


default search action
Advances in Mathematics of Communications, Volume 15
Volume 15, Number 1, February 2021
- San Ling

, Buket Özkaya
:
New bounds on the minimum distance of cyclic codes. 1-8 - Hongming Ru, Chunming Tang, Yanfeng Qi, Yuxiao Deng:

A construction of p-ary linear codes with two or three weights. 9-22 - Tinghua Hu, Yang Yang, Zhengchun Zhou:

Golay complementary sets with large zero odd-periodic correlation zones. 23-33 - Iván Bailera, Joaquim Borges

, Josep Rifà:
On Hadamard full propelinear codes with associated group C2t˟ C2. 35-54 - Chunming Tang, Maozhi Xu, Yanfeng Qi, Mingshuo Zhou:

A new class of p-ary regular bent functions. 55-64 - Jintai Ding

, Zheng Zhang, Joshua Deaton:
The singularity attack to the multivariate signature scheme HIMQ-3. 65-72 - Dandan Wang, Xiwang Cao, Gaojun Luo:

A class of linear codes and their complete weight enumerators. 73-97 - Shudi Yang, Xiangli Kong, Xueying Shi:

Complete weight enumerators of a class of linear codes over finite fields. 99-112 - Pedro Branco:

A post-quantum UC-commitment scheme in the global random oracle model from code-based assumptions. 113-130 - Fengwei Li, Qin Yue, Xiaoming Sun:

The values of two classes of Gaussian periods in index 2 case and weight distributions of linear codes. 131-153 - Yujuan Li, Huaifu Wang, Peipei Zhou, Guoshuang Zhang:

Some properties of the cycle decomposition of WG-NLFSR. 155-165 - Tingting Wu, Li Liu, Lanqiang Li, Shixin Zhu:

Repeated-root constacyclic codes of length 6lps. 167-189 - Lisa Hernandez Lucas:

Properties of sets of Subspaces with Constant Intersection Dimension. 191-206
Volume 15, Number 2, May 2021
- Karan Khathuria

, Joachim Rosenthal, Violetta Weger
:
Encryption scheme based on expanded Reed-Solomon codes. 207-218 - Sabira El Khalfaoui

, Gábor Péter Nagy
:
On the dimension of the subfield subcodes of 1-point Hermitian codes. 219-226 - Jong Yoon Hyun, Boran Kim, Minwon Na:

Construction of minimal linear codes from multi-variable functions. 227-240 - Sugata Gangopadhyay, Constanza Riera, Pantelimon Stanica:

Gowers U2 norm as a measure of nonlinearity for Boolean functions and their generalizations. 241-256 - Palash Sarkar, Subhadip Singha

:
Verifying solutions to LWE with implications for concrete security. 257-266 - Nicola Pace, Angelo Sonnino

:
On the existence of PD-sets: Algorithms arising from automorphism groups of codes. 267-277 - Gaojun Luo, Xiwang Cao:

Two classes of near-optimal codebooks with respect to the Welch bound. 279-289 - Yuan Cao, Yonglin Cao, Hai Q. Dinh, Ramakrishna Bandi

, Fang-Wei Fu:
An explicit representation and enumeration for negacyclic codes of length 2kn over ℤ4+uℤ4. 291-309 - Akbar Mahmoodi Rishakani, Seyed Mojtaba Dehnavi, Mohammad Reza Mirzaee Shamsabad, Nasour Bagheri:

Cryptographic properties of cyclic binary matrices. 311-327 - Bimal Mandal, Aditi Kar Gangopadhyay:

A note on generalization of bent boolean functions. 329-346 - Wenqin Zhang, Zhengchun Zhou, Udaya Parampalli, Vladimir Sidorenko:

Capacity-achieving private information retrieval scheme with a smaller sub-packetization. 347-363 - Sumit Kumar Debnath

, Pantelimon Stanica, Nibedita Kundu, Tanmay Choudhury:
Secure and efficient multiparty private set intersection cardinality. 365-386
Volume 15, Number 3, August 2021
- Yun Gao, Shilin Yang, Fang-Wei Fu:

Some optimal cyclic 픽q-linear 픽qt-codes. 387-396 - Iris Anshel, Derek Atkins, Dorian Goldfeld, Paul E. Gunnells

:
Ironwood meta key agreement and authentication protocol. 397-413 - Sascha Kurz:

The [46, 9, 20]2 code is unique. 415-422 - Dean Crnkovic

, Nina Mostarac
, Bernardo Gabriel Rodrigues, Leo Storme:
$ s $-PD-sets for codes from projective planes $ \mathrm{PG}(2, 2^h) $, $ 5 \leq h\leq 9 $. 423-440 - Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu, Hao Chen:

Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem. 441-469 - Joe Gildea

, Adrian Korban, Abidin Kaya, Bahattin Yildiz:
Constructing self-dual codes from group rings and reverse circulant matrices. 471-485 - Muhammad Ajmal

, Xiande Zhang:
New optimal error-correcting codes for crosstalk avoidance in on-chip data buses. 487-506 - Jennifer D. Key, Bernardo Gabriel Rodrigues:

Binary codes from m-ary n-cubes Qmn. 507-524 - Lei Lei, Wenli Ren, Cuiling Fan:

The differential spectrum of a class of power functions over finite fields. 525-537 - Nishant Sinha:

Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack. 539-556
Volume 15, Number 4, November 2021
- Cunsheng Ding, Chunming Tang:

Infinite families of 3-designs from o-polynomials. 557-573 - Grégory Berhuy, Jean Fasel, Odile Garotta:

Rank weights for arbitrary finite field extensions. 575-587 - Mohsen Mousavi, Ali Zaghian, Morteza Esmaeili:

Involutory-Multiple-Lightweight MDS Matrices based on Cauchy-type Matrices. 589-610 - Ranya Djihad Boulanouar, Aicha Batoul, Delphine Boucher

:
An overview on skew constacyclic codes and their subclass of LCD codes. 611-632 - Vedran Krcadinac, Renata Vlahovic Kruc:

Quasi-symmetric designs on 56 points. 633-646 - Ferruh Özbudak, Eda Tekin:

Correlation distribution of a sequence family generalizing some sequences of Trachtenberg. 647-662 - Rong Wang, Xiaoni Du, Cuiling Fan:

Infinite families of 2-designs from a class of non-binary Kasami cyclic codes. 663-676 - Anna-Lena Horlemann-Trautmann

, Violetta Weger
:
Information set decoding in the Lee metric with applications to cryptography. 677-699 - Lin Yi, Xiangyong Zeng, Zhimin Sun:

On finite length nonbinary sequences with large nonlinear complexity over the residue ring ℤm. 701-720 - Junchao Zhou, Nian Li, Xiangyong Zeng, Yunge Xu:

A generic construction of rotation symmetric bent functions. 721-736 - Habibul Islam

, Om Prakash
, Patrick Solé:
ℤ4ℤ4[u]-additive cyclic and constacyclic codes. 737-755 - Tingting Pang, Nian Li, Li Zhang, Xiangyong Zeng:

Several new classes of (balanced) Boolean functions with few Walsh transform values. 757-775

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














