  polynomial-reconstruction based
                                  public-key system under optimal
                                  parameter choice . . . . . . . . . . . . 61--78
            Jonathan Jedwab and   
              Matthew G. Parker   There are no Barker arrays having more
                                  than two dimensions  . . . . . . . . . . 79--84
                 I. Gashkov and   
            J. A. O. Ekberg and   
                        D. Taub   A geometric approach to finding new
                                  lower bounds of $A(n, d, w)$ . . . . . . 85--91
              Ji-Woong Jang and   
               Jong-Seon No and   
                   Habong Chung   Butson Hadamard matrices with partially
                                  cyclic core  . . . . . . . . . . . . . . 93--101
                     John Arhin   On the structure of $1$-designs with at
                                  most two block intersection numbers  . . 103--114
                       Lijun Ji   A construction for large sets of
                                  disjoint Kirkman triple systems  . . . . 115--122
                E. J. Cheon and   
                      T. Maruta   On the minimum length of some linear
                                  codes  . . . . . . . . . . . . . . . . . 123--135
       Maria Bras-Amorós   Algebraic-geometry codes, one-point
                                  codes, and evaluation codes  . . . . . . 137--145
                Bahattin Yildiz   Weights modulo $p^e$ of linear codes
                                  over rings . . . . . . . . . . . . . . . 147--165
             Wen-Ai Jackson and   
                      S. Murphy   Projective aspects of the AES inversion  167--179


Designs, Codes, and Cryptography
Volume 44, Number 1--3, September, 2007

              Dina Ghinelli and   
           James Hirschfeld and   
              Dieter Jungnickel   Preface  . . . . . . . . . . . . . . . . 1--2
                     J. A. Thas   The uniqueness of $1$-systems of
                                  $W_5(q)$ satisfying the BLT-property,
                                  with $q$ odd . . . . . . . . . . . . . . 3--10
              P. J. Cameron and   
                    A. Rudvalis   A design and a geometry for the group
                                  ${\rm Fi}_{22}$  . . . . . . . . . . . . 11--14
              Gary L. Ebert and   
             Keith E. Mellinger   Mixed partitions and related designs . . 15--23
                 Alan R. Prince   A translation plane of order $19^2$
                                  admitting ${\rm SL}(2,5)$, obtained by
                                  $12$-nest replacement  . . . . . . . . . 25--30
                 Antonio Pasini   A characterization of truncated
                                  projective geometries as flag-transitive
                                  ${\rm PG}^*.{\rm PG}$-geometries . . . . 31--38
             Guglielmo Lunardon   Simplectic spreads and finite semifields 39--48
               Guobiao Weng and   
               Weisheng Qiu and   
                Zeying Wang and   
                     Qing Xiang   Pseudo-Paley graphs and skew Hadamard
                                  difference sets from presemifields . . . 49--62
                Simeon Ball and   
                 Michel Lavrauw   On the Hughes--Kleinfeld and Knuth's
                                  semifields two-dimensional over a weak
                                  nucleus  . . . . . . . . . . . . . . . . 63--67
                M. Biliotti and   
                     V. Jha and   
              N. L. Johnson and   
                   A. Montinaro   Translation planes of order $q^2$
                                  admitting a two-transitive orbit of
                                  length $q + 1$ on the line at infinity   69--86


Designs, Codes, and Cryptography
Volume 45, Number 1, October, 2007

              Michael Dewar and   
                Lucia Moura and   
             Daniel Panario and   
              Brett Stevens and   
                     Qiang Wang   Division of trinomials by pentanomials
                                  and orthogonal arrays  . . . . . . . . . 1--17
Francisco Rodríguez-Henríquez and   
     Guillermo Morales-Luna and   
             Nazar A. Saqib and   
      Nareli Cruz-Cortés   Parallel Itoh--Tsujii multiplicative
                                  inversion algorithm for a special class
                                  of trinomials  . . . . . . . . . . . . . 19--37
                       Lijun Ji   Constructions for large sets of
                                  $L$-intersecting Steiner triple systems  39--49
           Morteza Esmaeili and   
                 Morteza Hivadi   $G$-projectable and
                                  $\Lambda$-projectable binary linear
                                  block codes  . . . . . . . . . . . . . . 51--64
                   Yu Xiong and   
                     Jun Ma and   
                       Hao Shen   On optimal codes with $w$-identifiable
                                  parent property  . . . . . . . . . . . . 65--90
            Esa Antero Seuranen   New lower bounds for multiple coverings  91--94
           Susan G. Barwick and   
                 Wen-Ai Jackson   A sequence approach to linear perfect
                                  hash families  . . . . . . . . . . . . . 95--121
                 I. Landjev and   
                      L. Storme   A weighted version of a result of Hamada
                                  on minihypers and on linear codes
                                  meeting the Griesmer bound . . . . . . . 123--138
               Xiande Zhang and   
                     Gennian Ge   Existence of $Z$-cyclic ${\rm
                                  3PDTWh}(p)$ for Prime $p \equiv 1$ (mod
                                  $4$) . . . . . . . . . . . . . . . . . . 139--155

Designs, Codes, and Cryptography
Volume 45, Number 2, November, 2007

                 Gennian Ge and   
                  Rolf Rees and   
                  Nabil Shalaby   Kirkman frames having hole type $h^u
                                  m^1$ for small $h$ . . . . . . . . . . . 157--184
                 Haitao Cao and   
                   Lijun Ji and   
                        Lie Zhu   Constructions for generalized Steiner
                                  systems ${\rm GS}(3, 4, v, 2)$ . . . . . 185--197
            Jaime Gutierrez and   
             Álvar Ibeas   Inferring sequences produced by a linear
                                  congruential generator on elliptic
                                  curves missing high-order bits . . . . . 199--212
             Tsvetan Asamov and   
                      Nuh Aydin   A search algorithm for linear codes:
                                  progressive dimension growth . . . . . . 213--217
    E. Martínez-Moro and   
               I. F. Rúa   On repeated-root multivariable codes
                                  over a finite chain ring . . . . . . . . 219--227
                       Ron Shaw   The $\psi$-associate $X^\#$ of a flat
                                  $X$ in ${\rm PG}(n, 2)$  . . . . . . . . 229--246
               Jon-Lark Kim and   
                    Yoonjin Lee   Construction of MDS self-dual codes over
                                  Galois rings . . . . . . . . . . . . . . 247--258
           Csaba Mengyán   On the number of pairwise non-isomorphic
                                  minimal blocking sets in ${\rm PG}(2,
                                  q)$  . . . . . . . . . . . . . . . . . . 259--267
               Eimear Byrne and   
           Marcus Greferath and   
          Michael E. O'Sullivan   Errata for ``The linear programming
                                  bound for codes over finite Frobenius
                                  rings''  . . . . . . . . . . . . . . . . 269--270

Designs, Codes, and Cryptography
Volume 45, Number 3, December, 2007

       Nevine Maurice Ebeid and   
                 M. Anwar Hasan   On $\tau$-adic representations of
                                  integers . . . . . . . . . . . . . . . . 271--296
                   San Ling and   
            Ferruh Özbudak   Constructions and bounds on linear
                                  error-block codes  . . . . . . . . . . . 297--316
               Ki Hyoung Ko and   
               Jang Won Lee and   
                    Tony Thomas   Towards generating secure keys for braid
                                  cryptography . . . . . . . . . . . . . . 317--333
              Radka Russeva and   
                 Nikolay Yankov   On binary self-dual codes of lengths
                                  $60$, $62$, $64$ and $66$ having an
                                  automorphism of order $9$  . . . . . . . 335--346
                  D. R. Stinson   Generalized mix functions and orthogonal
                                  equitable rectangles . . . . . . . . . . 347--357
     Cícero Carvalho and   
                     Takao Kato   Codes from curves with total inflection
                                  points . . . . . . . . . . . . . . . . . 359--364
          Gert Monstad Hana and   
                 Trygve Johnsen   Scroll codes . . . . . . . . . . . . . . 365--377
                  Koji Momihara   Necessary and sufficient conditions for
                                  tight equi-difference conflict-avoiding
                                  codes of weight three  . . . . . . . . . 379--390
                    Jinhua Wang   A new class of optimal $3$-splitting
                                  authentication codes . . . . . . . . . . 391--391


Designs, Codes, and Cryptography
Volume 46, Number 1, January, 2008

                Jinhua Wang and   
                       Hao Shen   Existence of $(v,K_{1(3)} \cup
                                  \{w^*\})$-PBDs and its applications  . . 1--16
             Vitaly Skachek and   
                    Ron M. Roth   Probabilistic algorithm for finding
                                  roots of linearized polynomials  . . . . 17--23
                Veerle Fack and   
       Szabolcs L. Fancsali and   
                  L. Storme and   
      Geetrui Van de Voorde and   
                    Joost Winne   Small weight codewords in the codes
                                  arising from Desarguesian projective
                                  planes . . . . . . . . . . . . . . . . . 25--43
                     Olof Heden   On perfect $p$-ary codes of length $p +
                                  1$ . . . . . . . . . . . . . . . . . . . 45--56
                 Wilfried Meidl   Reducing the calculation of the linear
                                  complexity of $u 2^v$-periodic binary
                                  sequences to Games--Chan algorithm . . . 57--65
              Weiming Zhang and   
                       Shiqu Li   A coding problem in steganography  . . . 67--81
             James A. Davis and   
                Laurent Poinsot   $G$-Perfect nonlinear functions  . . . . 83--96
         Sosina Martirosyan and   
                 Tran van Trung   Explicit constructions for perfect hash
                                  families . . . . . . . . . . . . . . . . 97--112
              Cunsheng Ding and   
                       Tao Feng   Codebooks from almost difference sets    113--126

Designs, Codes, and Cryptography
Volume 46, Number 2, February, 2008

              Norman L. Johnson   $m$th-Root subgeometry partitions  . . . 127--136
             Boris Skori\'c and   
       Stefan Katzenbeisser and   
                Mehmet U. Celik   Symmetric Tardos fingerprinting codes
                                  for arbitrary alphabet sizes . . . . . . 137--166
            Vito Abatangelo and   
                 Bambina Larato   Elliptic near-MDS codes over
                                  $\mathbb{F}_5$ . . . . . . . . . . . . . 167--174
               Thomas Britz and   
              Keisuke Shiromoto   Designs from subcode supports of linear
                                  codes  . . . . . . . . . . . . . . . . . 175--189
            Gerzson Kéri   The covering radius of extreme binary
                                  $2$-surjective codes . . . . . . . . . . 191--198
           Alessandro Montinaro   On the Ree Unital  . . . . . . . . . . . 199--209
               Jianxing Yin and   
                    Jie Yan and   
                  Chengmin Wang   Generalized balanced tournament designs
                                  and related codes  . . . . . . . . . . . 211--230
         Antonio Cossidente and   
             Nicola Durante and   
            Giuseppe Marino and   
               Tim Penttila and   
           Alessandro Siciliano   The geometry of some two-character sets  231--241

Designs, Codes, and Cryptography
Volume 46, Number 3, March, 2008

                 Aaron Potechin   Maximal caps in ${\rm AG}(6, 3)$ . . . . 243--259
             Giorgio Donati and   
                 Nicola Durante   On the intersection of two subgeometries
                                  of ${\rm PG}(n, q)$  . . . . . . . . . . 261--267
     Jürgen Bierbrauer and   
            Gohar M. Kyureghyan   Crooked binomials  . . . . . . . . . . . 269--301
    Maria Cristeta Cuaresma and   
            Michael Giudici and   
              Cheryl E. Praeger   Homogeneous factorisations of Johnson
                                  graphs . . . . . . . . . . . . . . . . . 303--327
               Berkant Ustaoglu   Obtaining a secure and efficient key
                                  agreement protocol from (H)MQV and NAXOS 329--342
             W. H. Holzmann and   
              H. Kharaghani and   
               B. Tayfeh-Rezaie   Williamson matrices up to order $59$ . . 343--352
          Nicholas Kolokotronis   Cryptographic properties of nonlinear
                                  pseudorandom number generators . . . . . 353--363
                   John Polhill   New negative Latin square type partial
                                  difference sets in nonelementary abelian
                                  $2$-groups and $3$-groups  . . . . . . . 365--377


Designs, Codes, and Cryptography
Volume 47, Number 1--3, June, 2008

                A. Blokhuis and   
        J. W. P. Hirschfeld and   
              D. Jungnickel and   
                     J. A. Thas   Finite geometries  . . . . . . . . . . . 1--2
                   S. De Winter   Non-isomorphic semipartial geometries    3--9
              Andrea Blunck and   
              Hans Havlicek and   
                Corrado Zanella   Divisible designs from twisted dual
                                  numbers  . . . . . . . . . . . . . . . . 11--20
                J. De Beule and   
                   A. Klein and   
                  K. Metsch and   
                      L. Storme   Partial ovoids and partial spreads in
                                  Hermitian polar spaces . . . . . . . . . 21--34
          B. N. Cooperstein and   
                    B. De Bruyn   The combinatorial properties of the
                                  hyperplanes of ${\rm DW}(5, q)$ arising
                                  from embedding . . . . . . . . . . . . . 35--51
           A. De Wispelaere and   
               H. Van Maldeghem   Regular partitions of (weak) finite
                                  generalized polygons . . . . . . . . . . 53--73
                  Kris Coolsaet   A $51$-dimensional embedding of the
                                  Ree--Tits generalized octagon  . . . . . 75--97
          Cheryl E. Praeger and   
                  Shenglin Zhou   Classification of line-transitive
                                  point-imprimitive linear spaces with
                                  line size at most $12$ . . . . . . . . . 99--111
             T. L. Alderson and   
                    A. A. Bruen   Coprimitive sets and inextendable codes  113--124
                      Yves Edel   Sequences in abelian groups $G$ of odd
                                  order without zero-sum subsequences of
                                  length $\exp(G)$ . . . . . . . . . . . . 125--134


Designs, Codes, and Cryptography
Volume 48, Number 1, July, 2008

               Eimear Byrne and   
           Marcus Greferath and   
                  Thomas Honold   Ring geometries, two-weight codes, and
                                  strongly regular graphs  . . . . . . . . 1--16
                Dameng Deng and   
                  Rolf Rees and   
                       Hao Shen   On the existence of nearly Kirkman
                                  triple systems with subsystems . . . . . 17--33
               Landang Yuan and   
                    Qingde Kang   Another construction for large sets of
                                  Kirkman triple systems . . . . . . . . . 35--42
                Sunghyu Han and   
                   Jon-Lark Kim   On self-dual codes over $\mathbb{F}_5$   43--58
                          L. Ji   $2$-idempotent $3$-quasigroups with a
                                  conjugate invariant subgroup consisting
                                  of a single cycle of length four . . . . 59--68
               A. D. Blinco and   
            S. I. El-Zanati and   
            G. F. Seelinger and   
             P. A. Sissokho and   
               L. E. Spence and   
               C. Vanden Eynden   On vector space partitions and uniformly
                                  resolvable designs . . . . . . . . . . . 69--77
                Oded Blayer and   
                    Tamir Tassa   Improved versions of Tardos'
                                  fingerprinting scheme  . . . . . . . . . 79--103
                      Koen Thas   Note on the existence of translation
                                  nets . . . . . . . . . . . . . . . . . . 105--107

Designs, Codes, and Cryptography
Volume 48, Number 2, August, 2008

              Cunsheng Ding and   
              Tor Helleseth and   
          Òyvind Ytrehus   Preface  . . . . . . . . . . . . . . . . 109--110
                  Zihui Liu and   
                 Wende Chen and   
                       Yuan Luo   The relative generalized Hamming weight
                                  of linear $q$-ary codes and their
                                  subcodes . . . . . . . . . . . . . . . . 111--123
                Shu-Tao Xia and   
                    Fang-Wei Fu   Undetected error probability of $q$-ary
                                  constant weight codes  . . . . . . . . . 125--140
            Khmaies Ouahada and   
              Theo G. Swart and   
        Hendrik C. Ferreira and   
                     Ling Cheng   Binary permutation sequences as subsets
                                  of Levenshtein codes, spectral null
                                  codes, run-length limited codes and
                                  constant weight codes  . . . . . . . . . 141--154
            Radinka Yorgova and   
              Alfred Wassermann   Binary self-dual codes with
                                  automorphisms of order $23$  . . . . . . 155--164
        Gerzson Kéri and   
Patric R. J. Östergård   On the minimum size of binary codes with
                                  length $2R + 4$ and covering radius $R$  165--169
             Ernst M. Gabidulin   Attacks and counter-attacks on the GPT
                                  public key cryptosystem  . . . . . . . . 171--177
            Constanza Riera and   
      Stéphane Jacob and   
              Matthew G. Parker   From graph states to two-graph states    179--206

Designs, Codes, and Cryptography
Volume 48, Number 3, September, 2008

           A. J. van Zanten and   
                 Loeky Haryanto   Sets of disjoint snakes based on a
                                  Reed--Muller code and covering the
                                  hypercube  . . . . . . . . . . . . . . . 207--229
             Michel Lavrauw and   
                 Leo Storme and   
         Geertrui Van de Voorde   On the code generated by the incidence
                                  matrix of points and hyperplanes in
                                  ${\rm PG}(n, q)$ and its dual  . . . . . 231--245
             Jong Yoon Hyun and   
                 Hyun Kwang Kim   Maximum distance separable poset codes   247--261
                 Alan R. Prince   Further translation planes of order
                                  $19^2$ admitting ${\rm SL}(2,5)$,
                                  obtained by nest replacement . . . . . . 263--267
                  Andreas Klein   Attacks on the RC4 stream cipher . . . . 269--286
           Hans Ludwig de Vries   On orthogonal resolutions of the
                                  classical Steiner quadruple system ${\rm
                                  SQS}(16)$  . . . . . . . . . . . . . . . 287--292
                 Zheng Gong and   
                 Xuejia Lai and   
                     Kefei Chen   A synthetic indifferentiability analysis
                                  of some block-cipher-based hash
                                  functions  . . . . . . . . . . . . . . . 293--305
           Ulrich Dempwolff and   
              William M. Kantor   Distorting symmetric designs . . . . . . 307--322
                      Olav Geil   On the second weight of generalized
                                  Reed--Muller codes . . . . . . . . . . . 323--330
                   Jianmin Wang   Some combinatorial constructions for
                                  optimal perfect deletion-correcting
                                  codes  . . . . . . . . . . . . . . . . . 331--347


Designs, Codes, and Cryptography
Volume 49, Number 1--3, December, 2008

            Pascale Charpin and   
                  Tor Helleseth   Editorial: In memory of Hans Dobbertin   1--2
             Hans Dobbertin and   
                 Gregor Leander   Bent functions embedded into the
                                  recursive framework of $\mathbb{Z}$-bent
                                  functions  . . . . . . . . . . . . . . . 3--22
                   J. F. Dillon   More DD difference sets  . . . . . . . . 23--32
        Harald Niederreiter and   
         Ayineedi Venkateswarlu   Periodic multisequences with large error
                                  linear complexity  . . . . . . . . . . . 33--45
                    Igor Semaev   On solving sparse algebraic equations
                                  over finite fields . . . . . . . . . . . 47--60
        Ferruh Özbudak and   
       Zülfükar Saygi   Systematic authentication codes using
                                  additive polynomials . . . . . . . . . . 61--77
              K. J. Horadam and   
                   D. G. Farmer   Bundles, presemifields and nonlinear
                                  functions  . . . . . . . . . . . . . . . 79--94
             Sumanta Sarkar and   
                Subhamoy Maitra   Idempotents in the neighbourhood of
                                  Patterson--Wiedemann functions having
                                  Walsh spectra zeros  . . . . . . . . . . 95--103
         Ernst M. Gabidulin and   
              Nina I. Pilipchuk   Error and erasure correcting algorithms
                                  for rank codes . . . . . . . . . . . . . 105--122
                Goutam Paul and   
          Siddheshwar Rathi and   
                Subhamoy Maitra   On non-negligible bias of the first
                                  output byte of RC4 towards the first
                                  three bytes of the secret key  . . . . . 123--134
               Jon-Lark Kim and   
            Patrick Solé   Skew Hadamard designs and their codes    135--145
        Håvard Raddum and   
                    Igor Semaev   Solving Multiple Right Hand Sides linear
                                  equations  . . . . . . . . . . . . . . . 147--160
       Lars Eirik Danielsen and   
              Matthew G. Parker   Edge local complementation and
                                  equivalence of binary linear codes . . . 161--170
    Reza Rezaeian Farashahi and   
             Ruud Pellikaan and   
               Andrey Sidorenko   Extractors for binary elliptic curves    171--186
                J. De Beule and   
                  K. Metsch and   
                      L. Storme   Characterization results on arbitrary
                                  non-weighted minihypers and on linear
                                  codes meeting the Griesmer bound . . . . 187--197
        Maria Christopoulou and   
           Theo Garefalakis and   
             Daniel Panario and   
                  David Thomson   The trace of an optimal normal element
                                  and low complexity normal bases  . . . . 199--215
            Mariusz Czapski and   
                 Maciej Nikodem   Error detection and error correction
                                  procedures for the Advanced Encryption
                                  Standard . . . . . . . . . . . . . . . . 217--232
               Haifeng Qian and   
                  Yuan Zhou and   
                  Zhibin Li and   
               Zecheng Wang and   
                     Bing Zhang   Efficient public key encryption with
                                  smallest ciphertext expansion from
                                  factoring  . . . . . . . . . . . . . . . 233--249
            George Petrides and   
           Johannes Mykkeltveit   Composition of recursions and nonlinear
                                  complexity of periodic binary sequences  251--264
                Danyo Danev and   
               Stefan Dodunekov   A family of ternary quasi-perfect BCH
                                  codes  . . . . . . . . . . . . . . . . . 265--271
           Marcus Brinkmann and   
                 Gregor Leander   On the classification of APN functions
                                  up to dimension five . . . . . . . . . . 273--288
                 Ryo Nojima and   
                Hideki Imai and   
            Kazukuni Kobara and   
                 Kirill Morozov   Semantic security for the McEliece
                                  cryptosystem without random oracles  . . 289--305
 Rogério M. Siqueira and   
              Sueli I. R. Costa   Flat tori, lattices and bounds for
                                  commutative group codes  . . . . . . . . 307--321
       Rafaël Fourquet and   
        Cédric Tavernier   An improved list decoding algorithm for
                                  the second order Reed--Muller codes and
                                  its applications . . . . . . . . . . . . 323--340
              Christian Bey and   
            Gohar M. Kyureghyan   On Boolean functions with the sum of
                                  every two of them being bent . . . . . . 341--346
          Kseniya Garaschuk and   
                   Petr Lisonek   On binary Kloosterman sums divisible by
                                  $3$  . . . . . . . . . . . . . . . . . . 347--357


Designs, Codes, and Cryptography
Volume 50, Number 1, January, 2009

              Masaaki Homma and   
                 Seon Jeong Kim   The second generalized Hamming weight
                                  for two-point codes on a Hermitian curve 1--40
            J. Schillewaert and   
                     J. A. Thas   Characterizations of Hermitian varieties
                                  by intersection numbers  . . . . . . . . 41--60
                    Jie Yan and   
                   Jianxing Yin   A class of optimal constant composition
                                  codes from GDRPs . . . . . . . . . . . . 61--76
        Steven T. Dougherty and   
               Jon-Lark Kim and   
                 Hamid Kulosman   MDS codes over finite principal ideal
                                  rings  . . . . . . . . . . . . . . . . . 77--92
               Guobiao Weng and   
                         Lei Hu   Some results on skew Hadamard difference
                                  sets . . . . . . . . . . . . . . . . . . 93--105
                Weidong Guo and   
                     Gennian Ge   The existence of generalized mix
                                  functions  . . . . . . . . . . . . . . . 107--113
    Jean-Sébastien Coron   A variant of Boneh--Franklin IBE with a
                                  tight reduction in the random oracle
                                  model  . . . . . . . . . . . . . . . . . 115--133
Frédéric A. B. Edoukou   Codes defined by forms of degree $2$ on
                                  non-degenerate Hermitian varieties in
                                  $\mathbb{P}^4 (\mathbb{F}_q)
                                  \mathbb{P}^4(\mathbb{F}_q)$  . . . . . . 135--146

Designs, Codes, and Cryptography
Volume 50, Number 2, February, 2009

                  Young Ho Park   Modular independence and generator
                                  matrices for codes over $\mathbb{Z}_m$   147--162
                Shu-Tao Xia and   
                    Fang-Wei Fu   Johnson type bounds on constant
                                  dimension codes  . . . . . . . . . . . . 163--172
                 Jong Yoon Hyun   Generalized MacWilliams identities and
                                  their applications to perfect binary
                                  codes  . . . . . . . . . . . . . . . . . 173--185
               Jan De Beule and   
           Patrick Govaerts and   
                Anja Hallez and   
                     Leo Storme   Tight sets, weighted $m$-covers,
                                  weighted $m$-ovoids, and minihypers  . . 187--201
                 Wenqing Fu and   
                       Tao Feng   On self-orthogonal group ring codes  . . 203--214
                   Feng Liu and   
               Chuan Kun Wu and   
                     Xi Jun Lin   The alignment problem of visual
                                  cryptography schemes . . . . . . . . . . 215--227
                  Horst Trinker   A simple derivation of the MacWilliams
                                  identity for linear ordered codes and
                                  orthogonal arrays  . . . . . . . . . . . 229--234
         Jürgen Bierbrauer   A family of crooked functions  . . . . . 235--241
                 Keqin Feng and   
               Qunying Liao and   
                      Jing Yang   Maximal values of generalized algebraic
                                  immunity . . . . . . . . . . . . . . . . 243--252
                Yiwei Huang and   
               Bernhard Schmidt   Uniqueness of some cyclic projective
                                  planes . . . . . . . . . . . . . . . . . 253--266

Designs, Codes, and Cryptography
Volume 50, Number 3, March, 2009

           Lionel Chaussade and   
            Pierre Loidreau and   
                    Felix Ulmer   Skew codes of prescribed distance or
                                  rank . . . . . . . . . . . . . . . . . . 267--284
                Yutaka Hiramine   A two-to-one map and abelian affine
                                  difference sets  . . . . . . . . . . . . 285--290
             Kiyoshi Nagata and   
              Fidel Nemenzo and   
                     Hideo Wada   The number of self-dual codes over
                                  $Z_{p^3}$  . . . . . . . . . . . . . . . 291--303
        Steven D. Galbraith and   
                      Xibin Lin   Computing pairings using $x$-coordinates
                                  only . . . . . . . . . . . . . . . . . . 305--324
               Gilles Piret and   
François-Xavier Standaert   Provable security of block ciphers
                                  against linear cryptanalysis: a mission
                                  impossible? An experimental review of
                                  the practical security approach and the
                                  key equivalence hypothesis in linear
                                  cryptanalysis  . . . . . . . . . . . . . 325--338
                    Yang Li and   
                   Lijun Ji and   
                   Jianxing Yin   Covering arrays of strength $3$ and $4$
                                  from holey difference matrices . . . . . 339--350
                 D. Panario and   
                     D. Thomson   Efficient $p$th root computations in
                                  finite fields of characteristic $p$  . . 351--358
       Alexander A. Davydov and   
          Stefano Marcugini and   
             Fernanda Pambianco   Complete $(q^2 + q + 8)/2$-caps in the
                                  spaces $PG(3, q ), q \equiv 2 (mod 3)$
                                  an odd prime, and a complete $20$-cap in
                                  $PG(3, 5)$ . . . . . . . . . . . . . . . 359--372


Designs, Codes, and Cryptography
Volume 51, Number 1, April, 2009

                  Tian Tian and   
                    Wen-Feng Qi   A note on the crosscorrelation of
                                  maximal length FCSR sequences  . . . . . 1--8
                    E. J. Cheon   A class of optimal linear codes of
                                  length one above the Griesmer bound  . . 9--20
                 Yu. I. Lyubich   On tight projective designs  . . . . . . 21--31
                 Wilfried Meidl   Remarks on a cyclotomic sequence . . . . 33--43
        Krzysztof Petelczyc and   
         Ma\lgorzata Prazmowska   $103$-configurations and projective
                                  realizability of multiplied
                                  configurations . . . . . . . . . . . . . 45--54
        Steven T. Dougherty and   
                    Hongwei Liu   Independence of vectors in codes over
                                  rings  . . . . . . . . . . . . . . . . . 55--68
                Sunghyu Han and   
                   Jon-Lark Kim   The nonexistence of near-extremal
                                  formally self-dual codes . . . . . . . . 69--77
          R. Julian R. Abel and   
          Norman J. Finizio and   
              Malcolm Greig and   
                Luis B. Morales   Existence of $(2, 8)$GWhD($v$) and $(4,
                                  8)$GWhD($v$) with $v \equiv 0, 1 \pmod
                                  8$ . . . . . . . . . . . . . . . . . . . 79--97
             Dimitrios Poulakis   A variant of Digital Signature Algorithm 99--104

Designs, Codes, and Cryptography
Volume 51, Number 2, May, 2009

           Iliya Bouyukliev and   
                Veerle Fack and   
                    Joost Winne   $2-(31,15,7)$, $2-(35,17,8)$ and
                                  $2-(36,15,6)$ designs with automorphisms
                                  of odd prime order, and their related
                                  Hadamard matrices and codes  . . . . . . 105--122
             Antonio Cossidente   Some constructions on the Hermitian
                                  surface  . . . . . . . . . . . . . . . . 123--129
          Dieter Jungnickel and   
            Vladimir D. Tonchev   Polarities, quasi-symmetric designs, and
                                  Hamada's conjecture  . . . . . . . . . . 131--140
                   Ron Shaw and   
                 Neil A. Gordon   The cubic Segre variety in PG$(5, 2)$    141--156
               John Bamberg and   
            Frank De Clerck and   
                 Nicola Durante   A hemisystem of a nonclassical
                                  generalised quadrangle . . . . . . . . . 157--165
             Michael J. Collins   Upper bounds for parent-identifying set
                                  systems  . . . . . . . . . . . . . . . . 167--173
                       Tao Feng   Difference sets with $n = 5 p^r$ . . . . 175--194
               Jooyoung Lee and   
                   Yongjin Yeom   Efficient RFID authentication protocols
                                  based on pseudorandom sequence
                                  generators . . . . . . . . . . . . . . . 195--210
            M. R. Darafsheh and   
              A. Iranmanesh and   
                  R. Kahkeshani   Some designs and codes invariant under
                                  the groups $S_9$ and A$_8$ . . . . . . . 211--223

Designs, Codes, and Cryptography
Volume 51, Number 3, June, 2009

                     H. Cao and   
                  J. Dinitz and   
                  D. Kreher and   
              D. R. Stinson and   
                         R. Wei   On orthogonal generalized equitable
                                  rectangles . . . . . . . . . . . . . . . 225--230
             Derek H. Smith and   
            Richard P. Ward and   
              Stephanie Perkins   Gold codes, Hadamard partitions and the
                                  security of CDMA systems . . . . . . . . 231--243
         Sarah Spence Adams and   
           Matthew Crawford and   
            Caitlin Greeley and   
                  Bryce Lee and   
         Mathav Kishore Murugan   Multilevel and multidimensional Hadamard
                                  matrices . . . . . . . . . . . . . . . . 245--252
                  Koji Momihara   Strong difference families, difference
                                  covers, and their applications for
                                  relative difference families . . . . . . 253--273
             Silvia Boumova and   
          Peter Boyvalenkov and   
            Hristina Kulina and   
                 Maya Stoyanova   Polynomial techniques for investigation
                                  of spherical designs . . . . . . . . . . 275--288
José Joaquín Bernal and   
Ángel del Río and   
       Juan Jacobo Simón   An intrinsical description of group
                                  codes  . . . . . . . . . . . . . . . . . 289--300
        Jessica F. Burkhart and   
             Neil J. Calkin and   
                Shuhong Gao and   
      Justine C. Hyde-Volpe and   
                Kevin James and   
                         others   Finite field elements of high order
                                  arising from modular curves  . . . . . . 301--314
              Thomas Martin and   
            Keith M. Martin and   
                     Peter Wild   Establishing the broadcast efficiency of
                                  the Subset Difference Revocation Scheme  315--334


Designs, Codes, and Cryptography
Volume 52, Number 1, July, 2009

Jaume Martí-Farré and   
            Carles Padró   Ideal secret sharing schemes whose
                                  minimal qualified subsets have at most
                                  three participants . . . . . . . . . . . 1--14
                  Lein Harn and   
                    Changlu Lin   Detection and identification of cheaters
                                  in $(t, n)$ secret sharing scheme  . . . 15--24
        Charles J. Colbourn and   
                Alan C. H. Ling   Linear hash families and forbidden
                                  configurations . . . . . . . . . . . . . 25--55
              Markus Grassl and   
              T. Aaron Gulliver   On circulant self-dual codes over small
                                  fields . . . . . . . . . . . . . . . . . 57--81
                  Yu-Ru Liu and   
               Craig V. Spencer   A generalization of Meshulam's theorem
                                  on subsets of finite abelian groups with
                                  no $3$-term arithmetic progression . . . 83--91
              Darryn Bryant and   
                Judith Egan and   
           Barbara Maenhaut and   
                 Ian M. Wanless   Indivisible plexes in latin squares  . . 93--105
                    Bin Wen and   
               Jianmin Wang and   
                   Jianxing Yin   Optimal grid holey packings with block
                                  size $3$ and $4$ . . . . . . . . . . . . 107--124
             Masaaki Harada and   
               Akihiro Munemasa   There exists no self-dual $[24, 12, 10]$
                                  code over $\mathbb{F}_5$ . . . . . . . . 125--127

Designs, Codes, and Cryptography
Volume 52, Number 2, August, 2009

                Tamir Tassa and   
                Jorge L. Villar   On proper secrets, $(t, k)$-bases and
                                  linear codes . . . . . . . . . . . . . . 129--154
             Bader AlBdaiwi and   
                Peter Horak and   
                Lorenzo Milazzo   Enumerating and decoding perfect linear
                                  Lee codes  . . . . . . . . . . . . . . . 155--162
                   John Polhill   Paley type partial difference sets in
                                  non $p$-groups . . . . . . . . . . . . . 163--169
                E. J. Cheon and   
                      T. Maruta   A new extension theorem for $3$-weight
                                  modulo $q$ linear codes over
                                  $\mathbb{F}_q$ . . . . . . . . . . . . . 171--183
          Clemens Heuberger and   
                  James A. Muir   Unbalanced digit sets and the closest
                                  choice strategy for minimal weight
                                  integer representations  . . . . . . . . 185--208
                Paul Dorbec and   
            Sylvain Gravier and   
               Iiro Honkala and   
                 Michel Mollard   Weighted codes in Lee metrics  . . . . . 209--218
        Kenneth G. Paterson and   
      Sriramkrishnan Srinivasan   On the relations between non-interactive
                                  key distribution, identity-based
                                  encryption and trapdoor discrete log
                                  groups . . . . . . . . . . . . . . . . . 219--241
                 Alan R. Prince   Pure partial planes of order $6$ with
                                  $25$ lines . . . . . . . . . . . . . . . 243--247

Designs, Codes, and Cryptography
Volume 52, Number 3, September, 2009

                  Tian Tian and   
                    Wen-Feng Qi   Linearity properties of binary FCSR
                                  sequences  . . . . . . . . . . . . . . . 249--262
               Brian Curtin and   
                  Ibtisam Daqqa   The subconstituent algebra of strongly
                                  regular graphs associated with a Latin
                                  square . . . . . . . . . . . . . . . . . 263--274
             Miwako Mishima and   
                Hung-Lin Fu and   
                  Shoichi Uruno   Optimal conflict-avoiding codes of
                                  length $n \equiv 0 \pmod 16$ and weight
                                  $3$  . . . . . . . . . . . . . . . . . . 275--291
                 A. Caranti and   
      Francesca Dalla Volta and   
                        M. Sala   An application of the O'Nan--Scott
                                  theorem to the group generated by the
                                  round functions of an AES-like cipher    293--301
              Claude Carlet and   
             Xiangyong Zeng and   
                 Chunlei Li and   
                         Lei Hu   Further properties of several classes of
                                  Boolean functions with optimum algebraic
                                  immunity . . . . . . . . . . . . . . . . 303--338
                 Koji Nuida and   
            Satoshi Fujitsu and   
            Manabu Hagiwara and   
           Takashi Kitagawa and   
            Hajime Watanabe and   
                         others   An improvement of discrete Tardos
                                  fingerprinting codes . . . . . . . . . . 339--362
               Jon-Lark Kim and   
                     Xiaoyu Liu   A generalized Gleason--Pierce--Ward
                                  theorem  . . . . . . . . . . . . . . . . 363--380
                   Dustin Moody   The Diffie--Hellman problem and
                                  generalization of Verheul's theorem  . . 381--390


Designs, Codes, and Cryptography
Volume 53, Number 1, October, 2009

          Robert S. Coulter and   
                 Todd Gutekunst   Special subsets of difference sets with
                                  particular emphasis on skew Hadamard
                                  difference sets  . . . . . . . . . . . . 1--12
                  Aidan Roy and   
                    A. J. Scott   Unitary designs and codes  . . . . . . . 13--31
                 Siman Yang and   
                        Lulu Qi   On improved asymptotic bounds for codes
                                  from global function fields  . . . . . . 33--43
         Andrzej Owsiejczuk and   
         Ma\lgorzata Prazmowska   Combinatorial generalizations of
                                  generalized quadrangles of order $(2,
                                  2)$  . . . . . . . . . . . . . . . . . . 45--57
             T. L. Alderson and   
      András Gács   On the maximality of linear codes  . . . 59--68

Designs, Codes, and Cryptography
Volume 53, Number 2, November, 2009

                     Olof Heden   Necessary and sufficient conditions for
                                  the existence of a class of partitions
                                  of a finite vector space . . . . . . . . 69--73
             Ramakanth Kavuluru   Characterization of $2^n$-periodic
                                  binary sequences with fixed $2$-error or
                                  $3$-error linear complexity  . . . . . . 75--97
     Cícero Carvalho and   
           Ercílio Silva   On algebras admitting a complete set of
                                  near weights, evaluation codes, and
                                  Goppa codes  . . . . . . . . . . . . . . 99--110
       Maria Bras-Amorós   On numerical semigroups and the
                                  redundancy of improved codes correcting
                                  generic errors . . . . . . . . . . . . . 111--118
                Simeon Ball and   
           Szabolcs L. Fancsali   Multiple blocking sets in finite
                                  projective spaces and improvements to
                                  the Griesmer bound for linear codes  . . 119--136

Designs, Codes, and Cryptography
Volume 53, Number 3, December, 2009

                Xiaohu Tang and   
              Tor Helleseth and   
                    Pingzhi Fan   A new optimal quaternary sequence family
                                  of length $2(2^n - 1)$ obtained from the
                                  orthogonal transformation of Families
                                  $\mathcal{B}$ and $\mathcal{C}$  . . . . 137--148
         Michael J. Mossinghoff   Wieferich pairs and Barker sequences . . 149--163
            Stefania Fanali and   
              Massimo Giulietti   On maximal curves with Frobenius
                                  dimension $3$  . . . . . . . . . . . . . 165--174
            Alexandre Pinto and   
         André Souto and   
              Armando Matos and   
            Luís Antunes   Commitment and authentication systems    175--193
   László Csirmaz   An impossibility result on graph secret
                                  sharing  . . . . . . . . . . . . . . . . 195--209


Designs, Codes, and Cryptography
Volume 54, Number 1, January, 2010

             Antonio Cossidente   The classical $1$-system of $Q^-(7, q )$
                                  and two-character sets . . . . . . . . . 1--9
                  Zihui Liu and   
                     Wende Chen   Notes on the value function  . . . . . . 11--19
                 Guoxin Zuo and   
                   Mingyuan Xia   A special class of $T$-matrices  . . . . 21--28
Françoise Levy-dit-Vehel and   
                 Ludovic Perret   Security analysis of word problem-based
                                  cryptosystems  . . . . . . . . . . . . . 29--41
               Jianmin Wang and   
               Xiuling Shan and   
                   Jianxing Yin   On constructions for optimal
                                  two-dimensional optical orthogonal codes 43--60
            Bahattin Yildiz and   
                 Suat Karadeniz   Linear codes over $\mathbb{F}_2 + u
                                  \mathbb{F}_2 + v \mathbb{F}_2 + u v
                                  \mathbb{F}_2$  . . . . . . . . . . . . . 61--81
    Reza Rezaeian Farashahi and   
            Igor E. Shparlinski   On the number of distinct elliptic
                                  curves in some families  . . . . . . . . 83--99

Designs, Codes, and Cryptography
Volume 54, Number 2, February, 2010

               S. El-Zanati and   
                  H. Jordon and   
               G. Seelinger and   
                P. Sissokho and   
                      L. Spence   The maximum size of a partial 3-spread
                                  in a finite vector space over GF$(2)$    101--107
               Sophie Huczynska   Equidistant frequency permutation arrays
                                  and related constant composition codes   109--120
                Changshe Ma and   
                  Jian Weng and   
                 Yingjiu Li and   
                    Robert Deng   Efficient discrete logarithm based
                                  multi-signature scheme in the plain
                                  public key model . . . . . . . . . . . . 121--133
               Ivan Landjev and   
                     Leo Storme   A study of $(x(q + 1), x; 2,
                                  q)$-minihypers . . . . . . . . . . . . . 135--147
      Maheshanand Bhaintwal and   
             Siri Krishan Wasan   Generalized Reed--Muller codes over
                                  $\mathbb{Z}_q$ . . . . . . . . . . . . . 149--166
                  J. Borges and   
C. Fernández-Córdoba and   
                   J. Pujol and   
                  J. Rif\`a and   
                  M. Villanueva   $\mathbb{Z}_2 \mathbb{Z}_4$-linear
                                  codes: generator matrices and duality    167--179
               Nathan Drake and   
           Gretchen L. Matthews   Parameter choices and a better bound on
                                  the list size in the Guruswami--Sudan
                                  algorithm for algebraic geometry codes   181--187

Designs, Codes, and Cryptography
Volume 54, Number 3, March, 2010

         Jürgen Bierbrauer   New semifields, PN and APN functions . . 189--200
      Dragomir Z. \Dbarokovi\'c   A new Yang number and consequences . . . 201--204
               Masayuki Abe and   
                   Yang Cui and   
                Hideki Imai and   
                     Eike Kiltz   Efficient hybrid encryption from
                                  ID-based encryption  . . . . . . . . . . 205--240
        Krzysztof Petelczyc and   
         Ma\lgorzata Prazmowska   Twisted Fano spaces and their
                                  classification, linear completions of
                                  systems of triangle perspectives . . . . 241--251
       Alexander A. Davydov and   
Patric R. J. Östergård   Linear codes with covering radius $3$    253--271
            J. Schillewaert and   
                  L. Storme and   
                     J. A. Thas   Minimal codewords in Reed--Muller codes  273--286
          Peter Vandendriessche   Some low-density parity-check codes
                                  derived from finite geometries . . . . . 287--297


Designs, Codes, and Cryptography
Volume 55, Number 1, April, 2010

               Junling Zhou and   
                   Yanxun Chang   New results on large sets of Kirkman
                                  triple systems . . . . . . . . . . . . . 1--7
              Norbert Knarr and   
                Markus Stroppel   Polarities and unitals in the
                                  Coulter--Matthews planes . . . . . . . . 9--18
               Mausumi Bose and   
                 Rahul Mukerjee   Optimal $(k, n)$ visual cryptographic
                                  schemes for general $k$  . . . . . . . . 19--35
             Antonio Maschietti   The group fixing a completely regular
                                  line-oval  . . . . . . . . . . . . . . . 37--43
               Hongsong Shi and   
             Shaoquan Jiang and   
                   Zhiguang Qin   More efficient DDH pseudorandom
                                  generators . . . . . . . . . . . . . . . 45--64
                  Tian Tian and   
                    Wen-Feng Qi   Expected values for the rational
                                  complexity of finite binary sequences    65--79
               Xiande Zhang and   
                     Gennian Ge   Existence of resolvable $H$-designs with
                                  group sizes $2$, $3$, $4$ and $6$  . . . 81--101

Designs, Codes, and Cryptography
Volume 55, Number 2--3, May, 2010

           Ronald C. Mullin and   
              Rainer Steinwandt   Special issue dedicated to Spyros
                                  Magliveras on the occasion of his 70th
                                  birthday . . . . . . . . . . . . . . . . 103--105
       C. Rößing and   
                      L. Storme   A spectrum result on minimal blocking
                                  sets with respect to the planes of
                                  $PG(3, q)$, $q$ odd  . . . . . . . . . . 107--119
           A. De Wispelaere and   
                 J. A. Thas and   
               H. Van Maldeghem   A characterization of the Grassmann
                                  embedding of $H(q)$, with $q$ even . . . 121--130
          Dieter Jungnickel and   
            Vladimir D. Tonchev   The number of designs with geometric
                                  parameters grows exponentially . . . . . 131--140
          Sanjit Chatterjee and   
           Darrel Hankerson and   
               Edward Knapp and   
                 Alfred Menezes   Comparing two pairing-based aggregate
                                  signature schemes  . . . . . . . . . . . 141--167
            Atefeh Mashatan and   
             Douglas R. Stinson   Practical unconditionally secure
                                  two-channel message authentication . . . 169--188
María Isabel González Vasco and   
Angel L. Pérez del Pozo and   
           Pedro Taborda Duarte   A note on the security of MST$_3$  . . . 189--200
            Charles J. Colbourn   Covering arrays from cyclotomy . . . . . 201--219
                   M. Abreu and   
                C. Balbuena and   
                     D. Labbate   Adjacency matrices of polarity graphs
                                  and of other $C_4$-free graphs of large
                                  size . . . . . . . . . . . . . . . . . . 221--233
                  Michael Huber   Block-transitive designs in affine
                                  spaces . . . . . . . . . . . . . . . . . 235--242
               Nidhi Singhi and   
              Nikhil Singhi and   
              Spyros Magliveras   Minimal logarithmic signatures for
                                  finite groups of Lie type  . . . . . . . 243--260
                R. D. Baker and   
                G. L. Ebert and   
                    K. L. Wantz   Enumeration of orthogonal Buekenhout
                                  unitals  . . . . . . . . . . . . . . . . 261--283
Gábor Korchmáros and   
                    Nicola Pace   Infinite family of large complete arcs
                                  in PG$(2, q^n)$, with $q$ odd and $n > 1$
                                  odd  . . . . . . . . . . . . . . . . . . 285--296
               N. A. Newman and   
                   C. A. Rodger   Enclosings of $\lambda$-fold 4-cycle
                                  systems  . . . . . . . . . . . . . . . . 297--310


Designs, Codes, and Cryptography
Volume 56, Number 1, July, 2010

              Marco Buratti and   
                  Anita Pasotti   Further progress on difference families
                                  with block size $4$ or $5$ . . . . . . . 1--20
                Yutaka Hiramine   Modified generalized Hadamard matrices
                                  and constructions for transversal
                                  designs  . . . . . . . . . . . . . . . . 21--33
                Lev Glebsky and   
            Igor E. Shparlinski   Short cycles in repeated exponentiation
                                  modulo a prime . . . . . . . . . . . . . 35--42
Cristina Fernández-Córdoba and   
                Jaume Pujol and   
             Merc\`e Villanueva   $\mathbb{Z}_2 \mathbb{Z}_4$-linear
                                  codes: rank and kernel . . . . . . . . . 43--59
      Eugenia O'Reilly-Regueiro   Reduction for primitive flag-transitive
                                  $(v, k, 4)$-symmetric designs  . . . . . 61--63
              Monica Nevins and   
       Camelia KarimianPour and   
                       Ali Miri   NTRU over rings beyond $\mathbb{Z}$  . . 65--78
               Ka Hin Leung and   
                 Siu Lun Ma and   
               Bernhard Schmidt   On Lander's conjecture for difference
                                  sets whose order is a power of $2$ or
                                  $3$  . . . . . . . . . . . . . . . . . . 79--84

Designs, Codes, and Cryptography
Volume 56, Number 2--3, August, 2010

               Jan De Beule and   
                  Yves Edel and   
         Emilia Käsper and   
              Andreas Klein and   
              Svetla Nikova and   
                         others   Galois geometries and applications . . . 85--86
                Simeon Ball and   
               Jan De Beule and   
                 Leo Storme and   
              Peter Sziklai and   
           Tamás Sz'onyi   In memoriam, András Gács . . . . . . . . . 87--88
                 M. Lavrauw and   
               G. Van de Voorde   On linear sets on a projective line  . . 89--104
         Antonio Cossidente and   
                 Oliver H. King   Some two-character sets  . . . . . . . . 105--113
                  G. Marino and   
                   O. Polverino   Ovoidal blocking sets and maximal
                                  partial ovoids of Hermitian varieties    115--130
            Stefania Fanali and   
              Massimo Giulietti   On some open problems on maximal curves  131--139
              Paulo Barreto and   
           Ventzislav Nikov and   
              Svetla Nikova and   
             Vincent Rijmen and   
              Elmar Tischhauser   Whirlwind: a new cryptographic hash
                                  function . . . . . . . . . . . . . . . . 141--162
                  Yves Edel and   
                   Ivan Landjev   On multiple caps in finite projective
                                  spaces . . . . . . . . . . . . . . . . . 163--175
             Angela Aguglia and   
 Gábor Korchmáros   Multiple blocking sets and multisets in
                                  Desarguesian planes  . . . . . . . . . . 177--181
                  Bart De Bruyn   On hyperovals of polar spaces  . . . . . 183--195
               Satoshi Yoshiara   Notes on APN functions, semibiplanes and
                                  dimensional dual hyperovals  . . . . . . 197--218
           F. A. B. Edoukou and   
                  A. Hallez and   
                  F. Rodier and   
                      L. Storme   The small weight codewords of the
                                  functional codes associated to
                                  non-singular Hermitian varieties . . . . 219--233
     Nóra V. Harrach and   
                   Klaus Metsch   Small point sets of $PG(n, q^3)$
                                  intersecting each $k$-subspace in $1
                                  \bmod q$ points  . . . . . . . . . . . . 235--248


Designs, Codes, and Cryptography
Volume 57, Number 1, October, 2010

            Kenneth W. Shum and   
                Wing Shing Wong   A tight asymptotic bound on the size of
                                  constant-weight conflict-avoiding codes  1--14
             John Fuelberth and   
         Athula Gunawardena and   
               C. David Shaffer   On incidence structures of nonsingular
                                  points and hyperbolic lines of ovoids in
                                  finite orthogonal spaces . . . . . . . . 15--33
                      Yves Edel   On quadratic APN functions and
                                  dimensional dual hyperovals  . . . . . . 35--44
             Ernst Schuster and   
                     Gennian Ge   On uniformly resolvable designs with
                                  block sizes $3$ and $4$  . . . . . . . . 45--69
                Amin Sakzad and   
      Mohammad-Reza Sadeghi and   
                 Daniel Panario   Codes with girth $8$ Tanner graph
                                  representation . . . . . . . . . . . . . 71--81
              Zhengjun Zhao and   
                     Xiwang Cao   A note on the reducibility of binary
                                  affine polynomials . . . . . . . . . . . 83--90
              H. B. Walikar and   
              B. D. Acharya and   
            Shailaja S. Shirkol   Designs associated with maximum
                                  independent sets of a graph  . . . . . . 91--105
                Tohru Nakashima   AG codes from vector bundles . . . . . . 107--115

Designs, Codes, and Cryptography
Volume 57, Number 2, November, 2010

              Shenglin Zhou and   
                     Huili Dong   Alternating groups and flag-transitive
                                  triplanes  . . . . . . . . . . . . . . . 117--126
         Vladimir Blinovsky and   
                   Uri Erez and   
                   Simon Litsyn   Weight distribution moments of random
                                  linear/coset codes . . . . . . . . . . . 127--138
       Gregory M. Zaverucha and   
             Douglas R. Stinson   Anonymity in shared symmetric key
                                  primitives . . . . . . . . . . . . . . . 139--160
C. Fernández-Córdoba and   
                   K. T. Phelps   On the minimum distance graph of an
                                  extended Preparata code  . . . . . . . . 161--168
               Eimear Byrne and   
           Marcus Greferath and   
               Axel Kohnert and   
                 Vitaly Skachek   New bounds for codes over finite
                                  Frobenius rings  . . . . . . . . . . . . 169--179
                Denis S. Krotov   On the binary codes with parameters of
                                  doubly-shortened 1-perfect codes . . . . 181--194
                 Seungkook Park   Minimum distance of Hermitian two-point
                                  codes  . . . . . . . . . . . . . . . . . 195--213
             Zhengchun Zhou and   
                    Xiaohu Tang   Optimal and perfect difference systems
                                  of sets from $q$-ary sequences with
                                  difference-balanced property . . . . . . 215--223

Designs, Codes, and Cryptography
Volume 57, Number 3, December, 2010

               Xiande Zhang and   
                     Gennian Ge   $H$-designs with the properties of
                                  resolvability or $(1, 2)$-resolvability  225--256
                 E. Pasalic and   
                     P. Charpin   Some results concerning
                                  cryptographically significant mappings
                                  over GF$(2^n)$ . . . . . . . . . . . . . 257--269
             Chun-peng Wang and   
                 Xiao-song Chen   On extended algebraic immunity . . . . . 271--281
        Panagiotis Rizomiliotis   On the security of the Feng--Liao--Yang
                                  Boolean functions with optimal algebraic
                                  immunity against fast algebraic attacks  283--292
                       Jin Hong   The cost of false alarms in Hellman and
                                  rainbow tradeoffs  . . . . . . . . . . . 293--327
                   Hyun Jin Kim   Self-dual codes with automorphism of
                                  order $3$ having $8$ cycles  . . . . . . 329--346
             Giorgio Donati and   
                 Nicola Durante   On the intersection of a Hermitian curve
                                  with a conic . . . . . . . . . . . . . . 347--360
              Rasha Shaheen and   
                 Arne Winterhof   Permutations of finite fields for check
                                  digit systems  . . . . . . . . . . . . . 361--371
           Ulrich Dempwolff and   
                   Timo Neumann   Geometric and design-theoretic aspects
                                  of semibent functions I  . . . . . . . . 373--381
              R. J. R. Abel and   
                  F. E. Bennett   Existence of directed BIBDs with block
                                  size $7$ and related perfect
                                  $5$-deletion-correcting codes of length
                                  $7$  . . . . . . . . . . . . . . . . . . 383--397


Designs, Codes, and Cryptography
Volume 58, Number 1, January, 2011

                     Xiaoyu Liu   An equivalence of Ward's bound and its
                                  application  . . . . . . . . . . . . . . 1--9
                    Tamir Tassa   Generalized oblivious transfer by secret
                                  sharing  . . . . . . . . . . . . . . . . 11--21
                    Jie Cui and   
                    Junying Pei   Quaternary 1-generator quasi-cyclic
                                  codes  . . . . . . . . . . . . . . . . . 23--33
              Chang-An Zhao and   
               Dongqing Xie and   
              Fangguo Zhang and   
              Jingwei Zhang and   
                 Bing-Long Chen   Computing bilinear pairings on elliptic
                                  curves with automorphisms  . . . . . . . 35--44
                  Aaram Yun and   
               Je Hong Park and   
                   Jooyoung Lee   On Lai--Massey and quasi-Feistel ciphers 45--72
Padraig Ó Catháin and   
                Marc Röder   The cocyclic Hadamard matrices of order
                                  less than $40$ . . . . . . . . . . . . . 73--88
              Marco Buratti and   
              Koji Momihara and   
                  Anita Pasotti   New results on optimal $(v, 4, 2, 1)$
                                  optical orthogonal codes . . . . . . . . 89--109

Designs, Codes, and Cryptography
Volume 58, Number 2, February, 2011

             Rajendra M. Pawale   Quasi-symmetric designs with the
                                  difference of block intersection numbers
                                  two  . . . . . . . . . . . . . . . . . . 111--121
         Sudhir R. Ghorpade and   
            Sartaj Ul Hasan and   
                   Meena Kumari   Primitive polynomials, Singer cycles and
                                  word-oriented linear feedback shift
                                  registers  . . . . . . . . . . . . . . . 123--134
                Jianguo Lei and   
                    Cuiling Fan   Optimal difference systems of sets and
                                  partition-type cyclic difference
                                  packings . . . . . . . . . . . . . . . . 135--153
                 David G. Glynn   An invariant for matrices and sets of
                                  points in prime characteristic . . . . . 155--172
             Roberto Avanzi and   
          Clemens Heuberger and   
               Helmut Prodinger   Redundant $\tau$-adic expansions I:
                                  non-adjacent digit sets and their
                                  applications to scalar multiplication    173--202
           Koichi Betsumiya and   
             Masaaki Harada and   
                 Hiroshi Kimura   Hadamard matrices of order $32$ and
                                  extremal ternary self-dual codes . . . . 203--214
                 David G. Glynn   A condition for arcs and MDS codes . . . 215--218
             Dimitrios Poulakis   Erratum to: A Variant of Digital
                                  Signature Algorithm  . . . . . . . . . . 219--219

Designs, Codes, and Cryptography
Volume 58, Number 3, March, 2011

            Bahattin Yildiz and   
                 Suat Karadeniz   Cyclic codes over $F_2 + u F_2 + v F_2 +
                                  u v F_2$ . . . . . . . . . . . . . . . . 221--234
                 Jong Hwan Park   Inner-product encryption under standard
                                  assumptions  . . . . . . . . . . . . . . 235--257
               Yongqiang Li and   
                 Mingsheng Wang   On EA-equivalence of certain
                                  permutations to power mappings . . . . . 259--269
                  Palash Sarkar   A trade-off between collision
                                  probability and key size in universal
                                  hashing using polynomials  . . . . . . . 271--278
                   Jianqin Zhou   On the $k$-error linear complexity of
                                  sequences with period $2 p^n$ over
                                  $\mathrm{GF}(q)$ . . . . . . . . . . . . 279--296
                Kwangsu Lee and   
                  Dong Hoon Lee   Improved hidden vector encryption with
                                  short ciphertexts and tokens . . . . . . 297--319
                  Hui Zhang and   
                     Gennian Ge   Completely reducible super-simple
                                  designs with block size four and related
                                  super-simple packings  . . . . . . . . . 321--346


Designs, Codes, and Cryptography
Volume 59, Number 1--3, April, 2011

    Matthew Geoffrey Parker and   
             Sasha Kholosha and   
            Pascale Charpin and   
                   Eirik Rosnes   Editorial  . . . . . . . . . . . . . . . 1--1
     Céline Blondeau and   
    Beno\^\it Gérard and   
            Jean-Pierre Tillich   Accurate estimates of the data
                                  complexity and success probability for
                                  various cryptanalyses  . . . . . . . . . 3--34
                Andrey Bogdanov   On unbalanced Feistel networks with
                                  contracting MDS diffusion  . . . . . . . 35--58
     Nina Brandstätter and   
            Gottlieb Pirsic and   
                 Arne Winterhof   Correlation of the two-prime Sidel'nikov
                                  sequence . . . . . . . . . . . . . . . . 59--68
            Lilya Budaghyan and   
                  Claude Carlet   CCZ-equivalence of bent vectorial
                                  functions and related constructions  . . 69--87
                  Claude Carlet   Relating three nonlinearity parameters
                                  of vectorial functions and building APN
                                  functions from bent functions  . . . . . 89--109
                Danyo Danev and   
           Stefan Dodunekov and   
                  Diana Radkova   A family of constacyclic ternary
                                  quasi-perfect codes with covering radius
                                  $3$  . . . . . . . . . . . . . . . . . . 111--118
       Lars Eirik Danielsen and   
              Matthew G. Parker   Directed graph representation of
                                  half-rate additive codes over
                                  $\mathrm{GF}(4)$ . . . . . . . . . . . . 119--130
          Richard G. Gibson and   
                Jonathan Jedwab   Quaternary Golay sequence pairs I: even
                                  length . . . . . . . . . . . . . . . . . 131--146
          Richard G. Gibson and   
                Jonathan Jedwab   Quaternary Golay sequence pairs II: odd
                                  length . . . . . . . . . . . . . . . . . 147--157
                David G. Harris   Critique of the related-key attack
                                  concept  . . . . . . . . . . . . . . . . 159--168
                      Marc Joye   How (Not) to design strong-RSA
                                  signatures . . . . . . . . . . . . . . . 169--182
           Torleiv Klòve   Lower bounds on the size of spheres of
                                  permutations under the Chebychev
                                  distance . . . . . . . . . . . . . . . . 183--191
          Philippe Langevin and   
                 Gregor Leander   Counting all bent functions in dimension
                                  eight $99270589265934370305785861242880$
                                  [$\approx 2^{106}$]  . . . . . . . . . . 193--205
             Gregor Leander and   
         François Rodier   Bounds on the degree of APN polynomials:
                                  the case of $x^{-1} + g(x)$  . . . . . . 207--222
               Petr Lisonek and   
                   Marko Moisio   On zeros of Kloosterman sums . . . . . . 223--230
            Subhamoy Maitra and   
                Goutam Paul and   
           Shashwat Raizada and   
             Subhabrata Sen and   
              Rudradev Sengupta   Some observations on HC-128  . . . . . . 231--245
         Stéphane Manuel   Classification and generation of
                                  disturbance vectors for collision
                                  attacks against SHA-1  . . . . . . . . . 247--263
                 Sihem Mesnager   A new class of bent and hyper-bent
                                  Boolean functions in polynomial forms    265--279
Patric R. J. Östergård and   
                  Olli Pottonen   Two optimal one-error-correcting codes
                                  of length $13$ that are not doubly
                                  shortened perfect codes  . . . . . . . . 281--285
 Elif Kurtaran Özbudak and   
        Ferruh Özbudak and   
       Zülfükar Saygi   A class of authentication codes with
                                  secrecy  . . . . . . . . . . . . . . . . 287--318
             Alexander Pott and   
                    Yin Tan and   
                   Tao Feng and   
                       San Ling   Association schemes arising from bent
                                  functions  . . . . . . . . . . . . . . . 319--331
                Kai-Uwe Schmidt   On the correlation distribution of
                                  Delsarte--Goethals sequences . . . . . . 333--347
                    Igor Semaev   Sparse Boolean equations and circuit
                                  lattices . . . . . . . . . . . . . . . . 349--364


Designs, Codes, and Cryptography
Volume 60, Number 1, July, 2011

                   Ziran Tu and   
                    Yingpu Deng   A conjecture about binary strings and
                                  its applications on constructing Boolean
                                  functions with optimal algebraic
                                  immunity . . . . . . . . . . . . . . . . 1--14
               Jongsung Kim and   
               Jaechul Sung and   
            Ermaliza Razali and   
         Raphael C.-W. Phan and   
                      Marc Joye   Notions and relations for RKA-secure
                                  permutation and function families  . . . 15--35
               Yanxun Chang and   
             Yeow Meng Chee and   
                   Junling Zhou   A pair of disjoint $3$-GDDs of type $g^t
                                  u^1$ . . . . . . . . . . . . . . . . . . 37--62
                Hossein Ghodosi   Comments on Harn--Lin's cheating
                                  detection scheme . . . . . . . . . . . . 63--66
                    Yonglin Cao   Structural properties and enumeration of
                                  $1$-generator generalized quasi-cyclic
                                  codes  . . . . . . . . . . . . . . . . . 67--79
                    Sanna Ranto   On binary linear $r$-identifying codes   81--89
                Yutaka Hiramine   A family of non class-regular symmetric
                                  transversal designs of spread type . . . 91--99

Designs, Codes, and Cryptography
Volume 60, Number 2, August, 2011

                  Horst Trinker   Cubic and higher degree bounds for codes
                                  and $(t, m, s)$-nets . . . . . . . . . . 101--121
                     Jiqiang Lu   The (related-key) impossible boomerang
                                  attack and its application to the AES
                                  block cipher . . . . . . . . . . . . . . 123--143
                 Wenping Ma and   
                    Shaohui Sun   New designs of frequency hopping
                                  sequences with low hit zone  . . . . . . 145--153
              Abbas Alhakim and   
              Mufutau Akinwande   A recursive construction of nonbinary de
                                  Bruijn sequences . . . . . . . . . . . . 155--169
                     Yin Li and   
            Gong-liang Chen and   
                    Jian-hua Li   An alternative class of irreducible
                                  polynomials for optimal extension fields 171--182
              Nikhil Singhi and   
                   Nidhi Singhi   Minimal logarithmic signatures for
                                  classical groups . . . . . . . . . . . . 183--195
       Theo Grundhöfer and   
                Boris Krinn and   
                Markus Stroppel   Non-existence of isomorphisms between
                                  certain unitals  . . . . . . . . . . . . 197--201

Designs, Codes, and Cryptography
Volume 60, Number 3, September, 2011

            V. A. Menegatto and   
             C. P. Oliveira and   
                    A. P. Peron   Exact point-distributions over the
                                  complex sphere . . . . . . . . . . . . . 203--223
              D. M. Donovan and   
                 M. J. Grannell   Designs having the parameters of
                                  projective and affine spaces . . . . . . 225--240
             Zhengchun Zhou and   
                    Xiaohu Tang   Generalized modified Gold sequences  . . 241--253
             Jong Hwan Park and   
                  Dong Hoon Lee   Fully collusion-resistant traitor
                                  tracing scheme with shorter ciphertexts  255--276
                   Klaus Metsch   A generalization of a result of
                                  Dembowski and Wagner . . . . . . . . . . 277--282
                 Miao Liang and   
                    Beiliang Du   A new class of splitting $3$-designs . . 283--290
Jesús Carrillo-Pacheco and   
                Felipe Zaldivar   On Lagrangian--Grassmannian codes  . . . 291--298


Designs, Codes, and Cryptography
Volume 61, Number 1, October, 2011

              Chia-Jung Lee and   
               Te-Tsung Lin and   
            Min-Zheng Shieh and   
              Shi-Chun Tsai and   
                   Hsin-Lung Wu   Decoding permutation arrays with ternary
                                  vectors  . . . . . . . . . . . . . . . . 1--9
            Giuseppe Marino and   
             Olga Polverino and   
                Rocco Trombetti   Towards the classification of rank $2$
                                  semifields $6$-dimensional over their
                                  center . . . . . . . . . . . . . . . . . 11--29
                   M. Bilal and   
                  J. Borges and   
            S. T. Dougherty and   
C. Fernández-Córdoba   Maximum distance separable codes over
                                  $\mathbb{Z}_4$ and $\mathbb{Z}_2 \times
                                  \mathbb{Z}_4$  . . . . . . . . . . . . . 31--40
               Sudhir Batra and   
                    S. K. Arora   Some cyclic codes of length $2 p^n$  . . 41--69
             Roberto Avanzi and   
         Waldyr Dias Benits and   
        Steven D. Galbraith and   
                    James McKee   On the distribution of the coefficients
                                  of normal forms for Frobenius expansions 71--89
     Ma\lgorzata Prazmowska and   
           Krzysztof Prazmowski   Semi-Pappus configurations;
                                  combinatorial generalizations of the
                                  Pappus configuration . . . . . . . . . . 91--103
               Alain Plagne and   
             Wolfgang A. Schmid   An application of coding theory to
                                  estimating Davenport constants . . . . . 105--118

Designs, Codes, and Cryptography
Volume 61, Number 2, November, 2011

                  Zihui Liu and   
                 Wende Chen and   
                 Zhimin Sun and   
                 Xiangyong Zeng   Further results on support weights of
                                  certain subcodes . . . . . . . . . . . . 119--129
                    E. J. Cheon   The non-existence of Griesmer codes with
                                  parameters close to codes of Belov type  131--139
                Sunghyu Han and   
                Heisook Lee and   
                    Yoonjin Lee   Binary formally self-dual odd codes  . . 141--150
             Yeow Meng Chee and   
                 Gennian Ge and   
                   Lijun Ji and   
                   San Ling and   
                   Jianxing Yin   List decodability at small radii . . . . 151--166
Jaume Martí-Farré and   
        Carles Padró and   
          Leonor Vázquez   Optimal complexity of secret sharing
                                  schemes with four minimal qualified
                                  subsets  . . . . . . . . . . . . . . . . 167--186
         Jürgen Bierbrauer   Commutative semifields from projection
                                  mappings . . . . . . . . . . . . . . . . 187--196
            Minerva Cordero and   
                     Vikram Jha   Fractional dimensions in semifields of
                                  odd order  . . . . . . . . . . . . . . . 197--221
                Hiroki Koga and   
                Takeru Ishihara   A general method for construction of
                                  $(t, n)$-threshold visual secret sharing
                                  schemes for color images . . . . . . . . 223--249

Designs, Codes, and Cryptography
Volume 61, Number 3, December, 2011

              Vladimir Edemskiy   About computation of the linear
                                  complexity of generalized cyclotomic
                                  sequences with period $p^{n + 1}$  . . . 251--260
               Carl Bracken and   
               Eimear Byrne and   
               Gary McGuire and   
                  Gabriele Nebe   On the equivalence of quadratic APN
                                  functions  . . . . . . . . . . . . . . . 261--272
                  B. Hanson and   
                 D. Panario and   
                     D. Thomson   Swan-like results for binomials and
                                  trinomials over finite fields of odd
                                  characteristic . . . . . . . . . . . . . 273--283
          R. Julian R. Abel and   
           Nigel H. N. Chan and   
                Diana Combe and   
              William D. Palmer   Existence of GBRDs with block size $4$
                                  and BRDs with block size $5$ . . . . . . 285--300
        Melsik K. Kyuregyan and   
            Gohar M. Kyureghyan   Irreducible compositions of polynomials
                                  over finite fields . . . . . . . . . . . 301--314
                Denis S. Krotov   On weight distributions of perfect
                                  colorings and completely regular codes   315--329
                        Qi Wang   The linear span of the frequency hopping
                                  sequences in optimal sets  . . . . . . . 331--344
            Andrew T. Jesso and   
              David A. Pike and   
                  Nabil Shalaby   Hamilton cycles in restricted
                                  block-intersection graphs  . . . . . . . 345--353


Designs, Codes, and Cryptography
Volume 62, Number 1, January, 2012

            Mario Lamberger and   
             Florian Mendel and   
             Vincent Rijmen and   
                   Koen Simoens   Memoryless near-collisions via coding
                                  theory . . . . . . . . . . . . . . . . . 1--18
                    Yun Fan and   
                 Guanghui Zhang   On the existence of self-dual
                                  permutation codes of finite groups . . . 19--29
                   Kenza Guenda   New MDS self-dual codes over finite
                                  fields . . . . . . . . . . . . . . . . . 31--42
           M. Christopoulou and   
             T. Garefalakis and   
                 D. Panario and   
                     D. Thomson   Gauss periods as constructions of low
                                  complexity normal bases  . . . . . . . . 43--62
           Simona Bonvicini and   
              Marco Buratti and   
             Gloria Rinaldi and   
                Tommaso Traetta   Some progress on the existence of
                                  $1$-rotational Steiner triple systems    63--78
              Wolfgang Lang and   
             Ekkehard Schneider   Turyn type Williamson matrices up to
                                  order $99$ . . . . . . . . . . . . . . . 79--84
          Maheshanand Bhaintwal   Skew quasi-cyclic codes over Galois
                                  rings  . . . . . . . . . . . . . . . . . 85--101
      Tamás Sz\Honyi and   
                  Zsuzsa Weiner   A stability theorem for lines in Galois
                                  planes of prime order  . . . . . . . . . 103--108
                 Miao Liang and   
                    Beiliang Du   A new class of $3$-fold perfect
                                  splitting authentication codes . . . . . 109--119
             Tatsuya Maruta and   
                   Yuri Yoshida   A generalized extension theorem for
                                  linear codes . . . . . . . . . . . . . . 121--130

Designs, Codes, and Cryptography
Volume 62, Number 2, February, 2012

                     Ce Shi and   
                    Yu Tang and   
                   Jianxing Yin   The equivalence between optimal
                                  detecting arrays and super-simple OAs    131--142
               Xiande Zhang and   
                  Hui Zhang and   
                     Gennian Ge   Optimal constant weight covering codes
                                  and nonuniform group divisible
                                  $3$-designs with block size four . . . . 143--160
               Xiaoshan Kai and   
                     Shixin Zhu   Negacyclic self-dual codes over finite
                                  chain rings  . . . . . . . . . . . . . . 161--174
                 David G. Glynn   The factorization of the permanent of a
                                  matrix with minimal rank in prime
                                  characteristic . . . . . . . . . . . . . 175--177
              Dongyoung Roh and   
                 Sang Geun Hahn   The square root Diffie--Hellman problem  179--187
        Ferruh Özbudak and   
                 Elif Saygi and   
       Zülfükar Saygi   A new class of quaternary LCZ sequence
                                  sets . . . . . . . . . . . . . . . . . . 189--198
                   Lijun Ji and   
                    Yang Li and   
                   Jianxing Yin   Constructions of covering arrays of
                                  strength five  . . . . . . . . . . . . . 199--208
                  J. Rif\`a and   
            F. I. Solov'eva and   
                  M. Villanueva   Intersection of Hamming codes avoiding
                                  Hamming subcodes . . . . . . . . . . . . 209--223
                   Ron Shaw and   
                Neil Gordon and   
                  Hans Havlicek   Aspects of the Segre variety
                                  $S_{1,1,1}(2) \mathcal{S}_{1,1,1}(2)$    225--239
               Ulrich Dempwolff   Geometric and design-theoretic aspects
                                  of semibent functions II . . . . . . . . 241--252

Designs, Codes, and Cryptography
Volume 62, Number 3, March, 2012

                       Tao Feng   On cyclic codes of length $2^{2^r} - 1$
                                  with two zeros whose dual codes have
                                  three weights  . . . . . . . . . . . . . 253--258
            Hossein Ghodosi and   
             Josef Pieprzyk and   
                  Ron Steinfeld   Multi-party computation with conversion
                                  of secret sharing  . . . . . . . . . . . 259--272
                K. T. Arasu and   
                     Siu Lun Ma   Nonexistence of ${\rm CW}(110, 100)$ . . 273--278
                Yutaka Hiramine   A construction for modified generalized
                                  Hadamard matrices using QGH matrices . . 279--288
                    Yupu Hu and   
                 Juntao Gao and   
                   Qing Liu and   
                    Yiwei Zhang   Fault analysis of Trivium  . . . . . . . 289--311
                    Lin Tan and   
                Wen-Feng Qi and   
                        Hong Xu   Asymptotic analysis on the normalized
                                  $k$-error linear complexity of binary
                                  sequences  . . . . . . . . . . . . . . . 313--321
              Petteri Kaski and   
        Mahdad Khatirinejad and   
Patric R. J. Östergård   Steiner triple systems satisfying the
                                  $4$-vertex condition . . . . . . . . . . 323--330
               Thomas Britz and   
             Trygve Johnsen and   
              Dillon Mayhew and   
              Keisuke Shiromoto   Wei-type duality theorems for matroids   331--341
              Hans Havlicek and   
              Boris Odehnal and   
                   Metod Saniga   On invariant notions of Segre varieties
                                  in binary projective spaces  . . . . . . 343--356
              Jordan D. Webster   Using rational idempotents to show
                                  Turyn's bound is sharp . . . . . . . . . 357--365


Designs, Codes, and Cryptography
Volume 63, Number 1, April, 2012

              Gaetan Bisson and   
           Andrew V. Sutherland   A low-memory algorithm for finding short
                                  product representations in finite groups 1--13
              D. M. Donovan and   
                 M. J. Grannell   On the number of designs with affine
                                  parameters . . . . . . . . . . . . . . . 15--27
                 Ian McLoughlin   A group ring construction of the
                                  $[48,24,12]$ type II linear block code   29--41
                   Hyun Jin Kim   The binary extremal self-dual codes of
                                  lengths $38$ and $40$  . . . . . . . . . 43--57
                   Alina Ostafe   Pseudorandom vector sequences of maximal
                                  period generated by triangular
                                  polynomial dynamical systems . . . . . . 59--72
               V. C. Mavron and   
            T. P. McDonough and   
               M. S. Shrikhande   On quasi-symmetric designs with
                                  intersection difference three  . . . . . 73--86
                Liping Wang and   
                     Qiang Wang   On explicit factors of cyclotomic
                                  polynomials over finite fields . . . . . 87--104
               Han Mao Kiah and   
               Ka Hin Leung and   
                       San Ling   A note on cyclic codes over ${\rm
                                  GR}(p^2, m)$ of length $p^k$ . . . . . . 105--112
        Steven T. Dougherty and   
             Suat Karadeniz and   
                Bahattin Yildiz   Cyclic codes over ${\rm R}_k$  . . . . . 113--126
László Csirmaz and   
            Gábor Tardos   On-line secret sharing . . . . . . . . . 127--147

Designs, Codes, and Cryptography
Volume 63, Number 2, May, 2012

        Manohar L. Aggarwal and   
              Andreas Klein and   
                     Leo Storme   The characterisation of the smallest two
                                  fold blocking sets in ${\rm PG}(n, 2)$   149--157
                J. De Beule and   
                  A. Hallez and   
                      L. Storme   A characterisation result on a
                                  particular class of non-weighted
                                  minihypers . . . . . . . . . . . . . . . 159--170
                    M. De Boeck   Small weight codewords in the dual code
                                  of points and hyperplanes in ${\rm
                                  PG}(n, q)$, $q$ even . . . . . . . . . . 171--182
                 Xiang-Dong Hou   Classification of self dual quadratic
                                  bent functions . . . . . . . . . . . . . 183--198
                 Kaoru Kurosawa   Round-efficient perfectly secure message
                                  transmission scheme against general
                                  adversary  . . . . . . . . . . . . . . . 199--207
               Aixian Zhang and   
                     Keqin Feng   Construction of cyclotomic codebooks
                                  nearly meeting the Welch bound . . . . . 209--224
            Paul Stankovski and   
               Sushmita Ruj and   
                Martin Hell and   
               Thomas Johansson   Improved distinguishers for HC-128 . . . 225--240
             Derek H. Smith and   
             Roberto Montemanni   A new table of permutation codes . . . . 241--253
             Oriol Farr\`as and   
Jessica Ruth Metcalf-Burton and   
        Carles Padró and   
          Leonor Vázquez   On the optimization of bipartite secret
                                  sharing schemes  . . . . . . . . . . . . 255--271
           Thomas W. Cusick and   
                 Younhwan Cheon   Affine equivalence for rotation
                                  symmetric Boolean functions with $2^k$
                                  variables  . . . . . . . . . . . . . . . 273--294

Designs, Codes, and Cryptography
Volume 63, Number 3, June, 2012

             Jong Yoon Hyun and   
                Heisook Lee and   
                    Yoonjin Lee   MacWilliams duality and a Gleason-type
                                  theorem on self-dual bent functions  . . 295--304
                   Kun Wang and   
                   Jianmin Wang   Semicyclic $4$-GDDs and related
                                  two-dimensional optical orthogonal codes 305--319
       Relinde P. M. J. Jurrius   Weight enumeration of codes from finite
                                  spaces . . . . . . . . . . . . . . . . . 321--330
                     Zhi Hu and   
              Patrick Longa and   
                      Maozhi Xu   Implementing the $4$-dimensional GLV
                                  method on GLS elliptic curves with
                                  $j$-invariant $0$  . . . . . . . . . . . 331--343
           Daniela Silvesan and   
                  Nabil Shalaby   Cyclic block designs with block size $3$
                                  from Skolem-type sequences . . . . . . . 345--355
               Yuemei Huang and   
                   Yanxun Chang   Two classes of optimal two-dimensional
                                  OOCs . . . . . . . . . . . . . . . . . . 357--363
                     E. Ballico   Scroll codes over curves of higher
                                  genus: reducible and superstable vector
                                  bundles  . . . . . . . . . . . . . . . . 365--377
            Antonino Simone and   
                 Boris Skori\'c   Accusation probabilities in Tardos
                                  codes: beyond the Gaussian approximation 379--412
               Guobiao Weng and   
                 Xiangyong Zeng   Further results on planar DO functions
                                  and commutative semifields . . . . . . . 413--423
             Daniel Panario and   
             Olga Sosnovski and   
              Brett Stevens and   
                     Qiang Wang   Divisibility of polynomials over finite
                                  fields and combinatorial applications    425--445


Designs, Codes, and Cryptography
Volume 64, Number 1--2, July, 2012

            Arrigo Bonisoli and   
           James Hirschfeld and   
              Spyros Magliveras   Preface: geometry, combinatorial designs
                                  and cryptology . . . . . . . . . . . . . 1--2
Gábor Korchmáros and   
          Valentino Lanzone and   
                 Angelo Sonnino   Projective $k$-arcs and $2$-level
                                  secret-sharing schemes . . . . . . . . . 3--15
            Frank De Clerck and   
          Stefaan De Winter and   
                    Thomas Maes   Singer $8$-arcs of Mathon type in PG$(2,
                                  2^7)$  . . . . . . . . . . . . . . . . . 17--31
               Lucia Indaco and   
 Gábor Korchmáros   $42$-arcs in PG$(2, q)$ left invariant
                                  by PSL$(2, 7)$ . . . . . . . . . . . . . 33--46
           Ilaria Cardinali and   
                 Antonio Pasini   Two forms related to the symplectic dual
                                  polar space in odd characteristic  . . . 47--60
              B. Temmermans and   
                 J. A. Thas and   
               H. Van Maldeghem   Collineations of polar spaces with
                                  restricted displacements . . . . . . . . 61--80
                  Bart De Bruyn   A decomposition of the universal
                                  embedding space for the near polygon
                                  \mathbb H$_n$  . . . . . . . . . . . . . 81--91
                S. E. Payne and   
                     J. A. Thas   An essay on self-dual generalized
                                  quadrangles  . . . . . . . . . . . . . . 93--103
              Philippe Cara and   
            Alice Devillers and   
            Michael Giudici and   
              Cheryl E. Praeger   Quotients of incidence geometries  . . . 105--128
             S. D. Georgiou and   
                      E. Lappas   Self-dual codes from circulant matrices  129--141
               Ka Hin Leung and   
               Bernhard Schmidt   New restrictions on possible orders of
                                  circulant Hadamard matrices  . . . . . . 143--151
        Marién Abreu and   
           Domenico Labbate and   
                   John Sheehan   Irreducible pseudo $2$-factor isomorphic
                                  cubic bipartite graphs . . . . . . . . . 153--160
Madeline González Muñiz and   
              Rainer Steinwandt   Security of message authentication codes
                                  in the presence of key-dependent
                                  messages . . . . . . . . . . . . . . . . 161--169
         Simon R. Blackburn and   
         Douglas R. Stinson and   
                 Jalaj Upadhyay   On the complexity of the herding attack
                                  and some related attacks on hash
                                  functions  . . . . . . . . . . . . . . . 171--193
          Rainer Steinwandt and   
   Adriana Suárez Corona   Identity-based non-interactive key
                                  distribution with forward security . . . 195--208
           Pascal Marquardt and   
                Pavol Svaba and   
                 Tran van Trung   Pseudorandom number generators based on
                                  random covers for finite groups  . . . . 209--220
              Otokar Grosek and   
             Peter Horák   On quasigroups with few associative
                                  triples  . . . . . . . . . . . . . . . . 221--227

Designs, Codes, and Cryptography
Volume 64, Number 3, September, 2012

                 Xiwang Cao and   
                         Lei Hu   On the reducibility of some composite
                                  polynomials over finite fields . . . . . 229--239
                Shaojing Fu and   
             Kanta Matsuura and   
                    Chao Li and   
                   Longjiang Qu   Construction of highly nonlinear
                                  resilient S-boxes with given degree  . . 241--253
                Anna Y. Pun and   
              Philip P. W. Wong   A geometric proof of a theorem on
                                  antiregularity of generalized
                                  quadrangles  . . . . . . . . . . . . . . 255--263
                 Olof Heden and   
            Juliane Lehmann and   
          Esmeralda Nastase and   
                  Papa Sissokho   Extremal sizes of subspace partitions    265--274
                Denis S. Krotov   On the binary codes with parameters of
                                  triply-shortened $1$-perfect codes . . . 275--283
                   Jianqin Zhou   A counterexample concerning the
                                  $3$-error linear complexity of
                                  $2^n$-periodic binary sequences  . . . . 285--286
             Mahdi Sajadieh and   
       Mohammad Dakhilalian and   
                 Hamid Mala and   
                  Behnaz Omoomi   On construction of involutory MDS
                                  matrices from Vandermonde Matrices in
                                  GF$(2^q)$  . . . . . . . . . . . . . . . 287--308
         Antonio Cossidente and   
                Giuseppe Marino   Hyperovals of Hermitian polar spaces . . 309--314


Designs, Codes, and Cryptography
Volume 65, Number 1--2, October, 2012

           Edwin R. van Dam and   
              Willem H. Haemers   Preface: Geometric and algebraic
                                  combinatorics  . . . . . . . . . . . . . 1--3
                Simeon Ball and   
                   Jan De Beule   On sets of vectors of a finite vector
                                  space in which every subset of basis
                                  size is a basis II . . . . . . . . . . . 5--14
          Dieter Jungnickel and   
            Vladimir D. Tonchev   A Hamada type characterization of the
                                  classical geometric designs  . . . . . . 15--28
       Aleksandar Jurisi\'c and   
                   Janos Vidali   Extremal $1$-codes in distance-regular
                                  graphs of diameter $3$ . . . . . . . . . 29--47
     Alexander L. Gavrilyuk and   
           Alexander A. Makhnev   Distance-regular graphs with
                                  intersection arrays $\{52, 35, 16; 1, 4,
                                  28\}$ and $\{69, 48, 24; 1, 4, 46\}$ do
                                  not exist  . . . . . . . . . . . . . . . 49--54
             Jack H. Koolen and   
                  Jongyook Park   A relationship between the diameter and
                                  the intersection number $c_2$ for a
                                  distance-regular graph . . . . . . . . . 55--63
                A. Blokhuis and   
                  A. E. Brouwer   Spectral characterization of a graph on
                                  the flags of the eleven point biplane    65--69
              Aart Blokhuis and   
         Andries E. Brouwer and   
              Willem H. Haemers   The graph with spectrum $14^1 2^{40}
                                  (-4)^{10} (-6)^9$  . . . . . . . . . . . 71--75
                      Hyonju Yu   On the limit points of the smallest
                                  eigenvalues of regular graphs  . . . . . 77--88
              Hirotake Kurihara   An excess theorem for spherical
                                  $2$-designs  . . . . . . . . . . . . . . 89--98
               Takuya Ikuta and   
               Akihiro Munemasa   Nomura algebras of nonsymmetric Hadamard
                                  models . . . . . . . . . . . . . . . . . 99--106
            Andries Brouwer and   
 Çiçek Güven   The generating rank of the space of
                                  short vectors in the Leech lattice mod
                                  $2$  . . . . . . . . . . . . . . . . . . 107--113
          Hendrik Van Maldeghem   Symplectic polarities of buildings of
                                  type E$_6$ . . . . . . . . . . . . . . . 115--125
                  Bart De Bruyn   The pseudo-hyperplanes and homogeneous
                                  pseudo-embeddings of AG$(n, 4)$ and
                                  PG$(n, 4)$ . . . . . . . . . . . . . . . 127--156
          William M. Kantor and   
                   Tim Penttila   Planes in which every quadrangle lies on
                                  a unique Baer subplane . . . . . . . . . 157--161

Designs, Codes, and Cryptography
Volume 65, Number 3, December, 2012

                K. T. Arasu and   
                 Xiaoyu Liu and   
                   Gary McGuire   Preface: Richard M. Wilson, Special
                                  issue honoring his 65th birthday . . . . 163--164
               Steve Butler and   
                     Ron Graham   A note on marking lines in $[k]^n$ in
                                  honor of Rick Wilson's 65th birthday . . 165--175
                Bahattin Yildiz   A lemma on binomial coefficients and
                                  applications to Lee weights modulo $2^e$
                                  of codes over $\mathbb {Z}_4$  . . . . . 177--185
                A. Blokhuis and   
              A. E. Brouwer and   
                    T. Sz\Honyi   On the chromatic number of $q$-Kneser
                                  graphs . . . . . . . . . . . . . . . . . 187--197
        Charles J. Colbourn and   
             Daniel Horsley and   
                  Chengmin Wang   Trails of triples in partial triple
                                  systems  . . . . . . . . . . . . . . . . 199--212
                 Peter J. Dukes   Coding with injections . . . . . . . . . 213--222
              W. H. Haemers and   
               M. J. P. Peeters   The maximum order of adjacency matrices
                                  of graphs with a given rank  . . . . . . 223--232
                  Noga Alon and   
         Keith E. Mellinger and   
               Dhruv Mubayi and   
        Jacques Verstraëte   The de Bruijn--Erd\Hos theorem for
                                  hypergraphs  . . . . . . . . . . . . . . 233--245
                   Tao Feng and   
                     Fan Wu and   
                     Qing Xiang   Pseudocyclic and non-amorphic fusion
                                  schemes of the cyclotomic association
                                  schemes  . . . . . . . . . . . . . . . . 247--257
         Tom Hòholdt and   
                 Heeralal Janwa   Eigenvalues and expansion of bipartite
                                  graphs . . . . . . . . . . . . . . . . . 259--273
          Fernando Hernando and   
                   Gary McGuire   Proof of a conjecture of Segre and
                                  Bartocci on monomial hyperovals in
                                  projective planes  . . . . . . . . . . . 275--289
                 Daniel J. Katz   On theorems of Delsarte--McEliece and
                                  Chevalley--Warning--Ax--Katz . . . . . . 291--324
          Jeffrey H. Dinitz and   
          Maura B. Paterson and   
         Douglas R. Stinson and   
                   Ruizhong Wei   Constructions for retransmission
                                  permutation arrays . . . . . . . . . . . 325--351
          Niranjan Balachandran   Forbidden configurations and Steiner
                                  designs  . . . . . . . . . . . . . . . . 353--364
               Navin Singhi and   
            D. K. Ray-Chaudhuri   Studying designs via multisets . . . . . 365--381
                       P. Baldi   Boolean autoencoders and hypercube
                                  clustering complexity  . . . . . . . . . 383--403


Designs, Codes, and Cryptography
Volume 66, Number 1--3, January, 2013

               Daniel Augot and   
              Anne Canteaut and   
               Gohar Kyureghyan   Editorial  . . . . . . . . . . . . . . . 1--2
               Eimear Byrne and   
           Marcus Greferath and   
                   Jaume Pernas   Algebraic decoding of negacyclic codes
                                  over $\mathbb{Z}_4$  . . . . . . . . . . 3--16
        Patrick Solé and   
           Jean-Claude Belfiore   Constructive spherical codes near the
                                  Shannon bound  . . . . . . . . . . . . . 17--26
              Thomas Honold and   
                   Ivan Landjev   Non-free extensions of the simplex codes
                                  over a chain ring with four elements . . 27--38
          Michael Kiermaier and   
              Johannes Zwanzger   New ring-linear codes from dualization
                                  in projective Hjelmslev geometries . . . 39--55
        Antonia Wachter-Zeh and   
            Valentin Afanassiev   Fast decoding of Gabidulin codes . . . . 57--73
            Andrey Bogdanov and   
                Kyoji Shibutani   Generalized Feistel networks revisited   75--97
             Alexander Pott and   
                       Yue Zhou   CCZ and EA equivalence between mappings
                                  over finite Abelian groups . . . . . . . 99--109
            Ernst Schulte-Geers   On CCZ-equivalence of addition $ \bmod
                                  2^n $  . . . . . . . . . . . . . . . . . 111--127
            L. A. Bassalygo and   
                 V. A. Zinoviev   On divisibility of exponential sums of
                                  polynomials of special type over fields
                                  of characteristic $2$  . . . . . . . . . 129--143
           Marcus Greferath and   
            Cathy Mc Fadden and   
            Jens Zumbrägel   Characteristics of invariant weights
                                  related to code equivalence over rings   145--156
             Santanu Sarkar and   
                Subhamoy Maitra   Cryptanalytic results on `Dual CRT' and
                                  `Common Prime' RSA . . . . . . . . . . . 157--174
           Andrea Röck and   
                   Kaisa Nyberg   Generalization of Matsui's Algorithm $1$
                                  to linear hull for key-alternating block
                                  ciphers  . . . . . . . . . . . . . . . . 175--193
                  Olav Geil and   
                 Casper Thomsen   Weighted Reed--Muller codes revisited    195--220
               Peter Beelen and   
                    Diego Ruano   Bounding the number of points on a curve
                                  using a generalization of Weierstrass
                                  semigroups . . . . . . . . . . . . . . . 221--230
Ayça Çesmelioglu and   
                 Wilfried Meidl   A construction of bent functions from
                                  plateaued functions  . . . . . . . . . . 231--242
        Sugata Gangopadhyay and   
                Anand Joshi and   
                 Gregor Leander   A new construction of bent functions
                                  based on $\mathbb{Z}$-bent functions . . 243--256
             Wilfried Meidl and   
                 Alev Topuzoglu   Quadratic functions with prescribed
                                  spectra  . . . . . . . . . . . . . . . . 257--273
          Joachim Rosenthal and   
            Anna-Lena Trautmann   A complete characterization of
                                  irreducible cyclic orbit codes and their
                                  Plücker embedding . . . . . . . . . . . . 275--289
             Alain Couvreur and   
                   Iwan Duursma   Evaluation codes from smooth quadric
                                  surfaces and twisted Segr\`e varieties   291--303


Designs, Codes, and Cryptography
Volume 67, Number 1, April, 2013

                Shuhong Gao and   
                 Raymond Heindl   Multivariate public key cryptosystems
                                  from Diophantine equations . . . . . . . 1--18
                     Jie Li and   
             Xiangyong Zeng and   
                Xiaohu Tang and   
                     Chunlei Li   A family of quadriphase sequences of
                                  period $ 4(2^n - 1) $ with low
                                  correlation and large linear span  . . . 19--35
                   Mieko Yamada   Difference sets over Galois rings with
                                  odd extension degrees and characteristic
                                  an even power of $2$ . . . . . . . . . . 37--57
                Yonglin Cao and   
                       Jian Gao   Constructing quasi-cyclic codes from
                                  linear algebra theory  . . . . . . . . . 59--75
                  Deng Tang and   
               Weiguo Zhang and   
                    Xiaohu Tang   Construction of balanced Boolean
                                  functions with high nonlinearity and
                                  good autocorrelation properties  . . . . 77--91
            Dimitri Leemans and   
                B. G. Rodrigues   Binary codes of some strongly regular
                                  subgraphs of the McLaughlin graph  . . . 93--109
               Mausumi Bose and   
                  Aloke Dey and   
                 Rahul Mukerjee   Key predistribution schemes for
                                  distributed sensor networks via block
                                  designs  . . . . . . . . . . . . . . . . 111--136
               John Bamberg and   
            Michael Giudici and   
                Gordon F. Royle   Hemisystems of small flock generalized
                                  quadrangles  . . . . . . . . . . . . . . 137--157

Designs, Codes, and Cryptography
Volume 67, Number 2, May, 2013

              Dina Ghinelli and   
        J. W. P. Hirschfeld and   
              Dieter Jungnickel   Obituary: Daniel R. Hughes (1927--2012)  159--162
              Dina Ghinelli and   
              Dieter Jungnickel   Obituary: Marialuisa J. de Resmini
                                  (1939--2012) . . . . . . . . . . . . . . 163--167
         Motahhareh Gharahi and   
        Massoud Hadian Dehkordi   The complexity of the graph access
                                  structures on six participants . . . . . 169--173
                Huajin Chen and   
                  Tian Tian and   
                     Wenfeng Qi   On the affine equivalence relation
                                  between two classes of Boolean functions
                                  with optimal algebraic immunity  . . . . 175--185
          Ibrahim Özen and   
                      Eda Tekin   Moments of the support weight
                                  distribution of linear codes . . . . . . 187--196
              Fangguo Zhang and   
                      Ping Wang   Speeding up elliptic curve discrete
                                  logarithm computations with point
                                  halving  . . . . . . . . . . . . . . . . 197--208
         Frederik Armknecht and   
       Stefan Katzenbeisser and   
                  Andreas Peter   Group homomorphic encryption:
                                  characterizations, impossibility
                                  results, and applications  . . . . . . . 209--232
                   Kun Wang and   
                   Jianxing Yin   Further results on the existence of
                                  nested orthogonal arrays . . . . . . . . 233--243
               Ian Goldberg and   
            Douglas Stebila and   
               Berkant Ustaoglu   Anonymity and one-way authentication in
                                  key exchange protocols . . . . . . . . . 245--269
                  Hoon Hong and   
               Eunjeong Lee and   
             Hyang-Sook Lee and   
                 Cheol-Min Park   Simple and exact formula for minimum
                                  loop length in Ate$_i$ pairing based on
                                  Brezing--Weng curves . . . . . . . . . . 271--292

Designs, Codes, and Cryptography
Volume 67, Number 3, June, 2013

             Kiyoshi Nagata and   
              Fidel Nemenzo and   
                     Hideo Wada   Mass formula and structure of self-dual
                                  codes over Z2s ${\bf Z}_{2^s}$ . . . . . 293--316
              Zhixiong Chen and   
                      Xiaoni Du   On the linear complexity of binary
                                  threshold sequences derived from Fermat
                                  quotients  . . . . . . . . . . . . . . . 317--323
                  Pinhui Ke and   
                  Jie Zhang and   
                Shengyuan Zhang   On the linear complexity and the
                                  autocorrelation of generalized
                                  cyclotomic binary sequences of length $
                                  2 p^m $  . . . . . . . . . . . . . . . . 325--339
             Kristin Lauter and   
                     Ning Shang   Generating pairing-friendly parameters
                                  for the CM construction of genus $2$
                                  curves over prime fields . . . . . . . . 341--355
              Orr Dunkelman and   
                  Nathan Keller   Cryptanalysis of the Stream Cipher LEX   357--373
                Luca Giuzzi and   
                 Valentina Pepe   Families of twisted tensor product codes 375--384
          Neil I. Gillespie and   
              Cheryl E. Praeger   Neighbour transitivity on codes in
                                  Hamming graphs . . . . . . . . . . . . . 385--393
            Jaime Gutierrez and   
         Álvar Ibeas and   
Domingo Gómez-Pérez and   
            Igor E. Shparlinski   Predicting masked linear pseudorandom
                                  number generators over finite fields . . 395--402


Designs, Codes, and Cryptography
Volume 68, Number 1--3, July, 2013

                D. Ghinelli and   
        J. W. P. Hirschfeld and   
              D. Jungnickel and   
                     J. A. Thas   Editorial: Finite geometries . . . . . . 1--2
                   Jan De Beule   On large maximal partial ovoids of the
                                  parabolic quadric $ Q(4, q) $  . . . . . 3--10
               L. Beukemann and   
                      K. Metsch   Small tight sets of hyperbolic quadrics  11--24
              Peter Sziklai and   
         Geertrui Van de Voorde   A small minimal blocking set in $ {\rm
                                  PG}(n, p^t) $, spanning a $ (t - 1)
                                  $-space, is linear . . . . . . . . . . . 25--32
                 Morgan Rodgers   Cameron--Liebler line classes  . . . . . 33--37
                 David G. Glynn   Permanent formulae from the Veronesean   39--47
               Anton Betten and   
               Eun Ju Cheon and   
             Seon Jeong Kim and   
                 Tatsuya Maruta   Three families of multiple blocking sets
                                  in Desarguesian projective planes of
                                  even order . . . . . . . . . . . . . . . 49--59
          Massimo Giulietti and   
 Gábor Korchmáros   Arcs in $ {\rm AG} (2, q) $ determining
                                  few directions . . . . . . . . . . . . . 61--72
          Massimo Giulietti and   
Gábor Korchmáros and   
          Stefano Marcugini and   
             Fernanda Pambianco   Transitive $ A_6 $-invariant $k$-arcs in
                                  $ {\rm PG}(2, q) $ . . . . . . . . . . . 73--79
               Ulrich Dempwolff   More translation planes and semifields
                                  from Dembowski--Ostrom polynomials . . . 81--103
              Thomas Honold and   
              Michael Kiermaier   The existence of maximal $ (q^2, 2)
                                  $-arcs in projective Hjelmslev planes
                                  over chain rings of length $2$ and odd
                                  prime characteristic . . . . . . . . . . 105--126
              Carmen Amarra and   
            Michael Giudici and   
              Cheryl E. Praeger   Symmetric diameter two graphs with
                                  affine-type vertex-quasiprimitive
                                  automorphism group . . . . . . . . . . . 127--139
               Yu Qing Chen and   
                       Tao Feng   Abelian and non-abelian Paley type group
                                  schemes  . . . . . . . . . . . . . . . . 141--154
               John Polhill and   
             James A. Davis and   
                      Ken Smith   A new product construction for partial
                                  difference sets  . . . . . . . . . . . . 155--161
          Dieter Jungnickel and   
            Vladimir D. Tonchev   New invariants for incidence structures  163--177
                  Kris Coolsaet   On the classification of nonsingular $ 2
                                  \times 2 \times 2 \times 2 $ hypercubes  179--194
                 David G. Glynn   Nonfactorizable nonsingular hypercubes   195--203
                 Michel Lavrauw   Finite semifields and nonsingular
                                  tensors  . . . . . . . . . . . . . . . . 205--227
           Ilaria Cardinali and   
                 Antonio Pasini   On certain forms and quadrics related to
                                  symplectic dual polar spaces in
                                  characteristic $2$ . . . . . . . . . . . 229--258
                  Bart De Bruyn   The pseudo-hyperplanes and homogeneous
                                  pseudo-embeddings of the generalized
                                  quadrangles of order $ (3, t) $  . . . . 259--284


Designs, Codes, and Cryptography
Volume 69, Number 1, October, 2013

                Luk Bettale and   
     Jean-Charles Faug\`ere and   
                 Ludovic Perret   Cryptanalysis of HFE, multi-HFE and
                                  variants for odd and even characteristic 1--52
                  Gang Chen and   
                       Ruihu Li   Ternary self-orthogonal codes of dual
                                  distance three and ternary quantum codes
                                  of distance three  . . . . . . . . . . . 53--63
               Xiande Zhang and   
                     Gennian Ge   A new existence proof for Steiner
                                  quadruple systems  . . . . . . . . . . . 65--76
     Pantelimon St\uanic\ua and   
             Thor Martinsen and   
        Sugata Gangopadhyay and   
            Brajesh Kumar Singh   Bent and generalized bent Boolean
                                  functions  . . . . . . . . . . . . . . . 77--94
             Derek H. Smith and   
             Roberto Montemanni   Permutation codes with specified packing
                                  radius . . . . . . . . . . . . . . . . . 95--106
                 Todd D. Mateer   Simple algorithms for decoding
                                  systematic Reed--Solomon codes . . . . . 107--121
                 C. Munuera and   
        A. Sepúlveda and   
                      F. Torres   Generalized Hermitian codes  . . . . . . 123--130
          Fernando Hernando and   
              Kyle Marshall and   
          Michael E. O'Sullivan   The dimension of subcode-subfields of
                                  shortened generalized Reed--Solomon
                                  codes  . . . . . . . . . . . . . . . . . 131--142

Designs, Codes, and Cryptography
Volume 69, Number 2, November, 2013

                G. Lunardon and   
                  G. Marino and   
               O. Polverino and   
                   R. Trombetti   A remark on symplectic semifield planes
                                  and $ Z_4 $-linear codes . . . . . . . . 143--149
                 Nikolay Yankov   New optimal $ [52, 26, 10] $ self-dual
                                  codes  . . . . . . . . . . . . . . . . . 151--159
    E. Martínez-Moro and   
A. Piñera-Nicolás and   
               I. F. Rúa   Additive semisimple multivariable codes
                                  over $ {\mathbb {F}_4} $ . . . . . . . . 161--180
            Sylvain Gravier and   
               Matjaz Kovse and   
             Michel Mollard and   
              Julien Moncel and   
                  Aline Parreau   New results on variants of covering
                                  codes in Sierpi\'nski graphs . . . . . . 181--188
          R. Julian R. Abel and   
                Diana Combe and   
           Adrian M. Nelson and   
              William D. Palmer   GBRDs over supersolvable groups and
                                  solvable groups of order prime to $3$    189--201
         Aleksandr Tuxanidy and   
                     Qiang Wang   Composed products and factors of
                                  cyclotomic polynomials over finite
                                  fields . . . . . . . . . . . . . . . . . 203--231
                   Liqin Hu and   
                        Qin Yue   Gauss periods and codebooks from
                                  generalized cyclotomic sets of order
                                  four . . . . . . . . . . . . . . . . . . 233--246
                   Fang Liu and   
               Daiyuan Peng and   
             Zhengchun Zhou and   
                    Xiaohu Tang   A new frequency-hopping sequence set
                                  based upon generalized cyclotomy . . . . 247--259

Designs, Codes, and Cryptography
Volume 69, Number 3, December, 2013

              Dieter Jungnickel   Obituary: Hanfried Lenz (1916--2013) . . 261--263
                  Tengyu Ma and   
               Xiaoming Sun and   
                    Huacheng Yu   On a conjecture of Butler and Graham . . 265--274
             Zhuojun Zhuang and   
                   Yuan Luo and   
                        Bin Dai   Code constructions and existence bounds
                                  for relative generalized Hamming weight  275--297
                 Ichiro Shimada   A note on rational normal curves totally
                                  tangent to a Hermitian variety . . . . . 299--303
                   O. Heden and   
                 J. Lehmann and   
                 E. Nastase and   
                    P. Sissokho   The supertail of a subspace partition    305--316
           N. Rajesh Pillai and   
                     S. S. Bedi   Algebraic attacks on a class of stream
                                  ciphers with unknown output function . . 317--330
           Alexis Bonnecaze and   
             Pierre Liardet and   
              Alexandre Venelli   AES side-channel countermeasure using
                                  random tower field constructions . . . . 331--349
                  Palash Sarkar   A new multi-linear universal hash family 351--367
          Marjan Bazrafshan and   
                 Tran van Trung   Improved bounds for separating hash
                                  families . . . . . . . . . . . . . . . . 369--382


Designs, Codes, and Cryptography
Volume 70, Number 1--2, January, 2014

             Joaquim Borges and   
         Merc\`e Villanueva and   
                Victor Zinoviev   Editorial: 3rd International Castle
                                  Meeting on Coding Theory and
                                  Applications . . . . . . . . . . . . . . 1--2
                David Auger and   
        Gérard Cohen and   
                 Sihem Mesnager   Sphere coverings and identifying codes   3--7
                   Sabine Kampf   Bounds on collaborative decoding of
                                  interleaved Hermitian codes and virtual
                                  extension  . . . . . . . . . . . . . . . 9--25
          Padmapani Seneviratne   Codes associated with circulant graphs
                                  and permutation decoding . . . . . . . . 27--33
                D. Ghinelli and   
                  J. D. Key and   
                T. P. McDonough   Hulls of codes from incidence matrices
                                  of connected regular graphs  . . . . . . 35--54
         Vladimir Sidorenko and   
                 Martin Bossert   Fast skew-feedback shift-register
                                  synthesis  . . . . . . . . . . . . . . . 55--67
             Anton Malevich and   
               Wolfgang Willems   On the classification of the extremal
                                  self-dual codes over small fields with
                                  $2$-transitive automorphism groups . . . 69--76
                  C. Araujo and   
                  I. Dejter and   
                       P. Horak   A generalization of Lee codes  . . . . . 77--90
           Kathryn Haymaker and   
            Christine A. Kelley   Geometric WOM codes and coding
                                  strategies for multilevel flash memories 91--104
               Jaume Pernas and   
                Jaume Pujol and   
             Merc\`e Villanueva   Characterization of the automorphism
                                  group of quaternary linear Hadamard
                                  codes  . . . . . . . . . . . . . . . . . 105--115
   Maria Bras-Amorós and   
               Albert Vico-Oton   On the Geil--Matsumoto bound and the
                                  length of AG codes . . . . . . . . . . . 117--125
                 Thomas Feulner   Classification and nonexistence results
                                  for linear codes with prescribed minimum
                                  distances  . . . . . . . . . . . . . . . 127--138
             Joaquim Borges and   
               Josep Rif\`a and   
                Victor Zinoviev   New families of completely regular codes
                                  and their corresponding distance regular
                                  coset graphs . . . . . . . . . . . . . . 139--148
               M. Tomlinson and   
                  M. Jibril and   
                   C. Tjhai and   
                  M. Grassl and   
                    M. Z. Ahmed   New binary codes from extended Goppa
                                  codes  . . . . . . . . . . . . . . . . . 149--156
     Fernando Piñero and   
                 Heeralal Janwa   On the subfield subcodes of Hermitian
                                  codes  . . . . . . . . . . . . . . . . . 157--173
José Joaquín Bernal and   
       Juan Jacobo Simón   Information sets in abelian codes:
                                  defining sets and Groebner basis . . . . 175--188
                 C. Galindo and   
                   F. Monserrat   Evaluation codes defined by finite
                                  families of plane valuations at infinity 189--213
Irene Márquez-Corbella and   
 Edgar Martínez-Moro and   
                 Ruud Pellikaan   On the unique representation of very
                                  strong algebraic geometry codes  . . . . 215--230
                  Eraj Khan and   
            Ernst Gabidulin and   
              Bahram Honary and   
                   Hassan Ahmed   Modified Niederreiter type of GPT
                                  cryptosystem based on reducible rank
                                  codes  . . . . . . . . . . . . . . . . . 231--239
                Telma Pinho and   
               Raquel Pinto and   
                    Paula Rocha   Realization of $2$D convolutional codes
                                  of rate $ \frac {1}{n} $ by separable
                                  Roesser models . . . . . . . . . . . . . 241--250

Designs, Codes, and Cryptography
Volume 70, Number 3, March, 2014

              Kota Ideguchi and   
          Elmar Tischhauser and   
                   Bart Preneel   Internal differential collision attacks
                                  on the reduced-round Gròstl-0 hash
                                  function . . . . . . . . . . . . . . . . 251--271
                      Junhua Wu   Proofs of two conjectures on the
                                  dimensions of binary codes . . . . . . . 273--304
                Soohak Choi and   
             Jong Yoon Hyun and   
                 Hyun Kwang Kim   Local duality theorem for $q$-ary
                                  $1$-perfect codes  . . . . . . . . . . . 305--311
              Myung-Kyu Lee and   
               Kyeongcheol Yang   The exponent of a polarizing matrix
                                  constructed from the Kronecker product   313--322
             Javier Herranz and   
             Alexandre Ruiz and   
      Germán Sáez   Signcryption schemes with threshold
                                  unsigncryption, and applications . . . . 323--345
               Aicha Batoul and   
               Kenza Guenda and   
              T. Aaron Gulliver   On self-dual cyclic codes over finite
                                  chain rings  . . . . . . . . . . . . . . 347--358
            Qun-Xiong Zheng and   
                Wen-Feng Qi and   
                      Tian Tian   On the distinctness of modular
                                  reductions of primitive sequences over $
                                  Z / (2^{32} - 1) $ . . . . . . . . . . . 359--368
            Andrey Bogdanov and   
                 Vincent Rijmen   Linear hulls with correlation zero and
                                  linear cryptanalysis of block ciphers    369--383
        Ferruh Özbudak and   
   Burcu Gülmez Temür   Finite number of fibre products of
                                  Kummer covers and curves with many
                                  points over finite fields  . . . . . . . 385--404
                 D. Boucher and   
                       F. Ulmer   Linear codes using skew polynomials with
                                  automorphisms and derivations  . . . . . 405--431


Designs, Codes, and Cryptography
Volume 71, Number 1, April, 2014

              Aart Blokhuis and   
         Andries E. Brouwer and   
                    Attila Sali   Note on the size of binary Armstrong
                                  codes  . . . . . . . . . . . . . . . . . 1--4
      Hiram H. López and   
Carlos Rentería-Márquez and   
           Rafael H. Villarreal   Affine cartesian codes . . . . . . . . . 5--19
                 D. Bartoli and   
                M. De Boeck and   
                  S. Fanali and   
                      L. Storme   On the functional codes defined by
                                  quadrics and Hermitian varieties . . . . 21--46
                 Guangfu Wu and   
            Hsin-Chiu Chang and   
                   Lin Wang and   
                   T. K. Truong   Constructing rate $ 1 / p $ systematic
                                  binary quasi-cyclic codes based on the
                                  matroid theory . . . . . . . . . . . . . 47--56
                N. P. Smart and   
                 F. Vercauteren   Fully homomorphic SIMD operations  . . . 57--81
            Thijs Laarhoven and   
                 Benne de Weger   Optimal symmetric Tardos traitor tracing
                                  schemes  . . . . . . . . . . . . . . . . 83--103
                    P. Loidreau   Asymptotic behaviour of codes in rank
                                  metric over finite fields  . . . . . . . 105--118
            Anuradha Sharma and   
                 Amit K. Sharma   On some new $m$-spotty Lee weight
                                  enumerators  . . . . . . . . . . . . . . 119--152
                S. Arumugam and   
              R. Lakshmanan and   
                Atulya K. Nagar   On ( $k$, n )*-visual cryptography
                                  scheme . . . . . . . . . . . . . . . . . 153--162
                  Tian Tian and   
                    Wen-Feng Qi   On the largest affine sub-families of a
                                  family of NFSR sequences . . . . . . . . 163--181

Designs, Codes, and Cryptography
Volume 71, Number 2, May, 2014

                  Sihong Su and   
                    Xiaohu Tang   Construction of rotation symmetric
                                  Boolean functions with optimal algebraic
                                  immunity and high nonlinearity . . . . . 183--199
                    Yun Fan and   
                   San Ling and   
                    Hongwei Liu   Matrix product codes over finite
                                  commutative Frobenius rings  . . . . . . 201--227
              Alexander Zeh and   
               Sergey Bezzateev   A new bound on the minimum distance of
                                  cyclic codes using
                                  small-minimum-distance cyclic codes  . . 229--246
               Tomas Nilson and   
                  Pia Heidtmann   Inner balance of symmetric designs . . . 247--260
        Antonia Wachter-Zeh and   
              Alexander Zeh and   
                 Martin Bossert   Decoding interleaved Reed--Solomon codes
                                  beyond their joint error-correcting
                                  capability . . . . . . . . . . . . . . . 261--281
                Peter Dukes and   
                    Leah Howard   Group divisible designs in MOLS of order
                                  ten  . . . . . . . . . . . . . . . . . . 283--291
                Reza Sepahi and   
              Ron Steinfeld and   
                 Josef Pieprzyk   Lattice-based completely non-malleable
                                  public-key encryption in the standard
                                  model  . . . . . . . . . . . . . . . . . 293--313
                 Peipei Dai and   
               Jianmin Wang and   
                   Jianxing Yin   Combinatorial constructions for optimal
                                  $2$-D optical orthogonal codes with
                                  AM--OPPTS property . . . . . . . . . . . 315--330
                Caixue Zhou and   
                   Wan Zhou and   
                     Xiwei Dong   Provable certificateless generalized
                                  signcryption scheme  . . . . . . . . . . 331--346
                   Jie Chen and   
               Hoon Wei Lim and   
                   San Ling and   
                  Huaxiong Wang   The relation and transformation between
                                  hierarchical inner product encryption
                                  and spatial encryption . . . . . . . . . 347--364

Designs, Codes, and Cryptography
Volume 71, Number 3, June, 2014

                Mingzhi Zhu and   
                     Gennian Ge   Room squares with super-simple property  365--381
           Vladimir Anashin and   
          Andrei Khrennikov and   
               Ekaterina Yurova   $T$-functions revisited: new criteria
                                  for bijectivity/transitivity . . . . . . 383--407
               Christophe Petit   Towards factoring in $ {\rm SL}(2,
                                  \mathbb {F}_{2^n}) $ . . . . . . . . . . 409--431
          Maura B. Paterson and   
             Douglas R. Stinson   A unified approach to combinatorial key
                                  predistribution schemes for sensor
                                  networks . . . . . . . . . . . . . . . . 433--457
             Johannes Braun and   
          Johannes Buchmann and   
              Ciaran Mullan and   
                 Alex Wiesmaier   Long term confidentiality: a survey  . . 459--478
               Anthony B. Evans   Mutually orthogonal Latin squares based
                                  on general linear groups . . . . . . . . 479--492
                 Nam Yul Yu and   
                 Keqin Feng and   
                   Aixian Zhang   A new class of near-optimal partial
                                  Fourier codebooks from an almost
                                  difference set . . . . . . . . . . . . . 493--501
               Klara Stokes and   
                 Oriol Farr\`as   Linear spaces and transversal designs:
                                  $k$-anonymous combinatorial
                                  configurations for anonymous database
                                  search notes . . . . . . . . . . . . . . 503--524
               Klara Stokes and   
                 Oriol Farr\`as   Erratum to: Linear spaces and
                                  transversal designs: $ (k)$-anonymous
                                  combinatorial configurations for
                                  anonymous database search  . . . . . . . 525--525
               Wakaha Ogata and   
                 Hiroshi Eguchi   Cheating detectable threshold scheme
                                  against most powerful cheaters for long
                                  secrets  . . . . . . . . . . . . . . . . 527--539
              S. G. Barwick and   
                 Wen-Ai Jackson   A characterisation of tangent subplanes
                                  of $ {\rm PG}(2, q^3) $  . . . . . . . . 541--545


Designs, Codes, and Cryptography
Volume 72, Number 1, July, 2014

               John Bamberg and   
               Jan De Beule and   
             Nicola Durante and   
                 Michel Lavrauw   Editorial: Special issue on finite
                                  geometries in honor of Frank De Clerck   1--5
              Dina Ghinelli and   
          Dieter Jungnickel and   
                   Klaus Metsch   Remarks on polarity designs  . . . . . . 7--19
                A. Blokhuis and   
                M. De Boeck and   
                F. Mazzocca and   
                      L. Storme   The Kakeya problem: a gap in the
                                  spectrum and classification of the
                                  smallest examples  . . . . . . . . . . . 21--31
                  S. Rottey and   
                      L. Storme   Maximal partial line spreads of
                                  non-singular quadrics  . . . . . . . . . 33--51
Gábor Korchmáros and   
                    Nicola Pace   Coset intersection of irreducible plane
                                  cubics . . . . . . . . . . . . . . . . . 53--75
               Maarten De Boeck   The largest Erd\Hos--Ko--Rado sets of
                                  planes in finite projective and finite
                                  classical polar spaces . . . . . . . . . 77--117
                  Kris Coolsaet   Some large partial ovoids of $ (Q^{-(5,
                                  q)}) $ for odd $q$ . . . . . . . . . . . 119--128
            Daniele Bartoli and   
          Stefano Marcugini and   
             Fernanda Pambianco   The non-existence of some NMDS codes and
                                  the extremal sizes of complete $ (n,
                                  3)$-arcs in $ {\rm PG}(2, 16)$ . . . . . 129--134
             Giorgio Donati and   
             Nicola Durante and   
           Alessandro Siciliano   On unitals in $ {\rm PG}(2, q^2) $
                                  stabilized by a homology group . . . . . 135--139
        Max Neunhöffer and   
              Cheryl E. Praeger   Sporadic neighbour-transitive codes in
                                  Johnson graphs . . . . . . . . . . . . . 141--152
           Gábor P. Nagy   Linear groups as right multiplication
                                  groups of quasifields  . . . . . . . . . 153--164
            Dean Crnkovi\'c and   
              Willem H. Haemers   Walk-regular divisible design graphs . . 165--175
                    Simeon Ball   A $p$-adic condition on the weight of a
                                  codeword of a linear code  . . . . . . . 177--183
             Nicola Durante and   
           Alessandro Siciliano   Some blocking semiovals of homology type
                                  in planes of square order  . . . . . . . 185--193

Designs, Codes, and Cryptography
Volume 72, Number 2, August, 2014

                     Alan J. Aw   The multicovering radius problem for
                                  some types of discrete structures  . . . 195--209
         Antonio Cossidente and   
            Giuseppe Marino and   
                   Tim Penttila   Relative symplectic subquadrangle
                                  hemisystems of the Hermitian surface . . 211--217
             Zhuojun Zhuang and   
                    Bin Dai and   
                   Yuan Luo and   
                A. J. Han Vinck   On the relative profiles of a linear
                                  code and a subcode . . . . . . . . . . . 219--247
               Yongqiang Li and   
                 Mingsheng Wang   Constructing differentially $4$-uniform
                                  permutations over $ {\rm GF}(2^{2m})$
                                  from quadratic APN permutations over $
                                  {\rm GF}(2^{2 m + 1})$ . . . . . . . . . 249--264
              Stanley Payne and   
                 Morgan Rodgers   Double $k$-sets in symplectic
                                  generalized quadrangles  . . . . . . . . 265--271
             Jong Yoon Hyun and   
                Heisook Lee and   
                    Yoonjin Lee   Boolean functions with MacWilliams
                                  duality  . . . . . . . . . . . . . . . . 273--287
                Hung-Lin Fu and   
               Yuan-Hsun Lo and   
                Kenneth W. Shum   Optimal conflict-avoiding codes of odd
                                  length and weight three  . . . . . . . . 289--309
         Ferdinand Ihringer and   
                   Klaus Metsch   On the maximum size of Erd\Hos--Ko--Rado
                                  sets in $ H(2 d + 1, q^2) $  . . . . . . 311--316
               Carl Bracken and   
             Faruk Göloglu   A non-cyclic triple-error-correcting
                                  BCH-like code and some minimum distance
                                  results  . . . . . . . . . . . . . . . . 317--330
                    Jay A. Wood   Relative one-weight linear codes . . . . 331--344
              C. M. Swanson and   
                  D. R. Stinson   Combinatorial solutions providing
                                  improved security for the generalized
                                  Russian cards problem  . . . . . . . . . 345--367
                     Ce Shi and   
                   Jianxing Yin   Existence of super-simple $ {\rm
                                  OA}_\lambda (3, 5, v)^\prime s $ . . . . 369--380
                Megan Adams and   
                      Junhua Wu   $2$-Ranks of incidence matrices
                                  associated with conics in finite
                                  projective planes  . . . . . . . . . . . 381--404
                    Tuvi Etzion   Covering of subspaces by subspaces . . . 405--421
                  Wenli Ren and   
                Fang-Wei Fu and   
                 Zhengchun Zhou   New sets of frequency-hopping sequences
                                  with optimal Hamming correlation . . . . 423--434
            S. T. Dougherty and   
C. Fernández-Córdoba   $ \mathbb {Z}_2 \mathbb {Z}_4 $-Additive
                                  formally self-dual codes . . . . . . . . 435--453
                 Angelo Sonnino   Transitive $ {\rm PSL}(2, 7) $-invariant
                                  $ 42$-arcs in $3$-dimensional projective
                                  spaces . . . . . . . . . . . . . . . . . 455--463
           Vedran Krcadinac and   
            Anamari Naki\'c and   
         Mario Osvin Pavcevi\'c   Equations for coefficients of tactical
                                  decomposition matrices for $t$-designs   465--469
             Trygve Johnsen and   
                 Hugues Verdure   Stanley--Reisner resolution of constant
                                  weight linear codes  . . . . . . . . . . 471--481

Designs, Codes, and Cryptography
Volume 72, Number 3, September, 2014

                    Yonglin Cao   A class of $1$-generator repeated root
                                  quasi-cyclic codes . . . . . . . . . . . 483--496
                Hengjia Wei and   
                     Gennian Ge   Kirkman frames having hole type $ h^u
                                  m^1 $ for $ h \equiv 0 \bmod 12 $  . . . 497--510
                 Maosheng Xiong   The weight distributions of a class of
                                  cyclic codes II  . . . . . . . . . . . . 511--528
          Naoyuki Horiguchi and   
           Tsuyoshi Miezaki and   
              Hiroyuki Nakasora   On the support designs of extremal
                                  binary doubly even self-dual codes . . . 529--537
               Ka Hin Leung and   
                     Siu Lun Ma   Proper circulant weighing matrices of
                                  weight $ p^2 $ . . . . . . . . . . . . . 539--550
               Ivan Landjev and   
                 Assia Rousseva   On the sharpness of Bruen's bound for
                                  intersection sets in Desarguesian affine
                                  spaces . . . . . . . . . . . . . . . . . 551--558
       Yasemin Cengellenmis and   
            Abdullah Dertli and   
                S. T. Dougherty   Codes over an infinite family of rings
                                  with a Gray map  . . . . . . . . . . . . 559--580
              Cunsheng Ding and   
             Alexander Pott and   
                        Qi Wang   Constructions of almost difference sets
                                  from finite fields . . . . . . . . . . . 581--592
                   Siyu Liu and   
         Felice Manganiello and   
           Frank R. Kschischang   Kötter interpolation in skew polynomial
                                  rings  . . . . . . . . . . . . . . . . . 593--608
                 James Berg and   
                  Max Wakefield   Skeleton simplicial evaluation codes . . 609--625
                Yutaka Hiramine   On the non-existence of maximal
                                  difference matrices of deficiency $1$    627--635
             Victoria Horan and   
                 Glenn Hurlbert   $1$-Overlap cycles for Steiner triple
                                  systems  . . . . . . . . . . . . . . . . 637--651
                  Sihong Su and   
                Xiaohu Tang and   
                 Xiangyong Zeng   A systematic method of constructing
                                  Boolean functions with optimal algebraic
                                  immunity based on the generator matrix
                                  of the Reed--Muller code . . . . . . . . 653--673
                     Vikram Jha   The Ubiquity of the Orders of Fractional
                                  Semifields of Even Characteristic  . . . 675--686
                 Nicholas Coxon   List decoding of number field codes  . . 687--711
                 Tran van Trung   A tight bound for frameproof codes
                                  viewed in terms of separating hash
                                  families . . . . . . . . . . . . . . . . 713--718
           Christoph Hering and   
              Andreas Krebs and   
                   Thomas Edgar   Naive configurations . . . . . . . . . . 719--731
     Jürgen Bierbrauer and   
            Daniele Bartoli and   
              Giorgio Faina and   
          Stefano Marcugini and   
         Fernanda Pambianco and   
                      Yves Edel   The structure of quaternary quantum caps 733--747
               Kenza Guenda and   
          T. Aaron Gulliver and   
         S. Arash Sheikholeslam   Lexicodes over rings . . . . . . . . . . 749--763


Designs, Codes, and Cryptography
Volume 73, Number 1, October, 2014

          Robert A. Liebler and   
              Cheryl E. Praeger   Neighbour-transitive codes in Johnson
                                  graphs . . . . . . . . . . . . . . . . . 1--25
            Henning Stichtenoth   A note on composed products of
                                  polynomials over finite fields . . . . . 27--32
              Naoki Chigira and   
             Masaaki Harada and   
               Masaaki Kitazume   On the classification of extremal doubly
                                  even self-dual codes with $2$-transitive
                                  automorphism groups  . . . . . . . . . . 33--35
               Hui-Chuan Lu and   
                    Hung-Lin Fu   The exact values of the optimal average
                                  information ratio of perfect
                                  secret-sharing schemes for tree-based
                                  access structures  . . . . . . . . . . . 37--46
                Tohru Nakashima   Construction of codes from Arakelov
                                  geometry . . . . . . . . . . . . . . . . 47--54
               Jianqin Zhou and   
                    Wanquan Liu   The $k$-error linear complexity
                                  distribution for $ 2^n$-periodic binary
                                  sequences  . . . . . . . . . . . . . . . 55--75
                Wayne Broughton   Admissible parameters of symmetric
                                  designs satisfying $ v = 4 (k - \lambda)
                                  + 2 $ and symmetric designs with inner
                                  balance  . . . . . . . . . . . . . . . . 77--83
               Jialin Huang and   
                     Xuejia Lai   Revisiting key schedule's diffusion in
                                  relation with round function's diffusion 85--103
           Bernhard Schmidt and   
                  Ming Ming Tan   Construction of relative difference sets
                                  and Hadamard groups  . . . . . . . . . . 105--119
                   Bart Mennink   On the collision and preimage security
                                  of MDC-4 in the ideal cipher model . . . 121--150
        Steven T. Dougherty and   
      Esengül Saltürk   Counting codes over rings  . . . . . . . 151--165
                   Xing Liu and   
               Daiyuan Peng and   
                     Hongyu Han   Low-hit-zone frequency hopping sequence
                                  sets with optimal partial Hamming
                                  correlation properties . . . . . . . . . 167--176
               Bogdan Groza and   
               Bogdan Warinschi   Cryptographic puzzles and DoS
                                  resilience, revisited  . . . . . . . . . 177--207
               Petr Lisonek and   
                      Hui Yi Lu   Bent functions on partial spreads  . . . 209--216
         Antonio Cossidente and   
               Francesco Pavese   New infinite families of hyperovals on $
                                  \mathcal H(3, q^2), q $ odd  . . . . . . 217--222
              Jianying Fang and   
               Junling Zhou and   
                   Yanxun Chang   Nonexistence of some quantum jump codes
                                  with specified parameters  . . . . . . . 223--235
                    Nian Li and   
                Xiaohu Tang and   
                  Tor Helleseth   New $M$-ary sequences with low
                                  autocorrelation from interleaved
                                  technique  . . . . . . . . . . . . . . . 237--249
                    Huaning Liu   A family of elliptic curve pseudorandom
                                  binary sequences . . . . . . . . . . . . 251--265
                      Olav Geil   Erratum to: On the second weight of
                                  generalized Reed--Muller codes . . . . . 267--267

Designs, Codes, and Cryptography
Volume 73, Number 2, November, 2014

            Lilya Budaghyan and   
              Tor Helleseth and   
                 Matthew Parker   Editorial: special issue on coding and
                                  cryptography . . . . . . . . . . . . . . 269--269
     Stéphane Ballet and   
                 Robert Rolland   On low weight codewords of generalized
                                  affine and projective Reed--Muller codes 271--297
              Claude Carlet and   
                 Andrew Klapper   On the arithmetic Walsh coefficients of
                                  Boolean functions  . . . . . . . . . . . 299--318
     Gottlieb Isabel Pirsic and   
                 Arne Winterhof   On discrete Fourier transform,
                                  ambiguity, and Hamming-autocorrelation
                                  of pseudorandom sequences  . . . . . . . 319--328
       Torleiv Klòve and   
                 Moshe Schwartz   Linear covering codes and
                                  error-correcting codes for
                                  limited-magnitude errors . . . . . . . . 329--354
              Felix Fontein and   
          Michael Schneider and   
                     Urs Wagner   PotLLL: a polynomial time version of LLL
                                  with deep insertions . . . . . . . . . . 355--368
             Hyun Kwang Kim and   
                Phan Thanh Toan   New inequalities for $q$-ary
                                  constant-weight codes  . . . . . . . . . 369--381
                 Santanu Sarkar   Small secret exponent attack on RSA
                                  variant with modulus $ N = p^r q $ . . . 383--392
          Joachim Rosenthal and   
        Natalia Silberstein and   
            Anna-Lena Trautmann   On the geometry of balls in the
                                  Grassmannian and list decoding of lifted
                                  Gabidulin codes  . . . . . . . . . . . . 393--416
               Petr Lisonek and   
               Vijaykumar Singh   Quantum codes from nearly
                                  self-orthogonal quaternary linear codes  417--424
             Soon Sheng Ong and   
Frédérique Oggier   Wiretap lattice codes from number fields
                                  with no small norm elements  . . . . . . 425--440
  Wittawat Kositwattanarerk and   
Frédérique Oggier   Connections between Construction $D$ and
                                  related constructions of lattices  . . . 441--455
        Ferruh Özbudak and   
       Zülfükar Saygi   On the exact number of solutions of
                                  certain linearized equations . . . . . . 457--468
                  Elena Dubrova   Generation of full cycles by a
                                  composition of NLFSRs  . . . . . . . . . 469--486
     Céline Blondeau and   
              Léo Perrin   More differentially $6$-uniform power
                                  functions  . . . . . . . . . . . . . . . 487--505
        Johan S. R. Nielsen and   
                  Alexander Zeh   Multi-trial Guruswami--Sudan decoding
                                  for generalised Reed--Solomon codes  . . 507--527
     Mahabir Prasad Jhanwar and   
     Ayineedi Venkateswarlu and   
          Reihaneh Safavi-Naini   Paillier-based publicly verifiable
                                  (non-interactive) secret sharing . . . . 529--546
        Antonia Wachter-Zeh and   
                  Alexander Zeh   List and unique error-erasure decoding
                                  of interleaved Gabidulin codes with
                                  interpolation techniques . . . . . . . . 547--570
                  Wenhui Li and   
         Vladimir Sidorenko and   
                   Danilo Silva   On transform-domain error and erasure
                                  correction by Gabidulin codes  . . . . . 571--586
                   Yuyin Yu and   
             Mingsheng Wang and   
                   Yongqiang Li   A matrix approach for constructing
                                  quadratic APN functions  . . . . . . . . 587--600

Designs, Codes, and Cryptography
Volume 73, Number 3, December, 2014

                 Weiwei Cao and   
                         Lei Hu   Projective interpolation of polynomial
                                  vectors and improved key recovery attack
                                  on SFLASH  . . . . . . . . . . . . . . . 719--730
                   Jie Chen and   
               Hoon Wei Lim and   
                   San Ling and   
                      Le Su and   
                  Huaxiong Wang   Spatial encryption supporting
                                  non-monotone access structure  . . . . . 731--746
               Xiaogang Liu and   
                       Yuan Luo   The weight distributions of some cyclic
                                  codes with three or four nonzeros over $
                                  \mathbb F_3 $  . . . . . . . . . . . . . 747--768
              Jianying Fang and   
                   Yanxun Chang   Mutually disjoint $t$-designs and
                                  $t$-SEEDs from extremal doubly-even
                                  self-dual codes  . . . . . . . . . . . . 769--780
                 Miao Liang and   
                Mingchao Li and   
                    Beiliang Du   A construction for $t$-fold perfect
                                  authentication codes with arbitration    781--790
                 Wenping Ma and   
                Chun-e Zhao and   
                    Dongsu Shen   New optimal constructions of
                                  conflict-avoiding codes of odd length
                                  and weight $3$ . . . . . . . . . . . . . 791--804
                 Yiling Lin and   
                 Masakazu Jimbo   Extremal properties of $t$-SEEDs and
                                  recursive constructions  . . . . . . . . 805--823
                   Tao Feng and   
                 Sihuang Hu and   
                 Shuxing Li and   
                     Gennian Ge   Difference sets with few character
                                  values . . . . . . . . . . . . . . . . . 825--839
             Javier Herranz and   
             Alexandre Ruiz and   
      Germán Sáez   New results and applications for
                                  multi-secret sharing schemes . . . . . . 841--864
               Avishek Adhikari   Linear algebraic techniques to construct
                                  monochrome visual cryptographic schemes
                                  for general access structure and its
                                  applications to color images . . . . . . 865--895
              Koji Momihara and   
                   Mieko Yamada   Divisible difference families from
                                  Galois rings $ {\rm GR}(4, n) $ and
                                  Hadamard matrices  . . . . . . . . . . . 897--909
                   Jie Chen and   
               Hoon Wei Lim and   
                   San Ling and   
              Huaxiong Wang and   
                    Hoeteck Wee   Shorter identity-based encryption via
                                  asymmetric pairings  . . . . . . . . . . 911--947
        Sebastian Raaphorst and   
                Lucia Moura and   
                  Brett Stevens   A construction for strength-3 covering
                                  arrays from linear feedback shift
                                  register sequences . . . . . . . . . . . 949--968
     Alexander L. Gavrilyuk and   
             Ivan Yu. Mogilnykh   Cameron-Liebler line classes in $ P G(n,
                                  4) $ . . . . . . . . . . . . . . . . . . 969--982
             Nikolay Yankov and   
                    Moon Ho Lee   New binary self-dual codes of lengths $
                                  50$--$ 60$ . . . . . . . . . . . . . . . 983--996
          Stanislav Bulygin and   
             Michael Walter and   
              Johannes Buchmann   Full analysis of PRINTcipher with
                                  respect to invariant subspace attack:
                                  efficient key recovery and
                                  countermeasures  . . . . . . . . . . . . 997--1022
                Edoardo Ballico   Any network code comes from an algebraic
                                  curve taking osculating spaces . . . . . 1023--1026
          Naoyuki Horiguchi and   
           Tsuyoshi Miezaki and   
              Hiroyuki Nakasora   Erratum to: On the support designs of
                                  extremal binary doubly even self-dual
                                  codes  . . . . . . . . . . . . . . . . . 1027--1028
       Torleiv Klòve and   
                 Moshe Schwartz   Erratum to: Linear covering codes and
                                  error-correcting codes for
                                  limited-magnitude errors . . . . . . . . 1029--1029


Designs, Codes, and Cryptography
Volume 74, Number 1, January, 2015

          Abhay Kumar Singh and   
             Pramod Kumar Kewat   On cyclic codes over the ring $ \mathbb
                                  Z_p[u] / \langle u^k \rangle $ . . . . . 1--13
                 Peipei Dai and   
               Jianmin Wang and   
                   Jianxing Yin   Two series of equitable symbol weight
                                  codes meeting the Plotkin bound  . . . . 15--29
              Minquan Cheng and   
                Hung-Lin Fu and   
                 Jing Jiang and   
               Yuan-Hsun Lo and   
                      Ying Miao   New bounds on $ \bar {2}$-separable
                                  codes of length $2$  . . . . . . . . . . 31--40
                   Hui Wang and   
            Paul Stankovski and   
               Thomas Johansson   A generalized birthday approach for
                                  efficiently finding linear relations in
                                  $ \ell $-sequences . . . . . . . . . . . 41--57
               Eun Ju Cheon and   
                 Seon Jeong Kim   On the minimum number of points covered
                                  by a set of lines in $ {\rm PG}(2, q) $  59--74
             Boris Skori\'c and   
            Jan-Jaap Oosterwijk   Binary and $q$-ary Tardos codes,
                                  revisited  . . . . . . . . . . . . . . . 75--111
Andrés Cordón-Franco and   
         Hans van Ditmarsch and   
David Fernández-Duque and   
         Fernando Soler-Toscano   A geometric protocol for cryptography
                                  with cards . . . . . . . . . . . . . . . 113--125
                Hengjia Wei and   
                     Gennian Ge   Spectrum of sizes for perfect
                                  $2$-deletion-correcting codes of length
                                  $4$  . . . . . . . . . . . . . . . . . . 127--151
               Ulrich Dempwolff   Symmetric doubly dual hyperovals have an
                                  odd rank . . . . . . . . . . . . . . . . 153--157
            Antonino Simone and   
                 Boris Skori\'c   False Negative probabilities in Tardos
                                  codes  . . . . . . . . . . . . . . . . . 159--182
                Cas Cremers and   
                Mich\`ele Feltz   Beyond eCK: perfect forward secrecy
                                  under actor compromise and ephemeral-key
                                  reveal . . . . . . . . . . . . . . . . . 183--218
           Katherine Jarvis and   
                  Monica Nevins   ETRU: NTRU over the Eisenstein integers  219--242
                Hengjia Wei and   
                     Gennian Ge   Group divisible designs with block size
                                  four and group type $ g^u m^1 $  . . . . 243--282
                  J. Rif\`a and   
            F. I. Solov'eva and   
                  M. Villanueva   Erratum to: Intersection of Hamming
                                  codes avoiding Hamming subcodes  . . . . 283--283

Designs, Codes, and Cryptography
Volume 74, Number 2, February, 2015

                Bocong Chen and   
                Hongwei Liu and   
                 Guanghui Zhang   A class of minimal cyclic codes over
                                  finite fields  . . . . . . . . . . . . . 285--300
                   Tao Feng and   
              Xiaomiao Wang and   
                   Yanxun Chang   Semi-cyclic holey group divisible
                                  designs with block size three  . . . . . 301--324
         Martin R. Albrecht and   
                 Carlos Cid and   
     Jean-Charles Faug\`ere and   
         Robert Fitzpatrick and   
                 Ludovic Perret   On the complexity of the BKW algorithm
                                  on LWE . . . . . . . . . . . . . . . . . 325--354
             Yiansheng Yang and   
                    Wenchao Cai   On self-dual constacyclic codes over
                                  finite fields  . . . . . . . . . . . . . 355--364
  Dragomir Z. \Dbarokovi\'c and   
             Ilias S. Kotsireas   Compression of periodic complementary
                                  sequences and applications . . . . . . . 365--377
         Cristiano Torezzan and   
  João E. Strapasson and   
          Sueli I. R. Costa and   
            Rogerio M. Siqueira   Optimum commutative group codes  . . . . 379--394
                Kwangsu Lee and   
             Jong Hwan Park and   
                  Dong Hoon Lee   Anonymous HIBE with short ciphertexts:
                                  full security in prime order groups  . . 395--425
             Michel Lavrauw and   
               John Sheekey and   
                Corrado Zanella   On embeddings of minimum dimension of $
                                  \mathrm {PG}(n, q) \times \mathrm
                                  {PG}(n, q) $ . . . . . . . . . . . . . . 427--440
            Hugues Randriam and   
                    Lin Sok and   
            Patrick Solé   Lower bounds on the minimum distance of
                                  long codes in the Lee metric . . . . . . 441--452
                  R. Alfaro and   
                K. Dhul-Qarnayn   Constructing self-dual codes over $
                                  \mathbb {F}_q[u] / (u^t) $ . . . . . . . 453--465
                  Dong Yang and   
                Wen-Feng Qi and   
                Qun-Xiong Zheng   Further results on the distinctness of
                                  modulo $2$ reductions of primitive
                                  sequences over $ \mathbf {Z} (2^{32} -
                                  1)$  . . . . . . . . . . . . . . . . . . 467--480
            Francis H. Hunt and   
          Stephanie Perkins and   
                 Derek H. Smith   Decoding mixed errors and erasures in
                                  permutation codes  . . . . . . . . . . . 481--493
             Oriol Farr\`as and   
            Carles Padró   Extending Brickell--Davenport theorem to
                                  non-perfect secret sharing schemes . . . 495--510

Designs, Codes, and Cryptography
Volume 74, Number 3, March, 2015

            Somphong Jitman and   
                       San Ling   Quasi-abelian codes  . . . . . . . . . . 511--531
               Xiaogang Liu and   
                       Yuan Luo   On the bounds and achievability about
                                  the ODPC of $ \mathcal {GRM} (2, m)^* $
                                  over prime fields for increasing message
                                  length . . . . . . . . . . . . . . . . . 533--557
            Javad Doliskani and   
             Éric Schost   Computing in degree $ 2^k $-extensions
                                  of finite fields of odd characteristic   559--569
             Nikolay Yankov and   
                    Moon Ho Lee   Classification of self-dual codes of
                                  length $ 50 $ with an automorphism of
                                  odd prime order  . . . . . . . . . . . . 571--579
               Yu Qing Chen and   
                       Tao Feng   Paley type sets from cyclotomic classes
                                  and Arasu--Dillon-Player difference sets 581--600
       Lars Eirik Danielsen and   
          Matthew G. Parker and   
                Constanza Riera   On graphs and codes preserved by edge
                                  local complementation  . . . . . . . . . 601--621
                   Qiang Li and   
               Xiang Xue Li and   
                Xue Jia Lai and   
                    Ke Fei Chen   Optimal assignment schemes for general
                                  access structures based on linear
                                  programming  . . . . . . . . . . . . . . 623--644
             Kazuhiko Minematsu   Building blockcipher from small-block
                                  tweakable blockcipher  . . . . . . . . . 645--663
                Kai-Uwe Schmidt   Highly nonlinear functions . . . . . . . 665--672
             Suat Karadeniz and   
                Bahattin Yildiz   New extremal binary self-dual codes of
                                  length $ 64 $ from $ R_3 $-lifts of the
                                  extended binary Hamming code . . . . . . 673--680
                  Hajime Matsui   On generator matrices and parity check
                                  matrices of generalized integer codes    681--701
                        Ming Su   On the linear complexity of
                                  Legendre--Sidelnikov sequences . . . . . 703--717
   László Csirmaz   Secret sharing on the $d$-dimensional
                                  cube . . . . . . . . . . . . . . . . . . 719--729


Designs, Codes, and Cryptography
Volume 75, Number 1, April, 2015

                 Xi Jun Lin and   
                    Ran Ren and   
               Zhengang Wei and   
                        Lin Sun   Comment on ``Identity-based
                                  non-interactive key distribution with
                                  forward security'' . . . . . . . . . . . 1--7
          Svetlana Topalova and   
                Stela Zhelezova   On point-transitive and transitive
                                  deficiency one parallelisms of PG $ (3,
                                  4) $ . . . . . . . . . . . . . . . . . . 9--19
 Martianus Frederic Ezerman and   
            Somphong Jitman and   
            Patrick Solé   Xing-Ling codes, duals of their
                                  subcodes, and good asymmetric quantum
                                  codes  . . . . . . . . . . . . . . . . . 21--42
                 Chengju Li and   
                    Qin Yue and   
                    Yiwei Huang   Two families of nearly optimal codebooks 43--57
                Nelly Fazio and   
                  Kevin Iga and   
        Antonio R. Nicolosi and   
             Ludovic Perret and   
          William E. Skeith III   Hardness of learning problems over
                                  Burnside groups of exponent $3$  . . . . 59--70
               Michael E. Zieve   Planar functions and perfect nonlinear
                                  monomials over finite fields . . . . . . 71--80
         Mladen Kovacevi\'c and   
           Dejan Vukobratovi\'c   Perfect codes in the discrete simplex    81--95
               Thomas Britz and   
          Keisuke Shiromoto and   
         Thomas Westerbäck   Demi-matroids from codes over finite
                                  Frobenius rings  . . . . . . . . . . . . 97--107
                Kenneth W. Shum   Optimal three-dimensional optical
                                  orthogonal codes of weight three . . . . 109--126
                  Zihui Liu and   
                     Xin-Wen Wu   On relative constant-weight codes  . . . 127--144
                     S. Ugolini   Sequences of irreducible polynomials
                                  without prescribed coefficients over odd
                                  prime fields . . . . . . . . . . . . . . 145--155
                 Hongyu Han and   
               Daiyuan Peng and   
                       Xing Liu   New lower bounds on the aperiodic
                                  Hamming correlations of frequency
                                  hopping sequences with low hit zone  . . 157--174
                Peter Horak and   
                     Zsolt Tuza   Speeding up deciphering by hypergraph
                                  ordering . . . . . . . . . . . . . . . . 175--185

Designs, Codes, and Cryptography
Volume 75, Number 2, May, 2015

              Chih-Yen Yang and   
                  Chung-Chin Lu   One-point Klein codes and their
                                  serial-in-serial-out systematic encoding 187--197
                    Zhen Ma and   
                Wen-Feng Qi and   
                      Tian Tian   On affine sub-families of the NFSR in
                                  Grain  . . . . . . . . . . . . . . . . . 199--212
             Antonio Cossidente   A new family of relative hemisystems on
                                  the Hermitian surface  . . . . . . . . . 213--221
                   N. A. Newman   $4$-Cycle decompositions of $ (\lambda +
                                  m) K_{v + u \setminus } \lambda K_v$ . . 223--235
                    Eric Swartz   A construction of a partial difference
                                  set in the extraspecial groups of order
                                  $ p^3 $ with exponent $ p^2 $  . . . . . 237--242
              Javier de la Cruz   On extremal self-dual codes of length $
                                  120 $  . . . . . . . . . . . . . . . . . 243--252
                    Sunghyu Han   A method for constructing self-dual
                                  codes over $ \mathbb {Z}_{2^m} $ . . . . 253--262
                Dabin Zheng and   
             Xiaoqiang Wang and   
             Xiangyong Zeng and   
                         Lei Hu   The weight distribution of a family of
                                  $p$-ary cyclic codes . . . . . . . . . . 263--275
             Yuuki Kageyama and   
                 Tatsuya Maruta   On the construction of Griesmer codes of
                                  dimension $5$  . . . . . . . . . . . . . 277--280
                  Elodie Leducq   Functions which are PN on infinitely
                                  many extensions of $ \mathbb{F}_p, p $
                                  odd  . . . . . . . . . . . . . . . . . . 281--299
                    Samrith Ram   Enumeration of linear transformation
                                  shift registers  . . . . . . . . . . . . 301--314
           A. J. van Zanten and   
                 A. Bojilov and   
                S. M. Dodunekov   Generalized residue and $t$-residue
                                  codes and their idempotent generators    315--334
                Elisa Gorla and   
                Maike Massierer   Point compression for the trace zero
                                  subgroup over a small degree extension
                                  field  . . . . . . . . . . . . . . . . . 335--357

Designs, Codes, and Cryptography
Volume 75, Number 3, June, 2015

           Gabriela Olteanu and   
              Inneke Van Gelder   Construction of minimal non-abelian left
                                  group codes  . . . . . . . . . . . . . . 359--373
               Yupeng Jiang and   
                    Yingpu Deng   New results on nonexistence of
                                  generalized bent functions . . . . . . . 375--385
             Yeow Meng Chee and   
                 Gennian Ge and   
                  Hui Zhang and   
                   Xiande Zhang   Hanani triple packings and optimal
                                  $q$-ary codes of constant weight three   387--403
               Josep Rif\`a and   
         Faina I. Solov'eva and   
             Merc\`e Villanueva   Self-embeddings of Hamming Steiner
                                  triple systems of small order and APN
                                  permutations . . . . . . . . . . . . . . 405--427
               Tomas Nilson and   
         Lars-Daniel Öhman   Triple arrays and Youden squares . . . . 429--451
          Peter Vandendriessche   On small line sets with few odd-points   453--463
               Maarten De Boeck   The largest Erd\Hos--Ko--Rado sets in $
                                  2 - (v, k, 1) $ designs  . . . . . . . . 465--481
               Gook Hwa Cho and   
                 Namhun Koo and   
                  Eunhye Ha and   
                   Soonhak Kwon   New cube root algorithm based on the
                                  third order linear recurrence relations
                                  in finite fields . . . . . . . . . . . . 483--495
            Ingo Janiszczak and   
           Wolfgang Lempken and   
Patric R. J. Östergård and   
              Reiner Staszewski   Permutation codes invariant under
                                  isometries . . . . . . . . . . . . . . . 497--507
            Yutaka Hiramine and   
                Chihiro Suetake   Difference matrices related to Sophie
                                  Germain primes $p$ using functions on
                                  the fields $ F_{2 p + 1}$  . . . . . . . 509--518
            Antonino Simone and   
                 Boris Skori\'c   False positive probabilities in $q$-ary
                                  Tardos codes: comparison of attacks  . . 519--542
        Heide Gluesing-Luerssen   Fourier-reflexive partitions and
                                  MacWilliams identities for additive
                                  codes  . . . . . . . . . . . . . . . . . 543--563
           Adeline Langlois and   
           Damien Stehlé   Worst-case to average-case reductions
                                  for module lattices  . . . . . . . . . . 565--599


Designs, Codes, and Cryptography
Volume 76, Number 1, July, 2015

               I. Kotsireas and   
     Edgar Martínez-Moro   Foreword: Computer Algebra in Coding
                                  Theory and Cryptography  . . . . . . . . 1--2
         Merc\`e Villanueva and   
               Fanxuan Zeng and   
                    Jaume Pujol   Efficient representation of binary
                                  nonlinear codes: constructions and
                                  minimum distance computation . . . . . . 3--21
          Natalia Dück and   
          Karl-Heinz Zimmermann   Heuristic decoding of linear codes using
                                  commutative algebra  . . . . . . . . . . 23--35
         Tom Hòholdt and   
     Fernando Piñero and   
                      Peng Zeng   Optimal codes as Tanner codes with
                                  cyclic component codes . . . . . . . . . 37--47
                  Olav Geil and   
                 Stefano Martin   An improvement of the Feng--Rao bound
                                  for primary codes  . . . . . . . . . . . 49--79
   Wilson Olaya-León and   
 Claudia Granados-Pinzón   The second generalized Hamming weight of
                                  certain Castle codes . . . . . . . . . . 81--87
             Carlos Galindo and   
              Fernando Hernando   Quantum codes from affine variety codes
                                  and their subfield-subcodes  . . . . . . 89--100
                 Carlos Munuera   Hamming codes for wet paper
                                  steganography  . . . . . . . . . . . . . 101--111
           Thomas W. Cusick and   
                    Bryan Johns   Theory of $2$-rotation symmetric cubic
                                  Boolean functions  . . . . . . . . . . . 113--133

Designs, Codes, and Cryptography
Volume 76, Number 2, August, 2015

             Mauro Biliotti and   
       Alessandro Montinaro and   
                 Eliana Francot   2- $ (v, k, 1) $ Designs with a
                                  point-primitive rank 3 automorphism
                                  group of affine type . . . . . . . . . . 135--171
        Ferruh Özbudak and   
              Seher Tutdere and   
                     Oguz Yayla   On some bounds on the minimum distance
                                  of cyclic codes over finite fields . . . 173--178
               Jooyoung Lee and   
                   Martijn Stam   MJH: a faster alternative to MDC-2 . . . 179--205
  Tamás Héger and   
Balázs Patkós and   
         Marcella Takáts   Search problems in vector spaces . . . . 207--216
                  T. Shaska and   
                        C. Shor   Theta functions and symmetric weight
                                  enumerators for codes over imaginary
                                  quadratic fields . . . . . . . . . . . . 217--235
                    D. Best and   
              H. Kharaghani and   
                        H. Ramp   Mutually unbiased weighing matrices  . . 237--256
                  Edward Dobson   Monomial isomorphisms of cyclic codes    257--267
José Joaquín Bernal and   
             Joaquim Borges and   
Cristina Fernández-Córdoba and   
             Merc\`e Villanueva   Permutation decoding of $ \mathbb{Z}_2
                                  \mathbb{Z}_4$-linear codes . . . . . . . 269--277
                    Jiao Li and   
              Claude Carlet and   
             Xiangyong Zeng and   
                 Chunlei Li and   
                     Lei Hu and   
                   Jinyong Shan   Two constructions of balanced Boolean
                                  functions with optimal algebraic
                                  immunity, high nonlinearity and good
                                  behavior against fast algebraic attacks  279--305
                  Eric Zhi Chen   A new iterative computer search
                                  algorithm for good quasi-twisted codes   307--323
            Thomas Plantard and   
               Willy Susilo and   
                  Zhenfei Zhang   LLL for ideal lattices: re-evaluation of
                                  the security of Gentry--Halevi's FHE
                                  scheme . . . . . . . . . . . . . . . . . 325--344
                 Sihuang Hu and   
                 Shuxing Li and   
                  Tao Zhang and   
                   Tao Feng and   
                     Gennian Ge   New pseudo-planar binomials in
                                  characteristic two and related schemes   345--360
               Yuan-Hsun Lo and   
                Hung-Lin Fu and   
                    Yi-Hean Lin   Weighted maximum matchings and optimal
                                  equi-difference conflict-avoiding codes  361--372

Designs, Codes, and Cryptography
Volume 76, Number 3, September, 2015

                 Masaaki Harada   On a $5$-design related to a putative
                                  extremal doubly even self-dual code of
                                  length a multiple of $ 24$ . . . . . . . 373--384
              Guo-Qiang Liu and   
                   Chen-Hui Jin   Differential cryptanalysis of
                                  PRESENT-like cipher  . . . . . . . . . . 385--408
                    Bangteng Xu   Bentness and nonlinearity of functions
                                  on finite groups . . . . . . . . . . . . 409--430
              Orr Dunkelman and   
              Nathan Keller and   
                     Adi Shamir   Almost universal forgery attacks on
                                  AES-based MAC's  . . . . . . . . . . . . 431--449
              S. G. Barwick and   
                 Wen-Ai Jackson   An investigation of the tangent splash
                                  of a subplane of $ \mathrm {PG}(2, q^3)
                                  $  . . . . . . . . . . . . . . . . . . . 451--468
            Atsushi Fujioka and   
            Koutarou Suzuki and   
               Keita Xagawa and   
                Kazuki Yoneyama   Strongly secure authenticated key
                                  exchange from factoring, codes, and
                                  lattices . . . . . . . . . . . . . . . . 469--504
                    Tung Le and   
                  Jamshid Moori   On the automorphisms of designs
                                  constructed from finite simple groups    505--517
           Steven Dougherty and   
               Jon-Lark Kim and   
                    Yoonjin Lee   Codes over rings and Hermitian lattices  519--535
                    Oktay Olmez   Plateaued functions and one-and-half
                                  difference sets  . . . . . . . . . . . . 537--549
           Anthony B. Evans and   
                 David Fear and   
              Rebecca J. Stones   Diagonally cyclic equitable rectangles   551--569
              Claude Carlet and   
                      Deng Tang   Enhanced Boolean functions suitable for
                                  the filter model of pseudo-random
                                  generator  . . . . . . . . . . . . . . . 571--587
                Hengjia Wei and   
                  Hui Zhang and   
                     Gennian Ge   Completely reducible super-simple
                                  designs with block size five and index
                                  two  . . . . . . . . . . . . . . . . . . 589--600
              Orr Dunkelman and   
                  Nathan Keller   Practical-time attacks against reduced
                                  variants of MISTY1 . . . . . . . . . . . 601--627


Designs, Codes, and Cryptography
Volume 77, Number 1, October, 2015

                    Yan Liu and   
                  Haode Yan and   
                    Chunlei Liu   A class of six-weight cyclic codes and
                                  their weight distribution  . . . . . . . 1--9
                     Jiqiang Lu   A methodology for differential-linear
                                  cryptanalysis and its applications . . . 11--48
            Anamari Naki\'c and   
         Mario Osvin Pavcevi\'c   Tactical decompositions of designs over
                                  finite fields  . . . . . . . . . . . . . 49--60
              Ryo Nishimaki and   
                   Keita Xagawa   Verifiably encrypted signatures with
                                  short keys based on the decisional
                                  linear problem and obfuscation for
                                  encrypted VES  . . . . . . . . . . . . . 61--98
                 Sihem Mesnager   Bent vectorial functions and linear
                                  codes from $o$-polynomials . . . . . . . 99--116
                  Deng Tang and   
              Claude Carlet and   
                    Xiaohu Tang   Differentially $4$-uniform bijections by
                                  permuting the inverse function . . . . . 117--141
               Sungwook Kim and   
                 Jung Hee Cheon   Fixed argument pairing inversion on
                                  elliptic curves  . . . . . . . . . . . . 143--152
                Yonglin Cao and   
                   Jian Gao and   
                    Fang-Wei Fu   Semisimple multivariable $ \mathbb {F}_q
                                  $-linear codes over $ \mathbb {F}_{q^l}
                                  $  . . . . . . . . . . . . . . . . . . . 153--177
                 Haibo Hong and   
               Licheng Wang and   
                    Yixian Yang   Minimal logarithmic signatures for the
                                  unitary group $ U_n(q) $ . . . . . . . . 179--191
                Jianfa Qian and   
                     Lina Zhang   Entanglement-assisted quantum codes from
                                  arbitrary binary linear codes  . . . . . 193--202
          Stefaan De Winter and   
                Sara Rottey and   
         Geertrui Van de Voorde   Linear representations of subgeometries  203--215
                Jingjun Bao and   
                       Lijun Ji   The completion determination of optimal
                                  $ (3, 4)$-packings . . . . . . . . . . . 217--229
             Santanu Sarkar and   
           Sourav Sen Gupta and   
                    Goutam Paul   Proving TLS-attack related open biases
                                  of RC4 . . . . . . . . . . . . . . . . . 231--253
                   Min Zeng and   
                   Yuan Luo and   
                     Guang Gong   Sequences with good correlation property
                                  based on depth and interleaving
                                  techniques . . . . . . . . . . . . . . . 255--275
Fabio Enrique Brochero Martínez   Explicit factorization of $ x^{n - 1}
                                  \in \mathbb {F}_q[x] $ . . . . . . . . . 277--286

Designs, Codes, and Cryptography
Volume 77, Number 2--3, December, 2015

                  Ian Blake and   
             Alfred Menezes and   
                   Doug Stinson   Guest Editorial: Special Issue in Honor
                                  of Scott A. Vanstone . . . . . . . . . . 287--299
                  Chuan Guo and   
         Douglas R. Stinson and   
                 Tran van Trung   On tight bounds for binary frameproof
                                  codes  . . . . . . . . . . . . . . . . . 301--319
         Charles C. Lindner and   
             Mariusz Meszka and   
                 Alexander Rosa   Almost $2$-perfect $6$-cycle systems . . 321--333
              Dirk Hachenberger   Primitive normal bases for quartic and
                                  cubic extensions: a geometric approach   335--350
                 Ryoh Fuji-Hara   Perfect hash families of strength three
                                  with three rows from varieties on finite
                                  projective geometries  . . . . . . . . . 351--356
                   Kevin Phelps   Enumeration of Kerdock codes of length $
                                  64 $ . . . . . . . . . . . . . . . . . . 357--363
          Dieter Jungnickel and   
            Vladimir D. Tonchev   Maximal arcs and quasi-symmetric designs 365--374
            Thijs Laarhoven and   
              Michele Mosca and   
                Joop van de Pol   Finding shortest lattice vectors faster
                                  using quantum search . . . . . . . . . . 375--400
             Sonia Chiasson and   
             P. C. van Oorschot   Quantifying the security advantage of
                                  password expiration policies . . . . . . 401--408
           D. S. Archdeacon and   
               J. H. Dinitz and   
                  D. M. Donovan   Square integer Heffter arrays with empty
                                  cells  . . . . . . . . . . . . . . . . . 409--426
           Alice Silverberg and   
                 Yuri G. Zarhin   Isogenies of abelian varieties over
                                  finite fields  . . . . . . . . . . . . . 427--439
           Beno\^\it Libert and   
              Thomas Peters and   
                  Marc Joye and   
                      Moti Yung   Linearly homomorphic
                                  structure-preserving signatures and
                                  their applications . . . . . . . . . . . 441--477
             Yeow Meng Chee and   
        Charles J. Colbourn and   
             Alan Chi Hung Ling   Optimal low-power coding for error
                                  correction and crosstalk avoidance in
                                  on-chip data buses . . . . . . . . . . . 479--491
          Michael Düll and   
           Björn Haase and   
       Gesine Hinterwälder   High-speed Curve25519 on $8$-bit, $
                                  16$-bit, and $ 32$-bit microcontrollers  493--514
             E. L. Roettger and   
             H. C. Williams and   
                      R. K. Guy   Some primality tests that eluded Lucas   515--539
          Jeffrey Hoffstein and   
            Joseph H. Silverman   PASS-Encrypt: a public key cryptosystem
                                  based on partial evaluation of
                                  polynomials  . . . . . . . . . . . . . . 541--552
                   E. R. Lamken   The asymptotic existence of DR$ (v, k, k
                                  - 1) $ $ (v, k, k - 1)$-BIBDs  . . . . . 553--562
           Liang Feng Zhang and   
          Reihaneh Safavi-Naini   Batch verifiable computation of
                                  outsourced functions . . . . . . . . . . 563--585
               Neal Koblitz and   
              Alfred J. Menezes   The random oracle model: a twenty-year
                                  retrospective  . . . . . . . . . . . . . 587--610
             Elena Andreeva and   
               Bart Mennink and   
                   Bart Preneel   Open problems in hash function security  611--631
                 Itai Dinur and   
              Orr Dunkelman and   
              Nathan Keller and   
                     Adi Shamir   Reflections on slide with a twist
                                  attacks  . . . . . . . . . . . . . . . . 633--651
               Gary McGuire and   
            Emrah Sercan Yilmaz   Further results on the number of
                                  rational points of hyperelliptic
                                  supersingular curves in characteristic 2 653--662
                    Ueli Maurer   Zero-knowledge proofs of knowledge for
                                  group homomorphisms  . . . . . . . . . . 663--676
               Gerhard Frey and   
                     Ernst Kani   Normal forms of hyperelliptic curves of
                                  genus $3$  . . . . . . . . . . . . . . . 677--712
                 Peter Landrock   Power map permutations and the discrete
                                  log problem  . . . . . . . . . . . . . . 713--724
           Tatsuaki Okamoto and   
            Katsuyuki Takashima   Achieving short ciphertexts or short
                                  secret-keys for adaptively secure
                                  general inner-product encryption . . . . 725--771


Designs, Codes, and Cryptography
Volume 78, Number 1, January, 2016

          Dieter Jungnickel and   
               Jennifer Key and   
                 Chris Mitchell   Editorial for the 25th anniversary issue 1--3
              Claude Carlet and   
                 Sihem Mesnager   Four decades of research on bent
                                  functions  . . . . . . . . . . . . . . . 5--50
        Steven D. Galbraith and   
                Pierrick Gaudry   Recent progress on the elliptic curve
                                  discrete logarithm problem . . . . . . . 51--72
               Antoine Joux and   
          Cécile Pierrot   Technical history of discrete logarithms
                                  in small characteristic finite fields    73--85
               Neal Koblitz and   
              Alfred J. Menezes   Cryptocash, cryptocurrencies, and
                                  cryptocontracts  . . . . . . . . . . . . 87--102
               Siaw-Lynn Ng and   
            Maura Beth Paterson   Disjoint difference families and their
                                  applications . . . . . . . . . . . . . . 103--127
            Harald Niederreiter   A survey of some applications of finite
                                  fields . . . . . . . . . . . . . . . . . 129--139
                 Alexander Pott   Almost perfect and planar functions  . . 141--195
                Lucia Moura and   
             Gary L. Mullen and   
                 Daniel Panario   Finite field constructions of
                                  combinatorial arrays . . . . . . . . . . 197--219
           Daniel M. Gordon and   
               Bernhard Schmidt   A survey of the multiplier conjecture    221--236
                Kai-Uwe Schmidt   Sequences with small correlation . . . . 237--267
         Christina Fragouli and   
                 Emina Soljanin   (Secure) Linear network coding multicast 269--310
                  T. Etzion and   
                      L. Storme   Galois geometries and coding theory  . . 311--350
             Anne Broadbent and   
            Christian Schaffner   Quantum cryptography beyond quantum key
                                  distribution . . . . . . . . . . . . . . 351--382

Designs, Codes, and Cryptography
Volume 78, Number 2, February, 2016

                  Michael Braun   $q$-Analogs of $t$-wise balanced designs
                                  from Borel subgroups . . . . . . . . . . 383--390
               Longjiang Qu and   
                    Yin Tan and   
                    Chao Li and   
                     Guang Gong   More constructions of differentially
                                  $4$-uniform permutations on $ \mathbb
                                  {F}_{2^{2k}}$  . . . . . . . . . . . . . 391--408
        Natalia Silberstein and   
                Anna Gál   Optimal combinatorial batch codes based
                                  on block designs . . . . . . . . . . . . 409--424
            Christina Delfs and   
            Steven D. Galbraith   Computing isogenies between
                                  supersingular elliptic curves over $
                                  \mathbb {F}_p $  . . . . . . . . . . . . 425--440
   Özgür Dagdelen and   
              David Galindo and   
            Pascal Véron   Extended security arguments for
                                  signature schemes  . . . . . . . . . . . 441--461
                       Sho Suda   A two-fold cover of strongly regular
                                  graphs with spreads and association
                                  schemes of class five  . . . . . . . . . 463--471
          Adonus L. Madison and   
                      Junhua Wu   Conics arising from external points and
                                  their binary codes . . . . . . . . . . . 473--491
                    Yu Chen and   
                Jiang Zhang and   
                Dongdai Lin and   
                 Zhenfeng Zhang   Generic constructions of integrated PKE
                                  and PEKS . . . . . . . . . . . . . . . . 493--526
         Antonio Cossidente and   
               Francesco Pavese   On subspace codes  . . . . . . . . . . . 527--531
                      Di Wu and   
                 Wenfeng Qi and   
                    Huajin Chen   On the spectral immunity of periodic
                                  sequences restricted to binary
                                  annihilators . . . . . . . . . . . . . . 533--545
         Praveen Gauravaram and   
             Nasour Bagheri and   
                Lars R. Knudsen   Building indifferentiable compression
                                  functions from the PGV compression
                                  functions  . . . . . . . . . . . . . . . 547--581

Designs, Codes, and Cryptography
Volume 78, Number 3, March, 2016

             Michel Lavrauw and   
                   John Sheekey   On BEL-configurations and finite
                                  semifields . . . . . . . . . . . . . . . 583--603
           Florian Caullery and   
            Kai-Uwe Schmidt and   
                       Yue Zhou   Exceptional planar polynomials . . . . . 605--613
           Martin Steinbach and   
              Dirk Hachenberger   A class of quaternary linear codes
                                  improving known minimum distances  . . . 615--627
              Claude Carlet and   
                 Guang Gong and   
                        Yin Tan   Quadratic zero-difference balanced
                                  functions, APN functions and strongly
                                  regular graphs . . . . . . . . . . . . . 629--654
               Jan De Beule and   
             Jeroen Demeyer and   
               Klaus Metsch and   
                 Morgan Rodgers   A new family of tight sets in $ \mathcal
                                  {Q}^+(5, q) $  . . . . . . . . . . . . . 655--678
               Yuan-Hsun Lo and   
            Wing Shing Wong and   
                    Hung-Lin Fu   Partially user-irrepressible sequence
                                  sets and conflict-avoiding codes . . . . 679--691
          Javier de la Cruz and   
          Michael Kiermaier and   
              Alfred Wassermann   The automorphism group of an extremal $
                                  [120, 60, 24] $ code does not contain
                                  elements of order $ 29 $ . . . . . . . . 693--702
                      Anonymous   Weight enumerator of some irreducible
                                  cyclic codes . . . . . . . . . . . . . . ??


Designs, Codes, and Cryptography
Volume 79, Number 1, April, 2016

               Andrea Montanari   Effective compression maps for
                                  torus-based cryptography . . . . . . . . 1--17
                   Lijun Ji and   
                   Zhengwu Dong   Existence of optimal strong partially
                                  balanced $3$-designs with block size
                                  four . . . . . . . . . . . . . . . . . . 19--36
           Tsuyoshi Miezaki and   
              Hiroyuki Nakasora   An upper bound of the value of $t$ of
                                  the support $t$-designs of extremal
                                  binary doubly even self-dual codes . . . 37--46
        Heide Gluesing-Luerssen   The homogeneous weight partition and its
                                  character-theoretic dual . . . . . . . . 47--61
             Jong Hwan Park and   
                  Dong Hoon Lee   An efficient IBE scheme with tight
                                  security reduction in the random oracle
                                  model  . . . . . . . . . . . . . . . . . 63--85
     Jean-Charles Faug\`ere and   
               Ayoub Otmani and   
             Ludovic Perret and   
Frédéric de Portzamparc and   
            Jean-Pierre Tillich   Structural cryptanalysis of McEliece
                                  schemes with compact keys  . . . . . . . 87--112
            Dean Crnkovi\'c and   
                 Sanja Rukavina   Self-dual codes from extended orbit
                                  matrices of symmetric designs  . . . . . 113--120
                    Kwangsu Lee   Self-updatable encryption with short
                                  public parameters and its extensions . . 121--161
          Binod Kumar Sahoo and   
         N. S. Narasimha Sastry   Binary codes of the symplectic
                                  generalized quadrangle of even order . . 163--170
         Stefka Bouyuklieva and   
           Wolfgang Willems and   
                 Nikolay Yankov   On the automorphisms of order $ 15 $ for
                                  a binary self-dual $ [96, 48, 20] $ code 171--182
         Jürgen Bierbrauer   Projective polynomials, a projection
                                  construction and a family of semifields  183--200

Designs, Codes, and Cryptography
Volume 79, Number 2, May, 2016

               Eimear Byrne and   
                   Alison Sneyd   Two-weight codes, graphs and orthogonal
                                  arrays . . . . . . . . . . . . . . . . . 201--217
                 B. Compton and   
                 R. Craigen and   
                   W. de Launey   Unreal $ B H(n, 6) $'s and Hadamard
                                  matrices . . . . . . . . . . . . . . . . 219--229
              Ibrahim Özen   Generalized weights and the
                                  Ball--Blokhuis congruence  . . . . . . . 231--235
               Dustin Moody and   
            Souradyuti Paul and   
              Daniel Smith-Tone   Improved indifferentiability security
                                  bound for the JH mode  . . . . . . . . . 237--259
         Martin R. Albrecht and   
     Jean-Charles Faug\`ere and   
              Pooya Farshim and   
           Gottfried Herold and   
                 Ludovic Perret   Polly Cracker, revisited . . . . . . . . 261--302
                 Jing Jiang and   
              Minquan Cheng and   
                      Ying Miao   Strongly separable codes . . . . . . . . 303--318
                Yutaka Hiramine   On automorphism groups of divisible
                                  designs acting regularly on the set of
                                  point classes  . . . . . . . . . . . . . 319--335
         Seyed Hassan Alavi and   
               Mohsen Bayat and   
              Ashraf Daneshkhah   Symmetric designs admitting
                                  flag-transitive and point-primitive
                                  automorphism groups associated to two
                                  dimensional projective special groups    337--351
                    Yan Liu and   
                      Haode Yan   A class of five-weight cyclic codes and
                                  their weight distribution  . . . . . . . 353--366
                Yijin Zhang and   
               Yuan-Hsun Lo and   
                Wing Shing Wong   Optimal strongly conflict-avoiding codes
                                  of even length and weight three  . . . . 367--382
                    Igor Semaev   MaxMinMax problem and sparse equations
                                  over finite fields . . . . . . . . . . . 383--404

Designs, Codes, and Cryptography
Volume 79, Number 3, June, 2016

              Dina Ghinelli and   
          Dieter Jungnickel and   
             Michel Lavrauw and   
                 Alexander Pott   Editorial: Finite geometries . . . . . . 405--406
            Anamari Naki\'c and   
                     Leo Storme   On the extendability of particular
                                  classes of constant dimension codes  . . 407--422
               Ayhan Cosgun and   
        Ferruh Özbudak and   
       Zülfükar Saygi   Further results on rational points of
                                  the curve $ y^{q^n} - y = \gamma x^{q^h
                                  + 1} - \alpha $ over $ \mathbb {F}_{q^m}
                                  $  . . . . . . . . . . . . . . . . . . . 423--441
Gábor Korchmáros and   
           Gábor P. Nagy   $3$-Nets realizing a diassociative loop
                                  in a projective plane  . . . . . . . . . 443--449
               Peter Beelen and   
         Fernando Piñero   The structure of dual Grassmann codes    451--470
          Stefaan De Winter and   
            Ellen Kamischke and   
                    Zeying Wang   Automorphisms of strongly regular graphs
                                  with applications to partial difference
                                  sets . . . . . . . . . . . . . . . . . . 471--485
            Daniele Bartoli and   
          Massimo Giulietti and   
                  Giovanni Zini   Complete $ (k, 3)$-arcs from quartic
                                  curves . . . . . . . . . . . . . . . . . 487--505
                  Bart De Bruyn   Hyperplanes of Hermitian dual polar
                                  spaces of rank $3$ containing a quad . . 507--533
               Ivan Landjev and   
             Assia Rousseva and   
                     Leo Storme   On the extendability of quasidivisible
                                  Griesmer arcs  . . . . . . . . . . . . . 535--547
          Neil I. Gillespie and   
            Michael Giudici and   
           Daniel R. Hawtin and   
              Cheryl E. Praeger   Entry-faithful $2$-neighbour transitive
                                  codes  . . . . . . . . . . . . . . . . . 549--564
              Katharina Kusejko   Simultaneous diagonalization of conics
                                  in $ P G(2, q) $ . . . . . . . . . . . . 565--581
                   Anton Betten   The packings of $ \mathrm {PG}(3, 3) $   583--595
         Antonio Cossidente and   
            Giuseppe Marino and   
               Francesco Pavese   Non-linear maximum rank distance codes   597--609
                Alice M. W. Hui   Extending some induced substructures of
                                  an inversive plane . . . . . . . . . . . 611--617
         Benjamin C. Cooper and   
                   Tim Penttila   Transitive hyperovals  . . . . . . . . . 619--623
       Szabolcs L. Fancsali and   
           Péter Sziklai   Higgledy-piggledy subspaces and uniform
                                  subspace designs . . . . . . . . . . . . 625--645


Designs, Codes, and Cryptography
Volume 80, Number 1, July, 2016

                  Eric Zhi Chen   New binary $h$-generator quasi-cyclic
                                  codes by augmentation and new minimum
                                  distance bounds  . . . . . . . . . . . . 1--10
        José Moreira and   
    Marcel Fernández and   
            Grigory Kabatiansky   Almost separating and almost secure
                                  frameproof codes over $q$-ary alphabets  11--28
            Dennis Hofheinz and   
                    Tibor Jager   Tightly secure signatures and public-key
                                  encryption . . . . . . . . . . . . . . . 29--61
            Igor E. Shparlinski   On small gaps between the elements of
                                  multiplicative subgroups of finite
                                  fields . . . . . . . . . . . . . . . . . 63--71
            Jonathan Jedwab and   
                      Amy Wiebe   Constructions of complex equiangular
                                  lines from mutually unbiased bases . . . 73--89
                Denis S. Krotov   Perfect codes in Doob graphs . . . . . . 91--102
                 Fuchun Guo and   
               Willy Susilo and   
                          Yi Mu   Generalized closest substring encryption 103--124
       Alexander A. Davydov and   
              Giorgio Faina and   
          Massimo Giulietti and   
          Stefano Marcugini and   
             Fernanda Pambianco   On constructions and parameters of
                                  symmetric configurations $ v_k $ . . . . 125--147
               Yanling Chen and   
           Markku Niemenmaa and   
                A. J. Han Vinck   A general check digit system based on
                                  finite groups  . . . . . . . . . . . . . 149--163
           Sabyasachi Dutta and   
     Raghvendra Singh Rohit and   
               Avishek Adhikari   Constructions and analysis of some
                                  efficient $t$-$ (k, n)^*$-visual
                                  cryptographic schemes using linear
                                  algebraic techniques . . . . . . . . . . 165--196
              Alberto Ravagnani   Rank-metric codes and their duality
                                  theory . . . . . . . . . . . . . . . . . 197--216

Designs, Codes, and Cryptography
Volume 80, Number 2, August, 2016

             Xiang-dong Hou and   
        Ferruh Özbudak and   
                       Yue Zhou   Switchings of semifield multiplications  217--239
                        Udo Ott   On Jacobi sums, difference sets and
                                  partial difference sets in Galois
                                  domains  . . . . . . . . . . . . . . . . 241--281
               Kohei Yamada and   
                Nobuko Miyamoto   A construction and decomposition of
                                  orthogonal arrays with non-prime-power
                                  numbers of symbols on the complement of
                                  a Baer subplane  . . . . . . . . . . . . 283--294
                 Chengju Li and   
                    Qin Yue and   
                    Fang-Wei Fu   Complete weight enumerators of some
                                  cyclic codes . . . . . . . . . . . . . . 295--315
              S. G. Barwick and   
                 Wen-Ai Jackson   Characterising pointsets in $ \mathrm
                                  {{PG}}(4, q) $ that correspond to conics 317--332
          Yarkin Doröz and   
                     Yin Hu and   
                     Berk Sunar   Homomorphic AES evaluation using the
                                  modified LTV scheme  . . . . . . . . . . 333--358
          Carl Löndahl and   
           Thomas Johansson and   
Masoumeh Koochak Shooshtari and   
    Mahmoud Ahmadian-Attari and   
             Mohammad Reza Aref   Squaring attacks on McEliece public-key
                                  cryptosystems using quasi-cyclic codes
                                  of even dimension  . . . . . . . . . . . 359--377
             Aysegul Bayram and   
           Elif Segah Oztas and   
                     Irfan Siap   Codes over $ F_4 + v F_4 $ and some DNA
                                  applications . . . . . . . . . . . . . . 379--393
              Marion Candau and   
             Roland Gautier and   
               Johannes Huisman   Convolutional block codes with
                                  cryptographic properties over the
                                  semi-direct product $ \mathbb {Z} / N
                                  \mathbb {Z} \rtimes \mathbb {Z} / M
                                  \mathbb {Z} $  . . . . . . . . . . . . . 395--407
            Kai-Uwe Schmidt and   
             Jürgen Willms   Barker sequences of odd length . . . . . 409--414
                   John Sheekey   Dimensional dual hyperovals in classical
                                  polar spaces . . . . . . . . . . . . . . 415--420

Designs, Codes, and Cryptography
Volume 80, Number 3, September, 2016

            Jason T. LeGrow and   
              David A. Pike and   
                Jonathan Poulin   Hamiltonicity and cycle extensions in
                                  $0$-block-intersection graphs of
                                  balanced incomplete block designs  . . . 421--433
             Kathleen Nowak and   
                    Oktay Olmez   Partial geometric designs with
                                  prescribed automorphisms . . . . . . . . 435--451
                     E. Ballico   Non-special subsets of the set of points
                                  of a curve defined over a finite field   453--457
                 Rongjia Li and   
                    Chenhui Jin   Meet-in-the-middle attacks on $
                                  10$-round AES-256  . . . . . . . . . . . 459--471
                 Ga Won Lee and   
                       Jin Hong   Comparison of perfect table
                                  cryptanalytic tradeoff algorithms  . . . 473--523
               Junqing Gong and   
                 Zhenfu Cao and   
               Shaohua Tang and   
                       Jie Chen   Extended dual system group and shorter
                                  unbounded hierarchical identity based
                                  encryption . . . . . . . . . . . . . . . 525--559
              Adel Alahmadi and   
            Hussain Alhazmi and   
              Tor Helleseth and   
                Rola Hijazi and   
              Najat Muthana and   
            Patrick Solé   On the lifted Zetterberg code  . . . . . 561--576
              Dirk Hachenberger   Asymptotic existence results for
                                  primitive completely normal elements in
                                  extensions of Galois fields  . . . . . . 577--586
                   Jian Guo and   
  Jérémy Jean and   
            Ivica Nikoli\'c and   
                      Yu Sasaki   Extended meet-in-the-middle attacks on
                                  some Feistel constructions . . . . . . . 587--618
      Juan Carlos Ku-Cauich and   
         Guillermo Morales-Luna   Authentication codes based on resilient
                                  Boolean maps . . . . . . . . . . . . . . 619--633
          Rebecca J. Stones and   
                    Ming Su and   
              Xiaoguang Liu and   
                  Gang Wang and   
                      Sheng Lin   A Latin square autotopism secret sharing
                                  scheme . . . . . . . . . . . . . . . . . 635--650


Designs, Codes, and Cryptography
Volume 81, Number 1, October, 2016

                  Haode Yan and   
                    Chunlei Liu   Two classes of cyclic codes and their
                                  weight enumerator  . . . . . . . . . . . 1--9
           Michelle Kendall and   
                Keith M. Martin   Graph-theoretic design and analysis of
                                  key predistribution schemes  . . . . . . 11--34
                 Aida Abiad and   
              Willem H. Haemers   Switched symplectic graphs and their
                                  $2$-ranks  . . . . . . . . . . . . . . . 35--41
             Shantian Cheng and   
                Khoa Nguyen and   
                  Huaxiong Wang   Policy-based signature scheme from
                                  lattices . . . . . . . . . . . . . . . . 43--74
                Matan Banin and   
                    Boaz Tsaban   A reduction of Semigroup DLP to classic
                                  DLP  . . . . . . . . . . . . . . . . . . 75--82
              Ciaran Mullan and   
                    Boaz Tsaban   $ {\rm SL}_2 $ homomorphic hash
                                  functions: worst case to average case
                                  reduction and short collision search . . 83--107
                   Chun Guo and   
                    Dongdai Lin   Separating invertible key derivations
                                  from non-invertible ones: sequential
                                  indifferentiability of $3$-round
                                  Even--Mansour  . . . . . . . . . . . . . 109--129
               John Bamberg and   
                Melissa Lee and   
                    Eric Swartz   A note on relative hemisystems of
                                  Hermitian generalised quadrangles  . . . 131--144
                  Michael Braun   New infinite series of $2$-designs over
                                  the binary and ternary field . . . . . . 145--152
                 Chengju Li and   
                Sunghan Bae and   
                Jaehyun Ahn and   
                 Shudi Yang and   
                   Zheng-An Yao   Complete weight enumerators of some
                                  linear codes and their applications  . . 153--168
             Trygve Johnsen and   
          Keisuke Shiromoto and   
                 Hugues Verdure   A generalization of Kung's theorem . . . 169--178

Designs, Codes, and Cryptography
Volume 81, Number 2, November, 2016

                   Alfredo Rial   Blind attribute-based encryption and
                                  oblivious transfer with fine-grained
                                  access control . . . . . . . . . . . . . 179--223
                    Yan Liu and   
                    Chunlei Liu   A class of cyclic codes whose duals have
                                  five zeros . . . . . . . . . . . . . . . 225--238
                  Boran Kim and   
                    Yoonjin Lee   Construction of extremal self-dual codes
                                  over $ {\mathbb {Z}}_8 $ and $ {\mathbb
                                  {Z}}_{16} $  . . . . . . . . . . . . . . 239--257
László Mérai and   
                 Arne Winterhof   On the linear complexity profile of some
                                  sequences derived from elliptic curves   259--267
       Bence Csajbók and   
                Corrado Zanella   On the equivalence of linear sets  . . . 269--281
             Zhengchun Zhou and   
                    Nian Li and   
                Cuiling Fan and   
                  Tor Helleseth   Linear codes with two or three weights
                                  from quadratic Bent functions  . . . . . 283--295
                  Zihui Liu and   
                     Xin-Wen Wu   The fullrank value function  . . . . . . 297--315
              Minquan Cheng and   
                 Jing Jiang and   
                  Haiyan Li and   
                  Ying Miao and   
                    Xiaohu Tang   Bounds and constructions for $
                                  {\overline {3}}$-separable codes with
                                  length $3$ . . . . . . . . . . . . . . . 317--335
             Wilfried Meidl and   
            Harald Niederreiter   Multisequences with high joint nonlinear
                                  complexity . . . . . . . . . . . . . . . 337--346
        Steven T. Dougherty and   
Cristina Fernández-Córdoba   Kernels and ranks of cyclic and
                                  negacyclic quaternary codes  . . . . . . 347--364
          R. Julian R. Abel and   
           Robert F. Bailey and   
          Andrea C. Burgess and   
             Peter Danziger and   
                Eric Mendelsohn   On generalized Howell designs with block
                                  size three . . . . . . . . . . . . . . . 365--391

Designs, Codes, and Cryptography
Volume 81, Number 3, December, 2016

               Yanfeng Wang and   
                     Wenling Wu   New criterion for diffusion property and
                                  applications to improved GFS and EGFN    393--412
                Abdulla Eid and   
               Hilaf Hasson and   
                   Amy Ksir and   
                 Justin Peachey   Suzuki-invariant codes from the Suzuki
                                  curve  . . . . . . . . . . . . . . . . . 413--425
     Cícero Carvalho and   
             Rafael Peixoto and   
                Fernando Torres   Near weights on higher dimensional
                                  varieties  . . . . . . . . . . . . . . . 427--443
         Antonio Cossidente and   
               Francesco Pavese   Veronese subspace codes  . . . . . . . . 445--457
                 Daqing Wan and   
                     Qiang Wang   Index bounds for character sums of
                                  polynomials over finite fields . . . . . 459--468
             Yuuki Kageyama and   
                 Tatsuya Maruta   On the geometric constructions of
                                  optimal linear codes . . . . . . . . . . 469--480
               Xiaoqin Zhan and   
                  Shenglin Zhou   Flag-transitive non-symmetric
                                  $2$-designs with $ (r, \lambda) = 1 $
                                  and sporadic socle . . . . . . . . . . . 481--487
                   Sanming Zhou   Total perfect codes in Cayley graphs . . 489--504
               Yanbin Zheng and   
               Pingzhi Yuan and   
                     Dingyi Pei   Large classes of permutation polynomials
                                  over $ \mathbb {F}_{q^2} $ . . . . . . . 505--521
              Huaifeng Chen and   
               Tingting Cui and   
                    Meiqin Wang   Improving algorithm 2 in
                                  multidimensional (zero-correlation)
                                  linear cryptanalysis using $
                                  \chi^2$-method . . . . . . . . . . . . . 523--540
               Hyun Jin Kim and   
                    Yoonjin Lee   Complementary information set codes over
                                  $ {\rm GF}(p) $  . . . . . . . . . . . . 541--555


Designs, Codes, and Cryptography
Volume 82, Number 1--2, January, 2017

            Pascale Charpin and   
           Thomas Johansson and   
           Gohar Kyureghyan and   
           Nicolas Sendrier and   
            Jean-Pierre Tillich   Editorial: Special issue on coding and
                                  cryptography . . . . . . . . . . . . . . 1--2
            Christina Boura and   
              Anne Canteaut and   
            Lars R. Knudsen and   
                 Gregor Leander   Reflection ciphers . . . . . . . . . . . 3--25
           Sondre Rònjom   Improving algebraic attacks on stream
                                  ciphers based on linear feedback shift
                                  register over $ \mathbb {F}_{2^k} $  . . 27--41
                    Pavol Zajac   Upper bounds on the complexity of
                                  algebraic cryptanalysis of ciphers with
                                  a low multiplicative complexity  . . . . 43--56
                  Serhii Dyshko   MacWilliams Extension Theorem for MDS
                                  codes over a vector space alphabet . . . 57--67
           Sergey Bezzateev and   
             Natalia Shekhunova   Lower bound of covering radius of binary
                                  irreducible Goppa codes  . . . . . . . . 69--76
         Kishan Chand Gupta and   
         Sumit Kumar Pandey and   
         Ayineedi Venkateswarlu   On the direct construction of recursive
                                  MDS matrices . . . . . . . . . . . . . . 77--94
        Kaushik Chakraborty and   
             Sumanta Sarkar and   
            Subhamoy Maitra and   
        Bodhisatwa Mazumdar and   
       Debdeep Mukhopadhyay and   
                Emmanuel Prouff   Redefining the transparency order  . . . 95--115
                  Marine Minier   Improving impossible-differential
                                  attacks against Rijndael-160 and
                                  Rijndael-224 . . . . . . . . . . . . . . 117--129
             Santanu Sarkar and   
         Ayineedi Venkateswarlu   Revisiting (nested) Roos bias in RC4 key
                                  scheduling algorithm . . . . . . . . . . 131--148
      Srimanta Bhattacharya and   
                 Sumanta Sarkar   On some permutation binomials and
                                  trinomials over $ \mathbb {F}_{2^n} $    149--160
             Mehdi Tibouchi and   
                    Taechan Kim   Improved elliptic curve hashing and
                                  point representation . . . . . . . . . . 161--177
         Kishan Chand Gupta and   
         Sumit Kumar Pandey and   
         Ayineedi Venkateswarlu   Towards a general construction of
                                  recursive MDS diffusion layers . . . . . 179--195
            A. G. D'yachkov and   
             I. V. Vorobyev and   
           N. A. Polyanskii and   
                V. Yu. Shchukin   Cover-free codes and separating system
                                  codes  . . . . . . . . . . . . . . . . . 197--209
            A. G. D'yachkov and   
             I. V. Vorobyev and   
           N. A. Polyanskii and   
                V. Yu. Shchukin   Symmetric disjunctive list-decoding
                                  codes  . . . . . . . . . . . . . . . . . 211--229
          Arkadii D'yachkov and   
              Ilya Vorobyev and   
          Nikita Polyanskii and   
             Vladislav Shchukin   Almost cover-free codes and designs  . . 231--247
            Cem Güneri and   
        Ferruh Özbudak and   
             Funda Özdemir   Hasse--Weil bound for additive cyclic
                                  codes  . . . . . . . . . . . . . . . . . 249--263
        Nurdagül Anbar and   
             Wilfried Meidl and   
                 Alev Topuzoglu   Idempotent and $p$-potent quadratic
                                  functions: distribution of nonlinearity
                                  and co-dimension . . . . . . . . . . . . 265--291
         Vladimir Gritsenko and   
        Grigory Kabatiansky and   
           Vladimir Lebedev and   
                Alexey Maevskiy   Signature codes for noisy multiple
                                  access adder channel . . . . . . . . . . 293--299
          Jeremy Maitin-Shepard   Optimal software-implemented
                                  Itoh--Tsujii inversion for $ \mathbb
                                  {F}_{2^m} $  . . . . . . . . . . . . . . 301--318

Designs, Codes, and Cryptography
Volume 82, Number 3, March, 2017

               Jerod Michel and   
                    Baokun Ding   A generalization of combinatorial
                                  designs and related codes  . . . . . . . 511--529
               Yupeng Jiang and   
                    Dongdai Lin   On affine sub-families of Grain-like
                                  structures . . . . . . . . . . . . . . . 531--542
                    Yun Fan and   
                    Bangteng Xu   Fourier transforms and bent functions on
                                  faithful actions of finite abelian
                                  groups . . . . . . . . . . . . . . . . . 543--558
             Kaoru Kurosawa and   
              Hiroyuki Ohta and   
                   Kenji Kakuta   How to make a linear network code
                                  (strongly) secure  . . . . . . . . . . . 559--582
                 Shuxing Li and   
                Hengjia Wei and   
                     Gennian Ge   Generic constructions for partitioned
                                  difference families with applications: a
                                  unified combinatorial approach . . . . . 583--599
              Palash Sarkar and   
                 Shashank Singh   A new method for decomposition in the
                                  Jacobian of small genus hyperelliptic
                                  curves . . . . . . . . . . . . . . . . . 601--616
             Moises Delgado and   
                 Heeralal Janwa   On the conjecture on APN functions and
                                  absolute irreducibility of polynomials   617--627
              R. Lakshmanan and   
                    S. Arumugam   Construction of a $ (k, n)$-visual
                                  cryptography scheme  . . . . . . . . . . 629--645
                Haiying Liu and   
                 Keqin Feng and   
                  Rongquan Feng   Nonexistence of generalized bent
                                  functions from $ \mathbb {Z}_2^n $ to $
                                  \mathbb {Z}_m $  . . . . . . . . . . . . 647--662
                 Shudi Yang and   
                   Zheng-An Yao   Complete weight enumerators of a family
                                  of three-weight linear codes . . . . . . 663--674
                  M. Huggan and   
               G. L. Mullen and   
                 B. Stevens and   
                     D. Thomson   Sudoku-like arrays, codes and
                                  orthogonality  . . . . . . . . . . . . . 675--693
                    Ming Li and   
               Yupeng Jiang and   
                    Dongdai Lin   The adjacency graphs of some feedback
                                  shift registers  . . . . . . . . . . . . 695--713


Designs, Codes, and Cryptography
Volume 83, Number 1, April, 2017

               Liqiang Peng and   
                     Lei Hu and   
                     Yao Lu and   
                     Jun Xu and   
                 Zhangjie Huang   Cryptanalysis of Dual RSA  . . . . . . . 1--21
                  Hao Zheng and   
               Yanxun Chang and   
                   Junling Zhou   Direct constructions of large sets of
                                  Kirkman triple systems . . . . . . . . . 23--32
                Xiao-Nan Lu and   
                 Masakazu Jimbo   Affine-invariant strictly cyclic Steiner
                                  quadruple systems  . . . . . . . . . . . 33--69
              Minquan Cheng and   
                Hung-Lin Fu and   
                 Jing Jiang and   
               Yuan-Hsun Lo and   
                      Ying Miao   Codes with the identifiable parent
                                  property for multimedia fingerprinting   71--82
                Jaehyun Ahn and   
                Dongseok Ka and   
                     Chengju Li   Complete weight enumerators of a class
                                  of linear codes  . . . . . . . . . . . . 83--99
                 Diego Napp and   
               Raquel Pinto and   
                   Marisa Toste   On MDS convolutional codes over $
                                  \mathbb {Z}_{p^r} $  . . . . . . . . . . 101--114
                Nicola Pace and   
                 Angelo Sonnino   On linear codes admitting large
                                  automorphism groups  . . . . . . . . . . 115--143
        Esteban Landerreche and   
   David Fernández-Duque   A case study in almost-perfect security
                                  for unconditionally secure communication 145--168
                Denis S. Krotov   On the automorphism groups of the $ Z_2
                                  Z_4 $-linear $1$-perfect and
                                  Preparata-like codes . . . . . . . . . . 169--177
              Xiaotian Chen and   
                       Yue Zhou   Asynchronous channel hopping systems
                                  from difference sets . . . . . . . . . . 179--196
                Hongfeng Wu and   
                     Li Zhu and   
              Rongquan Feng and   
                     Siman Yang   Explicit factorizations of cyclotomic
                                  polynomials over finite fields . . . . . 197--217
                Bocong Chen and   
                  Liren Lin and   
                   San Ling and   
                    Hongwei Liu   Three new classes of optimal
                                  frequency-hopping sequence sets  . . . . 219--232

Designs, Codes, and Cryptography
Volume 83, Number 2, May, 2017

            Daniele Bartoli and   
          Stefano Marcugini and   
             Fernanda Pambianco   On the completeness of plane cubic
                                  curves over finite fields  . . . . . . . 233--267
             Angela Aguglia and   
                    Luca Giuzzi   Intersection sets, three-character
                                  multisets and associated codes . . . . . 269--282
                 M. Kuijper and   
                       R. Pinto   An iterative algorithm for
                                  parametrization of shortest length
                                  linear shift registers over finite chain
                                  rings  . . . . . . . . . . . . . . . . . 283--305
                Ziling Heng and   
                        Qin Yue   Evaluation of the Hamming weights of a
                                  class of linear codes based on Gauss
                                  sums . . . . . . . . . . . . . . . . . . 307--326
             Mahdi Sajadieh and   
              Arash Mirzaei and   
                 Hamid Mala and   
                 Vincent Rijmen   A new counting method to bound the
                                  number of active S-boxes in Rijndael and
                                  $3$D . . . . . . . . . . . . . . . . . . 327--343
               I. F. Rúa   Primitive semifields of order $ 2^{4e} $ 345--356
                   Bart Mennink   Optimal collision security in double
                                  block length hashing with single length
                                  key  . . . . . . . . . . . . . . . . . . 357--406
                 Yiyuan Luo and   
                 Xuejia Lai and   
                     Yujie Zhou   Generic attacks on the Lai--Massey
                                  scheme . . . . . . . . . . . . . . . . . 407--423
                 Jingxue Ma and   
                  Tao Zhang and   
                   Tao Feng and   
                     Gennian Ge   Some new results on permutation
                                  polynomials over finite fields . . . . . 425--443
               Yupeng Jiang and   
                Jiangshuai Yang   On the number of irreducible linear
                                  transformation shift registers . . . . . 445--454
                 Xiang Wang and   
                    Fang-Wei Fu   On the snake-in-the-box codes for rank
                                  modulation under Kendall's $ \tau
                                  $-metric . . . . . . . . . . . . . . . . 455--465
                Yonglin Hao and   
                    Willi Meier   Truncated differential based known-key
                                  attacks on round-reduced SIMON . . . . . 467--492

Designs, Codes, and Cryptography
Volume 83, Number 3, June, 2017

                 Tran van Trung   Simple $t$-designs: a recursive
                                  construction for arbitrary $t$ . . . . . 493--502
                  Tao Zhang and   
                     Gennian Ge   Quantum MDS codes with large minimum
                                  distance . . . . . . . . . . . . . . . . 503--517
                Elisa Gorla and   
                Maike Massierer   An optimal representation for the trace
                                  zero subgroup  . . . . . . . . . . . . . 519--548
          Esmeralda Nastase and   
                  Papa Sissokho   The structure of the minimum size
                                  supertail of a subspace partition  . . . 549--563
                 Xinxin Fan and   
           Adilet Otemissov and   
             Francesco Sica and   
               Andrey Sidorenko   Multiple point compression on elliptic
                                  curves . . . . . . . . . . . . . . . . . 565--588
               Jon-Lark Kim and   
                       Nari Lee   A projection decoding of a binary
                                  extremal self-dual code of length $ 40 $ 589--609
         Aras Erzurumluoglu and   
                  David A. Pike   Twofold triple systems without
                                  $2$-intersecting Gray codes  . . . . . . 611--631
                Lingfei Jin and   
                     Haibin Kan   Construction of binary linear codes via
                                  rational function fields . . . . . . . . 633--638
Umberto Martínez-Peñas   On the roots and minimum rank distance
                                  of skew cyclic codes . . . . . . . . . . 639--660
               Sergey Bereg and   
              Linda Morales and   
              I. Hal Sudborough   Extending permutation arrays: improving
                                  MOLS bounds  . . . . . . . . . . . . . . 661--683
           Victor J. W. Guo and   
                    Yiting Yang   Proof of a conjecture of Klòve on
                                  permutation codes under the Chebychev
                                  distance . . . . . . . . . . . . . . . . 685--690
              Chunming Tang and   
                  Can Xiang and   
                     Keqin Feng   Linear codes with few weights from
                                  inhomogeneous quadratic functions  . . . 691--714
                      Anonymous   Editor's note  . . . . . . . . . . . . . 715--716


Designs, Codes, and Cryptography
Volume 84, Number 1--2, July, 2017

              Aart Blokhuis and   
           Edwin R. van Dam and   
          Willem H. Haemers and   
                 Jack H. Koolen   Preface to the special issue dedicated
                                  to Andries E. Brouwer  . . . . . . . . . 1--2
                Jack Koolen and   
                       Zhi Qiao   Light tails and the Hermitian dual polar
                                  graphs . . . . . . . . . . . . . . . . . 3--12
            K. Ashik Mathew and   
Patric R. J. Östergård   New lower bounds for the Shannon
                                  capacity of odd cycles . . . . . . . . . 13--22
              Eiichi Bannai and   
              Etsuko Bannai and   
                        Yan Zhu   Relative $t$-designs in binary Hamming
                                  association scheme $ H(n, 2)$  . . . . . 23--53
                   V. Diego and   
                     M. A. Fiol   Distance mean-regular graphs . . . . . . 55--71
          Alireza Abdollahi and   
           Edwin R. van Dam and   
                Mojtaba Jazaeri   Distance-regular Cayley graphs with
                                  least eigenvalue $ - 2 $ . . . . . . . . 73--85
               Bart Litjens and   
                 Sven Polak and   
            Alexander Schrijver   Semidefinite bounds for nonbinary codes
                                  based on quadruples  . . . . . . . . . . 87--100
             Leonard H. Soicher   The uniqueness of a distance-regular
                                  graph with intersection array $ \{ 32,
                                  27, 8, 1; 1, 4, 27, 32 \} $ and related
                                  results  . . . . . . . . . . . . . . . . 101--108
           Peter J. Cameron and   
           Josephine Kusuma and   
            Patrick Solé   $ \mathbb {Z}_4 $-codes and their Gray
                                  map images as orthogonal arrays  . . . . 109--114
             Anurag Bishnoi and   
                  Bart De Bruyn   Characterizations of the Suzuki tower
                                  near polygons  . . . . . . . . . . . . . 115--133
              Xi-Ming Cheng and   
                 Jack H. Koolen   A generalization of a theorem of
                                  Neumaier . . . . . . . . . . . . . . . . 135--142
       Jozefien D'haeseleer and   
               Klaus Metsch and   
                 Leo Storme and   
         Geertrui Van de Voorde   On the maximality of a set of mutually
                                  orthogonal Sudoku latin Squares  . . . . 143--152
        Sebastian M. Cioaba and   
          Willem H. Haemers and   
              Jason R. Vermette   The graphs with all but two eigenvalues
                                  equal to $ - 2 $ or $0$  . . . . . . . . 153--163
            Vladimir D. Tonchev   On resolvable Steiner $2$-designs and
                                  maximal arcs in projective planes  . . . 165--172
               Akihiro Munemasa   Godsil--McKay switching and twisted
                                  Grassmann graphs . . . . . . . . . . . . 173--179
István Kovács and   
            Klavdija Kutnar and   
          János Ruff and   
          Tamás Sz\Honyi   Integral automorphisms of affine spaces
                                  over finite fields . . . . . . . . . . . 181--188
               Ebrahim Ghorbani   On eigenvalues of Seidel matrices and
                                  Haemers' conjecture  . . . . . . . . . . 189--195
                A. Blokhuis and   
                  G. Marino and   
                F. Mazzocca and   
                   O. Polverino   On almost small and almost large
                                  super-Vandermonde sets in $ {\rm GF}(q)
                                  $  . . . . . . . . . . . . . . . . . . . 197--201
               Mikhail Klin and   
                   Matan Ziv-Av   A non-Schurian coherent configuration on
                                  $ 14 $ points exists . . . . . . . . . . 203--221
              Nathann Cohen and   
           Dmitrii V. Pasechnik   Implementing Brouwer's database of
                                  strongly regular graphs  . . . . . . . . 223--235
                Arnold Neumaier   Bounding basis reduction properties  . . 237--259
Umberto Martínez-Peñas and   
                 Ruud Pellikaan   Rank error-correcting pairs  . . . . . . 261--281
          David B. Chandler and   
                  Peter Sin and   
                     Qing Xiang   The Smith group of the hypercube graph   283--294
                   Tom Verhoeff   The spurs of D. H. Lehmer  . . . . . . . 295--310

Designs, Codes, and Cryptography
Volume 84, Number 3, September, 2017

                 Huiwen Jia and   
                        Yupu Hu   Cryptanalysis of multilinear maps from
                                  ideal lattices: revisited  . . . . . . . 311--324
                  Zhaoping Meng   Doubly resolvable Steiner quadruple
                                  systems and related designs  . . . . . . 325--343
             Michel Lavrauw and   
                   John Sheekey   The BEL-rank of finite semifields  . . . 345--358
                 Shuxing Li and   
                     Gennian Ge   Constructions of maximum distance
                                  separable symbol-pair codes using cyclic
                                  and constacyclic codes . . . . . . . . . 359--372
             Angelo De Caro and   
                Vincenzo Iovino   On the power of rewinding simulators in
                                  functional encryption  . . . . . . . . . 373--399
                 Hongyu Han and   
               Daiyuan Peng and   
           Udaya Parampalli and   
                   Zheng Ma and   
                  Hongbin Liang   Construction of low-hit-zone frequency
                                  hopping sequences with optimal partial
                                  Hamming correlation by interleaving
                                  techniques . . . . . . . . . . . . . . . 401--414
             James A. Davis and   
           Sophie Huczynska and   
                 Gary L. Mullen   Near-complete external difference
                                  families . . . . . . . . . . . . . . . . 415--424
               Ana Salagean and   
                  R. Winter and   
    Matei Mandache-Salagean and   
             Raphael C.-W. Phan   Higher order differentiation over finite
                                  fields with applications to generalising
                                  the cube attack  . . . . . . . . . . . . 425--449
          Stefaan De Winter and   
                    Zeying Wang   Classification of partial difference
                                  sets in Abelian groups of order $ 4 p^2
                                  $  . . . . . . . . . . . . . . . . . . . 451--461
                Lingfei Jin and   
                 Haibin Kan and   
                        Jie Wen   Quantum MDS codes with relatively large
                                  minimum distance from Hermitian
                                  self-orthogonal codes  . . . . . . . . . 463--471
                    Yun Fan and   
                    Liang Zhang   Galois self-dual constacyclic codes  . . 473--492


Designs, Codes, and Cryptography
Volume 85, Number 1, October, 2017

             Thor Martinsen and   
             Wilfried Meidl and   
         Pantelimon St\uanic\ua   Partial spread and vectorial generalized
                                  bent functions . . . . . . . . . . . . . 1--13
                  Gang Shen and   
                   Feng Liu and   
                Zhengxin Fu and   
                         Bin Yu   Perfect contrast XOR-based visual
                                  cryptography schemes via linear algebra  15--37
                Kwangsu Lee and   
              Dong Hoon Lee and   
                 Jong Hwan Park   Efficient revocable identity-based
                                  encryption via subset difference methods 39--76
            Eleonesio Strey and   
              Sueli I. R. Costa   Lattices from codes over $ \mathbb {Z}_q
                                  $: generalization of constructions $D$,
                                  $ D'$ and $ \overline {D}$ . . . . . . . 77--95
                    Sascha Kurz   Improved upper bounds for partial
                                  spreads  . . . . . . . . . . . . . . . . 97--106
         Günter F. Steinke   Collineations of finite $2$-affine
                                  planes . . . . . . . . . . . . . . . . . 107--120
                 Leyla Isik and   
             Alev Topuzoglu and   
                 Arne Winterhof   Complete mappings and Carlitz rank . . . 121--128
                Peter Horak and   
                Igor Semaev and   
                     Zsolt Tuza   A combinatorial problem related to
                                  sparse systems of equations  . . . . . . 129--144
               Rongmao Chen and   
                      Yi Mu and   
                Guomin Yang and   
               Willy Susilo and   
                     Fuchun Guo   Strong authenticated key exchange with
                                  auxiliary inputs . . . . . . . . . . . . 145--173
               Rongmao Chen and   
                      Yi Mu and   
                Guomin Yang and   
               Willy Susilo and   
                 Fuchun Guo and   
                     Yang Zheng   A note on the strong authenticated key
                                  exchange with auxiliary inputs . . . . . 175--178
                  Jian Yuan and   
                 Shixin Zhu and   
               Xiaoshan Kai and   
                        Ping Li   On the construction of quantum
                                  constacyclic codes . . . . . . . . . . . 179--190

Designs, Codes, and Cryptography
Volume 85, Number 2, November, 2017

                 Kamil Otal and   
            Ferruh Özbudak   Cyclic subspace codes via subspace
                                  polynomials  . . . . . . . . . . . . . . 191--204
               Satoshi Yoshiara   Equivalences among plateaued APN
                                  functions  . . . . . . . . . . . . . . . 205--217
             Limengnan Zhou and   
               Daiyuan Peng and   
              Hongbin Liang and   
             Changyuan Wang and   
                       Zheng Ma   Constructions of optimal low-hit-zone
                                  frequency hopping sequence sets  . . . . 219--232
            Vladimir D. Tonchev   Linearly embeddable designs  . . . . . . 233--247
               Junling Zhou and   
                   Yanxun Chang   Bounds and constructions of
                                  $t$-spontaneous emission error designs   249--271
             Kaoru Kurosawa and   
                 Le Trieu Phong   Anonymous and leakage resilient IBE and
                                  IPE  . . . . . . . . . . . . . . . . . . 273--298
              Jingyuan Chen and   
                   Lijun Ji and   
                         Yun Li   New optical orthogonal signature pattern
                                  codes with maximum collision parameter
                                  $2$ and weight $4$ . . . . . . . . . . . 299--318
                    Yun Fan and   
                    Bangteng Xu   Nonlinear functions and difference sets
                                  on group actions . . . . . . . . . . . . 319--341
                 Junwu Dong and   
                     Dingyi Pei   Construction for de Bruijn sequences
                                  with large stage . . . . . . . . . . . . 343--358
Luis Felipe Tapia Cuitiño and   
            Andrea Luigi Tironi   Some properties of skew codes over
                                  finite fields  . . . . . . . . . . . . . 359--380
              Abbas Alhakim and   
                 Maher Nouiehed   Stretching de Bruijn sequences . . . . . 381--394

Designs, Codes, and Cryptography
Volume 85, Number 3, December, 2017

               Nikolay Kolomeec   The graph of minimal distances of bent
                                  functions and its properties . . . . . . 395--410
                  Hao Zheng and   
               Yanxun Chang and   
                   Junling Zhou   Large sets of Kirkman triple systems of
                                  prime power sizes  . . . . . . . . . . . 411--423
              Zongchen Chen and   
                        Da Zhao   On symmetric BIBDs with the same
                                  $3$-concurrence  . . . . . . . . . . . . 425--436
          Georgios Tzanakis and   
                Lucia Moura and   
             Daniel Panario and   
                  Brett Stevens   Covering arrays from m-sequences and
                                  character sums . . . . . . . . . . . . . 437--456
         Antonio Cossidente and   
               Francesco Pavese   Strongly regular graphs from classical
                                  generalized quadrangles  . . . . . . . . 457--470
                 Jianing Li and   
                    Yingpu Deng   Nonexistence of two classes of
                                  generalized bent functions . . . . . . . 471--482
            Manabu Hagiwara and   
                    Justin Kong   Consolidation for compact constraints
                                  and Kendall tau LP decodable permutation
                                  codes  . . . . . . . . . . . . . . . . . 483--521
                     Ronan Egan   On equivalence of negaperiodic Golay
                                  pairs  . . . . . . . . . . . . . . . . . 523--532
                   Xin Wang and   
                Yiwei Zhang and   
                Yiting Yang and   
                     Gennian Ge   New bounds of permutation codes under
                                  Hamming metric and Kendall's $ \tau
                                  $-metric . . . . . . . . . . . . . . . . 533--545
                 Amir Rubin and   
                     Gera Weiss   Mapping prefer-opposite to prefer-one de
                                  Bruijn sequences . . . . . . . . . . . . 547--555
             Joaquim Borges and   
Cristina Fernández-Córdoba   There is exactly one $ \mathbb {Z}_2
                                  \mathbb {Z}_4 $-cyclic $1$-perfect code  557--566


Designs, Codes, and Cryptography
Volume 86, Number 1, January, 2018

          Javier de la Cruz and   
                Elisa Gorla and   
      Hiram H. López and   
              Alberto Ravagnani   Weight distribution of rank-metric codes 1--16
             Yohei Watanabe and   
                  Junji Shikata   Timed-release computational secret
                                  sharing and threshold encryption . . . . 17--54
           Gottfried Herold and   
           Elena Kirshanova and   
                  Alexander May   On the asymptotic complexity of solving
                                  LWE  . . . . . . . . . . . . . . . . . . 55--83
      Oliver Wilhelm Gnilke and   
           Marcus Greferath and   
         Mario Osvin Pavcevi\'c   Mosaics of combinatorial designs . . . . 85--95
                Jongkil Kim and   
               Willy Susilo and   
                 Fuchun Guo and   
                      Man Ho Au   Functional encryption for computational
                                  hiding in prime order groups via pair
                                  encodings  . . . . . . . . . . . . . . . 97--120
               Kenza Guenda and   
            Somphong Jitman and   
              T. Aaron Gulliver   Constructions of good
                                  entanglement-assisted quantum error
                                  correcting codes . . . . . . . . . . . . 121--136
           Léo Ducas and   
       Wessel P. J. van Woerden   The closest vector problem in tensored
                                  root lattices of type A and in their
                                  duals  . . . . . . . . . . . . . . . . . 137--150
                Qichun Wang and   
               Chik How Tan and   
           Theo Fanuela Prabowo   On the covering radius of the third
                                  order Reed--Muller code $ {\rm RM}(3, 7)
                                  $  . . . . . . . . . . . . . . . . . . . 151--159
            Daniele Bartoli and   
           Maria Montanucci and   
                  Giovanni Zini   Multi point AG codes on the GK maximal
                                  curve  . . . . . . . . . . . . . . . . . 161--177
            Alice M. W. Hui and   
                B. G. Rodrigues   Switched graphs of some strongly regular
                                  graphs related to the symplectic graph   179--194
         Douglas R. Stinson and   
                   Ruizhong Wei   Combinatorial repairability for
                                  threshold schemes  . . . . . . . . . . . 195--210
             Chuangqiang Hu and   
                     Shudi Yang   Multi-point codes over Kummer extensions 211--230
     Alexander L. Gavrilyuk and   
                Ilia Matkin and   
                   Tim Penttila   Derivation of Cameron--Liebler line
                                  classes  . . . . . . . . . . . . . . . . 231--236

Designs, Codes, and Cryptography
Volume 86, Number 2, February, 2018

         Simon R. Blackburn and   
           Marcus Greferath and   
           Camilla Hollanti and   
     Mario Osvin Pavcevi\'c and   
          Joachim Rosenthal and   
                 Leo Storme and   
Ángeles Vázquez-Castro and   
              Alfred Wassermann   Preface to the special issue on network
                                  coding and designs . . . . . . . . . . . 237--238
          Michael Kiermaier and   
                Sascha Kurz and   
              Alfred Wassermann   The order of the automorphism group of a
                                  binary $ {\vec{q}} $-analog of the Fano
                                  plane is at most two . . . . . . . . . . 239--250
          Michael Kiermaier and   
              Reinhard Laue and   
              Alfred Wassermann   A new series of large sets of subspace
                                  designs over the binary field  . . . . . 251--268
              Dirk Liebhold and   
              Gabriele Nebe and   
         Angeles Vazquez-Castro   Network coding with flags  . . . . . . . 269--284
              Paulo Almeida and   
                 Diego Napp and   
                   Raquel Pinto   MDS 2D convolutional codes with optimal
                                  1D horizontal projections  . . . . . . . 285--302
                    D. Napp and   
                   R. Pinto and   
                   V. Sidorenko   Concatenation of convolutional codes and
                                  rank metric codes for multi-shot network
                                  coding . . . . . . . . . . . . . . . . . 303--318
Anna-Lena Horlemann-Trautmann and   
              Kyle Marshall and   
              Joachim Rosenthal   Extension of Overbeck's attack for
                                  Gabidulin-based cryptosystems  . . . . . 319--340
            Alessandro Neri and   
Anna-Lena Horlemann-Trautmann and   
    Tovohery Randrianarisoa and   
              Joachim Rosenthal   On the genericity of maximum rank
                                  distance and Gabidulin codes . . . . . . 341--363
  Anna-Lena Horlemann-Trautmann   Message encoding and retrieval for
                                  spread and cyclic orbit codes  . . . . . 365--386
              Netanel Raviv and   
              Eitan Yaakobi and   
           Muriel Médard   Coding for locality in reconstructing
                                  permutations . . . . . . . . . . . . . . 387--418
        Natalia Silberstein and   
                  Alexander Zeh   Anticode-based locally repairable codes
                                  with high availability . . . . . . . . . 419--445

Designs, Codes, and Cryptography
Volume 86, Number 3, March, 2018

                      Anonymous   Editor's note  . . . . . . . . . . . . . 447--447
          Dieter Jungnickel and   
            Vladimir D. Tonchev   On Bonisoli's theorem and the block
                                  codes of Steiner triple systems  . . . . 449--462
             Joaquim Borges and   
Cristina Fernández-Córdoba and   
                Roger Ten-Valls   $ {{\mathbb {Z}}}_2$-double cyclic codes 463--479
            Mich\`ele Feltz and   
                    Cas Cremers   Strengthening the security of
                                  authenticated key exchange against bad
                                  randomness . . . . . . . . . . . . . . . 481--516
                  Shuai Han and   
                Shengli Liu and   
                Baodong Qin and   
                        Dawu Gu   Tightly CCA-secure identity-based
                                  encryption with ciphertext
                                  pseudorandomness . . . . . . . . . . . . 517--554
         Ales Drápal and   
                  Viliam Valent   Few associative triples, isotopisms and
                                  groups . . . . . . . . . . . . . . . . . 555--568
       Roland D. Barrolleta and   
             Merc\`e Villanueva   Partial permutation decoding for binary
                                  linear and $ Z_4 $-linear Hadamard codes 569--586
          Dieter Jungnickel and   
                   Yue Zhou and   
            Vladimir D. Tonchev   Extension sets, affine designs, and
                                  Hamada's conjecture  . . . . . . . . . . 587--610
     Jürgen Bierbrauer and   
            Daniele Bartoli and   
              Giorgio Faina and   
          Stefano Marcugini and   
             Fernanda Pambianco   A family of semifields in odd
                                  characteristic . . . . . . . . . . . . . 611--621
               Jooyoung Lee and   
                 Atul Luykx and   
               Bart Mennink and   
             Kazuhiko Minematsu   Connecting tweakable and multi-key
                                  blockcipher security . . . . . . . . . . 623--640
            Seung Geol Choi and   
         Dana Dachman-Soled and   
                 Tal Malkin and   
                    Hoeteck Wee   Improved, black-box, non-malleable
                                  encryption from semantic security  . . . 641--663
               Ulrich Dempwolff   CCZ equivalence of power functions . . . 665--692
     Rafael A. Arce-Nazario and   
          Francis N. Castro and   
   Oscar E. González and   
             Luis A. Medina and   
              Ivelisse M. Rubio   New families of balanced symmetric
                                  functions and a generalization of
                                  Cusick, Li and St\uanic\ua's conjecture  693--701
                  Cunsheng Ding   Infinite families of $3$-designs from a
                                  type of five-weight code . . . . . . . . 703--719

Designs, Codes, and Cryptography
Volume 86, Number 4, April, 2018

                     Li Lin and   
                     Wenling Wu   Improved meet-in-the-middle attacks on
                                  reduced-round Kalyna-128/256 and
                                  Kalyna-256/512 . . . . . . . . . . . . . 721--741
               Remi Bricout and   
                Sean Murphy and   
        Kenneth G. Paterson and   
            Thyla van der Merwe   Analysing and exploiting the Mantin
                                  biases in RC4  . . . . . . . . . . . . . 743--770
                 Fengwei Li and   
                        Qin Yue   The primitive idempotents and weight
                                  distributions of irreducible
                                  constacyclic codes . . . . . . . . . . . 771--784
        José Moreira and   
    Marcel Fernández and   
            Grigory Kabatiansky   Constructions of almost secure
                                  frameproof codes with applications to
                                  fingerprinting schemes . . . . . . . . . 785--802
                  Tao Zhang and   
                     Gennian Ge   Combinatorial constructions of packings
                                  in Grassmannian spaces . . . . . . . . . 803--815
                    Oktay Olmez   A link between combinatorial designs and
                                  three-weight linear codes  . . . . . . . 817--833
                   Gerardo Vega   A correction on the determination of the
                                  weight enumerator polynomial of some
                                  irreducible cyclic codes . . . . . . . . 835--840
                Baokun Ding and   
                 Gennian Ge and   
                  Jun Zhang and   
                  Tao Zhang and   
                    Yiwei Zhang   New constructions of MDS symbol-pair
                                  codes  . . . . . . . . . . . . . . . . . 841--859
                  Sven C. Polak   New nonbinary code bounds based on
                                  divisibility arguments . . . . . . . . . 861--874
        Irrinki Gnana Sudha and   
                 R. S. Selvaraj   Codes with a pomset metric and
                                  constructions  . . . . . . . . . . . . . 875--892
                 Xiang-Dong Hou   Complexities of normal bases constructed
                                  from Gauss periods . . . . . . . . . . . 893--905
        Charles J. Colbourn and   
                 Erin Lanus and   
                 Kaushik Sarkar   Asymptotic and constructive methods for
                                  covering perfect hash families and
                                  covering arrays  . . . . . . . . . . . . 907--937
               Zhiqiang Lin and   
                 Dingyi Pei and   
                Dongdai Lin and   
                  Xiaolei Zhang   Fast construction of binary ring FCSRs
                                  for hardware stream ciphers  . . . . . . 939--953

Designs, Codes, and Cryptography
Volume 86, Number 5, May, 2018

                   Jooyoung Lee   Key alternating ciphers based on
                                  involutions  . . . . . . . . . . . . . . 955--988
                   Boris Ryabko   Properties of two Shannon's ciphers  . . 989--995
               John Bamberg and   
             Jesse Lansdown and   
                    Melissa Lee   On $m$-ovoids of regular near polygons   997--1006
                Dabin Zheng and   
                    Jingjun Bao   Four classes of linear codes from
                                  cyclotomic cosets  . . . . . . . . . . . 1007--1022
                 Weihua Liu and   
             Andrew Klapper and   
                  Zhixiong Chen   Solving the FCSR synthesis problem for
                                  multi-sequences by lattice basis
                                  reduction  . . . . . . . . . . . . . . . 1023--1038
    John Vincent S. Morales and   
                  Hajime Tanaka   An Assmus--Mattson theorem for codes
                                  over commutative association schemes . . 1039--1062
                Liantao Lan and   
               Yanxun Chang and   
                    Lidong Wang   Constructions of cyclic quaternary
                                  constant-weight codes of weight three
                                  and distance four  . . . . . . . . . . . 1063--1083
                 Masaaki Harada   Binary extremal self-dual codes of
                                  length 60 and related codes  . . . . . . 1085--1094
               Sergey Bereg and   
                   Avi Levy and   
              I. Hal Sudborough   Constructing permutation arrays from
                                  groups . . . . . . . . . . . . . . . . . 1095--1111
László Mérai   On the elliptic curve endomorphism
                                  generator  . . . . . . . . . . . . . . . 1113--1129
        Sugata Gangopadhyay and   
               Bimal Mandal and   
         Pantelimon St\uanic\ua   Gowers $ U_3 $ norm of some classes of
                                  bent Boolean functions . . . . . . . . . 1131--1148
                Jiejing Wen and   
               Minghui Yang and   
                 Fangwei Fu and   
                     Keqin Feng   Cyclotomic construction of strong
                                  external difference families in finite
                                  fields . . . . . . . . . . . . . . . . . 1149--1159
         Antonio Cossidente and   
               Francesco Pavese   On intriguing sets of finite symplectic
                                  spaces . . . . . . . . . . . . . . . . . 1161--1174

Designs, Codes, and Cryptography
Volume 86, Number 6, June, 2018

             Giorgio Donati and   
                 Nicola Durante   A generalization of the normal rational
                                  curve in $ \mathrm{PG}(d, q^n) $ and its
                                  associated non-linear MRD codes  . . . . 1175--1184
                 Tran van Trung   A recursive construction for simple
                                  $t$-designs using resolutions  . . . . . 1185--1200
                 Minjia Shi and   
             Zahra Sepasdar and   
              Adel Alahmadi and   
            Patrick Solé   On two-weight $ \mathbb {Z}_{2^k}
                                  $-codes  . . . . . . . . . . . . . . . . 1201--1209
                Goutam Paul and   
                     Souvik Ray   On data complexity of distinguishing
                                  attacks versus message recovery attacks
                                  on stream ciphers  . . . . . . . . . . . 1211--1247
                  Nuh Aydin and   
       Yasemin Cengellenmis and   
                Abdullah Dertli   On some constacyclic codes over $
                                  \mathbb {Z}_4 \left [u \right] / \left
                                  \langle u^2 - 1 \right \rangle $, their
                                  $ \mathbb {Z}_4 $ images, and new codes  1249--1255
              Adel Alahmadi and   
         Funda Özdemir and   
            Patrick Solé   On self-dual double circulant codes  . . 1257--1265
                Bocong Chen and   
                    Hongwei Liu   Constructions of cyclic constant
                                  dimension codes  . . . . . . . . . . . . 1267--1279
              Chong-Dao Lee and   
               Yaotsu Chang and   
                    Chia-an Liu   A construction of group divisible
                                  designs with block sizes 3 to 7  . . . . 1281--1293
                 Wenquan Bi and   
                   Zheng Li and   
              Xiaoyang Dong and   
                      Lu Li and   
                   Xiaoyun Wang   Conditional cube attack on round-reduced
                                  River Keyak  . . . . . . . . . . . . . . 1295--1310
         Ferdinand Ihringer and   
                  Karen Meagher   Miklós--Manickam--Singhi conjectures on
                                  partial geometries . . . . . . . . . . . 1311--1327
                     Wei Su and   
                  Yang Yang and   
                    Cuiling Fan   New optimal binary sequences with period
                                  $ 4 p $ via interleaving
                                  Ding--Helleseth--Lam sequences . . . . . 1329--1338
                  Jie Zhang and   
                   Jie Chen and   
               Junqing Gong and   
                   Aijun Ge and   
                    Chuangui Ma   Leakage-resilient attribute based
                                  encryption in prime-order groups via
                                  predicate encodings  . . . . . . . . . . 1339--1366
             James A. Davis and   
                    Oktay Olmez   A framework for constructing partial
                                  geometric difference sets  . . . . . . . 1367--1375

Designs, Codes, and Cryptography
Volume 86, Number 7, July, 2018

             Joaquim Borges and   
Cristina Fernández-Córdoba   A characterization of $ \mathbb{Z}_2
                                  \mathbb{Z}_2 [u] $-linear codes  . . . . 1377--1389
           Philippe Gaborit and   
               Ayoub Otmani and   
Hervé Talé Kalachi   Polynomial-time key recovery attack on
                                  the Faure--Loidreau scheme based on
                                  Gabidulin codes  . . . . . . . . . . . . 1391--1403
                  David Clayton   A note on almost difference sets in
                                  nonabelian groups  . . . . . . . . . . . 1405--1410
                  Shuai Han and   
                Shengli Liu and   
                        Lin Lyu   Super-strong RKA secure MAC, PKE and SE
                                  from tag-based hash proof system . . . . 1411--1449
                Hai Q. Dinh and   
          Abhay Kumar Singh and   
        Sukhamoy Pattanayak and   
          Songsak Sriboonchitta   Cyclic DNA codes over the ring $
                                  \mathbb{F}_2 + u \mathbb{F}_2 + v
                                  \mathbb{F}_2 + u v \mathbb{F}_2 + v^2
                                  \mathbb{F}_2 + u v^2 \mathbb{F}_2 $  . . 1451--1467
                Kai-Uwe Schmidt   Hermitian rank distance codes  . . . . . 1469--1481
                  Zibi Xiao and   
             Xiangyong Zeng and   
                 Chunlei Li and   
                  Tor Helleseth   New generalized cyclotomic binary
                                  sequences of period $ p^2 $  . . . . . . 1483--1497
              Jingyuan Chen and   
                   Lijun Ji and   
                         Yun Li   Combinatorial constructions of optimal $
                                  (m, n, 4, 2) $ optical orthogonal
                                  signature pattern codes  . . . . . . . . 1499--1525
               SenPeng Wang and   
                     Bin Hu and   
                        Yan Liu   The autocorrelation properties of single
                                  cycle polynomial $T$-functions . . . . . 1527--1540
                  Qian Wang and   
                    Chenhui Jin   Upper bound of the length of truncated
                                  impossible differentials for AES . . . . 1541--1552
                   Li Shuai and   
                        Miao Li   A method to calculate differential
                                  uniformity for permutations  . . . . . . 1553--1563
                Jianfa Qian and   
                     Lina Zhang   On MDS linear complementary dual codes
                                  and entanglement-assisted quantum codes  1565--1572
            Hadi Kharaghani and   
                       Sho Suda   Unbiased orthogonal designs  . . . . . . 1573--1588

Designs, Codes, and Cryptography
Volume 86, Number 8, August, 2018

            Daniele Bartoli and   
                  Luciane Quoos   Permutation polynomials of the type $
                                  x^r g(x^s) $ over $ {\mathbb
                                  {F}}_{q^{2n}} $  . . . . . . . . . . . . 1589--1599
             Maosheng Xiong and   
                  Haode Yan and   
                   Pingzhi Yuan   On a conjecture of differentially
                                  $8$-uniform power functions  . . . . . . 1601--1621
                Keita Emura and   
           Goichiro Hanaoka and   
                 Koji Nuida and   
                  Go Ohtake and   
           Takahiro Matsuda and   
                   Shota Yamada   Chosen ciphertext secure
                                  keyed-homomorphic public-key
                                  cryptosystems  . . . . . . . . . . . . . 1623--1683
     Konstantinos Limniotis and   
          Nicholas Kolokotronis   Boolean functions with maximum algebraic
                                  immunity: further extensions of the
                                  Carlet--Feng construction  . . . . . . . 1685--1706
               Neranga Fernando   Self-reciprocal polynomials and coterm
                                  polynomials  . . . . . . . . . . . . . . 1707--1726
            Chong Shangguan and   
                 Jingxue Ma and   
                     Gennian Ge   New upper bounds for parent-identifying
                                  codes and traceability codes . . . . . . 1727--1737
                Mingchao Li and   
                 Miao Liang and   
                Beiliang Du and   
                  Jingyuan Chen   A construction for optimal $c$-splitting
                                  authentication and secrecy codes . . . . 1739--1755
              Hongxue Liang and   
                  Shenglin Zhou   Flag-transitive point-primitive
                                  automorphism groups of non-symmetric 2-$
                                  (v, k, 3) $ designs  . . . . . . . . . . 1757--1766
    I. Blanco-Chacón and   
                   E. Byrne and   
                 I. Duursma and   
                     J. Sheekey   Rank metric codes and zeta functions . . 1767--1792
               Maki Yoshida and   
                  Satoshi Obana   On the (in)efficiency of non-interactive
                                  secure multiparty computation  . . . . . 1793--1805
               Daniel Augot and   
            Pierre Loidreau and   
               Gwezheneg Robert   Generalized Gabidulin codes over fields
                                  of any characteristic  . . . . . . . . . 1807--1848
José I. Farrán and   
Pedro A. García-Sánchez and   
 Benjamín A. Heredia and   
                Micah J. Leamer   The second Feng--Rao number for codes
                                  coming from telescopic semigroups  . . . 1849--1864
             Sihem Mesnager and   
        Ferruh Özbudak and   
                    Ahmet Sinak   On the $p$-ary (cubic) bent and
                                  plateaued (vectorial) functions  . . . . 1865--1892

Designs, Codes, and Cryptography
Volume 86, Number 9, September, 2018

           Khodakhast Bibak and   
            Bruce M. Kapron and   
           Venkatesh Srinivasan   Unweighted linear congruences with
                                  distinct coordinates and the
                                  Varshamov--Tenengolts codes  . . . . . . 1893--1904
                  J. Rif\`a and   
    Emilio Suárez Canedo   Hadamard full propelinear codes of type
                                  $Q$; rank and kernel . . . . . . . . . . 1905--1921
                   Ling Sun and   
              Huaifeng Chen and   
                    Meiqin Wang   Zero-correlation attacks: statistical
                                  models independent of the number of
                                  approximations . . . . . . . . . . . . . 1923--1945
             Yoshitaka Koga and   
             Tatsuya Maruta and   
              Keisuke Shiromoto   On critical exponents of Dowling
                                  matroids . . . . . . . . . . . . . . . . 1947--1962
               Zhilin Zhang and   
                  Shenglin Zhou   Flag-transitive point-quasiprimitive 2-$
                                  (v, k, 2) $ designs  . . . . . . . . . . 1963--1971
            Kai-Uwe Schmidt and   
                       Yue Zhou   On the number of inequivalent Gabidulin
                                  codes  . . . . . . . . . . . . . . . . . 1973--1982
               Ayoub Otmani and   
Hervé Talé Kalachi and   
         Sélestin Ndjeya   Improved cryptanalysis of rank metric
                                  schemes based on Gabidulin codes . . . . 1983--1996
                     Jun Xu and   
             Santanu Sarkar and   
                     Lei Hu and   
             Zhangjie Huang and   
                   Liqiang Peng   Solving a class of modular polynomial
                                  equations and its relation to modular
                                  inversion hidden number problem and
                                  inversive congruential generator . . . . 1997--2033
              Alberto Ravagnani   Duality of codes supported on regular
                                  lattices, with an application to
                                  enumerative combinatorics  . . . . . . . 2035--2063
          Javier de la Cruz and   
               Wolfgang Willems   On group codes with complementary duals  2065--2073
             Trygve Johnsen and   
                 Hugues Verdure   Flags of almost affine codes and the
                                  two-party wire-tap channel of type II    2075--2090
                    Yun Fan and   
                    Bangteng Xu   Fourier transforms and bent functions on
                                  finite groups  . . . . . . . . . . . . . 2091--2113
        Steven T. Dougherty and   
              Joseph Gildea and   
               Rhian Taylor and   
           Alexander Tylyshchak   Group rings, $G$-codes and constructions
                                  of self-dual and formally self-dual
                                  codes  . . . . . . . . . . . . . . . . . 2115--2138

Designs, Codes, and Cryptography
Volume 86, Number 10, October, 2018

                 Shixin Zhu and   
               Zhonghua Sun and   
                        Ping Li   A class of negacyclic BCH codes and its
                                  application to quantum codes . . . . . . 2139--2165
            Seunghwan Chang and   
                 Jong Yoon Hyun   Linear codes from simplicial complexes   2167--2181
              Jezerca Hodaj and   
         Melissa S. Keranen and   
           Donald L. Kreher and   
                 Leah Tollefson   Some new Kirkman signal sets . . . . . . 2183--2195
             Dario Catalano and   
                Dario Fiore and   
                  Luca Nizzardo   Homomorphic signatures with sublinear
                                  public keys via asymmetric programmable
                                  hash functions . . . . . . . . . . . . . 2197--2246
          Ramakrishna Bandi and   
      Alexandre Fotue Tabue and   
     Edgar Martínez-Moro   On counting subring-submodules of free
                                  modules over finite commutative
                                  Frobenius rings  . . . . . . . . . . . . 2247--2254
                       Lijun Ji   Group divisible designs with large block
                                  sizes  . . . . . . . . . . . . . . . . . 2255--2260
                     Chengju Li   Hermitian LCD codes from cyclic codes    2261--2278
     Jean-Charles Faug\`ere and   
               Alexandre Wallet   The point decomposition problem over
                                  hyperelliptic curves . . . . . . . . . . 2279--2314
            Daniele Bartoli and   
           Maria Montanucci and   
                  Giovanni Zini   AG codes and AG quantum codes from the
                                  GGS curve  . . . . . . . . . . . . . . . 2315--2344
           Khadijeh Bagheri and   
      Mohammad-Reza Sadeghi and   
                 Daniel Panario   A non-commutative cryptosystem based on
                                  quaternion algebras  . . . . . . . . . . 2345--2377
                Kangquan Li and   
               Longjiang Qu and   
                     Qiang Wang   New constructions of permutation
                                  polynomials of the form $ x^r h \left
                                  (x^{q - 1} \right) $ over $ {\mathbb
                                  F}_{q^2} $ . . . . . . . . . . . . . . . 2379--2405
                Kwangsu Lee and   
                 Seunghwan Park   Revocable hierarchical identity-based
                                  encryption with shorter private keys and
                                  update keys  . . . . . . . . . . . . . . 2407--2440
                    Cuiling Fan   The linear complexity of a class of
                                  binary sequences with optimal
                                  autocorrelation  . . . . . . . . . . . . 2441--2450

Designs, Codes, and Cryptography
Volume 86, Number 11, November, 2018

                  Song Tian and   
                     Bao Li and   
               Kunpeng Wang and   
                         Wei Yu   Cover attacks for elliptic curves with
                                  cofactor two . . . . . . . . . . . . . . 2451--2468
                 Yunwen Liu and   
             Vincent Rijmen and   
                 Gregor Leander   Nonlinear diffusion layers . . . . . . . 2469--2484
                 Minjia Shi and   
                 Liqin Qian and   
            Patrick Solé   On self-dual negacirculant codes of
                                  index two and four . . . . . . . . . . . 2485--2494
                 Yunhua Wen and   
                Shengli Liu and   
                      Shuai Han   Reusable fuzzy extractor from the
                                  decisional Diffie--Hellman assumption    2495--2512
                 Zhengchun Zhou   Three-weight ternary linear codes from a
                                  family of cyclic difference sets . . . . 2513--2523
               David Derler and   
                Daniel Slamanig   Practical witness encryption for
                                  algebraic languages or how to encrypt
                                  under Groth--Sahai proofs  . . . . . . . 2525--2547
                    Jia Liu and   
                Tibor Jager and   
             Saqib A. Kakvi and   
               Bogdan Warinschi   How to build time-lock encryption  . . . 2549--2586
                Chunpeng Ge and   
               Willy Susilo and   
                Liming Fang and   
              Jiandong Wang and   
                    Yunqing Shi   A CCA-secure key-policy attribute-based
                                  proxy re-encryption in the adaptive
                                  corruption model for dropbox data
                                  sharing system . . . . . . . . . . . . . 2587--2603
              Claude Carlet and   
             Sihem Mesnager and   
              Chunming Tang and   
                     Yanfeng Qi   Euclidean and Hermitian LCD MDS codes    2605--2618
           I. Yu. Mogilnykh and   
                F. I. Solov'eva   On explicit minimum weight bases for
                                  extended cyclic codes related to Gold
                                  functions  . . . . . . . . . . . . . . . 2619--2627
        Jose Torres-Jimenez and   
    Idelfonso Izquierdo-Marquez   Covering arrays of strength three from
                                  extended permutation vectors . . . . . . 2629--2643
                  Hui Zhang and   
              Eitan Yaakobi and   
            Natalia Silberstein   Multiset combinatorial batch codes . . . 2645--2660
             Jared Antrobus and   
        Heide Gluesing-Luerssen   Lexicodes over finite principal ideal
                                  rings  . . . . . . . . . . . . . . . . . 2661--2676

Designs, Codes, and Cryptography
Volume 86, Number 12, December, 2018

                  Ming Ming Tan   Group invariant weighing matrices  . . . 2677--2702
         Beno\^\it Cogliati and   
                 Yannick Seurin   Analysis of the single-permutation
                                  encrypted Davies--Meyer construction . . 2703--2723
               Simone Costa and   
                   Tao Feng and   
                  Xiaomiao Wang   Frame difference families and resolvable
                                  balanced incomplete block designs  . . . 2725--2745
             Beno\^\it Cogliati   Tweaking a block cipher: multi-user
                                  beyond-birthday-bound security in the
                                  standard model . . . . . . . . . . . . . 2747--2763
               Xiaoqin Zhan and   
                  Shenglin Zhou   Non-symmetric $2$-designs admitting a
                                  two-dimensional projective linear group  2765--2773
              Xiao-Xin Zhao and   
                  Tian Tian and   
                    Wen-Feng Qi   A ring-like cascade connection and a
                                  class of NFSRs with the same cycle
                                  structures . . . . . . . . . . . . . . . 2775--2790
      Wittawat Kositwattanarerk   Pseudocodeword-free criterion for codes
                                  with cycle-free Tanner graph . . . . . . 2791--2805
        Neriman Gamze Orhon and   
                  Huseyin Hisil   Speeding up Huff form of elliptic curves 2807--2823
  Fernando L. Piñero and   
                  Prasant Singh   A note on the weight spectrum of the
                                  Schubert code $ C_\alpha (2, m) $  . . . 2825--2836
                     Jin Li and   
               Aixian Zhang and   
                     Keqin Feng   Linear codes over $ \mathbb{F}_q[x] /
                                  (x^2) $ and $ G R(p^2, m) $ reaching the
                                  Griesmer bound . . . . . . . . . . . . . 2837--2855
                Xiaojuan Lu and   
                Xiaolei Niu and   
                     Haitao Cao   Some results on generalized strong
                                  external difference families . . . . . . 2857--2868
                Xiaofang Xu and   
                 Chunlei Li and   
             Xiangyong Zeng and   
                  Tor Helleseth   Constructions of complete permutation
                                  polynomials  . . . . . . . . . . . . . . 2869--2892
José I. Farrán and   
Pedro A. García-Sánchez and   
     Benjamín A. Heredia   On the second Feng--Rao distance of
                                  Algebraic Geometry codes related to Arf
                                  semigroups . . . . . . . . . . . . . . . 2893--2916


Designs, Codes, and Cryptography
Volume 87, Number 1, January, 2019

                 Xinxin Fan and   
                 Guang Gong and   
         Berry Schoenmakers and   
             Francesco Sica and   
               Andrey Sidorenko   Secure simultaneous bit extraction from
                                  Koblitz curves . . . . . . . . . . . . . 1--13
                  Haibo Liu and   
                   Qunying Liao   Several classes of linear codes with a
                                  few weights from defining sets over $
                                  \mathbb{F}_p + u \mathbb{F}_p $  . . . . 15--29
                  Shihui Fu and   
                    Xiutao Feng   Involutory differentially $4$-uniform
                                  permutations from known constructions    31--56
             John T. Ethier and   
                 Gary L. Mullen   Sets of mutually orthogonal Sudoku
                                  frequency squares  . . . . . . . . . . . 57--65
                     Ronan Egan   Phased unitary Golay pairs, Butson
                                  Hadamard matrices and a conjecture of
                                  Ito's  . . . . . . . . . . . . . . . . . 67--74
            Thierry Mefenza and   
                Damien Vergnaud   Polynomial interpolation of the
                                  generalized Diffie--Hellman and
                                  Naor--Reingold functions . . . . . . . . 75--85
                 Minjia Shi and   
                Hongwei Zhu and   
        Patrick Solé and   
         Gérard D. Cohen   How many weights can a linear code have? 87--95
              Minquan Cheng and   
                 Jing Jiang and   
                     Qiang Wang   Improved bounds on $2$-frameproof codes
                                  with length 4  . . . . . . . . . . . . . 97--106
                  Tao Zhang and   
                     Gennian Ge   Constructions of optimal Ferrers diagram
                                  rank metric codes  . . . . . . . . . . . 107--121
           Azam Soleimanian and   
                Shahram Khazaei   Publicly verifiable searchable symmetric
                                  encryption based on efficient
                                  cryptographic components . . . . . . . . 123--147
              Shiyong Zhang and   
                 Gongliang Chen   New results on the state cycles of
                                  Trivium  . . . . . . . . . . . . . . . . 149--162
              Zhixiong Chen and   
                    Ting Gu and   
                 Andrew Klapper   On the $q$-bentness of Boolean functions 163--171
                  Alp Bassa and   
            Henning Stichtenoth   Self-dual codes better than the
                                  Gilbert--Varshamov bound . . . . . . . . 173--182

Designs, Codes, and Cryptography
Volume 87, Number 4, April, 2019

           Ilaria Cardinali and   
             Michel Lavrauw and   
               Klaus Metsch and   
                 Alexander Pott   Preface to the special issue on finite
                                  geometries . . . . . . . . . . . . . . . 715--716
                  Karen Meagher   An Erd\Hos--Ko--Rado theorem for the
                                  group $ {\rm PSU}(3, q) $  . . . . . . . 717--744
                  Marco Buratti   On disjoint $ (v, k, k - 1) $ difference
                                  families . . . . . . . . . . . . . . . . 745--755
          Stefaan De Winter and   
                    Zeying Wang   Non-existence of partial difference sets
                                  in Abelian groups of order $ 8 p^3 $ . . 757--768
              Marco Buratti and   
               Francesca Merola   Fano Kaleidoscopes and their
                                  generalizations  . . . . . . . . . . . . 769--784
               Ivan Landjev and   
              Nevyana Georgieva   Conditions for the existence of spreads
                                  in projective Hjelmslev spaces . . . . . 785--794
            Daniele Bartoli and   
          Massimo Giulietti and   
               Maria Montanucci   Linear codes from Denniston maximal arcs 795--806
          Stefaan De Winter and   
              Cunsheng Ding and   
            Vladimir D. Tonchev   Maximal arcs and extended cyclic codes   807--816
     Fernando Piñero and   
                  Prasant Singh   The weight spectrum of certain affine
                                  Grassmann codes  . . . . . . . . . . . . 817--830
          Dieter Jungnickel and   
       Spyros S. Magliveras and   
        Vladimir D. Tonchev and   
              Alfred Wassermann   The classification of Steiner triple
                                  systems on $ 27 $ points with $3$-rank $
                                  24$  . . . . . . . . . . . . . . . . . . 831--839
             Assia Rousseva and   
                   Ivan Landjev   Linear codes close to the Griesmer bound
                                  and the related geometric structures . . 841--854
        Igor E. Shparlinski and   
                 Arne Winterhof   Codes correcting restricted errors . . . 855--863
              Aart Blokhuis and   
                 Leo Storme and   
          Tamás Sz\Honyi   Relative blocking sets of unions of Baer
                                  subplanes  . . . . . . . . . . . . . . . 865--877
               Jan De Beule and   
             Jeroen Demeyer and   
               Sam Mattheus and   
           Péter Sziklai   On the cylinder conjecture . . . . . . . 879--893
              Hiroaki Taniguchi   A variation of the dual hyperoval $
                                  {\mathcal {S}}_c $ using presemifields   895--908
                  Bart De Bruyn   Three homogeneous embeddings of $
                                  \mathrm{DW}(2 n - 1, 2) $  . . . . . . . 909--929
               Anton Betten and   
                 Fatma Karaoglu   Cubic surfaces over small finite fields  931--953

Designs, Codes, and Cryptography
Volume 87, Number 5, May, 2019

            Pascale Charpin and   
              Philippe Langevin   Obituary of Jacques Wolfmann
                                  (1932--2018) . . . . . . . . . . . . . . 955--956
            Alice M. W. Hui and   
       Muhammad Adib Surani and   
                   Sanming Zhou   The vertex-isoperimetric number of the
                                  incidence and non-incidence graphs of
                                  unitals  . . . . . . . . . . . . . . . . 957--970
                 Yuqing Zhu and   
            Jincheng Zhuang and   
                 Hairong Yi and   
                   Chang Lv and   
                    Dongdai Lin   A variant of the Galbraith--Ruprai
                                  algorithm for discrete logarithms with
                                  improved complexity  . . . . . . . . . . 971--986
             Mariusz Meszka and   
               Magdalena Tyniec   Orthogonal one-factorizations of
                                  complete multipartite graphs . . . . . . 987--993
           Alexander M. Romanov   On non-full-rank perfect codes over
                                  finite fields  . . . . . . . . . . . . . 995--1003
              Junji Shikata and   
                 Yohei Watanabe   Identity-based encryption with
                                  hierarchical key-insulation in the
                                  standard model . . . . . . . . . . . . . 1005--1033
                  Yanbin Li and   
                    Meiqin Wang   Cryptanalysis of MORUS . . . . . . . . . 1035--1058
              Shoko Chisaki and   
                 Yui Kimura and   
                Nobuko Miyamoto   A recursive construction for difference
                                  systems of sets  . . . . . . . . . . . . 1059--1068
            Giacomo Micheli and   
                 Violetta Weger   Cryptanalysis of the CLR-cryptosystem    1069--1086
                Ziling Heng and   
                  Cunsheng Ding   A construction of $q$-ary linear codes
                                  with irreducible cyclic codes  . . . . . 1087--1108
                 Darcy Best and   
              Trent Marbach and   
          Rebecca J. Stones and   
                 Ian M. Wanless   Covers and partial transversals of Latin
                                  squares  . . . . . . . . . . . . . . . . 1109--1136
               Zuling Chang and   
 Martianus Frederic Ezerman and   
                   San Ling and   
                  Huaxiong Wang   On binary de Bruijn sequences from LFSRs
                                  with arbitrary characteristic
                                  polynomials  . . . . . . . . . . . . . . 1137--1160
                 Huiqin Xie and   
                        Li Yang   Using Bernstein--Vazirani algorithm to
                                  attack block ciphers . . . . . . . . . . 1161--1182
          Vladimir Edemskiy and   
                 Chunlei Li and   
             Xiangyong Zeng and   
                  Tor Helleseth   The linear complexity of generalized
                                  cyclotomic binary sequences of period $
                                  p^n $  . . . . . . . . . . . . . . . . . 1183--1197

Designs, Codes, and Cryptography
Volume 87, Number 6, June, 2019

               A. J. van Zanten   Primitive idempotent tables of cyclic
                                  and constacyclic codes . . . . . . . . . 1199--1225
               Hiroki Koike and   
István Kovács and   
         Dragan Maru\vsi\vc and   
               Mikhail Muzychuk   Cyclic groups are CI-groups for balanced
                                  configurations . . . . . . . . . . . . . 1227--1235
           Tsuyoshi Miezaki and   
                    Manabu Oura   On the cycle index and the weight
                                  enumerator . . . . . . . . . . . . . . . 1237--1242
               Jerod Michel and   
                        Qi Wang   Almost difference sets in nonabelian
                                  groups . . . . . . . . . . . . . . . . . 1243--1251
                  Serhii Dyshko   The extension theorem for Lee and
                                  Euclidean weight codes over integer
                                  residue rings  . . . . . . . . . . . . . 1253--1269
                 Wenquan Bi and   
              Xiaoyang Dong and   
                   Zheng Li and   
                   Rui Zong and   
                   Xiaoyun Wang   MILP-aided cube-attack-like
                                  cryptanalysis on Keccak Keyed modes  . . 1271--1296
                   Chun Guo and   
                Yaobin Shen and   
                   Lei Wang and   
                        Dawu Gu   Beyond-birthday secure domain-preserving
                                  PRFs from a single permutation . . . . . 1297--1322
             Oriol Farr\`as and   
Jordi Ribes-González and   
                     Sara Ricci   Local bounds for the optimal information
                                  ratio of secret sharing schemes  . . . . 1323--1344
              Zhengan Huang and   
                 Junzuo Lai and   
                Wenbin Chen and   
                  Man Ho Au and   
                  Zhen Peng and   
                         Jin Li   Simulation-based selective opening
                                  security for receivers under
                                  chosen-ciphertext attacks  . . . . . . . 1345--1371
               David Derler and   
                Daniel Slamanig   Key-homomorphic signatures: definitions
                                  and applications to multiparty
                                  signatures and non-interactive
                                  zero-knowledge . . . . . . . . . . . . . 1373--1413
               Yanxun Chang and   
                  Hao Zheng and   
                   Junling Zhou   Existence of frame-derived $H$-designs   1415--1431
            Daniele Bartoli and   
                  Matteo Bonini   Minimum weight codewords in dual
                                  algebraic-geometric codes from the
                                  Giulietti--Korchmáros curve . . . . . . . 1433--1445
                 Minjia Shi and   
                    Yan Liu and   
            Hugues Randriam and   
                    Lin Sok and   
            Patrick Solé   Trace codes over $ {\mathbb {Z}}_4 $,
                                  and Boolean functions  . . . . . . . . . 1447--1455
         Ferdinand Ihringer and   
                  Karen Meagher   Correction to: Miklós--Manickam--Singhi
                                  conjectures on partial geometries  . . . 1457--1457

Designs, Codes, and Cryptography
Volume 87, Number 7, July, 2019

        Giorgos Kapetanakis and   
                     Lucas Reis   Variations of the Primitive Normal Basis
                                  Theorem  . . . . . . . . . . . . . . . . 1459--1480
                  Shihui Fu and   
                Xiutao Feng and   
                Dongdai Lin and   
                     Qiang Wang   A recursive construction of permutation
                                  polynomials over $ {\mathbb {F}}_{q^2} $
                                  with odd characteristic related to Rédei
                                  functions  . . . . . . . . . . . . . . . 1481--1498
                   Tao Feng and   
                Lidong Wang and   
                  Xiaomiao Wang   Optimal $2$-D $ (n \times m, 3, 2,
                                  1)$-optical orthogonal codes and related
                                  equi-difference conflict avoiding codes  1499--1520
                 Tran van Trung   On existence theorems for simple
                                  $t$-designs  . . . . . . . . . . . . . . 1521--1540
              Julien Lavauzelle   Lifted projective Reed--Solomon codes    1541--1575
              Claude Carlet and   
                    Xi Chen and   
                   Longjiang Qu   Constructing infinite families of low
                                  differential uniformity $ (n,
                                  m)$-functions with $ m > n / 2$ . . . . . 1577--1599
                  Keju Meng and   
                 Fuyou Miao and   
                         Yue Yu   A secure and efficient on-line/off-line
                                  group key distribution protocol  . . . . 1601--1620
         Beno\^\it Cogliati and   
                 Titouan Tanguy   Multi-user security bound for filter
                                  permutators in the random oracle model   1621--1638
                   John Polhill   A new family of partial difference sets
                                  in $3$-groups  . . . . . . . . . . . . . 1639--1646
               Dongdong Jia and   
                Sumei Zhang and   
                Gengsheng Zhang   Erasure combinatorial batch codes based
                                  on nonadaptive group testing . . . . . . 1647--1656
                     Lucas Reis   Factorization of a class of composed
                                  polynomials  . . . . . . . . . . . . . . 1657--1671
             Matthew Fickus and   
                    John Jasper   Equiangular tight frames from group
                                  divisible designs  . . . . . . . . . . . 1673--1697
           Sabyasachi Dutta and   
           Avishek Adhikari and   
                   Sushmita Ruj   Maximal contrast color visual secret
                                  sharing schemes  . . . . . . . . . . . . 1699--1711

Designs, Codes, and Cryptography
Volume 87, Number 8, August, 2019

                   Xing Liu and   
                     Liang Zhou   Improved Singleton bound on frequency
                                  hopping sequences and optimal
                                  constructions  . . . . . . . . . . . . . 1713--1733
                   Xing Liu and   
                     Liang Zhou   Correction to: Improved Singleton bound
                                  on frequency hopping sequences and
                                  optimal constructions  . . . . . . . . . 1735--1736
           Léo Ducas and   
          Cécile Pierrot   Polynomial time bounded distance
                                  decoding near Minkowski's bound in
                                  discrete logarithm lattices  . . . . . . 1737--1748
                Qichun Wang and   
         Pantelimon St\uanic\ua   A trigonometric sum sharp estimate and
                                  new bounds on the nonlinearity of some
                                  cryptographic Boolean functions  . . . . 1749--1763
              Keisuke Shiromoto   Codes with the rank metric and matroids  1765--1776
               Mahdi Cheraghchi   Nearly optimal robust secret sharing . . 1777--1796
                   Jian Liu and   
                 Sihem Mesnager   Weightwise perfectly balanced functions
                                  with high weightwise nonlinearity
                                  profile  . . . . . . . . . . . . . . . . 1797--1813
                 Xiang-Dong Hou   Optimal binary constant weight codes and
                                  affine linear groups over finite fields  1815--1838
                A. Blokhuis and   
                M. De Boeck and   
                 J. D'haeseleer   Cameron--Liebler sets of $k$-spaces in $
                                  \mathrm {PG}(n, q) $ . . . . . . . . . . 1839--1856
                 Minjia Shi and   
               Daitao Huang and   
                Denis S. Krotov   Additive perfect codes in Doob graphs    1857--1869
               Torger Olson and   
                    Eric Swartz   Transitive PSL(2,11)-invariant $k$-arcs
                                  in PG(4,q) . . . . . . . . . . . . . . . 1871--1879
         Andries E. Brouwer and   
                  Sven C. Polak   Uniqueness of codes using semidefinite
                                  programming  . . . . . . . . . . . . . . 1881--1895
                     Itai Dinur   An algorithmic framework for the
                                  generalized birthday problem . . . . . . 1897--1926
                Yansheng Wu and   
                    Qin Yue and   
                    Xueying Shi   At most three-weight binary linear codes
                                  from generalized Moisio's exponential
                                  sums . . . . . . . . . . . . . . . . . . 1927--1943

Designs, Codes, and Cryptography
Volume 87, Number 9, September, 2019

               Jerod Michel and   
                        Qi Wang   Almost designs and their links with
                                  balanced incomplete block designs  . . . 1945--1960
               Ching-Yi Lai and   
                  Kai-Min Chung   Quantum encryption and generalized
                                  Shannon impossibility  . . . . . . . . . 1961--1972
              Hiroaki Taniguchi   On some quadratic APN functions  . . . . 1973--1983
         Antonio Cossidente and   
               Francesco Pavese   On line covers of finite projective and
                                  polar spaces . . . . . . . . . . . . . . 1985--2002
                 Miao Liang and   
                       Lijun Ji   On $ (t, L) $-fold perfect
                                  authentication and secrecy codes with
                                  arbitration  . . . . . . . . . . . . . . 2003--2026
     Cícero Carvalho and   
Xavier Ramírez-Mondragón and   
       Victor G. L. Neumann and   
         Horacio Tapia-Recillas   Projective Reed--Muller type codes on
                                  higher dimensional scrolls . . . . . . . 2027--2042
                Qichun Wang and   
         Pantelimon St\uanic\ua   Transparency order for Boolean
                                  functions: analysis and construction . . 2043--2059
                Yanwei Zhou and   
                    Bo Yang and   
                          Yi Mu   Continuous leakage-resilient
                                  identity-based encryption with leakage
                                  amplification  . . . . . . . . . . . . . 2061--2090
                 Minjia Shi and   
            Denis S. Krotov and   
            Patrick Solé   A new distance-regular graph of diameter
                                  $3$ on $ 1024$ vertices  . . . . . . . . 2091--2101
                 Minjia Shi and   
            Denis S. Krotov and   
            Patrick Solé   Correction to: A new distance-regular
                                  graph of diameter $3$ on $ 1024$
                                  vertices . . . . . . . . . . . . . . . . 2103--2103
               Sergey Bereg and   
                Zevi Miller and   
        Luis Gerardo Mojica and   
              Linda Morales and   
               I. H. Sudborough   New lower bounds for permutation arrays
                                  using contraction  . . . . . . . . . . . 2105--2128
          Peter Vandendriessche   On KM-arcs in non-Desarguesian
                                  projective planes  . . . . . . . . . . . 2129--2137
            Gregory Maxwell and   
            Andrew Poelstra and   
             Yannick Seurin and   
                  Pieter Wuille   Simple Schnorr multi-signatures with
                                  applications to Bitcoin  . . . . . . . . 2139--2164
                Xueying Shi and   
                    Qin Yue and   
                    Yansheng Wu   The dual-containing primitive BCH codes
                                  with the maximum designed distance and
                                  their applications to quantum codes  . . 2165--2183

Designs, Codes, and Cryptography
Volume 87, Number 10, October, 2019

                   Xin Wang and   
                    Jie Cui and   
                       Lijun Ji   Linear $ (2, p, p)$-AONTs exist for all
                                  primes $p$ . . . . . . . . . . . . . . . 2185--2197
                  Nuh Aydin and   
         Jonathan Lambrinos and   
              Oliver VandenBerg   On equivalence of cyclic codes,
                                  generalization of a quasi-twisted search
                                  algorithm, and new linear codes  . . . . 2199--2212
                  Liang Bai and   
                      Zihui Liu   On the third greedy weight of
                                  $4$-dimensional codes  . . . . . . . . . 2213--2230
               Matvei Kotov and   
              Anton Menshov and   
              Alexander Ushakov   An attack on the Walnut digital
                                  signature algorithm  . . . . . . . . . . 2231--2250
                Junying Liu and   
               Yupeng Jiang and   
             Qunxiong Zheng and   
                    Dongdai Lin   A new construction of zero-difference
                                  balanced functions and two applications  2251--2265
                  Tian Tian and   
              Jia-Min Zhang and   
                    Wen-Feng Qi   On the uniqueness of a type of cascade
                                  connection representations for NFSRs . . 2267--2294
Umberto Martínez-Peñas   Theory of supports for linear codes
                                  endowed with the sum-rank metric . . . . 2295--2320
                    Qichun Wang   Hadamard matrices, $d$-linearly
                                  independent sets and correlation-immune
                                  Boolean functions with minimum Hamming
                                  weights  . . . . . . . . . . . . . . . . 2321--2333
                 R. Sobhani and   
               A. Abdollahi and   
               J. Bagherian and   
                     M. Khatami   A note on good permutation codes from
                                  Reed--Solomon codes  . . . . . . . . . . 2335--2340
            Hadi Kharaghani and   
                       Sho Suda   Linked systems of symmetric group
                                  divisible designs of type II . . . . . . 2341--2360
               Jon-Lark Kim and   
               Junyong Park and   
                    Soohak Choi   Steganographic schemes from perfect
                                  codes on Cayley graphs . . . . . . . . . 2361--2374
                 Bhaskar Bagchi   A coding theoretic approach to the
                                  uniqueness conjecture for projective
                                  planes of prime order  . . . . . . . . . 2375--2389
                Minglong Qi and   
                  Shengwu Xiong   A correction to: On the linear
                                  complexity of the
                                  Sidelnikov--Lempel--Cohn--Eastman
                                  sequences  . . . . . . . . . . . . . . . 2391--2393
                 Minjia Shi and   
            Patrick Solé   Three-weight codes, triple sum sets, and
                                  strongly walk regular graphs . . . . . . 2395--2404
              J. A. Armario and   
                 D. L. Flannery   Generalized binary arrays from
                                  quasi-orthogonal cocycles  . . . . . . . 2405--2417
                   Yuan Cao and   
                Yonglin Cao and   
        Steven T. Dougherty and   
                       San Ling   Construction and enumeration for
                                  self-dual cyclic codes over $ \mathbb
                                  {Z}_4 $ of oddly even length . . . . . . 2419--2446
                     Shuxing Li   On the weight distribution of second
                                  order Reed--Muller codes and their
                                  relatives  . . . . . . . . . . . . . . . 2447--2460

Designs, Codes, and Cryptography
Volume 87, Number 11, November, 2019

              Marco Buratti and   
              Dieter Jungnickel   Partitioned difference families versus
                                  zero-difference balanced functions . . . 2461--2467
               Ana I. Gomez and   
        Domingo Gomez-Perez and   
    Guénaël Renault   A probabilistic analysis on a lattice
                                  attack against DSA . . . . . . . . . . . 2469--2488
              Masaya Yasuda and   
               Junpei Yamaguchi   A new polynomial-time variant of LLL
                                  with deep insertions for decreasing the
                                  squared-sum of Gram--Schmidt lengths . . 2489--2505
                Iwan M. Duursma   Matrix theory for minimal trellises  . . 2507--2536
               Min Kyu Song and   
                 Hong-Yeop Song   Hamming correlation properties of the
                                  array structure of Sidelnikov sequences  2537--2551
                    Yupu Hu and   
                     Huiwen Jia   A new Gaussian sampling for trapdoor
                                  lattices with arbitrary modulus  . . . . 2553--2570
                   John Sheekey   Binary additive MRD codes with minimum
                                  distance $ n - 1 $ must contain a
                                  semifield spread set . . . . . . . . . . 2571--2583
                  Yi Ouyang and   
                   Xianhong Xie   Linear complexity of generalized
                                  cyclotomic sequences of period $ 2 p^m $ 2585--2596
             Sihem Mesnager and   
             Fengrong Zhang and   
              Chunming Tang and   
                      Yong Zhou   Further study on the maximum number of
                                  bent components of vectorial functions   2597--2610
                Yiwei Zhang and   
                     Gennian Ge   A general private information retrieval
                                  scheme for MDS coded databases with
                                  colluding servers  . . . . . . . . . . . 2611--2623
                 Zixiang Xu and   
                Yiwei Zhang and   
                     Gennian Ge   New theoretical bounds and constructions
                                  of permutation codes under block
                                  permutation metric . . . . . . . . . . . 2625--2637
     Theodoulos Garefalakis and   
            Giorgos Kapetanakis   Further Results on the Morgan--Mullen
                                  Conjecture . . . . . . . . . . . . . . . 2639--2654
               Jerod Michel and   
                        Qi Wang   Partial geometric designs from group
                                  actions  . . . . . . . . . . . . . . . . 2655--2670
                Kevin M. Byrnes   The maximum length of circuit codes with
                                  long bit runs and a new characterization
                                  theorem  . . . . . . . . . . . . . . . . 2671--2681
                  Dong Yang and   
                Wen-Feng Qi and   
                   Hua-Jin Chen   Provable security against impossible
                                  differential and zero correlation linear
                                  cryptanalysis of some Feistel structures 2683--2700
               Siaw-Lynn Ng and   
              Maura B. Paterson   Functional repair codes: a view from
                                  projective geometry  . . . . . . . . . . 2701--2722
               Xiaoqin Zhan and   
                 Suyun Ding and   
                      Shuyi Bai   Flag-transitive $2$-designs from $ {\rm
                                  PSL}(2, 40 q)$ with block size $4$ . . . 2723--2728

Designs, Codes, and Cryptography
Volume 87, Number 12, December, 2019

             Peter J. Dukes and   
               Esther R. Lamken   Constructions and uses of incomplete
                                  pairwise balanced designs  . . . . . . . 2729--2751
            Chong Shangguan and   
                     Gennian Ge   A new piggybacking design for systematic
                                  MDS storage codes  . . . . . . . . . . . 2753--2770
       Alexander A. Davydov and   
          Stefano Marcugini and   
             Fernanda Pambianco   New covering codes of radius $R$,
                                  codimension tR and $ t R + \frac
                                  {R}{2}$, and saturating sets in
                                  projective spaces  . . . . . . . . . . . 2771--2792
              Chunming Tang and   
              Cunsheng Ding and   
                 Maosheng Xiong   Steiner systems $ S(2, 4, \frac {3^m -
                                  1}{2}) $ and $2$-designs from ternary
                                  linear codes of length $ \frac {3^m -
                                  1}{2}$ . . . . . . . . . . . . . . . . . 2793--2811
              Claude Carlet and   
                 Chengju Li and   
                 Sihem Mesnager   Some (almost) optimally extendable
                                  linear codes . . . . . . . . . . . . . . 2813--2834
                 Tran van Trung   Recursive constructions for
                                  $s$-resolvable $t$-designs . . . . . . . 2835--2845
              Ron Steinfeld and   
                Amin Sakzad and   
                Raymond K. Zhao   Practical $ \mathsf {MP}$--$ \mathsf
                                  {LWE} $-based encryption balancing
                                  security-risk versus efficiency  . . . . 2847--2884
                Guomin Yang and   
               Rongmao Chen and   
                      Yi Mu and   
               Willy Susilo and   
                 Fuchun Guo and   
                         Jie Li   Strongly leakage resilient authenticated
                                  key exchange, revisited  . . . . . . . . 2885--2911
                    Qi Chen and   
              Chunming Tang and   
                   Zhiqiang Lin   Efficient explicit constructions of
                                  compartmented secret sharing schemes . . 2913--2940
                   San Ling and   
              Buket Özkaya   Multidimensional quasi-twisted codes:
                                  equivalent characterizations and their
                                  relation to multidimensional
                                  convolutional codes  . . . . . . . . . . 2941--2965
      Dávid Mez\Hofi and   
           Gábor P. Nagy   On the geometry of full points of
                                  abstract unitals . . . . . . . . . . . . 2967--2978
       Terry Shue Chien Lau and   
                   Chik How Tan   New rank codes based encryption scheme
                                  using partial circulant matrices . . . . 2979--2999
                  Qian Wang and   
                    Chenhui Jin   More accurate results on the provable
                                  security of AES against impossible
                                  differential cryptanalysis . . . . . . . 3001--3018
                     Julia Lieb   Necessary field size and probability for
                                  MDP and complete MDP convolutional codes 3019--3043
                 Yujuan Sun and   
              Jiafang Zhang and   
            Sugata Gangopadhyay   Construction of resilient Boolean
                                  functions in odd variables with strictly
                                  almost optimal nonlinearity  . . . . . . 3045--3062
              Claude Carlet and   
                 Chengju Li and   
                 Sihem Mesnager   Linear codes with small hulls in
                                  semi-primitive case  . . . . . . . . . . 3063--3075
                  Zihui Liu and   
                  Jinliang Wang   Linear complementary dual codes over
                                  rings  . . . . . . . . . . . . . . . . . 3077--3086


Designs, Codes, and Cryptography
Volume 88, Number 1, January, 2020

José Gómez-Torrecillas and   
             Erik Hieta-Aho and   
              F. J. Lobillo and   
Sergio López-Permouth and   
                Gabriel Navarro   Some remarks on non projective Frobenius
                                  algebras and linear codes  . . . . . . . 1--15
                Simeon Ball and   
                 Michel Lavrauw   Arcs and tensors . . . . . . . . . . . . 17--31
              S. G. Barwick and   
            Alice M. W. Hui and   
             Wen-Ai Jackson and   
            Jeroen Schillewaert   Characterising hyperbolic hyperplanes of
                                  a non-singular quadric in $ \mathrm
                                  {PG}(4, q) $ . . . . . . . . . . . . . . 33--39
            Jasvinder Singh and   
               Manish Gupta and   
          Jaskarn Singh Bhullar   Construction of girth-8 $ (3,
                                  L)$-QC-LDPC codes of smallest CPM size
                                  using column multipliers . . . . . . . . 41--49
             Sihem Mesnager and   
               Kwang Ho Kim and   
                   Dujin Jo and   
                Junyop Choe and   
                Munhyon Han and   
                    Dok Nam Lee   A proof of the Beierle--Kranz--Leander
                                  conjecture related to lightweight
                                  multiplication in $ \mathbb {F}_{2^n} $  51--62
               Sergey Bereg and   
                 Peter J. Dukes   A lower bound on permutation codes of
                                  distance $ n - 1 $ . . . . . . . . . . . 63--72
                     Tai Do Duc   Necessary conditions for the existence
                                  of group-invariant Butson Hadamard
                                  matrices and a new family of perfect
                                  arrays . . . . . . . . . . . . . . . . . 73--90
          Stefan Kölbl and   
          Elmar Tischhauser and   
             Patrick Derbez and   
                Andrey Bogdanov   Troika: a ternary cryptographic hash
                                  function . . . . . . . . . . . . . . . . 91--117
                   Rong Pan and   
                   Tao Feng and   
                Lidong Wang and   
                  Xiaomiao Wang   Optimal optical orthogonal signature
                                  pattern codes with weight three and
                                  cross-correlation constraint one . . . . 119--131
               Kenza Guenda and   
          T. Aaron Gulliver and   
            Somphong Jitman and   
          Satanan Thipworawimon   Linear $ \ell $-intersection pairs of
                                  codes and their applications . . . . . . 133--152
              Xiao-Xin Zhao and   
                Wen-Feng Qi and   
                  Jia-Min Zhang   Further results on the equivalence
                                  between Galois NFSRs and Fibonacci NFSRs 153--171
         Abhishek Kesarwani and   
               Dibyendu Roy and   
             Santanu Sarkar and   
                    Willi Meier   New cube distinguishers on NFSR-based
                                  stream ciphers . . . . . . . . . . . . . 173--199
             Aleksandr Kutsenko   Metrical properties of self-dual bent
                                  functions  . . . . . . . . . . . . . . . 201--222
                    Rohit Gupta   Several new permutation quadrinomials
                                  over finite fields of odd characteristic 223--239

Designs, Codes, and Cryptography
Volume 88, Number 2, February, 2020

                Hongwei Liu and   
                         Xu Pan   Galois hulls of linear codes over finite
                                  fields . . . . . . . . . . . . . . . . . 241--255
                     Xia Li and   
                        Qin Yue   Four classes of minimal binary linear
                                  codes with $ w_{\rm min} / w_{\rm max} <
                                  1 / 2 $ derived from Boolean functions   257--271
José Mart\'ìnez-Bernal and   
   Miguel A. Valencia-Bucio and   
           Rafael H. Villarreal   Linear codes over signed graphs  . . . . 273--296
                    Yan Liu and   
                 Xiwang Cao and   
                         Wei Lu   On some conjectures about optimal
                                  ternary cyclic codes . . . . . . . . . . 297--309
               Sergey Bereg and   
        Luis Gerardo Mojica and   
              Linda Morales and   
                 Hal Sudborough   Constructing permutation arrays using
                                  partition and extension  . . . . . . . . 311--339
                     Jun Xu and   
                     Lei Hu and   
                 Santanu Sarkar   Cryptanalysis of elliptic curve hidden
                                  number problem from PKC 2017 . . . . . . 341--361
            Tim van de Kamp and   
              Andreas Peter and   
                  Willem Jonker   A multi-authority approach to various
                                  predicate encryption types . . . . . . . 363--390
                Luca Mariot and   
       Maximilien Gadouleau and   
            Enrico Formenti and   
               Alberto Leporati   Mutually orthogonal latin squares based
                                  on cellular automata . . . . . . . . . . 391--411
                   Xin Ling and   
             Sihem Mesnager and   
                 Yanfeng Qi and   
                  Chunming Tang   A class of narrow-sense BCH codes over $
                                  \mathbb {F}_q$ of length $ \frac {q^m -
                                  1}{2} $  . . . . . . . . . . . . . . . . 413--427
              Bart De Bruyn and   
                        Mou Gao   On four codes with automorphism group $
                                  P \Sigma L(3, 4) $ and pseudo-embeddings
                                  of the large Witt designs  . . . . . . . 429--452
             Jong Yoon Hyun and   
                Jungyun Lee and   
                    Yoonjin Lee   Ramanujan graphs and expander families
                                  constructed from $p$-ary bent functions  453--470

Designs, Codes, and Cryptography
Volume 88, Number 3, March, 2020

                   Ana Salagean   Discrete antiderivatives for functions
                                  over $\mathbb{F}_p^n$  . . . . . . . . . 471--486
                 Xiang Wang and   
                    Fang-Wei Fu   Snake-in-the-box codes under the $
                                  \ell_\infty $-metric for rank modulation 487--503
                Dipayan Das and   
          Jeffrey Hoffstein and   
                Jill Pipher and   
              William Whyte and   
                  Zhenfei Zhang   Modular lattice signatures, revisited    505--532
                    Yubo Li and   
               Zhichao Yang and   
                Kangquan Li and   
                   Longjiang Qu   A new algorithm on the minimal rational
                                  fraction representation of feedback with
                                  carry shift registers  . . . . . . . . . 533--552
                  Can Xiang and   
                   Xin Ling and   
                        Qi Wang   Combinatorial $t$-designs from quadratic
                                  functions  . . . . . . . . . . . . . . . 553--565
                Saban Alaca and   
                 Goldwyn Millar   Shift-inequivalent decimations of the
                                  Sidelnikov--Lempel--Cohn--Eastman
                                  sequences  . . . . . . . . . . . . . . . 567--583
                 Raphael Yuster   Perfect sequence covering arrays . . . . 585--593
                    Sascha Kurz   Subspaces intersecting in at most a
                                  point  . . . . . . . . . . . . . . . . . 595--599
                S. Hodzi\'c and   
                 E. Pasalic and   
                S. Gangopadhyay   Generic constructions of $ \mathbb
                                  {Z}$-bent functions  . . . . . . . . . . 601--623

Designs, Codes, and Cryptography
Volume 88, Number 4, April, 2020

              Cunsheng Ding and   
              Chunming Tang and   
            Vladimir D. Tonchev   Linear codes of $2$-designs associated
                                  with subcodes of the ternary generalized
                                  Reed--Muller codes . . . . . . . . . . . 625--641
             Nicolas Aragon and   
              Olivier Blazy and   
 Jean-Christophe Deneuville and   
           Philippe Gaborit and   
       Terry Shue Chien Lau and   
               Chik How Tan and   
                   Keita Xagawa   Cryptanalysis of a rank-based signature
                                  with short public keys . . . . . . . . . 643--653
               John Sheekey and   
         Geertrui Van de Voorde   Rank-metric codes, linear sets, and
                                  their duality  . . . . . . . . . . . . . 655--675
           Liang Feng Zhang and   
          Reihaneh Safavi-Naini   Protecting data privacy in publicly
                                  verifiable delegation of matrix and
                                  polynomial functions . . . . . . . . . . 677--709
            Alessandro Neri and   
  Anna-Lena Horlemann-Trautmann   Random construction of partial MDS codes 711--725
               Xiusheng Liu and   
                      Hualu Liu   $ \sigma $-LCD codes over finite chain
                                  rings  . . . . . . . . . . . . . . . . . 727--746
         Hans-Joachim Kroll and   
                  Rita Vincenti   Linear codes from ruled sets in finite
                                  projective spaces  . . . . . . . . . . . 747--754
               Ka Hin Leung and   
                        Qi Wang   New nonexistence results on $ (m, 40
                                  n)$-generalized bent functions . . . . . 755--770
             Sam Adriaensen and   
                Lins Denaux and   
                 Leo Storme and   
                  Zsuzsa Weiner   Small weight code words arising from the
                                  incidence of points and hyperplanes in $
                                  \mathrm {PG}(n, q) $ . . . . . . . . . . 771--788

Designs, Codes, and Cryptography
Volume 88, Number 5, May, 2020

             Heiko Dietrich and   
            Jeroen Schillewaert   On a duality for codes over non-abelian
                                  groups . . . . . . . . . . . . . . . . . 789--805
               Zenghui Fang and   
                   Junling Zhou   The sizes of maximal $ (v, k, k - 2, k -
                                  1) $ optical orthogonal codes  . . . . . 807--824
            Sanjit Bhowmick and   
      Alexandre Fotue-Tabue and   
Edgar Mart\'ìnez-Moro and   
          Ramakrishna Bandi and   
                   Satya Bagchi   Do non-free LCD codes over finite
                                  commutative Frobenius rings exist? . . . 825--840
                       Yue Zhou   On equivalence of maximum additive
                                  symmetric rank-distance codes  . . . . . 841--850
                 Jing Jiang and   
                   Yujie Gu and   
                  Minquan Cheng   Multimedia IPP codes with efficient
                                  tracing  . . . . . . . . . . . . . . . . 851--866
           Andrea Ferraguti and   
                Giacomo Micheli   Full classification of permutation
                                  rational functions and complete rational
                                  functions of degree three over finite
                                  fields . . . . . . . . . . . . . . . . . 867--886
                 Gaoli Wang and   
                 Fukang Liu and   
                 Binbin Cui and   
             Florian Mendel and   
            Christoph Dobraunig   Improved (semi-free-start/near-)
                                  collision and distinguishing attacks on
                                  round-reduced RIPEMD-160 . . . . . . . . 887--930
           Elena Kirshanova and   
               Huyen Nguyen and   
       Damien Stehlé and   
               Alexandre Wallet   On the smoothing parameter and last
                                  minimum of random orthogonal lattices    931--950
                  Bohua Zhu and   
               Junling Zhou and   
                   Yanxun Chang   $ 2 - (v, 405; 40 m) $ spontaneous
                                  emission error designs . . . . . . . . . 951--970
         Seyed Hassan Alavi and   
               Mohsen Bayat and   
             Jalal Choulaki and   
              Ashraf Daneshkhah   Flag-transitive block designs with prime
                                  replication number and almost simple
                                  groups . . . . . . . . . . . . . . . . . 971--992

Designs, Codes, and Cryptography
Volume 88, Number 6, June, 2020

        Brett Hemenway Falk and   
             Nadia Heninger and   
                  Michael Rudow   Properties of constacyclic codes under
                                  the Schur product  . . . . . . . . . . . 993--1021
               Ryann Cartor and   
              Daniel Smith-Tone   All in the $ C^* $ family  . . . . . . . 1023--1036
                 Minjia Shi and   
                      Li Xu and   
                Denis S. Krotov   On the number of resolvable Steiner
                                  triple systems of small $3$-rank . . . . 1037--1046
           Aurore Guillevic and   
               Simon Masson and   
          Emmanuel Thomé   Cocks--Pinch curves of embedding degrees
                                  five to eight and optimal ate pairing
                                  computation  . . . . . . . . . . . . . . 1047--1081
                Hong-Yu Sun and   
              Xuan-Yong Zhu and   
                Qun-Xiong Zheng   Predicting truncated multiple recursive
                                  generators with unknown parameters . . . 1083--1102
                 Boxin Zhao and   
              Xiaoyang Dong and   
                Willi Meier and   
                 Keting Jia and   
                     Gaoli Wang   Generalized related-key rectangle
                                  attacks on block ciphers with linear key
                                  schedule: applications to SKINNY and
                                  GIFT . . . . . . . . . . . . . . . . . . 1103--1126
               Xiaolei Fang and   
               Khawla Lebed and   
                Hongwei Liu and   
                    Jinquan Luo   New MDS self-dual codes over finite
                                  fields of odd characteristic . . . . . . 1127--1138
                     Wei Lu and   
                     Xia Wu and   
                 Xiwang Cao and   
                      Ming Chen   Six constructions of asymptotically
                                  optimal codebooks via the character sums 1139--1158
            Lilya Budaghyan and   
           Nikolay Kaleyski and   
            Constanza Riera and   
         Pantelimon St\uanic\ua   Partially APN functions with APN-like
                                  polynomial representations . . . . . . . 1159--1177
              Xiaoyang Dong and   
               Bingyou Dong and   
                   Xiaoyun Wang   Quantum attacks on some Feistel block
                                  ciphers  . . . . . . . . . . . . . . . . 1179--1203
              Xiao-Xin Zhao and   
            Qun-Xiong Zheng and   
            Zhong-Xiao Wang and   
                    Wen-Feng Qi   On a class of isomorphic NFSRs . . . . . 1205--1226
         María Chara and   
     Ricardo Podestá and   
               Ricardo Toledano   Block transitive codes attaining the
                                  Tsfasman--Vladut--Zink bound . . . . . . 1227--1253
                   Yanan Wu and   
                    Nian Li and   
                 Xiangyong Zeng   Linear codes with few weights from
                                  cyclotomic classes and weakly regular
                                  bent functions . . . . . . . . . . . . . 1255--1272
                  Mrinmoy Datta   Relative generalized Hamming weights of
                                  affine Cartesian codes . . . . . . . . . 1273--1284

Designs, Codes, and Cryptography
Volume 88, Number 10, October, 2020

                S. Hodzi\'c and   
                 E. Pasalic and   
                         Y. Wei   A general framework for secondary
                                  constructions of bent and plateaued
                                  functions  . . . . . . . . . . . . . . . 2007--2035
            Vladimir N. Potapov   On $q$-ary bent and plateaued functions  2037--2049
                Kai Lin Ong and   
                  Miin Huey Ang   On equivalency of zero-divisor codes via
                                  classifying their idempotent generator   2051--2065
                   Yujie Gu and   
                  Shohei Satake   On $2$-parent-identifying set systems of
                                  block size 4 . . . . . . . . . . . . . . 2067--2076
              Masaya Yasuda and   
           Satoshi Nakamura and   
               Junpei Yamaguchi   Analysis of DeepBKZ reduction for
                                  finding short lattice vectors  . . . . . 2077--2100
                    Yan Zhu and   
                 Naoki Watamura   Relative $t$-designs in Johnson
                                  association schemes for $P$-polynomial
                                  structure  . . . . . . . . . . . . . . . 2101--2118
                  Mengna Wu and   
                 Chengju Li and   
                    Zilong Wang   Characterizations and constructions of
                                  triple-cycle permutations of the form $
                                  x^r h(x^s) $ . . . . . . . . . . . . . . 2119--2132
         Christian Elsholtz and   
   Péter Pál Pach   Caps and progression-free sets in $
                                  \mathbb {Z}_m^n $  . . . . . . . . . . . 2133--2170
               Lijing Zheng and   
                   Jie Peng and   
                 Haibin Kan and   
                  Yanjun Li and   
                       Juan Luo   On constructions and properties of $ (n,
                                  m)$-functions with maximal number of
                                  bent components  . . . . . . . . . . . . 2171--2186
        Simona Boyadzhiyska and   
                Shagnik Das and   
             Tibor Szabó   Enumerating extensions of mutually
                                  orthogonal Latin squares . . . . . . . . 2187--2206
            Baptiste Lambin and   
             Patrick Derbez and   
            Pierre-Alain Fouque   Linearly equivalent S-boxes and the
                                  division property  . . . . . . . . . . . 2207--2231
             Sihem Mesnager and   
              Chunming Tang and   
                 Maosheng Xiong   On the boomerang uniformity of quadratic
                                  permutations . . . . . . . . . . . . . . 2233--2246
                  Boran Kim and   
                    Yoonjin Lee   Classification of self-dual cyclic codes
                                  over the chain ring $ \mathbb {Z}_p[u] /
                                  \langle u^3 \rangle $  . . . . . . . . . 2247--2273

Designs, Codes, and Cryptography
Volume 88, Number 11, November, 2020

                 Yanyan Gao and   
                    Qin Yue and   
                    Yansheng Wu   LCD codes and self-orthogonal codes in
                                  generalized dihedral group algebras  . . 2275--2287
                 Yunwen Liu and   
              Wenying Zhang and   
                   Bing Sun and   
             Vincent Rijmen and   
               Guoqiang Liu and   
                    Chao Li and   
                Shaojing Fu and   
                    Meichun Cao   The phantom of differential
                                  characteristics  . . . . . . . . . . . . 2289--2311
             Martin Ekerå   On post-processing in the quantum
                                  algorithm for computing short discrete
                                  logarithms . . . . . . . . . . . . . . . 2313--2335
         Seyed Hassan Alavi and   
          Ashraf Daneshkhah and   
              Cheryl E. Praeger   Symmetries of biplanes . . . . . . . . . 2337--2359
             Yeow Meng Chee and   
        Charles J. Colbourn and   
                  Hoang Dau and   
                Ryan Gabrys and   
            Alan C. H. Ling and   
                 Dylan Lusi and   
              Olgica Milenkovic   Access balancing in storage systems by
                                  labeling partial Steiner systems . . . . 2361--2376
                Juanjuan Xu and   
                Jingjun Bao and   
                       Lijun Ji   Doubly resolvable Steiner quadruple
                                  systems of orders $ 2^{2n + 1} $ . . . . 2377--2386
               Khodakhast Bibak   Deletion correcting codes meet the
                                  Littlewood--Offord problem . . . . . . . 2387--2396
            Cem Güneri and   
 Edgar Martínez-Moro and   
                  Selcen Sayici   Linear complementary pair of group codes
                                  over finite chain rings  . . . . . . . . 2397--2405
                Xinxin Gong and   
                      Bin Zhang   Fast computation of linear approximation
                                  over certain composition functions and
                                  applications to SNOW 2.0 and SNOW 3G . . 2407--2431
             Youngkyung Lee and   
              Dong Hoon Lee and   
                 Jong Hwan Park   Tightly CCA-secure encryption scheme in
                                  a multi-user setting with corruptions    2433--2452

Designs, Codes, and Cryptography
Volume 88, Number 12, December, 2020

               Xinmei Huang and   
                    Qin Yue and   
                Yansheng Wu and   
               Xiaoping Shi and   
                   Jerod Michel   Binary primitive LCD BCH codes . . . . . 2453--2473
             Jong Yoon Hyun and   
             Hyun Kwang Kim and   
                Yansheng Wu and   
                        Qin Yue   Optimal minimal linear codes from posets 2475--2492
                 Minjia Shi and   
                  Wang Xuan and   
            Patrick Solé   Two families of two-weight codes over $
                                  \mathbb {Z}_4 $  . . . . . . . . . . . . 2493--2505
               Junling Zhou and   
                   Wenling Zhou   Wide-sense $2$-frameproof codes  . . . . 2507--2519
                   Petr Lisonek   Maximal nonassociativity via fields  . . 2521--2530
         Sudhir R. Ghorpade and   
                 Trygve Johnsen   A polymatroid approach to generalized
                                  weights of rank metric codes . . . . . . 2531--2546
                 Minjia Shi and   
                      Li Xu and   
            Patrick Solé   Construction of isodual codes from
                                  polycirculant matrices . . . . . . . . . 2547--2560
          Juliane Capaverde and   
           Ariane M. Masuda and   
   Virgínia M. Rodrigues   Rédei permutations with cycles of the
                                  same length  . . . . . . . . . . . . . . 2561--2579
             Whan-Hyuk Choi and   
               Hyun Jin Kim and   
                    Yoonjin Lee   Construction of
                                  single-deletion-correcting DNA codes
                                  using CIS codes  . . . . . . . . . . . . 2581--2596
              Lukas Kölsch   On the inverses of Kasami and
                                  Bracken--Leander exponents . . . . . . . 2597--2621

Designs, Codes, and Cryptography
Volume 88, Number 7, July, 2020

          Julien Lavauzelle and   
                  Julian Renner   Cryptanalysis of a system based on
                                  twisted Reed--Solomon codes  . . . . . . 1285--1300
       Alexandru Chirvasitu and   
               Thomas W. Cusick   Affine equivalence for quadratic
                                  rotation symmetric Boolean functions . . 1301--1329
Tovohery Hajatiana Randrianarisoa   A geometric approach to rank metric
                                  codes and a classification of constant
                                  weight codes . . . . . . . . . . . . . . 1331--1348
               Minfeng Shao and   
                      Ying Miao   On optimal weak algebraic manipulation
                                  detection codes and weighted external
                                  difference families  . . . . . . . . . . 1349--1369
               Dingding Jia and   
                  Yamin Liu and   
                         Bao Li   IBE with tight security against
                                  selective opening and chosen-ciphertext
                                  attacks  . . . . . . . . . . . . . . . . 1371--1400
             Lorenzo Grassi and   
           Christian Rechberger   Revisiting Gilbert's known-key
                                  distinguisher  . . . . . . . . . . . . . 1401--1445
                Xuanlong Ma and   
                   Min Feng and   
                   Kaishun Wang   Subgroup perfect codes in Cayley sum
                                  graphs . . . . . . . . . . . . . . . . . 1447--1461
               Yupeng Jiang and   
                    Dongdai Lin   Longest subsequences shared by two de
                                  Bruijn sequences . . . . . . . . . . . . 1463--1475

Designs, Codes, and Cryptography
Volume 88, Number 8, August, 2020

               Peter Beelen and   
                  Olav Geil and   
 Edgar Martínez-Moro and   
                     Xin-Wen Wu   Foreword-Special Issue: Codes,
                                  Cryptology and Curves in honour of Ruud
                                  Pellikaan  . . . . . . . . . . . . . . . 1477--1478
             Mojtaba Fadavi and   
        Reza Rezaeian Farashahi   Uniform encodings to elliptic curves and
                                  indistinguishable point representation   1479--1502
               Thomas Britz and   
             Adam Mammoliti and   
              Keisuke Shiromoto   Wei-type duality theorems for rank
                                  metric codes . . . . . . . . . . . . . . 1503--1519
Umberto Martínez-Peñas   Hamming and simplex codes for the
                                  sum-rank metric  . . . . . . . . . . . . 1521--1539
          Lucky Erap Galvez and   
                   Jon-Lark Kim   Construction of self-dual matrix codes   1541--1560
             Alain Couvreur and   
            Isabella Panaccione   Power error locating pairs . . . . . . . 1561--1593
Alonso Sepúlveda Castellanos and   
       Maria Bras-Amorós   Weierstrass semigroup at $ m + 1 $
                                  rational points in maximal curves which
                                  cannot be covered by the Hermitian curve 1595--1616
   Maria Bras-Amorós and   
               Iwan Duursma and   
                    Euijin Hong   Isometry-dual flags of AG codes  . . . . 1617--1638
René Bòdker Christensen and   
                      Olav Geil   Steane-enlargement of quantum codes from
                                  the Hermitian function field . . . . . . 1639--1652
Ignacio García-Marco and   
Irene Márquez-Corbella and   
                    Diego Ruano   High dimensional affine codes whose
                                  square has a designed minimum distance   1653--1672
      Hiram H. López and   
       Gretchen L. Matthews and   
                  Ivan Soprunov   Monomial-Cartesian codes and their
                                  duals, with applications to LCD codes,
                                  quantum codes, and locally recoverable
                                  codes  . . . . . . . . . . . . . . . . . 1673--1685
Irene Márquez-Corbella and   
 Edgar Martínez-Moro and   
                 Carlos Munuera   Computing sharp recovery structures for
                                  locally recoverable codes  . . . . . . . 1687--1698

Designs, Codes, and Cryptography
Volume 88, Number 9, September, 2020

              Anne Canteaut and   
           Gohar Kyureghyan and   
             Alexander Pott and   
                    Felix Ulmer   Editorial: Coding and Cryptography 2019  1699--1699
        Alexandr A. Polujan and   
                 Alexander Pott   Cubic bent functions outside the
                                  completed Maiorana--McFarland class  . . 1701--1722
              Daniel Gerike and   
            Gohar M. Kyureghyan   Permutations on finite fields with
                                  invariant cycle structure on lines . . . 1723--1740
                    Pan Tan and   
             Zhengchun Zhou and   
         Vladimir Sidorenko and   
               Udaya Parampalli   Two classes of optimal LRCs with
                                  information $ (r, t)$-locality . . . . . 1741--1757
                   Jian Liu and   
             Sihem Mesnager and   
                      Deng Tang   Constructions of optimal locally
                                  recoverable codes via Dickson
                                  polynomials  . . . . . . . . . . . . . . 1759--1780
                Tuvi Etzion and   
                Sascha Kurz and   
                 Kamil Otal and   
            Ferruh Özbudak   Subspace packings: constructions and
                                  bounds . . . . . . . . . . . . . . . . . 1781--1810
          P. G. Boyvalenkov and   
              P. D. Dragnev and   
               D. P. Hardin and   
                 E. B. Saff and   
                M. M. Stoyanova   Upper bounds for energies of spherical
                                  codes of given cardinality and
                                  separation . . . . . . . . . . . . . . . 1811--1826
             Sabyasachi Dey and   
                 Santanu Sarkar   Proving the biases of Salsa and ChaCha
                                  in differential attack . . . . . . . . . 1827--1856
 Jean-Christophe Deneuville and   
               Philippe Gaborit   Cryptanalysis of a code-based one-time
                                  signature  . . . . . . . . . . . . . . . 1857--1866
               Ana Salagean and   
            Ferruh Özbudak   Counting Boolean functions with faster
                                  points . . . . . . . . . . . . . . . . . 1867--1883
              Elena Egorova and   
           Marcel Fernandez and   
            Grigory Kabatiansky   On non-binary traceability set systems   1885--1892
             Ryutaroh Matsumoto   Message randomization and strong
                                  security in quantum stabilizer-based
                                  secret sharing for classical secrets . . 1893--1907
       Gretchen L. Matthews and   
         Fernando Piñero   Codes with locality from cyclic
                                  extensions of Deligne--Lusztig curves    1909--1924
             Assia Rousseva and   
                   Ivan Landjev   The geometric approach to the existence
                                  of some quaternary Griesmer codes  . . . 1925--1940
              Daniel Coggia and   
                 Alain Couvreur   On the security of a Loidreau rank
                                  metric code based encryption scheme  . . 1941--1957
                Shizhu Tian and   
            Christina Boura and   
              Léo Perrin   Boomerang uniformity of popular S-box
                                  constructions  . . . . . . . . . . . . . 1959--1989
               Delphine Boucher   An algorithm for decoding skew
                                  Reed--Solomon codes with respect to the
                                  skew metric  . . . . . . . . . . . . . . 1991--2005


Designs, Codes, and Cryptography
Volume 89, Number 1, January, 2021

             Sihem Mesnager and   
                  Sihong Su and   
                      Hui Zhang   A construction method of balanced
                                  rotation symmetric Boolean functions on
                                  arbitrary even number of variables with
                                  optimal algebraic immunity . . . . . . . 1--17
            Lilya Budaghyan and   
            Marco Calderini and   
              Claude Carlet and   
             Robert Coulter and   
                    Irene Villa   Generalized isotopic shift construction
                                  for APN functions  . . . . . . . . . . . 19--32
                Marco Calderini   Differentially low uniform permutations
                                  from known $4$-uniform functions . . . . 33--52
                 P. Almeida and   
                        D. Napp   A new rank metric for convolutional
                                  codes  . . . . . . . . . . . . . . . . . 53--73
             Wilfried Meidl and   
                  Isabel Pirsic   Bent and $ \mathbb {Z}_{2^k} $-Bent
                                  functions from spread-like partitions    75--89
                       Xin Wang   Improved upper bounds for
                                  parent-identifying set systems and
                                  separable codes  . . . . . . . . . . . . 91--104
            Matthias Grezet and   
               Camilla Hollanti   The complete hierarchical locality of
                                  the punctured Simplex code . . . . . . . 105--125
         Pranab Chakraborty and   
                Subhamoy Maitra   Further clarification on Mantin's
                                  Digraph Repetition Bias in RC4 . . . . . 127--141
         Michael Bamiloshin and   
            Aner Ben-Efraim and   
             Oriol Farr\`as and   
            Carles Padró   Common information, matroid
                                  representation, and secret sharing for
                                  matroid ports  . . . . . . . . . . . . . 143--166
               Alexey Oblaukhov   On metric regularity of Reed--Muller
                                  codes  . . . . . . . . . . . . . . . . . 167--197

Designs, Codes, and Cryptography
Volume 89, Number 2, February, 2021

            Edoardo Ballico and   
         Giuseppe Favacchio and   
               Elena Guardo and   
                Lorenzo Milazzo   Steiner systems and configurations of
                                  points . . . . . . . . . . . . . . . . . 199--219
            Sartaj Ul Hasan and   
                  Mohit Pal and   
            Constanza Riera and   
         Pantelimon St\uanic\ua   On the $c$-differential uniformity of
                                  certain maps over finite fields  . . . . 221--239
              Xiaopeng Zhao and   
                 Zhenfu Cao and   
               Xiaolei Dong and   
                       Jun Shao   Extended Galbraith's test on the
                                  anonymity of IBE schemes from higher
                                  residuosity  . . . . . . . . . . . . . . 241--253
               Jingkun Zhou and   
                  Zhiwen He and   
                      Zhao Chai   Two kinds of constructions of directed
                                  strongly regular graphs  . . . . . . . . 255--268
            Delio Jaramillo and   
            Maria Vaz Pinto and   
           Rafael H. Villarreal   Evaluation codes and their basic
                                  parameters . . . . . . . . . . . . . . . 269--300
     Cícero Carvalho and   
           Victor G. L. Neumann   Towards the Complete Determination of
                                  Next-to-Minimal Weights of Projective
                                  Reed--Muller Codes . . . . . . . . . . . 301--315
               Chen-Dong Ye and   
                  Tian Tian and   
                  Fan-Yang Zeng   The MILP-aided conditional differential
                                  attack and its application to Trivium    317--339
              Eiichi Bannai and   
                Manabu Oura and   
                        Da Zhao   The complex conjugate invariants of
                                  Clifford groups  . . . . . . . . . . . . 341--350
              Julian Renner and   
            Alessandro Neri and   
                 Sven Puchinger   Low-rank parity-check codes over Galois
                                  rings  . . . . . . . . . . . . . . . . . 351--386
             Trygve Johnsen and   
                 Hugues Verdure   Greedy weights for matroids  . . . . . . 387--405

Designs, Codes, and Cryptography
Volume 89, Number 3, March, 2021

                   Chun Guo and   
                   Guoyan Zhang   Beyond-birthday security for
                                  permutation-based Feistel networks . . . 407--440
              Claude Carlet and   
               Kwang Ho Kim and   
                 Sihem Mesnager   A direct proof of APN-ness of the Kasami
                                  functions  . . . . . . . . . . . . . . . 441--446
    Heide Gluesing-Luerssen and   
                 Hunter Lehmann   Distance Distributions of Cyclic Orbit
                                  Codes  . . . . . . . . . . . . . . . . . 447--470
            Daniele Bartoli and   
              Matteo Bonini and   
               Marco Timpanella   On the weight distribution of some
                                  minimal codes  . . . . . . . . . . . . . 471--487
         Stefano Innamorati and   
                  Fulvio Zuanni   Classifying sets of class $ [1, q + 1, 2
                                  q + 1, q^2 + q + 1]_2 $ in $ {\rm PG}(r,
                                  q) $, $ r \ge 3 $  . . . . . . . . . . . 489--496
      Hiram H. López and   
              Beth Malmskog and   
       Gretchen L. Matthews and   
Fernando Piñero-González and   
                  Mary Wootters   Hermitian-lifted codes . . . . . . . . . 497--515
             James A. Davis and   
                  J. J. Hoo and   
             Connor Kissane and   
                 Ziming Liu and   
               Calvin Reedy and   
            Kartikey Sharma and   
                  Ken Smith and   
                      Yiwei Sun   Abelian difference sets with the
                                  symmetric difference property  . . . . . 517--523
       Nicholas J. Cavenagh and   
             Adam Mammoliti and   
                 Ian M. Wanless   Maximal sets of mutually orthogonal
                                  frequency squares  . . . . . . . . . . . 525--558
                Sascha Kurz and   
                  Eitan Yaakobi   PIR Codes with Short Block Length  . . . 559--587
                 Tran van Trung   An extending theorem for $s$-resolvable
                                  $t$-designs  . . . . . . . . . . . . . . 589--597

Designs, Codes, and Cryptography
Volume 89, Number 4, April, 2021

José Andrés Armario and   
               Ivan Bailera and   
                     Ronan Egan   Generalized Hadamard full propelinear
                                  codes  . . . . . . . . . . . . . . . . . 599--615
               Makoto Araya and   
             Masaaki Harada and   
                      Ken Saito   Characterization and classification of
                                  optimal LCD codes  . . . . . . . . . . . 617--640
               Tania Sidana and   
                Anuradha Sharma   Roulette games and depths of words over
                                  finite commutative rings . . . . . . . . 641--678
             Zhongxiao Wang and   
             Qunxiong Zheng and   
               Xiaoxin Zhao and   
                    Xiutao Feng   Grain-like structures with minimal and
                                  maximal period sequences . . . . . . . . 679--693
                  Yuhua Sun and   
              Tongjiang Yan and   
                    Qiuyan Wang   The $2$-adic complexity of Yu--Gong
                                  sequences with interleaved structure and
                                  optimal autocorrelation magnitude  . . . 695--707
               Sebati Ghosh and   
                  Palash Sarkar   Variants of Wegman--Carter message
                                  authentication code supporting variable
                                  tag lengths  . . . . . . . . . . . . . . 709--736
                Kangquan Li and   
                 Chunlei Li and   
              Tor Helleseth and   
                   Longjiang Qu   Cryptographically strong permutations
                                  from the butterfly structure . . . . . . 737--761

Designs, Codes, and Cryptography
Volume 89, Number 5, May, 2021

               Tsuyoshi Miezaki   Design-theoretic analogies between
                                  codes, lattices, and vertex operator
                                  algebras . . . . . . . . . . . . . . . . 763--780
              Zhaoping Meng and   
                  Bin Zhang and   
                    Zhanggui Wu   Constructions of doubly resolvable
                                  Steiner quadruple systems  . . . . . . . 781--795
                  Hualu Liu and   
                    Peng Hu and   
                   Xiusheng Liu   Asymmetric entanglement-assisted quantum
                                  codes: bound and constructions . . . . . 797--809
                    Simeon Ball   Some constructions of quantum MDS codes  811--821
                        Lin Sok   New families of self-dual codes  . . . . 823--841
           Tsuyoshi Miezaki and   
           Akihiro Munemasa and   
              Hiroyuki Nakasora   A note on Assmus--Mattson type theorems  843--858
               Bart Mennink and   
                   Samuel Neves   On the Resilience of Even--Mansour to
                                  Invariant Permutations . . . . . . . . . 859--893
               Dingding Jia and   
               Beno\^\it Libert   SO-CCA secure PKE from pairing based
                                  all-but-many lossy trapdoor functions    895--923
            Veronika Kuchta and   
                Amin Sakzad and   
              Ron Steinfeld and   
                  Joseph K. Liu   Lattice-based zero-knowledge arguments
                                  for additive and multiplicative
                                  relations  . . . . . . . . . . . . . . . 925--963
             Angela Aguglia and   
                Luca Giuzzi and   
                 Angelo Sonnino   Near-MDS codes from elliptic curves  . . 965--972
                 Wonhee Cho and   
                Jiseung Kim and   
                   Changmin Lee   (In)security of concrete instantiation
                                  of Lin17's functional encryption scheme
                                  from noisy multilinear maps  . . . . . . 973--1016
                    Nan Cui and   
                Shengli Liu and   
                    Dawu Gu and   
                      Jian Weng   Robustly reusable fuzzy extractor with
                                  imperfect randomness . . . . . . . . . . 1017--1059
      Masoumeh Shafieinejad and   
            Navid Nasr Esfahani   A scalable post-quantum hash-based group
                                  signature  . . . . . . . . . . . . . . . 1061--1090
                      Ankur and   
             Pramod Kumar Kewat   Self-dual codes over $ \mathbb{F}_2[u] /
                                  \langle u^4 \rangle $ and Jacobi forms
                                  over a totally real subfield of $
                                  \mathbb{Q}(\zeta_8) $  . . . . . . . . . 1091--1109

Designs, Codes, and Cryptography
Volume 89, Number 6, June, 2021

                Hanwen Feng and   
                Jianwei Liu and   
                    Qianhong Wu   Traceable ring signatures: general
                                  framework and post-quantum security  . . 1111--1145
                     Huili Dong   Flag-transitive 4-designs and $ P S L(2,
                                  q) $ groups  . . . . . . . . . . . . . . 1147--1157
                        Jun Guo   Cameron--Liebler sets in bilinear forms
                                  graphs . . . . . . . . . . . . . . . . . 1159--1180
                  Haode Yan and   
                     Chengju Li   Differential spectra of a class of power
                                  permutations with characteristic 5 . . . 1181--1191
              Zhengbang Zha and   
                         Lei Hu   Some classes of power functions with low
                                  $c$-differential uniformity over finite
                                  fields . . . . . . . . . . . . . . . . . 1193--1210
               Daniel R. Hawtin   $s$-Elusive codes in Hamming graphs  . . 1211--1220
            Daniele Bartoli and   
           Maria Montanucci and   
                  Giovanni Zini   On certain self-orthogonal AG codes with
                                  applications to quantum error-correcting
                                  codes  . . . . . . . . . . . . . . . . . 1221--1239
Himadri Shekhar Chakraborty and   
               Tsuyoshi Miezaki   Average of complete joint weight
                                  enumerators and self-dual codes  . . . . 1241--1254
                Jianfu Chen and   
                  Shenglin Zhou   Flag-transitive, point-imprimitive $ 2 -
                                  (v, k, \lambda) $ symmetric designs with
                                  $k$ and $ \lambda $ prime powers . . . . 1255--1260
           Giovanni Falcone and   
                   Marco Pavone   Binary Hamming codes and Boolean designs 1261--1277
              Julian Renner and   
             Sven Puchinger and   
            Antonia Wachter-Zeh   LIGA: a cryptosystem based on the
                                  hardness of rank-metric list and
                                  interleaved decoding . . . . . . . . . . 1279--1319
         Jonathan S. Turner and   
         Ilias S. Kotsireas and   
                Andrew J. Geyer   A Legendre pair of length 77 using
                                  complementary binary matrices with fixed
                                  marginals  . . . . . . . . . . . . . . . 1321--1333
          Olive Chakraborty and   
     Jean-Charles Faug\`ere and   
                 Ludovic Perret   Cryptanalysis of the extension field
                                  cancellation cryptosystem  . . . . . . . 1335--1364
        Alexandr A. Polujan and   
                 Alexander Pott   Correction to: Cubic bent functions
                                  outside the completed
                                  Maiorana--McFarland class  . . . . . . . 1365--1366

Designs, Codes, and Cryptography
Volume 89, Number 7, July, 2021

      Hiram H. López and   
              Ivan Soprunov and   
           Rafael H. Villarreal   The dual of an evaluation code . . . . . 1367--1403
                Tairong Shi and   
                 Wenling Wu and   
                  Sengpeng Wang   Breaking LWC candidates: sESTATE and
                                  Elephant in quantum setting  . . . . . . 1405--1432
             Mahdi Sajadieh and   
                 Mohsen Mousavi   Construction of MDS matrices from
                                  generalized Feistel structures . . . . . 1433--1452
                Yumeng Yang and   
             Xiangyong Zeng and   
                       Shi Wang   Construction of lightweight involutory
                                  MDS matrices . . . . . . . . . . . . . . 1453--1483
             Fengrong Zhang and   
               Enes Pasalic and   
                 Yongzhuang Wei   Wide minimal binary linear codes from
                                  the general Maiorana--McFarland class    1485--1507
             Kanat Abdukhalikov   Equivalence classes of Niho bent
                                  functions  . . . . . . . . . . . . . . . 1509--1534
                Keita Emura and   
           Atsushi Takayasu and   
                 Yohei Watanabe   Adaptively secure revocable hierarchical
                                  IBE from $k$-linear assumption . . . . . 1535--1574
                Yanwei Zhou and   
                    Bo Yang and   
                          Yi Mu   Novel generic construction of
                                  leakage-resilient PKE scheme with CCA
                                  security . . . . . . . . . . . . . . . . 1575--1614
        Steven T. Dougherty and   
                 Joe Gildea and   
                    Abidin Kaya   Composite matrices from group rings,
                                  composite $G$-codes and constructions of
                                  self-dual codes  . . . . . . . . . . . . 1615--1638
                Ruikai Chen and   
             Sihem Mesnager and   
                  Chang-An Zhao   Good polynomials for optimal LRC of low
                                  locality . . . . . . . . . . . . . . . . 1639--1660
                Tuvi Etzion and   
                   Junling Zhou   Large sets with multiplicity . . . . . . 1661--1690
                Huaning Liu and   
                         Xi Liu   On the properties of generalized
                                  cyclotomic binary sequences of period $
                                  2 p^m $  . . . . . . . . . . . . . . . . 1691--1712
              Cunsheng Ding and   
              Chunming Tang and   
            Vladimir D. Tonchev   The projective general linear group $
                                  \mathrm {PGL}(2, 2^m) $ and linear codes
                                  of length $ 2^m + 1 $  . . . . . . . . . 1713--1734
             Oriol Farr\`as and   
Jordi Ribes-González and   
                     Sara Ricci   Privacy-preserving data splitting: a
                                  combinatorial approach . . . . . . . . . 1735--1756

Designs, Codes, and Cryptography
Volume 89, Number 8, August, 2021

               Junqing Gong and   
                   Haifeng Qian   Simple and efficient FE for quadratic
                                  functions  . . . . . . . . . . . . . . . 1757--1786
             Varsha Chauhan and   
            Anuradha Sharma and   
                   Monika Yadav   Hamming weight distributions of
                                  multi-twisted codes over finite fields   1787--1837
              Shoko Chisaki and   
             Ryoh Fuji-Hara and   
                Nobuko Miyamoto   A construction for circulant type
                                  dropout designs  . . . . . . . . . . . . 1839--1852
              Giovanni Zini and   
               Ferdinando Zullo   Scattered subspaces and related codes    1853--1873
                  Ling Song and   
                      Yi Tu and   
                         Lei Hu   Security analysis of Subterranean 2.0    1875--1905
               Sebati Ghosh and   
                  Palash Sarkar   Breaking tweakable enciphering schemes
                                  using Simon's algorithm  . . . . . . . . 1907--1926
               Atsushi Takayasu   Tag-based ABE in prime-order groups via
                                  pair encoding  . . . . . . . . . . . . . 1927--1963
               Atsushi Takayasu   Adaptively secure lattice-based
                                  revocable IBE in the QROM: compact
                                  parameters, tight security, and
                                  anonymity  . . . . . . . . . . . . . . . 1965--1992
                Ziling Heng and   
                 Dexiang Li and   
                    Fuling Chen   A family of projective two-weight linear
                                  codes  . . . . . . . . . . . . . . . . . 1993--2007
             Xiaoqiang Wang and   
                Dabin Zheng and   
                      Yan Zhang   Binary linear codes with few weights
                                  from Boolean functions . . . . . . . . . 2009--2030
                Ruikai Chen and   
             Sihem Mesnager and   
                  Chang-An Zhao   Correction to: Good polynomials for
                                  optimal LRC of low locality  . . . . . . 2031--2031

Designs, Codes, and Cryptography
Volume 89, Number 9, September, 2021

            Hadi Kharaghani and   
              Thomas Pender and   
                       Sho Suda   Balancedly splittable orthogonal designs
                                  and equiangular tight frames . . . . . . 2033--2050
                Hongwei Liu and   
                   Shengwei Liu   Construction of MDS twisted
                                  Reed--Solomon codes and LCD--MDS codes   2051--2065
               Peter Ligeti and   
              Peter Sziklai and   
         Marcella Takáts   Generalized threshold secret sharing and
                                  finite geometry  . . . . . . . . . . . . 2067--2078
            Fatemeh Ghasemi and   
                Reza Kaboli and   
          Mohammad-Mahdi Rafiei   On ideal homomorphic secret sharing
                                  schemes and their decomposition  . . . . 2079--2096
             Nicolas Aragon and   
                Marco Baldi and   
                  Paolo Santini   Cryptanalysis of a code-based full-time
                                  signature  . . . . . . . . . . . . . . . 2097--2112
             Sadegh Sadeghi and   
             Vincent Rijmen and   
                 Nasour Bagheri   Proposing an MILP-based method for the
                                  experimental verification of
                                  difference-based trails: application to
                                  SPECK, SIMECK  . . . . . . . . . . . . . 2113--2155
                     E. Ballico   Locally Recoverable Codes correcting
                                  many erasures over small fields  . . . . 2157--2162
             Trygve Johnsen and   
                 Hugues Verdure   Möbius and coboundary polynomials for
                                  matroids . . . . . . . . . . . . . . . . 2163--2177
              Xiaojing Chen and   
                 Shixin Zhu and   
                     Gaojun Luo   A new family of EAQMDS codes constructed
                                  from constacyclic codes  . . . . . . . . 2179--2193
               Daitao Huang and   
                    Qin Yue and   
                         Xia Li   MDS or NMDS self-dual codes from twisted
                                  generalized Reed--Solomon codes  . . . . 2195--2209

Designs, Codes, and Cryptography
Volume 89, Number 10, October, 2021

       Alexander A. Davydov and   
          Stefano Marcugini and   
             Fernanda Pambianco   Twisted cubic and point-line incidence
                                  matrix in $ \mathrm {PG}(3, q) $ . . . . 2211--2233
        Gianira N. Alfarano and   
                 Julia Lieb and   
              Joachim Rosenthal   Construction of LDPC convolutional codes
                                  via difference triangle sets . . . . . . 2235--2254
              Ritam Bhaumik and   
               Mridul Nandi and   
              Anik Raychaudhuri   Improved indifferentiability security
                                  proof for 3-round tweakable
                                  Luby--Rackoff  . . . . . . . . . . . . . 2255--2281
         Kanat Abdukhalikov and   
                         Duy Ho   Extended cyclic codes, maximal arcs and
                                  ovoids . . . . . . . . . . . . . . . . . 2283--2294
                 Masaaki Harada   Construction of binary LCD codes,
                                  ternary LCD codes and quaternary
                                  Hermitian LCD codes  . . . . . . . . . . 2295--2312
Ayça Çesmelioglu and   
             Wilfried Meidl and   
                  Isabel Pirsic   Vectorial bent functions and partial
                                  difference sets  . . . . . . . . . . . . 2313--2330
Clementa Alonso-González and   
Miguel Ángel Navarro-Pérez   Cyclic orbit flag codes  . . . . . . . . 2331--2356
                Yu-Chi Chen and   
                    Xin Xie and   
                     Raylin Tso   Public key encryption with filtered
                                  equality test revisited  . . . . . . . . 2357--2372
            Charles J. Colbourn   Egalitarian Steiner triple systems for
                                  data popularity  . . . . . . . . . . . . 2373--2395
                Keita Emura and   
           Atsushi Takayasu and   
                 Yohei Watanabe   Efficient identity-based encryption with
                                  Hierarchical key-insulation from HIBE    2397--2431

Designs, Codes, and Cryptography
Volume 89, Number 11, November, 2021

         Michail I. Rozhkov and   
           Alexander V. Sorokin   Some conditions for absence of affine
                                  functions in NFSR output stream  . . . . 2433--2443
             Stefka Bouyuklieva   Optimal binary LCD codes . . . . . . . . 2445--2461
                 A. Bapi\'c and   
                     E. Pasalic   A new method for secondary constructions
                                  of vectorial bent functions  . . . . . . 2463--2475
                  Qian Wang and   
                    Chenhui Jin   Bounding the length of impossible
                                  differentials for SPN block ciphers  . . 2477--2493
                    Peng Hu and   
                   Xiusheng Liu   Linear complementary pairs of codes over
                                  rings  . . . . . . . . . . . . . . . . . 2495--2509
                 Xiang Wang and   
               Yuanjie Wang and   
                    Fang-Wei Fu   Nonexistence of perfect permutation
                                  codes under the Kendall $ \tau $ -metric 2511--2531
              Xiaojing Chen and   
                 Shixin Zhu and   
                      Wan Jiang   Cyclic codes and some new
                                  entanglement-assisted quantum MDS codes  2533--2551
             Matthew Fickus and   
          Joseph W. Iverson and   
                  Emily J. King   Grassmannian codes from paired
                                  difference sets  . . . . . . . . . . . . 2553--2576
             Junichi Tomida and   
              Yuto Kawahara and   
                  Ryo Nishimaki   Fast, compact, and expressive
                                  attribute-based encryption . . . . . . . 2577--2626
            Sartaj Ul Hasan and   
                  Mohit Pal and   
         Pantelimon St\uanic\ua   Boomerang uniformity of a class of power
                                  maps . . . . . . . . . . . . . . . . . . 2627--2636
                   Yanan Wu and   
                    Nian Li and   
                 Xiangyong Zeng   New P$c$N and AP$c$N functions over
                                  finite fields  . . . . . . . . . . . . . 2637--2651

Designs, Codes, and Cryptography
Volume 89, Number 12, December, 2021

                   Laura Monroe   Binary signed-digit integers and the
                                  Stern diatomic sequence  . . . . . . . . 2653--2662
                Jinjin Chai and   
                Zilong Wang and   
                    Erzhong Xue   Walsh spectrum and nega spectrum of
                                  complementary arrays . . . . . . . . . . 2663--2677
                Binbin Pang and   
                 Shixin Zhu and   
                   Xiaoshan Kai   Five families of the narrow-sense
                                  primitive BCH codes over finite fields   2679--2696
               WeiGuo Zhang and   
                 YuJuan Sun and   
                   Enes Pasalic   Three classes of balanced vectorial
                                  semi-bent functions  . . . . . . . . . . 2697--2714
               M. H. Ahmadi and   
             N. Akhlaghinia and   
                       S. Sadri   New partitionings of complete designs    2715--2723
           Simona Bonvicini and   
              Marco Buratti and   
                Tommaso Traetta   The first families of highly symmetric
                                  Kirkman Triple Systems whose orders fill
                                  a congruence class . . . . . . . . . . . 2725--2757
                    Sascha Kurz   Bounds for flag codes  . . . . . . . . . 2759--2785
               Chen-Dong Ye and   
                      Tian Tian   An improved degree evaluation method of
                                  NFSR-based cryptosystems . . . . . . . . 2787--2806
                  Yiming Li and   
                Shengli Liu and   
                        Dawu Gu   Pseudorandom functions in NC class from
                                  the standard LWE assumption  . . . . . . 2807--2839
              Hariom Sharma and   
                   R. K. Sharma   Existence of primitive normal pairs with
                                  one prescribed trace over finite fields  2841--2855
        Navid Nasr Esfahani and   
             Douglas R. Stinson   On security properties of all-or-nothing
                                  transforms . . . . . . . . . . . . . . . 2857--2867
                   Ziran Tu and   
             Xiangyong Zeng and   
                         Yan Li   Binomial permutations over finite fields
                                  with even characteristic . . . . . . . . 2869--2888


Designs, Codes, and Cryptography
Volume 90, Number 2, February, 2022

                    Nian Li and   
                    Zhao Hu and   
                 Xiangyong Zeng   A note on ``Cryptographically strong
                                  permutations from the butterfly
                                  structure''  . . . . . . . . . . . . . . 265--276
               Keisuke Hara and   
           Takahiro Matsuda and   
                 Keisuke Tanaka   Generic transformation from broadcast
                                  encryption to round-optimal deniable
                                  ring authentication  . . . . . . . . . . 277--316
                 Joe Gildea and   
              Adrian Korban and   
           Adam Michael Roberts   New binary self-dual codes of lengths
                                  80, 84 and 96 from composite matrices    317--342
              Soumak Biswas and   
          Maheshanand Bhaintwal   Quantum codes from $ \mathbb {Z}_2
                                  \mathbb {Z}_2 [u] / \langle u^4 \rangle
                                  $-cyclic codes . . . . . . . . . . . . . 343--366
                   Rong Pan and   
          R. Julian R. Abel and   
                  Xiaomiao Wang   Difference matrices with five rows over
                                  finite abelian groups  . . . . . . . . . 367--386
             Xiao-Juan Wang and   
                  Tian Tian and   
                    Wen-Feng Qi   A generic method for investigating
                                  nonsingular Galois NFSRs . . . . . . . . 387--408
            Steven T. Dougherty   The neighbor graph of binary self-dual
                                  codes  . . . . . . . . . . . . . . . . . 409--425
           Marcel Fernandez and   
                 Jorge J. Urroz   A study of the separating property in
                                  Reed--Solomon codes by bounding the
                                  minimum distance . . . . . . . . . . . . 427--442
             Fatih Demirbas and   
                     Orhun Kara   Integral characteristics by keyspace
                                  partitioning . . . . . . . . . . . . . . 443--472
               Ulrich Dempwolff   Correction to: CCZ equivalence of power
                                  functions  . . . . . . . . . . . . . . . 473--475
                A. Blokhuis and   
                M. De Boeck and   
                 J. D'haeseleer   Correction to: Cameron--Liebler sets of
                                  $k$-spaces in $ \mathrm {PG}(n, q) $ . . 477--487

Designs, Codes, and Cryptography
Volume 90, Number 3, March, 2022

         Deepak Kumar Dalai and   
                  Santu Pal and   
                 Santanu Sarkar   A state bit recovery algorithm with
                                  TMDTO attack on Lizard and Grain-128a    489--521
                      Olav Geil   From primary to dual affine variety
                                  codes over the Klein quartic . . . . . . 523--543
                Xiaofang Xu and   
             Xiangyong Zeng and   
                   Shasha Zhang   Regular complete permutation polynomials
                                  over $ \mathbb {F}_{2^n} $ . . . . . . . 545--575
                  Jiang Liu and   
                     Qin Li and   
                   Haozhen Situ   Efficient quantum homomorphic encryption
                                  scheme with flexible evaluators and its
                                  simulation . . . . . . . . . . . . . . . 577--591
               Moritz Wiese and   
                   Holger Boche   Mosaics of combinatorial designs for
                                  information-theoretic security . . . . . 593--632
               Jan De Beule and   
          Jonathan Mannaert and   
                     Leo Storme   Cameron--Liebler $k$-sets in subspaces
                                  and non-existence conditions . . . . . . 633--651
                    H. Zhao and   
                     Y. Wei and   
                       N. Cepak   Two secondary constructions of bent
                                  functions without initial conditions . . 653--679
                    Pan Tan and   
                Cuiling Fan and   
                        Wei Guo   Linear codes from support designs of
                                  ternary cyclic codes . . . . . . . . . . 681--693
       Terry Shue Chien Lau and   
                   Chik How Tan   On the design and security of Lee metric
                                  McEliece cryptosystems . . . . . . . . . 695--717
                  Quan Yuan and   
             Mehdi Tibouchi and   
                   Masayuki Abe   On subset-resilient hash function
                                  families . . . . . . . . . . . . . . . . 719--758
              Charul Rajput and   
          Maheshanand Bhaintwal   On the locality of quasi-cyclic codes
                                  over finite fields . . . . . . . . . . . 759--777
             Dibyayoti Jena and   
         Geertrui Van de Voorde   The geometric field of linearity of
                                  linear sets  . . . . . . . . . . . . . . 779--799
               Dmitrii Koshelev   Indifferentiable hashing to ordinary
                                  elliptic $ \mathbb {F}_q $-curves of $ j
                                  = 0 $ with the cost of one
                                  exponentiation in $ \mathbb {F}_q $  . . 801--812
              Mengzhen Zhao and   
                Cuiling Fan and   
                    Zihong Tian   Nearly optimal balanced quaternary
                                  sequence pairs of prime period $ N
                                  \equiv 5 \pmod 8 $ . . . . . . . . . . . 813--826
                   Tim Penttila   Uniqueness of the inversive plane of
                                  order sixty-four . . . . . . . . . . . . 827--834

Designs, Codes, and Cryptography
Volume 90, Number 4, April, 2022

                Kevin M. Byrnes   Isomorphism of maximum length circuit
                                  codes  . . . . . . . . . . . . . . . . . 835--850
                Liantao Lan and   
               Yanxun Chang and   
                    Lidong Wang   The completion of optimal cyclic
                                  quaternary codes of weight 3 and
                                  distance 3 . . . . . . . . . . . . . . . 851--862
                Yanwei Zhao and   
                  Shenglin Zhou   Flag-transitive $ 2 - (v, k, \lambda) $
                                  designs with $ r > \lambda (k - 3) $  . . 863--869
         Rajendra M. Pawale and   
        Mohan S. Shrikhande and   
               Kusum S. Rajbhar   Non-existence of quasi-symmetric designs
                                  with restricted block graphs . . . . . . 871--879
                 Luka Music and   
    Céline Chevalier and   
                  Elham Kashefi   Dispelling myths on superposition
                                  attacks: formal security model and
                                  attack analyses  . . . . . . . . . . . . 881--920
                    Yi Zhao and   
               Kaitai Liang and   
            Emmanouil Panaousis   Practical algorithm substitution attack
                                  on extractable signatures  . . . . . . . 921--937
             Alexander Barg and   
                 Zitan Chen and   
                    Itzhak Tamo   A construction of maximally recoverable
                                  codes  . . . . . . . . . . . . . . . . . 939--945
             Daiki Kawabata and   
                 Tatsuya Maruta   On the nonexistence of ternary linear
                                  codes attaining the Griesmer bound . . . 947--956
         Paolo Santonastaso and   
               Ferdinando Zullo   On the list decodability of rank-metric
                                  codes containing Gabidulin codes . . . . 957--982
              Orr Dunkelman and   
           Maria Eichlseder and   
             Markus Schofnegger   Practical key recovery attacks on
                                  FlexAEAD . . . . . . . . . . . . . . . . 983--1007
           Christof Beierle and   
             Gregor Leander and   
              Léo Perrin   Trims and extensions of quadratic APN
                                  functions  . . . . . . . . . . . . . . . 1009--1036
            Dipak K. Bhunia and   
Cristina Fernández-Córdoba and   
             Merc\`e Villanueva   On the linearity and classification of $
                                  \mathbb {Z}_{p^s} $-linear generalized
                                  Hadamard codes . . . . . . . . . . . . . 1037--1058
         Janaka Alawatugoda and   
               Tatsuaki Okamoto   Standard model leakage-resilient
                                  authenticated key exchange using
                                  inner-product extractors . . . . . . . . 1059--1079
        Nurdagül Anbar and   
                 Wilfried Meidl   Bent partitions  . . . . . . . . . . . . 1081--1101

Designs, Codes, and Cryptography
Volume 90, Number 5, May, 2022

             Carlos Galindo and   
              Fernando Hernando   On the generalization of the
                                  construction of quantum codes from
                                  Hermitian self-orthogonal codes  . . . . 1103--1112
                Hongwei Zhu and   
                 Minjia Shi and   
            Ferruh Özbudak   Complete $b$-symbol weight distribution
                                  of some irreducible cyclic codes . . . . 1113--1125
                Kai Lin Ong and   
                  Miin Huey Ang   On equivalence of cyclic and dihedral
                                  zero-divisor codes having nilpotents of
                                  nilpotency degree two as generators  . . 1127--1138
               WeiGuo Zhang and   
               Enes Pasalic and   
                  LiuPiao Zhang   Phase orthogonal sequence sets for
                                  (QS)CDMA communications  . . . . . . . . 1139--1156
                  Fucai Luo and   
                 Saif Al-Kuwari   Attribute-based signatures from
                                  lattices: unbounded attributes and
                                  semi-adaptive security . . . . . . . . . 1157--1177
                  Zhenyu Lu and   
             Sihem Mesnager and   
                    Meiqin Wang   An STP-based model toward designing
                                  S-boxes with good cryptographic
                                  properties . . . . . . . . . . . . . . . 1179--1202
             Felix Lazebnik and   
                Lorinda Leshock   On Pappus configurations in Hall planes  1203--1219
                  Hui Zhang and   
                Cuiling Fan and   
                 Sihem Mesnager   Constructions of two-dimensional
                                  Z-complementary array pairs with large
                                  ZCZ ratio  . . . . . . . . . . . . . . . 1221--1239
                  Nuh Aydin and   
                 Peihan Liu and   
                  Bryan Yoshino   Polycyclic codes associated with
                                  trinomials: good codes and open
                                  questions  . . . . . . . . . . . . . . . 1241--1269
                 Gaojun Luo and   
                       San Ling   Application of optimal $p$-ary linear
                                  codes to alphabet-optimal locally
                                  repairable codes . . . . . . . . . . . . 1271--1287
             Fengrong Zhang and   
               Enes Pasalic and   
                 Yongzhuang Wei   Minimal binary linear codes: a general
                                  framework based on bent concatenation    1289--1318

Designs, Codes, and Cryptography
Volume 90, Number 6, June, 2022

                  Can Xiang and   
              Chunming Tang and   
                         Qi Liu   An infinite family of antiprimitive
                                  cyclic codes supporting Steiner systems
                                  $ S(3, 8, 7^m + 1) $ . . . . . . . . . . 1319--1333
              Michael Kiermaier   On $ \alpha $-points of $q$-analogs of
                                  the Fano plane . . . . . . . . . . . . . 1335--1345
               Valerio Dose and   
             Pietro Mercuri and   
                 Claudio Stirpe   High order elements in finite fields
                                  arising from recursive towers  . . . . . 1347--1368
                Engin Senel and   
                 Figen Öke   On the automorphisms of generalized
                                  algebraic geometry codes . . . . . . . . 1369--1379
       Arghya Bhattacharjee and   
               Avijit Dutta and   
                   Mridul Nandi   $ \mathsf {CENCPP}^* $:
                                  beyond-birthday-secure encryption from
                                  public permutations  . . . . . . . . . . 1381--1425
               Austin Dukes and   
           Andrea Ferraguti and   
                Giacomo Micheli   Optimal selection for good polynomials
                                  of degree up to five . . . . . . . . . . 1427--1436
               Kwang Ho Kim and   
             Sihem Mesnager and   
                  Myong Chol Jo   On permutation quadrinomials with
                                  boomerang uniformity 4 and the
                                  best-known nonlinearity  . . . . . . . . 1437--1461
                Jinming Wen and   
                 Xiao-Wen Chang   Sharper bounds on four lattice constants 1463--1484
           Tsuyoshi Miezaki and   
              Hiroyuki Nakasora   A note on the Assmus--Mattson theorem
                                  for some binary codes  . . . . . . . . . 1485--1502
             Angela Aguglia and   
              Michela Ceria and   
                    Luca Giuzzi   Some hypersurfaces over finite fields,
                                  minimal codes and secret sharing schemes 1503--1519
            Dean Crnkovi\'c and   
           Daniel R. Hawtin and   
                    Andrea Svob   Neighbour-transitive codes and partial
                                  spreads in generalised quadrangles . . . 1521--1533
                 Luka Music and   
    Céline Chevalier and   
                  Elham Kashefi   Correction to: Dispelling myths on
                                  superposition attacks: formal security
                                  model and attack analyses  . . . . . . . 1535--1535

Designs, Codes, and Cryptography
Volume 90, Number 10, October, 2022

             Hyun Kwang Kim and   
                     Jieun Kwon   Classification of weighted posets and
                                  digraphs admitting the extended Hamming
                                  code to be a perfect code  . . . . . . . 2249--2269
               Masayuki Abe and   
                 Miguel Ambrona   Blind key-generation attribute-based
                                  encryption for general predicates  . . . 2271--2299
             Shweta Agrawal and   
            Rajarshi Biswas and   
              Ryo Nishimaki and   
               Keita Xagawa and   
                  Xiang Xie and   
                   Shota Yamada   Cryptanalysis of Boyen's attribute-based
                                  encryption scheme in TCC 2013  . . . . . 2301--2318
                  Abbas Alhakim   Designing preference functions for de
                                  Bruijn sequences with forbidden words    2319--2335
                   Junru Ma and   
                    Jinquan Luo   Constructions of MDS symbol-pair codes
                                  with minimum distance seven or eight . . 2337--2359
           Hamidreza Eyvazi and   
                Karim Samei and   
                  Batoul Savari   The linearity of Carlet's Gray image of
                                  linear codes over $ \mathbb {Z}_8 $  . . 2361--2373
             Daniel Horsley and   
Padraig Ó Catháin   Block avoiding point sequencings of
                                  partial Steiner systems  . . . . . . . . 2375--2383
                  Haode Yan and   
                      Kun Zhang   On the $c$-differential spectrum of
                                  power functions over finite fields . . . 2385--2405
    Yagmur Çakiroglu and   
                 Oguz Yayla and   
            Emrah Sercan Yilmaz   The number of irreducible polynomials
                                  over finite fields with vanishing trace
                                  and reciprocal trace . . . . . . . . . . 2407--2417
                    Jun Liu and   
                Dachao Wang and   
                    Yupu Hu and   
                   Jie Chen and   
                   Baocang Wang   Improved key-recovery attacks on
                                  reduced-round WEM-8  . . . . . . . . . . 2419--2448
               Zhaocun Zhou and   
               Dengguo Feng and   
                      Bin Zhang   Efficient and extensive search for
                                  precise linear approximations with high
                                  correlations of full SNOW-V  . . . . . . 2449--2479
               Gerald J. Janusz   Covering polynomials and projections of
                                  self-dual codes  . . . . . . . . . . . . 2481--2489
                   Lijun Ji and   
                 Miao Liang and   
                   Yanting Wang   Combinational constructions of splitting
                                  authentication codes with perfect
                                  secrecy  . . . . . . . . . . . . . . . . 2491--2515

Designs, Codes, and Cryptography
Volume 90, Number 11, November, 2022

            W. Cary Huffman and   
               Jon-Lark Kim and   
            Patrick Solé   Guest editorial: On coding theory and
                                  combinatorics --- in memory of Vera
                                  Pless  . . . . . . . . . . . . . . . . . 2517--2527
                   Jian Gao and   
              Xiangrui Meng and   
                    Fang-Wei Fu   Weight distribution of double cyclic
                                  codes over Galois rings  . . . . . . . . 2529--2549
               Rongsheng Wu and   
                     Minjia Shi   On $ \mathbb {Z}_2 \mathbb {Z}_4
                                  $-additive polycyclic codes and their
                                  Gray images  . . . . . . . . . . . . . . 2551--2562
    Federico N. Martínez   Symmetric functions and spherical
                                  $t$-designs in $ \pm \mathbb {R}^2 $ . . 2563--2581
Himadri Shekhar Chakraborty and   
               Tsuyoshi Miezaki   Variants of Jacobi polynomials in coding
                                  theory . . . . . . . . . . . . . . . . . 2583--2597
                 Minjia Shi and   
                Shukai Wang and   
              Tor Helleseth and   
            Patrick Solé   Quadratic residue codes, rank three
                                  groups and PBIBDs  . . . . . . . . . . . 2599--2611
                Rongcun Qin and   
              Hengming Zhao and   
                  Huangsheng Yu   Compatible difference packing set
                                  systems and their applications to
                                  multilength variable-weight OOCs . . . . 2613--2645
            Martino Borello and   
            Cem Güneri and   
Elif Saçìkara and   
            Patrick Solé   The concatenated structure of
                                  quasi-abelian codes  . . . . . . . . . . 2647--2661
                 Liqin Qian and   
                 Xiwang Cao and   
                     Wei Lu and   
            Patrick Solé   A new method for constructing linear
                                  codes with small hulls . . . . . . . . . 2663--2682
              Serhii Dyshko and   
                    Jay A. Wood   MacWilliams extension property for
                                  arbitrary weights on linear codes over
                                  module alphabets . . . . . . . . . . . . 2683--2701
                  Yuqing Fu and   
                    Hongwei Liu   Galois self-orthogonal constacyclic
                                  codes over finite fields . . . . . . . . 2703--2733
             Whan Hyuk Choi and   
                   Jon Lark Kim   An improved upper bound on self-dual
                                  codes over finite fields $ {\rm GF} (11)
                                  $, $ {\rm GF} (19) $, and $ {\rm GF}
                                  (23) $ . . . . . . . . . . . . . . . . . 2735--2751
            Vladimir D. Tonchev   On Pless symmetry codes, ternary QR
                                  codes, and related Hadamard matrices and
                                  designs  . . . . . . . . . . . . . . . . 2753--2762
               Shikha Patel and   
                     Om Prakash   $ (\theta, \delta_\theta)$-Cyclic codes
                                  over $ \mathbb {F}_q[u, v] \slash
                                  \langle u^2 - u, v^2 - v, u v - v u
                                  \rangle $  . . . . . . . . . . . . . . . 2763--2781

Designs, Codes, and Cryptography
Volume 90, Number 12, December, 2022

     Stéphane Ballet and   
             Nicolas Baudru and   
           Alexis Bonnecaze and   
                  Mila Tukumuli   Construction of asymmetric
                                  Chudnovsky-type algorithms for
                                  multiplication in finite fields  . . . . 2783--2811
                Yansheng Wu and   
                Yoonjin Lee and   
                     Qiang Wang   Further improvement on index bounds  . . 2813--2821
                        Lin Sok   A new construction of linear codes with
                                  one-dimensional hull . . . . . . . . . . 2823--2839
             Fatemeh Jafari and   
          Alireza Abdollahi and   
            Javad Bagherian and   
             Maryam Khatami and   
                   Reza Sobhani   Equidistant permutation group codes  . . 2841--2859
    Edoukou Berenger Ayebie and   
               El Mamoun Souidi   New code-based cryptographic accumulator
                                  and fully dynamic group signature  . . . 2861--2891
           Hokuto Takahashi and   
                Manabu Hagiwara   Decoding algorithms of monotone codes
                                  and azinv codes and their unified view   2893--2922
               Iwan Duursma and   
                        Xiao Li   Johnson graph codes  . . . . . . . . . . 2923--2941
            Jessica Bariffi and   
               Sam Mattheus and   
            Alessandro Neri and   
              Joachim Rosenthal   Moderate-density parity-check codes from
                                  projective bundles . . . . . . . . . . . 2943--2966
               Jon-Lark Kim and   
                   JunYong Park   Steganography from perfect codes on
                                  Cayley graphs over Gaussian integers,
                                  Eisenstein--Jacobi integers and
                                  Lipschitz integers . . . . . . . . . . . 2967--2989
                Xianmang He and   
               Yindong Chen and   
              Zusheng Zhang and   
                   Kunxiao Zhou   Parallel sub-code construction for
                                  constant-dimension codes . . . . . . . . 2991--3001
              Adel Alahmadi and   
            Amani Alkathiry and   
              Alaa Altassan and   
           Alexis Bonnecaze and   
              Hatoon Shoaib and   
            Patrick Solé   The build-up construction over a
                                  commutative non-unital ring  . . . . . . 3003--3010
              Slim Bettaieb and   
             Lo\"\ic Bidoux and   
              Olivier Blazy and   
                Yann Connan and   
               Philippe Gaborit   A gapless code-based hash proof system
                                  based on RQC and its applications  . . . 3011--3044

Designs, Codes, and Cryptography
Volume 90, Number 7, July, 2022

        Ferruh Özbudak and   
   Burcu Gülmez Temür   Classification of permutation
                                  polynomials of the form $ x^3 g(x^{q -
                                  1}) $ of $ \mathbb {F}_{q^2} $ where $
                                  g(x) = x^3 + b x + c $ and $ b, c \in
                                  \mathbb {F}_q^* $  . . . . . . . . . . . 1537--1556
                Simeon Ball and   
                    James Dixon   The equivalence of linear codes implies
                                  semi-linear equivalence  . . . . . . . . 1557--1565
                 Tran van Trung   A method of constructing 2-resolvable
                                  $t$-designs for $ t = 3, 4$  . . . . . . 1567--1583
            Dean Crnkovi\'c and   
                    Andrea Svob   Switching for 2-designs  . . . . . . . . 1585--1593
            Vladimir D. Tonchev   Book Review: \booktitleDesigns from
                                  Linear Codes, second edition, by
                                  Cunsheng Ding and Chunming Tang, World
                                  Scientific, 2022 . . . . . . . . . . . . 1595--1597
                Jingjun Bao and   
                       Lijun Ji   Large sets of $t$-designs over finite
                                  fields exist for all $t$ . . . . . . . . 1599--1609
             Menglong Zhang and   
                   Tao Feng and   
                  Xiaomiao Wang   The existence of cyclic $ (v, 4,
                                  1)$-designs  . . . . . . . . . . . . . . 1611--1628
                     Xia Li and   
                        Qin Yue   Non-binary irreducible quasi-cyclic
                                  parity-check subcodes of Goppa codes and
                                  extended Goppa codes . . . . . . . . . . 1629--1647
                  Jun Zhang and   
             Zhengchun Zhou and   
                  Chunming Tang   A class of twisted generalized
                                  Reed--Solomon codes  . . . . . . . . . . 1649--1658
               Sergey Bereg and   
               Brian Malouf and   
              Linda Morales and   
             Thomas Stanley and   
              I. Hal Sudborough   Using permutation rational functions to
                                  obtain permutation arrays with large
                                  Hamming distance . . . . . . . . . . . . 1659--1677
              Adrian Korban and   
            Serap Sahinkaya and   
                    Deniz Ustun   Reversible $ G^k $-codes with
                                  applications to DNA codes  . . . . . . . 1679--1694

Designs, Codes, and Cryptography
Volume 90, Number 8, August, 2022

                   Yan Wang and   
                  Xilin Han and   
              Weiqiong Wang and   
                    Ziling Heng   Linear complexity over $ \mathbb {F}_q $
                                  and 2-adic complexity of a class of
                                  binary generalized cyclotomic sequences
                                  with good autocorrelation  . . . . . . . 1695--1712
           Alexander M. Romanov   On the number of q -ary quasi-perfect
                                  codes with covering radius 2 . . . . . . 1713--1719
           Khodakhast Bibak and   
             Behrouz Zolfaghari   The Modular Subset-Sum Problem and the
                                  size of deletion correcting codes  . . . 1721--1734
             Jung Hee Cheon and   
                 Wonhee Cho and   
              Jeong Han Kim and   
                    Jiseung Kim   Adventures in crypto dark matter:
                                  attacks, fixes and analysis for weak
                                  pseudorandom functions . . . . . . . . . 1735--1760
           Samaneh Mashahdi and   
          Bagher Bagherpour and   
                    Ali Zaghian   A non-interactive $ (t, n)$-publicly
                                  verifiable multi-secret sharing scheme   1761--1782
               Sadmir Kudin and   
                   Enes Pasalic   A complete characterization of $
                                  \mathcal {D}_0 \cap \mathcal {M}^\# $
                                  and a general framework for specifying
                                  bent functions in $ \mathcal {C} $
                                  outside $ \mathcal {M}^\# $  . . . . . . 1783--1796
         Seyyed Arash Azimi and   
        Adrián Ranea and   
       Mahmoud Salmasizadeh and   
             Javad Mohajeri and   
         Mohammad Reza Aref and   
                 Vincent Rijmen   A bit-vector differential model for the
                                  modular addition by a constant and its
                                  applications to differential and
                                  impossible-differential cryptanalysis    1797--1855
                Lidong Wang and   
                   Lulu Cai and   
                   Tao Feng and   
                Zihong Tian and   
                  Xiaomiao Wang   Geometric orthogonal codes and
                                  geometrical difference packings  . . . . 1857--1879
        Marién Abreu and   
                Martin Funk and   
         Vedran Kr\vcadinac and   
               Domenico Labbate   Strongly regular configurations  . . . . 1881--1897
        Katharina Boudgoust and   
                Amin Sakzad and   
                  Ron Steinfeld   Vandermonde meets Regev: public key
                                  encryption schemes based on partial
                                  Vandermonde problems . . . . . . . . . . 1899--1936
                Junzhen Sui and   
               Xiaomeng Zhu and   
                    Xueying Shi   MDS and near-MDS codes via twisted
                                  Reed--Solomon codes  . . . . . . . . . . 1937--1958

Designs, Codes, and Cryptography
Volume 90, Number 9, September, 2022

                Simeon Ball and   
             Michel Lavrauw and   
          Tamás Sz\Honyi   Contributions by Aart Blokhuis to finite
                                  geometry, discrete mathematics, and
                                  combinatorics  . . . . . . . . . . . . . 1959--1961
                B. De Bruyn and   
                         M. Gao   A characterization of the Coxeter cap    1963--1981
          Willem H. Haemers and   
             Leila Parsaei Majd   Spectral symmetry in conference matrices 1983--1990
              Oliver Janzer and   
Zoltán Lóránt Nagy   Coloring linear hypergraphs: the
                                  Erd\Hos--Faber--Lovász conjecture and the
                                  Combinatorial Nullstellensatz  . . . . . 1991--2001
                 Aida Abiad and   
              Bart De Bruyn and   
       Jozefien D'haeseleer and   
                 Jack H. Koolen   Neumaier graphs with few eigenvalues . . 2003--2019
             Michel Lavrauw and   
              Tomasz Popiel and   
                   John Sheekey   Combinatorial invariants for nets of
                                  conics in $ \mathrm {PG}(2, q) $ . . . . 2021--2067
               R. A. Bailey and   
           Peter J. Cameron and   
             Michael Kinyon and   
              Cheryl E. Praeger   Diagonal groups and arcs over groups . . 2069--2080
        Giovanni Longobardi and   
                 Leo Storme and   
                Rocco Trombetti   On sets of subspaces with two
                                  intersection dimensions and a
                                  geometrical junta bound  . . . . . . . . 2081--2099
                A. Blokhuis and   
                M. De Boeck and   
                 J. D'haeseleer   On the sunflower bound for $k$-spaces,
                                  pairwise intersecting in a point . . . . 2101--2111
                    Lins Denaux   Constructing saturating sets in
                                  projective spaces using subgeometries    2113--2144
              William M. Kantor   Automorphism subgroups for designs with
                                  $ \lambda = 1 $  . . . . . . . . . . . . 2145--2157
               Anton Betten and   
                 Fatma Karaoglu   The Eckardt point configuration of cubic
                                  surfaces revisited . . . . . . . . . . . 2159--2180
                  Xinyu Tan and   
       Narayanan Rengaswamy and   
              Robert Calderbank   Approximate unitary 3-designs from
                                  transvection Markov chains . . . . . . . 2181--2204
              Carmen Amarra and   
            Alice Devillers and   
              Cheryl E. Praeger   Delandtsheer--Doyen parameters for
                                  block-transitive point-imprimitive
                                  2-designs  . . . . . . . . . . . . . . . 2205--2221
              Aart Blokhuis and   
             Ruud Pellikaan and   
          Tamás Sz\Honyi   The extended coset leader weight
                                  enumerator of a twisted cubic code . . . 2223--2247


Designs, Codes, and Cryptography
Volume 91, Number 1, January, 2023

          Lukas Kölsch and   
         Björn Kriepke and   
            Gohar M. Kyureghyan   Image sets of perfectly nonlinear maps   1--27
                   He Zhang and   
                  Chunming Tang   Constructions of large cyclic constant
                                  dimension codes via Sidon spaces . . . . 29--44
            Hadi Kharaghani and   
                   Sho Suda and   
                   Vlad Zaitsev   On a class of optimal constant weight
                                  ternary codes  . . . . . . . . . . . . . 45--54
             Yasamin Khaefi and   
            Zeinab Akhlaghi and   
               Behrooz Khosravi   On the subgroup perfect codes in Cayley
                                  graphs . . . . . . . . . . . . . . . . . 55--61
       Maximilien Gadouleau and   
                Luca Mariot and   
                  Stjepan Picek   Bent functions in the partial spread
                                  class generated by linear recurring
                                  sequences  . . . . . . . . . . . . . . . 63--82
                    Pan Tan and   
                Cuiling Fan and   
              Cunsheng Ding and   
              Chunming Tang and   
                 Zhengchun Zhou   The minimum locality of linear codes . . 83--114
      Josimar J. R. Aguirre and   
     Cícero Carvalho and   
           Victor G. L. Neumann   About $r$-primitive and $k$-normal
                                  elements in finite fields  . . . . . . . 115--126
                Jiaxin Wang and   
                    Fang-Wei Fu   New results on vectorial dual-bent
                                  functions and partial difference sets    127--149
              Claude Carlet and   
                Rebeka Kiss and   
           Gábor P. Nagy   Simplicity conditions for binary
                                  orthogonal arrays  . . . . . . . . . . . 151--163
             Marloes Venema and   
          Greg Alpár and   
              Jaap-Henk Hoepman   Systematizing core properties of
                                  pairing-based attribute-based encryption
                                  to uncover remaining challenges in
                                  enforcing access control in practice . . 165--220
                    Ming Li and   
               Yupeng Jiang and   
                    Dongdai Lin   Properties of the cycles that contain
                                  all vectors of weight $ \le k $  . . . . 221--239
              Xavier Caruso and   
                  Amaury Durand   Duals of linearized Reed--Solomon codes  241--271
                 Minjia Shi and   
                     Na Liu and   
               Jon-Lark Kim and   
            Patrick Solé   Additive complementary dual codes over $
                                  \mathbb {F}_4 $  . . . . . . . . . . . . 273--284
                   Yupeng Jiang   A relation between sequences generated
                                  by Golomb's preference algorithm . . . . 285--291
Vincenzo Pallozzi Lavorante and   
             Valentino Smaldore   New hemisystems of the Hermitian surface 293--307

Designs, Codes, and Cryptography
Volume 91, Number 2, February, 2023

                     Xi Xie and   
                    Nian Li and   
             Xiangyong Zeng and   
                Xiaohu Tang and   
                        Yao Yao   Several classes of bent functions over
                                  finite fields  . . . . . . . . . . . . . 309--332
José Andrés Armario and   
               Ivan Bailera and   
                     Ronan Egan   Butson full propelinear codes  . . . . . 333--351
             Bingsheng Shen and   
                   Hua Meng and   
                  Yang Yang and   
                 Zhengchun Zhou   New constructions of $Z$-complementary
                                  code sets and mutually orthogonal
                                  complementary sequence sets  . . . . . . 353--371
               WeiGuo Zhang and   
               Enes Pasalic and   
                  Yiran Liu and   
              Liupiao Zhang and   
                    Chunlei Xie   A design and flexible assignment of
                                  orthogonal binary sequence sets for
                                  (QS)-CDMA systems  . . . . . . . . . . . 373--389
          Shuichi Katsumata and   
                 Toi Tomita and   
                   Shota Yamada   Direct computation of branching programs
                                  and its applications to more efficient
                                  lattice-based cryptography . . . . . . . 391--431
           Christof Beierle and   
                  Claude Carlet   Gold functions and switched cube
                                  functions are not 0-extendable in
                                  dimension $ n > 5 $ . . . . . . . . . . . 433--449
               Eimear Byrne and   
              Michela Ceria and   
              Sorina Ionica and   
            Relinde Jurrius and   
    Elif Saçìkara   Constructions of new matroids and
                                  designs over $ \mathbb {F}_q $ . . . . . 451--473
               Xiaoqin Hong and   
                     Xiwang Cao   Improved generalized block inserting
                                  construction of constant dimension codes 475--495
             Lo\"\ic Bidoux and   
           Philippe Gaborit and   
             Mukul Kulkarni and   
                   Victor Mateu   Code-based signatures from new proofs of
                                  knowledge for the syndrome decoding
                                  problem  . . . . . . . . . . . . . . . . 497--544
        Nurdagül Anbar and   
        Tekgül Kalayci and   
                 Wilfried Meidl   Generalized semifield spreads  . . . . . 545--562
           Thibauld Feneuil and   
               Antoine Joux and   
                Matthieu Rivain   Shared permutation for syndrome
                                  decoding: new zero-knowledge protocol
                                  and code-based signature . . . . . . . . 563--608
      Emmanouil Doulgerakis and   
            Thijs Laarhoven and   
                 Benne de Weger   The irreducible vectors of a lattice:
                                  Some theory and applications . . . . . . 609--643
          Michael Kiermaier and   
                Sascha Kurz and   
        Patrick Solé and   
              Michael Stoll and   
              Alfred Wassermann   On strongly walk regular graphs, triple
                                  sum sets and their codes . . . . . . . . 645--675
                 Minjia Shi and   
                Shukai Wang and   
               Jon-Lark Kim and   
            Patrick Solé   Self-orthogonal codes over a non-unital
                                  ring and combinatorial matrices  . . . . 677--689
                 Minjia Shi and   
                Shukai Wang and   
               Jon-Lark Kim and   
            Patrick Solé   Correction: Self-orthogonal codes over a
                                  non-unital ring and combinatorial
                                  matrices . . . . . . . . . . . . . . . . 691--691
                 Minjia Shi and   
                Shukai Wang and   
                    Xiaoxiao Li   Retracted Article: $ \mathbb {Z}_p
                                  \mathbb {Z}_{p^2} $-linear codes: rank
                                  and kernel . . . . . . . . . . . . . . . 693--693

Designs, Codes, and Cryptography
Volume 91, Number 3, March, 2023

               Xiusheng Liu and   
                      Hualu Liu   LCP of group codes over finite Frobenius
                                  rings  . . . . . . . . . . . . . . . . . 695--708
                Jiaxin Shen and   
                Jianfu Chen and   
                  Shenglin Zhou   Flag-transitive 2-designs with prime
                                  square replication number and
                                  alternating groups . . . . . . . . . . . 709--717
             Sihem Mesnager and   
                 Liqin Qian and   
                     Xiwang Cao   Further projective binary linear codes
                                  derived from two-to-one functions and
                                  their duals  . . . . . . . . . . . . . . 719--746
              Mrinmoy Datta and   
                 Trygve Johnsen   Codes from symmetric polynomials . . . . 747--761
                   Dev Akre and   
                  Nuh Aydin and   
         Matthew Harrington and   
                  Saurav Pandey   A generalization of cyclic code
                                  equivalence algorithm to constacyclic
                                  codes  . . . . . . . . . . . . . . . . . 763--777
          Bill Correll, Jr. and   
         Christopher N. Swanson   Difference-based structural properties
                                  of Costas arrays . . . . . . . . . . . . 779--794
               Makoto Araya and   
             Masaaki Harada and   
                  Koji Momihara   Hadamard matrices related to a certain
                                  series of ternary self-dual codes  . . . 795--805
              Xiangrui Meng and   
                   Jian Gao and   
                Fang-Wei Fu and   
                     Fanghui Ma   Weight distributions of Q2DC codes over
                                  finite fields  . . . . . . . . . . . . . 807--830
              M. Montanucci and   
                   G. Tizziotti   Generalized Weierstrass semigroups at
                                  several points on certain maximal curves
                                  which cannot be covered by the Hermitian
                                  curve  . . . . . . . . . . . . . . . . . 831--851
               Hyoseung Kim and   
            Olivier Sanders and   
             Michel Abdalla and   
                 Jong Hwan Park   Practical dynamic group signatures
                                  without knowledge extractors . . . . . . 853--893
           Maarten De Boeck and   
         Geertrui Van de Voorde   Embedded antipodal planes and the
                                  minimum weight of the dual code of
                                  points and lines in projective planes of
                                  order $ p^2 $  . . . . . . . . . . . . . 895--920
                   Yan Tong and   
             Xiangyong Zeng and   
               Shasha Zhang and   
                  Shiwei Xu and   
                   Zhengwei Ren   The estimates of trigonometric sums and
                                  new bounds on a mean value, a sequence
                                  and a cryptographic function . . . . . . 921--949
                Jingzhou Na and   
            Jonathan Jedwab and   
                     Shuxing Li   A group-based structure for perfect
                                  sequence covering arrays . . . . . . . . 951--970
                    Fei Guo and   
                Zilong Wang and   
                     Guang Gong   Several secondary methods for
                                  constructing bent-negabent functions . . 971--995
    Clémence Bouvier and   
              Anne Canteaut and   
              Léo Perrin   On the algebraic degree of iterated
                                  power functions  . . . . . . . . . . . . 997--1033
           Zhongliang Zhang and   
                   Zhen Qin and   
                       Chun Guo   Just tweak! Asymptotically optimal
                                  security for the cascaded LRW1 tweakable
                                  blockcipher  . . . . . . . . . . . . . . 1035--1052
                    Kwangsu Lee   Decentralized multi-client functional
                                  encryption for set intersection with
                                  improved efficiency  . . . . . . . . . . 1053--1093
              Michela Ceria and   
         Antonio Cossidente and   
            Giuseppe Marino and   
               Francesco Pavese   On near-MDS codes and caps . . . . . . . 1095--1110
               Daniel Augot and   
              Sarah Bordage and   
                     Jade Nardi   Efficient multivariate low-degree tests
                                  via interactive oracle proofs of
                                  proximity for polynomial codes . . . . . 1111--1151
               Wanbao Zhang and   
                  Shenglin Zhou   Extremely line-primitive automorphism
                                  groups of finite linear spaces . . . . . 1153--1163

Designs, Codes, and Cryptography
Volume 91, Number 4, April, 2023

               Yanbin Zheng and   
                   Yuyin Yu and   
              Zhengbang Zha and   
                  Xingchen Zhou   On inverses of permutation polynomials
                                  of the form $ x \left (x^s - a
                                  \right)^{(q^m - 1) \slash s} $ over $
                                  \mathbb {F}_{q^n} $  . . . . . . . . . . 1165--1181
                  Ilya Vorobyev   Complete traceability multimedia
                                  fingerprinting codes resistant to
                                  averaging attack and adversarial noise
                                  with optimal rate  . . . . . . . . . . . 1183--1191
                     Yun Li and   
                    Hongwei Liu   Cyclic constant dimension subspace codes
                                  via the sum of Sidon spaces  . . . . . . 1193--1207
                Weijun Fang and   
                   Bin Chen and   
                Shu-Tao Xia and   
                Fang-Wei Fu and   
                   Xiangyu Chen   Perfect LRCs and $k$-optimal LRCs  . . . 1209--1232
              Zhengan Huang and   
                 Junzuo Lai and   
              Gongxian Zeng and   
                         Xin Mu   Receiver selective opening security for
                                  identity-based encryption in the
                                  multi-challenge setting  . . . . . . . . 1233--1259
                    Bangteng Xu   Characterizations and constructions of
                                  plateaued functions on finite abelian
                                  groups . . . . . . . . . . . . . . . . . 1261--1292
            Michael J. Gill and   
                 Ian M. Wanless   Pairs of MOLS of order ten satisfying
                                  non-trivial relations  . . . . . . . . . 1293--1313
              Shohei Satake and   
                       Yujie Gu   Cayley sum graphs and their applications
                                  to codebooks . . . . . . . . . . . . . . 1315--1333
                     Songbao Mo   Ideal hierarchical secret sharing and
                                  lattice path matroids  . . . . . . . . . 1335--1349
                 Rocco Mora and   
            Jean-Pierre Tillich   On the dimension and structure of the
                                  square of the dual of a Goppa code . . . 1351--1372
                   Dan Zeng and   
             Xiangyong Zeng and   
                   Lisha Li and   
                       Yunge Xu   The cycle structure of a class of
                                  permutation polynomials  . . . . . . . . 1373--1400
               Shi-Feng Sun and   
              Ron Steinfeld and   
                    Amin Sakzad   Incremental symmetric puncturable
                                  encryption with support for unbounded
                                  number of punctures  . . . . . . . . . . 1401--1426
    Vincenzo Pallozzi Lavorante   External points to a conic from a Baer
                                  subplane . . . . . . . . . . . . . . . . 1427--1441
         Christian Elsholtz and   
             Benjamin Klahn and   
              Gabriel F. Lipnik   Large subsets of $ \mathbb {Z}_m^n $
                                  without arithmetic progressions  . . . . 1443--1452
                 Minjia Shi and   
                    Yaya Li and   
                  Wei Cheng and   
            Dean Crnkovi\'c and   
               Denis Krotov and   
            Patrick Solé   Self-dual bent sequences for complex
                                  Hadamard matrices  . . . . . . . . . . . 1453--1474
             Giusy Monzillo and   
               Tim Penttila and   
           Alessandro Siciliano   Eggs in finite projective spaces and
                                  unitals in translation planes  . . . . . 1475--1485
                 Enrico Iurlano   Growth of the perfect sequence covering
                                  array number . . . . . . . . . . . . . . 1487--1494
                      Li Xu and   
             Zhengchun Zhou and   
                  Jun Zhang and   
                 Sihem Mesnager   Optimal quaternary $ (r,
                                  \delta)$-locally recoverable codes:
                                  their structures and complete
                                  classification . . . . . . . . . . . . . 1495--1526
               Zhonghua Sun and   
               Sujuan Huang and   
                     Shixin Zhu   Optimal quaternary Hermitian LCD codes
                                  and their related codes  . . . . . . . . 1527--1558
                  Sihong Su and   
                     Xiaoqi Guo   A further study on the construction
                                  methods of bent functions and self-dual
                                  bent functions based on Rothaus's bent
                                  function . . . . . . . . . . . . . . . . 1559--1580

Designs, Codes, and Cryptography
Volume 91, Number 5, May, 2023

              S. G. Barwick and   
            Alice M. W. Hui and   
                 Wen-Ai Jackson   A geometric description of the Figueroa
                                  plane  . . . . . . . . . . . . . . . . . 1581--1593
        Henk D. L. Hollmann and   
            Karan Khathuria and   
              Ago-Erik Riet and   
                 Vitaly Skachek   On some batch code properties of the
                                  simplex code . . . . . . . . . . . . . . 1595--1605
           Alexander Shaporenko   Derivatives of bent functions in
                                  connection with the bent sum
                                  decomposition problem  . . . . . . . . . 1607--1625
 Jérôme Ducoat and   
Frédérique Oggier   Rank weight hierarchy of some classes of
                                  polynomial codes . . . . . . . . . . . . 1627--1644
      Nuttapong Attrapadung and   
           Goichiro Hanaoka and   
               Ryo Hiromasa and   
           Takahiro Matsuda and   
            Jacob C. N. Schuldt   Maliciously circuit-private multi-key
                                  FHE and MPC based on LWE . . . . . . . . 1645--1684
                    Simeon Ball   Grassl--Rötteler cyclic and consta-cyclic
                                  MDS codes are generalised Reed--Solomon
                                  codes  . . . . . . . . . . . . . . . . . 1685--1694
                    Zhao Hu and   
                    Nian Li and   
                  Linjie Xu and   
             Xiangyong Zeng and   
                    Xiaohu Tang   The differential spectrum and boomerang
                                  spectrum of a class of locally-APN
                                  functions  . . . . . . . . . . . . . . . 1695--1711
                Han-Bing Yu and   
            Qun-Xiong Zheng and   
                Yi-Jian Liu and   
                Jing-Guo Bi and   
                Yu-Fei Duan and   
               Jing-Wen Xue and   
                     You Wu and   
                    Yue Cao and   
                 Rong Cheng and   
                   Lin Wang and   
                   Bai-Shun Sun   An improved method for predicting
                                  truncated multiple recursive generators
                                  with unknown parameters  . . . . . . . . 1713--1736
     Hopein Christofen Tang and   
               Djoko Suprijanto   A general family of Plotkin-optimal
                                  two-weight codes over $ \mathbb {Z}_4 $  1737--1750
               Reo Eriguchi and   
            Noboru Kunihiro and   
                     Koji Nuida   Multiplicative and verifiably
                                  multiplicative secret sharing for
                                  multipartite adversary structures  . . . 1751--1778
                 Jiabo Wang and   
                      Cong Ling   Polar sampler: A novel Bernoulli sampler
                                  using polar codes with application to
                                  integer Gaussian sampling  . . . . . . . 1779--1811
               Makoto Araya and   
                 Masaaki Harada   Some restrictions on the weight
                                  enumerators of near-extremal ternary
                                  self-dual codes and quaternary Hermitian
                                  self-dual codes  . . . . . . . . . . . . 1813--1843
              Pratish Datta and   
                Ratna Dutta and   
            Sourav Mukhopadhyay   Short attribute-based signatures for
                                  arbitrary Turing machines from standard
                                  assumptions  . . . . . . . . . . . . . . 1845--1872
                     Fengwei Li   Cyclic codes of length $ 5 p $ with MDS
                                  symbol-pair  . . . . . . . . . . . . . . 1873--1888
             Zhongxiao Wang and   
               Xiaoxin Zhao and   
             Qunxiong Zheng and   
                Xiutao Feng and   
                      Zehao Sun   The decomposition of an NFSR into the
                                  cascade connection of two smaller NFSRs
                                  revisited  . . . . . . . . . . . . . . . 1889--1910
                 N. Durante and   
              G. Longobardi and   
                        V. Pepe   $ (d, \sigma) $-Veronese variety and
                                  some applications  . . . . . . . . . . . 1911--1921
                    Hui Han and   
                 Jianjun Mu and   
              Xiaopeng Jiao and   
                Yu-Cheng He and   
                  Zhanzhan Zhao   Constructions of multi-permutation codes
                                  correcting a single burst of deletions   1923--1934
             Michel Lavrauw and   
                   John Sheekey   Symplectic 4-dimensional semifields of
                                  order $ 8^4 $ and $ 9^4 $  . . . . . . . 1935--1949
    Máté Gyarmati   Secret sharing on regular bipartite
                                  access structures  . . . . . . . . . . . 1951--1971
               Monika Yadav and   
                Anuradha Sharma   A recursive method for the construction
                                  and enumeration of self-orthogonal and
                                  self-dual codes over the quasi-Galois
                                  ring $ \mathbb {F}_{2^r}[u] \slash
                                  \langle u^e \rangle $  . . . . . . . . . 1973--2003
                Elisa Gorla and   
             Cristina Landolina   Quasi optimal anticodes: structure and
                                  invariants . . . . . . . . . . . . . . . 2005--2020
                   Lin Jiao and   
                Yonglin Hao and   
                   Yongqiang Li   Guess-and-determine attacks on SNOW--VI
                                  stream cipher  . . . . . . . . . . . . . 2021--2055
               Wenxiao Qiao and   
                 Hailun Yan and   
                  Siwei Sun and   
                     Lei Hu and   
                      Jiwu Jing   New cryptanalysis of LowMC with
                                  algebraic techniques . . . . . . . . . . 2057--2075
       Mar\'ìa Chara and   
                Sam Kottler and   
              Beth Malmskog and   
            Bianca Thompson and   
                  Mckenzie West   Minimum distance and parameter ranges of
                                  locally recoverable codes with
                                  availability from fiber products of
                                  curves . . . . . . . . . . . . . . . . . 2077--2105
               Daniel M. Gordon   Signed difference sets . . . . . . . . . 2107--2115

Designs, Codes, and Cryptography
Volume 91, Number 6, June, 2023

                      Rupert Li   Unique optima of the Delsarte linear
                                  program  . . . . . . . . . . . . . . . . 2117--2140
              Ward Beullens and   
              Samuel Dobson and   
          Shuichi Katsumata and   
                  Yi-Fu Lai and   
               Federico Pintore   Group signatures and more from isogenies
                                  and lattices: generic, simple, and
                                  efficient  . . . . . . . . . . . . . . . 2141--2200
                   Boris Ryabko   Unconditionally secure short key ciphers
                                  based on data compression and
                                  randomization  . . . . . . . . . . . . . 2201--2212
                   Gerardo Vega   The $b$-symbol weight distributions of
                                  all semiprimitive irreducible cyclic
                                  codes  . . . . . . . . . . . . . . . . . 2213--2221
Himadri Shekhar Chakraborty and   
           Tsuyoshi Miezaki and   
                    Manabu Oura   Harmonic Tutte polynomials of matroids   2223--2236
                 Nam-Su Jho and   
                   Jooyoung Lee   Partition and mix: generalizing the
                                  swap-or-not shuffle  . . . . . . . . . . 2237--2254
                    Zihan Zhang   A new metric on symmetric groups and
                                  applications to block permutation codes  2255--2271
                  Xiaoni Du and   
                Wengang Jin and   
                 Sihem Mesnager   Several classes of new weakly regular
                                  bent functions outside $ \mathcal {R}
                                  \mathcal {F} $, their duals and some
                                  related (minimal) codes with few weights 2273--2307
               James Hammer and   
                     John Lorch   Diagonal cellular factor pair Latin
                                  squares  . . . . . . . . . . . . . . . . 2309--2322
        Abílio Lemos and   
       Victor G. L. Neumann and   
             Sávio Ribas   On arithmetic progressions in finite
                                  fields . . . . . . . . . . . . . . . . . 2323--2346
                   Tao Feng and   
                    Jianbing Lu   On finite generalized quadrangles with $
                                  {\rm PSL}(2, q) $ as an automorphism
                                  group  . . . . . . . . . . . . . . . . . 2347--2364

Designs, Codes, and Cryptography
Volume 91, Number 7, July, 2023

               Enes Pasalic and   
               Amar Bapi\'c and   
             Fengrong Zhang and   
                 Yongzhuang Wei   Explicit infinite families of bent
                                  functions outside the completed
                                  Maiorana--McFarland class  . . . . . . . 2365--2393
             Xiaoqiang Wang and   
               Zhonghua Sun and   
                  Cunsheng Ding   Two families of negacyclic BCH codes . . 2395--2420
                  Jian Ding and   
                Changlu Lin and   
                 Fuchun Lin and   
                  Huaxiong Wang   Full threshold change range of threshold
                                  changeable secret sharing  . . . . . . . 2421--2447
              Mima Stanojkovski   Submodule codes as spherical codes in
                                  buildings  . . . . . . . . . . . . . . . 2449--2472
            Igor E. Shparlinski   Fixed points of the subset sum
                                  pseudorandom number generators . . . . . 2473--2479
             Moises Delgado and   
             Heeralal Janwa and   
               Carlos Agrinsoni   Some new techniques and progress towards
                                  the resolution of the conjecture of
                                  exceptional APN functions and absolutely
                                  irreducibility of a class of polynomials 2481--2495
                 Tran van Trung   Point-missing $s$-resolvable
                                  $t$-designs: infinite series of
                                  4-designs with constant index  . . . . . 2497--2508
              Eiichi Bannai and   
           Tsuyoshi Miezaki and   
              Hiroyuki Nakasora   A note on the Assmus--Mattson theorem
                                  for some binary codes II . . . . . . . . 2509--2522
         Hirokazu Kobayashi and   
             Yohei Watanabe and   
         Kazuhiko Minematsu and   
                  Junji Shikata   Tight lower bounds and optimal
                                  constructions of anonymous broadcast
                                  encryption and authentication  . . . . . 2523--2562
                  Shitao Li and   
                 Minjia Shi and   
                      Juan Wang   An improved method for constructing
                                  formally self-dual codes with small
                                  hulls  . . . . . . . . . . . . . . . . . 2563--2583
                   Marco Pavone   Subset sums and block designs in a
                                  finite vector space  . . . . . . . . . . 2585--2603
             Guangzhou Chen and   
                   Xiaodong Niu   Constructions for new orthogonal arrays
                                  based on large sets of orthogonal arrays 2605--2625

Designs, Codes, and Cryptography
Volume 91, Number 8, August, 2023

                     Wei Lu and   
                     Xia Wu and   
                 Yufei Wang and   
                     Xiwang Cao   A general construction of regular
                                  complete permutation polynomials . . . . 2627--2647
               Isabel Byrne and   
             Natalie Dodson and   
                 Ryan Lynch and   
Eric Pabón\textendashCancel and   
Fernando Piñero-González   Improving the minimum distance bound of
                                  Trace Goppa codes  . . . . . . . . . . . 2649--2663
                       Hao Chen   New MDS entanglement-assisted quantum
                                  codes from MDS Hermitian self-orthogonal
                                  codes  . . . . . . . . . . . . . . . . . 2665--2676
                    Yan Liu and   
                    Jianguo Lei   More results on large sets of Kirkman
                                  triple systems . . . . . . . . . . . . . 2677--2686
              Zhongya Zhang and   
                 Wenling Wu and   
                    Han Sui and   
                     Bolin Wang   Post-quantum security on the Lai--Massey
                                  scheme . . . . . . . . . . . . . . . . . 2687--2704
              Jaap-Henk Hoepman   Two faces of blindness . . . . . . . . . 2705--2721
              Bagher Bagherpour   A bivariate polynomial-based
                                  cryptographic hard problem and its
                                  applications . . . . . . . . . . . . . . 2723--2735
                        Yan Zhu   Optimal and extremal graphical designs
                                  on regular graphs associated with
                                  classical parameters . . . . . . . . . . 2737--2754
               Xiantong Tan and   
                      Haode Yan   Differential spectrum of a class of APN
                                  power functions  . . . . . . . . . . . . 2755--2768
                Erzhong Xue and   
                    Zilong Wang   The $q$-ary Golay arrays of size $ 2
                                  \times 2 \times \cdots \times 2 $ are
                                  standard . . . . . . . . . . . . . . . . 2769--2778
                Jiseung Kim and   
                   Changmin Lee   A polynomial time algorithm for breaking
                                  NTRU encryption with multiple keys . . . 2779--2789
                   Ting Lan and   
                 Weijun Liu and   
                    Fu-Gang Yin   Block-transitive 3-$ (v, k, 1) $ designs
                                  associated with alternating groups . . . 2791--2807

Designs, Codes, and Cryptography
Volume 91, Number 9, September, 2023

                  Rongquan Feng   Obituary of Professor Zhexian Wan  . . . 2809--2810
                  Junyang Zhang   Characterizing subgroup perfect codes by
                                  2-subgroups  . . . . . . . . . . . . . . 2811--2819
               Zhonghua Sun and   
             Xiaoqiang Wang and   
                  Cunsheng Ding   Several families of irreducible
                                  constacyclic and cyclic codes  . . . . . 2821--2843
                  Kai Zhang and   
                 Xuejia Lai and   
                   Lei Wang and   
                   Jie Guan and   
                     Bin Hu and   
               Senpeng Wang and   
                    Tairong Shi   Meet-in-the-middle attack with
                                  splice-and-cut technique and a general
                                  automatic framework  . . . . . . . . . . 2845--2878
               S. P. Glasby and   
         Ferdinand Ihringer and   
                   Sam Mattheus   The proportion of non-degenerate
                                  complementary subspaces in classical
                                  spaces . . . . . . . . . . . . . . . . . 2879--2891
                    Yu Zhan and   
               Ziqian Zhang and   
                   Qian Liu and   
                   Baocang Wang   Hiding the input-size in multi-party
                                  private set intersection . . . . . . . . 2893--2915
              Pratish Datta and   
                      Tapas Pal   (Compact) Adaptively secure FE for
                                  attribute-weighted sums from $k$--Lin    2917--3034
      Aurélien Dupin and   
      Pierrick Méaux and   
           Mélissa Rossi   On the algebraic immunity-resiliency
                                  trade-off, implications for Goldreich's
                                  pseudorandom generator . . . . . . . . . 3035--3079
              Hyung Tae Lee and   
                   Jae Hong Seo   On the security of functional encryption
                                  in the generic group model . . . . . . . 3081--3114

Designs, Codes, and Cryptography
Volume 91, Number 10, October, 2023

               Kaiqiang Liu and   
             Zhengchun Zhou and   
       Avik Ranjan Adhikary and   
                       Rong Luo   New sets of non-orthogonal spreading
                                  sequences with low correlation and low
                                  PAPR using extended Boolean functions    3115--3139
                     Yu Dai and   
                Kaizhan Lin and   
              Chang-An Zhao and   
                    Zijian Zhou   Fast subgroup membership testings for $
                                  \mathbb {G}_1 $, $ \mathbb {G}_2 $ and $
                                  \mathbb {G}_T $ on pairing-friendly
                                  curves . . . . . . . . . . . . . . . . . 3141--3166
            Daniele Bartoli and   
           Giuliana Fatabbi and   
            Francesco Ghiandoni   On the exceptionality of rational APN
                                  functions  . . . . . . . . . . . . . . . 3167--3186
                  Kai Zhang and   
                 Xuejia Lai and   
                   Jie Guan and   
                         Bin Hu   Weak rotational property and its
                                  application  . . . . . . . . . . . . . . 3187--3214
            Dean Crnkovi\'c and   
                    Andrea Svob   LCD subspace codes . . . . . . . . . . . 3215--3226
                Melissa Lee and   
                 Gabriel Verret   Extremely primitive groups and linear
                                  spaces . . . . . . . . . . . . . . . . . 3227--3240
            Pin-Chieh Tseng and   
               Ching-Yi Lai and   
                   Wei-Hsuan Yu   Semidefinite programming bounds for
                                  binary codes from a split Terwilliger
                                  algebra  . . . . . . . . . . . . . . . . 3241--3262
                     Wen Ma and   
                    Jinquan Luo   Block codes in pomset metric over $
                                  \mathbb {Z}_m $  . . . . . . . . . . . . 3263--3284
                     Lucas Reis   The average density of $K$-normal
                                  elements over finite fields  . . . . . . 3285--3292
                Denis S. Krotov   Projective tilings and full-rank perfect
                                  codes  . . . . . . . . . . . . . . . . . 3293--3303
                Livia Betti and   
                  Jim Brown and   
            Fernando Gaitan and   
               Aiyana Spear and   
                Japheth Varlack   Lattices in real quadratic fields and
                                  associated theta series arising from
                                  codes over $ \textbf {F}_4 $ and $
                                  \textbf {F}_2 \times \textbf {F}_2 $ . . 3305--3319
                     Jie Xu and   
              Zhiyong Zheng and   
                   Kun Tian and   
                       Man Chen   Two properties of prefix codes and
                                  uniquely decodable codes . . . . . . . . 3321--3330

Designs, Codes, and Cryptography
Volume 91, Number 11, November, 2023

           Steven Galbraith and   
            Rosario Gennaro and   
             Carla R\`afols and   
                  Ron Steinfeld   Guest editorial: Special issue on
                                  Mathematics of Zero-Knowledge  . . . . . 3331--3332
            Diego F. Aranha and   
          Youssef El Housni and   
               Aurore Guillevic   A survey of elliptic curves for proof
                                  systems  . . . . . . . . . . . . . . . . 3333--3378
                 Scott Ames and   
               Carmit Hazay and   
                Yuval Ishai and   
Muthuramakrishnan Venkitasubramaniam   Ligero: lightweight sublinear arguments
                                  without a trusted setup  . . . . . . . . 3379--3424
              Ward Beullens and   
                Luca De Feo and   
        Steven D. Galbraith and   
               Christophe Petit   Proving knowledge of isogenies: a survey 3425--3456
           Daniel Benarroch and   
          Matteo Campanelli and   
                Dario Fiore and   
                Kobi Gurkan and   
             Dimitris Kolonelos   Zero-knowledge proofs for set
                                  membership: efficient, succinct, modular 3457--3525
               Carsten Baum and   
             Samuel Dittmer and   
               Peter Scholl and   
                      Xiao Wang   Sok: vector OLE-based zero-knowledge
                                  protocols  . . . . . . . . . . . . . . . 3527--3561
André Guerino Castoldi and   
Anderson Novaes Martinhão and   
   Emerson L. Monte Carmelo and   
Otávio J. N. T. N. dos Santos   Covering schemes of strength $t$ . . . . 3563--3580
               Congming Wei and   
               Bingyou Dong and   
               Jialiang Hua and   
              Xiaoyang Dong and   
                   Guoyan Zhang   Improved attacks against reduced-round
                                  Whirlwind  . . . . . . . . . . . . . . . 3581--3602
               Senpeng Wang and   
               Dengguo Feng and   
                     Bin Hu and   
                   Jie Guan and   
                  Kai Zhang and   
                    Tairong Shi   New method for combining Matsui's
                                  bounding conditions with sequential
                                  encoding method  . . . . . . . . . . . . 3603--3642
             Shamil Asgarli and   
              Dragos Ghioca and   
                    Chi Hoi Yip   Plane curves giving rise to blocking
                                  sets over finite fields  . . . . . . . . 3643--3669
              Magali Bardet and   
              Pierre Briaud and   
                Maxime Bros and   
           Philippe Gaborit and   
            Jean-Pierre Tillich   Revisiting algebraic attacks on MinRank
                                  and on the rank decoding problem . . . . 3671--3707
                Shizhu Tian and   
                 Yitong Liu and   
                 Xiangyong Zeng   A further study on bridge structures and
                                  constructing bijective S-boxes for
                                  low-latency masking  . . . . . . . . . . 3709--3739
                    Jingjun Bao   Constructions of column-orthogonal
                                  strong orthogonal arrays via matchings
                                  of bipartite graphs  . . . . . . . . . . 3741--3755
                Yanwei Zhou and   
                    Bo Yang and   
                 Zirui Qiao and   
                    Zhe Xia and   
               Mingwu Zhang and   
                          Yi Mu   Leakage-resilient identity-based
                                  cryptography from minimal assumptions    3757--3801
               Jinzheng Cao and   
                  Jian Weng and   
                 Yanbin Pan and   
                 Qingfeng Cheng   Generalized attack on ECDSA: known bits
                                  in arbitrary positions . . . . . . . . . 3803--3823

Designs, Codes, and Cryptography
Volume 91, Number 12, December, 2023

                  Xuan Pang and   
                   Xiaoqin Zhan   Block-transitive 3-$ (v, 4, \lambda) $
                                  designs with sporadic or alternating
                                  socle  . . . . . . . . . . . . . . . . . 3825--3835
        Subhabrata Samajder and   
                  Palash Sarkar   Another look at key randomisation
                                  hypotheses . . . . . . . . . . . . . . . 3837--3855
       Somayyeh Golalizadeh and   
              Nasrin Soltankhah   On the fourth weight of generalized
                                  Reed--Muller codes . . . . . . . . . . . 3857--3879
               Xiaofeng Xie and   
                      Tian Tian   Structural evaluation of AES-like
                                  ciphers against mixture differential
                                  cryptanalysis  . . . . . . . . . . . . . 3881--3899
              Hexiang Huang and   
                     Qing Xiang   Construction of storage codes of rate
                                  approaching one on triangle-free graphs  3901--3913
         Kazumasa Shinagawa and   
               Reo Eriguchi and   
              Shohei Satake and   
                     Koji Nuida   Private simultaneous messages based on
                                  quadratic residues . . . . . . . . . . . 3915--3932
                Binbin Pang and   
                 Shixin Zhu and   
                  Tian Yang and   
                        Jun Gao   BCH codes with larger dimensional hull   3933--3951
                Ziling Heng and   
                 Dexiang Li and   
                     Fenjin Liu   Ternary self-orthogonal codes from
                                  weakly regular bent functions and their
                                  application in LCD codes . . . . . . . . 3953--3976
                 Shuangqing Liu   Optimal Ferrers diagram rank-metric
                                  codes from MRD codes . . . . . . . . . . 3977--3993
José Gómez-Torrecillas and   
              F. J. Lobillo and   
                Gabriel Navarro   Skew differential Goppa codes and their
                                  application to Mceliece cryptosystem . . 3995--4017
              Haider Al Kim and   
             Sven Puchinger and   
             Ludo Tolhuizen and   
            Antonia Wachter-Zeh   Coding and bounds for partially
                                  defective memory cells . . . . . . . . . 4019--4058
           Haetham Al Aswad and   
          Cécile Pierrot   Individual discrete logarithm with
                                  sublattice reduction . . . . . . . . . . 4059--4091
             Yeow Meng Chee and   
         Alan Chi Hung Ling and   
                 Van Khu Vu and   
                      Hui Zhang   Scheduling to reduce close contacts:
                                  resolvable grid graph decomposition and
                                  packing  . . . . . . . . . . . . . . . . 4093--4106
                   Qiang Li and   
            Qun-xiong Zheng and   
                    Wen-feng Qi   Practical attacks on small private
                                  exponent RSA: new records and new
                                  insights . . . . . . . . . . . . . . . . 4107--4142
                Hongwei Liu and   
                   Shengwei Liu   A class of constacyclic codes are
                                  generalized Reed--Solomon codes  . . . . 4143--4151


Designs, Codes, and Cryptography
Volume 92, Number 1, January, 2024

                    Hai Liu and   
                 Chengju Li and   
                   Haifeng Qian   Parameters of several families of binary
                                  duadic codes and their related codes . . 1--12
       Arghya Bhattacharjee and   
              Ritam Bhaumik and   
               Avijit Dutta and   
               Mridul Nandi and   
              Anik Raychaudhuri   BBB security for 5-round
                                  even-Mansour-based key-alternating
                                  Feistel ciphers  . . . . . . . . . . . . 13--49
                 Jiaxin Pan and   
                  Chen Qian and   
                Benedikt Wagner   Generic constructions of master-key KDM
                                  secure attribute-based encryption  . . . 51--92
                  Kris Coolsaet   Nonsingular hypercubes and
                                  nonintersecting hyperboloids . . . . . . 93--112
             Aleksandr Kutsenko   Decomposing self-dual bent functions . . 113--144
                Vidya Sagar and   
                 Ritumoni Sarma   Minimal and optimal binary codes
                                  obtained using $ C_D $-construction over
                                  the non-unital ring I  . . . . . . . . . 145--157
              Orr Dunkelman and   
              Nathan Keller and   
                 Eyal Ronen and   
                     Adi Shamir   Quantum time/memory/data tradeoff
                                  attacks  . . . . . . . . . . . . . . . . 159--177
              Michela Ceria and   
                       Teo Mora   Towards a Gröbner-free approach to coding 179--204
     Alexander L. Gavrilyuk and   
                       Sho Suda   Uniqueness of an association scheme
                                  related to the Witt design on 11 points  205--209
                    Boyi He and   
                   Qunying Liao   The properties and the error-correcting
                                  pair for lengthened GRS codes  . . . . . 211--225

Designs, Codes, and Cryptography
Volume 92, Number 2, February, 2024

                S. Hodzi\'c and   
                     A. Roy and   
                    E. Andreeva   Quantum cryptanalysis of Farfalle and
                                  (generalised) key-alternating Feistel
                                  networks . . . . . . . . . . . . . . . . 227--257
                   Ziwei Lu and   
                  Shenglin Zhou   Flag-transitive symmetric 2-designs of
                                  prime order  . . . . . . . . . . . . . . 259--266
                  Danyao Wu and   
                   Pingzhi Yuan   Permutation polynomials and their
                                  compositional inverses over finite
                                  fields by a local method . . . . . . . . 267--276
             Kota Takahashi and   
          Keitaro Hashimoto and   
                   Wakaha Ogata   Chosen-ciphertext secure code-based
                                  threshold public key encryptions with
                                  short ciphertext . . . . . . . . . . . . 277--301
               Monika Yadav and   
                Anuradha Sharma   Construction and enumeration of
                                  self-orthogonal and self-dual codes over
                                  Galois rings of even characteristic  . . 303--339
                     Wen Ma and   
                    Jinquan Luo   Codes with respect to weighted poset
                                  block metric . . . . . . . . . . . . . . 341--363
                 Xiaowei Su and   
                Zihong Tian and   
                     Guohui Hao   Determination of the sizes of optimal
                                  geometric orthogonal codes with
                                  parameters $ (n \times m, k, \lambda, k
                                  - 1) $ . . . . . . . . . . . . . . . . . 365--395
                Cuiling Fan and   
                    An Wang and   
                          Li Xu   New classes of NMDS codes with dimension
                                  3  . . . . . . . . . . . . . . . . . . . 397--418
           Diane M. Donovan and   
           Mike J. Grannell and   
              Emine Sule Yazici   On maximal partial Latin hypercubes  . . 419--433
               Hannes Bartz and   
           Thomas Jerkovits and   
               Johan Rosenkilde   Fast Kötter--Nielsen--Hòholdt
                                  interpolation over skew polynomial rings
                                  and its application in coding theory . . 435--465
           Nikolay Kolomeec and   
                    Denis Bykov   On the image of an affine subspace under
                                  the inverse function within a finite
                                  field  . . . . . . . . . . . . . . . . . 467--476
            Mahir Bilen Can and   
                 Roy Joshua and   
                 G. V. Ravindra   Defects of codes from higher dimensional
                                  algebraic varieties  . . . . . . . . . . 477--494
                   John Bamberg   On the 430-cap of $ {\rm PG}(6, 4) $
                                  having two intersection sizes with
                                  respect to hyperplanes . . . . . . . . . 495--503

Designs, Codes, and Cryptography
Volume 92, Number 3, March, 2024

                      Anonymous   Editorial Note: Coding and Cryptography
                                  2022 . . . . . . . . . . . . . . . . . . 505--505
           Marco Timpanella and   
                  Giovanni Zini   On a family of linear MRD codes with
                                  parameters $ [8 \times 8, 16, 7]_q $ . . 507--530
               Amar Bapi\'c and   
               Enes Pasalic and   
           Alexandr Polujan and   
                 Alexander Pott   Vectorial Boolean functions with the
                                  maximum number of bent components beyond
                                  the Nyberg's bound . . . . . . . . . . . 531--552
     Felicitas Hörmann and   
                   Hannes Bartz   Interpolation-based decoding of folded
                                  variants of linearized and skew
                                  Reed--Solomon codes  . . . . . . . . . . 553--586
            Agathe Cheriere and   
             Lina Mortajine and   
             Tania Richmond and   
                Nadia El Mrabet   Exploiting ROLLO's constant-time
                                  implementations with a single-trace
                                  analysis . . . . . . . . . . . . . . . . 587--608
               Anina Gruica and   
        Anna-Lena Horlemann and   
          Alberto Ravagnani and   
               Nadja Willenborg   Densities of codes of various linearity
                                  degrees in translation-invariant metric
                                  spaces . . . . . . . . . . . . . . . . . 609--637
              V. N. Potapov and   
            A. A. Taranenko and   
              Yu. V. Tarannikov   An asymptotic lower bound on the number
                                  of bent functions  . . . . . . . . . . . 639--651
            Selçuk Kavut   Modified Patterson--Wiedemann
                                  construction . . . . . . . . . . . . . . 653--666
            Cem Güneri and   
        Ferruh Özbudak and   
                  Selcen Sayici   On subfield subcodes obtained from
                                  restricted evaluation codes  . . . . . . 667--680
         Faruk Göloglu and   
              Lukas Kölsch   Counting the number of non-isotopic
                                  Taniguchi semifields . . . . . . . . . . 681--694
         Anna-Maurin Graner and   
            Gohar M. Kyureghyan   Constructing irreducible polynomials
                                  recursively with a reverse composition
                                  method . . . . . . . . . . . . . . . . . 695--708
                Rafael Arce and   
    Carlos Hernández and   
          José Ortiz and   
             Ivelisse Rubio and   
                  Jaziel Torres   Analysis and computation of
                                  multidimensional linear complexity of
                                  periodic arrays  . . . . . . . . . . . . 709--722
              Nicolas David and   
María Naya-Plasencia and   
    André Schrottenloher   Quantum impossible differential attacks:
                                  applications to AES and SKINNY . . . . . 723--751
             Rakhi Pratihar and   
Tovohery Hajatiana Randrianarisoa   Antipodal two-weight rank metric codes   753--769
           Akihiro Munemasa and   
           Rowena Alma L. Betty   Classification of extremal type II $
                                  \mathbb {Z}_4 $-codes of length 24 . . . 771--785
            Reza Dastbasteh and   
                   Petr Lisonek   New quantum codes from self-dual codes
                                  over $ \mathbb {F}_4 $ . . . . . . . . . 787--801
     André Chailloux and   
                 Simona Etinski   On the (in)security of optimized
                                  Stern-like signature schemes . . . . . . 803--832
            Krijn Reijnders and   
         Simona Samardjiska and   
                Monika Trimoska   Hardness estimates of the code
                                  equivalence problem in the rank metric   833--862
                Suman Dutta and   
                Subhamoy Maitra   Introducing nega-Forrelation: quantum
                                  algorithms in analyzing nega-Hadamard
                                  and nega-crosscorrelation spectra  . . . 863--883

Designs, Codes, and Cryptography
Volume 92, Number 4, April, 2024

               Qianqian Yan and   
                   Junling Zhou   Mutually disjoint Steiner systems from
                                  BCH codes  . . . . . . . . . . . . . . . 885--907
               Léo Ducas   Provable lattice reduction of $ \mathbb
                                  {Z}^n $ with blocksize $ n / 2 $ . . . . 909--916
              Shanxiang Lyu and   
                   Ling Liu and   
                  Cong Ling and   
                 Junzuo Lai and   
                       Hao Chen   Lattice codes for lattice-based PKE  . . 917--939
             Shannon Veitch and   
             Douglas R. Stinson   Unconditionally secure non-malleable
                                  secret sharing and circular external
                                  difference families  . . . . . . . . . . 941--956
                 Jiqiang Lu and   
                  Wenchang Zhou   Improved meet-in-the-middle attack on 10
                                  rounds of the AES-256 block cipher . . . 957--973
               Moritz Wiese and   
                   Holger Boche   $ \varepsilon $-Almost collision-flat
                                  universal hash functions and mosaics of
                                  designs  . . . . . . . . . . . . . . . . 975--998
            Dipak K. Bhunia and   
Cristina Fernández-Córdoba and   
                Carlos Vela and   
             Merc\`e Villanueva   On the equivalence of $ \mathbb
                                  {Z}_{p^s} $-linear generalized Hadamard
                                  codes  . . . . . . . . . . . . . . . . . 999--1022
               Sergey Bereg and   
     Mohammadreza Haghpanah and   
               Brian Malouf and   
              I. Hal Sudborough   Improved bounds for permutation arrays
                                  under Chebyshev distance . . . . . . . . 1023--1039
           Tsuyoshi Miezaki and   
               Akihiro Munemasa   Jacobi polynomials and harmonic weight
                                  enumerators of the first-order
                                  Reed--Muller codes and the extended
                                  Hamming codes  . . . . . . . . . . . . . 1041--1049
               Deng-Ming Xu and   
                  Gang Wang and   
             Sihem Mesnager and   
                    You Gao and   
                    Fang-Wei Fu   Jacobi sums over Galois rings of
                                  arbitrary characters and their
                                  applications in constructing
                                  asymptotically optimal codebooks . . . . 1051--1073
             Nicolas Aragon and   
             Victor Dyseryn and   
           Philippe Gaborit and   
            Pierre Loidreau and   
              Julian Renner and   
            Antonia Wachter-Zeh   LowMS: a new rank metric code-based KEM
                                  without ideal structure  . . . . . . . . 1075--1093
                Guangkui Xu and   
                 Gaojun Luo and   
                 Xiwang Cao and   
                      Heqian Xu   Hulls of linear codes from simplex codes 1095--1112

Designs, Codes, and Cryptography
Volume 92, Number 5, May, 2024

 José Alves Oliveira and   
 F. E. Brochero Martínez   Dynamics of polynomial maps over finite
                                  fields . . . . . . . . . . . . . . . . . 1113--1125
           Elena Kirshanova and   
             Ekaterina Malygina   Construction-D lattice from
                                  Garcia--Stichtenoth tower code . . . . . 1127--1142
     Cícero Carvalho and   
      Hiram H. López and   
           Gretchen L. Matthews   Decreasing norm-trace codes  . . . . . . 1143--1161
              Xiaojing Chen and   
                  Xingbo Lu and   
                 Shixin Zhu and   
                  Wan Jiang and   
                     Xindi Wang   New entanglement-assisted quantum
                                  error-correcting codes from negacyclic
                                  codes  . . . . . . . . . . . . . . . . . 1163--1174
                      Lei Zhang   Observations on the branch number and
                                  differential analysis of SPEEDY  . . . . 1175--1199
                Mesut Sahin and   
                     Oguz Yayla   Codes on subgroups of weighted
                                  projective tori  . . . . . . . . . . . . 1201--1218
      Alonso S. Castellanos and   
         Erik A. R. Mendoza and   
                  Luciane Quoos   Weierstrass semigroups, pure gaps and
                                  codes on function fields . . . . . . . . 1219--1242
                   Sara Ban and   
                 Sanja Rukavina   Construction of self-orthogonal $
                                  \mathbb {Z}_{2^k} $-codes  . . . . . . . 1243--1250
               Wenqin Zhang and   
                   Yuan Luo and   
                      Lele Wang   Optimal binary and ternary locally
                                  repairable codes with minimum distance 6 1251--1265
                 Kenji Yasunaga   Improved bounds for codes correcting
                                  insertions and deletions . . . . . . . . 1267--1278
               Thomas Britz and   
Himadri Shekhar Chakraborty and   
             Reina Ishikawa and   
           Tsuyoshi Miezaki and   
         Hopein Christofen Tang   Harmonic Tutte polynomials of matroids
                                  II . . . . . . . . . . . . . . . . . . . 1279--1297
           Lidija Stanovnik and   
                Miha Moskon and   
                      Miha Mraz   In search of maximum non-overlapping
                                  codes  . . . . . . . . . . . . . . . . . 1299--1326
                Ruikai Chen and   
                 Sihem Mesnager   On a class of permutation rational
                                  functions involving trace maps . . . . . 1327--1339
             Semira Einsele and   
               Kenneth Paterson   Average case error estimates of the
                                  strong Lucas test  . . . . . . . . . . . 1341--1378
     Alexander L. Gavrilyuk and   
           Vladislav V. Kabanov   Strongly regular graphs decomposable
                                  into a divisible design graph and a
                                  Hoffman coclique . . . . . . . . . . . . 1379--1391
                Jan Schoone and   
                    Joan Daemen   The state diagram of $ \chi $  . . . . . 1393--1421
                     Yun Li and   
                Hongwei Liu and   
                 Sihem Mesnager   New constructions of constant dimension
                                  subspace codes with large sizes  . . . . 1423--1437
           Matthew Kreitzer and   
                 Mihai Nica and   
                 Rajesh Pereira   Using alternating de Bruijn sequences to
                                  construct de Bruijn tori . . . . . . . . 1439--1454

Designs, Codes, and Cryptography
Volume 92, Number 6, June, 2024

                  Xiaoni Du and   
René Rodríguez and   
                         Hao Wu   Infinite families of minimal binary
                                  codes via Krawtchouk polynomials . . . . 1455--1475
               Yi-Fan Tseng and   
                Zi-Yuan Liu and   
                     Raylin Tso   Predicate encryption with
                                  selective-opening security for
                                  receivers: formal definition, generic
                                  construction, and concrete
                                  instantiations for several primitives    1477--1500
                   Laura Monroe   Optimal binary signed-digit
                                  representations of integers and the
                                  Stern polynomial . . . . . . . . . . . . 1501--1516
              Zhaoping Meng and   
               Qingling Gao and   
                    Zhanggui Wu   A recursive construction of doubly
                                  resolvable Steiner quadruple systems . . 1517--1531
                  Haode Yan and   
                      Yanan Yin   On the parameters of extended primitive
                                  cyclic codes and the related designs . . 1533--1540
                   Qiqi Lai and   
               Feng-Hao Liu and   
                   Zhedong Wang   Leakage-resilient \textsfIBE/ABE with
                                  optimal leakage rates from lattices  . . 1541--1597
           Adam Michael Roberts   Self-dual codes from a block matrix
                                  construction characterised by group
                                  rings  . . . . . . . . . . . . . . . . . 1599--1617
              Kanchan Singh and   
        Ritesh Kumar Pathak and   
               Sheo Kumar Singh   Linear codes associated to determinantal
                                  varieties in the space of Hermitian
                                  matrices . . . . . . . . . . . . . . . . 1619--1635
                   Chun Guo and   
                 Yiyuan Luo and   
                    Chenyu Xiao   On the sequential indifferentiability of
                                  the Lai--Massey construction . . . . . . 1637--1661
                Xinxin Gong and   
                Yonglin Hao and   
                    Qingju Wang   Combining MILP modeling with algebraic
                                  bias evaluation for linear mask search:
                                  improved fast correlation attacks on
                                  SNOW . . . . . . . . . . . . . . . . . . 1663--1728
                    Yu-Chi Chen   A conceptually simple and generic
                                  construction of plaintext checkable
                                  encryption in the standard model . . . . 1729--1746
           Alexander M. Romanov   Perfect mixed codes from generalized
                                  Reed--Muller codes . . . . . . . . . . . 1747--1759
                  S. Kunzweiler   Efficient computation of $ (2^n,
                                  2^n)$-isogenies  . . . . . . . . . . . . 1761--1802
          Angelot Behajaina and   
            Martino Borello and   
          Javier de la Cruz and   
               Wolfgang Willems   Twisted skew $G$-codes . . . . . . . . . 1803--1821
                Kaizhan Lin and   
               Jianming Lin and   
                Shiping Cai and   
                 Weize Wang and   
                  Chang-An Zhao   Compressed M-SIDH: an instance of
                                  compressed SIDH-like schemes with
                                  isogenies of highly composite degrees    1823--1843

Designs, Codes, and Cryptography
Volume 92, Number 7, July, 2024

                       Hao Chen   Large Hermitian hull GRS codes of any
                                  given length . . . . . . . . . . . . . . 1845--1853
                Hongna Yang and   
                 Yiwei Wang and   
                    Yiwei Zhang   Extremal regular graphs and hypergraphs
                                  related to fractional repetition codes   1855--1878
                 Liqin Qian and   
                 Xiwang Cao and   
                     Xia Wu and   
                         Wei Lu   MDS codes with $l$-Galois hulls of
                                  arbitrary dimensions . . . . . . . . . . 1879--1902
           Delphine Boucher and   
Kayodé Epiphane Nouetowa   Some constructions and existence
                                  conditions for Hermitian self-dual skew
                                  codes  . . . . . . . . . . . . . . . . . 1903--1924
          Tran Viet Xuan Phuong   Anonymous attribute-based broadcast
                                  encryption with hidden multiple access
                                  structures . . . . . . . . . . . . . . . 1925--1945
       Ebru Adiguzel-Goktas and   
                  Enver Ozdemir   Square root computation in finite fields 1947--1959
             Giuseppe D'Alconzo   Monomial isomorphism for tensors and
                                  applications to code equivalence
                                  problems . . . . . . . . . . . . . . . . 1961--1982
                Benjamin Fuller   Impossibility of efficient
                                  information-theoretic fuzzy extraction   1983--2009
               Rongsheng Wu and   
                   Xiande Zhang   Balanced reconstruction codes for single
                                  edits  . . . . . . . . . . . . . . . . . 2011--2029
                 Chunyu Gan and   
                 Chengju Li and   
               Haifeng Qian and   
                    Xueying Shi   On Bose distance of a class of BCH codes
                                  with two types of designed distances . . 2031--2053
                 Yuxin Tong and   
                  Xiang Xie and   
                  Kang Yang and   
                  Rui Zhang and   
                        Rui Xue   Efficient secure multi-party computation
                                  for proof of custody in Ethereum
                                  sharding . . . . . . . . . . . . . . . . 2055--2083
               Zhonghua Sun and   
                 Xinyue Liu and   
                 Shixin Zhu and   
                 Yongsheng Tang   Negacyclic BCH codes of length $ \frac
                                  {q^{2m} - 1}{q + 1} $ and their duals    2085--2101

Designs, Codes, and Cryptography
Volume 92, Number 8, August, 2024

                   Chun Guo and   
                      Ling Song   CCA security for contracting
                                  (quasi-)Feistel constructions with tight
                                  round complexity . . . . . . . . . . . . 2103--2129
              Slim Bettaieb and   
             Lo\"\ic Bidoux and   
             Victor Dyseryn and   
                Andre Esser and   
           Philippe Gaborit and   
             Mukul Kulkarni and   
                  Marco Palumbi   PERK: compact signature scheme based on
                                  a new variant of the permuted kernel
                                  problem  . . . . . . . . . . . . . . . . 2131--2157
               Ka Hin Leung and   
           Bernhard Schmidt and   
                      Tao Zhang   Classification of semiregular relative
                                  difference sets with $ \gcd (\lambda, n)
                                  = 1 $ attaining Turyn's bound  . . . . . 2159--2182
             Giusy Monzillo and   
               Tim Penttila and   
           Alessandro Siciliano   Classifying pseudo-ovals, translation
                                  generalized quadrangles, and elation
                                  Laguerre planes of small order . . . . . 2183--2196
              Seungjun Baek and   
                 Giyoon Kim and   
                   Jongsung Kim   Preimage attacks on reduced-round
                                  Ascon--Xof . . . . . . . . . . . . . . . 2197--2217
                    Cong Yu and   
                 Shixin Zhu and   
                     Fuyin Tian   Construction of quantum codes from
                                  multivariate polynomial rings  . . . . . 2219--2234
             Shuangqing Liu and   
                       Lijun Ji   Combinatorial constructions of optimal
                                  low-power error-correcting cooling codes 2235--2252
                Geyang Wang and   
                        Qi Wang   On the size distribution of the
                                  fixed-length Levenshtein balls with
                                  radius one . . . . . . . . . . . . . . . 2253--2265
                Juanjuan Xu and   
                       Lijun Ji   Special overlarge sets of Kirkman triple
                                  systems  . . . . . . . . . . . . . . . . 2267--2285
            Daniele Bartoli and   
             Nicola Durante and   
     Giovanni Giuseppe Grimaldi   Ovoids of $ Q(6, q) $ of low degree  . . 2287--2306
              Ryosuke Yamaguchi   Jacobi polynomials for the first-order
                                  generalized Reed--Muller codes . . . . . 2307--2321
                  Zhiwen He and   
              Tingting Chen and   
                     Gennian Ge   New constructions of signed difference
                                  sets . . . . . . . . . . . . . . . . . . 2323--2340
                Jan Schoone and   
                    Joan Daemen   Algebraic properties of the maps $
                                  \chi_n $ . . . . . . . . . . . . . . . . 2341--2365
                    Sascha Kurz   Lengths of divisible codes: the missing
                                  cases  . . . . . . . . . . . . . . . . . 2367--2378
               Hannes Bartz and   
                 Sven Puchinger   Fast decoding of lifted interleaved
                                  linearized Reed--Solomon codes for
                                  multishot network coding . . . . . . . . 2379--2421

Designs, Codes, and Cryptography
Volume 92, Number 9, September, 2024

                Xiaoli Dong and   
                    Jun Liu and   
             Yongzhuang Wei and   
                    Wen Gao and   
                       Jie Chen   Meet-in-the-middle attacks on AES with
                                  value constraints  . . . . . . . . . . . 2423--2449
             Sam Adriaensen and   
                    Lins Denaux   Small weight codewords of projective
                                  geometric codes II . . . . . . . . . . . 2451--2472
                    Bo Yang and   
                Kangkang He and   
             Xiangyong Zeng and   
                      Zibi Xiao   Symmetric 2-adic complexity of
                                  Tang--Gong interleaved sequences from
                                  generalized GMW sequence pair  . . . . . 2473--2489
              Carmen Amarra and   
            Alice Devillers and   
              Cheryl E. Praeger   Chain-imprimitive, flag-transitive
                                  2-designs  . . . . . . . . . . . . . . . 2491--2510
   Santiago Barrera Acevedo and   
             Heiko Dietrich and   
                   Corey Lionis   New families of quaternionic Hadamard
                                  matrices . . . . . . . . . . . . . . . . 2511--2525
       Alexander A. Davydov and   
          Stefano Marcugini and   
             Fernanda Pambianco   Further results on covering codes with
                                  radius $R$ and codimension $ t R + 1 $   2527--2548
                 C. Galindo and   
                F. Hernando and   
          H. Martín-Cruz   Optimal $ (r, \delta)$-LRCs from
                                  monomial-Cartesian codes and their
                                  subfield-subcodes  . . . . . . . . . . . 2549--2586
               Gergely Kiss and   
            Gábor Somlai   Special directions on the finite affine
                                  plane  . . . . . . . . . . . . . . . . . 2587--2597
              Xiaomeng Wang and   
                   Lina Wei and   
                Shou-Jun Xu and   
                   Sanming Zhou   Subgroup total perfect codes in Cayley
                                  sum graphs . . . . . . . . . . . . . . . 2599--2613
           Mikhail Muzychuk and   
                 Grigory Ryabov   Constructing linked systems of relative
                                  difference sets via Schur rings  . . . . 2615--2637
               Enes Pasalic and   
               Amar Bapi\'c and   
             Fengrong Zhang and   
                 Yongzhuang Wei   Using $ P_\tau $ property for designing
                                  bent functions provably outside the
                                  completed Maiorana--McFarland class  . . 2639--2654
                    Le Dong and   
               Danxun Zhang and   
                   Wenya Li and   
                     Wenling Wu   Yoyo attack on 4-round Lai--Massey
                                  scheme with secret round functions . . . 2655--2684
                    Jie Hao and   
                Shu-Tao Xia and   
            Kenneth W. Shum and   
                   Bin Chen and   
                Fang-Wei Fu and   
                    Yixian Yang   Optimal ternary locally repairable codes 2685--2704

Designs, Codes, and Cryptography
Volume 92, Number 10, October, 2024

                   Ang Xiao and   
                       Yue Zhou   On the packing density of Lee spheres    2705--2729
             Jong Yoon Hyun and   
                Jungyun Lee and   
                    Yoonjin Lee   Characterization of weakly regular
                                  $p$-ary bent functions of $ \ell $-form  2731--2741
         María Chara and   
     Ricardo Podestá and   
              Luciane Quoos and   
               Ricardo Toledano   Lifting iso-dual algebraic geometry
                                  codes  . . . . . . . . . . . . . . . . . 2743--2767
                      Song Tian   Computing gluing and splitting $ (\ell,
                                  \ell) $-isogenies  . . . . . . . . . . . 2769--2789
            Hadi Kharaghani and   
              Thomas Pender and   
               Vladimir Tonchev   On optimal constant weight codes derived
                                  from $ \omega $-circulant balanced
                                  generalized weighing matrices  . . . . . 2791--2799
            Elena Berardini and   
           Alessio Caminata and   
              Alberto Ravagnani   Structure of CSS and CSS-T quantum codes 2801--2823
             Muhammad Imran and   
           Gábor Ivanyos   Efficient quantum algorithms for some
                                  instances of the semidirect discrete
                                  logarithm problem  . . . . . . . . . . . 2825--2843
                  Wenjun Yu and   
                 Moshe Schwartz   On duplication-free codes for disjoint
                                  or equal-length errors . . . . . . . . . 2845--2861
                Joanne Hall and   
             Daniel Horsley and   
             Douglas R. Stinson   Bounds on data limits for all-to-all
                                  comparison from combinatorial designs    2863--2879
 Rajendra Prasad Rajpurohit and   
      Maheshanand Bhaintwal and   
                  Charul Rajput   Locally maximal recoverable codes and
                                  LMR--LCD codes . . . . . . . . . . . . . 2881--2899
                Xinran Wang and   
                Ziling Heng and   
                 Fengwei Li and   
                        Qin Yue   LCD codes and almost optimally
                                  extendable codes from self-orthogonal
                                  codes  . . . . . . . . . . . . . . . . . 2901--2926
                 Masaaki Harada   A method for constructing quaternary
                                  Hermitian self-dual codes and an
                                  application to quantum codes . . . . . . 2927--2948
                 Jing Jiang and   
                Fenggui Pei and   
                 Cailin Wen and   
              Minquan Cheng and   
            Henk D. L. Hollmann   Constructions of $t$-strongly multimedia
                                  IPP codes with length $ t + 1 $  . . . . 2949--2970
                   Jing Qiu and   
                    Fang-Wei Fu   Some new constructions of optimal linear
                                  codes and alphabet-optimal $ (r, \delta)
                                  $-locally repairable codes . . . . . . . 2971--2991
                Hongwei Liu and   
                       Zihao Yu   Linear codes from simplicial complexes
                                  over $ \mathbb {F}_{2^n} $ . . . . . . . 2993--3016
               Yupeng Jiang and   
                    Ming Li and   
                   Ying Gao and   
                    Dongdai Lin   On prefer-one sequences  . . . . . . . . 3017--3032
                Horacio Navarro   Bases for Riemann--Roch spaces of
                                  linearized function fields with
                                  applications to generalized algebraic
                                  geometry codes . . . . . . . . . . . . . 3033--3048
               Makoto Araya and   
             Masaaki Harada and   
            Hadi Kharaghani and   
            Ali Mohammadian and   
           Behruz Tayfeh-Rezaie   On the classification of skew Hadamard
                                  matrices of order $ \varvec {36} $ and
                                  related structures . . . . . . . . . . . 3049--3062
              Xiaoshan Quan and   
                    Qin Yue and   
                     Fuqing Sun   Hulls of cyclic codes with respect to
                                  the regular permutation inner product    3063--3083
               Sven Schäge   \textsfTOPAS 2-pass key exchange with
                                  full perfect forward secrecy and optimal
                                  communication complexity . . . . . . . . 3085--3124
           Stefan Steinerberger   A note on approximate Hadamard matrices  3125--3131
F. E. Brochero Martínez and   
               Daniela Oliveira   On the number of rational points of
                                  Artin--Schreier's curves and
                                  hypersurfaces  . . . . . . . . . . . . . 3133--3154
              Pratish Datta and   
                  Tapas Pal and   
            Katsuyuki Takashima   Compact FE for unbounded
                                  attribute-weighted sums for logspace
                                  from SXDH  . . . . . . . . . . . . . . . 3155--3235
                     Jin Li and   
                Huilian Zhu and   
                     Shan Huang   Some constacyclic BCH codes with good
                                  parameters . . . . . . . . . . . . . . . 3237--3259
               Wonseok Choi and   
              Seongha Hwang and   
              Byeonghak Lee and   
                   Jooyoung Lee   ZLR: a fast online authenticated
                                  encryption scheme achieving full
                                  security . . . . . . . . . . . . . . . . 3261--3316

Designs, Codes, and Cryptography
Volume 92, Number 11, November, 2024

Manuel González-Sarabia and   
Humberto Muñoz-George and   
             Jorge A. Ordaz and   
Eduardo Sáenz-de-Cabezón and   
           Rafael H. Villarreal   Indicator functions, $v$-numbers and
                                  Gorenstein rings in the theory of
                                  projective Reed--Muller-type codes . . . 3317--3353
          F. R. Kschischang and   
             F. Manganiello and   
               A. Ravagnani and   
                      K. Savary   External codes for multiple unicast
                                  networks via interference alignment  . . 3355--3369
     Jürgen Bierbrauer and   
          Stefano Marcugini and   
             Fernanda Pambianco   An asymptotic property of quaternary
                                  additive codes . . . . . . . . . . . . . 3371--3375
                  Huawei Wu and   
                  Jing Yang and   
                     Keqin Feng   Circular external difference families:
                                  construction and non-existence . . . . . 3377--3390
Isaac A. Canales-Martínez and   
                    Igor Semaev   Multivariate correlation attacks and the
                                  cryptanalysis of LFSR-based stream
                                  ciphers  . . . . . . . . . . . . . . . . 3391--3427
                Xinyue Ming and   
                   Tao Feng and   
                Guojing Jia and   
                  Xiaomiao Wang   The existence of $ (\mathbb {Z}_v, 4, 1)
                                  $-disjoint difference families . . . . . 3429--3446
                Sarah Arpin and   
             James Clements and   
           Pierrick Dartois and   
    Jonathan Komada Eriksen and   
         Péter Kutas and   
            Benjamin Wesolowski   Finding orientations of supersingular
                                  elliptic curves and quaternion orders    3447--3493
                 Somi Gupta and   
               Francesco Pavese   Affine vector space partitions and
                                  spreads of quadrics  . . . . . . . . . . 3495--3502
                 Tran van Trung   Constructions for $t$-designs and
                                  $s$-resolvable $t$-designs . . . . . . . 3503--3514
              Woohyuk Chung and   
               Hwigyeom Kim and   
               Jooyoung Lee and   
                   Yeongmin Lee   Security analysis of the ISO standard
                                  OFB--DRBG  . . . . . . . . . . . . . . . 3515--3532
                     Xu Pan and   
                   Hao Chen and   
                    Hongwei Liu   Some self-dual codes and isodual codes
                                  constructed by matrix product codes  . . 3533--3559
              Marco Buratti and   
                Anamari Naki\'c   Additivity of symmetric and subspace
                                  2-designs  . . . . . . . . . . . . . . . 3561--3572
               Dongchun Han and   
                   Hanbin Zhang   Explicit constructions of NMDS self-dual
                                  codes  . . . . . . . . . . . . . . . . . 3573--3585
          Shuichi Katsumata and   
                  Yi-Fu Lai and   
            Jason T. LeGrow and   
                       Ling Qin   CSI-Otter: isogeny-based (partially)
                                  blind signatures from the class group
                                  action with a twist  . . . . . . . . . . 3587--3643
       Gretchen L. Matthews and   
            Travis Morrison and   
                Aidan W. Murphy   Curve-lifted codes for local recovery
                                  using lines  . . . . . . . . . . . . . . 3645--3664
           Sergey Goryainov and   
         Elena V. Konstantinova   Non-canonical maximum cliques without a
                                  design structure in the block graphs of
                                  2-designs  . . . . . . . . . . . . . . . 3665--3675
Héctor Masip-Ardevol and   
  Jordi Baylina-Melé and   
  Marc Guzmán-Albiol and   
   Jose Luis Muñoz-Tapia   eSTARK: extending STARKs with arguments  3677--3721
                    Yang Li and   
                  Shitao Li and   
                     Shixin Zhu   New and improved formally self-dual
                                  codes with small hulls from polynomial
                                  four Toeplitz codes  . . . . . . . . . . 3723--3751
                 Bolin Wang and   
                     Wenling Wu   Security analysis of P-SPN schemes
                                  against invariant subspace attack with
                                  inactive S-boxes . . . . . . . . . . . . 3753--3782
                     Lei Li and   
                 Xinchun Yu and   
               Chenhao Ying and   
                 Liang Chen and   
              Yuanyuan Dong and   
                       Yuan Luo   MDS array codes with efficient repair
                                  and small sub-packetization level  . . . 3783--3798
                  Shuhui Yu and   
                       Lijun Ji   Two new constructions of cyclic subspace
                                  codes via Sidon spaces . . . . . . . . . 3799--3811
                     Yin Lv and   
                Danping Shi and   
                     Lei Hu and   
                         Yi Guo   Utilizing FWT in linear cryptanalysis of
                                  block ciphers with various structures    3813--3842
               Huawei Huang and   
              Changgen Peng and   
                    Lunzhi Deng   Cryptanalysis of a key exchange protocol
                                  based on a modified tropical structure   3843--3858

Designs, Codes, and Cryptography
Volume 92, Number 12, December, 2024

                      Yi Li and   
                Xiutao Feng and   
                     Qiang Wang   Towards a classification of permutation
                                  binomials of the form $ x^i + a x $ over
                                  $ \mathbb {F}_{2^n} $  . . . . . . . . . 3859--3875
                Haiyan Guan and   
                  Shenglin Zhou   Reduction for block-transitive $t$--$
                                  (k^2, k, \lambda) $ designs  . . . . . . 3877--3894
                    Shi Bai and   
             Hansraj Jangir and   
                   Tran Ngo and   
                William Youmans   An algebraic algorithm for breaking NTRU
                                  with multiple keys . . . . . . . . . . . 3895--3918
                 Jinrui Sha and   
                Shengli Liu and   
                      Shuai Han   Functional commitments for arbitrary
                                  circuits of bounded sizes  . . . . . . . 3919--3953
                   Yuan Gao and   
                Weijun Fang and   
                  Jingke Xu and   
                  Dong Wang and   
                     Sihuang Hu   Optimal $ (2, \delta) $ locally
                                  repairable codes via punctured simplex
                                  codes  . . . . . . . . . . . . . . . . . 3955--3979
        Ferruh Özbudak and   
              Buket Özkaya   New distance bounds for quasi-cyclic
                                  codes  . . . . . . . . . . . . . . . . . 3981--4009
             Deepak Agrawal and   
    Srinivasan Krishnaswamy and   
                   Smarajit Das   On Boolean functions derived from linear
                                  maps over $ \mathbb {Z}_4 $ and their
                                  application to secret sharing  . . . . . 4011--4033
          Noy Soffer Aranov and   
              Angelot Behajaina   On the maximum size of ultrametric
                                  orthogonal sets over discrete valued
                                  fields . . . . . . . . . . . . . . . . . 4035--4055
       Robert Christian Subroto   An algebraic approach to circulant
                                  column parity mixers . . . . . . . . . . 4057--4083
           Melek Çil and   
       Baris Bülent Kirlar   On the construction of certain odd
                                  degree irreducible polynomials over
                                  finite fields  . . . . . . . . . . . . . 4085--4097
              Feixiang Zhao and   
                  Jian Weng and   
                  Wenli Xie and   
                    Lin Hou and   
                        Ming Li   Time-based attribute-based proxy
                                  re-encryption with decryption key update 4099--4129
               Simon Masson and   
              Antonio Sanso and   
                  Zhenfei Zhang   Bandersnatch: a fast elliptic curve
                                  built over the BLS12-381 scalar field    4131--4143
             Alexander Barg and   
               Ohad Elishco and   
                Ryan Gabrys and   
                Geyang Wang and   
                  Eitan Yaakobi   Storage codes and recoverable systems on
                                  lines and grids  . . . . . . . . . . . . 4145--4168
                  Yiwen Gao and   
                    Yuan Li and   
                     Haibin Kan   On the uniqueness of balanced complex
                                  orthogonal design  . . . . . . . . . . . 4169--4187
  Zoltán Füredi and   
         Alexandr Kostochka and   
                  Mohit Kumbhat   Minimal abundant packings and
                                  choosability with separation . . . . . . 4189--4194
             Nicola Durante and   
 Giovanni Giuseppe Grimaldi and   
            Giovanni Longobardi   Non-linear MRD codes from cones over
                                  exterior sets  . . . . . . . . . . . . . 4195--4211
             Bingsheng Shen and   
                     Tao Yu and   
             Zhengchun Zhou and   
                      Yang Yang   Asymptotically optimal aperiodic
                                  quasi-complementary sequence sets based
                                  on extended Boolean functions  . . . . . 4213--4230
    Ajani De Vas Gunasekara and   
                Alice Devillers   Transitive path decompositions of
                                  Cartesian products of complete graphs    4231--4245
       Birenjith Sasidharan and   
           Emanuele Viterbo and   
                  Son Hoang Dau   Binary cyclic-gap constant weight codes
                                  with low-complexity encoding and
                                  decoding . . . . . . . . . . . . . . . . 4247--4277
                Zhiguo Ding and   
               Michael E. Zieve   Two classes of exceptional $m$-to-1
                                  rational functions . . . . . . . . . . . 4279--4285
                Yingyin Pan and   
             Jianghua Zhong and   
                    Dongdai Lin   Generalized cycle joining method and its
                                  application to the construction of
                                  long-period Galois NFSRs . . . . . . . . 4287--4311
 Ákos K. Matszangosz and   
         Ferenc Szöll\Hosi   A characterization of complex Hadamard
                                  matrices appearing in families of MUB
                                  triplets . . . . . . . . . . . . . . . . 4313--4333
                   Rong Luo and   
              Mingliang Yan and   
             Sihem Mesnager and   
                   Dongchun Han   On Abelian one-dimensional hull codes in
                                  group algebras . . . . . . . . . . . . . 4335--4352
                   Yadi Wei and   
                Jiaxin Wang and   
                    Fang-Wei Fu   Association schemes arising from
                                  non-weakly regular bent functions  . . . 4353--4422
         Kazuhiko Minematsu and   
                Shingo Sato and   
                  Junji Shikata   Interactive aggregate message
                                  authentication equipped with detecting
                                  functionality from adaptive group
                                  testing  . . . . . . . . . . . . . . . . 4423--4451
                Shuping Mao and   
               Tingting Guo and   
                  Peng Wang and   
                 Ruozhou Xu and   
                Yuchao Chen and   
                         Lei Hu   A quantum-secure partial parallel MAC
                                  QPCBC  . . . . . . . . . . . . . . . . . 4453--4486
                Guangkui Xu and   
                 Xiwang Cao and   
                 Gaojun Luo and   
                      Huawei Wu   Infinite families of 3-designs from
                                  special symmetric polynomials  . . . . . 4487--4509
     Carlos Aguilar-Melchor and   
             Nicolas Aragon and   
 Jean-Christophe Deneuville and   
           Philippe Gaborit and   
  Jérôme Lacan and   
            Gilles Zémor   Efficient error-correcting codes for the
                                  HQC post-quantum cryptosystem  . . . . . 4511--4530
                  Shuyu Luo and   
              Weiqiong Wang and   
                   Qi Zhang and   
                   Zhenjie Song   Constructions of plateaued correctors
                                  with high correction order and good
                                  nonlinearity via Walsh spectral
                                  neutralization technique . . . . . . . . 4531--4548
             Zahra Ahmadian and   
              Akram Khalesi and   
             Dounia M'foukh and   
            Hossein Moghimi and   
    María Naya-Plasencia   Truncated differential cryptanalysis:
                                  new insights and application to
                                  QARMAv1-$n$ and QARMAv2-64 . . . . . . . 4549--4591