ISSN:
 1930-5346

eISSN:
 1930-5338

All Issues

Volume 15, 2021

Volume 14, 2020

Volume 13, 2019

Volume 12, 2018

Volume 11, 2017

Volume 10, 2016

Volume 9, 2015

Volume 8, 2014

Volume 7, 2013

Volume 6, 2012

Volume 5, 2011

Volume 4, 2010

Volume 3, 2009

Volume 2, 2008

Volume 1, 2007

Congratulations to AMC Editor in Chief Sihem Mesnager on winning the 2020 George Boole International Prize for her contributions to Boolean functions and their applications for communications (codes and symmetric cryptography)! Learn more about her research and achievements in this news piece.

Advances in Mathematics of Communications (AMC) publishes original research papers of the highest quality in all areas of mathematics and computer science which are relevant to applications in communications technology. For this reason, submissions from many areas of mathematics are invited, provided these show a high level of originality, new techniques, an innovative approach, novel methodologies, or otherwise a high level of depth and sophistication. Any work that does not conform to these standards will be rejected.

Call for Papers: Special Issue entitled “Secure Implementations of Post-Quantum Cryptographic Algorithms and Mathematical Approaches


Note: “Most Cited” is by Cross-Ref , and “Most Downloaded” is based on available data in the new website.

Select all articles

Export/Reference:

Encryption scheme based on expanded Reed-Solomon codes
Karan Khathuria, Joachim Rosenthal and Violetta Weger
2021, 15(2) : 207-218 doi: 10.3934/amc.2020053 +[Abstract](1368) +[HTML](518) +[PDF](373.36KB)
On the dimension of the subfield subcodes of 1-point Hermitian codes
Sabira El Khalfaoui and Gábor P. Nagy
2021, 15(2) : 219-226 doi: 10.3934/amc.2020054 +[Abstract](1043) +[HTML](475) +[PDF](312.64KB)
Construction of minimal linear codes from multi-variable functions
Jong Yoon Hyun, Boran Kim and Minwon Na
2021, 15(2) : 227-240 doi: 10.3934/amc.2020055 +[Abstract](961) +[HTML](503) +[PDF](391.33KB)
Gowers $ U_2 $ norm as a measure of nonlinearity for Boolean functions and their generalizations
Sugata Gangopadhyay, Constanza Riera and Pantelimon Stănică
2021, 15(2) : 241-256 doi: 10.3934/amc.2020056 +[Abstract](1016) +[HTML](493) +[PDF](467.73KB)
Verifying solutions to LWE with implications for concrete security
Palash Sarkar and Subhadip Singha
2021, 15(2) : 257-266 doi: 10.3934/amc.2020057 +[Abstract](938) +[HTML](462) +[PDF](355.45KB)
On the existence of PD-sets: Algorithms arising from automorphism groups of codes
Nicola Pace and Angelo Sonnino
2021, 15(2) : 267-277 doi: 10.3934/amc.2020065 +[Abstract](903) +[HTML](508) +[PDF](384.21KB)
Two classes of near-optimal codebooks with respect to the Welch bound
Gaojun Luo and Xiwang Cao
2021, 15(2) : 279-289 doi: 10.3934/amc.2020066 +[Abstract](862) +[HTML](481) +[PDF](378.41KB)
An explicit representation and enumeration for negacyclic codes of length $ 2^kn $ over $ \mathbb{Z}_4+u\mathbb{Z}_4 $
Yuan Cao, Yonglin Cao, Hai Q. Dinh, Ramakrishna Bandi and Fang-Wei Fu
2021, 15(2) : 291-309 doi: 10.3934/amc.2020067 +[Abstract](964) +[HTML](458) +[PDF](453.4KB)
Cryptographic properties of cyclic binary matrices
Akbar Mahmoodi Rishakani, Seyed Mojtaba Dehnavi, Mohmmadreza Mirzaee Shamsabad and Nasour Bagheri
2021, 15(2) : 311-327 doi: 10.3934/amc.2020068 +[Abstract](956) +[HTML](537) +[PDF](513.17KB)
A note on generalization of bent boolean functions
Bimal Mandal and Aditi Kar Gangopadhyay
2021, 15(2) : 329-346 doi: 10.3934/amc.2020069 +[Abstract](757) +[HTML](415) +[PDF](429.61KB)
Capacity-achieving private information retrieval scheme with a smaller sub-packetization
Wenqin Zhang, Zhengchun Zhou, Udaya Parampalli and Vladimir Sidorenko
2021, 15(2) : 347-363 doi: 10.3934/amc.2020070 +[Abstract](727) +[HTML](431) +[PDF](394.87KB)
Secure and efficient multiparty private set intersection cardinality
Sumit Kumar Debnath, Pantelimon Stǎnicǎ, Nibedita Kundu and Tanmay Choudhury
2021, 15(2) : 365-386 doi: 10.3934/amc.2020071 +[Abstract](881) +[HTML](512) +[PDF](818.16KB)
Some optimal cyclic $ \mathbb{F}_q $-linear $ \mathbb{F}_{q^t} $-codes
Yun Gao, Shilin Yang and Fang-Wei Fu
2020doi: 10.3934/amc.2020072 +[Abstract](615) +[HTML](350) +[PDF](334.93KB)
Ironwood meta key agreement and authentication protocol
Iris Anshel, Derek Atkins, Dorian Goldfeld and Paul E. Gunnells
2020doi: 10.3934/amc.2020073 +[Abstract](695) +[HTML](370) +[PDF](438.53KB)
The $[46, 9, 20]_2$ code is unique
Sascha Kurz
2020doi: 10.3934/amc.2020074 +[Abstract](613) +[HTML](363) +[PDF](262.96KB)
$ s $-PD-sets for codes from projective planes $ \mathrm{PG}(2,2^h) $, $ 5 \leq h\leq 9 $
Dean Crnković, Nina Mostarac, Bernardo G. Rodrigues and Leo Storme
2020doi: 10.3934/amc.2020075 +[Abstract](630) +[HTML](367) +[PDF](330.23KB)
Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem
Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu and Hao Chen
2020doi: 10.3934/amc.2020076 +[Abstract](901) +[HTML](430) +[PDF](511.79KB)
Constructing self-dual codes from group rings and reverse circulant matrices
Joe Gildea, Adrian Korban, Abidin Kaya and Bahattin Yildiz
2020doi: 10.3934/amc.2020077 +[Abstract](691) +[HTML](446) +[PDF](318.98KB)
New optimal error-correcting codes for crosstalk avoidance in on-chip data buses
Muhammad Ajmal and Xiande Zhang
2020doi: 10.3934/amc.2020078 +[Abstract](724) +[HTML](453) +[PDF](349.14KB)
Binary codes from $ m $-ary $ n $-cubes $ Q^m_n $
Jennifer D. Key and Bernardo G. Rodrigues
2020doi: 10.3934/amc.2020079 +[Abstract](634) +[HTML](367) +[PDF](416.63KB)
The differential spectrum of a class of power functions over finite fields
Lei Lei, Wenli Ren and Cuiling Fan
2020doi: 10.3934/amc.2020080 +[Abstract](713) +[HTML](413) +[PDF](317.2KB)
Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack
Nishant Sinha
2020doi: 10.3934/amc.2020081 +[Abstract](582) +[HTML](384) +[PDF](338.67KB)
Infinite families of $ 3 $-designs from o-polynomials
Cunsheng Ding and Chunming Tang
2020doi: 10.3934/amc.2020082 +[Abstract](568) +[HTML](398) +[PDF](328.49KB)
Rank weights for arbitrary finite field extensions
Grégory Berhuy, Jean Fasel and Odile Garotta
2020doi: 10.3934/amc.2020083 +[Abstract](545) +[HTML](277) +[PDF](363.79KB)
Involutory-Multiple-Lightweight MDS Matrices based on Cauchy-type Matrices
Mohsen Mousavi, Ali Zaghian and Morteza Esmaeili
2020doi: 10.3934/amc.2020084 +[Abstract](570) +[HTML](326) +[PDF](465.49KB)
An overview on skew constacyclic codes and their subclass of LCD codes
Ranya Djihad Boulanouar, Aicha Batoul and Delphine Boucher
2020doi: 10.3934/amc.2020085 +[Abstract](744) +[HTML](335) +[PDF](414.84KB)
Quasi-symmetric designs on $ 56 $ points
Vedran Krčadinac and Renata Vlahović Kruc
2020doi: 10.3934/amc.2020086 +[Abstract](512) +[HTML](243) +[PDF](395.43KB)
Correlation distribution of a sequence family generalizing some sequences of Trachtenberg
Ferruh Özbudak and Eda Tekin
2020doi: 10.3934/amc.2020087 +[Abstract](477) +[HTML](267) +[PDF](378.58KB)
Infinite families of 2-designs from a class of non-binary Kasami cyclic codes
Rong Wang, Xiaoni Du and Cuiling Fan
2020doi: 10.3934/amc.2020088 +[Abstract](527) +[HTML](267) +[PDF](376.64KB)
Information set decoding in the Lee metric with applications to cryptography
Anna-Lena Horlemann-Trautmann and Violetta Weger
2020doi: 10.3934/amc.2020089 +[Abstract](480) +[HTML](244) +[PDF](380.68KB)
On finite length nonbinary sequences with large nonlinear complexity over the residue ring $ \mathbb{Z}_{m} $
Lin Yi, Xiangyong Zeng and Zhimin Sun
2020doi: 10.3934/amc.2020091 +[Abstract](412) +[HTML](235) +[PDF](374.08KB)
A generic construction of rotation symmetric bent functions
Junchao Zhou, Nian Li, Xiangyong Zeng and Yunge Xu
2020doi: 10.3934/amc.2020092 +[Abstract](419) +[HTML](227) +[PDF](366.16KB)
$ \mathbb{Z}_{4}\mathbb{Z}_{4}[u] $-additive cyclic and constacyclic codes
Habibul Islam, Om Prakash and Patrick Solé
2020doi: 10.3934/amc.2020094 +[Abstract](554) +[HTML](300) +[PDF](537.79KB)
Several new classes of (balanced) Boolean functions with few Walsh transform values
Tingting Pang, Nian Li, Li Zhang and Xiangyong Zeng
2020doi: 10.3934/amc.2020095 +[Abstract](484) +[HTML](227) +[PDF](342.04KB)
Additive and linear conjucyclic codes over $ {\mathbb{F}}_4 $
Taher Abualrub and Steven T. Dougherty
2020doi: 10.3934/amc.2020096 +[Abstract](406) +[HTML](214) +[PDF](331.6KB)
New quantum codes from constacyclic codes over the ring $ R_{k,m} $
Habibul Islam, Om Prakash and Ram Krishna Verma
2020doi: 10.3934/amc.2020097 +[Abstract](471) +[HTML](303) +[PDF](461.37KB)
Efficient fully CCA-secure predicate encryptions from pair encodings
Mridul Nandi and Tapas Pandit
2020doi: 10.3934/amc.2020098 +[Abstract](368) +[HTML](242) +[PDF](774.26KB)
Locally repairable codes with high availability based on generalised quadrangles
Michel Lavrauw and Geertrui Van de Voorde
2020doi: 10.3934/amc.2020099 +[Abstract](378) +[HTML](211) +[PDF](295.97KB)
Binary sequences derived from differences of consecutive quadratic residues
Arne Winterhof and Zibi Xiao
2020doi: 10.3934/amc.2020100 +[Abstract](339) +[HTML](190) +[PDF](336.56KB)
On the diffusion of the Improved Generalized Feistel
Tsonka Baicheva and Svetlana Topalova
2020doi: 10.3934/amc.2020102 +[Abstract](209) +[HTML](145) +[PDF](395.58KB)
Cryptanalysis and enhancement of multi factor remote user authentication scheme based on signcryption
Vani Rajasekar, Premalatha Jayapaul and Sathya Krishnamoorthi
2020doi: 10.3934/amc.2020103 +[Abstract](389) +[HTML](206) +[PDF](468.4KB)
A geometric characterization of minimal codes and their asymptotic performance
Gianira N. Alfarano, Martino Borello and Alessandro Neri
2020doi: 10.3934/amc.2020104 +[Abstract](408) +[HTML](204) +[PDF](342.53KB)
Orbit codes from forms on vector spaces over a finite field
Angela Aguglia, Antonio Cossidente, Giuseppe Marino, Francesco Pavese and Alessandro Siciliano
2020doi: 10.3934/amc.2020105 +[Abstract](336) +[HTML](187) +[PDF](479.05KB)
Infinite families of 2-designs from two classes of binary cyclic codes with three nonzeros
Xiaoni Du, Rong Wang, Chunming Tang and Qi Wang
2020doi: 10.3934/amc.2020106 +[Abstract](301) +[HTML](193) +[PDF](348.81KB)
Optimal antiblocking systems of information sets for the binary codes related to triangular graphs
Hans-Joachim Kroll, Sayed-Ghahreman Taherian and Rita Vincenti
2020doi: 10.3934/amc.2020107 +[Abstract](345) +[HTML](221) +[PDF](331.8KB)
${\sf {FAST}}$: Disk encryption and beyond
Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas López and Palash Sarkar
2020doi: 10.3934/amc.2020108 +[Abstract](318) +[HTML](160) +[PDF](732.06KB)
Further results on 2-uniform states arising from irredundant orthogonal arrays
Yajuan Zang, Guangzhou Chen, Kejun Chen and Zihong Tian
2020doi: 10.3934/amc.2020109 +[Abstract](278) +[HTML](155) +[PDF](419.56KB)
Two constructions of low-hit-zone frequency-hopping sequence sets
Wenjuan Yin, Can Xiang and Fang-Wei Fu
2020doi: 10.3934/amc.2020110 +[Abstract](303) +[HTML](165) +[PDF](414.16KB)
New self-dual codes of length 68 from a $ 2 \times 2 $ block matrix construction and group rings
Maria Bortos, Joe Gildea, Abidin Kaya, Adrian Korban and Alexander Tylyshchak
2020doi: 10.3934/amc.2020111 +[Abstract](282) +[HTML](162) +[PDF](373.47KB)
On the equivalence of several classes of quaternary sequences with optimal autocorrelation and length $ 2p$
Pinhui Ke, Panpan Qiao and Yang Yang
2020doi: 10.3934/amc.2020112 +[Abstract](273) +[HTML](166) +[PDF](413.1KB)
Efficient arithmetic in (pseudo-)Mersenne prime order fields
Kaushik Nath and Palash Sarkar
2020doi: 10.3934/amc.2020113 +[Abstract](341) +[HTML](129) +[PDF](647.94KB)
Constructions of linear codes with small hulls from association schemes
Ye Wang and Ran Tao
2020doi: 10.3934/amc.2020114 +[Abstract](224) +[HTML](130) +[PDF](407.96KB)
A New Construction of odd-variable Rotation symmetric Boolean functions with good cryptographic properties
Bingxin Wang and Sihong Su
2020doi: 10.3934/amc.2020115 +[Abstract](185) +[HTML](116) +[PDF](433.03KB)
Optimal strategies for CSIDH
Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez
2020doi: 10.3934/amc.2020116 +[Abstract](508) +[HTML](129) +[PDF](889.96KB)
A note on the Signal-to-noise ratio of $ (n, m) $-functions
Yu Zhou, Xinfeng Dong, Yongzhuang Wei and Fengrong Zhang
2020doi: 10.3934/amc.2020117 +[Abstract](208) +[HTML](97) +[PDF](524.5KB)
Rotated $ A_n $-lattice codes of full diversity
Agnaldo José Ferrari and Tatiana Miguel Rodrigues de Souza
2020doi: 10.3934/amc.2020118 +[Abstract](196) +[HTML](82) +[PDF](343.0KB)
New discrete logarithm computation for the medium prime case using the function field sieve
Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh and Emmanuel Thomé
2020doi: 10.3934/amc.2020119 +[Abstract](144) +[HTML](42) +[PDF](403.92KB)
Three classes of partitioned difference families and their optimal constant composition codes
Shanding Xu, Longjiang Qu and Xiwang Cao
2020doi: 10.3934/amc.2020120 +[Abstract](187) +[HTML](149) +[PDF](519.73KB)
Nearly optimal codebooks from generalized Boolean bent functions over $ \mathbb{Z}_{4} $
Junchao Zhou, Yunge Xu, Lisha Wang and Nian Li
2020doi: 10.3934/amc.2020121 +[Abstract](107) +[HTML](60) +[PDF](471.09KB)
Codes over $ \frak m $-adic completion rings
Saadoun Mahmoudi and Karim Samei
2020doi: 10.3934/amc.2020122 +[Abstract](104) +[HTML](43) +[PDF](446.02KB)
Constacyclic codes of length $ 8p^s $ over $ \mathbb F_{p^m} + u\mathbb F_{p^m} $
Hai Q. Dinh, Bac T. Nguyen and Paravee Maneejuk
2020doi: 10.3934/amc.2020123 +[Abstract](141) +[HTML](43) +[PDF](701.66KB)
Complete weight enumerator of torsion codes
Xiangrui Meng and Jian Gao
2020doi: 10.3934/amc.2020124 +[Abstract](99) +[HTML](46) +[PDF](549.13KB)
On ideal $ t $-tuple distribution of orthogonal functions in filtering de bruijn generators
Kalikinkar Mandal and Guang Gong
2020doi: 10.3934/amc.2020125 +[Abstract](176) +[HTML](71) +[PDF](441.83KB)
A practicable timing attack against HQC and its countermeasure
Guillaume Wafo-Tapa, Slim Bettaieb, Loïc Bidoux, Philippe Gaborit and Etienne Marcatel
2020doi: 10.3934/amc.2020126 +[Abstract](142) +[HTML](88) +[PDF](395.88KB)
On $ \sigma $-self-orthogonal constacyclic codes over $ \mathbb F_{p^m}+u\mathbb F_{p^m} $
Hongwei Liu and Jingge Liu
2020doi: 10.3934/amc.2020127 +[Abstract](133) +[HTML](64) +[PDF](419.25KB)
Some results on lightweight stream ciphers Fountain v1 & Lizard
Ravi Anand, Dibyendu Roy and Santanu Sarkar
2020doi: 10.3934/amc.2020128 +[Abstract](153) +[HTML](60) +[PDF](393.41KB)
Codes with few weights arising from linear sets
Vito Napolitano and Ferdinando Zullo
2020doi: 10.3934/amc.2020129 +[Abstract](186) +[HTML](66) +[PDF](323.99KB)
A new almost perfect nonlinear function which is not quadratic
Yves Edel and Alexander Pott
2009, 3(1) : 59-81 doi: 10.3934/amc.2009.3.59 +[Abstract](4126) +[PDF](288.3KB) Cited By(68)
A new family of linear maximum rank distance codes
John Sheekey
2016, 10(3) : 475-488 doi: 10.3934/amc.2016019 +[Abstract](5229) +[PDF](390.1KB) Cited By(51)
Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
Anton Stolbunov
2010, 4(2) : 215-235 doi: 10.3934/amc.2010.4.215 +[Abstract](4535) +[PDF](304.1KB) Cited By(42)
Skew constacyclic codes over Galois rings
Delphine Boucher, Patrick Solé and Felix Ulmer
2008, 2(3) : 273-292 doi: 10.3934/amc.2008.2.273 +[Abstract](4093) +[PDF](247.3KB) Cited By(40)
Complementary dual codes for counter-measures to side-channel attacks
Claude Carlet and Sylvain Guilley
2016, 10(1) : 131-150 doi: 10.3934/amc.2016.10.131 +[Abstract](3821) +[PDF](502.5KB) Cited By(37)
Public key cryptography based on semigroup actions
Gérard Maze, Chris Monico and Joachim Rosenthal
2007, 1(4) : 489-507 doi: 10.3934/amc.2007.1.489 +[Abstract](4455) +[PDF](248.6KB) Cited By(37)
Efficient implementation of elliptic curve cryptography in wireless sensors
Diego F. Aranha, Ricardo Dahab, Julio López and Leonardo B. Oliveira
2010, 4(2) : 169-187 doi: 10.3934/amc.2010.4.169 +[Abstract](4392) +[PDF](304.4KB) Cited By(31)
A review of the available construction methods for Golomb rulers
Konstantinos Drakakis
2009, 3(3) : 235-250 doi: 10.3934/amc.2009.3.235 +[Abstract](3585) +[PDF](218.2KB) Cited By(29)
A survey of perfect codes
Olof Heden
2008, 2(2) : 223-247 doi: 10.3934/amc.2008.2.223 +[Abstract](4574) +[PDF](323.1KB) Cited By(28)
Combinatorial batch codes
M. B. Paterson, D. R. Stinson and R. Wei
2009, 3(1) : 13-27 doi: 10.3934/amc.2009.3.13 +[Abstract](2786) +[PDF](275.6KB) Cited By(27)
A construction of $ \mathbb{F}_2 $-linear cyclic, MDS codes
Sara D. Cardell, Joan-Josep Climent, Daniel Panario and Brett Stevens
2020, 14(3) : 437-453 doi: 10.3934/amc.2020047 +[Abstract](1480) +[HTML](439) +[PDF](397.95KB) PDF Downloads(2524)
Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results
Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray and Susanta Samanta
2019, 13(4) : 779-843 doi: 10.3934/amc.2019045 +[Abstract](2797) +[HTML](752) +[PDF](673.93KB) PDF Downloads(655)
New mission and opportunity for mathematics researchers: Cryptography in the quantum era
Lidong Chen and Dustin Moody
2020, 14(1) : 161-169 doi: 10.3934/amc.2020013 +[Abstract](2565) +[HTML](1052) +[PDF](221.27KB) PDF Downloads(649)
Critical perspectives on provable security: Fifteen years of "another look" papers
Neal Koblitz and Alfred Menezes
2019, 13(4) : 517-558 doi: 10.3934/amc.2019034 +[Abstract](4679) +[HTML](995) +[PDF](437.66KB) PDF Downloads(589)
Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations
Sanjit Chatterjee and Berkant Ustaoğlu
2020, 14(2) : 177-205 doi: 10.3934/amc.2020015 +[Abstract](1583) +[HTML](1120) +[PDF](397.63KB) PDF Downloads(476)
Efficient traceable ring signature scheme without pairings
Ke Gu, Xinying Dong and Linyu Wang
2020, 14(2) : 207-232 doi: 10.3934/amc.2020016 +[Abstract](1779) +[HTML](505) +[PDF](453.37KB) PDF Downloads(457)
Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
Anton Stolbunov
2010, 4(2) : 215-235 doi: 10.3934/amc.2010.4.215 +[Abstract](4535) +[PDF](304.1KB) PDF Downloads(448)
Constacyclic codes of length $np^s$ over $\mathbb{F}_{p^m}+u\mathbb{F}_{p^m}$
Yonglin Cao, Yuan Cao, Hai Q. Dinh, Fang-Wei Fu, Jian Gao and Songsak Sriboonchitta
2018, 12(2) : 231-262 doi: 10.3934/amc.2018016 +[Abstract](5194) +[HTML](512) +[PDF](555.31KB) PDF Downloads(435)
Improved attacks on knapsack problem with their variants and a knapsack type ID-scheme
Konstantinos A. Draziotis and Anastasia Papadopoulou
2018, 12(3) : 429-449 doi: 10.3934/amc.2018026 +[Abstract](5580) +[HTML](283) +[PDF](543.19KB) PDF Downloads(393)
Construction and assignment of orthogonal sequences and zero correlation zone sequences for applications in CDMA systems
Chunlei Xie and Yujuan Sun
2020, 14(1) : 1-9 doi: 10.3934/amc.2020001 +[Abstract](1817) +[HTML](479) +[PDF](314.52KB) PDF Downloads(389)

2019  Impact Factor: 0.734

Editors

Referees

Librarians

Email Alert

[Back to Top]