Designs Codes and Cryptography

Papers
(The TQCC of Designs Codes and Cryptography is 3. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-03-01 to 2025-03-01.)
ArticleCitations
On the algebraic degree of iterated power functions30
Polynomial reduction from syndrome decoding problem to regular decoding problem25
Non-canonical maximum cliques without a design structure in the block graphs of 2-designs23
The revised boomerang connectivity tables and their connection to the difference distribution table21
Automorphism subgroups for designs with $$\lambda =1$$21
On vectorial functions with maximal number of bent components20
Blocking sets of secant and tangent lines with respect to a quadric of $$\text{ PG }(n,q)$$18
A new automatic framework for searching rotational-XOR differential characteristics in ARX ciphers18
Efficient information-theoretic distributed point functions with general output groups17
Additive twisted codes: new distance bounds and infinite families of quantum codes17
Introducing nega-Forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra16
Book Review: “Designs from Linear Codes”, second edition, by Cunsheng Ding and Chunming Tang, World Scientific, 202216
Spectral symmetry in conference matrices16
Editorial Note: Coding and Cryptography 202216
Hardness estimates of the code equivalence problem in the rank metric15
Incremental symmetric puncturable encryption with support for unbounded number of punctures15
Vectorial bent functions and partial difference sets15
A note on the Walsh spectrum of the Flystel14
On two non-existence results for Cameron–Liebler k-sets in $${{\,\mathrm{\textrm{PG}}\,}}(n,q)$$14
A complete characterization of $${\mathcal {D}}_0 \cap {\mathcal {M}}^\#$$ and a general framework for specifying bent functions in $${\mathcal {C}}$$ outside $${\mathcal {M}}^\#$$13
Submodule codes as spherical codes in buildings13
RETRACTED ARTICLE: $$\mathbb {Z}_p\mathbb {Z}_{p^2}$$-linear codes: rank and kernel13
An improved upper bound on self-dual codes over finite fields GF(11), GF(19), and GF(23)13
On prefer-one sequences12
Improving the minimum distance bound of Trace Goppa codes12
Codes with respect to weighted poset block metric11
Observations on the branch number and differential analysis of SPEEDY11
Sok: vector OLE-based zero-knowledge protocols11
A method for constructing quaternary Hermitian self-dual codes and an application to quantum codes10
A class of twisted generalized Reed–Solomon codes10
Additive complementary dual codes over $$\mathbb {F}_4$$10
Efficient computation of $$(2^n,2^n)$$-isogenies10
Generalized semifield spreads10
Ligero: lightweight sublinear arguments without a trusted setup10
A class of constacyclic codes are generalized Reed–Solomon codes10
Flag-transitive 2-designs with prime square replication number and alternating groups10
Optimal quaternary Hermitian LCD codes and their related codes10
Perfect mixed codes from generalized Reed–Muller codes9
Eggs in finite projective spaces and unitals in translation planes9
Parameters of several families of binary duadic codes and their related codes9
Post-quantum security on the Lai–Massey scheme9
Improved bounds for codes correcting insertions and deletions9
Some restrictions on the weight enumerators of near-extremal ternary self-dual codes and quaternary Hermitian self-dual codes9
Generalized attack on ECDSA: known bits in arbitrary positions9
Polar sampler: A novel Bernoulli sampler using polar codes with application to integer Gaussian sampling9
Optimal quaternary $$(r,\delta )$$-locally recoverable codes: their structures and complete classification9
Fast subgroup membership testings for $$\mathbb {G}_1$$, $$\mathbb {G}_2$$ and $$\mathbb {G}_T$$ on pairing-friendly curves9
Self-dual bent sequences for complex Hadamard matrices9
On the security of functional encryption in the generic group model8
Construction-D lattice from Garcia–Stichtenoth tower code8
On translation hyperovals in semifield planes8
$$\textsf {TOPAS}$$2-pass key exchange with full perfect forward secrecy and optimal communication complexity8
Weak rotational property and its application8
Small weight codewords of projective geometric codes II8
Two classes of exceptional m-to-1 rational functions8
Simple vs. vectorial: exploiting structural symmetry to beat the ZeroSum distinguisher8
Infinite families of 3-designs from special symmetric polynomials8
On certain self-orthogonal AG codes with applications to Quantum error-correcting codes7
Cameron–Liebler sets in bilinear forms graphs7
Diagonal groups and arcs over groups7
Properties of the cycles that contain all vectors of weight $$\le k$$7
Coloring linear hypergraphs: the Erdős–Faber–Lovász conjecture and the Combinatorial Nullstellensatz7
Difference-based structural properties of costas arrays7
Mosaics of combinatorial designs for information-theoretic security7
Uniqueness of the inversive plane of order sixty-four7
Variants of Jacobi polynomials in coding theory7
Some classes of power functions with low c-differential uniformity over finite fields7
Difference matrices with five rows over finite abelian groups7
Improving the Gaudry–Schost algorithm for multidimensional discrete logarithms7
Balancedly splittable orthogonal designs and equiangular tight frames7
Generalized bilateral multilevel construction for constant dimension codes7
Several families of irreducible constacyclic and cyclic codes6
Constructions of t-strongly multimedia IPP codes with length $$t+1$$6
Flag-transitive symmetric 2-designs of prime order6
Quantum rectangle attack and its application on Deoxys-BC6
Cayley sum graphs and their applications to codebooks6
Minimal abundant packings and choosability with separation6
Densities of codes of various linearity degrees in translation-invariant metric spaces6
Counting the number of non-isotopic Taniguchi semifields6
Exploiting ROLLO’s constant-time implementations with a single-trace analysis6
Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature6
MDS array codes with efficient repair and small sub-packetization level6
Partition and mix: generalizing the swap-or-not shuffle6
Combinatorial constructions of optimal low-power error-correcting cooling codes6
A further study on bridge structures and constructing bijective S-boxes for low-latency masking6
A note on the Assmus–Mattson theorem for some binary codes II6
Moments of autocorrelation demerit factors of binary sequences6
Explicit constructions of NMDS self-dual codes6
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures5
Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher5
Leakage-resilient $$\textsf {IBE} $$/$$\textsf {ABE} $$  with optimal leakage rates from lattices5
Quantum time/memory/data tradeoff attacks5
The projective general linear group $${\mathrm {PGL}}(2,2^m)$$ and linear codes of length $$2^m+1$$5
The b-symbol weight distributions of all semiprimitive irreducible cyclic codes5
Privacy-preserving data splitting: a combinatorial approach5
On Boolean functions derived from linear maps over $$\mathbb {Z}_4$$ and their application to secret sharing5
The first families of highly symmetric Kirkman Triple Systems whose orders fill a congruence class5
Classification of semiregular relative difference sets with $$\gcd (\lambda ,n)=1$$ attaining Turyn’s bound5
Cryptanalysis of a code-based full-time signature5
Association schemes arising from non-weakly regular bent functions5
Hulls of projective Reed–Muller codes5
A general family of Plotkin-optimal two-weight codes over $$\mathbb {Z}_4$$5
Symplectic 4-dimensional semifields of order $$8^4$$ and $$9^4$$5
Bounding the length of impossible differentials for SPN block ciphers5
Binomial permutations over finite fields with even characteristic5
New quantum codes from self-dual codes over $$\mathbb {F}_4$$5
A new family of EAQMDS codes constructed from constacyclic codes5
LCD subspace codes5
On Pappus configurations in Hall planes4
Hulls of cyclic codes with respect to the regular permutation inner product4
On the algebraic immunity—resiliency trade-off, implications for Goldreich’s pseudorandom generator4
Another look at key randomisation hypotheses4
On the design and security of Lee metric McEliece cryptosystems4
Johnson graph codes4
A construction of maximally recoverable codes4
Switching for 2-designs4
Equivalence classes of Niho bent functions4
On the number of q-ary quasi-perfect codes with covering radius 24
Functional commitments for arbitrary circuits of bounded sizes4
Construction of lightweight involutory MDS matrices4
Circular external difference families: construction and non-existence4
Construction of storage codes of rate approaching one on triangle-free graphs4
Cameron–Liebler k-sets in subspaces and non-existence conditions4
Isomorphism of maximum length circuit codes4
Constructing saturating sets in projective spaces using subgeometries4
Gold functions and switched cube functions are not 0-extendable in dimension n > 54
Improved generalized block inserting construction of constant dimension codes4
Practical key recovery attacks on FlexAEAD4
Neumaier graphs with few eigenvalues4
On the number of rational points of Artin–Schreier’s curves and hypersurfaces4
Algebraic hierarchical locally recoverable codes with nested affine subspace recovery4
SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions4
Ternary isodual codes and 3-designs4
On the subgroup perfect codes in Cayley graphs4
Novel generic construction of leakage-resilient PKE scheme with CCA security4
Locally maximal recoverable codes and LMR-LCD codes4
New MDS entanglement-assisted quantum codes from MDS Hermitian self-orthogonal codes3
Extremely line-primitive automorphism groups of finite linear spaces3
Construction of asymmetric Chudnovsky-type algorithms for multiplication in finite fields3
On arithmetic progressions in finite fields3
Introducing locality in some generalized AG codes3
Block-transitive 3-$$(v,4,\lambda )$$ designs with sporadic or alternating socle3
Robustly reusable fuzzy extractor with imperfect randomness3
The cycle structure of a class of permutation polynomials3
On the packing density of Lee spheres3
Hadamard matrices related to a certain series of ternary self-dual codes3
Individual discrete logarithm with sublattice reduction3
On the maximum size of variable-length non-overlapping codes3
On the (in)security of optimized Stern-like signature schemes3
Constructions for new orthogonal arrays based on large sets of orthogonal arrays3
Classification of extremal type II $$\mathbb {Z}_4$$-codes of length 243
Structure of CSS and CSS-T quantum codes3
The equivalence of linear codes implies semi-linear equivalence3
ZLR: a fast online authenticated encryption scheme achieving full security3
Fully selective opening secure IBE from LWE3
Jacobi polynomials for the first-order generalized Reed–Muller codes3
Covering polynomials and projections of self-dual codes3
An improved method for constructing formally self-dual codes with small hulls3
Permutation polynomials and their compositional inverses over finite fields by a local method3
Correction: Self-orthogonal codes over a non-unital ring and combinatorial matrices3
Determination of the sizes of optimal geometric orthogonal codes with parameters $$(n\times m,k,\lambda ,k-1)$$3
Square root computation in finite fields3
Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes3
Constructing linked systems of relative difference sets via Schur rings3
A survey of compositional inverses of permutation polynomials over finite fields3
Monomial isomorphism for tensors and applications to code equivalence problems3
New method for combining Matsui’s bounding conditions with sequential encoding method3
Some self-dual codes and isodual codes constructed by matrix product codes3
Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees3
Finding orientations of supersingular elliptic curves and quaternion orders3
Phase orthogonal sequence sets for (QS)CDMA communications3
Revisiting products of the form X times a linearized polynomial L(X)3
On the dimension and structure of the square of the dual of a Goppa code3
$$(d,\varvec{\sigma })$$-Veronese variety and some applications3
The existence of $$(\mathbb {Z}_v,4,1)$$-disjoint difference families3
Constructing k-ary orientable sequences with asymptotically optimal length3
Subset sums and block designs in a finite vector space3
The geometry of $$(t\mod q)$$-arcs3
SAND: an AND-RX Feistel lightweight block cipher supporting S-box-based security evaluations3
Fast Kötter–Nielsen–Høholdt interpolation over skew polynomial rings and its application in coding theory3
Plane curves giving rise to blocking sets over finite fields3
Rank weight hierarchy of some classes of polynomial codes3
The differential spectrum and boomerang spectrum of a class of locally-APN functions3
Flag-transitive, point-imprimitive 2-$$(v,k,\lambda )$$ symmetric designs with k and $$\lambda $$ prime powers3
Extremely primitive groups and linear spaces3
A polynomial time algorithm for breaking NTRU encryption with multiple keys3
The estimates of trigonometric sums and new bounds on a mean value, a sequence and a cryptographic function3
CCA security for contracting (quasi-)Feistel constructions with tight round complexity3
Perfect LRCs and k-optimal LRCs3
Short attribute-based signatures for arbitrary Turing machines from standard assumptions3
0.16417288780212