We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 21-40 of 10,000 results
  1. External codes for multiple unicast networks via interference alignment

    We introduce a formal framework to study the multiple unicast problem for a coded network in which the network code is linear over a finite field and...

    F. R. Kschischang, F. Manganiello, ... K. Savary in Designs, Codes and Cryptography
    Article Open access 10 June 2024
  2. On prefer-one sequences

    We study the sequences generated by prefer-one rule with different initial vectors. Firstly, we give upper bounds of their periods and for initial...

    Yupeng Jiang, Ming Li, ... Dongdai Lin in Designs, Codes and Cryptography
    Article 10 June 2024
  3. On the classification of skew Hadamard matrices of order \(\varvec{36}\) and related structures

    Two skew Hadamard matrices are considered SH -equivalent if they are similar by a signed permutation matrix. This paper determines the number of SH -ine...

    Makoto Araya, Masaaki Harada, ... Behruz Tayfeh-Rezaie in Designs, Codes and Cryptography
    Article 07 June 2024
  4. Indicator functions, v-numbers and Gorenstein rings in the theory of projective Reed–Muller-type codes

    For projective Reed–Muller-type codes we give a global duality criterion in terms of the v-number and the Hilbert function of a vanishing ideal. As...

    Manuel González-Sarabia, Humberto Muñoz-George, ... Rafael H. Villarreal in Designs, Codes and Cryptography
    Article 05 June 2024
  5. ZLR: a fast online authenticated encryption scheme achieving full security

    Online authenticated encryption has been considered of practical relevance in light-weight environments due to low latency and constant memory usage....

    Wonseok Choi, Seongha Hwang, ... Jooyoung Lee in Designs, Codes and Cryptography
    Article Open access 30 May 2024
  6. Constructions of t-strongly multimedia IPP codes with length \(t+1\)

    Strongly multimedia identifiable parent property code ( t -SMIPPC) was introduced for protecting multimedia contents from illegally redistributing...

    **g Jiang, Fenggui Pei, ... Henk D. L. Hollmann in Designs, Codes and Cryptography
    Article 28 May 2024
  7. Some new constructions of optimal linear codes and alphabet-optimal \((r,\delta )\)-locally repairable codes

    In distributed storage systems, an r -Locally Repairable Code ( r -LRC) ensures that a failed symbol can be recovered by accessing at most r other...

    **g Qiu, Fang-Wei Fu in Designs, Codes and Cryptography
    Article 24 May 2024
  8. Structure of CSS and CSS-T quantum codes

    We investigate CSS and CSS-T quantum error-correcting codes from the point of view of their existence, rarity, and performance. We give a lower bound...

    Elena Berardini, Alessio Caminata, Alberto Ravagnani in Designs, Codes and Cryptography
    Article 24 May 2024
  9. Bounds on data limits for all-to-all comparison from combinatorial designs

    In situations where every item in a data set must be compared with every other item in the set, it may be desirable to store the data across a number...

    Joanne Hall, Daniel Horsley, Douglas R. Stinson in Designs, Codes and Cryptography
    Article Open access 23 May 2024
  10. Efficient quantum algorithms for some instances of the semidirect discrete logarithm problem

    The semidirect discrete logarithm problem (SDLP) is the following analogue of the standard discrete logarithm problem in the semidirect product...

    Muhammad Imran, Gábor Ivanyos in Designs, Codes and Cryptography
    Article Open access 21 May 2024
  11. On duplication-free codes for disjoint or equal-length errors

    Motivated by applications in DNA storage, we study a setting in which strings are affected by tandem-duplication errors. In particular, we look at...

    Wenjun Yu, Moshe Schwartz in Designs, Codes and Cryptography
    Article 21 May 2024
  12. Locally maximal recoverable codes and LMR-LCD codes

    Rajendra Prasad Rajpurohit, Maheshanand Bhaintwal, Charul Rajput in Designs, Codes and Cryptography
    Article 17 May 2024
  13. LCD codes and almost optimally extendable codes from self-orthogonal codes

    LCD codes and (almost) optimally extendable codes can be used to safeguard against fault injection attacks (FIA) and side-channel attacks (SCA) in...

    **nran Wang, Ziling Heng, ... Qin Yue in Designs, Codes and Cryptography
    Article 17 May 2024
  14. On optimal constant weight codes derived from \(\omega \)-circulant balanced generalized weighing matrices

    Balanced generalized weight matrices are used to construct optimal constant weight codes that are monomially inequivalent to codes derived from the...

    Hadi Kharaghani, Thomas Pender, Vladimir Tonchev in Designs, Codes and Cryptography
    Article 14 May 2024
  15. Lifting iso-dual algebraic geometry codes

    María Chara, Ricardo Podestá, ... Ricardo Toledano in Designs, Codes and Cryptography
    Article 07 May 2024
  16. Yoyo attack on 4-round Lai-Massey scheme with secret round functions

    In this study, we present the first yoyo attack to recover the secret round function of the 4-round Lai-Massey scheme with an affine orthomorphism....

    Le Dong, Danxun Zhang, ... Wenling Wu in Designs, Codes and Cryptography
    Article 03 May 2024
Did you find what you were looking for? Share feedback.