Search
Search Results
-
Explicit constructions of NMDS self-dual codes
Near maximum distance separable (NMDS) codes are important in finite geometry and coding theory. Self-dual codes are closely related to...
-
-
Vectorial negabent concepts: similarities, differences, and generalizations
In Pasalic et al. (IEEE Trans Inf Theory 69:2702–2712, 2023), and in Anbar and Meidl (Cryptogr Commun 10:235–249, 2018), two different vectorial...
-
Some self-dual codes and isodual codes constructed by matrix product codes
In 2020, Cao et al. proved that any repeated-root constacyclic code is monomially equivalent to a matrix product code of simple-root constacyclic...
-
Some constacyclic BCH codes with good parameters
BCH codes as a subclass of constacyclic BCH codes have been widely studied, while the results on the parameters of BCH codes over finite fields are...
-
Security analysis of the ISO standard \(\textsf{OFB}\)-\(\textsf{DRBG}\)
Deterministic random bit generators (DRBGs) are essential tools in modern cryptography for generating secure and unpredictable random numbers. The...
-
A survey of compositional inverses of permutation polynomials over finite fields
In this paper, we survey on the recent results and methods in the study of compositional inverses of permutation polynomials over finite fields. In...
-
Constructions for t-designs and s-resolvable t-designs
The purpose of the present paper is to introduce recursive methods for constructing simple t -designs, s -resolvable t -designs, and large sets of t -desi...
-
Finding orientations of supersingular elliptic curves and quaternion orders
An oriented supersingular elliptic curve is a curve which is enhanced with the information of an endomorphism. Computing the full endomorphism ring...
-
On the maximum size of variable-length non-overlap** codes
Non-overlap** codes are a set of codewords such that any nontrivial prefix of each codeword is not a nontrivial suffix of any codeword in the set,...
-
Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers
Cryptanalysis of modern symmetric ciphers may be done by using linear equation systems with multiple right hand sides, which describe the encryption...
-
Bases for Riemann–Roch spaces of linearized function fields with applications to generalized algebraic geometry codes
Several applications of function fields over finite fields, or equivalently, algebraic curves over finite fields, require computing bases for...
-
Optimal ternary locally repairable codes
Locally repairable codes (LRCs) are linear codes with locality properties for code symbols, which have important applications in distributed storage...
-
Circular external difference families: construction and non-existence
The circular external difference family and its strong version are of great significance both in theory and in applications. In this paper, we apply...