All Issues

Volume 15, 2021

Volume 14, 2020

Volume 13, 2019

Volume 12, 2018

Volume 11, 2017

Volume 10, 2016

Volume 9, 2015

Volume 8, 2014

Volume 7, 2013

Volume 6, 2012

Volume 5, 2011

Volume 4, 2010

Volume 3, 2009

Volume 2, 2008

Volume 1, 2007

AMC Flyer: showing all essential information of the journal.
Advances in Mathematics of Communications (AMC) publishes original research papers of the highest quality in all areas of mathematics and computer science relevant to applications in communications technology. For this reason, submissions from many areas of mathematics are invited, provided these show a high level of originality, new techniques, an innovative approach, novel methodologies, or otherwise a high level of depth and sophistication. Any work that does not conform to these standards will be rejected.

Call for Papers: Special Issue entitled “Secure Implementations of Post-Quantum Cryptographic Algorithms and Mathematical Approaches

Note: “Most Cited” is by Cross-Ref , and “Most Downloaded” is based on available data in the new website.

Select all articles


Infinite families of $ 3 $-designs from o-polynomials
Cunsheng Ding and Chunming Tang
2021, 15(4) : 557-573 doi: 10.3934/amc.2020082 +[Abstract](1508) +[HTML](829) +[PDF](381.17KB)
Rank weights for arbitrary finite field extensions
Grégory Berhuy, Jean Fasel and Odile Garotta
2021, 15(4) : 575-587 doi: 10.3934/amc.2020083 +[Abstract](1381) +[HTML](641) +[PDF](364.62KB)
Involutory-Multiple-Lightweight MDS Matrices based on Cauchy-type Matrices
Mohsen Mousavi, Ali Zaghian and Morteza Esmaeili
2021, 15(4) : 589-610 doi: 10.3934/amc.2020084 +[Abstract](1576) +[HTML](734) +[PDF](466.51KB)
An overview on skew constacyclic codes and their subclass of LCD codes
Ranya Djihad Boulanouar, Aicha Batoul and Delphine Boucher
2021, 15(4) : 611-632 doi: 10.3934/amc.2020085 +[Abstract](1643) +[HTML](711) +[PDF](415.9KB)
Quasi-symmetric designs on $ 56 $ points
Vedran Krčadinac and Renata Vlahović Kruc
2021, 15(4) : 633-646 doi: 10.3934/amc.2020086 +[Abstract](1269) +[HTML](603) +[PDF](395.8KB)
Correlation distribution of a sequence family generalizing some sequences of Trachtenberg
Ferruh Özbudak and Eda Tekin
2021, 15(4) : 647-662 doi: 10.3934/amc.2020087 +[Abstract](1193) +[HTML](685) +[PDF](379.75KB)
Infinite families of 2-designs from a class of non-binary Kasami cyclic codes
Rong Wang, Xiaoni Du and Cuiling Fan
2021, 15(4) : 663-676 doi: 10.3934/amc.2020088 +[Abstract](1265) +[HTML](635) +[PDF](377.61KB)
Information set decoding in the Lee metric with applications to cryptography
Anna-Lena Horlemann-Trautmann and Violetta Weger
2021, 15(4) : 677-699 doi: 10.3934/amc.2020089 +[Abstract](1383) +[HTML](595) +[PDF](451.62KB)
On finite length nonbinary sequences with large nonlinear complexity over the residue ring $ \mathbb{Z}_{m} $
Lin Yi, Xiangyong Zeng and Zhimin Sun
2021, 15(4) : 701-720 doi: 10.3934/amc.2020091 +[Abstract](1120) +[HTML](579) +[PDF](443.91KB)
A generic construction of rotation symmetric bent functions
Junchao Zhou, Nian Li, Xiangyong Zeng and Yunge Xu
2021, 15(4) : 721-736 doi: 10.3934/amc.2020092 +[Abstract](1096) +[HTML](557) +[PDF](428.05KB)
$ \mathbb{Z}_{4}\mathbb{Z}_{4}[u] $-additive cyclic and constacyclic codes
Habibul Islam, Om Prakash and Patrick Solé
2021, 15(4) : 737-755 doi: 10.3934/amc.2020094 +[Abstract](1303) +[HTML](673) +[PDF](437.82KB)
Several new classes of (balanced) Boolean functions with few Walsh transform values
Tingting Pang, Nian Li, Li Zhang and Xiangyong Zeng
2021, 15(4) : 757-775 doi: 10.3934/amc.2020095 +[Abstract](1305) +[HTML](564) +[PDF](399.29KB)
Additive and linear conjucyclic codes over $ {\mathbb{F}}_4 $
Taher Abualrub and Steven T. Dougherty
2020doi: 10.3934/amc.2020096 +[Abstract](1079) +[HTML](549) +[PDF](331.6KB)
New quantum codes from constacyclic codes over the ring $ R_{k,m} $
Habibul Islam, Om Prakash and Ram Krishna Verma
2020doi: 10.3934/amc.2020097 +[Abstract](1248) +[HTML](756) +[PDF](461.37KB)
Efficient fully CCA-secure predicate encryptions from pair encodings
Mridul Nandi and Tapas Pandit
2020doi: 10.3934/amc.2020098 +[Abstract](970) +[HTML](586) +[PDF](774.26KB)
Locally repairable codes with high availability based on generalised quadrangles
Michel Lavrauw and Geertrui Van de Voorde
2020doi: 10.3934/amc.2020099 +[Abstract](1074) +[HTML](534) +[PDF](295.97KB)
Binary sequences derived from differences of consecutive quadratic residues
Arne Winterhof and Zibi Xiao
2020doi: 10.3934/amc.2020100 +[Abstract](979) +[HTML](524) +[PDF](336.56KB)
On the diffusion of the Improved Generalized Feistel
Tsonka Baicheva and Svetlana Topalova
2020doi: 10.3934/amc.2020102 +[Abstract](851) +[HTML](468) +[PDF](395.58KB)
RETRACTION: Cryptanalysis and enhancement of multi factor remote user authentication scheme based on signcryption
Editorial Office
2020doi: 10.3934/amc.2020103 +[Abstract](1138) +[HTML](548) +[PDF](58.33KB)
A geometric characterization of minimal codes and their asymptotic performance
Gianira N. Alfarano, Martino Borello and Alessandro Neri
2020doi: 10.3934/amc.2020104 +[Abstract](1286) +[HTML](552) +[PDF](342.53KB)
Orbit codes from forms on vector spaces over a finite field
Angela Aguglia, Antonio Cossidente, Giuseppe Marino, Francesco Pavese and Alessandro Siciliano
2020doi: 10.3934/amc.2020105 +[Abstract](1031) +[HTML](515) +[PDF](479.05KB)
Infinite families of 2-designs from two classes of binary cyclic codes with three nonzeros
Xiaoni Du, Rong Wang, Chunming Tang and Qi Wang
2020doi: 10.3934/amc.2020106 +[Abstract](906) +[HTML](565) +[PDF](348.81KB)
Optimal antiblocking systems of information sets for the binary codes related to triangular graphs
Hans-Joachim Kroll, Sayed-Ghahreman Taherian and Rita Vincenti
2020doi: 10.3934/amc.2020107 +[Abstract](920) +[HTML](555) +[PDF](331.8KB)
${\sf {FAST}}$: Disk encryption and beyond
Debrup Chakraborty, Sebati Ghosh, Cuauhtemoc Mancillas López and Palash Sarkar
2020doi: 10.3934/amc.2020108 +[Abstract](1076) +[HTML](518) +[PDF](732.06KB)
Further results on 2-uniform states arising from irredundant orthogonal arrays
Yajuan Zang, Guangzhou Chen, Kejun Chen and Zihong Tian
2020doi: 10.3934/amc.2020109 +[Abstract](952) +[HTML](462) +[PDF](419.56KB)
Two constructions of low-hit-zone frequency-hopping sequence sets
Wenjuan Yin, Can Xiang and Fang-Wei Fu
2020doi: 10.3934/amc.2020110 +[Abstract](988) +[HTML](513) +[PDF](414.16KB)
New self-dual codes of length 68 from a $ 2 \times 2 $ block matrix construction and group rings
Maria Bortos, Joe Gildea, Abidin Kaya, Adrian Korban and Alexander Tylyshchak
2020doi: 10.3934/amc.2020111 +[Abstract](911) +[HTML](475) +[PDF](373.47KB)
On the equivalence of several classes of quaternary sequences with optimal autocorrelation and length $ 2p$
Pinhui Ke, Panpan Qiao and Yang Yang
2020doi: 10.3934/amc.2020112 +[Abstract](896) +[HTML](482) +[PDF](413.1KB)
Efficient arithmetic in (pseudo-)Mersenne prime order fields
Kaushik Nath and Palash Sarkar
2020doi: 10.3934/amc.2020113 +[Abstract](1098) +[HTML](493) +[PDF](647.94KB)
Constructions of linear codes with small hulls from association schemes
Ye Wang and Ran Tao
2020doi: 10.3934/amc.2020114 +[Abstract](871) +[HTML](467) +[PDF](407.96KB)
A New Construction of odd-variable Rotation symmetric Boolean functions with good cryptographic properties
Bingxin Wang and Sihong Su
2020doi: 10.3934/amc.2020115 +[Abstract](849) +[HTML](465) +[PDF](433.03KB)
Optimal strategies for CSIDH
Jesús-Javier Chi-Domínguez and Francisco Rodríguez-Henríquez
2020doi: 10.3934/amc.2020116 +[Abstract](1435) +[HTML](468) +[PDF](889.96KB)
A note on the Signal-to-noise ratio of $ (n, m) $-functions
Yu Zhou, Xinfeng Dong, Yongzhuang Wei and Fengrong Zhang
2020doi: 10.3934/amc.2020117 +[Abstract](797) +[HTML](448) +[PDF](524.5KB)
Rotated $ A_n $-lattice codes of full diversity
Agnaldo José Ferrari and Tatiana Miguel Rodrigues de Souza
2020doi: 10.3934/amc.2020118 +[Abstract](806) +[HTML](409) +[PDF](343.0KB)
New discrete logarithm computation for the medium prime case using the function field sieve
Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh and Emmanuel Thomé
2020doi: 10.3934/amc.2020119 +[Abstract](909) +[HTML](381) +[PDF](403.92KB)
Three classes of partitioned difference families and their optimal constant composition codes
Shanding Xu, Longjiang Qu and Xiwang Cao
2020doi: 10.3934/amc.2020120 +[Abstract](835) +[HTML](491) +[PDF](519.73KB)
Nearly optimal codebooks from generalized Boolean bent functions over $ \mathbb{Z}_{4} $
Junchao Zhou, Yunge Xu, Lisha Wang and Nian Li
2020doi: 10.3934/amc.2020121 +[Abstract](757) +[HTML](434) +[PDF](471.09KB)
Codes over $ \frak m $-adic completion rings
Saadoun Mahmoudi and Karim Samei
2020doi: 10.3934/amc.2020122 +[Abstract](749) +[HTML](356) +[PDF](446.02KB)
Constacyclic codes of length $ 8p^s $ over $ \mathbb F_{p^m} + u\mathbb F_{p^m} $
Hai Q. Dinh, Bac T. Nguyen and Paravee Maneejuk
2020doi: 10.3934/amc.2020123 +[Abstract](745) +[HTML](357) +[PDF](701.66KB)
Complete weight enumerator of torsion codes
Xiangrui Meng and Jian Gao
2020doi: 10.3934/amc.2020124 +[Abstract](756) +[HTML](362) +[PDF](549.13KB)
On ideal $ t $-tuple distribution of orthogonal functions in filtering de bruijn generators
Kalikinkar Mandal and Guang Gong
2020doi: 10.3934/amc.2020125 +[Abstract](807) +[HTML](444) +[PDF](441.83KB)
A practicable timing attack against HQC and its countermeasure
Guillaume Wafo-Tapa, Slim Bettaieb, Loïc Bidoux, Philippe Gaborit and Etienne Marcatel
2020doi: 10.3934/amc.2020126 +[Abstract](869) +[HTML](469) +[PDF](395.88KB)
On $ \sigma $-self-orthogonal constacyclic codes over $ \mathbb F_{p^m}+u\mathbb F_{p^m} $
Hongwei Liu and Jingge Liu
2020doi: 10.3934/amc.2020127 +[Abstract](893) +[HTML](388) +[PDF](419.25KB)
Some results on lightweight stream ciphers Fountain v1 & Lizard
Ravi Anand, Dibyendu Roy and Santanu Sarkar
2020doi: 10.3934/amc.2020128 +[Abstract](866) +[HTML](397) +[PDF](393.41KB)
Codes with few weights arising from linear sets
Vito Napolitano and Ferdinando Zullo
2020doi: 10.3934/amc.2020129 +[Abstract](810) +[HTML](387) +[PDF](323.99KB)
On the minimum number of minimal codewords
Romar dela Cruz, Michael Kiermaier, Sascha Kurz and Alfred Wassermann
2021doi: 10.3934/amc.2020130 +[Abstract](654) +[HTML](337) +[PDF](330.04KB)
A new class of optimal wide-gap one-coincidence frequency-hopping sequence sets
Wenli Ren and Feng Wang
2021doi: 10.3934/amc.2020131 +[Abstract](659) +[HTML](369) +[PDF](351.72KB)
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems
Terry Shue Chien Lau and Chik How Tan
2021doi: 10.3934/amc.2020132 +[Abstract](679) +[HTML](403) +[PDF](375.67KB)
Connection of $ p $-ary $ t $-weight linear codes to Ramanujan Cayley graphs with $ t+1 $ eigenvalues
Jong Yoon Hyun, Yoonjin Lee and Yansheng Wu
2021doi: 10.3934/amc.2020133 +[Abstract](636) +[HTML](323) +[PDF](405.51KB)
Character sums over a non-chain ring and their applications
Liqin Qian and Xiwang Cao
2021doi: 10.3934/amc.2020134 +[Abstract](602) +[HTML](297) +[PDF](551.93KB)
Duadic codes over $ \mathbb{Z}_4+u\mathbb{Z}_4 $
Raj Kumar and Maheshanand Bhaintwal
2021doi: 10.3934/amc.2020135 +[Abstract](581) +[HTML](307) +[PDF](383.87KB)
The lower bounds on the second-order nonlinearity of three classes of Boolean functions
Qian Liu
2021doi: 10.3934/amc.2020136 +[Abstract](702) +[HTML](325) +[PDF](424.97KB)
An optimization approach to the Langberg-Médard multiple unicast conjecture
Kai Cai and Guangyue Han
2021doi: 10.3934/amc.2021001 +[Abstract](501) +[HTML](271) +[PDF](393.36KB)
The weight distribution of irreducible cyclic codes associated with decomposable generalized Paley graphs
Ricardo A. Podestá and Denis E. Videla
2021doi: 10.3934/amc.2021002 +[Abstract](589) +[HTML](277) +[PDF](440.46KB)
Extremal absorbing sets in low-density parity-check codes
Emily McMillon, Allison Beemer and Christine A. Kelley
2021doi: 10.3934/amc.2021003 +[Abstract](637) +[HTML](285) +[PDF](421.07KB)
Classical reduction of gap SVP to LWE: A concrete security analysis
Palash Sarkar and Subhadip Singha
2021doi: 10.3934/amc.2021004 +[Abstract](569) +[HTML](349) +[PDF](452.08KB)
A coercion-resistant blockchain-based E-voting protocol with receipts
Chiara Spadafora, Riccardo Longo and Massimiliano Sala
2021doi: 10.3934/amc.2021005 +[Abstract](1289) +[HTML](365) +[PDF](430.83KB)
Several formulas for Bernoulli numbers and polynomials
Takao Komatsu, Bijan Kumar Patel and Claudio Pita-Ruiz
2021doi: 10.3934/amc.2021006 +[Abstract](895) +[HTML](324) +[PDF](351.54KB)
Combining subspace codes
Antonio Cossidente, Sascha Kurz, Giuseppe Marino and Francesco Pavese
2021doi: 10.3934/amc.2021007 +[Abstract](575) +[HTML](270) +[PDF](417.57KB)
On the correlation measures of orders $ 3 $ and $ 4 $ of binary sequence of period $ p^2 $ derived from Fermat quotients
Huaning Liu and Xi Liu
2021doi: 10.3934/amc.2021008 +[Abstract](629) +[HTML](271) +[PDF](326.96KB)
Formal security proof for a scheme on a topological network
Roberto Civino and Riccardo Longo
2021doi: 10.3934/amc.2021009 +[Abstract](574) +[HTML](280) +[PDF](266.71KB)
Partial direct product difference sets and almost quaternary sequences
Büşra Özden and Oǧuz Yayla
2021doi: 10.3934/amc.2021010 +[Abstract](476) +[HTML](271) +[PDF](448.97KB)
The weight recursions for the 2-rotation symmetric quartic Boolean functions
Thomas W. Cusick and Younhwan Cheon
2021doi: 10.3934/amc.2021011 +[Abstract](456) +[HTML](253) +[PDF](387.58KB)
Some progress on optimal $ 2 $-D $ (n\times m,3,2,1) $-optical orthogonal codes
Kailu Yang, Xiaomiao Wang, Menglong Zhang and Lidong Wang
2021doi: 10.3934/amc.2021012 +[Abstract](489) +[HTML](290) +[PDF](464.48KB)
Generalized Hamming weights of toric codes over hypersimplices and squarefree affine evaluation codes
Nupur Patanker and Sanjay Kumar Singh
2021doi: 10.3934/amc.2021013 +[Abstract](462) +[HTML](268) +[PDF](416.09KB)
Ternary Primitive LCD BCH codes
Xinmei Huang, Qin Yue, Yansheng Wu and Xiaoping Shi
2021doi: 10.3934/amc.2021014 +[Abstract](453) +[HTML](228) +[PDF](417.23KB)
Quantum states associated to mixed graphs and their algebraic characterization
Constanza Riera, Matthew G. Parker and Pantelimon Stǎnicǎ
2021doi: 10.3934/amc.2021015 +[Abstract](434) +[HTML](240) +[PDF](457.86KB)
Delegating signing rights in a multivariate proxy signature scheme
Sumit Kumar Debnath, Tanmay Choudhury, Pantelimon Stănică, Kunal Dey and Nibedita Kundu
2021doi: 10.3934/amc.2021016 +[Abstract](446) +[HTML](269) +[PDF](965.12KB)
On ideal and weakly-ideal access structures
Reza Kaboli, Shahram Khazaei and Maghsoud Parviz
2021doi: 10.3934/amc.2021017 +[Abstract](530) +[HTML](215) +[PDF](423.61KB)
The conorm code of an AG-code
María Chara, Ricardo A. Podestá and Ricardo Toledano
2021doi: 10.3934/amc.2021018 +[Abstract](429) +[HTML](234) +[PDF](403.32KB)
On the linear complexity and autocorrelation of generalized cyclotomic binary sequences with period $ 4p^n $
Lin Yi, Xiangyong Zeng, Zhimin Sun and Shasha Zhang
2021doi: 10.3934/amc.2021019 +[Abstract](423) +[HTML](253) +[PDF](496.03KB)
A new construction of weightwise perfectly balanced Boolean functions
Rui Zhang and Sihong Su
2021doi: 10.3934/amc.2021020 +[Abstract](476) +[HTML](231) +[PDF](344.08KB)
Designing tweakable enciphering schemes using public permutations
Debrup Chakraborty, Avijit Dutta and Samir Kundu
2021doi: 10.3934/amc.2021021 +[Abstract](465) +[HTML](270) +[PDF](651.02KB)
Five-weight codes from three-valued correlation of M-sequences
Minjia Shi, Liqin Qian, Tor Helleseth and Patrick Solé
2021doi: 10.3934/amc.2021022 +[Abstract](346) +[HTML](212) +[PDF](382.23KB)
Some subfield codes from MDS codes
Can Xiang and Jinquan Luo
2021doi: 10.3934/amc.2021023 +[Abstract](453) +[HTML](214) +[PDF](372.9KB)
On additive MDS codes over small fields
Simeon Ball, Guillermo Gamboa and Michel Lavrauw
2021doi: 10.3934/amc.2021024 +[Abstract](384) +[HTML](220) +[PDF](365.49KB)
Four by four MDS matrices with the fewest XOR gates based on words
Shi Wang, Yongqiang Li, Shizhu Tian and Xiangyong Zeng
2021doi: 10.3934/amc.2021025 +[Abstract](381) +[HTML](263) +[PDF](532.12KB)
A new twofold Cornacchia-type algorithm and its applications
Bei Wang, Yi Ouyang, Songsong Li and Honggang Hu
2021doi: 10.3934/amc.2021026 +[Abstract](374) +[HTML](236) +[PDF](420.16KB)
Degenerate flag varieties in network coding
Ghislain Fourier and Gabriele Nebe
2021doi: 10.3934/amc.2021027 +[Abstract](353) +[HTML](199) +[PDF](325.61KB)
New quantum codes from skew constacyclic codes
Ram Krishna Verma, Om Prakash, Ashutosh Singh and Habibul Islam
2021doi: 10.3934/amc.2021028 +[Abstract](420) +[HTML](276) +[PDF](490.87KB)
On the number of factorizations of $ t $ mod $ N $ and the probability distribution of Diffie-Hellman secret keys for many users
Alar Leibak
2021doi: 10.3934/amc.2021029 +[Abstract](260) +[HTML](141) +[PDF](304.54KB)
Partitioned difference families: The storm has not yet passed
Marco Buratti and Dieter Jungnickel
2021doi: 10.3934/amc.2021030 +[Abstract](243) +[HTML](146) +[PDF](312.03KB)
A decoding algorithm for 2D convolutional codes over the erasure channel
Julia Lieb and Raquel Pinto
2021doi: 10.3934/amc.2021031 +[Abstract](288) +[HTML](120) +[PDF](475.28KB)
On the number of distinct k-decks: Enumeration and bounds
Johan Chrisnata, Han Mao Kiah, Sankeerth Rao Karingula, Alexander Vardy, Eitan Yaakobi Yao and Hanwen Yao
2021doi: 10.3934/amc.2021032 +[Abstract](267) +[HTML](127) +[PDF](561.44KB)
Two classes of new optimal ternary cyclic codes
Yan Liu, Xiwang Cao and Wei Lu
2021doi: 10.3934/amc.2021033 +[Abstract](286) +[HTML](126) +[PDF](451.61KB)
New type i binary [72, 36, 12] self-dual codes from composite matrices and R1 lifts
Adrian Korban, Serap Şahinkaya and Deniz Ustun
2021doi: 10.3934/amc.2021034 +[Abstract](300) +[HTML](145) +[PDF](393.01KB)
Revisiting some results on APN and algebraic immune functions
Claude Carlet
2021doi: 10.3934/amc.2021035 +[Abstract](260) +[HTML](118) +[PDF](404.43KB)
Domination mappings into the hamming ball: Existence, constructions, and algorithms
Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah and Alexander Vardy
2021doi: 10.3934/amc.2021036 +[Abstract](256) +[HTML](116) +[PDF](1009.78KB)
Z-complementary pairs with flexible lengths and large zero odd-periodic correlation zones
Liqun Yao, Wenli Ren, Yong Wang and Chunming Tang
2021doi: 10.3934/amc.2021037 +[Abstract](398) +[HTML](134) +[PDF](349.95KB)
On the pseudorandom properties of $ k $-ary Sidel'nikov sequences
Huaning Liu and Yixin Ren
2021doi: 10.3934/amc.2021038 +[Abstract](327) +[HTML](121) +[PDF](345.77KB)
New self-dual codes from $ 2 \times 2 $ block circulant matrices, group rings and neighbours of neighbours
Joe Gildea, Abidin Kaya, Adam Michael Roberts, Rhian Taylor and Alexander Tylyshchak
2021doi: 10.3934/amc.2021039 +[Abstract](315) +[HTML](123) +[PDF](333.8KB)
Automorphism groups and isometries for cyclic orbit codes
Heide Gluesing-Luerssen and Hunter Lehmann
2021doi: 10.3934/amc.2021040 +[Abstract](346) +[HTML](124) +[PDF](389.43KB)
Cryptographic multilinear maps using pro-p groups
Delaram Kahrobaei and Mima Stanojkovski
2021doi: 10.3934/amc.2021041 +[Abstract](283) +[HTML](120) +[PDF](379.75KB)
On the weight distribution of the cosets of MDS codes
Alexander A. Davydov, Stefano Marcugini and Fernanda Pambianco
2021doi: 10.3934/amc.2021042 +[Abstract](282) +[HTML](89) +[PDF](402.02KB)
Optimal quinary negacyclic codes with minimum distance four
Jinmei Fan and Yanhai Zhang
2021doi: 10.3934/amc.2021043 +[Abstract](221) +[HTML](112) +[PDF](323.54KB)
Repeated-root constacyclic codes of length 6lmpn
Tingting Wu, Shixin Zhu, Li Liu and Lanqiang Li
2021doi: 10.3934/amc.2021044 +[Abstract](193) +[HTML](89) +[PDF](424.55KB)
On BCH split metacyclic codes
Angelot Behajaina
2021doi: 10.3934/amc.2021045 +[Abstract](464) +[HTML](91) +[PDF](379.49KB)
On one-lee weight and two-lee weight $ \mathbb{Z}_2\mathbb{Z}_4[u] $ additive codes and their constructions
Jie Geng, Huazhang Wu and Patrick Solé
2021doi: 10.3934/amc.2021046 +[Abstract](152) +[HTML](57) +[PDF](430.17KB)
On the complexity of solving generic overdetermined bilinear systems
John B. Baena, Daniel Cabarcas and Javier Verbel
2021doi: 10.3934/amc.2021047 +[Abstract](201) +[HTML](65) +[PDF](510.16KB)
Vandermonde sets, hyperovals and Niho bent functions
Kanat Abdukhalikov and Duy Ho
2021doi: 10.3934/amc.2021048 +[Abstract](174) +[HTML](57) +[PDF](372.77KB)
A survey on functional encryption
Carla Mascia, Massimiliano Sala and Irene Villa
2021doi: 10.3934/amc.2021049 +[Abstract](343) +[HTML](80) +[PDF](715.11KB)
A multivariate identity-based broadcast encryption with applications to the internet of things
Vikas Srivastava, Sumit Kumar Debnath, Pantelimon Stǎnicǎ and Saibal Kumar Pal
2021doi: 10.3934/amc.2021050 +[Abstract](105) +[HTML](40) +[PDF](378.36KB)
Constructions of irredundant orthogonal arrays
Guangzhou Chen and Xiaotong Zhang
2021doi: 10.3934/amc.2021051 +[Abstract](77) +[HTML](35) +[PDF](414.57KB)
Nonexistence of some ternary linear codes with minimum weight -2 modulo 9
Toshiharu Sawashima and Tatsuya Maruta
2021doi: 10.3934/amc.2021052 +[Abstract](91) +[HTML](52) +[PDF](396.23KB)
Security analysis of public key encryption with filtered equality test
Yu-Chi Chen
2021doi: 10.3934/amc.2021053 +[Abstract](71) +[HTML](18) +[PDF](245.56KB)
Splitting authentication codes with perfect secrecy: New results, constructions and connections with algebraic manipulation detection codes
Maura B. Paterson and Douglas R. Stinson
2021doi: 10.3934/amc.2021054 +[Abstract](89) +[HTML](22) +[PDF](360.84KB)
A proof of the conjectured run time of the Hafner-McCurley class group algorithm
Jean-François Biasse and Muhammed Rashad Erukulangara
2021doi: 10.3934/amc.2021055 +[Abstract](469) +[HTML](111) +[PDF](391.38KB)
A new almost perfect nonlinear function which is not quadratic
Yves Edel and Alexander Pott
2009, 3(1) : 59-81 doi: 10.3934/amc.2009.3.59 +[Abstract](5319) +[PDF](288.3KB) Cited By(68)
A new family of linear maximum rank distance codes
John Sheekey
2016, 10(3) : 475-488 doi: 10.3934/amc.2016019 +[Abstract](6354) +[PDF](390.1KB) Cited By(51)
Skew constacyclic codes over Galois rings
Delphine Boucher, Patrick Solé and Felix Ulmer
2008, 2(3) : 273-292 doi: 10.3934/amc.2008.2.273 +[Abstract](5008) +[PDF](247.3KB) Cited By(44)
Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
Anton Stolbunov
2010, 4(2) : 215-235 doi: 10.3934/amc.2010.4.215 +[Abstract](5861) +[PDF](304.1KB) Cited By(44)
Complementary dual codes for counter-measures to side-channel attacks
Claude Carlet and Sylvain Guilley
2016, 10(1) : 131-150 doi: 10.3934/amc.2016.10.131 +[Abstract](4923) +[PDF](502.5KB) Cited By(43)
Public key cryptography based on semigroup actions
Gérard Maze, Chris Monico and Joachim Rosenthal
2007, 1(4) : 489-507 doi: 10.3934/amc.2007.1.489 +[Abstract](5342) +[PDF](248.6KB) Cited By(37)
Efficient implementation of elliptic curve cryptography in wireless sensors
Diego F. Aranha, Ricardo Dahab, Julio López and Leonardo B. Oliveira
2010, 4(2) : 169-187 doi: 10.3934/amc.2010.4.169 +[Abstract](5337) +[PDF](304.4KB) Cited By(32)
A review of the available construction methods for Golomb rulers
Konstantinos Drakakis
2009, 3(3) : 235-250 doi: 10.3934/amc.2009.3.235 +[Abstract](4376) +[PDF](218.2KB) Cited By(31)
A survey of perfect codes
Olof Heden
2008, 2(2) : 223-247 doi: 10.3934/amc.2008.2.223 +[Abstract](5514) +[PDF](323.1KB) Cited By(28)
Combinatorial batch codes
M. B. Paterson, D. R. Stinson and R. Wei
2009, 3(1) : 13-27 doi: 10.3934/amc.2009.3.13 +[Abstract](3580) +[PDF](275.6KB) Cited By(27)
A construction of $ \mathbb{F}_2 $-linear cyclic, MDS codes
Sara D. Cardell, Joan-Josep Climent, Daniel Panario and Brett Stevens
2020, 14(3) : 437-453 doi: 10.3934/amc.2020047 +[Abstract](2407) +[HTML](450) +[PDF](397.95KB) PDF Downloads(2803)
Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results
Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray and Susanta Samanta
2019, 13(4) : 779-843 doi: 10.3934/amc.2019045 +[Abstract](3742) +[HTML](759) +[PDF](673.93KB) PDF Downloads(1464)
Critical perspectives on provable security: Fifteen years of "another look" papers
Neal Koblitz and Alfred Menezes
2019, 13(4) : 517-558 doi: 10.3934/amc.2019034 +[Abstract](6032) +[HTML](1023) +[PDF](437.66KB) PDF Downloads(886)
Efficient traceable ring signature scheme without pairings
Ke Gu, Xinying Dong and Linyu Wang
2020, 14(2) : 207-232 doi: 10.3934/amc.2020016 +[Abstract](2731) +[HTML](527) +[PDF](453.37KB) PDF Downloads(884)
New mission and opportunity for mathematics researchers: Cryptography in the quantum era
Lidong Chen and Dustin Moody
2020, 14(1) : 161-169 doi: 10.3934/amc.2020013 +[Abstract](3660) +[HTML](1082) +[PDF](221.27KB) PDF Downloads(841)
Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
Anton Stolbunov
2010, 4(2) : 215-235 doi: 10.3934/amc.2010.4.215 +[Abstract](5861) +[PDF](304.1KB) PDF Downloads(813)
Double circulant self-dual and LCD codes over Galois rings
Minjia Shi, Daitao Huang, Lin Sok and Patrick Solé
2019, 13(1) : 171-183 doi: 10.3934/amc.2019011 +[Abstract](4592) +[HTML](320) +[PDF](367.28KB) PDF Downloads(811)
Construction of skew cyclic codes over $\mathbb F_q+v\mathbb F_q$
Fatmanur Gursoy, Irfan Siap and Bahattin Yildiz
2014, 8(3) : 313-322 doi: 10.3934/amc.2014.8.313 +[Abstract](4872) +[PDF](318.7KB) PDF Downloads(781)
Improved attacks on knapsack problem with their variants and a knapsack type ID-scheme
Konstantinos A. Draziotis and Anastasia Papadopoulou
2018, 12(3) : 429-449 doi: 10.3934/amc.2018026 +[Abstract](6524) +[HTML](294) +[PDF](543.19KB) PDF Downloads(683)
Highly nonlinear (vectorial) Boolean functions that are symmetric under some permutations
SelÇuk Kavut and Seher Tutdere
2020, 14(1) : 127-136 doi: 10.3934/amc.2020010 +[Abstract](1957) +[HTML](375) +[PDF](303.85KB) PDF Downloads(648)

2020 Impact Factor: 0.935
5 Year Impact Factor: 0.976
2020 CiteScore: 1.5




Email Alert

[Back to Top]