Shinagawa, Kazumasa; Eriguchi, Reo; Satake, Shohei; Nuida, Koji Private simultaneous messages based on quadratic residues. (English) Zbl 1527.94068 Des. Codes Cryptography 91, No. 12, 3915-3932 (2023). MSC: 94A60 11T71 14G50 05C90 05E05 PDFBibTeX XMLCite \textit{K. Shinagawa} et al., Des. Codes Cryptography 91, No. 12, 3915--3932 (2023; Zbl 1527.94068) Full Text: DOI arXiv OA License
Hollmann, Henk D. L.; Khathuria, Karan; Riet, Ago-Erik; Skachek, Vitaly On some batch code properties of the simplex code. (English) Zbl 07680962 Des. Codes Cryptography 91, No. 5, 1595-1605 (2023). MSC: 20D60 94B60 20K01 05D40 PDFBibTeX XMLCite \textit{H. D. L. Hollmann} et al., Des. Codes Cryptography 91, No. 5, 1595--1605 (2023; Zbl 07680962) Full Text: DOI arXiv
Satake, Shohei; Gu, Yujie Cayley sum graphs and their applications to codebooks. (English) Zbl 1527.05118 Des. Codes Cryptography 91, No. 4, 1315-1333 (2023). Reviewer: Xueliang Li (Tianjin) MSC: 05C50 05C25 11T71 PDFBibTeX XMLCite \textit{S. Satake} and \textit{Y. Gu}, Des. Codes Cryptography 91, No. 4, 1315--1333 (2023; Zbl 1527.05118) Full Text: DOI
Augot, Daniel; Bordage, Sarah; Nardi, Jade Efficient multivariate low-degree tests via interactive oracle proofs of proximity for polynomial codes. (English) Zbl 1520.94102 Des. Codes Cryptography 91, No. 3, 1111-1151 (2023). MSC: 94B25 68Q11 94C11 PDFBibTeX XMLCite \textit{D. Augot} et al., Des. Codes Cryptography 91, No. 3, 1111--1151 (2023; Zbl 1520.94102) Full Text: DOI
Horsley, Daniel; Ó Catháin, Padraig Block avoiding point sequencings of partial Steiner systems. (English) Zbl 1505.05024 Des. Codes Cryptography 90, No. 10, 2375-2383 (2022). Reviewer: Zhaoping Meng (Jinan) MSC: 05B05 05B07 PDFBibTeX XMLCite \textit{D. Horsley} and \textit{P. Ó Catháin}, Des. Codes Cryptography 90, No. 10, 2375--2383 (2022; Zbl 1505.05024) Full Text: DOI arXiv
Janzer, Oliver; Nagy, Zoltán Lóránt Coloring linear hypergraphs: the Erdős-Faber-Lovász conjecture and the combinatorial nullstellensatz. (English) Zbl 1496.05052 Des. Codes Cryptography 90, No. 9, 1991-2001 (2022). MSC: 05C15 05C65 05C20 PDFBibTeX XMLCite \textit{O. Janzer} and \textit{Z. L. Nagy}, Des. Codes Cryptography 90, No. 9, 1991--2001 (2022; Zbl 1496.05052) Full Text: DOI arXiv
Colbourn, Charles J. Egalitarian Steiner triple systems for data popularity. (English) Zbl 1473.05034 Des. Codes Cryptography 89, No. 10, 2373-2395 (2021). MSC: 05B07 05B05 51E10 68M07 68P20 PDFBibTeX XMLCite \textit{C. J. Colbourn}, Des. Codes Cryptography 89, No. 10, 2373--2395 (2021; Zbl 1473.05034) Full Text: DOI
Zhou, Junling; Zhou, Wenling Wide-sense 2-frameproof codes. (English) Zbl 1478.94150 Des. Codes Cryptography 88, No. 12, 2507-2519 (2020). MSC: 94B65 05C65 05D05 68R05 PDFBibTeX XMLCite \textit{J. Zhou} and \textit{W. Zhou}, Des. Codes Cryptography 88, No. 12, 2507--2519 (2020; Zbl 1478.94150) Full Text: DOI arXiv
Elsholtz, Christian; Pach, Péter Pál Caps and progression-free sets in \(\mathbb{Z}_m^n\). (English) Zbl 1465.11051 Des. Codes Cryptography 88, No. 10, 2133-2170 (2020). MSC: 11B25 20K01 94A60 51E22 PDFBibTeX XMLCite \textit{C. Elsholtz} and \textit{P. P. Pach}, Des. Codes Cryptography 88, No. 10, 2133--2170 (2020; Zbl 1465.11051) Full Text: DOI arXiv
Gu, Yujie; Satake, Shohei On 2-parent-identifying set systems of block size 4. (English) Zbl 1465.94132 Des. Codes Cryptography 88, No. 10, 2067-2076 (2020). MSC: 94B25 05D05 PDFBibTeX XMLCite \textit{Y. Gu} and \textit{S. Satake}, Des. Codes Cryptography 88, No. 10, 2067--2076 (2020; Zbl 1465.94132) Full Text: DOI arXiv
Egorova, Elena; Fernandez, Marcel; Kabatiansky, Grigory On non-binary traceability set systems. (English) Zbl 1453.94160 Des. Codes Cryptography 88, No. 9, 1885-1892 (2020). MSC: 94B60 PDFBibTeX XMLCite \textit{E. Egorova} et al., Des. Codes Cryptography 88, No. 9, 1885--1892 (2020; Zbl 1453.94160) Full Text: DOI Link
Ma, Xuanlong; Feng, Min; Wang, Kaishun Subgroup perfect codes in Cayley sum graphs. (English) Zbl 1448.05153 Des. Codes Cryptography 88, No. 7, 1447-1461 (2020). MSC: 05C69 05C25 94B25 PDFBibTeX XMLCite \textit{X. Ma} et al., Des. Codes Cryptography 88, No. 7, 1447--1461 (2020; Zbl 1448.05153) Full Text: DOI
Hyun, Jong Yoon; Lee, Jungyun; Lee, Yoonjin Ramanujan graphs and expander families constructed from \(p\)-ary bent functions. (English) Zbl 1439.05229 Des. Codes Cryptography 88, No. 2, 453-470 (2020). Reviewer: Yue Zhou (Changsha) MSC: 05E30 11T71 05C50 PDFBibTeX XMLCite \textit{J. Y. Hyun} et al., Des. Codes Cryptography 88, No. 2, 453--470 (2020; Zbl 1439.05229) Full Text: DOI
Bereg, Sergey; Miller, Zevi; Mojica, Luis Gerardo; Morales, Linda; Sudborough, I. H. New lower bounds for permutation arrays using contraction. (English) Zbl 1432.05002 Des. Codes Cryptography 87, No. 9, 2105-2128 (2019). Reviewer: Ioan Tomescu (Bucureşti) MSC: 05A05 05B30 05C25 PDFBibTeX XMLCite \textit{S. Bereg} et al., Des. Codes Cryptography 87, No. 9, 2105--2128 (2019; Zbl 1432.05002) Full Text: DOI arXiv
Lavauzelle, Julien Lifted projective Reed-Solomon codes. (English) Zbl 1445.94037 Des. Codes Cryptography 87, No. 7, 1541-1575 (2019). MSC: 94B05 11T71 PDFBibTeX XMLCite \textit{J. Lavauzelle}, Des. Codes Cryptography 87, No. 7, 1541--1575 (2019; Zbl 1445.94037) Full Text: DOI arXiv
Farràs, Oriol; Ribes-González, Jordi; Ricci, Sara Local bounds for the optimal information ratio of secret sharing schemes. (English) Zbl 1445.94019 Des. Codes Cryptography 87, No. 6, 1323-1344 (2019). MSC: 94A60 68P30 94A62 PDFBibTeX XMLCite \textit{O. Farràs} et al., Des. Codes Cryptography 87, No. 6, 1323--1344 (2019; Zbl 1445.94019) Full Text: DOI
Egorova, Elena; Fernandez, Marcel; Kabatiansky, Grigory; Lee, Moon Ho Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing. (English) Zbl 1421.94125 Des. Codes Cryptography 87, No. 2-3, 455-462 (2019). MSC: 94B60 PDFBibTeX XMLCite \textit{E. Egorova} et al., Des. Codes Cryptography 87, No. 2--3, 455--462 (2019; Zbl 1421.94125) Full Text: DOI Link
Bagheri, Khadijeh; Sadeghi, Mohammad-Reza; Panario, Daniel A non-commutative cryptosystem based on quaternion algebras. (English) Zbl 1408.94926 Des. Codes Cryptography 86, No. 10, 2345-2377 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Bagheri} et al., Des. Codes Cryptography 86, No. 10, 2345--2377 (2018; Zbl 1408.94926) Full Text: DOI arXiv
Shangguan, Chong; Ma, Jingxue; Ge, Gennian New upper bounds for parent-identifying codes and traceability codes. (English) Zbl 1402.94127 Des. Codes Cryptography 86, No. 8, 1727-1737 (2018). MSC: 94B65 94B25 PDFBibTeX XMLCite \textit{C. Shangguan} et al., Des. Codes Cryptography 86, No. 8, 1727--1737 (2018; Zbl 1402.94127) Full Text: DOI
Ihringer, Ferdinand; Meagher, Karen Miklós-Manickam-Singhi conjectures on partial geometries. (English) Zbl 1387.05033 Des. Codes Cryptography 86, No. 6, 1311-1327 (2018); correction ibid. 87, No. 6, 1457 (2019). MSC: 05B25 51E20 05E30 PDFBibTeX XMLCite \textit{F. Ihringer} and \textit{K. Meagher}, Des. Codes Cryptography 86, No. 6, 1311--1327 (2018; Zbl 1387.05033) Full Text: DOI arXiv
Colbourn, Charles J.; Lanus, Erin; Sarkar, Kaushik Asymptotic and constructive methods for covering perfect hash families and covering arrays. (English) Zbl 1383.05045 Des. Codes Cryptography 86, No. 4, 907-937 (2018). MSC: 05B40 05B15 05D40 05E18 51E20 PDFBibTeX XMLCite \textit{C. J. Colbourn} et al., Des. Codes Cryptography 86, No. 4, 907--937 (2018; Zbl 1383.05045) Full Text: DOI
Moreira, José; Fernández, Marcel; Kabatiansky, Grigory Constructions of almost secure frameproof codes with applications to fingerprinting schemes. (English) Zbl 1414.94954 Des. Codes Cryptography 86, No. 4, 785-802 (2018). MSC: 94B60 94B65 PDFBibTeX XMLCite \textit{J. Moreira} et al., Des. Codes Cryptography 86, No. 4, 785--802 (2018; Zbl 1414.94954) Full Text: DOI Link
Raviv, Netanel; Yaakobi, Eitan; Médard, Muriel Coding for locality in reconstructing permutations. (English) Zbl 1386.68050 Des. Codes Cryptography 86, No. 2, 387-418 (2018). MSC: 68P20 05A05 68M14 68R05 94B05 PDFBibTeX XMLCite \textit{N. Raviv} et al., Des. Codes Cryptography 86, No. 2, 387--418 (2018; Zbl 1386.68050) Full Text: DOI arXiv
Mathew, K. Ashik; Östergård, Patric R. J. New lower bounds for the Shannon capacity of odd cycles. (English) Zbl 1367.05160 Des. Codes Cryptography 84, No. 1-2, 13-22 (2017). MSC: 05C69 94A24 PDFBibTeX XMLCite \textit{K. A. Mathew} and \textit{P. R. J. Östergård}, Des. Codes Cryptography 84, No. 1--2, 13--22 (2017; Zbl 1367.05160) Full Text: DOI arXiv
Kendall, Michelle; Martin, Keith M. Graph-theoretic design and analysis of key predistribution schemes. (English) Zbl 1379.94043 Des. Codes Cryptography 81, No. 1, 11-34 (2016). MSC: 94A60 94C99 05B05 05C65 05C90 94C30 94C15 PDFBibTeX XMLCite \textit{M. Kendall} and \textit{K. M. Martin}, Des. Codes Cryptography 81, No. 1, 11--34 (2016; Zbl 1379.94043) Full Text: DOI Link
Jiang, Jing; Cheng, Minquan; Miao, Ying Strongly separable codes. (English) Zbl 1405.94103 Des. Codes Cryptography 79, No. 2, 303-318 (2016). MSC: 94A62 94B25 68P30 PDFBibTeX XMLCite \textit{J. Jiang} et al., Des. Codes Cryptography 79, No. 2, 303--318 (2016; Zbl 1405.94103) Full Text: DOI arXiv
Schmidt, Kai-Uwe Sequences with small correlation. (English) Zbl 1387.94059 Des. Codes Cryptography 78, No. 1, 237-267 (2016). MSC: 94A55 11B83 05B10 PDFBibTeX XMLCite \textit{K.-U. Schmidt}, Des. Codes Cryptography 78, No. 1, 237--267 (2016; Zbl 1387.94059) Full Text: DOI arXiv
Carlet, Claude; Mesnager, Sihem Four decades of research on bent functions. (English) Zbl 1378.94028 Des. Codes Cryptography 78, No. 1, 5-50 (2016). Reviewer: Wilfried Meidl (Linz) MSC: 94A60 06E30 PDFBibTeX XMLCite \textit{C. Carlet} and \textit{S. Mesnager}, Des. Codes Cryptography 78, No. 1, 5--50 (2016; Zbl 1378.94028) Full Text: DOI
Aw, Alan J. The multicovering radius problem for some types of discrete structures. (English) Zbl 1333.94075 Des. Codes Cryptography 72, No. 2, 195-209 (2014). Reviewer: Steven T. Dougherty (Scranton) MSC: 94B75 05D40 PDFBibTeX XMLCite \textit{A. J. Aw}, Des. Codes Cryptography 72, No. 2, 195--209 (2014; Zbl 1333.94075) Full Text: DOI arXiv
López, Hiram H.; Rentería-Márquez, Carlos; Villarreal, Rafael H. Affine Cartesian codes. (English) Zbl 1312.94118 Des. Codes Cryptography 71, No. 1, 5-19 (2014). Reviewer: Marco Calderini (Povo) MSC: 94B27 94B25 13P25 14G50 PDFBibTeX XMLCite \textit{H. H. López} et al., Des. Codes Cryptography 71, No. 1, 5--19 (2014; Zbl 1312.94118) Full Text: DOI arXiv
Auger, David; Cohen, Gérard; Mesnager, Sihem Sphere coverings and identifying codes. (English) Zbl 1282.05184 Des. Codes Cryptography 70, No. 1-2, 3-7 (2014). MSC: 05C70 05C12 05D05 94B25 94C12 PDFBibTeX XMLCite \textit{D. Auger} et al., Des. Codes Cryptography 70, No. 1--2, 3--7 (2014; Zbl 1282.05184) Full Text: DOI
Balachandran, Niranjan Forbidden configurations and Steiner designs. (English) Zbl 1254.05032 Des. Codes Cryptography 65, No. 3, 353-364 (2012). MSC: 05B30 05D05 PDFBibTeX XMLCite \textit{N. Balachandran}, Des. Codes Cryptography 65, No. 3, 353--364 (2012; Zbl 1254.05032) Full Text: DOI
Alon, Noga; Mellinger, Keith E.; Mubayi, Dhruv; Verstraëte, Jacques The de Bruijn-Erdős theorem for hypergraphs. (English) Zbl 1254.05026 Des. Codes Cryptography 65, No. 3, 233-245 (2012). MSC: 05B05 05C65 05C35 PDFBibTeX XMLCite \textit{N. Alon} et al., Des. Codes Cryptography 65, No. 3, 233--245 (2012; Zbl 1254.05026) Full Text: DOI arXiv
Høholdt, Tom; Janwa, Heeralal Eigenvalues and expansion of bipartite graphs. (English) Zbl 1254.05103 Des. Codes Cryptography 65, No. 3, 259-273 (2012). MSC: 05C50 05C45 05B05 94C30 PDFBibTeX XMLCite \textit{T. Høholdt} and \textit{H. Janwa}, Des. Codes Cryptography 65, No. 3, 259--273 (2012; Zbl 1254.05103) Full Text: DOI Link
Bisson, Gaetan; Sutherland, Andrew V. A low-memory algorithm for finding short product representations in finite groups. (English) Zbl 1246.20031 Des. Codes Cryptography 63, No. 1, 1-13 (2012). Reviewer: Władysław Narkiewicz (Wrocław) MSC: 20D60 11B83 11G20 11R29 11T99 20-04 68W30 PDFBibTeX XMLCite \textit{G. Bisson} and \textit{A. V. Sutherland}, Des. Codes Cryptography 63, No. 1, 1--13 (2012; Zbl 1246.20031) Full Text: DOI arXiv
Glynn, David G. An invariant for matrices and sets of points in prime characteristic. (English) Zbl 1229.05303 Des. Codes Cryptography 58, No. 2, 155-172 (2011). MSC: 05E99 11C20 11T71 14L24 15A15 15B33 15A72 51A05 94B27 PDFBibTeX XMLCite \textit{D. G. Glynn}, Des. Codes Cryptography 58, No. 2, 155--172 (2011; Zbl 1229.05303) Full Text: DOI
Collins, Michael J. Upper bounds for parent-identifying set systems. (English) Zbl 1236.05050 Des. Codes Cryptography 51, No. 2, 167-173 (2009). MSC: 05B25 PDFBibTeX XMLCite \textit{M. J. Collins}, Des. Codes Cryptography 51, No. 2, 167--173 (2009; Zbl 1236.05050) Full Text: DOI
Gács, András; Szőnyi, Tamás Random constructions and density results. (English) Zbl 1185.51011 Des. Codes Cryptography 47, No. 1-3, 267-287 (2008). Reviewer: Basri Çelik (Nilüfer-Bursa) MSC: 51E20 51E21 05B25 PDFBibTeX XMLCite \textit{A. Gács} and \textit{T. Szőnyi}, Des. Codes Cryptography 47, No. 1--3, 267--287 (2008; Zbl 1185.51011) Full Text: DOI
Martirosyan, Sosina; van Trung, Tran Explicit constructions for perfect hash families. (English) Zbl 1185.05020 Des. Codes Cryptography 46, No. 1, 97-112 (2008). MSC: 05B05 PDFBibTeX XMLCite \textit{S. Martirosyan} and \textit{T. van Trung}, Des. Codes Cryptography 46, No. 1, 97--112 (2008; Zbl 1185.05020) Full Text: DOI
Xiong, Yu; Ma, Jun; Shen, Hao On optimal codes with \(w\)-identifiable parent property. (English) Zbl 1203.68130 Des. Codes Cryptography 45, No. 1, 65-90 (2007). MSC: 68R10 90C27 90C47 94B25 68P25 PDFBibTeX XMLCite \textit{Y. Xiong} et al., Des. Codes Cryptography 45, No. 1, 65--90 (2007; Zbl 1203.68130) Full Text: DOI
Safavi-Naini, Rei; Wang, Huaxiong Secret sharing schemes with partial broadcast channels. (English) Zbl 1205.94110 Des. Codes Cryptography 41, No. 1, 5-22 (2006). MSC: 94A62 94A17 68P30 PDFBibTeX XMLCite \textit{R. Safavi-Naini} and \textit{H. Wang}, Des. Codes Cryptography 41, No. 1, 5--22 (2006; Zbl 1205.94110) Full Text: DOI
Colbourn, Charles J.; Martirosyan, Sosina S.; van Trung, Tran; Walker, Robert A. Roux-type constructions for covering arrays of strengths three and four. (English) Zbl 1182.05026 Des. Codes Cryptography 41, No. 1, 33-57 (2006). MSC: 05B40 05B15 68N30 PDFBibTeX XMLCite \textit{C. J. Colbourn} et al., Des. Codes Cryptography 41, No. 1, 33--57 (2006; Zbl 1182.05026) Full Text: DOI
Long, Shoulun; Pieprzyk, Josef; Wang, Huaxiong; Wong, Duncan S. Generalised cumulative arrays in secret sharing. (English) Zbl 1261.94032 Des. Codes Cryptography 40, No. 2, 191-209 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{S. Long} et al., Des. Codes Cryptography 40, No. 2, 191--209 (2006; Zbl 1261.94032) Full Text: DOI
van Trung, Tran; Martirosyan, Sosina New constructions for IPP codes. (English) Zbl 1077.94028 Des. Codes Cryptography 35, No. 2, 227-239 (2005). Reviewer: Juan Tena Ayuso (Valladolid) MSC: 94B25 94A60 94B60 PDFBibTeX XMLCite \textit{T. van Trung} and \textit{S. Martirosyan}, Des. Codes Cryptography 35, No. 2, 227--239 (2005; Zbl 1077.94028) Full Text: DOI
Baker, R. D.; Ebert, G. L.; Penttila, Tim Hyperbolic fibrations and \(q\)-clans. (English) Zbl 1079.51504 Des. Codes Cryptography 34, No. 2-3, 295-305 (2005). MSC: 51E20 51A40 PDFBibTeX XMLCite \textit{R. D. Baker} et al., Des. Codes Cryptography 34, No. 2--3, 295--305 (2005; Zbl 1079.51504) Full Text: DOI
Zémor, Gilles Hash functions and Cayley graphs. (English) Zbl 0807.94012 Des. Codes Cryptography 4, No. 4, 381-394 (1994). MSC: 94A60 05C25 68P25 20H15 PDFBibTeX XMLCite \textit{G. Zémor}, Des. Codes Cryptography 4, No. 4, 381--394 (1994; Zbl 0807.94012) Full Text: DOI