Designs Codes and Cryptography

Papers
(The TQCC of Designs Codes and Cryptography is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-05-01 to 2024-05-01.)
ArticleCitations
On the c-differential uniformity of certain maps over finite fields31
On the boomerang uniformity of quadratic permutations26
MDS or NMDS self-dual codes from twisted generalized Reed–Solomon codes22
A general framework for secondary constructions of bent and plateaued functions20
Some classes of power functions with low c-differential uniformity over finite fields20
Construction of MDS twisted Reed–Solomon codes and LCD MDS codes18
Optimal binary LCD codes18
Characterization and classification of optimal LCD codes16
A note on Assmus–Mattson type theorems15
Construction of binary LCD codes, ternary LCD codes and quaternary Hermitian LCD codes15
Some constructions of quantum MDS codes15
Cryptographically strong permutations from the butterfly structure15
A new family of EAQMDS codes constructed from constacyclic codes15
Fast, compact, and expressive attribute-based encryption14
Distance Distributions of Cyclic Orbit Codes14
New PcN and APcN functions over finite fields14
Traceable ring signatures: general framework and post-quantum security13
Scattered subspaces and related codes13
On the security of a Loidreau rank metric code based encryption scheme12
Cyclic codes and some new entanglement-assisted quantum MDS codes12
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations12
Optimal minimal linear codes from posets12
A family of projective two-weight linear codes12
Bent partitions12
Tightly CCA-secure encryption scheme in a multi-user setting with corruptions12
A polymatroid approach to generalized weights of rank metric codes12
Hamming and simplex codes for the sum-rank metric11
Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature11
MDS symbol-pair codes from repeated-root cyclic codes11
Two families of two-weight codes over $$\mathbb {Z}_4$$11
Differential spectra of a class of power permutations with characteristic 511
The minimum locality of linear codes11
Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice10
Novel generic construction of leakage-resilient PKE scheme with CCA security10
Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation10
Bent and $${{\mathbb {Z}}}_{2^k}$$-Bent functions from spread-like partitions10
On constructions and properties of (n, m)-functions with maximal number of bent components10
An algorithm for decoding skew Reed–Solomon codes with respect to the skew metric10
On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity9
The dual of an evaluation code9
Design-theoretic analogies between codes, lattices, and vertex operator algebras9
The first families of highly symmetric Kirkman Triple Systems whose orders fill a congruence class9
Twisted cubic and point-line incidence matrix in $$\mathrm {PG}(3,q)$$9
Generalized isotopic shift construction for APN functions9
Additive complementary dual codes over $$\mathbb {F}_4$$9
Construction of lightweight involutory MDS matrices9
Linearly equivalent S-boxes and the division property9
Boomerang uniformity of a class of power maps9
New MDS entanglement-assisted quantum codes from MDS Hermitian self-orthogonal codes9
Access balancing in storage systems by labeling partial Steiner systems9
Code-based signatures from new proofs of knowledge for the syndrome decoding problem8
Complete b-symbol weight distribution of some irreducible cyclic codes8
On the linearity and classification of $${\mathbb {Z}}_{p^s}$$-linear generalized hadamard codes8
Differentially low uniform permutations from known 4-uniform functions8
Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity8
Boomerang uniformity of popular S-box constructions8
Construction of isodual codes from polycirculant matrices8
Binary Hamming codes and Boolean designs8
An improved method for constructing formally self-dual codes with small hulls8
Linear complementary pairs of codes over rings8
New constructions of Z-complementary code sets and mutually orthogonal complementary sequence sets8
Weight distribution of double cyclic codes over Galois rings8
Linear complementary pair of group codes over finite chain rings8
Extending Coggia–Couvreur attack on Loidreau’s rank-metric cryptosystem7
Characterizations and constructions of triple-cycle permutations of the form $$x^rh(x^s)$$7
New families of self-dual codes7
Mosaics of combinatorial designs for information-theoretic security7
A new construction of linear codes with one-dimensional hull7
On post-processing in the quantum algorithm for computing short discrete logarithms7
A note on “Cryptographically strong permutations from the butterfly structure”7
Bounds for flag codes7
The projective general linear group $${\mathrm {PGL}}(2,2^m)$$ and linear codes of length $$2^m+1$$7
Binary primitive LCD BCH codes7
The extended coset leader weight enumerator of a twisted cubic code7
Classification of permutation polynomials of the form $$x^3g(x^{q-1})$$ of $${\mathbb F}_{q^2}$$ where $$g(x)=x^3+bx+c$$ and $$b,c \in {\mathbb F}_q^*$$7
Constructing saturating sets in projective spaces using subgeometries7
Difference matrices with five rows over finite abelian groups7
LCD codes and self-orthogonal codes in generalized dihedral group algebras6
Evaluation codes and their basic parameters6
A survey of elliptic curves for proof systems6
Two families of negacyclic BCH codes6
A scalable post-quantum hash-based group signature6
Vectorial bent functions and partial difference sets6
On the c-differential spectrum of power functions over finite fields6
LIGA: a cryptosystem based on the hardness of rank-metric list and interleaved decoding6
A new method for constructing linear codes with small hulls6
Group signatures and more from isogenies and lattices: generic, simple, and efficient6
Near-MDS codes from elliptic curves6
A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity6
Indifferentiable hashing to ordinary elliptic $${\mathbb {F}}_{\!q}$$-curves of $$j=0$$ with the cost of one exponentiation in $${\mathbb {F}}_{\!q}$$6
Egalitarian Steiner triple systems for data popularity6
Adaptively secure revocable hierarchical IBE from k-linear assumption6
Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G6
Phase orthogonal sequence sets for (QS)CDMA communications5
Generalized semifield spreads5
Galois self-orthogonal constacyclic codes over finite fields5
Parameters and characterizations of hulls of some projective narrow-sense BCH codes5
On the inverses of Kasami and Bracken–Leander exponents5
A note on the Assmus–Mattson theorem for some binary codes5
Construction of $${\text {MDS}}$$ matrices from generalized Feistel structures5
Nonexistence of perfect permutation codes under the Kendall $$\tau $$-metric5
The MILP-aided conditional differential attack and its application to Trivium5
Binomial permutations over finite fields with even characteristic5
An infinite family of antiprimitive cyclic codes supporting Steiner systems $$S(3,8, 7^m+1)$$5
Caps and progression-free sets in $${{\mathbb {Z}}}_m^n$$5
Bent functions in the partial spread class generated by linear recurring sequences5
Cyclic orbit flag codes5
A Legendre pair of length 77 using complementary binary matrices with fixed marginals5
Steiner systems and configurations of points5
About r-primitive and k-normal elements in finite fields5
A direct proof of APN-ness of the Kasami functions5
Application of optimal p-ary linear codes to alphabet-optimal locally repairable codes5
On Pless symmetry codes, ternary QR codes, and related Hadamard matrices and designs5
MDS and near-MDS codes via twisted Reed–Solomon codes5
Functional encryption for set intersection in the multi-client setting5
Composite matrices from group rings, composite G-codes and constructions of self-dual codes5
On the dimension and structure of the square of the dual of a Goppa code5
Revisiting algebraic attacks on MinRank and on the rank decoding problem4
Constructions of MDS symbol-pair codes with minimum distance seven or eight4
On certain self-orthogonal AG codes with applications to Quantum error-correcting codes4
On the algebraic degree of iterated power functions4
Constructions of new matroids and designs over $${\mathbb {F}}_q$$4
The phantom of differential characteristics4
An STP-based model toward designing S-boxes with good cryptographic properties4
Self-orthogonal codes over a non-unital ring and combinatorial matrices4
Constructions of large cyclic constant dimension codes via Sidon spaces4
Revisiting Gilbert’s known-key distinguisher4
A class of twisted generalized Reed–Solomon codes4
A construction of maximally recoverable codes4
A family of linear codes from constant dimension subspace codes4
A new method for secondary constructions of vectorial bent functions4
New results on vectorial dual-bent functions and partial difference sets4
Complete traceability multimedia fingerprinting codes resistant to averaging attack and adversarial noise with optimal rate4
Low-rank parity-check codes over Galois rings4
Extended cyclic codes, maximal arcs and ovoids4
On $$\mathbb {Z}_2\mathbb {Z}_4$$-additive polycyclic codes and their Gray images4
Uniqueness of the inversive plane of order sixty-four4
Equivalence classes of Niho bent functions4
On security properties of all-or-nothing transforms4
The build-up construction over a commutative non-unital ring4
$$(\theta , \delta _\theta )$$-Cyclic codes over $$\mathbb {F}_q[u,v]/\langle u^2-u, v^2-v, uv-vu \rangle $$4
Classification of self-dual cyclic codes over the chain ring $$\mathbb Z_p[u]/\langle u^3 \rangle $$4
Weight distributions and weight hierarchies of a family of p-ary linear codes3
Explicit infinite families of bent functions outside the completed Maiorana–McFarland class3
Analysis of DeepBKZ reduction for finding short lattice vectors3
s-Elusive codes in Hamming graphs3
The 2-adic complexity of Yu-Gong sequences with interleaved structure and optimal autocorrelation magnitude3
On arithmetic progressions in finite fields3
On the generalization of the construction of quantum codes from Hermitian self-orthogonal codes3
Simple and efficient FE for quadratic functions3
Improved upper bounds for parent-identifying set systems and separable codes3
Some restrictions on the weight enumerators of near-extremal ternary self-dual codes and quaternary Hermitian self-dual codes3
Cryptanalysis of Boyen’s attribute-based encryption scheme in TCC 20133
Roulette games and depths of words over finite commutative rings3
Cyclic constant dimension subspace codes via the sum of Sidon spaces3
Efficient identity-based encryption with Hierarchical key-insulation from HIBE3
A new rank metric for convolutional codes3
Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems3
Parallel sub-code construction for constant-dimension codes3
Regular complete permutation polynomials over $${\mathbb {F}}_{2^{n}}$$3
Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, SIMECK3
Maximal nonassociativity via fields3
Optimal quaternary Hermitian LCD codes and their related codes3
Standard model leakage-resilient authenticated key exchange using inner-product extractors3
Good polynomials for optimal LRC of low locality3
Five families of the narrow-sense primitive BCH codes over finite fields3
A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme3
Polycyclic codes associated with trinomials: good codes and open questions3
Duals of linearized Reed–Solomon codes3
Existence of primitive normal pairs with one prescribed trace over finite fields3
Weight distributions of Q2DC codes over finite fields3
The existence of cyclic (v, 4, 1)-designs3
Steganography from perfect codes on Cayley graphs over Gaussian integers, Eisenstein–Jacobi integers and Lipschitz integers3
A gapless code-based hash proof system based on RQC and its applications3
On 2-parent-identifying set systems of block size 43
On the subgroup perfect codes in Cayley graphs3
Greedy weights for matroids3
Rédei permutations with cycles of the same length3
Walsh spectrum and nega spectrum of complementary arrays3
Flag-transitive 2-$$(v,k,\lambda )$$ designs with $$r>\lambda (k-3)$$3
0.049164056777954