All Issues

Volume 16, 2022

Volume 15, 2021

Volume 14, 2020

Volume 13, 2019

Volume 12, 2018

Volume 11, 2017

Volume 10, 2016

Volume 9, 2015

Volume 8, 2014

Volume 7, 2013

Volume 6, 2012

Volume 5, 2011

Volume 4, 2010

Volume 3, 2009

Volume 2, 2008

Volume 1, 2007

AMC Flyer: showing all essential information of the journal.
Advances in Mathematics of Communications (AMC) publishes original research papers of the highest quality in all areas of mathematics and computer science relevant to applications in communications technology. For this reason, submissions from many areas of mathematics are invited, provided these show a high level of originality, new techniques, an innovative approach, novel methodologies, or otherwise a high level of depth and sophistication. Any work that does not conform to these standards will be rejected.

Call for Papers: Special Issue on "Cryptography and Coding Theory-dedicated to the 60th Birthday of Prof. Cunsheng Ding."
Call for Papers: Special Issue "ALgebraic and combinatorial methods for COding and CRYPTography" (ALCOCRYPT)
Call for Papers: Special Issue entitled “Secure Implementations of Post-Quantum Cryptographic Algorithms and Mathematical Approaches

Note: “Most Cited” is by Cross-Ref , and “Most Downloaded” is based on available data in the new website.

Select all articles


Rotated $ A_n $-lattice codes of full diversity
Agnaldo José Ferrari and Tatiana Miguel Rodrigues de Souza
2022, 16(3) : 439-447 doi: 10.3934/amc.2020118 +[Abstract](1460) +[HTML](586) +[PDF](372.16KB)
New discrete logarithm computation for the medium prime case using the function field sieve
Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh and Emmanuel Thomé
2022, 16(3) : 449-464 doi: 10.3934/amc.2020119 +[Abstract](1562) +[HTML](547) +[PDF](459.28KB)
Three classes of partitioned difference families and their optimal constant composition codes
Shanding Xu, Longjiang Qu and Xiwang Cao
2022, 16(3) : 465-483 doi: 10.3934/amc.2020120 +[Abstract](1568) +[HTML](661) +[PDF](552.02KB)
Nearly optimal codebooks from generalized Boolean bent functions over $ \mathbb{Z}_{4} $
Junchao Zhou, Yunge Xu, Lisha Wang and Nian Li
2022, 16(3) : 485-501 doi: 10.3934/amc.2020121 +[Abstract](1417) +[HTML](650) +[PDF](504.91KB)
Codes over $ \frak m $-adic completion rings
Saadoun Mahmoudi and Karim Samei
2022, 16(3) : 503-524 doi: 10.3934/amc.2020122 +[Abstract](1439) +[HTML](514) +[PDF](466.75KB)
Constacyclic codes of length $ 8p^s $ over $ \mathbb F_{p^m} + u\mathbb F_{p^m} $
Hai Q. Dinh, Bac T. Nguyen and Paravee Maneejuk
2022, 16(3) : 525-570 doi: 10.3934/amc.2020123 +[Abstract](1373) +[HTML](513) +[PDF](735.5KB)
Complete weight enumerator of torsion codes
Xiangrui Meng and Jian Gao
2022, 16(3) : 571-596 doi: 10.3934/amc.2020124 +[Abstract](1569) +[HTML](518) +[PDF](591.48KB)
On ideal $ t $-tuple distribution of orthogonal functions in filtering de bruijn generators
Kalikinkar Mandal and Guang Gong
2022, 16(3) : 597-619 doi: 10.3934/amc.2020125 +[Abstract](1457) +[HTML](604) +[PDF](564.45KB)
A practicable timing attack against HQC and its countermeasure
Guillaume Wafo-Tapa, Slim Bettaieb, Loïc Bidoux, Philippe Gaborit and Etienne Marcatel
2022, 16(3) : 621-642 doi: 10.3934/amc.2020126 +[Abstract](1680) +[HTML](703) +[PDF](483.72KB)
On $ \sigma $-self-orthogonal constacyclic codes over $ \mathbb F_{p^m}+u\mathbb F_{p^m} $
Hongwei Liu and Jingge Liu
2022, 16(3) : 643-665 doi: 10.3934/amc.2020127 +[Abstract](1715) +[HTML](571) +[PDF](496.35KB)
RETRACTION: Cryptanalysis and enhancement of multi factor remote user authentication scheme based on signcryption
Editorial Office
2020doi: 10.3934/amc.2020103 +[Abstract](1769) +[HTML](737) +[PDF](58.33KB)
Some results on lightweight stream ciphers Fountain v1 & Lizard
Ravi Anand, Dibyendu Roy and Santanu Sarkar
2020doi: 10.3934/amc.2020128 +[Abstract](1442) +[HTML](552) +[PDF](393.41KB)
Codes with few weights arising from linear sets
Vito Napolitano and Ferdinando Zullo
2020doi: 10.3934/amc.2020129 +[Abstract](1327) +[HTML](548) +[PDF](323.99KB)
On the minimum number of minimal codewords
Romar dela Cruz, Michael Kiermaier, Sascha Kurz and Alfred Wassermann
2021doi: 10.3934/amc.2020130 +[Abstract](1190) +[HTML](542) +[PDF](330.04KB)
A new class of optimal wide-gap one-coincidence frequency-hopping sequence sets
Wenli Ren and Feng Wang
2021doi: 10.3934/amc.2020131 +[Abstract](1186) +[HTML](574) +[PDF](351.72KB)
Polynomial-time plaintext recovery attacks on the IKKR code-based cryptosystems
Terry Shue Chien Lau and Chik How Tan
2021doi: 10.3934/amc.2020132 +[Abstract](1194) +[HTML](592) +[PDF](375.67KB)
Connection of $ p $-ary $ t $-weight linear codes to Ramanujan Cayley graphs with $ t+1 $ eigenvalues
Jong Yoon Hyun, Yoonjin Lee and Yansheng Wu
2021doi: 10.3934/amc.2020133 +[Abstract](1172) +[HTML](514) +[PDF](405.51KB)
Character sums over a non-chain ring and their applications
Liqin Qian and Xiwang Cao
2021doi: 10.3934/amc.2020134 +[Abstract](1099) +[HTML](460) +[PDF](551.93KB)
Duadic codes over $ \mathbb{Z}_4+u\mathbb{Z}_4 $
Raj Kumar and Maheshanand Bhaintwal
2021doi: 10.3934/amc.2020135 +[Abstract](1038) +[HTML](481) +[PDF](383.87KB)
The lower bounds on the second-order nonlinearity of three classes of Boolean functions
Qian Liu
2021doi: 10.3934/amc.2020136 +[Abstract](1168) +[HTML](490) +[PDF](424.97KB)
An optimization approach to the Langberg-Médard multiple unicast conjecture
Kai Cai and Guangyue Han
2021doi: 10.3934/amc.2021001 +[Abstract](919) +[HTML](432) +[PDF](393.36KB)
The weight distribution of irreducible cyclic codes associated with decomposable generalized Paley graphs
Ricardo A. Podestá and Denis E. Videla
2021doi: 10.3934/amc.2021002 +[Abstract](1100) +[HTML](447) +[PDF](440.46KB)
Extremal absorbing sets in low-density parity-check codes
Emily McMillon, Allison Beemer and Christine A. Kelley
2021doi: 10.3934/amc.2021003 +[Abstract](1131) +[HTML](442) +[PDF](421.07KB)
Classical reduction of gap SVP to LWE: A concrete security analysis
Palash Sarkar and Subhadip Singha
2021doi: 10.3934/amc.2021004 +[Abstract](1217) +[HTML](523) +[PDF](452.08KB)
A coercion-resistant blockchain-based E-voting protocol with receipts
Chiara Spadafora, Riccardo Longo and Massimiliano Sala
2021doi: 10.3934/amc.2021005 +[Abstract](2053) +[HTML](576) +[PDF](430.83KB)
Several formulas for Bernoulli numbers and polynomials
Takao Komatsu, Bijan Kumar Patel and Claudio Pita-Ruiz
2021doi: 10.3934/amc.2021006 +[Abstract](1467) +[HTML](494) +[PDF](351.54KB)
Combining subspace codes
Antonio Cossidente, Sascha Kurz, Giuseppe Marino and Francesco Pavese
2021doi: 10.3934/amc.2021007 +[Abstract](1108) +[HTML](427) +[PDF](417.57KB)
On the correlation measures of orders $ 3 $ and $ 4 $ of binary sequence of period $ p^2 $ derived from Fermat quotients
Huaning Liu and Xi Liu
2021doi: 10.3934/amc.2021008 +[Abstract](1225) +[HTML](431) +[PDF](326.96KB)
Formal security proof for a scheme on a topological network
Roberto Civino and Riccardo Longo
2021doi: 10.3934/amc.2021009 +[Abstract](1060) +[HTML](438) +[PDF](266.71KB)
Partial direct product difference sets and almost quaternary sequences
Büşra Özden and Oǧuz Yayla
2021doi: 10.3934/amc.2021010 +[Abstract](967) +[HTML](466) +[PDF](448.97KB)
The weight recursions for the 2-rotation symmetric quartic Boolean functions
Thomas W. Cusick and Younhwan Cheon
2021doi: 10.3934/amc.2021011 +[Abstract](915) +[HTML](423) +[PDF](387.58KB)
Some progress on optimal $ 2 $-D $ (n\times m,3,2,1) $-optical orthogonal codes
Kailu Yang, Xiaomiao Wang, Menglong Zhang and Lidong Wang
2021doi: 10.3934/amc.2021012 +[Abstract](974) +[HTML](474) +[PDF](464.48KB)
Generalized Hamming weights of toric codes over hypersimplices and squarefree affine evaluation codes
Nupur Patanker and Sanjay Kumar Singh
2021doi: 10.3934/amc.2021013 +[Abstract](944) +[HTML](432) +[PDF](416.09KB)
Ternary Primitive LCD BCH codes
Xinmei Huang, Qin Yue, Yansheng Wu and Xiaoping Shi
2021doi: 10.3934/amc.2021014 +[Abstract](908) +[HTML](391) +[PDF](417.23KB)
Quantum states associated to mixed graphs and their algebraic characterization
Constanza Riera, Matthew G. Parker and Pantelimon Stǎnicǎ
2021doi: 10.3934/amc.2021015 +[Abstract](883) +[HTML](404) +[PDF](457.86KB)
Delegating signing rights in a multivariate proxy signature scheme
Sumit Kumar Debnath, Tanmay Choudhury, Pantelimon Stănică, Kunal Dey and Nibedita Kundu
2021doi: 10.3934/amc.2021016 +[Abstract](986) +[HTML](483) +[PDF](965.12KB)
On ideal and weakly-ideal access structures
Reza Kaboli, Shahram Khazaei and Maghsoud Parviz
2021doi: 10.3934/amc.2021017 +[Abstract](960) +[HTML](386) +[PDF](423.61KB)
The conorm code of an AG-code
María Chara, Ricardo A. Podestá and Ricardo Toledano
2021doi: 10.3934/amc.2021018 +[Abstract](924) +[HTML](414) +[PDF](403.32KB)
On the linear complexity and autocorrelation of generalized cyclotomic binary sequences with period $ 4p^n $
Lin Yi, Xiangyong Zeng, Zhimin Sun and Shasha Zhang
2021doi: 10.3934/amc.2021019 +[Abstract](936) +[HTML](446) +[PDF](496.03KB)
A new construction of weightwise perfectly balanced Boolean functions
Rui Zhang and Sihong Su
2021doi: 10.3934/amc.2021020 +[Abstract](1032) +[HTML](397) +[PDF](344.08KB)
Designing tweakable enciphering schemes using public permutations
Debrup Chakraborty, Avijit Dutta and Samir Kundu
2021doi: 10.3934/amc.2021021 +[Abstract](1033) +[HTML](477) +[PDF](651.02KB)
Five-weight codes from three-valued correlation of M-sequences
Minjia Shi, Liqin Qian, Tor Helleseth and Patrick Solé
2021doi: 10.3934/amc.2021022 +[Abstract](873) +[HTML](381) +[PDF](382.23KB)
Some subfield codes from MDS codes
Can Xiang and Jinquan Luo
2021doi: 10.3934/amc.2021023 +[Abstract](968) +[HTML](400) +[PDF](372.9KB)
On additive MDS codes over small fields
Simeon Ball, Guillermo Gamboa and Michel Lavrauw
2021doi: 10.3934/amc.2021024 +[Abstract](922) +[HTML](447) +[PDF](365.49KB)
Four by four MDS matrices with the fewest XOR gates based on words
Shi Wang, Yongqiang Li, Shizhu Tian and Xiangyong Zeng
2021doi: 10.3934/amc.2021025 +[Abstract](915) +[HTML](514) +[PDF](532.12KB)
A new twofold Cornacchia-type algorithm and its applications
Bei Wang, Yi Ouyang, Songsong Li and Honggang Hu
2021doi: 10.3934/amc.2021026 +[Abstract](860) +[HTML](444) +[PDF](420.16KB)
Degenerate flag varieties in network coding
Ghislain Fourier and Gabriele Nebe
2021doi: 10.3934/amc.2021027 +[Abstract](860) +[HTML](367) +[PDF](325.61KB)
New quantum codes from skew constacyclic codes
Ram Krishna Verma, Om Prakash, Ashutosh Singh and Habibul Islam
2021doi: 10.3934/amc.2021028 +[Abstract](1015) +[HTML](493) +[PDF](490.87KB)
On the number of factorizations of $ t $ mod $ N $ and the probability distribution of Diffie-Hellman secret keys for many users
Alar Leibak
2021doi: 10.3934/amc.2021029 +[Abstract](734) +[HTML](319) +[PDF](304.54KB)
Partitioned difference families: The storm has not yet passed
Marco Buratti and Dieter Jungnickel
2021doi: 10.3934/amc.2021030 +[Abstract](698) +[HTML](317) +[PDF](312.03KB)
A decoding algorithm for 2D convolutional codes over the erasure channel
Julia Lieb and Raquel Pinto
2021doi: 10.3934/amc.2021031 +[Abstract](870) +[HTML](284) +[PDF](475.28KB)
On the number of distinct k-decks: Enumeration and bounds
Johan Chrisnata, Han Mao Kiah, Sankeerth Rao Karingula, Alexander Vardy, Eitan Yaakobi Yao and Hanwen Yao
2021doi: 10.3934/amc.2021032 +[Abstract](767) +[HTML](296) +[PDF](561.44KB)
Two classes of new optimal ternary cyclic codes
Yan Liu, Xiwang Cao and Wei Lu
2021doi: 10.3934/amc.2021033 +[Abstract](820) +[HTML](291) +[PDF](451.61KB)
New type i binary [72, 36, 12] self-dual codes from composite matrices and R1 lifts
Adrian Korban, Serap Şahinkaya and Deniz Ustun
2021doi: 10.3934/amc.2021034 +[Abstract](754) +[HTML](325) +[PDF](393.01KB)
Revisiting some results on APN and algebraic immune functions
Claude Carlet
2021doi: 10.3934/amc.2021035 +[Abstract](733) +[HTML](280) +[PDF](404.43KB)
Domination mappings into the hamming ball: Existence, constructions, and algorithms
Yeow Meng Chee, Tuvi Etzion, Han Mao Kiah and Alexander Vardy
2021doi: 10.3934/amc.2021036 +[Abstract](724) +[HTML](278) +[PDF](1009.78KB)
Z-complementary pairs with flexible lengths and large zero odd-periodic correlation zones
Liqun Yao, Wenli Ren, Yong Wang and Chunming Tang
2021doi: 10.3934/amc.2021037 +[Abstract](927) +[HTML](312) +[PDF](349.95KB)
On the pseudorandom properties of $ k $-ary Sidel'nikov sequences
Huaning Liu and Yixin Ren
2021doi: 10.3934/amc.2021038 +[Abstract](806) +[HTML](368) +[PDF](345.77KB)
New self-dual codes from $ 2 \times 2 $ block circulant matrices, group rings and neighbours of neighbours
Joe Gildea, Abidin Kaya, Adam Michael Roberts, Rhian Taylor and Alexander Tylyshchak
2021doi: 10.3934/amc.2021039 +[Abstract](794) +[HTML](309) +[PDF](333.8KB)
Automorphism groups and isometries for cyclic orbit codes
Heide Gluesing-Luerssen and Hunter Lehmann
2021doi: 10.3934/amc.2021040 +[Abstract](841) +[HTML](288) +[PDF](389.43KB)
Cryptographic multilinear maps using pro-p groups
Delaram Kahrobaei and Mima Stanojkovski
2021doi: 10.3934/amc.2021041 +[Abstract](814) +[HTML](290) +[PDF](379.75KB)
On the weight distribution of the cosets of MDS codes
Alexander A. Davydov, Stefano Marcugini and Fernanda Pambianco
2021doi: 10.3934/amc.2021042 +[Abstract](829) +[HTML](241) +[PDF](402.02KB)
Optimal quinary negacyclic codes with minimum distance four
Jinmei Fan and Yanhai Zhang
2021doi: 10.3934/amc.2021043 +[Abstract](700) +[HTML](271) +[PDF](323.54KB)
Repeated-root constacyclic codes of length 6lmpn
Tingting Wu, Shixin Zhu, Li Liu and Lanqiang Li
2021doi: 10.3934/amc.2021044 +[Abstract](656) +[HTML](240) +[PDF](424.55KB)
On BCH split metacyclic codes
Angelot Behajaina
2021doi: 10.3934/amc.2021045 +[Abstract](1063) +[HTML](239) +[PDF](379.49KB)
On one-lee weight and two-lee weight $ \mathbb{Z}_2\mathbb{Z}_4[u] $ additive codes and their constructions
Jie Geng, Huazhang Wu and Patrick Solé
2021doi: 10.3934/amc.2021046 +[Abstract](654) +[HTML](219) +[PDF](430.17KB)
On the complexity of solving generic overdetermined bilinear systems
John B. Baena, Daniel Cabarcas and Javier Verbel
2021doi: 10.3934/amc.2021047 +[Abstract](761) +[HTML](216) +[PDF](510.16KB)
Vandermonde sets, hyperovals and Niho bent functions
Kanat Abdukhalikov and Duy Ho
2021doi: 10.3934/amc.2021048 +[Abstract](688) +[HTML](211) +[PDF](372.77KB)
A survey on functional encryption
Carla Mascia, Massimiliano Sala and Irene Villa
2021doi: 10.3934/amc.2021049 +[Abstract](1373) +[HTML](374) +[PDF](715.11KB)
A multivariate identity-based broadcast encryption with applications to the internet of things
Vikas Srivastava, Sumit Kumar Debnath, Pantelimon Stǎnicǎ and Saibal Kumar Pal
2021doi: 10.3934/amc.2021050 +[Abstract](668) +[HTML](297) +[PDF](378.36KB)
Constructions of irredundant orthogonal arrays
Guangzhou Chen and Xiaotong Zhang
2021doi: 10.3934/amc.2021051 +[Abstract](574) +[HTML](223) +[PDF](414.57KB)
Nonexistence of some ternary linear codes with minimum weight -2 modulo 9
Toshiharu Sawashima and Tatsuya Maruta
2021doi: 10.3934/amc.2021052 +[Abstract](606) +[HTML](253) +[PDF](396.23KB)
Security analysis of public key encryption with filtered equality test
Yu-Chi Chen
2021doi: 10.3934/amc.2021053 +[Abstract](605) +[HTML](183) +[PDF](245.56KB)
Splitting authentication codes with perfect secrecy: New results, constructions and connections with algebraic manipulation detection codes
Maura B. Paterson and Douglas R. Stinson
2021doi: 10.3934/amc.2021054 +[Abstract](563) +[HTML](180) +[PDF](360.84KB)
A proof of the conjectured run time of the Hafner-McCurley class group algorithm
Jean-François Biasse and Muhammed Rashad Erukulangara
2021doi: 10.3934/amc.2021055 +[Abstract](1009) +[HTML](341) +[PDF](391.38KB)
Reversible $ G $-codes over the ring $ {\mathcal{F}}_{j,k} $ with applications to DNA codes
Yasemin Cengellenmis, Abdullah Dertli, Steven T. Dougherty, Adrian Korban, Serap Şahinkaya and Deniz Ustun
2021doi: 10.3934/amc.2021056 +[Abstract](681) +[HTML](181) +[PDF](381.17KB)
Rotational analysis of ChaCha permutation
Stefano Barbero, Emanuele Bellini and Rusydi H. Makarim
2021doi: 10.3934/amc.2021057 +[Abstract](526) +[HTML](170) +[PDF](393.56KB)
New nonexistence results on perfect permutation codes under the hamming metric
Xiang Wang and Wenjuan Yin
2021doi: 10.3934/amc.2021058 +[Abstract](650) +[HTML](167) +[PDF](316.62KB)
Generic constructions of MDS Euclidean self-dual codes via GRS codes
Ziteng Huang, Weijun Fang, Fang-Wei Fu and Fengting Li
2021doi: 10.3934/amc.2021059 +[Abstract](700) +[HTML](169) +[PDF](379.13KB)
Differential spectra of a class of power permutations with Niho exponents
Zhen Li and Haode Yan
2021doi: 10.3934/amc.2021060 +[Abstract](668) +[HTML](196) +[PDF](283.52KB)
Minimal codewords arising from the incidence of points and hyperplanes in projective spaces
Daniele Bartoli and Lins Denaux
2021doi: 10.3934/amc.2021061 +[Abstract](602) +[HTML](165) +[PDF](415.55KB)
Niederreiter cryptosystems using quasi-cyclic codes that resist quantum Fourier sampling
Upendra Kapshikar and Ayan Mahalanobis
2021doi: 10.3934/amc.2021062 +[Abstract](530) +[HTML](199) +[PDF](345.64KB)
Aperiodic/periodic complementary sequence pairs over quaternions
Zhen Li, Cuiling Fan, Wei Su and Yanfeng Qi
2021doi: 10.3934/amc.2021063 +[Abstract](605) +[HTML](178) +[PDF](394.85KB)
On the exponents of APN power functions and Sidon sets, sum-free sets, and Dickson polynomials
Claude Carlet and Stjepan Picek
2021doi: 10.3934/amc.2021064 +[Abstract](521) +[HTML](155) +[PDF](392.67KB)
Constructions of asymptotically optimal codebooks with respect to Welch bound and Levenshtein bound
Gang Wang, Deng-Ming Xu and Fang-Wei Fu
2021doi: 10.3934/amc.2021065 +[Abstract](573) +[HTML](181) +[PDF](327.24KB)
Classification of $ \mathbf{(3 \!\mod 5)} $ arcs in $ \mathbf{ \operatorname{PG}(3,5)} $
Sascha Kurz, Ivan Landjev and Assia Rousseva
2021doi: 10.3934/amc.2021066 +[Abstract](479) +[HTML](156) +[PDF](465.77KB)
Following Forrelation – quantum algorithms in exploring Boolean functions' spectra
Suman Dutta, Subhamoy Maitra and Chandra Sekhar Mukherjee
2022doi: 10.3934/amc.2021067 +[Abstract](605) +[HTML](135) +[PDF](716.29KB)
Rectangular, range, and restricted AONTs: Three generalizations of all-or-nothing transforms
Navid Nasr Esfahani and Douglas R. Stinson
2022doi: 10.3934/amc.2021068 +[Abstract](464) +[HTML](136) +[PDF](290.16KB)
The interplay of different metrics for the construction of constant dimension codes
Sascha Kurz
2022doi: 10.3934/amc.2021069 +[Abstract](424) +[HTML](153) +[PDF](424.08KB)
Construction for both self-dual codes and LCD codes
Keita Ishizuka and Ken Saito
2022doi: 10.3934/amc.2021070 +[Abstract](562) +[HTML](129) +[PDF](340.42KB)
Constructions of optimal low hit zone frequency hopping sequence sets with large family size
Xiujie Zhang, Xianhua Niu and Xin Tan
2022doi: 10.3934/amc.2021071 +[Abstract](477) +[HTML](201) +[PDF](368.67KB)
An algorithmic approach to entanglement-assisted quantum error-correcting codes from the Hermitian curve
René B. Christensen, Carlos Munuera, Francisco R. F. Pereira and Diego Ruano
2022doi: 10.3934/amc.2021072 +[Abstract](562) +[HTML](136) +[PDF](398.52KB)
New quantum codes from metacirculant graphs via self-dual additive $\mathbb{F}_4$-codes
Padmapani Seneviratne and Martianus Frederic Ezerman
2022doi: 10.3934/amc.2021073 +[Abstract](500) +[HTML](193) +[PDF](348.89KB)
Upper bounds on the length function for covering codes with covering radius $ R $ and codimension $ tR+1 $
Alexander A. Davydov, Stefano Marcugini and Fernanda Pambianco
2022doi: 10.3934/amc.2021074 +[Abstract](515) +[HTML](145) +[PDF](562.48KB)
An algorithm for solving over-determined multivariate quadratic systems over finite fields
Lih-Chung Wang, Tzer-jen Wei, Jian-Ming Shih, Yuh-Hua Hu and Chih-Cheng Hsieh
2022doi: 10.3934/amc.2022001 +[Abstract](368) +[HTML](109) +[PDF](411.61KB)
Galois LCD codes over rings
Zihui Liu
2022doi: 10.3934/amc.2022002 +[Abstract](382) +[HTML](95) +[PDF](369.28KB)
Two classes of cyclic extended double-error-correcting Goppa codes
Yanyan Gao, Qin Yue, Xinmei Huang and Yun Yang
2022doi: 10.3934/amc.2022003 +[Abstract](336) +[HTML](120) +[PDF](308.58KB)
Additive polycyclic codes over $ \mathbb{F}_{4} $ induced by binary vectors and some optimal codes
Arezoo Soufi Karbaski, Taher Abualrub, Nuh Aydin and Peihan Liu
2022doi: 10.3934/amc.2022004 +[Abstract](354) +[HTML](181) +[PDF](332.25KB)
Correcting adversarial errors with generalized regenerating codes
Negin Karimi, Ahmad Yousefian Darani and Marcus Greferath
2022doi: 10.3934/amc.2022005 +[Abstract](389) +[HTML](98) +[PDF](337.77KB)
Two pointsets in $ \mathrm{PG}(2,q^n) $ and the associated codes
Vito Napolitano, Olga Polverino, Paolo Santonastaso and Ferdinando Zullo
2022doi: 10.3934/amc.2022006 +[Abstract](343) +[HTML](92) +[PDF](504.56KB)
Computing square roots faster than the Tonelli-Shanks/Bernstein algorithm
Palash Sarkar
2022doi: 10.3934/amc.2022007 +[Abstract](319) +[HTML](84) +[PDF](479.35KB)
Balanced ($\mathbb{Z} _{2u}\times \mathbb{Z}_{38v}$, {3, 4, 5}, 1) difference packings and related codes
Hengming Zhao, Rongcun Qin and Dianhua Wu
2022doi: 10.3934/amc.2022008 +[Abstract](434) +[HTML](149) +[PDF](473.82KB)
The zero-error capacity of binary channels with 2-memories
Guofen Zhang, Ping Li, Jianfeng Hou and Bo Bai
2022doi: 10.3934/amc.2022009 +[Abstract](367) +[HTML](94) +[PDF](334.64KB)
On the generalised rank weights of quasi-cyclic codes
Enhui Lim and Frédérique Oggier
2022doi: 10.3934/amc.2022010 +[Abstract](321) +[HTML](81) +[PDF](354.83KB)
Infinite families of 2-designs from a class of affine-invariant codes
Yan Liu and Xiwang Cao
2022doi: 10.3934/amc.2022011 +[Abstract](290) +[HTML](81) +[PDF](372.56KB)
Finding small roots for bivariate polynomials over the ring of integers
Jiseung Kim and Changmin Lee
2022doi: 10.3934/amc.2022012 +[Abstract](297) +[HTML](92) +[PDF](330.88KB)
Parameterization of Boolean functions by vectorial functions and associated constructions
Claude Carlet
2022doi: 10.3934/amc.2022013 +[Abstract](286) +[HTML](77) +[PDF](435.79KB)
Self-orthogonal codes from equitable partitions of distance-regular graphs
Dean Crnković, Sanja Rukavina and Andrea Švob
2022doi: 10.3934/amc.2022014 +[Abstract](299) +[HTML](132) +[PDF](273.08KB)
On the polycyclic codes over $ \mathbb{F}_q+u\mathbb{F}_q $
Wei Qi
2022doi: 10.3934/amc.2022015 +[Abstract](332) +[HTML](95) +[PDF](321.82KB)
On some codes from rank 3 primitive actions of the simple Chevalley group $ G_2(q) $
Tung Le and Bernardo G. Rodrigues
2022doi: 10.3934/amc.2022016 +[Abstract](290) +[HTML](124) +[PDF](405.23KB)
On $ \mathbb{Z}_4\mathbb{Z}_4[u^3] $-additive constacyclic codes
Om Prakash, Shikha Yadav, Habibul Islam and Patrick Solé
2022doi: 10.3934/amc.2022017 +[Abstract](268) +[HTML](79) +[PDF](503.34KB)
On Polynomial Modular Number Systems over $ \mathbb{Z}/{p}\mathbb{Z} $
Jean-Claude Bajard, Jérémy Marrez, Thomas Plantard and Pascal Véron
2022doi: 10.3934/amc.2022018 +[Abstract](318) +[HTML](104) +[PDF](411.67KB)
Three constructions of Golay complementary array sets
Bingsheng Shen, Yang Yang and Ruibin Ren
2022doi: 10.3934/amc.2022019 +[Abstract](304) +[HTML](119) +[PDF](334.28KB)
Three weight ternary linear codes from non-weakly regular bent functions
Rumi Melih Pelen
2022doi: 10.3934/amc.2022020 +[Abstract](221) +[HTML](66) +[PDF](435.45KB)
Binary self-dual codes of various lengths with new weight enumerators from a modified bordered construction and neighbours
Joe Gildea, Adrian Korban, Adam M. Roberts and Alexander Tylyshchak
2022doi: 10.3934/amc.2022021 +[Abstract](209) +[HTML](62) +[PDF](335.58KB)
Reconstructing points of superelliptic curves over a prime finite field
Jaime Gutierrez
2022doi: 10.3934/amc.2022022 +[Abstract](287) +[HTML](66) +[PDF](378.25KB)
$\mathbb{F}_{p^{m}}\mathbb{F}_{p^{m}}{[u^2]}$-additive skew cyclic codes of length $2p^s $
Roghayeh Mohammadi Hesari, Mahboubeh Hosseinabadi, Rashid Rezaei and Karim Samei
2022doi: 10.3934/amc.2022023 +[Abstract](217) +[HTML](71) +[PDF](437.48KB)
Construction of three classes of strictly optimal frequency-hopping sequence sets
Xianhong Xie, Yi Ouyang, Honggang Hu and Ming Mao
2022doi: 10.3934/amc.2022024 +[Abstract](197) +[HTML](89) +[PDF](334.45KB)
Constructions of optimal multiply constant-weight codes MCWC$ (3,n_1;1,n_2;1,n_3;8)s $
Liying Pan, R. Julian R. Abel and Jinhua Wang
2022doi: 10.3934/amc.2022025 +[Abstract](201) +[HTML](90) +[PDF](587.29KB)
Quantum-safe identity-based broadcast encryption with provable security from multivariate cryptography
Ramprasad Sarkar, Mriganka Mandal and Sourav Mukhopadhyay
2022doi: 10.3934/amc.2022026 +[Abstract](237) +[HTML](120) +[PDF](669.04KB)
Some constructions of (almost) optimally extendable linear codes
Xiaoshan Quan, Qin Yue and Liqin Hu
2022doi: 10.3934/amc.2022027 +[Abstract](191) +[HTML](57) +[PDF](355.16KB)
Convolutional codes over finite chain rings, MDP codes and their characterization
Gianira N. Alfarano, Anina Gruica, Julia Lieb and Joachim Rosenthal
2022doi: 10.3934/amc.2022028 +[Abstract](271) +[HTML](81) +[PDF](405.51KB)
On the hardness of the Lee syndrome decoding problem
Violetta Weger, Karan Khathuria, Anna-Lena Horlemann, Massimo Battaglioni, Paolo Santini and Edoardo Persichetti
2022doi: 10.3934/amc.2022029 +[Abstract](226) +[HTML](49) +[PDF](529.17KB)
Low-density and high-density asymmetric CT-burst correcting integer codes
Nabin Kumar Pokhrel and Pankaj Kumar Das
2022doi: 10.3934/amc.2022030 +[Abstract](251) +[HTML](58) +[PDF](400.66KB)
Public key cryptography based on twisted dihedral group algebras
Javier de la Cruz and Ricardo Villanueva-Polanco
2022doi: 10.3934/amc.2022031 +[Abstract](209) +[HTML](75) +[PDF](474.31KB)
New type I binary $[72, 36, 12]$ self-dual codes from $M_6(\mathbb{F}_2)G$ - Group matrix rings by a hybrid search technique based on a neighbourhood-virus optimisation algorithm
Adrian Korban, Serap Sahinkaya and Deniz Ustun
2022doi: 10.3934/amc.2022032 +[Abstract](152) +[HTML](68) +[PDF](973.08KB)
A novel genetic search scheme based on nature-inspired evolutionary algorithms for binary self-dual codes
Adrian Korban, Serap Şahinkaya and Deniz Ustun
2022doi: 10.3934/amc.2022033 +[Abstract](176) +[HTML](85) +[PDF](3600.92KB)
Constructions of optimal rank-metric codes from automorphisms of rational function fields
Rakhi Pratihar and Tovohery Hajatiana Randrianarisoa
2022doi: 10.3934/amc.2022034 +[Abstract](174) +[HTML](39) +[PDF](476.39KB)
Differential faultt attack on DEFAULT
Chandan Dey, Sumit Kumar Pandey, Tapabrata Roy and Santanu Sarkar
2022doi: 10.3934/amc.2022035 +[Abstract](91) +[HTML](35) +[PDF](379.12KB)
Binary self-dual and LCD codes from generator matrices constructed from two group ring elements by a heuristic search scheme
Steven Dougherty, Adrian Korban, Serap Șahinkaya and Deniz Ustun
2022doi: 10.3934/amc.2022036 +[Abstract](111) +[HTML](48) +[PDF](327.95KB)
Optimal data placements for triple replication in distributed storage systems
Ruijing Liu and Junling Zhou
2022doi: 10.3934/amc.2022037 +[Abstract](86) +[HTML](23) +[PDF](408.63KB)
Loops, multi-edges and collisions in supersingular isogeny graphs
Wissam Ghantous
2022doi: 10.3934/amc.2022038 +[Abstract](66) +[HTML](20) +[PDF](441.53KB)
New constant dimension subspace codes from multilevel linkage construction
Huimin Lao and Hao Chen
2022doi: 10.3934/amc.2022039 +[Abstract](76) +[HTML](34) +[PDF](379.78KB)
Kite-group divisible packings and coverings with any minimum leave and minimum excess
Yuxing Yang, Yanxun Chang and Lidong Wang
2022doi: 10.3934/amc.2022040 +[Abstract](94) +[HTML](19) +[PDF](377.98KB)
Constructions for several classes of few-weight linear codes and their applications
Canze Zhu and Qunying Liao
2022doi: 10.3934/amc.2022041 +[Abstract](65) +[HTML](10) +[PDF](498.73KB)
Optimal binary linear codes from posets of the disjoint union of two chains
Yansheng Wu, Jong Yoon Hyun and Qin Yue
2022doi: 10.3934/amc.2022042 +[Abstract](65) +[HTML](19) +[PDF](290.19KB)
Infinite families of $ t $-designs and strongly regular graphs from punctured codes
Ziling Heng, Dexiang Li, Fenjin Liu and Weiqiong Wang
2022doi: 10.3934/amc.2022043 +[Abstract](29) +[HTML](12) +[PDF](437.0KB)
Another expression of the MacWilliams identities and its applications
Fengwei Li and Xuemei Wang
2022doi: 10.3934/amc.2022044 +[Abstract](20) +[HTML](12) +[PDF](375.37KB)
Compositional inverses of AGW-PPs –dedicated to professor cunsheng ding for his 60th birthday
Pingzhi Yuan
2022doi: 10.3934/amc.2022045 +[Abstract](30) +[HTML](8) +[PDF](330.98KB)
Two classes of power mappings with boomerang uniformity 2
Haode Yan, Zhen Li, Zhitian Song and Rongquan Feng
2022doi: 10.3934/amc.2022046 +[Abstract](30) +[HTML](10) +[PDF](322.05KB)
Expressing the minimum distance, weight distribution and covering radius of codes by means of the algebraic and numerical normal forms of their indicators
Claude Carlet
2022doi: 10.3934/amc.2022047 +[Abstract](21) +[HTML](20) +[PDF](383.32KB)
A new almost perfect nonlinear function which is not quadratic
Yves Edel and Alexander Pott
2009, 3(1) : 59-81 doi: 10.3934/amc.2009.3.59 +[Abstract](6191) +[PDF](288.3KB) Cited By(68)
A new family of linear maximum rank distance codes
John Sheekey
2016, 10(3) : 475-488 doi: 10.3934/amc.2016019 +[Abstract](7163) +[PDF](390.1KB) Cited By(51)
Skew constacyclic codes over Galois rings
Delphine Boucher, Patrick Solé and Felix Ulmer
2008, 2(3) : 273-292 doi: 10.3934/amc.2008.2.273 +[Abstract](5733) +[PDF](247.3KB) Cited By(44)
Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
Anton Stolbunov
2010, 4(2) : 215-235 doi: 10.3934/amc.2010.4.215 +[Abstract](7018) +[PDF](304.1KB) Cited By(44)
Complementary dual codes for counter-measures to side-channel attacks
Claude Carlet and Sylvain Guilley
2016, 10(1) : 131-150 doi: 10.3934/amc.2016.10.131 +[Abstract](5772) +[PDF](502.5KB) Cited By(43)
Public key cryptography based on semigroup actions
Gérard Maze, Chris Monico and Joachim Rosenthal
2007, 1(4) : 489-507 doi: 10.3934/amc.2007.1.489 +[Abstract](6150) +[PDF](248.6KB) Cited By(37)
Efficient implementation of elliptic curve cryptography in wireless sensors
Diego F. Aranha, Ricardo Dahab, Julio López and Leonardo B. Oliveira
2010, 4(2) : 169-187 doi: 10.3934/amc.2010.4.169 +[Abstract](6053) +[PDF](304.4KB) Cited By(32)
A review of the available construction methods for Golomb rulers
Konstantinos Drakakis
2009, 3(3) : 235-250 doi: 10.3934/amc.2009.3.235 +[Abstract](5057) +[PDF](218.2KB) Cited By(31)
A survey of perfect codes
Olof Heden
2008, 2(2) : 223-247 doi: 10.3934/amc.2008.2.223 +[Abstract](6501) +[PDF](323.1KB) Cited By(28)
Combinatorial batch codes
M. B. Paterson, D. R. Stinson and R. Wei
2009, 3(1) : 13-27 doi: 10.3934/amc.2009.3.13 +[Abstract](4308) +[PDF](275.6KB) Cited By(27)
A construction of $ \mathbb{F}_2 $-linear cyclic, MDS codes
Sara D. Cardell, Joan-Josep Climent, Daniel Panario and Brett Stevens
2020, 14(3) : 437-453 doi: 10.3934/amc.2020047 +[Abstract](3204) +[HTML](453) +[PDF](397.95KB) PDF Downloads(3054)
Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results
Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray and Susanta Samanta
2019, 13(4) : 779-843 doi: 10.3934/amc.2019045 +[Abstract](4391) +[HTML](759) +[PDF](673.93KB) PDF Downloads(2016)
Double circulant self-dual and LCD codes over Galois rings
Minjia Shi, Daitao Huang, Lin Sok and Patrick Solé
2019, 13(1) : 171-183 doi: 10.3934/amc.2019011 +[Abstract](5269) +[HTML](321) +[PDF](367.28KB) PDF Downloads(1371)
Critical perspectives on provable security: Fifteen years of "another look" papers
Neal Koblitz and Alfred Menezes
2019, 13(4) : 517-558 doi: 10.3934/amc.2019034 +[Abstract](7138) +[HTML](1030) +[PDF](437.66KB) PDF Downloads(1262)
Efficient traceable ring signature scheme without pairings
Ke Gu, Xinying Dong and Linyu Wang
2020, 14(2) : 207-232 doi: 10.3934/amc.2020016 +[Abstract](3437) +[HTML](533) +[PDF](453.37KB) PDF Downloads(1169)
Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
Anton Stolbunov
2010, 4(2) : 215-235 doi: 10.3934/amc.2010.4.215 +[Abstract](7018) +[PDF](304.1KB) PDF Downloads(1045)
Construction of skew cyclic codes over $\mathbb F_q+v\mathbb F_q$
Fatmanur Gursoy, Irfan Siap and Bahattin Yildiz
2014, 8(3) : 313-322 doi: 10.3934/amc.2014.8.313 +[Abstract](5754) +[PDF](318.7KB) PDF Downloads(1010)
Some remarks on the construction of class polynomials
Elisavet Konstantinou and Aristides Kontogeorgis
2011, 5(1) : 109-118 doi: 10.3934/amc.2011.5.109 +[Abstract](5749) +[PDF](234.9KB) PDF Downloads(975)
New mission and opportunity for mathematics researchers: Cryptography in the quantum era
Lidong Chen and Dustin Moody
2020, 14(1) : 161-169 doi: 10.3934/amc.2020013 +[Abstract](4566) +[HTML](1093) +[PDF](221.27KB) PDF Downloads(957)
Improved attacks on knapsack problem with their variants and a knapsack type ID-scheme
Konstantinos A. Draziotis and Anastasia Papadopoulou
2018, 12(3) : 429-449 doi: 10.3934/amc.2018026 +[Abstract](7226) +[HTML](297) +[PDF](543.19KB) PDF Downloads(873)

2021 Impact Factor: 1.015
5 Year Impact Factor: 1.078
2021 CiteScore: 1.8




Email Alert

[Back to Top]