ISSN:
 1930-5346

eISSN:
 1930-5338

All Issues

Volume 15, 2021

Volume 14, 2020

Volume 13, 2019

Volume 12, 2018

Volume 11, 2017

Volume 10, 2016

Volume 9, 2015

Volume 8, 2014

Volume 7, 2013

Volume 6, 2012

Volume 5, 2011

Volume 4, 2010

Volume 3, 2009

Volume 2, 2008

Volume 1, 2007

AMC Flyer: showing all essential information of the journal.
Advances in Mathematics of Communications (AMC) publishes original research papers of the highest quality in all areas of mathematics and computer science relevant to applications in communications technology. For this reason, submissions from many areas of mathematics are invited, provided these show a high level of originality, new techniques, an innovative approach, novel methodologies, or otherwise a high level of depth and sophistication. Any work that does not conform to these standards will be rejected.

Call for Papers: Special Issue entitled, “Algebraic and Geometric Perspectives on Coding Theory”
Call for Papers: Special Issue entitled “Secure Implementations of Post-Quantum Cryptographic Algorithms and Mathematical Approaches

Congratulations to AMC Editor in Chief Sihem Mesnager on winning the 2020 George Boole International Prize for her contributions to Boolean functions and their applications for communications (codes and symmetric cryptography)! Learn more about her research and achievements in this news piece.


Note: “Most Cited” is by Cross-Ref , and “Most Downloaded” is based on available data in the new website.

Select all articles

Export/Reference:

Some optimal cyclic $ \mathbb{F}_q $-linear $ \mathbb{F}_{q^t} $-codes
Yun Gao, Shilin Yang and Fang-Wei Fu
2021, 15(3) : 387-396 doi: 10.3934/amc.2020072 +[Abstract](1270) +[HTML](531) +[PDF](338.97KB)
Ironwood meta key agreement and authentication protocol
Iris Anshel, Derek Atkins, Dorian Goldfeld and Paul E. Gunnells
2021, 15(3) : 397-413 doi: 10.3934/amc.2020073 +[Abstract](1101) +[HTML](566) +[PDF](437.39KB)
The $[46, 9, 20]_2$ code is unique
Sascha Kurz
2021, 15(3) : 415-422 doi: 10.3934/amc.2020074 +[Abstract](1013) +[HTML](531) +[PDF](262.93KB)
$ s $-PD-sets for codes from projective planes $ \mathrm{PG}(2,2^h) $, $ 5 \leq h\leq 9 $
Dean Crnković, Nina Mostarac, Bernardo G. Rodrigues and Leo Storme
2021, 15(3) : 423-440 doi: 10.3934/amc.2020075 +[Abstract](1040) +[HTML](538) +[PDF](328.6KB)
Finding small solutions of the equation $ \mathit{{Bx-Ay = z}} $ and its applications to cryptanalysis of the RSA cryptosystem
Shixiong Wang, Longjiang Qu, Chao Li, Shaojing Fu and Hao Chen
2021, 15(3) : 441-469 doi: 10.3934/amc.2020076 +[Abstract](1289) +[HTML](632) +[PDF](515.0KB)
Constructing self-dual codes from group rings and reverse circulant matrices
Joe Gildea, Adrian Korban, Abidin Kaya and Bahattin Yildiz
2021, 15(3) : 471-485 doi: 10.3934/amc.2020077 +[Abstract](1060) +[HTML](613) +[PDF](317.52KB)
New optimal error-correcting codes for crosstalk avoidance in on-chip data buses
Muhammad Ajmal and Xiande Zhang
2021, 15(3) : 487-506 doi: 10.3934/amc.2020078 +[Abstract](1095) +[HTML](638) +[PDF](351.7KB)
Binary codes from $ m $-ary $ n $-cubes $ Q^m_n $
Jennifer D. Key and Bernardo G. Rodrigues
2021, 15(3) : 507-524 doi: 10.3934/amc.2020079 +[Abstract](986) +[HTML](516) +[PDF](415.66KB)
The differential spectrum of a class of power functions over finite fields
Lei Lei, Wenli Ren and Cuiling Fan
2021, 15(3) : 525-537 doi: 10.3934/amc.2020080 +[Abstract](1140) +[HTML](574) +[PDF](321.61KB)
Internal state recovery of Espresso stream cipher using conditional sampling resistance and TMDTO attack
Nishant Sinha
2021, 15(3) : 539-556 doi: 10.3934/amc.2020081 +[Abstract](910) +[HTML](565) +[PDF](336.0KB)
Infinite families of $ 3 $-designs from o-polynomials
Cunsheng Ding and Chunming Tang
2020doi: 10.3934/amc.2020082 +[Abstract](905) +[HTML](575) +[PDF](328.49KB)
Rank weights for arbitrary finite field extensions
Grégory Berhuy, Jean Fasel and Odile Garotta
2020doi: 10.3934/amc.2020083 +[Abstract](850) +[HTML](426) +[PDF](363.79KB)
Involutory-Multiple-Lightweight MDS Matrices based on Cauchy-type Matrices
Mohsen Mousavi, Ali Zaghian and Morteza Esmaeili
2020doi: 10.3934/amc.2020084 +[Abstract](1011) +[HTML](504) +[PDF](465.49KB)
An overview on skew constacyclic codes and their subclass of LCD codes
Ranya Djihad Boulanouar, Aicha Batoul and Delphine Boucher
2020doi: 10.3934/amc.2020085 +[Abstract](1055) +[HTML](488) +[PDF](414.84KB)
Quasi-symmetric designs on $ 56 $ points
Vedran Krčadinac and Renata Vlahović Kruc
2020doi: 10.3934/amc.2020086 +[Abstract](803) +[HTML](392) +[PDF](395.43KB)
Correlation distribution of a sequence family generalizing some sequences of Trachtenberg
Ferruh Özbudak and Eda Tekin
2020doi: 10.3934/amc.2020087 +[Abstract](731) +[HTML](432) +[PDF](378.58KB)
Infinite families of 2-designs from a class of non-binary Kasami cyclic codes
Rong Wang, Xiaoni Du and Cuiling Fan
2020doi: 10.3934/amc.2020088 +[Abstract](840) +[HTML](420) +[PDF](376.64KB)
Information set decoding in the Lee metric with applications to cryptography
Anna-Lena Horlemann-Trautmann and Violetta Weger
2020doi: 10.3934/amc.2020089 +[Abstract](822) +[HTML](388) +[PDF](380.68KB)
On finite length nonbinary sequences with large nonlinear complexity over the residue ring $ \mathbb{Z}_{m} $
Lin Yi, Xiangyong Zeng and Zhimin Sun
2020doi: 10.3934/amc.2020091 +[Abstract](691) +[HTML](380) +[PDF](374.08KB)
A generic construction of rotation symmetric bent functions
Junchao Zhou, Nian Li, Xiangyong Zeng and Yunge Xu
2020doi: 10.3934/amc.2020092 +[Abstract](674) +[HTML](369) +[PDF](366.16KB)
$ \mathbb{Z}_{4}\mathbb{Z}_{4}[u] $-additive cyclic and constacyclic codes
Habibul Islam, Om Prakash and Patrick Solé
2020doi: 10.3934/amc.2020094 +[Abstract](826) +[HTML](456) +[PDF](537.79KB)
Several new classes of (balanced) Boolean functions with few Walsh transform values
Tingting Pang, Nian Li, Li Zhang and Xiangyong Zeng
2020doi: 10.3934/amc.2020095 +[Abstract](758) +[HTML](368) +[PDF](342.04KB)
Additive and linear conjucyclic codes over $ {\mathbb{F}}_4 $
Taher Abualrub and Steven T. Dougherty
2020doi: 10.3934/amc.2020096 +[Abstract](667) +[HTML](356) +[PDF](331.6KB)
New quantum codes from constacyclic codes over the ring $ R_{k,m} $
Habibul Islam, Om Prakash and Ram Krishna Verma
2020doi: 10.3934/amc.2020097 +[Abstract](770) +[HTML](521) +[PDF](461.37KB)
Efficient fully CCA-secure predicate encryptions from pair encodings
Mridul Nandi and Tapas Pandit
2020doi: 10.3934/amc.2020098 +[Abstract](599) +[HTML](395) +[PDF](774.26KB)
Locally repairable codes with high availability based on generalised quadrangles
Michel Lavrauw and Geertrui Van de Voorde
2020doi: 10.3934/amc.2020099 +[Abstract](651) +[HTML](345) +[PDF](295.97KB)
Binary sequences derived from differences of consecutive quadratic residues
Arne Winterhof and Zibi Xiao
2020doi: 10.3934/amc.2020100 +[Abstract](602) +[HTML](337) +[PDF](336.56KB)
On the diffusion of the Improved Generalized Feistel
Tsonka Baicheva and Svetlana Topalova
2020doi: 10.3934/amc.2020102 +[Abstract](451) +[HTML](283) +[PDF](395.58KB)
Cryptanalysis and enhancement of multi factor remote user authentication scheme based on signcryption
Vani Rajasekar, Premalatha Jayapaul and Sathya Krishnamoorthi
2020doi: 10.3934/amc.2020103 +[Abstract](676) +[HTML](349) +[PDF](468.4KB)
A geometric characterization of minimal codes and their asymptotic performance
Gianira N. Alfarano, Martino Borello and Alessandro Neri
2020doi: 10.3934/amc.2020104 +[Abstract](789) +[HTML](360) +[PDF](342.53KB)
Orbit codes from forms on vector spaces over a finite field
Angela Aguglia, Antonio Cossidente, Giuseppe Marino, Francesco Pavese and Alessandro Siciliano
2020doi: 10.3934/amc.2020105 +[Abstract](592) +[HTML](331) +[PDF](479.05KB)
Infinite families of 2-designs from two classes of binary cyclic codes with three nonzeros
Xiaoni Du, Rong Wang, Chunming Tang and Qi Wang
2020doi: 10.3934/amc.2020106 +[Abstract](556) +[HTML](347) +[PDF](348.81KB)
Optimal antiblocking systems of information sets for the binary codes related to triangular graphs
Hans-Joachim Kroll, Sayed-Ghahreman Taherian and Rita Vincenti
2020doi: 10.3934/amc.2020107 +[Abstract](583) +[HTML](370) +[PDF](331.8KB)
${\sf {FAST}}$: Disk encryption and beyond
Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas López and Palash Sarkar
2020doi: 10.3934/amc.2020108 +[Abstract](588) +[HTML](317) +[PDF](732.06KB)
Further results on 2-uniform states arising from irredundant orthogonal arrays
Yajuan Zang, Guangzhou Chen, Kejun Chen and Zihong Tian
2020doi: 10.3934/amc.2020109 +[Abstract](590) +[HTML](285) +[PDF](419.56KB)
Two constructions of low-hit-zone frequency-hopping sequence sets
Wenjuan Yin, Can Xiang and Fang-Wei Fu
2020doi: 10.3934/amc.2020110 +[Abstract](577) +[HTML](311) +[PDF](414.16KB)
New self-dual codes of length 68 from a $ 2 \times 2 $ block matrix construction and group rings
Maria Bortos, Joe Gildea, Abidin Kaya, Adrian Korban and Alexander Tylyshchak
2020doi: 10.3934/amc.2020111 +[Abstract](537) +[HTML](296) +[PDF](373.47KB)
On the equivalence of several classes of quaternary sequences with optimal autocorrelation and length $ 2p$
Pinhui Ke, Panpan Qiao and Yang Yang
2020doi: 10.3934/amc.2020112 +[Abstract](496) +[HTML](293) +[PDF](413.1KB)
Efficient arithmetic in (pseudo-)Mersenne prime order fields
Kaushik Nath and Palash Sarkar
2020doi: 10.3934/amc.2020113 +[Abstract](698) +[HTML](308) +[PDF](647.94KB)
Constructions of linear codes with small hulls from association schemes
Ye Wang and Ran Tao
2020doi: 10.3934/amc.2020114 +[Abstract](502) +[HTML](280) +[PDF](407.96KB)
A New Construction of odd-variable Rotation symmetric Boolean functions with good cryptographic properties
Bingxin Wang and Sihong Su
2020doi: 10.3934/amc.2020115 +[Abstract](429) +[HTML](264) +[PDF](433.03KB)
Optimal strategies for CSIDH
Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez
2020doi: 10.3934/amc.2020116 +[Abstract](898) +[HTML](275) +[PDF](889.96KB)
A note on the Signal-to-noise ratio of $ (n, m) $-functions
Yu Zhou, Xinfeng Dong, Yongzhuang Wei and Fengrong Zhang
2020doi: 10.3934/amc.2020117 +[Abstract](460) +[HTML](253) +[PDF](524.5KB)
Rotated $ A_n $-lattice codes of full diversity
Agnaldo José Ferrari and Tatiana Miguel Rodrigues de Souza
2020doi: 10.3934/amc.2020118 +[Abstract](451) +[HTML](221) +[PDF](343.0KB)
New discrete logarithm computation for the medium prime case using the function field sieve
Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh and Emmanuel Thomé
2020doi: 10.3934/amc.2020119 +[Abstract](467) +[HTML](188) +[PDF](403.92KB)
Three classes of partitioned difference families and their optimal constant composition codes
Shanding Xu, Longjiang Qu and Xiwang Cao
2020doi: 10.3934/amc.2020120 +[Abstract](469) +[HTML](302) +[PDF](519.73KB)
Nearly optimal codebooks from generalized Boolean bent functions over $ \mathbb{Z}_{4} $
Junchao Zhou, Yunge Xu, Lisha Wang and Nian Li
2020doi: 10.3934/amc.2020121 +[Abstract](397) +[HTML](227) +[PDF](471.09KB)
Codes over $ \frak m $-adic completion rings
Saadoun Mahmoudi and Karim Samei
2020doi: 10.3934/amc.2020122 +[Abstract](398) +[HTML](178) +[PDF](446.02KB)
Constacyclic codes of length $ 8p^s $ over $ \mathbb F_{p^m} + u\mathbb F_{p^m} $
Hai Q. Dinh, Bac T. Nguyen and Paravee Maneejuk
2020doi: 10.3934/amc.2020123 +[Abstract](410) +[HTML](173) +[PDF](701.66KB)
Complete weight enumerator of torsion codes
Xiangrui Meng and Jian Gao
2020doi: 10.3934/amc.2020124 +[Abstract](369) +[HTML](177) +[PDF](549.13KB)
On ideal $ t $-tuple distribution of orthogonal functions in filtering de bruijn generators
Kalikinkar Mandal and Guang Gong
2020doi: 10.3934/amc.2020125 +[Abstract](457) +[HTML](226) +[PDF](441.83KB)
A practicable timing attack against HQC and its countermeasure
Guillaume Wafo-Tapa, Slim Bettaieb, Loïc Bidoux, Philippe Gaborit and Etienne Marcatel
2020doi: 10.3934/amc.2020126 +[Abstract](416) +[HTML](251) +[PDF](395.88KB)
On $ \sigma $-self-orthogonal constacyclic codes over $ \mathbb F_{p^m}+u\mathbb F_{p^m} $
Hongwei Liu and Jingge Liu
2020doi: 10.3934/amc.2020127 +[Abstract](426) +[HTML](207) +[PDF](419.25KB)
Some results on lightweight stream ciphers Fountain v1 & Lizard
Ravi Anand, Dibyendu Roy and Santanu Sarkar
2020doi: 10.3934/amc.2020128 +[Abstract](469) +[HTML](195) +[PDF](393.41KB)
Codes with few weights arising from linear sets
Vito Napolitano and Ferdinando Zullo
2020doi: 10.3934/amc.2020129 +[Abstract](460) +[HTML](210) +[PDF](323.99KB)
On the minimum number of minimal codewords
Romar dela Cruz, Michael Kiermaier, Sascha Kurz and Alfred Wassermann
2021doi: 10.3934/amc.2020130 +[Abstract](284) +[HTML](161) +[PDF](330.04KB)
A new class of optimal wide-gap one-coincidence frequency-hopping sequence sets
Wenli Ren and Feng Wang
2021doi: 10.3934/amc.2020131 +[Abstract](275) +[HTML](175) +[PDF](351.72KB)
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems
Terry Shue Chien Lau and Chik How Tan
2021doi: 10.3934/amc.2020132 +[Abstract](312) +[HTML](204) +[PDF](375.67KB)
Connection of $ p $-ary $ t $-weight linear codes to Ramanujan Cayley graphs with $ t+1 $ eigenvalues
Jong Yoon Hyun, Yoonjin Lee and Yansheng Wu
2021doi: 10.3934/amc.2020133 +[Abstract](242) +[HTML](134) +[PDF](405.51KB)
Character sums over a non-chain ring and their applications
Liqin Qian and Xiwang Cao
2021doi: 10.3934/amc.2020134 +[Abstract](255) +[HTML](122) +[PDF](551.93KB)
Duadic codes over $ \mathbb{Z}_4+u\mathbb{Z}_4 $
Raj Kumar and Maheshanand Bhaintwal
2021doi: 10.3934/amc.2020135 +[Abstract](256) +[HTML](124) +[PDF](383.87KB)
The lower bounds on the second-order nonlinearity of three classes of Boolean functions
Qian Liu
2021doi: 10.3934/amc.2020136 +[Abstract](326) +[HTML](131) +[PDF](424.97KB)
An optimization approach to the Langberg-Médard multiple unicast conjecture
Kai Cai and Guangyue Han
2021doi: 10.3934/amc.2021001 +[Abstract](175) +[HTML](92) +[PDF](393.36KB)
The weight distribution of irreducible cyclic codes associated with decomposable generalized Paley graphs
Ricardo A. Podestá and Denis E. Videla
2021doi: 10.3934/amc.2021002 +[Abstract](236) +[HTML](102) +[PDF](440.46KB)
Extremal absorbing sets in low-density parity-check codes
Emily McMillon, Allison Beemer and Christine A. Kelley
2021doi: 10.3934/amc.2021003 +[Abstract](229) +[HTML](90) +[PDF](421.07KB)
Classical reduction of gap SVP to LWE: A concrete security analysis
Palash Sarkar and Subhadip Singha
2021doi: 10.3934/amc.2021004 +[Abstract](206) +[HTML](140) +[PDF](452.08KB)
A coercion-resistant blockchain-based E-voting protocol with receipts
Chiara Spadafora, Riccardo Longo and Massimiliano Sala
2021doi: 10.3934/amc.2021005 +[Abstract](726) +[HTML](166) +[PDF](430.83KB)
Several formulas for Bernoulli numbers and polynomials
Takao Komatsu, Bijan Kumar Patel and Claudio Pita-Ruiz
2021doi: 10.3934/amc.2021006 +[Abstract](375) +[HTML](119) +[PDF](351.54KB)
Combining subspace codes
Antonio Cossidente, Sascha Kurz, Giuseppe Marino and Francesco Pavese
2021doi: 10.3934/amc.2021007 +[Abstract](184) +[HTML](83) +[PDF](417.57KB)
On the correlation measures of orders $ 3 $ and $ 4 $ of binary sequence of period $ p^2 $ derived from Fermat quotients
Huaning Liu and Xi Liu
2021doi: 10.3934/amc.2021008 +[Abstract](222) +[HTML](89) +[PDF](326.96KB)
Formal security proof for a scheme on a topological network
Roberto Civino and Riccardo Longo
2021doi: 10.3934/amc.2021009 +[Abstract](240) +[HTML](93) +[PDF](266.71KB)
Partial direct product difference sets and almost quaternary sequences
Büşra Özden and Oǧuz Yayla
2021doi: 10.3934/amc.2021010 +[Abstract](101) +[HTML](66) +[PDF](448.97KB)
The weight recursions for the 2-rotation symmetric quartic Boolean functions
Thomas W. Cusick and Younhwan Cheon
2021doi: 10.3934/amc.2021011 +[Abstract](101) +[HTML](59) +[PDF](387.58KB)
Some progress on optimal $ 2 $-D $ (n\times m,3,2,1) $-optical orthogonal codes
Kailu Yang, Xiaomiao Wang, Menglong Zhang and Lidong Wang
2021doi: 10.3934/amc.2021012 +[Abstract](140) +[HTML](93) +[PDF](464.48KB)
Generalized Hamming weights of toric codes over hypersimplices and squarefree affine evaluation codes
Nupur Patanker and Sanjay Kumar Singh
2021doi: 10.3934/amc.2021013 +[Abstract](117) +[HTML](66) +[PDF](416.09KB)
Ternary Primitive LCD BCH codes
Xinmei Huang, Qin Yue, Yansheng Wu and Xiaoping Shi
2021doi: 10.3934/amc.2021014 +[Abstract](90) +[HTML](43) +[PDF](417.23KB)
Quantum states associated to mixed graphs and their algebraic characterization
Constanza Riera, Matthew G. Parker and Pantelimon Stǎnicǎ
2021doi: 10.3934/amc.2021015 +[Abstract](105) +[HTML](55) +[PDF](457.86KB)
Delegating signing rights in a multivariate proxy signature scheme
Sumit Kumar Debnath, Tanmay Choudhury, Pantelimon Stănică, Kunal Dey and Nibedita Kundu
2021doi: 10.3934/amc.2021016 +[Abstract](40) +[HTML](21) +[PDF](965.12KB)
On ideal and weakly-ideal access structures
Reza Kaboli, Shahram Khazaei and Maghsoud Parviz
2021doi: 10.3934/amc.2021017 +[Abstract](45) +[HTML](23) +[PDF](423.61KB)
The conorm code of an AG-code
María Chara, Ricardo A. Podestá and Ricardo Toledano
2021doi: 10.3934/amc.2021018 +[Abstract](43) +[HTML](18) +[PDF](403.32KB)
On the linear complexity and autocorrelation of generalized cyclotomic binary sequences with period $ 4p^n $
Lin Yi, Xiangyong Zeng, Zhimin Sun and Shasha Zhang
2021doi: 10.3934/amc.2021019 +[Abstract](44) +[HTML](21) +[PDF](496.03KB)
A new construction of weightwise perfectly balanced Boolean functions
Rui Zhang and Sihong Su
2021doi: 10.3934/amc.2021020 +[Abstract](42) +[HTML](22) +[PDF](344.08KB)
Designing tweakable enciphering schemes using public permutations
Debrup Chakraborty, Avijit Dutta and Samir Kundu
2021doi: 10.3934/amc.2021021 +[Abstract](38) +[HTML](22) +[PDF](651.02KB)
A new almost perfect nonlinear function which is not quadratic
Yves Edel and Alexander Pott
2009, 3(1) : 59-81 doi: 10.3934/amc.2009.3.59 +[Abstract](4636) +[PDF](288.3KB) Cited By(68)
A new family of linear maximum rank distance codes
John Sheekey
2016, 10(3) : 475-488 doi: 10.3934/amc.2016019 +[Abstract](5678) +[PDF](390.1KB) Cited By(51)
Skew constacyclic codes over Galois rings
Delphine Boucher, Patrick Solé and Felix Ulmer
2008, 2(3) : 273-292 doi: 10.3934/amc.2008.2.273 +[Abstract](4498) +[PDF](247.3KB) Cited By(44)
Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
Anton Stolbunov
2010, 4(2) : 215-235 doi: 10.3934/amc.2010.4.215 +[Abstract](5097) +[PDF](304.1KB) Cited By(44)
Complementary dual codes for counter-measures to side-channel attacks
Claude Carlet and Sylvain Guilley
2016, 10(1) : 131-150 doi: 10.3934/amc.2016.10.131 +[Abstract](4280) +[PDF](502.5KB) Cited By(43)
Public key cryptography based on semigroup actions
Gérard Maze, Chris Monico and Joachim Rosenthal
2007, 1(4) : 489-507 doi: 10.3934/amc.2007.1.489 +[Abstract](4846) +[PDF](248.6KB) Cited By(37)
Efficient implementation of elliptic curve cryptography in wireless sensors
Diego F. Aranha, Ricardo Dahab, Julio López and Leonardo B. Oliveira
2010, 4(2) : 169-187 doi: 10.3934/amc.2010.4.169 +[Abstract](4843) +[PDF](304.4KB) Cited By(32)
A review of the available construction methods for Golomb rulers
Konstantinos Drakakis
2009, 3(3) : 235-250 doi: 10.3934/amc.2009.3.235 +[Abstract](3925) +[PDF](218.2KB) Cited By(31)
A survey of perfect codes
Olof Heden
2008, 2(2) : 223-247 doi: 10.3934/amc.2008.2.223 +[Abstract](4980) +[PDF](323.1KB) Cited By(28)
Combinatorial batch codes
M. B. Paterson, D. R. Stinson and R. Wei
2009, 3(1) : 13-27 doi: 10.3934/amc.2009.3.13 +[Abstract](3141) +[PDF](275.6KB) Cited By(27)
A construction of $ \mathbb{F}_2 $-linear cyclic, MDS codes
Sara D. Cardell, Joan-Josep Climent, Daniel Panario and Brett Stevens
2020, 14(3) : 437-453 doi: 10.3934/amc.2020047 +[Abstract](1881) +[HTML](443) +[PDF](397.95KB) PDF Downloads(2637)
Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results
Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray and Susanta Samanta
2019, 13(4) : 779-843 doi: 10.3934/amc.2019045 +[Abstract](3252) +[HTML](756) +[PDF](673.93KB) PDF Downloads(1005)
Critical perspectives on provable security: Fifteen years of "another look" papers
Neal Koblitz and Alfred Menezes
2019, 13(4) : 517-558 doi: 10.3934/amc.2019034 +[Abstract](5199) +[HTML](1010) +[PDF](437.66KB) PDF Downloads(749)
New mission and opportunity for mathematics researchers: Cryptography in the quantum era
Lidong Chen and Dustin Moody
2020, 14(1) : 161-169 doi: 10.3934/amc.2020013 +[Abstract](3069) +[HTML](1072) +[PDF](221.27KB) PDF Downloads(740)
Efficient traceable ring signature scheme without pairings
Ke Gu, Xinying Dong and Linyu Wang
2020, 14(2) : 207-232 doi: 10.3934/amc.2020016 +[Abstract](2181) +[HTML](509) +[PDF](453.37KB) PDF Downloads(629)
Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
Anton Stolbunov
2010, 4(2) : 215-235 doi: 10.3934/amc.2010.4.215 +[Abstract](5097) +[PDF](304.1KB) PDF Downloads(624)
Construction of skew cyclic codes over $\mathbb F_q+v\mathbb F_q$
Fatmanur Gursoy, Irfan Siap and Bahattin Yildiz
2014, 8(3) : 313-322 doi: 10.3934/amc.2014.8.313 +[Abstract](4270) +[PDF](318.7KB) PDF Downloads(562)
Malleability and ownership of proxy signatures: Towards a stronger definition and its limitations
Sanjit Chatterjee and Berkant Ustaoğlu
2020, 14(2) : 177-205 doi: 10.3934/amc.2020015 +[Abstract](1867) +[HTML](1123) +[PDF](397.63KB) PDF Downloads(549)
Improved attacks on knapsack problem with their variants and a knapsack type ID-scheme
Konstantinos A. Draziotis and Anastasia Papadopoulou
2018, 12(3) : 429-449 doi: 10.3934/amc.2018026 +[Abstract](6026) +[HTML](289) +[PDF](543.19KB) PDF Downloads(524)
Constacyclic codes of length $np^s$ over $\mathbb{F}_{p^m}+u\mathbb{F}_{p^m}$
Yonglin Cao, Yuan Cao, Hai Q. Dinh, Fang-Wei Fu, Jian Gao and Songsak Sriboonchitta
2018, 12(2) : 231-262 doi: 10.3934/amc.2018016 +[Abstract](5572) +[HTML](515) +[PDF](555.31KB) PDF Downloads(520)

2019  Impact Factor: 0.734

Editors

Referees

Librarians

Email Alert

[Back to Top]