Issue 3/2025
Content (16 Articles)
Breaking the power-of-two barrier: noise estimation for BGV in NTT-friendly rings
Andrea Di Giusto, Chiara Marcolla
Almost tight security in lattices with polynomial moduli—PRF, IBE, all-but-many LTF, and more
Zhedong Wang, Qiqi Lai, Feng-Hao Liu
Quantum rectangle attack and its application on Deoxys-BC
Yin-Song Xu, Yi-Bo Luo, Zheng Yuan, Xuan Zhou, Qi-di You, Fei Gao, Xiao-Yang Dong
Factorization and irreducibility of composed products
- Open Access
Lukas Kölsch, Lucas Krompholz, Gohar Kyureghyan
Derivative descendants of cyclic codes and constacyclic codes
Li Xu, Cuiling Fan, Chunming Tang, Zhengchun Zhou
Codes over and and theta series of the corresponding lattices in quadratic fields
- Open Access
Josline Freed
Quantum security of Trojan message attacks on Merkle–Damgård hash construction
Ying Xu, Xiaoni Du, Jian Zou
Several new classes of optimal ternary cyclic codes with two or three zeros
Gaofei Wu, Zhuohui You, Zhengbang Zha, Yuqing Zhang
Guessing less and better: improved attacks on GIFT-64
- Open Access
Federico Canale, María Naya-Plasencia
Correction: Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions
- Correction
Bingsheng Shen, Tao Yu, Zhengchun Zhou, Yang Yang