Last update:
Thu Oct 30 10:49:21 MDT 2025
Anonymous Editorial . . . . . . . . . . . . . . . 5
G. Eric Moorhouse Bruck nets, codes, and characters of
loops . . . . . . . . . . . . . . . . . 7--29
A. Tietäväinen Covering radius and dual distance . . . 31--46
B. A. LaMacchia and
A. M. Odlyzko Computation of discrete logarithms in
prime fields . . . . . . . . . . . . . . 47--62
E. R. Lamken and
W. H. Mills and
R. M. Wilson Four pairwise balanced designs . . . . . 63--68
Chat Yin Ho Some remarks on orders of projective
planes, planar difference sets and
multipliers . . . . . . . . . . . . . . 69--75
Juriaan Simonis and
Cornelis de Vroedt A simple proof of the Delsarte
inequalities . . . . . . . . . . . . . . 77--82
K. T. Arasu and
Alexander Pott On quasiregular collineation groups of
projective planes . . . . . . . . . . . 83--92
Klaus Metsch Improvement of Bruck's completion
theorem . . . . . . . . . . . . . . . . 99--116
James A. Davis A note on products of relative
difference sets . . . . . . . . . . . . 117--119
Helmut Siemon Cyclic Steiner quadruple systems and
Köhler's orbit graphs . . . . . . . . . . 121--132
David J. Peterson Fractal properties of the singular
function $s(u)$ . . . . . . . . . . . . 133--139
Jürgen Bierbrauer and
Tran Van Trung Halving ${\rm PGL}(2,2^f), f$ odd: a
series of cryptocodes . . . . . . . . . 141--148
B. A. Anderson and
P. A. Leonard A class of self-orthogonal
$2$-sequencings . . . . . . . . . . . . 149--181
Douglas A. Leonard Linear cyclic codes of wordlength $v$
over ${\rm GF}(q^s)$ which are also
linear cyclic codes of wordlength $sv$
over ${\rm GF}(q)$ . . . . . . . . . . . 183--189
A. A. Bruen and
J. C. Fisher The Jamison method in Galois geometries 199--205
Oliver Pfaff The classification of doubly transitive
affine designs . . . . . . . . . . . . . 207--217
Dirk Hachenberger Constructions of large translation nets
with nonabelian translation groups . . . 219--236
Anne Delandtsheer Dimensional linear spaces whose
automorphism group is (line,
hyperplane)-flag transitive . . . . . . 237--245
D. Jungnickel and
Vladimir D. Tonchev Exponential number of quasi-symmetric
SDP designs and codes meeting the
Grey-Rankin bound . . . . . . . . . . . 247--253
J. D. Key Hermitian varieties as codewords . . . . 255--259
E. W. Lambeck A remark on the intersection arrays of
distance regular graphs and the distance
regular graphs of diameter $d=3i-1$ with
$b_i=1$ and $k>2$ . . . . . . . . . . . . 261--266
Antonio Pasini Diagram geometries for sharply
$n$-transitive sets of permutations or
of mappings . . . . . . . . . . . . . . 275--297
H. Van Maldeghem and
J. A. Thas and
S. E. Payne Desarguesian finite generalized
quadrangles are classical or dual
classical . . . . . . . . . . . . . . . 299--305
Jürgen Bierbrauer and
Tran Van Trung Some highly symmetric authentication
perpendicular arrays . . . . . . . . . . 307--319
S. L. Ma McFarland's conjecture on abelian
difference sets with multiplier $-1$ . . 321--332
Ka Hin Leung and
Siu Lun Ma and
Yan Loi Wong Difference sets in dihedral groups . . . 333--338
Tomik Yaghoobian and
Ian F. Blake Hermitian codes as generalized
Reed--Solomon codes . . . . . . . . . . 5--17
Jonathan Jedwab Generalized perfect arrays and Menon
difference sets . . . . . . . . . . . . 19--68
Bhaskar Bagchi On quasi-symmetric designs . . . . . . . 69--79
P. P. Greenough and
R. Hill Optimal ternary quasi-cyclic codes . . . 81--91
Jonathan Jedwab and
Sheelagh Lloyd A note on the nonexistence of Barker
sequences . . . . . . . . . . . . . . . 93--97
Whitfield Diffie and
Paul C. van Oorschot and
Michael J. Wiener Authentication and authenticated key
exchanges . . . . . . . . . . . . . . . 107--125
Edward Spence A complete classification of symmetric
$(31,10,3)$ designs . . . . . . . . . . 127--136
R. Hill and
D. E. Newton Optimal ternary linear codes . . . . . . 137--157
Darryn E. Bryant Varieties of quasigroups arising from
$2$-perfect $m$-cycle systems . . . . . 159--168
Stephen D. Cohen The explicit construction of irreducible
polynomials over finite fields . . . . . 169--174
D. R. Stinson Combinatorial characterizations of
authentication codes . . . . . . . . . . 175--187
A. Blokhuis and
A. R. Calderbank Quasi-symmetric designs and the Smith
normal form . . . . . . . . . . . . . . 189--206
Xiang Dong Hou Some inequalities about the covering
radius of Reed--Muller codes . . . . . . 215--224
Noboru Hamada and
Tor Helleseth and
Òyvind Ytrehus On the construction of
$[q^4+q^2-q,5,q^4-q^3+q^2-2q;q]$-codes
meeting the Griesmer bound . . . . . . . 225--229
Michael R. Fellows and
Neal Koblitz Self-witnessing polynomial-time
complexity and prime factorization . . . 231--235
Charles J. Colbourn and
Eric Mendelsohn and
Cheryl E. Praeger and
Vladimir D. Tonchev Concerning multiplier automorphisms of
cyclic Steiner triple systems . . . . . 237--251
Ronald Shaw A characterization of the primals in
${\rm PG}(m,2)$ . . . . . . . . . . . . 253--256
K. T. Arasu and
Qing Xiang On the existence of periodic
complementary binary sequences . . . . . 257--262
Alexander Pott On abelian difference set codes . . . . 263--271
Peter Landrock and
Olaf Manz Classical codes as ideals in group
algebras . . . . . . . . . . . . . . . . 273--285
Thomas Beth and
Volker Hatz Design machines: algebraically well
described interconnection networks . . . 287--298
Nicola Melone and
Udo Ott On the rank of truncated incidence
matrices of linear spaces . . . . . . . 307--313
Shuhong Gao and
Hendrik W. Lenstra, Jr. Optimal normal bases . . . . . . . . . . 315--323
W.-A. Jackson and
P. R. Wild Relations between two perfect ternary
sequence constructions . . . . . . . . . 325--332
Zhe Xian Wan Construction of Cartesian authentication
codes from unitary geometry . . . . . . 333--356
D. R. Stinson An explication of secret sharing schemes 357--390
D. de Caen and
C. D. Godsil and
G. F. Royle On the $p$-rank of incidence matrices
and a bound of Bruen and Ott . . . . . . 391--394
Bernhard Schmidt Note on a question by S. Bagchi and B.
Bagchi: ``Designs from pairs of finite
fields. I. A cyclic unital $U(6)$ and
other regular Steiner $2$-designs'' [J.
Combin. Theory Ser. A 52 (1989), no. 1,
51--61; MR 90k:05025] . . . . . . . . . 395--395
Donovan R. Hare and
William McCuaig The connectivity of the
block-intersection graphs of designs . . 5--8
W. D. Wallis and
J. L. Yucas and
G.-H. Zhang Single change covering designs . . . . . 9--19
Charles Laywine Subsquares in orthogonal Latin squares
as subspaces in affine geometries: a
generalization of an equivalence of Bose 21--28
Levon H. Khachatrian The lower bound of the quadratic spans
of de Bruijn sequences . . . . . . . . . 29--32
E. R. Lamken Existence results for generalized
balanced tournament designs with block
size $3$ . . . . . . . . . . . . . . . . 33--61
Chris M. Skinner Nonsymmetric $2$-designs modulo $2$ . . 63--68
Peter Boyvalenkov Nonexistence of certain symmetric
spherical codes . . . . . . . . . . . . 69--74
W. de Launey and
K. J. Horadam A weak difference set construction for
higher-dimensional designs . . . . . . . 75--87
A. E. Brouwer and
L. M. G. M. Tolhuizen A sharpening of the Johnson bound for
binary linear codes and the nonexistence
of linear codes with Preparata
parameters . . . . . . . . . . . . . . . 95--98
V. C. Mavron and
W. D. Wallis Cubic arcs in cubic nets . . . . . . . . 99--104
Alexander Barg Incomplete sums, dc-constrained codes,
and codes that maintain synchronization 105--116
J. D. Key and
F. E. Sullivan Codes of Steiner triple and quadruple
systems . . . . . . . . . . . . . . . . 117--125
Albrecht Beutelspacher and
Ferenc Wettl On $2$-level secret sharing . . . . . . 127--134
Claude Carlet Partially-bent functions . . . . . . . . 135--145
W. K. Chan Necessary conditions for Menon
difference sets . . . . . . . . . . . . 147--154
S. S. Sane and
M. S. Shrikhande Some characterizations of
quasi-symmetric designs with a spread 155--166
Xiang Dong Hou Further results on the covering radii of
the Reed--Muller codes . . . . . . . . . 167--177
Aart Blokhuis and
Klaus Metsch On the size of a maximal partial spread 187--191
Edwin R. van Dam Classification of spreads of ${\rm
PG}(3,4)\sbs{\rm PG}(3,2)$ . . . . . . . 193--198
Thomas Beth The ${\rm GF}(p)$-dimension of the codes
generated by the classical point-line
geometries over ${\rm GF}(p)$ . . . . . 199--207
Charles J. Colbourn and
Alexander Rosa and
\vStefan Znám The spectrum of maximal partial Steiner
triple systems . . . . . . . . . . . . . 209--219
Josep Rif\`a-Coma How to avoid the cheaters succeeding in
the key sharing scheme . . . . . . . . . 221--228
Christine M. O'Keefe and
Alan Rahilly Spreads and group divisible designs . . 229--235
Claude Carlet The automorphism groups of the
Delsarte-Goethals codes . . . . . . . . 237--249
Heikki O. Hämäläinen and
Iiro S. Honkala and
Markku K. Kaikkonen and
Simon N. Litsyn Bounds for binary multiple covering
codes . . . . . . . . . . . . . . . . . 251--275
Sara Bitan and
Tuvi Etzion The last packing number of quadruples,
and cyclic SQS . . . . . . . . . . . . . 283--313
Steven Dougherty Nets and their codes . . . . . . . . . . 315--331
Willi Geiselmann and
Dieter Gollmann Self-dual bases in ${\bf F}_{q^n}$ . . . 333--345
A. Klapper Cross-correlations of geometric
sequences in characteristic two . . . . 347--377
James A. Davis and
Jonathan Jedwab A note on new semi-regular divisible
difference sets . . . . . . . . . . . . 379--381
Luc Teirlinck Some new $2$-resolvable Steiner
quadruple systems . . . . . . . . . . . 5--10
Chris J. Mitchell and
Kenneth G. Paterson Decoding perfect maps . . . . . . . . . 11--30
J. H. Conway and
N. J. A. Sloane Quaternary constructions for the binary
single-error-correcting codes of Julin,
Best and others . . . . . . . . . . . . 31--42
George T. Kennedy and
Vera Pless On designs and formally self-dual codes 43--55
Stefan M. Dodunekov and
Silvia B. Encheva and
Stoyan N. Kapralov On the $[28, 7, 12]$ binary
self-complementary codes and their
residuals . . . . . . . . . . . . . . . 57--67
Thomas Johansson A shift register construction of
unconditionally secure authentication
codes . . . . . . . . . . . . . . . . . 69--81
Wen-Ai Jackson and
Keith M. Martin Geometric secret sharing schemes and
their duals . . . . . . . . . . . . . . 83--95
U. Dempwolff Translation planes of order $27$ . . . . 105--121
Steven T. Dougherty A coding-theoretic solution to the $36$
officer problem . . . . . . . . . . . . 123--128
Dirk Hachenberger On completely free elements in finite
fields . . . . . . . . . . . . . . . . . 129--143
Roberta Evans Sabin On row-cyclic codes with algebraic
structure . . . . . . . . . . . . . . . 145--155
Attila Sali On the rigidity of spherical $t$-designs
that are orbits of finite reflection
groups . . . . . . . . . . . . . . . . . 157--170
Gérald E. Séguin A counter-example to a recent result on
the $q$-ary image of a $q^s$-ary cyclic
code . . . . . . . . . . . . . . . . . . 171--175
Kathleen A. S. Quinn Some constructions for key distribution
patterns . . . . . . . . . . . . . . . . 177--191
Alfred Menezes Book review . . . . . . . . . . . . . . 193
A. R. Calderbank and
P. C. Fishburn Maximal three-independent subsets of
$\{0,1,2\}^n$ . . . . . . . . . . . . . 203--211
Olof Heden A binary perfect code of length $15$ and
codimension $0$ . . . . . . . . . . . . 213--220
S. L. Ma A survey of partial difference sets . . 221--261
M. J. B. Robshaw On evaluating the linear complexity of a
sequence of least period $2^n$ . . . . . 263--269
M. van Eupen and
R. Hill An optimal ternary $[69,5,45]$ code and
related codes . . . . . . . . . . . . . 271--282
Zhe Xian Wan The weight hierarchies of the projective
codes from nondegenerate quadrics . . . 283--300
R. D. Baker and
G. L. Ebert A Bruen chain for $q=19$ . . . . . . . . 307--312
Yu Qing Chen and
Qing Xiang and
Surinder K. Sehgal An exponent bound on skew Hadamard
abelian difference sets . . . . . . . . 313--317
Dieter Jungnickel and
Alexander Pott A new class of symmetric
$(v,k,\lambda)$-designs . . . . . . . . 319--325
C. Koukouvinos and
S. Kounias and
J. Seberry and
C. H. Yang and
J. Yang On sequences with zero autocorrelation 327--340
Chris J. Mitchell Constructing $c$-ary perfect factors . . 341--368
D. R. Stinson Universal hashing and authentication
codes . . . . . . . . . . . . . . . . . 369--380
Gilles Zémor Hash functions and Cayley graphs . . . . 381--394
K. T. Arasu and
Surinder K. Sehgal Difference Sets in Abelian Groups of
$p$-Rank Two . . . . . . . . . . . . . . 5--12
Marco Buratti A Powerful Method for Constructing
Difference Families and Optimal Optical
Orthogonal Codes . . . . . . . . . . . . 13--25
M. J. Coster and
W. H. Haemers Quasi-Symmetric Designs Related to the
Triangular Graph . . . . . . . . . . . . 27--42
Clement Lam and
Larry Thiel and
Vladimir D. Tonchev On quasi-symmetric $2$-$(28,12,11)$ and
$2$-$(36,16,12)$ designs . . . . . . . . 43--55
Rudolf Mathon and
Gordon F. Royle The Translation Planes of Order $49$ . . 57--72
David Naccache and
David M'Ra\"\ihi and
Dan Raphaeli Can Montgomery Parasites Be Avoided? A
Design Methodology Based on Key and
Cryptosystem Modifications . . . . . . . 73--80
U. Dempwolff Correction to: ``Translation planes of
order $27$'' [Des. Codes Cryptogr. 4
(1994), no. 2, 105--121; MR 95a:51012] 81--81
Ahmed M. Assaf On Covering Designs with Block Size $5$
and Index $5$ . . . . . . . . . . . . . 91--107
David Gillman and
Ronald L. Rivest Complete Variable-Length ``Fix-Free''
Codes . . . . . . . . . . . . . . . . . 109--114
Kenneth G. Paterson Perfect Factors in the de Bruijn Graph 115--138
René Peeters On the $p$-Ranks of Net Graphs . . . . . 139--153
Stephan J. Suchower Nonisomorphic Complete Sets of
$F$-Rectangles with Prime Power
Dimensions . . . . . . . . . . . . . . . 155--174
Marco Carpentieri A Perfect Threshold Secret Sharing
Scheme to Identify Cheaters . . . . . . 183--187
Charles J. Colbourn and
Jeffrey H. Dinitz and
Mieczys\law Wojtas Thwarts in Transversal Designs . . . . . 189--197
R. Craigen The Structure of Weighing Matrices
having Large Weights . . . . . . . . . . 199--216
Tuvi Etzion and
Victor Wei and
Zhen Zhang Bounds on the Sizes of Constant Weight
Covering Codes . . . . . . . . . . . . . 217--239
K. Gopalakrishnan and
D. R. Stinson Three Characterizations of Non-binary
Correlation-Immune and Resilient
Functions . . . . . . . . . . . . . . . 241--251
Akihiro Munemasa On Perfect $t$-Shift Codes in Abelian
Groups . . . . . . . . . . . . . . . . . 253--259
Christine M. O'Keefe Key Distribution Patterns using
Minkowski Planes . . . . . . . . . . . . 261--267
Tran Van Trung On the Construction of Authentication
and Secrecy Codes . . . . . . . . . . . 269--280
J. D. Key and
F. E. Sullivan Erratum: ``Codes of Steiner triple and
quadruple systems'' [Des. Codes
Cryptogr. \bf 3 (1993), no. 2, 117--125;
MR 94e:05050] . . . . . . . . . . . . . 281--281
Patrick A. H. Bours On the Construction of Perfect
Deletion-Correcting Codes using Design
Theory . . . . . . . . . . . . . . . . . 5--20
A. R. Calderbank and
N. J. A. Sloane Modular and $p$-adic Cyclic Codes . . . 21--35
J. K. Gibson Severely Denting the Gabidulin Version
of the McEliece Public Key Cryptosystem 37--45
Glenn Hurlbert and
Garth Isaak New Constructions for de Bruijn Tori . . 47--56
S. L. Ma and
Bernhard Schmidt On $(p^a,p,p^a,p^{a-1})$-relative
difference sets . . . . . . . . . . . . 57--71
W. J. Martin and
X. J. Zhu Anticodes for the Grassman and bilinear
forms graphs . . . . . . . . . . . . . . 73--79
Masaaki Harada and
Hiroshi Kimura New Extremal Doubly-Even $[64, 32, 12]$
Codes . . . . . . . . . . . . . . . . . 91--96
W. Cary Huffman and
Vladimir D. Tonchev The existence of extremal self-dual
$[50,25,10]$ codes and quasi-symmetric
$2$-$(49,9,6)$ designs . . . . . . . . . 97--106
Helmut Meyn Explicit $N$-Polynomials of $2$-Power
Degree over Finite Fields, I . . . . . . 107--116
Renate Scheidler and
Hugh C. Williams A Public-Key Cryptosystem Utilizing
Cyclotomic Fields . . . . . . . . . . . 117--131
N. Shalaby and
J. Yin Directed packings with block size $5$
and even $\nu$ . . . . . . . . . . . . . 133--142
Marten van Dijk On the Information Rate of Perfect
Secret Sharing Schemes . . . . . . . . . 143--169
P. Dey and
J. L. Hayden On Symmetric Incidence Matrices of
Projective Planes . . . . . . . . . . . 179--188
D. G. Glynn and
J. W. P. Hirschfeld On the Classification of Geometric Codes
by Polynomial Functions . . . . . . . . 189--204
Thomas Johansson Authentication Codes for Nontrusting
Parties Obtained from Rank Metric Codes 205--218
Yaron Klein and
Simon Litsyn and
Alexander Vardy Two New Bounds on the Size of Binary
Codes with a Minimum Distance of Three 219--227
Tim Penttila and
Gordon F. Royle Sets of Type $(m, n)$ in the Affine and
Projective Planes of Order Nine . . . . 229--245
Kevin T. Phelps and
Mike Levan Kernels of Nonlinear Hamming Codes . . . 247--257
Anonymous Foreword to this issue . . . . . . . . . 7--8
Whitfield Diffie The National Security Establishment and
the Development of Public-Key
Cryptography . . . . . . . . . . . . . . 9--12
Mary Fischer ``And Now For Something Completely
Different'' (The Egyptologist and the
Cryptographer: a Personal Reminiscence) 13--15
Thomas Beth Watching the Bhang Meter and Flying
through Dirt . . . . . . . . . . . . . . 17--25
Paul Syverson and
Catherine Meadows A Formal Language for Cryptographic
Protocol Requirements . . . . . . . . . 27--59
Kaisa Nyberg and
Rainer A. Rueppel Message Recovery for Signature Schemes
Based on the Discrete Logarithm Problem 61--81
R. Safavi-Naini and
L. Tombak Authentication Codes in Plaintext and
Chosen-Content Attacks . . . . . . . . . 83--99
C. J. Mitchell and
F. C. Piper and
M. Walker and
P. Wild Authentication Schemes, Perfect Local
Randomizers, Perfect Secrecy and Secret
Sharing Schemes . . . . . . . . . . . . 101--110
Xian-Mo Zhang and
Yuliang Zheng Characterizing the Structures of
Cryptographic Functions Satisfying the
Propagation Criterion for Almost All
Vectors . . . . . . . . . . . . . . . . 111--134
Dieter Gollmann and
Yongfei Han and
Chris J. Mitchell Redundant Integer Representations and
Fast Exponentiation . . . . . . . . . . 135--151
R. Scheidler and
A. Stein and
Hugh C. Williams Key-Exchange in Real Quadratic
Congruence Function Fields . . . . . . . 153--174
J. D. Key and
F. E. Sullivan Correction to: ``Codes of Steiner triple
and quadruple systems'' [Des. Codes
Cryptogr. \bf 3 (1993), no. 2, 117--125;
MR 94e:05050] . . . . . . . . . . . . . 175--175
Alexey E. Ashikhmin and
Simon N. Litsyn Fast Decoding Algorithms for First Order
Reed--Muller and Related Codes . . . . . 187--214
Thierry P. Berger On the Automorphism Groups of
Affine-Invariant Codes . . . . . . . . . 215--221
T. Aaron Gulliver and
Vijay K. Bhargava New Good Rate $(m-1)/pm$ Ternary and
Quaternary Quasi-Cyclic Codes . . . . . 223--233
Marijn Van Eupen and
Noboru Hamada and
Yoko Watamori The Nonexistence of Ternary $[50,5,32]$
Codes . . . . . . . . . . . . . . . . . 235--237
Rolf S. Rees and
Douglas R. Stinson Combinatorial characterizations of
authentication codes. II . . . . . . . . 239--259
Dieter Jungnickel and
Günter Pickert A Life's Work in Geometry: An Homage to
Hanfried Lenz . . . . . . . . . . . . . 9--22
K. T. Arasu and
Alexander Pott Impossibility of a Certain Cyclotomic
Equation with Applications to Difference
Sets . . . . . . . . . . . . . . . . . . 23--27
Alphonse Baartmans and
Ivan Landjev and
Vladimir D. Tonchev On the Binary Codes of Steiner Triple
Systems . . . . . . . . . . . . . . . . 29--43
R. A. Bailey Orthogonal Partitions in Designed
Experiments . . . . . . . . . . . . . . 45--77
R. D. Baker and
G. L. Ebert Regulus-free spreads of ${\rm PG}(3, q)$ 79--89
Thomas Beth Designs, Codes and Crypts --- a Puzzle
Altogether . . . . . . . . . . . . . . . 91--101
Darryn E. Bryant and
D. G. Hoffman and
C. A. Rodger $5$-Cycle Systems with Holes . . . . . . 103--108
Peter J. Cameron Stories about Groups and Sequences . . . 109--133
Dirk Hachenberger Groups Admitting a Kantor Family and a
Factorized Normal Subgroup . . . . . . . 135--143
Willem H. Haemers and
Vladimir D. Tonchev Spreads in Strongly Regular Graphs . . . 145--157
Dieter Jungnickel and
Marialuisa J. de Resmini and
Scott A. Vanstone Codes Based on Complete Graphs . . . . . 159--165
Ka Hin Leung and
Siu Lun Ma A construction of partial difference
sets in $Z_{p^2}\times
Z_{p^2}\times\cdots\times Z_{p^2}$ . . . 167--172
Arlene A. Pascasio and
Cheryl E. Praeger and
Blessilda P. Raposa On the characterisation of ${\rm
AG}(n,q)$ by its parameters as a nearly
triply regular design . . . . . . . . . 173--179
S. E. Payne The fundamental theorem of $q$-clan
geometry . . . . . . . . . . . . . . . . 181--202
Günter Pickert Extension of Gravity Centers
Configuration to Steiner Triple Systems 203--214
D. K. Ray-Chaudhuri and
Qing Xiang Constructions of Partial Difference Sets
and Relative Difference Sets Using
Galois Rings . . . . . . . . . . . . . . 215--227
E. E. Shult and
J. A. Thas $m$-systems and partial $m$-systems of
polar spaces . . . . . . . . . . . . . . 229--238
Helmut Siemon Piotrowski's Infinite Series of Steiner
Quadruple Systems Revisited . . . . . . 239--254
R. A. Bailey Orthogonal partitions in designed
experiments. Corrected reprint . . . . . 45--77
Peter J. Cameron Stories about groups and sequences.
Corrected reprint of ``Stories about
groups and sequences'' [Des. Codes
Cryptogr. \bf 8 (1996), no. 1--2,
109--133; MR 97f:20004a] . . . . . . . . 109--133
Josep Domingo-Ferrer Achieving Rights Untransferability with
Client-Independent Servers . . . . . . . 263--271
Masaaki Harada Existence of New Extremal Doubly-Even
Codes and Extremal Singly-Even Codes . . 273--283
Xiang-dong Hou The Covering Radius of $R(1,9)$ in
$R(4,9)$ . . . . . . . . . . . . . . . . 285--292
Heeralal Janwa and
Oscar Moreno McEliece Public Key Cryptosystems Using
Algebraic-Geometric Codes . . . . . . . 293--307
Ivan N. Landgev Constructions of Group Divisible Designs 309--318
D. B. Meisner New Classes of Groups Containing Menon
Difference Sets . . . . . . . . . . . . 319--325
Tamás Szönyi On Cyclic Caps in Projective Spaces . . 327--332
Vladimir Tonchev Preface . . . . . . . . . . . . . . . . 5--6
E. F. Assmus, Jr. and
J. D. Key Designs and codes: an update . . . . . . 7--27
Jürgen Bierbrauer and
Stephen Black and
Yves Edel Some $t$-homogeneous sets of
permutations . . . . . . . . . . . . . . 29--38
Jeffrey T. Bonn Forcing Linearity on Greedy Codes . . . 39--49
Laurel L. Carpenter Oval Designs in Desarguesian Projective
Planes . . . . . . . . . . . . . . . . . 51--59
Charles J. Colbourn and
Donald L. Kreher Concerning Difference Matrices . . . . . 61--70
Hiroshi Kimura Hadamard Matrices and Dihedral Groups 71--77
Laura Monroe Self-Orthogonal Greedy Codes . . . . . . 79--83
Iosif Pinelis On the Minimal Number of Even
Submatrices of $0$-$1$ Matrices . . . . 85--93
J. A. Thas $k$-arcs, hyperovals, partial flocks and
flocks . . . . . . . . . . . . . . . . . 95--104
Tran Van Trung A Generalization of a Theorem of Dehon
for Simple $t$-Designs . . . . . . . . . 105--114
Judy L. Walker A New Approach to the Main Conjecture on
Algebraic-Geometric MDS Codes . . . . . 115--120
Stefka Buyuklieva and
Vassil Yorgov Singly-Even Self-Dual Codes of Length
$40$ . . . . . . . . . . . . . . . . . . 131--141
Mario A. de Boer Almost MDS Codes . . . . . . . . . . . . 143--155
Chang-Seop Park and
Gui-Liang Feng and
Kenneth K. Tzeng The New Minimum Distance Bounds of Goppa
Codes and Their Decoding . . . . . . . . 157--176
Ron M. Roth Spectral-Null Codes and Null Spaces of
Hadamard Submatrices . . . . . . . . . . 177--191
Alfred Scheerhorn Dickson Polynomials, Completely Normal
Polynomials and the Cyclic Module
Structure of Specific Extensions of
Finite Fields . . . . . . . . . . . . . 193--202
M. A. Shokrollahi Stickelberger Codes . . . . . . . . . . 203--213
A. N. Skorobogatov On the Number of Representations of
Matroids Over Finite Fields . . . . . . 215--226
Pier Vittorio Ceccherini Giuseppe Tallini (1930--1995) . . . . . 237--245
Giuseppe Tallini Combinatorial Problems in Infinite
Spaces . . . . . . . . . . . . . . . . . 247--249
S. R. Blackburn A Note on Sequences with the Shift and
Add Property . . . . . . . . . . . . . . 251--256
Tor Helleseth and
P. Vijay Kumar and
Abhijit Shanbhag Codes with the Same Weight Distributions
as the Goethals Codes and the
Delsarte-Goethals Codes . . . . . . . . 257--266
Wen-Ai Jackson and
Keith M. Martin Perfect Secret Sharing Schemes on Five
Participants . . . . . . . . . . . . . . 267--286
Wen-Ai Jackson and
Keith M. Martin and
Christine M. O'Keefe A Construction for Multisecret Threshold
Schemes . . . . . . . . . . . . . . . . 287--303
Ueli M. Maurer and
Yacov Yacobi A Non-interactive Public-Key
Distribution System . . . . . . . . . . 305--316
Cécile Huybrechts and
Antonio Pasini On $c^{n-2}.c^*$ geometries of order $2$ 317--330
Stephen D. Cohen The Length of Primitive BCH Codes with
Minimal Covering Radius . . . . . . . . 5--16
Jean Conan On the enumeration and generation of
nonweight equivalent rate $\frac 12$
convolutional codes . . . . . . . . . . 17--27
András Gács and
Péter Sziklai and
Tamás Sz\Honyi Two Remarks on Blocking Sets and Nuclei
in Planes of Prime Order . . . . . . . . 29--39
Noboru Hamada A Necessary and Sufficient Condition for
the Existence of Some Ternary $[n, k,
d]$ Codes Meeting the Greismer Bound . . 41--56
Gerhard Hiss On the Incidence Matrix of the Ree
Unital . . . . . . . . . . . . . . . . . 57--62
Marijn van Eupen and
Petr Lison\vek Classification of Some Optimal Ternary
Linear Codes of Small Length . . . . . . 63--84
A. J. van Zanten Lexicographic Order and Linearity . . . 85--97
Dieter Jungnickel Preface . . . . . . . . . . . . . . . . 107--107
Arrigo Bonisoli and
Gábor Korchmáros and
Tamás Szönyi Some Multiply Derived Translation Planes
with ${\rm SL}(2,5)$ as an Inherited
Collineation Group in the Translation
Complement . . . . . . . . . . . . . . . 109--114
Sabine Bouzette and
Francis Buekenhout and
Edmond Dony and
Alain Gottcheiner A Theory of Nets for Polyhedra and
Polytopes Related to Incidence
Geometries . . . . . . . . . . . . . . . 115--136
Claudia Broecker and
Ralph-Hardo Schulz and
Gernot Stroth Check Character Systems Using Chevalley
Groups . . . . . . . . . . . . . . . . . 137--143
Aiden A. Bruen and
David L. Wehlau Partitioning Quadrics, Symmetric Group
Divisible Designs and Caps . . . . . . . 145--155
A. R. Calderbank and
Gary M. McGuire Construction of a $(64,2^{37},12)$ code
via Galois rings . . . . . . . . . . . . 157--165
Robert S. Coulter and
Rex W. Matthews Planar Functions and Planes of
Lenz-Barlotti Class II . . . . . . . . . 167--184
Wen-Ai Jackson and
Peter R. Wild On GMW Designs and Cyclic Hadamard
Designs . . . . . . . . . . . . . . . . 185--191
Norman L. Johnson and
Guglielmo Lunardon Maximal Partial Spreads and Flocks . . . 193--202
Alan C. H. Ling and
Xiaojun Zhu and
Charles J. Colbourn and
Ronald C. Mullin Pairwise Balanced Designs with
Consecutive Block Sizes . . . . . . . . 203--222
Siu Lun Ma and
Bernhard Schmidt Difference Sets Corresponding to a Class
of Symmetric Designs . . . . . . . . . . 223--236
Rudolf Mathon and
Tran Van Trung Unitals and Unitary Polarities in
Symmetric Designs . . . . . . . . . . . 237--250
Klaus Metsch Embedding the Linear Structure of Planar
Spaces into Projective Spaces . . . . . 251--263
R. J. R. Abel and
Charles J. Colbourn and
Jianxing Yin and
Hantao Zhang Existence of incomplete transversal
designs with block size five and any
index $\lambda$ . . . . . . . . . . . . 275--307
Lynn Margaret Batten and
Kris Coolsaet and
Anne Penfold Street Blocking sets in $(v,\{2,4\},1)$-designs 309--314
Margaret Ann Bernard and
Bhu Dev Sharma Linear Codes with Non-Uniform Error
Correction Capability . . . . . . . . . 315--323
Diane Erdmann and
Sean Murphy An Approximate Distribution for the
Maximum Order Complexity . . . . . . . . 325--339
A. Faldum and
W. Willems Codes of Small Defect . . . . . . . . . 341--350
Alice E. D. Houston On the limit of maximal density of
sequences with a Perfect Linear
Complexity Profile . . . . . . . . . . . 351--359
Zhe-Xian Wan State Spaces of Convolutional Codes . . 361--369
Marco Buratti From a $(G, k, 1)$ to a $(Ck \oplus G,
k, 1)$ difference family . . . . . . . . 5--9
Marco Buratti On Resolvable Difference Families . . . 11--23
T. Aaron Gulliver and
Masaaki Harada Classification of Extremal Double
Circulant Formally Self-Dual Even Codes 25--35
E. R. Lamken The Existence of Partitioned Generalized
Balanced Tournament Designs with Block
Size $3$ . . . . . . . . . . . . . . . . 37--71
Siu Lun Ma and
Surinder K. Sehgal A Family of Semi-Regular Divisible
Difference Sets . . . . . . . . . . . . 73--78
Stephanie Perkins Codes with a Disparity Property . . . . 79--97
Carlo Blundo and
Alfredo de Santis and
Roberto de Simone and
Ugo Vaccaro Tight Bounds on the Information Rate of
Secret Sharing Schemes . . . . . . . . . 107--122
Malcolm Greig and
Julian Abel Resolvable Balanced Incomplete Block
Designs with Block Size $8$ . . . . . . 123--140
T. Aaron Gulliver and
Masaaki Harada Weight Enumerators of Double Circulant
Codes and New Extremal Self-Dual Codes 141--150
Patric R. J. Östergård and
Heikki O. Hämäläinen A New Table of Binary/Ternary Mixed
Covering Codes . . . . . . . . . . . . . 151--178
Eric R. Verheul and
Henk C. A. van Tilborg Constructions and properties of $k$ out
of $n$ visual secret sharing schemes . . 179--196
Jürgen Bierbrauer Universal Hashing and Geometric Codes 207--221
Simon R. Blackburn A Generalized Rational Interpolation
Problem and the Solution of the
Welch-Berlekamp Key Equation . . . . . . 223--234
C. Blundo and
A. Giorgio Gaggia and
D. R. Stinson On the Dealer's Randomness Required in
Secret Sharing Schemes . . . . . . . . . 235--259
A. E. Brouwer and
M. van Eupen The Correspondence Between Projective
Codes and $2$-weight Codes . . . . . . . 261--266
James A. Davis and
Surinder K. Sehgal Using the Simplex Code to Construct
Relative Difference Sets in $2$-groups 267--277
G. B. Khosrovshahi and
A. Nowzari-Dalini and
R. Torabi Trading Signed Designs and Some New
$4-(12, 5, 4)$ Designs . . . . . . . . . 279--288
A. Klapper Cross-Correlations of Quadratic Form
Sequences in Odd Characteristic . . . . 289--305
Iliya Boukliev Some New Optimal Ternary Linear Codes 5--11
Mike Burmester and
Yvo G. Desmedt and
Fred Piper and
Michael Walker A General Zero-Knowledge Scheme . . . . 13--37
Stefka Buyuklieva On the Binary Self-Dual Codes with an
Automorphism of Order $2$ . . . . . . . 39--48
R. Craigen and
H. Kharaghani Hadamard Matrices from Weighing Matrices
via Signed Groups . . . . . . . . . . . 49--58
F. Franek and
A. Rosa and
T. S. Griggs Large Sets of Mutually Almost Disjoint
Steiner Triple Systems Not From Steiner
Quadruple Systems . . . . . . . . . . . 59--67
J. L. Hayden Generalized Hadamard Matrices . . . . . 69--73
Xiang-Dong Hou The Reed--Muller code $R(1,7)$ is normal 75--82
Tatsuya Maruta On the Achievement of the Griesmer Bound 83--87
L. Storme Normal Rational Curves Over Prime Fields 89--96
Hanno Lefmann and
Pavel Pudlák and
Petr Savick\'y On Sparse Parity Check Matrices . . . . 107--130
Vladimir I. Levenshtein Split Orthogonal Arrays and Maximum
Independent Resilient Systems of
Functions . . . . . . . . . . . . . . . 131--160
Marten van Dijk A Linear Construction of Secret Sharing
Schemes . . . . . . . . . . . . . . . . 161--201
Evangelos Kranakis and
Paul C. Van Oorschot Introduction . . . . . . . . . . . . . . 213--213
Doug R. Stinson On Some Methods for Unconditionally
Secure Key Distribution and Broadcast
Encryption . . . . . . . . . . . . . . . 215--243
N. Rogier and
Pascal Chauvaud ${\rm MD}2$ is not secure without the
checksum byte . . . . . . . . . . . . . 245--251
Vincent Rijmen and
Bart Preneel and
Erik De Win On Weaknesses of Non-surjective Round
Functions . . . . . . . . . . . . . . . 253--266
J. Lee and
H. M. Heys and
S. E. Tavares Resistance of a CAST-Like Encryption
Algorithm to Linear and Differential
Cryptanalysis . . . . . . . . . . . . . 267--282
Carlisle M. Adams Constructing Symmetric Ciphers Using the
CAST Design Procedure . . . . . . . . . 283--316
R. Julian R. Abel and
Malcolm Greig Balanced Incomplete Block Designs with
Block Size $7$ . . . . . . . . . . . . . 5--30
E. F. Assmus, Jr. Linearly Derived Steiner Triple Systems 31--49
Aiden Bruen and
Lucien Haddad and
David Wehlau Caps and Colouring Steiner Triple
Systems . . . . . . . . . . . . . . . . 51--55
Gary McGuire and
Vladimir D. Tonchev and
Harold N. Ward Characterizing the Hermitian and Ree
Unitals on $28$ Points . . . . . . . . . 57--61
Helmut Siemon A number-theoretic conjecture and the
existence of $S$-cyclic Steiner
quadruple systems . . . . . . . . . . . 63--94
Darryn E. Bryant and
A. Khodkar On Orthogonal Double Covers of Graphs 103--105
L. R. A. Casse and
K. M. Martin and
P. R. Wild Bounds and Characterizations of
Authentication/Secrecy Schemes . . . . . 107--129
James A. Davis and
Jonathan Jedwab and
Miranda Mowbray New Families of Semi-Regular Relative
Difference Sets . . . . . . . . . . . . 131--146
J. Fitzgerald and
R. F. Lax Decoding affine variety codes using
Gröbner bases . . . . . . . . . . . . . . 147--158
Kirsten Mackenzie-Fleming A Recursive Construction for $2$-Designs 159--164
Noboru Hamada and
Marijn van Eupen The Nonexistence of Ternary $[38, 6,
23]$ Codes . . . . . . . . . . . . . . . 165--172
T. S. Michael and
W. D. Wallis Skew-Hadamard Matrices and the Smith
Normal Form . . . . . . . . . . . . . . 173--176
Ilene H. Morgan Equiorthogonal Frequency Hypercubes:
Preliminary Theory . . . . . . . . . . . 177--185
Pratima Panigrahi The collinearity graph of the $O^-(8,2)$
quadric is not geometrisable . . . . . . 187--198
Corrado Zanella Linear sections of the finite Veronese
varieties and authentication systems
defined using geometry . . . . . . . . . 199--212
Tsonka Stefanova Baicheva The Covering Radius of Ternary Cyclic
Codes with Length up to $25$ . . . . . . 223--227
J. J. Brennan and
Bruce Geist Analysis of iterated modular
exponentiation: the orbits of
$x^\alpha\bmod N$ . . . . . . . . . . . 229--245
Yu Qing Chen A Construction of Difference Sets . . . 247--250
Dragomir \vZ. \Dbarokovi\'c Note on Periodic Complementary Sets of
Binary Sequences . . . . . . . . . . . . 251--256
T. Aaron Gulliver and
Masaaki Harada Classification of Extremal Double
Circulant Self-Dual Codes of Lengths
$64$ to $72$ . . . . . . . . . . . . . . 257--269
Masaaki Harada New extremal type II codes over $\bold
Z_4$ . . . . . . . . . . . . . . . . . . 271--284
Ilia Krasikov and
Simon Litsyn Bounds on Spectra of Codes with Known
Dual Distance . . . . . . . . . . . . . 285--297
R. Safavi-Naini Three Systems for Threshold Generation
of Authenticators . . . . . . . . . . . 299--312
A. A. Zain and
B. Sundar Rajan Quasideterminant Characterization of MDS
Group Codes over Abelian Groups . . . . 313--330
F. E. Bennett and
J. Yin and
H. Zhang and
R. J. R. Abel Perfect Mendelsohn Packing Designs with
Block Size Five . . . . . . . . . . . . 5--22
Sergei V. Bezzateev and
Natalia A. Shekhunova A Subclass of Binary Goppa Codes With
Improved Estimation of the Code
Dimension . . . . . . . . . . . . . . . 23--38
David B. Jaffe and
Vladimir D. Tonchev Computing Linear Codes and Unitals . . . 39--52
Marc Joye and
Jean-Jacques Quisquater Reducing the Elliptic Curve Cryptosystem
of Meyer-Müller to the Cryptosystem of
Rabin-Williams . . . . . . . . . . . . . 53--56
Çetin K. Koç and
Tolga Acar Montgomery multiplication in ${\rm
GF}(2^k)$ . . . . . . . . . . . . . . . 57--69
Tero Laihonen and
Simon Litsyn On Upper Bounds for Minimum Distance and
Covering Radius of Non-binary Codes . . 71--80
A. Mahmoodi Existence of Perfect
$3$-Deletion-Correcting Codes . . . . . 81--87
Antonio Maschietti Difference Sets and Hyperovals . . . . . 89--98
Alexei Ashikhmin On Generalized Hamming Weights for
Galois Ring Linear Codes . . . . . . . . 107--126
Aiden A. Bruen and
Keldon Drudge On the non-existence of certain
Cameron-Liebler line classes in ${\rm
PG}(3, q)$ . . . . . . . . . . . . . . . 127--132
Claude Carlet and
Philippe Guillot An Alternate Characterization of the
Bentness of Binary Functions, with
Uniqueness . . . . . . . . . . . . . . . 133--140
Charles J. Colbourn and
Alan C. H. Ling Point Code Minimum Steiner Triple
Systems . . . . . . . . . . . . . . . . 141--146
Yury J. Ionin A Technique for Constructing Symmetric
Designs . . . . . . . . . . . . . . . . 147--158
Volker Müller and
Scott Vanstone and
Robert Zuccherato Discrete Logarithm Based Cryptosystems
in Quadratic Function Fields of
Characteristic $2$ . . . . . . . . . . . 159--178
Juriaan Simonis and
Alexei Ashikhmin Almost Affine Codes . . . . . . . . . . 179--197
Amir H. Banihashemi and
Amir K. Khandani An Inequality on the Coding Gain of
Densest Lattice Packings in Successive
Dimensions . . . . . . . . . . . . . . . 207--212
Harald Fripertinger Enumeration, Construction and Random
Generation of Block Codes . . . . . . . 213--219
Jingmin He and
Ed Dawson Shared Secret Reconstruction . . . . . . 221--237
Philippe Langevin Weights of Abelian Codes . . . . . . . . 239--245
Kenneth G. Paterson Root Counting, the DFT and the Linear
Complexity of Nonlinear Filtering . . . 247--259
Doug R. Stinson and
Tran Van Trung Some New Results on Key Distribution
Patterns and Broadcast Encryption . . . 261--279
Marten van Dijk and
Christian Gehrmann and
Ben Smeets Unconditionally Secure Group
Authentication . . . . . . . . . . . . . 281--296
Helmut Siemon Erratum: ``A number-theoretic conjecture
and the existence of $S$-cyclic Steiner
quadruple systems'' [Des. Codes
Cryptogr. \bf 13 (1998), no. 1, 63--94;
1 600 695] . . . . . . . . . . . . . . . 297--297
Anton Betten and
Adalbert Kerber and
Reinhard Laue and
Alfred Wassermann Simple $8$-Designs with Small Parameters 5--27
Roberto De Prisco and
Alfredo De Santis On Lower Bounds for the Redundancy of
Optimal Codes . . . . . . . . . . . . . 29--45
Wende Chen and
Torleiv Klòve Weight Hierarchies of Linear Codes
Satisfying the Chain Condition . . . . . 47--66
Christian Gehrmann Multiround Unconditionally Secure
Authentication . . . . . . . . . . . . . 67--86
Kaoru Kurosawa and
Koji Okada and
Hajime Saido and
Douglas R. Stinson New Combinatorial Bounds for
Authentication Codes and Key
Predistribution Schemes . . . . . . . . 87--100
Ross Anderson and
Cunsheng Ding and
Tor Helleseth and
Torleiv Klòve How to build robust shared control
systems . . . . . . . . . . . . . . . . 111--124
Claude Carlet and
Pascale Charpin and
Victor Zinoviev Codes, bent functions and permutations
suitable for DES-like cryptosystems . . 125--156
Wende Chen and
Zhi Chen and
Torleiv Klòve New constructions of disjoint distinct
difference sets . . . . . . . . . . . . 157--165
K. Chen and
L. Zhu Existence of $(q,6,1)$ difference
families with $q$ a prime power . . . . 167--173
Tor Helleseth and
P. Vijay Kumar and
Kyeongcheol Yang An infinite family of $3$-designs from
Preparata codes over ${Z}_4$ . . . . . . 175--181
Markku Kaikkonen Codes from affine permutation groups . . 183--186
A. A. I. Perera and
K. J. Horadam Cocyclic generalised Hadamard matrices
and central relative difference sets . . 187--200
Kyeongcheol Yang and
Tor Helleseth Two new infinite families of $3$-designs
from Kerdock codes over ${Z}_4$ . . . . 201--214
K. T. Arasu and
S. L. Ma Abelian Difference Sets Without
Self-conjugacy . . . . . . . . . . . . . 223--230
Simeon Ball Partial Unitals and Related Structures
in Desarguesian Planes . . . . . . . . . 231--236
M. C. Bhandari and
K. K. P. Chanduka and
A. K. Lal On Lower Bounds For Covering Codes . . . 237--243
Ivan N. Landjev The Nonexistence of Some Optimal Ternary
Codes of Dimension Five . . . . . . . . 245--258
Hiroyuki Ohmori and
Takashi Miyamoto Construction of Weighing Matrices
$(17,9)$ Having the Intersection Number
$8$ . . . . . . . . . . . . . . . . . . 259--269
Nabil Shalaby and
Jianxing Yin Nested Optimal $\lambda$-Packings and
$\lambda$-Coverings of Pairs with
Triples . . . . . . . . . . . . . . . . 271--278
Brett Stevens and
Lucia Moura and
Eric Mendelsohn Lower Bounds for Transversal Covers . . 279--299
Marten van Dijk and
Wen-Ai Jackson and
Keith M. Martin A General Decomposition Construction for
Incomplete Secret Sharing Schemes . . . 301--321
M. C. Bhandari and
M. K. Gupta and
A. K. Lal Some Results on NQR Codes . . . . . . . 5--9
Simon Blake-Wilson and
Kevin T. Phelps Constant Weight Codes and Group
Divisible Designs . . . . . . . . . . . 11--27
Alexander A. Davydov and
Patric R. J. Ostergaard New Linear Codes with Covering Radius
$2$ and Odd Basis . . . . . . . . . . . 29--39
Vikram Jha and
Norman Johnson Cyclic Ostrom Spreads . . . . . . . . . 41--51
Kaoru Kurosawa and
Wakaha Ogata Efficient Rabin-type Digital Signature
Scheme . . . . . . . . . . . . . . . . . 53--64
Patric R. J. Ostergård and
William D. Weakley Constructing Covering Codes with Given
Automorphisms . . . . . . . . . . . . . 65--73
Carles Padro and
Germán Sáez and
Jorge Luis Villar Detection of Cheaters in Vector Space
Secret Sharing Schemes . . . . . . . . . 75--85
Keisuke Shiromoto The Weight Enumerator of Linear Codes
over GF$(qm)$ Having Generator Matrix
over GF$(q)$ . . . . . . . . . . . . . . 87--92
A. Barg and
A. Ashikhmin Binomial Moments of the Distance
Distribution and the Probability of
Undetected Error . . . . . . . . . . . . 103--116
Marco Buratti Some $(17q, 17, 2)$ and $(25q, 25, 3)$
BIBD Constructions . . . . . . . . . . . 117--120
Paul Camion and
Anne Canteaut Correlation-Immune and Resilient
Functions Over a Finite Alphabet and
Their Applications in Cryptography . . . 121--149
Yves Edel and
Jürgen Bierbrauer $41$ is the Largest Size of a Cap in
${\rm PG}(4,4)$ . . . . . . . . . . . . 151--160
Graham Norton On Minimal Realization Over a Finite
Chain Ring . . . . . . . . . . . . . . . 161--178
Kevin T. Phelps and
Mike LeVan Switching Equivalence Classes of Perfect
Codes . . . . . . . . . . . . . . . . . 179--184
A. J. van Zanten and
Agung Lukito Construction of Certain Cyclic
Distance-Preserving Codes Having
Linear-Algebraic Characteristics . . . . 185--199
L. M. Batten and
J. M. Dover Some Sets of Type in Cubic Order Planes 211--213
Alexis Bonnecaze and
Bernard Mourrain and
Patrick Solé Jacobi Polynomials, Type II Codes, and
Designs . . . . . . . . . . . . . . . . 215--234
M. A. Chateauneuf and
Charles J. Colbourn and
D. L. Kreher Covering Arrays of Strength Three . . . 235--242
Sebastian Egner and
Thomas Beth How to Play $M_{13}$? . . . . . . . . . 243--247
John Friedlander and
Michael Larsen and
Daniel Lieman and
Igor Shparlinski On The Correlation Of Binary
$M$-sequences . . . . . . . . . . . . . 249--256
Philippe Gaborit and
Masaaki Harada Construction of Extremal Type II Codes
over ${\bf Z}_4$ . . . . . . . . . . . . 257--269
William J. Martin Designs in Product Association Schemes 271--289
Deirdre Longacher Smeltzer Properties of Codes from Difference Sets
in $2$-Groups . . . . . . . . . . . . . 291--306
Anonymous Guest Editorial . . . . . . . . . . . . 5--6
J. D. Key and
H. F. Mattson, Jr. Edward F. Assmus, Jr. (1931--1998) . . . 7--11
Anonymous Ed Assmus . . . . . . . . . . . . . . . 13--14
Aiden A. Bruen and
David L. Wehlau Long Binary Linear Codes and Large Caps
in Projective Space . . . . . . . . . . 37--60
Bernhard Schmidt Williamson Matrices and a Conjecture of
Ito's . . . . . . . . . . . . . . . . . 61--68
Yu Qing Chen On a Family of Covering Extended
Building Sets . . . . . . . . . . . . . 69--72
Harold N. Ward An Introduction to Divisible Codes . . . 73--79
Pascale Charpin and
Aimo Tietäväinen and
Victor Zinoviev On the Minimum Distances of Non-Binary
Cyclic Codes . . . . . . . . . . . . . . 81--85
G. Cohen and
J. Rif\`a and
J. Tena and
G. Zémor On the Characterization of Linear
Uniquely Decodable Codes . . . . . . . . 87--96
Joseph A. Thas and
Hendrik Van Maldeghem On Embeddings of the Flag Geometries of
Projective Planes in Finite Projective
Spaces . . . . . . . . . . . . . . . . . 97--104
Neil J. Calkin and
J. D. Key and
M. J. De Resmini Minimum Weight and Dimension Formulas
for Some Geometric Codes . . . . . . . . 105--120
Vladimir D. Tonchev Linear Perfect Codes and a
Characterization of the Classical
Designs . . . . . . . . . . . . . . . . 121--128
Jörg Eisfeld The Eigenspaces of the
Bose--Mesner-Algebras of the Association
Schemes corresponding to Projective
Spaces and Polar Spaces . . . . . . . . 129--150
Ray Hill An Extension Theorem for Linear Codes 151--157
Yury J. Ionin Building Symmetric Designs With Building
Sets . . . . . . . . . . . . . . . . . . 159--175
Hans Dobbertin Another Proof of Kasami's Theorem . . . 177--180
Anton Betten and
Reinhard Laue and
Alfred Wassermann A Steiner $5$-Design on $36$ Points . . 181--186
Willem H. Haemers and
René Peeters and
Jeroen M. van Rijckevorsel Binary Codes of Strongly Regular Graphs 187--209
Qing Xiang Maximally Nonlinear Functions and Bent
Functions . . . . . . . . . . . . . . . 211--218
Klaus Metsch A Bose-Burton Theorem for Elliptic Polar
Spaces . . . . . . . . . . . . . . . . . 219--224
J. F. Dillon Multiplicative Difference Sets via
Additive Characters . . . . . . . . . . 225--235
Simeon Ball and
Aart Blokhuis and
Christine M. O'Keefe On Unitals with Many Baer Sublines . . . 237--252
G. L. Ebert and
J. W. P. Hirschfeld Complete Systems of Lines on a Hermitian
Surface over a Finite Field . . . . . . 253--268
Tor Helleseth and
Victor Zinoviev On $Z_4$-Linear Goethals Codes and
Kloosterman Sums . . . . . . . . . . . . 269--288
Richard M. Wilson Signed Hypergraph Designs and Diagonal
Forms for Some Incidence Matrices . . . 289--297
A. Blokhuis and
A. E. Brouwer The Universal Embedding Dimension of the
Near Polygon on the $1$-Factors of a
Complete Graph . . . . . . . . . . . . . 299--303
James A. Davis and
Jonathan Jedwab A New Family of Relative Difference Sets
in $2$-Groups . . . . . . . . . . . . . 305--312
Dieter Jungnickel and
Jack van Lint Editorial . . . . . . . . . . . . . . . 5--6
K. T. Arasu and
N. J. Voss Answering a Question of Pott on Almost
Perfect Sequences . . . . . . . . . . . 7--10
Christine Bachoc On Harmonic Weight Enumerators of Binary
Codes . . . . . . . . . . . . . . . . . 11--28
Thierry P. Berger and
Pascale Charpin The Automorphism Groups of BCH Codes and
of Some Affine-Invariant Codes Over
Extension Fields . . . . . . . . . . . . 29--53
Wayne Broughton and
Gary McGuire Some Observations on Quasi-$3$ Designs
and Hadamard Matrices . . . . . . . . . 55--61
Matthew R. Brown and
Christine M. O'Keefe and
Tim Penttila Triads, Flocks of Conics and
$Q^{-(5,1)}$ . . . . . . . . . . . . . . 63--70
Gérard D. Cohen and
Sylvia B. Encheva and
Gilles Zémor Antichain Codes . . . . . . . . . . . . 71--80
Charles A. Cusack and
Spyros S. Magliveras Semiregular Large Sets . . . . . . . . . 81--87
D. de Caen and
E. R. van Dam Association Schemes Related to Kasami
Codes and Kerdock Sets . . . . . . . . . 89--102
Iwan Duursma and
Tor Helleseth and
Chunming Rong and
Kyeongcheol Yang Split Weight Enumerators for the
Preparata Codes with Applications to
Designs . . . . . . . . . . . . . . . . 103--124
J. E. Fields and
P. Gaborit and
W. C. Huffman and
V. Pless On the Classification of Extremal Even
Formally Self-Dual Codes . . . . . . . . 125--148
Shuhong Gao and
Jason Howell A General Polynomial Sieve . . . . . . . 149--157
Chat Yin Ho Incidence Matrices and Collineations of
Finite Projective Planes . . . . . . . . 159--162
H. Janwa and
H. F. Mattson, Jr. Some Upper Bounds on the Covering Radii
of Linear Codes Over and Their
Applications . . . . . . . . . . . . . . 163--181
G. B. Khosrovshahi and
Reza Naserasr Hypergraphical Codes Arising from Binary
Trades . . . . . . . . . . . . . . . . . 183--186
Rudolf Mathon and
Tran van Trung Directed $t$-Packings and Directed
$t$-Steiner Systems . . . . . . . . . . 187--198
Klaus Metsch and
L. Storme Partial $t$-Spreads in
$\mbox{PG}(2t+1,q)$ . . . . . . . . . . 199--216
Alan R. Prince Flag-Transitive Affine Planes of Order
$64$ . . . . . . . . . . . . . . . . . . 217--221
Mattias Svanström A Class of Perfect Ternary
Constant-Weight Codes . . . . . . . . . 223--229
Jack van Lint and
Ludo Tolhuizen On Perfect Ternary Constant Weight Codes 231--234
Tamás Szhonyi On the Embedding of $(k,p)$-Arcs is
Maximal Arcs . . . . . . . . . . . . . . 235--246
J. H. Dinitz and
E. R. Lamken HOPs and COPs: Room frames with
partitionable transversals . . . . . . . 5--26
Todd D. Vance A Gap in GRM Code Weight Distributions 27--43
Xian-Mo Zhang and
Yuliang Zheng and
Hideki Imai Relating Differential Distribution
Tables to Other Properties of
Substitution Boxes . . . . . . . . . . . 45--63
Neal Koblitz Guest Editorial . . . . . . . . . . . . 75--76
Simon Blake-Wilson Information Security, Mathematics, and
Public-Key Cryptography . . . . . . . . 77--99
Arjen K. Lenstra Integer Factoring . . . . . . . . . . . 101--128
Andrew Odlyzko Discrete Logarithms: The Past and the
Future . . . . . . . . . . . . . . . . . 129--145
Ueli M. Maurer and
Stefan Wolf The Diffie--Hellman Protocol . . . . . . 147--171
Neal Koblitz and
Alfred Menezes and
Scott Vanstone The State of Elliptic Curve Cryptography 173--193
Jerome A. Solinas Efficient Arithmetic on Koblitz Curves 195--249
Joseph H. Silverman The Xedni Calculus and the Elliptic
Curve Discrete Logarithm Problem . . . . 5--40
Michael J. Jacobson and
Neal Koblitz and
Joseph H. Silverman and
Andreas Stein and
Edlyn Teske Analysis of the Xedni Calculus Attack 41--64
James M. McQuillan Pencils of Hyperconics in Projective
Planes of Characteristic Two . . . . . . 65--71
Jacques Wolfmann Difference Sets in $Z_4^m$ and
$F_2^{2m}$ . . . . . . . . . . . . . . . 73--88
Ralph-Hardo Schulz and
Antonino Giorgio Spera Automorphisms of Constant Weight Codes
and of Divisible Designs . . . . . . . . 89--97
Grégoire Bommier and
Francis Blanchet Binary Quasi-Cyclic Goppa Codes . . . . 107--124
Graham H. Norton and
Ana Salagean-Mandache On the Key Equation Over a Commutative
Ring . . . . . . . . . . . . . . . . . . 125--141
Arrigo Bonisoli and
Antonio Cossidente Mixed Partitions of Projective
Geometries . . . . . . . . . . . . . . . 143--154
A. Halbutogullari and
C. K. Koc Parallel Multiplication in using
Polynomial Residue Arithmetic . . . . . 155--173
Jacques Patarin Cryptanalysis of the Matsumoto and Imai
Public Key Scheme of Eurocrypt'98 . . . 175--209
Charles J. Colbourn and
Sufang Zhao Maximum Kirkman Signal Sets for
Synchronous Uni-Polar Multi-User
Communication Systems . . . . . . . . . 219--227
Sylvia B. Encheva and
Gérard D. Cohen Linear Codes and Their Coordinate
Ordering . . . . . . . . . . . . . . . . 229--250
Xiang-dong Hou Bent Functions, Partial Difference Sets,
and Quasi-Frobenius Local Rings . . . . 251--268
Ari Juels and
Marcus Peinado Hiding Cliques for Cryptographic
Security . . . . . . . . . . . . . . . . 269--280
Satoshi Obana and
Kaoru Kurosawa Combinatorial Classification of Optimal
Authentication Codes with Arbitration 281--305
Pratima Panigrahi The Non-Collinearity Graph of the
$(8,2)$ Quadric Is Uniquely
Geometrisable . . . . . . . . . . . . . 307--317
Olga Polverino Small Blocking Sets in $\mbox{PG}(2, p)$ 319--324
Ching-Nung Yang and
Chi-Sung Laih New Colored Visual Secret Sharing
Schemes . . . . . . . . . . . . . . . . 325--336
Aart Blokhuis and
Willem H. Haemers Preface . . . . . . . . . . . . . . . . 5--5
N. G. de Bruijn Jaap Seidel 80 . . . . . . . . . . . . . 7--10
Béla Bajnok Spherical Designs and Generalized
Sum-Free Sets in Abelian Groups . . . . 11--18
R. D. Baker and
J. M. Dover and
G. L. Ebert and
K. L. Wantz Perfect Baer Subplane Partitions and
Three-Dimensional Flag-Transitive Planes 19--39
Peter Beelen and
Ruud Pellikaan The Newton Polygon of Plane Curves with
Many Rational Points . . . . . . . . . . 41--67
A. E. Brouwer Locally Paley Graphs . . . . . . . . . . 69--76
Frans C. Bussemaker and
Willem H. Haemers and
Edward Spence The Search for Pseudo Orthogonal Latin
Squares of Order Six . . . . . . . . . . 77--82
Edwin R. van Dam A Characterization of Association
Schemes from Affine Spaces . . . . . . . 83--86
Frank De Clerck and
Mario Delanote Two-Weight Codes, Partial Geometries and
Steiner Systems . . . . . . . . . . . . 87--98
Ralf Gramlich and
Hendrik Van Maldeghem Epimorphisms of Generalized Polygons
Part 1: Geometrical Characterizations 99--111
Yury J. Ionin and
M. S. Shrikhande Strongly Regular Graphs and Designs with
Three Intersection Numbers . . . . . . . 113--125
Aleksandar Jurivsic and
Jack Koolen A Local Approach to $1$-Homogeneous
Graphs . . . . . . . . . . . . . . . . . 127--147
Jack Koolen and
Monique Laurent and
Alexander Schrijver Equilateral Dimension of the Rectilinear
Space . . . . . . . . . . . . . . . . . 149--164
Johannes Maks and
Juriaan Simonis Optimal Subcodes of Second Order
Reed--Muller Codes and Maximal Linear
Spaces of Bivectors of Maximal Rank . . 165--180
William J. Martin Minimum Distance Bounds for $s$-Regular
Codes . . . . . . . . . . . . . . . . . 181--187
Bernhard Mühlherr On Isomorphisms between Coxeter Groups 189--189
L. J. Rylands and
D. E. Taylor Constructions for Octonion and
Exceptional Jordan Algebras . . . . . . 191--203
Akos Seress Large Families of Cospectral Graphs . . 205--208
Ron Shaw Subsets of $\mbox{PG}(n,2)$ and Maximal
Partial Spreads in $\mbox{PG}(4,2)$ . . 209--222
Irfan Siap and
Dijen K. Ray-Chaudhuri New Linear Codes Over and Improvements
on Bounds . . . . . . . . . . . . . . . 223--233
L. Storme and
Zs. Weiner On $1$-Blocking Sets in $\mbox{PG}(n,q),
n\geq 3$ . . . . . . . . . . . . . . . . 235--251
Akos Seress All Lambda-Designs With $\lambda = 2^p$
are Type-1 . . . . . . . . . . . . . . . 5--17
Antonio Cossidente and
Domenico Labbate and
Alessandro Siciliano Veronese Varieties Over Finite Fields
and Their Projections . . . . . . . . . 19--32
Sylvie Dubuc Characterization of Linear Structures 33--45
Satoshi Obana and
Kaoru Kurosawa Bounds and Combinatorial Structure of
$(k,n)$ Multi-Receiver $A$-Codes . . . . 47--63
Joan Daemen and
Lars R. Knudsen and
Vincent Rijmen Linear Frameworks for Block Ciphers . . 65--87
T. Aaron Gulliver and
Masaaki Harada Codes over and Improvements to the
Bounds on Ternary Linear Codes . . . . . 89--96
Andreas Enge and
Dieter Jungnickel Review . . . . . . . . . . . . . . . . . 97--99
Gretchen L. Matthews Weierstrass Pairs and Minimum Distance
of Goppa Codes . . . . . . . . . . . . . 107--121
Arne Winterhof Some Estimates for Character Sums and
Applications . . . . . . . . . . . . . . 123--131
D. R. Stinson Something About All or Nothing
(Transforms) . . . . . . . . . . . . . . 133--138
Harold N. Ward The Nonexistence of a $[207,4,165]$ Code
over ${\rm GF}(5)$ . . . . . . . . . . . 139--148
Kenichiro Tanabe A New Proof of the Assmus--Mattson
Theorem for Non-Binary Codes . . . . . . 149--155
Agnes V. Dizon-Garciano and
Yutaka Hiramine On Sylow Subgroups of Abelian Affine
Difference Sets . . . . . . . . . . . . 157--163
Tatsuya Maruta On the Nonexistence of $q$-ary Linear
Codes of Dimension Five . . . . . . . . 165--177
Norman L. Johnson Two-Transitive Parallelisms . . . . . . 179--189
U. Dempwolff Primitive Rank $3$ Groups on Symmetric
Designs . . . . . . . . . . . . . . . . 191--207
Michel Sebille There Exists a Simple Non Trivial
$t$-design with an Arbitrarily Large
Automorphism Group for Every $t$ . . . . 215--219
R. Ahlswede and
H. K. Aydinian and
L. H. Khachatrian On Perfect Codes and Related Concepts 221--237
R. Scheidler Cryptography in Quadratic Function
Fields . . . . . . . . . . . . . . . . . 239--264
Kaoru Kurosawa and
Satoshi Obana Combinatorial Bounds on Authentication
Codes with Arbitration . . . . . . . . . 265--281
Vikram Jha and
Norman L. Johnson Almost Desarguesian Maximal Partial
Spreads . . . . . . . . . . . . . . . . 283--304
Alexander A. Davydov New Constructions of Covering Codes . . 305--316
Karl Brincat On the Use of RSA as a Secret Key
Cryptosystem . . . . . . . . . . . . . . 317--329
Olof Heden A Maximal Partial Spread of Size $45$ in
${\rm PG}(3,7)$ . . . . . . . . . . . . 331--334
Igor Shparlinski On the Linear Complexity of the Power
Generator . . . . . . . . . . . . . . . 5--10
Koichi Betsumiya and
Masaaki Harada Binary Optimal Odd Formally Self-Dual
Codes . . . . . . . . . . . . . . . . . 11--22
Tadashi Wadayama and
Toru Hada and
Koichiro Wakasugi and
Masao Kasahara Upper and Lower Bounds on Maximum
Nonlinearity of $n$-input $m$-output
Boolean Function . . . . . . . . . . . . 23--34
Blessilda P. Raposa Some Triple Block Intersection Numbers
of Paley $2$-Designs of QN-type . . . . 35--52
Andreas Enge The Extended Euclidian Algorithm on
Polynomials, and the Computational
Efficiency of Hyperelliptic
Cryptosystems . . . . . . . . . . . . . 53--74
J. E. Iiams A Note on Certain 2-Groups with Hadamard
Difference Sets . . . . . . . . . . . . 75--80
Christophe Mouaha and
Gerhard Schiffels All $q^m$-ary Cyclic Codes with Cyclic
$q$-ary Image Are Known . . . . . . . . 81--98
Jianxing Yin A Combinatorial Construction for Perfect
Deletion-Correcting Codes . . . . . . . 99--110
I. Honkala and
A. Klapper Bounds for the Multicovering Radii of
Reed--Muller Codes with Applications to
Stream Ciphers . . . . . . . . . . . . . 131--146
Igor Shparlinski On Some Properties of the Shrinking
Generator . . . . . . . . . . . . . . . 147--156
Tor Helleseth and
P. Vijay Kumar and
Halvard Martinsen A New Family of Ternary Sequences with
Ideal Two-level Autocorrelation Function 157--166
T. Aaron Gulliver and
Nikolai Senkevitch Optimal Ternary Linear Rate $1/2$ Codes 167--172
Luke O'Connor On String Replacement Exponentiation . . 173--184
B. N. Cooperstein Hyperplane Sections of Kantor's Unitary
Ovoids . . . . . . . . . . . . . . . . . 185--196
Yves Edel and
Jürgen Bierbrauer Large Caps in Small Spaces . . . . . . . 197--212
Kenzi Akiyama On Certain Schur Rings of Dimension $4$ 213--222
Ilia Krasikov and
Simon Litsyn On the Distance Distributions of BCH
Codes and Their Duals . . . . . . . . . 223--232
Marco Buratti and
Fulvio Zuanni Perfect Cayley Designs as
Generalizations of Perfect Mendelsohn
Designs . . . . . . . . . . . . . . . . 233--248
J. A. Thas Characterizations of Translation
Generalized Quadrangles . . . . . . . . 249--258
C. Koukouvinos and
M. Mitrouli and
Jennifer Seberry Values of Minors of $(1,-1)$ Incidence
Matrices of SBIBDs and Their Application
to the Growth Problem . . . . . . . . . 267--282
N. A. Howgrave-Graham and
N. P. Smart Lattice Attacks on Digital Signature
Schemes . . . . . . . . . . . . . . . . 283--290
Sharad Sane A Proof of the Jungnickel-Tonchev
Conjecture on Quasi-Multiple
Quasi-Symmetric Designs . . . . . . . . 291--296
Marc Joye and
Jean-Jacques Quisquater and
Tsuyoshi Takagi How to Choose Secret Parameters for
RSA-Type Cryptosystems over Elliptic
Curves . . . . . . . . . . . . . . . . . 297--316
K. T. Arasu and
Yu Qing Chen A Difference Set in $(\mathbb{Z}/4
\mathbb{Z})^3 \times
\mathbb{Z}/5\mathbb{Z}$ . . . . . . . . 317--324
Koichi Betsumiya and
Masaaki Harada Classification of Formally Self-Dual
Even Codes of Lengths up to $16$ . . . . 325--332
Galina T. Bogdanova and
Andries E. Brouwer and
Stoian N. Kapralov and
Patric R. J. Östergård Error-Correcting Codes over an Alphabet
of Four Elements . . . . . . . . . . . . 333--342
Kanat S. Abdukhalikov Affine Invariant and Cyclic Codes over
$p$-adic Numbers and Finite Rings . . . 343--370
G. Hughes Structure Theorems for Group Ring Codes
with an Application to Self-Dual Codes 5--14
Houshou Chen and
John T. Coffey Trellis Structure and Higher Weights of
Extremal Self-Dual Codes . . . . . . . . 15--36
István Kovács On the Internal Nuclei of Sets in ${\rm
PG}(n,q)$, $q$ is Odd . . . . . . . . . 37--42
Chris Boner Maximal Weight Divisors of Projective
Reed--Muller Codes . . . . . . . . . . . 43--47
Siaw-Lynn Ng and
Michael Walker On the Composition of Matroids and Ideal
Secret Sharing Schemes . . . . . . . . . 49--67
D. Wu and
L. Zhu Generalized Steiner Systems with a Prime
Power . . . . . . . . . . . . . . . . . 69--80
P. Véron True Dimension of Some Binary Quadratic
Trace Goppa Codes . . . . . . . . . . . 81--97
Gabriele Nebe and
E. M. Rains and
N. J. A. Sloane The Invariants of the Clifford Groups 99--122
Martin Bokler Minimal Blocking Sets in Projective
Spaces of Square Order . . . . . . . . . 131--144
Amir K. Khandani and
M. Esmaeili Successive Minimization of the State
Complexity of the Self-dual Lattices
Using Korkin--Zolotarev Reduced Basis 145--158
Sönke Blunck On the Existence and Construction of
Tight Fourth Order Quadrature Rules for
the Sphere . . . . . . . . . . . . . . . 159--169
A. Baliga Cocyclic Codes of Length $40$ . . . . . 171--179
Kwok Yan Lam and
Francesco Sica The Weight Distribution of . . . . . . . 181--191
Iiro Honkala and
Tero Laihonen and
Sanna Ranto On Codes Identifying Sets of Vertices in
Hamming Spaces . . . . . . . . . . . . . 193--204
Simeon Ball and
Ray Hill and
Ivan Landjev and
Harold Ward On $(q^2 + q + 2, q + 2)$-arcs in the
Projective Plane . . . . . . . . . . . . 205--224
Zvonimir Janko and
Hadi Kharaghani and
Vladimir D. Tonchev The Existence of a Bush-Type Hadamard
Matrix of Order $324$ and Two New
Infinite Classes of Symmetric Designs 225--232
E. Ballico and
A. Cossidente Curves in Projective Spaces and Almost
MDS Codes . . . . . . . . . . . . . . . 233--237
Mariko Hagita and
Bernhard Schmidt Bijections Between Group Rings
Preserving Character Sums . . . . . . . 243--254
Carlo Blundo and
Annalisa De Bonis and
Alfredo De Santis Improved Schemes for Visual Cryptography 255--278
Igor E. Shparlinski and
Joseph H. Silverman On the Linear Complexity of the
Naor--Reingold Pseudo-random Function
from Elliptic Curves . . . . . . . . . . 279--289
Clement Lam and
Ying Miao Difference Families . . . . . . . . . . 291--304
H. Tapia-Recillas and
G. Vega An Upper Bound on the Number of
Iterations for Transforming a Boolean
Function of Degree Greater or Equal Than
$4$ to a Function of Degree $3$ . . . . 305--312
Nuh Aydin and
Irfan Siap and
Dijen K. Ray-Chaudhuri The Structure of $1$-Generator
Quasi-Twisted Codes and New Linear Codes 313--326
Wenbo Mao Verifiable Partial Escrow of Integer
Factors . . . . . . . . . . . . . . . . 327--342
Jeong-Heon Kim and
Hong-Yeop Song Trace Representation of Legendre
Sequences . . . . . . . . . . . . . . . 343--348
Stefka Bouyuklieva On the Automorphisms of Order $2$ with
Fixed Points for the Extremal Self-Dual
Codes of Length . . . . . . . . . . . . 5--13
Philip A. Eisen and
Douglas R. Stinson Threshold Visual Cryptography Schemes
with Specified Whiteness Levels of
Reconstructed Pixels . . . . . . . . . . 15--61
Arne Winterhof Polynomial Interpolation of the Discrete
Logarithm . . . . . . . . . . . . . . . 63--72
Etsuko Bannai and
Mitsuhiro Sawano Symmetric Designs Attached to
Four-Weight Spin Models . . . . . . . . 73--90
D. Brozovic and
C. Ho and
A. Munemasa A Correction to ``Incidence Matrices and
Collineations of Finite Projective
Planes'' by Chat Yin Ho, Designs, Codes
and Cryptography, 18 (1999), 159--162 91--93
T. Blackmore and
G. H. Norton Lower Bounds on the State Complexity of
Geometric Goppa Codes . . . . . . . . . 95--115
K. T. Arasu and
Warwick de Launey and
S. L. Ma On Circulant Complex Hadamard Matrices 123--142
S. Ferret and
L. Storme Minihypers and Linear Codes Meeting the
Griesmer Bound: Improvements to Results
of Hamada, Helleseth and Maekawa . . . . 143--162
Stelios Georgiou and
Masaaki Harada and
Christos Koukouvinos Orthogonal Designs and Type II Codes
over $\mathbb{Z}_{2k}$ . . . . . . . . . 163--174
Sergio Cabello and
Carles Padró and
Germán Sáez Secret Sharing Schemes with Detection of
Cheaters for a General Access Structure 175--188
Jürgen Bierbrauer The Theory of Cyclic Codes and a
Generalization to Additive Codes . . . . 189--206
Jorge Guajardo and
Christof Paar Itoh--Tsujii Inversion in Standard Basis
and Its Application in Cryptography and
Codes . . . . . . . . . . . . . . . . . 207--216
Ingrid Biehl and
Johannes Buchmann and
Safuat Hamdy and
Andreas Meyer A Signature Scheme Based on the
Intractability of Computing Roots . . . 223--236
Massimo Giulietti and
Fernanda Pambianco and
Fernando Torres and
Emanuela Ughi On Complete Arcs Arising from Plane
Curves . . . . . . . . . . . . . . . . . 237--246
Koen Thas A Theorem Concerning Nets Arising from
Generalized Quadrangles with a Regular
Point . . . . . . . . . . . . . . . . . 247--253
Luis Martínez and
Antonio Vera-López Ring-Valued Assignments to the Points of
a $t$-Design . . . . . . . . . . . . . . 255--262
C. Carlet and
Yu. Tarannikov Covering Sequences of Boolean Functions
and Their Cryptographic Significance . . 263--279
Carles Padró and
Ignacio Gracia and
Sebasti\`a Martín Molleví and
Paz Morillo Linear Key Predistribution Schemes . . . 281--298
John B. Polhill Constructions of Nested Partial
Difference Sets with Galois Rings . . . 299--309
Edoardo Ballico and
Antonio Cossidente Hermitian Veronesean Schemes . . . . . . 311--317
Charles J. Colbourn and
Douglas R. Stinson and
G. H. John van Rees Preface: In Honour of Ronald C. Mullin 5--6
R. Julian R. Abel and
F. E. Bennett and
G. Ge The Existence of Four HMOLS with Equal
Sized Holes . . . . . . . . . . . . . . 7--31
R. Julian R. Abel and
Iliya Bluskov and
Malcolm Greig Balanced Incomplete Block Designs with
Block Size $9$ and $\lambda=2,4,8$ . . . 33--59
R. T. Bilous and
G. H. J. van Rees An Enumeration of Binary Self-Dual Codes
of Length $32$ . . . . . . . . . . . . . 61--86
Ian F. Blake and
Theodoulos Garefalakis On the Security of the Digital Signature
Algorithm . . . . . . . . . . . . . . . 87--96
C. Blundo and
B. Masucci and
D. R. Stinson and
R. Wei Constructions and Bounds for
Unconditionally Secure Non-Interactive
Commitment Schemes . . . . . . . . . . . 97--110
Marco Buratti Cyclic Designs with Block Size $4$ and
Related Optimal Optical Orthogonal Codes 111--125
H. Cao and
L. Zhu Kirkman Packing Designs KPD$(3, 5*,v)$ 127--138
Chris Charnes and
Martin Rötteler and
Thomas Beth Homogeneous Bent Functions, Invariants,
and Designs . . . . . . . . . . . . . . 139--154
Yanxun Chang and
Ying Miao General Constructions for Double Group
Divisible Designs and Double Frames . . 155--168
Charles J. Colbourn and
E. R. Lamken and
Alan C. H. Ling and
W. H. Mills The Existence of Kirkman Squares ---
Doubly Resolvable $(v,3,1)$-BIBDs . . . 169--196
Peng Ding and
Jennifer D. Key Subcodes of the Projective Generalized
Reed--Muller Codes Spanned by
Minimum-Weight Vectors . . . . . . . . . 197--211
Marialuisa J. de Resmini and
Dina Ghinelli and
Dieter Jungnickel Arcs and Ovals from Abelian Groups . . . 213--228
Michael Drmota and
Daniel Panario A Rigorous Proof of the Waterloo
Algorithm for the Discrete Logarithm
Problem . . . . . . . . . . . . . . . . 229--241
F. Franek and
M. J. Grannell and
T. S. Griggs and
A. Rosa On Large Sets of $v-1$ L-Intersecting
Steiner Triple Systems of Order $v$ . . 243--256
Ryoh Fuji-Hara and
Ying Miao A Note on Geometric Structures of Linear
Ordered Orthogonal Arrays and
(T,M,S)-Nets of Low Strength . . . . . . 257--263
G. Ge and
R. S. Rees On Group-Divisible Designs with Block
Size Four and Group-Type gum1 . . . . . 5--24
Malcolm Greig Finite Linear Spaces II . . . . . . . . 25--47
Hans-Dietrich O. F. Gronau and
Martin Grüttmüller and
Sven Hartmann and
Uwe Leck and
Volker Leck On Orthogonal Double Covers of Graphs 49--91
M. J. Jacobson, Jr. and
H. C. Williams Modular Arithmetic on Elements of Small
Norm in Quadratic Fields . . . . . . . . 93--110
Clement Lam and
Vladimir D. Tonchev A New Bound on the Number of Designs
with Classical Affine Parameters . . . . 111--117
Rudolf Mathon and
Anne Penfold Street Partitioning Sets of Triples into Small
Planes . . . . . . . . . . . . . . . . . 119--130
Patric R. J. Östergård and
Petteri Kaski Enumeration of $2-(9, 3, \lambda)$
Designs and Their Resolutions . . . . . 131--137
Kevin T. Phelps and
Merc\`e Villanueva Ranks of $q$-Ary $1$-Perfect Codes . . . 139--144
Nabil Shalaby and
Jianmin Wang and
Jianxing Yin Existence of Perfect
$4$-Deletion-Correcting Codes with
Length Six . . . . . . . . . . . . . . . 145--156
Gustavus J. Simmons Parity Encoding of Binary Sequences . . 157--164
Brett Stevens and
Eric Mendelsohn Packing Arrays and Packing Designs . . . 165--176
Kevin T. Phelps and
Merc\`e Villanueva On Perfect Codes: Rank and Kernel . . . 183--194
Vikram Jha and
Norman L. Johnson Transversal-Free Translation Nets . . . 195--205
Wen-Guey Tzeng and
Chi-Ming Hu A New Approach for Visual Cryptography 207--227
S. Murphy and
M. J. B. Robshaw Key-Dependent S-Boxes and Differential
Cryptanalysis . . . . . . . . . . . . . 229--255
Patric R. J. Östergård A $2-(22, 8, 4)$ Design Cannot Have a
$2-(10, 4, 4)$ Subdesign . . . . . . . . 257--260
A. Ashikhmin and
A. Barg Bounds on the Covering Radius of Linear
Codes . . . . . . . . . . . . . . . . . 261--269
Fang-Wei Fu and
Victor K.-W. Wei Self-Complementary Balanced Codes and
Quasi-Symmetric Designs . . . . . . . . 271--279
K. J. Horadam and
P. Udaya A New Construction of Central Relative
$(p^a, p^a, p^a, 1)$-Difference Sets . . 281--295
Patric R. J. Östergård Classifying Subspaces of Hamming Spaces 297--305
David Pointcheval and
Guillaume Poupard A New $\mathcal{NP}$-Complete Problem
and Public-Key Identification . . . . . 5--31
Simon Joseph Agou and
Marc Deléglise and
Jean-Louis Nicolas Short Polynomial Representations for
Square Roots Modulo $p$ . . . . . . . . 33--44
Emily H. Moore and
Harriet Pollatsek Looking for Difference Sets in Groups
with Dihedral Images . . . . . . . . . . 45--50
P. Govaerts and
L. Storme On a Particular Class of Minihypers and
Its Applications. I. The Result for
General $q$ . . . . . . . . . . . . . . 51--63
V. Abatangelo and
B. Larato Doubly $\beta$-Derived Translation
Planes . . . . . . . . . . . . . . . . . 65--74
K. T. Arasu and
Kevin J. Player A New Family of Cyclic Difference Sets
with Singer Parameters in Characteristic
Three . . . . . . . . . . . . . . . . . 75--91
Xiang-dong Hou On Binary Resilient Functions . . . . . 93--112
Laurie Law and
Alfred Menezes and
Minghua Qu and
Jerry Solinas and
Scott Vanstone An Efficient Protocol for Authenticated
Key Agreement . . . . . . . . . . . . . 119--134
Sergei Konyagin and
Tanja Lange and
Igor Shparlinski Linear Complexity of the Discrete
Logarithm . . . . . . . . . . . . . . . 135--146
V. C. Mavron and
T. P. McDonough and
M. S. Shrikhande Quasi-Symmetric Designs with Good Blocks
and Intersection Number One . . . . . . 147--162
Stefka Bouyuklieva and
Masaaki Harada Extremal Self-Dual $[50, 25, 10]$ Codes
with Automorphisms of Order $3$ and
Quasi-Symmetric $2-(49, 9, 6)$ Designs 163--169
Koichi Betsumiya and
T. Aaron Gulliver and
Masaaki Harada Extremal Self-Dual Codes over
$\mathbb{F}_2 \times \mathbb{F}_2$ . . . 171--186
Sheng-bo Xu and
Jeroen Doumen and
Henk van Tilborg On the Security of Digital Signature
Schemes Based on Error-Correcting Codes 187--199
Svetla Nikova and
Ventzislav Nikov Improvement of the Delsarte Bound for
$\theta$-Designs When It Is Not the Best
Bound Possible . . . . . . . . . . . . . 201--222
Mida Guillermo and
Keith M. Martin and
Christine M. O'Keefe Providing Anonymity in Unconditionally
Secure Secret Sharing Schemes . . . . . 227--245
Dong-Joon Shin and
P. Vijay Kumar and
Tor Helleseth $3$-Designs from the $Z_4$-Goethals
Codes via a New Kloosterman Sum Identity 247--263
Tor Helleseth and
Torleiv Klòve and
Vladimir I. Levenshtein Hypercubic $4$ and $5$-Designs from
Double-Error-Correcting BCH Codes . . . 265--282
David Masson Designs and Representation of the
Symmetric Group . . . . . . . . . . . . 283--302
Klaus Huber Taking $p$th Roots Modulo Polynomials
over Finite Fields . . . . . . . . . . . 303--311
A. Blokhuis and
J. W. P. Hirschfeld and
D. Jungnickel and
J. A. Thas Finite Geometries . . . . . . . . . . . 5--5
A. Aguglia and
A. Cossidente and
G. L. Ebert Complete Spans on Hermitian Varieties 7--15
R. Ahlswede and
H. Aydinian and
L. H. Khachatrian Forbidden $(0,1)$-Vectors in Hyperplanes
of $\mathbb{R}^n$: The Restricted Case 17--28
Rudolf Ahlswede and
Levon Khachatrian Cone Dependence --- a Basic
Combinatorial Concept . . . . . . . . . 29--40
Laura Bader and
Nicola Durante and
Maska Law and
Guglielmo Lunardon and
Tim Penttila Symmetries of BLT-Sets . . . . . . . . . 41--50
Thomas Beth and
Christopher Charnes and
Markus Grassl and
Gernot Alber and
Aldo Delgado and
Michael Mussinger A New Class of Designs Which Protect
against Quantum Jumps . . . . . . . . . 51--70
Jürgen Bierbrauer and
Stefano Marcugini and
Fernanda Pambianco Projective Planes, Coverings and a
Network Problem . . . . . . . . . . . . 71--89
Aart Blokhuis and
Tamás Sz\Honyi and
Zsuzsa Weiner On Sets without Tangents in Galois
Planes of Even Order . . . . . . . . . . 91--98
Yves Edel and
Jürgen Bierbrauer The Largest Cap in AG$(4, 4)$ and Its
Uniqueness . . . . . . . . . . . . . . . 99--104
S. Ferret and
L. Storme Results on Maximal Partial Spreads in
PG$(3, p^3)$ and on Related Minihypers 105--122
András Gács and
Tamás Sz\Honyi On Maximal Partial Spreads in PG$(n, q)$ 123--129
András Gács and
Zsuzsa Weiner On $(q + t, t)$-Arcs of Type $(0, 2, t)$ 131--139
P. Govaerts and
D. Jungnickel and
L. Storme and
J. A. Thas Some New Maximal Sets of Mutually
Orthogonal Latin Squares . . . . . . . . 141--147
Gohar M. Kyureghyan and
Alexander Pott On the Linear Complexity of the
Sidelnikov--Lempel--Cohn--Eastman
Sequences . . . . . . . . . . . . . . . 149--164
I. Landjev and
A. Rousseva and
T. Maruta and
R. Hill On Optimal Codes Over the Field with
Five Elements . . . . . . . . . . . . . 165--175
Dimitri Leemans The Residually Weakly Primitive
Geometries of M$_{22}$ . . . . . . . . . 177--178
D. Luyckx and
J. A. Thas On $1$-Systems of Q$(6, q)$, $q$ Even 179--197
Hendrik van Maldeghem Some Remarks on Steiner Systems . . . . 199--213
Klaus Metsch On the Characterization of the Folded
Halved Cubes by Their Intersection
Arrays . . . . . . . . . . . . . . . . . 215--225
Koen Thas Symmetry in Generalized Quadrangles . . 227--245
Vladimir D. Tonchev A Note on MDS Codes, $n$-Arcs and
Complete Designs . . . . . . . . . . . . 247--250
Siaw-Lynn Ng A Representation of a Family of Secret
Sharing Matroids . . . . . . . . . . . . 5--19
Maria Axenovich and
Zoltán Füredi Exact Bounds on the Sizes of Covering
Codes . . . . . . . . . . . . . . . . . 21--38
Shengli Liu and
Henk C. A. Van Tilborg and
Marten Van Dijk A Practical Protocol for Advantage
Distillation and Information
Reconciliation . . . . . . . . . . . . . 39--62
Keith E. Mellinger A Geometric Relationship Between
Equivalent Spreads . . . . . . . . . . . 63--71
Cunsheng Ding and
Mordecai Golin and
Torleiv Klòve Meeting the Welch and Karystinos-Pados
Bounds on DS-CDMA Binary Signature Sets 73--84
Antonia W. Bluher On $x^6 + x + a$ in Characteristic Three 85--95
Iliya Bouyukliev and
Juriaan Simonis Some New Results on Optimal Codes Over
$F^5$ . . . . . . . . . . . . . . . . . 97--111
San Ling and
Patrick Solé On the Algebraic Structure of
Quasi-cyclic Codes II: Chain Rings . . . 113--130
H. Kharaghani On a Class of Symmetric Balanced
Generalized Weighing Matrices . . . . . 139--149
Daniel B. Dalan New Extremal Type I Codes of Lengths
$40$, $42$, and $44$ . . . . . . . . . . 151--157
Massimiliano Sala Upper Bounds on the Dual Distance of
BCH$(255, k)$ . . . . . . . . . . . . . 159--168
Kenichiro Tanabe A Criterion for Designs in $Z_4$-codes
on the Symmetrized Weight Enumerator . . 169--185
Jon-Lark Kim and
Vera Pless Designs in Additive Codes over GF$(4)$ 187--199
Phong Q. Nguyen and
Igor E. Shparlinski The Insecurity of the Elliptic Curve
Digital Signature Algorithm with
Partially Known Nonces . . . . . . . . . 201--217
I. Cardinali and
O. Polverino and
R. Trombetti On the Sporadic Semifield Flock . . . . 219--226
Palash Sarkar and
Paul J. Schellenberg Construction of Symmetric Balanced
Squares with Blocksize More than One . . 235--280
Detlef Hühnlein and
Michael J. Jacobson, Jr. and
Damian Weber Towards Practical Non-Interactive
Public-Key Cryptosystems Using
Non-Maximal Imaginary Quadratic Orders 281--299
Ederlina G. Nocon On the Construction of Some Type II
Codes over $Z_4 \times Z_4$ . . . . . . 301--323
David B. Chandler and
Qing Xiang Cyclic Relative Difference Sets and
their $p$-Ranks . . . . . . . . . . . . 325--343
Yves Edel Extensions of Generalized Product Caps 5--14
J. Barát and
A. Del Fra and
S. Innamorati and
L. Storme Minimal Blocking Sets in PG$(2, 8)$ and
Maximal Partial Spreads in PG$(3, 8)$ 15--26
Hans Georg Schaathun A Lower Bound on the Greedy Weights of
Product Codes . . . . . . . . . . . . . 27--42
David G. Glynn On the Orthogonality of Geometric Codes 43--50
Jovan Dj. Goli\'c and
Renato Menicocci Correlation Analysis of the Alternating
Step Generator . . . . . . . . . . . . . 51--74
Dong-Joon Shin and
P. Vijay Kumar and
Tor Helleseth An Assmus--Mattson-Type Approach for
Identifying $3$-Designs from Linear
Codes over Z$_4$ . . . . . . . . . . . . 75--92
Ingrid Biehl and
Sacher Paulus and
Tsuyoshi Takagi Efficient Undeniable Signature Schemes
Based on Ideal Arithmetic in Quadratic
Orders . . . . . . . . . . . . . . . . . 99--123
Tran Van Trung and
Sosina Martirosyan On a Class of Traceability Codes . . . . 125--132
S. Rajola and
M. Scafati Tallini Affine Planes and Flag Linear Spaces . . 133--137
T. Aaron Gulliver and
Masaaki Harada On the Minimum Weight of Codes over
$F_5$ Constructed from Certain
Conference Matrices . . . . . . . . . . 139--145
Pantelimon St\uanic\ua and
Soo Hak Sung Boolean Functions with Five Controllable
Cryptographic Properties . . . . . . . . 147--157
U. Dempwolff Affine Rank $3$ Groups on Symmetric
Designs . . . . . . . . . . . . . . . . 159--168
Michael E. O'Sullivan On Koetter's Algorithm and the
Computation of Error Values . . . . . . 169--188
David A. Drake and
Kevin Keating Ovals and Hyperovals in Desarguesian
Nets . . . . . . . . . . . . . . . . . . 195--212
Peter Sin The $p$-Rank of the Incidence Matrix of
Intersecting Linear Subspaces . . . . . 213--220
Andreas Klein Partial Ovoids in Classical Finite Polar
Spaces . . . . . . . . . . . . . . . . . 221--226
Andrew Klapper and
Jinzhong Xu Register Synthesis for Algebraic
Feedback Shift Registers Based on
Non-Primes . . . . . . . . . . . . . . . 227--250
Matthew R. Brown and
Christine M. O'Keefe and
S. E. Payne and
Tim Penttila and
Gordon F. Royle Spreads of $T_2(o)$, $\alpha$-flocks and
Ovals . . . . . . . . . . . . . . . . . 251--282
Klaus Metsch Small Point Sets that Meet All
Generators of $W(2 n +1, q)$ . . . . . . 283--288
Gloria Rinaldi Key Distribution Patterns Using Tangent
Circle Structures . . . . . . . . . . . 289--300
Siguna Müller On the Computation of Square Roots in
Finite Fields . . . . . . . . . . . . . 301--312
Sergey V. Avgustinovich and
Olof Heden and
Faina I. Solov'eva The Classification of Some Perfect Codes 313--318
Anonymous Preface . . . . . . . . . . . . . . . . 5--6
Anonymous List of Participants . . . . . . . . . . 7--8
Simeon Ball and
John Bamberg and
Michel Lavrauw and
Tim Penttila Symplectic Spreads . . . . . . . . . . . 9--14
Carlo Blundo and
Paolo D'Arco and
Alfredo De Santis and
Massimiliano Listo Design of Self-Healing Key Distribution
Schemes . . . . . . . . . . . . . . . . 15--44
Julia M. N. Brown On the Action of the Groups
$\mbox{GL}(n+1,q)$, $\mbox{PGL}(n + 1,
q)$, $\mbox{SL}(n + 1, q)$ and
$\mbox{PSL}(n + 1, q)$ on $\mbox{PG}(n,
q^t)$ . . . . . . . . . . . . . . . . . 45--50
Wensong Chu and
Charles J. Colbourn and
Peter Dukes Constructions for Permutation Codes in
Powerline Communications . . . . . . . . 51--64
Charles J. Colbourn and
Alan C. H. Ling and
Violet R. Syrotiuk Cover-Free Families and
Topology-Transparent Scheduling for
MANETs . . . . . . . . . . . . . . . . . 65--95
A. Cossidente and
M. J. de Resmini Remarks on Singer Cyclic Groups and
Their Normalizers . . . . . . . . . . . 97--102
F. De Clerck and
M. Delanote On $(0,\alpha)$-Geometries and Dual
Semipartial Geometries Fully Embedded in
an Affine Space . . . . . . . . . . . . 103--110
Nikias de Feyter Planar Oval Sets in Desarguesian Planes
of Even Order . . . . . . . . . . . . . 111--119
D. Deng and
D. R. Stinson and
R. Wei The Lovász Local Lemma and Its
Applications to some Combinatorial
Arrays . . . . . . . . . . . . . . . . . 121--134
A. De Santis and
B. Masucci Anonymous Membership Broadcast Schemes 135--151
S. De Winter and
J. A. Thas SPG-Reguli Satisfying the Polar Property
and a New Semipartial Geometry . . . . . 153--166
David A. Drake and
Wendy Myrvold Nets of Small Degree Without Ovals . . . 167--183
Z. Eslami and
G. B. Khosrovshahi and
M. M. Noori Enumeration of $t$-Designs Through
Intersection Matrices . . . . . . . . . 185--191
S. Georgiou and
C. Koukouvinos Self-Orthogonal and Self-Dual Codes
Constructed via Combinatorial Designs
and Diophantine Equations . . . . . . . 193--206
M. I. González Vasco and
D. Hofheinz and
C. Martínez and
R. Steinwandt On the Security of Two Public Key
Cryptosystems Using Non-Abelian Groups 207--216
Otokar Gro\vsek and
Peter Horák and
Tran van Trung On Non-Polynomial Latin Squares . . . . 217--226
Yury J. Ionin Regular Hadamard Matrices Generating
Infinite Families of Symmetric Designs 227--233
G. B. Khosrovshahi and
B. Tayfeh-Rezaie Some Indecomposable $t$-Designs . . . . 235--238
G. Korchmáros and
A. Sonnino Hyperbolic Ovals in Finite Planes . . . 239--249
Selda Kücçükcçìfcçì and
C. C. Lindner Minimum Covering for Hexagon Triple
Systems . . . . . . . . . . . . . . . . 251--265
Domenico Labbate Amalgams of Cubic Bipartite Graphs . . . 267--275
Reinhard Laue Resolvable $t$-Designs . . . . . . . . . 277--301
X. Ma and
R. Wei On a Bound of Cover-Free Families . . . 303--321
Sosina Martirosyan and
Tran van Trung On $t$-Covering Arrays . . . . . . . . . 323--339
Keith E. Mellinger LDPC Codes from Triangle-Free Line Sets 341--350
Alan Offer and
Hendrik Van Maldeghem Spreads and Ovoids Translation with
Respect to Disjoint Flags . . . . . . . 351--367
Tanya E. Seidel and
Daniel Socek and
Michal Sramka Parallel Symmetric Attack on NTRU using
Non-Deterministic Lattice Reduction . . 369--379
R. Shaw and
N. A. Gordon The Quintic Grassmannian $G_{1, 4, 2}$
in $\mbox{PG}(9, 2)$ . . . . . . . . . . 381--396
János Barát and
Leo Storme Multiple Blocking Sets in
$\mbox{PG}(n,q), n > 3$ . . . . . . . . . 5--21
Jong-Seon No and
Dong-Joon Shin and
Tor Helleseth On the $p$-Ranks and Characteristic
Polynomials of Cyclic Difference Sets 23--37
Tor Helleseth and
Johannes Mykkeltveit A Proof of Simmons' Conjecture . . . . . 39--43
Steven T. Dougherty and
Keisuke Shiromoto Maximum Distance Codes in
$\mbox{Mat}_{n,s} (Z_k)$ with a
Non-Hamming Metric and Uniform
Distributions . . . . . . . . . . . . . 45--61
David A. Drake and
Wendy Myrvold The Non-Existence of Maximal Sets of
Four Mutually Orthogonal Latin Squares
of Order $8$ . . . . . . . . . . . . . . 63--69
Harold N. Ward A Sequence of Unique Quaternary Griesmer
Codes . . . . . . . . . . . . . . . . . 71--85
Conchita Martínez-Pérez and
Wolfgang Willems On the Weight Hierarchy of Product Codes 95--108
Wilfried Meidl How Many Bits have to be Changed to
Decrease the Linear Complexity? . . . . 109--122
Mark Goresky and
Andrew Klapper Periodicity and Correlation Properties
of $d$-FCSR Sequences . . . . . . . . . 123--148
Masaaki Harada and
Michio Ozeki and
Kenichiro Tanabe On the Covering Radius of Ternary
Extremal Self-Dual Codes . . . . . . . . 149--158
J. L. Hayden Eigenvalues of Finite Projective Planes
with an Abelian Cartesian Group . . . . 159--172
Lucio Guerra and
Rita Vincenti On the Linear Codes Arising from
Schubert Varieties . . . . . . . . . . . 173--180
Wiebke S. Diestelkamp Parameter Inequalities for Orthogonal
Arrays with Mixed Levels . . . . . . . . 187--197
Jong-Seon No New Cyclic Difference Sets with Singer
Parameters Constructed from
$d$-Homogeneous Functions . . . . . . . 199--213
María Isabel González Vasco and
Consuelo Martínez and
Rainer Steinwandt Towards a Uniform Description of Several
Group Based Cryptographic Primitives . . 215--226
Cunsheng Ding and
Xiaojian Tian Three Constructions of Authentication
Codes with Perfect Secrecy . . . . . . . 227--239
Carlo Blundo and
Sebasti\`a Martín and
Barbara Masucci and
CarlEs Padró A Linear Algebraic Approach to Metering
Schemes . . . . . . . . . . . . . . . . 241--260
Alfred Menezes and
Nigel Smart Security of Signature Schemes in a
Multi-User Setting . . . . . . . . . . . 261--274
Joseph L. Yucas and
Gary L. Mullen Self-Reciprocal Irreducible Polynomials
Over Finite Fields . . . . . . . . . . . 275--281
Tatsuya Maruta and
Ivan N. Landjev and
Assya Rousseva On the Minimum Size of Some Minihypers
and Related Linear Codes . . . . . . . . 5--15
Jaume Martí-Farré and
Carles Padró Secret Sharing Schemes with Three or
Four Minimal Qualified Subsets . . . . . 17--34
Ferruh Özbudak Elements of Prescribed Order, Prescribed
Traces and Systems of Rational Functions
Over Finite Fields . . . . . . . . . . . 35--54
Michael Braun and
Adalbert Kerber and
Reinhard Laue Systematic Construction of $q$-Analogs
of $t-(v, k,\lambda)$-Designs . . . . . 55--70
Masaaki Harada and
Clement Lam and
Vladimir D. Tonchev Symmetric $(4,4)$-Nets and Generalized
Hadamard Matrices Over Groups of Order
$4$ . . . . . . . . . . . . . . . . . . 71--87
Bikash Kumar Dey and
B. Sundar Rajan $F_q$-linear Cyclic Codes over $F^m_q$:
DFT Approach . . . . . . . . . . . . . . 89--116
Gennian Ge and
Alan C. H. Ling Group Divisible Designs with Block Size
Four and Group Type $g^u m^1$ with
Minimum $m$ . . . . . . . . . . . . . . 117--126
Aart Blokhuis and
Willem Haemers Preface . . . . . . . . . . . . . . . . 135--135
Edwin R. Van Dam The Combinatorics of Dom de Caen . . . . 137--148
D. De Caen and
D. Fon-Der-Flaass Distance Regular Covers of Complete
Graphs from Latin Squares . . . . . . . 149--153
K. Coolsaet and
J. Degraer A Computer-Assisted Proof of the
Uniqueness of the Perkel Graph . . . . . 155--171
Bang Sejeong and
J. H. Koolen Some Interlacing Results for the
Eigenvalues of Distance-regular graphs 173--186
Hirasaka On Meta-Thin Association Schemes . . . . 187--201
Ron Shaw and
Johannes G. Maks and
Neil A. Gordon The Classification of Flats in which are
External to the Grassmannian . . . . . . 203--227
Dragos Cvetkovi\'c and
Peter Rowlinson and
Slobodan K. Simi\'c Graphs With Least Eigenvalue $-2$: a New
Proof of the $31$ Forbidden Subgraphs
Theorem . . . . . . . . . . . . . . . . 229--240
Brian Curtin Algebraic Characterizations of Graph
Regularity Conditions . . . . . . . . . 241--248
Mikhail Muzychuk and
István Kovács A Solution of a Problem of A. E. Brouwer 249--264
Ákos Seress Square-Free Non-Cayley Numbers. On
Vertex-Transitive Non-Cayley Graphs of
Square-Free Order . . . . . . . . . . . 265--281
Joseph A. Thas and
Hendrik Van Maldeghem Some Characterizations of Finite
Hermitian Veroneseans . . . . . . . . . 283--293
R. D. Baker and
G. L. Ebert and
Tim Penttila Hyperbolic Fibrations and $q$-Clans . . 295--305
Paul Terwilliger Two Linear Transformations each
Tridiagonal with Respect to an
Eigenbasis of the other; Comments on the
Parameter Array . . . . . . . . . . . . 307--332
Hans Cuypers A Note on the Tight Spherical $7$-Design
in and $5$-Design in . . . . . . . . . . 333--337
Klaus Metsch Blocking Structures of Hermitian
Varieties . . . . . . . . . . . . . . . 339--360
Jovan Dj. Goli\'c and
Philip Hawkes Vectorial Approach to Fast Correlation
Attacks . . . . . . . . . . . . . . . . 5--19
John P. Mcsorley and
N. C. K. Phillips and
W. D. Wallis and
others Double Arrays, Triple Arrays and
Balanced Grids . . . . . . . . . . . . . 21--45
Wen-Guey Tzeng and
Zhi-Jia Tzeng A Public-Key Traitor Tracing Scheme with
Revocation Using Dynamic Shares . . . . 47--61
Thierry P. Berger and
Pierre Loidreau How to Mask the Structure of Codes for a
Cryptographic Use . . . . . . . . . . . 63--79
Olgica Milenkovic Support Weight Enumerators and Coset
Weight Distributions of Isodual Codes 81--109
Florian Hess and
Igor E. Shparlinski On the Linear Complexity and
Multidimensional Distribution of
Congruential Generators over Elliptic
Curves . . . . . . . . . . . . . . . . . 111--117
Daniel R. L. Brown Generic Groups, Collision Resistance,
and ECDSA . . . . . . . . . . . . . . . 119--152
Rafa\l Bia\lota and
Grzegorz Kawa Modified Alternating
$\stackrel{\rightarrow}{k}$ generators 159--174
Tatsuya Maruta Extendability of Ternary Linear Codes 175--190
Mingyuan Xia and
Tianbing Xia and
Jennifer Seberry A New Method for Constructing Williamson
Matrices . . . . . . . . . . . . . . . . 191--209
Cícero Carvalho and
Fernando Torres On Goppa Codes and Weierstrass Gaps at
Several Points . . . . . . . . . . . . . 211--225
Tran Van Trung and
Sosina Martirosyan New Constructions for IPP Codes . . . . 227--239
Patric R. J. Östergård and
Jörn Quistorff and
Alfred Wassermann New Results on Codes with Covering
Radius $1$ and Minimum Distance $2$ . . 241--250
Petr Lisonek and
Mahadad Khatirinejad A Family of Complete Caps in ${\rm
PG}(n,2)$ . . . . . . . . . . . . . . . 259--270
Harri Haanpää and
Petteri Kaski The Near Resolvable $2-(13, 4, 3)$
Designs and Thirteen-Player Whist
Tournaments . . . . . . . . . . . . . . 271--285
G. E. Gennian and
C. W. H. Lam and
Alan C. H. Ling and
others Resolvable Maximum Packings with
Quadruples . . . . . . . . . . . . . . . 287--302
Yury J. Ionin and
Hadi Kharaghani A Recursive Construction for New
Symmetric Designs . . . . . . . . . . . 303--310
Stelvio Cimato and
Roberto De Prisco and
Alfredo De Santis Optimal Colored Threshold Visual
Cryptography Schemes . . . . . . . . . . 311--335
D. Luyckx and
J. A. Thas Trialities and $1$-Systems of $Q^+(7,q)$ 337--352
S. G. Barwick and
Wen-Ai Jackson and
Keith M. Martin A General Approach to Robust Web
Metering . . . . . . . . . . . . . . . . 5--27
John C. Galati On the Non-existence of Semiregular
Relative Difference Sets in Groups with
All Sylow Subgroups Cyclic . . . . . . . 29--31
Mathieu Ciet and
Marc Joye Elliptic Curve Cryptosystems in the
Presence of Permanent and Transient
Faults . . . . . . . . . . . . . . . . . 33--43
Carl Bracken and
Gary Mcguire Characterization of SDP Designs That
Yield Certain Spin Models . . . . . . . 45--52
Iuon-Chang Lin and
Min-Shiang Hwang and
Chin-Chen Chang The General Pay-Word: a Micro-payment
Scheme Based on $n$-dimension One-way
Hash Chain . . . . . . . . . . . . . . . 53--67
J. Löfvenberg Binary Fingerprinting Codes . . . . . . 69--81
L. Ji and
D. Wu and
L. Zhu Existence of Generalized Steiner Systems
$\mathrm{GS}(2,4,\nu,2)$ . . . . . . . . 83--99
J. Eisfeld and
L. Storme and
P. Sziklai On the Spectrum of the Sizes of Maximal
Partial Line Spreads in
$\mathrm{PG}(2n,q), n \geq 3$ . . . . . 101--110
J. De Kaey On a More General Characterisation of
Steiner Systems . . . . . . . . . . . . 117--129
P. Langevin and
J.-P. Zanotti Nonlinearity of Some Invariant Boolean
Functions . . . . . . . . . . . . . . . 131--146
F. L. Chiera Type II Codes over $ \mathbb{Z} / 2 k
\mathbb{Z} $, Invariant Rings and Theta
Series . . . . . . . . . . . . . . . . . 147--158
Shenglin Zhou Block Primitive $2-(v,k,1)$ Designs
Admitting a Ree Group of Characteristic
Two . . . . . . . . . . . . . . . . . . 159--169
Ka Hin Leung and
Bernhard Schmidt The Field Descent Method . . . . . . . . 171--188
Claude Carlet Concatenating Indicators of Flats for
Designing Cryptographic Functions . . . 189--202
Vikram Jha Local Schur's Lemma and Commutative
Semifields . . . . . . . . . . . . . . . 203--216
Manish K. Gupta and
Mahesh C. Bhandari and
Arbind K. Lal On Linear Codes over $\mathbb{Z}_2^s$ 227--244
Ezra Brown and
Bruce T. Myers and
Jerome A. Solinas Hyperelliptic Curves with Compact
Parameters . . . . . . . . . . . . . . . 245--261
Keith M. Martin and
Rei Safavi-Naini and
Huaxiong Wang and
Peter R. Wild Distributing the Encryption and
Decryption of a Block Cipher . . . . . . 263--287
E. J. Cheon and
T. Kato and
S. J. Kim Nonexistence of $[n, 5, d]_q$ Codes
Attaining the Griesmer Bound for $q^4 -
2 q^2 - 2 q + 1 \leq d \leq q^4 - 2 q^2
- q$ . . . . . . . . . . . . . . . . . . 289--299
Juan Manuel Gonzalez Nieto and
Colin Boyd and
Ed Dawson A Public Key Cryptosystem Based On a
Subgroup Membership Problem . . . . . . 301--316
P. Véron Proof of Conjectures on the True
Dimension of Some Binary Goppa Codes . . 317--325
Patric R. J. Östergård Two New Four-Error-Correcting Binary
Codes . . . . . . . . . . . . . . . . . 327--329
Stephen D. Cohen Finite Field Elements with Specified
Order and Traces . . . . . . . . . . . . 331--340
Anonymous Volume Table of Contents: Volume 36 . . 341--342
Anka Golemac and
Tanja Vucici\'c and
Josko Mandi\'c One $(96,20,4)$-symmetric Design and
related Nonabelian Difference Sets . . . 5--13
A. J. van Zanten and
I. Nengah Suparta On the Construction of Linear $q$-ary
Lexicodes . . . . . . . . . . . . . . . 15--29
Philippe Langevin and
Pascal Véron On the Non-linearity of Power Functions 31--43
Gerzson Kéri and
Patric R. J. Östergård Bounds for Covering Codes over Large
Alphabets . . . . . . . . . . . . . . . 45--60
Alexander A. Davydov and
Giorgio Faina and
Fernanda Pambianco Constructions of Small Complete Caps in
Binary Projective Spaces . . . . . . . . 61--80
John Malone-Lee Signcryption with Non-interactive
Non-repudiation . . . . . . . . . . . . 81--109
Masaaki Homma and
Seon Jeong Kim Toward the Determination of the Minimum
Distance of Two--Point Codes on a
Hermitian Curve . . . . . . . . . . . . 111--132
Friederike Brezing and
Annegret Weng Elliptic Curves Suitable for Pairing
Based Cryptography . . . . . . . . . . . 133--141
B. Tayfeh-Rezaie On the Existence of Large Sets of
$t$-designs of Prime Sizes . . . . . . . 143--149
R. Ahlswede and
H. Aydinian and
L. H. Khachatrian Forbidden (0,1)-vectors in Hyperplanes
of $\mathbb{R}^n$: The unrestricted case 151--167
Miin Huey Ang and
Siu Lun Ma Symmetric Weighing Matrices Constructed
using Group Matrices . . . . . . . . . . 195--210
Jürgen Bierbrauer and
Yves Edel A Family of Binary $(t, m, s)$-Nets of
Strength $5$ . . . . . . . . . . . . . . 211--214
G. B. Belyavskaya and
V. I. Izbash and
G. L. Mullen Check Character Systems using
Quasigroups: I . . . . . . . . . . . . . 215--227
R. Safavi-naini and
C. Charnes MRD Hashing . . . . . . . . . . . . . . 229--242
K. T. Phelps and
J. Rif\`a and
M. Villanueva Kernels and $p$-Kernels of $p^r$-ary
1-Perfect Codes . . . . . . . . . . . . 243--261
Bart De Bruyn Slim Near Polygons . . . . . . . . . . . 263--280
Jianxing Yin Cyclic Difference Packing and Covering
Arrays . . . . . . . . . . . . . . . . . 281--292
Chihiro Suetake The Classification of Symmetric
Transversal Designs STD$_4[12;3]$'s . . 293--304
Antonino Giorgio Spera Asymptotically Good Codes from
Generalized Algebraic--Geometry Codes 305--312
John P. Mcsorley Double Arrays, Triple Arrays and
Balanced Grids with $v = r + c - 1$ . . 313--318
S. G. Barwick and
Wen-Ai Jackson An Optimal Multisecret Threshold Scheme
Construction . . . . . . . . . . . . . . 367--389
A. Ya. Dorofeev and
L. S. Kazarin and
V. M. Sidelnikov and
M. E. Tuzhilin Matrix Groups Related to the Quaternion
Group and Spherical Orbit Codes . . . . 391--404
G. B. Belyavskaya and
V. I. Izbash and
G. L. Mullen Check Character Systems Using
Quasigroups: II . . . . . . . . . . . . 405--419
E. J. Cheon and
T. Kato and
S. J. Kim On the Minimum Length of some Linear
Codes of Dimension $5$ . . . . . . . . . 421--434
A. Wispelaere and
H. Maldeghem Codes from Generalized Hexagons . . . . 435--448
Claude Carlet and
Joseph L. Yucas Piecewise Constructions of Bent and
Almost Optimal Boolean Functions . . . . 449--464
T. Aaron Gulliver and
Masaaki Harada and
Takuji Nishimura and
Patric R. J. Östergård Near-Extremal Formally Self-Dual Even
Codes of Lengths $24$ and $32$ . . . . . 465--471
Gretchen L. Matthews Weierstrass Semigroups and Codes from a
Quotient of the Hermitian Curve . . . . 473--492
Omran Ahmadi and
Alfred Menezes On the Number of Trace-One Elements in
Polynomial Bases for $\mathbb{F}_2^n$ 493--507
Jens-Matthias Bohli and
Rainer Steinwandt and
María Isabel González Vasco and
Consuelo Martínez Weak Keys in MST$_1$ . . . . . . . . . . 509--524
Masaaki Harada Self-Orthogonal $3-(56,12,65)$ Designs
and Extremal Doubly-Even Self-Dual Codes
of Length $56$ . . . . . . . . . . . . . 5--16
Mehmet Ozen and
Irfan Siap Linear Codes over $\mathbb{F}_q[u] /
(u^s)$ with Respect to the
Rosenbloom--Tsfasman Metric . . . . . . 17--29
T. L. Alderson $(6,3)$-MDS Codes over an Alphabet of
Size $4$ . . . . . . . . . . . . . . . . 31--40
Jean-Sébastien Coron and
David Naccache and
Yvo Desmedt and
Andrew Odlyzko and
Julien P. Stern Index Calculation Attacks on RSA
Signature and Encryption . . . . . . . . 41--53
Masaaki Homma and
Seon Jeong Kim The Two-Point Codes on a Hermitian Curve
with the Designed Minimum Distance . . . 55--81
L. Ji Asymptotic Determination of the Last
Packing Number of Quadruples . . . . . . 83--95
Steven T. Dougherty and
T. Aaron. Gulliver and
Manabu Oura Higher Weights for Ternary and
Quaternary Self-Dual Codes . . . . . . . 97--112
Michel Lavrauw Sublines of Prime Order Contained in the
Set of Internal Points of a Conic . . . 113--123
Olof Heden A Full Rank Perfect Code of Length $31$ 125--129
Simeon Ball and
Patrick Govaerts and
Leo Storme On Ovoids of Parabolic Quadrics . . . . 131--145
Wilfried Meidl and
Arne Winterhof Some Notes on the Linear Complexity of
Sidel'nikov--Lempel--Cohn--Eastman
Sequences . . . . . . . . . . . . . . . 159--178
Frank de Clerck and
Stefaan de Winter and
Elisabeth Kuijken and
Cristina Tonesi Distance-Regular $(0, \alpha)$-Reguli 179--194
Sara Cauchie A Characterization of the Complement of
a Hyperbolic Quadric in ${\rm PG}(3,q)$,
for $q$ Odd . . . . . . . . . . . . . . 195--208
Michael Scott and
Paulo S. L. M. Barreto Generating More MNT Elliptic Curves . . 209--217
Gwoboa Horng and
Tzungher Chen and
Du-shiau Tsai Cheating in Visual Cryptography . . . . 219--236
Ari Juels and
Madhu Sudan A Fuzzy Vault Scheme . . . . . . . . . . 237--257
D. R. Stinson Some Observations on the Theory of
Cryptographic Hash Functions . . . . . . 259--277
Khoongming Khoo and
Guang Gong and
Douglas R. Stinson A New Characterization of Semi-bent and
Bent Functions on Finite Fields* . . . . 279--295
Eric Merchant Exponentially Many Hadamard Designs . . 297--308
Norifumi Kamiya and
Marc P. C. Fossorier Quasi-Cyclic Codes from a Finite Affine
Plane . . . . . . . . . . . . . . . . . 311--329
Petri Rosendahl A Generalization of Niho's Theorem . . . 331--336
San Ling and
Harald Niederreiter and
Patrick Solé On the Algebraic Structure of
Quasi-cyclic Codes IV: Repeated Roots 337--361
Vince Grolmusz Co-Orthogonal Codes . . . . . . . . . . 363--372
Jinhua Wang A New Class of Optimal $3$-splitting
Authentication Codes . . . . . . . . . . 373--381
Annegret Weng A Low-Memory Algorithm for Point
Counting on Picard Curves . . . . . . . 383--393
Omran Ahmadi Self-Reciprocal Irreducible Pentanomials
Over $\mathbb{F}_2$ . . . . . . . . . . 395--397
Benjamin Arazi Communication-Computation Trade-off in
Executing ECDSA in a Contactless
Smartcard . . . . . . . . . . . . . . . 399--415
Jeremy Dover Subregular Spreads of Hermitian Unitals 5--15
Mahdad Khatirinejad and
Petr Lisonek Classification and Constructions of
Complete Caps in Binary Spaces . . . . . 17--31
A. Cossidente and
A. Siciliano The Automorphism Group of Plane
Algebraic Curves with Singer
Automorphisms . . . . . . . . . . . . . 33--37
Tao Feng and
Yanxun Chang Existence of Z-cyclic ${\rm 3PTWh}(p)$
for any Prime $p \equiv 1$ (mod $4$) . . 39--49
Agnes D. Garciano and
Yutaka Hiramine and
Takeo Yokonuma On Relative Difference Sets in Dihedral
Groups . . . . . . . . . . . . . . . . . 51--63
Steven T. Dougherty and
Young Ho Park Codes Over the $p$-adic Integers . . . . 65--80
S. De Winter and
K. Thas Generalized Quadrangles with an Abelian
Singer Group . . . . . . . . . . . . . . 81--87
Barbara Masucci Sharing Multiple Secrets: Models,
Schemes and Analysis . . . . . . . . . . 89--111
Igor E. Shparlinski On RSA Moduli with Prescribed Bit
Patterns . . . . . . . . . . . . . . . . 113--122
Steven T. Dougherty and
San Ling Cyclic Codes Over $\mathbb{Z}_4$ of Even
Length . . . . . . . . . . . . . . . . . 127--153
Hassan Aly and
Arne Winterhof On the Linear Complexity Profile of
Nonlinear Congruential Pseudorandom
Number Generators with Dickson
Polynomials . . . . . . . . . . . . . . 155--162
Michael Giudici Codes with a Certain Weight-preserving
Transitive Group of Automorphisms . . . 163--172
Kejun Chen and
Ruizhong Wei Super-simple $(\nu, 5, 5)$ Designs . . . 173--187
Mathieu Ciet and
Marc Joye and
Kristin Lauter and
Peter L. Montgomery Trading Inversions for Multiplications
in Elliptic Curve Cryptography . . . . . 189--206
Gilberto Bini $A$-Codes from Rational Functions over
Galois Rings . . . . . . . . . . . . . . 207--214
Cem Güneri and
Ferruh Özbudak Improvements on Generalized Hamming
Weights of Some Trace Codes . . . . . . 215--231
Gilles Piret Luby--Rackoff Revisited: On the Use of
Permutations as Inner Functions of a
Feistel Scheme . . . . . . . . . . . . . 233--245
Dean Crnkovi\'c A Series of Regular Hadamard Matrices 247--251
Marten Van Dijk and
Dwaine Clarke and
Blaise Gassend and
G. Edward Suh and
Srinivas Devadas Speeding up Exponentiation using an
Untrusted Computational Resource . . . . 253--273
M. R. Darafsheh Designs from the Group ${\rm PSL}_2(q)$,
$q$ Even . . . . . . . . . . . . . . . . 311--316
Sergey V. Avgustinovich and
Olof Heden and
Faina I. Solov'eva On Intersection Problem for Perfect
Binary Codes . . . . . . . . . . . . . . 317--322
Jan De Beule and
Leo Storme Blocking All Generators of $Q^+(2 n +
1,3)$, $n \geq 4$ . . . . . . . . . . . 323--333
Jen-Chun Chang New Algorithms of Distance-Increasing
Mappings from Binary Vectors to
Permutations by Swaps . . . . . . . . . 335--345
Samuel Maffre A Weak Key Test for Braid Based
Cryptography . . . . . . . . . . . . . . 347--373
Masaaki Homma and
Seon Jeong Kim The Two-Point Codes with the Designed
Distance on a Hermitian Curve in Even
Characteristic . . . . . . . . . . . . . 375--386
Katie M. O'Brien and
Patrick Fitzpatrick Bounds on Codes Derived by Counting
Components in Varshamov Graphs . . . . . 387--396
Angela Aguglia and
Massimo Giulietti Blocking Sets of Certain Line Sets
Related to a Conic . . . . . . . . . . . 397--405
Masaaki Homma and
Seon Jeong Kim The Complete Determination of the
Minimum Distance of Two-Point Codes on a
Hermitian Curve . . . . . . . . . . . . 5--24
Peter J. Grabner and
Clemens Heuberger On the Number of Optimal Base $2$
Representations of Integers . . . . . . 25--39
Deepak Kumar Dalai and
Subhamoy Maitra and
Sumanta Sarkar Basic Theory in Construction of Boolean
Functions with Maximum Possible
Annihilator Immunity . . . . . . . . . . 41--58
François Rodier Asymptotic Nonlinearity of Boolean
Functions . . . . . . . . . . . . . . . 59--70
Claude Carlet and
Cunsheng Ding and
Harald Niederreiter Authentication Schemes from Highly
Nonlinear Functions . . . . . . . . . . 71--79
Hiroki Koga and
Etsuyo Ueda Basic Properties of the
$(t,n)$-Threshold Visual Secret Sharing
Scheme with Perfect Reconstruction of
Black Pixels . . . . . . . . . . . . . . 81--102
Javier Herranz and
Germán Sáez Distributed Ring Signatures from General
Dual Access Structures . . . . . . . . . 103--120
Anthony B. Evans Latin Squares without Orthogonal Mates 121--130
Ian M. Wanless and
Bridget S. Webb The Existence of Latin Squares without
Orthogonal Mates . . . . . . . . . . . . 131--135
Yen-Ying Huang and
Shi-Chun Tsai and
Hsin-Lung Wu On the Construction of Permutation
Arrays via Mappings from Binary Vectors
to Permutations . . . . . . . . . . . . 139--155
Cunsheng Ding and
Jianxing Yin A Construction of Optimal Constant
Composition Codes . . . . . . . . . . . 157--165
Yanxun Chang and
Cunsheng Ding Constructions of External Difference
Families and Disjoint Difference
Families . . . . . . . . . . . . . . . . 167--185
Octavio Páez Osuna There are $1239$ Steiner Triple Systems
${\rm STS}(31)$ of $2$-rank $27$ . . . . 187--190
Shoulun Long and
Josef Pieprzyk and
Huaxiong Wang and
Duncan S. Wong Generalised Cumulative Arrays in Secret
Sharing . . . . . . . . . . . . . . . . 191--209
R. J. R. Abel and
F. E. Bennett The Existence of $(\nu, 6,
\lambda)$-Perfect Mendelsohn Designs
with $\lambda > 1$ . . . . . . . . . . . 211--224
Mike J. Grannell and
Terry S. Griggs and
Anne Penfold Street A Flaw in the Use of Minimal Defining
Sets for Secret Sharing Schemes . . . . 225--236
Andreas Faldum and
Julio Lafuente and
Gustavo Ochoa and
Wolfgang Willems Error Probabilities for Bounded Distance
Decoding . . . . . . . . . . . . . . . . 237--252
Mausumi Bose and
Rahul Mukerjee Optimal $(2,n)$ visual cryptographic
schemes . . . . . . . . . . . . . . . . 255--267
Brendan D. McKay and
Jeanette C. McLeod and
Ian M. Wanless The number of transversals in a Latin
square . . . . . . . . . . . . . . . . . 269--284
Christopher Wolf and
An Braeken and
Bart Preneel On the security of stepwise triangular
systems . . . . . . . . . . . . . . . . 285--302
Gennian Ge and
Ying Miao and
L. Zhu GOB designs for authentication codes
with arbitration . . . . . . . . . . . . 303--317
Olof Heden and
Martin Hessler On the classification of perfect codes:
side class structures . . . . . . . . . 319--333
David G. Glynn and
Johannes G. Maks and
Rey Casse The polynomial degree of the
Grassmannian $G(1,n,q)$ of lines in
finite projective space ${\rm PG}(n,q)$ 335--341
Sean V. Droms and
Keith E. Mellinger and
Chris Meyer LDPC codes generated by conics in the
classical projective plane . . . . . . . 343--356
Peter Horak and
Bader F. AlBdaiwi Fast decoding of quasi-perfect Lee
distance codes . . . . . . . . . . . . . 357--367
Hassan Aly and
Arne Winterhof On the $k$-error linear complexity over
$\mathbb{F}_p$ of Legendre and
Sidelnikov sequences . . . . . . . . . . 369--374
Rei Safavi-Naini and
Huaxiong Wang Secret sharing schemes with partial
broadcast channels . . . . . . . . . . . 5--22
Julien Moncel Constructing codes identifying sets of
vertices . . . . . . . . . . . . . . . . 23--31
Charles J. Colbourn and
Sosina S. Martirosyan and
Tran Van Trung and
Robert A. Walker Roux-type constructions for covering
arrays of strengths three and four . . . 33--57
Iliya Bouyukliev and
Veerle Fack and
Wolfgang Willems and
Joost Winne Projective two-weight codes with small
parameters and their corresponding
graphs . . . . . . . . . . . . . . . . . 59--78
Peter Keevash and
Cheng Yeaw Ku A random construction for permutation
codes and the covering radius . . . . . 79--86
Vince Grolmusz Pairs of codes with prescribed Hamming
distances and coincidences . . . . . . . 87--99
Stefka Bouyuklieva and
Patric R. J. Östergård New constructions of optimal self-dual
binary codes of length $54$ . . . . . . 101--109
K. T. Arasu and
Ka Hin Leung and
Siu Lun Ma and
Ali Nabavi and
D. K. Ray-Chaudhuri Circulant weighing matrices of weight
$2^{2 t}$ . . . . . . . . . . . . . . . 111--123
Vikram Jha and
Norman L. Johnson Subregular planes admitting elations . . 125--145
Marcelo Muniz Isometric embeddings of $\mathbb{Z}_p^k$
in the Hamming space $\mathbb{F}_p^N$
and $\mathbb{Z}_p^k$-linear codes . . . 147--152
Robert F. Bailey Uncoverings-by-bases for base-transitive
permutation groups . . . . . . . . . . . 153--176
Zhenfu Cao and
Gennian Ge and
Ying Miao Combinatorial characterizations of
one-coincidence frequency-hopping
sequences . . . . . . . . . . . . . . . 177--184
Stefko Miklavic and
Primoz Potocnik Distance-transitive dihedrants . . . . . 185--193
Carl Bracken and
Gary McGuire and
Harold Ward New quasi-symmetric designs constructed
using mutually orthogonal Latin squares
and Hadamard matrices . . . . . . . . . 195--198
C. Galindo and
M. Sanchis Evaluation codes and plane valuations 199--219
Lihua Liu and
Hao Shen Explicit constructions of separating
hash families from algebraic curves over
finite fields . . . . . . . . . . . . . 221--233
Steven T. Dougherty and
T. Aaron Gulliver and
John Wong Self-dual codes over $\mathbb{Z}_8$ and
$\mathbb{Z}_9$ . . . . . . . . . . . . . 235--249
Takehiro Hasegawa and
Shoichi Kondo and
Hidekazu Kurusu A sequence of one-point codes from a
tower of function fields . . . . . . . . 251--267
Jun Shen and
Hao Shen Embeddings of resolvable group divisible
designs with block size $3$ . . . . . . 269--298
Soonhak Kwon and
Chang Hoon Kim and
Chun Pyo Hong Sparse polynomials, redundant bases,
Gauss periods, and efficient
exponentiation of primitive elements for
small characteristic finite fields . . . 299--306
Ali Miri and
Monica Nevins and
Terasan Niyomsataya Applications of representation theory to
wireless communications . . . . . . . . 307--318
Carl Bracken New classes of self-complementary codes
and quasi-symmetric designs . . . . . . 319--323
Pascal O. Vontobel and
Ashwin Ganesan On universally decodable matrices for
space-time coding . . . . . . . . . . . 325--342
Ferruh Özbudak and
Zülfükar Saygi Some constructions of systematic
authentication codes using Galois rings 343--357
Andrea Blunck and
Hans Havlicek and
Corrado Zanella Lifting of divisible designs . . . . . . 1--14
Chong-Dao Lee and
Yaotsu Chang and
Trieu-Kien Truong A result on the weight distributions of
binary quadratic residue codes . . . . . 15--20
Peter Roelse The design of composite permutations
with applications to DES-like S-boxes 21--42
Nevine Ebeid and
M. Anwar Hasan On binary signed digit representations
of integers . . . . . . . . . . . . . . 43--65
Simon Litsyn and
Beniamin Mounits Improved lower bounds on sizes of
single-error correcting codes . . . . . 67--72
Jon-Lark Kim and
Keith E. Mellinger and
Leo Storme Small weight codewords in LDPC codes
defined by (dual) classical generalized
quadrangles . . . . . . . . . . . . . . 73--92
Naoki Chigira and
Masaaki Harada and
Masaaki Kitazume Extremal self-dual codes of length $64$
through neighbors and covering radii . . 93--101
Antonio Cossidente and
Giuseppe Marino Veronese embedding and two-character
sets . . . . . . . . . . . . . . . . . . 103--107
Bessie C. Hu and
Duncan S. Wong and
Zhenfeng Zhang and
Xiaotie Deng Certificateless signature: a new
security model and an improved generic
construction . . . . . . . . . . . . . . 109--126
Jürgen Bierbrauer A direct approach to linear programming
bounds for codes and tms-nets . . . . . 127--143
Sanjeevani Gharge and
Sharad Sane Quasi-affine symmetric designs . . . . . 145--166
Amir J. Salomon and
Ofer Amrani Reed--Muller codes and Barnes--Wall
lattices: Generalized multilevel
constructions and representation over
${\rm GF}(2^q)$ . . . . . . . . . . . . 167--180
Wilfried Meidl and
Ayineedi Venkateswarlu Remarks on the $k$-error linear
complexity of $p^n$-periodic sequences 181--193
Maura Paterson Sliding-window dynamic frameproof codes 195--212
S. González and
C. Martínez and
I. F. Rúa Symplectic spread-based generalized
Kerdock codes . . . . . . . . . . . . . 213--226
Dongvu Tonien and
Reihaneh Safavi-Naini Construction of deletion correcting
codes using generalized Reed--Solomon
codes and their subcodes . . . . . . . . 227--237
Paulo S. L. M. Barreto and
Steven D. Galbraith and
Colm Ó'hÉigeartaigh and
Michael Scott Efficient pairing computation on
supersingular Abelian varieties . . . . 239--271
Taher Abualrub and
Irfan Siap Cyclic codes over the rings $Z_2 + u
Z_2$ and $Z_2 + u Z_2 + u^2 Z_2$ . . . . 273--287
Eimear Byrne and
Marcus Greferath and
Michael E. O'Sullivan The linear programming bound for codes
over finite Frobenius rings . . . . . . 289--301
Valentina Pepe LDPC codes from the Hermitian curve . . 303--315
Maura Paterson Sequential and dynamic frameproof codes 317--326
Gerardo Vega and
Jacques Wolfmann New classes of $2$-weight cyclic codes 327--334
Thomas Westerbäck Maximal partial packings of $Z_2^n$ with
perfect codes . . . . . . . . . . . . . 335--355
Shane Kelly Constructions of intriguing sets of
polar spaces from field reduction and
derivation . . . . . . . . . . . . . . . 1--8
Fang-Wei Fu and
Shu-Tao Xia The characterization of binary constant
weight codes meeting the bound of Fu and
Shen . . . . . . . . . . . . . . . . . . 9--20
Nikias De Feyter Classification of $(0,2)$-geometries
embedded in ${\rm AG}(3,q)$ . . . . . . 21--32
Andrea Caggegi and
Giovanni Falcone On $2-(n^2, 2 n, 2n-1)$ designs with
three intersection numbers . . . . . . . 33--40
Sabine Giese and
Ralph-Hardo Schulz Divisible designs with dual translation
group . . . . . . . . . . . . . . . . . 41--45
Tetsuya Izu and
Jun Kogure and
Takeshi Koshiba and
Takeshi Shimoyama Low-density attack revisited . . . . . . 47--59
Aggelos Kiayias and
Moti Yung Cryptanalyzing the
polynomial-reconstruction based
public-key system under optimal
parameter choice . . . . . . . . . . . . 61--78
Jonathan Jedwab and
Matthew G. Parker There are no Barker arrays having more
than two dimensions . . . . . . . . . . 79--84
I. Gashkov and
J. A. O. Ekberg and
D. Taub A geometric approach to finding new
lower bounds of $A(n, d, w)$ . . . . . . 85--91
Ji-Woong Jang and
Jong-Seon No and
Habong Chung Butson Hadamard matrices with partially
cyclic core . . . . . . . . . . . . . . 93--101
John Arhin On the structure of $1$-designs with at
most two block intersection numbers . . 103--114
Lijun Ji A construction for large sets of
disjoint Kirkman triple systems . . . . 115--122
E. J. Cheon and
T. Maruta On the minimum length of some linear
codes . . . . . . . . . . . . . . . . . 123--135
Maria Bras-Amorós Algebraic-geometry codes, one-point
codes, and evaluation codes . . . . . . 137--145
Bahattin Yildiz Weights modulo $p^e$ of linear codes
over rings . . . . . . . . . . . . . . . 147--165
Wen-Ai Jackson and
S. Murphy Projective aspects of the AES inversion 167--179
Dina Ghinelli and
James Hirschfeld and
Dieter Jungnickel Preface . . . . . . . . . . . . . . . . 1--2
J. A. Thas The uniqueness of $1$-systems of
$W_5(q)$ satisfying the BLT-property,
with $q$ odd . . . . . . . . . . . . . . 3--10
P. J. Cameron and
A. Rudvalis A design and a geometry for the group
${\rm Fi}_{22}$ . . . . . . . . . . . . 11--14
Gary L. Ebert and
Keith E. Mellinger Mixed partitions and related designs . . 15--23
Alan R. Prince A translation plane of order $19^2$
admitting ${\rm SL}(2,5)$, obtained by
$12$-nest replacement . . . . . . . . . 25--30
Antonio Pasini A characterization of truncated
projective geometries as flag-transitive
${\rm PG}^*.{\rm PG}$-geometries . . . . 31--38
Guglielmo Lunardon Simplectic spreads and finite semifields 39--48
Guobiao Weng and
Weisheng Qiu and
Zeying Wang and
Qing Xiang Pseudo-Paley graphs and skew Hadamard
difference sets from presemifields . . . 49--62
Simeon Ball and
Michel Lavrauw On the Hughes--Kleinfeld and Knuth's
semifields two-dimensional over a weak
nucleus . . . . . . . . . . . . . . . . 63--67
M. Biliotti and
V. Jha and
N. L. Johnson and
A. Montinaro Translation planes of order $q^2$
admitting a two-transitive orbit of
length $q + 1$ on the line at infinity 69--86
Michael Dewar and
Lucia Moura and
Daniel Panario and
Brett Stevens and
Qiang Wang Division of trinomials by pentanomials
and orthogonal arrays . . . . . . . . . 1--17
Francisco Rodríguez-Henríquez and
Guillermo Morales-Luna and
Nazar A. Saqib and
Nareli Cruz-Cortés Parallel Itoh--Tsujii multiplicative
inversion algorithm for a special class
of trinomials . . . . . . . . . . . . . 19--37
Lijun Ji Constructions for large sets of
$L$-intersecting Steiner triple systems 39--49
Morteza Esmaeili and
Morteza Hivadi $G$-projectable and
$\Lambda$-projectable binary linear
block codes . . . . . . . . . . . . . . 51--64
Yu Xiong and
Jun Ma and
Hao Shen On optimal codes with $w$-identifiable
parent property . . . . . . . . . . . . 65--90
Esa Antero Seuranen New lower bounds for multiple coverings 91--94
Susan G. Barwick and
Wen-Ai Jackson A sequence approach to linear perfect
hash families . . . . . . . . . . . . . 95--121
I. Landjev and
L. Storme A weighted version of a result of Hamada
on minihypers and on linear codes
meeting the Griesmer bound . . . . . . . 123--138
Xiande Zhang and
Gennian Ge Existence of $Z$-cyclic ${\rm
3PDTWh}(p)$ for Prime $p \equiv 1$ (mod
$4$) . . . . . . . . . . . . . . . . . . 139--155
Gennian Ge and
Rolf Rees and
Nabil Shalaby Kirkman frames having hole type $h^u
m^1$ for small $h$ . . . . . . . . . . . 157--184
Haitao Cao and
Lijun Ji and
Lie Zhu Constructions for generalized Steiner
systems ${\rm GS}(3, 4, v, 2)$ . . . . . 185--197
Jaime Gutierrez and
Álvar Ibeas Inferring sequences produced by a linear
congruential generator on elliptic
curves missing high-order bits . . . . . 199--212
Tsvetan Asamov and
Nuh Aydin A search algorithm for linear codes:
progressive dimension growth . . . . . . 213--217
E. Martínez-Moro and
I. F. Rúa On repeated-root multivariable codes
over a finite chain ring . . . . . . . . 219--227
Ron Shaw The $\psi$-associate $X^\#$ of a flat
$X$ in ${\rm PG}(n, 2)$ . . . . . . . . 229--246
Jon-Lark Kim and
Yoonjin Lee Construction of MDS self-dual codes over
Galois rings . . . . . . . . . . . . . . 247--258
Csaba Mengyán On the number of pairwise non-isomorphic
minimal blocking sets in ${\rm PG}(2,
q)$ . . . . . . . . . . . . . . . . . . 259--267
Eimear Byrne and
Marcus Greferath and
Michael E. O'Sullivan Errata for ``The linear programming
bound for codes over finite Frobenius
rings'' . . . . . . . . . . . . . . . . 269--270
Nevine Maurice Ebeid and
M. Anwar Hasan On $\tau$-adic representations of
integers . . . . . . . . . . . . . . . . 271--296
San Ling and
Ferruh Özbudak Constructions and bounds on linear
error-block codes . . . . . . . . . . . 297--316
Ki Hyoung Ko and
Jang Won Lee and
Tony Thomas Towards generating secure keys for braid
cryptography . . . . . . . . . . . . . . 317--333
Radka Russeva and
Nikolay Yankov On binary self-dual codes of lengths
$60$, $62$, $64$ and $66$ having an
automorphism of order $9$ . . . . . . . 335--346
D. R. Stinson Generalized mix functions and orthogonal
equitable rectangles . . . . . . . . . . 347--357
Cícero Carvalho and
Takao Kato Codes from curves with total inflection
points . . . . . . . . . . . . . . . . . 359--364
Gert Monstad Hana and
Trygve Johnsen Scroll codes . . . . . . . . . . . . . . 365--377
Koji Momihara Necessary and sufficient conditions for
tight equi-difference conflict-avoiding
codes of weight three . . . . . . . . . 379--390
Jinhua Wang A new class of optimal $3$-splitting
authentication codes . . . . . . . . . . 391--391
Jinhua Wang and
Hao Shen Existence of $(v,K_{1(3)} \cup
\{w^*\})$-PBDs and its applications . . 1--16
Vitaly Skachek and
Ron M. Roth Probabilistic algorithm for finding
roots of linearized polynomials . . . . 17--23
Veerle Fack and
Szabolcs L. Fancsali and
L. Storme and
Geetrui Van de Voorde and
Joost Winne Small weight codewords in the codes
arising from Desarguesian projective
planes . . . . . . . . . . . . . . . . . 25--43
Olof Heden On perfect $p$-ary codes of length $p +
1$ . . . . . . . . . . . . . . . . . . . 45--56
Wilfried Meidl Reducing the calculation of the linear
complexity of $u 2^v$-periodic binary
sequences to Games--Chan algorithm . . . 57--65
Weiming Zhang and
Shiqu Li A coding problem in steganography . . . 67--81
James A. Davis and
Laurent Poinsot $G$-Perfect nonlinear functions . . . . 83--96
Sosina Martirosyan and
Tran van Trung Explicit constructions for perfect hash
families . . . . . . . . . . . . . . . . 97--112
Cunsheng Ding and
Tao Feng Codebooks from almost difference sets 113--126
Norman L. Johnson $m$th-Root subgeometry partitions . . . 127--136
Boris Skori\'c and
Stefan Katzenbeisser and
Mehmet U. Celik Symmetric Tardos fingerprinting codes
for arbitrary alphabet sizes . . . . . . 137--166
Vito Abatangelo and
Bambina Larato Elliptic near-MDS codes over
$\mathbb{F}_5$ . . . . . . . . . . . . . 167--174
Thomas Britz and
Keisuke Shiromoto Designs from subcode supports of linear
codes . . . . . . . . . . . . . . . . . 175--189
Gerzson Kéri The covering radius of extreme binary
$2$-surjective codes . . . . . . . . . . 191--198
Alessandro Montinaro On the Ree Unital . . . . . . . . . . . 199--209
Jianxing Yin and
Jie Yan and
Chengmin Wang Generalized balanced tournament designs
and related codes . . . . . . . . . . . 211--230
Antonio Cossidente and
Nicola Durante and
Giuseppe Marino and
Tim Penttila and
Alessandro Siciliano The geometry of some two-character sets 231--241
Aaron Potechin Maximal caps in ${\rm AG}(6, 3)$ . . . . 243--259
Giorgio Donati and
Nicola Durante On the intersection of two subgeometries
of ${\rm PG}(n, q)$ . . . . . . . . . . 261--267
Jürgen Bierbrauer and
Gohar M. Kyureghyan Crooked binomials . . . . . . . . . . . 269--301
Maria Cristeta Cuaresma and
Michael Giudici and
Cheryl E. Praeger Homogeneous factorisations of Johnson
graphs . . . . . . . . . . . . . . . . . 303--327
Berkant Ustaoglu Obtaining a secure and efficient key
agreement protocol from (H)MQV and NAXOS 329--342
W. H. Holzmann and
H. Kharaghani and
B. Tayfeh-Rezaie Williamson matrices up to order $59$ . . 343--352
Nicholas Kolokotronis Cryptographic properties of nonlinear
pseudorandom number generators . . . . . 353--363
John Polhill New negative Latin square type partial
difference sets in nonelementary abelian
$2$-groups and $3$-groups . . . . . . . 365--377
A. Blokhuis and
J. W. P. Hirschfeld and
D. Jungnickel and
J. A. Thas Finite geometries . . . . . . . . . . . 1--2
S. De Winter Non-isomorphic semipartial geometries 3--9
Andrea Blunck and
Hans Havlicek and
Corrado Zanella Divisible designs from twisted dual
numbers . . . . . . . . . . . . . . . . 11--20
J. De Beule and
A. Klein and
K. Metsch and
L. Storme Partial ovoids and partial spreads in
Hermitian polar spaces . . . . . . . . . 21--34
B. N. Cooperstein and
B. De Bruyn The combinatorial properties of the
hyperplanes of ${\rm DW}(5, q)$ arising
from embedding . . . . . . . . . . . . . 35--51
A. De Wispelaere and
H. Van Maldeghem Regular partitions of (weak) finite
generalized polygons . . . . . . . . . . 53--73
Kris Coolsaet A $51$-dimensional embedding of the
Ree--Tits generalized octagon . . . . . 75--97
Cheryl E. Praeger and
Shenglin Zhou Classification of line-transitive
point-imprimitive linear spaces with
line size at most $12$ . . . . . . . . . 99--111
T. L. Alderson and
A. A. Bruen Coprimitive sets and inextendable codes 113--124
Yves Edel Sequences in abelian groups $G$ of odd
order without zero-sum subsequences of
length $\exp(G)$ . . . . . . . . . . . . 125--134
Eimear Byrne and
Marcus Greferath and
Thomas Honold Ring geometries, two-weight codes, and
strongly regular graphs . . . . . . . . 1--16
Dameng Deng and
Rolf Rees and
Hao Shen On the existence of nearly Kirkman
triple systems with subsystems . . . . . 17--33
Landang Yuan and
Qingde Kang Another construction for large sets of
Kirkman triple systems . . . . . . . . . 35--42
Sunghyu Han and
Jon-Lark Kim On self-dual codes over $\mathbb{F}_5$ 43--58
L. Ji $2$-idempotent $3$-quasigroups with a
conjugate invariant subgroup consisting
of a single cycle of length four . . . . 59--68
A. D. Blinco and
S. I. El-Zanati and
G. F. Seelinger and
P. A. Sissokho and
L. E. Spence and
C. Vanden Eynden On vector space partitions and uniformly
resolvable designs . . . . . . . . . . . 69--77
Oded Blayer and
Tamir Tassa Improved versions of Tardos'
fingerprinting scheme . . . . . . . . . 79--103
Koen Thas Note on the existence of translation
nets . . . . . . . . . . . . . . . . . . 105--107
Cunsheng Ding and
Tor Helleseth and
Òyvind Ytrehus Preface . . . . . . . . . . . . . . . . 109--110
Zihui Liu and
Wende Chen and
Yuan Luo The relative generalized Hamming weight
of linear $q$-ary codes and their
subcodes . . . . . . . . . . . . . . . . 111--123
Shu-Tao Xia and
Fang-Wei Fu Undetected error probability of $q$-ary
constant weight codes . . . . . . . . . 125--140
Khmaies Ouahada and
Theo G. Swart and
Hendrik C. Ferreira and
Ling Cheng Binary permutation sequences as subsets
of Levenshtein codes, spectral null
codes, run-length limited codes and
constant weight codes . . . . . . . . . 141--154
Radinka Yorgova and
Alfred Wassermann Binary self-dual codes with
automorphisms of order $23$ . . . . . . 155--164
Gerzson Kéri and
Patric R. J. Östergård On the minimum size of binary codes with
length $2R + 4$ and covering radius $R$ 165--169
Ernst M. Gabidulin Attacks and counter-attacks on the GPT
public key cryptosystem . . . . . . . . 171--177
Constanza Riera and
Stéphane Jacob and
Matthew G. Parker From graph states to two-graph states 179--206
A. J. van Zanten and
Loeky Haryanto Sets of disjoint snakes based on a
Reed--Muller code and covering the
hypercube . . . . . . . . . . . . . . . 207--229
Michel Lavrauw and
Leo Storme and
Geertrui Van de Voorde On the code generated by the incidence
matrix of points and hyperplanes in
${\rm PG}(n, q)$ and its dual . . . . . 231--245
Jong Yoon Hyun and
Hyun Kwang Kim Maximum distance separable poset codes 247--261
Alan R. Prince Further translation planes of order
$19^2$ admitting ${\rm SL}(2,5)$,
obtained by nest replacement . . . . . . 263--267
Andreas Klein Attacks on the RC4 stream cipher . . . . 269--286
Hans Ludwig de Vries On orthogonal resolutions of the
classical Steiner quadruple system ${\rm
SQS}(16)$ . . . . . . . . . . . . . . . 287--292
Zheng Gong and
Xuejia Lai and
Kefei Chen A synthetic indifferentiability analysis
of some block-cipher-based hash
functions . . . . . . . . . . . . . . . 293--305
Ulrich Dempwolff and
William M. Kantor Distorting symmetric designs . . . . . . 307--322
Olav Geil On the second weight of generalized
Reed--Muller codes . . . . . . . . . . . 323--330
Jianmin Wang Some combinatorial constructions for
optimal perfect deletion-correcting
codes . . . . . . . . . . . . . . . . . 331--347
Pascale Charpin and
Tor Helleseth Editorial: In memory of Hans Dobbertin 1--2
Hans Dobbertin and
Gregor Leander Bent functions embedded into the
recursive framework of $\mathbb{Z}$-bent
functions . . . . . . . . . . . . . . . 3--22
J. F. Dillon More DD difference sets . . . . . . . . 23--32
Harald Niederreiter and
Ayineedi Venkateswarlu Periodic multisequences with large error
linear complexity . . . . . . . . . . . 33--45
Igor Semaev On solving sparse algebraic equations
over finite fields . . . . . . . . . . . 47--60
Ferruh Özbudak and
Zülfükar Saygi Systematic authentication codes using
additive polynomials . . . . . . . . . . 61--77
K. J. Horadam and
D. G. Farmer Bundles, presemifields and nonlinear
functions . . . . . . . . . . . . . . . 79--94
Sumanta Sarkar and
Subhamoy Maitra Idempotents in the neighbourhood of
Patterson--Wiedemann functions having
Walsh spectra zeros . . . . . . . . . . 95--103
Ernst M. Gabidulin and
Nina I. Pilipchuk Error and erasure correcting algorithms
for rank codes . . . . . . . . . . . . . 105--122
Goutam Paul and
Siddheshwar Rathi and
Subhamoy Maitra On non-negligible bias of the first
output byte of RC4 towards the first
three bytes of the secret key . . . . . 123--134
Jon-Lark Kim and
Patrick Solé Skew Hadamard designs and their codes 135--145
Håvard Raddum and
Igor Semaev Solving Multiple Right Hand Sides linear
equations . . . . . . . . . . . . . . . 147--160
Lars Eirik Danielsen and
Matthew G. Parker Edge local complementation and
equivalence of binary linear codes . . . 161--170
Reza Rezaeian Farashahi and
Ruud Pellikaan and
Andrey Sidorenko Extractors for binary elliptic curves 171--186
J. De Beule and
K. Metsch and
L. Storme Characterization results on arbitrary
non-weighted minihypers and on linear
codes meeting the Griesmer bound . . . . 187--197
Maria Christopoulou and
Theo Garefalakis and
Daniel Panario and
David Thomson The trace of an optimal normal element
and low complexity normal bases . . . . 199--215
Mariusz Czapski and
Maciej Nikodem Error detection and error correction
procedures for the Advanced Encryption
Standard . . . . . . . . . . . . . . . . 217--232
Haifeng Qian and
Yuan Zhou and
Zhibin Li and
Zecheng Wang and
Bing Zhang Efficient public key encryption with
smallest ciphertext expansion from
factoring . . . . . . . . . . . . . . . 233--249
George Petrides and
Johannes Mykkeltveit Composition of recursions and nonlinear
complexity of periodic binary sequences 251--264
Danyo Danev and
Stefan Dodunekov A family of ternary quasi-perfect BCH
codes . . . . . . . . . . . . . . . . . 265--271
Marcus Brinkmann and
Gregor Leander On the classification of APN functions
up to dimension five . . . . . . . . . . 273--288
Ryo Nojima and
Hideki Imai and
Kazukuni Kobara and
Kirill Morozov Semantic security for the McEliece
cryptosystem without random oracles . . 289--305
Rogério M. Siqueira and
Sueli I. R. Costa Flat tori, lattices and bounds for
commutative group codes . . . . . . . . 307--321
Rafaël Fourquet and
Cédric Tavernier An improved list decoding algorithm for
the second order Reed--Muller codes and
its applications . . . . . . . . . . . . 323--340
Christian Bey and
Gohar M. Kyureghyan On Boolean functions with the sum of
every two of them being bent . . . . . . 341--346
Kseniya Garaschuk and
Petr Lisonek On binary Kloosterman sums divisible by
$3$ . . . . . . . . . . . . . . . . . . 347--357
Masaaki Homma and
Seon Jeong Kim The second generalized Hamming weight
for two-point codes on a Hermitian curve 1--40
J. Schillewaert and
J. A. Thas Characterizations of Hermitian varieties
by intersection numbers . . . . . . . . 41--60
Jie Yan and
Jianxing Yin A class of optimal constant composition
codes from GDRPs . . . . . . . . . . . . 61--76
Steven T. Dougherty and
Jon-Lark Kim and
Hamid Kulosman MDS codes over finite principal ideal
rings . . . . . . . . . . . . . . . . . 77--92
Guobiao Weng and
Lei Hu Some results on skew Hadamard difference
sets . . . . . . . . . . . . . . . . . . 93--105
Weidong Guo and
Gennian Ge The existence of generalized mix
functions . . . . . . . . . . . . . . . 107--113
Jean-Sébastien Coron A variant of Boneh--Franklin IBE with a
tight reduction in the random oracle
model . . . . . . . . . . . . . . . . . 115--133
Frédéric A. B. Edoukou Codes defined by forms of degree $2$ on
non-degenerate Hermitian varieties in
$\mathbb{P}^4 (\mathbb{F}_q)
\mathbb{P}^4(\mathbb{F}_q)$ . . . . . . 135--146
Young Ho Park Modular independence and generator
matrices for codes over $\mathbb{Z}_m$ 147--162
Shu-Tao Xia and
Fang-Wei Fu Johnson type bounds on constant
dimension codes . . . . . . . . . . . . 163--172
Jong Yoon Hyun Generalized MacWilliams identities and
their applications to perfect binary
codes . . . . . . . . . . . . . . . . . 173--185
Jan De Beule and
Patrick Govaerts and
Anja Hallez and
Leo Storme Tight sets, weighted $m$-covers,
weighted $m$-ovoids, and minihypers . . 187--201
Wenqing Fu and
Tao Feng On self-orthogonal group ring codes . . 203--214
Feng Liu and
Chuan Kun Wu and
Xi Jun Lin The alignment problem of visual
cryptography schemes . . . . . . . . . . 215--227
Horst Trinker A simple derivation of the MacWilliams
identity for linear ordered codes and
orthogonal arrays . . . . . . . . . . . 229--234
Jürgen Bierbrauer A family of crooked functions . . . . . 235--241
Keqin Feng and
Qunying Liao and
Jing Yang Maximal values of generalized algebraic
immunity . . . . . . . . . . . . . . . . 243--252
Yiwei Huang and
Bernhard Schmidt Uniqueness of some cyclic projective
planes . . . . . . . . . . . . . . . . . 253--266
Lionel Chaussade and
Pierre Loidreau and
Felix Ulmer Skew codes of prescribed distance or
rank . . . . . . . . . . . . . . . . . . 267--284
Yutaka Hiramine A two-to-one map and abelian affine
difference sets . . . . . . . . . . . . 285--290
Kiyoshi Nagata and
Fidel Nemenzo and
Hideo Wada The number of self-dual codes over
$Z_{p^3}$ . . . . . . . . . . . . . . . 291--303
Steven D. Galbraith and
Xibin Lin Computing pairings using $x$-coordinates
only . . . . . . . . . . . . . . . . . . 305--324
Gilles Piret and
François-Xavier Standaert Provable security of block ciphers
against linear cryptanalysis: a mission
impossible? An experimental review of
the practical security approach and the
key equivalence hypothesis in linear
cryptanalysis . . . . . . . . . . . . . 325--338
Yang Li and
Lijun Ji and
Jianxing Yin Covering arrays of strength $3$ and $4$
from holey difference matrices . . . . . 339--350
D. Panario and
D. Thomson Efficient $p$th root computations in
finite fields of characteristic $p$ . . 351--358
Alexander A. Davydov and
Stefano Marcugini and
Fernanda Pambianco Complete $(q^2 + q + 8)/2$-caps in the
spaces $PG(3, q ), q \equiv 2 (mod 3)$
an odd prime, and a complete $20$-cap in
$PG(3, 5)$ . . . . . . . . . . . . . . . 359--372
Tian Tian and
Wen-Feng Qi A note on the crosscorrelation of
maximal length FCSR sequences . . . . . 1--8
E. J. Cheon A class of optimal linear codes of
length one above the Griesmer bound . . 9--20
Yu. I. Lyubich On tight projective designs . . . . . . 21--31
Wilfried Meidl Remarks on a cyclotomic sequence . . . . 33--43
Krzysztof Petelczyc and
Ma\lgorzata Prazmowska $103$-configurations and projective
realizability of multiplied
configurations . . . . . . . . . . . . . 45--54
Steven T. Dougherty and
Hongwei Liu Independence of vectors in codes over
rings . . . . . . . . . . . . . . . . . 55--68
Sunghyu Han and
Jon-Lark Kim The nonexistence of near-extremal
formally self-dual codes . . . . . . . . 69--77
R. Julian R. Abel and
Norman J. Finizio and
Malcolm Greig and
Luis B. Morales Existence of $(2, 8)$GWhD($v$) and $(4,
8)$GWhD($v$) with $v \equiv 0, 1 \pmod
8$ . . . . . . . . . . . . . . . . . . . 79--97
Dimitrios Poulakis A variant of Digital Signature Algorithm 99--104
Iliya Bouyukliev and
Veerle Fack and
Joost Winne $2-(31,15,7)$, $2-(35,17,8)$ and
$2-(36,15,6)$ designs with automorphisms
of odd prime order, and their related
Hadamard matrices and codes . . . . . . 105--122
Antonio Cossidente Some constructions on the Hermitian
surface . . . . . . . . . . . . . . . . 123--129
Dieter Jungnickel and
Vladimir D. Tonchev Polarities, quasi-symmetric designs, and
Hamada's conjecture . . . . . . . . . . 131--140
Ron Shaw and
Neil A. Gordon The cubic Segre variety in PG$(5, 2)$ 141--156
John Bamberg and
Frank De Clerck and
Nicola Durante A hemisystem of a nonclassical
generalised quadrangle . . . . . . . . . 157--165
Michael J. Collins Upper bounds for parent-identifying set
systems . . . . . . . . . . . . . . . . 167--173
Tao Feng Difference sets with $n = 5 p^r$ . . . . 175--194
Jooyoung Lee and
Yongjin Yeom Efficient RFID authentication protocols
based on pseudorandom sequence
generators . . . . . . . . . . . . . . . 195--210
M. R. Darafsheh and
A. Iranmanesh and
R. Kahkeshani Some designs and codes invariant under
the groups $S_9$ and A$_8$ . . . . . . . 211--223
H. Cao and
J. Dinitz and
D. Kreher and
D. R. Stinson and
R. Wei On orthogonal generalized equitable
rectangles . . . . . . . . . . . . . . . 225--230
Derek H. Smith and
Richard P. Ward and
Stephanie Perkins Gold codes, Hadamard partitions and the
security of CDMA systems . . . . . . . . 231--243
Sarah Spence Adams and
Matthew Crawford and
Caitlin Greeley and
Bryce Lee and
Mathav Kishore Murugan Multilevel and multidimensional Hadamard
matrices . . . . . . . . . . . . . . . . 245--252
Koji Momihara Strong difference families, difference
covers, and their applications for
relative difference families . . . . . . 253--273
Silvia Boumova and
Peter Boyvalenkov and
Hristina Kulina and
Maya Stoyanova Polynomial techniques for investigation
of spherical designs . . . . . . . . . . 275--288
José Joaquín Bernal and
Ángel del Río and
Juan Jacobo Simón An intrinsical description of group
codes . . . . . . . . . . . . . . . . . 289--300
Jessica F. Burkhart and
Neil J. Calkin and
Shuhong Gao and
Justine C. Hyde-Volpe and
Kevin James and
others Finite field elements of high order
arising from modular curves . . . . . . 301--314
Thomas Martin and
Keith M. Martin and
Peter Wild Establishing the broadcast efficiency of
the Subset Difference Revocation Scheme 315--334
Jaume Martí-Farré and
Carles Padró Ideal secret sharing schemes whose
minimal qualified subsets have at most
three participants . . . . . . . . . . . 1--14
Lein Harn and
Changlu Lin Detection and identification of cheaters
in $(t, n)$ secret sharing scheme . . . 15--24
Charles J. Colbourn and
Alan C. H. Ling Linear hash families and forbidden
configurations . . . . . . . . . . . . . 25--55
Markus Grassl and
T. Aaron Gulliver On circulant self-dual codes over small
fields . . . . . . . . . . . . . . . . . 57--81
Yu-Ru Liu and
Craig V. Spencer A generalization of Meshulam's theorem
on subsets of finite abelian groups with
no $3$-term arithmetic progression . . . 83--91
Darryn Bryant and
Judith Egan and
Barbara Maenhaut and
Ian M. Wanless Indivisible plexes in latin squares . . 93--105
Bin Wen and
Jianmin Wang and
Jianxing Yin Optimal grid holey packings with block
size $3$ and $4$ . . . . . . . . . . . . 107--124
Masaaki Harada and
Akihiro Munemasa There exists no self-dual $[24, 12, 10]$
code over $\mathbb{F}_5$ . . . . . . . . 125--127
Tamir Tassa and
Jorge L. Villar On proper secrets, $(t, k)$-bases and
linear codes . . . . . . . . . . . . . . 129--154
Bader AlBdaiwi and
Peter Horak and
Lorenzo Milazzo Enumerating and decoding perfect linear
Lee codes . . . . . . . . . . . . . . . 155--162
John Polhill Paley type partial difference sets in
non $p$-groups . . . . . . . . . . . . . 163--169
E. J. Cheon and
T. Maruta A new extension theorem for $3$-weight
modulo $q$ linear codes over
$\mathbb{F}_q$ . . . . . . . . . . . . . 171--183
Clemens Heuberger and
James A. Muir Unbalanced digit sets and the closest
choice strategy for minimal weight
integer representations . . . . . . . . 185--208
Paul Dorbec and
Sylvain Gravier and
Iiro Honkala and
Michel Mollard Weighted codes in Lee metrics . . . . . 209--218
Kenneth G. Paterson and
Sriramkrishnan Srinivasan On the relations between non-interactive
key distribution, identity-based
encryption and trapdoor discrete log
groups . . . . . . . . . . . . . . . . . 219--241
Alan R. Prince Pure partial planes of order $6$ with
$25$ lines . . . . . . . . . . . . . . . 243--247
Tian Tian and
Wen-Feng Qi Linearity properties of binary FCSR
sequences . . . . . . . . . . . . . . . 249--262
Brian Curtin and
Ibtisam Daqqa The subconstituent algebra of strongly
regular graphs associated with a Latin
square . . . . . . . . . . . . . . . . . 263--274
Miwako Mishima and
Hung-Lin Fu and
Shoichi Uruno Optimal conflict-avoiding codes of
length $n \equiv 0 \pmod 16$ and weight
$3$ . . . . . . . . . . . . . . . . . . 275--291
A. Caranti and
Francesca Dalla Volta and
M. Sala An application of the O'Nan--Scott
theorem to the group generated by the
round functions of an AES-like cipher 293--301
Claude Carlet and
Xiangyong Zeng and
Chunlei Li and
Lei Hu Further properties of several classes of
Boolean functions with optimum algebraic
immunity . . . . . . . . . . . . . . . . 303--338
Koji Nuida and
Satoshi Fujitsu and
Manabu Hagiwara and
Takashi Kitagawa and
Hajime Watanabe and
others An improvement of discrete Tardos
fingerprinting codes . . . . . . . . . . 339--362
Jon-Lark Kim and
Xiaoyu Liu A generalized Gleason--Pierce--Ward
theorem . . . . . . . . . . . . . . . . 363--380
Dustin Moody The Diffie--Hellman problem and
generalization of Verheul's theorem . . 381--390
Robert S. Coulter and
Todd Gutekunst Special subsets of difference sets with
particular emphasis on skew Hadamard
difference sets . . . . . . . . . . . . 1--12
Aidan Roy and
A. J. Scott Unitary designs and codes . . . . . . . 13--31
Siman Yang and
Lulu Qi On improved asymptotic bounds for codes
from global function fields . . . . . . 33--43
Andrzej Owsiejczuk and
Ma\lgorzata Prazmowska Combinatorial generalizations of
generalized quadrangles of order $(2,
2)$ . . . . . . . . . . . . . . . . . . 45--57
T. L. Alderson and
András Gács On the maximality of linear codes . . . 59--68
Olof Heden Necessary and sufficient conditions for
the existence of a class of partitions
of a finite vector space . . . . . . . . 69--73
Ramakanth Kavuluru Characterization of $2^n$-periodic
binary sequences with fixed $2$-error or
$3$-error linear complexity . . . . . . 75--97
Cícero Carvalho and
Ercílio Silva On algebras admitting a complete set of
near weights, evaluation codes, and
Goppa codes . . . . . . . . . . . . . . 99--110
Maria Bras-Amorós On numerical semigroups and the
redundancy of improved codes correcting
generic errors . . . . . . . . . . . . . 111--118
Simeon Ball and
Szabolcs L. Fancsali Multiple blocking sets in finite
projective spaces and improvements to
the Griesmer bound for linear codes . . 119--136
Xiaohu Tang and
Tor Helleseth and
Pingzhi Fan A new optimal quaternary sequence family
of length $2(2^n - 1)$ obtained from the
orthogonal transformation of Families
$\mathcal{B}$ and $\mathcal{C}$ . . . . 137--148
Michael J. Mossinghoff Wieferich pairs and Barker sequences . . 149--163
Stefania Fanali and
Massimo Giulietti On maximal curves with Frobenius
dimension $3$ . . . . . . . . . . . . . 165--174
Alexandre Pinto and
André Souto and
Armando Matos and
Luís Antunes Commitment and authentication systems 175--193
László Csirmaz An impossibility result on graph secret
sharing . . . . . . . . . . . . . . . . 195--209
Antonio Cossidente The classical $1$-system of $Q^-(7, q )$
and two-character sets . . . . . . . . . 1--9
Zihui Liu and
Wende Chen Notes on the value function . . . . . . 11--19
Guoxin Zuo and
Mingyuan Xia A special class of $T$-matrices . . . . 21--28
Françoise Levy-dit-Vehel and
Ludovic Perret Security analysis of word problem-based
cryptosystems . . . . . . . . . . . . . 29--41
Jianmin Wang and
Xiuling Shan and
Jianxing Yin On constructions for optimal
two-dimensional optical orthogonal codes 43--60
Bahattin Yildiz and
Suat Karadeniz Linear codes over $\mathbb{F}_2 + u
\mathbb{F}_2 + v \mathbb{F}_2 + u v
\mathbb{F}_2$ . . . . . . . . . . . . . 61--81
Reza Rezaeian Farashahi and
Igor E. Shparlinski On the number of distinct elliptic
curves in some families . . . . . . . . 83--99
S. El-Zanati and
H. Jordon and
G. Seelinger and
P. Sissokho and
L. Spence The maximum size of a partial 3-spread
in a finite vector space over GF$(2)$ 101--107
Sophie Huczynska Equidistant frequency permutation arrays
and related constant composition codes 109--120
Changshe Ma and
Jian Weng and
Yingjiu Li and
Robert Deng Efficient discrete logarithm based
multi-signature scheme in the plain
public key model . . . . . . . . . . . . 121--133
Ivan Landjev and
Leo Storme A study of $(x(q + 1), x; 2,
q)$-minihypers . . . . . . . . . . . . . 135--147
Maheshanand Bhaintwal and
Siri Krishan Wasan Generalized Reed--Muller codes over
$\mathbb{Z}_q$ . . . . . . . . . . . . . 149--166
J. Borges and
C. Fernández-Córdoba and
J. Pujol and
J. Rif\`a and
M. Villanueva $\mathbb{Z}_2 \mathbb{Z}_4$-linear
codes: generator matrices and duality 167--179
Nathan Drake and
Gretchen L. Matthews Parameter choices and a better bound on
the list size in the Guruswami--Sudan
algorithm for algebraic geometry codes 181--187
Jürgen Bierbrauer New semifields, PN and APN functions . . 189--200
Dragomir Z. \Dbarokovi\'c A new Yang number and consequences . . . 201--204
Masayuki Abe and
Yang Cui and
Hideki Imai and
Eike Kiltz Efficient hybrid encryption from
ID-based encryption . . . . . . . . . . 205--240
Krzysztof Petelczyc and
Ma\lgorzata Prazmowska Twisted Fano spaces and their
classification, linear completions of
systems of triangle perspectives . . . . 241--251
Alexander A. Davydov and
Patric R. J. Östergård Linear codes with covering radius $3$ 253--271
J. Schillewaert and
L. Storme and
J. A. Thas Minimal codewords in Reed--Muller codes 273--286
Peter Vandendriessche Some low-density parity-check codes
derived from finite geometries . . . . . 287--297
Junling Zhou and
Yanxun Chang New results on large sets of Kirkman
triple systems . . . . . . . . . . . . . 1--7
Norbert Knarr and
Markus Stroppel Polarities and unitals in the
Coulter--Matthews planes . . . . . . . . 9--18
Mausumi Bose and
Rahul Mukerjee Optimal $(k, n)$ visual cryptographic
schemes for general $k$ . . . . . . . . 19--35
Antonio Maschietti The group fixing a completely regular
line-oval . . . . . . . . . . . . . . . 37--43
Hongsong Shi and
Shaoquan Jiang and
Zhiguang Qin More efficient DDH pseudorandom
generators . . . . . . . . . . . . . . . 45--64
Tian Tian and
Wen-Feng Qi Expected values for the rational
complexity of finite binary sequences 65--79
Xiande Zhang and
Gennian Ge Existence of resolvable $H$-designs with
group sizes $2$, $3$, $4$ and $6$ . . . 81--101
Ronald C. Mullin and
Rainer Steinwandt Special issue dedicated to Spyros
Magliveras on the occasion of his 70th
birthday . . . . . . . . . . . . . . . . 103--105
C. Rößing and
L. Storme A spectrum result on minimal blocking
sets with respect to the planes of
$PG(3, q)$, $q$ odd . . . . . . . . . . 107--119
A. De Wispelaere and
J. A. Thas and
H. Van Maldeghem A characterization of the Grassmann
embedding of $H(q)$, with $q$ even . . . 121--130
Dieter Jungnickel and
Vladimir D. Tonchev The number of designs with geometric
parameters grows exponentially . . . . . 131--140
Sanjit Chatterjee and
Darrel Hankerson and
Edward Knapp and
Alfred Menezes Comparing two pairing-based aggregate
signature schemes . . . . . . . . . . . 141--167
Atefeh Mashatan and
Douglas R. Stinson Practical unconditionally secure
two-channel message authentication . . . 169--188
María Isabel González Vasco and
Angel L. Pérez del Pozo and
Pedro Taborda Duarte A note on the security of MST$_3$ . . . 189--200
Charles J. Colbourn Covering arrays from cyclotomy . . . . . 201--219
M. Abreu and
C. Balbuena and
D. Labbate Adjacency matrices of polarity graphs
and of other $C_4$-free graphs of large
size . . . . . . . . . . . . . . . . . . 221--233
Michael Huber Block-transitive designs in affine
spaces . . . . . . . . . . . . . . . . . 235--242
Nidhi Singhi and
Nikhil Singhi and
Spyros Magliveras Minimal logarithmic signatures for
finite groups of Lie type . . . . . . . 243--260
R. D. Baker and
G. L. Ebert and
K. L. Wantz Enumeration of orthogonal Buekenhout
unitals . . . . . . . . . . . . . . . . 261--283
Gábor Korchmáros and
Nicola Pace Infinite family of large complete arcs
in PG$(2, q^n)$, with $q$ odd and $n > 1$
odd . . . . . . . . . . . . . . . . . . 285--296
N. A. Newman and
C. A. Rodger Enclosings of $\lambda$-fold 4-cycle
systems . . . . . . . . . . . . . . . . 297--310
Marco Buratti and
Anita Pasotti Further progress on difference families
with block size $4$ or $5$ . . . . . . . 1--20
Yutaka Hiramine Modified generalized Hadamard matrices
and constructions for transversal
designs . . . . . . . . . . . . . . . . 21--33
Lev Glebsky and
Igor E. Shparlinski Short cycles in repeated exponentiation
modulo a prime . . . . . . . . . . . . . 35--42
Cristina Fernández-Córdoba and
Jaume Pujol and
Merc\`e Villanueva $\mathbb{Z}_2 \mathbb{Z}_4$-linear
codes: rank and kernel . . . . . . . . . 43--59
Eugenia O'Reilly-Regueiro Reduction for primitive flag-transitive
$(v, k, 4)$-symmetric designs . . . . . 61--63
Monica Nevins and
Camelia KarimianPour and
Ali Miri NTRU over rings beyond $\mathbb{Z}$ . . 65--78
Ka Hin Leung and
Siu Lun Ma and
Bernhard Schmidt On Lander's conjecture for difference
sets whose order is a power of $2$ or
$3$ . . . . . . . . . . . . . . . . . . 79--84
Jan De Beule and
Yves Edel and
Emilia Käsper and
Andreas Klein and
Svetla Nikova and
others Galois geometries and applications . . . 85--86
Simeon Ball and
Jan De Beule and
Leo Storme and
Peter Sziklai and
Tamás Sz'onyi In memoriam, András Gács . . . . . . . . . 87--88
M. Lavrauw and
G. Van de Voorde On linear sets on a projective line . . 89--104
Antonio Cossidente and
Oliver H. King Some two-character sets . . . . . . . . 105--113
G. Marino and
O. Polverino Ovoidal blocking sets and maximal
partial ovoids of Hermitian varieties 115--130
Stefania Fanali and
Massimo Giulietti On some open problems on maximal curves 131--139
Paulo Barreto and
Ventzislav Nikov and
Svetla Nikova and
Vincent Rijmen and
Elmar Tischhauser Whirlwind: a new cryptographic hash
function . . . . . . . . . . . . . . . . 141--162
Yves Edel and
Ivan Landjev On multiple caps in finite projective
spaces . . . . . . . . . . . . . . . . . 163--175
Angela Aguglia and
Gábor Korchmáros Multiple blocking sets and multisets in
Desarguesian planes . . . . . . . . . . 177--181
Bart De Bruyn On hyperovals of polar spaces . . . . . 183--195
Satoshi Yoshiara Notes on APN functions, semibiplanes and
dimensional dual hyperovals . . . . . . 197--218
F. A. B. Edoukou and
A. Hallez and
F. Rodier and
L. Storme The small weight codewords of the
functional codes associated to
non-singular Hermitian varieties . . . . 219--233
Nóra V. Harrach and
Klaus Metsch Small point sets of $PG(n, q^3)$
intersecting each $k$-subspace in $1
\bmod q$ points . . . . . . . . . . . . 235--248
Kenneth W. Shum and
Wing Shing Wong A tight asymptotic bound on the size of
constant-weight conflict-avoiding codes 1--14
John Fuelberth and
Athula Gunawardena and
C. David Shaffer On incidence structures of nonsingular
points and hyperbolic lines of ovoids in
finite orthogonal spaces . . . . . . . . 15--33
Yves Edel On quadratic APN functions and
dimensional dual hyperovals . . . . . . 35--44
Ernst Schuster and
Gennian Ge On uniformly resolvable designs with
block sizes $3$ and $4$ . . . . . . . . 45--69
Amin Sakzad and
Mohammad-Reza Sadeghi and
Daniel Panario Codes with girth $8$ Tanner graph
representation . . . . . . . . . . . . . 71--81
Zhengjun Zhao and
Xiwang Cao A note on the reducibility of binary
affine polynomials . . . . . . . . . . . 83--90
H. B. Walikar and
B. D. Acharya and
Shailaja S. Shirkol Designs associated with maximum
independent sets of a graph . . . . . . 91--105
Tohru Nakashima AG codes from vector bundles . . . . . . 107--115
Shenglin Zhou and
Huili Dong Alternating groups and flag-transitive
triplanes . . . . . . . . . . . . . . . 117--126
Vladimir Blinovsky and
Uri Erez and
Simon Litsyn Weight distribution moments of random
linear/coset codes . . . . . . . . . . . 127--138
Gregory M. Zaverucha and
Douglas R. Stinson Anonymity in shared symmetric key
primitives . . . . . . . . . . . . . . . 139--160
C. Fernández-Córdoba and
K. T. Phelps On the minimum distance graph of an
extended Preparata code . . . . . . . . 161--168
Eimear Byrne and
Marcus Greferath and
Axel Kohnert and
Vitaly Skachek New bounds for codes over finite
Frobenius rings . . . . . . . . . . . . 169--179
Denis S. Krotov On the binary codes with parameters of
doubly-shortened 1-perfect codes . . . . 181--194
Seungkook Park Minimum distance of Hermitian two-point
codes . . . . . . . . . . . . . . . . . 195--213
Zhengchun Zhou and
Xiaohu Tang Optimal and perfect difference systems
of sets from $q$-ary sequences with
difference-balanced property . . . . . . 215--223
Xiande Zhang and
Gennian Ge $H$-designs with the properties of
resolvability or $(1, 2)$-resolvability 225--256
E. Pasalic and
P. Charpin Some results concerning
cryptographically significant mappings
over GF$(2^n)$ . . . . . . . . . . . . . 257--269
Chun-peng Wang and
Xiao-song Chen On extended algebraic immunity . . . . . 271--281
Panagiotis Rizomiliotis On the security of the Feng--Liao--Yang
Boolean functions with optimal algebraic
immunity against fast algebraic attacks 283--292
Jin Hong The cost of false alarms in Hellman and
rainbow tradeoffs . . . . . . . . . . . 293--327
Hyun Jin Kim Self-dual codes with automorphism of
order $3$ having $8$ cycles . . . . . . 329--346
Giorgio Donati and
Nicola Durante On the intersection of a Hermitian curve
with a conic . . . . . . . . . . . . . . 347--360
Rasha Shaheen and
Arne Winterhof Permutations of finite fields for check
digit systems . . . . . . . . . . . . . 361--371
Ulrich Dempwolff and
Timo Neumann Geometric and design-theoretic aspects
of semibent functions I . . . . . . . . 373--381
R. J. R. Abel and
F. E. Bennett Existence of directed BIBDs with block
size $7$ and related perfect
$5$-deletion-correcting codes of length
$7$ . . . . . . . . . . . . . . . . . . 383--397
Xiaoyu Liu An equivalence of Ward's bound and its
application . . . . . . . . . . . . . . 1--9
Tamir Tassa Generalized oblivious transfer by secret
sharing . . . . . . . . . . . . . . . . 11--21
Jie Cui and
Junying Pei Quaternary 1-generator quasi-cyclic
codes . . . . . . . . . . . . . . . . . 23--33
Chang-An Zhao and
Dongqing Xie and
Fangguo Zhang and
Jingwei Zhang and
Bing-Long Chen Computing bilinear pairings on elliptic
curves with automorphisms . . . . . . . 35--44
Aaram Yun and
Je Hong Park and
Jooyoung Lee On Lai--Massey and quasi-Feistel ciphers 45--72
Padraig Ó Catháin and
Marc Röder The cocyclic Hadamard matrices of order
less than $40$ . . . . . . . . . . . . . 73--88
Marco Buratti and
Koji Momihara and
Anita Pasotti New results on optimal $(v, 4, 2, 1)$
optical orthogonal codes . . . . . . . . 89--109
Rajendra M. Pawale Quasi-symmetric designs with the
difference of block intersection numbers
two . . . . . . . . . . . . . . . . . . 111--121
Sudhir R. Ghorpade and
Sartaj Ul Hasan and
Meena Kumari Primitive polynomials, Singer cycles and
word-oriented linear feedback shift
registers . . . . . . . . . . . . . . . 123--134
Jianguo Lei and
Cuiling Fan Optimal difference systems of sets and
partition-type cyclic difference
packings . . . . . . . . . . . . . . . . 135--153
David G. Glynn An invariant for matrices and sets of
points in prime characteristic . . . . . 155--172
Roberto Avanzi and
Clemens Heuberger and
Helmut Prodinger Redundant $\tau$-adic expansions I:
non-adjacent digit sets and their
applications to scalar multiplication 173--202
Koichi Betsumiya and
Masaaki Harada and
Hiroshi Kimura Hadamard matrices of order $32$ and
extremal ternary self-dual codes . . . . 203--214
David G. Glynn A condition for arcs and MDS codes . . . 215--218
Dimitrios Poulakis Erratum to: A Variant of Digital
Signature Algorithm . . . . . . . . . . 219--219
Bahattin Yildiz and
Suat Karadeniz Cyclic codes over $F_2 + u F_2 + v F_2 +
u v F_2$ . . . . . . . . . . . . . . . . 221--234
Jong Hwan Park Inner-product encryption under standard
assumptions . . . . . . . . . . . . . . 235--257
Yongqiang Li and
Mingsheng Wang On EA-equivalence of certain
permutations to power mappings . . . . . 259--269
Palash Sarkar A trade-off between collision
probability and key size in universal
hashing using polynomials . . . . . . . 271--278
Jianqin Zhou On the $k$-error linear complexity of
sequences with period $2 p^n$ over
$\mathrm{GF}(q)$ . . . . . . . . . . . . 279--296
Kwangsu Lee and
Dong Hoon Lee Improved hidden vector encryption with
short ciphertexts and tokens . . . . . . 297--319
Hui Zhang and
Gennian Ge Completely reducible super-simple
designs with block size four and related
super-simple packings . . . . . . . . . 321--346
Matthew Geoffrey Parker and
Sasha Kholosha and
Pascale Charpin and
Eirik Rosnes Editorial . . . . . . . . . . . . . . . 1--1
Céline Blondeau and
Beno\^\it Gérard and
Jean-Pierre Tillich Accurate estimates of the data
complexity and success probability for
various cryptanalyses . . . . . . . . . 3--34
Andrey Bogdanov On unbalanced Feistel networks with
contracting MDS diffusion . . . . . . . 35--58
Nina Brandstätter and
Gottlieb Pirsic and
Arne Winterhof Correlation of the two-prime Sidel'nikov
sequence . . . . . . . . . . . . . . . . 59--68
Lilya Budaghyan and
Claude Carlet CCZ-equivalence of bent vectorial
functions and related constructions . . 69--87
Claude Carlet Relating three nonlinearity parameters
of vectorial functions and building APN
functions from bent functions . . . . . 89--109
Danyo Danev and
Stefan Dodunekov and
Diana Radkova A family of constacyclic ternary
quasi-perfect codes with covering radius
$3$ . . . . . . . . . . . . . . . . . . 111--118
Lars Eirik Danielsen and
Matthew G. Parker Directed graph representation of
half-rate additive codes over
$\mathrm{GF}(4)$ . . . . . . . . . . . . 119--130
Richard G. Gibson and
Jonathan Jedwab Quaternary Golay sequence pairs I: even
length . . . . . . . . . . . . . . . . . 131--146
Richard G. Gibson and
Jonathan Jedwab Quaternary Golay sequence pairs II: odd
length . . . . . . . . . . . . . . . . . 147--157
David G. Harris Critique of the related-key attack
concept . . . . . . . . . . . . . . . . 159--168
Marc Joye How (Not) to design strong-RSA
signatures . . . . . . . . . . . . . . . 169--182
Torleiv Klòve Lower bounds on the size of spheres of
permutations under the Chebychev
distance . . . . . . . . . . . . . . . . 183--191
Philippe Langevin and
Gregor Leander Counting all bent functions in dimension
eight $99270589265934370305785861242880$
[$\approx 2^{106}$] . . . . . . . . . . 193--205
Gregor Leander and
François Rodier Bounds on the degree of APN polynomials:
the case of $x^{-1} + g(x)$ . . . . . . 207--222
Petr Lisonek and
Marko Moisio On zeros of Kloosterman sums . . . . . . 223--230
Subhamoy Maitra and
Goutam Paul and
Shashwat Raizada and
Subhabrata Sen and
Rudradev Sengupta Some observations on HC-128 . . . . . . 231--245
Stéphane Manuel Classification and generation of
disturbance vectors for collision
attacks against SHA-1 . . . . . . . . . 247--263
Sihem Mesnager A new class of bent and hyper-bent
Boolean functions in polynomial forms 265--279
Patric R. J. Östergård and
Olli Pottonen Two optimal one-error-correcting codes
of length $13$ that are not doubly
shortened perfect codes . . . . . . . . 281--285
Elif Kurtaran Özbudak and
Ferruh Özbudak and
Zülfükar Saygi A class of authentication codes with
secrecy . . . . . . . . . . . . . . . . 287--318
Alexander Pott and
Yin Tan and
Tao Feng and
San Ling Association schemes arising from bent
functions . . . . . . . . . . . . . . . 319--331
Kai-Uwe Schmidt On the correlation distribution of
Delsarte--Goethals sequences . . . . . . 333--347
Igor Semaev Sparse Boolean equations and circuit
lattices . . . . . . . . . . . . . . . . 349--364
Ziran Tu and
Yingpu Deng A conjecture about binary strings and
its applications on constructing Boolean
functions with optimal algebraic
immunity . . . . . . . . . . . . . . . . 1--14
Jongsung Kim and
Jaechul Sung and
Ermaliza Razali and
Raphael C.-W. Phan and
Marc Joye Notions and relations for RKA-secure
permutation and function families . . . 15--35
Yanxun Chang and
Yeow Meng Chee and
Junling Zhou A pair of disjoint $3$-GDDs of type $g^t
u^1$ . . . . . . . . . . . . . . . . . . 37--62
Hossein Ghodosi Comments on Harn--Lin's cheating
detection scheme . . . . . . . . . . . . 63--66
Yonglin Cao Structural properties and enumeration of
$1$-generator generalized quasi-cyclic
codes . . . . . . . . . . . . . . . . . 67--79
Sanna Ranto On binary linear $r$-identifying codes 81--89
Yutaka Hiramine A family of non class-regular symmetric
transversal designs of spread type . . . 91--99
Horst Trinker Cubic and higher degree bounds for codes
and $(t, m, s)$-nets . . . . . . . . . . 101--121
Jiqiang Lu The (related-key) impossible boomerang
attack and its application to the AES
block cipher . . . . . . . . . . . . . . 123--143
Wenping Ma and
Shaohui Sun New designs of frequency hopping
sequences with low hit zone . . . . . . 145--153
Abbas Alhakim and
Mufutau Akinwande A recursive construction of nonbinary de
Bruijn sequences . . . . . . . . . . . . 155--169
Yin Li and
Gong-liang Chen and
Jian-hua Li An alternative class of irreducible
polynomials for optimal extension fields 171--182
Nikhil Singhi and
Nidhi Singhi Minimal logarithmic signatures for
classical groups . . . . . . . . . . . . 183--195
Theo Grundhöfer and
Boris Krinn and
Markus Stroppel Non-existence of isomorphisms between
certain unitals . . . . . . . . . . . . 197--201
V. A. Menegatto and
C. P. Oliveira and
A. P. Peron Exact point-distributions over the
complex sphere . . . . . . . . . . . . . 203--223
D. M. Donovan and
M. J. Grannell Designs having the parameters of
projective and affine spaces . . . . . . 225--240
Zhengchun Zhou and
Xiaohu Tang Generalized modified Gold sequences . . 241--253
Jong Hwan Park and
Dong Hoon Lee Fully collusion-resistant traitor
tracing scheme with shorter ciphertexts 255--276
Klaus Metsch A generalization of a result of
Dembowski and Wagner . . . . . . . . . . 277--282
Miao Liang and
Beiliang Du A new class of splitting $3$-designs . . 283--290
Jesús Carrillo-Pacheco and
Felipe Zaldivar On Lagrangian--Grassmannian codes . . . 291--298
Chia-Jung Lee and
Te-Tsung Lin and
Min-Zheng Shieh and
Shi-Chun Tsai and
Hsin-Lung Wu Decoding permutation arrays with ternary
vectors . . . . . . . . . . . . . . . . 1--9
Giuseppe Marino and
Olga Polverino and
Rocco Trombetti Towards the classification of rank $2$
semifields $6$-dimensional over their
center . . . . . . . . . . . . . . . . . 11--29
M. Bilal and
J. Borges and
S. T. Dougherty and
C. Fernández-Córdoba Maximum distance separable codes over
$\mathbb{Z}_4$ and $\mathbb{Z}_2 \times
\mathbb{Z}_4$ . . . . . . . . . . . . . 31--40
Sudhir Batra and
S. K. Arora Some cyclic codes of length $2 p^n$ . . 41--69
Roberto Avanzi and
Waldyr Dias Benits and
Steven D. Galbraith and
James McKee On the distribution of the coefficients
of normal forms for Frobenius expansions 71--89
Ma\lgorzata Prazmowska and
Krzysztof Prazmowski Semi-Pappus configurations;
combinatorial generalizations of the
Pappus configuration . . . . . . . . . . 91--103
Alain Plagne and
Wolfgang A. Schmid An application of coding theory to
estimating Davenport constants . . . . . 105--118
Zihui Liu and
Wende Chen and
Zhimin Sun and
Xiangyong Zeng Further results on support weights of
certain subcodes . . . . . . . . . . . . 119--129
E. J. Cheon The non-existence of Griesmer codes with
parameters close to codes of Belov type 131--139
Sunghyu Han and
Heisook Lee and
Yoonjin Lee Binary formally self-dual odd codes . . 141--150
Yeow Meng Chee and
Gennian Ge and
Lijun Ji and
San Ling and
Jianxing Yin List decodability at small radii . . . . 151--166
Jaume Martí-Farré and
Carles Padró and
Leonor Vázquez Optimal complexity of secret sharing
schemes with four minimal qualified
subsets . . . . . . . . . . . . . . . . 167--186
Jürgen Bierbrauer Commutative semifields from projection
mappings . . . . . . . . . . . . . . . . 187--196
Minerva Cordero and
Vikram Jha Fractional dimensions in semifields of
odd order . . . . . . . . . . . . . . . 197--221
Hiroki Koga and
Takeru Ishihara A general method for construction of
$(t, n)$-threshold visual secret sharing
schemes for color images . . . . . . . . 223--249
Vladimir Edemskiy About computation of the linear
complexity of generalized cyclotomic
sequences with period $p^{n + 1}$ . . . 251--260
Carl Bracken and
Eimear Byrne and
Gary McGuire and
Gabriele Nebe On the equivalence of quadratic APN
functions . . . . . . . . . . . . . . . 261--272
B. Hanson and
D. Panario and
D. Thomson Swan-like results for binomials and
trinomials over finite fields of odd
characteristic . . . . . . . . . . . . . 273--283
R. Julian R. Abel and
Nigel H. N. Chan and
Diana Combe and
William D. Palmer Existence of GBRDs with block size $4$
and BRDs with block size $5$ . . . . . . 285--300
Melsik K. Kyuregyan and
Gohar M. Kyureghyan Irreducible compositions of polynomials
over finite fields . . . . . . . . . . . 301--314
Denis S. Krotov On weight distributions of perfect
colorings and completely regular codes 315--329
Qi Wang The linear span of the frequency hopping
sequences in optimal sets . . . . . . . 331--344
Andrew T. Jesso and
David A. Pike and
Nabil Shalaby Hamilton cycles in restricted
block-intersection graphs . . . . . . . 345--353
Mario Lamberger and
Florian Mendel and
Vincent Rijmen and
Koen Simoens Memoryless near-collisions via coding
theory . . . . . . . . . . . . . . . . . 1--18
Yun Fan and
Guanghui Zhang On the existence of self-dual
permutation codes of finite groups . . . 19--29
Kenza Guenda New MDS self-dual codes over finite
fields . . . . . . . . . . . . . . . . . 31--42
M. Christopoulou and
T. Garefalakis and
D. Panario and
D. Thomson Gauss periods as constructions of low
complexity normal bases . . . . . . . . 43--62
Simona Bonvicini and
Marco Buratti and
Gloria Rinaldi and
Tommaso Traetta Some progress on the existence of
$1$-rotational Steiner triple systems 63--78
Wolfgang Lang and
Ekkehard Schneider Turyn type Williamson matrices up to
order $99$ . . . . . . . . . . . . . . . 79--84
Maheshanand Bhaintwal Skew quasi-cyclic codes over Galois
rings . . . . . . . . . . . . . . . . . 85--101
Tamás Sz\Honyi and
Zsuzsa Weiner A stability theorem for lines in Galois
planes of prime order . . . . . . . . . 103--108
Miao Liang and
Beiliang Du A new class of $3$-fold perfect
splitting authentication codes . . . . . 109--119
Tatsuya Maruta and
Yuri Yoshida A generalized extension theorem for
linear codes . . . . . . . . . . . . . . 121--130
Ce Shi and
Yu Tang and
Jianxing Yin The equivalence between optimal
detecting arrays and super-simple OAs 131--142
Xiande Zhang and
Hui Zhang and
Gennian Ge Optimal constant weight covering codes
and nonuniform group divisible
$3$-designs with block size four . . . . 143--160
Xiaoshan Kai and
Shixin Zhu Negacyclic self-dual codes over finite
chain rings . . . . . . . . . . . . . . 161--174
David G. Glynn The factorization of the permanent of a
matrix with minimal rank in prime
characteristic . . . . . . . . . . . . . 175--177
Dongyoung Roh and
Sang Geun Hahn The square root Diffie--Hellman problem 179--187
Ferruh Özbudak and
Elif Saygi and
Zülfükar Saygi A new class of quaternary LCZ sequence
sets . . . . . . . . . . . . . . . . . . 189--198
Lijun Ji and
Yang Li and
Jianxing Yin Constructions of covering arrays of
strength five . . . . . . . . . . . . . 199--208
J. Rif\`a and
F. I. Solov'eva and
M. Villanueva Intersection of Hamming codes avoiding
Hamming subcodes . . . . . . . . . . . . 209--223
Ron Shaw and
Neil Gordon and
Hans Havlicek Aspects of the Segre variety
$S_{1,1,1}(2) \mathcal{S}_{1,1,1}(2)$ 225--239
Ulrich Dempwolff Geometric and design-theoretic aspects
of semibent functions II . . . . . . . . 241--252
Tao Feng On cyclic codes of length $2^{2^r} - 1$
with two zeros whose dual codes have
three weights . . . . . . . . . . . . . 253--258
Hossein Ghodosi and
Josef Pieprzyk and
Ron Steinfeld Multi-party computation with conversion
of secret sharing . . . . . . . . . . . 259--272
K. T. Arasu and
Siu Lun Ma Nonexistence of ${\rm CW}(110, 100)$ . . 273--278
Yutaka Hiramine A construction for modified generalized
Hadamard matrices using QGH matrices . . 279--288
Yupu Hu and
Juntao Gao and
Qing Liu and
Yiwei Zhang Fault analysis of Trivium . . . . . . . 289--311
Lin Tan and
Wen-Feng Qi and
Hong Xu Asymptotic analysis on the normalized
$k$-error linear complexity of binary
sequences . . . . . . . . . . . . . . . 313--321
Petteri Kaski and
Mahdad Khatirinejad and
Patric R. J. Östergård Steiner triple systems satisfying the
$4$-vertex condition . . . . . . . . . . 323--330
Thomas Britz and
Trygve Johnsen and
Dillon Mayhew and
Keisuke Shiromoto Wei-type duality theorems for matroids 331--341
Hans Havlicek and
Boris Odehnal and
Metod Saniga On invariant notions of Segre varieties
in binary projective spaces . . . . . . 343--356
Jordan D. Webster Using rational idempotents to show
Turyn's bound is sharp . . . . . . . . . 357--365
Gaetan Bisson and
Andrew V. Sutherland A low-memory algorithm for finding short
product representations in finite groups 1--13
D. M. Donovan and
M. J. Grannell On the number of designs with affine
parameters . . . . . . . . . . . . . . . 15--27
Ian McLoughlin A group ring construction of the
$[48,24,12]$ type II linear block code 29--41
Hyun Jin Kim The binary extremal self-dual codes of
lengths $38$ and $40$ . . . . . . . . . 43--57
Alina Ostafe Pseudorandom vector sequences of maximal
period generated by triangular
polynomial dynamical systems . . . . . . 59--72
V. C. Mavron and
T. P. McDonough and
M. S. Shrikhande On quasi-symmetric designs with
intersection difference three . . . . . 73--86
Liping Wang and
Qiang Wang On explicit factors of cyclotomic
polynomials over finite fields . . . . . 87--104
Han Mao Kiah and
Ka Hin Leung and
San Ling A note on cyclic codes over ${\rm
GR}(p^2, m)$ of length $p^k$ . . . . . . 105--112
Steven T. Dougherty and
Suat Karadeniz and
Bahattin Yildiz Cyclic codes over ${\rm R}_k$ . . . . . 113--126
László Csirmaz and
Gábor Tardos On-line secret sharing . . . . . . . . . 127--147
Manohar L. Aggarwal and
Andreas Klein and
Leo Storme The characterisation of the smallest two
fold blocking sets in ${\rm PG}(n, 2)$ 149--157
J. De Beule and
A. Hallez and
L. Storme A characterisation result on a
particular class of non-weighted
minihypers . . . . . . . . . . . . . . . 159--170
M. De Boeck Small weight codewords in the dual code
of points and hyperplanes in ${\rm
PG}(n, q)$, $q$ even . . . . . . . . . . 171--182
Xiang-Dong Hou Classification of self dual quadratic
bent functions . . . . . . . . . . . . . 183--198
Kaoru Kurosawa Round-efficient perfectly secure message
transmission scheme against general
adversary . . . . . . . . . . . . . . . 199--207
Aixian Zhang and
Keqin Feng Construction of cyclotomic codebooks
nearly meeting the Welch bound . . . . . 209--224
Paul Stankovski and
Sushmita Ruj and
Martin Hell and
Thomas Johansson Improved distinguishers for HC-128 . . . 225--240
Derek H. Smith and
Roberto Montemanni A new table of permutation codes . . . . 241--253
Oriol Farr\`as and
Jessica Ruth Metcalf-Burton and
Carles Padró and
Leonor Vázquez On the optimization of bipartite secret
sharing schemes . . . . . . . . . . . . 255--271
Thomas W. Cusick and
Younhwan Cheon Affine equivalence for rotation
symmetric Boolean functions with $2^k$
variables . . . . . . . . . . . . . . . 273--294
Jong Yoon Hyun and
Heisook Lee and
Yoonjin Lee MacWilliams duality and a Gleason-type
theorem on self-dual bent functions . . 295--304
Kun Wang and
Jianmin Wang Semicyclic $4$-GDDs and related
two-dimensional optical orthogonal codes 305--319
Relinde P. M. J. Jurrius Weight enumeration of codes from finite
spaces . . . . . . . . . . . . . . . . . 321--330
Zhi Hu and
Patrick Longa and
Maozhi Xu Implementing the $4$-dimensional GLV
method on GLS elliptic curves with
$j$-invariant $0$ . . . . . . . . . . . 331--343
Daniela Silvesan and
Nabil Shalaby Cyclic block designs with block size $3$
from Skolem-type sequences . . . . . . . 345--355
Yuemei Huang and
Yanxun Chang Two classes of optimal two-dimensional
OOCs . . . . . . . . . . . . . . . . . . 357--363
E. Ballico Scroll codes over curves of higher
genus: reducible and superstable vector
bundles . . . . . . . . . . . . . . . . 365--377
Antonino Simone and
Boris Skori\'c Accusation probabilities in Tardos
codes: beyond the Gaussian approximation 379--412
Guobiao Weng and
Xiangyong Zeng Further results on planar DO functions
and commutative semifields . . . . . . . 413--423
Daniel Panario and
Olga Sosnovski and
Brett Stevens and
Qiang Wang Divisibility of polynomials over finite
fields and combinatorial applications 425--445
Arrigo Bonisoli and
James Hirschfeld and
Spyros Magliveras Preface: geometry, combinatorial designs
and cryptology . . . . . . . . . . . . . 1--2
Gábor Korchmáros and
Valentino Lanzone and
Angelo Sonnino Projective $k$-arcs and $2$-level
secret-sharing schemes . . . . . . . . . 3--15
Frank De Clerck and
Stefaan De Winter and
Thomas Maes Singer $8$-arcs of Mathon type in PG$(2,
2^7)$ . . . . . . . . . . . . . . . . . 17--31
Lucia Indaco and
Gábor Korchmáros $42$-arcs in PG$(2, q)$ left invariant
by PSL$(2, 7)$ . . . . . . . . . . . . . 33--46
Ilaria Cardinali and
Antonio Pasini Two forms related to the symplectic dual
polar space in odd characteristic . . . 47--60
B. Temmermans and
J. A. Thas and
H. Van Maldeghem Collineations of polar spaces with
restricted displacements . . . . . . . . 61--80
Bart De Bruyn A decomposition of the universal
embedding space for the near polygon
\mathbb H$_n$ . . . . . . . . . . . . . 81--91
S. E. Payne and
J. A. Thas An essay on self-dual generalized
quadrangles . . . . . . . . . . . . . . 93--103
Philippe Cara and
Alice Devillers and
Michael Giudici and
Cheryl E. Praeger Quotients of incidence geometries . . . 105--128
S. D. Georgiou and
E. Lappas Self-dual codes from circulant matrices 129--141
Ka Hin Leung and
Bernhard Schmidt New restrictions on possible orders of
circulant Hadamard matrices . . . . . . 143--151
Marién Abreu and
Domenico Labbate and
John Sheehan Irreducible pseudo $2$-factor isomorphic
cubic bipartite graphs . . . . . . . . . 153--160
Madeline González Muñiz and
Rainer Steinwandt Security of message authentication codes
in the presence of key-dependent
messages . . . . . . . . . . . . . . . . 161--169
Simon R. Blackburn and
Douglas R. Stinson and
Jalaj Upadhyay On the complexity of the herding attack
and some related attacks on hash
functions . . . . . . . . . . . . . . . 171--193
Rainer Steinwandt and
Adriana Suárez Corona Identity-based non-interactive key
distribution with forward security . . . 195--208
Pascal Marquardt and
Pavol Svaba and
Tran van Trung Pseudorandom number generators based on
random covers for finite groups . . . . 209--220
Otokar Grosek and
Peter Horák On quasigroups with few associative
triples . . . . . . . . . . . . . . . . 221--227
Xiwang Cao and
Lei Hu On the reducibility of some composite
polynomials over finite fields . . . . . 229--239
Shaojing Fu and
Kanta Matsuura and
Chao Li and
Longjiang Qu Construction of highly nonlinear
resilient S-boxes with given degree . . 241--253
Anna Y. Pun and
Philip P. W. Wong A geometric proof of a theorem on
antiregularity of generalized
quadrangles . . . . . . . . . . . . . . 255--263
Olof Heden and
Juliane Lehmann and
Esmeralda Nastase and
Papa Sissokho Extremal sizes of subspace partitions 265--274
Denis S. Krotov On the binary codes with parameters of
triply-shortened $1$-perfect codes . . . 275--283
Jianqin Zhou A counterexample concerning the
$3$-error linear complexity of
$2^n$-periodic binary sequences . . . . 285--286
Mahdi Sajadieh and
Mohammad Dakhilalian and
Hamid Mala and
Behnaz Omoomi On construction of involutory MDS
matrices from Vandermonde Matrices in
GF$(2^q)$ . . . . . . . . . . . . . . . 287--308
Antonio Cossidente and
Giuseppe Marino Hyperovals of Hermitian polar spaces . . 309--314
Edwin R. van Dam and
Willem H. Haemers Preface: Geometric and algebraic
combinatorics . . . . . . . . . . . . . 1--3
Simeon Ball and
Jan De Beule On sets of vectors of a finite vector
space in which every subset of basis
size is a basis II . . . . . . . . . . . 5--14
Dieter Jungnickel and
Vladimir D. Tonchev A Hamada type characterization of the
classical geometric designs . . . . . . 15--28
Aleksandar Jurisi\'c and
Janos Vidali Extremal $1$-codes in distance-regular
graphs of diameter $3$ . . . . . . . . . 29--47
Alexander L. Gavrilyuk and
Alexander A. Makhnev Distance-regular graphs with
intersection arrays $\{52, 35, 16; 1, 4,
28\}$ and $\{69, 48, 24; 1, 4, 46\}$ do
not exist . . . . . . . . . . . . . . . 49--54
Jack H. Koolen and
Jongyook Park A relationship between the diameter and
the intersection number $c_2$ for a
distance-regular graph . . . . . . . . . 55--63
A. Blokhuis and
A. E. Brouwer Spectral characterization of a graph on
the flags of the eleven point biplane 65--69
Aart Blokhuis and
Andries E. Brouwer and
Willem H. Haemers The graph with spectrum $14^1 2^{40}
(-4)^{10} (-6)^9$ . . . . . . . . . . . 71--75
Hyonju Yu On the limit points of the smallest
eigenvalues of regular graphs . . . . . 77--88
Hirotake Kurihara An excess theorem for spherical
$2$-designs . . . . . . . . . . . . . . 89--98
Takuya Ikuta and
Akihiro Munemasa Nomura algebras of nonsymmetric Hadamard
models . . . . . . . . . . . . . . . . . 99--106
Andries Brouwer and
Çiçek Güven The generating rank of the space of
short vectors in the Leech lattice mod
$2$ . . . . . . . . . . . . . . . . . . 107--113
Hendrik Van Maldeghem Symplectic polarities of buildings of
type E$_6$ . . . . . . . . . . . . . . . 115--125
Bart De Bruyn The pseudo-hyperplanes and homogeneous
pseudo-embeddings of AG$(n, 4)$ and
PG$(n, 4)$ . . . . . . . . . . . . . . . 127--156
William M. Kantor and
Tim Penttila Planes in which every quadrangle lies on
a unique Baer subplane . . . . . . . . . 157--161
K. T. Arasu and
Xiaoyu Liu and
Gary McGuire Preface: Richard M. Wilson, Special
issue honoring his 65th birthday . . . . 163--164
Steve Butler and
Ron Graham A note on marking lines in $[k]^n$ in
honor of Rick Wilson's 65th birthday . . 165--175
Bahattin Yildiz A lemma on binomial coefficients and
applications to Lee weights modulo $2^e$
of codes over $\mathbb {Z}_4$ . . . . . 177--185
A. Blokhuis and
A. E. Brouwer and
T. Sz\Honyi On the chromatic number of $q$-Kneser
graphs . . . . . . . . . . . . . . . . . 187--197
Charles J. Colbourn and
Daniel Horsley and
Chengmin Wang Trails of triples in partial triple
systems . . . . . . . . . . . . . . . . 199--212
Peter J. Dukes Coding with injections . . . . . . . . . 213--222
W. H. Haemers and
M. J. P. Peeters The maximum order of adjacency matrices
of graphs with a given rank . . . . . . 223--232
Noga Alon and
Keith E. Mellinger and
Dhruv Mubayi and
Jacques Verstraëte The de Bruijn--Erd\Hos theorem for
hypergraphs . . . . . . . . . . . . . . 233--245
Tao Feng and
Fan Wu and
Qing Xiang Pseudocyclic and non-amorphic fusion
schemes of the cyclotomic association
schemes . . . . . . . . . . . . . . . . 247--257
Tom Hòholdt and
Heeralal Janwa Eigenvalues and expansion of bipartite
graphs . . . . . . . . . . . . . . . . . 259--273
Fernando Hernando and
Gary McGuire Proof of a conjecture of Segre and
Bartocci on monomial hyperovals in
projective planes . . . . . . . . . . . 275--289
Daniel J. Katz On theorems of Delsarte--McEliece and
Chevalley--Warning--Ax--Katz . . . . . . 291--324
Jeffrey H. Dinitz and
Maura B. Paterson and
Douglas R. Stinson and
Ruizhong Wei Constructions for retransmission
permutation arrays . . . . . . . . . . . 325--351
Niranjan Balachandran Forbidden configurations and Steiner
designs . . . . . . . . . . . . . . . . 353--364
Navin Singhi and
D. K. Ray-Chaudhuri Studying designs via multisets . . . . . 365--381
P. Baldi Boolean autoencoders and hypercube
clustering complexity . . . . . . . . . 383--403
Daniel Augot and
Anne Canteaut and
Gohar Kyureghyan Editorial . . . . . . . . . . . . . . . 1--2
Eimear Byrne and
Marcus Greferath and
Jaume Pernas Algebraic decoding of negacyclic codes
over $\mathbb{Z}_4$ . . . . . . . . . . 3--16
Patrick Solé and
Jean-Claude Belfiore Constructive spherical codes near the
Shannon bound . . . . . . . . . . . . . 17--26
Thomas Honold and
Ivan Landjev Non-free extensions of the simplex codes
over a chain ring with four elements . . 27--38
Michael Kiermaier and
Johannes Zwanzger New ring-linear codes from dualization
in projective Hjelmslev geometries . . . 39--55
Antonia Wachter-Zeh and
Valentin Afanassiev Fast decoding of Gabidulin codes . . . . 57--73
Andrey Bogdanov and
Kyoji Shibutani Generalized Feistel networks revisited 75--97
Alexander Pott and
Yue Zhou CCZ and EA equivalence between mappings
over finite Abelian groups . . . . . . . 99--109
Ernst Schulte-Geers On CCZ-equivalence of addition $ \bmod
2^n $ . . . . . . . . . . . . . . . . . 111--127
L. A. Bassalygo and
V. A. Zinoviev On divisibility of exponential sums of
polynomials of special type over fields
of characteristic $2$ . . . . . . . . . 129--143
Marcus Greferath and
Cathy Mc Fadden and
Jens Zumbrägel Characteristics of invariant weights
related to code equivalence over rings 145--156
Santanu Sarkar and
Subhamoy Maitra Cryptanalytic results on `Dual CRT' and
`Common Prime' RSA . . . . . . . . . . . 157--174
Andrea Röck and
Kaisa Nyberg Generalization of Matsui's Algorithm $1$
to linear hull for key-alternating block
ciphers . . . . . . . . . . . . . . . . 175--193
Olav Geil and
Casper Thomsen Weighted Reed--Muller codes revisited 195--220
Peter Beelen and
Diego Ruano Bounding the number of points on a curve
using a generalization of Weierstrass
semigroups . . . . . . . . . . . . . . . 221--230
Ayça Çesmelioglu and
Wilfried Meidl A construction of bent functions from
plateaued functions . . . . . . . . . . 231--242
Sugata Gangopadhyay and
Anand Joshi and
Gregor Leander A new construction of bent functions
based on $\mathbb{Z}$-bent functions . . 243--256
Wilfried Meidl and
Alev Topuzoglu Quadratic functions with prescribed
spectra . . . . . . . . . . . . . . . . 257--273
Joachim Rosenthal and
Anna-Lena Trautmann A complete characterization of
irreducible cyclic orbit codes and their
Plücker embedding . . . . . . . . . . . . 275--289
Alain Couvreur and
Iwan Duursma Evaluation codes from smooth quadric
surfaces and twisted Segr\`e varieties 291--303
Shuhong Gao and
Raymond Heindl Multivariate public key cryptosystems
from Diophantine equations . . . . . . . 1--18
Jie Li and
Xiangyong Zeng and
Xiaohu Tang and
Chunlei Li A family of quadriphase sequences of
period $ 4(2^n - 1) $ with low
correlation and large linear span . . . 19--35
Mieko Yamada Difference sets over Galois rings with
odd extension degrees and characteristic
an even power of $2$ . . . . . . . . . . 37--57
Yonglin Cao and
Jian Gao Constructing quasi-cyclic codes from
linear algebra theory . . . . . . . . . 59--75
Deng Tang and
Weiguo Zhang and
Xiaohu Tang Construction of balanced Boolean
functions with high nonlinearity and
good autocorrelation properties . . . . 77--91
Dimitri Leemans and
B. G. Rodrigues Binary codes of some strongly regular
subgraphs of the McLaughlin graph . . . 93--109
Mausumi Bose and
Aloke Dey and
Rahul Mukerjee Key predistribution schemes for
distributed sensor networks via block
designs . . . . . . . . . . . . . . . . 111--136
John Bamberg and
Michael Giudici and
Gordon F. Royle Hemisystems of small flock generalized
quadrangles . . . . . . . . . . . . . . 137--157
Dina Ghinelli and
J. W. P. Hirschfeld and
Dieter Jungnickel Obituary: Daniel R. Hughes (1927--2012) 159--162
Dina Ghinelli and
Dieter Jungnickel Obituary: Marialuisa J. de Resmini
(1939--2012) . . . . . . . . . . . . . . 163--167
Motahhareh Gharahi and
Massoud Hadian Dehkordi The complexity of the graph access
structures on six participants . . . . . 169--173
Huajin Chen and
Tian Tian and
Wenfeng Qi On the affine equivalence relation
between two classes of Boolean functions
with optimal algebraic immunity . . . . 175--185
Ibrahim Özen and
Eda Tekin Moments of the support weight
distribution of linear codes . . . . . . 187--196
Fangguo Zhang and
Ping Wang Speeding up elliptic curve discrete
logarithm computations with point
halving . . . . . . . . . . . . . . . . 197--208
Frederik Armknecht and
Stefan Katzenbeisser and
Andreas Peter Group homomorphic encryption:
characterizations, impossibility
results, and applications . . . . . . . 209--232
Kun Wang and
Jianxing Yin Further results on the existence of
nested orthogonal arrays . . . . . . . . 233--243
Ian Goldberg and
Douglas Stebila and
Berkant Ustaoglu Anonymity and one-way authentication in
key exchange protocols . . . . . . . . . 245--269
Hoon Hong and
Eunjeong Lee and
Hyang-Sook Lee and
Cheol-Min Park Simple and exact formula for minimum
loop length in Ate$_i$ pairing based on
Brezing--Weng curves . . . . . . . . . . 271--292
Kiyoshi Nagata and
Fidel Nemenzo and
Hideo Wada Mass formula and structure of self-dual
codes over Z2s ${\bf Z}_{2^s}$ . . . . . 293--316
Zhixiong Chen and
Xiaoni Du On the linear complexity of binary
threshold sequences derived from Fermat
quotients . . . . . . . . . . . . . . . 317--323
Pinhui Ke and
Jie Zhang and
Shengyuan Zhang On the linear complexity and the
autocorrelation of generalized
cyclotomic binary sequences of length $
2 p^m $ . . . . . . . . . . . . . . . . 325--339
Kristin Lauter and
Ning Shang Generating pairing-friendly parameters
for the CM construction of genus $2$
curves over prime fields . . . . . . . . 341--355
Orr Dunkelman and
Nathan Keller Cryptanalysis of the Stream Cipher LEX 357--373
Luca Giuzzi and
Valentina Pepe Families of twisted tensor product codes 375--384
Neil I. Gillespie and
Cheryl E. Praeger Neighbour transitivity on codes in
Hamming graphs . . . . . . . . . . . . . 385--393
Jaime Gutierrez and
Álvar Ibeas and
Domingo Gómez-Pérez and
Igor E. Shparlinski Predicting masked linear pseudorandom
number generators over finite fields . . 395--402
D. Ghinelli and
J. W. P. Hirschfeld and
D. Jungnickel and
J. A. Thas Editorial: Finite geometries . . . . . . 1--2
Jan De Beule On large maximal partial ovoids of the
parabolic quadric $ Q(4, q) $ . . . . . 3--10
L. Beukemann and
K. Metsch Small tight sets of hyperbolic quadrics 11--24
Peter Sziklai and
Geertrui Van de Voorde A small minimal blocking set in $ {\rm
PG}(n, p^t) $, spanning a $ (t - 1)
$-space, is linear . . . . . . . . . . . 25--32
Morgan Rodgers Cameron--Liebler line classes . . . . . 33--37
David G. Glynn Permanent formulae from the Veronesean 39--47
Anton Betten and
Eun Ju Cheon and
Seon Jeong Kim and
Tatsuya Maruta Three families of multiple blocking sets
in Desarguesian projective planes of
even order . . . . . . . . . . . . . . . 49--59
Massimo Giulietti and
Gábor Korchmáros Arcs in $ {\rm AG} (2, q) $ determining
few directions . . . . . . . . . . . . . 61--72
Massimo Giulietti and
Gábor Korchmáros and
Stefano Marcugini and
Fernanda Pambianco Transitive $ A_6 $-invariant $k$-arcs in
$ {\rm PG}(2, q) $ . . . . . . . . . . . 73--79
Ulrich Dempwolff More translation planes and semifields
from Dembowski--Ostrom polynomials . . . 81--103
Thomas Honold and
Michael Kiermaier The existence of maximal $ (q^2, 2)
$-arcs in projective Hjelmslev planes
over chain rings of length $2$ and odd
prime characteristic . . . . . . . . . . 105--126
Carmen Amarra and
Michael Giudici and
Cheryl E. Praeger Symmetric diameter two graphs with
affine-type vertex-quasiprimitive
automorphism group . . . . . . . . . . . 127--139
Yu Qing Chen and
Tao Feng Abelian and non-abelian Paley type group
schemes . . . . . . . . . . . . . . . . 141--154
John Polhill and
James A. Davis and
Ken Smith A new product construction for partial
difference sets . . . . . . . . . . . . 155--161
Dieter Jungnickel and
Vladimir D. Tonchev New invariants for incidence structures 163--177
Kris Coolsaet On the classification of nonsingular $ 2
\times 2 \times 2 \times 2 $ hypercubes 179--194
David G. Glynn Nonfactorizable nonsingular hypercubes 195--203
Michel Lavrauw Finite semifields and nonsingular
tensors . . . . . . . . . . . . . . . . 205--227
Ilaria Cardinali and
Antonio Pasini On certain forms and quadrics related to
symplectic dual polar spaces in
characteristic $2$ . . . . . . . . . . . 229--258
Bart De Bruyn The pseudo-hyperplanes and homogeneous
pseudo-embeddings of the generalized
quadrangles of order $ (3, t) $ . . . . 259--284
Luk Bettale and
Jean-Charles Faug\`ere and
Ludovic Perret Cryptanalysis of HFE, multi-HFE and
variants for odd and even characteristic 1--52
Gang Chen and
Ruihu Li Ternary self-orthogonal codes of dual
distance three and ternary quantum codes
of distance three . . . . . . . . . . . 53--63
Xiande Zhang and
Gennian Ge A new existence proof for Steiner
quadruple systems . . . . . . . . . . . 65--76
Pantelimon St\uanic\ua and
Thor Martinsen and
Sugata Gangopadhyay and
Brajesh Kumar Singh Bent and generalized bent Boolean
functions . . . . . . . . . . . . . . . 77--94
Derek H. Smith and
Roberto Montemanni Permutation codes with specified packing
radius . . . . . . . . . . . . . . . . . 95--106
Todd D. Mateer Simple algorithms for decoding
systematic Reed--Solomon codes . . . . . 107--121
C. Munuera and
A. Sepúlveda and
F. Torres Generalized Hermitian codes . . . . . . 123--130
Fernando Hernando and
Kyle Marshall and
Michael E. O'Sullivan The dimension of subcode-subfields of
shortened generalized Reed--Solomon
codes . . . . . . . . . . . . . . . . . 131--142
G. Lunardon and
G. Marino and
O. Polverino and
R. Trombetti A remark on symplectic semifield planes
and $ Z_4 $-linear codes . . . . . . . . 143--149
Nikolay Yankov New optimal $ [52, 26, 10] $ self-dual
codes . . . . . . . . . . . . . . . . . 151--159
E. Martínez-Moro and
A. Piñera-Nicolás and
I. F. Rúa Additive semisimple multivariable codes
over $ {\mathbb {F}_4} $ . . . . . . . . 161--180
Sylvain Gravier and
Matjaz Kovse and
Michel Mollard and
Julien Moncel and
Aline Parreau New results on variants of covering
codes in Sierpi\'nski graphs . . . . . . 181--188
R. Julian R. Abel and
Diana Combe and
Adrian M. Nelson and
William D. Palmer GBRDs over supersolvable groups and
solvable groups of order prime to $3$ 189--201
Aleksandr Tuxanidy and
Qiang Wang Composed products and factors of
cyclotomic polynomials over finite
fields . . . . . . . . . . . . . . . . . 203--231
Liqin Hu and
Qin Yue Gauss periods and codebooks from
generalized cyclotomic sets of order
four . . . . . . . . . . . . . . . . . . 233--246
Fang Liu and
Daiyuan Peng and
Zhengchun Zhou and
Xiaohu Tang A new frequency-hopping sequence set
based upon generalized cyclotomy . . . . 247--259
Dieter Jungnickel Obituary: Hanfried Lenz (1916--2013) . . 261--263
Tengyu Ma and
Xiaoming Sun and
Huacheng Yu On a conjecture of Butler and Graham . . 265--274
Zhuojun Zhuang and
Yuan Luo and
Bin Dai Code constructions and existence bounds
for relative generalized Hamming weight 275--297
Ichiro Shimada A note on rational normal curves totally
tangent to a Hermitian variety . . . . . 299--303
O. Heden and
J. Lehmann and
E. Nastase and
P. Sissokho The supertail of a subspace partition 305--316
N. Rajesh Pillai and
S. S. Bedi Algebraic attacks on a class of stream
ciphers with unknown output function . . 317--330
Alexis Bonnecaze and
Pierre Liardet and
Alexandre Venelli AES side-channel countermeasure using
random tower field constructions . . . . 331--349
Palash Sarkar A new multi-linear universal hash family 351--367
Marjan Bazrafshan and
Tran van Trung Improved bounds for separating hash
families . . . . . . . . . . . . . . . . 369--382
Joaquim Borges and
Merc\`e Villanueva and
Victor Zinoviev Editorial: 3rd International Castle
Meeting on Coding Theory and
Applications . . . . . . . . . . . . . . 1--2
David Auger and
Gérard Cohen and
Sihem Mesnager Sphere coverings and identifying codes 3--7
Sabine Kampf Bounds on collaborative decoding of
interleaved Hermitian codes and virtual
extension . . . . . . . . . . . . . . . 9--25
Padmapani Seneviratne Codes associated with circulant graphs
and permutation decoding . . . . . . . . 27--33
D. Ghinelli and
J. D. Key and
T. P. McDonough Hulls of codes from incidence matrices
of connected regular graphs . . . . . . 35--54
Vladimir Sidorenko and
Martin Bossert Fast skew-feedback shift-register
synthesis . . . . . . . . . . . . . . . 55--67
Anton Malevich and
Wolfgang Willems On the classification of the extremal
self-dual codes over small fields with
$2$-transitive automorphism groups . . . 69--76
C. Araujo and
I. Dejter and
P. Horak A generalization of Lee codes . . . . . 77--90
Kathryn Haymaker and
Christine A. Kelley Geometric WOM codes and coding
strategies for multilevel flash memories 91--104
Jaume Pernas and
Jaume Pujol and
Merc\`e Villanueva Characterization of the automorphism
group of quaternary linear Hadamard
codes . . . . . . . . . . . . . . . . . 105--115
Maria Bras-Amorós and
Albert Vico-Oton On the Geil--Matsumoto bound and the
length of AG codes . . . . . . . . . . . 117--125
Thomas Feulner Classification and nonexistence results
for linear codes with prescribed minimum
distances . . . . . . . . . . . . . . . 127--138
Joaquim Borges and
Josep Rif\`a and
Victor Zinoviev New families of completely regular codes
and their corresponding distance regular
coset graphs . . . . . . . . . . . . . . 139--148
M. Tomlinson and
M. Jibril and
C. Tjhai and
M. Grassl and
M. Z. Ahmed New binary codes from extended Goppa
codes . . . . . . . . . . . . . . . . . 149--156
Fernando Piñero and
Heeralal Janwa On the subfield subcodes of Hermitian
codes . . . . . . . . . . . . . . . . . 157--173
José Joaquín Bernal and
Juan Jacobo Simón Information sets in abelian codes:
defining sets and Groebner basis . . . . 175--188
C. Galindo and
F. Monserrat Evaluation codes defined by finite
families of plane valuations at infinity 189--213
Irene Márquez-Corbella and
Edgar Martínez-Moro and
Ruud Pellikaan On the unique representation of very
strong algebraic geometry codes . . . . 215--230
Eraj Khan and
Ernst Gabidulin and
Bahram Honary and
Hassan Ahmed Modified Niederreiter type of GPT
cryptosystem based on reducible rank
codes . . . . . . . . . . . . . . . . . 231--239
Telma Pinho and
Raquel Pinto and
Paula Rocha Realization of $2$D convolutional codes
of rate $ \frac {1}{n} $ by separable
Roesser models . . . . . . . . . . . . . 241--250
Kota Ideguchi and
Elmar Tischhauser and
Bart Preneel Internal differential collision attacks
on the reduced-round Gròstl-0 hash
function . . . . . . . . . . . . . . . . 251--271
Junhua Wu Proofs of two conjectures on the
dimensions of binary codes . . . . . . . 273--304
Soohak Choi and
Jong Yoon Hyun and
Hyun Kwang Kim Local duality theorem for $q$-ary
$1$-perfect codes . . . . . . . . . . . 305--311
Myung-Kyu Lee and
Kyeongcheol Yang The exponent of a polarizing matrix
constructed from the Kronecker product 313--322
Javier Herranz and
Alexandre Ruiz and
Germán Sáez Signcryption schemes with threshold
unsigncryption, and applications . . . . 323--345
Aicha Batoul and
Kenza Guenda and
T. Aaron Gulliver On self-dual cyclic codes over finite
chain rings . . . . . . . . . . . . . . 347--358
Qun-Xiong Zheng and
Wen-Feng Qi and
Tian Tian On the distinctness of modular
reductions of primitive sequences over $
Z / (2^{32} - 1) $ . . . . . . . . . . . 359--368
Andrey Bogdanov and
Vincent Rijmen Linear hulls with correlation zero and
linear cryptanalysis of block ciphers 369--383
Ferruh Özbudak and
Burcu Gülmez Temür Finite number of fibre products of
Kummer covers and curves with many
points over finite fields . . . . . . . 385--404
D. Boucher and
F. Ulmer Linear codes using skew polynomials with
automorphisms and derivations . . . . . 405--431
Aart Blokhuis and
Andries E. Brouwer and
Attila Sali Note on the size of binary Armstrong
codes . . . . . . . . . . . . . . . . . 1--4
Hiram H. López and
Carlos Rentería-Márquez and
Rafael H. Villarreal Affine cartesian codes . . . . . . . . . 5--19
D. Bartoli and
M. De Boeck and
S. Fanali and
L. Storme On the functional codes defined by
quadrics and Hermitian varieties . . . . 21--46
Guangfu Wu and
Hsin-Chiu Chang and
Lin Wang and
T. K. Truong Constructing rate $ 1 / p $ systematic
binary quasi-cyclic codes based on the
matroid theory . . . . . . . . . . . . . 47--56
N. P. Smart and
F. Vercauteren Fully homomorphic SIMD operations . . . 57--81
Thijs Laarhoven and
Benne de Weger Optimal symmetric Tardos traitor tracing
schemes . . . . . . . . . . . . . . . . 83--103
P. Loidreau Asymptotic behaviour of codes in rank
metric over finite fields . . . . . . . 105--118
Anuradha Sharma and
Amit K. Sharma On some new $m$-spotty Lee weight
enumerators . . . . . . . . . . . . . . 119--152
S. Arumugam and
R. Lakshmanan and
Atulya K. Nagar On ( $k$, n )*-visual cryptography
scheme . . . . . . . . . . . . . . . . . 153--162
Tian Tian and
Wen-Feng Qi On the largest affine sub-families of a
family of NFSR sequences . . . . . . . . 163--181
Sihong Su and
Xiaohu Tang Construction of rotation symmetric
Boolean functions with optimal algebraic
immunity and high nonlinearity . . . . . 183--199
Yun Fan and
San Ling and
Hongwei Liu Matrix product codes over finite
commutative Frobenius rings . . . . . . 201--227
Alexander Zeh and
Sergey Bezzateev A new bound on the minimum distance of
cyclic codes using
small-minimum-distance cyclic codes . . 229--246
Tomas Nilson and
Pia Heidtmann Inner balance of symmetric designs . . . 247--260
Antonia Wachter-Zeh and
Alexander Zeh and
Martin Bossert Decoding interleaved Reed--Solomon codes
beyond their joint error-correcting
capability . . . . . . . . . . . . . . . 261--281
Peter Dukes and
Leah Howard Group divisible designs in MOLS of order
ten . . . . . . . . . . . . . . . . . . 283--291
Reza Sepahi and
Ron Steinfeld and
Josef Pieprzyk Lattice-based completely non-malleable
public-key encryption in the standard
model . . . . . . . . . . . . . . . . . 293--313
Peipei Dai and
Jianmin Wang and
Jianxing Yin Combinatorial constructions for optimal
$2$-D optical orthogonal codes with
AM--OPPTS property . . . . . . . . . . . 315--330
Caixue Zhou and
Wan Zhou and
Xiwei Dong Provable certificateless generalized
signcryption scheme . . . . . . . . . . 331--346
Jie Chen and
Hoon Wei Lim and
San Ling and
Huaxiong Wang The relation and transformation between
hierarchical inner product encryption
and spatial encryption . . . . . . . . . 347--364
Mingzhi Zhu and
Gennian Ge Room squares with super-simple property 365--381
Vladimir Anashin and
Andrei Khrennikov and
Ekaterina Yurova $T$-functions revisited: new criteria
for bijectivity/transitivity . . . . . . 383--407
Christophe Petit Towards factoring in $ {\rm SL}(2,
\mathbb {F}_{2^n}) $ . . . . . . . . . . 409--431
Maura B. Paterson and
Douglas R. Stinson A unified approach to combinatorial key
predistribution schemes for sensor
networks . . . . . . . . . . . . . . . . 433--457
Johannes Braun and
Johannes Buchmann and
Ciaran Mullan and
Alex Wiesmaier Long term confidentiality: a survey . . 459--478
Anthony B. Evans Mutually orthogonal Latin squares based
on general linear groups . . . . . . . . 479--492
Nam Yul Yu and
Keqin Feng and
Aixian Zhang A new class of near-optimal partial
Fourier codebooks from an almost
difference set . . . . . . . . . . . . . 493--501
Klara Stokes and
Oriol Farr\`as Linear spaces and transversal designs:
$k$-anonymous combinatorial
configurations for anonymous database
search notes . . . . . . . . . . . . . . 503--524
Klara Stokes and
Oriol Farr\`as Erratum to: Linear spaces and
transversal designs: $ (k)$-anonymous
combinatorial configurations for
anonymous database search . . . . . . . 525--525
Wakaha Ogata and
Hiroshi Eguchi Cheating detectable threshold scheme
against most powerful cheaters for long
secrets . . . . . . . . . . . . . . . . 527--539
S. G. Barwick and
Wen-Ai Jackson A characterisation of tangent subplanes
of $ {\rm PG}(2, q^3) $ . . . . . . . . 541--545
John Bamberg and
Jan De Beule and
Nicola Durante and
Michel Lavrauw Editorial: Special issue on finite
geometries in honor of Frank De Clerck 1--5
Dina Ghinelli and
Dieter Jungnickel and
Klaus Metsch Remarks on polarity designs . . . . . . 7--19
A. Blokhuis and
M. De Boeck and
F. Mazzocca and
L. Storme The Kakeya problem: a gap in the
spectrum and classification of the
smallest examples . . . . . . . . . . . 21--31
S. Rottey and
L. Storme Maximal partial line spreads of
non-singular quadrics . . . . . . . . . 33--51
Gábor Korchmáros and
Nicola Pace Coset intersection of irreducible plane
cubics . . . . . . . . . . . . . . . . . 53--75
Maarten De Boeck The largest Erd\Hos--Ko--Rado sets of
planes in finite projective and finite
classical polar spaces . . . . . . . . . 77--117
Kris Coolsaet Some large partial ovoids of $ (Q^{-(5,
q)}) $ for odd $q$ . . . . . . . . . . . 119--128
Daniele Bartoli and
Stefano Marcugini and
Fernanda Pambianco The non-existence of some NMDS codes and
the extremal sizes of complete $ (n,
3)$-arcs in $ {\rm PG}(2, 16)$ . . . . . 129--134
Giorgio Donati and
Nicola Durante and
Alessandro Siciliano On unitals in $ {\rm PG}(2, q^2) $
stabilized by a homology group . . . . . 135--139
Max Neunhöffer and
Cheryl E. Praeger Sporadic neighbour-transitive codes in
Johnson graphs . . . . . . . . . . . . . 141--152
Gábor P. Nagy Linear groups as right multiplication
groups of quasifields . . . . . . . . . 153--164
Dean Crnkovi\'c and
Willem H. Haemers Walk-regular divisible design graphs . . 165--175
Simeon Ball A $p$-adic condition on the weight of a
codeword of a linear code . . . . . . . 177--183
Nicola Durante and
Alessandro Siciliano Some blocking semiovals of homology type
in planes of square order . . . . . . . 185--193
Alan J. Aw The multicovering radius problem for
some types of discrete structures . . . 195--209
Antonio Cossidente and
Giuseppe Marino and
Tim Penttila Relative symplectic subquadrangle
hemisystems of the Hermitian surface . . 211--217
Zhuojun Zhuang and
Bin Dai and
Yuan Luo and
A. J. Han Vinck On the relative profiles of a linear
code and a subcode . . . . . . . . . . . 219--247
Yongqiang Li and
Mingsheng Wang Constructing differentially $4$-uniform
permutations over $ {\rm GF}(2^{2m})$
from quadratic APN permutations over $
{\rm GF}(2^{2 m + 1})$ . . . . . . . . . 249--264
Stanley Payne and
Morgan Rodgers Double $k$-sets in symplectic
generalized quadrangles . . . . . . . . 265--271
Jong Yoon Hyun and
Heisook Lee and
Yoonjin Lee Boolean functions with MacWilliams
duality . . . . . . . . . . . . . . . . 273--287
Hung-Lin Fu and
Yuan-Hsun Lo and
Kenneth W. Shum Optimal conflict-avoiding codes of odd
length and weight three . . . . . . . . 289--309
Ferdinand Ihringer and
Klaus Metsch On the maximum size of Erd\Hos--Ko--Rado
sets in $ H(2 d + 1, q^2) $ . . . . . . 311--316
Carl Bracken and
Faruk Göloglu A non-cyclic triple-error-correcting
BCH-like code and some minimum distance
results . . . . . . . . . . . . . . . . 317--330
Jay A. Wood Relative one-weight linear codes . . . . 331--344
C. M. Swanson and
D. R. Stinson Combinatorial solutions providing
improved security for the generalized
Russian cards problem . . . . . . . . . 345--367
Ce Shi and
Jianxing Yin Existence of super-simple $ {\rm
OA}_\lambda (3, 5, v)^\prime s $ . . . . 369--380
Megan Adams and
Junhua Wu $2$-Ranks of incidence matrices
associated with conics in finite
projective planes . . . . . . . . . . . 381--404
Tuvi Etzion Covering of subspaces by subspaces . . . 405--421
Wenli Ren and
Fang-Wei Fu and
Zhengchun Zhou New sets of frequency-hopping sequences
with optimal Hamming correlation . . . . 423--434
S. T. Dougherty and
C. Fernández-Córdoba $ \mathbb {Z}_2 \mathbb {Z}_4 $-Additive
formally self-dual codes . . . . . . . . 435--453
Angelo Sonnino Transitive $ {\rm PSL}(2, 7) $-invariant
$ 42$-arcs in $3$-dimensional projective
spaces . . . . . . . . . . . . . . . . . 455--463
Vedran Krcadinac and
Anamari Naki\'c and
Mario Osvin Pavcevi\'c Equations for coefficients of tactical
decomposition matrices for $t$-designs 465--469
Trygve Johnsen and
Hugues Verdure Stanley--Reisner resolution of constant
weight linear codes . . . . . . . . . . 471--481
Yonglin Cao A class of $1$-generator repeated root
quasi-cyclic codes . . . . . . . . . . . 483--496
Hengjia Wei and
Gennian Ge Kirkman frames having hole type $ h^u
m^1 $ for $ h \equiv 0 \bmod 12 $ . . . 497--510
Maosheng Xiong The weight distributions of a class of
cyclic codes II . . . . . . . . . . . . 511--528
Naoyuki Horiguchi and
Tsuyoshi Miezaki and
Hiroyuki Nakasora On the support designs of extremal
binary doubly even self-dual codes . . . 529--537
Ka Hin Leung and
Siu Lun Ma Proper circulant weighing matrices of
weight $ p^2 $ . . . . . . . . . . . . . 539--550
Ivan Landjev and
Assia Rousseva On the sharpness of Bruen's bound for
intersection sets in Desarguesian affine
spaces . . . . . . . . . . . . . . . . . 551--558
Yasemin Cengellenmis and
Abdullah Dertli and
S. T. Dougherty Codes over an infinite family of rings
with a Gray map . . . . . . . . . . . . 559--580
Cunsheng Ding and
Alexander Pott and
Qi Wang Constructions of almost difference sets
from finite fields . . . . . . . . . . . 581--592
Siyu Liu and
Felice Manganiello and
Frank R. Kschischang Kötter interpolation in skew polynomial
rings . . . . . . . . . . . . . . . . . 593--608
James Berg and
Max Wakefield Skeleton simplicial evaluation codes . . 609--625
Yutaka Hiramine On the non-existence of maximal
difference matrices of deficiency $1$ 627--635
Victoria Horan and
Glenn Hurlbert $1$-Overlap cycles for Steiner triple
systems . . . . . . . . . . . . . . . . 637--651
Sihong Su and
Xiaohu Tang and
Xiangyong Zeng A systematic method of constructing
Boolean functions with optimal algebraic
immunity based on the generator matrix
of the Reed--Muller code . . . . . . . . 653--673
Vikram Jha The Ubiquity of the Orders of Fractional
Semifields of Even Characteristic . . . 675--686
Nicholas Coxon List decoding of number field codes . . 687--711
Tran van Trung A tight bound for frameproof codes
viewed in terms of separating hash
families . . . . . . . . . . . . . . . . 713--718
Christoph Hering and
Andreas Krebs and
Thomas Edgar Naive configurations . . . . . . . . . . 719--731
Jürgen Bierbrauer and
Daniele Bartoli and
Giorgio Faina and
Stefano Marcugini and
Fernanda Pambianco and
Yves Edel The structure of quaternary quantum caps 733--747
Kenza Guenda and
T. Aaron Gulliver and
S. Arash Sheikholeslam Lexicodes over rings . . . . . . . . . . 749--763
Robert A. Liebler and
Cheryl E. Praeger Neighbour-transitive codes in Johnson
graphs . . . . . . . . . . . . . . . . . 1--25
Henning Stichtenoth A note on composed products of
polynomials over finite fields . . . . . 27--32
Naoki Chigira and
Masaaki Harada and
Masaaki Kitazume On the classification of extremal doubly
even self-dual codes with $2$-transitive
automorphism groups . . . . . . . . . . 33--35
Hui-Chuan Lu and
Hung-Lin Fu The exact values of the optimal average
information ratio of perfect
secret-sharing schemes for tree-based
access structures . . . . . . . . . . . 37--46
Tohru Nakashima Construction of codes from Arakelov
geometry . . . . . . . . . . . . . . . . 47--54
Jianqin Zhou and
Wanquan Liu The $k$-error linear complexity
distribution for $ 2^n$-periodic binary
sequences . . . . . . . . . . . . . . . 55--75
Wayne Broughton Admissible parameters of symmetric
designs satisfying $ v = 4 (k - \lambda)
+ 2 $ and symmetric designs with inner
balance . . . . . . . . . . . . . . . . 77--83
Jialin Huang and
Xuejia Lai Revisiting key schedule's diffusion in
relation with round function's diffusion 85--103
Bernhard Schmidt and
Ming Ming Tan Construction of relative difference sets
and Hadamard groups . . . . . . . . . . 105--119
Bart Mennink On the collision and preimage security
of MDC-4 in the ideal cipher model . . . 121--150
Steven T. Dougherty and
Esengül Saltürk Counting codes over rings . . . . . . . 151--165
Xing Liu and
Daiyuan Peng and
Hongyu Han Low-hit-zone frequency hopping sequence
sets with optimal partial Hamming
correlation properties . . . . . . . . . 167--176
Bogdan Groza and
Bogdan Warinschi Cryptographic puzzles and DoS
resilience, revisited . . . . . . . . . 177--207
Petr Lisonek and
Hui Yi Lu Bent functions on partial spreads . . . 209--216
Antonio Cossidente and
Francesco Pavese New infinite families of hyperovals on $
\mathcal H(3, q^2), q $ odd . . . . . . 217--222
Jianying Fang and
Junling Zhou and
Yanxun Chang Nonexistence of some quantum jump codes
with specified parameters . . . . . . . 223--235
Nian Li and
Xiaohu Tang and
Tor Helleseth New $M$-ary sequences with low
autocorrelation from interleaved
technique . . . . . . . . . . . . . . . 237--249
Huaning Liu A family of elliptic curve pseudorandom
binary sequences . . . . . . . . . . . . 251--265
Olav Geil Erratum to: On the second weight of
generalized Reed--Muller codes . . . . . 267--267
Lilya Budaghyan and
Tor Helleseth and
Matthew Parker Editorial: special issue on coding and
cryptography . . . . . . . . . . . . . . 269--269
Stéphane Ballet and
Robert Rolland On low weight codewords of generalized
affine and projective Reed--Muller codes 271--297
Claude Carlet and
Andrew Klapper On the arithmetic Walsh coefficients of
Boolean functions . . . . . . . . . . . 299--318
Gottlieb Isabel Pirsic and
Arne Winterhof On discrete Fourier transform,
ambiguity, and Hamming-autocorrelation
of pseudorandom sequences . . . . . . . 319--328
Torleiv Klòve and
Moshe Schwartz Linear covering codes and
error-correcting codes for
limited-magnitude errors . . . . . . . . 329--354
Felix Fontein and
Michael Schneider and
Urs Wagner PotLLL: a polynomial time version of LLL
with deep insertions . . . . . . . . . . 355--368
Hyun Kwang Kim and
Phan Thanh Toan New inequalities for $q$-ary
constant-weight codes . . . . . . . . . 369--381
Santanu Sarkar Small secret exponent attack on RSA
variant with modulus $ N = p^r q $ . . . 383--392
Joachim Rosenthal and
Natalia Silberstein and
Anna-Lena Trautmann On the geometry of balls in the
Grassmannian and list decoding of lifted
Gabidulin codes . . . . . . . . . . . . 393--416
Petr Lisonek and
Vijaykumar Singh Quantum codes from nearly
self-orthogonal quaternary linear codes 417--424
Soon Sheng Ong and
Frédérique Oggier Wiretap lattice codes from number fields
with no small norm elements . . . . . . 425--440
Wittawat Kositwattanarerk and
Frédérique Oggier Connections between Construction $D$ and
related constructions of lattices . . . 441--455
Ferruh Özbudak and
Zülfükar Saygi On the exact number of solutions of
certain linearized equations . . . . . . 457--468
Elena Dubrova Generation of full cycles by a
composition of NLFSRs . . . . . . . . . 469--486
Céline Blondeau and
Léo Perrin More differentially $6$-uniform power
functions . . . . . . . . . . . . . . . 487--505
Johan S. R. Nielsen and
Alexander Zeh Multi-trial Guruswami--Sudan decoding
for generalised Reed--Solomon codes . . 507--527
Mahabir Prasad Jhanwar and
Ayineedi Venkateswarlu and
Reihaneh Safavi-Naini Paillier-based publicly verifiable
(non-interactive) secret sharing . . . . 529--546
Antonia Wachter-Zeh and
Alexander Zeh List and unique error-erasure decoding
of interleaved Gabidulin codes with
interpolation techniques . . . . . . . . 547--570
Wenhui Li and
Vladimir Sidorenko and
Danilo Silva On transform-domain error and erasure
correction by Gabidulin codes . . . . . 571--586
Yuyin Yu and
Mingsheng Wang and
Yongqiang Li A matrix approach for constructing
quadratic APN functions . . . . . . . . 587--600
Weiwei Cao and
Lei Hu Projective interpolation of polynomial
vectors and improved key recovery attack
on SFLASH . . . . . . . . . . . . . . . 719--730
Jie Chen and
Hoon Wei Lim and
San Ling and
Le Su and
Huaxiong Wang Spatial encryption supporting
non-monotone access structure . . . . . 731--746
Xiaogang Liu and
Yuan Luo The weight distributions of some cyclic
codes with three or four nonzeros over $
\mathbb F_3 $ . . . . . . . . . . . . . 747--768
Jianying Fang and
Yanxun Chang Mutually disjoint $t$-designs and
$t$-SEEDs from extremal doubly-even
self-dual codes . . . . . . . . . . . . 769--780
Miao Liang and
Mingchao Li and
Beiliang Du A construction for $t$-fold perfect
authentication codes with arbitration 781--790
Wenping Ma and
Chun-e Zhao and
Dongsu Shen New optimal constructions of
conflict-avoiding codes of odd length
and weight $3$ . . . . . . . . . . . . . 791--804
Yiling Lin and
Masakazu Jimbo Extremal properties of $t$-SEEDs and
recursive constructions . . . . . . . . 805--823
Tao Feng and
Sihuang Hu and
Shuxing Li and
Gennian Ge Difference sets with few character
values . . . . . . . . . . . . . . . . . 825--839
Javier Herranz and
Alexandre Ruiz and
Germán Sáez New results and applications for
multi-secret sharing schemes . . . . . . 841--864
Avishek Adhikari Linear algebraic techniques to construct
monochrome visual cryptographic schemes
for general access structure and its
applications to color images . . . . . . 865--895
Koji Momihara and
Mieko Yamada Divisible difference families from
Galois rings $ {\rm GR}(4, n) $ and
Hadamard matrices . . . . . . . . . . . 897--909
Jie Chen and
Hoon Wei Lim and
San Ling and
Huaxiong Wang and
Hoeteck Wee Shorter identity-based encryption via
asymmetric pairings . . . . . . . . . . 911--947
Sebastian Raaphorst and
Lucia Moura and
Brett Stevens A construction for strength-3 covering
arrays from linear feedback shift
register sequences . . . . . . . . . . . 949--968
Alexander L. Gavrilyuk and
Ivan Yu. Mogilnykh Cameron-Liebler line classes in $ P G(n,
4) $ . . . . . . . . . . . . . . . . . . 969--982
Nikolay Yankov and
Moon Ho Lee New binary self-dual codes of lengths $
50$--$ 60$ . . . . . . . . . . . . . . . 983--996
Stanislav Bulygin and
Michael Walter and
Johannes Buchmann Full analysis of PRINTcipher with
respect to invariant subspace attack:
efficient key recovery and
countermeasures . . . . . . . . . . . . 997--1022
Edoardo Ballico Any network code comes from an algebraic
curve taking osculating spaces . . . . . 1023--1026
Naoyuki Horiguchi and
Tsuyoshi Miezaki and
Hiroyuki Nakasora Erratum to: On the support designs of
extremal binary doubly even self-dual
codes . . . . . . . . . . . . . . . . . 1027--1028
Torleiv Klòve and
Moshe Schwartz Erratum to: Linear covering codes and
error-correcting codes for
limited-magnitude errors . . . . . . . . 1029--1029
Abhay Kumar Singh and
Pramod Kumar Kewat On cyclic codes over the ring $ \mathbb
Z_p[u] / \langle u^k \rangle $ . . . . . 1--13
Peipei Dai and
Jianmin Wang and
Jianxing Yin Two series of equitable symbol weight
codes meeting the Plotkin bound . . . . 15--29
Minquan Cheng and
Hung-Lin Fu and
Jing Jiang and
Yuan-Hsun Lo and
Ying Miao New bounds on $ \bar {2}$-separable
codes of length $2$ . . . . . . . . . . 31--40
Hui Wang and
Paul Stankovski and
Thomas Johansson A generalized birthday approach for
efficiently finding linear relations in
$ \ell $-sequences . . . . . . . . . . . 41--57
Eun Ju Cheon and
Seon Jeong Kim On the minimum number of points covered
by a set of lines in $ {\rm PG}(2, q) $ 59--74
Boris Skori\'c and
Jan-Jaap Oosterwijk Binary and $q$-ary Tardos codes,
revisited . . . . . . . . . . . . . . . 75--111
Andrés Cordón-Franco and
Hans van Ditmarsch and
David Fernández-Duque and
Fernando Soler-Toscano A geometric protocol for cryptography
with cards . . . . . . . . . . . . . . . 113--125
Hengjia Wei and
Gennian Ge Spectrum of sizes for perfect
$2$-deletion-correcting codes of length
$4$ . . . . . . . . . . . . . . . . . . 127--151
Ulrich Dempwolff Symmetric doubly dual hyperovals have an
odd rank . . . . . . . . . . . . . . . . 153--157
Antonino Simone and
Boris Skori\'c False Negative probabilities in Tardos
codes . . . . . . . . . . . . . . . . . 159--182
Cas Cremers and
Mich\`ele Feltz Beyond eCK: perfect forward secrecy
under actor compromise and ephemeral-key
reveal . . . . . . . . . . . . . . . . . 183--218
Katherine Jarvis and
Monica Nevins ETRU: NTRU over the Eisenstein integers 219--242
Hengjia Wei and
Gennian Ge Group divisible designs with block size
four and group type $ g^u m^1 $ . . . . 243--282
J. Rif\`a and
F. I. Solov'eva and
M. Villanueva Erratum to: Intersection of Hamming
codes avoiding Hamming subcodes . . . . 283--283
Bocong Chen and
Hongwei Liu and
Guanghui Zhang A class of minimal cyclic codes over
finite fields . . . . . . . . . . . . . 285--300
Tao Feng and
Xiaomiao Wang and
Yanxun Chang Semi-cyclic holey group divisible
designs with block size three . . . . . 301--324
Martin R. Albrecht and
Carlos Cid and
Jean-Charles Faug\`ere and
Robert Fitzpatrick and
Ludovic Perret On the complexity of the BKW algorithm
on LWE . . . . . . . . . . . . . . . . . 325--354
Yiansheng Yang and
Wenchao Cai On self-dual constacyclic codes over
finite fields . . . . . . . . . . . . . 355--364
Dragomir Z. \Dbarokovi\'c and
Ilias S. Kotsireas Compression of periodic complementary
sequences and applications . . . . . . . 365--377
Cristiano Torezzan and
João E. Strapasson and
Sueli I. R. Costa and
Rogerio M. Siqueira Optimum commutative group codes . . . . 379--394
Kwangsu Lee and
Jong Hwan Park and
Dong Hoon Lee Anonymous HIBE with short ciphertexts:
full security in prime order groups . . 395--425
Michel Lavrauw and
John Sheekey and
Corrado Zanella On embeddings of minimum dimension of $
{\rm PG}(n, q) \times {\rm PG}(n, q) $ 427--440
Hugues Randriam and
Lin Sok and
Patrick Solé Lower bounds on the minimum distance of
long codes in the Lee metric . . . . . . 441--452
R. Alfaro and
K. Dhul-Qarnayn Constructing self-dual codes over $
\mathbb {F}_q[u] / (u^t) $ . . . . . . . 453--465
Dong Yang and
Wen-Feng Qi and
Qun-Xiong Zheng Further results on the distinctness of
modulo $2$ reductions of primitive
sequences over $ \mathbf {Z} (2^{32} -
1)$ . . . . . . . . . . . . . . . . . . 467--480
Francis H. Hunt and
Stephanie Perkins and
Derek H. Smith Decoding mixed errors and erasures in
permutation codes . . . . . . . . . . . 481--493
Oriol Farr\`as and
Carles Padró Extending Brickell--Davenport theorem to
non-perfect secret sharing schemes . . . 495--510
Somphong Jitman and
San Ling Quasi-abelian codes . . . . . . . . . . 511--531
Xiaogang Liu and
Yuan Luo On the bounds and achievability about
the ODPC of $ \mathcal {GRM} (2, m)^* $
over prime fields for increasing message
length . . . . . . . . . . . . . . . . . 533--557
Javad Doliskani and
Éric Schost Computing in degree $ 2^k $-extensions
of finite fields of odd characteristic 559--569
Nikolay Yankov and
Moon Ho Lee Classification of self-dual codes of
length $ 50 $ with an automorphism of
odd prime order . . . . . . . . . . . . 571--579
Yu Qing Chen and
Tao Feng Paley type sets from cyclotomic classes
and Arasu--Dillon-Player difference sets 581--600
Lars Eirik Danielsen and
Matthew G. Parker and
Constanza Riera On graphs and codes preserved by edge
local complementation . . . . . . . . . 601--621
Qiang Li and
Xiang Xue Li and
Xue Jia Lai and
Ke Fei Chen Optimal assignment schemes for general
access structures based on linear
programming . . . . . . . . . . . . . . 623--644
Kazuhiko Minematsu Building blockcipher from small-block
tweakable blockcipher . . . . . . . . . 645--663
Kai-Uwe Schmidt Highly nonlinear functions . . . . . . . 665--672
Suat Karadeniz and
Bahattin Yildiz New extremal binary self-dual codes of
length $ 64 $ from $ R_3 $-lifts of the
extended binary Hamming code . . . . . . 673--680
Hajime Matsui On generator matrices and parity check
matrices of generalized integer codes 681--701
Ming Su On the linear complexity of
Legendre--Sidelnikov sequences . . . . . 703--717
László Csirmaz Secret sharing on the $d$-dimensional
cube . . . . . . . . . . . . . . . . . . 719--729
Xi Jun Lin and
Ran Ren and
Zhengang Wei and
Lin Sun Comment on ``Identity-based
non-interactive key distribution with
forward security'' . . . . . . . . . . . 1--7
Svetlana Topalova and
Stela Zhelezova On point-transitive and transitive
deficiency one parallelisms of PG $ (3,
4) $ . . . . . . . . . . . . . . . . . . 9--19
Martianus Frederic Ezerman and
Somphong Jitman and
Patrick Solé Xing-Ling codes, duals of their
subcodes, and good asymmetric quantum
codes . . . . . . . . . . . . . . . . . 21--42
Chengju Li and
Qin Yue and
Yiwei Huang Two families of nearly optimal codebooks 43--57
Nelly Fazio and
Kevin Iga and
Antonio R. Nicolosi and
Ludovic Perret and
William E. Skeith III Hardness of learning problems over
Burnside groups of exponent $3$ . . . . 59--70
Michael E. Zieve Planar functions and perfect nonlinear
monomials over finite fields . . . . . . 71--80
Mladen Kovacevi\'c and
Dejan Vukobratovi\'c Perfect codes in the discrete simplex 81--95
Thomas Britz and
Keisuke Shiromoto and
Thomas Westerbäck Demi-matroids from codes over finite
Frobenius rings . . . . . . . . . . . . 97--107
Kenneth W. Shum Optimal three-dimensional optical
orthogonal codes of weight three . . . . 109--126
Zihui Liu and
Xin-Wen Wu On relative constant-weight codes . . . 127--144
S. Ugolini Sequences of irreducible polynomials
without prescribed coefficients over odd
prime fields . . . . . . . . . . . . . . 145--155
Hongyu Han and
Daiyuan Peng and
Xing Liu New lower bounds on the aperiodic
Hamming correlations of frequency
hopping sequences with low hit zone . . 157--174
Peter Horak and
Zsolt Tuza Speeding up deciphering by hypergraph
ordering . . . . . . . . . . . . . . . . 175--185
Chih-Yen Yang and
Chung-Chin Lu One-point Klein codes and their
serial-in-serial-out systematic encoding 187--197
Zhen Ma and
Wen-Feng Qi and
Tian Tian On affine sub-families of the NFSR in
Grain . . . . . . . . . . . . . . . . . 199--212
Antonio Cossidente A new family of relative hemisystems on
the Hermitian surface . . . . . . . . . 213--221
N. A. Newman $4$-Cycle decompositions of $ (\lambda +
m) K_{v + u \setminus } \lambda K_v$ . . 223--235
Eric Swartz A construction of a partial difference
set in the extraspecial groups of order
$ p^3 $ with exponent $ p^2 $ . . . . . 237--242
Javier de la Cruz On extremal self-dual codes of length $
120 $ . . . . . . . . . . . . . . . . . 243--252
Sunghyu Han A method for constructing self-dual
codes over $ \mathbb {Z}_{2^m} $ . . . . 253--262
Dabin Zheng and
Xiaoqiang Wang and
Xiangyong Zeng and
Lei Hu The weight distribution of a family of
$p$-ary cyclic codes . . . . . . . . . . 263--275
Yuuki Kageyama and
Tatsuya Maruta On the construction of Griesmer codes of
dimension $5$ . . . . . . . . . . . . . 277--280
Elodie Leducq Functions which are PN on infinitely
many extensions of $ \mathbb{F}_p, p $
odd . . . . . . . . . . . . . . . . . . 281--299
Samrith Ram Enumeration of linear transformation
shift registers . . . . . . . . . . . . 301--314
A. J. van Zanten and
A. Bojilov and
S. M. Dodunekov Generalized residue and $t$-residue
codes and their idempotent generators 315--334
Elisa Gorla and
Maike Massierer Point compression for the trace zero
subgroup over a small degree extension
field . . . . . . . . . . . . . . . . . 335--357
Gabriela Olteanu and
Inneke Van Gelder Construction of minimal non-abelian left
group codes . . . . . . . . . . . . . . 359--373
Yupeng Jiang and
Yingpu Deng New results on nonexistence of
generalized bent functions . . . . . . . 375--385
Yeow Meng Chee and
Gennian Ge and
Hui Zhang and
Xiande Zhang Hanani triple packings and optimal
$q$-ary codes of constant weight three 387--403
Josep Rif\`a and
Faina I. Solov'eva and
Merc\`e Villanueva Self-embeddings of Hamming Steiner
triple systems of small order and APN
permutations . . . . . . . . . . . . . . 405--427
Tomas Nilson and
Lars-Daniel Öhman Triple arrays and Youden squares . . . . 429--451
Peter Vandendriessche On small line sets with few odd-points 453--463
Maarten De Boeck The largest Erd\Hos--Ko--Rado sets in $
2 - (v, k, 1) $ designs . . . . . . . . 465--481
Gook Hwa Cho and
Namhun Koo and
Eunhye Ha and
Soonhak Kwon New cube root algorithm based on the
third order linear recurrence relations
in finite fields . . . . . . . . . . . . 483--495
Ingo Janiszczak and
Wolfgang Lempken and
Patric R. J. Östergård and
Reiner Staszewski Permutation codes invariant under
isometries . . . . . . . . . . . . . . . 497--507
Yutaka Hiramine and
Chihiro Suetake Difference matrices related to Sophie
Germain primes $p$ using functions on
the fields $ F_{2 p + 1}$ . . . . . . . 509--518
Antonino Simone and
Boris Skori\'c False positive probabilities in $q$-ary
Tardos codes: comparison of attacks . . 519--542
Heide Gluesing-Luerssen Fourier-reflexive partitions and
MacWilliams identities for additive
codes . . . . . . . . . . . . . . . . . 543--563
Adeline Langlois and
Damien Stehlé Worst-case to average-case reductions
for module lattices . . . . . . . . . . 565--599
I. Kotsireas and
Edgar Martínez-Moro Foreword: Computer Algebra in Coding
Theory and Cryptography . . . . . . . . 1--2
Merc\`e Villanueva and
Fanxuan Zeng and
Jaume Pujol Efficient representation of binary
nonlinear codes: constructions and
minimum distance computation . . . . . . 3--21
Natalia Dück and
Karl-Heinz Zimmermann Heuristic decoding of linear codes using
commutative algebra . . . . . . . . . . 23--35
Tom Hòholdt and
Fernando Piñero and
Peng Zeng Optimal codes as Tanner codes with
cyclic component codes . . . . . . . . . 37--47
Olav Geil and
Stefano Martin An improvement of the Feng--Rao bound
for primary codes . . . . . . . . . . . 49--79
Wilson Olaya-León and
Claudia Granados-Pinzón The second generalized Hamming weight of
certain Castle codes . . . . . . . . . . 81--87
Carlos Galindo and
Fernando Hernando Quantum codes from affine variety codes
and their subfield-subcodes . . . . . . 89--100
Carlos Munuera Hamming codes for wet paper
steganography . . . . . . . . . . . . . 101--111
Thomas W. Cusick and
Bryan Johns Theory of $2$-rotation symmetric cubic
Boolean functions . . . . . . . . . . . 113--133
Mauro Biliotti and
Alessandro Montinaro and
Eliana Francot 2- $ (v, k, 1) $ Designs with a
point-primitive rank 3 automorphism
group of affine type . . . . . . . . . . 135--171
Ferruh Özbudak and
Seher Tutdere and
Oguz Yayla On some bounds on the minimum distance
of cyclic codes over finite fields . . . 173--178
Jooyoung Lee and
Martijn Stam MJH: a faster alternative to MDC-2 . . . 179--205
Tamás Héger and
Balázs Patkós and
Marcella Takáts Search problems in vector spaces . . . . 207--216
T. Shaska and
C. Shor Theta functions and symmetric weight
enumerators for codes over imaginary
quadratic fields . . . . . . . . . . . . 217--235
D. Best and
H. Kharaghani and
H. Ramp Mutually unbiased weighing matrices . . 237--256
Edward Dobson Monomial isomorphisms of cyclic codes 257--267
José Joaquín Bernal and
Joaquim Borges and
Cristina Fernández-Córdoba and
Merc\`e Villanueva Permutation decoding of $ \mathbb{Z}_2
\mathbb{Z}_4$-linear codes . . . . . . . 269--277
Jiao Li and
Claude Carlet and
Xiangyong Zeng and
Chunlei Li and
Lei Hu and
Jinyong Shan Two constructions of balanced Boolean
functions with optimal algebraic
immunity, high nonlinearity and good
behavior against fast algebraic attacks 279--305
Eric Zhi Chen A new iterative computer search
algorithm for good quasi-twisted codes 307--323
Thomas Plantard and
Willy Susilo and
Zhenfei Zhang LLL for ideal lattices: re-evaluation of
the security of Gentry--Halevi's FHE
scheme . . . . . . . . . . . . . . . . . 325--344
Sihuang Hu and
Shuxing Li and
Tao Zhang and
Tao Feng and
Gennian Ge New pseudo-planar binomials in
characteristic two and related schemes 345--360
Yuan-Hsun Lo and
Hung-Lin Fu and
Yi-Hean Lin Weighted maximum matchings and optimal
equi-difference conflict-avoiding codes 361--372
Masaaki Harada On a $5$-design related to a putative
extremal doubly even self-dual code of
length a multiple of $ 24$ . . . . . . . 373--384
Guo-Qiang Liu and
Chen-Hui Jin Differential cryptanalysis of
PRESENT-like cipher . . . . . . . . . . 385--408
Bangteng Xu Bentness and nonlinearity of functions
on finite groups . . . . . . . . . . . . 409--430
Orr Dunkelman and
Nathan Keller and
Adi Shamir Almost universal forgery attacks on
AES-based MAC's . . . . . . . . . . . . 431--449
S. G. Barwick and
Wen-Ai Jackson An investigation of the tangent splash
of a subplane of $ \mathrm {PG}(2, q^3)
$ . . . . . . . . . . . . . . . . . . . 451--468
Atsushi Fujioka and
Koutarou Suzuki and
Keita Xagawa and
Kazuki Yoneyama Strongly secure authenticated key
exchange from factoring, codes, and
lattices . . . . . . . . . . . . . . . . 469--504
Tung Le and
Jamshid Moori On the automorphisms of designs
constructed from finite simple groups 505--517
Steven Dougherty and
Jon-Lark Kim and
Yoonjin Lee Codes over rings and Hermitian lattices 519--535
Oktay Olmez Plateaued functions and one-and-half
difference sets . . . . . . . . . . . . 537--549
Anthony B. Evans and
David Fear and
Rebecca J. Stones Diagonally cyclic equitable rectangles 551--569
Claude Carlet and
Deng Tang Enhanced Boolean functions suitable for
the filter model of pseudo-random
generator . . . . . . . . . . . . . . . 571--587
Hengjia Wei and
Hui Zhang and
Gennian Ge Completely reducible super-simple
designs with block size five and index
two . . . . . . . . . . . . . . . . . . 589--600
Orr Dunkelman and
Nathan Keller Practical-time attacks against reduced
variants of MISTY1 . . . . . . . . . . . 601--627
Yan Liu and
Haode Yan and
Chunlei Liu A class of six-weight cyclic codes and
their weight distribution . . . . . . . 1--9
Jiqiang Lu A methodology for differential-linear
cryptanalysis and its applications . . . 11--48
Anamari Naki\'c and
Mario Osvin Pavcevi\'c Tactical decompositions of designs over
finite fields . . . . . . . . . . . . . 49--60
Ryo Nishimaki and
Keita Xagawa Verifiably encrypted signatures with
short keys based on the decisional
linear problem and obfuscation for
encrypted VES . . . . . . . . . . . . . 61--98
Sihem Mesnager Bent vectorial functions and linear
codes from $o$-polynomials . . . . . . . 99--116
Deng Tang and
Claude Carlet and
Xiaohu Tang Differentially $4$-uniform bijections by
permuting the inverse function . . . . . 117--141
Sungwook Kim and
Jung Hee Cheon Fixed argument pairing inversion on
elliptic curves . . . . . . . . . . . . 143--152
Yonglin Cao and
Jian Gao and
Fang-Wei Fu Semisimple multivariable $ \mathbb {F}_q
$-linear codes over $ \mathbb {F}_{q^l}
$ . . . . . . . . . . . . . . . . . . . 153--177
Haibo Hong and
Licheng Wang and
Yixian Yang Minimal logarithmic signatures for the
unitary group $ U_n(q) $ . . . . . . . . 179--191
Jianfa Qian and
Lina Zhang Entanglement-assisted quantum codes from
arbitrary binary linear codes . . . . . 193--202
Stefaan De Winter and
Sara Rottey and
Geertrui Van de Voorde Linear representations of subgeometries 203--215
Jingjun Bao and
Lijun Ji The completion determination of optimal
$ (3, 4)$-packings . . . . . . . . . . . 217--229
Santanu Sarkar and
Sourav Sen Gupta and
Goutam Paul Proving TLS-attack related open biases
of RC4 . . . . . . . . . . . . . . . . . 231--253
Min Zeng and
Yuan Luo and
Guang Gong Sequences with good correlation property
based on depth and interleaving
techniques . . . . . . . . . . . . . . . 255--275
Fabio Enrique Brochero Martínez Explicit factorization of $ x^{n - 1}
\in \mathbb {F}_q[x] $ . . . . . . . . . 277--286
Ian Blake and
Alfred Menezes and
Doug Stinson Guest Editorial: Special Issue in Honor
of Scott A. Vanstone . . . . . . . . . . 287--299
Chuan Guo and
Douglas R. Stinson and
Tran van Trung On tight bounds for binary frameproof
codes . . . . . . . . . . . . . . . . . 301--319
Charles C. Lindner and
Mariusz Meszka and
Alexander Rosa Almost $2$-perfect $6$-cycle systems . . 321--333
Dirk Hachenberger Primitive normal bases for quartic and
cubic extensions: a geometric approach 335--350
Ryoh Fuji-Hara Perfect hash families of strength three
with three rows from varieties on finite
projective geometries . . . . . . . . . 351--356
Kevin Phelps Enumeration of Kerdock codes of length $
64 $ . . . . . . . . . . . . . . . . . . 357--363
Dieter Jungnickel and
Vladimir D. Tonchev Maximal arcs and quasi-symmetric designs 365--374
Thijs Laarhoven and
Michele Mosca and
Joop van de Pol Finding shortest lattice vectors faster
using quantum search . . . . . . . . . . 375--400
Sonia Chiasson and
P. C. van Oorschot Quantifying the security advantage of
password expiration policies . . . . . . 401--408
D. S. Archdeacon and
J. H. Dinitz and
D. M. Donovan Square integer Heffter arrays with empty
cells . . . . . . . . . . . . . . . . . 409--426
Alice Silverberg and
Yuri G. Zarhin Isogenies of abelian varieties over
finite fields . . . . . . . . . . . . . 427--439
Beno\^\it Libert and
Thomas Peters and
Marc Joye and
Moti Yung Linearly homomorphic
structure-preserving signatures and
their applications . . . . . . . . . . . 441--477
Yeow Meng Chee and
Charles J. Colbourn and
Alan Chi Hung Ling Optimal low-power coding for error
correction and crosstalk avoidance in
on-chip data buses . . . . . . . . . . . 479--491
Michael Düll and
Björn Haase and
Gesine Hinterwälder High-speed Curve25519 on $8$-bit, $
16$-bit, and $ 32$-bit microcontrollers 493--514
E. L. Roettger and
H. C. Williams and
R. K. Guy Some primality tests that eluded Lucas 515--539
Jeffrey Hoffstein and
Joseph H. Silverman PASS-Encrypt: a public key cryptosystem
based on partial evaluation of
polynomials . . . . . . . . . . . . . . 541--552
E. R. Lamken The asymptotic existence of DR$ (v, k, k
- 1) $ $ (v, k, k - 1)$-BIBDs . . . . . 553--562
Liang Feng Zhang and
Reihaneh Safavi-Naini Batch verifiable computation of
outsourced functions . . . . . . . . . . 563--585
Neal Koblitz and
Alfred J. Menezes The random oracle model: a twenty-year
retrospective . . . . . . . . . . . . . 587--610
Elena Andreeva and
Bart Mennink and
Bart Preneel Open problems in hash function security 611--631
Itai Dinur and
Orr Dunkelman and
Nathan Keller and
Adi Shamir Reflections on slide with a twist
attacks . . . . . . . . . . . . . . . . 633--651
Gary McGuire and
Emrah Sercan Yilmaz Further results on the number of
rational points of hyperelliptic
supersingular curves in characteristic 2 653--662
Ueli Maurer Zero-knowledge proofs of knowledge for
group homomorphisms . . . . . . . . . . 663--676
Gerhard Frey and
Ernst Kani Normal forms of hyperelliptic curves of
genus $3$ . . . . . . . . . . . . . . . 677--712
Peter Landrock Power map permutations and the discrete
log problem . . . . . . . . . . . . . . 713--724
Tatsuaki Okamoto and
Katsuyuki Takashima Achieving short ciphertexts or short
secret-keys for adaptively secure
general inner-product encryption . . . . 725--771
Dieter Jungnickel and
Jennifer Key and
Chris Mitchell Editorial for the 25th anniversary issue 1--3
Claude Carlet and
Sihem Mesnager Four decades of research on bent
functions . . . . . . . . . . . . . . . 5--50
Steven D. Galbraith and
Pierrick Gaudry Recent progress on the elliptic curve
discrete logarithm problem . . . . . . . 51--72
Antoine Joux and
Cécile Pierrot Technical history of discrete logarithms
in small characteristic finite fields 73--85
Neal Koblitz and
Alfred J. Menezes Cryptocash, cryptocurrencies, and
cryptocontracts . . . . . . . . . . . . 87--102
Siaw-Lynn Ng and
Maura Beth Paterson Disjoint difference families and their
applications . . . . . . . . . . . . . . 103--127
Harald Niederreiter A survey of some applications of finite
fields . . . . . . . . . . . . . . . . . 129--139
Alexander Pott Almost perfect and planar functions . . 141--195
Lucia Moura and
Gary L. Mullen and
Daniel Panario Finite field constructions of
combinatorial arrays . . . . . . . . . . 197--219
Daniel M. Gordon and
Bernhard Schmidt A survey of the multiplier conjecture 221--236
Kai-Uwe Schmidt Sequences with small correlation . . . . 237--267
Christina Fragouli and
Emina Soljanin (Secure) Linear network coding multicast 269--310
T. Etzion and
L. Storme Galois geometries and coding theory . . 311--350
Anne Broadbent and
Christian Schaffner Quantum cryptography beyond quantum key
distribution . . . . . . . . . . . . . . 351--382
Michael Braun $q$-Analogs of $t$-wise balanced designs
from Borel subgroups . . . . . . . . . . 383--390
Longjiang Qu and
Yin Tan and
Chao Li and
Guang Gong More constructions of differentially
$4$-uniform permutations on $ \mathbb
{F}_{2^{2k}}$ . . . . . . . . . . . . . 391--408
Natalia Silberstein and
Anna Gál Optimal combinatorial batch codes based
on block designs . . . . . . . . . . . . 409--424
Christina Delfs and
Steven D. Galbraith Computing isogenies between
supersingular elliptic curves over $
\mathbb {F}_p $ . . . . . . . . . . . . 425--440
Özgür Dagdelen and
David Galindo and
Pascal Véron Extended security arguments for
signature schemes . . . . . . . . . . . 441--461
Sho Suda A two-fold cover of strongly regular
graphs with spreads and association
schemes of class five . . . . . . . . . 463--471
Adonus L. Madison and
Junhua Wu Conics arising from external points and
their binary codes . . . . . . . . . . . 473--491
Yu Chen and
Jiang Zhang and
Dongdai Lin and
Zhenfeng Zhang Generic constructions of integrated PKE
and PEKS . . . . . . . . . . . . . . . . 493--526
Antonio Cossidente and
Francesco Pavese On subspace codes . . . . . . . . . . . 527--531
Di Wu and
Wenfeng Qi and
Huajin Chen On the spectral immunity of periodic
sequences restricted to binary
annihilators . . . . . . . . . . . . . . 533--545
Praveen Gauravaram and
Nasour Bagheri and
Lars R. Knudsen Building indifferentiable compression
functions from the PGV compression
functions . . . . . . . . . . . . . . . 547--581
Michel Lavrauw and
John Sheekey On BEL-configurations and finite
semifields . . . . . . . . . . . . . . . 583--603
Florian Caullery and
Kai-Uwe Schmidt and
Yue Zhou Exceptional planar polynomials . . . . . 605--613
Martin Steinbach and
Dirk Hachenberger A class of quaternary linear codes
improving known minimum distances . . . 615--627
Claude Carlet and
Guang Gong and
Yin Tan Quadratic zero-difference balanced
functions, APN functions and strongly
regular graphs . . . . . . . . . . . . . 629--654
Jan De Beule and
Jeroen Demeyer and
Klaus Metsch and
Morgan Rodgers A new family of tight sets in $ \mathcal
{Q}^+(5, q) $ . . . . . . . . . . . . . 655--678
Yuan-Hsun Lo and
Wing Shing Wong and
Hung-Lin Fu Partially user-irrepressible sequence
sets and conflict-avoiding codes . . . . 679--691
Javier de la Cruz and
Michael Kiermaier and
Alfred Wassermann The automorphism group of an extremal $
[120, 60, 24] $ code does not contain
elements of order $ 29 $ . . . . . . . . 693--702
Anonymous Weight enumerator of some irreducible
cyclic codes . . . . . . . . . . . . . . ??
Andrea Montanari Effective compression maps for
torus-based cryptography . . . . . . . . 1--17
Lijun Ji and
Zhengwu Dong Existence of optimal strong partially
balanced $3$-designs with block size
four . . . . . . . . . . . . . . . . . . 19--36
Tsuyoshi Miezaki and
Hiroyuki Nakasora An upper bound of the value of $t$ of
the support $t$-designs of extremal
binary doubly even self-dual codes . . . 37--46
Heide Gluesing-Luerssen The homogeneous weight partition and its
character-theoretic dual . . . . . . . . 47--61
Jong Hwan Park and
Dong Hoon Lee An efficient IBE scheme with tight
security reduction in the random oracle
model . . . . . . . . . . . . . . . . . 63--85
Jean-Charles Faug\`ere and
Ayoub Otmani and
Ludovic Perret and
Frédéric de Portzamparc and
Jean-Pierre Tillich Structural cryptanalysis of McEliece
schemes with compact keys . . . . . . . 87--112
Dean Crnkovi\'c and
Sanja Rukavina Self-dual codes from extended orbit
matrices of symmetric designs . . . . . 113--120
Kwangsu Lee Self-updatable encryption with short
public parameters and its extensions . . 121--161
Binod Kumar Sahoo and
N. S. Narasimha Sastry Binary codes of the symplectic
generalized quadrangle of even order . . 163--170
Stefka Bouyuklieva and
Wolfgang Willems and
Nikolay Yankov On the automorphisms of order $ 15 $ for
a binary self-dual $ [96, 48, 20] $ code 171--182
Jürgen Bierbrauer Projective polynomials, a projection
construction and a family of semifields 183--200
Eimear Byrne and
Alison Sneyd Two-weight codes, graphs and orthogonal
arrays . . . . . . . . . . . . . . . . . 201--217
B. Compton and
R. Craigen and
W. de Launey Unreal $ B H(n, 6) $'s and Hadamard
matrices . . . . . . . . . . . . . . . . 219--229
Ibrahim Özen Generalized weights and the
Ball--Blokhuis congruence . . . . . . . 231--235
Dustin Moody and
Souradyuti Paul and
Daniel Smith-Tone Improved indifferentiability security
bound for the JH mode . . . . . . . . . 237--259
Martin R. Albrecht and
Jean-Charles Faug\`ere and
Pooya Farshim and
Gottfried Herold and
Ludovic Perret Polly Cracker, revisited . . . . . . . . 261--302
Jing Jiang and
Minquan Cheng and
Ying Miao Strongly separable codes . . . . . . . . 303--318
Yutaka Hiramine On automorphism groups of divisible
designs acting regularly on the set of
point classes . . . . . . . . . . . . . 319--335
Seyed Hassan Alavi and
Mohsen Bayat and
Ashraf Daneshkhah Symmetric designs admitting
flag-transitive and point-primitive
automorphism groups associated to two
dimensional projective special groups 337--351
Yan Liu and
Haode Yan A class of five-weight cyclic codes and
their weight distribution . . . . . . . 353--366
Yijin Zhang and
Yuan-Hsun Lo and
Wing Shing Wong Optimal strongly conflict-avoiding codes
of even length and weight three . . . . 367--382
Igor Semaev MaxMinMax problem and sparse equations
over finite fields . . . . . . . . . . . 383--404
Dina Ghinelli and
Dieter Jungnickel and
Michel Lavrauw and
Alexander Pott Editorial: Finite geometries . . . . . . 405--406
Anamari Naki\'c and
Leo Storme On the extendability of particular
classes of constant dimension codes . . 407--422
Ayhan Cosgun and
Ferruh Özbudak and
Zülfükar Saygi Further results on rational points of
the curve $ y^{q^n} - y = \gamma x^{q^h
+ 1} - \alpha $ over $ \mathbb {F}_{q^m}
$ . . . . . . . . . . . . . . . . . . . 423--441
Gábor Korchmáros and
Gábor P. Nagy $3$-Nets realizing a diassociative loop
in a projective plane . . . . . . . . . 443--449
Peter Beelen and
Fernando Piñero The structure of dual Grassmann codes 451--470
Stefaan De Winter and
Ellen Kamischke and
Zeying Wang Automorphisms of strongly regular graphs
with applications to partial difference
sets . . . . . . . . . . . . . . . . . . 471--485
Daniele Bartoli and
Massimo Giulietti and
Giovanni Zini Complete $ (k, 3)$-arcs from quartic
curves . . . . . . . . . . . . . . . . . 487--505
Bart De Bruyn Hyperplanes of Hermitian dual polar
spaces of rank $3$ containing a quad . . 507--533
Ivan Landjev and
Assia Rousseva and
Leo Storme On the extendability of quasidivisible
Griesmer arcs . . . . . . . . . . . . . 535--547
Neil I. Gillespie and
Michael Giudici and
Daniel R. Hawtin and
Cheryl E. Praeger Entry-faithful $2$-neighbour transitive
codes . . . . . . . . . . . . . . . . . 549--564
Katharina Kusejko Simultaneous diagonalization of conics
in $ P G(2, q) $ . . . . . . . . . . . . 565--581
Anton Betten The packings of $ \mathrm {PG}(3, 3) $ 583--595
Antonio Cossidente and
Giuseppe Marino and
Francesco Pavese Non-linear maximum rank distance codes 597--609
Alice M. W. Hui Extending some induced substructures of
an inversive plane . . . . . . . . . . . 611--617
Benjamin C. Cooper and
Tim Penttila Transitive hyperovals . . . . . . . . . 619--623
Szabolcs L. Fancsali and
Péter Sziklai Higgledy-piggledy subspaces and uniform
subspace designs . . . . . . . . . . . . 625--645
Eric Zhi Chen New binary $h$-generator quasi-cyclic
codes by augmentation and new minimum
distance bounds . . . . . . . . . . . . 1--10
José Moreira and
Marcel Fernández and
Grigory Kabatiansky Almost separating and almost secure
frameproof codes over $q$-ary alphabets 11--28
Dennis Hofheinz and
Tibor Jager Tightly secure signatures and public-key
encryption . . . . . . . . . . . . . . . 29--61
Igor E. Shparlinski On small gaps between the elements of
multiplicative subgroups of finite
fields . . . . . . . . . . . . . . . . . 63--71
Jonathan Jedwab and
Amy Wiebe Constructions of complex equiangular
lines from mutually unbiased bases . . . 73--89
Denis S. Krotov Perfect codes in Doob graphs . . . . . . 91--102
Fuchun Guo and
Willy Susilo and
Yi Mu Generalized closest substring encryption 103--124
Alexander A. Davydov and
Giorgio Faina and
Massimo Giulietti and
Stefano Marcugini and
Fernanda Pambianco On constructions and parameters of
symmetric configurations $ v_k $ . . . . 125--147
Yanling Chen and
Markku Niemenmaa and
A. J. Han Vinck A general check digit system based on
finite groups . . . . . . . . . . . . . 149--163
Sabyasachi Dutta and
Raghvendra Singh Rohit and
Avishek Adhikari Constructions and analysis of some
efficient $t$-$ (k, n)^*$-visual
cryptographic schemes using linear
algebraic techniques . . . . . . . . . . 165--196
Alberto Ravagnani Rank-metric codes and their duality
theory . . . . . . . . . . . . . . . . . 197--216
Xiang-dong Hou and
Ferruh Özbudak and
Yue Zhou Switchings of semifield multiplications 217--239
Udo Ott On Jacobi sums, difference sets and
partial difference sets in Galois
domains . . . . . . . . . . . . . . . . 241--281
Kohei Yamada and
Nobuko Miyamoto A construction and decomposition of
orthogonal arrays with non-prime-power
numbers of symbols on the complement of
a Baer subplane . . . . . . . . . . . . 283--294
Chengju Li and
Qin Yue and
Fang-Wei Fu Complete weight enumerators of some
cyclic codes . . . . . . . . . . . . . . 295--315
S. G. Barwick and
Wen-Ai Jackson Characterising pointsets in $ \mathrm
{{PG}}(4, q) $ that correspond to conics 317--332
Yarkin Doröz and
Yin Hu and
Berk Sunar Homomorphic AES evaluation using the
modified LTV scheme . . . . . . . . . . 333--358
Carl Löndahl and
Thomas Johansson and
Masoumeh Koochak Shooshtari and
Mahmoud Ahmadian-Attari and
Mohammad Reza Aref Squaring attacks on McEliece public-key
cryptosystems using quasi-cyclic codes
of even dimension . . . . . . . . . . . 359--377
Aysegul Bayram and
Elif Segah Oztas and
Irfan Siap Codes over $ F_4 + v F_4 $ and some DNA
applications . . . . . . . . . . . . . . 379--393
Marion Candau and
Roland Gautier and
Johannes Huisman Convolutional block codes with
cryptographic properties over the
semi-direct product $ \mathbb {Z} / N
\mathbb {Z} \rtimes \mathbb {Z} / M
\mathbb {Z} $ . . . . . . . . . . . . . 395--407
Kai-Uwe Schmidt and
Jürgen Willms Barker sequences of odd length . . . . . 409--414
John Sheekey Dimensional dual hyperovals in classical
polar spaces . . . . . . . . . . . . . . 415--420
Jason T. LeGrow and
David A. Pike and
Jonathan Poulin Hamiltonicity and cycle extensions in
$0$-block-intersection graphs of
balanced incomplete block designs . . . 421--433
Kathleen Nowak and
Oktay Olmez Partial geometric designs with
prescribed automorphisms . . . . . . . . 435--451
E. Ballico Non-special subsets of the set of points
of a curve defined over a finite field 453--457
Rongjia Li and
Chenhui Jin Meet-in-the-middle attacks on $
10$-round AES-256 . . . . . . . . . . . 459--471
Ga Won Lee and
Jin Hong Comparison of perfect table
cryptanalytic tradeoff algorithms . . . 473--523
Junqing Gong and
Zhenfu Cao and
Shaohua Tang and
Jie Chen Extended dual system group and shorter
unbounded hierarchical identity based
encryption . . . . . . . . . . . . . . . 525--559
Adel Alahmadi and
Hussain Alhazmi and
Tor Helleseth and
Rola Hijazi and
Najat Muthana and
Patrick Solé On the lifted Zetterberg code . . . . . 561--576
Dirk Hachenberger Asymptotic existence results for
primitive completely normal elements in
extensions of Galois fields . . . . . . 577--586
Jian Guo and
Jérémy Jean and
Ivica Nikoli\'c and
Yu Sasaki Extended meet-in-the-middle attacks on
some Feistel constructions . . . . . . . 587--618
Juan Carlos Ku-Cauich and
Guillermo Morales-Luna Authentication codes based on resilient
Boolean maps . . . . . . . . . . . . . . 619--633
Rebecca J. Stones and
Ming Su and
Xiaoguang Liu and
Gang Wang and
Sheng Lin A Latin square autotopism secret sharing
scheme . . . . . . . . . . . . . . . . . 635--650
Haode Yan and
Chunlei Liu Two classes of cyclic codes and their
weight enumerator . . . . . . . . . . . 1--9
Michelle Kendall and
Keith M. Martin Graph-theoretic design and analysis of
key predistribution schemes . . . . . . 11--34
Aida Abiad and
Willem H. Haemers Switched symplectic graphs and their
$2$-ranks . . . . . . . . . . . . . . . 35--41
Shantian Cheng and
Khoa Nguyen and
Huaxiong Wang Policy-based signature scheme from
lattices . . . . . . . . . . . . . . . . 43--74
Matan Banin and
Boaz Tsaban A reduction of Semigroup DLP to classic
DLP . . . . . . . . . . . . . . . . . . 75--82
Ciaran Mullan and
Boaz Tsaban $ {\rm SL}_2 $ homomorphic hash
functions: worst case to average case
reduction and short collision search . . 83--107
Chun Guo and
Dongdai Lin Separating invertible key derivations
from non-invertible ones: sequential
indifferentiability of $3$-round
Even--Mansour . . . . . . . . . . . . . 109--129
John Bamberg and
Melissa Lee and
Eric Swartz A note on relative hemisystems of
Hermitian generalised quadrangles . . . 131--144
Michael Braun New infinite series of $2$-designs over
the binary and ternary field . . . . . . 145--152
Chengju Li and
Sunghan Bae and
Jaehyun Ahn and
Shudi Yang and
Zheng-An Yao Complete weight enumerators of some
linear codes and their applications . . 153--168
Trygve Johnsen and
Keisuke Shiromoto and
Hugues Verdure A generalization of Kung's theorem . . . 169--178
Alfredo Rial Blind attribute-based encryption and
oblivious transfer with fine-grained
access control . . . . . . . . . . . . . 179--223
Yan Liu and
Chunlei Liu A class of cyclic codes whose duals have
five zeros . . . . . . . . . . . . . . . 225--238
Boran Kim and
Yoonjin Lee Construction of extremal self-dual codes
over $ {\mathbb {Z}}_8 $ and $ {\mathbb
{Z}}_{16} $ . . . . . . . . . . . . . . 239--257
László Mérai and
Arne Winterhof On the linear complexity profile of some
sequences derived from elliptic curves 259--267
Bence Csajbók and
Corrado Zanella On the equivalence of linear sets . . . 269--281
Zhengchun Zhou and
Nian Li and
Cuiling Fan and
Tor Helleseth Linear codes with two or three weights
from quadratic Bent functions . . . . . 283--295
Zihui Liu and
Xin-Wen Wu The fullrank value function . . . . . . 297--315
Minquan Cheng and
Jing Jiang and
Haiyan Li and
Ying Miao and
Xiaohu Tang Bounds and constructions for $
{\overline {3}}$-separable codes with
length $3$ . . . . . . . . . . . . . . . 317--335
Wilfried Meidl and
Harald Niederreiter Multisequences with high joint nonlinear
complexity . . . . . . . . . . . . . . . 337--346
Steven T. Dougherty and
Cristina Fernández-Córdoba Kernels and ranks of cyclic and
negacyclic quaternary codes . . . . . . 347--364
R. Julian R. Abel and
Robert F. Bailey and
Andrea C. Burgess and
Peter Danziger and
Eric Mendelsohn On generalized Howell designs with block
size three . . . . . . . . . . . . . . . 365--391
Yanfeng Wang and
Wenling Wu New criterion for diffusion property and
applications to improved GFS and EGFN 393--412
Abdulla Eid and
Hilaf Hasson and
Amy Ksir and
Justin Peachey Suzuki-invariant codes from the Suzuki
curve . . . . . . . . . . . . . . . . . 413--425
Cícero Carvalho and
Rafael Peixoto and
Fernando Torres Near weights on higher dimensional
varieties . . . . . . . . . . . . . . . 427--443
Antonio Cossidente and
Francesco Pavese Veronese subspace codes . . . . . . . . 445--457
Daqing Wan and
Qiang Wang Index bounds for character sums of
polynomials over finite fields . . . . . 459--468
Yuuki Kageyama and
Tatsuya Maruta On the geometric constructions of
optimal linear codes . . . . . . . . . . 469--480
Xiaoqin Zhan and
Shenglin Zhou Flag-transitive non-symmetric
$2$-designs with $ (r, \lambda) = 1 $
and sporadic socle . . . . . . . . . . . 481--487
Sanming Zhou Total perfect codes in Cayley graphs . . 489--504
Yanbin Zheng and
Pingzhi Yuan and
Dingyi Pei Large classes of permutation polynomials
over $ \mathbb {F}_{q^2} $ . . . . . . . 505--521
Huaifeng Chen and
Tingting Cui and
Meiqin Wang Improving algorithm 2 in
multidimensional (zero-correlation)
linear cryptanalysis using $
\chi^2$-method . . . . . . . . . . . . . 523--540
Hyun Jin Kim and
Yoonjin Lee Complementary information set codes over
$ {\rm GF}(p) $ . . . . . . . . . . . . 541--555
Pascale Charpin and
Thomas Johansson and
Gohar Kyureghyan and
Nicolas Sendrier and
Jean-Pierre Tillich Editorial: Special issue on coding and
cryptography . . . . . . . . . . . . . . 1--2
Christina Boura and
Anne Canteaut and
Lars R. Knudsen and
Gregor Leander Reflection ciphers . . . . . . . . . . . 3--25
Sondre Rònjom Improving algebraic attacks on stream
ciphers based on linear feedback shift
register over $ \mathbb {F}_{2^k} $ . . 27--41
Pavol Zajac Upper bounds on the complexity of
algebraic cryptanalysis of ciphers with
a low multiplicative complexity . . . . 43--56
Serhii Dyshko MacWilliams Extension Theorem for MDS
codes over a vector space alphabet . . . 57--67
Sergey Bezzateev and
Natalia Shekhunova Lower bound of covering radius of binary
irreducible Goppa codes . . . . . . . . 69--76
Kishan Chand Gupta and
Sumit Kumar Pandey and
Ayineedi Venkateswarlu On the direct construction of recursive
MDS matrices . . . . . . . . . . . . . . 77--94
Kaushik Chakraborty and
Sumanta Sarkar and
Subhamoy Maitra and
Bodhisatwa Mazumdar and
Debdeep Mukhopadhyay and
Emmanuel Prouff Redefining the transparency order . . . 95--115
Marine Minier Improving impossible-differential
attacks against Rijndael-160 and
Rijndael-224 . . . . . . . . . . . . . . 117--129
Santanu Sarkar and
Ayineedi Venkateswarlu Revisiting (nested) Roos bias in RC4 key
scheduling algorithm . . . . . . . . . . 131--148
Srimanta Bhattacharya and
Sumanta Sarkar On some permutation binomials and
trinomials over $ \mathbb {F}_{2^n} $ 149--160
Mehdi Tibouchi and
Taechan Kim Improved elliptic curve hashing and
point representation . . . . . . . . . . 161--177
Kishan Chand Gupta and
Sumit Kumar Pandey and
Ayineedi Venkateswarlu Towards a general construction of
recursive MDS diffusion layers . . . . . 179--195
A. G. D'yachkov and
I. V. Vorobyev and
N. A. Polyanskii and
V. Yu. Shchukin Cover-free codes and separating system
codes . . . . . . . . . . . . . . . . . 197--209
A. G. D'yachkov and
I. V. Vorobyev and
N. A. Polyanskii and
V. Yu. Shchukin Symmetric disjunctive list-decoding
codes . . . . . . . . . . . . . . . . . 211--229
Arkadii D'yachkov and
Ilya Vorobyev and
Nikita Polyanskii and
Vladislav Shchukin Almost cover-free codes and designs . . 231--247
Cem Güneri and
Ferruh Özbudak and
Funda Özdemir Hasse--Weil bound for additive cyclic
codes . . . . . . . . . . . . . . . . . 249--263
Nurdagül Anbar and
Wilfried Meidl and
Alev Topuzoglu Idempotent and $p$-potent quadratic
functions: distribution of nonlinearity
and co-dimension . . . . . . . . . . . . 265--291
Vladimir Gritsenko and
Grigory Kabatiansky and
Vladimir Lebedev and
Alexey Maevskiy Signature codes for noisy multiple
access adder channel . . . . . . . . . . 293--299
Jeremy Maitin-Shepard Optimal software-implemented
Itoh--Tsujii inversion for $ \mathbb
{F}_{2^m} $ . . . . . . . . . . . . . . 301--318
Jerod Michel and
Baokun Ding A generalization of combinatorial
designs and related codes . . . . . . . 511--529
Yupeng Jiang and
Dongdai Lin On affine sub-families of Grain-like
structures . . . . . . . . . . . . . . . 531--542
Yun Fan and
Bangteng Xu Fourier transforms and bent functions on
faithful actions of finite abelian
groups . . . . . . . . . . . . . . . . . 543--558
Kaoru Kurosawa and
Hiroyuki Ohta and
Kenji Kakuta How to make a linear network code
(strongly) secure . . . . . . . . . . . 559--582
Shuxing Li and
Hengjia Wei and
Gennian Ge Generic constructions for partitioned
difference families with applications: a
unified combinatorial approach . . . . . 583--599
Palash Sarkar and
Shashank Singh A new method for decomposition in the
Jacobian of small genus hyperelliptic
curves . . . . . . . . . . . . . . . . . 601--616
Moises Delgado and
Heeralal Janwa On the conjecture on APN functions and
absolute irreducibility of polynomials 617--627
R. Lakshmanan and
S. Arumugam Construction of a $ (k, n)$-visual
cryptography scheme . . . . . . . . . . 629--645
Haiying Liu and
Keqin Feng and
Rongquan Feng Nonexistence of generalized bent
functions from $ \mathbb {Z}_2^n $ to $
\mathbb {Z}_m $ . . . . . . . . . . . . 647--662
Shudi Yang and
Zheng-An Yao Complete weight enumerators of a family
of three-weight linear codes . . . . . . 663--674
M. Huggan and
G. L. Mullen and
B. Stevens and
D. Thomson Sudoku-like arrays, codes and
orthogonality . . . . . . . . . . . . . 675--693
Ming Li and
Yupeng Jiang and
Dongdai Lin The adjacency graphs of some feedback
shift registers . . . . . . . . . . . . 695--713
Liqiang Peng and
Lei Hu and
Yao Lu and
Jun Xu and
Zhangjie Huang Cryptanalysis of Dual RSA . . . . . . . 1--21
Hao Zheng and
Yanxun Chang and
Junling Zhou Direct constructions of large sets of
Kirkman triple systems . . . . . . . . . 23--32
Xiao-Nan Lu and
Masakazu Jimbo Affine-invariant strictly cyclic Steiner
quadruple systems . . . . . . . . . . . 33--69
Minquan Cheng and
Hung-Lin Fu and
Jing Jiang and
Yuan-Hsun Lo and
Ying Miao Codes with the identifiable parent
property for multimedia fingerprinting 71--82
Jaehyun Ahn and
Dongseok Ka and
Chengju Li Complete weight enumerators of a class
of linear codes . . . . . . . . . . . . 83--99
Diego Napp and
Raquel Pinto and
Marisa Toste On MDS convolutional codes over $
\mathbb {Z}_{p^r} $ . . . . . . . . . . 101--114
Nicola Pace and
Angelo Sonnino On linear codes admitting large
automorphism groups . . . . . . . . . . 115--143
Esteban Landerreche and
David Fernández-Duque A case study in almost-perfect security
for unconditionally secure communication 145--168
Denis S. Krotov On the automorphism groups of the $ Z_2
Z_4 $-linear $1$-perfect and
Preparata-like codes . . . . . . . . . . 169--177
Xiaotian Chen and
Yue Zhou Asynchronous channel hopping systems
from difference sets . . . . . . . . . . 179--196
Hongfeng Wu and
Li Zhu and
Rongquan Feng and
Siman Yang Explicit factorizations of cyclotomic
polynomials over finite fields . . . . . 197--217
Bocong Chen and
Liren Lin and
San Ling and
Hongwei Liu Three new classes of optimal
frequency-hopping sequence sets . . . . 219--232
Daniele Bartoli and
Stefano Marcugini and
Fernanda Pambianco On the completeness of plane cubic
curves over finite fields . . . . . . . 233--267
Angela Aguglia and
Luca Giuzzi Intersection sets, three-character
multisets and associated codes . . . . . 269--282
M. Kuijper and
R. Pinto An iterative algorithm for
parametrization of shortest length
linear shift registers over finite chain
rings . . . . . . . . . . . . . . . . . 283--305
Ziling Heng and
Qin Yue Evaluation of the Hamming weights of a
class of linear codes based on Gauss
sums . . . . . . . . . . . . . . . . . . 307--326
Mahdi Sajadieh and
Arash Mirzaei and
Hamid Mala and
Vincent Rijmen A new counting method to bound the
number of active S-boxes in Rijndael and
$3$D . . . . . . . . . . . . . . . . . . 327--343
I. F. Rúa Primitive semifields of order $ 2^{4e} $ 345--356
Bart Mennink Optimal collision security in double
block length hashing with single length
key . . . . . . . . . . . . . . . . . . 357--406
Yiyuan Luo and
Xuejia Lai and
Yujie Zhou Generic attacks on the Lai--Massey
scheme . . . . . . . . . . . . . . . . . 407--423
Jingxue Ma and
Tao Zhang and
Tao Feng and
Gennian Ge Some new results on permutation
polynomials over finite fields . . . . . 425--443
Yupeng Jiang and
Jiangshuai Yang On the number of irreducible linear
transformation shift registers . . . . . 445--454
Xiang Wang and
Fang-Wei Fu On the snake-in-the-box codes for rank
modulation under Kendall's $ \tau
$-metric . . . . . . . . . . . . . . . . 455--465
Yonglin Hao and
Willi Meier Truncated differential based known-key
attacks on round-reduced SIMON . . . . . 467--492
Tran van Trung Simple $t$-designs: a recursive
construction for arbitrary $t$ . . . . . 493--502
Tao Zhang and
Gennian Ge Quantum MDS codes with large minimum
distance . . . . . . . . . . . . . . . . 503--517
Elisa Gorla and
Maike Massierer An optimal representation for the trace
zero subgroup . . . . . . . . . . . . . 519--548
Esmeralda Nastase and
Papa Sissokho The structure of the minimum size
supertail of a subspace partition . . . 549--563
Xinxin Fan and
Adilet Otemissov and
Francesco Sica and
Andrey Sidorenko Multiple point compression on elliptic
curves . . . . . . . . . . . . . . . . . 565--588
Jon-Lark Kim and
Nari Lee A projection decoding of a binary
extremal self-dual code of length $ 40 $ 589--609
Aras Erzurumluoglu and
David A. Pike Twofold triple systems without
$2$-intersecting Gray codes . . . . . . 611--631
Lingfei Jin and
Haibin Kan Construction of binary linear codes via
rational function fields . . . . . . . . 633--638
Umberto Martínez-Peñas On the roots and minimum rank distance
of skew cyclic codes . . . . . . . . . . 639--660
Sergey Bereg and
Linda Morales and
I. Hal Sudborough Extending permutation arrays: improving
MOLS bounds . . . . . . . . . . . . . . 661--683
Victor J. W. Guo and
Yiting Yang Proof of a conjecture of Klòve on
permutation codes under the Chebychev
distance . . . . . . . . . . . . . . . . 685--690
Chunming Tang and
Can Xiang and
Keqin Feng Linear codes with few weights from
inhomogeneous quadratic functions . . . 691--714
Anonymous Editor's note . . . . . . . . . . . . . 715--716
Aart Blokhuis and
Edwin R. van Dam and
Willem H. Haemers and
Jack H. Koolen Preface to the special issue dedicated
to Andries E. Brouwer . . . . . . . . . 1--2
Jack Koolen and
Zhi Qiao Light tails and the Hermitian dual polar
graphs . . . . . . . . . . . . . . . . . 3--12
K. Ashik Mathew and
Patric R. J. Östergård New lower bounds for the Shannon
capacity of odd cycles . . . . . . . . . 13--22
Eiichi Bannai and
Etsuko Bannai and
Yan Zhu Relative $t$-designs in binary Hamming
association scheme $ H(n, 2)$ . . . . . 23--53
V. Diego and
M. A. Fiol Distance mean-regular graphs . . . . . . 55--71
Alireza Abdollahi and
Edwin R. van Dam and
Mojtaba Jazaeri Distance-regular Cayley graphs with
least eigenvalue $ - 2 $ . . . . . . . . 73--85
Bart Litjens and
Sven Polak and
Alexander Schrijver Semidefinite bounds for nonbinary codes
based on quadruples . . . . . . . . . . 87--100
Leonard H. Soicher The uniqueness of a distance-regular
graph with intersection array $ \{ 32,
27, 8, 1; 1, 4, 27, 32 \} $ and related
results . . . . . . . . . . . . . . . . 101--108
Peter J. Cameron and
Josephine Kusuma and
Patrick Solé $ \mathbb {Z}_4 $-codes and their Gray
map images as orthogonal arrays . . . . 109--114
Anurag Bishnoi and
Bart De Bruyn Characterizations of the Suzuki tower
near polygons . . . . . . . . . . . . . 115--133
Xi-Ming Cheng and
Jack H. Koolen A generalization of a theorem of
Neumaier . . . . . . . . . . . . . . . . 135--142
Jozefien D'haeseleer and
Klaus Metsch and
Leo Storme and
Geertrui Van de Voorde On the maximality of a set of mutually
orthogonal Sudoku latin Squares . . . . 143--152
Sebastian M. Cioaba and
Willem H. Haemers and
Jason R. Vermette The graphs with all but two eigenvalues
equal to $ - 2 $ or $0$ . . . . . . . . 153--163
Vladimir D. Tonchev On resolvable Steiner $2$-designs and
maximal arcs in projective planes . . . 165--172
Akihiro Munemasa Godsil--McKay switching and twisted
Grassmann graphs . . . . . . . . . . . . 173--179
István Kovács and
Klavdija Kutnar and
János Ruff and
Tamás Sz\Honyi Integral automorphisms of affine spaces
over finite fields . . . . . . . . . . . 181--188
Ebrahim Ghorbani On eigenvalues of Seidel matrices and
Haemers' conjecture . . . . . . . . . . 189--195
A. Blokhuis and
G. Marino and
F. Mazzocca and
O. Polverino On almost small and almost large
super-Vandermonde sets in $ {\rm GF}(q)
$ . . . . . . . . . . . . . . . . . . . 197--201
Mikhail Klin and
Matan Ziv-Av A non-Schurian coherent configuration on
$ 14 $ points exists . . . . . . . . . . 203--221
Nathann Cohen and
Dmitrii V. Pasechnik Implementing Brouwer's database of
strongly regular graphs . . . . . . . . 223--235
Arnold Neumaier Bounding basis reduction properties . . 237--259
Umberto Martínez-Peñas and
Ruud Pellikaan Rank error-correcting pairs . . . . . . 261--281
David B. Chandler and
Peter Sin and
Qing Xiang The Smith group of the hypercube graph 283--294
Tom Verhoeff The spurs of D. H. Lehmer . . . . . . . 295--310
Huiwen Jia and
Yupu Hu Cryptanalysis of multilinear maps from
ideal lattices: revisited . . . . . . . 311--324
Zhaoping Meng Doubly resolvable Steiner quadruple
systems and related designs . . . . . . 325--343
Michel Lavrauw and
John Sheekey The BEL-rank of finite semifields . . . 345--358
Shuxing Li and
Gennian Ge Constructions of maximum distance
separable symbol-pair codes using cyclic
and constacyclic codes . . . . . . . . . 359--372
Angelo De Caro and
Vincenzo Iovino On the power of rewinding simulators in
functional encryption . . . . . . . . . 373--399
Hongyu Han and
Daiyuan Peng and
Udaya Parampalli and
Zheng Ma and
Hongbin Liang Construction of low-hit-zone frequency
hopping sequences with optimal partial
Hamming correlation by interleaving
techniques . . . . . . . . . . . . . . . 401--414
James A. Davis and
Sophie Huczynska and
Gary L. Mullen Near-complete external difference
families . . . . . . . . . . . . . . . . 415--424
Ana Salagean and
R. Winter and
Matei Mandache-Salagean and
Raphael C.-W. Phan Higher order differentiation over finite
fields with applications to generalising
the cube attack . . . . . . . . . . . . 425--449
Stefaan De Winter and
Zeying Wang Classification of partial difference
sets in Abelian groups of order $ 4 p^2
$ . . . . . . . . . . . . . . . . . . . 451--461
Lingfei Jin and
Haibin Kan and
Jie Wen Quantum MDS codes with relatively large
minimum distance from Hermitian
self-orthogonal codes . . . . . . . . . 463--471
Yun Fan and
Liang Zhang Galois self-dual constacyclic codes . . 473--492
Thor Martinsen and
Wilfried Meidl and
Pantelimon St\uanic\ua Partial spread and vectorial generalized
bent functions . . . . . . . . . . . . . 1--13
Gang Shen and
Feng Liu and
Zhengxin Fu and
Bin Yu Perfect contrast XOR-based visual
cryptography schemes via linear algebra 15--37
Kwangsu Lee and
Dong Hoon Lee and
Jong Hwan Park Efficient revocable identity-based
encryption via subset difference methods 39--76
Eleonesio Strey and
Sueli I. R. Costa Lattices from codes over $ \mathbb {Z}_q
$: generalization of constructions $D$,
$ D'$ and $ \overline {D}$ . . . . . . . 77--95
Sascha Kurz Improved upper bounds for partial
spreads . . . . . . . . . . . . . . . . 97--106
Günter F. Steinke Collineations of finite $2$-affine
planes . . . . . . . . . . . . . . . . . 107--120
Leyla Isik and
Alev Topuzoglu and
Arne Winterhof Complete mappings and Carlitz rank . . . 121--128
Peter Horak and
Igor Semaev and
Zsolt Tuza A combinatorial problem related to
sparse systems of equations . . . . . . 129--144
Rongmao Chen and
Yi Mu and
Guomin Yang and
Willy Susilo and
Fuchun Guo Strong authenticated key exchange with
auxiliary inputs . . . . . . . . . . . . 145--173
Rongmao Chen and
Yi Mu and
Guomin Yang and
Willy Susilo and
Fuchun Guo and
Yang Zheng A note on the strong authenticated key
exchange with auxiliary inputs . . . . . 175--178
Jian Yuan and
Shixin Zhu and
Xiaoshan Kai and
Ping Li On the construction of quantum
constacyclic codes . . . . . . . . . . . 179--190
Kamil Otal and
Ferruh Özbudak Cyclic subspace codes via subspace
polynomials . . . . . . . . . . . . . . 191--204
Satoshi Yoshiara Equivalences among plateaued APN
functions . . . . . . . . . . . . . . . 205--217
Limengnan Zhou and
Daiyuan Peng and
Hongbin Liang and
Changyuan Wang and
Zheng Ma Constructions of optimal low-hit-zone
frequency hopping sequence sets . . . . 219--232
Vladimir D. Tonchev Linearly embeddable designs . . . . . . 233--247
Junling Zhou and
Yanxun Chang Bounds and constructions of
$t$-spontaneous emission error designs 249--271
Kaoru Kurosawa and
Le Trieu Phong Anonymous and leakage resilient IBE and
IPE . . . . . . . . . . . . . . . . . . 273--298
Jingyuan Chen and
Lijun Ji and
Yun Li New optical orthogonal signature pattern
codes with maximum collision parameter
$2$ and weight $4$ . . . . . . . . . . . 299--318
Yun Fan and
Bangteng Xu Nonlinear functions and difference sets
on group actions . . . . . . . . . . . . 319--341
Junwu Dong and
Dingyi Pei Construction for de Bruijn sequences
with large stage . . . . . . . . . . . . 343--358
Luis Felipe Tapia Cuitiño and
Andrea Luigi Tironi Some properties of skew codes over
finite fields . . . . . . . . . . . . . 359--380
Abbas Alhakim and
Maher Nouiehed Stretching de Bruijn sequences . . . . . 381--394
Nikolay Kolomeec The graph of minimal distances of bent
functions and its properties . . . . . . 395--410
Hao Zheng and
Yanxun Chang and
Junling Zhou Large sets of Kirkman triple systems of
prime power sizes . . . . . . . . . . . 411--423
Zongchen Chen and
Da Zhao On symmetric BIBDs with the same
$3$-concurrence . . . . . . . . . . . . 425--436
Georgios Tzanakis and
Lucia Moura and
Daniel Panario and
Brett Stevens Covering arrays from m-sequences and
character sums . . . . . . . . . . . . . 437--456
Antonio Cossidente and
Francesco Pavese Strongly regular graphs from classical
generalized quadrangles . . . . . . . . 457--470
Jianing Li and
Yingpu Deng Nonexistence of two classes of
generalized bent functions . . . . . . . 471--482
Manabu Hagiwara and
Justin Kong Consolidation for compact constraints
and Kendall tau LP decodable permutation
codes . . . . . . . . . . . . . . . . . 483--521
Ronan Egan On equivalence of negaperiodic Golay
pairs . . . . . . . . . . . . . . . . . 523--532
Xin Wang and
Yiwei Zhang and
Yiting Yang and
Gennian Ge New bounds of permutation codes under
Hamming metric and Kendall's $ \tau
$-metric . . . . . . . . . . . . . . . . 533--545
Amir Rubin and
Gera Weiss Mapping prefer-opposite to prefer-one de
Bruijn sequences . . . . . . . . . . . . 547--555
Joaquim Borges and
Cristina Fernández-Córdoba There is exactly one $ \mathbb {Z}_2
\mathbb {Z}_4 $-cyclic $1$-perfect code 557--566
Javier de la Cruz and
Elisa Gorla and
Hiram H. López and
Alberto Ravagnani Weight distribution of rank-metric codes 1--16
Yohei Watanabe and
Junji Shikata Timed-release computational secret
sharing and threshold encryption . . . . 17--54
Gottfried Herold and
Elena Kirshanova and
Alexander May On the asymptotic complexity of solving
LWE . . . . . . . . . . . . . . . . . . 55--83
Oliver Wilhelm Gnilke and
Marcus Greferath and
Mario Osvin Pavcevi\'c Mosaics of combinatorial designs . . . . 85--95
Jongkil Kim and
Willy Susilo and
Fuchun Guo and
Man Ho Au Functional encryption for computational
hiding in prime order groups via pair
encodings . . . . . . . . . . . . . . . 97--120
Kenza Guenda and
Somphong Jitman and
T. Aaron Gulliver Constructions of good
entanglement-assisted quantum error
correcting codes . . . . . . . . . . . . 121--136
Léo Ducas and
Wessel P. J. van Woerden The closest vector problem in tensored
root lattices of type A and in their
duals . . . . . . . . . . . . . . . . . 137--150
Qichun Wang and
Chik How Tan and
Theo Fanuela Prabowo On the covering radius of the third
order Reed--Muller code $ {\rm RM}(3, 7)
$ . . . . . . . . . . . . . . . . . . . 151--159
Daniele Bartoli and
Maria Montanucci and
Giovanni Zini Multi point AG codes on the GK maximal
curve . . . . . . . . . . . . . . . . . 161--177
Alice M. W. Hui and
B. G. Rodrigues Switched graphs of some strongly regular
graphs related to the symplectic graph 179--194
Douglas R. Stinson and
Ruizhong Wei Combinatorial repairability for
threshold schemes . . . . . . . . . . . 195--210
Chuangqiang Hu and
Shudi Yang Multi-point codes over Kummer extensions 211--230
Alexander L. Gavrilyuk and
Ilia Matkin and
Tim Penttila Derivation of Cameron--Liebler line
classes . . . . . . . . . . . . . . . . 231--236
Simon R. Blackburn and
Marcus Greferath and
Camilla Hollanti and
Mario Osvin Pavcevi\'c and
Joachim Rosenthal and
Leo Storme and
Ángeles Vázquez-Castro and
Alfred Wassermann Preface to the special issue on network
coding and designs . . . . . . . . . . . 237--238
Michael Kiermaier and
Sascha Kurz and
Alfred Wassermann The order of the automorphism group of a
binary $ {\vec {q}} $-analog of the Fano
plane is at most two . . . . . . . . . . 239--250
Michael Kiermaier and
Reinhard Laue and
Alfred Wassermann A new series of large sets of subspace
designs over the binary field . . . . . 251--268
Dirk Liebhold and
Gabriele Nebe and
Angeles Vazquez-Castro Network coding with flags . . . . . . . 269--284
Paulo Almeida and
Diego Napp and
Raquel Pinto MDS 2D convolutional codes with optimal
1D horizontal projections . . . . . . . 285--302
D. Napp and
R. Pinto and
V. Sidorenko Concatenation of convolutional codes and
rank metric codes for multi-shot network
coding . . . . . . . . . . . . . . . . . 303--318
Anna-Lena Horlemann-Trautmann and
Kyle Marshall and
Joachim Rosenthal Extension of Overbeck's attack for
Gabidulin-based cryptosystems . . . . . 319--340
Alessandro Neri and
Anna-Lena Horlemann-Trautmann and
Tovohery Randrianarisoa and
Joachim Rosenthal On the genericity of maximum rank
distance and Gabidulin codes . . . . . . 341--363
Anna-Lena Horlemann-Trautmann Message encoding and retrieval for
spread and cyclic orbit codes . . . . . 365--386
Netanel Raviv and
Eitan Yaakobi and
Muriel Médard Coding for locality in reconstructing
permutations . . . . . . . . . . . . . . 387--418
Natalia Silberstein and
Alexander Zeh Anticode-based locally repairable codes
with high availability . . . . . . . . . 419--445
Anonymous Editor's note . . . . . . . . . . . . . 447--447
Dieter Jungnickel and
Vladimir D. Tonchev On Bonisoli's theorem and the block
codes of Steiner triple systems . . . . 449--462
Joaquim Borges and
Cristina Fernández-Córdoba and
Roger Ten-Valls $ {{\mathbb {Z}}}_2$-double cyclic codes 463--479
Mich\`ele Feltz and
Cas Cremers Strengthening the security of
authenticated key exchange against bad
randomness . . . . . . . . . . . . . . . 481--516
Shuai Han and
Shengli Liu and
Baodong Qin and
Dawu Gu Tightly CCA-secure identity-based
encryption with ciphertext
pseudorandomness . . . . . . . . . . . . 517--554
Ales Drápal and
Viliam Valent Few associative triples, isotopisms and
groups . . . . . . . . . . . . . . . . . 555--568
Roland D. Barrolleta and
Merc\`e Villanueva Partial permutation decoding for binary
linear and $ Z_4 $-linear Hadamard codes 569--586
Dieter Jungnickel and
Yue Zhou and
Vladimir D. Tonchev Extension sets, affine designs, and
Hamada's conjecture . . . . . . . . . . 587--610
Jürgen Bierbrauer and
Daniele Bartoli and
Giorgio Faina and
Stefano Marcugini and
Fernanda Pambianco A family of semifields in odd
characteristic . . . . . . . . . . . . . 611--621
Jooyoung Lee and
Atul Luykx and
Bart Mennink and
Kazuhiko Minematsu Connecting tweakable and multi-key
blockcipher security . . . . . . . . . . 623--640
Seung Geol Choi and
Dana Dachman-Soled and
Tal Malkin and
Hoeteck Wee Improved, black-box, non-malleable
encryption from semantic security . . . 641--663
Ulrich Dempwolff CCZ equivalence of power functions . . . 665--692
Rafael A. Arce-Nazario and
Francis N. Castro and
Oscar E. González and
Luis A. Medina and
Ivelisse M. Rubio New families of balanced symmetric
functions and a generalization of
Cusick, Li and St\uanic\ua's conjecture 693--701
Cunsheng Ding Infinite families of $3$-designs from a
type of five-weight code . . . . . . . . 703--719
Li Lin and
Wenling Wu Improved meet-in-the-middle attacks on
reduced-round Kalyna-128/256 and
Kalyna-256/512 . . . . . . . . . . . . . 721--741
Remi Bricout and
Sean Murphy and
Kenneth G. Paterson and
Thyla van der Merwe Analysing and exploiting the Mantin
biases in RC4 . . . . . . . . . . . . . 743--770
Fengwei Li and
Qin Yue The primitive idempotents and weight
distributions of irreducible
constacyclic codes . . . . . . . . . . . 771--784
José Moreira and
Marcel Fernández and
Grigory Kabatiansky Constructions of almost secure
frameproof codes with applications to
fingerprinting schemes . . . . . . . . . 785--802
Tao Zhang and
Gennian Ge Combinatorial constructions of packings
in Grassmannian spaces . . . . . . . . . 803--815
Oktay Olmez A link between combinatorial designs and
three-weight linear codes . . . . . . . 817--833
Gerardo Vega A correction on the determination of the
weight enumerator polynomial of some
irreducible cyclic codes . . . . . . . . 835--840
Baokun Ding and
Gennian Ge and
Jun Zhang and
Tao Zhang and
Yiwei Zhang New constructions of MDS symbol-pair
codes . . . . . . . . . . . . . . . . . 841--859
Sven C. Polak New nonbinary code bounds based on
divisibility arguments . . . . . . . . . 861--874
Irrinki Gnana Sudha and
R. S. Selvaraj Codes with a pomset metric and
constructions . . . . . . . . . . . . . 875--892
Xiang-Dong Hou Complexities of normal bases constructed
from Gauss periods . . . . . . . . . . . 893--905
Charles J. Colbourn and
Erin Lanus and
Kaushik Sarkar Asymptotic and constructive methods for
covering perfect hash families and
covering arrays . . . . . . . . . . . . 907--937
Zhiqiang Lin and
Dingyi Pei and
Dongdai Lin and
Xiaolei Zhang Fast construction of binary ring FCSRs
for hardware stream ciphers . . . . . . 939--953
Jooyoung Lee Key alternating ciphers based on
involutions . . . . . . . . . . . . . . 955--988
Boris Ryabko Properties of two Shannon's ciphers . . 989--995
John Bamberg and
Jesse Lansdown and
Melissa Lee On $m$-ovoids of regular near polygons 997--1006
Dabin Zheng and
Jingjun Bao Four classes of linear codes from
cyclotomic cosets . . . . . . . . . . . 1007--1022
Weihua Liu and
Andrew Klapper and
Zhixiong Chen Solving the FCSR synthesis problem for
multi-sequences by lattice basis
reduction . . . . . . . . . . . . . . . 1023--1038
John Vincent S. Morales and
Hajime Tanaka An Assmus--Mattson theorem for codes
over commutative association schemes . . 1039--1062
Liantao Lan and
Yanxun Chang and
Lidong Wang Constructions of cyclic quaternary
constant-weight codes of weight three
and distance four . . . . . . . . . . . 1063--1083
Masaaki Harada Binary extremal self-dual codes of
length 60 and related codes . . . . . . 1085--1094
Sergey Bereg and
Avi Levy and
I. Hal Sudborough Constructing permutation arrays from
groups . . . . . . . . . . . . . . . . . 1095--1111
László Mérai On the elliptic curve endomorphism
generator . . . . . . . . . . . . . . . 1113--1129
Sugata Gangopadhyay and
Bimal Mandal and
Pantelimon St\uanic\ua Gowers $ U_3 $ norm of some classes of
bent Boolean functions . . . . . . . . . 1131--1148
Jiejing Wen and
Minghui Yang and
Fangwei Fu and
Keqin Feng Cyclotomic construction of strong
external difference families in finite
fields . . . . . . . . . . . . . . . . . 1149--1159
Antonio Cossidente and
Francesco Pavese On intriguing sets of finite symplectic
spaces . . . . . . . . . . . . . . . . . 1161--1174
Giorgio Donati and
Nicola Durante A generalization of the normal rational
curve in $ \mathrm {PG}(d, q^n) $ and
its associated non-linear MRD codes . . 1175--1184
Tran van Trung A recursive construction for simple
$t$-designs using resolutions . . . . . 1185--1200
Minjia Shi and
Zahra Sepasdar and
Adel Alahmadi and
Patrick Solé On two-weight $ \mathbb {Z}_{2^k}
$-codes . . . . . . . . . . . . . . . . 1201--1209
Goutam Paul and
Souvik Ray On data complexity of distinguishing
attacks versus message recovery attacks
on stream ciphers . . . . . . . . . . . 1211--1247
Nuh Aydin and
Yasemin Cengellenmis and
Abdullah Dertli On some constacyclic codes over $
\mathbb {Z}_4 \left [u \right] / \left
\langle u^2 - 1 \right \rangle $, their
$ \mathbb {Z}_4 $ images, and new codes 1249--1255
Adel Alahmadi and
Funda Özdemir and
Patrick Solé On self-dual double circulant codes . . 1257--1265
Bocong Chen and
Hongwei Liu Constructions of cyclic constant
dimension codes . . . . . . . . . . . . 1267--1279
Chong-Dao Lee and
Yaotsu Chang and
Chia-an Liu A construction of group divisible
designs with block sizes 3 to 7 . . . . 1281--1293
Wenquan Bi and
Zheng Li and
Xiaoyang Dong and
Lu Li and
Xiaoyun Wang Conditional cube attack on round-reduced
River Keyak . . . . . . . . . . . . . . 1295--1310
Ferdinand Ihringer and
Karen Meagher Miklós--Manickam--Singhi conjectures on
partial geometries . . . . . . . . . . . 1311--1327
Wei Su and
Yang Yang and
Cuiling Fan New optimal binary sequences with period
$ 4 p $ via interleaving
Ding--Helleseth--Lam sequences . . . . . 1329--1338
Jie Zhang and
Jie Chen and
Junqing Gong and
Aijun Ge and
Chuangui Ma Leakage-resilient attribute based
encryption in prime-order groups via
predicate encodings . . . . . . . . . . 1339--1366
James A. Davis and
Oktay Olmez A framework for constructing partial
geometric difference sets . . . . . . . 1367--1375
Joaquim Borges and
Cristina Fernández-Córdoba A characterization of $ \mathbb {Z}_2
\mathbb {Z}_2 [u] $-linear codes . . . . 1377--1389
Philippe Gaborit and
Ayoub Otmani and
Hervé Talé Kalachi Polynomial-time key recovery attack on
the Faure--Loidreau scheme based on
Gabidulin codes . . . . . . . . . . . . 1391--1403
David Clayton A note on almost difference sets in
nonabelian groups . . . . . . . . . . . 1405--1410
Shuai Han and
Shengli Liu and
Lin Lyu Super-strong RKA secure MAC, PKE and SE
from tag-based hash proof system . . . . 1411--1449
Hai Q. Dinh and
Abhay Kumar Singh and
Sukhamoy Pattanayak and
Songsak Sriboonchitta Cyclic DNA codes over the ring $ \mathbb
{F}_2 + u \mathbb {F}_2 + v \mathbb
{F}_2 + u v \mathbb {F}_2 + v^2 \mathbb
{F}_2 + u v^2 \mathbb {F}_2 $ . . . . . 1451--1467
Kai-Uwe Schmidt Hermitian rank distance codes . . . . . 1469--1481
Zibi Xiao and
Xiangyong Zeng and
Chunlei Li and
Tor Helleseth New generalized cyclotomic binary
sequences of period $ p^2 $ . . . . . . 1483--1497
Jingyuan Chen and
Lijun Ji and
Yun Li Combinatorial constructions of optimal $
(m, n, 4, 2) $ optical orthogonal
signature pattern codes . . . . . . . . 1499--1525
SenPeng Wang and
Bin Hu and
Yan Liu The autocorrelation properties of single
cycle polynomial $T$-functions . . . . . 1527--1540
Qian Wang and
Chenhui Jin Upper bound of the length of truncated
impossible differentials for AES . . . . 1541--1552
Li Shuai and
Miao Li A method to calculate differential
uniformity for permutations . . . . . . 1553--1563
Jianfa Qian and
Lina Zhang On MDS linear complementary dual codes
and entanglement-assisted quantum codes 1565--1572
Hadi Kharaghani and
Sho Suda Unbiased orthogonal designs . . . . . . 1573--1588
Daniele Bartoli and
Luciane Quoos Permutation polynomials of the type $
x^r g(x^s) $ over $ {\mathbb
{F}}_{q^{2n}} $ . . . . . . . . . . . . 1589--1599
Maosheng Xiong and
Haode Yan and
Pingzhi Yuan On a conjecture of differentially
$8$-uniform power functions . . . . . . 1601--1621
Keita Emura and
Goichiro Hanaoka and
Koji Nuida and
Go Ohtake and
Takahiro Matsuda and
Shota Yamada Chosen ciphertext secure
keyed-homomorphic public-key
cryptosystems . . . . . . . . . . . . . 1623--1683
Konstantinos Limniotis and
Nicholas Kolokotronis Boolean functions with maximum algebraic
immunity: further extensions of the
Carlet--Feng construction . . . . . . . 1685--1706
Neranga Fernando Self-reciprocal polynomials and coterm
polynomials . . . . . . . . . . . . . . 1707--1726
Chong Shangguan and
Jingxue Ma and
Gennian Ge New upper bounds for parent-identifying
codes and traceability codes . . . . . . 1727--1737
Mingchao Li and
Miao Liang and
Beiliang Du and
Jingyuan Chen A construction for optimal $c$-splitting
authentication and secrecy codes . . . . 1739--1755
Hongxue Liang and
Shenglin Zhou Flag-transitive point-primitive
automorphism groups of non-symmetric 2-$
(v, k, 3) $ designs . . . . . . . . . . 1757--1766
I. Blanco-Chacón and
E. Byrne and
I. Duursma and
J. Sheekey Rank metric codes and zeta functions . . 1767--1792
Maki Yoshida and
Satoshi Obana On the (in)efficiency of non-interactive
secure multiparty computation . . . . . 1793--1805
Daniel Augot and
Pierre Loidreau and
Gwezheneg Robert Generalized Gabidulin codes over fields
of any characteristic . . . . . . . . . 1807--1848
José I. Farrán and
Pedro A. García-Sánchez and
Benjamín A. Heredia and
Micah J. Leamer The second Feng--Rao number for codes
coming from telescopic semigroups . . . 1849--1864
Sihem Mesnager and
Ferruh Özbudak and
Ahmet Sinak On the $p$-ary (cubic) bent and
plateaued (vectorial) functions . . . . 1865--1892
Khodakhast Bibak and
Bruce M. Kapron and
Venkatesh Srinivasan Unweighted linear congruences with
distinct coordinates and the
Varshamov--Tenengolts codes . . . . . . 1893--1904
J. Rif\`a and
Emilio Suárez Canedo Hadamard full propelinear codes of type
$Q$; rank and kernel . . . . . . . . . . 1905--1921
Ling Sun and
Huaifeng Chen and
Meiqin Wang Zero-correlation attacks: statistical
models independent of the number of
approximations . . . . . . . . . . . . . 1923--1945
Yoshitaka Koga and
Tatsuya Maruta and
Keisuke Shiromoto On critical exponents of Dowling
matroids . . . . . . . . . . . . . . . . 1947--1962
Zhilin Zhang and
Shenglin Zhou Flag-transitive point-quasiprimitive 2-$
(v, k, 2) $ designs . . . . . . . . . . 1963--1971
Kai-Uwe Schmidt and
Yue Zhou On the number of inequivalent Gabidulin
codes . . . . . . . . . . . . . . . . . 1973--1982
Ayoub Otmani and
Hervé Talé Kalachi and
Sélestin Ndjeya Improved cryptanalysis of rank metric
schemes based on Gabidulin codes . . . . 1983--1996
Jun Xu and
Santanu Sarkar and
Lei Hu and
Zhangjie Huang and
Liqiang Peng Solving a class of modular polynomial
equations and its relation to modular
inversion hidden number problem and
inversive congruential generator . . . . 1997--2033
Alberto Ravagnani Duality of codes supported on regular
lattices, with an application to
enumerative combinatorics . . . . . . . 2035--2063
Javier de la Cruz and
Wolfgang Willems On group codes with complementary duals 2065--2073
Trygve Johnsen and
Hugues Verdure Flags of almost affine codes and the
two-party wire-tap channel of type II 2075--2090
Yun Fan and
Bangteng Xu Fourier transforms and bent functions on
finite groups . . . . . . . . . . . . . 2091--2113
Steven T. Dougherty and
Joseph Gildea and
Rhian Taylor and
Alexander Tylyshchak Group rings, $G$-codes and constructions
of self-dual and formally self-dual
codes . . . . . . . . . . . . . . . . . 2115--2138
Shixin Zhu and
Zhonghua Sun and
Ping Li A class of negacyclic BCH codes and its
application to quantum codes . . . . . . 2139--2165
Seunghwan Chang and
Jong Yoon Hyun Linear codes from simplicial complexes 2167--2181
Jezerca Hodaj and
Melissa S. Keranen and
Donald L. Kreher and
Leah Tollefson Some new Kirkman signal sets . . . . . . 2183--2195
Dario Catalano and
Dario Fiore and
Luca Nizzardo Homomorphic signatures with sublinear
public keys via asymmetric programmable
hash functions . . . . . . . . . . . . . 2197--2246
Ramakrishna Bandi and
Alexandre Fotue Tabue and
Edgar Martínez-Moro On counting subring-submodules of free
modules over finite commutative
Frobenius rings . . . . . . . . . . . . 2247--2254
Lijun Ji Group divisible designs with large block
sizes . . . . . . . . . . . . . . . . . 2255--2260
Chengju Li Hermitian LCD codes from cyclic codes 2261--2278
Jean-Charles Faug\`ere and
Alexandre Wallet The point decomposition problem over
hyperelliptic curves . . . . . . . . . . 2279--2314
Daniele Bartoli and
Maria Montanucci and
Giovanni Zini AG codes and AG quantum codes from the
GGS curve . . . . . . . . . . . . . . . 2315--2344
Khadijeh Bagheri and
Mohammad-Reza Sadeghi and
Daniel Panario A non-commutative cryptosystem based on
quaternion algebras . . . . . . . . . . 2345--2377
Kangquan Li and
Longjiang Qu and
Qiang Wang New constructions of permutation
polynomials of the form $ x^r h \left
(x^{q - 1} \right) $ over $ {\mathbb
F}_{q^2} $ . . . . . . . . . . . . . . . 2379--2405
Kwangsu Lee and
Seunghwan Park Revocable hierarchical identity-based
encryption with shorter private keys and
update keys . . . . . . . . . . . . . . 2407--2440
Cuiling Fan The linear complexity of a class of
binary sequences with optimal
autocorrelation . . . . . . . . . . . . 2441--2450
Song Tian and
Bao Li and
Kunpeng Wang and
Wei Yu Cover attacks for elliptic curves with
cofactor two . . . . . . . . . . . . . . 2451--2468
Yunwen Liu and
Vincent Rijmen and
Gregor Leander Nonlinear diffusion layers . . . . . . . 2469--2484
Minjia Shi and
Liqin Qian and
Patrick Solé On self-dual negacirculant codes of
index two and four . . . . . . . . . . . 2485--2494
Yunhua Wen and
Shengli Liu and
Shuai Han Reusable fuzzy extractor from the
decisional Diffie--Hellman assumption 2495--2512
Zhengchun Zhou Three-weight ternary linear codes from a
family of cyclic difference sets . . . . 2513--2523
David Derler and
Daniel Slamanig Practical witness encryption for
algebraic languages or how to encrypt
under Groth--Sahai proofs . . . . . . . 2525--2547
Jia Liu and
Tibor Jager and
Saqib A. Kakvi and
Bogdan Warinschi How to build time-lock encryption . . . 2549--2586
Chunpeng Ge and
Willy Susilo and
Liming Fang and
Jiandong Wang and
Yunqing Shi A CCA-secure key-policy attribute-based
proxy re-encryption in the adaptive
corruption model for dropbox data
sharing system . . . . . . . . . . . . . 2587--2603
Claude Carlet and
Sihem Mesnager and
Chunming Tang and
Yanfeng Qi Euclidean and Hermitian LCD MDS codes 2605--2618
I. Yu. Mogilnykh and
F. I. Solov'eva On explicit minimum weight bases for
extended cyclic codes related to Gold
functions . . . . . . . . . . . . . . . 2619--2627
Jose Torres-Jimenez and
Idelfonso Izquierdo-Marquez Covering arrays of strength three from
extended permutation vectors . . . . . . 2629--2643
Hui Zhang and
Eitan Yaakobi and
Natalia Silberstein Multiset combinatorial batch codes . . . 2645--2660
Jared Antrobus and
Heide Gluesing-Luerssen Lexicodes over finite principal ideal
rings . . . . . . . . . . . . . . . . . 2661--2676
Ming Ming Tan Group invariant weighing matrices . . . 2677--2702
Beno\^\it Cogliati and
Yannick Seurin Analysis of the single-permutation
encrypted Davies--Meyer construction . . 2703--2723
Simone Costa and
Tao Feng and
Xiaomiao Wang Frame difference families and resolvable
balanced incomplete block designs . . . 2725--2745
Beno\^\it Cogliati Tweaking a block cipher: multi-user
beyond-birthday-bound security in the
standard model . . . . . . . . . . . . . 2747--2763
Xiaoqin Zhan and
Shenglin Zhou Non-symmetric $2$-designs admitting a
two-dimensional projective linear group 2765--2773
Xiao-Xin Zhao and
Tian Tian and
Wen-Feng Qi A ring-like cascade connection and a
class of NFSRs with the same cycle
structures . . . . . . . . . . . . . . . 2775--2790
Wittawat Kositwattanarerk Pseudocodeword-free criterion for codes
with cycle-free Tanner graph . . . . . . 2791--2805
Neriman Gamze Orhon and
Huseyin Hisil Speeding up Huff form of elliptic curves 2807--2823
Fernando L. Piñero and
Prasant Singh A note on the weight spectrum of the
Schubert code $ C_\alpha (2, m) $ . . . 2825--2836
Jin Li and
Aixian Zhang and
Keqin Feng Linear codes over $ \mathbb {F}_q[x] /
(x^2) $ and $ G R(p^2, m) $ reaching the
Griesmer bound . . . . . . . . . . . . . 2837--2855
Xiaojuan Lu and
Xiaolei Niu and
Haitao Cao Some results on generalized strong
external difference families . . . . . . 2857--2868
Xiaofang Xu and
Chunlei Li and
Xiangyong Zeng and
Tor Helleseth Constructions of complete permutation
polynomials . . . . . . . . . . . . . . 2869--2892
José I. Farrán and
Pedro A. García-Sánchez and
Benjamín A. Heredia On the second Feng--Rao distance of
Algebraic Geometry codes related to Arf
semigroups . . . . . . . . . . . . . . . 2893--2916
Xinxin Fan and
Guang Gong and
Berry Schoenmakers and
Francesco Sica and
Andrey Sidorenko Secure simultaneous bit extraction from
Koblitz curves . . . . . . . . . . . . . 1--13
Haibo Liu and
Qunying Liao Several classes of linear codes with a
few weights from defining sets over $
\mathbb {F}_p + u \mathbb {F}_p $ . . . 15--29
Shihui Fu and
Xiutao Feng Involutory differentially $4$-uniform
permutations from known constructions 31--56
John T. Ethier and
Gary L. Mullen Sets of mutually orthogonal Sudoku
frequency squares . . . . . . . . . . . 57--65
Ronan Egan Phased unitary Golay pairs, Butson
Hadamard matrices and a conjecture of
Ito's . . . . . . . . . . . . . . . . . 67--74
Thierry Mefenza and
Damien Vergnaud Polynomial interpolation of the
generalized Diffie--Hellman and
Naor--Reingold functions . . . . . . . . 75--85
Minjia Shi and
Hongwei Zhu and
Patrick Solé and
Gérard D. Cohen How many weights can a linear code have? 87--95
Minquan Cheng and
Jing Jiang and
Qiang Wang Improved bounds on $2$-frameproof codes
with length 4 . . . . . . . . . . . . . 97--106
Tao Zhang and
Gennian Ge Constructions of optimal Ferrers diagram
rank metric codes . . . . . . . . . . . 107--121
Azam Soleimanian and
Shahram Khazaei Publicly verifiable searchable symmetric
encryption based on efficient
cryptographic components . . . . . . . . 123--147
Shiyong Zhang and
Gongliang Chen New results on the state cycles of
Trivium . . . . . . . . . . . . . . . . 149--162
Zhixiong Chen and
Ting Gu and
Andrew Klapper On the $q$-bentness of Boolean functions 163--171
Alp Bassa and
Henning Stichtenoth Self-dual codes better than the
Gilbert--Varshamov bound . . . . . . . . 173--182
Ilaria Cardinali and
Michel Lavrauw and
Klaus Metsch and
Alexander Pott Preface to the special issue on finite
geometries . . . . . . . . . . . . . . . 715--716
Karen Meagher An Erd\Hos--Ko--Rado theorem for the
group $ {\rm PSU}(3, q) $ . . . . . . . 717--744
Marco Buratti On disjoint $ (v, k, k - 1) $ difference
families . . . . . . . . . . . . . . . . 745--755
Stefaan De Winter and
Zeying Wang Non-existence of partial difference sets
in Abelian groups of order $ 8 p^3 $ . . 757--768
Marco Buratti and
Francesca Merola Fano Kaleidoscopes and their
generalizations . . . . . . . . . . . . 769--784
Ivan Landjev and
Nevyana Georgieva Conditions for the existence of spreads
in projective Hjelmslev spaces . . . . . 785--794
Daniele Bartoli and
Massimo Giulietti and
Maria Montanucci Linear codes from Denniston maximal arcs 795--806
Stefaan De Winter and
Cunsheng Ding and
Vladimir D. Tonchev Maximal arcs and extended cyclic codes 807--816
Fernando Piñero and
Prasant Singh The weight spectrum of certain affine
Grassmann codes . . . . . . . . . . . . 817--830
Dieter Jungnickel and
Spyros S. Magliveras and
Vladimir D. Tonchev and
Alfred Wassermann The classification of Steiner triple
systems on $ 27 $ points with $3$-rank $
24$ . . . . . . . . . . . . . . . . . . 831--839
Assia Rousseva and
Ivan Landjev Linear codes close to the Griesmer bound
and the related geometric structures . . 841--854
Igor E. Shparlinski and
Arne Winterhof Codes correcting restricted errors . . . 855--863
Aart Blokhuis and
Leo Storme and
Tamás Sz\Honyi Relative blocking sets of unions of Baer
subplanes . . . . . . . . . . . . . . . 865--877
Jan De Beule and
Jeroen Demeyer and
Sam Mattheus and
Péter Sziklai On the cylinder conjecture . . . . . . . 879--893
Hiroaki Taniguchi A variation of the dual hyperoval $
{\mathcal {S}}_c $ using presemifields 895--908
Bart De Bruyn Three homogeneous embeddings of $
\mathrm {DW}(2 n - 1, 2) $ . . . . . . . 909--929
Anton Betten and
Fatma Karaoglu Cubic surfaces over small finite fields 931--953
Pascale Charpin and
Philippe Langevin Obituary of Jacques Wolfmann
(1932--2018) . . . . . . . . . . . . . . 955--956
Alice M. W. Hui and
Muhammad Adib Surani and
Sanming Zhou The vertex-isoperimetric number of the
incidence and non-incidence graphs of
unitals . . . . . . . . . . . . . . . . 957--970
Yuqing Zhu and
Jincheng Zhuang and
Hairong Yi and
Chang Lv and
Dongdai Lin A variant of the Galbraith--Ruprai
algorithm for discrete logarithms with
improved complexity . . . . . . . . . . 971--986
Mariusz Meszka and
Magdalena Tyniec Orthogonal one-factorizations of
complete multipartite graphs . . . . . . 987--993
Alexander M. Romanov On non-full-rank perfect codes over
finite fields . . . . . . . . . . . . . 995--1003
Junji Shikata and
Yohei Watanabe Identity-based encryption with
hierarchical key-insulation in the
standard model . . . . . . . . . . . . . 1005--1033
Yanbin Li and
Meiqin Wang Cryptanalysis of MORUS . . . . . . . . . 1035--1058
Shoko Chisaki and
Yui Kimura and
Nobuko Miyamoto A recursive construction for difference
systems of sets . . . . . . . . . . . . 1059--1068
Giacomo Micheli and
Violetta Weger Cryptanalysis of the CLR-cryptosystem 1069--1086
Ziling Heng and
Cunsheng Ding A construction of $q$-ary linear codes
with irreducible cyclic codes . . . . . 1087--1108
Darcy Best and
Trent Marbach and
Rebecca J. Stones and
Ian M. Wanless Covers and partial transversals of Latin
squares . . . . . . . . . . . . . . . . 1109--1136
Zuling Chang and
Martianus Frederic Ezerman and
San Ling and
Huaxiong Wang On binary de Bruijn sequences from LFSRs
with arbitrary characteristic
polynomials . . . . . . . . . . . . . . 1137--1160
Huiqin Xie and
Li Yang Using Bernstein--Vazirani algorithm to
attack block ciphers . . . . . . . . . . 1161--1182
Vladimir Edemskiy and
Chunlei Li and
Xiangyong Zeng and
Tor Helleseth The linear complexity of generalized
cyclotomic binary sequences of period $
p^n $ . . . . . . . . . . . . . . . . . 1183--1197
A. J. van Zanten Primitive idempotent tables of cyclic
and constacyclic codes . . . . . . . . . 1199--1225
Hiroki Koike and
István Kovács and
Dragan Maru\vsi\vc and
Mikhail Muzychuk Cyclic groups are CI-groups for balanced
configurations . . . . . . . . . . . . . 1227--1235
Tsuyoshi Miezaki and
Manabu Oura On the cycle index and the weight
enumerator . . . . . . . . . . . . . . . 1237--1242
Jerod Michel and
Qi Wang Almost difference sets in nonabelian
groups . . . . . . . . . . . . . . . . . 1243--1251
Serhii Dyshko The extension theorem for Lee and
Euclidean weight codes over integer
residue rings . . . . . . . . . . . . . 1253--1269
Wenquan Bi and
Xiaoyang Dong and
Zheng Li and
Rui Zong and
Xiaoyun Wang MILP-aided cube-attack-like
cryptanalysis on Keccak Keyed modes . . 1271--1296
Chun Guo and
Yaobin Shen and
Lei Wang and
Dawu Gu Beyond-birthday secure domain-preserving
PRFs from a single permutation . . . . . 1297--1322
Oriol Farr\`as and
Jordi Ribes-González and
Sara Ricci Local bounds for the optimal information
ratio of secret sharing schemes . . . . 1323--1344
Zhengan Huang and
Junzuo Lai and
Wenbin Chen and
Man Ho Au and
Zhen Peng and
Jin Li Simulation-based selective opening
security for receivers under
chosen-ciphertext attacks . . . . . . . 1345--1371
David Derler and
Daniel Slamanig Key-homomorphic signatures: definitions
and applications to multiparty
signatures and non-interactive
zero-knowledge . . . . . . . . . . . . . 1373--1413
Yanxun Chang and
Hao Zheng and
Junling Zhou Existence of frame-derived $H$-designs 1415--1431
Daniele Bartoli and
Matteo Bonini Minimum weight codewords in dual
algebraic-geometric codes from the
Giulietti--Korchmáros curve . . . . . . . 1433--1445
Minjia Shi and
Yan Liu and
Hugues Randriam and
Lin Sok and
Patrick Solé Trace codes over $ {\mathbb {Z}}_4 $,
and Boolean functions . . . . . . . . . 1447--1455
Ferdinand Ihringer and
Karen Meagher Correction to: Miklós--Manickam--Singhi
conjectures on partial geometries . . . 1457--1457
Giorgos Kapetanakis and
Lucas Reis Variations of the Primitive Normal Basis
Theorem . . . . . . . . . . . . . . . . 1459--1480
Shihui Fu and
Xiutao Feng and
Dongdai Lin and
Qiang Wang A recursive construction of permutation
polynomials over $ {\mathbb {F}}_{q^2} $
with odd characteristic related to Rédei
functions . . . . . . . . . . . . . . . 1481--1498
Tao Feng and
Lidong Wang and
Xiaomiao Wang Optimal $2$-D $ (n \times m, 3, 2,
1)$-optical orthogonal codes and related
equi-difference conflict avoiding codes 1499--1520
Tran van Trung On existence theorems for simple
$t$-designs . . . . . . . . . . . . . . 1521--1540
Julien Lavauzelle Lifted projective Reed--Solomon codes 1541--1575
Claude Carlet and
Xi Chen and
Longjiang Qu Constructing infinite families of low
differential uniformity $ (n,
m)$-functions with $ m > n / 2$ . . . . . 1577--1599
Keju Meng and
Fuyou Miao and
Yue Yu A secure and efficient on-line/off-line
group key distribution protocol . . . . 1601--1620
Beno\^\it Cogliati and
Titouan Tanguy Multi-user security bound for filter
permutators in the random oracle model 1621--1638
John Polhill A new family of partial difference sets
in $3$-groups . . . . . . . . . . . . . 1639--1646
Dongdong Jia and
Sumei Zhang and
Gengsheng Zhang Erasure combinatorial batch codes based
on nonadaptive group testing . . . . . . 1647--1656
Lucas Reis Factorization of a class of composed
polynomials . . . . . . . . . . . . . . 1657--1671
Matthew Fickus and
John Jasper Equiangular tight frames from group
divisible designs . . . . . . . . . . . 1673--1697
Sabyasachi Dutta and
Avishek Adhikari and
Sushmita Ruj Maximal contrast color visual secret
sharing schemes . . . . . . . . . . . . 1699--1711
Xing Liu and
Liang Zhou Improved Singleton bound on frequency
hopping sequences and optimal
constructions . . . . . . . . . . . . . 1713--1733
Xing Liu and
Liang Zhou Correction to: Improved Singleton bound
on frequency hopping sequences and
optimal constructions . . . . . . . . . 1735--1736
Léo Ducas and
Cécile Pierrot Polynomial time bounded distance
decoding near Minkowski's bound in
discrete logarithm lattices . . . . . . 1737--1748
Qichun Wang and
Pantelimon St\uanic\ua A trigonometric sum sharp estimate and
new bounds on the nonlinearity of some
cryptographic Boolean functions . . . . 1749--1763
Keisuke Shiromoto Codes with the rank metric and matroids 1765--1776
Mahdi Cheraghchi Nearly optimal robust secret sharing . . 1777--1796
Jian Liu and
Sihem Mesnager Weightwise perfectly balanced functions
with high weightwise nonlinearity
profile . . . . . . . . . . . . . . . . 1797--1813
Xiang-Dong Hou Optimal binary constant weight codes and
affine linear groups over finite fields 1815--1838
A. Blokhuis and
M. De Boeck and
J. D'haeseleer Cameron--Liebler sets of $k$-spaces in $
{\rm PG}(n, q) $ . . . . . . . . . . . . 1839--1856
Minjia Shi and
Daitao Huang and
Denis S. Krotov Additive perfect codes in Doob graphs 1857--1869
Torger Olson and
Eric Swartz Transitive PSL(2,11)-invariant $k$-arcs
in PG(4,q) . . . . . . . . . . . . . . . 1871--1879
Andries E. Brouwer and
Sven C. Polak Uniqueness of codes using semidefinite
programming . . . . . . . . . . . . . . 1881--1895
Itai Dinur An algorithmic framework for the
generalized birthday problem . . . . . . 1897--1926
Yansheng Wu and
Qin Yue and
Xueying Shi At most three-weight binary linear codes
from generalized Moisio's exponential
sums . . . . . . . . . . . . . . . . . . 1927--1943
Jerod Michel and
Qi Wang Almost designs and their links with
balanced incomplete block designs . . . 1945--1960
Ching-Yi Lai and
Kai-Min Chung Quantum encryption and generalized
Shannon impossibility . . . . . . . . . 1961--1972
Hiroaki Taniguchi On some quadratic APN functions . . . . 1973--1983
Antonio Cossidente and
Francesco Pavese On line covers of finite projective and
polar spaces . . . . . . . . . . . . . . 1985--2002
Miao Liang and
Lijun Ji On $ (t, L) $-fold perfect
authentication and secrecy codes with
arbitration . . . . . . . . . . . . . . 2003--2026
Cícero Carvalho and
Xavier Ramírez-Mondragón and
Victor G. L. Neumann and
Horacio Tapia-Recillas Projective Reed--Muller type codes on
higher dimensional scrolls . . . . . . . 2027--2042
Qichun Wang and
Pantelimon St\uanic\ua Transparency order for Boolean
functions: analysis and construction . . 2043--2059
Yanwei Zhou and
Bo Yang and
Yi Mu Continuous leakage-resilient
identity-based encryption with leakage
amplification . . . . . . . . . . . . . 2061--2090
Minjia Shi and
Denis S. Krotov and
Patrick Solé A new distance-regular graph of diameter
$3$ on $ 1024$ vertices . . . . . . . . 2091--2101
Minjia Shi and
Denis S. Krotov and
Patrick Solé Correction to: A new distance-regular
graph of diameter $3$ on $ 1024$
vertices . . . . . . . . . . . . . . . . 2103--2103
Sergey Bereg and
Zevi Miller and
Luis Gerardo Mojica and
Linda Morales and
I. H. Sudborough New lower bounds for permutation arrays
using contraction . . . . . . . . . . . 2105--2128
Peter Vandendriessche On KM-arcs in non-Desarguesian
projective planes . . . . . . . . . . . 2129--2137
Gregory Maxwell and
Andrew Poelstra and
Yannick Seurin and
Pieter Wuille Simple Schnorr multi-signatures with
applications to Bitcoin . . . . . . . . 2139--2164
Xueying Shi and
Qin Yue and
Yansheng Wu The dual-containing primitive BCH codes
with the maximum designed distance and
their applications to quantum codes . . 2165--2183
Xin Wang and
Jie Cui and
Lijun Ji Linear $ (2, p, p)$-AONTs exist for all
primes $p$ . . . . . . . . . . . . . . . 2185--2197
Nuh Aydin and
Jonathan Lambrinos and
Oliver VandenBerg On equivalence of cyclic codes,
generalization of a quasi-twisted search
algorithm, and new linear codes . . . . 2199--2212
Liang Bai and
Zihui Liu On the third greedy weight of
$4$-dimensional codes . . . . . . . . . 2213--2230
Matvei Kotov and
Anton Menshov and
Alexander Ushakov An attack on the Walnut digital
signature algorithm . . . . . . . . . . 2231--2250
Junying Liu and
Yupeng Jiang and
Qunxiong Zheng and
Dongdai Lin A new construction of zero-difference
balanced functions and two applications 2251--2265
Tian Tian and
Jia-Min Zhang and
Wen-Feng Qi On the uniqueness of a type of cascade
connection representations for NFSRs . . 2267--2294
Umberto Martínez-Peñas Theory of supports for linear codes
endowed with the sum-rank metric . . . . 2295--2320
Qichun Wang Hadamard matrices, $d$-linearly
independent sets and correlation-immune
Boolean functions with minimum Hamming
weights . . . . . . . . . . . . . . . . 2321--2333
R. Sobhani and
A. Abdollahi and
J. Bagherian and
M. Khatami A note on good permutation codes from
Reed--Solomon codes . . . . . . . . . . 2335--2340
Hadi Kharaghani and
Sho Suda Linked systems of symmetric group
divisible designs of type II . . . . . . 2341--2360
Jon-Lark Kim and
Junyong Park and
Soohak Choi Steganographic schemes from perfect
codes on Cayley graphs . . . . . . . . . 2361--2374
Bhaskar Bagchi A coding theoretic approach to the
uniqueness conjecture for projective
planes of prime order . . . . . . . . . 2375--2389
Minglong Qi and
Shengwu Xiong A correction to: On the linear
complexity of the
Sidelnikov--Lempel--Cohn--Eastman
sequences . . . . . . . . . . . . . . . 2391--2393
Minjia Shi and
Patrick Solé Three-weight codes, triple sum sets, and
strongly walk regular graphs . . . . . . 2395--2404
J. A. Armario and
D. L. Flannery Generalized binary arrays from
quasi-orthogonal cocycles . . . . . . . 2405--2417
Yuan Cao and
Yonglin Cao and
Steven T. Dougherty and
San Ling Construction and enumeration for
self-dual cyclic codes over $ \mathbb
{Z}_4 $ of oddly even length . . . . . . 2419--2446
Shuxing Li On the weight distribution of second
order Reed--Muller codes and their
relatives . . . . . . . . . . . . . . . 2447--2460
Marco Buratti and
Dieter Jungnickel Partitioned difference families versus
zero-difference balanced functions . . . 2461--2467
Ana I. Gomez and
Domingo Gomez-Perez and
Guénaël Renault A probabilistic analysis on a lattice
attack against DSA . . . . . . . . . . . 2469--2488
Masaya Yasuda and
Junpei Yamaguchi A new polynomial-time variant of LLL
with deep insertions for decreasing the
squared-sum of Gram--Schmidt lengths . . 2489--2505
Iwan M. Duursma Matrix theory for minimal trellises . . 2507--2536
Min Kyu Song and
Hong-Yeop Song Hamming correlation properties of the
array structure of Sidelnikov sequences 2537--2551
Yupu Hu and
Huiwen Jia A new Gaussian sampling for trapdoor
lattices with arbitrary modulus . . . . 2553--2570
John Sheekey Binary additive MRD codes with minimum
distance $ n - 1 $ must contain a
semifield spread set . . . . . . . . . . 2571--2583
Yi Ouyang and
Xianhong Xie Linear complexity of generalized
cyclotomic sequences of period $ 2 p^m $ 2585--2596
Sihem Mesnager and
Fengrong Zhang and
Chunming Tang and
Yong Zhou Further study on the maximum number of
bent components of vectorial functions 2597--2610
Yiwei Zhang and
Gennian Ge A general private information retrieval
scheme for MDS coded databases with
colluding servers . . . . . . . . . . . 2611--2623
Zixiang Xu and
Yiwei Zhang and
Gennian Ge New theoretical bounds and constructions
of permutation codes under block
permutation metric . . . . . . . . . . . 2625--2637
Theodoulos Garefalakis and
Giorgos Kapetanakis Further Results on the Morgan--Mullen
Conjecture . . . . . . . . . . . . . . . 2639--2654
Jerod Michel and
Qi Wang Partial geometric designs from group
actions . . . . . . . . . . . . . . . . 2655--2670
Kevin M. Byrnes The maximum length of circuit codes with
long bit runs and a new characterization
theorem . . . . . . . . . . . . . . . . 2671--2681
Dong Yang and
Wen-Feng Qi and
Hua-Jin Chen Provable security against impossible
differential and zero correlation linear
cryptanalysis of some Feistel structures 2683--2700
Siaw-Lynn Ng and
Maura B. Paterson Functional repair codes: a view from
projective geometry . . . . . . . . . . 2701--2722
Xiaoqin Zhan and
Suyun Ding and
Shuyi Bai Flag-transitive $2$-designs from $ {\rm
PSL}(2, 40 q)$ with block size $4$ . . . 2723--2728
Peter J. Dukes and
Esther R. Lamken Constructions and uses of incomplete
pairwise balanced designs . . . . . . . 2729--2751
Chong Shangguan and
Gennian Ge A new piggybacking design for systematic
MDS storage codes . . . . . . . . . . . 2753--2770
Alexander A. Davydov and
Stefano Marcugini and
Fernanda Pambianco New covering codes of radius $R$,
codimension tR and $ t R + \frac
{R}{2}$, and saturating sets in
projective spaces . . . . . . . . . . . 2771--2792
Chunming Tang and
Cunsheng Ding and
Maosheng Xiong Steiner systems $ S(2, 4, \frac {3^m -
1}{2}) $ and $2$-designs from ternary
linear codes of length $ \frac {3^m -
1}{2}$ . . . . . . . . . . . . . . . . . 2793--2811
Claude Carlet and
Chengju Li and
Sihem Mesnager Some (almost) optimally extendable
linear codes . . . . . . . . . . . . . . 2813--2834
Tran van Trung Recursive constructions for
$s$-resolvable $t$-designs . . . . . . . 2835--2845
Ron Steinfeld and
Amin Sakzad and
Raymond K. Zhao Practical $ \mathsf {MP}$--$ \mathsf
{LWE} $-based encryption balancing
security-risk versus efficiency . . . . 2847--2884
Guomin Yang and
Rongmao Chen and
Yi Mu and
Willy Susilo and
Fuchun Guo and
Jie Li Strongly leakage resilient authenticated
key exchange, revisited . . . . . . . . 2885--2911
Qi Chen and
Chunming Tang and
Zhiqiang Lin Efficient explicit constructions of
compartmented secret sharing schemes . . 2913--2940
San Ling and
Buket Özkaya Multidimensional quasi-twisted codes:
equivalent characterizations and their
relation to multidimensional
convolutional codes . . . . . . . . . . 2941--2965
Dávid Mez\Hofi and
Gábor P. Nagy On the geometry of full points of
abstract unitals . . . . . . . . . . . . 2967--2978
Terry Shue Chien Lau and
Chik How Tan New rank codes based encryption scheme
using partial circulant matrices . . . . 2979--2999
Qian Wang and
Chenhui Jin More accurate results on the provable
security of AES against impossible
differential cryptanalysis . . . . . . . 3001--3018
Julia Lieb Necessary field size and probability for
MDP and complete MDP convolutional codes 3019--3043
Yujuan Sun and
Jiafang Zhang and
Sugata Gangopadhyay Construction of resilient Boolean
functions in odd variables with strictly
almost optimal nonlinearity . . . . . . 3045--3062
Claude Carlet and
Chengju Li and
Sihem Mesnager Linear codes with small hulls in
semi-primitive case . . . . . . . . . . 3063--3075
Zihui Liu and
Jinliang Wang Linear complementary dual codes over
rings . . . . . . . . . . . . . . . . . 3077--3086
José Gómez-Torrecillas and
Erik Hieta-Aho and
F. J. Lobillo and
Sergio López-Permouth and
Gabriel Navarro Some remarks on non projective Frobenius
algebras and linear codes . . . . . . . 1--15
Simeon Ball and
Michel Lavrauw Arcs and tensors . . . . . . . . . . . . 17--31
S. G. Barwick and
Alice M. W. Hui and
Wen-Ai Jackson and
Jeroen Schillewaert Characterising hyperbolic hyperplanes of
a non-singular quadric in $ \mathrm
{PG}(4, q) $ . . . . . . . . . . . . . . 33--39
Jasvinder Singh and
Manish Gupta and
Jaskarn Singh Bhullar Construction of girth-8 $ (3,
L)$-QC-LDPC codes of smallest CPM size
using column multipliers . . . . . . . . 41--49
Sihem Mesnager and
Kwang Ho Kim and
Dujin Jo and
Junyop Choe and
Munhyon Han and
Dok Nam Lee A proof of the Beierle--Kranz--Leander
conjecture related to lightweight
multiplication in $ \mathbb {F}_{2^n} $ 51--62
Sergey Bereg and
Peter J. Dukes A lower bound on permutation codes of
distance $ n - 1 $ . . . . . . . . . . . 63--72
Tai Do Duc Necessary conditions for the existence
of group-invariant Butson Hadamard
matrices and a new family of perfect
arrays . . . . . . . . . . . . . . . . . 73--90
Stefan Kölbl and
Elmar Tischhauser and
Patrick Derbez and
Andrey Bogdanov Troika: a ternary cryptographic hash
function . . . . . . . . . . . . . . . . 91--117
Rong Pan and
Tao Feng and
Lidong Wang and
Xiaomiao Wang Optimal optical orthogonal signature
pattern codes with weight three and
cross-correlation constraint one . . . . 119--131
Kenza Guenda and
T. Aaron Gulliver and
Somphong Jitman and
Satanan Thipworawimon Linear $ \ell $-intersection pairs of
codes and their applications . . . . . . 133--152
Xiao-Xin Zhao and
Wen-Feng Qi and
Jia-Min Zhang Further results on the equivalence
between Galois NFSRs and Fibonacci NFSRs 153--171
Abhishek Kesarwani and
Dibyendu Roy and
Santanu Sarkar and
Willi Meier New cube distinguishers on NFSR-based
stream ciphers . . . . . . . . . . . . . 173--199
Aleksandr Kutsenko Metrical properties of self-dual bent
functions . . . . . . . . . . . . . . . 201--222
Rohit Gupta Several new permutation quadrinomials
over finite fields of odd characteristic 223--239
Hongwei Liu and
Xu Pan Galois hulls of linear codes over finite
fields . . . . . . . . . . . . . . . . . 241--255
Xia Li and
Qin Yue Four classes of minimal binary linear
codes with $ w_{\rm min} / w_{\rm max} <
1 / 2 $ derived from Boolean functions 257--271
José Mart\'ìnez-Bernal and
Miguel A. Valencia-Bucio and
Rafael H. Villarreal Linear codes over signed graphs . . . . 273--296
Yan Liu and
Xiwang Cao and
Wei Lu On some conjectures about optimal
ternary cyclic codes . . . . . . . . . . 297--309
Sergey Bereg and
Luis Gerardo Mojica and
Linda Morales and
Hal Sudborough Constructing permutation arrays using
partition and extension . . . . . . . . 311--339
Jun Xu and
Lei Hu and
Santanu Sarkar Cryptanalysis of elliptic curve hidden
number problem from PKC 2017 . . . . . . 341--361
Tim van de Kamp and
Andreas Peter and
Willem Jonker A multi-authority approach to various
predicate encryption types . . . . . . . 363--390
Luca Mariot and
Maximilien Gadouleau and
Enrico Formenti and
Alberto Leporati Mutually orthogonal latin squares based
on cellular automata . . . . . . . . . . 391--411
Xin Ling and
Sihem Mesnager and
Yanfeng Qi and
Chunming Tang A class of narrow-sense BCH codes over $
\mathbb {F}_q $ of length $ \frac {q^m -
1}{2} $ . . . . . . . . . . . . . . . . 413--427
Bart De Bruyn and
Mou Gao On four codes with automorphism group $
P \Sigma L(3, 4) $ and pseudo-embeddings
of the large Witt designs . . . . . . . 429--452
Jong Yoon Hyun and
Jungyun Lee and
Yoonjin Lee Ramanujan graphs and expander families
constructed from $p$-ary bent functions 453--470
Ana Salagean Discrete antiderivatives for functions
over $ \mathbb {F}_p^n $ . . . . . . . . 471--486
Xiang Wang and
Fang-Wei Fu Snake-in-the-box codes under the $
\ell_\infty $-metric for rank modulation 487--503
Dipayan Das and
Jeffrey Hoffstein and
Jill Pipher and
William Whyte and
Zhenfei Zhang Modular lattice signatures, revisited 505--532
Yubo Li and
Zhichao Yang and
Kangquan Li and
Longjiang Qu A new algorithm on the minimal rational
fraction representation of feedback with
carry shift registers . . . . . . . . . 533--552
Can Xiang and
Xin Ling and
Qi Wang Combinatorial $t$-designs from quadratic
functions . . . . . . . . . . . . . . . 553--565
Saban Alaca and
Goldwyn Millar Shift-inequivalent decimations of the
Sidelnikov--Lempel--Cohn--Eastman
sequences . . . . . . . . . . . . . . . 567--583
Raphael Yuster Perfect sequence covering arrays . . . . 585--593
Sascha Kurz Subspaces intersecting in at most a
point . . . . . . . . . . . . . . . . . 595--599
S. Hodzi\'c and
E. Pasalic and
S. Gangopadhyay Generic constructions of $ \mathbb
{Z}$-bent functions . . . . . . . . . . 601--623
Cunsheng Ding and
Chunming Tang and
Vladimir D. Tonchev Linear codes of $2$-designs associated
with subcodes of the ternary generalized
Reed--Muller codes . . . . . . . . . . . 625--641
Nicolas Aragon and
Olivier Blazy and
Jean-Christophe Deneuville and
Philippe Gaborit and
Terry Shue Chien Lau and
Chik How Tan and
Keita Xagawa Cryptanalysis of a rank-based signature
with short public keys . . . . . . . . . 643--653
John Sheekey and
Geertrui Van de Voorde Rank-metric codes, linear sets, and
their duality . . . . . . . . . . . . . 655--675
Liang Feng Zhang and
Reihaneh Safavi-Naini Protecting data privacy in publicly
verifiable delegation of matrix and
polynomial functions . . . . . . . . . . 677--709
Alessandro Neri and
Anna-Lena Horlemann-Trautmann Random construction of partial MDS codes 711--725
Xiusheng Liu and
Hualu Liu $ \sigma $-LCD codes over finite chain
rings . . . . . . . . . . . . . . . . . 727--746
Hans-Joachim Kroll and
Rita Vincenti Linear codes from ruled sets in finite
projective spaces . . . . . . . . . . . 747--754
Ka Hin Leung and
Qi Wang New nonexistence results on $ (m, 40
n)$-generalized bent functions . . . . . 755--770
Sam Adriaensen and
Lins Denaux and
Leo Storme and
Zsuzsa Weiner Small weight code words arising from the
incidence of points and hyperplanes in $
{\rm PG}(n, q) $ . . . . . . . . . . . . 771--788
Heiko Dietrich and
Jeroen Schillewaert On a duality for codes over non-abelian
groups . . . . . . . . . . . . . . . . . 789--805
Zenghui Fang and
Junling Zhou The sizes of maximal $ (v, k, k - 2, k -
1) $ optical orthogonal codes . . . . . 807--824
Sanjit Bhowmick and
Alexandre Fotue-Tabue and
Edgar Mart\'ìnez-Moro and
Ramakrishna Bandi and
Satya Bagchi Do non-free LCD codes over finite
commutative Frobenius rings exist? . . . 825--840
Yue Zhou On equivalence of maximum additive
symmetric rank-distance codes . . . . . 841--850
Jing Jiang and
Yujie Gu and
Minquan Cheng Multimedia IPP codes with efficient
tracing . . . . . . . . . . . . . . . . 851--866
Andrea Ferraguti and
Giacomo Micheli Full classification of permutation
rational functions and complete rational
functions of degree three over finite
fields . . . . . . . . . . . . . . . . . 867--886
Gaoli Wang and
Fukang Liu and
Binbin Cui and
Florian Mendel and
Christoph Dobraunig Improved (semi-free-start/near-)
collision and distinguishing attacks on
round-reduced RIPEMD-160 . . . . . . . . 887--930
Elena Kirshanova and
Huyen Nguyen and
Damien Stehlé and
Alexandre Wallet On the smoothing parameter and last
minimum of random orthogonal lattices 931--950
Bohua Zhu and
Junling Zhou and
Yanxun Chang $ 2 - (v, 405; 40 m) $ spontaneous
emission error designs . . . . . . . . . 951--970
Seyed Hassan Alavi and
Mohsen Bayat and
Jalal Choulaki and
Ashraf Daneshkhah Flag-transitive block designs with prime
replication number and almost simple
groups . . . . . . . . . . . . . . . . . 971--992
Brett Hemenway Falk and
Nadia Heninger and
Michael Rudow Properties of constacyclic codes under
the Schur product . . . . . . . . . . . 993--1021
Ryann Cartor and
Daniel Smith-Tone All in the $ C^* $ family . . . . . . . 1023--1036
Minjia Shi and
Li Xu and
Denis S. Krotov On the number of resolvable Steiner
triple systems of small $3$-rank . . . . 1037--1046
Aurore Guillevic and
Simon Masson and
Emmanuel Thomé Cocks--Pinch curves of embedding degrees
five to eight and optimal ate pairing
computation . . . . . . . . . . . . . . 1047--1081
Hong-Yu Sun and
Xuan-Yong Zhu and
Qun-Xiong Zheng Predicting truncated multiple recursive
generators with unknown parameters . . . 1083--1102
Boxin Zhao and
Xiaoyang Dong and
Willi Meier and
Keting Jia and
Gaoli Wang Generalized related-key rectangle
attacks on block ciphers with linear key
schedule: applications to SKINNY and
GIFT . . . . . . . . . . . . . . . . . . 1103--1126
Xiaolei Fang and
Khawla Lebed and
Hongwei Liu and
Jinquan Luo New MDS self-dual codes over finite
fields of odd characteristic . . . . . . 1127--1138
Wei Lu and
Xia Wu and
Xiwang Cao and
Ming Chen Six constructions of asymptotically
optimal codebooks via the character sums 1139--1158
Lilya Budaghyan and
Nikolay Kaleyski and
Constanza Riera and
Pantelimon St\uanic\ua Partially APN functions with APN-like
polynomial representations . . . . . . . 1159--1177
Xiaoyang Dong and
Bingyou Dong and
Xiaoyun Wang Quantum attacks on some Feistel block
ciphers . . . . . . . . . . . . . . . . 1179--1203
Xiao-Xin Zhao and
Qun-Xiong Zheng and
Zhong-Xiao Wang and
Wen-Feng Qi On a class of isomorphic NFSRs . . . . . 1205--1226
María Chara and
Ricardo Podestá and
Ricardo Toledano Block transitive codes attaining the
Tsfasman--Vladut--Zink bound . . . . . . 1227--1253
Yanan Wu and
Nian Li and
Xiangyong Zeng Linear codes with few weights from
cyclotomic classes and weakly regular
bent functions . . . . . . . . . . . . . 1255--1272
Mrinmoy Datta Relative generalized Hamming weights of
affine Cartesian codes . . . . . . . . . 1273--1284
S. Hodzi\'c and
E. Pasalic and
Y. Wei A general framework for secondary
constructions of bent and plateaued
functions . . . . . . . . . . . . . . . 2007--2035
Vladimir N. Potapov On $q$-ary bent and plateaued functions 2037--2049
Kai Lin Ong and
Miin Huey Ang On equivalency of zero-divisor codes via
classifying their idempotent generator 2051--2065
Yujie Gu and
Shohei Satake On $2$-parent-identifying set systems of
block size 4 . . . . . . . . . . . . . . 2067--2076
Masaya Yasuda and
Satoshi Nakamura and
Junpei Yamaguchi Analysis of DeepBKZ reduction for
finding short lattice vectors . . . . . 2077--2100
Yan Zhu and
Naoki Watamura Relative $t$-designs in Johnson
association schemes for $P$-polynomial
structure . . . . . . . . . . . . . . . 2101--2118
Mengna Wu and
Chengju Li and
Zilong Wang Characterizations and constructions of
triple-cycle permutations of the form $
x^r h(x^s) $ . . . . . . . . . . . . . . 2119--2132
Christian Elsholtz and
Péter Pál Pach Caps and progression-free sets in $
\mathbb {Z}_m^n $ . . . . . . . . . . . 2133--2170
Lijing Zheng and
Jie Peng and
Haibin Kan and
Yanjun Li and
Juan Luo On constructions and properties of $ (n,
m)$-functions with maximal number of
bent components . . . . . . . . . . . . 2171--2186
Simona Boyadzhiyska and
Shagnik Das and
Tibor Szabó Enumerating extensions of mutually
orthogonal Latin squares . . . . . . . . 2187--2206
Baptiste Lambin and
Patrick Derbez and
Pierre-Alain Fouque Linearly equivalent S-boxes and the
division property . . . . . . . . . . . 2207--2231
Sihem Mesnager and
Chunming Tang and
Maosheng Xiong On the boomerang uniformity of quadratic
permutations . . . . . . . . . . . . . . 2233--2246
Boran Kim and
Yoonjin Lee Classification of self-dual cyclic codes
over the chain ring $ \mathbb {Z}_p[u] /
\langle u^3 \rangle $ . . . . . . . . . 2247--2273
Yanyan Gao and
Qin Yue and
Yansheng Wu LCD codes and self-orthogonal codes in
generalized dihedral group algebras . . 2275--2287
Yunwen Liu and
Wenying Zhang and
Bing Sun and
Vincent Rijmen and
Guoqiang Liu and
Chao Li and
Shaojing Fu and
Meichun Cao The phantom of differential
characteristics . . . . . . . . . . . . 2289--2311
Martin Ekerå On post-processing in the quantum
algorithm for computing short discrete
logarithms . . . . . . . . . . . . . . . 2313--2335
Seyed Hassan Alavi and
Ashraf Daneshkhah and
Cheryl E. Praeger Symmetries of biplanes . . . . . . . . . 2337--2359
Yeow Meng Chee and
Charles J. Colbourn and
Hoang Dau and
Ryan Gabrys and
Alan C. H. Ling and
Dylan Lusi and
Olgica Milenkovic Access balancing in storage systems by
labeling partial Steiner systems . . . . 2361--2376
Juanjuan Xu and
Jingjun Bao and
Lijun Ji Doubly resolvable Steiner quadruple
systems of orders $ 2^{2n + 1} $ . . . . 2377--2386
Khodakhast Bibak Deletion correcting codes meet the
Littlewood--Offord problem . . . . . . . 2387--2396
Cem Güneri and
Edgar Martínez-Moro and
Selcen Sayici Linear complementary pair of group codes
over finite chain rings . . . . . . . . 2397--2405
Xinxin Gong and
Bin Zhang Fast computation of linear approximation
over certain composition functions and
applications to SNOW 2.0 and SNOW 3G . . 2407--2431
Youngkyung Lee and
Dong Hoon Lee and
Jong Hwan Park Tightly CCA-secure encryption scheme in
a multi-user setting with corruptions 2433--2452
Xinmei Huang and
Qin Yue and
Yansheng Wu and
Xiaoping Shi and
Jerod Michel Binary primitive LCD BCH codes . . . . . 2453--2473
Jong Yoon Hyun and
Hyun Kwang Kim and
Yansheng Wu and
Qin Yue Optimal minimal linear codes from posets 2475--2492
Minjia Shi and
Wang Xuan and
Patrick Solé Two families of two-weight codes over $
\mathbb {Z}_4 $ . . . . . . . . . . . . 2493--2505
Junling Zhou and
Wenling Zhou Wide-sense $2$-frameproof codes . . . . 2507--2519
Petr Lisonek Maximal nonassociativity via fields . . 2521--2530
Sudhir R. Ghorpade and
Trygve Johnsen A polymatroid approach to generalized
weights of rank metric codes . . . . . . 2531--2546
Minjia Shi and
Li Xu and
Patrick Solé Construction of isodual codes from
polycirculant matrices . . . . . . . . . 2547--2560
Juliane Capaverde and
Ariane M. Masuda and
Virgínia M. Rodrigues Rédei permutations with cycles of the
same length . . . . . . . . . . . . . . 2561--2579
Whan-Hyuk Choi and
Hyun Jin Kim and
Yoonjin Lee Construction of
single-deletion-correcting DNA codes
using CIS codes . . . . . . . . . . . . 2581--2596
Lukas Kölsch On the inverses of Kasami and
Bracken--Leander exponents . . . . . . . 2597--2621
Julien Lavauzelle and
Julian Renner Cryptanalysis of a system based on
twisted Reed--Solomon codes . . . . . . 1285--1300
Alexandru Chirvasitu and
Thomas W. Cusick Affine equivalence for quadratic
rotation symmetric Boolean functions . . 1301--1329
Tovohery Hajatiana Randrianarisoa A geometric approach to rank metric
codes and a classification of constant
weight codes . . . . . . . . . . . . . . 1331--1348
Minfeng Shao and
Ying Miao On optimal weak algebraic manipulation
detection codes and weighted external
difference families . . . . . . . . . . 1349--1369
Dingding Jia and
Yamin Liu and
Bao Li IBE with tight security against
selective opening and chosen-ciphertext
attacks . . . . . . . . . . . . . . . . 1371--1400
Lorenzo Grassi and
Christian Rechberger Revisiting Gilbert's known-key
distinguisher . . . . . . . . . . . . . 1401--1445
Xuanlong Ma and
Min Feng and
Kaishun Wang Subgroup perfect codes in Cayley sum
graphs . . . . . . . . . . . . . . . . . 1447--1461
Yupeng Jiang and
Dongdai Lin Longest subsequences shared by two de
Bruijn sequences . . . . . . . . . . . . 1463--1475
Peter Beelen and
Olav Geil and
Edgar Martínez-Moro and
Xin-Wen Wu Foreword-Special Issue: Codes,
Cryptology and Curves in honour of Ruud
Pellikaan . . . . . . . . . . . . . . . 1477--1478
Mojtaba Fadavi and
Reza Rezaeian Farashahi Uniform encodings to elliptic curves and
indistinguishable point representation 1479--1502
Thomas Britz and
Adam Mammoliti and
Keisuke Shiromoto Wei-type duality theorems for rank
metric codes . . . . . . . . . . . . . . 1503--1519
Umberto Martínez-Peñas Hamming and simplex codes for the
sum-rank metric . . . . . . . . . . . . 1521--1539
Lucky Erap Galvez and
Jon-Lark Kim Construction of self-dual matrix codes 1541--1560
Alain Couvreur and
Isabella Panaccione Power error locating pairs . . . . . . . 1561--1593
Alonso Sepúlveda Castellanos and
Maria Bras-Amorós Weierstrass semigroup at $ m + 1 $
rational points in maximal curves which
cannot be covered by the Hermitian curve 1595--1616
Maria Bras-Amorós and
Iwan Duursma and
Euijin Hong Isometry-dual flags of AG codes . . . . 1617--1638
René Bòdker Christensen and
Olav Geil Steane-enlargement of quantum codes from
the Hermitian function field . . . . . . 1639--1652
Ignacio García-Marco and
Irene Márquez-Corbella and
Diego Ruano High dimensional affine codes whose
square has a designed minimum distance 1653--1672
Hiram H. López and
Gretchen L. Matthews and
Ivan Soprunov Monomial-Cartesian codes and their
duals, with applications to LCD codes,
quantum codes, and locally recoverable
codes . . . . . . . . . . . . . . . . . 1673--1685
Irene Márquez-Corbella and
Edgar Martínez-Moro and
Carlos Munuera Computing sharp recovery structures for
locally recoverable codes . . . . . . . 1687--1698
Anne Canteaut and
Gohar Kyureghyan and
Alexander Pott and
Felix Ulmer Editorial: Coding and Cryptography 2019 1699--1699
Alexandr A. Polujan and
Alexander Pott Cubic bent functions outside the
completed Maiorana--McFarland class . . 1701--1722
Daniel Gerike and
Gohar M. Kyureghyan Permutations on finite fields with
invariant cycle structure on lines . . . 1723--1740
Pan Tan and
Zhengchun Zhou and
Vladimir Sidorenko and
Udaya Parampalli Two classes of optimal LRCs with
information $ (r, t)$-locality . . . . . 1741--1757
Jian Liu and
Sihem Mesnager and
Deng Tang Constructions of optimal locally
recoverable codes via Dickson
polynomials . . . . . . . . . . . . . . 1759--1780
Tuvi Etzion and
Sascha Kurz and
Kamil Otal and
Ferruh Özbudak Subspace packings: constructions and
bounds . . . . . . . . . . . . . . . . . 1781--1810
P. G. Boyvalenkov and
P. D. Dragnev and
D. P. Hardin and
E. B. Saff and
M. M. Stoyanova Upper bounds for energies of spherical
codes of given cardinality and
separation . . . . . . . . . . . . . . . 1811--1826
Sabyasachi Dey and
Santanu Sarkar Proving the biases of Salsa and ChaCha
in differential attack . . . . . . . . . 1827--1856
Jean-Christophe Deneuville and
Philippe Gaborit Cryptanalysis of a code-based one-time
signature . . . . . . . . . . . . . . . 1857--1866
Ana Salagean and
Ferruh Özbudak Counting Boolean functions with faster
points . . . . . . . . . . . . . . . . . 1867--1883
Elena Egorova and
Marcel Fernandez and
Grigory Kabatiansky On non-binary traceability set systems 1885--1892
Ryutaroh Matsumoto Message randomization and strong
security in quantum stabilizer-based
secret sharing for classical secrets . . 1893--1907
Gretchen L. Matthews and
Fernando Piñero Codes with locality from cyclic
extensions of Deligne--Lusztig curves 1909--1924
Assia Rousseva and
Ivan Landjev The geometric approach to the existence
of some quaternary Griesmer codes . . . 1925--1940
Daniel Coggia and
Alain Couvreur On the security of a Loidreau rank
metric code based encryption scheme . . 1941--1957
Shizhu Tian and
Christina Boura and
Léo Perrin Boomerang uniformity of popular S-box
constructions . . . . . . . . . . . . . 1959--1989
Delphine Boucher An algorithm for decoding skew
Reed--Solomon codes with respect to the
skew metric . . . . . . . . . . . . . . 1991--2005
Sihem Mesnager and
Sihong Su and
Hui Zhang A construction method of balanced
rotation symmetric Boolean functions on
arbitrary even number of variables with
optimal algebraic immunity . . . . . . . 1--17
Lilya Budaghyan and
Marco Calderini and
Claude Carlet and
Robert Coulter and
Irene Villa Generalized isotopic shift construction
for APN functions . . . . . . . . . . . 19--32
Marco Calderini Differentially low uniform permutations
from known $4$-uniform functions . . . . 33--52
P. Almeida and
D. Napp A new rank metric for convolutional
codes . . . . . . . . . . . . . . . . . 53--73
Wilfried Meidl and
Isabel Pirsic Bent and $ \mathbb {Z}_{2^k} $-Bent
functions from spread-like partitions 75--89
Xin Wang Improved upper bounds for
parent-identifying set systems and
separable codes . . . . . . . . . . . . 91--104
Matthias Grezet and
Camilla Hollanti The complete hierarchical locality of
the punctured Simplex code . . . . . . . 105--125
Pranab Chakraborty and
Subhamoy Maitra Further clarification on Mantin's
Digraph Repetition Bias in RC4 . . . . . 127--141
Michael Bamiloshin and
Aner Ben-Efraim and
Oriol Farr\`as and
Carles Padró Common information, matroid
representation, and secret sharing for
matroid ports . . . . . . . . . . . . . 143--166
Alexey Oblaukhov On metric regularity of Reed--Muller
codes . . . . . . . . . . . . . . . . . 167--197
Edoardo Ballico and
Giuseppe Favacchio and
Elena Guardo and
Lorenzo Milazzo Steiner systems and configurations of
points . . . . . . . . . . . . . . . . . 199--219
Sartaj Ul Hasan and
Mohit Pal and
Constanza Riera and
Pantelimon St\uanic\ua On the $c$-differential uniformity of
certain maps over finite fields . . . . 221--239
Xiaopeng Zhao and
Zhenfu Cao and
Xiaolei Dong and
Jun Shao Extended Galbraith's test on the
anonymity of IBE schemes from higher
residuosity . . . . . . . . . . . . . . 241--253
Jingkun Zhou and
Zhiwen He and
Zhao Chai Two kinds of constructions of directed
strongly regular graphs . . . . . . . . 255--268
Delio Jaramillo and
Maria Vaz Pinto and
Rafael H. Villarreal Evaluation codes and their basic
parameters . . . . . . . . . . . . . . . 269--300
Cícero Carvalho and
Victor G. L. Neumann Towards the Complete Determination of
Next-to-Minimal Weights of Projective
Reed--Muller Codes . . . . . . . . . . . 301--315
Chen-Dong Ye and
Tian Tian and
Fan-Yang Zeng The MILP-aided conditional differential
attack and its application to Trivium 317--339
Eiichi Bannai and
Manabu Oura and
Da Zhao The complex conjugate invariants of
Clifford groups . . . . . . . . . . . . 341--350
Julian Renner and
Alessandro Neri and
Sven Puchinger Low-rank parity-check codes over Galois
rings . . . . . . . . . . . . . . . . . 351--386
Trygve Johnsen and
Hugues Verdure Greedy weights for matroids . . . . . . 387--405
Chun Guo and
Guoyan Zhang Beyond-birthday security for
permutation-based Feistel networks . . . 407--440
Claude Carlet and
Kwang Ho Kim and
Sihem Mesnager A direct proof of APN-ness of the Kasami
functions . . . . . . . . . . . . . . . 441--446
Heide Gluesing-Luerssen and
Hunter Lehmann Distance Distributions of Cyclic Orbit
Codes . . . . . . . . . . . . . . . . . 447--470
Daniele Bartoli and
Matteo Bonini and
Marco Timpanella On the weight distribution of some
minimal codes . . . . . . . . . . . . . 471--487
Stefano Innamorati and
Fulvio Zuanni Classifying sets of class $ [1, q + 1, 2
q + 1, q^2 + q + 1]_2 $ in $ {\rm PG}(r,
q) $, $ r \ge 3 $ . . . . . . . . . . . 489--496
Hiram H. López and
Beth Malmskog and
Gretchen L. Matthews and
Fernando Piñero-González and
Mary Wootters Hermitian-lifted codes . . . . . . . . . 497--515
James A. Davis and
J. J. Hoo and
Connor Kissane and
Ziming Liu and
Calvin Reedy and
Kartikey Sharma and
Ken Smith and
Yiwei Sun Abelian difference sets with the
symmetric difference property . . . . . 517--523
Nicholas J. Cavenagh and
Adam Mammoliti and
Ian M. Wanless Maximal sets of mutually orthogonal
frequency squares . . . . . . . . . . . 525--558
Sascha Kurz and
Eitan Yaakobi PIR Codes with Short Block Length . . . 559--587
Tran van Trung An extending theorem for $s$-resolvable
$t$-designs . . . . . . . . . . . . . . 589--597
José Andrés Armario and
Ivan Bailera and
Ronan Egan Generalized Hadamard full propelinear
codes . . . . . . . . . . . . . . . . . 599--615
Makoto Araya and
Masaaki Harada and
Ken Saito Characterization and classification of
optimal LCD codes . . . . . . . . . . . 617--640
Tania Sidana and
Anuradha Sharma Roulette games and depths of words over
finite commutative rings . . . . . . . . 641--678
Zhongxiao Wang and
Qunxiong Zheng and
Xiaoxin Zhao and
Xiutao Feng Grain-like structures with minimal and
maximal period sequences . . . . . . . . 679--693
Yuhua Sun and
Tongjiang Yan and
Qiuyan Wang The $2$-adic complexity of Yu--Gong
sequences with interleaved structure and
optimal autocorrelation magnitude . . . 695--707
Sebati Ghosh and
Palash Sarkar Variants of Wegman--Carter message
authentication code supporting variable
tag lengths . . . . . . . . . . . . . . 709--736
Kangquan Li and
Chunlei Li and
Tor Helleseth and
Longjiang Qu Cryptographically strong permutations
from the butterfly structure . . . . . . 737--761
Tsuyoshi Miezaki Design-theoretic analogies between
codes, lattices, and vertex operator
algebras . . . . . . . . . . . . . . . . 763--780
Zhaoping Meng and
Bin Zhang and
Zhanggui Wu Constructions of doubly resolvable
Steiner quadruple systems . . . . . . . 781--795
Hualu Liu and
Peng Hu and
Xiusheng Liu Asymmetric entanglement-assisted quantum
codes: bound and constructions . . . . . 797--809
Simeon Ball Some constructions of quantum MDS codes 811--821
Lin Sok New families of self-dual codes . . . . 823--841
Tsuyoshi Miezaki and
Akihiro Munemasa and
Hiroyuki Nakasora A note on Assmus--Mattson type theorems 843--858
Bart Mennink and
Samuel Neves On the Resilience of Even--Mansour to
Invariant Permutations . . . . . . . . . 859--893
Dingding Jia and
Beno\^\it Libert SO-CCA secure PKE from pairing based
all-but-many lossy trapdoor functions 895--923
Veronika Kuchta and
Amin Sakzad and
Ron Steinfeld and
Joseph K. Liu Lattice-based zero-knowledge arguments
for additive and multiplicative
relations . . . . . . . . . . . . . . . 925--963
Angela Aguglia and
Luca Giuzzi and
Angelo Sonnino Near-MDS codes from elliptic curves . . 965--972
Wonhee Cho and
Jiseung Kim and
Changmin Lee (In)security of concrete instantiation
of Lin17's functional encryption scheme
from noisy multilinear maps . . . . . . 973--1016
Nan Cui and
Shengli Liu and
Dawu Gu and
Jian Weng Robustly reusable fuzzy extractor with
imperfect randomness . . . . . . . . . . 1017--1059
Masoumeh Shafieinejad and
Navid Nasr Esfahani A scalable post-quantum hash-based group
signature . . . . . . . . . . . . . . . 1061--1090
Ankur and
Pramod Kumar Kewat Self-dual codes over $ \mathbb {F}_2 [u]
/ \langle u^4 \rangle $ and Jacobi forms
over a totally real subfield of $
\mathbb {Q}(\zeta_8) $ . . . . . . . . . 1091--1109
Hanwen Feng and
Jianwei Liu and
Qianhong Wu Traceable ring signatures: general
framework and post-quantum security . . 1111--1145
Huili Dong Flag-transitive 4-designs and $ P S L(2,
q) $ groups . . . . . . . . . . . . . . 1147--1157
Jun Guo Cameron--Liebler sets in bilinear forms
graphs . . . . . . . . . . . . . . . . . 1159--1180
Haode Yan and
Chengju Li Differential spectra of a class of power
permutations with characteristic 5 . . . 1181--1191
Zhengbang Zha and
Lei Hu Some classes of power functions with low
$c$-differential uniformity over finite
fields . . . . . . . . . . . . . . . . . 1193--1210
Daniel R. Hawtin $s$-Elusive codes in Hamming graphs . . 1211--1220
Daniele Bartoli and
Maria Montanucci and
Giovanni Zini On certain self-orthogonal AG codes with
applications to quantum error-correcting
codes . . . . . . . . . . . . . . . . . 1221--1239
Himadri Shekhar Chakraborty and
Tsuyoshi Miezaki Average of complete joint weight
enumerators and self-dual codes . . . . 1241--1254
Jianfu Chen and
Shenglin Zhou Flag-transitive, point-imprimitive $ 2 -
(v, k, \lambda) $ symmetric designs with
$k$ and $ \lambda $ prime powers . . . . 1255--1260
Giovanni Falcone and
Marco Pavone Binary Hamming codes and Boolean designs 1261--1277
Julian Renner and
Sven Puchinger and
Antonia Wachter-Zeh LIGA: a cryptosystem based on the
hardness of rank-metric list and
interleaved decoding . . . . . . . . . . 1279--1319
Jonathan S. Turner and
Ilias S. Kotsireas and
Andrew J. Geyer A Legendre pair of length 77 using
complementary binary matrices with fixed
marginals . . . . . . . . . . . . . . . 1321--1333
Olive Chakraborty and
Jean-Charles Faug\`ere and
Ludovic Perret Cryptanalysis of the extension field
cancellation cryptosystem . . . . . . . 1335--1364
Alexandr A. Polujan and
Alexander Pott Correction to: Cubic bent functions
outside the completed
Maiorana--McFarland class . . . . . . . 1365--1366
Hiram H. López and
Ivan Soprunov and
Rafael H. Villarreal The dual of an evaluation code . . . . . 1367--1403
Tairong Shi and
Wenling Wu and
Sengpeng Wang Breaking LWC candidates: sESTATE and
Elephant in quantum setting . . . . . . 1405--1432
Mahdi Sajadieh and
Mohsen Mousavi Construction of MDS matrices from
generalized Feistel structures . . . . . 1433--1452
Yumeng Yang and
Xiangyong Zeng and
Shi Wang Construction of lightweight involutory
MDS matrices . . . . . . . . . . . . . . 1453--1483
Fengrong Zhang and
Enes Pasalic and
Yongzhuang Wei Wide minimal binary linear codes from
the general Maiorana--McFarland class 1485--1507
Kanat Abdukhalikov Equivalence classes of Niho bent
functions . . . . . . . . . . . . . . . 1509--1534
Keita Emura and
Atsushi Takayasu and
Yohei Watanabe Adaptively secure revocable hierarchical
IBE from $k$-linear assumption . . . . . 1535--1574
Yanwei Zhou and
Bo Yang and
Yi Mu Novel generic construction of
leakage-resilient PKE scheme with CCA
security . . . . . . . . . . . . . . . . 1575--1614
Steven T. Dougherty and
Joe Gildea and
Abidin Kaya Composite matrices from group rings,
composite $G$-codes and constructions of
self-dual codes . . . . . . . . . . . . 1615--1638
Ruikai Chen and
Sihem Mesnager and
Chang-An Zhao Good polynomials for optimal LRC of low
locality . . . . . . . . . . . . . . . . 1639--1660
Tuvi Etzion and
Junling Zhou Large sets with multiplicity . . . . . . 1661--1690
Huaning Liu and
Xi Liu On the properties of generalized
cyclotomic binary sequences of period $
2 p^m $ . . . . . . . . . . . . . . . . 1691--1712
Cunsheng Ding and
Chunming Tang and
Vladimir D. Tonchev The projective general linear group $
\mathrm {PGL}(2, 2^m) $ and linear codes
of length $ 2^m + 1 $ . . . . . . . . . 1713--1734
Oriol Farr\`as and
Jordi Ribes-González and
Sara Ricci Privacy-preserving data splitting: a
combinatorial approach . . . . . . . . . 1735--1756
Junqing Gong and
Haifeng Qian Simple and efficient FE for quadratic
functions . . . . . . . . . . . . . . . 1757--1786
Varsha Chauhan and
Anuradha Sharma and
Monika Yadav Hamming weight distributions of
multi-twisted codes over finite fields 1787--1837
Shoko Chisaki and
Ryoh Fuji-Hara and
Nobuko Miyamoto A construction for circulant type
dropout designs . . . . . . . . . . . . 1839--1852
Giovanni Zini and
Ferdinando Zullo Scattered subspaces and related codes 1853--1873
Ling Song and
Yi Tu and
Lei Hu Security analysis of Subterranean 2.0 1875--1905
Sebati Ghosh and
Palash Sarkar Breaking tweakable enciphering schemes
using Simon's algorithm . . . . . . . . 1907--1926
Atsushi Takayasu Tag-based ABE in prime-order groups via
pair encoding . . . . . . . . . . . . . 1927--1963
Atsushi Takayasu Adaptively secure lattice-based
revocable IBE in the QROM: compact
parameters, tight security, and
anonymity . . . . . . . . . . . . . . . 1965--1992
Ziling Heng and
Dexiang Li and
Fuling Chen A family of projective two-weight linear
codes . . . . . . . . . . . . . . . . . 1993--2007
Xiaoqiang Wang and
Dabin Zheng and
Yan Zhang Binary linear codes with few weights
from Boolean functions . . . . . . . . . 2009--2030
Ruikai Chen and
Sihem Mesnager and
Chang-An Zhao Correction to: Good polynomials for
optimal LRC of low locality . . . . . . 2031--2031
Hadi Kharaghani and
Thomas Pender and
Sho Suda Balancedly splittable orthogonal designs
and equiangular tight frames . . . . . . 2033--2050
Hongwei Liu and
Shengwei Liu Construction of MDS twisted
Reed--Solomon codes and LCD--MDS codes 2051--2065
Peter Ligeti and
Peter Sziklai and
Marcella Takáts Generalized threshold secret sharing and
finite geometry . . . . . . . . . . . . 2067--2078
Fatemeh Ghasemi and
Reza Kaboli and
Mohammad-Mahdi Rafiei On ideal homomorphic secret sharing
schemes and their decomposition . . . . 2079--2096
Nicolas Aragon and
Marco Baldi and
Paolo Santini Cryptanalysis of a code-based full-time
signature . . . . . . . . . . . . . . . 2097--2112
Sadegh Sadeghi and
Vincent Rijmen and
Nasour Bagheri Proposing an MILP-based method for the
experimental verification of
difference-based trails: application to
SPECK, SIMECK . . . . . . . . . . . . . 2113--2155
E. Ballico Locally Recoverable Codes correcting
many erasures over small fields . . . . 2157--2162
Trygve Johnsen and
Hugues Verdure Möbius and coboundary polynomials for
matroids . . . . . . . . . . . . . . . . 2163--2177
Xiaojing Chen and
Shixin Zhu and
Gaojun Luo A new family of EAQMDS codes constructed
from constacyclic codes . . . . . . . . 2179--2193
Daitao Huang and
Qin Yue and
Xia Li MDS or NMDS self-dual codes from twisted
generalized Reed--Solomon codes . . . . 2195--2209
Alexander A. Davydov and
Stefano Marcugini and
Fernanda Pambianco Twisted cubic and point-line incidence
matrix in $ {\rm PG}(3, q) $ . . . . . . 2211--2233
Gianira N. Alfarano and
Julia Lieb and
Joachim Rosenthal Construction of LDPC convolutional codes
via difference triangle sets . . . . . . 2235--2254
Ritam Bhaumik and
Mridul Nandi and
Anik Raychaudhuri Improved indifferentiability security
proof for 3-round tweakable
Luby--Rackoff . . . . . . . . . . . . . 2255--2281
Kanat Abdukhalikov and
Duy Ho Extended cyclic codes, maximal arcs and
ovoids . . . . . . . . . . . . . . . . . 2283--2294
Masaaki Harada Construction of binary LCD codes,
ternary LCD codes and quaternary
Hermitian LCD codes . . . . . . . . . . 2295--2312
Ayça Çesmelioglu and
Wilfried Meidl and
Isabel Pirsic Vectorial bent functions and partial
difference sets . . . . . . . . . . . . 2313--2330
Clementa Alonso-González and
Miguel Ángel Navarro-Pérez Cyclic orbit flag codes . . . . . . . . 2331--2356
Yu-Chi Chen and
Xin Xie and
Raylin Tso Public key encryption with filtered
equality test revisited . . . . . . . . 2357--2372
Charles J. Colbourn Egalitarian Steiner triple systems for
data popularity . . . . . . . . . . . . 2373--2395
Keita Emura and
Atsushi Takayasu and
Yohei Watanabe Efficient identity-based encryption with
Hierarchical key-insulation from HIBE 2397--2431
Michail I. Rozhkov and
Alexander V. Sorokin Some conditions for absence of affine
functions in NFSR output stream . . . . 2433--2443
Stefka Bouyuklieva Optimal binary LCD codes . . . . . . . . 2445--2461
A. Bapi\'c and
E. Pasalic A new method for secondary constructions
of vectorial bent functions . . . . . . 2463--2475
Qian Wang and
Chenhui Jin Bounding the length of impossible
differentials for SPN block ciphers . . 2477--2493
Peng Hu and
Xiusheng Liu Linear complementary pairs of codes over
rings . . . . . . . . . . . . . . . . . 2495--2509
Xiang Wang and
Yuanjie Wang and
Fang-Wei Fu Nonexistence of perfect permutation
codes under the Kendall $ \tau $ -metric 2511--2531
Xiaojing Chen and
Shixin Zhu and
Wan Jiang Cyclic codes and some new
entanglement-assisted quantum MDS codes 2533--2551
Matthew Fickus and
Joseph W. Iverson and
Emily J. King Grassmannian codes from paired
difference sets . . . . . . . . . . . . 2553--2576
Junichi Tomida and
Yuto Kawahara and
Ryo Nishimaki Fast, compact, and expressive
attribute-based encryption . . . . . . . 2577--2626
Sartaj Ul Hasan and
Mohit Pal and
Pantelimon St\uanic\ua Boomerang uniformity of a class of power
maps . . . . . . . . . . . . . . . . . . 2627--2636
Yanan Wu and
Nian Li and
Xiangyong Zeng New P$c$N and AP$c$N functions over
finite fields . . . . . . . . . . . . . 2637--2651
Laura Monroe Binary signed-digit integers and the
Stern diatomic sequence . . . . . . . . 2653--2662
Jinjin Chai and
Zilong Wang and
Erzhong Xue Walsh spectrum and nega spectrum of
complementary arrays . . . . . . . . . . 2663--2677
Binbin Pang and
Shixin Zhu and
Xiaoshan Kai Five families of the narrow-sense
primitive BCH codes over finite fields 2679--2696
WeiGuo Zhang and
YuJuan Sun and
Enes Pasalic Three classes of balanced vectorial
semi-bent functions . . . . . . . . . . 2697--2714
M. H. Ahmadi and
N. Akhlaghinia and
S. Sadri New partitionings of complete designs 2715--2723
Simona Bonvicini and
Marco Buratti and
Tommaso Traetta The first families of highly symmetric
Kirkman Triple Systems whose orders fill
a congruence class . . . . . . . . . . . 2725--2757
Sascha Kurz Bounds for flag codes . . . . . . . . . 2759--2785
Chen-Dong Ye and
Tian Tian An improved degree evaluation method of
NFSR-based cryptosystems . . . . . . . . 2787--2806
Yiming Li and
Shengli Liu and
Dawu Gu Pseudorandom functions in NC class from
the standard LWE assumption . . . . . . 2807--2839
Hariom Sharma and
R. K. Sharma Existence of primitive normal pairs with
one prescribed trace over finite fields 2841--2855
Navid Nasr Esfahani and
Douglas R. Stinson On security properties of all-or-nothing
transforms . . . . . . . . . . . . . . . 2857--2867
Ziran Tu and
Xiangyong Zeng and
Yan Li Binomial permutations over finite fields
with even characteristic . . . . . . . . 2869--2888
Nian Li and
Zhao Hu and
Xiangyong Zeng A note on ``Cryptographically strong
permutations from the butterfly
structure'' . . . . . . . . . . . . . . 265--276
Keisuke Hara and
Takahiro Matsuda and
Keisuke Tanaka Generic transformation from broadcast
encryption to round-optimal deniable
ring authentication . . . . . . . . . . 277--316
Joe Gildea and
Adrian Korban and
Adam Michael Roberts New binary self-dual codes of lengths
80, 84 and 96 from composite matrices 317--342
Soumak Biswas and
Maheshanand Bhaintwal Quantum codes from $ \mathbb {Z}_2
\mathbb {Z}_2 [u] / \langle u^4 \rangle
$-cyclic codes . . . . . . . . . . . . . 343--366
Rong Pan and
R. Julian R. Abel and
Xiaomiao Wang Difference matrices with five rows over
finite abelian groups . . . . . . . . . 367--386
Xiao-Juan Wang and
Tian Tian and
Wen-Feng Qi A generic method for investigating
nonsingular Galois NFSRs . . . . . . . . 387--408
Steven T. Dougherty The neighbor graph of binary self-dual
codes . . . . . . . . . . . . . . . . . 409--425
Marcel Fernandez and
Jorge J. Urroz A study of the separating property in
Reed--Solomon codes by bounding the
minimum distance . . . . . . . . . . . . 427--442
Fatih Demirbas and
Orhun Kara Integral characteristics by keyspace
partitioning . . . . . . . . . . . . . . 443--472
Ulrich Dempwolff Correction to: CCZ equivalence of power
functions . . . . . . . . . . . . . . . 473--475
A. Blokhuis and
M. De Boeck and
J. D'haeseleer Correction to: Cameron--Liebler sets of
$k$-spaces in $ {\rm PG}(n, q) $ . . . . 477--487
Deepak Kumar Dalai and
Santu Pal and
Santanu Sarkar A state bit recovery algorithm with
TMDTO attack on Lizard and Grain-128a 489--521
Olav Geil From primary to dual affine variety
codes over the Klein quartic . . . . . . 523--543
Xiaofang Xu and
Xiangyong Zeng and
Shasha Zhang Regular complete permutation polynomials
over $ \mathbb {F}_{2^n} $ . . . . . . . 545--575
Jiang Liu and
Qin Li and
Haozhen Situ Efficient quantum homomorphic encryption
scheme with flexible evaluators and its
simulation . . . . . . . . . . . . . . . 577--591
Moritz Wiese and
Holger Boche Mosaics of combinatorial designs for
information-theoretic security . . . . . 593--632
Jan De Beule and
Jonathan Mannaert and
Leo Storme Cameron--Liebler $k$-sets in subspaces
and non-existence conditions . . . . . . 633--651
H. Zhao and
Y. Wei and
N. Cepak Two secondary constructions of bent
functions without initial conditions . . 653--679
Pan Tan and
Cuiling Fan and
Wei Guo Linear codes from support designs of
ternary cyclic codes . . . . . . . . . . 681--693
Terry Shue Chien Lau and
Chik How Tan On the design and security of Lee metric
McEliece cryptosystems . . . . . . . . . 695--717
Quan Yuan and
Mehdi Tibouchi and
Masayuki Abe On subset-resilient hash function
families . . . . . . . . . . . . . . . . 719--758
Charul Rajput and
Maheshanand Bhaintwal On the locality of quasi-cyclic codes
over finite fields . . . . . . . . . . . 759--777
Dibyayoti Jena and
Geertrui Van de Voorde The geometric field of linearity of
linear sets . . . . . . . . . . . . . . 779--799
Dmitrii Koshelev Indifferentiable hashing to ordinary
elliptic $ \mathbb {F}_q $-curves of $ j
= 0 $ with the cost of one
exponentiation in $ \mathbb {F}_q $ . . 801--812
Mengzhen Zhao and
Cuiling Fan and
Zihong Tian Nearly optimal balanced quaternary
sequence pairs of prime period $ N
\equiv 5 \pmod 8 $ . . . . . . . . . . . 813--826
Tim Penttila Uniqueness of the inversive plane of
order sixty-four . . . . . . . . . . . . 827--834
Kevin M. Byrnes Isomorphism of maximum length circuit
codes . . . . . . . . . . . . . . . . . 835--850
Liantao Lan and
Yanxun Chang and
Lidong Wang The completion of optimal cyclic
quaternary codes of weight 3 and
distance 3 . . . . . . . . . . . . . . . 851--862
Yanwei Zhao and
Shenglin Zhou Flag-transitive $ 2 - (v, k, \lambda) $
designs with $ r > \lambda (k - 3) $ . . 863--869
Rajendra M. Pawale and
Mohan S. Shrikhande and
Kusum S. Rajbhar Non-existence of quasi-symmetric designs
with restricted block graphs . . . . . . 871--879
Luka Music and
Céline Chevalier and
Elham Kashefi Dispelling myths on superposition
attacks: formal security model and
attack analyses . . . . . . . . . . . . 881--920
Yi Zhao and
Kaitai Liang and
Emmanouil Panaousis Practical algorithm substitution attack
on extractable signatures . . . . . . . 921--937
Alexander Barg and
Zitan Chen and
Itzhak Tamo A construction of maximally recoverable
codes . . . . . . . . . . . . . . . . . 939--945
Daiki Kawabata and
Tatsuya Maruta On the nonexistence of ternary linear
codes attaining the Griesmer bound . . . 947--956
Paolo Santonastaso and
Ferdinando Zullo On the list decodability of rank-metric
codes containing Gabidulin codes . . . . 957--982
Orr Dunkelman and
Maria Eichlseder and
Markus Schofnegger Practical key recovery attacks on
FlexAEAD . . . . . . . . . . . . . . . . 983--1007
Christof Beierle and
Gregor Leander and
Léo Perrin Trims and extensions of quadratic APN
functions . . . . . . . . . . . . . . . 1009--1036
Dipak K. Bhunia and
Cristina Fernández-Córdoba and
Merc\`e Villanueva On the linearity and classification of $
\mathbb {Z}_{p^s} $-linear generalized
Hadamard codes . . . . . . . . . . . . . 1037--1058
Janaka Alawatugoda and
Tatsuaki Okamoto Standard model leakage-resilient
authenticated key exchange using
inner-product extractors . . . . . . . . 1059--1079
Nurdagül Anbar and
Wilfried Meidl Bent partitions . . . . . . . . . . . . 1081--1101
Carlos Galindo and
Fernando Hernando On the generalization of the
construction of quantum codes from
Hermitian self-orthogonal codes . . . . 1103--1112
Hongwei Zhu and
Minjia Shi and
Ferruh Özbudak Complete $b$-symbol weight distribution
of some irreducible cyclic codes . . . . 1113--1125
Kai Lin Ong and
Miin Huey Ang On equivalence of cyclic and dihedral
zero-divisor codes having nilpotents of
nilpotency degree two as generators . . 1127--1138
WeiGuo Zhang and
Enes Pasalic and
LiuPiao Zhang Phase orthogonal sequence sets for
(QS)CDMA communications . . . . . . . . 1139--1156
Fucai Luo and
Saif Al-Kuwari Attribute-based signatures from
lattices: unbounded attributes and
semi-adaptive security . . . . . . . . . 1157--1177
Zhenyu Lu and
Sihem Mesnager and
Meiqin Wang An STP-based model toward designing
S-boxes with good cryptographic
properties . . . . . . . . . . . . . . . 1179--1202
Felix Lazebnik and
Lorinda Leshock On Pappus configurations in Hall planes 1203--1219
Hui Zhang and
Cuiling Fan and
Sihem Mesnager Constructions of two-dimensional
Z-complementary array pairs with large
ZCZ ratio . . . . . . . . . . . . . . . 1221--1239
Nuh Aydin and
Peihan Liu and
Bryan Yoshino Polycyclic codes associated with
trinomials: good codes and open
questions . . . . . . . . . . . . . . . 1241--1269
Gaojun Luo and
San Ling Application of optimal $p$-ary linear
codes to alphabet-optimal locally
repairable codes . . . . . . . . . . . . 1271--1287
Fengrong Zhang and
Enes Pasalic and
Yongzhuang Wei Minimal binary linear codes: a general
framework based on bent concatenation 1289--1318
Can Xiang and
Chunming Tang and
Qi Liu An infinite family of antiprimitive
cyclic codes supporting Steiner systems
$ S(3, 8, 7^m + 1) $ . . . . . . . . . . 1319--1333
Michael Kiermaier On $ \alpha $-points of $q$-analogs of
the Fano plane . . . . . . . . . . . . . 1335--1345
Valerio Dose and
Pietro Mercuri and
Claudio Stirpe High order elements in finite fields
arising from recursive towers . . . . . 1347--1368
Engin Senel and
Figen Öke On the automorphisms of generalized
algebraic geometry codes . . . . . . . . 1369--1379
Arghya Bhattacharjee and
Avijit Dutta and
Mridul Nandi $ \mathsf {CENCPP}^* $:
beyond-birthday-secure encryption from
public permutations . . . . . . . . . . 1381--1425
Austin Dukes and
Andrea Ferraguti and
Giacomo Micheli Optimal selection for good polynomials
of degree up to five . . . . . . . . . . 1427--1436
Kwang Ho Kim and
Sihem Mesnager and
Myong Chol Jo On permutation quadrinomials with
boomerang uniformity 4 and the
best-known nonlinearity . . . . . . . . 1437--1461
Jinming Wen and
Xiao-Wen Chang Sharper bounds on four lattice constants 1463--1484
Tsuyoshi Miezaki and
Hiroyuki Nakasora A note on the Assmus--Mattson theorem
for some binary codes . . . . . . . . . 1485--1502
Angela Aguglia and
Michela Ceria and
Luca Giuzzi Some hypersurfaces over finite fields,
minimal codes and secret sharing schemes 1503--1519
Dean Crnkovi\'c and
Daniel R. Hawtin and
Andrea Svob Neighbour-transitive codes and partial
spreads in generalised quadrangles . . . 1521--1533
Luka Music and
Céline Chevalier and
Elham Kashefi Correction to: Dispelling myths on
superposition attacks: formal security
model and attack analyses . . . . . . . 1535--1535
Hyun Kwang Kim and
Jieun Kwon Classification of weighted posets and
digraphs admitting the extended Hamming
code to be a perfect code . . . . . . . 2249--2269
Masayuki Abe and
Miguel Ambrona Blind key-generation attribute-based
encryption for general predicates . . . 2271--2299
Shweta Agrawal and
Rajarshi Biswas and
Ryo Nishimaki and
Keita Xagawa and
Xiang Xie and
Shota Yamada Cryptanalysis of Boyen's attribute-based
encryption scheme in TCC 2013 . . . . . 2301--2318
Abbas Alhakim Designing preference functions for de
Bruijn sequences with forbidden words 2319--2335
Junru Ma and
Jinquan Luo Constructions of MDS symbol-pair codes
with minimum distance seven or eight . . 2337--2359
Hamidreza Eyvazi and
Karim Samei and
Batoul Savari The linearity of Carlet's Gray image of
linear codes over $ \mathbb {Z}_8 $ . . 2361--2373
Daniel Horsley and
Padraig Ó Catháin Block avoiding point sequencings of
partial Steiner systems . . . . . . . . 2375--2383
Haode Yan and
Kun Zhang On the $c$-differential spectrum of
power functions over finite fields . . . 2385--2405
Yagmur Çakiroglu and
Oguz Yayla and
Emrah Sercan Yilmaz The number of irreducible polynomials
over finite fields with vanishing trace
and reciprocal trace . . . . . . . . . . 2407--2417
Jun Liu and
Dachao Wang and
Yupu Hu and
Jie Chen and
Baocang Wang Improved key-recovery attacks on
reduced-round WEM-8 . . . . . . . . . . 2419--2448
Zhaocun Zhou and
Dengguo Feng and
Bin Zhang Efficient and extensive search for
precise linear approximations with high
correlations of full SNOW-V . . . . . . 2449--2479
Gerald J. Janusz Covering polynomials and projections of
self-dual codes . . . . . . . . . . . . 2481--2489
Lijun Ji and
Miao Liang and
Yanting Wang Combinational constructions of splitting
authentication codes with perfect
secrecy . . . . . . . . . . . . . . . . 2491--2515
W. Cary Huffman and
Jon-Lark Kim and
Patrick Solé Guest editorial: On coding theory and
combinatorics --- in memory of Vera
Pless . . . . . . . . . . . . . . . . . 2517--2527
Jian Gao and
Xiangrui Meng and
Fang-Wei Fu Weight distribution of double cyclic
codes over Galois rings . . . . . . . . 2529--2549
Rongsheng Wu and
Minjia Shi On $ \mathbb {Z}_2 \mathbb {Z}_4
$-additive polycyclic codes and their
Gray images . . . . . . . . . . . . . . 2551--2562
Federico N. Martínez Symmetric functions and spherical
$t$-designs in $ \pm \mathbb {R}^2 $ . . 2563--2581
Himadri Shekhar Chakraborty and
Tsuyoshi Miezaki Variants of Jacobi polynomials in coding
theory . . . . . . . . . . . . . . . . . 2583--2597
Minjia Shi and
Shukai Wang and
Tor Helleseth and
Patrick Solé Quadratic residue codes, rank three
groups and PBIBDs . . . . . . . . . . . 2599--2611
Rongcun Qin and
Hengming Zhao and
Huangsheng Yu Compatible difference packing set
systems and their applications to
multilength variable-weight OOCs . . . . 2613--2645
Martino Borello and
Cem Güneri and
Elif Saçìkara and
Patrick Solé The concatenated structure of
quasi-abelian codes . . . . . . . . . . 2647--2661
Liqin Qian and
Xiwang Cao and
Wei Lu and
Patrick Solé A new method for constructing linear
codes with small hulls . . . . . . . . . 2663--2682
Serhii Dyshko and
Jay A. Wood MacWilliams extension property for
arbitrary weights on linear codes over
module alphabets . . . . . . . . . . . . 2683--2701
Yuqing Fu and
Hongwei Liu Galois self-orthogonal constacyclic
codes over finite fields . . . . . . . . 2703--2733
Whan Hyuk Choi and
Jon Lark Kim An improved upper bound on self-dual
codes over finite fields $ {\rm GF} (11)
$, $ {\rm GF} (19) $, and $ {\rm GF}
(23) $ . . . . . . . . . . . . . . . . . 2735--2751
Vladimir D. Tonchev On Pless symmetry codes, ternary QR
codes, and related Hadamard matrices and
designs . . . . . . . . . . . . . . . . 2753--2762
Shikha Patel and
Om Prakash $ (\theta, \delta_\theta)$-Cyclic codes
over $ \mathbb {F}_q[u, v] \slash
\langle u^2 - u, v^2 - v, u v - v u
\rangle $ . . . . . . . . . . . . . . . 2763--2781
Stéphane Ballet and
Nicolas Baudru and
Alexis Bonnecaze and
Mila Tukumuli Construction of asymmetric
Chudnovsky-type algorithms for
multiplication in finite fields . . . . 2783--2811
Yansheng Wu and
Yoonjin Lee and
Qiang Wang Further improvement on index bounds . . 2813--2821
Lin Sok A new construction of linear codes with
one-dimensional hull . . . . . . . . . . 2823--2839
Fatemeh Jafari and
Alireza Abdollahi and
Javad Bagherian and
Maryam Khatami and
Reza Sobhani Equidistant permutation group codes . . 2841--2859
Edoukou Berenger Ayebie and
El Mamoun Souidi New code-based cryptographic accumulator
and fully dynamic group signature . . . 2861--2891
Hokuto Takahashi and
Manabu Hagiwara Decoding algorithms of monotone codes
and azinv codes and their unified view 2893--2922
Iwan Duursma and
Xiao Li Johnson graph codes . . . . . . . . . . 2923--2941
Jessica Bariffi and
Sam Mattheus and
Alessandro Neri and
Joachim Rosenthal Moderate-density parity-check codes from
projective bundles . . . . . . . . . . . 2943--2966
Jon-Lark Kim and
JunYong Park Steganography from perfect codes on
Cayley graphs over Gaussian integers,
Eisenstein--Jacobi integers and
Lipschitz integers . . . . . . . . . . . 2967--2989
Xianmang He and
Yindong Chen and
Zusheng Zhang and
Kunxiao Zhou Parallel sub-code construction for
constant-dimension codes . . . . . . . . 2991--3001
Adel Alahmadi and
Amani Alkathiry and
Alaa Altassan and
Alexis Bonnecaze and
Hatoon Shoaib and
Patrick Solé The build-up construction over a
commutative non-unital ring . . . . . . 3003--3010
Slim Bettaieb and
Lo\"\ic Bidoux and
Olivier Blazy and
Yann Connan and
Philippe Gaborit A gapless code-based hash proof system
based on RQC and its applications . . . 3011--3044
Ferruh Özbudak and
Burcu Gülmez Temür Classification of permutation
polynomials of the form $ x^3 g(x^{q -
1}) $ of $ \mathbb {F}_{q^2} $ where $
g(x) = x^3 + b x + c $ and $ b, c \in
\mathbb {F}_q^* $ . . . . . . . . . . . 1537--1556
Simeon Ball and
James Dixon The equivalence of linear codes implies
semi-linear equivalence . . . . . . . . 1557--1565
Tran van Trung A method of constructing 2-resolvable
$t$-designs for $ t = 3, 4$ . . . . . . 1567--1583
Dean Crnkovi\'c and
Andrea Svob Switching for 2-designs . . . . . . . . 1585--1593
Vladimir D. Tonchev Book Review: \booktitleDesigns from
Linear Codes, second edition, by
Cunsheng Ding and Chunming Tang, World
Scientific, 2022 . . . . . . . . . . . . 1595--1597
Jingjun Bao and
Lijun Ji Large sets of $t$-designs over finite
fields exist for all $t$ . . . . . . . . 1599--1609
Menglong Zhang and
Tao Feng and
Xiaomiao Wang The existence of cyclic $ (v, 4,
1)$-designs . . . . . . . . . . . . . . 1611--1628
Xia Li and
Qin Yue Non-binary irreducible quasi-cyclic
parity-check subcodes of Goppa codes and
extended Goppa codes . . . . . . . . . . 1629--1647
Jun Zhang and
Zhengchun Zhou and
Chunming Tang A class of twisted generalized
Reed--Solomon codes . . . . . . . . . . 1649--1658
Sergey Bereg and
Brian Malouf and
Linda Morales and
Thomas Stanley and
I. Hal Sudborough Using permutation rational functions to
obtain permutation arrays with large
Hamming distance . . . . . . . . . . . . 1659--1677
Adrian Korban and
Serap Sahinkaya and
Deniz Ustun Reversible $ G^k $-codes with
applications to DNA codes . . . . . . . 1679--1694
Yan Wang and
Xilin Han and
Weiqiong Wang and
Ziling Heng Linear complexity over $ \mathbb {F}_q $
and 2-adic complexity of a class of
binary generalized cyclotomic sequences
with good autocorrelation . . . . . . . 1695--1712
Alexander M. Romanov On the number of q -ary quasi-perfect
codes with covering radius 2 . . . . . . 1713--1719
Khodakhast Bibak and
Behrouz Zolfaghari The Modular Subset-Sum Problem and the
size of deletion correcting codes . . . 1721--1734
Jung Hee Cheon and
Wonhee Cho and
Jeong Han Kim and
Jiseung Kim Adventures in crypto dark matter:
attacks, fixes and analysis for weak
pseudorandom functions . . . . . . . . . 1735--1760
Samaneh Mashahdi and
Bagher Bagherpour and
Ali Zaghian A non-interactive $ (t, n)$-publicly
verifiable multi-secret sharing scheme 1761--1782
Sadmir Kudin and
Enes Pasalic A complete characterization of $
\mathcal {D}_0 \cap \mathcal {M}^\# $
and a general framework for specifying
bent functions in $ \mathcal {C} $
outside $ \mathcal {M}^\# $ . . . . . . 1783--1796
Seyyed Arash Azimi and
Adrián Ranea and
Mahmoud Salmasizadeh and
Javad Mohajeri and
Mohammad Reza Aref and
Vincent Rijmen A bit-vector differential model for the
modular addition by a constant and its
applications to differential and
impossible-differential cryptanalysis 1797--1855
Lidong Wang and
Lulu Cai and
Tao Feng and
Zihong Tian and
Xiaomiao Wang Geometric orthogonal codes and
geometrical difference packings . . . . 1857--1879
Marién Abreu and
Martin Funk and
Vedran Kr\vcadinac and
Domenico Labbate Strongly regular configurations . . . . 1881--1897
Katharina Boudgoust and
Amin Sakzad and
Ron Steinfeld Vandermonde meets Regev: public key
encryption schemes based on partial
Vandermonde problems . . . . . . . . . . 1899--1936
Junzhen Sui and
Xiaomeng Zhu and
Xueying Shi MDS and near-MDS codes via twisted
Reed--Solomon codes . . . . . . . . . . 1937--1958
Simeon Ball and
Michel Lavrauw and
Tamás Sz\Honyi Contributions by Aart Blokhuis to finite
geometry, discrete mathematics, and
combinatorics . . . . . . . . . . . . . 1959--1961
B. De Bruyn and
M. Gao A characterization of the Coxeter cap 1963--1981
Willem H. Haemers and
Leila Parsaei Majd Spectral symmetry in conference matrices 1983--1990
Oliver Janzer and
Zoltán Lóránt Nagy Coloring linear hypergraphs: the
Erd\Hos--Faber--Lovász conjecture and the
Combinatorial Nullstellensatz . . . . . 1991--2001
Aida Abiad and
Bart De Bruyn and
Jozefien D'haeseleer and
Jack H. Koolen Neumaier graphs with few eigenvalues . . 2003--2019
Michel Lavrauw and
Tomasz Popiel and
John Sheekey Combinatorial invariants for nets of
conics in $ {\rm PG}(2, q) $ . . . . . . 2021--2067
R. A. Bailey and
Peter J. Cameron and
Michael Kinyon and
Cheryl E. Praeger Diagonal groups and arcs over groups . . 2069--2080
Giovanni Longobardi and
Leo Storme and
Rocco Trombetti On sets of subspaces with two
intersection dimensions and a
geometrical junta bound . . . . . . . . 2081--2099
A. Blokhuis and
M. De Boeck and
J. D'haeseleer On the sunflower bound for $k$-spaces,
pairwise intersecting in a point . . . . 2101--2111
Lins Denaux Constructing saturating sets in
projective spaces using subgeometries 2113--2144
William M. Kantor Automorphism subgroups for designs with
$ \lambda = 1 $ . . . . . . . . . . . . 2145--2157
Anton Betten and
Fatma Karaoglu The Eckardt point configuration of cubic
surfaces revisited . . . . . . . . . . . 2159--2180
Xinyu Tan and
Narayanan Rengaswamy and
Robert Calderbank Approximate unitary 3-designs from
transvection Markov chains . . . . . . . 2181--2204
Carmen Amarra and
Alice Devillers and
Cheryl E. Praeger Delandtsheer--Doyen parameters for
block-transitive point-imprimitive
2-designs . . . . . . . . . . . . . . . 2205--2221
Aart Blokhuis and
Ruud Pellikaan and
Tamás Sz\Honyi The extended coset leader weight
enumerator of a twisted cubic code . . . 2223--2247
Lukas Kölsch and
Björn Kriepke and
Gohar M. Kyureghyan Image sets of perfectly nonlinear maps 1--27
He Zhang and
Chunming Tang Constructions of large cyclic constant
dimension codes via Sidon spaces . . . . 29--44
Hadi Kharaghani and
Sho Suda and
Vlad Zaitsev On a class of optimal constant weight
ternary codes . . . . . . . . . . . . . 45--54
Yasamin Khaefi and
Zeinab Akhlaghi and
Behrooz Khosravi On the subgroup perfect codes in Cayley
graphs . . . . . . . . . . . . . . . . . 55--61
Maximilien Gadouleau and
Luca Mariot and
Stjepan Picek Bent functions in the partial spread
class generated by linear recurring
sequences . . . . . . . . . . . . . . . 63--82
Pan Tan and
Cuiling Fan and
Cunsheng Ding and
Chunming Tang and
Zhengchun Zhou The minimum locality of linear codes . . 83--114
Josimar J. R. Aguirre and
Cícero Carvalho and
Victor G. L. Neumann About $r$-primitive and $k$-normal
elements in finite fields . . . . . . . 115--126
Jiaxin Wang and
Fang-Wei Fu New results on vectorial dual-bent
functions and partial difference sets 127--149
Claude Carlet and
Rebeka Kiss and
Gábor P. Nagy Simplicity conditions for binary
orthogonal arrays . . . . . . . . . . . 151--163
Marloes Venema and
Greg Alpár and
Jaap-Henk Hoepman Systematizing core properties of
pairing-based attribute-based encryption
to uncover remaining challenges in
enforcing access control in practice . . 165--220
Ming Li and
Yupeng Jiang and
Dongdai Lin Properties of the cycles that contain
all vectors of weight $ \le k $ . . . . 221--239
Xavier Caruso and
Amaury Durand Duals of linearized Reed--Solomon codes 241--271
Minjia Shi and
Na Liu and
Jon-Lark Kim and
Patrick Solé Additive complementary dual codes over $
\mathbb {F}_4 $ . . . . . . . . . . . . 273--284
Yupeng Jiang A relation between sequences generated
by Golomb's preference algorithm . . . . 285--291
Vincenzo Pallozzi Lavorante and
Valentino Smaldore New hemisystems of the Hermitian surface 293--307
Xi Xie and
Nian Li and
Xiangyong Zeng and
Xiaohu Tang and
Yao Yao Several classes of bent functions over
finite fields . . . . . . . . . . . . . 309--332
José Andrés Armario and
Ivan Bailera and
Ronan Egan Butson full propelinear codes . . . . . 333--351
Bingsheng Shen and
Hua Meng and
Yang Yang and
Zhengchun Zhou New constructions of $Z$-complementary
code sets and mutually orthogonal
complementary sequence sets . . . . . . 353--371
WeiGuo Zhang and
Enes Pasalic and
Yiran Liu and
Liupiao Zhang and
Chunlei Xie A design and flexible assignment of
orthogonal binary sequence sets for
(QS)-CDMA systems . . . . . . . . . . . 373--389
Shuichi Katsumata and
Toi Tomita and
Shota Yamada Direct computation of branching programs
and its applications to more efficient
lattice-based cryptography . . . . . . . 391--431
Christof Beierle and
Claude Carlet Gold functions and switched cube
functions are not 0-extendable in
dimension $ n > 5 $ . . . . . . . . . . . 433--449
Eimear Byrne and
Michela Ceria and
Sorina Ionica and
Relinde Jurrius and
Elif Saçìkara Constructions of new matroids and
designs over $ \mathbb {F}_q $ . . . . . 451--473
Xiaoqin Hong and
Xiwang Cao Improved generalized block inserting
construction of constant dimension codes 475--495
Lo\"\ic Bidoux and
Philippe Gaborit and
Mukul Kulkarni and
Victor Mateu Code-based signatures from new proofs of
knowledge for the syndrome decoding
problem . . . . . . . . . . . . . . . . 497--544
Nurdagül Anbar and
Tekgül Kalayci and
Wilfried Meidl Generalized semifield spreads . . . . . 545--562
Thibauld Feneuil and
Antoine Joux and
Matthieu Rivain Shared permutation for syndrome
decoding: new zero-knowledge protocol
and code-based signature . . . . . . . . 563--608
Emmanouil Doulgerakis and
Thijs Laarhoven and
Benne de Weger The irreducible vectors of a lattice:
Some theory and applications . . . . . . 609--643
Michael Kiermaier and
Sascha Kurz and
Patrick Solé and
Michael Stoll and
Alfred Wassermann On strongly walk regular graphs, triple
sum sets and their codes . . . . . . . . 645--675
Minjia Shi and
Shukai Wang and
Jon-Lark Kim and
Patrick Solé Self-orthogonal codes over a non-unital
ring and combinatorial matrices . . . . 677--689
Minjia Shi and
Shukai Wang and
Jon-Lark Kim and
Patrick Solé Correction: Self-orthogonal codes over a
non-unital ring and combinatorial
matrices . . . . . . . . . . . . . . . . 691--691
Minjia Shi and
Shukai Wang and
Xiaoxiao Li Retracted Article: $ \mathbb {Z}_p
\mathbb {Z}_{p^2} $-linear codes: rank
and kernel . . . . . . . . . . . . . . . 693--693
Xiusheng Liu and
Hualu Liu LCP of group codes over finite Frobenius
rings . . . . . . . . . . . . . . . . . 695--708
Jiaxin Shen and
Jianfu Chen and
Shenglin Zhou Flag-transitive 2-designs with prime
square replication number and
alternating groups . . . . . . . . . . . 709--717
Sihem Mesnager and
Liqin Qian and
Xiwang Cao Further projective binary linear codes
derived from two-to-one functions and
their duals . . . . . . . . . . . . . . 719--746
Mrinmoy Datta and
Trygve Johnsen Codes from symmetric polynomials . . . . 747--761
Dev Akre and
Nuh Aydin and
Matthew Harrington and
Saurav Pandey A generalization of cyclic code
equivalence algorithm to constacyclic
codes . . . . . . . . . . . . . . . . . 763--777
Bill Correll, Jr. and
Christopher N. Swanson Difference-based structural properties
of Costas arrays . . . . . . . . . . . . 779--794
Makoto Araya and
Masaaki Harada and
Koji Momihara Hadamard matrices related to a certain
series of ternary self-dual codes . . . 795--805
Xiangrui Meng and
Jian Gao and
Fang-Wei Fu and
Fanghui Ma Weight distributions of Q2DC codes over
finite fields . . . . . . . . . . . . . 807--830
M. Montanucci and
G. Tizziotti Generalized Weierstrass semigroups at
several points on certain maximal curves
which cannot be covered by the Hermitian
curve . . . . . . . . . . . . . . . . . 831--851
Hyoseung Kim and
Olivier Sanders and
Michel Abdalla and
Jong Hwan Park Practical dynamic group signatures
without knowledge extractors . . . . . . 853--893
Maarten De Boeck and
Geertrui Van de Voorde Embedded antipodal planes and the
minimum weight of the dual code of
points and lines in projective planes of
order $ p^2 $ . . . . . . . . . . . . . 895--920
Yan Tong and
Xiangyong Zeng and
Shasha Zhang and
Shiwei Xu and
Zhengwei Ren The estimates of trigonometric sums and
new bounds on a mean value, a sequence
and a cryptographic function . . . . . . 921--949
Jingzhou Na and
Jonathan Jedwab and
Shuxing Li A group-based structure for perfect
sequence covering arrays . . . . . . . . 951--970
Fei Guo and
Zilong Wang and
Guang Gong Several secondary methods for
constructing bent-negabent functions . . 971--995
Clémence Bouvier and
Anne Canteaut and
Léo Perrin On the algebraic degree of iterated
power functions . . . . . . . . . . . . 997--1033
Zhongliang Zhang and
Zhen Qin and
Chun Guo Just tweak! Asymptotically optimal
security for the cascaded LRW1 tweakable
blockcipher . . . . . . . . . . . . . . 1035--1052
Kwangsu Lee Decentralized multi-client functional
encryption for set intersection with
improved efficiency . . . . . . . . . . 1053--1093
Michela Ceria and
Antonio Cossidente and
Giuseppe Marino and
Francesco Pavese On near-MDS codes and caps . . . . . . . 1095--1110
Daniel Augot and
Sarah Bordage and
Jade Nardi Efficient multivariate low-degree tests
via interactive oracle proofs of
proximity for polynomial codes . . . . . 1111--1151
Wanbao Zhang and
Shenglin Zhou Extremely line-primitive automorphism
groups of finite linear spaces . . . . . 1153--1163
Yanbin Zheng and
Yuyin Yu and
Zhengbang Zha and
Xingchen Zhou On inverses of permutation polynomials
of the form $ x \left (x^s - a
\right)^{(q^m - 1) \slash s} $ over $
\mathbb {F}_{q^n} $ . . . . . . . . . . 1165--1181
Ilya Vorobyev Complete traceability multimedia
fingerprinting codes resistant to
averaging attack and adversarial noise
with optimal rate . . . . . . . . . . . 1183--1191
Yun Li and
Hongwei Liu Cyclic constant dimension subspace codes
via the sum of Sidon spaces . . . . . . 1193--1207
Weijun Fang and
Bin Chen and
Shu-Tao Xia and
Fang-Wei Fu and
Xiangyu Chen Perfect LRCs and $k$-optimal LRCs . . . 1209--1232
Zhengan Huang and
Junzuo Lai and
Gongxian Zeng and
Xin Mu Receiver selective opening security for
identity-based encryption in the
multi-challenge setting . . . . . . . . 1233--1259
Bangteng Xu Characterizations and constructions of
plateaued functions on finite abelian
groups . . . . . . . . . . . . . . . . . 1261--1292
Michael J. Gill and
Ian M. Wanless Pairs of MOLS of order ten satisfying
non-trivial relations . . . . . . . . . 1293--1313
Shohei Satake and
Yujie Gu Cayley sum graphs and their applications
to codebooks . . . . . . . . . . . . . . 1315--1333
Songbao Mo Ideal hierarchical secret sharing and
lattice path matroids . . . . . . . . . 1335--1349
Rocco Mora and
Jean-Pierre Tillich On the dimension and structure of the
square of the dual of a Goppa code . . . 1351--1372
Dan Zeng and
Xiangyong Zeng and
Lisha Li and
Yunge Xu The cycle structure of a class of
permutation polynomials . . . . . . . . 1373--1400
Shi-Feng Sun and
Ron Steinfeld and
Amin Sakzad Incremental symmetric puncturable
encryption with support for unbounded
number of punctures . . . . . . . . . . 1401--1426
Vincenzo Pallozzi Lavorante External points to a conic from a Baer
subplane . . . . . . . . . . . . . . . . 1427--1441
Christian Elsholtz and
Benjamin Klahn and
Gabriel F. Lipnik Large subsets of $ \mathbb {Z}_m^n $
without arithmetic progressions . . . . 1443--1452
Minjia Shi and
Yaya Li and
Wei Cheng and
Dean Crnkovi\'c and
Denis Krotov and
Patrick Solé Self-dual bent sequences for complex
Hadamard matrices . . . . . . . . . . . 1453--1474
Giusy Monzillo and
Tim Penttila and
Alessandro Siciliano Eggs in finite projective spaces and
unitals in translation planes . . . . . 1475--1485
Enrico Iurlano Growth of the perfect sequence covering
array number . . . . . . . . . . . . . . 1487--1494
Li Xu and
Zhengchun Zhou and
Jun Zhang and
Sihem Mesnager Optimal quaternary $ (r,
\delta)$-locally recoverable codes:
their structures and complete
classification . . . . . . . . . . . . . 1495--1526
Zhonghua Sun and
Sujuan Huang and
Shixin Zhu Optimal quaternary Hermitian LCD codes
and their related codes . . . . . . . . 1527--1558
Sihong Su and
Xiaoqi Guo A further study on the construction
methods of bent functions and self-dual
bent functions based on Rothaus's bent
function . . . . . . . . . . . . . . . . 1559--1580
S. G. Barwick and
Alice M. W. Hui and
Wen-Ai Jackson A geometric description of the Figueroa
plane . . . . . . . . . . . . . . . . . 1581--1593
Henk D. L. Hollmann and
Karan Khathuria and
Ago-Erik Riet and
Vitaly Skachek On some batch code properties of the
simplex code . . . . . . . . . . . . . . 1595--1605
Alexander Shaporenko Derivatives of bent functions in
connection with the bent sum
decomposition problem . . . . . . . . . 1607--1625
Jérôme Ducoat and
Frédérique Oggier Rank weight hierarchy of some classes of
polynomial codes . . . . . . . . . . . . 1627--1644
Nuttapong Attrapadung and
Goichiro Hanaoka and
Ryo Hiromasa and
Takahiro Matsuda and
Jacob C. N. Schuldt Maliciously circuit-private multi-key
FHE and MPC based on LWE . . . . . . . . 1645--1684
Simeon Ball Grassl--Rötteler cyclic and consta-cyclic
MDS codes are generalised Reed--Solomon
codes . . . . . . . . . . . . . . . . . 1685--1694
Zhao Hu and
Nian Li and
Linjie Xu and
Xiangyong Zeng and
Xiaohu Tang The differential spectrum and boomerang
spectrum of a class of locally-APN
functions . . . . . . . . . . . . . . . 1695--1711
Han-Bing Yu and
Qun-Xiong Zheng and
Yi-Jian Liu and
Jing-Guo Bi and
Yu-Fei Duan and
Jing-Wen Xue and
You Wu and
Yue Cao and
Rong Cheng and
Lin Wang and
Bai-Shun Sun An improved method for predicting
truncated multiple recursive generators
with unknown parameters . . . . . . . . 1713--1736
Hopein Christofen Tang and
Djoko Suprijanto A general family of Plotkin-optimal
two-weight codes over $ \mathbb {Z}_4 $ 1737--1750
Reo Eriguchi and
Noboru Kunihiro and
Koji Nuida Multiplicative and verifiably
multiplicative secret sharing for
multipartite adversary structures . . . 1751--1778
Jiabo Wang and
Cong Ling Polar sampler: A novel Bernoulli sampler
using polar codes with application to
integer Gaussian sampling . . . . . . . 1779--1811
Makoto Araya and
Masaaki Harada Some restrictions on the weight
enumerators of near-extremal ternary
self-dual codes and quaternary Hermitian
self-dual codes . . . . . . . . . . . . 1813--1843
Pratish Datta and
Ratna Dutta and
Sourav Mukhopadhyay Short attribute-based signatures for
arbitrary Turing machines from standard
assumptions . . . . . . . . . . . . . . 1845--1872
Fengwei Li Cyclic codes of length $ 5 p $ with MDS
symbol-pair . . . . . . . . . . . . . . 1873--1888
Zhongxiao Wang and
Xiaoxin Zhao and
Qunxiong Zheng and
Xiutao Feng and
Zehao Sun The decomposition of an NFSR into the
cascade connection of two smaller NFSRs
revisited . . . . . . . . . . . . . . . 1889--1910
N. Durante and
G. Longobardi and
V. Pepe $ (d, \sigma) $-Veronese variety and
some applications . . . . . . . . . . . 1911--1921
Hui Han and
Jianjun Mu and
Xiaopeng Jiao and
Yu-Cheng He and
Zhanzhan Zhao Constructions of multi-permutation codes
correcting a single burst of deletions 1923--1934
Michel Lavrauw and
John Sheekey Symplectic 4-dimensional semifields of
order $ 8^4 $ and $ 9^4 $ . . . . . . . 1935--1949
Máté Gyarmati Secret sharing on regular bipartite
access structures . . . . . . . . . . . 1951--1971
Monika Yadav and
Anuradha Sharma A recursive method for the construction
and enumeration of self-orthogonal and
self-dual codes over the quasi-Galois
ring $ \mathbb {F}_{2^r}[u] \slash
\langle u^e \rangle $ . . . . . . . . . 1973--2003
Elisa Gorla and
Cristina Landolina Quasi optimal anticodes: structure and
invariants . . . . . . . . . . . . . . . 2005--2020
Lin Jiao and
Yonglin Hao and
Yongqiang Li Guess-and-determine attacks on SNOW--VI
stream cipher . . . . . . . . . . . . . 2021--2055
Wenxiao Qiao and
Hailun Yan and
Siwei Sun and
Lei Hu and
Jiwu Jing New cryptanalysis of LowMC with
algebraic techniques . . . . . . . . . . 2057--2075
Mar\'ìa Chara and
Sam Kottler and
Beth Malmskog and
Bianca Thompson and
Mckenzie West Minimum distance and parameter ranges of
locally recoverable codes with
availability from fiber products of
curves . . . . . . . . . . . . . . . . . 2077--2105
Daniel M. Gordon Signed difference sets . . . . . . . . . 2107--2115
Rupert Li Unique optima of the Delsarte linear
program . . . . . . . . . . . . . . . . 2117--2140
Ward Beullens and
Samuel Dobson and
Shuichi Katsumata and
Yi-Fu Lai and
Federico Pintore Group signatures and more from isogenies
and lattices: generic, simple, and
efficient . . . . . . . . . . . . . . . 2141--2200
Boris Ryabko Unconditionally secure short key ciphers
based on data compression and
randomization . . . . . . . . . . . . . 2201--2212
Gerardo Vega The $b$-symbol weight distributions of
all semiprimitive irreducible cyclic
codes . . . . . . . . . . . . . . . . . 2213--2221
Himadri Shekhar Chakraborty and
Tsuyoshi Miezaki and
Manabu Oura Harmonic Tutte polynomials of matroids 2223--2236
Nam-Su Jho and
Jooyoung Lee Partition and mix: generalizing the
swap-or-not shuffle . . . . . . . . . . 2237--2254
Zihan Zhang A new metric on symmetric groups and
applications to block permutation codes 2255--2271
Xiaoni Du and
Wengang Jin and
Sihem Mesnager Several classes of new weakly regular
bent functions outside $ \mathcal {R}
\mathcal {F} $, their duals and some
related (minimal) codes with few weights 2273--2307
James Hammer and
John Lorch Diagonal cellular factor pair Latin
squares . . . . . . . . . . . . . . . . 2309--2322
Abílio Lemos and
Victor G. L. Neumann and
Sávio Ribas On arithmetic progressions in finite
fields . . . . . . . . . . . . . . . . . 2323--2346
Tao Feng and
Jianbing Lu On finite generalized quadrangles with $
{\rm PSL}(2, q) $ as an automorphism
group . . . . . . . . . . . . . . . . . 2347--2364
Enes Pasalic and
Amar Bapi\'c and
Fengrong Zhang and
Yongzhuang Wei Explicit infinite families of bent
functions outside the completed
Maiorana--McFarland class . . . . . . . 2365--2393
Xiaoqiang Wang and
Zhonghua Sun and
Cunsheng Ding Two families of negacyclic BCH codes . . 2395--2420
Jian Ding and
Changlu Lin and
Fuchun Lin and
Huaxiong Wang Full threshold change range of threshold
changeable secret sharing . . . . . . . 2421--2447
Mima Stanojkovski Submodule codes as spherical codes in
buildings . . . . . . . . . . . . . . . 2449--2472
Igor E. Shparlinski Fixed points of the subset sum
pseudorandom number generators . . . . . 2473--2479
Moises Delgado and
Heeralal Janwa and
Carlos Agrinsoni Some new techniques and progress towards
the resolution of the conjecture of
exceptional APN functions and absolutely
irreducibility of a class of polynomials 2481--2495
Tran van Trung Point-missing $s$-resolvable
$t$-designs: infinite series of
4-designs with constant index . . . . . 2497--2508
Eiichi Bannai and
Tsuyoshi Miezaki and
Hiroyuki Nakasora A note on the Assmus--Mattson theorem
for some binary codes II . . . . . . . . 2509--2522
Hirokazu Kobayashi and
Yohei Watanabe and
Kazuhiko Minematsu and
Junji Shikata Tight lower bounds and optimal
constructions of anonymous broadcast
encryption and authentication . . . . . 2523--2562
Shitao Li and
Minjia Shi and
Juan Wang An improved method for constructing
formally self-dual codes with small
hulls . . . . . . . . . . . . . . . . . 2563--2583
Marco Pavone Subset sums and block designs in a
finite vector space . . . . . . . . . . 2585--2603
Guangzhou Chen and
Xiaodong Niu Constructions for new orthogonal arrays
based on large sets of orthogonal arrays 2605--2625
Wei Lu and
Xia Wu and
Yufei Wang and
Xiwang Cao A general construction of regular
complete permutation polynomials . . . . 2627--2647
Isabel Byrne and
Natalie Dodson and
Ryan Lynch and
Eric Pabón-Cancel and
Fernando Piñero-González Improving the minimum distance bound of
Trace Goppa codes . . . . . . . . . . . 2649--2663
Hao Chen New MDS entanglement-assisted quantum
codes from MDS Hermitian self-orthogonal
codes . . . . . . . . . . . . . . . . . 2665--2676
Yan Liu and
Jianguo Lei More results on large sets of Kirkman
triple systems . . . . . . . . . . . . . 2677--2686
Zhongya Zhang and
Wenling Wu and
Han Sui and
Bolin Wang Post-quantum security on the Lai--Massey
scheme . . . . . . . . . . . . . . . . . 2687--2704
Jaap-Henk Hoepman Two faces of blindness . . . . . . . . . 2705--2721
Bagher Bagherpour A bivariate polynomial-based
cryptographic hard problem and its
applications . . . . . . . . . . . . . . 2723--2735
Yan Zhu Optimal and extremal graphical designs
on regular graphs associated with
classical parameters . . . . . . . . . . 2737--2754
Xiantong Tan and
Haode Yan Differential spectrum of a class of APN
power functions . . . . . . . . . . . . 2755--2768
Erzhong Xue and
Zilong Wang The $q$-ary Golay arrays of size $ 2
\times 2 \times \cdots \times 2 $ are
standard . . . . . . . . . . . . . . . . 2769--2778
Jiseung Kim and
Changmin Lee A polynomial time algorithm for breaking
NTRU encryption with multiple keys . . . 2779--2789
Ting Lan and
Weijun Liu and
Fu-Gang Yin Block-transitive 3-$ (v, k, 1) $ designs
associated with alternating groups . . . 2791--2807
Rongquan Feng Obituary of Professor Zhexian Wan . . . 2809--2810
Junyang Zhang Characterizing subgroup perfect codes by
2-subgroups . . . . . . . . . . . . . . 2811--2819
Zhonghua Sun and
Xiaoqiang Wang and
Cunsheng Ding Several families of irreducible
constacyclic and cyclic codes . . . . . 2821--2843
Kai Zhang and
Xuejia Lai and
Lei Wang and
Jie Guan and
Bin Hu and
Senpeng Wang and
Tairong Shi Meet-in-the-middle attack with
splice-and-cut technique and a general
automatic framework . . . . . . . . . . 2845--2878
S. P. Glasby and
Ferdinand Ihringer and
Sam Mattheus The proportion of non-degenerate
complementary subspaces in classical
spaces . . . . . . . . . . . . . . . . . 2879--2891
Yu Zhan and
Ziqian Zhang and
Qian Liu and
Baocang Wang Hiding the input-size in multi-party
private set intersection . . . . . . . . 2893--2915
Pratish Datta and
Tapas Pal (Compact) Adaptively secure FE for
attribute-weighted sums from $k$--Lin 2917--3034
Aurélien Dupin and
Pierrick Méaux and
Mélissa Rossi On the algebraic immunity-resiliency
trade-off, implications for Goldreich's
pseudorandom generator . . . . . . . . . 3035--3079
Hyung Tae Lee and
Jae Hong Seo On the security of functional encryption
in the generic group model . . . . . . . 3081--3114
Kaiqiang Liu and
Zhengchun Zhou and
Avik Ranjan Adhikary and
Rong Luo New sets of non-orthogonal spreading
sequences with low correlation and low
PAPR using extended Boolean functions 3115--3139
Yu Dai and
Kaizhan Lin and
Chang-An Zhao and
Zijian Zhou Fast subgroup membership testings for $
\mathbb {G}_1 $, $ \mathbb {G}_2 $ and $
\mathbb {G}_T $ on pairing-friendly
curves . . . . . . . . . . . . . . . . . 3141--3166
Daniele Bartoli and
Giuliana Fatabbi and
Francesco Ghiandoni On the exceptionality of rational APN
functions . . . . . . . . . . . . . . . 3167--3186
Kai Zhang and
Xuejia Lai and
Jie Guan and
Bin Hu Weak rotational property and its
application . . . . . . . . . . . . . . 3187--3214
Dean Crnkovi\'c and
Andrea Svob LCD subspace codes . . . . . . . . . . . 3215--3226
Melissa Lee and
Gabriel Verret Extremely primitive groups and linear
spaces . . . . . . . . . . . . . . . . . 3227--3240
Pin-Chieh Tseng and
Ching-Yi Lai and
Wei-Hsuan Yu Semidefinite programming bounds for
binary codes from a split Terwilliger
algebra . . . . . . . . . . . . . . . . 3241--3262
Wen Ma and
Jinquan Luo Block codes in pomset metric over $
\mathbb {Z}_m $ . . . . . . . . . . . . 3263--3284
Lucas Reis The average density of $K$-normal
elements over finite fields . . . . . . 3285--3292
Denis S. Krotov Projective tilings and full-rank perfect
codes . . . . . . . . . . . . . . . . . 3293--3303
Livia Betti and
Jim Brown and
Fernando Gaitan and
Aiyana Spear and
Japheth Varlack Lattices in real quadratic fields and
associated theta series arising from
codes over $ \textbf {F}_4 $ and $
\textbf {F}_2 \times \textbf {F}_2 $ . . 3305--3319
Jie Xu and
Zhiyong Zheng and
Kun Tian and
Man Chen Two properties of prefix codes and
uniquely decodable codes . . . . . . . . 3321--3330
Steven Galbraith and
Rosario Gennaro and
Carla R\`afols and
Ron Steinfeld Guest editorial: Special issue on
Mathematics of Zero-Knowledge . . . . . 3331--3332
Diego F. Aranha and
Youssef El Housni and
Aurore Guillevic A survey of elliptic curves for proof
systems . . . . . . . . . . . . . . . . 3333--3378
Scott Ames and
Carmit Hazay and
Yuval Ishai and
Muthuramakrishnan Venkitasubramaniam Ligero: lightweight sublinear arguments
without a trusted setup . . . . . . . . 3379--3424
Ward Beullens and
Luca De Feo and
Steven D. Galbraith and
Christophe Petit Proving knowledge of isogenies: a survey 3425--3456
Daniel Benarroch and
Matteo Campanelli and
Dario Fiore and
Kobi Gurkan and
Dimitris Kolonelos Zero-knowledge proofs for set
membership: efficient, succinct, modular 3457--3525
Carsten Baum and
Samuel Dittmer and
Peter Scholl and
Xiao Wang Sok: vector OLE-based zero-knowledge
protocols . . . . . . . . . . . . . . . 3527--3561
André Guerino Castoldi and
Anderson Novaes Martinhão and
Emerson L. Monte Carmelo and
Otávio J. N. T. N. dos Santos Covering schemes of strength $t$ . . . . 3563--3580
Congming Wei and
Bingyou Dong and
Jialiang Hua and
Xiaoyang Dong and
Guoyan Zhang Improved attacks against reduced-round
Whirlwind . . . . . . . . . . . . . . . 3581--3602
Senpeng Wang and
Dengguo Feng and
Bin Hu and
Jie Guan and
Kai Zhang and
Tairong Shi New method for combining Matsui's
bounding conditions with sequential
encoding method . . . . . . . . . . . . 3603--3642
Shamil Asgarli and
Dragos Ghioca and
Chi Hoi Yip Plane curves giving rise to blocking
sets over finite fields . . . . . . . . 3643--3669
Magali Bardet and
Pierre Briaud and
Maxime Bros and
Philippe Gaborit and
Jean-Pierre Tillich Revisiting algebraic attacks on MinRank
and on the rank decoding problem . . . . 3671--3707
Shizhu Tian and
Yitong Liu and
Xiangyong Zeng A further study on bridge structures and
constructing bijective S-boxes for
low-latency masking . . . . . . . . . . 3709--3739
Jingjun Bao Constructions of column-orthogonal
strong orthogonal arrays via matchings
of bipartite graphs . . . . . . . . . . 3741--3755
Yanwei Zhou and
Bo Yang and
Zirui Qiao and
Zhe Xia and
Mingwu Zhang and
Yi Mu Leakage-resilient identity-based
cryptography from minimal assumptions 3757--3801
Jinzheng Cao and
Jian Weng and
Yanbin Pan and
Qingfeng Cheng Generalized attack on ECDSA: known bits
in arbitrary positions . . . . . . . . . 3803--3823
Xuan Pang and
Xiaoqin Zhan Block-transitive 3-$ (v, 4, \lambda) $
designs with sporadic or alternating
socle . . . . . . . . . . . . . . . . . 3825--3835
Subhabrata Samajder and
Palash Sarkar Another look at key randomisation
hypotheses . . . . . . . . . . . . . . . 3837--3855
Somayyeh Golalizadeh and
Nasrin Soltankhah On the fourth weight of generalized
Reed--Muller codes . . . . . . . . . . . 3857--3879
Xiaofeng Xie and
Tian Tian Structural evaluation of AES-like
ciphers against mixture differential
cryptanalysis . . . . . . . . . . . . . 3881--3899
Hexiang Huang and
Qing Xiang Construction of storage codes of rate
approaching one on triangle-free graphs 3901--3913
Kazumasa Shinagawa and
Reo Eriguchi and
Shohei Satake and
Koji Nuida Private simultaneous messages based on
quadratic residues . . . . . . . . . . . 3915--3932
Binbin Pang and
Shixin Zhu and
Tian Yang and
Jun Gao BCH codes with larger dimensional hull 3933--3951
Ziling Heng and
Dexiang Li and
Fenjin Liu Ternary self-orthogonal codes from
weakly regular bent functions and their
application in LCD codes . . . . . . . . 3953--3976
Shuangqing Liu Optimal Ferrers diagram rank-metric
codes from MRD codes . . . . . . . . . . 3977--3993
José Gómez-Torrecillas and
F. J. Lobillo and
Gabriel Navarro Skew differential Goppa codes and their
application to Mceliece cryptosystem . . 3995--4017
Haider Al Kim and
Sven Puchinger and
Ludo Tolhuizen and
Antonia Wachter-Zeh Coding and bounds for partially
defective memory cells . . . . . . . . . 4019--4058
Haetham Al Aswad and
Cécile Pierrot Individual discrete logarithm with
sublattice reduction . . . . . . . . . . 4059--4091
Yeow Meng Chee and
Alan Chi Hung Ling and
Van Khu Vu and
Hui Zhang Scheduling to reduce close contacts:
resolvable grid graph decomposition and
packing . . . . . . . . . . . . . . . . 4093--4106
Qiang Li and
Qun-xiong Zheng and
Wen-feng Qi Practical attacks on small private
exponent RSA: new records and new
insights . . . . . . . . . . . . . . . . 4107--4142
Hongwei Liu and
Shengwei Liu A class of constacyclic codes are
generalized Reed--Solomon codes . . . . 4143--4151
Hai Liu and
Chengju Li and
Haifeng Qian Parameters of several families of binary
duadic codes and their related codes . . 1--12
Arghya Bhattacharjee and
Ritam Bhaumik and
Avijit Dutta and
Mridul Nandi and
Anik Raychaudhuri BBB security for 5-round
even-Mansour-based key-alternating
Feistel ciphers . . . . . . . . . . . . 13--49
Jiaxin Pan and
Chen Qian and
Benedikt Wagner Generic constructions of master-key KDM
secure attribute-based encryption . . . 51--92
Kris Coolsaet Nonsingular hypercubes and
nonintersecting hyperboloids . . . . . . 93--112
Aleksandr Kutsenko Decomposing self-dual bent functions . . 113--144
Vidya Sagar and
Ritumoni Sarma Minimal and optimal binary codes
obtained using $ C_D $-construction over
the non-unital ring I . . . . . . . . . 145--157
Orr Dunkelman and
Nathan Keller and
Eyal Ronen and
Adi Shamir Quantum time/memory/data tradeoff
attacks . . . . . . . . . . . . . . . . 159--177
Michela Ceria and
Teo Mora Towards a Gröbner-free approach to coding 179--204
Alexander L. Gavrilyuk and
Sho Suda Uniqueness of an association scheme
related to the Witt design on 11 points 205--209
Boyi He and
Qunying Liao The properties and the error-correcting
pair for lengthened GRS codes . . . . . 211--225
S. Hodzi\'c and
A. Roy and
E. Andreeva Quantum cryptanalysis of Farfalle and
(generalised) key-alternating Feistel
networks . . . . . . . . . . . . . . . . 227--257
Ziwei Lu and
Shenglin Zhou Flag-transitive symmetric 2-designs of
prime order . . . . . . . . . . . . . . 259--266
Danyao Wu and
Pingzhi Yuan Permutation polynomials and their
compositional inverses over finite
fields by a local method . . . . . . . . 267--276
Kota Takahashi and
Keitaro Hashimoto and
Wakaha Ogata Chosen-ciphertext secure code-based
threshold public key encryptions with
short ciphertext . . . . . . . . . . . . 277--301
Monika Yadav and
Anuradha Sharma Construction and enumeration of
self-orthogonal and self-dual codes over
Galois rings of even characteristic . . 303--339
Wen Ma and
Jinquan Luo Codes with respect to weighted poset
block metric . . . . . . . . . . . . . . 341--363
Xiaowei Su and
Zihong Tian and
Guohui Hao Determination of the sizes of optimal
geometric orthogonal codes with
parameters $ (n \times m, k, \lambda, k
- 1) $ . . . . . . . . . . . . . . . . . 365--395
Cuiling Fan and
An Wang and
Li Xu New classes of NMDS codes with dimension
3 . . . . . . . . . . . . . . . . . . . 397--418
Diane M. Donovan and
Mike J. Grannell and
Emine Sule Yazici On maximal partial Latin hypercubes . . 419--433
Hannes Bartz and
Thomas Jerkovits and
Johan Rosenkilde Fast Kötter--Nielsen--Hòholdt
interpolation over skew polynomial rings
and its application in coding theory . . 435--465
Nikolay Kolomeec and
Denis Bykov On the image of an affine subspace under
the inverse function within a finite
field . . . . . . . . . . . . . . . . . 467--476
Mahir Bilen Can and
Roy Joshua and
G. V. Ravindra Defects of codes from higher dimensional
algebraic varieties . . . . . . . . . . 477--494
John Bamberg On the 430-cap of $ {\rm PG}(6, 4) $
having two intersection sizes with
respect to hyperplanes . . . . . . . . . 495--503
Anonymous Editorial Note: Coding and Cryptography
2022 . . . . . . . . . . . . . . . . . . 505--505
Marco Timpanella and
Giovanni Zini On a family of linear MRD codes with
parameters $ [8 \times 8, 16, 7]_q $ . . 507--530
Amar Bapi\'c and
Enes Pasalic and
Alexandr Polujan and
Alexander Pott Vectorial Boolean functions with the
maximum number of bent components beyond
the Nyberg's bound . . . . . . . . . . . 531--552
Felicitas Hörmann and
Hannes Bartz Interpolation-based decoding of folded
variants of linearized and skew
Reed--Solomon codes . . . . . . . . . . 553--586
Agathe Cheriere and
Lina Mortajine and
Tania Richmond and
Nadia El Mrabet Exploiting ROLLO's constant-time
implementations with a single-trace
analysis . . . . . . . . . . . . . . . . 587--608
Anina Gruica and
Anna-Lena Horlemann and
Alberto Ravagnani and
Nadja Willenborg Densities of codes of various linearity
degrees in translation-invariant metric
spaces . . . . . . . . . . . . . . . . . 609--637
V. N. Potapov and
A. A. Taranenko and
Yu. V. Tarannikov An asymptotic lower bound on the number
of bent functions . . . . . . . . . . . 639--651
Selçuk Kavut Modified Patterson--Wiedemann
construction . . . . . . . . . . . . . . 653--666
Cem Güneri and
Ferruh Özbudak and
Selcen Sayici On subfield subcodes obtained from
restricted evaluation codes . . . . . . 667--680
Faruk Göloglu and
Lukas Kölsch Counting the number of non-isotopic
Taniguchi semifields . . . . . . . . . . 681--694
Anna-Maurin Graner and
Gohar M. Kyureghyan Constructing irreducible polynomials
recursively with a reverse composition
method . . . . . . . . . . . . . . . . . 695--708
Rafael Arce and
Carlos Hernández and
José Ortiz and
Ivelisse Rubio and
Jaziel Torres Analysis and computation of
multidimensional linear complexity of
periodic arrays . . . . . . . . . . . . 709--722
Nicolas David and
María Naya-Plasencia and
André Schrottenloher Quantum impossible differential attacks:
applications to AES and SKINNY . . . . . 723--751
Rakhi Pratihar and
Tovohery Hajatiana Randrianarisoa Antipodal two-weight rank metric codes 753--769
Akihiro Munemasa and
Rowena Alma L. Betty Classification of extremal type II $
\mathbb {Z}_4 $-codes of length 24 . . . 771--785
Reza Dastbasteh and
Petr Lisonek New quantum codes from self-dual codes
over $ \mathbb {F}_4 $ . . . . . . . . . 787--801
André Chailloux and
Simona Etinski On the (in)security of optimized
Stern-like signature schemes . . . . . . 803--832
Krijn Reijnders and
Simona Samardjiska and
Monika Trimoska Hardness estimates of the code
equivalence problem in the rank metric 833--862
Suman Dutta and
Subhamoy Maitra Introducing nega-Forrelation: quantum
algorithms in analyzing nega-Hadamard
and nega-crosscorrelation spectra . . . 863--883
Qianqian Yan and
Junling Zhou Mutually disjoint Steiner systems from
BCH codes . . . . . . . . . . . . . . . 885--907
Léo Ducas Provable lattice reduction of $ \mathbb
{Z}^n $ with blocksize $ n / 2 $ . . . . 909--916
Shanxiang Lyu and
Ling Liu and
Cong Ling and
Junzuo Lai and
Hao Chen Lattice codes for lattice-based PKE . . 917--939
Shannon Veitch and
Douglas R. Stinson Unconditionally secure non-malleable
secret sharing and circular external
difference families . . . . . . . . . . 941--956
Jiqiang Lu and
Wenchang Zhou Improved meet-in-the-middle attack on 10
rounds of the AES-256 block cipher . . . 957--973
Moritz Wiese and
Holger Boche $ \varepsilon $-Almost collision-flat
universal hash functions and mosaics of
designs . . . . . . . . . . . . . . . . 975--998
Dipak K. Bhunia and
Cristina Fernández-Córdoba and
Carlos Vela and
Merc\`e Villanueva On the equivalence of $ \mathbb
{Z}_{p^s} $-linear generalized Hadamard
codes . . . . . . . . . . . . . . . . . 999--1022
Sergey Bereg and
Mohammadreza Haghpanah and
Brian Malouf and
I. Hal Sudborough Improved bounds for permutation arrays
under Chebyshev distance . . . . . . . . 1023--1039
Tsuyoshi Miezaki and
Akihiro Munemasa Jacobi polynomials and harmonic weight
enumerators of the first-order
Reed--Muller codes and the extended
Hamming codes . . . . . . . . . . . . . 1041--1049
Deng-Ming Xu and
Gang Wang and
Sihem Mesnager and
You Gao and
Fang-Wei Fu Jacobi sums over Galois rings of
arbitrary characters and their
applications in constructing
asymptotically optimal codebooks . . . . 1051--1073
Nicolas Aragon and
Victor Dyseryn and
Philippe Gaborit and
Pierre Loidreau and
Julian Renner and
Antonia Wachter-Zeh LowMS: a new rank metric code-based KEM
without ideal structure . . . . . . . . 1075--1093
Guangkui Xu and
Gaojun Luo and
Xiwang Cao and
Heqian Xu Hulls of linear codes from simplex codes 1095--1112
José Alves Oliveira and
F. E. Brochero Martínez Dynamics of polynomial maps over finite
fields . . . . . . . . . . . . . . . . . 1113--1125
Elena Kirshanova and
Ekaterina Malygina Construction-D lattice from
Garcia--Stichtenoth tower code . . . . . 1127--1142
Cícero Carvalho and
Hiram H. López and
Gretchen L. Matthews Decreasing norm-trace codes . . . . . . 1143--1161
Xiaojing Chen and
Xingbo Lu and
Shixin Zhu and
Wan Jiang and
Xindi Wang New entanglement-assisted quantum
error-correcting codes from negacyclic
codes . . . . . . . . . . . . . . . . . 1163--1174
Lei Zhang Observations on the branch number and
differential analysis of SPEEDY . . . . 1175--1199
Mesut Sahin and
Oguz Yayla Codes on subgroups of weighted
projective tori . . . . . . . . . . . . 1201--1218
Alonso S. Castellanos and
Erik A. R. Mendoza and
Luciane Quoos Weierstrass semigroups, pure gaps and
codes on function fields . . . . . . . . 1219--1242
Sara Ban and
Sanja Rukavina Construction of self-orthogonal $
\mathbb {Z}_{2^k} $-codes . . . . . . . 1243--1250
Wenqin Zhang and
Yuan Luo and
Lele Wang Optimal binary and ternary locally
repairable codes with minimum distance 6 1251--1265
Kenji Yasunaga Improved bounds for codes correcting
insertions and deletions . . . . . . . . 1267--1278
Thomas Britz and
Himadri Shekhar Chakraborty and
Reina Ishikawa and
Tsuyoshi Miezaki and
Hopein Christofen Tang Harmonic Tutte polynomials of matroids
II . . . . . . . . . . . . . . . . . . . 1279--1297
Lidija Stanovnik and
Miha Moskon and
Miha Mraz In search of maximum non-overlapping
codes . . . . . . . . . . . . . . . . . 1299--1326
Ruikai Chen and
Sihem Mesnager On a class of permutation rational
functions involving trace maps . . . . . 1327--1339
Semira Einsele and
Kenneth Paterson Average case error estimates of the
strong Lucas test . . . . . . . . . . . 1341--1378
Alexander L. Gavrilyuk and
Vladislav V. Kabanov Strongly regular graphs decomposable
into a divisible design graph and a
Hoffman coclique . . . . . . . . . . . . 1379--1391
Jan Schoone and
Joan Daemen The state diagram of $ \chi $ . . . . . 1393--1421
Yun Li and
Hongwei Liu and
Sihem Mesnager New constructions of constant dimension
subspace codes with large sizes . . . . 1423--1437
Matthew Kreitzer and
Mihai Nica and
Rajesh Pereira Using alternating de Bruijn sequences to
construct de Bruijn tori . . . . . . . . 1439--1454
Xiaoni Du and
René Rodríguez and
Hao Wu Infinite families of minimal binary
codes via Krawtchouk polynomials . . . . 1455--1475
Yi-Fan Tseng and
Zi-Yuan Liu and
Raylin Tso Predicate encryption with
selective-opening security for
receivers: formal definition, generic
construction, and concrete
instantiations for several primitives 1477--1500
Laura Monroe Optimal binary signed-digit
representations of integers and the
Stern polynomial . . . . . . . . . . . . 1501--1516
Zhaoping Meng and
Qingling Gao and
Zhanggui Wu A recursive construction of doubly
resolvable Steiner quadruple systems . . 1517--1531
Haode Yan and
Yanan Yin On the parameters of extended primitive
cyclic codes and the related designs . . 1533--1540
Qiqi Lai and
Feng-Hao Liu and
Zhedong Wang Leakage-resilient \textsfIBE/ABE with
optimal leakage rates from lattices . . 1541--1597
Adam Michael Roberts Self-dual codes from a block matrix
construction characterised by group
rings . . . . . . . . . . . . . . . . . 1599--1617
Kanchan Singh and
Ritesh Kumar Pathak and
Sheo Kumar Singh Linear codes associated to determinantal
varieties in the space of Hermitian
matrices . . . . . . . . . . . . . . . . 1619--1635
Chun Guo and
Yiyuan Luo and
Chenyu Xiao On the sequential indifferentiability of
the Lai--Massey construction . . . . . . 1637--1661
Xinxin Gong and
Yonglin Hao and
Qingju Wang Combining MILP modeling with algebraic
bias evaluation for linear mask search:
improved fast correlation attacks on
SNOW . . . . . . . . . . . . . . . . . . 1663--1728
Yu-Chi Chen A conceptually simple and generic
construction of plaintext checkable
encryption in the standard model . . . . 1729--1746
Alexander M. Romanov Perfect mixed codes from generalized
Reed--Muller codes . . . . . . . . . . . 1747--1759
S. Kunzweiler Efficient computation of $ (2^n,
2^n)$-isogenies . . . . . . . . . . . . 1761--1802
Angelot Behajaina and
Martino Borello and
Javier de la Cruz and
Wolfgang Willems Twisted skew $G$-codes . . . . . . . . . 1803--1821
Kaizhan Lin and
Jianming Lin and
Shiping Cai and
Weize Wang and
Chang-An Zhao Compressed M-SIDH: an instance of
compressed SIDH-like schemes with
isogenies of highly composite degrees 1823--1843
Hao Chen Large Hermitian hull GRS codes of any
given length . . . . . . . . . . . . . . 1845--1853
Hongna Yang and
Yiwei Wang and
Yiwei Zhang Extremal regular graphs and hypergraphs
related to fractional repetition codes 1855--1878
Liqin Qian and
Xiwang Cao and
Xia Wu and
Wei Lu MDS codes with $l$-Galois hulls of
arbitrary dimensions . . . . . . . . . . 1879--1902
Delphine Boucher and
Kayodé Epiphane Nouetowa Some constructions and existence
conditions for Hermitian self-dual skew
codes . . . . . . . . . . . . . . . . . 1903--1924
Tran Viet Xuan Phuong Anonymous attribute-based broadcast
encryption with hidden multiple access
structures . . . . . . . . . . . . . . . 1925--1945
Ebru Adiguzel-Goktas and
Enver Ozdemir Square root computation in finite fields 1947--1959
Giuseppe D'Alconzo Monomial isomorphism for tensors and
applications to code equivalence
problems . . . . . . . . . . . . . . . . 1961--1982
Benjamin Fuller Impossibility of efficient
information-theoretic fuzzy extraction 1983--2009
Rongsheng Wu and
Xiande Zhang Balanced reconstruction codes for single
edits . . . . . . . . . . . . . . . . . 2011--2029
Chunyu Gan and
Chengju Li and
Haifeng Qian and
Xueying Shi On Bose distance of a class of BCH codes
with two types of designed distances . . 2031--2053
Yuxin Tong and
Xiang Xie and
Kang Yang and
Rui Zhang and
Rui Xue Efficient secure multi-party computation
for proof of custody in Ethereum
sharding . . . . . . . . . . . . . . . . 2055--2083
Zhonghua Sun and
Xinyue Liu and
Shixin Zhu and
Yongsheng Tang Negacyclic BCH codes of length $ \frac
{q^{2m} - 1}{q + 1} $ and their duals 2085--2101
Chun Guo and
Ling Song CCA security for contracting
(quasi-)Feistel constructions with tight
round complexity . . . . . . . . . . . . 2103--2129
Slim Bettaieb and
Lo\"\ic Bidoux and
Victor Dyseryn and
Andre Esser and
Philippe Gaborit and
Mukul Kulkarni and
Marco Palumbi PERK: compact signature scheme based on
a new variant of the permuted kernel
problem . . . . . . . . . . . . . . . . 2131--2157
Ka Hin Leung and
Bernhard Schmidt and
Tao Zhang Classification of semiregular relative
difference sets with $ \gcd (\lambda, n)
= 1 $ attaining Turyn's bound . . . . . 2159--2182
Giusy Monzillo and
Tim Penttila and
Alessandro Siciliano Classifying pseudo-ovals, translation
generalized quadrangles, and elation
Laguerre planes of small order . . . . . 2183--2196
Seungjun Baek and
Giyoon Kim and
Jongsung Kim Preimage attacks on reduced-round
Ascon--Xof . . . . . . . . . . . . . . . 2197--2217
Cong Yu and
Shixin Zhu and
Fuyin Tian Construction of quantum codes from
multivariate polynomial rings . . . . . 2219--2234
Shuangqing Liu and
Lijun Ji Combinatorial constructions of optimal
low-power error-correcting cooling codes 2235--2252
Geyang Wang and
Qi Wang On the size distribution of the
fixed-length Levenshtein balls with
radius one . . . . . . . . . . . . . . . 2253--2265
Juanjuan Xu and
Lijun Ji Special overlarge sets of Kirkman triple
systems . . . . . . . . . . . . . . . . 2267--2285
Daniele Bartoli and
Nicola Durante and
Giovanni Giuseppe Grimaldi Ovoids of $ Q(6, q) $ of low degree . . 2287--2306
Ryosuke Yamaguchi Jacobi polynomials for the first-order
generalized Reed--Muller codes . . . . . 2307--2321
Zhiwen He and
Tingting Chen and
Gennian Ge New constructions of signed difference
sets . . . . . . . . . . . . . . . . . . 2323--2340
Jan Schoone and
Joan Daemen Algebraic properties of the maps $
\chi_n $ . . . . . . . . . . . . . . . . 2341--2365
Sascha Kurz Lengths of divisible codes: the missing
cases . . . . . . . . . . . . . . . . . 2367--2378
Hannes Bartz and
Sven Puchinger Fast decoding of lifted interleaved
linearized Reed--Solomon codes for
multishot network coding . . . . . . . . 2379--2421
Xiaoli Dong and
Jun Liu and
Yongzhuang Wei and
Wen Gao and
Jie Chen Meet-in-the-middle attacks on AES with
value constraints . . . . . . . . . . . 2423--2449
Sam Adriaensen and
Lins Denaux Small weight codewords of projective
geometric codes II . . . . . . . . . . . 2451--2472
Bo Yang and
Kangkang He and
Xiangyong Zeng and
Zibi Xiao Symmetric 2-adic complexity of
Tang--Gong interleaved sequences from
generalized GMW sequence pair . . . . . 2473--2489
Carmen Amarra and
Alice Devillers and
Cheryl E. Praeger Chain-imprimitive, flag-transitive
2-designs . . . . . . . . . . . . . . . 2491--2510
Santiago Barrera Acevedo and
Heiko Dietrich and
Corey Lionis New families of quaternionic Hadamard
matrices . . . . . . . . . . . . . . . . 2511--2525
Alexander A. Davydov and
Stefano Marcugini and
Fernanda Pambianco Further results on covering codes with
radius $R$ and codimension $ t R + 1 $ 2527--2548
C. Galindo and
F. Hernando and
H. Martín-Cruz Optimal $ (r, \delta)$-LRCs from
monomial-Cartesian codes and their
subfield-subcodes . . . . . . . . . . . 2549--2586
Gergely Kiss and
Gábor Somlai Special directions on the finite affine
plane . . . . . . . . . . . . . . . . . 2587--2597
Xiaomeng Wang and
Lina Wei and
Shou-Jun Xu and
Sanming Zhou Subgroup total perfect codes in Cayley
sum graphs . . . . . . . . . . . . . . . 2599--2613
Mikhail Muzychuk and
Grigory Ryabov Constructing linked systems of relative
difference sets via Schur rings . . . . 2615--2637
Enes Pasalic and
Amar Bapi\'c and
Fengrong Zhang and
Yongzhuang Wei Using $ P_\tau $ property for designing
bent functions provably outside the
completed Maiorana--McFarland class . . 2639--2654
Le Dong and
Danxun Zhang and
Wenya Li and
Wenling Wu Yoyo attack on 4-round Lai--Massey
scheme with secret round functions . . . 2655--2684
Jie Hao and
Shu-Tao Xia and
Kenneth W. Shum and
Bin Chen and
Fang-Wei Fu and
Yixian Yang Optimal ternary locally repairable codes 2685--2704
Ang Xiao and
Yue Zhou On the packing density of Lee spheres 2705--2729
Jong Yoon Hyun and
Jungyun Lee and
Yoonjin Lee Characterization of weakly regular
$p$-ary bent functions of $ \ell $-form 2731--2741
María Chara and
Ricardo Podestá and
Luciane Quoos and
Ricardo Toledano Lifting iso-dual algebraic geometry
codes . . . . . . . . . . . . . . . . . 2743--2767
Song Tian Computing gluing and splitting $ (\ell,
\ell) $-isogenies . . . . . . . . . . . 2769--2789
Hadi Kharaghani and
Thomas Pender and
Vladimir Tonchev On optimal constant weight codes derived
from $ \omega $-circulant balanced
generalized weighing matrices . . . . . 2791--2799
Elena Berardini and
Alessio Caminata and
Alberto Ravagnani Structure of CSS and CSS-T quantum codes 2801--2823
Muhammad Imran and
Gábor Ivanyos Efficient quantum algorithms for some
instances of the semidirect discrete
logarithm problem . . . . . . . . . . . 2825--2843
Wenjun Yu and
Moshe Schwartz On duplication-free codes for disjoint
or equal-length errors . . . . . . . . . 2845--2861
Joanne Hall and
Daniel Horsley and
Douglas R. Stinson Bounds on data limits for all-to-all
comparison from combinatorial designs 2863--2879
Rajendra Prasad Rajpurohit and
Maheshanand Bhaintwal and
Charul Rajput Locally maximal recoverable codes and
LMR--LCD codes . . . . . . . . . . . . . 2881--2899
Xinran Wang and
Ziling Heng and
Fengwei Li and
Qin Yue LCD codes and almost optimally
extendable codes from self-orthogonal
codes . . . . . . . . . . . . . . . . . 2901--2926
Masaaki Harada A method for constructing quaternary
Hermitian self-dual codes and an
application to quantum codes . . . . . . 2927--2948
Jing Jiang and
Fenggui Pei and
Cailin Wen and
Minquan Cheng and
Henk D. L. Hollmann Constructions of $t$-strongly multimedia
IPP codes with length $ t + 1 $ . . . . 2949--2970
Jing Qiu and
Fang-Wei Fu Some new constructions of optimal linear
codes and alphabet-optimal $ (r, \delta)
$-locally repairable codes . . . . . . . 2971--2991
Hongwei Liu and
Zihao Yu Linear codes from simplicial complexes
over $ \mathbb {F}_{2^n} $ . . . . . . . 2993--3016
Yupeng Jiang and
Ming Li and
Ying Gao and
Dongdai Lin On prefer-one sequences . . . . . . . . 3017--3032
Horacio Navarro Bases for Riemann--Roch spaces of
linearized function fields with
applications to generalized algebraic
geometry codes . . . . . . . . . . . . . 3033--3048
Makoto Araya and
Masaaki Harada and
Hadi Kharaghani and
Ali Mohammadian and
Behruz Tayfeh-Rezaie On the classification of skew Hadamard
matrices of order $ \varvec {36} $ and
related structures . . . . . . . . . . . 3049--3062
Xiaoshan Quan and
Qin Yue and
Fuqing Sun Hulls of cyclic codes with respect to
the regular permutation inner product 3063--3083
Sven Schäge \textsfTOPAS 2-pass key exchange with
full perfect forward secrecy and optimal
communication complexity . . . . . . . . 3085--3124
Stefan Steinerberger A note on approximate Hadamard matrices 3125--3131
F. E. Brochero Martínez and
Daniela Oliveira On the number of rational points of
Artin--Schreier's curves and
hypersurfaces . . . . . . . . . . . . . 3133--3154
Pratish Datta and
Tapas Pal and
Katsuyuki Takashima Compact FE for unbounded
attribute-weighted sums for logspace
from SXDH . . . . . . . . . . . . . . . 3155--3235
Jin Li and
Huilian Zhu and
Shan Huang Some constacyclic BCH codes with good
parameters . . . . . . . . . . . . . . . 3237--3259
Wonseok Choi and
Seongha Hwang and
Byeonghak Lee and
Jooyoung Lee ZLR: a fast online authenticated
encryption scheme achieving full
security . . . . . . . . . . . . . . . . 3261--3316
Manuel González-Sarabia and
Humberto Muñoz-George and
Jorge A. Ordaz and
Eduardo Sáenz-de-Cabezón and
Rafael H. Villarreal Indicator functions, $v$-numbers and
Gorenstein rings in the theory of
projective Reed--Muller-type codes . . . 3317--3353
F. R. Kschischang and
F. Manganiello and
A. Ravagnani and
K. Savary External codes for multiple unicast
networks via interference alignment . . 3355--3369
Jürgen Bierbrauer and
Stefano Marcugini and
Fernanda Pambianco An asymptotic property of quaternary
additive codes . . . . . . . . . . . . . 3371--3375
Huawei Wu and
Jing Yang and
Keqin Feng Circular external difference families:
construction and non-existence . . . . . 3377--3390
Isaac A. Canales-Martínez and
Igor Semaev Multivariate correlation attacks and the
cryptanalysis of LFSR-based stream
ciphers . . . . . . . . . . . . . . . . 3391--3427
Xinyue Ming and
Tao Feng and
Guojing Jia and
Xiaomiao Wang The existence of $ (\mathbb {Z}_v, 4, 1)
$-disjoint difference families . . . . . 3429--3446
Sarah Arpin and
James Clements and
Pierrick Dartois and
Jonathan Komada Eriksen and
Péter Kutas and
Benjamin Wesolowski Finding orientations of supersingular
elliptic curves and quaternion orders 3447--3493
Somi Gupta and
Francesco Pavese Affine vector space partitions and
spreads of quadrics . . . . . . . . . . 3495--3502
Tran van Trung Constructions for $t$-designs and
$s$-resolvable $t$-designs . . . . . . . 3503--3514
Woohyuk Chung and
Hwigyeom Kim and
Jooyoung Lee and
Yeongmin Lee Security analysis of the ISO standard
OFB--DRBG . . . . . . . . . . . . . . . 3515--3532
Xu Pan and
Hao Chen and
Hongwei Liu Some self-dual codes and isodual codes
constructed by matrix product codes . . 3533--3559
Marco Buratti and
Anamari Naki\'c Additivity of symmetric and subspace
2-designs . . . . . . . . . . . . . . . 3561--3572
Dongchun Han and
Hanbin Zhang Explicit constructions of NMDS self-dual
codes . . . . . . . . . . . . . . . . . 3573--3585
Shuichi Katsumata and
Yi-Fu Lai and
Jason T. LeGrow and
Ling Qin CSI-Otter: isogeny-based (partially)
blind signatures from the class group
action with a twist . . . . . . . . . . 3587--3643
Gretchen L. Matthews and
Travis Morrison and
Aidan W. Murphy Curve-lifted codes for local recovery
using lines . . . . . . . . . . . . . . 3645--3664
Sergey Goryainov and
Elena V. Konstantinova Non-canonical maximum cliques without a
design structure in the block graphs of
2-designs . . . . . . . . . . . . . . . 3665--3675
Héctor Masip-Ardevol and
Jordi Baylina-Melé and
Marc Guzmán-Albiol and
Jose Luis Muñoz-Tapia eSTARK: extending STARKs with arguments 3677--3721
Yang Li and
Shitao Li and
Shixin Zhu New and improved formally self-dual
codes with small hulls from polynomial
four Toeplitz codes . . . . . . . . . . 3723--3751
Bolin Wang and
Wenling Wu Security analysis of P-SPN schemes
against invariant subspace attack with
inactive S-boxes . . . . . . . . . . . . 3753--3782
Lei Li and
Xinchun Yu and
Chenhao Ying and
Liang Chen and
Yuanyuan Dong and
Yuan Luo MDS array codes with efficient repair
and small sub-packetization level . . . 3783--3798
Shuhui Yu and
Lijun Ji Two new constructions of cyclic subspace
codes via Sidon spaces . . . . . . . . . 3799--3811
Yin Lv and
Danping Shi and
Lei Hu and
Yi Guo Utilizing FWT in linear cryptanalysis of
block ciphers with various structures 3813--3842
Huawei Huang and
Changgen Peng and
Lunzhi Deng Cryptanalysis of a key exchange protocol
based on a modified tropical structure 3843--3858
Yi Li and
Xiutao Feng and
Qiang Wang Towards a classification of permutation
binomials of the form $ x^i + a x $ over
$ \mathbb {F}_{2^n} $ . . . . . . . . . 3859--3875
Haiyan Guan and
Shenglin Zhou Reduction for block-transitive $t$--$
(k^2, k, \lambda) $ designs . . . . . . 3877--3894
Shi Bai and
Hansraj Jangir and
Tran Ngo and
William Youmans An algebraic algorithm for breaking NTRU
with multiple keys . . . . . . . . . . . 3895--3918
Jinrui Sha and
Shengli Liu and
Shuai Han Functional commitments for arbitrary
circuits of bounded sizes . . . . . . . 3919--3953
Yuan Gao and
Weijun Fang and
Jingke Xu and
Dong Wang and
Sihuang Hu Optimal $ (2, \delta) $ locally
repairable codes via punctured simplex
codes . . . . . . . . . . . . . . . . . 3955--3979
Ferruh Özbudak and
Buket Özkaya New distance bounds for quasi-cyclic
codes . . . . . . . . . . . . . . . . . 3981--4009
Deepak Agrawal and
Srinivasan Krishnaswamy and
Smarajit Das On Boolean functions derived from linear
maps over $ \mathbb {Z}_4 $ and their
application to secret sharing . . . . . 4011--4033
Noy Soffer Aranov and
Angelot Behajaina On the maximum size of ultrametric
orthogonal sets over discrete valued
fields . . . . . . . . . . . . . . . . . 4035--4055
Robert Christian Subroto An algebraic approach to circulant
column parity mixers . . . . . . . . . . 4057--4083
Melek Çil and
Baris Bülent Kirlar On the construction of certain odd
degree irreducible polynomials over
finite fields . . . . . . . . . . . . . 4085--4097
Feixiang Zhao and
Jian Weng and
Wenli Xie and
Lin Hou and
Ming Li Time-based attribute-based proxy
re-encryption with decryption key update 4099--4129
Simon Masson and
Antonio Sanso and
Zhenfei Zhang Bandersnatch: a fast elliptic curve
built over the BLS12-381 scalar field 4131--4143
Alexander Barg and
Ohad Elishco and
Ryan Gabrys and
Geyang Wang and
Eitan Yaakobi Storage codes and recoverable systems on
lines and grids . . . . . . . . . . . . 4145--4168
Yiwen Gao and
Yuan Li and
Haibin Kan On the uniqueness of balanced complex
orthogonal design . . . . . . . . . . . 4169--4187
Zoltán Füredi and
Alexandr Kostochka and
Mohit Kumbhat Minimal abundant packings and
choosability with separation . . . . . . 4189--4194
Nicola Durante and
Giovanni Giuseppe Grimaldi and
Giovanni Longobardi Non-linear MRD codes from cones over
exterior sets . . . . . . . . . . . . . 4195--4211
Bingsheng Shen and
Tao Yu and
Zhengchun Zhou and
Yang Yang Asymptotically optimal aperiodic
quasi-complementary sequence sets based
on extended Boolean functions . . . . . 4213--4230
Ajani De Vas Gunasekara and
Alice Devillers Transitive path decompositions of
Cartesian products of complete graphs 4231--4245
Birenjith Sasidharan and
Emanuele Viterbo and
Son Hoang Dau Binary cyclic-gap constant weight codes
with low-complexity encoding and
decoding . . . . . . . . . . . . . . . . 4247--4277
Zhiguo Ding and
Michael E. Zieve Two classes of exceptional $m$-to-1
rational functions . . . . . . . . . . . 4279--4285
Yingyin Pan and
Jianghua Zhong and
Dongdai Lin Generalized cycle joining method and its
application to the construction of
long-period Galois NFSRs . . . . . . . . 4287--4311
Ákos K. Matszangosz and
Ferenc Szöll\Hosi A characterization of complex Hadamard
matrices appearing in families of MUB
triplets . . . . . . . . . . . . . . . . 4313--4333
Rong Luo and
Mingliang Yan and
Sihem Mesnager and
Dongchun Han On Abelian one-dimensional hull codes in
group algebras . . . . . . . . . . . . . 4335--4352
Yadi Wei and
Jiaxin Wang and
Fang-Wei Fu Association schemes arising from
non-weakly regular bent functions . . . 4353--4422
Kazuhiko Minematsu and
Shingo Sato and
Junji Shikata Interactive aggregate message
authentication equipped with detecting
functionality from adaptive group
testing . . . . . . . . . . . . . . . . 4423--4451
Shuping Mao and
Tingting Guo and
Peng Wang and
Ruozhou Xu and
Yuchao Chen and
Lei Hu A quantum-secure partial parallel MAC
QPCBC . . . . . . . . . . . . . . . . . 4453--4486
Guangkui Xu and
Xiwang Cao and
Gaojun Luo and
Huawei Wu Infinite families of 3-designs from
special symmetric polynomials . . . . . 4487--4509
Carlos Aguilar-Melchor and
Nicolas Aragon and
Jean-Christophe Deneuville and
Philippe Gaborit and
Jérôme Lacan and
Gilles Zémor Efficient error-correcting codes for the
HQC post-quantum cryptosystem . . . . . 4511--4530
Shuyu Luo and
Weiqiong Wang and
Qi Zhang and
Zhenjie Song Constructions of plateaued correctors
with high correction order and good
nonlinearity via Walsh spectral
neutralization technique . . . . . . . . 4531--4548
Zahra Ahmadian and
Akram Khalesi and
Dounia M'foukh and
Hossein Moghimi and
María Naya-Plasencia Truncated differential cryptanalysis:
new insights and application to
QARMAv1-$n$ and QARMAv2-64 . . . . . . . 4549--4591
Vassili C. Mavron and
Harold N. Ward Designer of codes: a tribute to Jennifer
Key . . . . . . . . . . . . . . . . . . 1--10
Xiang Wang and
Fang-Wei Fu and
Elena V. Konstantinova The sequence reconstruction of
permutations with Hamming metric . . . . 11--37
Christof Beierle Revisiting products of the form $X$
times a linearized polynomial $ L(X)$ 39--50
Chin Hei Chan and
Fang-Wei Fu and
Maosheng Xiong Decoding error probability of random
parity-check matrix ensemble over the
erasure channel . . . . . . . . . . . . 51--77
Reza Dastbasteh and
Farzad Padashnick and
Pedro M. Crespo and
Markus Grassl and
Javad Sharafi Equivalence of constacyclic codes with
shift constants of different orders . . 79--93
Cain Álvarez-García and
Carlos Alberto Castillo-Guillén and
Mohamed Badaoui and
Andriy Kryvko DNA codes over groups . . . . . . . . . 95--110
Kathryn Haymaker and
Beth Malmskog and
Gretchen Matthews Algebraic hierarchical locally
recoverable codes with nested affine
subspace recovery . . . . . . . . . . . 111--132
Sahiba Suryawanshi and
Shibam Ghosh and
Dhiman Saha and
Prathamesh Ram Simple vs. vectorial: exploiting
structural symmetry to beat the ZeroSum
distinguisher . . . . . . . . . . . . . 133--174
Simeon Ball and
Michel Lavrauw and
Tabriz Popatia Griesmer type bounds for additive codes
over finite fields, integral and
fractional MDS codes . . . . . . . . . . 175--196
Xiaoqin Hong and
Xiwang Cao and
Gaojun Luo Generalized bilateral multilevel
construction for constant dimension
codes . . . . . . . . . . . . . . . . . 197--225
Xianmang He and
Zusheng Zhang and
Si Tian and
Jingli Wang and
Yindong Chen Parallel construction for constant
dimension codes from mixed dimension
construction . . . . . . . . . . . . . . 227--241
Sabyasachi Dey and
Gregor Leander and
Nitin Kumar Sharma Improved key recovery attacks on
reduced-round Salsa20 . . . . . . . . . 243--262
Tran van Trung Retraction Note: Constructions for
$t$-designs and $s$-resolvable
$t$-designs . . . . . . . . . . . . . . 263--263
Ilaria Cardinali and
Michel Lavrauw and
Klaus Metsch and
Alexander Pott Finite geometries . . . . . . . . . . . 265--266
Nour Alnajjarine and
Michel Lavrauw A classification of planes intersecting
the Veronese surface over finite fields
of even order . . . . . . . . . . . . . 267--296
Jake Faulkner and
Geertrui Van de Voorde On the equivalence, stabilisers, and
feet of Buekenhout--Tits unitals . . . . 297--307
Kanat Abdukhalikov and
Duy Ho Linear codes from arcs and quadrics . . 309--329
John Bamberg and
Yuval Filmus and
Ferdinand Ihringer and
Sascha Kurz Affine vector space partitions . . . . . 331--357
Sascha Kurz and
Ivan Landjev and
Francesco Pavese and
Assia Rousseva The geometry of $ (t \bmod q) $-arcs . . 359--372
Ivan Landjev and
Emiliyan Rogachev Sperner's theorem for non-free modules
over finite chain rings . . . . . . . . 373--390
Bart De Bruyn Families of quadratic sets on the Klein
quadric . . . . . . . . . . . . . . . . 391--407
Sascha Kurz Capacity of an infinite family of
networks related to the diamond network
for fixed alphabet sizes . . . . . . . . 409--421
Máté Gyarmati and
Péter Ligeti and
Peter Sziklai and
Marcella Takáts Conjunctive hierarchical secret sharing
by finite geometry . . . . . . . . . . . 423--428
Kevin Allen and
John Sheekey On translation hyperovals in semifield
planes . . . . . . . . . . . . . . . . . 429--442
Sihong Su and
Xiaoyan Chen A new method of constructing $ (k + s)
$-variable bent functions based on a
family of $s$-plateaued functions on $k$
variables . . . . . . . . . . . . . . . 443--465
Andrea Di Giusto and
Chiara Marcolla Breaking the power-of-two barrier: noise
estimation for BGV in NTT-friendly rings 467--502
Zhedong Wang and
Qiqi Lai and
Feng-Hao Liu Almost tight security in lattices with
polynomial moduli-PRF, IBE, all-but-many
LTF, and more . . . . . . . . . . . . . 503--551
Yin-Song Xu and
Yi-Bo Luo and
Zheng Yuan and
Xuan Zhou and
Qi-di You and
Fei Gao and
Xiao-Yang Dong Quantum rectangle attack and its
application on Deoxys--BC . . . . . . . 553--590
Lukas Kölsch and
Lucas Krompholz and
Gohar Kyureghyan Factorization and irreducibility of
composed products . . . . . . . . . . . 591--614
Li Xu and
Cuiling Fan and
Chunming Tang and
Zhengchun Zhou Derivative descendants of cyclic codes
and constacyclic codes . . . . . . . . . 615--632
Josline Freed Codes over $ \mathbb {F}_4 $ and $
\mathbb {F}_2 \times \mathbb {F}_2 $ and
theta series of the corresponding
lattices in quadratic fields . . . . . . 633--644
Shikang Yu and
Tao Feng and
Menglong Zhang A pair of orthogonal orthomorphisms of
finite nilpotent groups . . . . . . . . 645--665
Xin Wei and
Xiande Zhang and
Gennian Ge On set systems with strongly restricted
intersections . . . . . . . . . . . . . 667--682
Nathan Kaplan and
Jon-Lark Kim Hulls of projective Reed--Muller codes 683--699
Huck Bennett and
Kaung Myat Htay Win Relating code equivalence to other
isomorphism problems . . . . . . . . . . 701--723
Xingyu Zheng and
Shukai Wang and
Cuiling Fan Optimal combinatorial neural codes via
symmetric designs . . . . . . . . . . . 725--736
Ying Xu and
Xiaoni Du and
Jian Zou Quantum security of Trojan message
attacks on Merkle--Damgård hash
construction . . . . . . . . . . . . . . 737--768
Gaofei Wu and
Zhuohui You and
Zhengbang Zha and
Yuqing Zhang Several new classes of optimal ternary
cyclic codes with two or three zeros . . 769--786
Federico Canale and
María Naya-Plasencia Guessing less and better: improved
attacks on GIFT-64 . . . . . . . . . . . 787--822
Bingsheng Shen and
Tao Yu and
Zhengchun Zhou and
Yang Yang Correction: Asymptotically optimal
aperiodic quasi-complementary sequence
sets based on extended Boolean functions 823--823
Jonathan Jedwab and
Alexander Pott and
Yue Zhou Sequences, codes, and Boolean functions:
in memory of Kai-Uwe Schmidt . . . . . . 825--829
Qiang Wang A survey of compositional inverses of
permutation polynomials over finite
fields . . . . . . . . . . . . . . . . . 831--870
Geyang Wang and
Qi Wang On the maximum size of variable-length
non-overlapping codes . . . . . . . . . 871--878
James A. Davis and
John Polhill and
Ken Smith and
Eric Swartz and
Jordan Webster New Spence difference sets . . . . . . . 879--888
Javier de la Cruz and
Wolfgang Willems Around LCD group codes . . . . . . . . . 889--897
Nurdagül Anbar and
Sadmir Kudin and
Wilfried Meidl and
Enes Pasalic and
Alexandr Polujan Vectorial negabent concepts:
similarities, differences, and
generalizations . . . . . . . . . . . . 899--921
Robert S. Coulter and
Bradley Fain A class of functions and their
application in constructing
semisymmetric designs . . . . . . . . . 923--935
Tor Helleseth and
Chunlei Li and
Yongbo Xia Investigation of the permutation and
linear codes from the Welch APN function 937--959
Lukas Kölsch and
Gohar Kyureghyan The classifications of $o$-monomials and
of 2-to-1 binomials are equivalent . . . 961--970
Charlene Weiß Nontrivial $t$-designs in polar spaces
exist for all $t$ . . . . . . . . . . . 971--981
Ruikai Chen and
Sihem Mesnager Involutions of finite abelian groups
with explicit constructions on finite
fields . . . . . . . . . . . . . . . . . 983--995
Radi Abubaker and
Guang Gong Frequency distance sequences for packet
detection in physical-layer security . . 997--1020
Daniel J. Katz and
Miriam E. Ramirez Moments of autocorrelation demerit
factors of binary sequences . . . . . . 1021--1065
Lilya Budaghyan and
Mohit Pal Arithmetization-oriented APN
permutations . . . . . . . . . . . . . . 1067--1088
Shuxing Li and
Maosheng Xiong Intersection distribution of degree four
polynomials over finite fields . . . . . 1089--1111
Jozefien D'haeseleer and
Ferdinand Ihringer and
Kai-Uwe Schmidt A common generalization of hypercube
partitions and ovoids in polar spaces 1113--1126
John Bamberg and
Michael Giudici and
Jesse Lansdown and
Gordon F. Royle Tactical decompositions in finite polar
spaces and non-spreading classical group
actions . . . . . . . . . . . . . . . . 1127--1141
Michael Kiermaier and
Kai-Uwe Schmidt and
Alfred Wassermann Designs in finite classical polar spaces 1143--1162
Jan De Beule and
Jonathan Mannaert and
Leo Storme On two non-existence results for
Cameron--Liebler $k$-sets in $ {\rm
PG}(n, q) $ . . . . . . . . . . . . . . 1163--1177
Sam Adriaensen and
Maarten De Boeck Association schemes and orthogonality
graphs on anisotropic points of polar
spaces . . . . . . . . . . . . . . . . . 1179--1216
Daniele Bartoli and
Francesco Ghiandoni On 3-dimensional MRD codes of type $
\langle {X^{q^t}, X + \delta }
X^{q^{2t}}, G(X) \rangle $ . . . . . . . 1217--1236
Claude Carlet On the vector subspaces of $ \mathbb
{F}_{2^n} $ over which the
multiplicative inverse function sums to
zero . . . . . . . . . . . . . . . . . . 1237--1254
Gustavo Terra Bastos and
Angelynn Álvarez and
Zachary Flores and
Adriana Salerno A construction of optimal quasi-cyclic
locally recoverable codes using
constituent codes . . . . . . . . . . . 1255--1270
Jicheng Ma and
Guiying Yan On automorphism groups of binary cyclic
codes . . . . . . . . . . . . . . . . . 1271--1282
Prachi Gupta and
P. R. Mishra and
Atul Gaur A class of permutations on $ \mathbb
{Z}_p $ with differential uniformity at
most 3 . . . . . . . . . . . . . . . . . 1283--1293
J. G. Coelho and
F. E. Brochero Martínez Low-weight codewords in cyclic codes . . 1295--1310
Zhonghua Sun and
Xinyue Liu Several families of negacyclic BCH codes
and their duals . . . . . . . . . . . . 1311--1336
Wei Lu and
Qingyao Wang and
Xiaoqiang Wang and
Dabin Zheng The weight hierarchies of three classes
of linear codes . . . . . . . . . . . . 1337--1355
Chunzhi Zhao and
Jinzheng Cao and
Junqi Zhang and
Qingfeng Cheng Fault attacks on multi-prime RSA
signatures . . . . . . . . . . . . . . . 1357--1374
Alonso S. Castellanos and
Erik A. R. Mendoza and
Guilherme Tizziotti The set of pure gaps at several rational
places in function fields . . . . . . . 1375--1400
Bart De Bruyn and
Sergey Goryainov and
Willem H. Haemers and
Leonid Shalaginov Divisible design graphs from the
symplectic graph . . . . . . . . . . . . 1401--1424
Dingding Jia and
Haiyang Xue and
Bao Li Fully selective opening secure IBE from
LWE . . . . . . . . . . . . . . . . . . 1425--1449
Lo\"\ic Bidoux and
Jesús-Javier Chi-Domínguez and
Thibauld Feneuil and
Philippe Gaborit and
Antoine Joux and
Matthieu Rivain and
Adrien Vinçotte RYDE: a digital signature scheme based
on rank syndrome decoding problem with
MPC-in-the-Head paradigm . . . . . . . . 1451--1486
Mohammed El Badry and
Abdelfattah Haily and
Ayoub Mounir On LCD skew group codes . . . . . . . . 1487--1499
Junru Li and
Pengzhen Ke and
Liang Feng Zhang Efficient information-theoretic
distributed point functions with general
output groups . . . . . . . . . . . . . 1501--1530
Siwei Chen and
Kai Hu and
Guozhen Liu and
Zhongfeng Niu and
Quan Quan Tan and
Shichang Wang Meet-in-the-middle attack on
round-reduced SCARF under single
pair-of-tweaks setting . . . . . . . . . 1531--1547
Yongbo Xia and
Chunlei Li and
Tor Helleseth Further investigation on differential
properties of the generalized
Ness--Helleseth function . . . . . . . . ??
Cunsheng Ding and
Zhonghua Sun and
Qianqian Yan The support designs of several families
of lifted linear codes . . . . . . . . . 1549--1573
Giacomo Micheli and
Vincenzo Pallozzi Lavorante and
Phillip Waitkevich Codes from $ A_m $ -invariant
polynomials . . . . . . . . . . . . . . 1575--1595
Lynn Engelberts and
Simona Etinski and
Johanna Loyer Quantum sieving for code-based
cryptanalysis and its limitations for
ISD . . . . . . . . . . . . . . . . . . 1597--1609
Carlos Aguilar-Melchor and
Victor Dyseryn and
Philippe Gaborit Somewhat homomorphic encryption based on
random codes . . . . . . . . . . . . . . 1611--1644
Minjia Shi and
Ruowen Liu and
Andrea Svob Ternary isodual codes and 3-designs . . 1645--1669
Reza Dastbasteh and
Petr Lisonek Additive twisted codes: new distance
bounds and infinite families of quantum
codes . . . . . . . . . . . . . . . . . 1671--1685
Xiang Wang and
Fang-Wei Fu Rate-improved multi-permutation codes
for correcting a single burst of stable
deletions . . . . . . . . . . . . . . . 1687--1724
Bart De Bruyn and
Puspendu Pradhan and
Binod Kumar Sahoo Blocking sets of secant and tangent
lines with respect to a quadric of $
{\rm PG}(n, q) $ . . . . . . . . . . . . 1725--1737
Mark Pankov and
Krzysztof Petelczyc and
Mariusz Zynel Symmetric $(15, 8, 4)$-designs in terms
of the geometry of binary simplex codes
of dimension 4 . . . . . . . . . . . . . 1739--1760
Pavol Zajac Polynomial reduction from syndrome
decoding problem to regular decoding
problem . . . . . . . . . . . . . . . . 1761--1775
Fabio Enrique Brochero Martínez and
Lucas Reis and
Sávio Ribas On polynomials over finite fields that
are free of binomials . . . . . . . . . 1777--1793
Rudong Min and
Jiale Han and
Yi Yang A public key encryption algorithm based
on multi-dimensional general Chebyshev
polynomial . . . . . . . . . . . . . . . 1795--1807
Jin Sima and
Chao Pan and
Olgica Milenkovic Perturbation-resilient sets for dynamic
service balancing . . . . . . . . . . . 1809--1836
F. J. Lobillo and
José Manuel Muñoz Linear complementary pairs of skew
constacyclic codes . . . . . . . . . . . 1837--1861
Xianhong Xie and
Yi Ouyang and
Honggang Hu On vectorial functions with maximal
number of bent components . . . . . . . 1863--1888
Soumya Sahoo and
Raghavendra Patil and
Chester Rebeiro Improved Side Channel Attacks on
TRIVIUM, GRAIN-128-AEAD, ACORN-128 v3
and ASCON-128a . . . . . . . . . . . . . 1889--1910
Zuling Chang and
Qiang Wang Efficient generation of odd order de
Bruijn sequence with the same complement
and reverse sequences. (French) [] . . . 1911--1933
Kirpa Garg and
Sartaj Ul Hasan and
Pantelimon Stanica The revised boomerang connectivity
tables and their connection to the
difference distribution table . . . . . 1935--1949
Sophie Huczynska and
Sophie Hume New results on non-disjoint and
classical strong external difference
families . . . . . . . . . . . . . . . . 1951--1984
Yuhan Zhang and
Lei Zhang and
Wenling Wu A new automatic framework for searching
rotational-XOR differential
characteristics in ARX ciphers . . . . . 1985--2012
Mathieu Degré and
Patrick Derbez and
André Schrottenloher New models for the cryptanalysis of
ASCON . . . . . . . . . . . . . . . . . 2013--2054
Chunghun Baek and
Taechan Kim Can we beat three halves lower bound?
(Im)possibility of reducing
communication cost for garbled circuits 2055--2072
Xinyue Ming and
Tao Feng and
Menglong Zhang The asymptotic existence of BIBDs having
a nesting . . . . . . . . . . . . . . . 2073--2105
Shuangqing Liu and
Shuhui Yu and
Lijun Ji Construction of optimal flag codes by
MRD codes . . . . . . . . . . . . . . . 2107--2118
Chloé Ba\"\isse and
Antoine Moran and
Antoine Loiseau Secret and shared keys recovery on
Hamming quasi-cyclic with SASCA . . . . 2119--2136
Mahak and
Maheshanand Bhaintwal On equidistant single-orbit cyclic and
quasi-cyclic subspace codes . . . . . . 2137--2157
Alexander L. Gavrilyuk and
Vladislav V. Kabanov Strongly regular graphs decomposable
into a divisible design graph and a
Delsarte clique . . . . . . . . . . . . 2159--2175
Zhixiong Chen and
Arne Winterhof Probabilistic results on the 2-adic
complexity . . . . . . . . . . . . . . . 2177--2189
Kangquan Li Constructions of complete permutations
in multiplication . . . . . . . . . . . 2191--2203
Chunyan Qin and
Gaojun Luo A generalized construction of
variable-length non-overlapping codes 2205--2228
Matthias Johann Steiner A note on the Walsh spectrum of the
Flystel . . . . . . . . . . . . . . . . 2229--2243
Hengming Zhao and
Rongcun Qin and
Dianhua Wu Optimal two-dimensional multilength
optical orthogonal codes via compatible
mixed difference packing set systems . . 2245--2262
Mengzhen Zhao and
Yanxun Chang Bounds and constructions of optimal
symbol-pair codes with constant
pair-weight . . . . . . . . . . . . . . 2263--2296
Bastien Pacifico Introducing locality in some generalized
AG codes . . . . . . . . . . . . . . . . ??
Hai Q. Dinh and
Hieu V. Ha and
Thieu N. Vo A new family of AMDS symbol-pair
constacyclic codes of length $ \textbf
{4p} $ and symbol-pair distance $
\textbf {9} $ . . . . . . . . . . . . . 2317--2332
Daniel Gabri\'c and
Joe Sawada Constructing k -ary orientable sequences
with asymptotically optimal length . . . 2333--2347
Kapish Chand Meena and
Piyush Pachauri and
Maheshanand Bhaintwal A class of triple-twisted GRS codes . . 2349--2367
Kaimin Cheng A class of ternary codes with few
weights . . . . . . . . . . . . . . . . 2369--2393
Tung Chou and
Edoardo Persichetti and
Paolo Santini On linear equivalence, canonical forms,
and digital signatures . . . . . . . . . 2395--2414
Wenya Li and
Kai Zhang and
Bin Hu A framework for constructing impossible
differential distinguishers and its
applications . . . . . . . . . . . . . . 2415--2457
Miroslav Markov and
Yuri Borissov The weight distribution of the
fourth-order Reed--Muller code of length
512 . . . . . . . . . . . . . . . . . . 2459--2486
Sebastian Bitzer and
Jeroen Delvaux and
Antonia Wachter-Zeh How to lose some weight: a practical
template syndrome decoding attack . . . 2487--2502
Hugo Sauerbier Couvée and
Thomas Jerkovits and
Jessica Bariffi Bounds on sphere sizes in the sum-rank
metric and coordinate-additive metrics 2503--2519
Chang Lv and
Yuqing Zhu Nonexistence of generalized bent
functions and the quadratic norm form
equations . . . . . . . . . . . . . . . 2521--2542
John Baena and
Daniel Cabarcas and
Luis Villota Admissible parameters for the Crossbred
algorithm and semi-regular sequences
over finite fields . . . . . . . . . . . 2543--2559
Carlos Agrinsoni and
Heeralal Janwa and
Moises Delgado Resolution of the exceptional APN
conjecture in the Gold degree case . . . 2561--2589
Ling Song and
Qinggan Fu and
Lei Hu Generalized impossible differential
attacks on block ciphers: application to
SKINNY and ForkSKINNY . . . . . . . . . 2591--2610
Arianna Dionigi and
Barbara Gatti Galois subcovers of the Hermitian curve
in characteristic p with respect to
subgroups of order dp with $ d \not = p
$ prime . . . . . . . . . . . . . . . . 2611--2655
Xiaopeng Zheng and
Hongbo Li and
Dingkang Wang A new framework for fast homomorphic
matrix multiplication . . . . . . . . . 2657--2670
Chi Zhang An attack on p -adic lattice public-key
encryption cryptosystems and signature
schemes . . . . . . . . . . . . . . . . 2671--2693
Marco Buratti and
Francesca Merola and
Anamari Naki\'c Additive combinatorial designs . . . . . 2695--2716
Javad Ebrahimi Boroojeni and
Mehri Oghbaei Bonab Binary stretch embedding of weighted
graphs . . . . . . . . . . . . . . . . . 2717--2740
Madhura Pathegama and
Alexander Barg Limitations of the decoding-to-LPN
reduction via code smoothing . . . . . . 2741--2760
Canze Zhu The complete weight enumerator of the
square of one-weight irreducible cyclic
codes . . . . . . . . . . . . . . . . . 2761--2778
William D. Carey and
Matthew David Kearney and
Stefan Popescu Universal partial tori . . . . . . . . . 2779--2802
Jingtao Xiong and
Jianghua Zhong and
Dongdai Lin Studying the isomorphism of NFSRs via a
general framework of bijections . . . . 2803--2822
Xiao-juan Wang and
Tian Tian and
Wen-feng Qi On the cycle structure of a class of
Galois NFSRs: component sequences
possessing identical periods . . . . . . 2823--2853
Eduardo Camps-Moreno and
Hiram H. López and
Rodrigo San-José The weight hierarchy of decreasing
norm-trace codes . . . . . . . . . . . . 2855--2871
Lukas Kölsch and
Gohar Kyureghyan Correction: The classifications of
$o$-monomials and of 2-to-1 binomials
are equivalent . . . . . . . . . . . . . 2873--2894
Julia Lieb and
Raquel Pinto and
Carlos Vela A new method for erasure decoding of
convolutional codes . . . . . . . . . . 2897--2918
Eric Kubischta and
Ian Teixeira Quantum codes and irreducible products
of characters . . . . . . . . . . . . . 2919--2930
Giacomo Micheli and
Vincenzo Pallozzi Lavorante and
Noah Smith Constructions of locally recoverable
codes with large availability . . . . . 2931--2945
Joonas Ahola and
Iván Blanco-Chacón and
Rodrigo M. Sánchez-Ledesma Fast multiplication and the PLWE-RLWE
equivalence for an infinite family of
maximal real subfields of cyclotomic
fields . . . . . . . . . . . . . . . . . 2947--2969
Hai Liu and
Chunyu Gan and
Xueying Shi Constructions of binary cyclic codes
with minimum weights exceeding the
square-root lower bound . . . . . . . . 2971--2992
Matteo Bonini and
Martino Borello and
Eimear Byrne The geometry of covering codes in the
sum-rank metric . . . . . . . . . . . . 2993--3009
Yuqing Zhu and
Chang Lv and
Jiqiang Liu Utilizing two subfields to accelerate
individual logarithm computation in
extended tower number field sieve . . . 3011--3027
Altan B. Kiliç and
Anne Nijsten and
Alberto Ravagnani Knot theory and error-correcting codes 3029--3068
Chengyu Sun and
Xin Wang New upper bounds for wide-sense
frameproof codes . . . . . . . . . . . . 3069--3082
Axel Lemoine and
Rocco Mora and
Jean-Pierre Tillich Understanding the new distinguisher of
alternant codes at degree 2 . . . . . . 3083--3105
Xue Jia and
Qin Yue and
Huan Sun Coding properties and automorphism
groups of two classes of twisted
generalized Reed--Solomon codes . . . . 3107--3133
Joshua Cooper and
Jack Hyatt Permutations minimizing the number of
collinear triples . . . . . . . . . . . 3135--3142
Max Schulz Rational transformations over finite
fields that are never irreducible . . . 3143--3157
Andrea C. Burgess and
Nicholas J. Cavenagh and
David A. Pike Weak colourings of Kirkman triple
systems . . . . . . . . . . . . . . . . 3159--3179
Shuiyin Liu and
Amin Sakzad Lattice codes for CRYSTALS-Kyber . . . . 3181--3205
Gustave Tchoffo Saah and
Tako Boris Fouotsa and
Célestin Nkuimi-Jugnia Avoiding trusted setup in isogeny-based
commitments . . . . . . . . . . . . . . 3207--3225
Zibi Xiao and
Yaya Ye and
Xiangyong Zeng Trace representation of a family of
generalized cyclotomic binary sequences
with period $ p^n $ . . . . . . . . . . 3227--3241
Jules Baudrin and
Christof Beierle and
Lukas Stennes Commutative cryptanalysis as a
generalization of differential
cryptanalysis . . . . . . . . . . . . . 3243--3281
Lev Yohananov and
Moshe Schwartz On the coding capacity of
reverse-complement and palindromic
duplication-correcting codes . . . . . . 3283--3302
Makhan Maji and
Sihem Mesnager and
Kalyan Hansda Characterizations for minimal codes:
graph theory approach and algebraic
approach over finite chain rings . . . . 3303--3335
Seyed Hassan Alavi On flag-transitive symmetric $ (v, k, 4)
$ designs . . . . . . . . . . . . . . . 3337--3359
Barbara Gatti and
Gábor Korchmáros and
Gioia Schulte Evaluation codes arising from symmetric
polynomials . . . . . . . . . . . . . . 3361--3373
Chun Guo and
Xiao Wang and
Yu Yu On tweakable correlation robust hashing
against key leakages . . . . . . . . . . 3375--3412
Gretchen L. Matthews and
Emily McMillon A combinatorial approach to avoiding
weak keys in the BIKE cryptosystem . . . 3413--3436
Zuo Ye and
Omer Sabary and
Ohad Elishco More on codes for combinatorial
composite DNA . . . . . . . . . . . . . 3437--3462
B. G. Rodrigues and
Patrick Solé Primitive rank 3 groups, binary codes,
and 3-designs . . . . . . . . . . . . . 3463--3479
Niklas Gassner and
Julia Lieb and
Michael Schaller Information-set decoding for
convolutional codes . . . . . . . . . . 3481--3505
Sergey Bezzateev and
Natalia Shekhunova Self-reversible generalized $ (L, G)
$-codes . . . . . . . . . . . . . . . . 3507--3519
Antonio Corbo Esposito and
Rosa Fera and
Francesco Romeo Hilbert series and degrees of regularity
of Oil & Vinegar and mixed quadratic
systems . . . . . . . . . . . . . . . . 3521--3541
Javier Herranz and
Germán Sáez $ (k, n)$-Consecutive access structures 3543--3563
R. Julian R. Abel and
Ingo Janiszczak and
Reiner Staszewski Improvements for lower bounds of
mutually orthogonal Latin squares of
sizes 54, 96 and 108 . . . . . . . . . . 3565--3573
Hajime Matsui and
Kakeru Kaneko Entanglement-assisted quantum
error-correcting codes via quasi-cyclic
codes with complementary duals . . . . . 3575--3591
Giulia Cavicchioni and
Eleonora Guerrini and
Alessio Meneghetti A class of locally recoverable codes
over finite chain rings . . . . . . . . 3593--3618
Frédérique Oggier and
Shengwei Liu and
Hongwei Liu About the Rankin and Bergé--Martinet
constants from a coding theory view
point . . . . . . . . . . . . . . . . . 3619--3640
Kamel Mohamed Faraoun and
Nadia El Mrabet Optimizing and securing GLV
multiplication over BLS
pairings-friendly curves . . . . . . . . 3641--3669
Yuehui Cui and
Jinquan Luo Differential uniformity and constacyclic
code from some power mapping . . . . . . 3671--3687
Sòren Fuglede Jòrgensen On the clique covering numbers of
Johnson graphs . . . . . . . . . . . . . 3689--3705
Yanyan Zhou and
Senpeng Wang and
Bin Hu Improved method of searching for
boomerang distinguishers on Feistel
structures-applications to WARP, TWINE,
LBlock, LBlock-s, and ALLPC . . . . . . 3707--3731
Shakir Ali and
Nuh Aydin and
Atif Ahmad Khan Constacyclic codes over general mixed
alphabets and their applications . . . . 3733--3760
Xiaoen Lin and
Le He and
Hongbo Yu Internal differential structure:
preimage attacks on up to 5-round Keccak 3761--3808
Danilo Francati and
Daniele Venturi Evolving secret sharing revisited:
computational security and succinctness 3809--3861
M. Buratti and
A. Pasotti Shiftable Heffter spaces . . . . . . . . 3863--3874
S. V. Borodachov and
P. G. Boyvalenkov and
M. M. Stoyanova Bounds on discrete potentials of
spherical $ (k, k)$-designs . . . . . . 3875--3902
Mrinal Kanti Bose and
Udaya Parampalli and
Abhay Kumar Singh Binary cyclic codes from permutation
polynomials over $ \mathbb {F}_{2^m} $ 3903--3932
Danyao Wu and
Pingzhi Yuan The compositional inverses of the
permutation polynomials from trace
functions over finite fields . . . . . . 3933--3953
Hao Lin and
Mingqiang Wang and
Kaitai Liang Generic construction of threshold ring
signatures and lattice-based
instantiations . . . . . . . . . . . . . 3955--4017
Hiroki Kajiura and
Koji Momihara and
Utano Ogata Divisible pre-difference sets for
approximating integrations over finite
groups . . . . . . . . . . . . . . . . . 4019--4042
Yong Liu and
Zejun Xiang and
Shasha Zhang A novel algorithm for the $k$-XOR
problem . . . . . . . . . . . . . . . . 4043--4081
Tongliang Zhang and
Haibin Kan and
Hanbing Zhao Further results on permutation
pentanomials over finite fields with
characteristic two . . . . . . . . . . . 4083--4112
Simeon Ball and
Michel Lavrauw and
Tabriz Popatia Correction to: Griesmer type bounds for
additive codes over finite fields,
integral and fractional MDS codes . . . 4113--4115
Yuli Tan and
Junling Zhou Steiner quadruple systems with minimum
colorable derived designs: constructions
and applications . . . . . . . . . . . . 4117--4140
Yagmur Çakiroglu and
Jade Nardi and
Mesut Sahin Codes on weighted projective planes . . 4141--4171
Lorenzo Grassi On generalizations of the Lai--Massey
scheme . . . . . . . . . . . . . . . . . 4173--4208
Rajeev Anand Sahu and
Jim Jean-Pierre Barthel and
Razvan Rosie A simple inner-product functional
encryption scheme from the inverse-DDH
assumption . . . . . . . . . . . . . . . 4209--4221
Klaus Metsch On the treewidth of generalized
$q$-Kneser graphs . . . . . . . . . . . 4223--4234
Makoto Araya and
Masaaki Harada and
Wei-Hsuan Yu Unbiased weighing matrices of weight 9 4235--4273
Zheng Gao Chen and
Jing Jian Li and
Jun Yang Zhang Subgroup perfect codes in lie type
simple groups of rank one . . . . . . . 4275--4292
Xing Lin Distributed repair schemes for
Reed--Solomon codes with multiple
erasures . . . . . . . . . . . . . . . . 4293--4312
Ivan Landjev and
Konstantin Vorob'ev On binary codes with distances $d$ and $
d + 2$ . . . . . . . . . . . . . . . . . 4313--4322
Michele Battagliola and
Riccardo Longo and
Giovanni Tognolini Security of fixed-weight repetitions of
special-sound multi-round interactive
proofs . . . . . . . . . . . . . . . . . 4323--4353
Céline Chevalier and
Ehsan Ebrahimi and
Quoc-Huy Vu On security notions for encryption in a
quantum world . . . . . . . . . . . . . 4355--4402
Benedek Kovács and
Zoltán Lóránt Nagy and
Dávid R. Szabó Blocking planes by lines in $ {\rm
PG}(n, q) $ . . . . . . . . . . . . . . 4403--4432
Clementa Alonso-González and
Miguel Ángel Navarro-Pérez Distance distribution of cyclic orbit
flag codes . . . . . . . . . . . . . . . 4433--4459
Shamil Asgarli and
Chi Hoi Yip Mutual position of two smooth quadrics
over finite fields . . . . . . . . . . . 4461--4472
Meng Cao and
Fuchuan Wei and
Gaojun Luo Entanglement-assisted quantum
error-correcting codes using
matrix-product codes . . . . . . . . . . 4473--4500
Haoran Xiong and
Guanghui Wang and
Guiying Yan On the lifting degree of girth-8 QC-LDPC
codes . . . . . . . . . . . . . . . . . 4501--4514
Kaimin Cheng The inverse stability of Artin--Schreier
polynomials over finite fields . . . . . 4515--4523
Thinh Hung Dang and
Dustin Moody New types of formula for isogenies
between elliptic curves . . . . . . . . 4525--4543
Adrián Fidalgo-Díaz and
Umberto Martínez-Peñas Distributed matrix multiplication with
straggler tolerance over very small
fields . . . . . . . . . . . . . . . . . 4545--4565
Dipak K. Bhunia and
Cristina Fernández-Córdoba and
Merc\`e Villanueva Linearity and classification of $
\mathbb {Z}_2 \mathbb {Z}_4 \mathbb
{Z}_8 $-linear Hadamard codes . . . . . 4567--4594
Chenmiao Shi and
Jie Peng and
Jinjie Gao On CCZ-equivalence of two new APN
functions in trivariate form . . . . . . 4595--4625
Avijit Dutta and
Eik List Forking sums of permutations for highly
secure and efficient PRFs . . . . . . . 4627--4658
Patric R. J. Östergård Classifying generalized Howell designs 4659--4670
Yaqian Zhang New centralized multi-node repair
schemes for distributed storage . . . . 4671--4682
Seyed Hassan Alavi and
Carmen Amarra and
Cheryl E. Praeger Higher-dimensional grid-imprimitive
block-transitive designs . . . . . . . . 4683--4719
Henk D. L. Hollmann and
Junming Ke and
Ago-Erik Riet An optimal binary linear
functional-repair storage code with
efficient repair related to $ {\rm
PG}(2, 8) $ . . . . . . . . . . . . . . 4721--4755
Patrick Bennett Asymptotically optimal constant weight
codes with even distance . . . . . . . . 4757--4763
Kanat Abdukhalikov and
Simeon Ball and
Tabriz Popatia Ovoids in the cyclic presentation of $
{\rm PG}(3, q) $ . . . . . . . . . . . . 4765--4778
Kirill Vedenev On the security of two IKKR-type
code-based cryptosystems . . . . . . . . 4779--4798
Claude Carlet and
Serge Feukoua and
Ana Salagean The stability of the algebraic degree of
Boolean functions when restricted to
affine spaces . . . . . . . . . . . . . 4799--4832
Gang Wang and
Xuan Gao and
Fang-Wei Fu Multilevel inserting constructions for
constant dimension subspace codes . . . 4833--4856
Rongxing Qiu and
Weijun Fang New constructions of MDS symbol-pair
codes via simple-root cyclic codes . . . 4857--4886
Tianling Weng and
Gaoli Wang and
Tingting Cui Exploiting output bits and the $ \chi $
operation in MitM preimage attacks on
Keccak . . . . . . . . . . . . . . . . . 4887--4909
Jie Liu and
Peng Hu and
Xiusheng Liu Galois LCD subspace codes . . . . . . . 4911--4923
Yueying Lou and
Qichun Wang Determining the weight spectrum of the
Reed--Muller codes $ R M(m - 6, m) $ 4925--4936
Denis S. Krotov and
Ferruh Özbudak and
Vladimir N. Potapov Generalizing the Bierbrauer--Friedman
bound for orthogonal arrays . . . . . . 4937--4950
Decai Wen and
Guoyuan Li and
Zihui Liu On the support weight distributions of
relative subcodes of some classes of
codes . . . . . . . . . . . . . . . . . 4951--4980
Claude Carlet and
Xiang-Dong Hou More on the sum-freedom of the
multiplicative inverse function . . . . 4981--4997
Angela Aguglia and
Luca Giuzzi and
Viola Siconolfi On mutually $ \mu $-intersecting
quasi-Hermitian varieties with some
applications . . . . . . . . . . . . . . ??
Donald L. Kreher and
Maura B. Paterson and
Douglas R. Stinson Near-factorizations of dihedral groups 5015--5038
Daiki Kawabata and
Tatsuya Maruta and
Keita Yasufuku A conjecture on the minimum length of
linear codes over finite fields . . . . 5039--5054
Sihem Mesnager and
Huawei Wu On the boomerang properties of $ x^{q +
2} $ over $ \mathbb {F}_{q^2} $ . . . . 5055--5078
Fengwei Li and
Ruiyuan Jiang and
Yuting Liu New MDS and self-dual generalized
Roth--Lample codes as well as their deep
holes . . . . . . . . . . . . . . . . . 5079--5096
Seyed Hassan Alavi Correction: On flag-transitive symmetric
$ (v, k, 4) $ designs . . . . . . . . . 5097--5098