All Issues

Volume 13, 2019

Volume 12, 2018

Volume 11, 2017

Volume 10, 2016

Volume 9, 2015

Volume 8, 2014

Volume 7, 2013

Volume 6, 2012

Volume 5, 2011

Volume 4, 2010

Volume 3, 2009

Volume 2, 2008

Volume 1, 2007

Advances in Mathematics of Communications (AMC) publishes original research papers of the highest quality in all areas of mathematics and computer science which are relevant to applications in communications technology. For this reason, submissions from many areas of mathematics are invited, provided these show a high level of originality, new techniques, an innovative approach, novel methodologies, or otherwise a high level of depth and sophistication. Any work that does not conform to these standards will be rejected.

Note: “Most Cited” is by Cross-Ref , and “Most Downloaded” is based on available data in the new website.

Select all articles


Letters for post-quantum cryptography standard evaluation
Jintai Ding, Sihem Mesnager and Lih-Chung Wang
2020, 14(1) : i-i doi: 10.3934/amc.2020012 +[Abstract](14) +[HTML](8) +[PDF](212.1KB)
Construction and assignment of orthogonal sequences and zero correlation zone sequences for applications in CDMA systems
Chunlei Xie and Yujuan Sun
2020, 14(1) : 1-9 doi: 10.3934/amc.2020001 +[Abstract](11) +[HTML](9) +[PDF](314.52KB)
New self-dual and formally self-dual codes from group ring constructions
Steven T. Dougherty, Joe Gildea, Abidin Kaya and Bahattin Yildiz
2020, 14(1) : 11-22 doi: 10.3934/amc.2020002 +[Abstract](19) +[HTML](8) +[PDF](329.37KB)
A construction of bent functions with optimal algebraic degree and large symmetric group
Wenying Zhang, Zhaohui Xing and Keqin Feng
2020, 14(1) : 23-33 doi: 10.3934/amc.2020003 +[Abstract](12) +[HTML](9) +[PDF](328.89KB)
Some generalizations of good integers and their applications in the study of self-dual negacyclic codes
Somphong Jitman, Supawadee Prugsapitak and Madhu Raka
2020, 14(1) : 35-51 doi: 10.3934/amc.2020004 +[Abstract](50) +[HTML](13) +[PDF](350.46KB)
Skew constacyclic codes over the local Frobenius non-chain rings of order 16
Nuh Aydin, Yasemin Cengellenmis, Abdullah Dertli, Steven T. Dougherty and Esengül Saltürk
2020, 14(1) : 53-67 doi: 10.3934/amc.2020005 +[Abstract](13) +[HTML](8) +[PDF](347.53KB)
A complete classification of partial MDS (maximally recoverable) codes with one global parity
Anna-Lena Horlemann-Trautmann and Alessandro Neri
2020, 14(1) : 69-88 doi: 10.3934/amc.2020006 +[Abstract](13) +[HTML](7) +[PDF](337.38KB)
New doubly even self-dual codes having minimum weight 20
Masaaki Harada
2020, 14(1) : 89-96 doi: 10.3934/amc.2020007 +[Abstract](13) +[HTML](5) +[PDF](262.01KB)
Two classes of differentially 4-uniform permutations over $ \mathbb{F}_{2^{n}} $ with $ n $ even
Guangkui Xu and Longjiang Qu
2020, 14(1) : 97-110 doi: 10.3934/amc.2020008 +[Abstract](9) +[HTML](5) +[PDF](311.46KB)
A note on the fast algebraic immunity and its consequences on modified majority functions
Deng Tang
2020, 14(1) : 111-125 doi: 10.3934/amc.2020009 +[Abstract](6) +[HTML](8) +[PDF](341.74KB)
Highly nonlinear (vectorial) Boolean functions that are symmetric under some permutations
SelÇuk Kavut and Seher Tutdere
2020, 14(1) : 127-136 doi: 10.3934/amc.2020010 +[Abstract](12) +[HTML](8) +[PDF](303.85KB)
Certified lattice reduction
Thomas Espitau and Antoine Joux
2020, 14(1) : 137-159 doi: 10.3934/amc.2020011 +[Abstract](7) +[HTML](8) +[PDF](681.01KB)
New mission and opportunity for mathematics researchers: cryptography in the quantum era
Lidong Chen and Dustin Moody
2020, 14(1) : 161-169 doi: 10.3934/amc.2020013 +[Abstract](12) +[HTML](15) +[PDF](221.27KB)
Giophantus distinguishing attack is a low dimensional learning with errors problem
Jintai Ding, Joshua Deaton and Kurt Schmidt
2020, 14(1) : 171-175 doi: 10.3934/amc.2020014 +[Abstract](11) +[HTML](7) +[PDF](226.84KB)
A new almost perfect nonlinear function which is not quadratic
Yves Edel and Alexander Pott
2009, 3(1) : 59-81 doi: 10.3934/amc.2009.3.59 +[Abstract](2318) +[PDF](288.3KB) Cited By(42)
Skew constacyclic codes over Galois rings
Delphine Boucher, Patrick Solé and Felix Ulmer
2008, 2(3) : 273-292 doi: 10.3934/amc.2008.2.273 +[Abstract](2250) +[PDF](247.3KB) Cited By(28)
A survey of perfect codes
Olof Heden
2008, 2(2) : 223-247 doi: 10.3934/amc.2008.2.223 +[Abstract](2646) +[PDF](323.1KB) Cited By(24)
A review of the available construction methods for Golomb rulers
Konstantinos Drakakis
2009, 3(3) : 235-250 doi: 10.3934/amc.2009.3.235 +[Abstract](2065) +[PDF](218.2KB) Cited By(22)
Public key cryptography based on semigroup actions
Gérard Maze, Chris Monico and Joachim Rosenthal
2007, 1(4) : 489-507 doi: 10.3934/amc.2007.1.489 +[Abstract](2630) +[PDF](248.6KB) Cited By(22)
A new family of linear maximum rank distance codes
John Sheekey
2016, 10(3) : 475-488 doi: 10.3934/amc.2016019 +[Abstract](2939) +[PDF](390.1KB) Cited By(19)
On the order bounds for one-point AG codes
Olav Geil, Carlos Munuera, Diego Ruano and Fernando Torres
2011, 5(3) : 489-504 doi: 10.3934/amc.2011.5.489 +[Abstract](2136) +[PDF](378.6KB) Cited By(18)
Efficient implementation of elliptic curve cryptography in wireless sensors
Diego F. Aranha, Ricardo Dahab, Julio López and Leonardo B. Oliveira
2010, 4(2) : 169-187 doi: 10.3934/amc.2010.4.169 +[Abstract](2698) +[PDF](304.4KB) Cited By(17)
Geometric constructions of optimal optical orthogonal codes
T. L. Alderson and K. E. Mellinger
2008, 2(4) : 451-467 doi: 10.3934/amc.2008.2.451 +[Abstract](2108) +[PDF](239.2KB) Cited By(16)
Linear nonbinary covering codes and saturating sets in projective spaces
Alexander A. Davydov, Massimo Giulietti, Stefano Marcugini and Fernanda Pambianco
2011, 5(1) : 119-147 doi: 10.3934/amc.2011.5.119 +[Abstract](2712) +[PDF](566.6KB) Cited By(15)
New families of strictly optimal frequency hopping sequence sets
Jingjun Bao
2018, 12(2) : 387-413 doi: 10.3934/amc.2018024 +[Abstract](2950) +[HTML](248) +[PDF](613.0KB) PDF Downloads(195)
Constacyclic codes of length $np^s$ over $\mathbb{F}_{p^m}+u\mathbb{F}_{p^m}$
Yonglin Cao, Yuan Cao, Hai Q. Dinh, Fang-Wei Fu, Jian Gao and Songsak Sriboonchitta
2018, 12(2) : 231-262 doi: 10.3934/amc.2018016 +[Abstract](2871) +[HTML](372) +[PDF](555.31KB) PDF Downloads(183)
Characterization of extended Hamming and Golay codes as perfect codes in poset block spaces
B. K. Dass, Namita Sharma and Rashmi Verma
2018, 12(4) : 629-639 doi: 10.3934/amc.2018037 +[Abstract](2062) +[HTML](340) +[PDF](366.18KB) PDF Downloads(153)
Strongly secure quantum ramp secret sharing constructed from algebraic curves over finite fields
Ryutaroh Matsumoto
2019, 13(1) : 1-10 doi: 10.3934/amc.2019001 +[Abstract](1885) +[HTML](395) +[PDF](344.95KB) PDF Downloads(143)
Self-dual additive $ \mathbb{F}_4 $-codes of lengths up to 40 represented by circulant graphs
Ken Saito
2019, 13(2) : 213-220 doi: 10.3934/amc.2019014 +[Abstract](1215) +[HTML](433) +[PDF](295.67KB) PDF Downloads(141)
Some new constructions of isodual and LCD codes over finite fields
Fatma-Zohra Benahmed, Kenza Guenda, Aicha Batoul and Thomas Aaron Gulliver
2019, 13(2) : 281-296 doi: 10.3934/amc.2019019 +[Abstract](1388) +[HTML](411) +[PDF](410.75KB) PDF Downloads(129)
$ {{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{4}}$-additive cyclic codes
Tingting Wu, Jian Gao, Yun Gao and Fang-Wei Fu
2018, 12(4) : 641-657 doi: 10.3934/amc.2018038 +[Abstract](1981) +[HTML](341) +[PDF](409.5KB) PDF Downloads(124)
Some classes of LCD codes and self-orthogonal codes over finite fields
Xia Li, Feng Cheng, Chunming Tang and Zhengchun Zhou
2019, 13(2) : 267-280 doi: 10.3934/amc.2019018 +[Abstract](1523) +[HTML](377) +[PDF](417.6KB) PDF Downloads(121)
Critical perspectives on provable security: Fifteen years of "another look" papers
Neal Koblitz and Alfred Menezes
2019, 13(4) : 517-558 doi: 10.3934/amc.2019034 +[Abstract](735) +[HTML](288) +[PDF](437.66KB) PDF Downloads(121)
More cyclotomic constructions of optimal frequency-hopping sequences
Shanding Xu, Xiwang Cao, Jiafu Mi and Chunming Tang
2019, 13(3) : 373-391 doi: 10.3934/amc.2019024 +[Abstract](1059) +[HTML](315) +[PDF](439.02KB) PDF Downloads(116)

2018  Impact Factor: 0.879




Email Alert

[Back to Top]