Designs Codes and Cryptography

Papers
(The median citation count of Designs Codes and Cryptography is 1. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2022-01-01 to 2026-01-01.)
ArticleCitations
Editorial Note: Coding and Cryptography 202227
Post-quantum security on the Lai–Massey scheme26
On the security of functional encryption in the generic group model23
Minimal abundant packings and choosability with separation23
On vectorial functions with maximal number of bent components21
Ternary isodual codes and 3-designs20
Uniqueness of the inversive plane of order sixty-four19
On the cycle structure of a class of Galois NFSRs: component sequences possessing identical periods18
Additive complementary dual codes over $$\mathbb {F}_4$$17
Introducing locality in some generalized AG codes17
Efficient computation of $$(2^n,2^n)$$-isogenies16
New constructions of cyclic constant-dimension subspace codes based on Sidon spaces and subspace polynomials16
Moments of autocorrelation demerit factors of binary sequences16
On two non-existence results for Cameron–Liebler k-sets in $${{\,\mathrm{\textrm{PG}}\,}}(n,q)$$16
Rational transformations over finite fields that are never irreducible15
Reduction for block-transitive t-$$(k^2,k,\lambda )$$ designs15
Quantum security of Trojan message attacks on Merkle–Damgård hash construction15
Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY15
Approximate unitary 3-designs from transvection Markov chains15
External codes for multiple unicast networks via interference alignment14
Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing14
The differential spectrum and boomerang spectrum of a class of locally-APN functions14
On arithmetic progressions in finite fields13
Cryptanalysis of a key exchange protocol based on a modified tropical structure13
Fully selective opening secure IBE from LWE13
The geometry of $$(t\mod q)$$-arcs13
The estimates of trigonometric sums and new bounds on a mean value, a sequence and a cryptographic function13
New results on non-disjoint and classical strong external difference families12
Association schemes and orthogonality graphs on anisotropic points of polar spaces12
Extremely primitive groups and linear spaces12
Non-binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codes12
Individual discrete logarithm with sublattice reduction12
An improved method for constructing formally self-dual codes with small hulls11
The cycle structure of a class of permutation polynomials11
On inverses of permutation polynomials of the form $$x\left( x^{s} -a\right) ^{(q^m-1)/s}$$ over $$\mathbb {F}_{q^n}$$10
Construction of correctors using resilient fragmentary Boolean functions10
MDS codes with l-Galois hulls of arbitrary dimensions10
Correction: On flag-transitive symmetric (v, k, 4) designs10
Some constacyclic BCH codes with good parameters9
On subfield subcodes obtained from restricted evaluation codes9
External points to a conic from a Baer subplane9
Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher9
Decoding algorithms of monotone codes and azinv codes and their unified view9
Derivative descendants of cyclic codes and constacyclic codes9
Scheduling to reduce close contacts: resolvable grid graph decomposition and packing9
Reversible $$G^k$$-codes with applications to DNA codes9
Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security8
On subset-resilient hash function families8
Bounds on data limits for all-to-all comparison from combinatorial designs8
Families of quadratic sets on the Klein quadric8
A novel algorithm for the k-XOR problem8
Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication8
Characterizing subgroup perfect codes by 2-subgroups8
Asymptotically optimal aperiodic quasi-complementary sequence sets based on extended Boolean functions8
Unconditionally secure non-malleable secret sharing and circular external difference families8
A generic method for investigating nonsingular Galois NFSRs8
On the nonexistence of ternary linear codes attaining the Griesmer bound8
Optimal Ferrers diagram rank-metric codes from MRD codes8
From primary to dual affine variety codes over the Klein quartic8
Moderate-density parity-check codes from projective bundles7
Generalizing the Bierbrauer–Friedman bound for orthogonal arrays7
Practical dynamic group signatures without knowledge extractors7
Practical algorithm substitution attack on extractable signatures7
Universal partial tori7
RETRACTED ARTICLE: Constructions for t-designs and s-resolvable t-designs7
An STP-based model toward designing S-boxes with good cryptographic properties7
Correction: Linearity of $$\mathbb {Z}_{2^L}$$-linear codes via Schur product7
Storage codes and recoverable systems on lines and grids7
Block-transitive 3-(v, k, 1) designs associated with alternating groups7
Characterization of weakly regular p-ary bent functions of $$\ell $$-form7
Sharper bounds on four lattice constants6
Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers6
Subgroup total perfect codes in Cayley sum graphs6
Construction of quantum codes from multivariate polynomial rings6
Further results on covering codes with radius R and codimension $$tR+1$$6
Permutations minimizing the number of collinear triples6
The weight hierarchy of decreasing norm-trace codes6
Guest editorial: On coding theory and combinatorics—in memory of Vera Pless6
A quantum-secure partial parallel MAC QPCBC6
Improved attacks against reduced-round Whirlwind6
Binary cyclic-gap constant weight codes with low-complexity encoding and decoding6
New MDS and self-dual generalized Roth-Lempel codes as well as their deep holes6
Optimal $$(r,\delta )$$-LRCs from monomial-Cartesian codes and their subfield-subcodes6
On the 430-cap of $$\textrm{PG}(6,4)$$ having two intersection sizes with respect to hyperplanes6
Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice6
Correction: The classifications of o-monomials and of 2-to-1 binomials are equivalent5
New distance bounds for quasi-cyclic codes5
Secret sharing on regular bipartite access structures5
A construction of optimal quasi-cyclic locally recoverable codes using constituent codes5
Lattices in real quadratic fields and associated theta series arising from codes over $${\textbf{F}}_4$$ and $${\textbf{F}}_2 \times {\textbf{F}}_2$$5
The b-symbol weight distributions of all semiprimitive irreducible cyclic codes5
Strongly regular graphs decomposable into a divisible design graph and a Hoffman coclique5
Submodule codes as spherical codes in buildings5
$$\textsf {TOPAS}$$2-pass key exchange with full perfect forward secrecy and optimal communication complexity5
The geometry of covering codes in the sum–rank metric5
(k, n)-Consecutive access structures5
On automorphism groups of binary cyclic codes5
Ternary self-orthogonal codes from weakly regular bent functions and their application in LCD Codes5
The proportion of non-degenerate complementary subspaces in classical spaces5
New models for the cryptanalysis of ASCON5
Hulls of cyclic codes with respect to the regular permutation inner product5
Quantum impossible differential attacks: applications to AES and SKINNY5
Mutually disjoint Steiner systems from BCH codes5
Constructing irreducible polynomials recursively with a reverse composition method5
The stability of the algebraic degree of Boolean functions when restricted to affine spaces5
Image sets of perfectly nonlinear maps5
Optimal two-dimensional multilength optical orthogonal codes via compatible mixed difference packing set systems5
Johnson graph codes5
Signed difference sets4
Retraction Note: Constructions for t-designs and s-resolvable t-designs4
A conceptually simple and generic construction of plaintext checkable encryption in the standard model4
Optimal binary signed-digit representations of integers and the Stern polynomial4
Zero-knowledge proofs for set membership: efficient, succinct, modular4
Security of fixed-weight repetitions of special-sound multi-round interactive proofs4
About r-primitive and k-normal elements in finite fields4
Primitive rank 3 groups, binary codes, and 3-designs4
Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions4
Fast subgroup membership testings for $$\mathbb {G}_1$$, $$\mathbb {G}_2$$ and $$\mathbb {G}_T$$ on pairing-friendly curves4
Constructing k-ary orientable sequences with asymptotically optimal length4
On linear equivalence, canonical forms, and digital signatures4
Decreasing norm-trace codes4
Efficient generation of odd order de Bruijn sequence with the same complement and reverse sequences4
The sequence reconstruction of permutations with Hamming metric4
Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes4
Pairs of MOLS of order ten satisfying non-trivial relations4
Covering polynomials and projections of self-dual codes4
Short attribute-based signatures for arbitrary Turing machines from standard assumptions4
Block-transitive 3-$$(v,4,\lambda )$$ designs with sporadic or alternating socle4
Ryser’s theorem for simple multi-Latin rectangles4
Codes on weighted projective planes4
On the lifting degree of girth-8 QC-LDPC codes4
Several new classes of MDS symbol-pair codes4
More on codes for combinatorial composite DNA4
Differential uniformity and constacyclic code from some power mapping4
New quantum codes from self-dual codes over $$\mathbb {F}_4$$4
Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature4
Perfect LRCs and k-optimal LRCs4
Additive combinatorial designs4
Classifying generalized Howell designs4
On the treewidth of generalized q-Kneser graphs4
Ovoids of Q(6, q) of low degree4
Non-existence of quasi-symmetric designs with restricted block graphs4
New constructions of signed difference sets4
Cameron–Liebler k-sets in subspaces and non-existence conditions4
Towards computing canonical lifts of ordinary elliptic curves in medium characteristic4
A note on the Assmus–Mattson theorem for some binary codes II4
Galois subcovers of the Hermitian curve in characteristic p with respect to subgroups of order dp with $$d\not =p$$ prime4
Gold functions and switched cube functions are not 0-extendable in dimension n > 54
Lemmas on traceability codes and an upper bound for 4-traceability4
A framework for constructing impossible differential distinguishers and its applications4
Difference-based structural properties of costas arrays4
Constructing linked systems of relative difference sets via Schur rings4
Codes from $$A_m$$-invariant polynomials4
Relating code equivalence to other isomorphism problems4
On Bose distance of a class of BCH codes with two types of designed distances3
On the boomerang properties of $$x^{q+2}$$ over $$\mathbb {F}_{q^2}$$3
Quasi optimal anticodes: structure and invariants3
Optimal and extremal graphical designs on regular graphs associated with classical parameters3
The classifications of o-monomials and of 2-to-1 binomials are equivalent3
Generalized cycle joining method and its application to the construction of long-period Galois NFSRs3
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist3
An optimal binary linear functional-repair storage code with efficient repair related to $$\textrm{PG}(2,8)$$3
An infinite family of antiprimitive cyclic codes supporting Steiner systems $$S(3,8, 7^m+1)$$3
Explicit infinite families of bent functions outside the completed Maiorana–McFarland class3
Anonymous attribute-based broadcast encryption with hidden multiple access structures3
Parallel sub-code construction for constant-dimension codes3
The complete weight enumerator of the square of one-weight irreducible cyclic codes3
Information set decoding for ring-linear codes3
Mutual position of two smooth quadrics over finite fields3
Integral characteristics by keyspace partitioning3
Projective tilings and full-rank perfect codes3
Minimum distance and parameter ranges of locally recoverable codes with availability from fiber products of curves3
The regular multivariate quadratic problem3
Complete b-symbol weight distribution of some irreducible cyclic codes3
Further investigation on differential properties of the generalized Ness–Helleseth function3
Exploiting output bits and the $$\chi $$ operation in MitM preimage attacks on Keccak3
Around LCD group codes3
On the image of an affine subspace under the inverse function within a finite field3
Linear codes from support designs of ternary cyclic codes3
LCD codes and almost optimally extendable codes from self-orthogonal codes3
Investigation of the permutation and linear codes from the Welch APN function3
Code-based signatures from new proofs of knowledge for the syndrome decoding problem3
A generalized construction of variable-length non-overlapping codes3
Using alternating de Bruijn sequences to construct de Bruijn tori3
Binary stretch embedding of weighted graphs3
Low-weight codewords in cyclic codes3
Galois LCD subspace codes3
Transitive path decompositions of Cartesian products of complete graphs3
Generic transformation from broadcast encryption to round-optimal deniable ring authentication3
Cryptanalysis of Boyen’s attribute-based encryption scheme in TCC 20133
Griesmer type bounds for additive codes over finite fields, integral and fractional MDS codes3
MDS and near-MDS codes via twisted Reed–Solomon codes3
Semiregular relative difference sets related to Gauss sums and projective planes3
Diagonal cellular factor pair Latin squares3
Can we beat three halves lower bound? (Im)possibility of reducing communication cost for garbled circuits3
Contributions by Aart Blokhuis to finite geometry, discrete mathematics, and combinatorics3
On strongly walk regular graphs, triple sum sets and their codes3
New families of quaternionic Hadamard matrices3
Additivity of symmetric and subspace 2-designs3
Improved key recovery attacks on reduced-round Salsa203
Flag-transitive 2-$$(v,k,\lambda )$$ designs with $$r>\lambda (k-3)$$3
Ovoids in the cyclic presentation of $$\textrm{PG}(3, q )$$3
On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity3
About the Rankin and Bergé-Martinet constants from a coding theory view point3
Block codes in pomset metric over $${\mathbb {Z}}_m$$3
$$\mathsf {CENCPP}^*$$: beyond-birthday-secure encryption from public permutations3
New results on vectorial dual-bent functions and partial difference sets3
Decomposing self-dual bent functions3
Skew differential Goppa codes and their application to Mceliece cryptosystem3
Full threshold change range of threshold changeable secret sharing3
Guess-and-determine attacks on SNOW-Vi stream cipher3
Constructions of large cyclic constant dimension codes via Sidon spaces3
On the equivalence of $$\mathbb {Z}_{p^s}$$-linear generalized Hadamard codes3
On flag-transitive symmetric (v, k, 4) designs3
A recursive method for the construction and enumeration of self-orthogonal and self-dual codes over the quasi-Galois ring $$\mathbb {F}_{2^r}[u]/<u^e>$$2
A common generalization of hypercube partitions and ovoids in polar spaces2
The inverse stability of Artin–Schreier polynomials over finite fields2
Further results on permutation pentanomials over finite fields with characteristic two2
Several classes of new weakly regular bent functions outside $$\mathcal{R}\mathcal{F}$$, their duals and some related (minimal) codes with few weights2
Equidistant permutation group codes2
Yoyo attack on 4-round Lai-Massey scheme with secret round functions2
Indicator functions, v-numbers and Gorenstein rings in the theory of projective Reed–Muller-type codes2
Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext2
A survey of compositional inverses of permutation polynomials over finite fields2
Symmetric (15, 8, 4)-designs in terms of the geometry of binary simplex codes of dimension 42
Plane curves giving rise to blocking sets over finite fields2
On the (in)security of optimized Stern-like signature schemes2
Evaluation codes arising from symmetric polynomials2
Classifying pseudo-ovals, translation generalized quadrangles, and elation Laguerre planes of small order2
The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited2
Neighbour-transitive codes and partial spreads in generalised quadrangles2
A geometric description of the Figueroa plane2
More on the sum-freedom of the multiplicative inverse function2
A further study on the construction methods of bent functions and self-dual bent functions based on Rothaus’s bent function2
Blind key-generation attribute-based encryption for general predicates2
On vanishing sums and cyclic Butson matrices2
Fast Kötter–Nielsen–Høholdt interpolation over skew polynomial rings and its application in coding theory2
Construction of self-orthogonal $$\mathbb {Z}_{2^k}$$-codes2
The average density of K-normal elements over finite fields2
Weak colourings of Kirkman triple systems2
Classification of permutation polynomials of the form $$x^3g(x^{q-1})$$ of $${\mathbb F}_{q^2}$$ where $$g(x)=x^3+bx+c$$ and $$b,c \in {\mathbb F}_q^*$$2
Algebraic properties of the maps $$\chi _n$$2
Decoding error probability of random parity-check matrix ensemble over the erasure channel2
New and improved formally self-dual codes with small hulls from polynomial four Toeplitz codes2
On security notions for encryption in a quantum world2
Harmonic Tutte polynomials of matroids2
Fast decoding of lifted interleaved linearized Reed–Solomon codes for multishot network coding2
The Eckardt point configuration of cubic surfaces revisited2
On the support weight distributions of relative subcodes of some classes of codes2
Linear codes associated to determinantal varieties in the space of hermitian matrices2
0.10317492485046