Search
Search Results
-
-
-
-
Special directions on the finite affine plane
In this paper we study the number of special directions of sets of cardinality divisible by p on a finite plane of order p , where p is a prime. We...
-
Chain-imprimitive, flag-transitive 2-designs
We consider 2-designs which admit a group of automorphisms that is flag-transitive and leaves invariant a chain of nontrivial point-partitions. We...
-
Meet-in-the-middle attacks on AES with value constraints
In meet-in-the-middle (MITM) attacks, the sizes of the precomputation tables determine the effectiveness. In this paper, value constraints are...
-
Symmetric 2-adic complexity of Tang–Gong interleaved sequences from generalized GMW sequence pair
Tang–Gong interleaved sequences constructed from the generalized GMW sequence pair are a class of binary sequences with optimal autocorrelation...
-
Fast decoding of lifted interleaved linearized Reed–Solomon codes for multishot network coding
Martínez-Peñas and Kschischang (IEEE Trans. Inf. Theory 65(8):4785–4803, 2019) proposed lifted linearized Reed–Solomon codes as suitable codes for...
-
Constructing linked systems of relative difference sets via Schur rings
In the present paper, we study relative difference sets (RDSs) and linked systems of them. It is shown that a closed linked system of RDSs is always...
-
-
Jacobi polynomials for the first-order generalized Reed–Muller codes
In this paper, we give the Jacobi polynomials for first-order generalized Reed–Muller codes. We show as a corollary the nonexistence of combinatorial...
-
Anonymous attribute-based broadcast encryption with hidden multiple access structures
Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the...