Isomorphism of maximum length circuit codes Kevin M. Byrnes OriginalPaper 16 January 2022 Pages: 835 - 850
The completion of optimal cyclic quaternary codes of weight 3 and distance 3 Liantao LanYanxun ChangLidong Wang OriginalPaper 30 January 2022 Pages: 851 - 862
Flag-transitive 2-\((v,k,\lambda )\) designs with \(r>\lambda (k-3)\) Yanwei ZhaoShenglin Zhou OriginalPaper 25 February 2022 Pages: 863 - 869
Non-existence of quasi-symmetric designs with restricted block graphs Rajendra M. PawaleMohan S. ShrikhandeKusum S. Rajbhar OriginalPaper 28 February 2022 Pages: 871 - 879
Dispelling myths on superposition attacks: formal security model and attack analyses Luka MusicCéline ChevalierElham Kashefi OriginalPaper 10 March 2022 Pages: 881 - 920
Practical algorithm substitution attack on extractable signatures Yi ZhaoKaitai LiangEmmanouil Panaousis OriginalPaper 05 March 2022 Pages: 921 - 937
A construction of maximally recoverable codes Alexander BargZitan ChenItzhak Tamo OriginalPaper 16 February 2022 Pages: 939 - 945
On the nonexistence of ternary linear codes attaining the Griesmer bound Daiki KawabataTatsuya Maruta OriginalPaper 23 February 2022 Pages: 947 - 956
On the list decodability of rank-metric codes containing Gabidulin codes Paolo SantonastasoFerdinando Zullo OriginalPaper 16 February 2022 Pages: 957 - 982
Practical key recovery attacks on FlexAEAD Orr DunkelmanMaria EichlsederMarkus Schofnegger OriginalPaper 11 March 2022 Pages: 983 - 1007
Trims and extensions of quadratic APN functions Christof BeierleGregor LeanderLéo Perrin OriginalPaper Open access 11 March 2022 Pages: 1009 - 1036
On the linearity and classification of \({\mathbb {Z}}_{p^s}\)-linear generalized hadamard codes Dipak K. BhuniaCristina Fernández-CórdobaMercè Villanueva OriginalPaper Open access 14 March 2022 Pages: 1037 - 1058
Standard model leakage-resilient authenticated key exchange using inner-product extractors Janaka AlawatugodaTatsuaki Okamoto OriginalPaper 15 March 2022 Pages: 1059 - 1079