Skip to main content

Designs, Codes and Cryptography OnlineFirst articles


A generic method for investigating nonsingular Galois NFSRs

Let n be a positive integer. An n-stage Galois NFSR has n registers and each register is updated by a feedback function. Then a Galois NFSR is called nonsingular if every register generates (strictly) periodic sequences, i.e., no branch points. In …


Construction of asymmetric Chudnovsky-type algorithms for multiplication in finite fields

The original algorithm of D.V. Chudnovsky and G.V. Chudnovsky for the multiplication in extensions of finite fields provides a bilinear complexity which is uniformly linear with respect to the degree of the extension. Recently, Randriambololona …


Quantum codes from -cyclic codes

A new class of binary quantum codes from cyclic codes over $$\mathbb {Z}_2\mathbb {Z}_2[u]/\langle u^4 \rangle $$ Z 2 Z 2 [ u ] / ⟨ u 4 ⟩ , $$u^4=0$$ u 4 = 0 , is introduced. The generator polynomials of $$\mathbb {Z}_2\mathbb {Z}_2[u]/\langle u^4 …


On the design and security of Lee metric McEliece cryptosystems

Recently, Horlemann-Trautmann and Weger (Adv Math Commun, , 2020) proposed a general framework for a Quaternary McEliece cryptosystem over the ring $${\mathbb {Z}}_4$$ Z 4 , and generalized the construction over …


Generic transformation from broadcast encryption to round-optimal deniable ring authentication

Deniable ring authentication enables a prover in some group (called a ring) to authenticate a message to a verifier using its secret key while at the same time allowing the prover to deny ever having interacted with the verifier. This primitive …

Current Publications

About this journal

There is a great deal of activity in design theory, coding theory and cryptography and recently there has been considerable research done which brings together more than one of the subjects. Designs, Codes and Cryptography provides a forum for high quality papers of both a theoretical and a practical nature which bridge more than one of these areas, encouraging interaction between them. It emphasizes the algebraic and geometric aspects of design theory, coding theory and cryptography.

The journal is widely read by engineers, mathematicians, computer scientists and others in education, industry and government.

Additional information

Premium Partner

    Image Credits