An infinite family of antiprimitive cyclic codes supporting Steiner systems \(S(3,8, 7^m+1)\) Can XiangChunming TangQi Liu OriginalPaper 20 April 2022 Pages: 1319 - 1333
On \(\alpha \)-points of q-analogs of the Fano plane Michael Kiermaier OriginalPaper Open access 27 April 2022 Pages: 1335 - 1345
High order elements in finite fields arising from recursive towers Valerio DosePietro MercuriClaudio Stirpe OriginalPaper Open access 21 April 2022 Pages: 1347 - 1368
On the automorphisms of generalized algebraic geometry codes Engin ŞenelFigen Öke OriginalPaper 30 April 2022 Pages: 1369 - 1379
\(\mathsf {CENCPP}^*\): beyond-birthday-secure encryption from public permutations Arghya BhattacharjeeAvijit DuttaMridul Nandi OriginalPaper 25 May 2022 Pages: 1381 - 1425
Optimal selection for good polynomials of degree up to five Austin DukesAndrea FerragutiGiacomo Micheli OriginalPaper 07 May 2022 Pages: 1427 - 1436
On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity Kwang Ho KimSihem MesnagerMyong Chol Jo OriginalPaper 07 May 2022 Pages: 1437 - 1461
Sharper bounds on four lattice constants Jinming WenXiao-Wen Chang OriginalPaper 09 May 2022 Pages: 1463 - 1484
A note on the Assmus–Mattson theorem for some binary codes Tsuyoshi MiezakiHiroyuki Nakasora OriginalPaper 10 May 2022 Pages: 1485 - 1502
Some hypersurfaces over finite fields, minimal codes and secret sharing schemes Angela AgugliaMichela CeriaLuca Giuzzi OriginalPaper Open access 21 May 2022 Pages: 1503 - 1519
Neighbour-transitive codes and partial spreads in generalised quadrangles Dean CrnkovićDaniel R. HawtinAndrea Švob OriginalPaper 21 May 2022 Pages: 1521 - 1533
Correction to: Dispelling myths on superposition attacks: formal security model and attack analyses Luka MusicCéline ChevalierElham Kashefi Correction 13 May 2022 Pages: 1535 - 1535