default search action
Advances in Mathematics of Communications, Volume 17
Volume 17, Number 1, 2023
- Daniele Bartoli, Martino Borello, Anna-Lena Horlemann:
Preface. i - Gianira N. Alfarano, Anina Gruica, Julia Lieb, Joachim Rosenthal:
Convolutional codes over finite chain rings, MDP codes and their characterization. 1-22 - Alessandro Barenghi, Jean-François Biasse, Edoardo Persichetti, Paolo Santini:
On the computational hardness of the code equivalence problem in cryptography. 23-55 - Daniele Bartoli, Lins Denaux:
Minimal codewords arising from the incidence of points and hyperplanes in projective spaces. 56-77 - René Bødker Christensen, Carlos Munuera, Francisco Revson Fernandes Pereira, Diego Ruano:
An algorithmic approach to entanglement-assisted quantum error-correcting codes from the Hermitian curve. 78-97 - Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco:
Upper bounds on the length function for covering codes with covering radius $ R $ and codimension $ tR+1 $. 98-118 - Heide Gluesing-Luerssen, Hunter Lehmann:
Automorphism groups and isometries for cyclic orbit codes. 119-138 - Keita Ishizuka, Ken Saito:
Construction for both self-dual codes and LCD codes. 139-151 - Sascha Kurz:
The interplay of different metrics for the construction of constant dimension codes. 152-171 - Sascha Kurz, Ivan N. Landjev, Assia Rousseva:
Classification of $ \mathbf{(3 \!\mod 5)} $ arcs in $ \mathbf{ \operatorname{PG}(3,5)} $. 172-206 - Tung Le, Bernardo Gabriel Rodrigues:
On some codes from rank 3 primitive actions of the simple Chevalley group $ G_2(q) $. 207-226 - Vito Napolitano, Olga Polverino, Paolo Santonastaso, Ferdinando Zullo:
Two pointsets in $ \mathrm{PG}(2,q^n) $ and the associated codes. 227-245 - Om Prakash, Shikha Yadav, Habibul Islam, Patrick Solé:
On $ \mathbb{Z}_4\mathbb{Z}_4[u^3] $-additive constacyclic codes. 246-261 - Rakhi Pratihar, Tovohery Hajatiana Randrianarisoa:
Constructions of optimal rank-metric codes from automorphisms of rational function fields. 262-287 - Padmapani Seneviratne, Martianus Frederic Ezerman:
New quantum codes from metacirculant graphs via self-dual additive $\mathbb{F}_4$-codes. 288-297
Volume 17, Number 2, 2023
- Ravi Anand, Dibyendu Roy, Santanu Sarkar:
Some results on lightweight stream ciphers Fountain v1 & Lizard. 298-319 - Vito Napolitano, Ferdinando Zullo:
Codes with few weights arising from linear sets. 320-332 - Romar dela Cruz, Michael Kiermaier, Sascha Kurz, Alfred Wassermann:
On the minimum number of minimal codewords. 333-341 - Wenli Ren, Feng Wang:
A new class of optimal wide-gap one-coincidence frequency-hopping sequence sets. 342-352 - Terry Shue Chien Lau, Chik How Tan:
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems. 353-366 - Jong Yoon Hyun, Yoonjin Lee, Yansheng Wu:
Connection of $ p $-ary $ t $-weight linear codes to Ramanujan Cayley graphs with $ t+1 $ eigenvalues. 367-380 - Liqin Qian, Xiwang Cao:
Character sums over a non-chain ring and their applications. 381-403 - Raj Kumar, Maheshanand Bhaintwal:
Duadic codes over $ \mathbb{Z}_4+u\mathbb{Z}_4 $. 404-417 - Qian Liu:
The lower bounds on the second-order nonlinearity of three classes of Boolean functions. 418-430 - Kai Cai, Guangyue Han:
An optimization approach to the Langberg-Médard multiple unicast conjecture. 431-445 - Ricardo A. Podestá, Denis E. Videla:
The weight distribution of irreducible cyclic codes associated with decomposable generalized Paley graphs. 446-464 - Emily McMillon, Allison Beemer, Christine A. Kelley:
Extremal absorbing sets in low-density parity-check codes. 465-483 - Palash Sarkar, Subhadip Singha:
Classical reduction of gap SVP to LWE: A concrete security analysis. 484-499 - Chiara Spadafora, Riccardo Longo, Massimiliano Sala:
A coercion-resistant blockchain-based E-voting protocol with receipts. 500-521
Volume 17, Number 3, 2023
- Takao Komatsu, Bijan Kumar Patel, Claudio Pita-Ruiz:
Several formulas for Bernoulli numbers and polynomials. 522-535 - Antonio Cossidente, Sascha Kurz, Giuseppe Marino, Francesco Pavese:
Combining subspace codes. 536-550 - Huaning Liu, Xi Liu:
On the correlation measures of orders $ 3 $ and $ 4 $ of binary sequence of period $ p^2 $ derived from Fermat quotients. 551-561 - Roberto Civino, Riccardo Longo:
Formal security proof for a scheme on a topological network. 562-571 - Büsra Özden, Oguz Yayla:
Partial direct product difference sets and almost quaternary sequences. 572-588 - Thomas W. Cusick, Younhwan Cheon:
The weight recursions for the 2-rotation symmetric quartic Boolean functions. 589-604 - Kailu Yang, Xiaomiao Wang, Menglong Zhang, Lidong Wang:
Some progress on optimal $ 2 $-D $ (n\times m,3,2,1) $-optical orthogonal codes. 605-625 - Nupur Patanker, Sanjay Kumar Singh:
Generalized Hamming weights of toric codes over hypersimplices and squarefree affine evaluation codes. 626-643 - Xinmei Huang, Qin Yue, Yansheng Wu, Xiaoping Shi:
Ternary Primitive LCD BCH codes. 644-659 - Constanza Riera, Matthew Geoffrey Parker, Pantelimon Stanica:
Quantum states associated to mixed graphs and their algebraic characterization. 660-680 - Sumit Kumar Debnath, Tanmay Choudhury, Pantelimon Stanica, Kunal Dey, Nibedita Kundu:
Delegating signing rights in a multivariate proxy signature scheme. 681-696 - Reza Kaboli, Shahram Khazaei, Maghsoud Parviz:
On ideal and weakly-ideal access structures. 697-713 - María Chara, Ricardo A. Podestá, Ricardo Toledano:
The conorm code of an AG-code. 714-732 - Lin Yi, Xiangyong Zeng, Zhimin Sun, Shasha Zhang:
On the linear complexity and autocorrelation of generalized cyclotomic binary sequences with period $ 4p^n $. 733-756
Volume 17, Number 4, 2023
- Rui Zhang, Sihong Su:
A new construction of weightwise perfectly balanced Boolean functions. 757-770 - Debrup Chakraborty, Avijit Dutta, Samir Kundu:
Designing tweakable enciphering schemes using public permutations. 771-798 - Minjia Shi, Liqin Qian, Tor Helleseth, Patrick Solé:
Five-weight codes from three-valued correlation of M-sequences. 799-814 - Can Xiang, Jinquan Luo:
Some subfield codes from MDS codes. 815-827 - Simeon Ball, Guillermo Gamboa, Michel Lavrauw:
On additive MDS codes over small fields. 828-844 - Shi Wang, Yongqiang Li, Shizhu Tian, Xiangyong Zeng:
Four by four MDS matrices with the fewest XOR gates based on words. 845-872 - Bei Wang, Yi Ouyang, Songsong Li, Honggang Hu:
A new twofold Cornacchia-type algorithm and its applications. 873-887 - Ghislain Fourier, Gabriele Nebe:
Degenerate flag varieties in network coding. 888-899 - Ram Krishna Verma, Om Prakash, Ashutosh Singh, Habibul Islam:
New quantum codes from skew constacyclic codes. 900-919 - Alar Leibak:
On the number of factorizations of $ t $ mod $ N $ and the probability distribution of Diffie-Hellman secret keys for many users. 920-927 - Marco Buratti, Dieter Jungnickel:
Partitioned difference families: The storm has not yet passed. 928-934 - Julia Lieb, Raquel Pinto:
A decoding algorithm for 2D convolutional codes over the erasure channel. 935-959 - Johan Chrisnata, Han Mao Kiah, Sankeerth Rao Karingula, Alexander Vardy, Eitan Yaakobi, Hanwen Yao:
On the number of distinct k-decks: Enumeration and bounds. 960-978 - Yan Liu, Xiwang Cao, Wei Lu:
Two classes of new optimal ternary cyclic codes. 979-993 - Adrian Korban, Serap Sahinkaya, Deniz Ustun:
New type i binary [72, 36, 12] self-dual codes from composite matrices and R1 lifts. 994-1011
Volume 17, Number 5, 2023
- Claude Carlet:
Revisiting some results on APN and algebraic immune functions. 1012-1026 - Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah, Alexander Vardy:
Domination mappings into the hamming ball: Existence, constructions, and algorithms. 1027-1059 - Liqun Yao, Wenli Ren, Yong Wang, Chunming Tang:
Z-complementary pairs with flexible lengths and large zero odd-periodic correlation zones. 1060-1071 - Huaning Liu, Yixin Ren:
On the pseudorandom properties of $ k $-ary Sidel'nikov sequences. 1072-1085 - Joe Gildea, Abidin Kaya, Adam Michael Roberts, Rhian Taylor, Alexander Tylyshchak:
New self-dual codes from $ 2 \times 2 $ block circulant matrices, group rings and neighbours of neighbours. 1086-1100 - Delaram Kahrobaei, Mima Stanojkovski:
Cryptographic multilinear maps using pro-p groups. 1101-1114 - Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco:
On the weight distribution of the cosets of MDS codes. 1115-1138 - Jinmei Fan, Yanhai Zhang:
Optimal quinary negacyclic codes with minimum distance four. 1139-1153 - Tingting Wu, Shixin Zhu, Li Liu, Lanqiang Li:
Repeated-root constacyclic codes of length 6lmpn. 1154-1180 - Angelot Behajaina:
On BCH split metacyclic codes. 1181-1195 - Jie Geng, Huazhang Wu, Patrick Solé:
On one-lee weight and two-lee weight $ \mathbb{Z}_2\mathbb{Z}_4[u] $ additive codes and their constructions. 1196-1209 - John B. Baena, Daniel Cabarcas, Javier A. Verbel:
On the complexity of solving generic overdetermined bilinear systems. 1210-1234 - Kanat S. Abdukhalikov, Duy Ho:
Vandermonde sets, hyperovals and Niho bent functions. 1235-1250 - Carla Mascia, Massimiliano Sala, Irene Villa:
A survey on functional encryption. 1251-1289 - Ting Yao, Heqian Xu, Yongsheng Tang, Shixin Zhu:
Asymptotically good $ \mathbb{Z}_{p}\mathbb{Z}_{p}[u]/\langle u^{t}\rangle $-additive cyclic codes. 1290-1301
Volume 17, Number 6, 2023
- Vikas Srivastava, Sumit Kumar Debnath, Pantelimon Stanica, Saibal Kumar Pal:
A multivariate identity-based broadcast encryption with applications to the internet of things. 1302-1313 - Guangzhou Chen, Xiaotong Zhang:
Constructions of irredundant orthogonal arrays. 1314-1337 - Toshiharu Sawashima, Tatsuya Maruta:
Nonexistence of some ternary linear codes with minimum weight -2 modulo 9. 1338-1357 - Yu-Chi Chen:
Security analysis of public key encryption with filtered equality test. 1358-1363 - Maura B. Paterson, Douglas R. Stinson:
Splitting authentication codes with perfect secrecy: New results, constructions and connections with algebraic manipulation detection codes. 1364-1387 - Jean-François Biasse, Muhammed Rashad Erukulangara:
A proof of the conjectured run time of the Hafner-McCurley class group algorithm. 1388-1405 - Yasemin Cengellenmis, Abdullah Dertli, Steven T. Dougherty, Adrian Korban, Serap Sahinkaya, Deniz Ustun:
Reversible $ G $-codes over the ring $ {\mathcal{F}}_{j,k} $ with applications to DNA codes. 1406-1421 - Stefano Barbero, Emanuele Bellini, Rusydi H. Makarim:
Rotational analysis of ChaCha permutation. 1422-1439 - Xiang Wang, Wenjuan Yin:
New nonexistence results on perfect permutation codes under the hamming metric. 1440-1452 - Ziteng Huang, Weijun Fang, Fang-Wei Fu, Fengting Li:
Generic constructions of MDS Euclidean self-dual codes via GRS codes. 1453-1467 - Zhen Li, Haode Yan:
Differential spectra of a class of power permutations with Niho exponents. 1468-1475 - Upendra Kapshikar, Ayan Mahalanobis:
Niederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier sampling. 1476-1492 - Zhen Li, Cuiling Fan, Wei Su, Yanfeng Qi:
Aperiodic/periodic complementary sequence pairs over quaternions. 1493-1506 - Claude Carlet, Stjepan Picek:
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials. 1507-1525 - Gang Wang, Deng-Ming Xu, Fang-Wei Fu:
Constructions of asymptotically optimal codebooks with respect to Welch bound and Levenshtein bound. 1526-1541
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.