Issue 6/2025
Content (34 Articles)
Further investigation on differential properties of the generalized Ness–Helleseth function
Yongbo Xia, Chunlei Li, Furong Bao, Shaoping Chen, Tor Helleseth
The support designs of several families of lifted linear codes
Cunsheng Ding, Zhonghua Sun, Qianqian Yan
Quantum sieving for code-based cryptanalysis and its limitations for ISD
Lynn Engelberts, Simona Etinski, Johanna Loyer
Somewhat homomorphic encryption based on random codes
Carlos Aguilar-Melchor, Victor Dyseryn, Philippe Gaborit
Ternary isodual codes and 3-designs
Minjia Shi, Ruowen Liu, Dean Crnković, Patrick Solé, Andrea Švob
Additive twisted codes: new distance bounds and infinite families of quantum codes
Reza Dastbasteh, Petr Lisoněk
Rate-improved multi-permutation codes for correcting a single burst of stable deletions
Xiang Wang, Fang-Wei Fu
Blocking sets of secant and tangent lines with respect to a quadric of
Bart De Bruyn, Puspendu Pradhan, Binod Kumar Sahoo
Symmetric (15, 8, 4)-designs in terms of the geometry of binary simplex codes of dimension 4
Mark Pankov, Krzysztof Petelczyc, Mariusz Żynel
Polynomial reduction from syndrome decoding problem to regular decoding problem
- Open Access
Pavol Zajac
On polynomials over finite fields that are free of binomials
Fabio Enrique Brochero Martínez, Lucas Reis, Sávio Ribas
A public key encryption algorithm based on multi-dimensional general Chebyshev polynomial
Rudong Min, Jiale Han, Shouliang Li, Zhen Yang, Yi Yang
Improved Side Channel Attacks on TRIVIUM, GRAIN-128-AEAD, ACORN-128 v3 and ASCON-128a
Soumya Sahoo, Raghavendra Patil, Sandip Kumar Mondal, Santanu Sarkar, Chester Rebeiro
Efficient generation of odd order de Bruijn sequence with the same complement and reverse sequences
Zuling Chang, Qiang Wang
The revised boomerang connectivity tables and their connection to the difference distribution table
Kirpa Garg, Sartaj Ul Hasan, Constanza Riera, Pantelimon Stănică
New results on non-disjoint and classical strong external difference families
- Open Access
Sophie Huczynska, Sophie Hume
A new automatic framework for searching rotational-XOR differential characteristics in ARX ciphers
Yuhan Zhang, Lei Zhang, Yafei Zheng, Wenling Wu
New models for the cryptanalysis of ASCON
Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher
Can we beat three halves lower bound? (Im)possibility of reducing communication cost for garbled circuits
Chunghun Baek, Taechan Kim
Secret and shared keys recovery on hamming quasi-cyclic with SASCA
Chloé Baïsse, Antoine Moran, Guillaume Goy, Julien Maillard, Nicolas Aragon, Philippe Gaborit, Maxime Lecomte, Antoine Loiseau
Strongly regular graphs decomposable into a divisible design graph and a Delsarte clique
Alexander L. Gavrilyuk, Vladislav V. Kabanov
Optimal two-dimensional multilength optical orthogonal codes via compatible mixed difference packing set systems
Hengming Zhao, Rongcun Qin, Minquan Cheng, Dianhua Wu
Bounds and constructions of optimal symbol-pair codes with constant pair-weight
Mengzhen Zhao, Yanxun Chang