Issue 11/2024
Content (23 Articles)
Indicator functions, v-numbers and Gorenstein rings in the theory of projective Reed–Muller-type codes
Manuel González-Sarabia, Humberto Muñoz-George, Jorge A. Ordaz, Eduardo Sáenz-de-Cabezón, Rafael H. Villarreal
External codes for multiple unicast networks via interference alignment
- Open Access
F. R. Kschischang, F. Manganiello, A. Ravagnani, K. Savary
An asymptotic property of quaternary additive codes
Jürgen Bierbrauer, Stefano Marcugini, Fernanda Pambianco
Circular external difference families: construction and non-existence
Huawei Wu, Jing Yang, Keqin Feng
Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers
Isaac A. Canales-Martínez, Igor Semaev
Finding orientations of supersingular elliptic curves and quaternion orders
- Open Access
Sarah Arpin, James Clements, Pierrick Dartois, Jonathan Komada Eriksen, Péter Kutas, Benjamin Wesolowski
RETRACTED ARTICLE: Constructions for t-designs and s-resolvable t-designs
- Open Access
Tran van Trung
Security analysis of the ISO standard -
- Open Access
Woohyuk Chung, Hwigyeom Kim, Jooyoung Lee, Yeongmin Lee
Some self-dual codes and isodual codes constructed by matrix product codes
Xu Pan, Hao Chen, Hongwei Liu
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist
- Open Access
Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, Ling Qin
Curve-lifted codes for local recovery using lines
- Open Access
Gretchen L. Matthews, Travis Morrison, Aidan W. Murphy
Non-canonical maximum cliques without a design structure in the block graphs of 2-designs
Sergey Goryainov, Elena V. Konstantinova
eSTARK: extending STARKs with arguments
- Open Access
Héctor Masip-Ardevol, Jordi Baylina-Melé, Marc Guzmán-Albiol, Jose Luis Muñoz-Tapia
New and improved formally self-dual codes with small hulls from polynomial four Toeplitz codes
Yang Li, Shitao Li, Shixin Zhu
Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes
Bolin Wang, Wenling Wu
MDS array codes with efficient repair and small sub-packetization level
Lei Li, Xinchun Yu, Chenhao Ying, Liang Chen, Yuanyuan Dong, Yuan Luo
Utilizing FWT in linear cryptanalysis of block ciphers with various structures
Yin Lv, Danping Shi, Lei Hu, Yi Guo
Cryptanalysis of a key exchange protocol based on a modified tropical structure
Huawei Huang, Changgen Peng, Lunzhi Deng