Last update:
Sat Aug 10 07:40:13 MDT 2024
Claude Carlet Editorial: \booktitleCryptography and Communications, Volume 1, Issue 1 . . . 1--2 Fang-Wei Fu and Harald Niederreiter and Ferruh Özbudak Joint linear complexity of multisequences consisting of linear recurring sequences . . . . . . . . . . 3--29 Charles J. Colbourn and Yuichiro Fujiwara Small stopping sets in Steiner triple systems . . . . . . . . . . . . . . . . 31--46 Joan Daemen and Vincent Rijmen New criteria for linear maps in AES-like ciphers . . . . . . . . . . . . . . . . 47--69 Martin Hell and Thomas Johansson and Lennart Brynielsson An overview of distinguishing attacks on stream ciphers . . . . . . . . . . . . . 71--94 Ramakanth Kavuluru and Andrew Klapper Lower bounds on error complexity measures for periodic LFSR and FCSR sequences . . . . . . . . . . . . . . . 95--116 Wilfried Meidl How to determine linear complexity and $k$-error linear complexity in some classes of linear recurring sequences 117--133
Somitra Kumar Sanadhya and Palash Sarkar A combinatorial analysis of recent attacks on step reduced SHA-2 family . . 135--173 Nicholas Kolokotronis and Konstantinos Limniotis and Nicholas Kalouptsidis Factorization of determinants over finite fields and application in stream ciphers . . . . . . . . . . . . . . . . 175--205 Hong Xu and Wen-Feng Qi and Yong-Hui Zheng Autocorrelations of $l$-sequences with prime connection integer . . . . . . . . 207--223 Goutam Paul and Subhamoy Maitra On biases of permutation and keystream bytes of RC4 towards the secret key . . 225--268 Aleksandar Kircanski and Rabeah Al-Zaidy and Amr M. Youssef A new distinguishing and key recovery attack on NGG stream cipher . . . . . . 269--282
Aleksandar Kircanski and Amr M. Youssef On the structural weakness of the GGHN stream cipher . . . . . . . . . . . . . 1--17 Robert Rolland The second weight of generalized Reed-Muller codes in most cases . . . . 19--40 Mikko Pelto New bounds for $ (r, \leq 2) $-identifying codes in the infinite king grid . . . . . . . . . . . . . . . . . . 41--47 Alina Ostafe and Igor E. Shparlinski Pseudorandom numbers and hash functions from iterations of multivariate polynomials . . . . . . . . . . . . . . 49--67 Ruchi Gode and Sugata Gangopadhyay Third-order nonlinearities of a subclass of Kasami functions . . . . . . . . . . 69--83 Tor Helleseth and Alexander Kholosha \boldmath $ x^{2^l + 1} + x + a $ and related affine polynomials over $ {\rm GF}(2^k) $ . . . . . . . . . . . . . . . 85--109 E. Rodney Canfield and Zhicheng Gao and Catherine Greenhill and Brendan D. McKay and Robert W. Robinson Asymptotic enumeration of correlation-immune Boolean functions . . 111--126
Dane L. Flannery and Kathryn J. Horadam Guest editorial for the special issue on design theory . . . . . . . . . . . . . 127--128 K. J. Horadam Hadamard matrices and their applications: Progress 2007--2010 . . . 129--154 Krishnasamy Thiru Arasu and Alex J. Gutman Circulant weighing matrices . . . . . . 155--171 Michael Huber Combinatorial bounds and characterizations of splitting authentication codes . . . . . . . . . . 173--185 Ferenc Szöll\Hosi Exotic complex Hadamard matrices and their equivalence . . . . . . . . . . . 187--198 Darcy Best and Hadi Kharaghani Unbiased complex Hadamard matrices and bases . . . . . . . . . . . . . . . . . 199--209 Philippe Jaming and Máté Matolcsi and Péter Móra The problem of mutually unbiased bases in dimension $6$ . . . . . . . . . . . . 211--220 Asha Rao and Diane Donovan and Joanne L. Hall Mutually orthogonal Latin squares and mutually unbiased bases in dimensions of odd prime power MOLS and MUBs in odd prime power dimensions . . . . . . . . . 221--231 Warwick de Launey and Daniel M. Gordon On the density of the set of known Hadamard orders . . . . . . . . . . . . 233--246 José Andrés Armario On an inequivalence criterion for cocyclic Hadamard matrices . . . . . . . 247--259 Padraig Ó Catháin and Richard M. Stafford On twin prime power Hadamard matrices 261--269 J. F. Dillon Some REALLY beautiful Hadamard matrices 271--292 Jennifer Seberry and Marilena Mitrouli Some remarks on Hadamard matrices . . . 293--306 Warwick de Launey and David A. Levin A Fourier-analytic approach to counting partial Hadamard matrices . . . . . . . 307--334
Lilya Budaghyan and Tor Helleseth New commutative semifields defined by new PN multinomials . . . . . . . . . . 1--16 D. G. Farmer and K. J. Horadam Equivalence classes of multiplicative central $ (p^n, p^n, p^n, 1) $-relative difference sets . . . . . . . . . . . . 17--28 Li-Ping Wang A lattice-based minimal partial realization algorithm for matrix sequences of varying length . . . . . . 29--42 Carl Bracken and Eimear Byrne and Nadya Markin and Gary McGuire A few more quadratic APN functions . . . 43--53
Zheng Yang and Pinhui Ke Construction of quaternary sequences of length $ p q $ with low autocorrelation 55--64 Keith M. Martin and Maura B. Paterson and Douglas R. Stinson Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures . . . . . . . . . . . . . . . 65--86 Khmaies Ouahada and Theo G. Swart and Hendrik C. Ferreira Permutation sequences and coded PAM signals with spectral nulls at rational submultiples of the symbol frequency . . 87--108 François Arnault and Thierry P. Berger and Benjamin Pousse A matrix approach for FCSR automata . . 109--139
Jiali Choy and Guanhan Chew and Khoongming Khoo and Huihui Yap Cryptographic properties and application of a Generalized Unbalanced Feistel Network structure . . . . . . . . . . . 141--164 Hassan Aly and Arne Winterhof Boolean functions derived from Fermat quotients . . . . . . . . . . . . . . . 165--174 Yongqiang Li and Mingsheng Wang Permutation polynomials EA-equivalent to the inverse function over $ {\rm GF}(2^n) $ . . . . . . . . . . . . . . . 175--186
Laurent Poinsot Non Abelian bent functions . . . . . . . 1--23 Enes Pasalic A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation . . . . . . . . 25--45 Miia Hermelin and Kaisa Nyberg Multidimensional linear distinguishing attacks and Boolean functions . . . . . 47--64 Peter Beelen and Gregor Leander A new construction of highly nonlinear S-boxes . . . . . . . . . . . . . . . . 65--77
Wenpei Si and Cunsheng Ding A simple stream cipher with proven properties . . . . . . . . . . . . . . . 79--104 Maxwell L. Bileschi and Thomas W. Cusick and Daniel Padgett Weights of Boolean cubic monomial rotation symmetric functions . . . . . . 105--130 Abdel Alim Kamal and Amr M. Youssef Fault analysis of the NTRUSign digital signature scheme . . . . . . . . . . . . 131--144
Subhamoy Maitra and Palash Sarkar Guest editorial . . . . . . . . . . . . 145--146 Anne Canteaut and María Naya-Plasencia Correlation attacks on combination generators . . . . . . . . . . . . . . . 147--171 Martin Ågren and Carl Löndahl and Martin Hell and Thomas Johansson A survey on fast correlation attacks . . 173--202 Simon Knellwolf and Willi Meier High order differential attacks on stream ciphers . . . . . . . . . . . . . 203--215 Itai Dinur and Adi Shamir Applying cube attacks to stream ciphers in realistic scenarios . . . . . . . . . 217--232 Meltem Sönmez Turan On the nonlinearity of maximum-length NFSR feedbacks . . . . . . . . . . . . . 233--243 Leonie Simpson and Serdar Boztas State cycles, initialization and the Trivium stream cipher . . . . . . . . . 245--258 Yi Lu and Serge Vaudenay and Willi Meier Synthetic linear analysis with applications to CubeHash and Rabbit . . 259--276 Mohammad Ali Orumiehchiha and Josef Pieprzyk and Ron Steinfeld Cryptanalysis of WG-7: a lightweight stream cipher . . . . . . . . . . . . . 277--285
Wenhao Wang and Meicheng Liu and Yin Zhang Comments on ``A design of Boolean functions resistant to (fast) algebraic cryptanalysis with efficient implementation'' . . . . . . . . . . . . 1--6 Thomas W. Cusick Finding Hamming weights without looking at truth tables . . . . . . . . . . . . 7--18 Sourav Sen Gupta and Anupam Chattopadhyay and Ayesha Khalid Designing integrated accelerator for stream ciphers with structural similarities . . . . . . . . . . . . . . 19--47 Zoubida Jadda and Patrice Parraud and Soukayna Qarboua Quaternary cryptographic bent functions and their binary projection . . . . . . 49--65 Romar dela Cruz and Huaxiong Wang Cheating-immune secret sharing schemes from codes and cumulative arrays . . . . 67--83
Alyssa Brown and Thomas W. Cusick Equivalence classes for cubic rotation symmetric functions . . . . . . . . . . 85--118 Ir\`ene Charon and Iiro Honkala and Olivier Hudry and Antoine Lobstein Minimum sizes of identifying codes in graphs differing by one vertex . . . . . 119--136 Sourav Das and Dipanwita RoyChowdhury \it CAR30: a new scalable stream cipher with rule $ 30 $ . . . . . . . . . . . . 137--162 Ana S\ual\uagean and Alex J. Burrage and Raphael C.-W. Phan Computing the linear complexity for sequences with characteristic polynomial $ f^v $ . . . . . . . . . . . . . . . . 163--177
Konstantinos Limniotis and Nicholas Kolokotronis and Nicholas Kalouptsidis Secondary constructions of Boolean functions with maximum algebraic immunity . . . . . . . . . . . . . . . . 179--199 K. T. Arasu and Simone Severini and Edmund Velten Block weighing matrices . . . . . . . . 201--207 Cunsheng Ding and Keqin Feng and Rongquan Feng and Maosheng Xiong and Aixian Zhang Unit time-phase signal sets: Bounds and constructions . . . . . . . . . . . . . 209--227
Maura B. Paterson and Douglas R. Stinson A simple combinatorial treatment of constructions and threshold gaps of ramp schemes . . . . . . . . . . . . . . . . 229--240 Elodie Leducq Second weight codewords of generalized Reed-Muller codes . . . . . . . . . . . 241--276 Guang Gong and Mark Aagaard and Xinxin Fan Resilience to distinguishing attacks on \sf WG-7 cipher and their generalizations . . . . . . . . . . . . 277--289
Tor Helleseth and Jonathan Jedwab Special issue editorial: Sequences and their applications . . . . . . . . . . . 1--2 Gaofei Wu and Matthew Geoffrey Parker A complementary construction using mutually unbiased bases . . . . . . . . 3--25 Dragana Bajic and Tatjana Loncar-Turukalo A simple suboptimal construction of cross-bifix-free codes . . . . . . . . . 27--37 Rema Hariharan New near perfect sequences of even lengths . . . . . . . . . . . . . . . . 39--46 Santiago Barrera Acevedo and Nathan Jolly Perfect arrays of unbounded sizes over the basic quaternions . . . . . . . . . 47--57 S. Z. Budi\vsin and P. Spasojevi\'c Paraunitary generation/correlation of QAM complementary sequence pairs . . . . 59--102
Stéphanie Dib Asymptotic nonlinearity of vectorial Boolean functions . . . . . . . . . . . 103--115 Kalikinkar Mandal and Guang Gong and Xinxin Fan and Mark Aagaard Optimal parameters for the WG stream cipher family . . . . . . . . . . . . . 117--135 Ying Gao and Romar dela Cruz Secret sharing schemes based on graphical codes . . . . . . . . . . . . 137--155 Ir\`ene Charon and Iiro Honkala and Olivier Hudry and Antoine Lobstein Minimum sizes of identifying codes in graphs differing by one edge . . . . . . 157--170
Sareh Emami and San Ling and Ivica Nikoli\'c and Josef Pieprzyk and Huaxiong Wang The resistance of PRESENT-80 against related-key differential attacks . . . . 171--187 Palash Sarkar Modes of operations for encryption and authentication using stream ciphers supporting an initialisation vector . . 189--231 Jinyong Shan and Lei Hu and Xiangyong Zeng Cryptographic properties of nested functions and algebraic immunity of the Boolean function in Hitag2 stream cipher 233--254 Pavol Zajac and Matú\vs Jókay Multiplicative complexity of bijective $ 4 \times 4 $ S-boxes . . . . . . . . . . 255--277
Asl\i Bay and Atefeh Mashatan and Serge Vaudenay Revisiting iterated attacks in the context of decorrelation theory . . . . 279--311 Bo Zhu and Guang Gong Multidimensional meet-in-the-middle attack and its applications to KATAN32/48/64 . . . . . . . . . . . . . 313--333 Xinxin Gong and Bin Zhang and Wenling Wu and Dengguo Feng Computing Walsh coefficients from the algebraic normal form of a Boolean function . . . . . . . . . . . . . . . . 335--358 Antonio Bernini and Stefano Bilotta and Renzo Pinzani and Ahmad Sabri and Vincent Vajnovszki Prefix partitioned gray codes for particular cross-bifix-free sets . . . . 359--369
Claude Carlet and Pierre-Alain Fouque Guest Editorial . . . . . . . . . . . . 1--2 Begül Bilgin and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen and Natalia Tokareva and Valeriya Vitkup Threshold implementations of small S-boxes . . . . . . . . . . . . . . . . 3--33 Bodhisatwa Mazumdar and Debdeep Mukhopadhyay and Indranil Sengupta Construction of RSBFs with improved cryptographic properties to resist differential fault attack on grain family of stream ciphers . . . . . . . . 35--69 Michael Tunstall and Marc Joye The distributions of individual bits in the output of multiplicative operations 71--90 Aurélie Bauer and Eliane Jaulmes and Emmanuel Prouff and Jean-René Reinhard and Justine Wild Horizontal collision correlation attack on elliptic curves---extended version 91--119 Christophe Clavier and Quentin Isorez and Damien Marion and Antoine Wurcker Complete reverse-engineering of AES-like block ciphers by SCARE and FIRE attacks 121--162 Sonia Bela\"\id and Vincent Grosso and François-Xavier Standaert Masking and leakage-resilient primitives: One, the other(s) or both? 163--184 Nadia El Mrabet and Jacques J. A. Fournier and Louis Goubin and Ronan Lashermes A survey of fault attacks in pairing based cryptography . . . . . . . . . . . 185--205
Mingchao Li and Miao Liang and Beiliang Du A construction of $t$-fold perfect splitting authentication codes with equal deception probabilities . . . . . 207--215 Chengju Li and Qin Yue The Walsh transform of a class of monomial functions and cyclic codes . . 217--228 Anuradha Sharma Repeated-root constacyclic codes of length $ \ell^t p^s $ and their dual codes . . . . . . . . . . . . . . . . . 229--255 Kishan Chand Gupta and Indranil Ghosh Ray Cryptographically significant MDS matrices based on circulant and circulant-like matrices for lightweight applications . . . . . . . . . . . . . . 257--287
Yiyuan Luo and Xuejia Lai and Tiejun Jia Attacks on a double length blockcipher-based hash proposal . . . . 289--295 Yuan Li Characterization of robust immune symmetric boolean functions . . . . . . 297--315 Santanu Sarkar Further non-randomness in RC4, RC4A and VMPC . . . . . . . . . . . . . . . . . . 317--330 Ivica Nikoli\'c and Lei Wang and Shuang Wu The parallel-cut meet-in-the-middle attack . . . . . . . . . . . . . . . . . 331--345
Zhi Hu and Lin Wang Injectivity of compressing maps on the set of primitive sequences modulo square-free odd integers . . . . . . . . 347--361 Nathan Jolly An algebra of arrays and almost perfect watermarks . . . . . . . . . . . . . . . 363--377 Francis N. Castro and Oscar E. González and Luis A. Medina A divisibility approach to the open boundary cases of Cusick--Li--St\uanic\ua's conjecture . . 379--402 José Ortiz-Ubarri New families of asymptotically optimal doubly periodic arrays with ideal correlation constraints . . . . . . . . 403--414 Colleen M. Swanson and Douglas R. Stinson Extended results on privacy against coalitions of users in user-private information retrieval protocols . . . . 415--437 Debrup Chakraborty and Vicente Hernandez-Jimenez and Palash Sarkar Another look at XCB . . . . . . . . . . 439--468 S. Hod\vzi\'c and E. Pasalic Generalized Bent Functions --- Some General Construction Methods and Related Necessary and Sufficient Conditions . . 469--483 Vladimir Edemskiy and Andrey Ivanov The linear complexity of balanced quaternary sequences with optimal autocorrelation value . . . . . . . . . 485--496 Jing Jane He and Daniel Panario and Qiang Wang and Arne Winterhof Linear complexity profile and correlation measure of interleaved sequences . . . . . . . . . . . . . . . 497--508 Chun Guo and Dongdai Lin Improved domain extender for the ideal cipher . . . . . . . . . . . . . . . . . 509--533 A. R. Rahimipour and A. R. Ashrafi and A. Gholami The existence of minimal logarithmic signatures for the sporadic Suzuki and simple Suzuki groups . . . . . . . . . . 535--542
Mingxing Wang and Yupeng Jiang and Dongdai Lin Further results on the nonlinearity of maximum-length NFSR feedbacks . . . . . 1--6 Adel Alahmadi and Hussain Alhazmi and Tor Helleseth and Rola Hijazi and Najat Muthana and Patrick Solé On the lifted Melas code . . . . . . . . 7--18 Maura B. Paterson and Douglas R. Stinson and Yongge Wang On encoding symbol degrees of array BP-XOR codes . . . . . . . . . . . . . . 19--32 Qiuyan Wang and Yupeng Jiang and Dongdai Lin Linear complexity of Ding-Helleseth sequences of order 2 over $ {\rm GF}(l) $ . . . . . . . . . . . . . . . . . . . 33--49 Jian Gao and Linzhi Shen and Fang-Wei Fu A Chinese remainder theorem approach to skew generalized quasi-cyclic codes over finite fields . . . . . . . . . . . . . 51--66 Thomas W. Cusick and Pantelimon St\uanic\ua Counting equivalence classes for monomial rotation symmetric Boolean functions with prime dimension . . . . . 67--81 Anuradha Sharma and Amit K. Sharma Construction of self-dual codes over $ \mathbb {Z}_{2^m} $ . . . . . . . . . . 83--101 Chuan Lv and Tongjiang Yan and Guozhen Xiao New developments in $q$-polynomial codes 103--112 Subhadeep Banik Conditional differential cryptanalysis of $ 105 $ round Grain v1 . . . . . . . 113--137 Iiro Honkala and Olivier Hudry and Antoine Lobstein On the ensemble of optimal identifying codes in a twin-free graph . . . . . . . 139--153 Guangkui Xu and Xiwang Cao and Shanding Xu Constructing new APN functions and bent functions over finite fields of odd characteristic via the switching method 155--171
Lilya Budaghyan and Tor Helleseth and Alexander Kholosha Editorial: Special issue on Boolean functions and their applications . . . . 173--174 Daniel J. Katz and Philippe Langevin New open problems related to old conjectures by Helleseth . . . . . . . . 175--189 Canan Ka\csìkcì and Wilfried Meidl and Alev Topuzo\uglu Spectra of a class of quadratic functions: Average behaviour and counting functions . . . . . . . . . . . 191--214 Chunlei Li and Tor Helleseth Quasi-perfect linear codes from planar and APN functions . . . . . . . . . . . 215--227 Sihem Mesnager Further constructions of infinite families of bent functions from new permutations and their duals . . . . . . 229--246 Georgi Ivanov and Nikolay Nikolov and Svetla Nikova Reversed genetic algorithms for generation of bijective S-boxes with good cryptographic properties . . . . . 247--276 Oleksandr Kazymyrov and Roman Oliynykov and Håvard Raddum Influence of addition modulo $ 2^n $ on algebraic attacks . . . . . . . . . . . 277--289 Yin Tan and Guang Gong and Bo Zhu Enhanced criteria on differential uniformity and nonlinearity of cryptographically significant functions 291--311
Joan Boyar and Magnus Gausdal Find and René Peralta On various nonlinearity measures for boolean functions . . . . . . . . . . . 313--330 Sonia Bogos and Florian Tram\`er and Serge Vaudenay On solving \sf LPN using \sf BKW and variants: implementation and analysis 331--369 Yuan Cheng and Wen-Feng Qi and Qun-Xiong Zheng and Dong Yang On the distinctness of primitive sequences over $ \mathbf {Z} / (p^e q) $ modulo $2$ . . . . . . . . . . . . . . . 371--381 Ting Gu and Andrew Klapper Statistical properties of half-$ \ell $-sequences . . . . . . . . . . . . . . 383--400 Kaushik Chakraborty and Subhamoy Maitra Application of Grover's algorithm to check non-resiliency of a Boolean function . . . . . . . . . . . . . . . . 401--413 Torleiv Klòve On covering sets for limited-magnitude errors . . . . . . . . . . . . . . . . . 415--433 Yi Lu and Yvo Desmedt Walsh transforms and cryptographic applications in bias computing . . . . . 435--453
Debrup Chakraborty and Palash Sarkar On modes of operations of a block cipher for authentication and authenticated encryption . . . . . . . . . . . . . . . 455--511 Fulin Li and Shixin Zhu and Honggang Hu and Ting Jiang Determining the $k$-error joint linear complexity spectrum for a binary multisequence with period $ p^n$ . . . . 513--523 Can Xiang Linear codes from a generic construction 525--539 Guangkui Xu and Xiwang Cao and Shanding Xu Optimal $p$-ary cyclic codes with minimum distance four from monomials . . 541--554 Brandon Dravie and Jérémy Parriaux and Philippe Guillot and Gilles Millérioux Matrix representations of vectorial Boolean functions and eigenanalysis . . 555--577 Ji-Jian Chin and Syh-Yuan Tan and Swee-Huay Heng and Raphael C.-W. Phan Twin-Beth: Security under active and concurrent attacks for the Beth identity-based identification scheme . . 579--591 Ji-Woong Jang and Dae-Woon Lim Large low probability of intercept properties of the quaternary sequence with optimal correlation property constructed by Legendre sequences . . . 593--604 Qiuyan Wang and Dongdai Lin Generalized cyclotomic numbers of order two and their applications . . . . . . . 605--616 Anuradha Sharma and Saroj Rani On constacyclic codes over finite fields 617--636 Kai-Uwe Schmidt Nonlinearity measures of random Boolean functions . . . . . . . . . . . . . . . 637--645
Cunsheng Ding and Zhengchun Zhou Preface: Special functions and codes . . 1--2 Kanat Abdukhalikov and Sihem Mesnager Bent functions linear on elements of some classical spreads and presemifields spreads . . . . . . . . . . . . . . . . 3--21 Sergey Bezzateev and Natalia Shekhunova Quasi-cyclic Goppa codes with special Goppa polynomials and matched location sets . . . . . . . . . . . . . . . . . . 23--39 Ziling Heng and Qin Yue Optimal codebooks achieving the Levenshtein bound from generalized bent functions over $ \mathbb {Z}_4 $ . . . . 41--53 Chengju Li and Sunghan Bae and Haode Yan A construction of codes with linearity from two linear codes . . . . . . . . . 55--69 Sihem Mesnager Linear codes with few weights from weakly regular bent functions based on a generic construction . . . . . . . . . . 71--84 Qi Wang Some cyclic codes with prime length from cyclotomy of order $4$ . . . . . . . . . 85--92 Can Xiang and Chunming Tang and Keqin Feng A class of linear codes with a few weights . . . . . . . . . . . . . . . . 93--116 Guangkui Xu and Xiwang Cao and Shanding Xu Two classes of $p$-ary bent functions and linear codes with three or four weights . . . . . . . . . . . . . . . . 117--131 Shudi Yang and Zheng-An Yao and Chang-An Zhao A class of three-weight linear codes and their complete weight enumerators . . . 133--149 Dan Zhang and Cuiling Fan and Daiyuan Peng and Xiaohu Tang Complete weight enumerators of some linear codes from quadratic forms . . . 151--163
Yue Zhou and Longjiang Qu Constructions of negabent functions over finite fields . . . . . . . . . . . . . 165--180 Xin Li and Zihui Liu On the second relative greedy weight . . 181--197 Lisha Wang and Xiaohu Tang On the correlation distribution of the generalized maximal length $ \mathbb {Z}_4 $-sequences . . . . . . . . . . . 199--215 Ana S\ual\uagean and Matei Mandache-S\ual\uagean Counting and characterising functions with ``fast points'' for differential attacks . . . . . . . . . . . . . . . . 217--239 Rama Krishna Bandi and Maheshanand Bhaintwal and Nuh Aydin A mass formula for negacyclic codes of length $ 2^k $ and some good negacyclic codes over $ \mathbb {Z}_4 + u \mathbb {Z}_4 $ . . . . . . . . . . . . . . . . 241--272 Elena Dubrova and Martin Hell Espresso: A stream cipher for $5$G wireless communication systems . . . . . 273--289 Tingting Wu and Jian Gao and Fang-Wei Fu $1$-generator generalized quasi-cyclic codes over $ \mathbb {Z}_4 $ . . . . . . 291--299 Sugata Gangopadhyay and Aditi Kar Gangopadhyay and Spyridon Pollatos and Pantelimon St\uanic\ua Cryptographic Boolean functions with biased inputs . . . . . . . . . . . . . 301--314
Qiuyan Wang and Kelan Ding and Dongdai Lin and Rui Xue A kind of three-weight linear codes . . 315--322 Ziling Heng and Qin Yue Complete weight distributions of two classes of cyclic codes . . . . . . . . 323--343 Jian Liu and Sihem Mesnager and Lusheng Chen On the nonlinearity of S-boxes and linear codes . . . . . . . . . . . . . . 345--361 Jie Peng and Chik How Tan New differentially $4$-uniform permutations by modifying the inverse function on subfields . . . . . . . . . 363--378 M. Esmaeili and M. Moosavi and T. A. Gulliver A new class of Fibonacci sequence based error correcting codes . . . . . . . . . 379--396 Minquan Cheng and Jing Jiang and Xiaohu Tang Asymptotically optimal $ \overline {2}$-separable codes with length $4$ . . 397--405 Miao Liang and Lijun Ji and Jingcai Zhang Some new classes of $2$-fold optimal or perfect splitting authentication codes 407--430
Zhiqiang Lin and Dongdai Lin and Dingyi Pei Practical construction of ring LFSRs and ring FCSRs with low diffusion delay for hardware cryptographic applications . . 431--443 Zhixiong Chen Linear complexity and trace representation of quaternary sequences over $ \mathbb {Z}_4 $ based on generalized cyclotomic classes modulo $ p q $ . . . . . . . . . . . . . . . . . 445--458 Madhu Raka and Leetika Kathuria and Mokshi Goyal $ (1 - 2 u^3)$-constacyclic codes and quadratic residue codes over $ \mathbb {F}_p[u] \slash \langle u^4 - u \rangle $ . . . . . . . . . . . . . . . . . . . 459--473 Pramod Kumar Kewat and Priti Kumari Cyclic codes from the second class two-prime Whiteman's generalized cyclotomic sequence with order $6$ . . . 475--499 László Mérai and Harald Niederreiter and Arne Winterhof Expansion complexity and linear complexity of sequences over finite fields . . . . . . . . . . . . . . . . . 501--509 Hongyu Han and Daiyuan Peng and Udaya Parampalli New sets of optimal low-hit-zone frequency-hopping sequences based on $m$-sequences . . . . . . . . . . . . . 511--522 Santanu Sarkar and Prakash Dey and Avishek Adhikari and Subhamoy Maitra Probabilistic signature based generalized framework for differential fault analysis of stream ciphers . . . . 523--543
Xianfang Wang and Jian Gao and Fang-Wei Fu Complete weight enumerators of two classes of linear codes . . . . . . . . 545--562 Shuai Xue and Wen-Feng Qi and Xiao-Yuan Yang On the best linear approximation of addition modulo $ 2^n $ . . . . . . . . 563--580 Thalia M. Laing and Keith M. Martin and Maura B. Paterson and Douglas R. Stinson Localised multisecret sharing . . . . . 581--597 Yuan Cao and Qingguo Li Cyclic codes of odd length over $ Z_4 [u] \slash \langle u^k \rangle $ . . . . 599--624 Xianfang Wang and Can Xiang and Fang-Wei Fu Secret sharing schemes for compartmented access structures . . . . . . . . . . . 625--635 Minjia Shi and Rongsheng Wu and Yan Liu and Patrick Solé Two and three weight codes over $ \mathbb {F}_p + u \mathbb {F}_p $ . . . 637--646 Chunming Tang and Yanfeng Qi A class of hyper-bent functions and Kloosterman sums . . . . . . . . . . . . 647--664
Saban Alaca and Goldwyn Millar Character values of the Sidelnikov--Lempel--Cohn--Eastman sequences . . . . . . . . . . . . . . . 665--682 Vladimir Edemskiy and Xiaoni Du Design sequences with high linear complexity over finite fields using generalized cyclotomy . . . . . . . . . 683--691 Nian Li and Tor Helleseth Several classes of permutation trinomials from Niho exponents . . . . . 693--705 Limengnan Zhou and Daiyuan Peng and Hongbin Liang and Changyuan Wang and Hongyu Han Generalized methods to construct low-hit-zone frequency-hopping sequence sets and optimal constructions . . . . . 707--728 J. Wolfmann Sequences of bent functions and near-bent functions . . . . . . . . . . 729--736 Heiko Dietrich and Nathan Jolly A new family of arrays with low autocorrelation . . . . . . . . . . . . 737--748 Eric Férard On the irreducibility of the hyperplane sections of Fermat varieties in $ \mathbb {P}^3 $ in characteristic $2$. II . . . . . . . . . . . . . . . . . . . 749--767
Tor Helleseth and Bart Preneel Editorial: Special issue on recent trends in cryptography . . . . . . . . . 1--3 Michael Scott Missing a trick: Karatsuba variations 5--15 Houda Ferradi and Rémi Géraud and Diana Maimut and David Naccache and Hang Zhou Backtracking-assisted multiplication . . 17--26 Sonia Bogos and John Gaspoz and Serge Vaudenay Cryptanalysis of a homomorphic encryption scheme . . . . . . . . . . . 27--39 Marie-Sarah Lacharité Security of BLS and BGLS signatures in a multi-user setting . . . . . . . . . . . 41--58 Valérie Nachef and Jacques Patarin and Emmanuel Volte Generic attacks with standard deviation analysis on $a$-Feistel schemes . . . . 59--77 Brett Hemenway and Rafail Ostrovsky Efficient robust secret sharing from expander graphs . . . . . . . . . . . . 79--99 Éloi de Chérisey and Sylvain Guilley and Annelie Heuser and Olivier Rioul On the optimality and practicability of mutual information analysis in some scenarios . . . . . . . . . . . . . . . 101--121 Gregory G. Rose KISS: A bit too simple . . . . . . . . . 123--137 Geong Sen Poh and Moesfa Soeheila Mohamad and Ji-Jian Chin Searchable symmetric encryption over multiple servers . . . . . . . . . . . . 139--158 Tomás Fabsic and Otokar Grosek and Karol Nemoga and Pavol Zajac On generating invertible circulant binary matrices with a prescribed number of ones . . . . . . . . . . . . . . . . 159--175 Christian Forler and Eik List and Stefan Lucks and Jakob Wenzel POEx: A beyond-birthday-bound-secure on-line cipher . . . . . . . . . . . . . 177--193 Tingting Cui and Huaifeng Chen and Long Wen and Meiqin Wang Statistical integral attack on CAST-256 and IDEA . . . . . . . . . . . . . . . . 195--209 Cécile Pierrot and Benjamin Wesolowski Malleability of the blockchain's entropy 211--233
Nurdagül Anbar and Wilfried Meidl Modified planar functions and their components . . . . . . . . . . . . . . . 235--249 Zuling Chang and Martianus Frederic Ezerman and San Ling and Huaxiong Wang Construction of de Bruijn sequences from product of two irreducible polynomials 251--275 Lin Sok and MinJia Shi and Patrick Solé Classification and Construction of quaternary self-dual bent functions . . 277--289 Pan Tan and Zhengchun Zhou and Deng Tang and Tor Helleseth The weight distribution of a class of two-weight linear codes derived from Kloosterman sums . . . . . . . . . . . . 291--299 Gaojun Luo and Xiwang Cao and Shanding Xu and Jiafu Mi Binary linear codes with two or three weights from Niho exponents . . . . . . 301--318 Cunsheng Ding A sequence construction of cyclic codes over finite fields . . . . . . . . . . . 319--341 Mokshi Goyal and Madhu Raka Quadratic residue codes over the ring $ \mathbb {F}_p[u] / \langle u^m - u \rangle $ and their Gray images . . . . 343--355 Santiago Barrera Acevedo and Heiko Dietrich Perfect sequences over the quaternions and $ (4 n, 2, 4 n, 2 n)$-relative difference sets in $ C_n \times Q_8$ . . 357--368 Andrew Klapper Matrix parametrized shift registers . . 369--382 Elena Dubrova and Mats Näslund and Göran Selander and Fredrik Lindqvist Message Authentication Based on Cryptographically Secure CRC without Polynomial Irreducibility Test . . . . . 383--399
Anuradha Sharma and Taranjot Kaur Enumeration formulae for self-dual, self-orthogonal and complementary-dual quasi-cyclic codes over finite fields 401--435 Shanding Xu and Xiwang Cao and Guangkui Xu and Gaojun Luo Two classes of near-optimal frequency-hopping sequence sets with prime-power period . . . . . . . . . . . 437--454 Li-Ping Wang and Daqing Wan On lattice-based algebraic feedback shift registers synthesis for multisequences . . . . . . . . . . . . . 455--465 Yuhua Sun and Qiang Wang and Tongjiang Yan The exact autocorrelation distribution and $2$-adic complexity of a class of binary sequences with almost optimal autocorrelation . . . . . . . . . . . . 467--477 Amit Jana and Goutam Paul Revisiting RC4 key collision: Faster search algorithm and new $ 22$-byte colliding key pairs . . . . . . . . . . 479--508 Serdar Boztas and Ferruh Özbudak and Eda Tekin Generalized nonbinary sequences with perfect autocorrelation, flexible alphabets and new periods . . . . . . . 509--517 R. Sobhani Cyclic codes over a non-commutative finite chain ring . . . . . . . . . . . 519--530 Kangquan Li and Longjiang Qu and Xi Chen and Chao Li Permutation polynomials of the form $ c x + \hbox {Tr}_{q^l / q}(x^a) $ and permutation trinomials over finite fields with even characteristic . . . . 531--554 Xuli Zhang and Jing Jiang and Minquan Cheng Bounds and constructions for $ \overline {3}$-strongly separable codes with length $3$ . . . . . . . . . . . . . . . 555--565 Zhengbang Zha and Lei Hu and Zhizheng Zhang New results on permutation polynomials of the form $ (x^{p m} - x + \delta)^s + x^{p m} + x $ over $ \mathbb {F} p^{2 m} $ . . . . . . . . . . . . . . . . . . . 567--578
Xiusheng Liu and Hai Q. Dinh and Hualu Liu and Long Yu On new quantum codes from matrix product codes . . . . . . . . . . . . . . . . . 579--589 Zongxiang Yi and Zhiqiang Lin and Lishan Ke A generic method to construct zero-difference balanced functions . . . 591--609 Yousuf Alsalami Constructions with high algebraic degree of differentially $4$-uniform $ (n, n - 1)$-functions and differentially $8$-uniform $ (n, n - 2)$-functions . . 611--628 Kalikinkar Mandal and Bo Yang and Guang Gong and Mark Aagaard On ideal $t$-tuple distribution of filtering de Bruijn sequence generators 629--641 Zhonghua Sun and Shixin Zhu and Liqi Wang The symbol-pair distance distribution of a class of repeated-root cyclic codes over $ \mathbb {F}_{p^m} $ . . . . . . . 643--653 Francis N. Castro and Luis A. Medina and Ivelisse M. Rubio Exact $2$-divisibility of exponential sums associated to boolean functions . . 655--666 Elena Barcucci and Antonio Bernini and Stefano Bilotta and Renzo Pinzani A $2$D non-overlapping code over a $q$-ary alphabet . . . . . . . . . . . . 667--683 Somphong Jitman Good integers and some applications in coding theory . . . . . . . . . . . . . 685--704 Aleksandr Tuxanidy and Qiang Wang Characteristic digit-sum sequences . . . 705--717 Lucky Galvez and Jon-Lark Kim and Nari Lee and Young Gun Roe and Byung-Sun Won Some bounds on binary LCD codes . . . . 719--728
Subhamoy Maitra Guest editorial . . . . . . . . . . . . 729--730 Ashwin Jha and Mridul Nandi On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers . . . . . . . . . . . . . 731--753 Tingting Cui and Huaifeng Chen and Sihem Mesnager and Ling Sun and Meiqin Wang Statistical integral distinguisher with multi-structure and its application on AES-like ciphers . . . . . . . . . . . . 755--776 Kenneth G. Paterson and Jacob C. N. Schuldt Statistical attacks on cookie masking for RC4 . . . . . . . . . . . . . . . . 777--801 Matthias Hamann and Matthias Krause and Willi Meier and Bin Zhang Design and analysis of small-state grain-like stream ciphers . . . . . . . 803--834 Subhabrata Samajder and Palash Sarkar Success probability of multiple/multidimensional linear cryptanalysis under general key randomisation hypotheses . . . . . . . . 835--879 Goutam Paul and Souvik Ray Analysis of burn-in period for RC4 state transition . . . . . . . . . . . . . . . 881--908 Claude Carlet and Sylvain Guilley Statistical properties of side-channel and fault injection attacks using coding theory . . . . . . . . . . . . . . . . . 909--933 Srimanta Bhattacharya and Mridul Nandi A note on the chi-square method: A tool for proving cryptographic security . . . 935--957 Matthias Hamann and Matthias Krause On stream ciphers with provable beyond-the-birthday-bound security against time-memory-data tradeoff attacks . . . . . . . . . . . . . . . . 959--1012
László Mérai and Arne Winterhof On the pseudorandomness of automatic sequences . . . . . . . . . . . . . . . 1013--1022 Tao Bai and Yongbo Xia A new class of permutation trinomials constructed from Niho exponents . . . . 1023--1036 Wilfried Meidl and Ísabel Pirsic On the normality of $p$-ary bent functions . . . . . . . . . . . . . . . 1037--1049 Claude Carlet On the nonlinearity of monotone Boolean functions . . . . . . . . . . . . . . . 1051--1061 Ting Gu and Zhixiong Chen and Andrew Klapper Correlation immune functions with respect to the $q$-transform . . . . . . 1063--1073 Sartaj Ul Hasan and Daniel Panario and Qiang Wang Nonlinear vectorial primitive recursive sequences . . . . . . . . . . . . . . . 1075--1090 Gaojun Luo and Xiwang Cao Complete weight enumerators of three classes of linear codes . . . . . . . . 1091--1108 Rong Luo and Udaya Parampalli Cyclic codes over $ M_2 (\mathbb {F}_2 + u \mathbb {F}_2) $ . . . . . . . . . . . 1109--1117 Gaojun Luo and Xiwang Cao Five classes of optimal two-weight linear codes . . . . . . . . . . . . . . 1119--1135 Subhabrata Samajder and Palash Sarkar Multiple (Truncated) Differential Cryptanalysis: Explicit Upper Bounds on Data Complexity . . . . . . . . . . . . 1137--1163 Xueying Shi and Qin Yue and Yaotsu Chang Some quantum MDS codes with large minimum distance from generalized Reed--Solomon codes . . . . . . . . . . 1165--1182 Zuling Chang and Martianus Frederic Ezerman and San Ling and Huaxiong Wang The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields . . . . . . . . . . . . . 1183--1202 Somphong Jitman Correction to: Good integers and some applications in coding theory . . . . . 1203--1203
Lilya Budaghyan and Claude Carlet and Tor Helleseth Editorial: Special Issue on Boolean functions and their applications . . . . 1--2 Irene Villa On APN functions $ L_1 (x^3) + L_2 (x^9) $ with linear $ L_1 $ and $ L_2 $ . . . 3--20 Valeriya Idrisova On an algorithm generating $2$-to-$1$ APN functions and its applications to ``the big APN problem'' . . . . . . . . 21--39 Luca Mariot and Stjepan Picek and Alberto Leporati and Domagoj Jakobovic Cellular automata based S-boxes . . . . 41--62 Sihem Mesnager and Zhengchun Zhou and Cunsheng Ding On the nonlinearity of Boolean functions with restricted input . . . . . . . . . 63--76 Bimal Mandal and Pantelimon Stanica and Sugata Gangopadhyay New classes of $p$-ary bent functions 77--92 Çagdas Çalik and Meltem Sönmez Turan and René Peralta The multiplicative complexity of $6$-variable Boolean functions . . . . . 93--107 Joan Boyar and Magnus Gausdal Find and René Peralta Small low-depth circuits for cryptographic applications . . . . . . . 109--127 Nian Li and Tor Helleseth New permutation trinomials from Niho exponents over finite fields with even characteristic . . . . . . . . . . . . . 129--136
Hongwei Liu and Youcef Maouche Several new classes of linear codes with few weights . . . . . . . . . . . . . . 137--146 Umberto Martínez-Peñas Universal secure rank-metric coding schemes with optimal communication overheads . . . . . . . . . . . . . . . 147--166 Lin Wang and Zhi Hu Injectivity on distribution of elements in the compressed sequences derived from primitive sequences over $ \mathbb {Z_{p^e}} $ . . . . . . . . . . . . . . 167--189 Jerod Michel and Qi Wang Some new balanced and almost balanced quaternary sequences with low autocorrelation . . . . . . . . . . . . 191--206 Enes Pasalic and Samir Hod\vzi\'c and Fengrong Zhang and Yongzhuang Wei Bent functions from nonlinear permutations and conversely . . . . . . 207--225 Huali Deng and Dabin Zheng More classes of permutation trinomials with Niho exponents . . . . . . . . . . 227--236 Olav Geil and Ferruh Özbudak On affine variety codes from the Klein quartic . . . . . . . . . . . . . . . . 237--257 Haode Yan A note on the constructions of MDS self-dual codes . . . . . . . . . . . . 259--268 Qichun Wang and Pantelimon Stanica New bounds on the covering radius of the second order Reed--Muller code of length $ 128 $ . . . . . . . . . . . . . . . . 269--277 Kangquan Li and Longjiang Qu and Qiang Wang Compositional inverses of permutation polynomials of the form $ x^r h(x^s) $ over finite fields . . . . . . . . . . . 279--298 Zhe Gao and Chao Li and Yue Zhou Upper bounds and constructions of complete Asynchronous channel hopping systems . . . . . . . . . . . . . . . . 299--312 Gaofei Wu and Nian Li Several classes of permutation trinomials over $ \mathbb {F}_{5^n} $ from Niho exponents . . . . . . . . . . 313--324 Mohammad Ashraf and Ghulam Mohammad Quantum codes over $ F_p $ from cyclic codes over $ F_p[u, v] / \langle u^2 - 1, v^3 - v, u v - v u \rangle $ . . . . 325--335 Yuhua Sun and Qiang Wang and Tongjiang Yan A lower bound on the $2$-adic complexity of the modified Jacobi sequence . . . . 337--349 Saeed Rostami and Elham Shakour and Mohammad Ali Orumiehchiha and Josef Pieprzyk Cryptanalysis of WG-8 and WG-16 stream ciphers . . . . . . . . . . . . . . . . 351--362
Lilya Budaghyan and Chunlei Li and Matthew G. Parker Editorial: Special Issue on Mathematical Methods for Cryptography . . . . . . . . 363--365 Kaisa Nyberg Affine linear cryptanalysis . . . . . . 367--377 Svetla Nikova and Ventzislav Nikov and Vincent Rijmen Decomposition of permutations in a finite field . . . . . . . . . . . . . . 379--384 Kerem Varici and Svetla Nikova and Ventzislav Nikov and Vincent Rijmen Constructions of S-boxes with uniform sharing . . . . . . . . . . . . . . . . 385--398 László Csirmaz and Péter Ligeti Secret sharing on large girth graphs . . 399--410 Yao Chen and Benjamin M. Case and Shuhong Gao and Guang Gong Error analysis of weak Poly--LWE instances . . . . . . . . . . . . . . . 411--426 Patrick Felke On the security of biquadratic $ C^* $ public-key cryptosystems and its generalizations . . . . . . . . . . . . 427--442 Håvard Raddum and Srimathi Varadharajan Factorization using binary decision diagrams . . . . . . . . . . . . . . . . 443--460 V. A. Zinoviev On classical Kloosterman sums . . . . . 461--496 Assen Bojilov and Lyubomir Borissov and Yuri Borissov Computing the number of finite field elements with prescribed absolute trace and co-trace . . . . . . . . . . . . . . 497--507 Nian Li and Xiangyong Zeng A survey on the applications of Niho exponents . . . . . . . . . . . . . . . 509--548 Torleiv Klòve Codes of length two correcting single errors of limited size . . . . . . . . . 549--555
Marco Buratti Hadamard partitioned difference families and their descendants . . . . . . . . . 557--562 Ziran Tu and Xiangyong Zeng A class of permutation trinomials over finite fields of odd characteristic . . 563--583 Diego Napp and Ricardo Pereira and Raquel Pinto and Paula Rocha Periodic state-space representations of periodic convolutional codes . . . . . . 585--595 Masaaki Harada Singly even self-dual codes of length $ 24 k + 10 $ and minimum weight $ 4 k + 2 $ . . . . . . . . . . . . . . . . . . . 597--608 Shudi Yang and Qin Yue and Yansheng Wu and Xiangli Kong Complete weight enumerators of a class of two-weight linear codes . . . . . . . 609--620 Ville Junnila and Tero Laihonen and Gabrielle Paris Optimal bounds on codes for location in circulant graphs . . . . . . . . . . . . 621--640 Selçuk Kavut and Sevdenur Baloglu Results on symmetric S-boxes constructed by concatenation of RSSBs . . . . . . . 641--660 Limengnan Zhou and Daiyuan Peng and Xing Liu and Hongyu Han and Zheng Ma Frequency-hopping sequence sets with good aperiodic Hamming correlation property . . . . . . . . . . . . . . . . 661--675 Masaaki Harada and Ken Saito Binary linear complementary dual codes 677--696 Sabyasachi Dey and Santanu Sarkar Settling the mystery of $ Z_r = r $ in RC4 . . . . . . . . . . . . . . . . . . 697--715 Liqin Qian and Minjia Shi and Patrick Solé On self-dual and LCD quasi-twisted codes of index two over a special chain ring 717--734 Zibi Xiao and Xiangyong Zeng and Chaoyun Li and Yupeng Jiang Binary sequences with period $N$ and nonlinear complexity $ N - 2$ . . . . . 735--757 Gang Wang and Min-Yao Niu and Fang-Wei Fu Deterministic constructions of compressed sensing matrices based on codes . . . . . . . . . . . . . . . . . 759--775 Alexey Oblaukhov A lower bound on the size of the largest metrically regular subset of the Boolean cube . . . . . . . . . . . . . . . . . . 777--791 Anastasiya Gorodilova On the differential equivalence of APN functions . . . . . . . . . . . . . . . 793--813 Yu Li and Tongjiang Yan and Chuan Lv Construction of a Near-Optimal Quasi-Complementary Sequence Set from Almost Difference Set . . . . . . . . . 815--824 Gaojun Luo and Xiwang Cao Two constructions of asymptotically optimal codebooks . . . . . . . . . . . 825--838
Joan-Josep Climent and Verónica Requena and Xaro Soler-Escriv\`a A construction of Abelian non-cyclic orbit codes . . . . . . . . . . . . . . 839--852 Gaofei Wu and Matthew Geoffrey Parker On Boolean functions with several flat spectra . . . . . . . . . . . . . . . . 853--880 Antti Laaksonen and Patric R. J. Östergård New lower bounds on $q$-ary error-correcting codes . . . . . . . . . 881--889 Nuh Aydin and Ghada Bakbouk and Jonathan G. G. Lambrinos New linear codes over non-prime fields 891--902 Daniele Bartoli and Alexander A. Davydov and Massimo Giulietti and Stefano Marcugini and Fernanda Pambianco New bounds for linear codes of covering radii 2 and 3 . . . . . . . . . . . . . 903--920 Muhiddin Uguz and Ali Doganaksoy and Fatih Sulak and Onur Koçak R-2 composition tests: a family of statistical randomness tests for a collection of binary sequences . . . . . 921--949 Lin Wang and Zhi Hu New explicit injective compressing mappings on primitive sequences over $ \mathbb {Z}_{p^e} $ . . . . . . . . . . 951--963 Hila Rabii and Osnat Keren A new class of security oriented error correcting robust codes . . . . . . . . 965--978 Ying Gao and Zihui Liu and Yiwei Liu The separation of binary relative three-weight codes and its applications 979--992 Richard Hofer and Arne Winterhof $r$-th order nonlinearity, correlation measure and least significant bit of the discrete logarithm . . . . . . . . . . . 993--997 Avaz Naghipour New classes of quantum codes on closed orientable surfaces . . . . . . . . . . 999--1008 Trygve Johnsen and Hugues Verdure Relative profiles and extended weight polynomials of almost affine codes . . . 1009--1020 Ismael Gutiérrez Garc\'ìa and Daladier Jabba Molinares and Ivan Molina Naizir A novel maximum distance separable code to generate universal identifiers . . . 1021--1035 Yana Liang and Jiali Cao and Xingfa Chen and Shiping Cai and Xiang Fan Linear complexity of Ding--Helleseth generalized cyclotomic sequences of order eight . . . . . . . . . . . . . . 1037--1056 Libo Wang and Baofeng Wu and Xiaoqiang Yue and Yanbin Zheng Further results on permutation trinomials with Niho exponents . . . . . 1057--1068 Aleksandar Radonjic and Vladimir Vujicic Integer codes correcting sparse byte errors . . . . . . . . . . . . . . . . . 1069--1077 S. Hod\vzi\'c and E. Pasalic and A. Chattopadhyay An iterative method for linear decomposition of index generating functions . . . . . . . . . . . . . . . 1079--1102 Cem Güneri and Ferruh Özbudak and Elif Saçikara A concatenated construction of linear complementary pair of codes . . . . . . 1103--1114 Allison Beemer and Kathryn Haymaker and Christine A. Kelley Absorbing sets of codes from finite geometries . . . . . . . . . . . . . . . 1115--1131 Chunming Tang and Yanfeng Qi and Dongmei Huang Regular $p$-ary bent functions with five terms and Kloosterman sums . . . . . . . 1133--1144
Lilya Budaghyan and Claude Carlet and Tor Helleseth Editorial: Special issue on Boolean functions and their applications 2018 1145--1146 Anne Canteaut and Léo Perrin and Shizhu Tian If a generalised butterfly is APN then it operates on 6 bits . . . . . . . . . 1147--1164 Nikolay S. Kaleyski Changing APN functions at two points . . 1165--1184 Deng Tang and Jian Liu A family of weightwise (almost) perfectly balanced boolean functions with optimal algebraic immunity . . . . 1185--1197 Xiang-dong Hou On a class of permutation trinomials in characteristic 2 . . . . . . . . . . . . 1199--1210 Claude Gravel and Daniel Panario and David Thomson Unicyclic strong permutations . . . . . 1211--1231 Wilfried Meidl and Alexander Pott Generalized bent functions into $ \mathbb {Z}_{p^k} $ from the partial spread and the Maiorana--McFarland class 1233--1245 Sihem Mesnager and Constanza Riera and Pantelimon Stanica Multiple characters transforms and generalized Boolean functions . . . . . 1247--1260 Gaojun Luo and Xiwang Cao and Sihem Mesnager Several new classes of self-dual bent functions derived from involutions . . . 1261--1273 N. Cepak and E. Pasalic and A. Muratovi\'c-Ribi\'c Frobenius linear translators giving rise to new infinite classes of permutations and bent functions . . . . . . . . . . . 1275--1295 Ferruh Özbudak and RumI MelIh Pelen Strongly regular graphs arising from non-weakly regular bent functions . . . 1297--1306 Patrick G. Cesarz and Robert S. Coulter Image sets with regularity of differences . . . . . . . . . . . . . . 1307--1337 Luís T. A. N. Brandão and Çagdas Çalik and Meltem Sönmez Turan and René Peralta Upper bounds on the multiplicative complexity of symmetric Boolean functions . . . . . . . . . . . . . . . 1339--1362
Yun Gao and Weijun Fang and Fang-Wei Fu On the algebraic structure of quasi-cyclic codes of index $ 1 \frac {1}{2} $ . . . . . . . . . . . . . . . . 1--18 Sihem Mesnager and Kwang Ho Kim and Junyop Choe and Chunming Tang On the Menezes--Teske--Weng conjecture 19--27 Zexia Shi and Fang-Wei Fu The primitive idempotents of irreducible constacyclic codes and LCD cyclic codes 29--52 Minjia Shi and Hongwei Zhu and Liqin Qian and Lin Sok and Patrick Solé On self-dual and LCD double circulant and double negacirculant codes over $ \mathbb {F}_q + u \mathbb {F}_q $ . . . 53--70 Moshe Milshtein A new two-error-correcting binary code of length 16 . . . . . . . . . . . . . . 71--75 Deng Tang and Haode Yan and Zhengchun Zhou and Xiaosong Zhang A new lower bound on the second-order nonlinearity of a class of monomial bent functions . . . . . . . . . . . . . . . 77--83 L. Budaghyan and Marco Calderini and I. Villa On relations between CCZ- and EA-equivalences . . . . . . . . . . . . 85--100 Adel Alahmadi and Cem Güneri and Buket Özkaya and Hatoon Shoaib and Patrick Solé On complementary dual multinegacirculant codes . . . . . . . . . . . . . . . . . 101--113 Suman Roy and Srinivasan Krishnaswamy On the frequency of symbols in sequences generated by nonlinear Feedforward generators . . . . . . . . . . . . . . . 115--126 Steven T. Dougherty and Joseph Gildea and Abidin Kaya Quadruple bordered constructions of self-dual codes from group rings . . . . 127--146 Fengwei Li and Qin Yue and Yansheng Wu Designed distances and parameters of new LCD BCH codes over finite fields . . . . 147--163
Tailin Niu and Kangquan Li and Longjiang Qu and Qiang Wang New constructions of involutions over finite fields . . . . . . . . . . . . . 165--185 Guanmin Guo and Ruihu Li and Yang Liu and Junli Wang A family of negacyclic BCH codes of length $ n = \frac {q^{2m} - 1}{2} $ . . 187--203 Li Shuai and Lina Wang and Li Miao and Xianwei Zhou Differential uniformity of the composition of two functions . . . . . . 205--220 Aleksandar Radonjic and Vladimir Vujicic Integer codes correcting burst asymmetric within a byte and double asymmetric errors . . . . . . . . . . . 221--230 Aleksandar Radonjic and Vladimir Vujicic Correction to: Integer codes correcting burst asymmetric errors within a byte and double asymmetric errors . . . . . . 231--231 Zhongxiao Wang and Qunxiong Zheng and Wenfeng Qi The cycle structure of NFSR($ f^d$) and its applications . . . . . . . . . . . . 233--252 Ting Yao and Shixin Zhu $ \mathbb {Z}_p \mathbb {Z}_{p^s} $-additive cyclic codes are asymptotically good . . . . . . . . . . 253--264 Zhonghua Sun and Shixin Zhu and Liqi Wang A class of constacyclic BCH codes . . . 265--284 Makoto Araya and Masaaki Harada On the minimum weights of binary linear complementary dual codes . . . . . . . . 285--300 Yuan Cao and Yonglin Cao Complete classification for simple root cyclic codes over the local ring $ \mathbb {Z}_4 [v] \slash \langle v^2 + 2 v \rangle $ . . . . . . . . . . . . . . 301--319
Tor Helleseth and Wai Ho Mow and Zhengchun Zhou Editorial: Special issue on sequences and their applications 2018 . . . . . . 321--323 Dan Zhang and Matthew Geoffrey Parker and Tor Helleseth Polyphase zero correlation zone sequences from generalised bent functions . . . . . . . . . . . . . . . 325--335 Evgeny Krengel One construction of perfect ternary sequences . . . . . . . . . . . . . . . 337--347 Yajing Zhou and Zhengchun Zhou and Yong Wang Two constructions for $ 16$-QAM complementary sequence sets with non-power-of-two length . . . . . . . . 349--362 Yang Yang and Chunlei Li New quaternary sequences with optimal odd-periodic autocorrelation magnitude 363--374 Deng Tang and Xia Li A note on the minimal binary linear code 375--388 Domingo Gómez-Pérez and Ana I. Gómez and Andrew Tirkel Large families of sequences for CDMA, frequency hopping, and UWB . . . . . . . 389--403 Hongyu Han and Sheng Zhang and Xing Liu Decimated $m$-sequences families with optimal partial Hamming correlation . . 405--413 Zhimin Sun and Xiangyong Zeng and Da Lin On the $N$-th maximum order complexity and the expansion complexity of a Rudin--Shapiro-like sequence . . . . . . 415--426 Chunlei Li and Yang Yang On three conjectures of binary sequences with low odd-periodic autocorrelation 427--442 Minjia Shi and Chenchen Wang and Yaoqiang Chang One-weight and two-weight $ \mathbb {Z}_2 \mathbb {Z}_2 [u, v] $ -additive codes . . . . . . . . . . . . . . . . . 443--454 Sihem Mesnager On generalized hyper-bent functions . . 455--468 Shuxing Li and Alexander Pott A direct construction of primitive formally dual pairs having subsets with unequal sizes . . . . . . . . . . . . . 469--483 Limengnan Zhou and Hongyu Han and Xing Liu Frequency-hopping sequence sets with no-hit-zone through Cartesian product 485--497 Malcolm Egan Properties of tight frames that are regular schemes . . . . . . . . . . . . 499--510 Yansheng Wu and Qin Yue and Xiaomeng Zhu Binary and ternary sequences with a few cross correlations . . . . . . . . . . . 511--525 Lilya Budaghyan and Nikolay S. Kaleyski and Pantelimon Stanica Partially APN Boolean functions and classes of functions that are not APN infinitely often . . . . . . . . . . . . 527--545 Xiwang Cao and Gaojun Luo and Guangkui Xu Three deterministic constructions of compressed sensing matrices with low coherence . . . . . . . . . . . . . . . 547--558 Xia Li and Cuiling Fan and Xiaoni Du A family of distance-optimal minimal linear codes with flexible parameters 559--567 Chengju Li and Qin Yue and Wei Peng A class of exponential sums and sequence families . . . . . . . . . . . . . . . . 569--584 Zilong Wang and Jinjin Chai and Guang Gong The Fourier spectral characterization for the correlation-immune functions over $ \mathbb {F}_p $ . . . . . . . . . 585--595 Ch. Srikanth Certain sequence of arithmetic progressions and a new key sharing method . . . . . . . . . . . . . . . . . 597--612 Krishna Gopal Benerjee and Manish K. Gupta On non-uniform flower codes . . . . . . 613--643
Zihui Liu and Jinliang Wang Notes on generalized Hamming weights of some classes of binary codes . . . . . . 645--657 Sihem Mesnager and Kwang Ho Kim and Myong Song Jo On the number of the rational zeros of linearized polynomials and the second-order nonlinearity of cubic Boolean functions . . . . . . . . . . . 659--674 Yuhua Sun and Tongjiang Yan and Lianhai Wang The $2$-adic complexity of a class of binary sequences with optimal autocorrelation magnitude . . . . . . . 675--683 Christof Beierle and Alex Biryukov and Aleksei Udovenko On degree-$d$ zero-sum sets of full rank 685--710 Jasvinder Singh and Manish Gupta and Jaskarn Singh Bhullar On the search of smallest QC-LDPC code with girth six and eight . . . . . . . . 711--723 Lu Zhao About the linear complexity of quaternary sequences with even length 725--741 Binbin Pang and Shixin Zhu and Xiaoshan Kai Some new bounds on LCD codes over finite fields . . . . . . . . . . . . . . . . . 743--755 J. A. Armario and D. L. Flannery Almost supplementary difference sets and quaternary sequences with optimal autocorrelation . . . . . . . . . . . . 757--768 Joe Gildea and Rhian Taylor and A. Tylyshchak Double bordered constructions of self-dual codes from group rings over Frobenius rings . . . . . . . . . . . . 769--784 José Ortiz-Ubarri New asymptotically optimal three-dimensional wave-length/space/time optical orthogonal codes for OCDMA systems . . . . . . . . . . . . . . . . 785--794 Liqin Hu and Keqin Feng The minimum distance of new generalisations of the punctured binary Reed--Muller codes . . . . . . . . . . . 795--808 Sihem Mesnager and Kwang Ho Kim and Dae Song Go Solving $ x + x^{2^l} + \cdots + x^{2^{ml}} = a $ over $ \mathbb {F}_{2^n} $ . . . . . . . . . . . . . . 809--817
Lilya Budaghyan and Tor Helleseth Editorial: Special issue on Boolean functions and their applications . . . . 819--820 Marco Calderini On the EA-classes of known APN functions in small dimensions . . . . . . . . . . 821--840 Patrick Felke The multivariate method strikes again: New power functions with low differential uniformity in odd characteristic . . . . . . . . . . . . . 841--857 A. Musukwa and M. Sala On the linear structures of balanced functions and quadratic APN functions 859--880 Aleksandr Kutsenko The group of automorphisms of the set of self-dual bent functions . . . . . . . . 881--898 Ayça Çesmelioglu and Wilfried Meidl and Alexander Pott Vectorial bent functions in odd characteristic and their components . . 899--912 Tekgül Kalayci and Henning Stichtenoth and Alev Topuzoglu Permutation polynomials and factorization . . . . . . . . . . . . . 913--934 Çagdas Çalik and Meltem Sönmez Turan and René Peralta Boolean functions with multiplicative complexity 3 and 4 . . . . . . . . . . . 935--946 Pavol Zajac and Matús Jókay Cryptographic properties of small bijective $S$-boxes with respect to modular addition . . . . . . . . . . . . 947--963 Nian Li and Sihem Mesnager Recent results and problems on constructions of linear codes from cryptographic functions . . . . . . . . 965--986 Wrya K. Kadir and Chunlei Li On decoding additive generalized twisted Gabidulin codes . . . . . . . . . . . . 987--1009 Cunsheng Ding and Chunming Tang Combinatorial $t$-designs from special functions . . . . . . . . . . . . . . . 1011--1033 Luis A. Medina and Matthew G. Parker and Pantelimon Stanica Root-Hadamard transforms and complementary sequences . . . . . . . . 1035--1049 Yuri Borissov and Lyubomir Borissov A note on the distinctness of some Kloosterman sums . . . . . . . . . . . . 1051--1056
Büsra Özden and Oguz Yayla Almost $p$-ary sequences . . . . . . . . 1057--1069 Jing Jiang and Minquan Cheng Regular $ (k, R, 1) $-packings with $ \max (R) = 3 $ and their locally repairable codes . . . . . . . . . . . . 1071--1089 Nurdagül Anbar and Canan Kasikçi and Alev Topuzoglu Shifted plateaued functions and their differential properties . . . . . . . . 1091--1105 Yuan Cao and Yonglin Cao and Fang-Wei Fu Correcting mistakes in the paper ``A mass formula for negacyclic codes of length $ 2^k $ and some good negacyclic codes over $ \mathbb {Z}_4 + u \mathbb {Z}_4 $'' [Cryptogr. Commun. (2017) 9:241--272] . . . . . . . . . . . . . . 1107--1110 Xiaoqiang Wang and Dabin Zheng The subfield codes of several classes of linear codes . . . . . . . . . . . . . . 1111--1131 Christof Beierle and Gregor Leander $4$-uniform permutations with null nonlinearity . . . . . . . . . . . . . . 1133--1141 Lijing Zheng and Jie Peng and Yanjun Li Several new infinite families of bent functions via second order derivatives 1143--1160 Marco Calderini and Irene Villa On the boomerang uniformity of some permutation polynomials . . . . . . . . 1161--1178 Faruk Göloglu Inverse function is not component-wise uniform . . . . . . . . . . . . . . . . 1179--1194 Xia Wu and Wei Lu and Xiwang Cao Two constructions of asymptotically optimal codebooks via the trace functions . . . . . . . . . . . . . . . 1195--1211
Xiaolei Fang and Meiqing Liu and Jinquan Luo On Euclidean Hulls of MDS Codes . . . . 1--14 Ming Yan and Tongjiang Yan and Yu Li Computing the $2$-adic complexity of two classes of Ding--Helleseth generalized cyclotomic sequences of periods of twin prime products . . . . . . . . . . . . . 15--26 Wateekorn Sriwirach and Chakkrid Klin-eam Repeated-root constacyclic codes of length $ 2 p^s $ over $ \mathbb {F}_{p^m} + u \mathbb {F}_{p^m} + u^2 \mathbb {F}_{p^m} $ . . . . . . . . . . 27--52 Minfeng Shao and Ying Miao Algebraic manipulation detection codes via highly nonlinear functions . . . . . 53--69 Swapan Maiti and Dipanwita Roy Chowdhury Design of fault-resilient S-boxes for AES-like block ciphers . . . . . . . . . 71--100 Junru Ma and Jinquan Luo On symbol-pair weight distribution of MDS codes and simplex codes over finite fields . . . . . . . . . . . . . . . . . 101--115 Can Xiang and Wenjuan Yin Two families of subfield codes with a few weights . . . . . . . . . . . . . . 117--127 Refia Aksoy and Fatma Çaliskan Self-dual codes over $ \mathbb {F}_2 \times (\mathbb {F}_2 + v \mathbb {F}_2) $ . . . . . . . . . . . . . . . . . . . 129--141 Krishna Gopal Benerjee and Sourav Deb and Manish K. Gupta On conflict free DNA codes . . . . . . . 143--171 Xiaoqiang Wang and Dabin Zheng and Yan Zhang A class of subfield codes of linear codes and their duals . . . . . . . . . 173--196
B. Rega and Z. H. Liu and C. Durairajan The $t$-wise intersection and trellis of relative four-weight codes . . . . . . . 197--223 Liqin Qian and Xiwang Cao and Sihem Mesnager Linear codes with one-dimensional hull associated with Gaussian sums . . . . . 225--243 He Zhang and Xiwang Cao Further constructions of cyclic subspace codes . . . . . . . . . . . . . . . . . 245--262 Iliya Bouyukliev and Stefka Bouyuklieva and Paskal Piperkov Characteristic vector and weight distribution of a linear code . . . . . 263--282 Nurdagül Anbar and Canan Kasikci Permutations polynomials of the form $ G(X)^k - L(X) $ and curves over finite fields . . . . . . . . . . . . . . . . . 283--294 Pantelimon Stanica and Aaron Geary The $c$-differential behavior of the inverse function under the EA-equivalence . . . . . . . . . . . . . 295--306 Fanghui Ma and Jian Gao and Fang-Wei Fu $ (\sigma, \delta)$-Skew quasi-cyclic codes over the ring $ \mathbb {Z}_4 + u \mathbb {Z}_4$ . . . . . . . . . . . . . 307--320 Ajeet Kumar and Subhamoy Maitra and Chandra Sekhar Mukherjee On approximate real mutually unbiased bases in square dimension . . . . . . . 321--329 Sophie Huczynska and Christopher Jefferson and Silvia Nepsinská Strong external difference families in abelian and non-abelian groups . . . . . 331--341 Jingwei Zhang and Chuangqiang Hu and Chang-An Zhao Trace representation of the binary $ p q^2$-periodic sequences derived from Euler quotients . . . . . . . . . . . . 343--359 Refia Aksoy and Fatma Çaliskan Correction to: Self-dual codes over $ \mathbb {F}_2 \times (\mathbb {F}_2 + v \mathbb {F}_2) $ . . . . . . . . . . . . 361--362
Mustafa Faraj and Catherine Gebotys Quiescent photonics side channel analysis: Low cost SRAM readout attack 363--376 Faruk Göloglu and Jirí Pavl\du On CCZ-inequivalence of some families of almost perfect nonlinear functions to permutations . . . . . . . . . . . . . . 377--391 Wengang Jin and Xiaoni Du and Cuiling Fan Boolean functions with six-valued Walsh spectra and their application . . . . . 393--405 Zhiwen He and Jiejing Wen Linear codes of 2-designs as subcodes of the generalized Reed--Muller codes . . . 407--423 Briji J. Chathely and Rajendra P. Deore Construction of binary Hadamard codes and their $s$-PD sets . . . . . . . . . 425--438 Daniele Bartoli and Matteo Bonini and Burçin Günes An inductive construction of minimal codes . . . . . . . . . . . . . . . . . 439--449 Aniruddha Biswas and Palash Sarkar Separation results for boolean function classes . . . . . . . . . . . . . . . . 451--458 Yubo Li and Kangquan Li and Longjiang Qu More permutations and involutions for constructing bent functions . . . . . . 459--473
Yves Aubry and Pierre Barthélémy and Nadia El Mrabet Special issue from mathematics to embedded devices . . . . . . . . . . . . 475--477 Dmitrii Koshelev Hashing to elliptic curves of $j$-invariant 1728 . . . . . . . . . . . 479--494 Stéphane Ballet and Alexis Bonnecaze and Thanh-Hung Dang Optimization of the scalar complexity of Chudnovsky$^2$ multiplication algorithms in finite fields . . . . . . . . . . . . 495--517 Sarah Bordage and Julien Lavauzelle On the privacy of a code-based single-server computational PIR scheme 519--526 Wei Cheng and Sylvain Guilley and Jean-Luc Danger Categorizing all linear codes of IPM over $ \mathbb {F}_{2^8} $ . . . . . . . 527--542 Simon Landry and Yanis Linge and Emmanuel Prouff Monomial evaluation of polynomial functions protected by threshold implementations --- with an illustration on AES . . . . . . . . . . . . . . . . . 543--572 Charles-Henry Bertrand Van Ouytsel and Olivier Bronchain and François-Xavier Standaert How to fool a black box machine learning based side-channel security evaluation 573--585 Charles Momin and Olivier Bronchain and François-Xavier Standaert A stealthy Hardware Trojan based on a Statistical Fault Attack . . . . . . . . 587--600
S. T. Dougherty and Joe Gildea and Serap Sahinkaya $G$-codes, self-dual $G$-codes and reversible $G$-codes over the ring $ \mathscr {B}_{j, k}$ . . . . . . . . . . 601--616 Yanhong Fan and Sihem Mesnager and Meiqin Wang Investigation for 8-bit SKINNY-like S-boxes, analysis and applications . . . 617--636 Enes Pasalic and René Rodríguez and Yongzhuang Wei Several classes of minimal binary linear codes violating the Ashikhmin--Barg bound . . . . . . . . . . . . . . . . . 637--659 Jingjie Lv and Ruihu Li and Yu Yao Quasi-cyclic constructions of asymmetric quantum error-correcting codes . . . . . 661--680 Xiang-dong Hou A power sum formula by Carlitz and its applications to permutation rational functions of finite fields . . . . . . . 681--694 Pavan Kumar and Noor Mohammad Khan A class of linear codes with their complete weight enumerators over finite fields . . . . . . . . . . . . . . . . . 695--725 Xiaoping Shi and Qin Yue and Xinmei Huang Quantum synchronizable codes from the Whiteman's generalized cyclotomy . . . . 727--739 Pierrick Méaux On the fast algebraic immunity of threshold functions . . . . . . . . . . 741--762 Chen Liu and Shuaijun Liu and Zhengchun Zhou Three-phase $Z$-complementary triads and almost complementary triads . . . . . . 763--773 K. T. Arasu and Daniel M. Gordon and Yiran Zhang New nonexistence results on circulant weighing matrices . . . . . . . . . . . 775--789 Damien Jamet and Pierre Popoli and Thomas Stoll Maximum order complexity of the sum of digits function in Zeckendorf base and polynomial subsequences . . . . . . . . 791--814 Lukas Kölsch and Robert Schüler Formal self duality . . . . . . . . . . 815--836 Kamil Otal and Eda Tekin Efficient generation of quadratic cyclotomic classes for shortest quadratic decompositions of polynomials 837--845 Ge Yao and Udaya Parampalli Cryptanalysis of the class of maximum period Galois NLFSR-based stream ciphers 847--864 Zibi Xiao and Xiangyong Zeng 2-Adic complexity of two constructions of binary sequences with period $ 4 N $ and optimal autocorrelation magnitude 865--885
Lilya Budaghyan and Claude Carlet and Kaisa Nyberg Editorial: Special issue on Boolean functions and their applications 2020 887--889 Pantelimon Stanica and Constanza Riera and Anton Tkachenko Characters, Weil sums and $c$-differential uniformity with an application to the perturbed Gold function . . . . . . . . . . . . . . . . 891--907 Nikolay Kolomeec Some general properties of modified bent functions through addition of indicator functions . . . . . . . . . . . . . . . 909--926 Cunsheng Ding and Chunming Tang The linear codes of $t$-designs held in the Reed--Muller and Simplex codes . . . 927--949 Sihem Mesnager and Sihong Su On constructions of weightwise perfectly balanced Boolean functions . . . . . . . 951--979 Benjamin Chase and Petr Lisonek Kim-type APN functions are affine equivalent to Gold functions . . . . . . 981--993 Nikolay S. Kaleyski Invariants for EA- and CCZ-equivalence of APN and AB functions . . . . . . . . 995--1023 Jian Ding and Changlu Lin and Sihem Mesnager Secret sharing schemes based on the dual of Golay codes . . . . . . . . . . . . . 1025--1041
Dandan Wang and Xiwang Cao A family of optimal ternary cyclic codes with minimum distance five and their duals . . . . . . . . . . . . . . . . . 1--13 A. Allahmadi and A. AlKenani and P. Solé New constructions of entanglement-assisted quantum codes . . 15--37 A. Allahmadi and A. AlKenani and P. Solé Correction to: New constructions of entanglement-assisted quantum codes . . 39--39 Siemen Dhooghe and Svetla Nikova Resilient uniformity: applying resiliency in masking . . . . . . . . . 41--58 Habibul Islam and Om Prakash Construction of LCD and new quantum codes from cyclic codes over a finite non-chain ring . . . . . . . . . . . . . 59--73 Kwang Ho Kim and Sihem Mesnager and Dok Nam Lee Preimages of $p$-Linearized Polynomials over $ \mathbb {F}_p$ . . . . . . . . . 75--86 Huimin Lao and Hao Chen and Xiaoqing Tan New constant dimension subspace codes from block inserting constructions . . . 87--99 S. Kudin and E. Pasalic and F. Zhang Permutations without linear structures inducing bent functions outside the completed Maiorana--McFarland class . . 101--116 Vishnupriya Anupindi and László Mérai Linear complexity of some sequences derived from hyperelliptic curves of genus 2 . . . . . . . . . . . . . . . . 117--134 Zhi Gu and Zhengchun Zhou and Udaya Parampalli A new family of polyphase sequences with low correlation . . . . . . . . . . . . 135--144 Xiaolei Fang and Renjie Jin and Wen Ma New Galois Hulls of GRS Codes and Application to EAQECCs . . . . . . . . . 145--159 Qianhong Wan and Chao Li On equivalence between two known families of APN polynomial functions and APN power functions . . . . . . . . . . 161--182
Vladimir Edemskiy and Yuhua Sun The symmetric 2-adic complexity of sequences with optimal autocorrelation magnitude and length $ 8 q $ . . . . . . 183--199 Yongfeng Niu and Qin Yue and Daitao Huang New constant dimension subspace codes from parallel linkage construction and multilevel construction . . . . . . . . 201--214 Yan Liu and Xiwang Cao A class of affine-invariant codes and their support 2-designs . . . . . . . . 215--227 Ge Yao and Udaya Parampalli Improved transformation algorithms for generalized Galois NLFSRs . . . . . . . 229--258 Heqian Xu and Wei Du Hermitian LCD codes over $ \mathbb {F}_{q^2} + u \mathbb {F}_{q^2} $ and their applications to maximal entanglement EAQECCs . . . . . . . . . . 259--269 Nikolay Kaleyski Deciding EA-equivalence via invariants 271--290 Limengnan Zhou and Xing Liu and Changyuan Wang Classes of optimal low-hit-zone frequency-hopping sequence sets with new parameters . . . . . . . . . . . . . . . 291--306 Limengnan Zhou and Hanzhou Wu Multi-party watermark embedding with frequency-hopping sequences . . . . . . 307--318 Lilya Budaghyan and Nikolay Kaleyski and Pantelimon Stanica On the behavior of some APN permutations under swapping points . . . . . . . . . 319--345 Xing Liu and Shaofang Hong and Limengnan Zhou NHZ frequency hopping sequence sets under aperiodic Hamming correlation: Tighter bound and optimal constructions 347--356 Haode Yan On $ ( - 1)$-differential uniformity of ternary APN power functions . . . . . . 357--369 Sha Jiang and Kangquan Li and Longjiang Qu Differential and boomerang spectrums of some power permutations . . . . . . . . 371--393 Vladimir Edemskiy and Nikita Sokolovskiy The estimate of the linear complexity of generalized cyclotomic binary and quaternary sequences with periods $ p^n $ and $ 2 p^n $ . . . . . . . . . . . . 395--414 Guangkui Xu and Longjiang Qu and Gaojun Luo Minimal linear codes from weakly regular bent functions . . . . . . . . . . . . . 415--431 Michael Vielhaber and Mónica del Pilar Canales Chacón and Sergio Jara Ceballos Rational complexity of binary sequences, F$ \mathbb {Q} $SRs, and pseudo-ultrametric continued fractions in $ \mathbb {R} $ . . . . . . . . . . . 433--457 Ana Salagean and Pantelimon Stanica Improving bounds on probabilistic affine tests to estimate the nonlinearity of Boolean functions . . . . . . . . . . . 459--481 Haitao Li and Yang Liu and Gang Wang Jump and hop randomness tests for binary sequences . . . . . . . . . . . . . . . 483--502
Ángela Barbero and Vitaly Skachek and Òyvind Ytrehus Preface of special issue on coding theory and applications . . . . . . . . 503--503 Jaime Gutierrez Attacking the linear congruential generator on elliptic curves via lattice techniques . . . . . . . . . . . . . . . 505--525 Ajeet Kumar and Subhamoy Maitra Resolvable block designs in construction of approximate real MUBs that are sparse 527--549 Raj Kumar and Maheshanand Bhaintwal Repeated root cyclic codes over $ \mathbb {Z}_{p^2} + u \mathbb {Z}_{p^2} $ and their Lee distances . . . . . . . 551--577 Fengwei Li The Hermitian dual-containing LCD BCH codes and related quantum codes . . . . 579--596 Huicong Liang and Sihem Mesnager and Meiqin Wang Cryptanalysis of the AEAD and hash algorithm DryGASCON . . . . . . . . . . 597--625 Minjia Shi and Shitao Li and Patrick Solé LCD and ACD codes over a noncommutative non-unital ring with four elements . . . 627--640 Can Xiang Some $t$-designs from BCH codes . . . . 641--652 Xia Li and Qin Yue and Deng Tang The second-order zero differential spectra of almost perfect nonlinear functions and the inverse function in odd characteristic . . . . . . . . . . . 653--662 Kaiqiang Liu and Qi Wang and Haode Yan A class of binary cyclic codes with optimal parameters . . . . . . . . . . . 663--675 Weijun Fang and Jun Zhang and Fang-Wei Fu New constructions of self-dual generalized Reed--Solomon codes . . . . 677--690
Sihem Mesnager and Bimal Mandal and Mounira Msahli Survey on recent trends towards generalized differential and boomerang uniformities . . . . . . . . . . . . . . 691--735 Wilfried Meidl A survey on $p$-ary and generalized bent functions . . . . . . . . . . . . . . . 737--782 László Mérai and Arne Winterhof Pseudorandom sequences derived from automatic sequences . . . . . . . . . . 783--815 Bingsheng Shen and Yang Yang and Zhengchun Zhou New $z$-complementary/complementary sequence sets with non-power-of-two length and low PAPR . . . . . . . . . . 817--832 Makoto Araya and Masaaki Harada On the classification of quaternary optimal Hermitian LCD codes . . . . . . 833--847 Yongjin Jeon and Seungjun Baek and Jongsung Kim Differential uniformity and linearity of S-boxes by multiplicative complexity . . 849--874 Xia Wu and Wei Lu and Xiwang Cao Minimal linear codes constructed from functions . . . . . . . . . . . . . . . 875--895 Ravi B. D. Figueiredo and Juliano B. Lima Tangent-Chebyshev maps over finite fields: New properties and functional graphs . . . . . . . . . . . . . . . . . 897--908 Hai Q. Dinh and Narendra Kumar and Abhay Kumar Singh A study of quantum codes obtained from cyclic codes over a non-chain ring . . . 909--923 Daniele Bartoli and Marco Timpanella On a conjecture on APN permutations . . 925--931 Seyda Köse and Ferruh Özbudak Factorization of some polynomials over finite local commutative rings and applications to certain self-dual and LCD codes . . . . . . . . . . . . . . . 933--948
Lin Sok MDS linear codes with one-dimensional hull . . . . . . . . . . . . . . . . . . 949--971 Maryam Izadi and Arezoo Soufi Karbaski and Rashid Rezaei and Karim Samei Isodual codes over $ \mathbb {F}_q $ from a multiplier . . . . . . . . . . . 973--982 Shanding Xu Optimal frequency-hopping sequences based on the decimated $m$-sequences . . 983--998 Lei Sun and Zexia Shi and Jian Liu and Fang-Wei Fu Results on the nonexistence of bent-negabent rotation symmetric Boolean functions . . . . . . . . . . . . . . . 999--1008 Reguia Lamia Bouzara and Kenza Guenda and Edgar Martínez-Moro Lifted codes and lattices from codes over finite chain rings . . . . . . . . 1009--1020 Shikha Patel and Om Prakash and Habibul Islam Cyclic codes over $ M_4 (\mathbb {F}_2 + u \mathbb {F}_2) $ . . . . . . . . . . . 1021--1034 Shikha Patel and Om Prakash and Habibul Islam Correction to: Cyclic codes over $ M_4 (\mathbb {F}_2 + u \mathbb {F}_2) $ . . 1035--1037 Fulin Li and Yang Liu and Jiayun Yan and Shixin Zhu A new fair multi-secret sharing scheme based on asymmetric bivariate polynomial 1039--1053 Kezia Saini and Manish Garg On the higher-order nonlinearity of a Boolean bent function class (Constructed via Niho power functions) . . . . . . . 1055--1066 George Petrides A number theoretic view on binary shift registers . . . . . . . . . . . . . . . 1067--1080 Haode Yan and Zhen Li A note on the differential spectrum of a class of power mappings with Niho exponent . . . . . . . . . . . . . . . . 1081--1089 Alexandru Chirvasitu and Thomas Cusick Symbolic dynamics and rotation symmetric Boolean functions . . . . . . . . . . . 1091--1115 Yuan Cao and Yonglin Cao and San Ling and Guidong Wang On the construction of self-dual cyclic codes over $ \mathbb {Z}_4 $ with arbitrary even length . . . . . . . . . 1117--1143 Yu Long Chen and Avijit Dutta and Mridul Nandi Multi-user BBB security of public permutations based MAC . . . . . . . . . 1145--1177 Boran Kim Quantum codes from one-point codes on norm-trace curves . . . . . . . . . . . 1179--1188 Ziteng Huang and Weijun Fang and Fang-Wei Fu Linear $l$-intersection pairs of MDS codes and their applications to AEAQECCs 1189--1206
Lilya Budaghyan and Claude Carlet and Cunsheng Ding and Tor Helleseth Editorial: Special issue on Boolean functions and their applications 2021 1207--1209 Daniele Bartoli and Marco Calderini and Constanza Riera and Pantelimon St\uanic\ua Low $c$-differential uniformity for functions modified on subfields . . . . 1211--1227 Amar Bapi\'c and Enes Pasalic and Fengrong Zhang and Samir Hod\vzi\'c Constructing new superclasses of bent functions from known ones . . . . . . . 1229--1256 Sartaj Ul Hasan and Mohit Pal and Pantelimon Stanica The binary Gold function and its $c$-boomerang connectivity table . . . . 1257--1280 Wrya K. Kadir and Chunlei Li and Ferdinando Zullo Encoding and decoding of several optimal rank metric codes . . . . . . . . . . . 1281--1300 Said Eddahmani and Sihem Mesnager Explicit values of the DDT, the BCT, the FBCT, and the FBDT of the inverse, the gold, and the Bracken--Leander S-boxes 1301--1344 Benjamin Chase and Petr Lisonek Construction of APN permutations via Walsh zero spaces . . . . . . . . . . . 1345--1357 Yuyin Yu and Léo Perrin Constructing more quadratic APN functions with the QAM method . . . . . 1359--1369 Sihem Mesnager and Sihong Su and Jingjing Li and Linya Zhu Concrete constructions of weightwise perfectly balanced (2-rotation symmetric) functions with optimal algebraic immunity and high weightwise nonlinearity . . . . . . . . . . . . . . 1371--1389
Xiaoqin Hong and Xiwang Cao Generalized block inserting for constructing new constant dimension codes . . . . . . . . . . . . . . . . . 1--15 Sandeep Sharma and Anuradha Sharma Multi-twisted additive codes over finite fields are asymptotically good . . . . . 17--33 Lilya Budaghyan and Ivana Ivkovic and Nikolay Kaleyski Triplicate functions . . . . . . . . . . 35--83 Praveen Kumar and Palash Sarkar and Sudhan Majhi and Subhabrata Paul A direct construction of even length ZCPs with large ZCZ ratio . . . . . . . 85--94 Min Li and Yajing Zhou and Wei Su and Yang Yang Constructions of almost complementary pairs based on non-standard Golay sequences . . . . . . . . . . . . . . . 95--110 Indibar Debnath and Om Prakash and Habibul Islam Galois hulls of constacyclic codes over finite fields . . . . . . . . . . . . . 111--127 Indibar Debnath and Om Prakash and Habibul Islam Correction to: Galois hulls of constacyclic codes over finite fields 129--130 Xiang Wang Reconstruction of permutations distorted by single Kendall $ \tau $-errors . . . 131--144 Yu Wang and Xiaoshan Kai and Zhonghua Sun and Shixin Zhu Hermitian dual-containing constacyclic codes over $ \mathbb {F}_{q^2} + v_1 \mathbb {F}_{q^2} + \cdots + v_r \mathbb {F}_{q^2} $ and new quantum codes . . . 145--158 Wenjuan Yin and Can Xiang and Fang-Wei Fu New frequency-hopping sequence sets with good parameters under aperiodic Hamming correlation . . . . . . . . . . . . . . 159--169 Hai Q. Dinh and Tushar Bag and Kanat Abdukhalikov and Sachin Pathak and Ashish K. Upadhyay and Ramakrishna Bandi and Warattaya Chinnakum On a class of skew constacyclic codes over mixed alphabets and applications in constructing optimal and quantum codes 171--198 George Petrides On decompositions of permutation polynomials into quadratic and cubic power permutations . . . . . . . . . . . 199--207 Youcef Maouche Symbol-pair weight distribution of some irreducible cyclic codes . . . . . . . . 209--220
Daitao Huang and Qin Yue and Yongfeng Niu MDS or NMDS LCD codes from twisted Reed--Solomon codes . . . . . . . . . . 221--237 Konstantin Kalgin and Valeriya Idrisova The classification of quadratic APN functions in 7 variables and combinatorial approaches to search for APN functions . . . . . . . . . . . . . 239--256 G. Gong and Z. L. Wang Status of three classes of sequences . . 257--308 Jeffrey Shallit Note on a Fibonacci parity sequence . . 309--315 Gerardo Vega and Félix Hernández The complete weight distribution of a subclass of optimal three-weight cyclic codes . . . . . . . . . . . . . . . . . 317--330 Qian Guo and Erik Mårtensson and Paul Stankovski Wagner Modeling and simulating the sample complexity of solving LWE using BKW-style algorithms . . . . . . . . . . 331--350 Chenmiao Shi and Jie Peng and Lijing Zheng and Shihao Lu On the equivalence between a new family of APN quadrinomials and the power APN functions . . . . . . . . . . . . . . . 351--363 Xiaoshan Quan and Qin Yue and Xia Li and Chengju Li Two classes of 2-weight and 3-weight linear codes in terms of Kloosterman sums . . . . . . . . . . . . . . . . . . 365--380 Xiaoshan Quan and Qin Yue and Xia Li and Chengju Li Correction: Two classes of 2-weight and 3-weight linear codes in terms of Kloosterman sums . . . . . . . . . . . . 381--381 Guanmin Guo and Ruihu Li and Yang Liu and Hao Song Duality of generalized twisted Reed--Solomon codes and Hermitian self-dual MDS or NMDS codes . . . . . . 383--395 Jiabo Wang and Cong Ling Polar coding for Ring--LWE-based public key encryption . . . . . . . . . . . . . 397--431 Selçuk Kavut Improved cryptographic properties of Boolean functions obtained from the neighbourhood of Patterson--Wiedemann functions . . . . . . . . . . . . . . . 433--442 Moshe Milshtein A new binary $ (17, 4, 5) $ constant weight code . . . . . . . . . . . . . . 443--453 Keita Ishizuka Construction of quaternary Hermitian LCD codes . . . . . . . . . . . . . . . . . 455--467 Whan-Hyuk Choi and Cem Güneri and Jon-Lark Kim and Ferruh Özbudak Optimal Binary Linear Complementary Pairs of Codes . . . . . . . . . . . . . 469--486
René Rodríguez and Yongzhuang Wei and Enes Pasalic A theoretical analysis of generalized invariants of bijective S-boxes . . . . 487--512 Fagang Li and Hao Chen and Huimin Lao and Shanxiang Lyu New upper bounds and constructions of multi-erasure locally recoverable codes 513--528 Hai Q. Dinh and Bhanu Pratap Yadav and Tushar Bag and Daniel Panario and Ashish Kumar Upadhyay Self-dual and LCD double circulant and double negacirculant codes over a family of finite rings $ \mathbb {F}_q [v_1, v_2, \ldots, v_t] $ . . . . . . . . . . 529--551 Xiaoru Li and Ziling Heng A construction of optimal locally recoverable codes . . . . . . . . . . . 553--563 Yang Li and Shixin Zhu and Ping Li On MDS codes with Galois hulls of arbitrary dimensions . . . . . . . . . . 565--587 Brahim Boudine and Jamal Laaouine and Mohammed Elhassani Charkani On the classification of ideals over $ R[X] \slash \langle f(X)^{p^s} \rangle $ when $ R = \mathbb {F}_{p^m} + u \mathbb {F}_{p^m} + \ldots + u^n \mathbb {F}_{p^m} $ . . . . . . . . . . . . . . 589--598 Vidya Sagar and Ritumoni Sarma Octanary linear codes using simplicial complexes . . . . . . . . . . . . . . . 599--616 Kaisa Nyberg Modifications of bijective S-boxes with linear structures . . . . . . . . . . . 617--625 Hiroaki Taniguchi D-property for APN functions from $ \mathbb {F}_2^n $ to $ \mathbb {F}_2^{n + 1} $ . . . . . . . . . . . . . . . . . 627--647 Daitao Huang and Qin Yue and Fengwei Li Two classes of quasi-cyclic codes via irreducible polynomials . . . . . . . . 649--659 Ruikai Chen and Sihem Mesnager Evaluation of Weil sums for some polynomials and associated quadratic forms . . . . . . . . . . . . . . . . . 661--673 Daniel Panario and Lucas Pandolfo Perin and Brett Stevens Comparing balanced sequences obtained from ElGamal function to random balanced sequences . . . . . . . . . . . . . . . 675--707 Zhi Gu and Zhengchun Zhou and Avik Ranjan Adhikary and Pingzhi Fan Two-dimensional Golay complementary array pairs with flexible size and large zero correlation zone . . . . . . . . . 709--717 Somantika Datta Welch bound equality sets with few distinct inner products from Delsarte--Goethals sets . . . . . . . . 719--729
Phil Hebborn and Gregor Leander and Aleksei Udovenko Mathematical aspects of division property . . . . . . . . . . . . . . . . 731--774 Ferruh Özbudak and Burcu Gülmez Temür Complete characterization of some permutation polynomials of the form $ x^r (1 + a x^{s_1(q - 1)} + b x^{s_2(q - 1)}) $ over $ \mathbb {F}_{q^2} $ . . . 775--793 Monika Bishnoi and Pankaj Kumar Weight enumerators of some irreducible cyclic codes of odd length . . . . . . . 795--809 Amritanshu Rai and Rohit Gupta Further results on a class of permutation trinomials . . . . . . . . . 811--820 Sampada Tiwari and Deepmala Sharma On higher order nonlinearities of Boolean functions . . . . . . . . . . . 821--830 Yanjun Li and Haibin Kan and Jie Peng and Lijing Zheng Cryptographic functions with interesting properties from CCZ-equivalence . . . . 831--844 Basri Çaliskan and Nuh Aydin and Peihan Liu Skew cyclic codes over $ \mathbb {Z}_4 + u \mathbb {Z}_4 + v \mathbb {Z}_4 $ . . 845--858 Moshe Milshtein Correction: A new binary $ (17, 4, 5) $ constant weight code . . . . . . . . . . 859--859
Jyotirmoy Basak and Subhamoy Maitra and Prabal Paul and Animesh Roy Analysis of boolean functions related to binary input binary output two-party nonlocal games . . . . . . . . . . . . . 861--890 Alireza Abdollahi and Javad Bagherian and Fatemeh Jafari and Maryam Khatami and Farzad Parvaresh and Reza Sobhani New upper bounds on the size of permutation codes under Kendall $ \tau $-metric . . . . . . . . . . . . . . . . 891--903 Yajing Zhou and Xiaoshan Kai and Shixin Zhu Two classes of ternary LCD constacyclic BCH codes . . . . . . . . . . . . . . . 905--919 Zhiye Yang and Zibi Xiao and Xiangyong Zeng Linear complexity and trace representation of balanced quaternary cyclotomic sequences of prime period $p$ 921--940 Jaziel Torres and Ivelisse Rubio Circular Costas maps: A multidimensional analog of circular Costas sequences . . 941--958 Junzhen Sui and Qin Yue and Fuqing Sun New constructions of self-dual codes via twisted generalized Reed--Solomon codes 959--978 Gobinda Ghosh and Sudhan Majhi and Subhabrata Paul Construction of Optimal Binary $Z$-Complementary Code Sets with New Lengths Using Generalized Boolean Function . . . . . . . . . . . . . . . . 979--993 François Rodier and Florian Caullery and Eric Férard Distribution of the autocorrelation of random Boolean functions . . . . . . . . 995--1009 Xianhong Xie and Yi Ouyang and Ming Mao Vectorial bent functions and linear codes from quadratic forms . . . . . . . 1011--1029 Kanat Abdukhalikov and Duy Ho Hyperbent functions from hyperovals . . 1031--1048
Lilya Budaghyan and Claude Carlet and Tor Helleseth and Wilfried Meidl Editorial: Special issue on Boolean functions and their applications 2022 1049--1051 Robert Christian Subroto An algebraic approach to symmetric linear layers in cryptographic primitives . . . . . . . . . . . . . . . 1053--1067 Li-An Chen and Robert S. Coulter Bounds on the differential uniformity of the Wan--Lidl polynomials . . . . . . . 1069--1085 Silvia Mella and Alireza Mehrdad and Joan Daemen Differential and Linear properties of vectorial boolean functions based on chi 1087--1116 Ana Salagean and Ferruh Özbudak Further constructions and characterizations of generalized almost perfect nonlinear functions . . . . . . 1117--1127 Valérie Gillot and Philippe Langevin Classification of some cosets of the Reed--Muller code . . . . . . . . . . . 1129--1137 Nikolay Kaleyski and Kjetil Nesheim and Pantelimon Stanica An infinite family of 0-APN monomials with two parameters . . . . . . . . . . 1139--1169 Marko Djurasevic and Domagoj Jakobovic and Luca Mariot and Stjepan Picek A survey of metaheuristic algorithms for the design of cryptographic Boolean functions . . . . . . . . . . . . . . . 1171--1197 Ana Salagean and Percy Reyes-Paredes Probabilistic estimation of the algebraic degree of Boolean functions 1199--1215 Nurdagül Anbar and Tekgül Kalayci and Wilfried Meidl On generalized spread bent partitions 1217--1234
Sihem Mesnager Special Issue on Contemporary interactions between codes, cryptographic functions and/or sequences 1--2 Fulin Li and Hang Hu and Shixin Zhu and Jiayun Yan A fully dynamic multi-secret sharing scheme with redundant authorization . . 3--20 Xiaoqiang Wang and Cunsheng Ding and Hongwei Liu and Dabin Zheng MDS constacyclic codes of length $q$ + 1 over $ {\rm GF}(q) $ . . . . . . . . . . 21--48 Ruipan Yang and Ruihu Li and Qiang Fu and Sen Yang and Yi Rao On locality of binary distance-optimal codes . . . . . . . . . . . . . . . . . 49--69 Bingsheng Shen and Yang Yang and Pingzhi Fan Preferred $Z$-complementary pairs and their application in Doppler resilient waveform design . . . . . . . . . . . . 71--87 Shilu Liu and Zhengchun Zhou and Avik Ranjan Adhikary and Yang Yang New supersets of Zadoff--Chu sequences via the Weil bound . . . . . . . . . . . 89--108 Eda Tekin and Oliver Wilhelm Gnilke and Ferruh Özbudak and Bernhard Blümich and Marcus Greferath Almost perfect autocorrelation sequences with small number of pauses for applications in magnetic resonance . . . 109--127 N. Zidari\vc and K. Mandal and G. Gong and M. Aagaard The Welch--Gong stream cipher --- evolutionary path . . . . . . . . . . . 129--165 Hongyang Xiao and Xiwang Cao New constructions of mutually orthogonal complementary sets and Z-complementary code sets based on extended Boolean functions . . . . . . . . . . . . . . . 167--184 Xia Li and Qin Yue and Daitao Huang Factorization of invariant polynomials under actions of projective linear groups and its applications in coding theory . . . . . . . . . . . . . . . . . 185--207 Zheng Wang and Zhifan Ye and Chunming Tang and Yang Yang New construction of optimal ZCZ sequence sets with inter-set zero cross-correlation zone . . . . . . . . . 209--228
Abhishek Roy and Sudhan Majhi Lower bounds on the maximum cross-correlations of $2$-D quasi-complementary array sets . . . . . 229--247 Kishan Chand Gupta and Sumit Kumar Pandey and Susanta Samanta On the construction of near-MDS matrices 249--283 Matthias Johann Steiner A lower bound for differential uniformity by multiplicative complexity & bijective functions of multiplicative complexity 1 over finite fields . . . . 285--308 Cheng Che and Tian Tian Further Results on Affine Sub--Families of NFSR Sequences . . . . . . . . . . . 309--321 J. A. Armario and R. Egan and D. L. Flannery Generalized partially bent functions, generalized perfect arrays, and cocyclic Butson matrices . . . . . . . . . . . . 323--337 Xinxin Lv and Cuiling Fan and Yanyan Wang The cross-correlation spectrum of ternary perfect sequences and their decimations . . . . . . . . . . . . . . 339--349 Changhui Chen and Haibin Kan and Jie Peng and Lijing Zheng and Yanjun Li Three classes of permutation quadrinomials in odd characteristic . . 351--365 Gobinda Ghosh and Sudhan Majhi and Shubhabrata Paul A direct construction of optimal 2D-ZCACS with flexible array size and large set size . . . . . . . . . . . . . 367--385 Rohit Gupta and Luciane Quoos and Qiang Wang Some classes of permutation binomials and trinomials of index $ q - 1 $ over $ \mathbb {F}_{q^n} $ . . . . . . . . . . 387--402 Nishant Kumar and Sudhan Majhi and Ashish K. Upadhyay A direct construction of complete complementary code with zero correlation zone property for prime-power length . . 403--426 Xiaoshan Kai and Jiayuan Zhang and Ping Li and Shixin Zhu Construction of binary self-orthogonal codes . . . . . . . . . . . . . . . . . 427--444 François Rodier and Florian Caullery and Eric Férard Periodic autocorrelation of sequences 445--458
Xiaopan Han and Guojun Han and Han Cai and Linxin Yin Locally repairable codes with multiple repair sets based on packings of block size 4 . . . . . . . . . . . . . . . . . 459--479 Marcel Fernandez and John Livieratos and Sebasti\`a Martín Frameproof codes, separable codes and $ B_2 $ codes: Bounds and constructions 481--506 Meng Cao and Jing Yang and Fuchuan Wei On the $ \sigma $ duals and $ \sigma $ hulls of linear codes . . . . . . . . . 507--530 Hamidreza Eyvazi and Karim Samei and Batoul Savari The Homogeneous Gray image of linear codes over the Galois ring $ G R(4, m) $ 531--540 Nishant Kumar and Sudhan Majhi and Sushant K. Jha A new construction of almost-optimal multiple ZCZ sequence sets for multi-cell QS--CDMA system . . . . . . . 541--556 Harshdeep Singh and Kapish Chand Meena MDS multi-twisted Reed--Solomon codes with small dimensional hull . . . . . . 557--578 Jong Yoon Hyun and Nayoung Han and Yoonjin Lee The Griesmer codes of Belov type and optimal quaternary codes via multi-variable functions . . . . . . . . 579--600 Xia Wu and Wei Lu and Xiwang Cao and Gaojun Luo Minimal linear codes constructed from partial spreads . . . . . . . . . . . . 601--611 Xiaoyan Jing and Zhefeng Xu The 4-adic complexity of interleaved quaternary sequences of even period with optimal autocorrelation . . . . . . . . 613--628 Xing Liu Low-hit-zone frequency hopping sequence sets under aperiodic Hamming correlation 629--645 Xing Liu Correction: Low-hit-zone frequency hopping sequence sets under aperiodic Hamming correlation . . . . . . . . . . 647--647 Shuhui Shen and Xiaojun Zhang A class of balanced binary sequences with two-valued non-zero autocorrelation sum and good crosscorrelation sum . . . 649--663 Prity Kumari and Karam Ratan Singh Re-keying analysis in group key management of wireless sensor networks 665--677
Xiao-Juan Wang and Tian Tian and Wen-Feng Qi GL-S-NFSR: a new NFSR structure and its period properties . . . . . . . . . . . 679--698 Jinghui Zhao and Xiuling Shan and Zihong Tian Combinatorial constructions of repairable ramp schemes . . . . . . . . 699--719 Pierrick Méaux and Dibyendu Roy Theoretical differential fault attacks on FLIP and FiLIP . . . . . . . . . . . 721--744 Hanglong Zhang and Xiwang Cao On the parameters of some LCD BCH codes over $ \mathbb {F}_q $ with length $ (q^m + 1) \slash \lambda $ . . . . . . . 745--765 Praveen Kumar and Sudhan Majhi and Subhabrata Paul A direct construction of cross $z$-complementary sequence sets with large set size . . . . . . . . . . . . . 767--777 Shitao Li and Minjia Shi and Huizhou Liu Several constructions of optimal LCD codes over small finite fields . . . . . 779--800 Tingting Wu and Shixin Zhu and Li Liu and Lanqiang Li Optimal quinary cyclic codes with three zeros . . . . . . . . . . . . . . . . . 801--823 Markus Grassl and Ferruh Özbudak and Buket Özkaya and Burcu Gülmez Temür Complete characterization of a class of permutation trinomials in characteristic five . . . . . . . . . . . . . . . . . . 825--841 Erzhong Xue and Zilong Wang and Jinjin Chai Boolean functions of binary Type-II and Type-III/II complementary array pairs 843--855 Canze Zhu and Qunying Liao The $ [1, 0]$-twisted generalized Reed--Solomon code . . . . . . . . . . . 857--878 Fengwei Li and Fanhui Meng and Ziling Heng and Qin Yue An improvement on Weil bounds for character sums of polynomials over finite fields . . . . . . . . . . . . . 879--887 Gülsüm Gözde Yilmazgüç and Javier de la Cruz and Edgar Martínez-Moro Abelian and consta-Abelian polyadic codes over affine algebras with a finite commutative chain coefficient ring . . . 889--907