Search dblp for Publications

export results for "stream:streams/journals/dcc:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/dcc/AragonDGLRW24,
  author       = {Nicolas Aragon and
                  Victor Dyseryn and
                  Philippe Gaborit and
                  Pierre Loidreau and
                  Julian Renner and
                  Antonia Wachter{-}Zeh},
  title        = {LowMS: a new rank metric code-based {KEM} without ideal structure},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {4},
  pages        = {1075--1093},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01330-5},
  doi          = {10.1007/S10623-023-01330-5},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AragonDGLRW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ArceNazarioHORT24,
  author       = {Rafael A. Arce{-}Nazario and
                  Carlos Hern{\'{a}}ndez and
                  Jos{\'{e}} R. Ortiz{-}Ubarri and
                  Ivelisse Rubio and
                  Jaziel Torres},
  title        = {Analysis and computation of multidimensional linear complexity of
                  periodic arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {709--722},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01274-w},
  doi          = {10.1007/S10623-023-01274-W},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ArceNazarioHORT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bamberg24,
  author       = {John Bamberg},
  title        = {On the 430-cap of rmPG(6,4) having two intersection sizes with respect
                  to hyperplanes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {495--503},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01318-1},
  doi          = {10.1007/S10623-023-01318-1},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Bamberg24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BapicPPP24,
  author       = {Amar Bapic and
                  Enes Pasalic and
                  Alexandr Polujan and
                  Alexander Pott},
  title        = {Vectorial Boolean functions with the maximum number of bent components
                  beyond the Nyberg's bound},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {531--552},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-022-01180-7},
  doi          = {10.1007/S10623-022-01180-7},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BapicPPP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartzJR24,
  author       = {Hannes Bartz and
                  Thomas Jerkovits and
                  Johan Rosenkilde},
  title        = {Fast K{\"{o}}tter-Nielsen-H{\o}holdt interpolation over skew
                  polynomial rings and its application in coding theory},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {435--465},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01315-4},
  doi          = {10.1007/S10623-023-01315-4},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BartzJR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeregHMS24,
  author       = {Sergey Bereg and
                  Mohammadreza Haghpanah and
                  Brian Malouf and
                  Ivan Hal Sudborough},
  title        = {Improved bounds for permutation arrays under Chebyshev distance},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {4},
  pages        = {1023--1039},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01326-1},
  doi          = {10.1007/S10623-023-01326-1},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeregHMS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BhattacharjeeBDNR24,
  author       = {Arghya Bhattacharjee and
                  Ritam Bhaumik and
                  Avijit Dutta and
                  Mridul Nandi and
                  Anik Raychaudhuri},
  title        = {{BBB} security for 5-round even-Mansour-based key-alternating Feistel
                  ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {1},
  pages        = {13--49},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01288-4},
  doi          = {10.1007/S10623-023-01288-4},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BhattacharjeeBDNR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BhuniaFVV24,
  author       = {Dipak K. Bhunia and
                  Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba and
                  Carlos Vela and
                  Merc{\`{e}} Villanueva},
  title        = {On the equivalence of {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{ps\}{\textdollar}-linear
                  generalized Hadamard codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {4},
  pages        = {999--1022},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01325-2},
  doi          = {10.1007/S10623-023-01325-2},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BhuniaFVV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CanJR24,
  author       = {Mahir Bilen Can and
                  Roy Joshua and
                  Girivaru V. Ravindra},
  title        = {Defects of codes from higher dimensional algebraic varieties},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {477--494},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01317-2},
  doi          = {10.1007/S10623-023-01317-2},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CanJR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CeriaM24,
  author       = {Michela Ceria and
                  Teo Mora},
  title        = {Towards a Gr{\"{o}}bner-free approach to coding},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {1},
  pages        = {179--204},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01302-9},
  doi          = {10.1007/S10623-023-01302-9},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CeriaM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChaillouxE24,
  author       = {Andr{\'{e}} Chailloux and
                  Simona Etinski},
  title        = {On the (in)security of optimized Stern-like signature schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {803--832},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01329-y},
  doi          = {10.1007/S10623-023-01329-Y},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChaillouxE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CheriereMRM24,
  author       = {Agathe Cheriere and
                  Lina Mortajine and
                  Tania Richmond and
                  Nadia El Mrabet},
  title        = {Exploiting ROLLO's constant-time implementations with a single-trace
                  analysis},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {587--608},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01227-3},
  doi          = {10.1007/S10623-023-01227-3},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CheriereMRM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Coolsaet24,
  author       = {Kris Coolsaet},
  title        = {Nonsingular hypercubes and nonintersecting hyperboloids},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {1},
  pages        = {93--112},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01297-3},
  doi          = {10.1007/S10623-023-01297-3},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Coolsaet24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DastbastehL24,
  author       = {Reza Dastbasteh and
                  Petr Lisonek},
  title        = {New quantum codes from self-dual codes over {\textdollar}{\textbackslash}mathbb
                  \{F\}{\_}4{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {787--801},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01306-5},
  doi          = {10.1007/S10623-023-01306-5},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DastbastehL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DavidNS24,
  author       = {Nicolas David and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Andr{\'{e}} Schrottenloher},
  title        = {Quantum impossible differential attacks: applications to {AES} and
                  {SKINNY}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {723--751},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01280-y},
  doi          = {10.1007/S10623-023-01280-Y},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DavidNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DonovanGY24,
  author       = {Diane M. Donovan and
                  Mike J. Grannell and
                  Emine Sule Yazici},
  title        = {On maximal partial Latin hypercubes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {419--433},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01314-5},
  doi          = {10.1007/S10623-023-01314-5},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DonovanGY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ducas24,
  author       = {L{\'{e}}o Ducas},
  title        = {Provable lattice reduction of {\textdollar}{\textbackslash}mathbb
                  \{Z\}n{\textdollar} with blocksize n/2},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {4},
  pages        = {909--916},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01320-7},
  doi          = {10.1007/S10623-023-01320-7},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ducas24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DunkelmanKRS24,
  author       = {Orr Dunkelman and
                  Nathan Keller and
                  Eyal Ronen and
                  Adi Shamir},
  title        = {Quantum time/memory/data tradeoff attacks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {1},
  pages        = {159--177},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01300-x},
  doi          = {10.1007/S10623-023-01300-X},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DunkelmanKRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DuttaM24,
  author       = {Suman Dutta and
                  Subhamoy Maitra},
  title        = {Introducing nega-Forrelation: quantum algorithms in analyzing nega-Hadamard
                  and nega-crosscorrelation spectra},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {863--883},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01346-x},
  doi          = {10.1007/S10623-023-01346-X},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DuttaM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FanWX24,
  author       = {Cuiling Fan and
                  An Wang and
                  Li Xu},
  title        = {New classes of {NMDS} codes with dimension 3},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {397--418},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01313-6},
  doi          = {10.1007/S10623-023-01313-6},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FanWX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GavrilyukS24,
  author       = {Alexander L. Gavrilyuk and
                  Sho Suda},
  title        = {Uniqueness of an association scheme related to the Witt design on
                  11 points},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {1},
  pages        = {205--209},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01303-8},
  doi          = {10.1007/S10623-023-01303-8},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GavrilyukS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GologluK24,
  author       = {Faruk G{\"{o}}loglu and
                  Lukas K{\"{o}}lsch},
  title        = {Counting the number of non-isotopic Taniguchi semifields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {681--694},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01262-0},
  doi          = {10.1007/S10623-023-01262-0},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GologluK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GranerK24,
  author       = {Anna{-}Maurin Graner and
                  Gohar M. Kyureghyan},
  title        = {Constructing irreducible polynomials recursively with a reverse composition
                  method},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {695--708},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01271-z},
  doi          = {10.1007/S10623-023-01271-Z},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GranerK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GruicaHRW24,
  author       = {Anina Gruica and
                  Anna{-}Lena Horlemann and
                  Alberto Ravagnani and
                  Nadja Willenborg},
  title        = {Densities of codes of various linearity degrees in translation-invariant
                  metric spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {609--637},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01236-2},
  doi          = {10.1007/S10623-023-01236-2},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GruicaHRW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuneriOS24,
  author       = {Cem G{\"{u}}neri and
                  Ferruh {\"{O}}zbudak and
                  Selcen Sayici},
  title        = {On subfield subcodes obtained from restricted evaluation codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {667--680},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01261-1},
  doi          = {10.1007/S10623-023-01261-1},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuneriOS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HeL24,
  author       = {Boyi He and
                  Qunying Liao},
  title        = {The properties and the error-correcting pair for lengthened {GRS}
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {1},
  pages        = {211--225},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01304-7},
  doi          = {10.1007/S10623-023-01304-7},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/HeL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HodzicRA24,
  author       = {Samir Hodzic and
                  Arnab Roy and
                  Elena Andreeva},
  title        = {Quantum cryptanalysis of Farfalle and (generalised) key-alternating
                  Feistel networks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {227--257},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01305-6},
  doi          = {10.1007/S10623-023-01305-6},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HodzicRA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HormannB24,
  author       = {Felicitas H{\"{o}}rmann and
                  Hannes Bartz},
  title        = {Interpolation-based decoding of folded variants of linearized and
                  skew Reed-Solomon codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {553--586},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01214-8},
  doi          = {10.1007/S10623-023-01214-8},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HormannB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kavut24,
  author       = {Sel{\c{c}}uk Kavut},
  title        = {Modified Patterson-Wiedemann construction},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {653--666},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01248-y},
  doi          = {10.1007/S10623-023-01248-Y},
  timestamp    = {Sat, 27 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kavut24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KolomeecB24,
  author       = {Nikolay Kolomeec and
                  Denis Bykov},
  title        = {On the image of an affine subspace under the inverse function within
                  a finite field},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {467--476},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01316-3},
  doi          = {10.1007/S10623-023-01316-3},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/KolomeecB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kutsenko24,
  author       = {Aleksandr Kutsenko},
  title        = {Decomposing self-dual bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {1},
  pages        = {113--144},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01298-2},
  doi          = {10.1007/S10623-023-01298-2},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Kutsenko24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuLQ24,
  author       = {Hai Liu and
                  Chengju Li and
                  Haifeng Qian},
  title        = {Parameters of several families of binary duadic codes and their related
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {1},
  pages        = {1--12},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01285-7},
  doi          = {10.1007/S10623-023-01285-7},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuLQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LuZ24,
  author       = {Ziwei Lu and
                  Shenglin Zhou},
  title        = {Flag-transitive symmetric 2-designs of prime order},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {259--266},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01307-4},
  doi          = {10.1007/S10623-023-01307-4},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LuZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LuZ24a,
  author       = {Jiqiang Lu and
                  Wenchang Zhou},
  title        = {Improved meet-in-the-middle attack on 10 rounds of the {AES-256} block
                  cipher},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {4},
  pages        = {957--973},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01323-4},
  doi          = {10.1007/S10623-023-01323-4},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LuZ24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LyuLLLC24,
  author       = {Shanxiang Lyu and
                  Ling Liu and
                  Cong Ling and
                  Junzuo Lai and
                  Hao Chen},
  title        = {Lattice codes for lattice-based {PKE}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {4},
  pages        = {917--939},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01321-6},
  doi          = {10.1007/S10623-023-01321-6},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LyuLLLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MaL24,
  author       = {Wen Ma and
                  Jinquan Luo},
  title        = {Codes with respect to weighted poset block metric},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {341--363},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01311-8},
  doi          = {10.1007/S10623-023-01311-8},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MaL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MiezakiM24,
  author       = {Tsuyoshi Miezaki and
                  Akihiro Munemasa},
  title        = {Jacobi polynomials and harmonic weight enumerators of the first-order
                  Reed-Muller codes and the extended Hamming codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {4},
  pages        = {1041--1049},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01327-0},
  doi          = {10.1007/S10623-023-01327-0},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MiezakiM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MunemasaB24,
  author       = {Akihiro Munemasa and
                  Rowena Alma L. Betty},
  title        = {Classification of extremal type {II} {\textdollar}{\textbackslash}mathbb
                  \{Z\}{\_}4{\textdollar}-codes of length 24},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {771--785},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01293-7},
  doi          = {10.1007/S10623-023-01293-7},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MunemasaB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PanQW24,
  author       = {Jiaxin Pan and
                  Chen Qian and
                  Benedikt Wagner},
  title        = {Generic constructions of master-key {KDM} secure attribute-based encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {1},
  pages        = {51--92},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01296-4},
  doi          = {10.1007/S10623-023-01296-4},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/PanQW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PotapovTT24,
  author       = {Vladimir N. Potapov and
                  Anna A. Taranenko and
                  Yuriy V. Tarannikov},
  title        = {An asymptotic lower bound on the number of bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {639--651},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01239-z},
  doi          = {10.1007/S10623-023-01239-Z},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PotapovTT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PratiharR24,
  author       = {Rakhi Pratihar and
                  Tovohery Hajatiana Randrianarisoa},
  title        = {Antipodal two-weight rank metric codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {753--769},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01283-9},
  doi          = {10.1007/S10623-023-01283-9},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PratiharR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ReijndersST24,
  author       = {Krijn Reijnders and
                  Simona Samardjiska and
                  Monika Trimoska},
  title        = {Hardness estimates of the code equivalence problem in the rank metric},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {833--862},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01338-x},
  doi          = {10.1007/S10623-023-01338-X},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ReijndersST24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SagarS24,
  author       = {Vidya Sagar and
                  Ritumoni Sarma},
  title        = {Minimal and optimal binary codes obtained using C\({}_{\mbox{D}}\)-construction
                  over the non-unital ring {I}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {1},
  pages        = {145--157},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01299-1},
  doi          = {10.1007/S10623-023-01299-1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/SagarS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SuTH24,
  author       = {Xiaowei Su and
                  Zihong Tian and
                  Guohui Hao},
  title        = {Determination of the sizes of optimal geometric orthogonal codes with
                  parameters (n{\(^\times\)} m,k,{\(\lambda\)} ,k-1)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {365--395},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01312-7},
  doi          = {10.1007/S10623-023-01312-7},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SuTH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TakahashiHO24,
  author       = {Kota Takahashi and
                  Keitaro Hashimoto and
                  Wakaha Ogata},
  title        = {Chosen-ciphertext secure code-based threshold public key encryptions
                  with short ciphertext},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {277--301},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01309-2},
  doi          = {10.1007/S10623-023-01309-2},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/TakahashiHO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TimpanellaZ24,
  author       = {Marco Timpanella and
                  Giovanni Zini},
  title        = {On a family of linear {MRD} codes with parameters [8{\(^\times\)}
                  8,16,7]\({}_{\mbox{q}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {507--530},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-022-01179-0},
  doi          = {10.1007/S10623-022-01179-0},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TimpanellaZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/VeitchS24,
  author       = {Shannon Veitch and
                  Douglas R. Stinson},
  title        = {Unconditionally secure non-malleable secret sharing and circular external
                  difference families},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {4},
  pages        = {941--956},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01322-5},
  doi          = {10.1007/S10623-023-01322-5},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/VeitchS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WieseB24,
  author       = {Moritz Wiese and
                  Holger Boche},
  title        = {{\(\epsilon\)}-Almost collision-flat universal hash functions and
                  mosaics of designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {4},
  pages        = {975--998},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01324-3},
  doi          = {10.1007/S10623-023-01324-3},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WieseB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WuY24,
  author       = {Danyao Wu and
                  Pingzhi Yuan},
  title        = {Permutation polynomials and their compositional inverses over finite
                  fields by a local method},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {267--276},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01308-3},
  doi          = {10.1007/S10623-023-01308-3},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WuY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/X24,
  title        = {Editorial Note: Coding and Cryptography 2022},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {3},
  pages        = {505},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-024-01365-2},
  doi          = {10.1007/S10623-024-01365-2},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/X24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuLCX24,
  author       = {Guangkui Xu and
                  Gaojun Luo and
                  Xiwang Cao and
                  Heqian Xu},
  title        = {Hulls of linear codes from simplex codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {4},
  pages        = {1095--1112},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01331-4},
  doi          = {10.1007/S10623-023-01331-4},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XuLCX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuWMGF24,
  author       = {Deng{-}Ming Xu and
                  Gang Wang and
                  Sihem Mesnager and
                  You Gao and
                  Fang{-}Wei Fu},
  title        = {Jacobi sums over Galois rings of arbitrary characters and their applications
                  in constructing asymptotically optimal codebooks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {4},
  pages        = {1051--1073},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01328-z},
  doi          = {10.1007/S10623-023-01328-Z},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XuWMGF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YadavS24,
  author       = {Monika Yadav and
                  Anuradha Sharma},
  title        = {Construction and enumeration of self-orthogonal and self-dual codes
                  over Galois rings of even characteristic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {2},
  pages        = {303--339},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01310-9},
  doi          = {10.1007/S10623-023-01310-9},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/YadavS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YanZ24,
  author       = {Qianqian Yan and
                  Junling Zhou},
  title        = {Mutually disjoint Steiner systems from {BCH} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {92},
  number       = {4},
  pages        = {885--907},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10623-023-01319-0},
  doi          = {10.1007/S10623-023-01319-0},
  timestamp    = {Wed, 24 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YanZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/00010D23,
  author       = {Xiaoqiang Wang and
                  Zhonghua Sun and
                  Cunsheng Ding},
  title        = {Two families of negacyclic {BCH} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2395--2420},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01208-6},
  doi          = {10.1007/S10623-023-01208-6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/00010D23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/0001L23,
  author       = {Tao Feng and
                  Jianbing Lu},
  title        = {On finite generalized quadrangles with rmPSL(2, q) as an automorphism
                  group},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {6},
  pages        = {2347--2364},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01203-x},
  doi          = {10.1007/S10623-023-01203-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/0001L23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/000223,
  author       = {Marco Pavone},
  title        = {Subset sums and block designs in a finite vector space},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2585--2603},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01213-9},
  doi          = {10.1007/S10623-023-01213-9},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/000223.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AguirreCN23,
  author       = {Josimar J. R. Aguirre and
                  C{\'{\i}}cero Carvalho and
                  Victor G. L. Neumann},
  title        = {About r-primitive and k-normal elements in finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {115--126},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01101-8},
  doi          = {10.1007/S10623-022-01101-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AguirreCN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AkreAHP23,
  author       = {Dev Akre and
                  Nuh Aydin and
                  Matthew J. Harrington and
                  Saurav R. Pandey},
  title        = {A generalization of cyclic code equivalence algorithm to constacyclic
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {763--777},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01124-1},
  doi          = {10.1007/S10623-022-01124-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AkreAHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AmesHIV23,
  author       = {Scott Ames and
                  Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Ligero: lightweight sublinear arguments without a trusted setup},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3379--3424},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01222-8},
  doi          = {10.1007/S10623-023-01222-8},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AmesHIV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AnbarKM23,
  author       = {Nurdag{\"{u}}l Anbar and
                  Tekg{\"{u}}l Kalayci and
                  Wilfried Meidl},
  title        = {Generalized semifield spreads},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {545--562},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01115-2},
  doi          = {10.1007/S10623-022-01115-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AnbarKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AranhaHG23,
  author       = {Diego F. Aranha and
                  Youssef El Housni and
                  Aurore Guillevic},
  title        = {A survey of elliptic curves for proof systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3333--3378},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01135-y},
  doi          = {10.1007/S10623-022-01135-Y},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AranhaHG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ArayaH23,
  author       = {Makoto Araya and
                  Masaaki Harada},
  title        = {Some restrictions on the weight enumerators of near-extremal ternary
                  self-dual codes and quaternary Hermitian self-dual codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1813--1843},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01172-7},
  doi          = {10.1007/S10623-022-01172-7},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ArayaH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ArayaHM23,
  author       = {Makoto Araya and
                  Masaaki Harada and
                  Koji Momihara},
  title        = {Hadamard matrices related to a certain series of ternary self-dual
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {795--805},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01127-y},
  doi          = {10.1007/S10623-022-01127-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ArayaHM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ArmarioBE23,
  author       = {Jos{\'{e}} Andr{\'{e}}s Armario and
                  Iv{\'{a}}n Bailera and
                  Ronan Egan},
  title        = {Butson full propelinear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {333--351},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01110-7},
  doi          = {10.1007/S10623-022-01110-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ArmarioBE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AsgarliGY23,
  author       = {Shamil Asgarli and
                  Dragos Ghioca and
                  Chi Hoi Yip},
  title        = {Plane curves giving rise to blocking sets over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3643--3669},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01264-y},
  doi          = {10.1007/S10623-023-01264-Y},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AsgarliGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AswadP23,
  author       = {Haetham Al Aswad and
                  C{\'{e}}cile Pierrot},
  title        = {Individual discrete logarithm with sublattice reduction},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {4059--4091},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01282-w},
  doi          = {10.1007/S10623-023-01282-W},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AswadP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AttrapadungHHMS23,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Ryo Hiromasa and
                  Takahiro Matsuda and
                  Jacob C. N. Schuldt},
  title        = {Maliciously circuit-private multi-key {FHE} and {MPC} based on {LWE}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1645--1684},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01160-x},
  doi          = {10.1007/S10623-022-01160-X},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AttrapadungHHMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AugotBN23,
  author       = {Daniel Augot and
                  Sarah Bordage and
                  Jade Nardi},
  title        = {Efficient multivariate low-degree tests via interactive oracle proofs
                  of proximity for polynomial codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {1111--1151},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01134-z},
  doi          = {10.1007/S10623-022-01134-Z},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AugotBN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bagherpour23,
  author       = {Bagher Bagherpour},
  title        = {A bivariate polynomial-based cryptographic hard problem and its applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2723--2735},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01229-1},
  doi          = {10.1007/S10623-023-01229-1},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Bagherpour23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ball23,
  author       = {Simeon Ball},
  title        = {Grassl-R{\"{o}}tteler cyclic and consta-cyclic {MDS} codes are
                  generalised Reed-Solomon codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1685--1694},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01174-5},
  doi          = {10.1007/S10623-022-01174-5},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ball23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BannaiMN23,
  author       = {Eiichi Bannai and
                  Tsuyoshi Miezaki and
                  Hiroyuki Nakasora},
  title        = {A note on the Assmus-Mattson theorem for some binary codes {II}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2509--2522},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01212-w},
  doi          = {10.1007/S10623-023-01212-W},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BannaiMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bao23,
  author       = {Jingjun Bao},
  title        = {Constructions of column-orthogonal strong orthogonal arrays via matchings
                  of bipartite graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3741--3755},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01267-9},
  doi          = {10.1007/S10623-023-01267-9},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Bao23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BardetBBGT23,
  author       = {Magali Bardet and
                  Pierre Briaud and
                  Maxime Bros and
                  Philippe Gaborit and
                  Jean{-}Pierre Tillich},
  title        = {Revisiting algebraic attacks on MinRank and on the rank decoding problem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3671--3707},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01265-x},
  doi          = {10.1007/S10623-023-01265-X},
  timestamp    = {Fri, 10 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BardetBBGT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartoliFG23,
  author       = {Daniele Bartoli and
                  Giuliana Fatabbi and
                  Francesco Ghiandoni},
  title        = {On the exceptionality of rational {APN} functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3167--3186},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01246-0},
  doi          = {10.1007/S10623-023-01246-0},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BartoliFG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BarwickHJ23,
  author       = {Susan G. Barwick and
                  Alice M. W. Hui and
                  Wen{-}Ai Jackson},
  title        = {A geometric description of the Figueroa plane},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1581--1593},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01158-5},
  doi          = {10.1007/S10623-022-01158-5},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BarwickHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BaumDSW23,
  author       = {Carsten Baum and
                  Samuel Dittmer and
                  Peter Scholl and
                  Xiao Wang},
  title        = {Sok: vector OLE-based zero-knowledge protocols},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3527--3561},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01292-8},
  doi          = {10.1007/S10623-023-01292-8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BaumDSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeierleC23,
  author       = {Christof Beierle and
                  Claude Carlet},
  title        = {Gold functions and switched cube functions are not 0-extendable in
                  dimension n {\textgreater} 5},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {433--449},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01111-6},
  doi          = {10.1007/S10623-022-01111-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeierleC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BenarrochCFGK23,
  author       = {Daniel Benarroch and
                  Matteo Campanelli and
                  Dario Fiore and
                  Kobi Gurkan and
                  Dimitris Kolonelos},
  title        = {Zero-knowledge proofs for set membership: efficient, succinct, modular},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3457--3525},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01245-1},
  doi          = {10.1007/S10623-023-01245-1},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BenarrochCFGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BettiBGSV23,
  author       = {Livia Betti and
                  Jim Brown and
                  Fernando Gaitan and
                  Aiyana Spear and
                  Japheth Varlack},
  title        = {Lattices in real quadratic fields and associated theta series arising
                  from codes over bfF\({}_{\mbox{4}}\) and bfF\({}_{\mbox{2}}\) {\(^\times\)}
                  bfF\({}_{\mbox{2}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3305--3319},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01258-w},
  doi          = {10.1007/S10623-023-01258-W},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BettiBGSV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeullensDKLP23,
  author       = {Ward Beullens and
                  Samuel Dobson and
                  Shuichi Katsumata and
                  Yi{-}Fu Lai and
                  Federico Pintore},
  title        = {Group signatures and more from isogenies and lattices: generic, simple,
                  and efficient},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {6},
  pages        = {2141--2200},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01192-x},
  doi          = {10.1007/S10623-023-01192-X},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeullensDKLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeullensFGP23,
  author       = {Ward Beullens and
                  Luca De Feo and
                  Steven D. Galbraith and
                  Christophe Petit},
  title        = {Proving knowledge of isogenies: a survey},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3425--3456},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01243-3},
  doi          = {10.1007/S10623-023-01243-3},
  timestamp    = {Fri, 10 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BeullensFGP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BidouxGKM23,
  author       = {Lo{\"{\i}}c Bidoux and
                  Philippe Gaborit and
                  Mukul Kulkarni and
                  V{\'{\i}}ctor Mateu},
  title        = {Code-based signatures from new proofs of knowledge for the syndrome
                  decoding problem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {497--544},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01114-3},
  doi          = {10.1007/S10623-022-01114-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BidouxGKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BoeckV23,
  author       = {Maarten De Boeck and
                  Geertrui Van de Voorde},
  title        = {Embedded antipodal planes and the minimum weight of the dual code
                  of points and lines in projective planes of order p\({}^{\mbox{2}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {895--920},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01131-2},
  doi          = {10.1007/S10623-022-01131-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BoeckV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BouvierCP23,
  author       = {Cl{\'{e}}mence Bouvier and
                  Anne Canteaut and
                  L{\'{e}}o Perrin},
  title        = {On the algebraic degree of iterated power functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {997--1033},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01136-x},
  doi          = {10.1007/S10623-022-01136-X},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BouvierCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ByrneCIJS23,
  author       = {Eimear Byrne and
                  Michela Ceria and
                  Sorina Ionica and
                  Relinde P. M. J. Jurrius and
                  Elif Sa{\c{c}}ikara},
  title        = {Constructions of new matroids and designs over {\textdollar}\{{\textbackslash}mathbb
                  \{F\}\}{\_}q{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {451--473},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01087-3},
  doi          = {10.1007/S10623-022-01087-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ByrneCIJS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ByrneDLPP23,
  author       = {Isabel Byrne and
                  Natalie Dodson and
                  Ryan Lynch and
                  Eric Pab{\'{o}}n{-}Cancel and
                  Fernando Pi{\~{n}}ero{-}Gonz{\'{a}}lez},
  title        = {Improving the minimum distance bound of Trace Goppa codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2649--2663},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01216-6},
  doi          = {10.1007/S10623-023-01216-6},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ByrneDLPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CaoWPC23,
  author       = {Jinzheng Cao and
                  Jian Weng and
                  Yanbin Pan and
                  Qingfeng Cheng},
  title        = {Generalized attack on {ECDSA:} known bits in arbitrary positions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3803--3823},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01269-7},
  doi          = {10.1007/S10623-023-01269-7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CaoWPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletKN23,
  author       = {Claude Carlet and
                  Rebeka Kiss and
                  G{\'{a}}bor P{\'{e}}ter Nagy},
  title        = {Simplicity conditions for binary orthogonal arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {151--163},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01105-4},
  doi          = {10.1007/S10623-022-01105-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarusoD23,
  author       = {Xavier Caruso and
                  Amaury Durand},
  title        = {Duals of linearized Reed-Solomon codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {241--271},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01102-7},
  doi          = {10.1007/S10623-022-01102-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarusoD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CastoldiMCS23,
  author       = {Andr{\'{e}} Guerino Castoldi and
                  Anderson Novaes Martinh{\~{a}}o and
                  Emerson L. Monte Carmelo and
                  Ot{\'{a}}vio J. N. T. N. dos Santos},
  title        = {Covering schemes of strength t},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3563--3580},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01252-2},
  doi          = {10.1007/S10623-023-01252-2},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CastoldiMCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CeriaCMP23,
  author       = {Michela Ceria and
                  Antonio Cossidente and
                  Giuseppe Marino and
                  Francesco Pavese},
  title        = {On near-MDS codes and caps},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {1095--1110},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01141-0},
  doi          = {10.1007/S10623-022-01141-0},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CeriaCMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChakrabortyMO23,
  author       = {Himadri Shekhar Chakraborty and
                  Tsuyoshi Miezaki and
                  Manabu Oura},
  title        = {Harmonic Tutte polynomials of matroids},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {6},
  pages        = {2223--2236},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01196-7},
  doi          = {10.1007/S10623-023-01196-7},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChakrabortyMO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CharaKMTW23,
  author       = {Mar{\'{\i}}a Chara and
                  Sam Kottler and
                  Beth Malmskog and
                  Bianca Thompson and
                  Mckenzie West},
  title        = {Minimum distance and parameter ranges of locally recoverable codes
                  with availability from fiber products of curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {2077--2105},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01189-6},
  doi          = {10.1007/S10623-023-01189-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CharaKMTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CheeLVZ23,
  author       = {Yeow Meng Chee and
                  Alan Chi Hung Ling and
                  Van Khu Vu and
                  Hui Zhang},
  title        = {Scheduling to reduce close contacts: resolvable grid graph decomposition
                  and packing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {4093--4106},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01291-9},
  doi          = {10.1007/S10623-023-01291-9},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CheeLVZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Chen23,
  author       = {Hao Chen},
  title        = {New {MDS} entanglement-assisted quantum codes from {MDS} Hermitian
                  self-orthogonal codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2665--2676},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01232-6},
  doi          = {10.1007/S10623-023-01232-6},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Chen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenN23,
  author       = {Guangzhou Chen and
                  Xiaodong Niu},
  title        = {Constructions for new orthogonal arrays based on large sets of orthogonal
                  arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2605--2625},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01217-5},
  doi          = {10.1007/S10623-023-01217-5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CorrellS23,
  author       = {Bill Correll Jr. and
                  Christopher N. Swanson},
  title        = {Difference-based structural properties of costas arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {779--794},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01125-0},
  doi          = {10.1007/S10623-022-01125-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CorrellS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CrnkovicS23,
  author       = {Dean Crnkovic and
                  Andrea Svob},
  title        = {{LCD} subspace codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3215--3226},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01251-3},
  doi          = {10.1007/S10623-023-01251-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CrnkovicS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DaiLZZ23,
  author       = {Yu Dai and
                  Kaizhan Lin and
                  Chang{-}An Zhao and
                  Zijian Zhou},
  title        = {Fast subgroup membership testings for {\textdollar}{\textbackslash}mathbb
                  \{G\}{\_}1{\textdollar}, {\textdollar}{\textbackslash}mathbb \{G\}{\_}2{\textdollar}
                  and {\textdollar}{\textbackslash}mathbb \{G\}{\_}T{\textdollar} on
                  pairing-friendly curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3141--3166},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01223-7},
  doi          = {10.1007/S10623-023-01223-7},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DaiLZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DattaDM23,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  title        = {Short attribute-based signatures for arbitrary Turing machines from
                  standard assumptions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1845--1872},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01163-8},
  doi          = {10.1007/S10623-022-01163-8},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DattaDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DattaJ23,
  author       = {Mrinmoy Datta and
                  Trygve Johnsen},
  title        = {Codes from symmetric polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {747--761},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01123-2},
  doi          = {10.1007/S10623-022-01123-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DattaJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DattaP23,
  author       = {Pratish Datta and
                  Tapas Pal},
  title        = {(Compact) Adaptively secure {FE} for attribute-weighted sums from
                  k-Lin},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {9},
  pages        = {2917--3034},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01219-3},
  doi          = {10.1007/S10623-023-01219-3},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DattaP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DelgadoJA23,
  author       = {Moises Delgado and
                  Heeralal Janwa and
                  Carlos Agrinsoni},
  title        = {Some new techniques and progress towards the resolution of the conjecture
                  of exceptional {APN} functions and absolutely irreducibility of a
                  class of polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2481--2495},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01202-y},
  doi          = {10.1007/S10623-023-01202-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DelgadoJA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DingLLW23,
  author       = {Jian Ding and
                  Changlu Lin and
                  Fuchun Lin and
                  Huaxiong Wang},
  title        = {Full threshold change range of threshold changeable secret sharing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2421--2447},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01205-9},
  doi          = {10.1007/S10623-023-01205-9},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DingLLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DoulgerakisLW23,
  author       = {Emmanouil Doulgerakis and
                  Thijs Laarhoven and
                  Benne de Weger},
  title        = {The irreducible vectors of a lattice},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {609--643},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01119-y},
  doi          = {10.1007/S10623-022-01119-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DoulgerakisLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DuJM23,
  author       = {Xiaoni Du and
                  Wengang Jin and
                  Sihem Mesnager},
  title        = {Several classes of new weakly regular bent functions outside {\(\mathscr{R}\)}{\(\mathscr{F}\)},
                  their duals and some related (minimal) codes with few weights},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {6},
  pages        = {2273--2307},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01198-5},
  doi          = {10.1007/S10623-023-01198-5},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DuJM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DucoatO23,
  author       = {J{\'{e}}r{\^{o}}me Ducoat and
                  Fr{\'{e}}d{\'{e}}rique E. Oggier},
  title        = {Rank weight hierarchy of some classes of polynomial codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1627--1644},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01181-6},
  doi          = {10.1007/S10623-022-01181-6},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DucoatO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DupinMR23,
  author       = {Aur{\'{e}}lien Dupin and
                  Pierrick M{\'{e}}aux and
                  M{\'{e}}lissa Rossi},
  title        = {On the algebraic immunity - resiliency trade-off, implications for
                  Goldreich's pseudorandom generator},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {9},
  pages        = {3035--3079},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01220-w},
  doi          = {10.1007/S10623-023-01220-W},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DupinMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DuranteLP23,
  author       = {Nicola Durante and
                  Giovanni Longobardi and
                  Valentina Pepe},
  title        = {{\textdollar}(d,{\textbackslash}varvec\{{\textbackslash}sigma \}){\textdollar}-Veronese
                  variety and some applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1911--1921},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01186-9},
  doi          = {10.1007/S10623-023-01186-9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DuranteLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ElsholtzKL23,
  author       = {Christian Elsholtz and
                  Benjamin Klahn and
                  Gabriel F. Lipnik},
  title        = {Large subsets of {\textdollar}{\textbackslash}mathbb \{Z\}{\_}mn{\textdollar}
                  without arithmetic progressions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1443--1452},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01145-w},
  doi          = {10.1007/S10623-022-01145-W},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ElsholtzKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EriguchiKN23,
  author       = {Reo Eriguchi and
                  Noboru Kunihiro and
                  Koji Nuida},
  title        = {Multiplicative and verifiably multiplicative secret sharing for multipartite
                  adversary structures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1751--1778},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01177-2},
  doi          = {10.1007/S10623-022-01177-2},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EriguchiKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FangCXFC23,
  author       = {Weijun Fang and
                  Bin Chen and
                  Shu{-}Tao Xia and
                  Fang{-}Wei Fu and
                  Xiangyu Chen},
  title        = {Perfect LRCs and k-optimal LRCs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1209--1232},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01148-7},
  doi          = {10.1007/S10623-022-01148-7},
  timestamp    = {Sat, 01 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FangCXFC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FeneuilJR23,
  author       = {Thibauld Feneuil and
                  Antoine Joux and
                  Matthieu Rivain},
  title        = {Shared permutation for syndrome decoding: new zero-knowledge protocol
                  and code-based signature},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {563--608},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01116-1},
  doi          = {10.1007/S10623-022-01116-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FeneuilJR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Feng23,
  author       = {Rongquan Feng},
  title        = {Obituary of Professor Zhexian Wan},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {9},
  pages        = {2809--2810},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01273-x},
  doi          = {10.1007/S10623-023-01273-X},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Feng23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GadouleauMP23,
  author       = {Maximilien Gadouleau and
                  Luca Mariot and
                  Stjepan Picek},
  title        = {Bent functions in the partial spread class generated by linear recurring
                  sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {63--82},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01097-1},
  doi          = {10.1007/S10623-022-01097-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GadouleauMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GalbraithGRS23,
  author       = {Steven D. Galbraith and
                  Rosario Gennaro and
                  Carla R{\`{a}}fols and
                  Ron Steinfeld},
  title        = {Guest editorial: Special issue on Mathematics of Zero-Knowledge},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3331--3332},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01260-2},
  doi          = {10.1007/S10623-023-01260-2},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GalbraithGRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GillW23,
  author       = {Michael J. Gill and
                  Ian M. Wanless},
  title        = {Pairs of {MOLS} of order ten satisfying non-trivial relations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1293--1313},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01149-6},
  doi          = {10.1007/S10623-022-01149-6},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GillW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GlasbyIM23,
  author       = {S. P. Glasby and
                  Ferdinand Ihringer and
                  Sam Mattheus},
  title        = {The proportion of non-degenerate complementary subspaces in classical
                  spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {9},
  pages        = {2879--2891},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01235-3},
  doi          = {10.1007/S10623-023-01235-3},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GlasbyIM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GolalizadehS23,
  author       = {Somayyeh Golalizadeh and
                  Nasrin Soltankhah},
  title        = {On the fourth weight of generalized Reed-Muller codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {3857--3879},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01276-8},
  doi          = {10.1007/S10623-023-01276-8},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GolalizadehS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GomezTorrecillasLN23,
  author       = {Jos{\'{e}} G{\'{o}}mez{-}Torrecillas and
                  Francisco Javier Lobillo and
                  Gabriel Navarro},
  title        = {Skew differential Goppa codes and their application to Mceliece cryptosystem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {3995--4017},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01286-6},
  doi          = {10.1007/S10623-023-01286-6},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GomezTorrecillasLN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Gordon23,
  author       = {Daniel M. Gordon},
  title        = {Signed difference sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {2107--2115},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01171-8},
  doi          = {10.1007/S10623-022-01171-8},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Gordon23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GorlaL23,
  author       = {Elisa Gorla and
                  Cristina Landolina},
  title        = {Quasi optimal anticodes: structure and invariants},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {2005--2020},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01188-7},
  doi          = {10.1007/S10623-023-01188-7},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GorlaL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuoWG23,
  author       = {Fei Guo and
                  Zilong Wang and
                  Guang Gong},
  title        = {Several secondary methods for constructing bent-negabent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {971--995},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01133-0},
  doi          = {10.1007/S10623-022-01133-0},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuoWG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Gyarmati23,
  author       = {M{\'{a}}t{\'{e}} Gyarmati},
  title        = {Secret sharing on regular bipartite access structures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1951--1971},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01187-8},
  doi          = {10.1007/S10623-023-01187-8},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Gyarmati23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HammerL23,
  author       = {James M. Hammer and
                  John Lorch},
  title        = {Diagonal cellular factor pair Latin squares},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {6},
  pages        = {2309--2322},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01200-0},
  doi          = {10.1007/S10623-023-01200-0},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HammerL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HanMJHZ23,
  author       = {Hui Han and
                  Jianjun Mu and
                  Xiaopeng Jiao and
                  Yu{-}Cheng He and
                  Zhanzhan Zhao},
  title        = {Constructions of multi-permutation codes correcting a single burst
                  of deletions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1923--1934},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01190-z},
  doi          = {10.1007/S10623-023-01190-Z},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HanMJHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HengLL23,
  author       = {Ziling Heng and
                  Dexiang Li and
                  Fenjin Liu},
  title        = {Ternary self-orthogonal codes from weakly regular bent functions and
                  their application in {LCD} Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {3953--3976},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01287-5},
  doi          = {10.1007/S10623-023-01287-5},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/HengLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Hoepman23,
  author       = {Jaap{-}Henk Hoepman},
  title        = {Two faces of blindness},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2705--2721},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01228-2},
  doi          = {10.1007/S10623-023-01228-2},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Hoepman23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HollmannKRS23,
  author       = {Henk D. L. Hollmann and
                  Karan Khathuria and
                  Ago{-}Erik Riet and
                  Vitaly Skachek},
  title        = {On some batch code properties of the simplex code},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1595--1605},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01173-6},
  doi          = {10.1007/S10623-022-01173-6},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HollmannKRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HongC23,
  author       = {Xiaoqin Hong and
                  Xiwang Cao},
  title        = {Improved generalized block inserting construction of constant dimension
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {475--495},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01117-0},
  doi          = {10.1007/S10623-022-01117-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HongC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuLXZT23,
  author       = {Zhao Hu and
                  Nian Li and
                  Linjie Xu and
                  Xiangyong Zeng and
                  Xiaohu Tang},
  title        = {The differential spectrum and boomerang spectrum of a class of locally-APN
                  functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1695--1711},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01161-w},
  doi          = {10.1007/S10623-022-01161-W},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuLXZT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuangLZM23,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Gongxian Zeng and
                  Xin Mu},
  title        = {Receiver selective opening security for identity-based encryption
                  in the multi-challenge setting},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1233--1259},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01147-8},
  doi          = {10.1007/S10623-022-01147-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuangLZM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuangX23,
  author       = {Hexiang Huang and
                  Qing Xiang},
  title        = {Construction of storage codes of rate approaching one on triangle-free
                  graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {3901--3913},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01278-6},
  doi          = {10.1007/S10623-023-01278-6},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/HuangX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Iurlano23,
  author       = {Enrico Iurlano},
  title        = {Growth of the perfect sequence covering array number},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1487--1494},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01168-3},
  doi          = {10.1007/S10623-022-01168-3},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Iurlano23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Jho023,
  author       = {Nam{-}Su Jho and
                  Jooyoung Lee},
  title        = {Partition and mix: generalizing the swap-or-not shuffle},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {6},
  pages        = {2237--2254},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01199-4},
  doi          = {10.1007/S10623-023-01199-4},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Jho023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Jiang23,
  author       = {Yupeng Jiang},
  title        = {A relation between sequences generated by Golomb's preference algorithm},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {285--291},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01108-1},
  doi          = {10.1007/S10623-022-01108-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Jiang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JiaoHL23,
  author       = {Lin Jiao and
                  Yonglin Hao and
                  Yongqiang Li},
  title        = {Guess-and-determine attacks on SNOW-Vi stream cipher},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {2021--2055},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01150-z},
  doi          = {10.1007/S10623-022-01150-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JiaoHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KatsumataTY23,
  author       = {Shuichi Katsumata and
                  Toi Tomita and
                  Shota Yamada},
  title        = {Direct computation of branching programs and its applications to more
                  efficient lattice-based cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {391--431},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01104-5},
  doi          = {10.1007/S10623-022-01104-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KatsumataTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KhaefiAK23,
  author       = {Yasamin Khaefi and
                  Zeinab Akhlaghi and
                  Behrooz Khosravi},
  title        = {On the subgroup perfect codes in Cayley graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {55--61},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01098-0},
  doi          = {10.1007/S10623-022-01098-0},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/KhaefiAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KharaghaniSZ23,
  author       = {Hadi Kharaghani and
                  Sho Suda and
                  Vlad Zaitsev},
  title        = {On a class of optimal constant weight ternary codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {45--54},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01096-2},
  doi          = {10.1007/S10623-022-01096-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KharaghaniSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KiermaierKSSW23,
  author       = {Michael Kiermaier and
                  Sascha Kurz and
                  Patrick Sol{\'{e}} and
                  Michael Stoll and
                  Alfred Wassermann},
  title        = {On strongly walk regular graphs, triple sum sets and their codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {645--675},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01118-z},
  doi          = {10.1007/S10623-022-01118-Z},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KiermaierKSSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimL23,
  author       = {Jiseung Kim and
                  Changmin Lee},
  title        = {A polynomial time algorithm for breaking {NTRU} encryption with multiple
                  keys},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2779--2789},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01233-5},
  doi          = {10.1007/S10623-023-01233-5},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KimL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimPTW23,
  author       = {Haider Al Kim and
                  Sven Puchinger and
                  Ludo Tolhuizen and
                  Antonia Wachter{-}Zeh},
  title        = {Coding and bounds for partially defective memory cells},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {4019--4058},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01270-0},
  doi          = {10.1007/S10623-023-01270-0},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/KimPTW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimSAP23,
  author       = {Hyoseung Kim and
                  Olivier Sanders and
                  Michel Abdalla and
                  Jong Hwan Park},
  title        = {Practical dynamic group signatures without knowledge extractors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {853--893},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01129-w},
  doi          = {10.1007/S10623-022-01129-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KimSAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kobayashi0MS23,
  author       = {Hirokazu Kobayashi and
                  Yohei Watanabe and
                  Kazuhiko Minematsu and
                  Junji Shikata},
  title        = {Tight lower bounds and optimal constructions of anonymous broadcast
                  encryption and authentication},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2523--2562},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01211-x},
  doi          = {10.1007/S10623-023-01211-X},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kobayashi0MS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KolschKK23,
  author       = {Lukas K{\"{o}}lsch and
                  Bj{\"{o}}rn Kriepke and
                  Gohar M. Kyureghyan},
  title        = {Image sets of perfectly nonlinear maps},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {1--27},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01094-4},
  doi          = {10.1007/S10623-022-01094-4},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KolschKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Krotov23,
  author       = {Denis S. Krotov},
  title        = {Projective tilings and full-rank perfect codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3293--3303},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01256-y},
  doi          = {10.1007/S10623-023-01256-Y},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Krotov23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LanLY23,
  author       = {Ting Lan and
                  Weijun Liu and
                  Fugang Yin},
  title        = {Block-transitive 3-(v, k, 1) designs associated with alternating groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2791--2807},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01215-7},
  doi          = {10.1007/S10623-023-01215-7},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LanLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Lavorante23,
  author       = {Vincenzo Pallozzi Lavorante},
  title        = {External points to a conic from a Baer subplane},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1427--1441},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01156-7},
  doi          = {10.1007/S10623-022-01156-7},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Lavorante23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LavoranteS23,
  author       = {Vincenzo Pallozzi Lavorante and
                  Valentino Smaldore},
  title        = {New hemisystems of the Hermitian surface},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {293--307},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01107-2},
  doi          = {10.1007/S10623-022-01107-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LavoranteS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LavrauwS23,
  author       = {Michel Lavrauw and
                  John Sheekey},
  title        = {Symplectic 4-dimensional semifields of order 8\({}^{\mbox{4}}\) and
                  9\({}^{\mbox{4}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1935--1949},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01183-y},
  doi          = {10.1007/S10623-023-01183-Y},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LavrauwS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Lee23,
  author       = {Kwangsu Lee},
  title        = {Decentralized multi-client functional encryption for set intersection
                  with improved efficiency},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {1053--1093},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01139-8},
  doi          = {10.1007/S10623-022-01139-8},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Lee23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeS23,
  author       = {Hyung Tae Lee and
                  Jae Hong Seo},
  title        = {On the security of functional encryption in the generic group model},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {9},
  pages        = {3081--3114},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01237-1},
  doi          = {10.1007/S10623-023-01237-1},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeV23,
  author       = {Melissa Lee and
                  Gabriel Verret},
  title        = {Extremely primitive groups and linear spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3227--3240},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01244-2},
  doi          = {10.1007/S10623-023-01244-2},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LemosNR23,
  author       = {Ab{\'{\i}}lio Lemos and
                  Victor G. L. Neumann and
                  S{\'{a}}vio Ribas},
  title        = {On arithmetic progressions in finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {6},
  pages        = {2323--2346},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01201-z},
  doi          = {10.1007/S10623-023-01201-Z},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LemosNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Li23,
  author       = {Fengwei Li},
  title        = {Cyclic codes of length 5p with {MDS} symbol-pair},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1873--1888},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01184-x},
  doi          = {10.1007/S10623-023-01184-X},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Li23a,
  author       = {Rupert Li},
  title        = {Unique optima of the Delsarte linear program},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {6},
  pages        = {2117--2140},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01191-y},
  doi          = {10.1007/S10623-023-01191-Y},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Li23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiJL23,
  author       = {Ming Li and
                  Yupeng Jiang and
                  Dongdai Lin},
  title        = {Properties of the cycles that contain all vectors of weight {\textdollar}{\textbackslash}le
                  k{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {221--239},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01100-9},
  doi          = {10.1007/S10623-022-01100-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiL23,
  author       = {Yun Li and
                  Hongwei Liu},
  title        = {Cyclic constant dimension subspace codes via the sum of Sidon spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1193--1207},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01146-9},
  doi          = {10.1007/S10623-022-01146-9},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiSW23,
  author       = {Shitao Li and
                  Minjia Shi and
                  Juan Wang},
  title        = {An improved method for constructing formally self-dual codes with
                  small hulls},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2563--2583},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01210-y},
  doi          = {10.1007/S10623-023-01210-Y},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiZQ23,
  author       = {Qiang Li and
                  Qun{-}Xiong Zheng and
                  Wenfeng Qi},
  title        = {Practical attacks on small private exponent {RSA:} new records and
                  new insights},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {4107--4142},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01295-5},
  doi          = {10.1007/S10623-023-01295-5},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiZQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Liu23,
  author       = {Shuangqing Liu},
  title        = {Optimal Ferrers diagram rank-metric codes from {MRD} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {3977--3993},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01284-8},
  doi          = {10.1007/S10623-023-01284-8},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Liu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuL23,
  author       = {Xiusheng Liu and
                  Hualu Liu},
  title        = {{LCP} of group codes over finite Frobenius rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {695--708},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01120-5},
  doi          = {10.1007/S10623-022-01120-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuL23a,
  author       = {Yan Liu and
                  Jianguo Lei},
  title        = {More results on large sets of Kirkman triple systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2677--2686},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01221-9},
  doi          = {10.1007/S10623-023-01221-9},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuL23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuL23b,
  author       = {Hongwei Liu and
                  Shengwei Liu},
  title        = {A class of constacyclic codes are generalized Reed-Solomon codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {4143--4151},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01294-6},
  doi          = {10.1007/S10623-023-01294-6},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuL23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuZAL23,
  author       = {Kaiqiang Liu and
                  Zhengchun Zhou and
                  Avik Ranjan Adhikary and
                  Rong Luo},
  title        = {New sets of non-orthogonal spreading sequences with low correlation
                  and low {PAPR} using extended Boolean functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3115--3139},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01247-z},
  doi          = {10.1007/S10623-023-01247-Z},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuZAL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LuWWC23,
  author       = {Wei Lu and
                  Xia Wu and
                  Yufei Wang and
                  Xiwang Cao},
  title        = {A general construction of regular complete permutation polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2627--2647},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01224-6},
  doi          = {10.1007/S10623-023-01224-6},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LuWWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MaL23,
  author       = {Wen Ma and
                  Jinquan Luo},
  title        = {Block codes in pomset metric over {\textdollar}\{{\textbackslash}mathbb
                  \{Z\}\}{\_}m{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3263--3284},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01249-x},
  doi          = {10.1007/S10623-023-01249-X},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MaL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MengGFM23,
  author       = {Xiangrui Meng and
                  Jian Gao and
                  Fang{-}Wei Fu and
                  Fanghui Ma},
  title        = {Weight distributions of {Q2DC} codes over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {807--830},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01128-x},
  doi          = {10.1007/S10623-022-01128-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MengGFM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MesnagerQC23,
  author       = {Sihem Mesnager and
                  Liqin Qian and
                  Xiwang Cao},
  title        = {Further projective binary linear codes derived from two-to-one functions
                  and their duals},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {719--746},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01122-3},
  doi          = {10.1007/S10623-022-01122-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MesnagerQC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Mo23,
  author       = {Songbao Mo},
  title        = {Ideal hierarchical secret sharing and lattice path matroids},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1335--1349},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01154-9},
  doi          = {10.1007/S10623-022-01154-9},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Mo23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MontanucciT23,
  author       = {Maria Montanucci and
                  Guilherme C. Tizziotti},
  title        = {Generalized Weierstrass semigroups at several points on certain maximal
                  curves which cannot be covered by the Hermitian curve},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {831--851},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01130-3},
  doi          = {10.1007/S10623-022-01130-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MontanucciT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MonzilloPS23,
  author       = {Giusy Monzillo and
                  Tim Penttila and
                  Alessandro Siciliano},
  title        = {Eggs in finite projective spaces and unitals in translation planes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1475--1485},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01162-9},
  doi          = {10.1007/S10623-022-01162-9},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MonzilloPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MoraT23,
  author       = {Rocco Mora and
                  Jean{-}Pierre Tillich},
  title        = {On the dimension and structure of the square of the dual of a Goppa
                  code},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1351--1372},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01153-w},
  doi          = {10.1007/S10623-022-01153-W},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MoraT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NaJL23,
  author       = {Jingzhou Na and
                  Jonathan Jedwab and
                  Shuxing Li},
  title        = {A group-based structure for perfect sequence covering arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {951--970},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01132-1},
  doi          = {10.1007/S10623-022-01132-1},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NaJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PangZ23,
  author       = {Xuan Pang and
                  Xiaoqin Zhan},
  title        = {Block-transitive 3-(v,4,{\(\lambda\)} {)} designs with sporadic or
                  alternating socle},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {3825--3835},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01275-9},
  doi          = {10.1007/S10623-023-01275-9},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/PangZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PangZYG23,
  author       = {Binbin Pang and
                  Shixin Zhu and
                  Tian Yang and
                  Jun Gao},
  title        = {{BCH} codes with larger dimensional hull},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {3933--3951},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01281-x},
  doi          = {10.1007/S10623-023-01281-X},
  timestamp    = {Mon, 13 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/PangZYG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PasalicBZW23,
  author       = {Enes Pasalic and
                  Amar Bapic and
                  Fengrong Zhang and
                  Yongzhuang Wei},
  title        = {Explicit infinite families of bent functions outside the completed
                  Maiorana-McFarland class},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2365--2393},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01204-w},
  doi          = {10.1007/S10623-023-01204-W},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PasalicBZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/QiaoYSHJ23,
  author       = {Wenxiao Qiao and
                  Hailun Yan and
                  Siwei Sun and
                  Lei Hu and
                  Jiwu Jing},
  title        = {New cryptanalysis of LowMC with algebraic techniques},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {2057--2075},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01178-1},
  doi          = {10.1007/S10623-022-01178-1},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/QiaoYSHJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Reis23,
  author       = {Lucas Reis},
  title        = {The average density of K-normal elements over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3285--3292},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01257-x},
  doi          = {10.1007/S10623-023-01257-X},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Reis23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ryabko23,
  author       = {Boris Ryabko},
  title        = {Unconditionally secure short key ciphers based on data compression
                  and randomization},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {6},
  pages        = {2201--2212},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01195-8},
  doi          = {10.1007/S10623-023-01195-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ryabko23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SamajderS23,
  author       = {Subhabrata Samajder and
                  Palash Sarkar},
  title        = {Another look at key randomisation hypotheses},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {3837--3855},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01272-y},
  doi          = {10.1007/S10623-023-01272-Y},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/SamajderS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SatakeG23,
  author       = {Shohei Satake and
                  Yujie Gu},
  title        = {Cayley sum graphs and their applications to codebooks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1315--1333},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01152-x},
  doi          = {10.1007/S10623-022-01152-X},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SatakeG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Shaporenko23,
  author       = {Alexander Shaporenko},
  title        = {Derivatives of bent functions in connection with the bent sum decomposition
                  problem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1607--1625},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01167-4},
  doi          = {10.1007/S10623-022-01167-4},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Shaporenko23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShenCZ23,
  author       = {Jiaxin Shen and
                  Jianfu Chen and
                  Shenglin Zhou},
  title        = {Flag-transitive 2-designs with prime square replication number and
                  alternating groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {709--717},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01121-4},
  doi          = {10.1007/S10623-022-01121-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShenCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShenMYZ23,
  author       = {Bingsheng Shen and
                  Hua Meng and
                  Yang Yang and
                  Zhengchun Zhou},
  title        = {New constructions of Z-complementary code sets and mutually orthogonal
                  complementary sequence sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {353--371},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01112-5},
  doi          = {10.1007/S10623-022-01112-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShenMYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiLCCKS23,
  author       = {Minjia Shi and
                  Yaya Li and
                  Wei Cheng and
                  Dean Crnkovic and
                  Denis S. Krotov and
                  Patrick Sol{\'{e}}},
  title        = {Self-dual bent sequences for complex Hadamard matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1453--1474},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01157-6},
  doi          = {10.1007/S10623-022-01157-6},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiLCCKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiLKS23,
  author       = {Minjia Shi and
                  Na Liu and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {Additive complementary dual codes over {\textdollar}{\textbackslash}mathbb
                  \{F\}{\_}4{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {273--284},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01106-3},
  doi          = {10.1007/S10623-022-01106-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiLKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiWKS23,
  author       = {Minjia Shi and
                  Shukai Wang and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {Self-orthogonal codes over a non-unital ring and combinatorial matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {677--689},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-021-00948-7},
  doi          = {10.1007/S10623-021-00948-7},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiWKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiWKS23a,
  author       = {Minjia Shi and
                  Shukai Wang and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {Correction: Self-orthogonal codes over a non-unital ring and combinatorial
                  matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {691},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01170-9},
  doi          = {10.1007/S10623-022-01170-9},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiWKS23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShinagawaESN23,
  author       = {Kazumasa Shinagawa and
                  Reo Eriguchi and
                  Shohei Satake and
                  Koji Nuida},
  title        = {Private simultaneous messages based on quadratic residues},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {3915--3932},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01279-5},
  doi          = {10.1007/S10623-023-01279-5},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShinagawaESN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Shparlinski23,
  author       = {Igor E. Shparlinski},
  title        = {Fixed points of the subset sum pseudorandom number generators},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2473--2479},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01209-5},
  doi          = {10.1007/S10623-023-01209-5},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Shparlinski23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Stanojkovski23,
  author       = {Mima Stanojkovski},
  title        = {Submodule codes as spherical codes in buildings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2449--2472},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01207-7},
  doi          = {10.1007/S10623-023-01207-7},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Stanojkovski23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SuG23,
  author       = {Sihong Su and
                  Xiaoqi Guo},
  title        = {A further study on the construction methods of bent functions and
                  self-dual bent functions based on Rothaus's bent function},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1559--1580},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01169-2},
  doi          = {10.1007/S10623-022-01169-2},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SuG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SunHZ23,
  author       = {Zhonghua Sun and
                  Sujuan Huang and
                  Shixin Zhu},
  title        = {Optimal quaternary Hermitian {LCD} codes and their related codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1527--1558},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01166-5},
  doi          = {10.1007/S10623-022-01166-5},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SunHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SunSS23,
  author       = {Shifeng Sun and
                  Ron Steinfeld and
                  Amin Sakzad},
  title        = {Incremental symmetric puncturable encryption with support for unbounded
                  number of punctures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1401--1426},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01143-y},
  doi          = {10.1007/S10623-022-01143-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SunSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SunWD23,
  author       = {Zhonghua Sun and
                  Xiaoqiang Wang and
                  Cunsheng Ding},
  title        = {Several families of irreducible constacyclic and cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {9},
  pages        = {2821--2843},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01242-4},
  doi          = {10.1007/S10623-023-01242-4},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SunWD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TanFDTZ23,
  author       = {Pan Tan and
                  Cuiling Fan and
                  Cunsheng Ding and
                  Chunming Tang and
                  Zhengchun Zhou},
  title        = {The minimum locality of linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {83--114},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01099-z},
  doi          = {10.1007/S10623-022-01099-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TanFDTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TanY23,
  author       = {Xiantong Tan and
                  Haode Yan},
  title        = {Differential spectrum of a class of {APN} power functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2755--2768},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01218-4},
  doi          = {10.1007/S10623-023-01218-4},
  timestamp    = {Tue, 01 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TanY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TangS23,
  author       = {Hopein Christofen Tang and
                  Djoko Suprijanto},
  title        = {A general family of Plotkin-optimal two-weight codes over {\textdollar}{\textbackslash}mathbb
                  \{Z\}{\_}4{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1737--1750},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01176-3},
  doi          = {10.1007/S10623-022-01176-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TangS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TianLZ23,
  author       = {Shizhu Tian and
                  Yitong Liu and
                  Xiangyong Zeng},
  title        = {A further study on bridge structures and constructing bijective S-boxes
                  for low-latency masking},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3709--3739},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01266-w},
  doi          = {10.1007/S10623-023-01266-W},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/TianLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TongZZXR23,
  author       = {Yan Tong and
                  Xiangyong Zeng and
                  Shasha Zhang and
                  Shiwei Xu and
                  Zhengwei Ren},
  title        = {The estimates of trigonometric sums and new bounds on a mean value,
                  a sequence and a cryptographic function},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {921--949},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01140-1},
  doi          = {10.1007/S10623-022-01140-1},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TongZZXR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Trung23,
  author       = {Tran van Trung},
  title        = {Point-missing s-resolvable t-designs: infinite series of 4-designs
                  with constant index},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2497--2508},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01206-8},
  doi          = {10.1007/S10623-023-01206-8},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Trung23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TsengLY23,
  author       = {Pin{-}Chieh Tseng and
                  Ching{-}Yi Lai and
                  Wei{-}Hsuan Yu},
  title        = {Semidefinite programming bounds for binary codes from a split Terwilliger
                  algebra},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3241--3262},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01250-4},
  doi          = {10.1007/S10623-023-01250-4},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TsengLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Vega23,
  author       = {Gerardo Vega},
  title        = {The b-symbol weight distributions of all semiprimitive irreducible
                  cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {6},
  pages        = {2213--2221},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01193-w},
  doi          = {10.1007/S10623-023-01193-W},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Vega23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/VenemaAH23,
  author       = {Marloes Venema and
                  Greg Alp{\'{a}}r and
                  Jaap{-}Henk Hoepman},
  title        = {Systematizing core properties of pairing-based attribute-based encryption
                  to uncover remaining challenges in enforcing access control in practice},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {165--220},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01093-5},
  doi          = {10.1007/S10623-022-01093-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/VenemaAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Vorobyev23,
  author       = {Ilya Vorobyev},
  title        = {Complete traceability multimedia fingerprinting codes resistant to
                  averaging attack and adversarial noise with optimal rate},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1183--1191},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01144-x},
  doi          = {10.1007/S10623-022-01144-X},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Vorobyev23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangF23,
  author       = {Jiaxin Wang and
                  Fang{-}Wei Fu},
  title        = {New results on vectorial dual-bent functions and partial difference
                  sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {127--149},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01103-6},
  doi          = {10.1007/S10623-022-01103-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangFHGZS23,
  author       = {Senpeng Wang and
                  Dengguo Feng and
                  Bin Hu and
                  Jie Guan and
                  Kai Zhang and
                  Tairong Shi},
  title        = {New method for combining Matsui's bounding conditions with sequential
                  encoding method},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3603--3642},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01259-9},
  doi          = {10.1007/S10623-023-01259-9},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WangFHGZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangL23,
  author       = {Jiabo Wang and
                  Cong Ling},
  title        = {Polar sampler: {A} novel Bernoulli sampler using polar codes with
                  application to integer Gaussian sampling},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1779--1811},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01164-7},
  doi          = {10.1007/S10623-022-01164-7},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangZZFS23,
  author       = {Zhongxiao Wang and
                  Xiaoxin Zhao and
                  Qunxiong Zheng and
                  Xiutao Feng and
                  Zehao Sun},
  title        = {The decomposition of an {NFSR} into the cascade connection of two
                  smaller NFSRs revisited},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1889--1910},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01182-z},
  doi          = {10.1007/S10623-023-01182-Z},
  timestamp    = {Tue, 25 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangZZFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WeiDHDZ23,
  author       = {Congming Wei and
                  Bingyou Dong and
                  Jialiang Hua and
                  Xiaoyang Dong and
                  Guoyan Zhang},
  title        = {Improved attacks against reduced-round Whirlwind},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3581--3602},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01254-0},
  doi          = {10.1007/S10623-023-01254-0},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WeiDHDZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XieLZTY23,
  author       = {Xi Xie and
                  Nian Li and
                  Xiangyong Zeng and
                  Xiaohu Tang and
                  Yao Yao},
  title        = {Several classes of bent functions over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {309--332},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01109-0},
  doi          = {10.1007/S10623-022-01109-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XieLZTY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XieT23,
  author       = {Xiaofeng Xie and
                  Tian Tian},
  title        = {Structural evaluation of AES-like ciphers against mixture differential
                  cryptanalysis},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {12},
  pages        = {3881--3899},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01277-7},
  doi          = {10.1007/S10623-023-01277-7},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/XieT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Xu23,
  author       = {Bangteng Xu},
  title        = {Characterizations and constructions of plateaued functions on finite
                  abelian groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1261--1292},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01151-y},
  doi          = {10.1007/S10623-022-01151-Y},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Xu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuZTC23,
  author       = {Jie Xu and
                  Zhiyong Zheng and
                  Kun Tian and
                  Man Chen},
  title        = {Two properties of prefix codes and uniquely decodable codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3321--3330},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01253-1},
  doi          = {10.1007/S10623-023-01253-1},
  timestamp    = {Tue, 10 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XuZTC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuZZM23,
  author       = {Li Xu and
                  Zhengchun Zhou and
                  Jun Zhang and
                  Sihem Mesnager},
  title        = {Optimal quaternary (r,{\(\delta\)} )-locally recoverable codes: their
                  structures and complete classification},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1495--1526},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01165-6},
  doi          = {10.1007/S10623-022-01165-6},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XuZZM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XueW23,
  author       = {Erzhong Xue and
                  Zilong Wang},
  title        = {The q-ary Golay arrays of size 2{\(^\times\)} 2{\(^\times\)} ... {\(^\times\)}
                  2 are standard},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2769--2778},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01230-8},
  doi          = {10.1007/S10623-023-01230-8},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XueW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YadavS23,
  author       = {Monika Yadav and
                  Anuradha Sharma},
  title        = {A recursive method for the construction and enumeration of self-orthogonal
                  and self-dual codes over the quasi-Galois ring {\textdollar}{\textbackslash}mathbb
                  \{F\}{\_}\{2r\}[u]/{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1973--2003},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01185-w},
  doi          = {10.1007/S10623-023-01185-W},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YadavS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YuZLBDXWCCWS23,
  author       = {Han{-}Bing Yu and
                  Qun{-}Xiong Zheng and
                  Yi{-}Jian Liu and
                  Jingguo Bi and
                  Yu{-}Fei Duan and
                  Jing{-}Wen Xue and
                  You Wu and
                  Yue Cao and
                  Rong Cheng and
                  Lin Wang and
                  Bai{-}Shun Sun},
  title        = {An improved method for predicting truncated multiple recursive generators
                  with unknown parameters},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1713--1736},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01175-4},
  doi          = {10.1007/S10623-022-01175-4},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YuZLBDXWCCWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZengZLX23,
  author       = {Dan Zeng and
                  Xiangyong Zeng and
                  Lisha Li and
                  Yunge Xu},
  title        = {The cycle structure of a class of permutation polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1373--1400},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01155-8},
  doi          = {10.1007/S10623-022-01155-8},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZengZLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhanZLW23,
  author       = {Yu Zhan and
                  Ziqian Zhang and
                  Qian Liu and
                  Baocang Wang},
  title        = {Hiding the input-size in multi-party private set intersection},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {9},
  pages        = {2893--2915},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01238-0},
  doi          = {10.1007/S10623-023-01238-0},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhanZLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Zhang23,
  author       = {Zihan Zhang},
  title        = {A new metric on symmetric groups and applications to block permutation
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {6},
  pages        = {2255--2271},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01197-6},
  doi          = {10.1007/S10623-023-01197-6},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Zhang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Zhang23a,
  author       = {Junyang Zhang},
  title        = {Characterizing subgroup perfect codes by 2-subgroups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {9},
  pages        = {2811--2819},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01240-6},
  doi          = {10.1007/S10623-023-01240-6},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Zhang23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangLGH23,
  author       = {Kai Zhang and
                  Xuejia Lai and
                  Jie Guan and
                  Bin Hu},
  title        = {Weak rotational property and its application},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {10},
  pages        = {3187--3214},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01241-5},
  doi          = {10.1007/S10623-023-01241-5},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangLGH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangLWGHWS23,
  author       = {Kai Zhang and
                  Xuejia Lai and
                  Lei Wang and
                  Jie Guan and
                  Bin Hu and
                  Senpeng Wang and
                  Tairong Shi},
  title        = {Meet-in-the-middle attack with splice-and-cut technique and a general
                  automatic framework},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {9},
  pages        = {2845--2878},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01226-4},
  doi          = {10.1007/S10623-023-01226-4},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangLWGHWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangPLZX23,
  author       = {WeiGuo Zhang and
                  Enes Pasalic and
                  Yiran Liu and
                  Liupiao Zhang and
                  Chunlei Xie},
  title        = {A design and flexible assignment of orthogonal binary sequence sets
                  for {(QS)-CDMA} systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {373--389},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01113-4},
  doi          = {10.1007/S10623-022-01113-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangPLZX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangQG23,
  author       = {Zhongliang Zhang and
                  Zhen Qin and
                  Chun Guo},
  title        = {Just tweak! Asymptotically optimal security for the cascaded {LRW1}
                  tweakable blockcipher},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {1035--1052},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01137-w},
  doi          = {10.1007/S10623-022-01137-W},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangQG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangT23,
  author       = {He Zhang and
                  Chunming Tang},
  title        = {Constructions of large cyclic constant dimension codes via Sidon spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {1},
  pages        = {29--44},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01095-3},
  doi          = {10.1007/S10623-022-01095-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangWSW23,
  author       = {Zhongya Zhang and
                  Wenling Wu and
                  Han Sui and
                  Bolin Wang},
  title        = {Post-quantum security on the Lai-Massey scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2687--2704},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01225-5},
  doi          = {10.1007/S10623-023-01225-5},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangWSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangZ23,
  author       = {Wanbao Zhang and
                  Shenglin Zhou},
  title        = {Extremely line-primitive automorphism groups of finite linear spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {3},
  pages        = {1153--1163},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01138-9},
  doi          = {10.1007/S10623-022-01138-9},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhengYZZ23,
  author       = {Yanbin Zheng and
                  Yuyin Yu and
                  Zhengbang Zha and
                  Xingchen Zhou},
  title        = {On inverses of permutation polynomials of the form {\textdollar}x{\textbackslash}left(
                  x\{s\} -a{\textbackslash}right) \{(qm-1)/s\}{\textdollar} over {\textdollar}{\textbackslash}mathbb
                  \{F\}{\_}\{qn\}{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {4},
  pages        = {1165--1181},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01142-z},
  doi          = {10.1007/S10623-022-01142-Z},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhengYZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouYQXZM23,
  author       = {Yanwei Zhou and
                  Bo Yang and
                  Zirui Qiao and
                  Zhe Xia and
                  Mingwu Zhang and
                  Yi Mu},
  title        = {Leakage-resilient identity-based cryptography from minimal assumptions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3757--3801},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01268-8},
  doi          = {10.1007/S10623-023-01268-8},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouYQXZM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Zhu23,
  author       = {Yan Zhu},
  title        = {Optimal and extremal graphical designs on regular graphs associated
                  with classical parameters},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {8},
  pages        = {2737--2754},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01231-7},
  doi          = {10.1007/S10623-023-01231-7},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Zhu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiWL23,
  title        = {{RETRACTED} {ARTICLE:} {\textdollar}{\textbackslash}mathbb \{Z\}{\_}p{\textbackslash}mathbb
                  \{Z\}{\_}\{p2\}{\textdollar}-linear codes: rank and kernel},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {2},
  pages        = {693},
  year         = {2023},
  note         = {Withdrawn.},
  url          = {https://doi.org/10.1007/s10623-021-00947-8},
  doi          = {10.1007/S10623-021-00947-8},
  timestamp    = {Tue, 21 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AbeA22,
  author       = {Masayuki Abe and
                  Miguel Ambrona},
  title        = {Blind key-generation attribute-based encryption for general predicates},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2271--2299},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01069-5},
  doi          = {10.1007/S10623-022-01069-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AbeA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AbiadBDK22,
  author       = {Aida Abiad and
                  Bart De Bruyn and
                  Jozefien D'haeseleer and
                  Jack H. Koolen},
  title        = {Neumaier graphs with few eigenvalues},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {2003--2019},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00856-w},
  doi          = {10.1007/S10623-021-00856-W},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AbiadBDK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AbreuFKL22,
  author       = {Mari{\'{e}}n Abreu and
                  Martin Funk and
                  Vedran Krcadinac and
                  Domenico Labbate},
  title        = {Strongly regular configurations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {8},
  pages        = {1881--1897},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01080-w},
  doi          = {10.1007/S10623-022-01080-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AbreuFKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AgrawalBNXXY22,
  author       = {Shweta Agrawal and
                  Rajarshi Biswas and
                  Ryo Nishimaki and
                  Keita Xagawa and
                  Xiang Xie and
                  Shota Yamada},
  title        = {Cryptanalysis of Boyen's attribute-based encryption scheme in {TCC}
                  2013},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2301--2318},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01076-6},
  doi          = {10.1007/S10623-022-01076-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AgrawalBNXXY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AgugliaCG22,
  author       = {Angela Aguglia and
                  Michela Ceria and
                  Luca Giuzzi},
  title        = {Some hypersurfaces over finite fields, minimal codes and secret sharing
                  schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {6},
  pages        = {1503--1519},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01051-1},
  doi          = {10.1007/S10623-022-01051-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AgugliaCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlahmadiAABSS22,
  author       = {Adel Alahmadi and
                  Amani Alkathiry and
                  Alaa Altassan and
                  Alexis Bonnecaze and
                  Hatoon Shoaib and
                  Patrick Sol{\'{e}}},
  title        = {The build-up construction over a commutative non-unital ring},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {12},
  pages        = {3003--3010},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01044-0},
  doi          = {10.1007/S10623-022-01044-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlahmadiAABSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlawatugodaO22,
  author       = {Janaka Alawatugoda and
                  Tatsuaki Okamoto},
  title        = {Standard model leakage-resilient authenticated key exchange using
                  inner-product extractors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {1059--1079},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01028-0},
  doi          = {10.1007/S10623-022-01028-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlawatugodaO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Alhakim22,
  author       = {Abbas Alhakim},
  title        = {Designing preference functions for de Bruijn sequences with forbidden
                  words},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2319--2335},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01077-5},
  doi          = {10.1007/S10623-022-01077-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Alhakim22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AmarraDP22,
  author       = {Carmen Amarra and
                  Alice Devillers and
                  Cheryl E. Praeger},
  title        = {Delandtsheer-Doyen parameters for block-transitive point-imprimitive
                  2-designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {2205--2221},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01015-5},
  doi          = {10.1007/S10623-022-01015-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AmarraDP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AnbarM22,
  author       = {Nurdag{\"{u}}l Anbar and
                  Wilfried Meidl},
  title        = {Bent partitions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {1081--1101},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01029-z},
  doi          = {10.1007/S10623-022-01029-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AnbarM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AydinLY22,
  author       = {Nuh Aydin and
                  Peihan Liu and
                  Bryan Yoshino},
  title        = {Polycyclic codes associated with trinomials: good codes and open questions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {5},
  pages        = {1241--1269},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01038-y},
  doi          = {10.1007/S10623-022-01038-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AydinLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AyebieS22,
  author       = {Edoukou Berenger Ayebie and
                  El Mamoun Souidi},
  title        = {New code-based cryptographic accumulator and fully dynamic group signature},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {12},
  pages        = {2861--2891},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01007-5},
  doi          = {10.1007/S10623-022-01007-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AyebieS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AzimiRSMAR22,
  author       = {Seyyed Arash Azimi and
                  Adri{\'{a}}n Ranea and
                  Mahmoud Salmasizadeh and
                  Javad Mohajeri and
                  Mohammad Reza Aref and
                  Vincent Rijmen},
  title        = {A bit-vector differential model for the modular addition by a constant
                  and its applications to differential and impossible-differential cryptanalysis},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {8},
  pages        = {1797--1855},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01074-8},
  doi          = {10.1007/S10623-022-01074-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AzimiRSMAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BaileyCKP22,
  author       = {Rosemary A. Bailey and
                  Peter J. Cameron and
                  Michael Kinyon and
                  Cheryl E. Praeger},
  title        = {Diagonal groups and arcs over groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {2069--2080},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00907-2},
  doi          = {10.1007/S10623-021-00907-2},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BaileyCKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BallD22,
  author       = {Simeon Ball and
                  James Dixon},
  title        = {The equivalence of linear codes implies semi-linear equivalence},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {7},
  pages        = {1557--1565},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01055-x},
  doi          = {10.1007/S10623-022-01055-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BallD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BallLS22,
  author       = {Simeon Ball and
                  Michel Lavrauw and
                  Tam{\'{a}}s Szonyi},
  title        = {Contributions by Aart Blokhuis to finite geometry, discrete mathematics,
                  and combinatorics},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {1959--1961},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01072-w},
  doi          = {10.1007/S10623-022-01072-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BallLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BalletBBT22,
  author       = {St{\'{e}}phane Ballet and
                  Nicolas Baudru and
                  Alexis Bonnecaze and
                  Mila Tukumuli},
  title        = {Construction of asymmetric Chudnovsky-type algorithms for multiplication
                  in finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {12},
  pages        = {2783--2811},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00986-1},
  doi          = {10.1007/S10623-021-00986-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BalletBBT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BaoJ22,
  author       = {Jingjun Bao and
                  Lijun Ji},
  title        = {Large sets of t-designs over finite fields exist for all t},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {7},
  pages        = {1599--1609},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01061-z},
  doi          = {10.1007/S10623-022-01061-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BaoJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BargCT22,
  author       = {Alexander Barg and
                  Zitan Chen and
                  Itzhak Tamo},
  title        = {A construction of maximally recoverable codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {939--945},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01020-8},
  doi          = {10.1007/S10623-022-01020-8},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BargCT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BariffiMNR22,
  author       = {Jessica Bariffi and
                  Sam Mattheus and
                  Alessandro Neri and
                  Joachim Rosenthal},
  title        = {Moderate-density parity-check codes from projective bundles},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {12},
  pages        = {2943--2966},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01054-y},
  doi          = {10.1007/S10623-022-01054-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BariffiMNR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeierleLP22,
  author       = {Christof Beierle and
                  Gregor Leander and
                  L{\'{e}}o Perrin},
  title        = {Trims and extensions of quadratic {APN} functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {1009--1036},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01024-4},
  doi          = {10.1007/S10623-022-01024-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeierleLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeregMMSS22,
  author       = {Sergey Bereg and
                  Brian Malouf and
                  Linda Morales and
                  Thomas Stanley and
                  Ivan Hal Sudborough},
  title        = {Using permutation rational functions to obtain permutation arrays
                  with large hamming distance},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {7},
  pages        = {1659--1677},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01039-x},
  doi          = {10.1007/S10623-022-01039-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeregMMSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BettaiebBBCG22,
  author       = {Slim Bettaieb and
                  Lo{\"{\i}}c Bidoux and
                  Olivier Blazy and
                  Yann Connan and
                  Philippe Gaborit},
  title        = {A gapless code-based hash proof system based on {RQC} and its applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {12},
  pages        = {3011--3044},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01075-7},
  doi          = {10.1007/S10623-022-01075-7},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BettaiebBBCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BettenK22,
  author       = {Anton Betten and
                  Fatma Karaoglu},
  title        = {The Eckardt point configuration of cubic surfaces revisited},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {2159--2180},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00999-w},
  doi          = {10.1007/S10623-021-00999-W},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BettenK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeuleMS22,
  author       = {Jan De Beule and
                  Jonathan Mannaert and
                  Leo Storme},
  title        = {Cameron-Liebler k-sets in subspaces and non-existence conditions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {633--651},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00995-0},
  doi          = {10.1007/S10623-021-00995-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeuleMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BhattacharjeeDL22,
  author       = {Arghya Bhattacharjee and
                  Avijit Dutta and
                  Eik List and
                  Mridul Nandi},
  title        = {CENCPP\({}^{\mbox{*}}\): beyond-birthday-secure encryption from public
                  permutations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {6},
  pages        = {1381--1425},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01045-z},
  doi          = {10.1007/S10623-022-01045-Z},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BhattacharjeeDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BhuniaFV22,
  author       = {Dipak K. Bhunia and
                  Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba and
                  Merc{\`{e}} Villanueva},
  title        = {On the linearity and classification of {\textdollar}\{{\textbackslash}mathbb
                  \{Z\}\}{\_}\{ps\}{\textdollar}-linear generalized hadamard codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {1037--1058},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01026-2},
  doi          = {10.1007/S10623-022-01026-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BhuniaFV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BibakZ22,
  author       = {Khodakhast Bibak and
                  Behrouz Zolfaghari},
  title        = {The Modular Subset-Sum Problem and the size of deletion correcting
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {8},
  pages        = {1721--1734},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01073-9},
  doi          = {10.1007/S10623-022-01073-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BibakZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BiswasB22,
  author       = {Soumak Biswas and
                  Maheshanand Bhaintwal},
  title        = {Quantum codes from {\textdollar}{\textbackslash}mathbb \{Z\}{\_}2{\textbackslash}mathbb
                  \{Z\}{\_}2[u]/{\textbackslash}langle u4 {\textbackslash}rangle {\textdollar}-cyclic
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {2},
  pages        = {343--366},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00978-1},
  doi          = {10.1007/S10623-021-00978-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BiswasB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlokhuisBD22,
  author       = {Aart Blokhuis and
                  Maarten De Boeck and
                  Jozefien D'haeseleer},
  title        = {Correction to: Cameron-Liebler sets of k-spaces in {\textdollar}\{\{{\textbackslash},
                  {\textbackslash}mathrm\{PG\}{\textbackslash}, \}\}(n, q){\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {2},
  pages        = {477--487},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00983-4},
  doi          = {10.1007/S10623-021-00983-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlokhuisBD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlokhuisBD22a,
  author       = {Aart Blokhuis and
                  Maarten De Boeck and
                  Jozefien D'haeseleer},
  title        = {On the sunflower bound for k-spaces, pairwise intersecting in a point},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {2101--2111},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00949-6},
  doi          = {10.1007/S10623-021-00949-6},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlokhuisBD22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlokhuisPS22,
  author       = {Aart Blokhuis and
                  Ruud Pellikaan and
                  Tam{\'{a}}s Szonyi},
  title        = {The extended coset leader weight enumerator of a twisted cubic code},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {2223--2247},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01060-0},
  doi          = {10.1007/S10623-022-01060-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlokhuisPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BorelloGSS22,
  author       = {Martino Borello and
                  Cem G{\"{u}}neri and
                  Elif Sa{\c{c}}ikara and
                  Patrick Sol{\'{e}}},
  title        = {The concatenated structure of quasi-abelian codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2647--2661},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00921-4},
  doi          = {10.1007/S10623-021-00921-4},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BorelloGSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BoudgoustSS22,
  author       = {Katharina Boudgoust and
                  Amin Sakzad and
                  Ron Steinfeld},
  title        = {Vandermonde meets Regev: public key encryption schemes based on partial
                  Vandermonde problems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {8},
  pages        = {1899--1936},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01083-7},
  doi          = {10.1007/S10623-022-01083-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BoudgoustSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BruynG22,
  author       = {Bart De Bruyn and
                  Mou Gao},
  title        = {Pseudo-embeddings and quadratic sets of quadrics},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {1},
  pages        = {199--213},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00971-8},
  doi          = {10.1007/S10623-021-00971-8},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BruynG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BruynG22a,
  author       = {Bart De Bruyn and
                  Mou Gao},
  title        = {A characterization of the Coxeter cap},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {1963--1981},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00855-x},
  doi          = {10.1007/S10623-021-00855-X},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BruynG22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Byrnes22,
  author       = {Kevin M. Byrnes},
  title        = {Isomorphism of maximum length circuit codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {835--850},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-01005-z},
  doi          = {10.1007/S10623-021-01005-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Byrnes22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CakirogluYY22,
  author       = {Yagmur {\c{C}}akiroglu and
                  Oguz Yayla and
                  Emrah Sercan Yilmaz},
  title        = {The number of irreducible polynomials over finite fields with vanishing
                  trace and reciprocal trace},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2407--2417},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01088-2},
  doi          = {10.1007/S10623-022-01088-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CakirogluYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChakrabortyM22,
  author       = {Himadri Shekhar Chakraborty and
                  Tsuyoshi Miezaki},
  title        = {Variants of Jacobi polynomials in coding theory},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2583--2597},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00923-2},
  doi          = {10.1007/S10623-021-00923-2},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ChakrabortyM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenFSFZLWWG22,
  author       = {Shiyao Chen and
                  Yanhong Fan and
                  Ling Sun and
                  Yong Fu and
                  Haibo Zhou and
                  Yongqing Li and
                  Meiqin Wang and
                  Weijia Wang and
                  Chun Guo},
  title        = {{SAND:} an {AND-RX} Feistel lightweight block cipher supporting S-box-based
                  security evaluations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {1},
  pages        = {155--198},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00970-9},
  doi          = {10.1007/S10623-021-00970-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenFSFZLWWG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChengZZ22,
  author       = {Qi Cheng and
                  Jun Zhang and
                  Jincheng Zhuang},
  title        = {{LWE} from non-commutative group rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {1},
  pages        = {239--263},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00973-6},
  doi          = {10.1007/S10623-021-00973-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChengZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CheonCKK22,
  author       = {Jung Hee Cheon and
                  Wonhee Cho and
                  Jeong Han Kim and
                  Jiseung Kim},
  title        = {Adventures in crypto dark matter: attacks, fixes and analysis for
                  weak pseudorandom functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {8},
  pages        = {1735--1760},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01071-x},
  doi          = {10.1007/S10623-022-01071-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CheonCKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChoiK22,
  author       = {Whan{-}Hyuk Choi and
                  Jon{-}Lark Kim},
  title        = {An improved upper bound on self-dual codes over finite fields GF(11),
                  GF(19), and {GF(23)}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2735--2751},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00968-3},
  doi          = {10.1007/S10623-021-00968-3},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ChoiK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CrnkovicHS22,
  author       = {Dean Crnkovic and
                  Daniel R. Hawtin and
                  Andrea Svob},
  title        = {Neighbour-transitive codes and partial spreads in generalised quadrangles},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {6},
  pages        = {1521--1533},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01053-z},
  doi          = {10.1007/S10623-022-01053-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CrnkovicHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CrnkovicS22,
  author       = {Dean Crnkovic and
                  Andrea Svob},
  title        = {Switching for 2-designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {7},
  pages        = {1585--1593},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01059-7},
  doi          = {10.1007/S10623-022-01059-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CrnkovicS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DalaiPS22,
  author       = {Deepak Kumar Dalai and
                  Santu Pal and
                  Santanu Sarkar},
  title        = {A state bit recovery algorithm with {TMDTO} attack on Lizard and Grain-128a},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {489--521},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00984-3},
  doi          = {10.1007/S10623-021-00984-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DalaiPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DemirbasK22,
  author       = {Fatih Demirbas and
                  Orhun Kara},
  title        = {Integral characteristics by keyspace partitioning},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {2},
  pages        = {443--472},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00989-y},
  doi          = {10.1007/S10623-021-00989-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DemirbasK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dempwolff22,
  author       = {Ulrich Dempwolff},
  title        = {Correction to: {CCZ} equivalence of power functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {2},
  pages        = {473--475},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00979-0},
  doi          = {10.1007/S10623-021-00979-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dempwolff22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Denaux22,
  author       = {Lins Denaux},
  title        = {Constructing saturating sets in projective spaces using subgeometries},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {2113--2144},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00951-y},
  doi          = {10.1007/S10623-021-00951-Y},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Denaux22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DoseMPS22,
  author       = {Valerio Dose and
                  Pietro Mercuri and
                  Ankan Pal and
                  Claudio Stirpe},
  title        = {High order elements in finite fields arising from recursive towers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {6},
  pages        = {1347--1368},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01041-3},
  doi          = {10.1007/S10623-022-01041-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DoseMPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dougherty22,
  author       = {Steven T. Dougherty},
  title        = {The neighbor graph of binary self-dual codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {2},
  pages        = {409--425},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00985-2},
  doi          = {10.1007/S10623-021-00985-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dougherty22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DukesFM22,
  author       = {Austin Dukes and
                  Andrea Ferraguti and
                  Giacomo Micheli},
  title        = {Optimal selection for good polynomials of degree up to five},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {6},
  pages        = {1427--1436},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01046-y},
  doi          = {10.1007/S10623-022-01046-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DukesFM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DunkelmanEKKLS22,
  author       = {Orr Dunkelman and
                  Maria Eichlseder and
                  Daniel Kales and
                  Nathan Keller and
                  Ga{\"{e}}tan Leurent and
                  Markus Schofnegger},
  title        = {Practical key recovery attacks on FlexAEAD},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {983--1007},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01023-5},
  doi          = {10.1007/S10623-022-01023-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DunkelmanEKKLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DuursmaL22,
  author       = {Iwan M. Duursma and
                  Xiao Li},
  title        = {Johnson graph codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {12},
  pages        = {2923--2941},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-01003-1},
  doi          = {10.1007/S10623-021-01003-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DuursmaL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DyshkoW22,
  author       = {Serhii Dyshko and
                  Jay A. Wood},
  title        = {MacWilliams extension property for arbitrary weights on linear codes
                  over module alphabets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2683--2701},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00945-w},
  doi          = {10.1007/S10623-021-00945-W},
  timestamp    = {Thu, 10 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DyshkoW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EyvaziSS22,
  author       = {Hamidreza Eyvazi and
                  Karim Samei and
                  Batoul Savari},
  title        = {The linearity of Carlet's Gray image of linear codes over {\textdollar}\{{\textbackslash}mathbb
                  \{Z\}\}{\_}\{8\}{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2361--2373},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01084-6},
  doi          = {10.1007/S10623-022-01084-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EyvaziSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FernandezU22,
  author       = {Marcel Fernandez and
                  Jorge Jim{\'{e}}nez Urroz},
  title        = {A study of the separating property in Reed-Solomon codes by bounding
                  the minimum distance},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {2},
  pages        = {427--442},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00988-z},
  doi          = {10.1007/S10623-021-00988-Z},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FernandezU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FuL22,
  author       = {Yuqing Fu and
                  Hongwei Liu},
  title        = {Galois self-orthogonal constacyclic codes over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2703--2733},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00957-6},
  doi          = {10.1007/S10623-021-00957-6},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/FuL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GalindoH22,
  author       = {Carlos Galindo and
                  Fernando Hernando},
  title        = {On the generalization of the construction of quantum codes from Hermitian
                  self-orthogonal codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {5},
  pages        = {1103--1112},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01018-2},
  doi          = {10.1007/S10623-022-01018-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GalindoH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GaoMF22,
  author       = {Jian Gao and
                  Xiangrui Meng and
                  Fang{-}Wei Fu},
  title        = {Weight distribution of double cyclic codes over Galois rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2529--2549},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00914-3},
  doi          = {10.1007/S10623-021-00914-3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GaoMF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Geil22,
  author       = {Olav Geil},
  title        = {From primary to dual affine variety codes over the Klein quartic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {523--543},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00990-5},
  doi          = {10.1007/S10623-021-00990-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Geil22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ghatak22,
  author       = {Anirban Ghatak},
  title        = {Extending Coggia-Couvreur attack on Loidreau's rank-metric cryptosystem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {1},
  pages        = {215--238},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00972-7},
  doi          = {10.1007/S10623-021-00972-7},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Ghatak22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GildeaKR22,
  author       = {Joe Gildea and
                  Adrian Korban and
                  Adam Michael Roberts},
  title        = {New binary self-dual codes of lengths 80, 84 and 96 from composite
                  matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {2},
  pages        = {317--342},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00976-3},
  doi          = {10.1007/S10623-021-00976-3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GildeaKR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HaemersM22,
  author       = {Willem H. Haemers and
                  Leila Parsaei Majd},
  title        = {Spectral symmetry in conference matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {1983--1990},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00858-8},
  doi          = {10.1007/S10623-021-00858-8},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HaemersM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HaraMHT22,
  author       = {Keisuke Hara and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {Generic transformation from broadcast encryption to round-optimal
                  deniable ring authentication},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {2},
  pages        = {277--316},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00975-4},
  doi          = {10.1007/S10623-021-00975-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HaraMHT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HeCZZ22,
  author       = {Xianmang He and
                  Yindong Chen and
                  Zusheng Zhang and
                  Kunxiao Zhou},
  title        = {Parallel sub-code construction for constant-dimension codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {12},
  pages        = {2991--3001},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01065-9},
  doi          = {10.1007/S10623-022-01065-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HeCZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HorsleyC22,
  author       = {Daniel Horsley and
                  Padraig {\'{O}} Cath{\'{a}}in},
  title        = {Block avoiding point sequencings of partial Steiner systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2375--2383},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01085-5},
  doi          = {10.1007/S10623-022-01085-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HorsleyC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuangLWD22,
  author       = {Yuwen Huang and
                  Chengju Li and
                  Qi Wang and
                  Zongrun Du},
  title        = {Parameters and characterizations of hulls of some projective narrow-sense
                  {BCH} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {1},
  pages        = {87--106},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00965-6},
  doi          = {10.1007/S10623-021-00965-6},
  timestamp    = {Mon, 27 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuangLWD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuffmanKS22,
  author       = {W. Cary Huffman and
                  Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {Guest editorial: On coding theory and combinatorics - in memory of
                  Vera Pless},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2517--2527},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01126-z},
  doi          = {10.1007/S10623-022-01126-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuffmanKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JafariABKS22,
  author       = {Fatemeh Jafari and
                  Alireza Abdollahi and
                  Javad Bagherian and
                  Maryam Khatami and
                  Reza Sobhani},
  title        = {Equidistant permutation group codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {12},
  pages        = {2841--2859},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00997-y},
  doi          = {10.1007/S10623-021-00997-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JafariABKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Janusz22,
  author       = {Gerald J. Janusz},
  title        = {Covering polynomials and projections of self-dual codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2481--2489},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01091-7},
  doi          = {10.1007/S10623-022-01091-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Janusz22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JanzerN22,
  author       = {Oliver Janzer and
                  Zolt{\'{a}}n L{\'{o}}r{\'{a}}nt Nagy},
  title        = {Coloring linear hypergraphs: the Erd{\H{o}}s-Faber-Lov{\'{a}}sz
                  conjecture and the Combinatorial Nullstellensatz},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {1991--2001},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00859-7},
  doi          = {10.1007/S10623-021-00859-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JanzerN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JenaV22,
  author       = {Dibyayoti Jena and
                  Geertrui Van de Voorde},
  title        = {The geometric field of linearity of linear sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {779--799},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01011-9},
  doi          = {10.1007/S10623-022-01011-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JenaV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JiLW22,
  author       = {Lijun Ji and
                  Miao Liang and
                  Yanting Wang},
  title        = {Combinational constructions of splitting authentication codes with
                  perfect secrecy},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2491--2515},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01092-6},
  doi          = {10.1007/S10623-022-01092-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JiLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JunnilaLL22,
  author       = {Ville Junnila and
                  Tero Laihonen and
                  Tuomo Lehtil{\"{a}}},
  title        = {Improved lower bound for locating-dominating codes in binary Hamming
                  spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {1},
  pages        = {67--85},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00963-8},
  doi          = {10.1007/S10623-021-00963-8},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/JunnilaLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kantor22,
  author       = {William M. Kantor},
  title        = {Automorphism subgroups for designs with {\(\lambda\)} =1},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {2145--2157},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00936-x},
  doi          = {10.1007/S10623-021-00936-X},
  timestamp    = {Fri, 02 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kantor22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KawabataM22,
  author       = {Daiki Kawabata and
                  Tatsuya Maruta},
  title        = {On the nonexistence of ternary linear codes attaining the Griesmer
                  bound},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {947--956},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01021-7},
  doi          = {10.1007/S10623-022-01021-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KawabataM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kiermaier22,
  author       = {Michael Kiermaier},
  title        = {On {\(\alpha\)}-points of q-analogs of the Fano plane},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {6},
  pages        = {1335--1345},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01033-3},
  doi          = {10.1007/S10623-022-01033-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kiermaier22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimK22,
  author       = {Hyun Kwang Kim and
                  Jieun Kwon},
  title        = {Classification of weighted posets and digraphs admitting the extended
                  Hamming code to be a perfect code},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2249--2269},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01066-8},
  doi          = {10.1007/S10623-022-01066-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KimK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimMCLLJ22,
  author       = {Kwang Ho Kim and
                  Sihem Mesnager and
                  Jong Hyok Choe and
                  Dok Nam Lee and
                  Sengsan Lee and
                  Myong Chol Jo},
  title        = {On permutation quadrinomials with boomerang uniformity 4 and the best-known
                  nonlinearity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {6},
  pages        = {1437--1461},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01047-x},
  doi          = {10.1007/S10623-022-01047-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KimMCLLJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimP22,
  author       = {Jon{-}Lark Kim and
                  Junyong Park},
  title        = {Steganography from perfect codes on Cayley graphs over Gaussian integers,
                  Eisenstein-Jacobi integers and Lipschitz integers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {12},
  pages        = {2967--2989},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01063-x},
  doi          = {10.1007/S10623-022-01063-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KimP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KorbanSU22,
  author       = {Adrian Korban and
                  Serap Sahinkaya and
                  Deniz Ustun},
  title        = {Reversible G\({}^{\mbox{k}}\)-codes with applications to {DNA} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {7},
  pages        = {1679--1694},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01067-7},
  doi          = {10.1007/S10623-022-01067-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KorbanSU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Koshelev22,
  author       = {Dmitrii I. Koshelev},
  title        = {Indifferentiable hashing to ordinary elliptic {\textdollar}\{{\textbackslash}mathbb
                  \{F\}\}{\_}\{{\textbackslash}!q\}{\textdollar}-curves of j=0 with
                  the cost of one exponentiation in {\textdollar}\{{\textbackslash}mathbb
                  \{F\}\}{\_}\{{\textbackslash}!q\}{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {801--812},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01012-8},
  doi          = {10.1007/S10623-022-01012-8},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Koshelev22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KudinP22,
  author       = {Sadmir Kudin and
                  Enes Pasalic},
  title        = {A complete characterization of {\textdollar}\{{\textbackslash}mathcal
                  \{D\}\}{\_}0 {\textbackslash}cap \{{\textbackslash}mathcal \{M\}\}{\textbackslash}{\#}{\textdollar}
                  and a general framework for specifying bent functions in \emph{C}
                  outside \emph{M}\({}^{\mbox{{\#}}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {8},
  pages        = {1783--1796},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01079-3},
  doi          = {10.1007/S10623-022-01079-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KudinP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LanCW22,
  author       = {Liantao Lan and
                  Yanxun Chang and
                  Lidong Wang},
  title        = {The completion of optimal cyclic quaternary codes of weight 3 and
                  distance 3},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {851--862},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01006-6},
  doi          = {10.1007/S10623-022-01006-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LanCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LauT22,
  author       = {Terry Shue Chien Lau and
                  Chik How Tan},
  title        = {On the design and security of Lee metric McEliece cryptosystems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {695--717},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-01002-2},
  doi          = {10.1007/S10623-021-01002-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LauT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LavrauwPS22,
  author       = {Michel Lavrauw and
                  Tomasz Popiel and
                  John Sheekey},
  title        = {Combinatorial invariants for nets of conics in {\textdollar}{\textbackslash}mathrm
                  \{PG\}(2, q){\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {2021--2067},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00881-9},
  doi          = {10.1007/S10623-021-00881-9},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LavrauwPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LazebnikL22,
  author       = {Felix Lazebnik and
                  Lorinda Leshock},
  title        = {On Pappus configurations in Hall planes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {5},
  pages        = {1203--1219},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01036-0},
  doi          = {10.1007/S10623-022-01036-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LazebnikL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeS22,
  author       = {Kwangsu Lee and
                  Minhye Seo},
  title        = {Functional encryption for set intersection in the multi-client setting},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {1},
  pages        = {17--47},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00961-w},
  doi          = {10.1007/S10623-021-00961-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiHXZ22,
  author       = {Nian Li and
                  Zhao Hu and
                  Maosheng Xiong and
                  Xiangyong Zeng},
  title        = {A note on "Cryptographically strong permutations from the butterfly
                  structure"},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {2},
  pages        = {265--276},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00974-5},
  doi          = {10.1007/S10623-021-00974-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiHXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiL22,
  author       = {Fei Li and
                  Xiumei Li},
  title        = {Weight distributions and weight hierarchies of a family of p-ary linear
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {1},
  pages        = {49--66},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00962-9},
  doi          = {10.1007/S10623-021-00962-9},
  timestamp    = {Fri, 09 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiY22,
  author       = {Xia Li and
                  Qin Yue},
  title        = {Non-binary irreducible quasi-cyclic parity-check subcodes of Goppa
                  codes and extended Goppa codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {7},
  pages        = {1629--1647},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01062-y},
  doi          = {10.1007/S10623-022-01062-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiYT22,
  author       = {Xia Li and
                  Qin Yue and
                  Deng Tang},
  title        = {A family of linear codes from constant dimension subspace codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {1},
  pages        = {1--15},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00960-x},
  doi          = {10.1007/S10623-021-00960-X},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuLQWSS22,
  author       = {Jiang Liu and
                  Qin Li and
                  Junyu Quan and
                  Can Wang and
                  Jinjing Shi and
                  Haozhen Situ},
  title        = {Efficient quantum homomorphic encryption scheme with flexible evaluators
                  and its simulation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {577--591},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00993-2},
  doi          = {10.1007/S10623-021-00993-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuLQWSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuWHCW22,
  author       = {Jun Liu and
                  Dachao Wang and
                  Yupu Hu and
                  Jie Chen and
                  Baocang Wang},
  title        = {Improved key-recovery attacks on reduced-round {WEM-8}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2419--2448},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01089-1},
  doi          = {10.1007/S10623-022-01089-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuWHCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LongobardiST22,
  author       = {Giovanni Longobardi and
                  Leo Storme and
                  Rocco Trombetti},
  title        = {On sets of subspaces with two intersection dimensions and a geometrical
                  junta bound},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {2081--2099},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00931-2},
  doi          = {10.1007/S10623-021-00931-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LongobardiST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LuMCFW22,
  author       = {Zhenyu Lu and
                  Sihem Mesnager and
                  Tingting Cui and
                  Yanhong Fan and
                  Meiqin Wang},
  title        = {An STP-based model toward designing S-boxes with good cryptographic
                  properties},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {5},
  pages        = {1179--1202},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01034-2},
  doi          = {10.1007/S10623-022-01034-2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LuMCFW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LuoA22,
  author       = {Fucai Luo and
                  Saif M. Al{-}Kuwari},
  title        = {Attribute-based signatures from lattices: unbounded attributes and
                  semi-adaptive security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {5},
  pages        = {1157--1177},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01027-1},
  doi          = {10.1007/S10623-022-01027-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LuoA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LuoL22,
  author       = {Gaojun Luo and
                  San Ling},
  title        = {Application of optimal p-ary linear codes to alphabet-optimal locally
                  repairable codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {5},
  pages        = {1271--1287},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01040-4},
  doi          = {10.1007/S10623-022-01040-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LuoL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MaL22,
  author       = {Junru Ma and
                  Jinquan Luo},
  title        = {{MDS} symbol-pair codes from repeated-root cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {1},
  pages        = {121--137},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00967-4},
  doi          = {10.1007/S10623-021-00967-4},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MaL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MaL22a,
  author       = {Junru Ma and
                  Jinquan Luo},
  title        = {Constructions of {MDS} symbol-pair codes with minimum distance seven
                  or eight},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2337--2359},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01081-9},
  doi          = {10.1007/S10623-022-01081-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MaL22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Martinez22,
  author       = {Federico N. Mart{\'{\i}}nez},
  title        = {Symmetric functions and spherical t-designs in {\textdollar}{\textbackslash}pmb
                  \{{\textbackslash}mathbb \{R\}2\}{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2563--2581},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00922-3},
  doi          = {10.1007/S10623-021-00922-3},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Martinez22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MashahdiBZ22,
  author       = {Samaneh Mashahdi and
                  Bagher Bagherpour and
                  Ali Zaghian},
  title        = {A non-interactive (t, n)-publicly verifiable multi-secret sharing
                  scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {8},
  pages        = {1761--1782},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01082-8},
  doi          = {10.1007/S10623-022-01082-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MashahdiBZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MiezakiN22,
  author       = {Tsuyoshi Miezaki and
                  Hiroyuki Nakasora},
  title        = {A note on the Assmus-Mattson theorem for some binary codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {6},
  pages        = {1485--1502},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01050-2},
  doi          = {10.1007/S10623-022-01050-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MiezakiN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MusicCK22,
  author       = {Luka Music and
                  C{\'{e}}line Chevalier and
                  Elham Kashefi},
  title        = {Dispelling myths on superposition attacks: formal security model and
                  attack analyses},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {881--920},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01017-3},
  doi          = {10.1007/S10623-022-01017-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MusicCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MusicCK22a,
  author       = {Luka Music and
                  C{\'{e}}line Chevalier and
                  Elham Kashefi},
  title        = {Correction to: Dispelling myths on superposition attacks: formal security
                  model and attack analyses},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {6},
  pages        = {1535},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01042-2},
  doi          = {10.1007/S10623-022-01042-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MusicCK22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OngH22,
  author       = {Kai Lin Ong and
                  Ang Miin Huey},
  title        = {On equivalence of cyclic and dihedral zero-divisor codes having nilpotents
                  of nilpotency degree two as generators},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {5},
  pages        = {1127--1138},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01025-3},
  doi          = {10.1007/S10623-022-01025-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OngH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OzbudakT22,
  author       = {Ferruh {\"{O}}zbudak and
                  Burcu G{\"{u}}lmez Tem{\"{u}}r},
  title        = {Classification of permutation polynomials of the form x\({}^{\mbox{3g(x\({}^{\mbox{q-1}}\))}}\)
                  of {\unicode{54589}}\({}_{\mbox{q\({}^{\mbox{2}}\)}}\) where g(x)=x\({}^{\mbox{3+bx+c}}\)
                  and {\textdollar}b, c {\textbackslash}in \{{\textbackslash}mathbb
                  F\}{\_}q*{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {7},
  pages        = {1537--1556},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01052-0},
  doi          = {10.1007/S10623-022-01052-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OzbudakT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PanABFUW22,
  author       = {Rong Pan and
                  R. Julian R. Abel and
                  Yudhistira A. Bunjamin and
                  Tao Feng and
                  Tiana J. Tsang Ung and
                  Xiaomiao Wang},
  title        = {Difference matrices with five rows over finite abelian groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {2},
  pages        = {367--386},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00981-6},
  doi          = {10.1007/S10623-021-00981-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PanABFUW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PatelP22,
  author       = {Shikha Patel and
                  Om Prakash},
  title        = {({\texttheta} , {\(\delta\)} \({}_{\mbox{{\texttheta}}}\) )-Cyclic
                  codes over {\textdollar}{\textbackslash}mathbb \{F\}{\_}q[u, v]/{\textbackslash}langle
                  u2-u, v2-v, uv-vu {\textbackslash}rangle {\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2763--2781},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00964-7},
  doi          = {10.1007/S10623-021-00964-7},
  timestamp    = {Tue, 06 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/PatelP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PawaleSR22,
  author       = {Rajendra M. Pawale and
                  Mohan S. Shrikhande and
                  Kusum S. Rajbhar},
  title        = {Non-existence of quasi-symmetric designs with restricted block graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {871--879},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01016-4},
  doi          = {10.1007/S10623-022-01016-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PawaleSR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Penttila22,
  author       = {Tim Penttila},
  title        = {Uniqueness of the inversive plane of order sixty-four},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {827--834},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01014-6},
  doi          = {10.1007/S10623-022-01014-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Penttila22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/QianCLS22,
  author       = {Liqin Qian and
                  Xiwang Cao and
                  Wei Lu and
                  Patrick Sol{\'{e}}},
  title        = {A new method for constructing linear codes with small hulls},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2663--2682},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00940-1},
  doi          = {10.1007/S10623-021-00940-1},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/QianCLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/QinZY22,
  author       = {Rongcun Qin and
                  Hengming Zhao and
                  Huangsheng Yu},
  title        = {Compatible difference packing set systems and their applications to
                  multilength variable-weight OOCs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2613--2645},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00927-y},
  doi          = {10.1007/S10623-021-00927-Y},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/QinZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RajputB22,
  author       = {Charul Rajput and
                  Maheshanand Bhaintwal},
  title        = {On the locality of quasi-cyclic codes over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {759--777},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01009-3},
  doi          = {10.1007/S10623-022-01009-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RajputB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Romankov22,
  author       = {Vitaly Roman'kov},
  title        = {An improvement of the Diffie-Hellman noncommutative protocol},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {1},
  pages        = {139--153},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00969-2},
  doi          = {10.1007/S10623-021-00969-2},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Romankov22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Romanov22,
  author       = {Alexander M. Romanov},
  title        = {On the number of q-ary quasi-perfect codes with covering radius 2},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {8},
  pages        = {1713--1719},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01070-y},
  doi          = {10.1007/S10623-022-01070-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Romanov22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SantonastasoZ22,
  author       = {Paolo Santonastaso and
                  Ferdinando Zullo},
  title        = {On the list decodability of rank-metric codes containing Gabidulin
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {957--982},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01022-6},
  doi          = {10.1007/S10623-022-01022-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SantonastasoZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SenelO22,
  author       = {Engin Senel and
                  Figen {\"{O}}ke},
  title        = {On the automorphisms of generalized algebraic geometry codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {6},
  pages        = {1369--1379},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01043-1},
  doi          = {10.1007/S10623-022-01043-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SenelO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiWHS22,
  author       = {Minjia Shi and
                  Shukai Wang and
                  Tor Helleseth and
                  Patrick Sol{\'{e}}},
  title        = {Quadratic residue codes, rank three groups and PBIBDs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2599--2611},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00918-z},
  doi          = {10.1007/S10623-021-00918-Z},
  timestamp    = {Thu, 10 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiWHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Sok22,
  author       = {Lin Sok},
  title        = {A new construction of linear codes with one-dimensional hull},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {12},
  pages        = {2823--2839},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00991-4},
  doi          = {10.1007/S10623-021-00991-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Sok22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SuiZS22,
  author       = {Junzhen Sui and
                  Xiaomeng Zhu and
                  Xueying Shi},
  title        = {{MDS} and near-MDS codes via twisted Reed-Solomon codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {8},
  pages        = {1937--1958},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01049-9},
  doi          = {10.1007/S10623-022-01049-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SuiZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TakahashiH22,
  author       = {Hokuto Takahashi and
                  Manabu Hagiwara},
  title        = {Decoding algorithms of monotone codes and azinv codes and their unified
                  view},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {12},
  pages        = {2893--2922},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-01004-0},
  doi          = {10.1007/S10623-021-01004-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TakahashiH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TanFMG22,
  author       = {Pan Tan and
                  Cuiling Fan and
                  Sihem Mesnager and
                  Wei Guo},
  title        = {Linear codes from support designs of ternary cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {681--693},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-01001-3},
  doi          = {10.1007/S10623-021-01001-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TanFMG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TanRC22,
  author       = {Xinyu Tan and
                  Narayanan Rengaswamy and
                  A. Robert Calderbank},
  title        = {Approximate unitary 3-designs from transvection Markov chains},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {9},
  pages        = {2181--2204},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-01000-4},
  doi          = {10.1007/S10623-021-01000-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TanRC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Tonchev22,
  author       = {Vladimir D. Tonchev},
  title        = {Book Review: "Designs from Linear Codes", second edition, by Cunsheng
                  Ding and Chunming Tang, World Scientific, 2022},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {7},
  pages        = {1595--1597},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01058-8},
  doi          = {10.1007/S10623-022-01058-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Tonchev22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Tonchev22a,
  author       = {Vladimir D. Tonchev},
  title        = {On Pless symmetry codes, ternary {QR} codes, and related Hadamard
                  matrices and designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2753--2762},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00941-0},
  doi          = {10.1007/S10623-021-00941-0},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Tonchev22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Trung22,
  author       = {Tran van Trung},
  title        = {A method of constructing 2-resolvable t-designs for t=3, 4},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {7},
  pages        = {1567--1583},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01056-w},
  doi          = {10.1007/S10623-022-01056-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Trung22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangCFTW22,
  author       = {Lidong Wang and
                  Lulu Cai and
                  Tao Feng and
                  Zihong Tian and
                  Xiaomiao Wang},
  title        = {Geometric orthogonal codes and geometrical difference packings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {8},
  pages        = {1857--1879},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01078-4},
  doi          = {10.1007/S10623-022-01078-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangCFTW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangHWH22,
  author       = {Yan Wang and
                  Xilin Han and
                  Weiqiong Wang and
                  Ziling Heng},
  title        = {Linear complexity over {\textdollar}\{{\textbackslash}mathbb \{F\}{\_}\{\{q\}\}\}{\textdollar}
                  and 2-adic complexity of a class of binary generalized cyclotomic
                  sequences with good autocorrelation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {8},
  pages        = {1695--1712},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01068-6},
  doi          = {10.1007/S10623-022-01068-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangHWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangTQ22,
  author       = {Xiao{-}Juan Wang and
                  Tian Tian and
                  Wen{-}Feng Qi},
  title        = {A generic method for investigating nonsingular Galois NFSRs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {2},
  pages        = {387--408},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00982-5},
  doi          = {10.1007/S10623-021-00982-5},
  timestamp    = {Thu, 18 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangTQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WenC22,
  author       = {Jinming Wen and
                  Xiao{-}Wen Chang},
  title        = {Sharper bounds on four lattice constants},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {6},
  pages        = {1463--1484},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01048-w},
  doi          = {10.1007/S10623-022-01048-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WenC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WieseB22,
  author       = {Moritz Wiese and
                  Holger Boche},
  title        = {Mosaics of combinatorial designs for information-theoretic security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {593--632},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00994-1},
  doi          = {10.1007/S10623-021-00994-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WieseB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WuLW22,
  author       = {Yansheng Wu and
                  Yoonjin Lee and
                  Qiang Wang},
  title        = {Further improvement on index bounds},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {12},
  pages        = {2813--2821},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00987-0},
  doi          = {10.1007/S10623-021-00987-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WuLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WuS22,
  author       = {Rongsheng Wu and
                  Minjia Shi},
  title        = {On {\textdollar}{\textbackslash}mathbb \{Z\}{\_}2{\textbackslash}mathbb
                  \{Z\}{\_}4{\textdollar}-additive polycyclic codes and their Gray images},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {11},
  pages        = {2551--2562},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00917-0},
  doi          = {10.1007/S10623-021-00917-0},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WuS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WuZ22,
  author       = {Haoxuan Wu and
                  Jincheng Zhuang},
  title        = {Improving the Gaudry-Schost algorithm for multidimensional discrete
                  logarithms},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {1},
  pages        = {107--119},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00966-5},
  doi          = {10.1007/S10623-021-00966-5},
  timestamp    = {Tue, 08 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WuZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XiangTL22,
  author       = {Can Xiang and
                  Chunming Tang and
                  Qi Liu},
  title        = {An infinite family of antiprimitive cyclic codes supporting Steiner
                  systems S(3, 8, 7\({}^{\mbox{m+1)}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {6},
  pages        = {1319--1333},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01032-4},
  doi          = {10.1007/S10623-022-01032-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XiangTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuZZ22,
  author       = {Xiaofang Xu and
                  Xiangyong Zeng and
                  Shasha Zhang},
  title        = {Regular complete permutation polynomials over {\textdollar}\{{\textbackslash}mathbb
                  \{F\}\}{\_}\{2\{n\}\}{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {545--575},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00992-3},
  doi          = {10.1007/S10623-021-00992-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XuZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YanZ22,
  author       = {Haode Yan and
                  Kun Zhang},
  title        = {On the c-differential spectrum of power functions over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2385--2405},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01086-4},
  doi          = {10.1007/S10623-022-01086-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YanZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YuanTA22,
  author       = {Quan Yuan and
                  Mehdi Tibouchi and
                  Masayuki Abe},
  title        = {On subset-resilient hash function families},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {719--758},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01008-4},
  doi          = {10.1007/S10623-022-01008-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YuanTA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangFM22,
  author       = {Hui Zhang and
                  Cuiling Fan and
                  Sihem Mesnager},
  title        = {Constructions of two-dimensional Z-complementary array pairs with
                  large {ZCZ} ratio},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {5},
  pages        = {1221--1239},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01035-1},
  doi          = {10.1007/S10623-022-01035-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangFM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangFW22,
  author       = {Menglong Zhang and
                  Tao Feng and
                  Xiaomiao Wang},
  title        = {The existence of cyclic (v, 4, 1)-designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {7},
  pages        = {1611--1628},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01057-9},
  doi          = {10.1007/S10623-022-01057-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangFW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangPRW22,
  author       = {Fengrong Zhang and
                  Enes Pasalic and
                  Ren{\'{e}} Rodr{\'{\i}}guez and
                  Yongzhuang Wei},
  title        = {Minimal binary linear codes: a general framework based on bent concatenation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {5},
  pages        = {1289--1318},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01037-z},
  doi          = {10.1007/S10623-022-01037-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangPRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangPZ22,
  author       = {WeiGuo Zhang and
                  Enes Pasalic and
                  Liupiao Zhang},
  title        = {Phase orthogonal sequence sets for {(QS)CDMA} communications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {5},
  pages        = {1139--1156},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01031-5},
  doi          = {10.1007/S10623-022-01031-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangPZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangZT22,
  author       = {Jun Zhang and
                  Zhengchun Zhou and
                  Chunming Tang},
  title        = {A class of twisted generalized Reed-Solomon codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {7},
  pages        = {1649--1658},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01064-w},
  doi          = {10.1007/S10623-022-01064-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangZT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoFT22,
  author       = {Mengzhen Zhao and
                  Cuiling Fan and
                  Zihong Tian},
  title        = {Nearly optimal balanced quaternary sequence pairs of prime period
                  N=uiv 5{\(\pm\)}od 8},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {813--826},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01013-7},
  doi          = {10.1007/S10623-022-01013-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoFT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoLZYMP22,
  author       = {Yi Zhao and
                  Kaitai Liang and
                  Yanqi Zhao and
                  Bo Yang and
                  Yang Ming and
                  Emmanouil Panaousis},
  title        = {Practical algorithm substitution attack on extractable signatures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {921--937},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01019-1},
  doi          = {10.1007/S10623-022-01019-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoLZYMP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoWZPC22,
  author       = {H. Zhao and
                  Yongzhuang Wei and
                  Fengrong Zhang and
                  Enes Pasalic and
                  Nastja Cepak},
  title        = {Two secondary constructions of bent functions without initial conditions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {3},
  pages        = {653--679},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00996-z},
  doi          = {10.1007/S10623-021-00996-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoWZPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoZ22,
  author       = {Yanwei Zhao and
                  Shenglin Zhou},
  title        = {Flag-transitive 2-(v, k, {\(\lambda\)} {)} designs with r{\textgreater}{\(\lambda\)}
                  (k-3)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {4},
  pages        = {863--869},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01010-w},
  doi          = {10.1007/S10623-022-01010-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouFZ22,
  author       = {Zhaocun Zhou and
                  Dengguo Feng and
                  Bin Zhang},
  title        = {Efficient and extensive search for precise linear approximations with
                  high correlations of full {SNOW-V}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2449--2479},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01090-8},
  doi          = {10.1007/S10623-022-01090-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouFZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhuSO22,
  author       = {Hongwei Zhu and
                  Minjia Shi and
                  Ferruh {\"{O}}zbudak},
  title        = {Complete b-symbol weight distribution of some irreducible cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {5},
  pages        = {1113--1125},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01030-6},
  doi          = {10.1007/S10623-022-01030-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhuSO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/0002ZJL21,
  author       = {Xiaojing Chen and
                  Shixin Zhu and
                  Wan Jiang and
                  Gaojun Luo},
  title        = {A new family of {EAQMDS} codes constructed from constacyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {9},
  pages        = {2179--2193},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00908-1},
  doi          = {10.1007/S10623-021-00908-1},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/0002ZJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Abdukhalikov21,
  author       = {Kanat S. Abdukhalikov},
  title        = {Equivalence classes of Niho bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1509--1534},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00885-5},
  doi          = {10.1007/S10623-021-00885-5},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Abdukhalikov21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AbdukhalikovH21,
  author       = {Kanat S. Abdukhalikov and
                  Duy Ho},
  title        = {Extended cyclic codes, maximal arcs and ovoids},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {10},
  pages        = {2283--2294},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00915-2},
  doi          = {10.1007/S10623-021-00915-2},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AbdukhalikovH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AgugliaGS21,
  author       = {Angela Aguglia and
                  Luca Giuzzi and
                  Angelo Sonnino},
  title        = {Near-MDS codes from elliptic curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {965--972},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00852-0},
  doi          = {10.1007/S10623-021-00852-0},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AgugliaGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AhmadiAKS21,
  author       = {M. H. Ahmadi and
                  N. Akhlaghinia and
                  Gholamreza B. Khosrovshahi and
                  S. Sadri},
  title        = {New partitionings of complete designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {12},
  pages        = {2715--2723},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00950-z},
  doi          = {10.1007/S10623-021-00950-Z},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AhmadiAKS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlfaranoLR21,
  author       = {Gianira N. Alfarano and
                  Julia Lieb and
                  Joachim Rosenthal},
  title        = {Construction of {LDPC} convolutional codes via difference triangle
                  sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {10},
  pages        = {2235--2254},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00912-5},
  doi          = {10.1007/S10623-021-00912-5},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AlfaranoLR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlmeidaA21,
  author       = {Paulo Jos{\'{e}} Fernandes Almeida and
                  Diego Napp Avelli},
  title        = {A new rank metric for convolutional codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {1},
  pages        = {53--73},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00808-w},
  doi          = {10.1007/S10623-020-00808-W},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AlmeidaA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Alonso-Gonzalez21,
  author       = {Clementa Alonso{-}Gonz{\'{a}}lez and
                  Miguel {\'{A}}ngel Navarro{-}P{\'{e}}rez},
  title        = {Cyclic orbit flag codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {10},
  pages        = {2331--2356},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00920-5},
  doi          = {10.1007/S10623-021-00920-5},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Alonso-Gonzalez21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AnkurK21,
  author       = {Ankur and
                  Pramod Kumar Kewat},
  title        = {Self-dual codes over {\textdollar}\{{\textbackslash}mathbb \{F\}\}{\_}2[u]/{\textbackslash}langle
                  u4 {\textbackslash}rangle {\textdollar} and Jacobi forms over a totally
                  real subfield of {\textdollar}\{{\textbackslash}mathbb \{Q\}\}({\textbackslash}zeta
                  {\_}8){\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {1091--1109},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00860-0},
  doi          = {10.1007/S10623-021-00860-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AnkurK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AragonBDKPS21,
  author       = {Nicolas Aragon and
                  Marco Baldi and
                  Jean{-}Christophe Deneuville and
                  Karan Khathuria and
                  Edoardo Persichetti and
                  Paolo Santini},
  title        = {Cryptanalysis of a code-based full-time signature},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {9},
  pages        = {2097--2112},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00902-7},
  doi          = {10.1007/S10623-021-00902-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AragonBDKPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ArayaHS21,
  author       = {Makoto Araya and
                  Masaaki Harada and
                  Ken Saito},
  title        = {Characterization and classification of optimal {LCD} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {4},
  pages        = {617--640},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00834-8},
  doi          = {10.1007/S10623-020-00834-8},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ArayaHS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ArmarioBE21,
  author       = {Jos{\'{e}} Andr{\'{e}}s Armario and
                  Iv{\'{a}}n Bailera and
                  Ronan Egan},
  title        = {Generalized Hadamard full propelinear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {4},
  pages        = {599--615},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00827-7},
  doi          = {10.1007/S10623-020-00827-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ArmarioBE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ball21,
  author       = {Simeon Ball},
  title        = {Some constructions of quantum {MDS} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {811--821},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00846-y},
  doi          = {10.1007/S10623-021-00846-Y},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ball21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ballico21,
  author       = {Edoardo Ballico},
  title        = {Locally Recoverable Codes correcting many erasures over small fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {9},
  pages        = {2157--2162},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00905-4},
  doi          = {10.1007/S10623-021-00905-4},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Ballico21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BallicoFGM21,
  author       = {Edoardo Ballico and
                  Giuseppe Favacchio and
                  Elena Guardo and
                  Lorenzo Milazzo},
  title        = {Steiner systems and configurations of points},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {2},
  pages        = {199--219},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00815-x},
  doi          = {10.1007/S10623-020-00815-X},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BallicoFGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BamiloshinBFP21,
  author       = {Michael Bamiloshin and
                  Aner Ben{-}Efraim and
                  Oriol Farr{\`{a}}s and
                  Carles Padr{\'{o}}},
  title        = {Common information, matroid representation, and secret sharing for
                  matroid ports},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {1},
  pages        = {143--166},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00811-1},
  doi          = {10.1007/S10623-020-00811-1},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BamiloshinBFP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BannaiOZ21,
  author       = {Eiichi Bannai and
                  Manabu Oura and
                  Da Zhao},
  title        = {The complex conjugate invariants of Clifford groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {2},
  pages        = {341--350},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00819-7},
  doi          = {10.1007/S10623-020-00819-7},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BannaiOZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BapicP21,
  author       = {Amar Bapic and
                  Enes Pasalic},
  title        = {A new method for secondary constructions of vectorial bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {11},
  pages        = {2463--2475},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00930-3},
  doi          = {10.1007/S10623-021-00930-3},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BapicP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartoliBT21,
  author       = {Daniele Bartoli and
                  Matteo Bonini and
                  Marco Timpanella},
  title        = {On the weight distribution of some minimal codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {3},
  pages        = {471--487},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00826-8},
  doi          = {10.1007/S10623-020-00826-8},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BartoliBT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartoliMZ21,
  author       = {Daniele Bartoli and
                  Maria Montanucci and
                  Giovanni Zini},
  title        = {On certain self-orthogonal {AG} codes with applications to Quantum
                  error-correcting codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1221--1239},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00870-y},
  doi          = {10.1007/S10623-021-00870-Y},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BartoliMZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BhaumikNR21,
  author       = {Ritam Bhaumik and
                  Mridul Nandi and
                  Anik Raychaudhuri},
  title        = {Improved indifferentiability security proof for 3-round tweakable
                  Luby-Rackoff},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {10},
  pages        = {2255--2281},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00913-4},
  doi          = {10.1007/S10623-021-00913-4},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BhaumikNR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BonviciniBGRT21,
  author       = {Simona Bonvicini and
                  Marco Buratti and
                  Martino Garonzi and
                  Gloria Rinaldi and
                  Tommaso Traetta},
  title        = {The first families of highly symmetric Kirkman Triple Systems whose
                  orders fill a congruence class},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {12},
  pages        = {2725--2757},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00952-x},
  doi          = {10.1007/S10623-021-00952-X},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BonviciniBGRT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bouyuklieva21,
  author       = {Stefka Bouyuklieva},
  title        = {Optimal binary {LCD} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {11},
  pages        = {2445--2461},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00929-w},
  doi          = {10.1007/S10623-021-00929-W},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Bouyuklieva21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BudaghyanCCCV21,
  author       = {Lilya Budaghyan and
                  Marco Calderini and
                  Claude Carlet and
                  Robert S. Coulter and
                  Irene Villa},
  title        = {Generalized isotopic shift construction for {APN} functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {1},
  pages        = {19--32},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00803-1},
  doi          = {10.1007/S10623-020-00803-1},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BudaghyanCCCV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Calderini21,
  author       = {Marco Calderini},
  title        = {Differentially low uniform permutations from known 4-uniform functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {1},
  pages        = {33--52},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00807-x},
  doi          = {10.1007/S10623-020-00807-X},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Calderini21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletKM21,
  author       = {Claude Carlet and
                  Kwang Ho Kim and
                  Sihem Mesnager},
  title        = {A direct proof of APN-ness of the Kasami functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {3},
  pages        = {441--446},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00830-y},
  doi          = {10.1007/S10623-020-00830-Y},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarvalhoN21,
  author       = {C{\'{\i}}cero Carvalho and
                  Victor G. L. Neumann},
  title        = {Towards the Complete Determination of Next-to-Minimal Weights of Projective
                  Reed-Muller Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {2},
  pages        = {301--315},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00821-z},
  doi          = {10.1007/S10623-020-00821-Z},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CarvalhoN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CavenaghMW21,
  author       = {Nicholas J. Cavenagh and
                  Adam Mammoliti and
                  Ian M. Wanless},
  title        = {Maximal sets of mutually orthogonal frequency squares},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {3},
  pages        = {525--558},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00832-w},
  doi          = {10.1007/S10623-020-00832-W},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CavenaghMW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CesmeliogluMP21,
  author       = {Ay{\c{c}}a {\c{C}}esmelioglu and
                  Wilfried Meidl and
                  Isabel Pirsic},
  title        = {Vectorial bent functions and partial difference sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {10},
  pages        = {2313--2330},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00919-y},
  doi          = {10.1007/S10623-021-00919-Y},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CesmeliogluMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChaiWX21,
  author       = {Jinjin Chai and
                  Zilong Wang and
                  Erzhong Xue},
  title        = {Walsh spectrum and nega spectrum of complementary arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {12},
  pages        = {2663--2677},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00938-9},
  doi          = {10.1007/S10623-021-00938-9},
  timestamp    = {Thu, 16 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ChaiWX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChakrabortyFP21,
  author       = {Olive Chakraborty and
                  Jean{-}Charles Faug{\`{e}}re and
                  Ludovic Perret},
  title        = {Cryptanalysis of the extension field cancellation cryptosystem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1335--1364},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00873-9},
  doi          = {10.1007/S10623-021-00873-9},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChakrabortyFP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChakrabortyM21,
  author       = {Pranab Chakraborty and
                  Subhamoy Maitra},
  title        = {Further clarification on Mantin's Digraph Repetition Bias in {RC4}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {1},
  pages        = {127--141},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00814-y},
  doi          = {10.1007/S10623-020-00814-Y},
  timestamp    = {Mon, 25 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ChakrabortyM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChakrabortyM21a,
  author       = {Himadri Shekhar Chakraborty and
                  Tsuyoshi Miezaki},
  title        = {Average of complete joint weight enumerators and self-dual codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1241--1254},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00874-8},
  doi          = {10.1007/S10623-021-00874-8},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChakrabortyM21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChauhanSSY21,
  author       = {Varsha Chauhan and
                  Anuradha Sharma and
                  Sandeep Sharma and
                  Monika Yadav},
  title        = {Hamming weight distributions of multi-twisted codes over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {8},
  pages        = {1787--1837},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00889-1},
  doi          = {10.1007/S10623-021-00889-1},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChauhanSSY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenMZ21,
  author       = {Ruikai Chen and
                  Sihem Mesnager and
                  Chang{-}An Zhao},
  title        = {Good polynomials for optimal {LRC} of low locality},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1639--1660},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00886-4},
  doi          = {10.1007/S10623-021-00886-4},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenMZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenMZ21a,
  author       = {Ruikai Chen and
                  Sihem Mesnager and
                  Chang{-}An Zhao},
  title        = {Correction to: Good polynomials for optimal {LRC} of low locality},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {8},
  pages        = {2031},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00909-0},
  doi          = {10.1007/S10623-021-00909-0},
  timestamp    = {Thu, 12 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenMZ21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenXTT21,
  author       = {Yu{-}Chi Chen and
                  Xin Xie and
                  Hung{-}Yu Tsao and
                  Raylin Tso},
  title        = {Public key encryption with filtered equality test revisited},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {10},
  pages        = {2357--2372},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00924-1},
  doi          = {10.1007/S10623-021-00924-1},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenXTT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenZ21,
  author       = {Jianfu Chen and
                  Shenglin Zhou},
  title        = {Flag-transitive, point-imprimitive 2-(v, k, {\(\lambda\)} {)} symmetric
                  designs with k and {\(\lambda\)} prime powers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1255--1260},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00869-5},
  doi          = {10.1007/S10623-021-00869-5},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenZJ21,
  author       = {Xiaojing Chen and
                  Shixin Zhu and
                  Wan Jiang},
  title        = {Cyclic codes and some new entanglement-assisted quantum {MDS} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {11},
  pages        = {2533--2551},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00935-y},
  doi          = {10.1007/S10623-021-00935-Y},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenZJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChisakiFM21,
  author       = {Shoko Chisaki and
                  Ryoh Fuji{-}Hara and
                  Nobuko Miyamoto},
  title        = {A construction for circulant type dropout designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {8},
  pages        = {1839--1852},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00890-8},
  doi          = {10.1007/S10623-021-00890-8},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChisakiFM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChoKL21,
  author       = {Wonhee Cho and
                  Jiseung Kim and
                  Changmin Lee},
  title        = {(In)security of concrete instantiation of Lin17's functional encryption
                  scheme from noisy multilinear maps},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {973--1016},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00854-y},
  doi          = {10.1007/S10623-021-00854-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChoKL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Colbourn21,
  author       = {Charles J. Colbourn},
  title        = {Egalitarian Steiner triple systems for data popularity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {10},
  pages        = {2373--2395},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00925-0},
  doi          = {10.1007/S10623-021-00925-0},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Colbourn21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CuiLGW21,
  author       = {Nan Cui and
                  Shengli Liu and
                  Dawu Gu and
                  Jian Weng},
  title        = {Robustly reusable fuzzy extractor with imperfect randomness},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {1017--1059},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00843-1},
  doi          = {10.1007/S10623-021-00843-1},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CuiLGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DavisHKLRSSS21,
  author       = {James A. Davis and
                  J. J. Hoo and
                  Connor Kissane and
                  Ziming Liu and
                  Calvin Reedy and
                  Kartikey Sharma and
                  Ken Smith and
                  Yiwei Sun},
  title        = {Abelian difference sets with the symmetric difference property},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {3},
  pages        = {517--523},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00829-5},
  doi          = {10.1007/S10623-020-00829-5},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DavisHKLRSSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DavydovMP21,
  author       = {Alexander A. Davydov and
                  Stefano Marcugini and
                  Fernanda Pambianco},
  title        = {Twisted cubic and point-line incidence matrix in {\textdollar}{\textbackslash}mathrm
                  \{PG\}(3, q){\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {10},
  pages        = {2211--2233},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00911-6},
  doi          = {10.1007/S10623-021-00911-6},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DavydovMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DingTT21,
  author       = {Cunsheng Ding and
                  Chunming Tang and
                  Vladimir D. Tonchev},
  title        = {The projective general linear group {\textdollar}\{{\textbackslash}mathrm
                  \{PGL\}\}(2, 2m){\textdollar} and linear codes of length 2\({}^{\mbox{m+1}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1713--1734},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00888-2},
  doi          = {10.1007/S10623-021-00888-2},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DingTT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dong21,
  author       = {Huili Dong},
  title        = {Flag-transitive 4-designs and PSL(2, q) groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1147--1157},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00867-7},
  doi          = {10.1007/S10623-021-00867-7},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dong21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DoughertyGKK21,
  author       = {Steven T. Dougherty and
                  Joe Gildea and
                  Adrian Korban and
                  Abidin Kaya},
  title        = {Composite matrices from group rings, composite G-codes and constructions
                  of self-dual codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1615--1638},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00882-8},
  doi          = {10.1007/S10623-021-00882-8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DoughertyGKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EmuraTW21,
  author       = {Keita Emura and
                  Atsushi Takayasu and
                  Yohei Watanabe},
  title        = {Adaptively secure revocable hierarchical {IBE} from k-linear assumption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1535--1574},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00880-w},
  doi          = {10.1007/S10623-021-00880-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EmuraTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EmuraTW21a,
  author       = {Keita Emura and
                  Atsushi Takayasu and
                  Yohei Watanabe},
  title        = {Efficient identity-based encryption with Hierarchical key-insulation
                  from {HIBE}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {10},
  pages        = {2397--2431},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00926-z},
  doi          = {10.1007/S10623-021-00926-Z},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EmuraTW21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EsfahaniS21,
  author       = {Navid Nasr Esfahani and
                  Douglas R. Stinson},
  title        = {On security properties of all-or-nothing transforms},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {12},
  pages        = {2857--2867},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00958-5},
  doi          = {10.1007/S10623-021-00958-5},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/EsfahaniS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EtzionZ21,
  author       = {Tuvi Etzion and
                  Junling Zhou},
  title        = {Large sets with multiplicity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1661--1690},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00878-4},
  doi          = {10.1007/S10623-021-00878-4},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EtzionZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FalconeP21,
  author       = {Giovanni Falcone and
                  Marco Pavone},
  title        = {Binary Hamming codes and Boolean designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1261--1277},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00853-z},
  doi          = {10.1007/S10623-021-00853-Z},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/FalconeP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FarrasRR21,
  author       = {Oriol Farr{\`{a}}s and
                  Jordi Ribes{-}Gonz{\'{a}}lez and
                  Sara Ricci},
  title        = {Privacy-preserving data splitting: a combinatorial approach},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1735--1756},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00884-6},
  doi          = {10.1007/S10623-021-00884-6},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/FarrasRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FengLLLW21,
  author       = {Hanwen Feng and
                  Jianwei Liu and
                  Dawei Li and
                  Ya{-}Nan Li and
                  Qianhong Wu},
  title        = {Traceable ring signatures: general framework and post-quantum security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1111--1145},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00863-x},
  doi          = {10.1007/S10623-021-00863-X},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FengLLLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FickusIJK21,
  author       = {Matthew Fickus and
                  Joseph W. Iverson and
                  John Jasper and
                  Emily J. King},
  title        = {Grassmannian codes from paired difference sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {11},
  pages        = {2553--2576},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00937-w},
  doi          = {10.1007/S10623-021-00937-W},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FickusIJK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GhasemiKKPR21,
  author       = {Fatemeh Ghasemi and
                  Reza Kaboli and
                  Shahram Khazaei and
                  Maghsoud Parviz and
                  Mohammad{-}Mahdi Rafiei},
  title        = {On ideal homomorphic secret sharing schemes and their decomposition},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {9},
  pages        = {2079--2096},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00901-8},
  doi          = {10.1007/S10623-021-00901-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GhasemiKKPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GhoshS21,
  author       = {Sebati Ghosh and
                  Palash Sarkar},
  title        = {Variants of Wegman-Carter message authentication code supporting variable
                  tag lengths},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {4},
  pages        = {709--736},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00840-w},
  doi          = {10.1007/S10623-020-00840-W},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GhoshS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GhoshS21a,
  author       = {Sebati Ghosh and
                  Palash Sarkar},
  title        = {Breaking tweakable enciphering schemes using Simon's algorithm},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {8},
  pages        = {1907--1926},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00893-5},
  doi          = {10.1007/S10623-021-00893-5},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GhoshS21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Gluesing-Luerssen21,
  author       = {Heide Gluesing{-}Luerssen and
                  Hunter Lehmann},
  title        = {Distance Distributions of Cyclic Orbit Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {3},
  pages        = {447--470},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00823-x},
  doi          = {10.1007/S10623-020-00823-X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Gluesing-Luerssen21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GongQ21,
  author       = {Junqing Gong and
                  Haifeng Qian},
  title        = {Simple and efficient {FE} for quadratic functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {8},
  pages        = {1757--1786},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00871-x},
  doi          = {10.1007/S10623-021-00871-X},
  timestamp    = {Thu, 07 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GongQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GrezetH21,
  author       = {Matthias Grezet and
                  Camilla Hollanti},
  title        = {The complete hierarchical locality of the punctured Simplex code},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {1},
  pages        = {105--125},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00810-2},
  doi          = {10.1007/S10623-020-00810-2},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GrezetH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Guo21,
  author       = {Jun Guo},
  title        = {Cameron-Liebler sets in bilinear forms graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1159--1180},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00864-w},
  doi          = {10.1007/S10623-021-00864-W},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Guo21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuoZ21,
  author       = {Chun Guo and
                  Guoyan Zhang},
  title        = {Beyond-birthday security for permutation-based Feistel networks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {3},
  pages        = {407--440},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00820-0},
  doi          = {10.1007/S10623-020-00820-0},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuoZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Harada21,
  author       = {Masaaki Harada},
  title        = {Construction of binary {LCD} codes, ternary {LCD} codes and quaternary
                  Hermitian {LCD} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {10},
  pages        = {2295--2312},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00916-1},
  doi          = {10.1007/S10623-021-00916-1},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Harada21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HasanPRS21,
  author       = {Sartaj Ul Hasan and
                  Mohit Pal and
                  Constanza Riera and
                  Pantelimon Stanica},
  title        = {On the c-differential uniformity of certain maps over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {2},
  pages        = {221--239},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00812-0},
  doi          = {10.1007/S10623-020-00812-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HasanPRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HasanPS21,
  author       = {Sartaj Ul Hasan and
                  Mohit Pal and
                  Pantelimon Stanica},
  title        = {Boomerang uniformity of a class of power maps},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {11},
  pages        = {2627--2636},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00944-x},
  doi          = {10.1007/S10623-021-00944-X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HasanPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Hawtin21,
  author       = {Daniel R. Hawtin},
  title        = {s-Elusive codes in Hamming graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1211--1220},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00868-6},
  doi          = {10.1007/S10623-021-00868-6},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Hawtin21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HengLDC21,
  author       = {Ziling Heng and
                  Dexiang Li and
                  Jiao Du and
                  Fuling Chen},
  title        = {A family of projective two-weight linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {8},
  pages        = {1993--2007},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00896-2},
  doi          = {10.1007/S10623-021-00896-2},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HengLDC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuL21,
  author       = {Peng Hu and
                  Xiusheng Liu},
  title        = {Linear complementary pairs of codes over rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {11},
  pages        = {2495--2509},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00933-0},
  doi          = {10.1007/S10623-021-00933-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuangYNL21,
  author       = {Daitao Huang and
                  Qin Yue and
                  Yongfeng Niu and
                  Xia Li},
  title        = {{MDS} or {NMDS} self-dual codes from twisted generalized Reed-Solomon
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {9},
  pages        = {2195--2209},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00910-7},
  doi          = {10.1007/S10623-021-00910-7},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuangYNL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/InnamoratiZ21,
  author       = {Stefano Innamorati and
                  Fulvio Zuanni},
  title        = {Classifying sets of class [1, q+1, 2q+1, q\({}^{\mbox{2}}\)+q+1]\({}_{\mbox{2}}\)
                  in PG(r, q), {\textdollar}r{\textbackslash}ge 3{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {3},
  pages        = {489--496},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00833-9},
  doi          = {10.1007/S10623-020-00833-9},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/InnamoratiZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JaramilloPV21,
  author       = {Delio Jaramillo and
                  Maria Vaz Pinto and
                  Rafael H. Villarreal},
  title        = {Evaluation codes and their basic parameters},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {2},
  pages        = {269--300},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00818-8},
  doi          = {10.1007/S10623-020-00818-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JaramilloPV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JiaL21,
  author       = {Dingding Jia and
                  Beno{\^{\i}}t Libert},
  title        = {{SO-CCA} secure {PKE} from pairing based all-but-many lossy trapdoor
                  functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {895--923},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00849-9},
  doi          = {10.1007/S10623-021-00849-9},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JiaL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JohnsenV21,
  author       = {Trygve Johnsen and
                  Hugues Verdure},
  title        = {Greedy weights for matroids},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {2},
  pages        = {387--405},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00824-w},
  doi          = {10.1007/S10623-020-00824-W},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JohnsenV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JohnsenV21a,
  author       = {Trygve Johnsen and
                  Hugues Verdure},
  title        = {M{\"{o}}bius and coboundary polynomials for matroids},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {9},
  pages        = {2163--2177},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00906-3},
  doi          = {10.1007/S10623-021-00906-3},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/JohnsenV21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KharaghaniPS21,
  author       = {Hadi Kharaghani and
                  Thomas Pender and
                  Sho Suda},
  title        = {Balancedly splittable orthogonal designs and equiangular tight frames},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {9},
  pages        = {2033--2050},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00897-1},
  doi          = {10.1007/S10623-021-00897-1},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KharaghaniPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KuchtaSSL21,
  author       = {Veronika Kuchta and
                  Amin Sakzad and
                  Ron Steinfeld and
                  Joseph K. Liu},
  title        = {Lattice-based zero-knowledge arguments for additive and multiplicative
                  relations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {925--963},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00851-1},
  doi          = {10.1007/S10623-021-00851-1},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KuchtaSSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kurz21,
  author       = {Sascha Kurz},
  title        = {Bounds for flag codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {12},
  pages        = {2759--2785},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00953-w},
  doi          = {10.1007/S10623-021-00953-W},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Kurz21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KurzY21,
  author       = {Sascha Kurz and
                  Eitan Yaakobi},
  title        = {{PIR} Codes with Short Block Length},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {3},
  pages        = {559--587},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00828-6},
  doi          = {10.1007/S10623-020-00828-6},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/KurzY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiLHG21,
  author       = {Yiming Li and
                  Shengli Liu and
                  Shuai Han and
                  Dawu Gu},
  title        = {Pseudorandom functions in {NC} class from the standard {LWE} assumption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {12},
  pages        = {2807--2839},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00955-8},
  doi          = {10.1007/S10623-021-00955-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiLHG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiLHQ21,
  author       = {Kangquan Li and
                  Chunlei Li and
                  Tor Helleseth and
                  Longjiang Qu},
  title        = {Cryptographically strong permutations from the butterfly structure},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {4},
  pages        = {737--761},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00837-5},
  doi          = {10.1007/S10623-020-00837-5},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiLHQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LigetiST21,
  author       = {P{\'{e}}ter Ligeti and
                  P{\'{e}}ter Sziklai and
                  Marcella Tak{\'{a}}ts},
  title        = {Generalized threshold secret sharing and finite geometry},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {9},
  pages        = {2067--2078},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00900-9},
  doi          = {10.1007/S10623-021-00900-9},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LigetiST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuHL21,
  author       = {Hualu Liu and
                  Peng Hu and
                  Xiusheng Liu},
  title        = {Asymmetric entanglement-assisted quantum codes: bound and constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {797--809},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00845-z},
  doi          = {10.1007/S10623-021-00845-Z},
  timestamp    = {Tue, 11 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuHL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuL21,
  author       = {Huaning Liu and
                  Xi Liu},
  title        = {On the properties of generalized cyclotomic binary sequences of period
                  2p\({}^{\mbox{m}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1691--1712},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00887-3},
  doi          = {10.1007/S10623-021-00887-3},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuL21a,
  author       = {Hongwei Liu and
                  Shengwei Liu},
  title        = {Construction of {MDS} twisted Reed-Solomon codes and {LCD} {MDS} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {9},
  pages        = {2051--2065},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00899-z},
  doi          = {10.1007/S10623-021-00899-Z},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuL21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LopezMMPW21,
  author       = {Hiram H. L{\'{o}}pez and
                  Beth Malmskog and
                  Gretchen L. Matthews and
                  Fernando Pi{\~{n}}ero{-}Gonz{\'{a}}lez and
                  Mary Wootters},
  title        = {Hermitian-lifted codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {3},
  pages        = {497--515},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00836-6},
  doi          = {10.1007/S10623-020-00836-6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LopezMMPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LopezSV21,
  author       = {Hiram H. L{\'{o}}pez and
                  Ivan Soprunov and
                  Rafael H. Villarreal},
  title        = {The dual of an evaluation code},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1367--1403},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00872-w},
  doi          = {10.1007/S10623-021-00872-W},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LopezSV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MeidlP21,
  author       = {Wilfried Meidl and
                  Isabel Pirsic},
  title        = {Bent and {\textdollar}\{\{{\textbackslash}mathbb \{Z\}\}\}{\_}\{2k\}{\textdollar}-Bent
                  functions from spread-like partitions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {1},
  pages        = {75--89},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00805-z},
  doi          = {10.1007/S10623-020-00805-Z},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MeidlP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MengZW21,
  author       = {Zhaoping Meng and
                  Bin Zhang and
                  Zhanggui Wu},
  title        = {Constructions of doubly resolvable Steiner quadruple systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {781--795},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00844-0},
  doi          = {10.1007/S10623-021-00844-0},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MengZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MenninkN21,
  author       = {Bart Mennink and
                  Samuel Neves},
  title        = {On the Resilience of Even-Mansour to Invariant Permutations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {859--893},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00850-2},
  doi          = {10.1007/S10623-021-00850-2},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MenninkN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MesnagerSZ21,
  author       = {Sihem Mesnager and
                  Sihong Su and
                  Hui Zhang},
  title        = {A construction method of balanced rotation symmetric Boolean functions
                  on arbitrary even number of variables with optimal algebraic immunity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {1},
  pages        = {1--17},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00806-y},
  doi          = {10.1007/S10623-020-00806-Y},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MesnagerSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Miezaki21,
  author       = {Tsuyoshi Miezaki},
  title        = {Design-theoretic analogies between codes, lattices, and vertex operator
                  algebras},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {763--780},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00842-2},
  doi          = {10.1007/S10623-021-00842-2},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Miezaki21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MiezakiMN21,
  author       = {Tsuyoshi Miezaki and
                  Akihiro Munemasa and
                  Hiroyuki Nakasora},
  title        = {A note on Assmus-Mattson type theorems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {843--858},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00848-w},
  doi          = {10.1007/S10623-021-00848-W},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MiezakiMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Monroe21,
  author       = {Laura Monroe},
  title        = {Binary signed-digit integers and the Stern diatomic sequence},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {12},
  pages        = {2653--2662},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00903-6},
  doi          = {10.1007/S10623-021-00903-6},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Monroe21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Oblaukhov21,
  author       = {Alexey Oblaukhov},
  title        = {On metric regularity of Reed-Muller codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {1},
  pages        = {167--197},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00813-z},
  doi          = {10.1007/S10623-020-00813-Z},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Oblaukhov21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PangZK21,
  author       = {Binbin Pang and
                  Shixin Zhu and
                  Xiaoshan Kai},
  title        = {Five families of the narrow-sense primitive {BCH} codes over finite
                  fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {12},
  pages        = {2679--2696},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00942-z},
  doi          = {10.1007/S10623-021-00942-Z},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/PangZK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PolujanP21,
  author       = {Alexandr A. Polujan and
                  Alexander Pott},
  title        = {Correction to: Cubic bent functions outside the completed Maiorana-McFarland
                  class},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1365--1366},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00877-5},
  doi          = {10.1007/S10623-021-00877-5},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PolujanP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RennerNP21,
  author       = {Julian Renner and
                  Alessandro Neri and
                  Sven Puchinger},
  title        = {Low-rank parity-check codes over Galois rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {2},
  pages        = {351--386},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00825-9},
  doi          = {10.1007/S10623-020-00825-9},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RennerNP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RennerPW21,
  author       = {Julian Renner and
                  Sven Puchinger and
                  Antonia Wachter{-}Zeh},
  title        = {{LIGA:} a cryptosystem based on the hardness of rank-metric list and
                  interleaved decoding},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1279--1319},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00861-z},
  doi          = {10.1007/S10623-021-00861-Z},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RennerPW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RozhkovS21,
  author       = {Michail I. Rozhkov and
                  Alexander V. Sorokin},
  title        = {Some conditions for absence of affine functions in {NFSR} output stream},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {11},
  pages        = {2433--2443},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00928-x},
  doi          = {10.1007/S10623-021-00928-X},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/RozhkovS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SadeghiRB21,
  author       = {Sadegh Sadeghi and
                  Vincent Rijmen and
                  Nasour Bagheri},
  title        = {Proposing an MILP-based method for the experimental verification of
                  difference-based trails: application to SPECK, {SIMECK}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {9},
  pages        = {2113--2155},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00904-5},
  doi          = {10.1007/S10623-021-00904-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SadeghiRB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SajadiehM21,
  author       = {Mahdi Sajadieh and
                  Mohsen Mousavi},
  title        = {Construction of {MDS} matrices from generalized Feistel structures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1433--1452},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00876-6},
  doi          = {10.1007/S10623-021-00876-6},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SajadiehM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShafieinejadE21,
  author       = {Masoumeh Shafieinejad and
                  Navid Nasr Esfahani},
  title        = {A scalable post-quantum hash-based group signature},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {1061--1090},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00857-9},
  doi          = {10.1007/S10623-021-00857-9},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShafieinejadE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SharmaS21,
  author       = {Hariom Sharma and
                  R. K. Sharma},
  title        = {Existence of primitive normal pairs with one prescribed trace over
                  finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {12},
  pages        = {2841--2855},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00956-7},
  doi          = {10.1007/S10623-021-00956-7},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/SharmaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiWHGW21,
  author       = {Tairong Shi and
                  Wenling Wu and
                  Bin Hu and
                  Jie Guan and
                  Sengpeng Wang},
  title        = {Breaking {LWC} candidates: sESTATE and Elephant in quantum setting},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1405--1432},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00875-7},
  doi          = {10.1007/S10623-021-00875-7},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiWHGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SidanaS21,
  author       = {Tania Sidana and
                  Anuradha Sharma},
  title        = {Roulette games and depths of words over finite commutative rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {4},
  pages        = {641--678},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00838-4},
  doi          = {10.1007/S10623-020-00838-4},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SidanaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Sok21,
  author       = {Lin Sok},
  title        = {New families of self-dual codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {5},
  pages        = {823--841},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00847-x},
  doi          = {10.1007/S10623-021-00847-X},
  timestamp    = {Tue, 11 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Sok21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SongTSH21,
  author       = {Ling Song and
                  Yi Tu and
                  Danping Shi and
                  Lei Hu},
  title        = {Security analysis of Subterranean 2.0},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {8},
  pages        = {1875--1905},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00892-6},
  doi          = {10.1007/S10623-021-00892-6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SongTSH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SunYW21,
  author       = {Yuhua Sun and
                  Tongjiang Yan and
                  Qiuyan Wang},
  title        = {The 2-adic complexity of Yu-Gong sequences with interleaved structure
                  and optimal autocorrelation magnitude},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {4},
  pages        = {695--707},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00841-9},
  doi          = {10.1007/S10623-020-00841-9},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SunYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Takayasu21,
  author       = {Atsushi Takayasu},
  title        = {Tag-based {ABE} in prime-order groups via pair encoding},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {8},
  pages        = {1927--1963},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00894-4},
  doi          = {10.1007/S10623-021-00894-4},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Takayasu21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Takayasu21a,
  author       = {Atsushi Takayasu},
  title        = {Adaptively secure lattice-based revocable {IBE} in the {QROM:} compact
                  parameters, tight security, and anonymity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {8},
  pages        = {1965--1992},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00895-3},
  doi          = {10.1007/S10623-021-00895-3},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Takayasu21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TomidaKN21,
  author       = {Junichi Tomida and
                  Yuto Kawahara and
                  Ryo Nishimaki},
  title        = {Fast, compact, and expressive attribute-based encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {11},
  pages        = {2577--2626},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00939-8},
  doi          = {10.1007/S10623-021-00939-8},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/TomidaKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Trung21,
  author       = {Tran van Trung},
  title        = {An extending theorem for s-resolvable t-designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {3},
  pages        = {589--597},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00835-7},
  doi          = {10.1007/S10623-020-00835-7},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Trung21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TuZJL21,
  author       = {Ziran Tu and
                  Xiangyong Zeng and
                  Yupeng Jiang and
                  Yan Li},
  title        = {Binomial permutations over finite fields with even characteristic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {12},
  pages        = {2869--2888},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00959-4},
  doi          = {10.1007/S10623-021-00959-4},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/TuZJL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TurnerKBG21,
  author       = {Jonathan S. Turner and
                  Ilias S. Kotsireas and
                  Dursun A. Bulutoglu and
                  Andrew J. Geyer},
  title        = {A Legendre pair of length 77 using complementary binary matrices with
                  fixed marginals},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1321--1333},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00862-y},
  doi          = {10.1007/S10623-021-00862-Y},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TurnerKBG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Wang21,
  author       = {Xin Wang},
  title        = {Improved upper bounds for parent-identifying set systems and separable
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {1},
  pages        = {91--104},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00809-9},
  doi          = {10.1007/S10623-020-00809-9},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Wang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangJ21,
  author       = {Qian Wang and
                  Chenhui Jin},
  title        = {Bounding the length of impossible differentials for {SPN} block ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {11},
  pages        = {2477--2493},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00932-1},
  doi          = {10.1007/S10623-021-00932-1},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangWYF21,
  author       = {Xiang Wang and
                  Yuanjie Wang and
                  Wenjuan Yin and
                  Fang{-}Wei Fu},
  title        = {Nonexistence of perfect permutation codes under the Kendall {\(\tau\)}-metric},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {11},
  pages        = {2511--2531},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00934-z},
  doi          = {10.1007/S10623-021-00934-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangWYF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangZZ21,
  author       = {Xiaoqiang Wang and
                  Dabin Zheng and
                  Yan Zhang},
  title        = {Binary linear codes with few weights from Boolean functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {8},
  pages        = {2009--2030},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00898-0},
  doi          = {10.1007/S10623-021-00898-0},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangZZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangZZF21,
  author       = {Zhongxiao Wang and
                  Qunxiong Zheng and
                  Xiao{-}Xin Zhao and
                  Xiutao Feng},
  title        = {Grain-like structures with minimal and maximal period sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {4},
  pages        = {679--693},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00839-3},
  doi          = {10.1007/S10623-020-00839-3},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangZZF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WuLZ21,
  author       = {Yanan Wu and
                  Nian Li and
                  Xiangyong Zeng},
  title        = {New PcN and APcN functions over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {11},
  pages        = {2637--2651},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00946-9},
  doi          = {10.1007/S10623-021-00946-9},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WuLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YanL21,
  author       = {Haode Yan and
                  Chengju Li},
  title        = {Differential spectra of a class of power permutations with characteristic
                  5},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1181--1191},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00865-9},
  doi          = {10.1007/S10623-021-00865-9},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YanL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YangZW21,
  author       = {Yumeng Yang and
                  Xiangyong Zeng and
                  Shi Wang},
  title        = {Construction of lightweight involutory {MDS} matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1453--1483},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00879-3},
  doi          = {10.1007/S10623-021-00879-3},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YangZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YeT21,
  author       = {Chen{-}Dong Ye and
                  Tian Tian},
  title        = {An improved degree evaluation method of NFSR-based cryptosystems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {12},
  pages        = {2787--2806},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00954-9},
  doi          = {10.1007/S10623-021-00954-9},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/YeT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YeTZ21,
  author       = {Chen{-}Dong Ye and
                  Tian Tian and
                  Fan{-}Yang Zeng},
  title        = {The MILP-aided conditional differential attack and its application
                  to Trivium},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {2},
  pages        = {317--339},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00822-y},
  doi          = {10.1007/S10623-020-00822-Y},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/YeTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaH21,
  author       = {Zhengbang Zha and
                  Lei Hu},
  title        = {Some classes of power functions with low c-differential uniformity
                  over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {6},
  pages        = {1193--1210},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00866-8},
  doi          = {10.1007/S10623-021-00866-8},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangPRW21,
  author       = {Fengrong Zhang and
                  Enes Pasalic and
                  Ren{\'{e}} Rodr{\'{\i}}guez and
                  Yongzhuang Wei},
  title        = {Wide minimal binary linear codes from the general Maiorana-McFarland
                  class},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1485--1507},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00883-7},
  doi          = {10.1007/S10623-021-00883-7},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangPRW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangSP21,
  author       = {WeiGuo Zhang and
                  Yujuan Sun and
                  Enes Pasalic},
  title        = {Three classes of balanced vectorial semi-bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {12},
  pages        = {2697--2714},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00943-y},
  doi          = {10.1007/S10623-021-00943-Y},
  timestamp    = {Thu, 07 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoCDS21,
  author       = {Xiaopeng Zhao and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jun Shao},
  title        = {Extended Galbraith's test on the anonymity of {IBE} schemes from higher
                  residuosity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {2},
  pages        = {241--253},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00816-w},
  doi          = {10.1007/S10623-020-00816-W},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoCDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouHC21,
  author       = {Jingkun Zhou and
                  Zhiwen He and
                  Zhao Chai},
  title        = {Two kinds of constructions of directed strongly regular graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {2},
  pages        = {255--268},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00817-9},
  doi          = {10.1007/S10623-020-00817-9},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouHC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouYXZM21,
  author       = {Yanwei Zhou and
                  Bo Yang and
                  Zhe Xia and
                  Mingwu Zhang and
                  Yi Mu},
  title        = {Novel generic construction of leakage-resilient {PKE} scheme with
                  {CCA} security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {7},
  pages        = {1575--1614},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-020-00831-x},
  doi          = {10.1007/S10623-020-00831-X},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouYXZM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZiniZ21,
  author       = {Giovanni Zini and
                  Ferdinando Zullo},
  title        = {Scattered subspaces and related codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {8},
  pages        = {1853--1873},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00891-7},
  doi          = {10.1007/S10623-021-00891-7},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZiniZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AdriaensenDSW20,
  author       = {Sam Adriaensen and
                  Lins Denaux and
                  Leo Storme and
                  Zsuzsa Weiner},
  title        = {Small weight code words arising from the incidence of points and hyperplanes
                  in PG(n, q)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {4},
  pages        = {771--788},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00710-0},
  doi          = {10.1007/S10623-019-00710-0},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AdriaensenDSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlacaM20,
  author       = {Saban Alaca and
                  Goldwyn Millar},
  title        = {Shift-inequivalent decimations of the Sidelnikov-Lempel-Cohn-Eastman
                  sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {3},
  pages        = {567--583},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00697-8},
  doi          = {10.1007/S10623-019-00697-8},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AlacaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlaviBCD20,
  author       = {Seyed Hassan Alavi and
                  Mohsen Bayat and
                  Jalal Choulaki and
                  Ashraf Daneshkhah},
  title        = {Flag-transitive block designs with prime replication number and almost
                  simple groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {5},
  pages        = {971--992},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00724-z},
  doi          = {10.1007/S10623-020-00724-Z},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlaviBCD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlaviDP20,
  author       = {Seyed Hassan Alavi and
                  Ashraf Daneshkhah and
                  Cheryl E. Praeger},
  title        = {Symmetries of biplanes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {11},
  pages        = {2337--2359},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00784-1},
  doi          = {10.1007/S10623-020-00784-1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlaviDP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AragonBDGLTX20,
  author       = {Nicolas Aragon and
                  Olivier Blazy and
                  Jean{-}Christophe Deneuville and
                  Philippe Gaborit and
                  Terry Shue Chien Lau and
                  Chik How Tan and
                  Keita Xagawa},
  title        = {Cryptanalysis of a rank-based signature with short public keys},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {4},
  pages        = {643--653},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00702-0},
  doi          = {10.1007/S10623-019-00702-0},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AragonBDGLTX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BallL20,
  author       = {Simeon Ball and
                  Michel Lavrauw},
  title        = {Arcs and tensors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {17--31},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00668-z},
  doi          = {10.1007/S10623-019-00668-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BallL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BarwickHJS20,
  author       = {Susan G. Barwick and
                  Alice M. W. Hui and
                  Wen{-}Ai Jackson and
                  Jeroen Schillewaert},
  title        = {Characterising hyperbolic hyperplanes of a non-singular quadric in
                  PG(4, q)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {33--39},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00669-y},
  doi          = {10.1007/S10623-019-00669-Y},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BarwickHJS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeelenGMW20,
  author       = {Peter Beelen and
                  Olav Geil and
                  Edgar Mart{\'{\i}}nez{-}Moro and
                  Xin{-}Wen Wu},
  title        = {Foreword - Special Issue: Codes, Cryptology and Curves in honour of
                  Ruud Pellikaan},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {8},
  pages        = {1477--1478},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00780-5},
  doi          = {10.1007/S10623-020-00780-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeelenGMW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeregD20,
  author       = {Sergey Bereg and
                  Peter J. Dukes},
  title        = {A lower bound on permutation codes of distance n-1},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {63--72},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00670-5},
  doi          = {10.1007/S10623-019-00670-5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeregD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeregMMS20,
  author       = {Sergey Bereg and
                  Luis Gerardo Mojica and
                  Linda Morales and
                  Ivan Hal Sudborough},
  title        = {Constructing permutation arrays using partition and extension},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {2},
  pages        = {311--339},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00684-z},
  doi          = {10.1007/S10623-019-00684-Z},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BeregMMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BhowmickTMBB20,
  author       = {Sanjit Bhowmick and
                  Alexandre Fotue Tabue and
                  Edgar Mart{\'{\i}}nez{-}Moro and
                  Ramakrishna Bandi and
                  Satya Bagchi},
  title        = {Do non-free {LCD} codes over finite commutative Frobenius rings exist?},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {5},
  pages        = {825--840},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00713-x},
  doi          = {10.1007/S10623-019-00713-X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BhowmickTMBB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bibak20,
  author       = {Khodakhast Bibak},
  title        = {Deletion correcting codes meet the Littlewood-Offord problem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {11},
  pages        = {2387--2396},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00787-y},
  doi          = {10.1007/S10623-020-00787-Y},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Bibak20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Boucher20,
  author       = {Delphine Boucher},
  title        = {An algorithm for decoding skew Reed-Solomon codes with respect to
                  the skew metric},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1991--2005},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00789-w},
  doi          = {10.1007/S10623-020-00789-W},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Boucher20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BoyadzhiyskaDS20,
  author       = {Simona Boyadzhiyska and
                  Shagnik Das and
                  Tibor Szab{\'{o}}},
  title        = {Enumerating extensions of mutually orthogonal Latin squares},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2187--2206},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00771-6},
  doi          = {10.1007/S10623-020-00771-6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BoyadzhiyskaDS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BoyvalenkovDHSS20,
  author       = {Peter G. Boyvalenkov and
                  Peter D. Dragnev and
                  Douglas P. Hardin and
                  Edward B. Saff and
                  Maya Stoyanova},
  title        = {Upper bounds for energies of spherical codes of given cardinality
                  and separation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1811--1826},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00733-y},
  doi          = {10.1007/S10623-020-00733-Y},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BoyvalenkovDHSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bras-AmorosDH20,
  author       = {Maria Bras{-}Amor{\'{o}}s and
                  Iwan M. Duursma and
                  Euijin Hong},
  title        = {Isometry-dual flags of {AG} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {8},
  pages        = {1617--1638},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00752-9},
  doi          = {10.1007/S10623-020-00752-9},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Bras-AmorosDH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BritzMS20,
  author       = {Thomas Britz and
                  Adam Mammoliti and
                  Keisuke Shiromoto},
  title        = {Wei-type duality theorems for rank metric codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {8},
  pages        = {1503--1519},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00688-9},
  doi          = {10.1007/S10623-019-00688-9},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BritzMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BruynG20,
  author       = {Bart De Bruyn and
                  Mou Gao},
  title        = {On four codes with automorphism group P{\(\Sigma\)} L(3, 4) and pseudo-embeddings
                  of the large Witt designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {2},
  pages        = {429--452},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00690-1},
  doi          = {10.1007/S10623-019-00690-1},
  timestamp    = {Wed, 29 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BruynG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BudaghyanKRS20,
  author       = {Lilya Budaghyan and
                  Nikolay S. Kaleyski and
                  Constanza Riera and
                  Pantelimon Stanica},
  title        = {Partially {APN} functions with APN-like polynomial representations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1159--1177},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00739-6},
  doi          = {10.1007/S10623-020-00739-6},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BudaghyanKRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CanteautKPU20,
  author       = {Anne Canteaut and
                  Gohar M. Kyureghyan and
                  Alexander Pott and
                  Felix Ulmer},
  title        = {Editorial: Coding and Cryptography 2019},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1699},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00791-2},
  doi          = {10.1007/S10623-020-00791-2},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CanteautKPU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CapaverdeMR20,
  author       = {Juliane Capaverde and
                  Ariane M. Masuda and
                  Virginia M. Rodrigues},
  title        = {R{\'{e}}dei permutations with cycles of the same length},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {12},
  pages        = {2561--2579},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00801-3},
  doi          = {10.1007/S10623-020-00801-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CapaverdeMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CartorS20,
  author       = {Ryann Cartor and
                  Daniel Smith{-}Tone},
  title        = {All in the C\({}^{\mbox{*}}\) family},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1023--1036},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00723-0},
  doi          = {10.1007/S10623-020-00723-0},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CartorS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CastellanosB20,
  author       = {Alonso Sep{\'{u}}lveda Castellanos and
                  Maria Bras{-}Amor{\'{o}}s},
  title        = {Weierstrass semigroup at m+1 rational points in maximal curves which
                  cannot be covered by the Hermitian curve},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {8},
  pages        = {1595--1616},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00757-4},
  doi          = {10.1007/S10623-020-00757-4},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CastellanosB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CharaPT20,
  author       = {Mar{\'{\i}}a Chara and
                  Ricardo A. Podest{\'{a}} and
                  Ricardo Toledano},
  title        = {Block transitive codes attaining the Tsfasman-Vladut-Zink bound},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1227--1253},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00743-w},
  doi          = {10.1007/S10623-020-00743-W},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CharaPT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CheeCDGLLM20,
  author       = {Yeow Meng Chee and
                  Charles J. Colbourn and
                  Hoang Dau and
                  Ryan Gabrys and
                  Alan C. H. Ling and
                  Dylan Lusi and
                  Olgica Milenkovic},
  title        = {Access balancing in storage systems by labeling partial Steiner systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {11},
  pages        = {2361--2376},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00786-z},
  doi          = {10.1007/S10623-020-00786-Z},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CheeCDGLLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChirvasituC20,
  author       = {Alexandru Chirvasitu and
                  Thomas W. Cusick},
  title        = {Affine equivalence for quadratic rotation symmetric Boolean functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {7},
  pages        = {1301--1329},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00748-5},
  doi          = {10.1007/S10623-020-00748-5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChirvasituC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChoiKL20,
  author       = {Whan{-}Hyuk Choi and
                  Hyun Jin Kim and
                  Yoonjin Lee},
  title        = {Construction of single-deletion-correcting {DNA} codes using {CIS}
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {12},
  pages        = {2581--2596},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00802-2},
  doi          = {10.1007/S10623-020-00802-2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ChoiKL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChristensenG20,
  author       = {Ren{\'{e}} B{\o}dker Christensen and
                  Olav Geil},
  title        = {Steane-enlargement of quantum codes from the Hermitian function field},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {8},
  pages        = {1639--1652},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00709-7},
  doi          = {10.1007/S10623-019-00709-7},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChristensenG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CoggiaC20,
  author       = {Daniel Coggia and
                  Alain Couvreur},
  title        = {On the security of a Loidreau rank metric code based encryption scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1941--1957},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00781-4},
  doi          = {10.1007/S10623-020-00781-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CoggiaC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CouvreurP20,
  author       = {Alain Couvreur and
                  Isabella Panaccione},
  title        = {Power error locating pairs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {8},
  pages        = {1561--1593},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00774-3},
  doi          = {10.1007/S10623-020-00774-3},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CouvreurP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DasHPWZ20,
  author       = {Dipayan Das and
                  Jeffrey Hoffstein and
                  Jill Pipher and
                  William Whyte and
                  Zhenfei Zhang},
  title        = {Modular lattice signatures, revisited},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {3},
  pages        = {505--532},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00694-x},
  doi          = {10.1007/S10623-019-00694-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DasHPWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Datta20,
  author       = {Mrinmoy Datta},
  title        = {Relative generalized Hamming weights of affine Cartesian codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1273--1284},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00745-8},
  doi          = {10.1007/S10623-020-00745-8},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Datta20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DeneuvilleG20,
  author       = {Jean{-}Christophe Deneuville and
                  Philippe Gaborit},
  title        = {Cryptanalysis of a code-based one-time signature},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1857--1866},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00737-8},
  doi          = {10.1007/S10623-020-00737-8},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DeneuvilleG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DeyS20,
  author       = {Sabyasachi Dey and
                  Santanu Sarkar},
  title        = {Proving the biases of Salsa and ChaCha in differential attack},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1827--1856},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00736-9},
  doi          = {10.1007/S10623-020-00736-9},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DeyS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DietrichS20,
  author       = {Heiko Dietrich and
                  Jeroen Schillewaert},
  title        = {On a duality for codes over non-abelian groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {5},
  pages        = {789--805},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00711-z},
  doi          = {10.1007/S10623-019-00711-Z},
  timestamp    = {Tue, 05 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DietrichS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DingTT20,
  author       = {Cunsheng Ding and
                  Chunming Tang and
                  Vladimir D. Tonchev},
  title        = {Linear codes of 2-designs associated with subcodes of the ternary
                  generalized Reed-Muller codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {4},
  pages        = {625--641},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00701-1},
  doi          = {10.1007/S10623-019-00701-1},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DingTT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DongDW20,
  author       = {Xiaoyang Dong and
                  Bingyou Dong and
                  Xiaoyun Wang},
  title        = {Quantum attacks on some feistel block ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1179--1203},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00741-y},
  doi          = {10.1007/S10623-020-00741-Y},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DongDW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Duc20,
  author       = {Tai Do Duc},
  title        = {Necessary conditions for the existence of group-invariant Butson Hadamard
                  matrices and a new family of perfect arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {73--90},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00671-4},
  doi          = {10.1007/S10623-019-00671-4},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Duc20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EgorovaFK20,
  author       = {Elena Egorova and
                  Marcel Fernandez and
                  Grigory Kabatiansky},
  title        = {On non-binary traceability set systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1885--1892},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00749-4},
  doi          = {10.1007/S10623-020-00749-4},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/EgorovaFK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ekera20,
  author       = {Martin Eker{\aa}},
  title        = {On post-processing in the quantum algorithm for computing short discrete
                  logarithms},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {11},
  pages        = {2313--2335},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00783-2},
  doi          = {10.1007/S10623-020-00783-2},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ekera20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ElsholtzP20,
  author       = {Christian Elsholtz and
                  P{\'{e}}ter P{\'{a}}l Pach},
  title        = {Caps and progression-free sets in {\textdollar}\{\{{\textbackslash}mathbb
                  \{Z\}\}\}{\_}mn{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2133--2170},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00769-0},
  doi          = {10.1007/S10623-020-00769-0},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ElsholtzP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EtzionKOO20,
  author       = {Tuvi Etzion and
                  Sascha Kurz and
                  Kamil Otal and
                  Ferruh {\"{O}}zbudak},
  title        = {Subspace packings: constructions and bounds},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1781--1810},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00732-z},
  doi          = {10.1007/S10623-020-00732-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/EtzionKOO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FadaviF20,
  author       = {Mojtaba Fadavi and
                  Reza Rezaeian Farashahi},
  title        = {Uniform encodings to elliptic curves and indistinguishable point representation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {8},
  pages        = {1479--1502},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00753-8},
  doi          = {10.1007/S10623-020-00753-8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FadaviF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FalkHR20,
  author       = {Brett Hemenway Falk and
                  Nadia Heninger and
                  Michael Rudow},
  title        = {Properties of constacyclic codes under the Schur product},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {993--1021},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00720-3},
  doi          = {10.1007/S10623-020-00720-3},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FalkHR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FangLLL20,
  author       = {Xiaolei Fang and
                  Khawla Lebed and
                  Hongwei Liu and
                  Jinquan Luo},
  title        = {New {MDS} self-dual codes over finite fields of odd characteristic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1127--1138},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00734-x},
  doi          = {10.1007/S10623-020-00734-X},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/FangLLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FangZ20,
  author       = {Zenghui Fang and
                  Junling Zhou},
  title        = {The sizes of maximal (v, k, k-2, k-1) optical orthogonal codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {5},
  pages        = {807--824},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00714-1},
  doi          = {10.1007/S10623-020-00714-1},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FerragutiM20,
  author       = {Andrea Ferraguti and
                  Giacomo Micheli},
  title        = {Full classification of permutation rational functions and complete
                  rational functions of degree three over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {5},
  pages        = {867--886},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00715-0},
  doi          = {10.1007/S10623-020-00715-0},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FerragutiM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GalvezK20,
  author       = {Lucky Galvez and
                  Jon{-}Lark Kim},
  title        = {Construction of self-dual matrix codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {8},
  pages        = {1541--1560},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00740-z},
  doi          = {10.1007/S10623-020-00740-Z},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GalvezK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GaoYW20,
  author       = {Yanyan Gao and
                  Qin Yue and
                  Yansheng Wu},
  title        = {{LCD} codes and self-orthogonal codes in generalized dihedral group
                  algebras},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {11},
  pages        = {2275--2287},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00778-z},
  doi          = {10.1007/S10623-020-00778-Z},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GaoYW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Garcia-MarcoMR20,
  author       = {Ignacio Garc{\'{\i}}a{-}Marco and
                  Irene M{\'{a}}rquez{-}Corbella and
                  Diego Ruano},
  title        = {High dimensional affine codes whose square has a designed minimum
                  distance},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {8},
  pages        = {1653--1672},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00764-5},
  doi          = {10.1007/S10623-020-00764-5},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Garcia-MarcoMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GerikeK20,
  author       = {Daniel Gerike and
                  Gohar M. Kyureghyan},
  title        = {Permutations on finite fields with invariant cycle structure on lines},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1723--1740},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00721-2},
  doi          = {10.1007/S10623-020-00721-2},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GerikeK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GhorpadeJ20,
  author       = {Sudhir R. Ghorpade and
                  Trygve Johnsen},
  title        = {A polymatroid approach to generalized weights of rank metric codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {12},
  pages        = {2531--2546},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00798-9},
  doi          = {10.1007/S10623-020-00798-9},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GhorpadeJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Gomez-Torrecillas20,
  author       = {Jos{\'{e}} G{\'{o}}mez{-}Torrecillas and
                  Erik Hieta{-}aho and
                  Francisco Javier Lobillo and
                  Sergio R. L{\'{o}}pez{-}Permouth and
                  Gabriel Navarro},
  title        = {Some remarks on non projective Frobenius algebras and linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {1--15},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00666-1},
  doi          = {10.1007/S10623-019-00666-1},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Gomez-Torrecillas20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GongZ20,
  author       = {Xinxin Gong and
                  Bin Zhang},
  title        = {Fast computation of linear approximation over certain composition
                  functions and applications to {SNOW} 2.0 and {SNOW} 3G},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {11},
  pages        = {2407--2431},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00790-3},
  doi          = {10.1007/S10623-020-00790-3},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GongZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GrassiR20,
  author       = {Lorenzo Grassi and
                  Christian Rechberger},
  title        = {Revisiting Gilbert's known-key distinguisher},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {7},
  pages        = {1401--1445},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00756-5},
  doi          = {10.1007/S10623-020-00756-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GrassiR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuS20,
  author       = {Yujie Gu and
                  Shohei Satake},
  title        = {On 2-parent-identifying set systems of block size 4},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2067--2076},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00763-6},
  doi          = {10.1007/S10623-020-00763-6},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuendaGJT20,
  author       = {Kenza Guenda and
                  T. Aaron Gulliver and
                  Somphong Jitman and
                  Satanan Thipworawimon},
  title        = {Linear {\(\mathscr{l}\)}-intersection pairs of codes and their applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {133--152},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00676-z},
  doi          = {10.1007/S10623-019-00676-Z},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuendaGJT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuillevicMT20,
  author       = {Aurore Guillevic and
                  Simon Masson and
                  Emmanuel Thom{\'{e}}},
  title        = {Cocks-Pinch curves of embedding degrees five to eight and optimal
                  ate pairing computation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1047--1081},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00727-w},
  doi          = {10.1007/S10623-020-00727-W},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuillevicMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuneriMS20,
  author       = {Cem G{\"{u}}neri and
                  Edgar Mart{\'{\i}}nez{-}Moro and
                  Selcen Sayici},
  title        = {Linear complementary pair of group codes over finite chain rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {11},
  pages        = {2397--2405},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00792-1},
  doi          = {10.1007/S10623-020-00792-1},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GuneriMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Gupta20,
  author       = {Rohit Gupta},
  title        = {Several new permutation quadrinomials over finite fields of odd characteristic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {223--239},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00680-3},
  doi          = {10.1007/S10623-019-00680-3},
  timestamp    = {Mon, 30 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Gupta20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HodzicPG20,
  author       = {Samir Hodzic and
                  Enes Pasalic and
                  Sugata Gangopadhyay},
  title        = {Generic constructions of {\textdollar}{\textbackslash}mathbb \{Z\}{\textdollar}-bent
                  functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {3},
  pages        = {601--623},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00700-2},
  doi          = {10.1007/S10623-019-00700-2},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/HodzicPG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HodzicPW20,
  author       = {Samir Hodzic and
                  Enes Pasalic and
                  Yongzhuang Wei},
  title        = {A general framework for secondary constructions of bent and plateaued
                  functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2007--2035},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00760-9},
  doi          = {10.1007/S10623-020-00760-9},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HodzicPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuangYWSM20,
  author       = {Xinmei Huang and
                  Qin Yue and
                  Yansheng Wu and
                  Xiaoping Shi and
                  Jerod Michel},
  title        = {Binary primitive {LCD} {BCH} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {12},
  pages        = {2453--2473},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00795-y},
  doi          = {10.1007/S10623-020-00795-Y},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/HuangYWSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HyunKWY20,
  author       = {Jong Yoon Hyun and
                  Hyun Kwang Kim and
                  Yansheng Wu and
                  Qin Yue},
  title        = {Optimal minimal linear codes from posets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {12},
  pages        = {2475--2492},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00793-0},
  doi          = {10.1007/S10623-020-00793-0},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/HyunKWY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HyunLL20,
  author       = {Jong Yoon Hyun and
                  Jungyun Lee and
                  Yoonjin Lee},
  title        = {Ramanujan graphs and expander families constructed from p-ary bent
                  functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {2},
  pages        = {453--470},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00692-z},
  doi          = {10.1007/S10623-019-00692-Z},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/HyunLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JiaLL20,
  author       = {Dingding Jia and
                  Yamin Liu and
                  Bao Li},
  title        = {{IBE} with tight security against selective opening and chosen-ciphertext
                  attacks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {7},
  pages        = {1371--1400},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00755-6},
  doi          = {10.1007/S10623-020-00755-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JiaLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JiangGC20,
  author       = {Jing Jiang and
                  Yujie Gu and
                  Minquan Cheng},
  title        = {Multimedia {IPP} codes with efficient tracing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {5},
  pages        = {851--866},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00717-y},
  doi          = {10.1007/S10623-020-00717-Y},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/JiangGC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JiangL20,
  author       = {Yupeng Jiang and
                  Dongdai Lin},
  title        = {Longest subsequences shared by two de Bruijn sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {7},
  pages        = {1463--1475},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00759-2},
  doi          = {10.1007/S10623-020-00759-2},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JiangL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KampPJ20,
  author       = {Tim van de Kamp and
                  Andreas Peter and
                  Willem Jonker},
  title        = {A multi-authority approach to various predicate encryption types},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {2},
  pages        = {363--390},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00686-x},
  doi          = {10.1007/S10623-019-00686-X},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/KampPJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KesarwaniRSM20,
  author       = {Abhishek Kesarwani and
                  Dibyendu Roy and
                  Santanu Sarkar and
                  Willi Meier},
  title        = {New cube distinguishers on NFSR-based stream ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {173--199},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00674-1},
  doi          = {10.1007/S10623-019-00674-1},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KesarwaniRSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimL20,
  author       = {Boran Kim and
                  Yoonjin Lee},
  title        = {Classification of self-dual cyclic codes over the chain ring {\(\mathbb{Z}\)}\({}_{\mbox{p}}\)[u]/
                  u\({}^{\mbox{3}}\) {\textgreater}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2247--2273},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00776-1},
  doi          = {10.1007/S10623-020-00776-1},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KimL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KirshanovaNSW20,
  author       = {Elena Kirshanova and
                  Huyen Nguyen and
                  Damien Stehl{\'{e}} and
                  Alexandre Wallet},
  title        = {On the smoothing parameter and last minimum of random orthogonal lattices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {5},
  pages        = {931--950},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00719-w},
  doi          = {10.1007/S10623-020-00719-W},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KirshanovaNSW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KolblTDB20,
  author       = {Stefan K{\"{o}}lbl and
                  Elmar Tischhauser and
                  Patrick Derbez and
                  Andrey Bogdanov},
  title        = {Troika: a ternary cryptographic hash function},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {91--117},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00673-2},
  doi          = {10.1007/S10623-019-00673-2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/KolblTDB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kolsch20,
  author       = {Lukas K{\"{o}}lsch},
  title        = {On the inverses of Kasami and Bracken-Leander exponents},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {12},
  pages        = {2597--2621},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00804-0},
  doi          = {10.1007/S10623-020-00804-0},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kolsch20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KrollV20,
  author       = {Hans{-}Joachim Kroll and
                  Rita Vincenti},
  title        = {Linear codes from ruled sets in finite projective spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {4},
  pages        = {747--754},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00707-9},
  doi          = {10.1007/S10623-019-00707-9},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KrollV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kurz20,
  author       = {Sascha Kurz},
  title        = {Subspaces intersecting in at most a point},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {3},
  pages        = {595--599},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00699-6},
  doi          = {10.1007/S10623-019-00699-6},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Kurz20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kutsenko20,
  author       = {Aleksandr Kutsenko},
  title        = {Metrical properties of self-dual bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {201--222},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00678-x},
  doi          = {10.1007/S10623-019-00678-X},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Kutsenko20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LambinDF20,
  author       = {Baptiste Lambin and
                  Patrick Derbez and
                  Pierre{-}Alain Fouque},
  title        = {Linearly equivalent S-boxes and the division property},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2207--2231},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00773-4},
  doi          = {10.1007/S10623-020-00773-4},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LambinDF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LavauzelleR20,
  author       = {Julien Lavauzelle and
                  Julian Renner},
  title        = {Cryptanalysis of a system based on twisted Reed-Solomon codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {7},
  pages        = {1285--1300},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00747-6},
  doi          = {10.1007/S10623-020-00747-6},
  timestamp    = {Mon, 22 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LavauzelleR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeLP20,
  author       = {Youngkyung Lee and
                  Dong Hoon Lee and
                  Jong Hwan Park},
  title        = {Tightly CCA-secure encryption scheme in a multi-user setting with
                  corruptions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {11},
  pages        = {2433--2452},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00794-z},
  doi          = {10.1007/S10623-020-00794-Z},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeLP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeungW20,
  author       = {Ka Hin Leung and
                  Qi Wang},
  title        = {New nonexistence results on (m, n)-generalized bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {4},
  pages        = {755--770},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00708-8},
  doi          = {10.1007/S10623-019-00708-8},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeungW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiY20,
  author       = {Xia Li and
                  Qin Yue},
  title        = {Four classes of minimal binary linear codes with w\({}_{\mbox{min}}\)/w\({}_{\mbox{max}}\){\textless}1/2
                  derived from Boolean functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {2},
  pages        = {257--271},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00682-1},
  doi          = {10.1007/S10623-019-00682-1},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiYLQ20,
  author       = {Yubo Li and
                  Zhichao Yang and
                  Kangquan Li and
                  Longjiang Qu},
  title        = {A new algorithm on the minimal rational fraction representation of
                  feedback with carry shift registers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {3},
  pages        = {533--552},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00695-w},
  doi          = {10.1007/S10623-019-00695-W},
  timestamp    = {Tue, 31 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiYLQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LingMQT20,
  author       = {Xin Ling and
                  Sihem Mesnager and
                  Yanfeng Qi and
                  Chunming Tang},
  title        = {A class of narrow-sense {BCH} codes over {\textdollar}{\textbackslash}mathbb
                  \{F\}{\_}q{\textdollar} of length {\textdollar}{\textbackslash}frac\{qm-1\}\{2\}{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {2},
  pages        = {413--427},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00691-0},
  doi          = {10.1007/S10623-019-00691-0},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LingMQT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Lisonek20,
  author       = {Petr Lisonek},
  title        = {Maximal nonassociativity via fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {12},
  pages        = {2521--2530},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00800-4},
  doi          = {10.1007/S10623-020-00800-4},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Lisonek20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuCL20,
  author       = {Yan Liu and
                  Xiwang Cao and
                  Wei Lu},
  title        = {On some conjectures about optimal ternary cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {2},
  pages        = {297--309},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00679-w},
  doi          = {10.1007/S10623-019-00679-W},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuCL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuL20,
  author       = {Xiusheng Liu and
                  Hualu Liu},
  title        = {{\(\sigma\)}-LCD codes over finite chain rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {4},
  pages        = {727--746},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00706-w},
  doi          = {10.1007/S10623-019-00706-W},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuMT20,
  author       = {Jian Liu and
                  Sihem Mesnager and
                  Deng Tang},
  title        = {Constructions of optimal locally recoverable codes via Dickson polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1759--1780},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00731-0},
  doi          = {10.1007/S10623-020-00731-0},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuMT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuP20,
  author       = {Hongwei Liu and
                  Xu Pan},
  title        = {Galois hulls of linear codes over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {2},
  pages        = {241--255},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00681-2},
  doi          = {10.1007/S10623-019-00681-2},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuZSRLLFC20,
  author       = {Yunwen Liu and
                  Wenying Zhang and
                  Bing Sun and
                  Vincent Rijmen and
                  Guoqiang Liu and
                  Chao Li and
                  Shaojing Fu and
                  Meichun Cao},
  title        = {The phantom of differential characteristics},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {11},
  pages        = {2289--2311},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00782-3},
  doi          = {10.1007/S10623-020-00782-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuZSRLLFC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LopezMS20,
  author       = {Hiram H. L{\'{o}}pez and
                  Gretchen L. Matthews and
                  Ivan Soprunov},
  title        = {Monomial-Cartesian codes and their duals, with applications to {LCD}
                  codes, quantum codes, and locally recoverable codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {8},
  pages        = {1673--1685},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00726-x},
  doi          = {10.1007/S10623-020-00726-X},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LopezMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LuWCC20,
  author       = {Wei Lu and
                  Xia Wu and
                  Xiwang Cao and
                  Ming Chen},
  title        = {Six constructions of asymptotically optimal codebooks via the character
                  sums},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1139--1158},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00735-w},
  doi          = {10.1007/S10623-020-00735-W},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LuWCC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MaFW20,
  author       = {Xuanlong Ma and
                  Min Feng and
                  Kaishun Wang},
  title        = {Subgroup perfect codes in Cayley sum graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {7},
  pages        = {1447--1461},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00758-3},
  doi          = {10.1007/S10623-020-00758-3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MaFW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MariotGFL20,
  author       = {Luca Mariot and
                  Maximilien Gadouleau and
                  Enrico Formenti and
                  Alberto Leporati},
  title        = {Mutually orthogonal latin squares based on cellular automata},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {2},
  pages        = {391--411},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00689-8},
  doi          = {10.1007/S10623-019-00689-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MariotGFL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Marquez-Corbella20,
  author       = {Irene M{\'{a}}rquez{-}Corbella and
                  Edgar Mart{\'{\i}}nez{-}Moro and
                  Carlos Munuera},
  title        = {Computing sharp recovery structures for locally recoverable codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {8},
  pages        = {1687--1698},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00746-7},
  doi          = {10.1007/S10623-020-00746-7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Marquez-Corbella20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Martinez-Bernal20,
  author       = {Jos{\'{e}} Mart{\'{\i}}nez{-}Bernal and
                  Miguel A. Valencia{-}Bucio and
                  Rafael H. Villarreal},
  title        = {Linear codes over signed graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {2},
  pages        = {273--296},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00683-0},
  doi          = {10.1007/S10623-019-00683-0},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Martinez-Bernal20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Martinez-Penas20,
  author       = {Umberto Mart{\'{\i}}nez{-}Pe{\~{n}}as},
  title        = {Hamming and simplex codes for the sum-rank metric},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {8},
  pages        = {1521--1539},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00772-5},
  doi          = {10.1007/S10623-020-00772-5},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Martinez-Penas20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Matsumoto20,
  author       = {Ryutaroh Matsumoto},
  title        = {Message randomization and strong security in quantum stabilizer-based
                  secret sharing for classical secrets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1893--1907},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00751-w},
  doi          = {10.1007/S10623-020-00751-W},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Matsumoto20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MatthewsP20,
  author       = {Gretchen L. Matthews and
                  Fernando Pi{\~{n}}ero},
  title        = {Codes with locality from cyclic extensions of Deligne-Lusztig curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1909--1924},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00767-2},
  doi          = {10.1007/S10623-020-00767-2},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MatthewsP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MesnagerKJCHL20,
  author       = {Sihem Mesnager and
                  Kwang Ho Kim and
                  Dujin Jo and
                  Junyop Choe and
                  Munhyon Han and
                  Dok Nam Lee},
  title        = {A proof of the Beierle-Kranz-Leander conjecture related to lightweight
                  multiplication in {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{2n\}{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {51--62},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00665-2},
  doi          = {10.1007/S10623-019-00665-2},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MesnagerKJCHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MesnagerTX20,
  author       = {Sihem Mesnager and
                  Chunming Tang and
                  Maosheng Xiong},
  title        = {On the boomerang uniformity of quadratic permutations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2233--2246},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00775-2},
  doi          = {10.1007/S10623-020-00775-2},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MesnagerTX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NeriH20,
  author       = {Alessandro Neri and
                  Anna{-}Lena Horlemann{-}Trautmann},
  title        = {Random construction of partial {MDS} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {4},
  pages        = {711--725},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00705-x},
  doi          = {10.1007/S10623-019-00705-X},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NeriH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OngH20,
  author       = {Kai Lin Ong and
                  Ang Miin Huey},
  title        = {On equivalency of zero-divisor codes via classifying their idempotent
                  generator},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2051--2065},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00762-7},
  doi          = {10.1007/S10623-020-00762-7},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OngH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PanFWW20,
  author       = {Rong Pan and
                  Tao Feng and
                  Lidong Wang and
                  Xiaomiao Wang},
  title        = {Optimal optical orthogonal signature pattern codes with weight three
                  and cross-correlation constraint one},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {119--131},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00675-0},
  doi          = {10.1007/S10623-019-00675-0},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PanFWW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PolujanP20,
  author       = {Alexandr Polujan and
                  Alexander Pott},
  title        = {Cubic bent functions outside the completed Maiorana-McFarland class},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1701--1722},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00712-y},
  doi          = {10.1007/S10623-019-00712-Y},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PolujanP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Potapov20,
  author       = {Vladimir N. Potapov},
  title        = {On q-ary bent and plateaued functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2037--2049},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00761-8},
  doi          = {10.1007/S10623-020-00761-8},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Potapov20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Randrianarisoa20,
  author       = {Tovohery Hajatiana Randrianarisoa},
  title        = {A geometric approach to rank metric codes and a classification of
                  constant weight codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {7},
  pages        = {1331--1348},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00750-x},
  doi          = {10.1007/S10623-020-00750-X},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Randrianarisoa20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RoussevaL20,
  author       = {Assia Rousseva and
                  Ivan N. Landjev},
  title        = {The geometric approach to the existence of some quaternary Griesmer
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1925--1940},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00777-0},
  doi          = {10.1007/S10623-020-00777-0},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RoussevaL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Salagean20,
  author       = {Ana Salagean},
  title        = {Discrete antiderivatives for functions over {\textdollar}{\textbackslash}mathop
                  \{\{{\textbackslash}mathbb \{F\}\}\}{\_}pn{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {3},
  pages        = {471--486},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00687-w},
  doi          = {10.1007/S10623-019-00687-W},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Salagean20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SalageanO20,
  author       = {Ana Salagean and
                  Ferruh {\"{O}}zbudak},
  title        = {Counting Boolean functions with faster points},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1867--1883},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00738-7},
  doi          = {10.1007/S10623-020-00738-7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SalageanO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShaoM20,
  author       = {Minfeng Shao and
                  Ying Miao},
  title        = {On optimal weak algebraic manipulation detection codes and weighted
                  external difference families},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {7},
  pages        = {1349--1369},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00754-7},
  doi          = {10.1007/S10623-020-00754-7},
  timestamp    = {Tue, 29 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShaoM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SheekeyV20,
  author       = {John Sheekey and
                  Geertrui Van de Voorde},
  title        = {Rank-metric codes, linear sets, and their duality},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {4},
  pages        = {655--675},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00703-z},
  doi          = {10.1007/S10623-019-00703-Z},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SheekeyV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiXK20,
  author       = {Minjia Shi and
                  Li Xu and
                  Denis S. Krotov},
  title        = {On the number of resolvable Steiner triple systems of small 3-rank},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1037--1046},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00725-y},
  doi          = {10.1007/S10623-020-00725-Y},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiXK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiXS20,
  author       = {Minjia Shi and
                  Wang Xuan and
                  Patrick Sol{\'{e}}},
  title        = {Two families of two-weight codes over {\textdollar}{\textbackslash}mathbb
                  \{Z\}{\_}4{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {12},
  pages        = {2493--2505},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00796-x},
  doi          = {10.1007/S10623-020-00796-X},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiXS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiXS20a,
  author       = {Minjia Shi and
                  Li Xu and
                  Patrick Sol{\'{e}}},
  title        = {Construction of isodual codes from polycirculant matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {12},
  pages        = {2547--2560},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00799-8},
  doi          = {10.1007/S10623-020-00799-8},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiXS20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SinghGB20,
  author       = {Jasvinder Singh and
                  Manish Gupta and
                  Jaskarn Singh Bhullar},
  title        = {Construction of girth-8 (3, {L)-QC-LDPC} codes of smallest {CPM} size
                  using column multipliers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {41--49},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00667-0},
  doi          = {10.1007/S10623-019-00667-0},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/SinghGB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SunZZ20,
  author       = {Hong{-}Yu Sun and
                  Xuan{-}Yong Zhu and
                  Qun{-}Xiong Zheng},
  title        = {Predicting truncated multiple recursive generators with unknown parameters},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1083--1102},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00729-8},
  doi          = {10.1007/S10623-020-00729-8},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SunZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TanZSP20,
  author       = {Pan Tan and
                  Zhengchun Zhou and
                  Vladimir Sidorenko and
                  Udaya Parampalli},
  title        = {Two classes of optimal LRCs with information (r, t)-locality},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1741--1757},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00728-9},
  doi          = {10.1007/S10623-020-00728-9},
  timestamp    = {Mon, 21 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TanZSP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TianBP20,
  author       = {Shizhu Tian and
                  Christina Boura and
                  L{\'{e}}o Perrin},
  title        = {Boomerang uniformity of popular S-box constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {9},
  pages        = {1959--1989},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00785-0},
  doi          = {10.1007/S10623-020-00785-0},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TianBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangF20,
  author       = {Xiang Wang and
                  Fang{-}Wei Fu},
  title        = {Snake-in-the-box codes under the {\(\mathscr{l}\)} \({}_{\mbox{{\(\infty\)}
                  }}\)-metric for rank modulation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {3},
  pages        = {487--503},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00693-y},
  doi          = {10.1007/S10623-019-00693-Y},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WangF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangLCMD20,
  author       = {Gaoli Wang and
                  Fukang Liu and
                  Binbin Cui and
                  Florian Mendel and
                  Christoph Dobraunig},
  title        = {Improved (semi-free-start/near-) collision and distinguishing attacks
                  on round-reduced {RIPEMD-160}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {5},
  pages        = {887--930},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00718-x},
  doi          = {10.1007/S10623-020-00718-X},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WangLCMD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WuLW20,
  author       = {Mengna Wu and
                  Chengju Li and
                  Zilong Wang},
  title        = {Characterizations and constructions of triple-cycle permutations of
                  the form x\({}^{\mbox{rh(x\({}^{\mbox{s)}}\)}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2119--2132},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00768-1},
  doi          = {10.1007/S10623-020-00768-1},
  timestamp    = {Fri, 09 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WuLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WuLZ20,
  author       = {Yanan Wu and
                  Nian Li and
                  Xiangyong Zeng},
  title        = {Linear codes with few weights from cyclotomic classes and weakly regular
                  bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1255--1272},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00744-9},
  doi          = {10.1007/S10623-020-00744-9},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WuLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XiangLW20,
  author       = {Can Xiang and
                  Xin Ling and
                  Qi Wang},
  title        = {Combinatorial t-designs from quadratic functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {3},
  pages        = {553--565},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00696-9},
  doi          = {10.1007/S10623-019-00696-9},
  timestamp    = {Wed, 17 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XiangLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuBJ20,
  author       = {Juanjuan Xu and
                  Jingjun Bao and
                  Lijun Ji},
  title        = {Doubly resolvable Steiner quadruple systems of orders 2\({}^{\mbox{2n+1}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {11},
  pages        = {2377--2386},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00788-x},
  doi          = {10.1007/S10623-020-00788-X},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XuBJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuHS20,
  author       = {Jun Xu and
                  Lei Hu and
                  Santanu Sarkar},
  title        = {Cryptanalysis of elliptic curve hidden number problem from {PKC} 2017},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {2},
  pages        = {341--361},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00685-y},
  doi          = {10.1007/S10623-019-00685-Y},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/XuHS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YasudaNY20,
  author       = {Masaya Yasuda and
                  Satoshi Nakamura and
                  Junpei Yamaguchi},
  title        = {Analysis of DeepBKZ reduction for finding short lattice vectors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2077--2100},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00765-4},
  doi          = {10.1007/S10623-020-00765-4},
  timestamp    = {Mon, 27 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/YasudaNY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Yuster20,
  author       = {Raphael Yuster},
  title        = {Perfect sequence covering arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {3},
  pages        = {585--593},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00698-7},
  doi          = {10.1007/S10623-019-00698-7},
  timestamp    = {Thu, 19 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Yuster20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangS20,
  author       = {Liang Feng Zhang and
                  Reihaneh Safavi{-}Naini},
  title        = {Protecting data privacy in publicly verifiable delegation of matrix
                  and polynomial functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {4},
  pages        = {677--709},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00704-y},
  doi          = {10.1007/S10623-019-00704-Y},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoDMJW20,
  author       = {Boxin Zhao and
                  Xiaoyang Dong and
                  Willi Meier and
                  Keting Jia and
                  Gaoli Wang},
  title        = {Generalized related-key rectangle attacks on block ciphers with linear
                  key schedule: applications to {SKINNY} and {GIFT}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1103--1126},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00730-1},
  doi          = {10.1007/S10623-020-00730-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoDMJW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoQZ20,
  author       = {Xiao{-}Xin Zhao and
                  Wen{-}Feng Qi and
                  Jia{-}Min Zhang},
  title        = {Further results on the equivalence between Galois NFSRs and Fibonacci
                  NFSRs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {1},
  pages        = {153--171},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00677-y},
  doi          = {10.1007/S10623-019-00677-Y},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoQZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoZWQ20,
  author       = {Xiao{-}Xin Zhao and
                  Qun{-}Xiong Zheng and
                  Zhong{-}Xiao Wang and
                  Wen{-}Feng Qi},
  title        = {On a class of isomorphic NFSRs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {1205--1226},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00742-x},
  doi          = {10.1007/S10623-020-00742-X},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoZWQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhengPKLL20,
  author       = {Lijing Zheng and
                  Jie Peng and
                  Haibin Kan and
                  Yanjun Li and
                  Juan Luo},
  title        = {On constructions and properties of (n, m)-functions with maximal number
                  of bent components},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2171--2186},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00770-7},
  doi          = {10.1007/S10623-020-00770-7},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhengPKLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Zhou20,
  author       = {Yue Zhou},
  title        = {On equivalence of maximum additive symmetric rank-distance codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {5},
  pages        = {841--850},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00716-z},
  doi          = {10.1007/S10623-020-00716-Z},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Zhou20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouZ20,
  author       = {Junling Zhou and
                  Wenling Zhou},
  title        = {Wide-sense 2-frameproof codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {12},
  pages        = {2507--2519},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00797-w},
  doi          = {10.1007/S10623-020-00797-W},
  timestamp    = {Sat, 14 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhuW20,
  author       = {Yan Zhu and
                  Naoki Watamura},
  title        = {Relative t-designs in Johnson association schemes for P-polynomial
                  structure},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {10},
  pages        = {2101--2118},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00766-3},
  doi          = {10.1007/S10623-020-00766-3},
  timestamp    = {Fri, 13 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhuW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhuZC20,
  author       = {Bohua Zhu and
                  Junling Zhou and
                  Yanxun Chang},
  title        = {2-(v, 5; m) spontaneous emission error designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {5},
  pages        = {951--970},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00722-1},
  doi          = {10.1007/S10623-020-00722-1},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhuZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlabdullahH19,
  author       = {S. Alabdullah and
                  J. W. P. Hirschfeld},
  title        = {A new lower bound for the smallest complete (k, n)-arc in {\textdollar}{\textdollar}{\textbackslash}mathrm
                  \{PG\}(2, q){\textdollar}{\textdollar} {PG} {(} 2 , q {)}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {679--683},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00592-8},
  doi          = {10.1007/S10623-018-00592-8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlabdullahH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ArmarioF19,
  author       = {Jos{\'{e}} Andr{\'{e}}s Armario and
                  Dane L. Flannery},
  title        = {Generalized binary arrays from quasi-orthogonal cocycles},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2405--2417},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00626-9},
  doi          = {10.1007/S10623-019-00626-9},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ArmarioF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AydinLV19,
  author       = {Nuh Aydin and
                  Jonathan G. G. Lambrinos and
                  Oliver VandenBerg},
  title        = {On equivalence of cyclic codes, generalization of a quasi-twisted
                  search algorithm, and new linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2199--2212},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00613-0},
  doi          = {10.1007/S10623-019-00613-0},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AydinLV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bagchi19,
  author       = {Bhaskar Bagchi},
  title        = {A coding theoretic approach to the uniqueness conjecture for projective
                  planes of prime order},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2375--2389},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00623-y},
  doi          = {10.1007/S10623-019-00623-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Bagchi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BaiL19,
  author       = {Liang Bai and
                  Zihui Liu},
  title        = {On the third greedy weight of 4-dimensional codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2213--2230},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00614-z},
  doi          = {10.1007/S10623-019-00614-Z},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BaiL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BaichevaT19,
  author       = {Tsonka Baicheva and
                  Svetlana Topalova},
  title        = {Classification of optimal (v, k, 1) binary cyclically permutable constant
                  weight codes with {\textdollar}{\textdollar}k=5, {\textdollar}{\textdollar}
                  k = 5 , 6 and 7 and small lengths},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {365--374},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0534-x},
  doi          = {10.1007/S10623-018-0534-X},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BaichevaT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BalletZ19,
  author       = {St{\'{e}}phane Ballet and
                  Alexey Zykin},
  title        = {Dense families of modular curves, prime numbers and uniform symmetric
                  tensor rank of multiplication in certain finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {517--525},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0560-8},
  doi          = {10.1007/S10623-018-0560-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BalletZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartoliB19,
  author       = {Daniele Bartoli and
                  Matteo Bonini},
  title        = {Minimum weight codewords in dual algebraic-geometric codes from the
                  Giulietti-Korchm{\'{a}}ros curve},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1433--1445},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0541-y},
  doi          = {10.1007/S10623-018-0541-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BartoliB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartoliGM19,
  author       = {Daniele Bartoli and
                  Massimo Giulietti and
                  Maria Montanucci},
  title        = {Linear codes from Denniston maximal arcs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {795--806},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0515-0},
  doi          = {10.1007/S10623-018-0515-0},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BartoliGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartzS19,
  author       = {Hannes Bartz and
                  Vladimir Sidorenko},
  title        = {Improved syndrome decoding of lifted {\textdollar}{\textdollar}L{\textdollar}{\textdollar}
                  {L} -interleaved Gabidulin codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {547--567},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0563-5},
  doi          = {10.1007/S10623-018-0563-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BartzS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BassaS19,
  author       = {Alp Bassa and
                  Henning Stichtenoth},
  title        = {Self-dual codes better than the Gilbert-Varshamov bound},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {173--182},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0497-y},
  doi          = {10.1007/S10623-018-0497-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BassaS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeregMMMS19,
  author       = {Sergey Bereg and
                  Zevi Miller and
                  Luis Gerardo Mojica and
                  Linda Morales and
                  Ivan Hal Sudborough},
  title        = {New lower bounds for permutation arrays using contraction},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {2105--2128},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00607-y},
  doi          = {10.1007/S10623-019-00607-Y},
  timestamp    = {Thu, 05 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeregMMMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BestMSW19,
  author       = {Darcy Best and
                  Trent G. Marbach and
                  Rebecca J. Stones and
                  Ian M. Wanless},
  title        = {Covers and partial transversals of Latin squares},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {1109--1136},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0499-9},
  doi          = {10.1007/S10623-018-0499-9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BestMSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BettenK19,
  author       = {Anton Betten and
                  Fatma Karaoglu},
  title        = {Cubic surfaces over small finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {931--953},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0590-2},
  doi          = {10.1007/S10623-018-0590-2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BettenK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeuleDMS19,
  author       = {Jan De Beule and
                  Jeroen Demeyer and
                  Sam Mattheus and
                  P{\'{e}}ter Sziklai},
  title        = {On the cylinder conjecture},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {879--893},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0571-5},
  doi          = {10.1007/S10623-018-0571-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeuleDMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BezzateevS19,
  author       = {Sergey Bezzateev and
                  Natalia A. Shekhunova},
  title        = {Totally decomposed cumulative Goppa codes with improved estimations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {569--587},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0566-2},
  doi          = {10.1007/S10623-018-0566-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BezzateevS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BiDLZW19,
  author       = {Wenquan Bi and
                  Xiaoyang Dong and
                  Zheng Li and
                  Rui Zong and
                  Xiaoyun Wang},
  title        = {MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1271--1296},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0526-x},
  doi          = {10.1007/S10623-018-0526-X},
  timestamp    = {Thu, 16 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BiDLZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlokhuisBD19,
  author       = {Aart Blokhuis and
                  Maarten De Boeck and
                  Jozefien D'haeseleer},
  title        = {Cameron-Liebler sets of k-spaces in {\textdollar}{\textdollar}\{\{{\textbackslash}mathrm\{PG\}\}\}(n,
                  q){\textdollar}{\textdollar} {PG} {(} n , q {)}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1839--1856},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0583-1},
  doi          = {10.1007/S10623-018-0583-1},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BlokhuisBD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlokhuisSS19,
  author       = {Aart Blokhuis and
                  Leo Storme and
                  Tam{\'{a}}s Szonyi},
  title        = {Relative blocking sets of unions of Baer subplanes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {865--877},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0575-1},
  doi          = {10.1007/S10623-018-0575-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlokhuisSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BouraCJS19,
  author       = {Christina Boura and
                  Anne Canteaut and
                  J{\'{e}}r{\'{e}}my Jean and
                  Valentin Suder},
  title        = {Two notions of differential equivalence on Sboxes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {185--202},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0496-z},
  doi          = {10.1007/S10623-018-0496-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BouraCJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BoyvalenkovDHSS19,
  author       = {Peter G. Boyvalenkov and
                  Peter D. Dragnev and
                  Douglas P. Hardin and
                  Edward B. Saff and
                  Maya Stoyanova},
  title        = {On spherical codes with inner products in a prescribed interval},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {299--315},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0524-z},
  doi          = {10.1007/S10623-018-0524-Z},
  timestamp    = {Wed, 26 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BoyvalenkovDHSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BrouwerP19,
  author       = {Andries E. Brouwer and
                  Sven C. Polak},
  title        = {Uniqueness of codes using semidefinite programming},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1881--1895},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0589-8},
  doi          = {10.1007/S10623-018-0589-8},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BrouwerP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bruyn19,
  author       = {Bart De Bruyn},
  title        = {Three homogeneous embeddings of {DW} (2n-1, 2)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {909--929},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0531-0},
  doi          = {10.1007/S10623-018-0531-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Bruyn19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Buratti19,
  author       = {Marco Buratti},
  title        = {On disjoint (v, k, k-1) difference families},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {745--755},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0511-4},
  doi          = {10.1007/S10623-018-0511-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Buratti19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BurattiJ19,
  author       = {Marco Buratti and
                  Dieter Jungnickel},
  title        = {Partitioned difference families versus zero-difference balanced functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2461--2467},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00632-x},
  doi          = {10.1007/S10623-019-00632-X},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BurattiJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BurattiM19,
  author       = {Marco Buratti and
                  Francesca Merola},
  title        = {Fano Kaleidoscopes and their generalizations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {769--784},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0538-6},
  doi          = {10.1007/S10623-018-0538-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BurattiM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Byrnes19,
  author       = {Kevin M. Byrnes},
  title        = {The maximum length of circuit codes with long bit runs and a new characterization
                  theorem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2671--2681},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00646-5},
  doi          = {10.1007/S10623-019-00646-5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Byrnes19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CaoCDL19,
  author       = {Yuan Cao and
                  Yonglin Cao and
                  Steven T. Dougherty and
                  San Ling},
  title        = {Construction and enumeration for self-dual cyclic codes over Z\({}_{\mbox{4}}\)
                  of oddly even length},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2419--2446},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00629-6},
  doi          = {10.1007/S10623-019-00629-6},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CaoCDL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CardinaliLMP19,
  author       = {Ilaria Cardinali and
                  Michel Lavrauw and
                  Klaus Metsch and
                  Alexander Pott},
  title        = {Preface to the special issue on finite geometries},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {715--716},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00600-x},
  doi          = {10.1007/S10623-018-00600-X},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CardinaliLMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Carlet19,
  author       = {Claude Carlet},
  title        = {On {APN} exponents, characterizations of differentially uniform functions
                  by the Walsh transform, and related cyclic-difference-set-like structures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {203--224},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0512-3},
  doi          = {10.1007/S10623-018-0512-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Carlet19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletCQ19,
  author       = {Claude Carlet and
                  Xi Chen and
                  Longjiang Qu},
  title        = {Constructing infinite families of low differential uniformity (n,
                  m)-functions with m {\textgreater} n / 2},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1577--1599},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0553-7},
  doi          = {10.1007/S10623-018-0553-7},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletCQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletLM19,
  author       = {Claude Carlet and
                  Chengju Li and
                  Sihem Mesnager},
  title        = {Some (almost) optimally extendable linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2813--2834},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00652-7},
  doi          = {10.1007/S10623-019-00652-7},
  timestamp    = {Wed, 06 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletLM19a,
  author       = {Claude Carlet and
                  Chengju Li and
                  Sihem Mesnager},
  title        = {Linear codes with small hulls in semi-primitive case},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {3063--3075},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00663-4},
  doi          = {10.1007/S10623-019-00663-4},
  timestamp    = {Wed, 06 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletLM19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarrierT19,
  author       = {K{\'{e}}vin Carrier and
                  Jean{-}Pierre Tillich},
  title        = {Identifying an unknown code by partial Gaussian elimination},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {685--713},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00593-7},
  doi          = {10.1007/S10623-018-00593-7},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CarrierT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarvalhoRNT19,
  author       = {C{\'{\i}}cero Carvalho and
                  Xavier Ram{\'{\i}}rez{-}Mondrag{\'{o}}n and
                  Victor G. L. Neumann and
                  Horacio Tapia{-}Recillas},
  title        = {Projective Reed-Muller type codes on higher dimensional scrolls},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {2027--2042},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00603-8},
  doi          = {10.1007/S10623-018-00603-8},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarvalhoRNT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CauchoisL19,
  author       = {Victor Cauchois and
                  Pierre Loidreau},
  title        = {On circulant involutory {MDS} matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {249--260},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0520-3},
  doi          = {10.1007/S10623-018-0520-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CauchoisL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChangELW19,
  author       = {Zuling Chang and
                  Martianus Frederic Ezerman and
                  San Ling and
                  Huaxiong Wang},
  title        = {On binary de Bruijn sequences from LFSRs with arbitrary characteristic
                  polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {1137--1160},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0509-y},
  doi          = {10.1007/S10623-018-0509-Y},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChangELW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChangZZ19,
  author       = {Yanxun Chang and
                  Hao Zheng and
                  Junling Zhou},
  title        = {Existence of frame-derived H-designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1415--1431},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0536-8},
  doi          = {10.1007/S10623-018-0536-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChangZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CharpinL19,
  author       = {Pascale Charpin and
                  Philippe Langevin},
  title        = {Obituary of Jacques Wolfmann {(1932-2018)}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {955--956},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00631-y},
  doi          = {10.1007/S10623-019-00631-Y},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CharpinL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenGK19,
  author       = {Zhixiong Chen and
                  Ting Gu and
                  Andrew Klapper},
  title        = {On the q-bentness of Boolean functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {163--171},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0494-1},
  doi          = {10.1007/S10623-018-0494-1},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenGK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenTL19,
  author       = {Qi Chen and
                  Chunming Tang and
                  Zhiqiang Lin},
  title        = {Efficient explicit constructions of compartmented secret sharing schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2913--2940},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00657-2},
  doi          = {10.1007/S10623-019-00657-2},
  timestamp    = {Fri, 22 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenTL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChengJW19,
  author       = {Minquan Cheng and
                  Jing Jiang and
                  Qiang Wang},
  title        = {Improved bounds on 2-frameproof codes with length 4},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {97--106},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0490-5},
  doi          = {10.1007/S10623-018-0490-5},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChengJW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Cheraghchi19,
  author       = {Mahdi Cheraghchi},
  title        = {Nearly optimal robust secret sharing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1777--1796},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0578-y},
  doi          = {10.1007/S10623-018-0578-Y},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Cheraghchi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChisakiKM19,
  author       = {Shoko Chisaki and
                  Yui Kimura and
                  Nobuko Miyamoto},
  title        = {A recursive construction for difference systems of sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {1059--1068},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0505-2},
  doi          = {10.1007/S10623-018-0505-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChisakiKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CivinoBS19,
  author       = {Roberto Civino and
                  C{\'{e}}line Blondeau and
                  Massimiliano Sala},
  title        = {Differential attacks: using alternative operations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {225--247},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0516-z},
  doi          = {10.1007/S10623-018-0516-Z},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CivinoBS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CogliatiT19,
  author       = {Beno{\^{\i}}t Cogliati and
                  Titouan Tanguy},
  title        = {Multi-user security bound for filter permutators in the random oracle
                  model},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1621--1638},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0555-5},
  doi          = {10.1007/S10623-018-0555-5},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CogliatiT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CossidenteP19,
  author       = {Antonio Cossidente and
                  Francesco Pavese},
  title        = {On line covers of finite projective and polar spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {1985--2002},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00599-1},
  doi          = {10.1007/S10623-018-00599-1},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CossidenteP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DOliveiraF19,
  author       = {Rafael G. L. D'Oliveira and
                  Marcelo Firer},
  title        = {A distance between channels: the average error of mismatched channels},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {481--493},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0557-3},
  doi          = {10.1007/S10623-018-0557-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DOliveiraF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DavydovMP19,
  author       = {Alexander A. Davydov and
                  Stefano Marcugini and
                  Fernanda Pambianco},
  title        = {New covering codes of radius R, codimension tR and {\textdollar}{\textdollar}tR+{\textbackslash}frac\{R\}\{2\}{\textdollar}{\textdollar},
                  and saturating sets in projective spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2771--2792},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00649-2},
  doi          = {10.1007/S10623-019-00649-2},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DavydovMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DerlerS19,
  author       = {David Derler and
                  Daniel Slamanig},
  title        = {Key-homomorphic signatures: definitions and applications to multiparty
                  signatures and non-interactive zero-knowledge},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1373--1413},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0535-9},
  doi          = {10.1007/S10623-018-0535-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DerlerS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DeyRS19,
  author       = {Sabyasachi Dey and
                  Tapabrata Roy and
                  Santanu Sarkar},
  title        = {Some results on Fruit},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {349--364},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0533-y},
  doi          = {10.1007/S10623-018-0533-Y},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DeyRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dinur19,
  author       = {Itai Dinur},
  title        = {An algorithmic framework for the generalized birthday problem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1897--1926},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00594-6},
  doi          = {10.1007/S10623-018-00594-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dinur19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DucasP19,
  author       = {L{\'{e}}o Ducas and
                  C{\'{e}}cile Pierrot},
  title        = {Polynomial time bounded distance decoding near Minkowski's bound in
                  discrete logarithm lattices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1737--1748},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0573-3},
  doi          = {10.1007/S10623-018-0573-3},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DucasP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DukesL19,
  author       = {Peter J. Dukes and
                  Esther R. Lamken},
  title        = {Constructions and uses of incomplete pairwise balanced designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2729--2751},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00645-6},
  doi          = {10.1007/S10623-019-00645-6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DukesL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DuttaAR19,
  author       = {Sabyasachi Dutta and
                  Avishek Adhikari and
                  Sushmita Ruj},
  title        = {Maximal contrast color visual secret sharing schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1699--1711},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0570-6},
  doi          = {10.1007/S10623-018-0570-6},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DuttaAR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Duursma19,
  author       = {Iwan M. Duursma},
  title        = {Matrix theory for minimal trellises},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2507--2536},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00627-8},
  doi          = {10.1007/S10623-019-00627-8},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Duursma19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dyshko19,
  author       = {Serhii Dyshko},
  title        = {The extension theorem for Lee and Euclidean weight codes over integer
                  residue rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1253--1269},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0521-2},
  doi          = {10.1007/S10623-018-0521-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dyshko19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EdemskiyLZH19,
  author       = {Vladimir Edemskiy and
                  Chunlei Li and
                  Xiangyong Zeng and
                  Tor Helleseth},
  title        = {The linear complexity of generalized cyclotomic binary sequences of
                  period p\({}^{\mbox{n}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {1183--1197},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0513-2},
  doi          = {10.1007/S10623-018-0513-2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/EdemskiyLZH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Egan19,
  author       = {Ronan Egan},
  title        = {Phased unitary Golay pairs, Butson Hadamard matrices and a conjecture
                  of Ito's},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {67--74},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0485-2},
  doi          = {10.1007/S10623-018-0485-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Egan19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EgorovaFKL19,
  author       = {Elena Egorova and
                  Marcel Fernandez and
                  Grigory Kabatiansky and
                  Moon Ho Lee},
  title        = {Signature codes for weighted noisy adder channel, multimedia fingerprinting
                  and compressed sensing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {455--462},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0551-9},
  doi          = {10.1007/S10623-018-0551-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EgorovaFKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EthierM19,
  author       = {John T. Ethier and
                  Gary L. Mullen},
  title        = {Sets of mutually orthogonal Sudoku frequency squares},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {57--65},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0487-0},
  doi          = {10.1007/S10623-018-0487-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EthierM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FanGSSS19,
  author       = {Xinxin Fan and
                  Guang Gong and
                  Berry Schoenmakers and
                  Francesco Sica and
                  Andrey Sidorenko},
  title        = {Secure simultaneous bit extraction from Koblitz curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {1--13},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0484-3},
  doi          = {10.1007/S10623-018-0484-3},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FanGSSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FarrasRR19,
  author       = {Oriol Farr{\`{a}}s and
                  Jordi Ribes{-}Gonz{\'{a}}lez and
                  Sara Ricci},
  title        = {Local bounds for the optimal information ratio of secret sharing schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1323--1344},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0529-7},
  doi          = {10.1007/S10623-018-0529-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FarrasRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FengWW19,
  author       = {Tao Feng and
                  Lidong Wang and
                  Xiaomiao Wang},
  title        = {Optimal 2-D (n {\texttimes} m , 3 , 2 , 1)-optical orthogonal codes
                  and related equi-difference conflict avoiding codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1499--1520},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0549-3},
  doi          = {10.1007/S10623-018-0549-3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/FengWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Fernandez-Cordoba19,
  author       = {Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba and
                  Carlos Vela and
                  Merc{\`{e}} Villanueva},
  title        = {On {\textdollar}{\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2s\}{\textdollar}{\textdollar}
                  {Z} 2 s -linear Hadamard codes: kernel and partial classification},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {417--435},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0546-6},
  doi          = {10.1007/S10623-018-0546-6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Fernandez-Cordoba19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FickusJ19,
  author       = {Matthew Fickus and
                  John Jasper},
  title        = {Equiangular tight frames from group divisible designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1673--1697},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0569-z},
  doi          = {10.1007/S10623-018-0569-Z},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FickusJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FuF19,
  author       = {Shihui Fu and
                  Xiutao Feng},
  title        = {Involutory differentially 4-uniform permutations from known constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {31--56},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0482-5},
  doi          = {10.1007/S10623-018-0482-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FuF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FuFLW19,
  author       = {Shihui Fu and
                  Xiutao Feng and
                  Dongdai Lin and
                  Qiang Wang},
  title        = {A recursive construction of permutation polynomials over F\({}_{\mbox{q\({}^{\mbox{2}}\)}}\)
                  with odd characteristic related to R{\'{e}}dei functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1481--1498},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0548-4},
  doi          = {10.1007/S10623-018-0548-4},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FuFLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GarefalakisK19,
  author       = {Theodoulos Garefalakis and
                  Giorgos Kapetanakis},
  title        = {Further Results on the Morgan-Mullen Conjecture},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2639--2654},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00643-8},
  doi          = {10.1007/S10623-019-00643-8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GarefalakisK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GhoshS19,
  author       = {Sebati Ghosh and
                  Palash Sarkar},
  title        = {Evaluating Bernstein-Rabin-Winograd polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {527--546},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0561-7},
  doi          = {10.1007/S10623-018-0561-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GhoshS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GnilkeGHPCS19,
  author       = {Oliver W. Gnilke and
                  Marcus Greferath and
                  Camilla Hollanti and
                  Guillermo Nu{\~{n}}ez Ponasso and
                  Padraig {\'{O}} Cath{\'{a}}in and
                  Eric Swartz},
  title        = {Improved user-private information retrieval via finite geometry},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {665--677},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00591-9},
  doi          = {10.1007/S10623-018-00591-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GnilkeGHPCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GomezGR19,
  author       = {Ana{-}Isabel G{\'{o}}mez and
                  Domingo G{\'{o}}mez{-}P{\'{e}}rez and
                  Gu{\'{e}}na{\"{e}}l Renault},
  title        = {A probabilistic analysis on a lattice attack against {DSA}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2469--2488},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00633-w},
  doi          = {10.1007/S10623-019-00633-W},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GomezGR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuoSWG19,
  author       = {Chun Guo and
                  Yaobin Shen and
                  Lei Wang and
                  Dawu Gu},
  title        = {Beyond-birthday secure domain-preserving PRFs from a single permutation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1297--1322},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0528-8},
  doi          = {10.1007/S10623-018-0528-8},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuoSWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuptaPV19,
  author       = {Kishan Chand Gupta and
                  Sumit Kumar Pandey and
                  Ayineedi Venkateswarlu},
  title        = {Almost involutory recursive {MDS} diffusion layers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {609--626},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0582-2},
  doi          = {10.1007/S10623-018-0582-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuptaPV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HeinleinHKKW19,
  author       = {Daniel Heinlein and
                  Thomas Honold and
                  Michael Kiermaier and
                  Sascha Kurz and
                  Alfred Wassermann},
  title        = {Classifying optimal binary subspace codes of length 8, constant dimension
                  4 and minimum distance 6},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {375--391},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0544-8},
  doi          = {10.1007/S10623-018-0544-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HeinleinHKKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HengD19,
  author       = {Ziling Heng and
                  Cunsheng Ding},
  title        = {A construction of q-ary linear codes with irreducible cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {1087--1108},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0507-0},
  doi          = {10.1007/S10623-018-0507-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HengD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HolzbaurBW19,
  author       = {Lukas Holzbaur and
                  Hannes Bartz and
                  Antonia Wachter{-}Zeh},
  title        = {Improved decoding and error floor analysis of staircase codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {647--664},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0587-x},
  doi          = {10.1007/S10623-018-0587-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HolzbaurBW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Hou19,
  author       = {Xiang{-}Dong Hou},
  title        = {Optimal binary constant weight codes and affine linear groups over
                  finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1815--1838},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0581-3},
  doi          = {10.1007/S10623-018-0581-3},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Hou19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuJ19,
  author       = {Yupu Hu and
                  Huiwen Jia},
  title        = {A new Gaussian sampling for trapdoor lattices with arbitrary modulus},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2553--2570},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00635-8},
  doi          = {10.1007/S10623-019-00635-8},
  timestamp    = {Thu, 17 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuangLCAPL19,
  author       = {Zhengan Huang and
                  Junzuo Lai and
                  Wenbin Chen and
                  Man Ho Au and
                  Zhen Peng and
                  Jin Li},
  title        = {Simulation-based selective opening security for receivers under chosen-ciphertext
                  attacks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1345--1371},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0530-1},
  doi          = {10.1007/S10623-018-0530-1},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuangLCAPL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuiSZ19,
  author       = {Alice M. W. Hui and
                  Muhammad Adib Surani and
                  Sanming Zhou},
  title        = {The vertex-isoperimetric number of the incidence and non-incidence
                  graphs of unitals},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {957--970},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0498-x},
  doi          = {10.1007/S10623-018-0498-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuiSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/IhringerM19,
  author       = {Ferdinand Ihringer and
                  Karen Meagher},
  title        = {Correction to: Mikl{\'{o}}s-Manickam-Singhi conjectures on partial
                  geometries},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1457},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00611-2},
  doi          = {10.1007/S10623-019-00611-2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/IhringerM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JiaZZ19,
  author       = {Dongdong Jia and
                  Sumei Zhang and
                  Gengsheng Zhang},
  title        = {Erasure combinatorial batch codes based on nonadaptive group testing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1647--1656},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0564-4},
  doi          = {10.1007/S10623-018-0564-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JiaZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JungnickelMTW19,
  author       = {Dieter Jungnickel and
                  Spyros S. Magliveras and
                  Vladimir D. Tonchev and
                  Alfred Wassermann},
  title        = {The classification of Steiner triple systems on 27 points with 3-rank
                  24},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {831--839},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0502-5},
  doi          = {10.1007/S10623-018-0502-5},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JungnickelMTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KapetanakisR19,
  author       = {Giorgos Kapetanakis and
                  Lucas Reis},
  title        = {Variations of the Primitive Normal Basis Theorem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1459--1480},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0543-9},
  doi          = {10.1007/S10623-018-0543-9},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KapetanakisR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KavutMT19,
  author       = {Sel{\c{c}}uk Kavut and
                  Subhamoy Maitra and
                  Deng Tang},
  title        = {Construction and search of balanced Boolean functions on even number
                  of variables towards excellent autocorrelation profile},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {261--276},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0522-1},
  doi          = {10.1007/S10623-018-0522-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KavutMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KavutT19,
  author       = {Sel{\c{c}}uk Kavut and
                  Seher Tutdere},
  title        = {The covering radii of a class of binary cyclic codes and some {BCH}
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {317--325},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0525-y},
  doi          = {10.1007/S10623-018-0525-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KavutT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KharaghaniS19,
  author       = {Hadi Kharaghani and
                  Sho Suda},
  title        = {Linked systems of symmetric group divisible designs of type {II}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2341--2360},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00622-z},
  doi          = {10.1007/S10623-019-00622-Z},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KharaghaniS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimPC19,
  author       = {Jon{-}Lark Kim and
                  Junyong Park and
                  Soohak Choi},
  title        = {Steganographic schemes from perfect codes on Cayley graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2361--2374},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00624-x},
  doi          = {10.1007/S10623-019-00624-X},
  timestamp    = {Tue, 31 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KimPC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KoikeKMM19,
  author       = {Hiroki Koike and
                  Istv{\'{a}}n Kov{\'{a}}cs and
                  Dragan Marusic and
                  Mikhail E. Muzychuk},
  title        = {Cyclic groups are CI-groups for balanced configurations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1227--1235},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0517-y},
  doi          = {10.1007/S10623-018-0517-Y},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KoikeKMM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KotovMU19,
  author       = {Matvei Kotov and
                  Anton Menshov and
                  Alexander Ushakov},
  title        = {An attack on the Walnut digital signature algorithm},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2231--2250},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00615-y},
  doi          = {10.1007/S10623-019-00615-Y},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/KotovMU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LaiC19,
  author       = {Ching{-}Yi Lai and
                  Kai{-}Min Chung},
  title        = {Quantum encryption and generalized Shannon impossibility},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {1961--1972},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00597-3},
  doi          = {10.1007/S10623-018-00597-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LaiC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LandjevG19,
  author       = {Ivan N. Landjev and
                  Nevyana Georgieva},
  title        = {Conditions for the existence of spreads in projective Hjelmslev spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {785--794},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0540-z},
  doi          = {10.1007/S10623-018-0540-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LandjevG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LauT19,
  author       = {Terry Shue Chien Lau and
                  Chik How Tan},
  title        = {New rank codes based encryption scheme using partial circulant matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2979--2999},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00659-0},
  doi          = {10.1007/S10623-019-00659-0},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LauT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Lavauzelle19,
  author       = {Julien Lavauzelle},
  title        = {Lifted projective Reed-Solomon codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1541--1575},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0552-8},
  doi          = {10.1007/S10623-018-0552-8},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Lavauzelle19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LenzWY19,
  author       = {Andreas Lenz and
                  Antonia Wachter{-}Zeh and
                  Eitan Yaakobi},
  title        = {Duplication-correcting codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {277--298},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0523-0},
  doi          = {10.1007/S10623-018-0523-0},
  timestamp    = {Wed, 16 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LenzWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Li19,
  author       = {Shuxing Li},
  title        = {On the weight distribution of second order Reed-Muller codes and their
                  relatives},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2447--2460},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00630-z},
  doi          = {10.1007/S10623-019-00630-Z},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Li19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiW19,
  author       = {Yanbin Li and
                  Meiqin Wang},
  title        = {Cryptanalysis of {MORUS}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {1035--1058},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0501-6},
  doi          = {10.1007/S10623-018-0501-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiangJ19,
  author       = {Miao Liang and
                  Lijun Ji},
  title        = {On (t, L)-fold perfect authentication and secrecy codes with arbitration},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {2003--2026},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00602-9},
  doi          = {10.1007/S10623-018-00602-9},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiangJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Lieb19,
  author       = {Julia Lieb},
  title        = {Necessary field size and probability for {MDP} and complete {MDP}
                  convolutional codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {3019--3043},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00661-6},
  doi          = {10.1007/S10623-019-00661-6},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Lieb19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LingO19,
  author       = {San Ling and
                  Buket {\"{O}}zkaya},
  title        = {Multidimensional quasi-twisted codes: equivalent characterizations
                  and their relation to multidimensional convolutional codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2941--2965},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00655-4},
  doi          = {10.1007/S10623-019-00655-4},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LingO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuJZL19,
  author       = {Junying Liu and
                  Yupeng Jiang and
                  Qunxiong Zheng and
                  Dongdai Lin},
  title        = {A new construction of zero-difference balanced functions and two applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2251--2265},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00616-x},
  doi          = {10.1007/S10623-019-00616-X},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuJZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuL19,
  author       = {Haibo Liu and
                  Qunying Liao},
  title        = {Several classes of linear codes with a few weights from defining sets
                  over {\textdollar}{\textdollar}{\textbackslash}mathbb \{F\}{\_}p+u{\textbackslash}mathbb
                  \{F\}{\_}p{\textdollar}{\textdollar} {F} p + u {F} p},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {15--29},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0478-1},
  doi          = {10.1007/S10623-018-0478-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuM19,
  author       = {Jian Liu and
                  Sihem Mesnager},
  title        = {Weightwise perfectly balanced functions with high weightwise nonlinearity
                  profile},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1797--1813},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0579-x},
  doi          = {10.1007/S10623-018-0579-X},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuW19,
  author       = {Zihui Liu and
                  Jinliang Wang},
  title        = {Linear complementary dual codes over rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {3077--3086},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00664-3},
  doi          = {10.1007/S10623-019-00664-3},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuZ19,
  author       = {Xing Liu and
                  Liang Zhou},
  title        = {Improved Singleton bound on frequency hopping sequences and optimal
                  constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1713--1733},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0572-4},
  doi          = {10.1007/S10623-018-0572-4},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuZ19a,
  author       = {Xing Liu and
                  Liang Zhou},
  title        = {Correction to: Improved Singleton bound on frequency hopping sequences
                  and optimal constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1735--1736},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00618-9},
  doi          = {10.1007/S10623-019-00618-9},
  timestamp    = {Thu, 28 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuZ19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Martinez-Penas19,
  author       = {Umberto Mart{\'{\i}}nez{-}Pe{\~{n}}as},
  title        = {Theory of supports for linear codes endowed with the sum-rank metric},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2295--2320},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00619-8},
  doi          = {10.1007/S10623-019-00619-8},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Martinez-Penas19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MaxwellPSW19,
  author       = {Gregory Maxwell and
                  Andrew Poelstra and
                  Yannick Seurin and
                  Pieter Wuille},
  title        = {Simple Schnorr multi-signatures with applications to Bitcoin},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {2139--2164},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00608-x},
  doi          = {10.1007/S10623-019-00608-X},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MaxwellPSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Meagher19,
  author       = {Karen Meagher},
  title        = {An Erd{\H{o}}s-Ko-Rado theorem for the group {\textdollar}{\textdollar}{\textbackslash}hbox
                  \{PSU\}(3, q){\textdollar}{\textdollar} {PSU} {(} 3 , q {)}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {717--744},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0537-7},
  doi          = {10.1007/S10623-018-0537-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Meagher19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MefenzaV19,
  author       = {Thierry Mefenza and
                  Damien Vergnaud},
  title        = {Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold
                  functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {75--85},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0486-1},
  doi          = {10.1007/S10623-018-0486-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MefenzaV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MengMY19,
  author       = {Keju Meng and
                  Fuyou Miao and
                  Yue Yu},
  title        = {A secure and efficient on-line/off-line group key distribution protocol},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1601--1620},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0554-6},
  doi          = {10.1007/S10623-018-0554-6},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MengMY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MesnagerOS19,
  author       = {Sihem Mesnager and
                  Ferruh {\"{O}}zbudak and
                  Ahmet Sinak},
  title        = {Linear codes from weakly regular plateaued functions and their secret
                  sharing schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {463--480},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0556-4},
  doi          = {10.1007/S10623-018-0556-4},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MesnagerOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MesnagerZTZ19,
  author       = {Sihem Mesnager and
                  Fengrong Zhang and
                  Chunming Tang and
                  Yong Zhou},
  title        = {Further study on the maximum number of bent components of vectorial
                  functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2597--2610},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00639-4},
  doi          = {10.1007/S10623-019-00639-4},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MesnagerZTZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MeszkaT19,
  author       = {Mariusz Meszka and
                  Magdalena Tyniec},
  title        = {Orthogonal one-factorizations of complete multipartite graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {987--993},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0504-3},
  doi          = {10.1007/S10623-018-0504-3},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MeszkaT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MezofiN19,
  author       = {D{\'{a}}vid Mezofi and
                  G{\'{a}}bor P{\'{e}}ter Nagy},
  title        = {On the geometry of full points of abstract unitals},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2967--2978},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00658-1},
  doi          = {10.1007/S10623-019-00658-1},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MezofiN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MichelW19,
  author       = {Jerod Michel and
                  Qi Wang},
  title        = {Almost difference sets in nonabelian groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1243--1251},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0519-9},
  doi          = {10.1007/S10623-018-0519-9},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MichelW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MichelW19a,
  author       = {Jerod Michel and
                  Qi Wang},
  title        = {Almost designs and their links with balanced incomplete block designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {1945--1960},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00596-4},
  doi          = {10.1007/S10623-018-00596-4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MichelW19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MichelW19b,
  author       = {Jerod Michel and
                  Qi Wang},
  title        = {Partial geometric designs from group actions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2655--2670},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00644-7},
  doi          = {10.1007/S10623-019-00644-7},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MichelW19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MicheliW19,
  author       = {Giacomo Micheli and
                  Violetta Weger},
  title        = {Cryptanalysis of the CLR-cryptosystem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {1069--1086},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0500-7},
  doi          = {10.1007/S10623-018-0500-7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MicheliW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MiezakiO19,
  author       = {Tsuyoshi Miezaki and
                  Manabu Oura},
  title        = {On the cycle index and the weight enumerator},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1237--1242},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0518-x},
  doi          = {10.1007/S10623-018-0518-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MiezakiO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NgP19,
  author       = {Siaw{-}Lynn Ng and
                  Maura B. Paterson},
  title        = {Functional repair codes: a view from projective geometry},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2701--2722},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00647-4},
  doi          = {10.1007/S10623-019-00647-4},
  timestamp    = {Thu, 17 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NgP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OlsonS19,
  author       = {Torger Olson and
                  Eric Swartz},
  title        = {Transitive PSL(2, 11)-invariant k-arcs in PG(4, q)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1871--1879},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0588-9},
  doi          = {10.1007/S10623-018-0588-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OlsonS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ostergard19,
  author       = {Patric R. J. {\"{O}}sterg{\aa}rd},
  title        = {The sextuply shortened binary Golay code is optimal},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {341--347},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0532-z},
  doi          = {10.1007/S10623-018-0532-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ostergard19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OuyangX19,
  author       = {Yi Ouyang and
                  Xianhong Xie},
  title        = {Linear complexity of generalized cyclotomic sequences of period 2p\({}^{\mbox{m}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2585--2596},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00638-5},
  doi          = {10.1007/S10623-019-00638-5},
  timestamp    = {Fri, 25 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OuyangX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PanarioR19,
  author       = {Daniel Panario and
                  Lucas Reis},
  title        = {The functional graph of linear maps over finite fields and applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {437--453},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0547-5},
  doi          = {10.1007/S10623-018-0547-5},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PanarioR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PineroS19,
  author       = {Fernando Pi{\~{n}}ero and
                  Prasant Singh},
  title        = {The weight spectrum of certain affine Grassmann codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {817--830},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0567-1},
  doi          = {10.1007/S10623-018-0567-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PineroS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PinheiroMF19,
  author       = {Jerry Anderson Pinheiro and
                  Roberto Assis Machado and
                  Marcelo Firer},
  title        = {Combinatorial metrics: MacWilliams-type identities, isometries and
                  extension property},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {327--340},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0527-9},
  doi          = {10.1007/S10623-018-0527-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PinheiroMF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Polhill19,
  author       = {John B. Polhill},
  title        = {A new family of partial difference sets in 3-groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1639--1646},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0562-6},
  doi          = {10.1007/S10623-018-0562-6},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Polhill19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PuchingerRB19,
  author       = {Sven Puchinger and
                  Johan Rosenkilde and
                  Irene I. Bouw},
  title        = {Improved power decoding of interleaved one-point Hermitian codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {589--607},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0577-z},
  doi          = {10.1007/S10623-018-0577-Z},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PuchingerRB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/QiX19,
  author       = {Minglong Qi and
                  Shengwu Xiong},
  title        = {A correction to: on the linear complexity of the Sidelnikov-Lempel-Cohn-Eastman
                  sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2391--2393},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00625-w},
  doi          = {10.1007/S10623-019-00625-W},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/QiX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/QureshiP19,
  author       = {Claudio M. Qureshi and
                  Daniel Panario},
  title        = {The graph structure of Chebyshev polynomials over finite fields and
                  applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {393--416},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0545-7},
  doi          = {10.1007/S10623-018-0545-7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/QureshiP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Randriam19,
  author       = {Hugues Randriam},
  title        = {Gaps between prime numbers and tensor rank of multiplication in finite
                  fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {627--645},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0584-0},
  doi          = {10.1007/S10623-018-0584-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Randriam19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Reis19,
  author       = {Lucas Reis},
  title        = {Factorization of a class of composed polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1657--1671},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0568-0},
  doi          = {10.1007/S10623-018-0568-0},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Reis19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Romanov19,
  author       = {Alexander M. Romanov},
  title        = {On non-full-rank perfect codes over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {995--1003},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0506-1},
  doi          = {10.1007/S10623-018-0506-1},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Romanov19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RoussevaL19,
  author       = {Assia Rousseva and
                  Ivan N. Landjev},
  title        = {Linear codes close to the Griesmer bound and the related geometric
                  structures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {841--854},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0565-3},
  doi          = {10.1007/S10623-018-0565-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RoussevaL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShangguanG19,
  author       = {Chong Shangguan and
                  Gennian Ge},
  title        = {A new piggybacking design for systematic {MDS} storage codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2753--2770},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00650-9},
  doi          = {10.1007/S10623-019-00650-9},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShangguanG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Sheekey19,
  author       = {John Sheekey},
  title        = {Binary additive {MRD} codes with minimum distance n-1 must contain
                  a semifield spread set},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2571--2583},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00637-6},
  doi          = {10.1007/S10623-019-00637-6},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Sheekey19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiHK19,
  author       = {Minjia Shi and
                  Daitao Huang and
                  Denis S. Krotov},
  title        = {Additive perfect codes in Doob graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1857--1869},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0586-y},
  doi          = {10.1007/S10623-018-0586-Y},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiKS19,
  author       = {Minjia Shi and
                  Denis S. Krotov and
                  Patrick Sol{\'{e}}},
  title        = {A new distance-regular graph of diameter 3 on 1024 vertices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {2091--2101},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00609-w},
  doi          = {10.1007/S10623-019-00609-W},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiKS19a,
  author       = {Minjia Shi and
                  Denis S. Krotov and
                  Patrick Sol{\'{e}}},
  title        = {Correction to: {A} new distance-regular graph of diameter 3 on 1024
                  vertices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {2103},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00672-3},
  doi          = {10.1007/S10623-019-00672-3},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiKS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiLRSS19,
  author       = {Minjia Shi and
                  Yan Liu and
                  Hugues Randriam and
                  Lin Sok and
                  Patrick Sol{\'{e}}},
  title        = {Trace codes over Z\({}_{\mbox{4}}\), and Boolean functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1447--1455},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0542-x},
  doi          = {10.1007/S10623-018-0542-X},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiLRSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiS19,
  author       = {Minjia Shi and
                  Patrick Sol{\'{e}}},
  title        = {Three-weight codes, triple sum sets, and strongly walk regular graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2395--2404},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00628-7},
  doi          = {10.1007/S10623-019-00628-7},
  timestamp    = {Sat, 14 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiYW19,
  author       = {Xueying Shi and
                  Qin Yue and
                  Yansheng Wu},
  title        = {The dual-containing primitive {BCH} codes with the maximum designed
                  distance and their applications to quantum codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {2165--2183},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00610-3},
  doi          = {10.1007/S10623-019-00610-3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiYW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiZSC19,
  author       = {Minjia Shi and
                  Hongwei Zhu and
                  Patrick Sol{\'{e}} and
                  G{\'{e}}rard D. Cohen},
  title        = {How many weights can a linear code have?},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {87--95},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0488-z},
  doi          = {10.1007/S10623-018-0488-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiZSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShikataW19,
  author       = {Junji Shikata and
                  Yohei Watanabe},
  title        = {Identity-based encryption with hierarchical key-insulation in the
                  standard model},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {1005--1033},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0503-4},
  doi          = {10.1007/S10623-018-0503-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShikataW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Shiromoto19,
  author       = {Keisuke Shiromoto},
  title        = {Codes with the rank metric and matroids},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1765--1776},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0576-0},
  doi          = {10.1007/S10623-018-0576-0},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Shiromoto19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShparlinskiW19,
  author       = {Igor E. Shparlinski and
                  Arne Winterhof},
  title        = {Codes correcting restricted errors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {855--863},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0585-z},
  doi          = {10.1007/S10623-018-0585-Z},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShparlinskiW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SobhaniABK19,
  author       = {Reza Sobhani and
                  Alireza Abdollahi and
                  Javad Bagherian and
                  Maryam Khatami},
  title        = {A note on good permutation codes from Reed-Solomon codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2335--2340},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00621-0},
  doi          = {10.1007/S10623-019-00621-0},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SobhaniABK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SoleimanianK19,
  author       = {Azam Soleimanian and
                  Shahram Khazaei},
  title        = {Publicly verifiable searchable symmetric encryption based on efficient
                  cryptographic components},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {123--147},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0489-y},
  doi          = {10.1007/S10623-018-0489-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SoleimanianK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SolovevaAJMZ19,
  author       = {Faina I. Solov'eva and
                  Daniel Augot and
                  Thomas Johansson and
                  Marine Minier and
                  Victor A. Zinoviev},
  title        = {Editorial: Special issue on coding and cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {183--184},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00601-w},
  doi          = {10.1007/S10623-018-00601-W},
  timestamp    = {Wed, 20 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/SolovevaAJMZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SongS19,
  author       = {Min Kyu Song and
                  Hong{-}Yeop Song},
  title        = {Hamming correlation properties of the array structure of Sidelnikov
                  sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2537--2551},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00636-7},
  doi          = {10.1007/S10623-019-00636-7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SongS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SteinfeldSZ19,
  author       = {Ron Steinfeld and
                  Amin Sakzad and
                  Raymond K. Zhao},
  title        = {Practical {\textdollar}{\textdollar}{\textbackslash}mathsf \{MP\}
                  {\textbackslash}text\{- \}{\textbackslash}mathsf \{LWE\} {\textdollar}{\textdollar}
                  -based encryption balancing security-risk versus efficiency},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2847--2884},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00654-5},
  doi          = {10.1007/S10623-019-00654-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SteinfeldSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SunZG19,
  author       = {Yujuan Sun and
                  Jia{-}Fang Zhang and
                  Sugata Gangopadhyay},
  title        = {Construction of resilient Boolean functions in odd variables with
                  strictly almost optimal nonlinearity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {3045--3062},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00662-5},
  doi          = {10.1007/S10623-019-00662-5},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/SunZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TangDX19,
  author       = {Chunming Tang and
                  Cunsheng Ding and
                  Maosheng Xiong},
  title        = {Steiner systems {\textdollar}{\textdollar}S(2, 4, {\textbackslash}frac\{3m-1\}\{2\}){\textdollar}{\textdollar}
                  and 2-designs from ternary linear codes of length {\textdollar}{\textdollar}{\textbackslash}frac\{3m-1\}\{2\}{\textdollar}{\textdollar}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2793--2811},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00651-8},
  doi          = {10.1007/S10623-019-00651-8},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/TangDX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Taniguchi19,
  author       = {Hiroaki Taniguchi},
  title        = {A variation of the dual hyperoval S\({}_{\mbox{c}}\) using presemifields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {895--908},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0539-5},
  doi          = {10.1007/S10623-018-0539-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Taniguchi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Taniguchi19a,
  author       = {Hiroaki Taniguchi},
  title        = {On some quadratic {APN} functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {1973--1983},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00598-2},
  doi          = {10.1007/S10623-018-00598-2},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Taniguchi19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TianZQ19,
  author       = {Tian Tian and
                  Jia{-}Min Zhang and
                  Wen{-}Feng Qi},
  title        = {On the uniqueness of a type of cascade connection representations
                  for NFSRs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2267--2294},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00617-w},
  doi          = {10.1007/S10623-019-00617-W},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/TianZQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TopalovaZ19,
  author       = {Svetlana Topalova and
                  Stela Zhelezova},
  title        = {Types of spreads and duality of the parallelisms of PG(3, 5) with
                  automorphisms of order 13},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {495--507},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0558-2},
  doi          = {10.1007/S10623-018-0558-2},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/TopalovaZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Trung19,
  author       = {Tran van Trung},
  title        = {On existence theorems for simple t-designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {7},
  pages        = {1521--1540},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0550-x},
  doi          = {10.1007/S10623-018-0550-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Trung19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Trung19a,
  author       = {Tran van Trung},
  title        = {Recursive constructions for s-resolvable t-designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2835--2845},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00653-6},
  doi          = {10.1007/S10623-019-00653-6},
  timestamp    = {Wed, 06 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Trung19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Vandendriessche19,
  author       = {Peter Vandendriessche},
  title        = {On KM-arcs in non-Desarguesian projective planes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {2129--2137},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00606-z},
  doi          = {10.1007/S10623-019-00606-Z},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Vandendriessche19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Vasileva19,
  author       = {Anastasia Vasil'eva},
  title        = {Local distributions for eigenfunctions and perfect colorings of q-ary
                  Hamming graph},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {2-3},
  pages        = {509--516},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0559-1},
  doi          = {10.1007/S10623-018-0559-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Vasileva19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Wang19,
  author       = {Qichun Wang},
  title        = {Hadamard matrices, d-linearly independent sets and correlation-immune
                  Boolean functions with minimum Hamming weights},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2321--2333},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00620-1},
  doi          = {10.1007/S10623-019-00620-1},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Wang19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangCJ19,
  author       = {Xin Wang and
                  Jie Cui and
                  Lijun Ji},
  title        = {Linear (2, p, p)-AONTs exist for all primes p},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {10},
  pages        = {2185--2197},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00612-1},
  doi          = {10.1007/S10623-019-00612-1},
  timestamp    = {Tue, 10 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WangCJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangJ19,
  author       = {Qian Wang and
                  Chenhui Jin},
  title        = {More accurate results on the provable security of {AES} against impossible
                  differential cryptanalysis},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {3001--3018},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00660-7},
  doi          = {10.1007/S10623-019-00660-7},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WangJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangS19,
  author       = {Qichun Wang and
                  Pantelimon Stanica},
  title        = {A trigonometric sum sharp estimate and new bounds on the nonlinearity
                  of some cryptographic Boolean functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1749--1763},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0574-2},
  doi          = {10.1007/S10623-018-0574-2},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangS19a,
  author       = {Qichun Wang and
                  Pantelimon Stanica},
  title        = {Transparency order for Boolean functions: analysis and construction},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {2043--2059},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00604-1},
  doi          = {10.1007/S10623-019-00604-1},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangS19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WinterDT19,
  author       = {Stefaan De Winter and
                  Cunsheng Ding and
                  Vladimir D. Tonchev},
  title        = {Maximal arcs and extended cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {807--816},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0514-1},
  doi          = {10.1007/S10623-018-0514-1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WinterDT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WinterW19,
  author       = {Stefaan De Winter and
                  Zeying Wang},
  title        = {Non-existence of partial difference sets in Abelian groups of order
                  8p\({}^{\mbox{3}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {4},
  pages        = {757--768},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0508-z},
  doi          = {10.1007/S10623-018-0508-Z},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WinterW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WuYS19,
  author       = {Yansheng Wu and
                  Qin Yue and
                  Xueying Shi},
  title        = {At most three-weight binary linear codes from generalized Moisio's
                  exponential sums},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {8},
  pages        = {1927--1943},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-00595-5},
  doi          = {10.1007/S10623-018-00595-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WuYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XieY19,
  author       = {Huiqin Xie and
                  Li Yang},
  title        = {Using Bernstein-Vazirani algorithm to attack block ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {1161--1182},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0510-5},
  doi          = {10.1007/S10623-018-0510-5},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XieY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuZG19,
  author       = {Zixiang Xu and
                  Yiwei Zhang and
                  Gennian Ge},
  title        = {New theoretical bounds and constructions of permutation codes under
                  block permutation metric},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2625--2637},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00641-w},
  doi          = {10.1007/S10623-019-00641-W},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XuZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YangCMSGL19,
  author       = {Guomin Yang and
                  Rongmao Chen and
                  Yi Mu and
                  Willy Susilo and
                  Fuchun Guo and
                  Jie Li},
  title        = {Strongly leakage resilient authenticated key exchange, revisited},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {12},
  pages        = {2885--2911},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00656-3},
  doi          = {10.1007/S10623-019-00656-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YangCMSGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YangQC19,
  author       = {Dong Yang and
                  Wen{-}Feng Qi and
                  Hua{-}Jin Chen},
  title        = {Provable security against impossible differential and zero correlation
                  linear cryptanalysis of some feistel structures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2683--2700},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00642-9},
  doi          = {10.1007/S10623-019-00642-9},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/YangQC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YasudaY19,
  author       = {Masaya Yasuda and
                  Junpei Yamaguchi},
  title        = {A new polynomial-time variant of {LLL} with deep insertions for decreasing
                  the squared-sum of Gram-Schmidt lengths},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2489--2505},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00634-9},
  doi          = {10.1007/S10623-019-00634-9},
  timestamp    = {Thu, 17 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YasudaY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Zanten19,
  author       = {A. J. van Zanten},
  title        = {Primitive idempotent tables of cyclic and constacyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {6},
  pages        = {1199--1225},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0495-0},
  doi          = {10.1007/S10623-018-0495-0},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Zanten19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhanDB19,
  author       = {Xiaoqin Zhan and
                  Suyun Ding and
                  Shuyi Bai},
  title        = {Flag-transitive 2-designs from PSL(2, q) with block size 4},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2723--2728},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00648-3},
  doi          = {10.1007/S10623-019-00648-3},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhanDB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangC19,
  author       = {Shiyong Zhang and
                  Gongliang Chen},
  title        = {New results on the state cycles of Trivium},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {149--162},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0493-2},
  doi          = {10.1007/S10623-018-0493-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangG19,
  author       = {Tao Zhang and
                  Gennian Ge},
  title        = {Constructions of optimal Ferrers diagram rank metric codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {1},
  pages        = {107--121},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0491-4},
  doi          = {10.1007/S10623-018-0491-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangG19a,
  author       = {Yiwei Zhang and
                  Gennian Ge},
  title        = {A general private information retrieval scheme for {MDS} coded databases
                  with colluding servers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {11},
  pages        = {2611--2623},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00640-x},
  doi          = {10.1007/S10623-019-00640-X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangG19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouYM19,
  author       = {Yanwei Zhou and
                  Bo Yang and
                  Yi Mu},
  title        = {Continuous leakage-resilient identity-based encryption with leakage
                  amplification},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {9},
  pages        = {2061--2090},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-019-00605-0},
  doi          = {10.1007/S10623-019-00605-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouYM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhuZYLL19,
  author       = {Yuqing Zhu and
                  Jincheng Zhuang and
                  Hairong Yi and
                  Chang Lv and
                  Dongdai Lin},
  title        = {A variant of the Galbraith-Ruprai algorithm for discrete logarithms
                  with improved complexity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {87},
  number       = {5},
  pages        = {971--986},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10623-018-0492-3},
  doi          = {10.1007/S10623-018-0492-3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhuZYLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlahmadiOS18,
  author       = {Adel Alahmadi and
                  Funda {\"{O}}zdemir and
                  Patrick Sol{\'{e}}},
  title        = {On self-dual double circulant codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1257--1265},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0393-x},
  doi          = {10.1007/S10623-017-0393-X},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlahmadiOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlmeidaNP18,
  author       = {Paulo Jos{\'{e}} Fernandes Almeida and
                  Diego Napp and
                  Raquel Pinto},
  title        = {{MDS} 2D convolutional codes with optimal 1D horizontal projections},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {285--302},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0357-1},
  doi          = {10.1007/S10623-017-0357-1},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlmeidaNP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AntrobusG18,
  author       = {Jared Antrobus and
                  Heide Gluesing{-}Luerssen},
  title        = {Lexicodes over finite principal ideal rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2661--2676},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0469-2},
  doi          = {10.1007/S10623-018-0469-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AntrobusG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Arce-NazarioCGM18,
  author       = {Rafael A. Arce{-}Nazario and
                  Francis N. Castro and
                  Oscar E. Gonz{\'{a}}lez and
                  Luis A. Medina and
                  Ivelisse M. Rubio},
  title        = {New families of balanced symmetric functions and a generalization
                  of Cusick, Li and St{\unicode{462}}nic{\unicode{462}}'s conjecture},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {693--701},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0351-7},
  doi          = {10.1007/S10623-017-0351-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Arce-NazarioCGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AugotLR18,
  author       = {Daniel Augot and
                  Pierre Loidreau and
                  Gwezheneg Robert},
  title        = {Generalized Gabidulin codes over fields of any characteristic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1807--1848},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0425-6},
  doi          = {10.1007/S10623-017-0425-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AugotLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AvelliPS18,
  author       = {Diego Napp Avelli and
                  Raquel Pinto and
                  Vladimir Sidorenko},
  title        = {Concatenation of convolutional codes and rank metric codes for multi-shot
                  network coding},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {303--318},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0346-4},
  doi          = {10.1007/S10623-017-0346-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AvelliPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AydinCD18,
  author       = {Nuh Aydin and
                  Yasemin Cengellenmis and
                  Abdullah Dertli},
  title        = {On some constacyclic codes over {\textdollar}{\textdollar}{\textbackslash}mathbb
                  \{Z\}{\_}\{4\}{\textbackslash}left[ u{\textbackslash}right] /{\textbackslash}left{\textbackslash}langle
                  u\{2\}-1{\textbackslash}right{\textbackslash}rangle {\textdollar}{\textdollar}
                  , their {\textdollar}Z\({}_{\mbox{4}}\) images, and new codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1249--1255},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0392-y},
  doi          = {10.1007/S10623-017-0392-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AydinCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BagheriSP18,
  author       = {Khadijeh Bagheri and
                  Mohammad{-}Reza Sadeghi and
                  Daniel Panario},
  title        = {A non-commutative cryptosystem based on quaternion algebras},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2345--2377},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0451-4},
  doi          = {10.1007/S10623-017-0451-4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BagheriSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BambergLL18,
  author       = {John Bamberg and
                  Jesse Lansdown and
                  Melissa Lee},
  title        = {On m-ovoids of regular near polygons},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {997--1006},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0373-1},
  doi          = {10.1007/S10623-017-0373-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BambergLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BandiTM18,
  author       = {Ramakrishna Bandi and
                  Alexandre Fotue Tabue and
                  Edgar Mart{\'{\i}}nez{-}Moro},
  title        = {On counting subring-submodules of free modules over finite commutative
                  frobenius rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2247--2254},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0446-1},
  doi          = {10.1007/S10623-017-0446-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BandiTM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BarrolletaV18,
  author       = {Roland D. Barrolleta and
                  Merc{\`{e}} Villanueva},
  title        = {Partial permutation decoding for binary linear and {\textdollar}{\textdollar}Z{\_}4{\textdollar}{\textdollar}
                  {Z} 4 -linear Hadamard codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {569--586},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0342-8},
  doi          = {10.1007/S10623-017-0342-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BarrolletaV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartoliMZ18,
  author       = {Daniele Bartoli and
                  Maria Montanucci and
                  Giovanni Zini},
  title        = {Multi point {AG} codes on the {GK} maximal curve},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {161--177},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0333-9},
  doi          = {10.1007/S10623-017-0333-9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BartoliMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartoliMZ18a,
  author       = {Daniele Bartoli and
                  Maria Montanucci and
                  Giovanni Zini},
  title        = {{AG} codes and {AG} quantum codes from the {GGS} curve},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2315--2344},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0450-5},
  doi          = {10.1007/S10623-017-0450-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BartoliMZ18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartoliQ18,
  author       = {Daniele Bartoli and
                  Luciane Quoos},
  title        = {Permutation polynomials of the type g(x\({}^{\mbox{s}}\)) over {\(\mathbb{F}\)}\({}_{\mbox{q\({}^{\mbox{2n}}\)}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1589--1599},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0415-8},
  doi          = {10.1007/S10623-017-0415-8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BartoliQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeregLS18,
  author       = {Sergey Bereg and
                  Avi Levy and
                  Ivan Hal Sudborough},
  title        = {Constructing permutation arrays from groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1095--1111},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0381-1},
  doi          = {10.1007/S10623-017-0381-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeregLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BiLDLW18,
  author       = {Wenquan Bi and
                  Zheng Li and
                  Xiaoyang Dong and
                  Lu Li and
                  Xiaoyun Wang},
  title        = {Conditional cube attack on round-reduced River Keyak},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1295--1310},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0396-7},
  doi          = {10.1007/S10623-017-0396-7},
  timestamp    = {Thu, 16 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BiLDLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BibakKS18,
  author       = {Khodakhast Bibak and
                  Bruce M. Kapron and
                  Venkatesh Srinivasan},
  title        = {Unweighted linear congruences with distinct coordinates and the Varshamov-Tenengolts
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1893--1904},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0428-3},
  doi          = {10.1007/S10623-017-0428-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BibakKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BierbrauerBFMP18,
  author       = {J{\"{u}}rgen Bierbrauer and
                  Daniele Bartoli and
                  Giorgio Faina and
                  Stefano Marcugini and
                  Fernanda Pambianco},
  title        = {A family of semifields in odd characteristic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {611--621},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0345-5},
  doi          = {10.1007/S10623-017-0345-5},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BierbrauerBFMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlackburnGHPRSV18,
  author       = {Simon R. Blackburn and
                  Marcus Greferath and
                  Camilla Hollanti and
                  Mario{-}Osvin Pavcevic and
                  Joachim Rosenthal and
                  Leo Storme and
                  {\'{A}}ngeles V{\'{a}}zquez{-}Castro and
                  Alfred Wassermann},
  title        = {Preface to the special issue on network coding and designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {237--238},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0443-4},
  doi          = {10.1007/S10623-017-0443-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlackburnGHPRSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Blanco-ChaconBD18,
  author       = {Iv{\'{a}}n Blanco{-}Chac{\'{o}}n and
                  Eimear Byrne and
                  Iwan M. Duursma and
                  John Sheekey},
  title        = {Rank metric codes and zeta functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1767--1792},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0423-8},
  doi          = {10.1007/S10623-017-0423-8},
  timestamp    = {Thu, 17 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Blanco-ChaconBD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BorgesF18,
  author       = {Joaquim Borges and
                  Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba},
  title        = {A characterization of {\(\mathbb{Z}\)}\({}_{\mbox{2}}\){\(\mathbb{Z}\)}\({}_{\mbox{2}}\)[u]-linear
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1377--1389},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0401-1},
  doi          = {10.1007/S10623-017-0401-1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BorgesF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BorgesFT18,
  author       = {Joaquim Borges and
                  Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba and
                  Roger Ten{-}Valls},
  title        = {Z\({}_{\mbox{2}}\)-double cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {463--479},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0334-8},
  doi          = {10.1007/S10623-017-0334-8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BorgesFT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BricoutMPM18,
  author       = {R{\'{e}}mi Bricout and
                  Sean Murphy and
                  Kenneth G. Paterson and
                  Thyla van der Merwe},
  title        = {Analysing and exploiting the Mantin biases in {RC4}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {743--770},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0355-3},
  doi          = {10.1007/S10623-017-0355-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BricoutMPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletMTQ18,
  author       = {Claude Carlet and
                  Sihem Mesnager and
                  Chunming Tang and
                  Yanfeng Qi},
  title        = {Euclidean and Hermitian {LCD} {MDS} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2605--2618},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0463-8},
  doi          = {10.1007/S10623-018-0463-8},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletMTQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CatalanoFN18,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Luca Nizzardo},
  title        = {Homomorphic signatures with sublinear public keys via asymmetric programmable
                  hash functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2197--2246},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0444-3},
  doi          = {10.1007/S10623-017-0444-3},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CatalanoFN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChangH18,
  author       = {Seunghwan Chang and
                  Jong Yoon Hyun},
  title        = {Linear codes from simplicial complexes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2167--2181},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0442-5},
  doi          = {10.1007/S10623-017-0442-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChangH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenJL18,
  author       = {Jingyuan Chen and
                  Lijun Ji and
                  Yun Li},
  title        = {Combinatorial constructions of optimal (m, n, 4, 2) optical orthogonal
                  signature pattern codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1499--1525},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0409-6},
  doi          = {10.1007/S10623-017-0409-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenL18,
  author       = {Bocong Chen and
                  Hongwei Liu},
  title        = {Constructions of cyclic constant dimension codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1267--1279},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0394-9},
  doi          = {10.1007/S10623-017-0394-9},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChoiDMW18,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  title        = {Improved, black-box, non-malleable encryption from semantic security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {641--663},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0348-2},
  doi          = {10.1007/S10623-017-0348-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChoiDMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Clayton18,
  author       = {David Clayton},
  title        = {A note on almost difference sets in nonabelian groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1405--1410},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0403-z},
  doi          = {10.1007/S10623-017-0403-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Clayton18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Cogliati18,
  author       = {Beno{\^{\i}}t Cogliati},
  title        = {Tweaking a block cipher: multi-user beyond-birthday-bound security
                  in the standard model},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2747--2763},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0471-8},
  doi          = {10.1007/S10623-018-0471-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Cogliati18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CogliatiS18,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yannick Seurin},
  title        = {Analysis of the single-permutation encrypted Davies-Meyer construction},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2703--2723},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0470-9},
  doi          = {10.1007/S10623-018-0470-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CogliatiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ColbournLS18,
  author       = {Charles J. Colbourn and
                  Erin Lanus and
                  Kaushik Sarkar},
  title        = {Asymptotic and constructive methods for covering perfect hash families
                  and covering arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {907--937},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0369-x},
  doi          = {10.1007/S10623-017-0369-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ColbournLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CossidenteP18,
  author       = {Antonio Cossidente and
                  Francesco Pavese},
  title        = {On intriguing sets of finite symplectic spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1161--1174},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0387-8},
  doi          = {10.1007/S10623-017-0387-8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CossidenteP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CostaFW18,
  author       = {Simone Costa and
                  Tao Feng and
                  Xiaomiao Wang},
  title        = {Frame difference families and resolvable balanced incomplete block
                  designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2725--2745},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0472-7},
  doi          = {10.1007/S10623-018-0472-7},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CostaFW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CruzGLR18,
  author       = {Javier de la Cruz and
                  Elisa Gorla and
                  Hiram H. L{\'{o}}pez and
                  Alberto Ravagnani},
  title        = {Weight distribution of rank-metric codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {1--16},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-016-0325-1},
  doi          = {10.1007/S10623-016-0325-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CruzGLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CruzW18,
  author       = {Javier de la Cruz and
                  Wolfgang Willems},
  title        = {On group codes with complementary duals},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {2065--2073},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0437-2},
  doi          = {10.1007/S10623-017-0437-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CruzW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DavisO18,
  author       = {James A. Davis and
                  Oktay {\"{O}}lmez},
  title        = {A framework for constructing partial geometric difference sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1367--1375},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0400-2},
  doi          = {10.1007/S10623-017-0400-2},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DavisO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dempwolff18,
  author       = {Ulrich Dempwolff},
  title        = {{CCZ} equivalence of power functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {665--692},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0350-8},
  doi          = {10.1007/S10623-017-0350-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dempwolff18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DerlerS18,
  author       = {David Derler and
                  Daniel Slamanig},
  title        = {Practical witness encryption for algebraic languages or how to encrypt
                  under Groth-Sahai proofs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2525--2547},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0460-y},
  doi          = {10.1007/S10623-018-0460-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DerlerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ding18,
  author       = {Cunsheng Ding},
  title        = {Infinite families of 3-designs from a type of five-weight code},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {703--719},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0352-6},
  doi          = {10.1007/S10623-017-0352-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ding18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DingGZZZ18,
  author       = {Baokun Ding and
                  Gennian Ge and
                  Jun Zhang and
                  Tao Zhang and
                  Yiwei Zhang},
  title        = {New constructions of {MDS} symbol-pair codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {841--859},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0365-1},
  doi          = {10.1007/S10623-017-0365-1},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DingGZZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DinhSPS18,
  author       = {Hai Q. Dinh and
                  Abhay Kumar Singh and
                  Sukhamoy Pattanayak and
                  Songsak Sriboonchitta},
  title        = {Cyclic {DNA} codes over the ring {\(\mathbb{F}\)}\({}_{\mbox{2}}\)+u{\(\mathbb{F}\)}\({}_{\mbox{2}}\)+v{\(\mathbb{F}\)}\({}_{\mbox{2}}\)+uv{\(\mathbb{F}\)}\({}_{\mbox{2}}\)+v\({}^{\mbox{2}}\){\(\mathbb{F}\)}\({}_{\mbox{2}}\)+uv\({}^{\mbox{2}}\){\(\mathbb{F}\)}\({}_{\mbox{2}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1451--1467},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0405-x},
  doi          = {10.1007/S10623-017-0405-X},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DinhSPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DonatiD18,
  author       = {Giorgio Donati and
                  Nicola Durante},
  title        = {A generalization of the normal rational curve in PG(d, q\({}^{\mbox{n}}\))
                  and its associated non-linear {MRD} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1175--1184},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0388-7},
  doi          = {10.1007/S10623-017-0388-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DonatiD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DoughertyGTT18,
  author       = {Steven T. Dougherty and
                  Joe Gildea and
                  Rhian Taylor and
                  Alexander Tylyshchak},
  title        = {Group rings, G-codes and constructions of self-dual and formally self-dual
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {2115--2138},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0440-7},
  doi          = {10.1007/S10623-017-0440-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DoughertyGTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DrapalV18,
  author       = {Ales Dr{\'{a}}pal and
                  Viliam Valent},
  title        = {Few associative triples, isotopisms and groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {555--568},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0341-9},
  doi          = {10.1007/S10623-017-0341-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DrapalV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DucasW18,
  author       = {L{\'{e}}o Ducas and
                  Wessel P. J. van Woerden},
  title        = {The closest vector problem in tensored root lattices of type {A} and
                  in their duals},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {137--150},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0332-x},
  doi          = {10.1007/S10623-017-0332-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DucasW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EmuraHNOMY18,
  author       = {Keita Emura and
                  Goichiro Hanaoka and
                  Koji Nuida and
                  Go Ohtake and
                  Takahiro Matsuda and
                  Shota Yamada},
  title        = {Chosen ciphertext secure keyed-homomorphic public-key cryptosystems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1623--1683},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0417-6},
  doi          = {10.1007/S10623-017-0417-6},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EmuraHNOMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Fan18,
  author       = {Cuiling Fan},
  title        = {The linear complexity of a class of binary sequences with optimal
                  autocorrelation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2441--2450},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0456-7},
  doi          = {10.1007/S10623-018-0456-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Fan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FanX18,
  author       = {Yun Fan and
                  Bangteng Xu},
  title        = {Fourier transforms and bent functions on finite groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {2091--2113},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0439-0},
  doi          = {10.1007/S10623-017-0439-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FanX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FarranGH18,
  author       = {Jos{\'{e}} Ignacio Farr{\'{a}}n and
                  Pedro A. Garc{\'{\i}}a{-}S{\'{a}}nchez and
                  Benjam{\'{\i}}n A. Heredia},
  title        = {On the second Feng-Rao distance of Algebraic Geometry codes related
                  to Arf semigroups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2893--2916},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0483-4},
  doi          = {10.1007/S10623-018-0483-4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FarranGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FarranGHL18,
  author       = {Jos{\'{e}} Ignacio Farr{\'{a}}n and
                  Pedro A. Garc{\'{\i}}a{-}S{\'{a}}nchez and
                  Benjam{\'{\i}}n A. Heredia and
                  Micah J. Leamer},
  title        = {The second Feng-Rao number for codes coming from telescopic semigroups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1849--1864},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0426-5},
  doi          = {10.1007/S10623-017-0426-5},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FarranGHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FaugereW18,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Alexandre Wallet},
  title        = {The point decomposition problem over hyperelliptic curves - Toward
                  efficient computation of discrete logarithms in even characteristic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2279--2314},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0449-y},
  doi          = {10.1007/S10623-017-0449-Y},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FaugereW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FeltzC18,
  author       = {Mich{\`{e}}le Feltz and
                  Cas Cremers},
  title        = {Strengthening the security of authenticated key exchange against bad
                  randomness},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {481--516},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0337-5},
  doi          = {10.1007/S10623-017-0337-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FeltzC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Fernando18,
  author       = {Neranga Fernando},
  title        = {Self-reciprocal polynomials and coterm polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1707--1726},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0419-4},
  doi          = {10.1007/S10623-017-0419-4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Fernando18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GaboritOK18,
  author       = {Philippe Gaborit and
                  Ayoub Otmani and
                  Herv{\'{e}} Tal{\'{e}} Kalachi},
  title        = {Polynomial-time key recovery attack on the Faure-Loidreau scheme based
                  on Gabidulin codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1391--1403},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0402-0},
  doi          = {10.1007/S10623-017-0402-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GaboritOK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GangopadhyayMS18,
  author       = {Sugata Gangopadhyay and
                  Bimal Mandal and
                  Pantelimon Stanica},
  title        = {Gowers U\({}_{\mbox{3}}\) norm of some classes of bent Boolean functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1131--1148},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0383-z},
  doi          = {10.1007/S10623-017-0383-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GangopadhyayMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GavrilyukMP18,
  author       = {Alexander L. Gavrilyuk and
                  Ilia Matkin and
                  Tim Penttila},
  title        = {Derivation of Cameron-Liebler line classes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {231--236},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0338-4},
  doi          = {10.1007/S10623-017-0338-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GavrilyukMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GeSFWS18,
  author       = {Chunpeng Ge and
                  Willy Susilo and
                  Liming Fang and
                  Jiandong Wang and
                  Yunqing Shi},
  title        = {A CCA-secure key-policy attribute-based proxy re-encryption in the
                  adaptive corruption model for dropbox data sharing system},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2587--2603},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0462-9},
  doi          = {10.1007/S10623-018-0462-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GeSFWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GnilkeGP18,
  author       = {Oliver Wilhelm Gnilke and
                  Marcus Greferath and
                  Mario{-}Osvin Pavcevic},
  title        = {Mosaics of combinatorial designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {85--95},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0328-6},
  doi          = {10.1007/S10623-017-0328-6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GnilkeGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuendaJG18,
  author       = {Kenza Guenda and
                  Somphong Jitman and
                  T. Aaron Gulliver},
  title        = {Constructions of good entanglement-assisted quantum error correcting
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {121--136},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0330-z},
  doi          = {10.1007/S10623-017-0330-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuendaJG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HanLL18,
  author       = {Shuai Han and
                  Shengli Liu and
                  Lin Lyu},
  title        = {Super-strong {RKA} secure MAC, {PKE} and {SE} from tag-based hash
                  proof system},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1411--1449},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0404-y},
  doi          = {10.1007/S10623-017-0404-Y},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HanLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HanLQG18,
  author       = {Shuai Han and
                  Shengli Liu and
                  Baodong Qin and
                  Dawu Gu},
  title        = {Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {517--554},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0339-3},
  doi          = {10.1007/S10623-017-0339-3},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HanLQG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Harada18,
  author       = {Masaaki Harada},
  title        = {Binary extremal self-dual codes of length 60 and related codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1085--1094},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0380-2},
  doi          = {10.1007/S10623-017-0380-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Harada18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HeroldKM18,
  author       = {Gottfried Herold and
                  Elena Kirshanova and
                  Alexander May},
  title        = {On the asymptotic complexity of solving {LWE}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {55--83},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-016-0326-0},
  doi          = {10.1007/S10623-016-0326-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HeroldKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HodajKKT18,
  author       = {Jezerca Hodaj and
                  Melissa S. Keranen and
                  Donald L. Kreher and
                  Leah Tollefson},
  title        = {Some new Kirkman signal sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2183--2195},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0445-2},
  doi          = {10.1007/S10623-017-0445-2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HodajKKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Horlemann-Trautmann18,
  author       = {Anna{-}Lena Horlemann{-}Trautmann and
                  Kyle Marshall and
                  Joachim Rosenthal},
  title        = {Extension of Overbeck's attack for Gabidulin-based cryptosystems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {319--340},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0343-7},
  doi          = {10.1007/S10623-017-0343-7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Horlemann-Trautmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Horlemann-Trautmann18a,
  author       = {Anna{-}Lena Horlemann{-}Trautmann},
  title        = {Message encoding and retrieval for spread and cyclic orbit codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {365--386},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0377-x},
  doi          = {10.1007/S10623-017-0377-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Horlemann-Trautmann18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Hou18,
  author       = {Xiang{-}Dong Hou},
  title        = {Complexities of normal bases constructed from Gauss periods},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {893--905},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0368-y},
  doi          = {10.1007/S10623-017-0368-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Hou18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuY18,
  author       = {Chuangqiang Hu and
                  Shudi Yang},
  title        = {Multi-point codes over Kummer extensions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {211--230},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0335-7},
  doi          = {10.1007/S10623-017-0335-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuiR18,
  author       = {Alice M. W. Hui and
                  Bernardo Gabriel Rodrigues},
  title        = {Switched graphs of some strongly regular graphs related to the symplectic
                  graph},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {179--194},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0340-x},
  doi          = {10.1007/S10623-017-0340-X},
  timestamp    = {Fri, 16 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuiR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/IhringerM18,
  author       = {Ferdinand Ihringer and
                  Karen Meagher},
  title        = {Mikl{\'{o}}s-Manickam-Singhi conjectures on partial geometries},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1311--1327},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0397-6},
  doi          = {10.1007/S10623-017-0397-6},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/IhringerM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ji18,
  author       = {Lijun Ji},
  title        = {Group divisible designs with large block sizes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2255--2260},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0448-z},
  doi          = {10.1007/S10623-017-0448-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ji18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JohnsenV18,
  author       = {Trygve Johnsen and
                  Hugues Verdure},
  title        = {Flags of almost affine codes and the two-party wire-tap channel of
                  type {II}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {2075--2090},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0438-1},
  doi          = {10.1007/S10623-017-0438-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JohnsenV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JungnickelT18,
  author       = {Dieter Jungnickel and
                  Vladimir D. Tonchev},
  title        = {On Bonisoli's theorem and the block codes of Steiner triple systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {449--462},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0406-9},
  doi          = {10.1007/S10623-017-0406-9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JungnickelT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JungnickelZT18,
  author       = {Dieter Jungnickel and
                  Yue Zhou and
                  Vladimir D. Tonchev},
  title        = {Extension sets, affine designs, and Hamada's conjecture},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {587--610},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0344-6},
  doi          = {10.1007/S10623-017-0344-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JungnickelZT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KharaghaniS18,
  author       = {Hadi Kharaghani and
                  Sho Suda},
  title        = {Unbiased orthogonal designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1573--1588},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0414-9},
  doi          = {10.1007/S10623-017-0414-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KharaghaniS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KiermaierKW18,
  author       = {Michael Kiermaier and
                  Sascha Kurz and
                  Alfred Wassermann},
  title        = {The order of the automorphism group of a binary q -analog of the Fano
                  plane is at most two},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {239--250},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0360-6},
  doi          = {10.1007/S10623-017-0360-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KiermaierKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KiermaierLW18,
  author       = {Michael Kiermaier and
                  Reinhard Laue and
                  Alfred Wassermann},
  title        = {A new series of large sets of subspace designs over the binary field},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {251--268},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0349-1},
  doi          = {10.1007/S10623-017-0349-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KiermaierLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimSGA18,
  author       = {Jongkil Kim and
                  Willy Susilo and
                  Fuchun Guo and
                  Man Ho Au},
  title        = {Functional encryption for computational hiding in prime order groups
                  via pair encodings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {97--120},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0327-7},
  doi          = {10.1007/S10623-017-0327-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KimSGA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KogaMS18,
  author       = {Yoshitaka Koga and
                  Tatsuya Maruta and
                  Keisuke Shiromoto},
  title        = {On critical exponents of Dowling matroids},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1947--1962},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0431-8},
  doi          = {10.1007/S10623-017-0431-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KogaMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kositwattanarerk18,
  author       = {Wittawat Kositwattanarerk},
  title        = {Pseudocodeword-free criterion for codes with cycle-free Tanner graph},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2791--2805},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0476-3},
  doi          = {10.1007/S10623-018-0476-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kositwattanarerk18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LanCW18,
  author       = {Liantao Lan and
                  Yanxun Chang and
                  Lidong Wang},
  title        = {Constructions of cyclic quaternary constant-weight codes of weight
                  three and distance four},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1063--1083},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0379-8},
  doi          = {10.1007/S10623-017-0379-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LanCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Lee18,
  author       = {Jooyoung Lee},
  title        = {Key alternating ciphers based on involutions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {955--988},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0371-3},
  doi          = {10.1007/S10623-017-0371-3},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Lee18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeCL18,
  author       = {Chong{-}Dao Lee and
                  Yaotsu Chang and
                  Chia{-}an Liu},
  title        = {A construction of group divisible designs with block sizes 3 to 7},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1281--1293},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0395-8},
  doi          = {10.1007/S10623-017-0395-8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeLMM18,
  author       = {Jooyoung Lee and
                  Atul Luykx and
                  Bart Mennink and
                  Kazuhiko Minematsu},
  title        = {Connecting tweakable and multi-key blockcipher security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {623--640},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0347-3},
  doi          = {10.1007/S10623-017-0347-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeLMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeP18,
  author       = {Kwangsu Lee and
                  Seunghwan Park},
  title        = {Revocable hierarchical identity-based encryption with shorter private
                  keys and update keys},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2407--2440},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0453-2},
  doi          = {10.1007/S10623-017-0453-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Li18,
  author       = {Chengju Li},
  title        = {Hermitian {LCD} codes from cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2261--2278},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0447-0},
  doi          = {10.1007/S10623-017-0447-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Li18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiLDC18,
  author       = {Mingchao Li and
                  Miao Liang and
                  Beiliang Du and
                  Jingyuan Chen},
  title        = {A construction for optimal c-splitting authentication and secrecy
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1739--1755},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0421-x},
  doi          = {10.1007/S10623-017-0421-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiLDC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiQW18,
  author       = {Kangquan Li and
                  Longjiang Qu and
                  Qiang Wang},
  title        = {New constructions of permutation polynomials of the form x\({}^{\mbox{r}}\)
                  h(x \({}^{\mbox{q - 1}}\)) over {\(\mathbb{F}\)}\({}_{\mbox{q\({}^{\mbox{2}}\)}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2379--2405},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0452-3},
  doi          = {10.1007/S10623-017-0452-3},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiQW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiY18,
  author       = {Fengwei Li and
                  Qin Yue},
  title        = {The primitive idempotents and weight distributions of irreducible
                  constacyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {771--784},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0356-2},
  doi          = {10.1007/S10623-017-0356-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiZF18,
  author       = {Jin Li and
                  Aixian Zhang and
                  Keqin Feng},
  title        = {Linear codes over F\({}_{\mbox{q}}\)[x]/(x\({}^{\mbox{2}}\)) and GR(p\({}^{\mbox{2}}\),
                  m) reaching the Griesmer bound},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2837--2855},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0479-0},
  doi          = {10.1007/S10623-018-0479-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiZF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiangZ18,
  author       = {Hongxue Liang and
                  Shenglin Zhou},
  title        = {Flag-transitive point-primitive automorphism groups of non-symmetric
                  2-(v, k, 3) designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1757--1766},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0422-9},
  doi          = {10.1007/S10623-017-0422-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiangZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiebholdNV18,
  author       = {Dirk Liebhold and
                  Gabriele Nebe and
                  {\'{A}}ngeles V{\'{a}}zquez{-}Castro},
  title        = {Network coding with flags},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {269--284},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0361-5},
  doi          = {10.1007/S10623-017-0361-5},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiebholdNV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LimniotisK18,
  author       = {Konstantinos Limniotis and
                  Nicholas Kolokotronis},
  title        = {Boolean functions with maximum algebraic immunity: further extensions
                  of the Carlet-Feng construction},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1685--1706},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0418-5},
  doi          = {10.1007/S10623-017-0418-5},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LimniotisK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LinPLZ18,
  author       = {Zhiqiang Lin and
                  Dingyi Pei and
                  Dongdai Lin and
                  Xiaolei Zhang},
  title        = {Fast construction of binary ring FCSRs for hardware stream ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {939--953},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0370-4},
  doi          = {10.1007/S10623-017-0370-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LinPLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LinW18,
  author       = {Li Lin and
                  Wenling Wu},
  title        = {Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256
                  and Kalyna-256/512},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {721--741},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0353-5},
  doi          = {10.1007/S10623-017-0353-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LinW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuJKW18,
  author       = {Jia Liu and
                  Tibor Jager and
                  Saqib A. Kakvi and
                  Bogdan Warinschi},
  title        = {How to build time-lock encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2549--2586},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0461-x},
  doi          = {10.1007/S10623-018-0461-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuJKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuKC18,
  author       = {Weihua Liu and
                  Andrew Klapper and
                  Zhixiong Chen},
  title        = {Solving the {FCSR} synthesis problem for multi-sequences by lattice
                  basis reduction},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1023--1038},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0375-z},
  doi          = {10.1007/S10623-017-0375-Z},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuRL18,
  author       = {Yunwen Liu and
                  Vincent Rijmen and
                  Gregor Leander},
  title        = {Nonlinear diffusion layers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2469--2484},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0458-5},
  doi          = {10.1007/S10623-018-0458-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuRL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LuNC18,
  author       = {Xiaojuan Lu and
                  Xiaolei Niu and
                  Haitao Cao},
  title        = {Some results on generalized strong external difference families},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2857--2868},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0481-6},
  doi          = {10.1007/S10623-018-0481-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LuNC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Merai18,
  author       = {L{\'{a}}szl{\'{o}} M{\'{e}}rai},
  title        = {On the elliptic curve endomorphism generator},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1113--1129},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0382-0},
  doi          = {10.1007/S10623-017-0382-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Merai18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MesnagerOS18,
  author       = {Sihem Mesnager and
                  Ferruh {\"{O}}zbudak and
                  Ahmet Sinak},
  title        = {On the p-ary (cubic) bent and plateaued (vectorial) functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1865--1892},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0427-4},
  doi          = {10.1007/S10623-017-0427-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MesnagerOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MogilnykhS18,
  author       = {Ivan Yu. Mogilnykh and
                  Faina I. Solov'eva},
  title        = {On explicit minimum weight bases for extended cyclic codes related
                  to Gold functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2619--2627},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0464-7},
  doi          = {10.1007/S10623-018-0464-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MogilnykhS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MoralesT18,
  author       = {John Vincent S. Morales and
                  Hajime Tanaka},
  title        = {An Assmus-Mattson theorem for codes over commutative association schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1039--1062},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0376-y},
  doi          = {10.1007/S10623-017-0376-Y},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MoralesT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MoreiraFK18,
  author       = {Jos{\'{e}} Moreira and
                  Marcel Fern{\'{a}}ndez and
                  Grigory Kabatiansky},
  title        = {Constructions of almost secure frameproof codes with applications
                  to fingerprinting schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {785--802},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0359-z},
  doi          = {10.1007/S10623-017-0359-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MoreiraFK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NeriHRR18,
  author       = {Alessandro Neri and
                  Anna{-}Lena Horlemann{-}Trautmann and
                  Tovohery Randrianarisoa and
                  Joachim Rosenthal},
  title        = {On the genericity of maximum rank distance and Gabidulin codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {341--363},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0354-4},
  doi          = {10.1007/S10623-017-0354-4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/NeriHRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Olmez18,
  author       = {Oktay Olmez},
  title        = {A link between combinatorial designs and three-weight linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {817--833},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0363-3},
  doi          = {10.1007/S10623-017-0363-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Olmez18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OrhonH18,
  author       = {Neriman Gamze Orhon and
                  H{\"{u}}seyin Hisil},
  title        = {Speeding up Huff form of elliptic curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2807--2823},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0475-4},
  doi          = {10.1007/S10623-018-0475-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OrhonH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OtmaniKN18,
  author       = {Ayoub Otmani and
                  Herv{\'{e}} Tal{\'{e}} Kalachi and
                  S{\'{e}}lestin Ndjeya},
  title        = {Improved cryptanalysis of rank metric schemes based on Gabidulin codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1983--1996},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0434-5},
  doi          = {10.1007/S10623-017-0434-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OtmaniKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PaulR18,
  author       = {Goutam Paul and
                  Souvik Ray},
  title        = {On data complexity of distinguishing attacks versus message recovery
                  attacks on stream ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1211--1247},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0391-z},
  doi          = {10.1007/S10623-017-0391-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/PaulR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PineroS18,
  author       = {Fernando L. Pi{\~{n}}ero and
                  Prasant Singh},
  title        = {A note on the weight spectrum of the Schubert code C\({}_{\mbox{{\(\alpha\)}}}\)(2,
                  m)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2825--2836},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0477-2},
  doi          = {10.1007/S10623-018-0477-2},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PineroS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Polak18,
  author       = {Sven C. Polak},
  title        = {New nonbinary code bounds based on divisibility arguments},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {861--874},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0366-0},
  doi          = {10.1007/S10623-017-0366-0},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Polak18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/QianZ18,
  author       = {Jianfa Qian and
                  Lina Zhang},
  title        = {On {MDS} linear complementary dual codes and entanglement-assisted
                  quantum codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1565--1572},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0413-x},
  doi          = {10.1007/S10623-017-0413-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/QianZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ravagnani18,
  author       = {Alberto Ravagnani},
  title        = {Duality of codes supported on regular lattices, with an application
                  to enumerative combinatorics},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {2035--2063},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0436-3},
  doi          = {10.1007/S10623-017-0436-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ravagnani18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RavivYM18,
  author       = {Netanel Raviv and
                  Eitan Yaakobi and
                  Muriel M{\'{e}}dard},
  title        = {Coding for locality in reconstructing permutations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {387--418},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0378-9},
  doi          = {10.1007/S10623-017-0378-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RavivYM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RifaS18,
  author       = {Josep Rif{\`{a}} and
                  Emilio Su{\'{a}}rez{-}Canedo},
  title        = {Hadamard full propelinear codes of type Q; rank and kernel},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1905--1921},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0429-2},
  doi          = {10.1007/S10623-017-0429-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RifaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ryabko18,
  author       = {Boris Ryabko},
  title        = {Properties of two Shannon's ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {989--995},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0372-2},
  doi          = {10.1007/S10623-017-0372-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ryabko18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Schmidt18,
  author       = {Kai{-}Uwe Schmidt},
  title        = {Hermitian rank distance codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1469--1481},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0407-8},
  doi          = {10.1007/S10623-017-0407-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Schmidt18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SchmidtZ18,
  author       = {Kai{-}Uwe Schmidt and
                  Yue Zhou},
  title        = {On the number of inequivalent Gabidulin codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1973--1982},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0433-6},
  doi          = {10.1007/S10623-017-0433-6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SchmidtZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShangguanMG18,
  author       = {Chong Shangguan and
                  Jingxue Ma and
                  Gennian Ge},
  title        = {New upper bounds for parent-identifying codes and traceability codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1727--1737},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0420-y},
  doi          = {10.1007/S10623-017-0420-Y},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShangguanMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiQS18,
  author       = {Minjia Shi and
                  Liqin Qian and
                  Patrick Sol{\'{e}}},
  title        = {On self-dual negacirculant codes of index two and four},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2485--2494},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0455-0},
  doi          = {10.1007/S10623-017-0455-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiQS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiSAS18,
  author       = {Minjia Shi and
                  Zahra Sepasdar and
                  Adel Alahmadi and
                  Patrick Sol{\'{e}}},
  title        = {On two-weight Z\({}_{\mbox{2\({}^{\mbox{k}}\)}}\) -codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1201--1209},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0390-0},
  doi          = {10.1007/S10623-017-0390-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiSAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShuaiL18,
  author       = {Shuai Li and
                  Li Miao},
  title        = {A method to calculate differential uniformity for permutations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1553--1563},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0412-y},
  doi          = {10.1007/S10623-017-0412-Y},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShuaiL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SilbersteinZ18,
  author       = {Natalia Silberstein and
                  Alexander Zeh},
  title        = {Anticode-based locally repairable codes with high availability},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {419--445},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0358-0},
  doi          = {10.1007/S10623-017-0358-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SilbersteinZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/StinsonW18,
  author       = {Douglas R. Stinson and
                  Ruizhong Wei},
  title        = {Combinatorial repairability for threshold schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {195--210},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0336-6},
  doi          = {10.1007/S10623-017-0336-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/StinsonW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SuYF18,
  author       = {Wei Su and
                  Yang Yang and
                  Cuiling Fan},
  title        = {New optimal binary sequences with period 4p via interleaving Ding-Helleseth-Lam
                  sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1329--1338},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0398-5},
  doi          = {10.1007/S10623-017-0398-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SuYF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SudhaS18,
  author       = {Irrinki Gnana Sudha and
                  R. S. Selvaraj},
  title        = {Codes with a pomset metric and constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {875--892},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0367-z},
  doi          = {10.1007/S10623-017-0367-Z},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SudhaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SunCW18,
  author       = {Ling Sun and
                  Huaifeng Chen and
                  Meiqin Wang},
  title        = {Zero-correlation attacks: statistical models independent of the number
                  of approximations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1923--1945},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0430-9},
  doi          = {10.1007/S10623-017-0430-9},
  timestamp    = {Tue, 07 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/SunCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Tan18,
  author       = {Ming Ming Tan},
  title        = {Group invariant weighing matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2677--2702},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0466-5},
  doi          = {10.1007/S10623-018-0466-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Tan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TianLWY18,
  author       = {Song Tian and
                  Bao Li and
                  Kunpeng Wang and
                  Wei Yu},
  title        = {Cover attacks for elliptic curves with cofactor two},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2451--2468},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0457-6},
  doi          = {10.1007/S10623-018-0457-6},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TianLWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Torres-JimenezI18,
  author       = {Jose Torres{-}Jimenez and
                  Idelfonso Izquierdo{-}Marquez},
  title        = {Covering arrays of strength three from extended permutation vectors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2629--2643},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0465-6},
  doi          = {10.1007/S10623-018-0465-6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Torres-JimenezI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Trung18,
  author       = {Tran van Trung},
  title        = {A recursive construction for simple t-designs using resolutions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1185--1200},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0389-6},
  doi          = {10.1007/S10623-017-0389-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Trung18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Vega18,
  author       = {Gerardo Vega},
  title        = {A correction on the determination of the weight enumerator polynomial
                  of some irreducible cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {835--840},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0364-2},
  doi          = {10.1007/S10623-017-0364-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Vega18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangHL18,
  author       = {SenPeng Wang and
                  Bin Hu and
                  Yan Liu},
  title        = {The autocorrelation properties of single cycle polynomial T-functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1527--1540},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0410-0},
  doi          = {10.1007/S10623-017-0410-0},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangJ18,
  author       = {Qian Wang and
                  Chenhui Jin},
  title        = {Upper bound of the length of truncated impossible differentials for
                  {AES}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1541--1552},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0411-z},
  doi          = {10.1007/S10623-017-0411-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangTP18,
  author       = {Qichun Wang and
                  Chik How Tan and
                  Theo Fanuela Prabowo},
  title        = {On the covering radius of the third order Reed-Muller code RM(3, 7)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {151--159},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0329-5},
  doi          = {10.1007/S10623-017-0329-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangTP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WatanabeS18,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  title        = {Timed-release computational secret sharing and threshold encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {17--54},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-016-0324-2},
  doi          = {10.1007/S10623-016-0324-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WatanabeS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WenLH18,
  author       = {Yunhua Wen and
                  Shengli Liu and
                  Shuai Han},
  title        = {Reusable fuzzy extractor from the decisional Diffie-Hellman assumption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2495--2512},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0459-4},
  doi          = {10.1007/S10623-018-0459-4},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WenLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WenYFF18,
  author       = {Jiejing Wen and
                  Minghui Yang and
                  Fang{-}Wei Fu and
                  Keqin Feng},
  title        = {Cyclotomic construction of strong external difference families in
                  finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1149--1159},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0384-y},
  doi          = {10.1007/S10623-017-0384-Y},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WenYFF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/X18,
  title        = {Editor's note},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {447},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0467-4},
  doi          = {10.1007/S10623-018-0467-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/X18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XiaoZLH18,
  author       = {Zibi Xiao and
                  Xiangyong Zeng and
                  Chunlei Li and
                  Tor Helleseth},
  title        = {New generalized cyclotomic binary sequences of period p\({}^{\mbox{2}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1483--1497},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0408-7},
  doi          = {10.1007/S10623-017-0408-7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/XiaoZLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XiongYY18,
  author       = {Maosheng Xiong and
                  Haode Yan and
                  Pingzhi Yuan},
  title        = {On a conjecture of differentially 8-uniform power functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1601--1621},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0416-7},
  doi          = {10.1007/S10623-017-0416-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XiongYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuLZH18,
  author       = {Xiaofang Xu and
                  Chunlei Li and
                  Xiangyong Zeng and
                  Tor Helleseth},
  title        = {Constructions of complete permutation polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2869--2892},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0480-7},
  doi          = {10.1007/S10623-018-0480-7},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/XuLZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuSHHP18,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu and
                  Zhangjie Huang and
                  Liqiang Peng},
  title        = {Solving a class of modular polynomial equations and its relation to
                  modular inversion hidden number problem and inversive congruential
                  generator},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1997--2033},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0435-4},
  doi          = {10.1007/S10623-017-0435-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XuSHHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YoshidaO18,
  author       = {Maki Yoshida and
                  Satoshi Obana},
  title        = {On the (in)efficiency of non-interactive secure multiparty computation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1793--1805},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0424-7},
  doi          = {10.1007/S10623-017-0424-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YoshidaO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhanZ18,
  author       = {Xiaoqin Zhan and
                  Shenglin Zhou},
  title        = {Non-symmetric 2-designs admitting a two-dimensional projective linear
                  group},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2765--2773},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0474-5},
  doi          = {10.1007/S10623-018-0474-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhanZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangCGGM18,
  author       = {Jie Zhang and
                  Jie Chen and
                  Junqing Gong and
                  Aijun Ge and
                  Chuangui Ma},
  title        = {Leakage-resilient attribute based encryption in prime-order groups
                  via predicate encodings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1339--1366},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0399-4},
  doi          = {10.1007/S10623-017-0399-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangCGGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangG18,
  author       = {Tao Zhang and
                  Gennian Ge},
  title        = {Combinatorial constructions of packings in Grassmannian spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {803--815},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0362-4},
  doi          = {10.1007/S10623-017-0362-4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangYS18,
  author       = {Hui Zhang and
                  Eitan Yaakobi and
                  Natalia Silberstein},
  title        = {Multiset combinatorial batch codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2645--2660},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0468-3},
  doi          = {10.1007/S10623-018-0468-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangZ18,
  author       = {Zhilin Zhang and
                  Shenglin Zhou},
  title        = {Flag-transitive point-quasiprimitive 2-(v, k, 2) designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1963--1971},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0432-7},
  doi          = {10.1007/S10623-017-0432-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoTQ18,
  author       = {Xiao{-}Xin Zhao and
                  Tian Tian and
                  Wen{-}Feng Qi},
  title        = {A ring-like cascade connection and a class of NFSRs with the same
                  cycle structures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2775--2790},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0473-6},
  doi          = {10.1007/S10623-018-0473-6},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoTQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhengB18,
  author       = {Dabin Zheng and
                  Jingjun Bao},
  title        = {Four classes of linear codes from cyclotomic cosets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1007--1022},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0374-0},
  doi          = {10.1007/S10623-017-0374-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhengB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Zhou18,
  author       = {Zhengchun Zhou},
  title        = {Three-weight ternary linear codes from a family of cyclic difference
                  sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2513--2523},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0454-1},
  doi          = {10.1007/S10623-017-0454-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Zhou18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhuSL18,
  author       = {Shixin Zhu and
                  Zhonghua Sun and
                  Ping Li},
  title        = {A class of negacyclic {BCH} codes and its application to quantum codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2139--2165},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0441-6},
  doi          = {10.1007/S10623-017-0441-6},
  timestamp    = {Wed, 11 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhuSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AbdollahiDJ17,
  author       = {Alireza Abdollahi and
                  Edwin R. van Dam and
                  Mojtaba Jazaeri},
  title        = {Distance-regular Cayley graphs with least eigenvalue -2},
  journal      = {Des. Codes Cryptogr.},
  volume       = {84},
  number       = {1-2},
  pages        = {73--85},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0209-4},
  doi          = {10.1007/S10623-016-0209-4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AbdollahiDJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AgugliaG17,
  author       = {Angela Aguglia and
                  Luca Giuzzi},
  title        = {Intersection sets, three-character multisets and associated codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {83},
  number       = {2},
  pages        = {269--282},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0302-8},
  doi          = {10.1007/S10623-016-0302-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AgugliaG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AhnKL17,
  author       = {Jaehyun Ahn and
                  Dongseok Ka and
                  Chengju Li},
  title        = {Complete weight enumerators of a class of linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {83},
  number       = {1},
  pages        = {83--99},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0205-8},
  doi          = {10.1007/S10623-016-0205-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AhnKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlamelouBCG17,
  author       = {Quentin Alam{\'{e}}lou and
                  Olivier Blazy and
                  St{\'{e}}phane Cauchie and
                  Philippe Gaborit},
  title        = {A code-based group signature scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {1-2},
  pages        = {469--493},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0276-6},
  doi          = {10.1007/S10623-016-0276-6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AlamelouBCG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlhakimN17,
  author       = {Abbas Alhakim and
                  Maher Nouiehed},
  title        = {Stretching de Bruijn sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {381--394},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0314-4},
  doi          = {10.1007/S10623-016-0314-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlhakimN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics