{"title":"Locally repairable codes with multiple repair sets based on packings of block size 4","authors":"Xiaopan Han, Guojun Han, Han Cai, Linxin Yin","doi":"10.1007/s12095-023-00681-z","DOIUrl":"https://doi.org/10.1007/s12095-023-00681-z","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":" 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135285704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Periodic autocorrelation of sequences","authors":"François Rodier, Florian Caullery, Eric Férard","doi":"10.1007/s12095-023-00680-0","DOIUrl":"https://doi.org/10.1007/s12095-023-00680-0","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"76 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135868296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Budaghyan, C. Carlet, T. Helleseth, Wilfried Meidl
{"title":"Editorial: Special issue on Boolean functions and their applications 2022","authors":"L. Budaghyan, C. Carlet, T. Helleseth, Wilfried Meidl","doi":"10.1007/s12095-023-00678-8","DOIUrl":"https://doi.org/10.1007/s12095-023-00678-8","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"109 1","pages":"1049 - 1051"},"PeriodicalIF":0.0,"publicationDate":"2023-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139315834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factorization of invariant polynomials under actions of projective linear groups and its applications in coding theory","authors":"Xia Li, Qin Yue, Daitao Huang","doi":"10.1007/s12095-023-00675-x","DOIUrl":"https://doi.org/10.1007/s12095-023-00675-x","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136294304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A direct construction of complete complementary code with zero correlation zone property for prime-power length","authors":"Nishant Kumar, Sudhan Majhi, Ashish K. Upadhyay","doi":"10.1007/s12095-023-00676-w","DOIUrl":"https://doi.org/10.1007/s12095-023-00676-w","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135352256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some classes of permutation binomials and trinomials of index $$q-1$$ over $${mathbb {F}_{q^n}}$$","authors":"Rohit Gupta, Luciane Quoos, Qiang Wang","doi":"10.1007/s12095-023-00674-y","DOIUrl":"https://doi.org/10.1007/s12095-023-00674-y","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"206 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135060609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New constructions of mutually orthogonal complementary sets and Z-complementary code sets based on extended Boolean functions","authors":"Hongyang Xiao, Xiwang Cao","doi":"10.1007/s12095-023-00673-z","DOIUrl":"https://doi.org/10.1007/s12095-023-00673-z","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"163 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135202970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A direct construction of optimal 2d-zcacs with flexible array size and large set size","authors":"Gobinda Ghosh, Sudhan Majhi, Shubhabrata Paul","doi":"10.1007/s12095-023-00669-9","DOIUrl":"https://doi.org/10.1007/s12095-023-00669-9","url":null,"abstract":"","PeriodicalId":10788,"journal":{"name":"Cryptography and Communications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135396711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}