Designs, Codes, and Cryptography

短名Des. Codes Cryptogr.
Journal Impact1.44
国际分区MATHEMATICS, APPLIED(Q2)
期刊索引SCI Q2中科院 2 区
ISSN0925-1022, 1573-7586
h-index68
国内分区数学(2区)数学计算机理论方法(2区)数学应用数学(2区)

DESIGNS, CODES AND CRYPTOGRAPHY 是一份经过档案同行评审的技术期刊,在指定领域发表原创研究论文。在设计理论、编码理论和密码学方面有大量的活动,包括大量的研究,这些研究汇集了不止一个学科。虽然每个单独的领域都有许多期刊,但很少有人鼓励学科之间的互动。该期刊的成立是为了满足在这些领域工作的数学家、工程师和计算机科学家的需求,他们的兴趣超出了任何一个学科的范围。个别学科。该杂志为其三个领域的高质量研究提供了一个论坛,特别欢迎涉及多个领域的论文。该杂志还考虑有限域和有限几何密切相关领域的高质量提交,这为研究提供了重要工具设计、代码和密码系统的构建和实际应用。特别是,它包括(主要是理论的)关于有限域计算方面的论文。它还考虑了序列设计中的主题,这些主题经常承认期刊主要领域中的等效公式。设计、代码和密码学以数学为导向,强调其所涵盖领域的代数和几何方面。该杂志考虑理论和实践性质的高质量论文,只要它们包含大量的数学。

期刊主页投稿网址
涉及主题数学计算机科学组合数学离散数学纯数学物理算法程序设计语言几何学数学分析工程类统计哲学量子力学计算机安全操作系统计算机网络生物
出版信息出版商: Springer Netherlands出版周期: Monthly期刊类型: journal
基本数据创刊年份: 1991原创研究文献占比100.00%自引率:14.30%Gold OA占比: 17.93%
平均审稿周期 网友分享经验:平均9.0个月
平均录用比例网友分享经验:容易

期刊引文格式

这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。

并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。

只有1位作者的期刊

有2位作者的期刊

有3位作者的期刊

有5位以上作者的期刊

书籍引用格式

以下是创作和编辑的书籍的参考文献的示例。

学位论文引用格式

网页引用格式

这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。

专利引用格式

最新文章

On the uniqueness of balanced complex orthogonal design

2024-9-3

Minimal abundant packings and choosability with separation

2024-9-3

Moments of autocorrelation demerit factors of binary sequences

2024-9-1

Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field

2024-9-1

Storage codes and recoverable systems on lines and grids

2024-9-1

Time-based attribute-based proxy re-encryption with decryption key update

2024-8-31

Frequency distance sequences for packet detection in physical-layer security

2024-8-31

On the construction of certain odd degree irreducible polynomials over finite fields

2024-8-27

An algebraic approach to circulant column parity mixers

2024-8-21

On Boolean functions derived from linear maps over $$\mathbb {Z}_4$$ and their application to secret sharing

2024-8-16

On the maximum size of ultrametric orthogonal sets over discrete valued fields

2024-8-16

New distance bounds for quasi-cyclic codes

2024-8-14

Involutions of finite abelian groups with explicit constructions on finite fields

2024-8-12

Functional commitments for arbitrary circuits of bounded sizes

2024-8-12

Optimal $$(2,\delta )$$ locally repairable codes via punctured simplex codes

2024-8-12

An algebraic algorithm for breaking NTRU with multiple keys

2024-8-10

Reduction for block-transitive t-$$(k^2,k,\lambda )$$ designs

2024-8-9

Towards a classification of permutation binomials of the form $$x^i+ax$$ over $${\mathbb {F}}_{2^n}$$

2024-8-9

Nontrivial t-designs in polar spaces exist for all t

2024-8-7

Cryptanalysis of a key exchange protocol based on a modified tropical structure

2024-8-3

The classifications of o-monomials and of 2-to-1 binomials are equivalent

2024-7-30

Investigation of the permutation and linear codes from the Welch APN function

2024-7-27

$$\textsf {TOPAS}$$2-pass key exchange with full perfect forward secrecy and optimal communication complexity

2024-7-27

Compact FE for unbounded attribute-weighted sums for logspace from SXDH

2024-7-27

Utilizing FWT in linear cryptanalysis of block ciphers with various structures

2024-7-25

Two new constructions of cyclic subspace codes via Sidon spaces

2024-7-24

MDS array codes with efficient repair and small sub-packetization level

2024-7-23

Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes

2024-7-21

A class of functions and their application in constructing semisymmetric designs

2024-7-20

eSTARK: extending STARKs with arguments

2024-7-20

New and improved formally self-dual codes with small hulls from polynomial four Toeplitz codes

2024-7-20

Non-canonical maximum cliques without a design structure in the block graphs of 2-designs

2024-7-18

Curve-lifted codes for local recovery using lines

2024-7-17

CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist

2024-7-17

Hulls of cyclic codes with respect to the regular permutation inner product

2024-7-15

Explicit constructions of NMDS self-dual codes

2024-7-12

New spence difference sets

2024-7-10

Vectorial negabent concepts: similarities, differences, and generalizations

2024-7-5

Additivity of symmetric and subspace 2-designs

2024-7-5

Around LCD group codes

2024-7-5

Some self-dual codes and isodual codes constructed by matrix product codes

2024-7-4

Some constacyclic BCH codes with good parameters

2024-7-2

Constructions for t-designs and s-resolvable t-designs

2024-6-27

Affine vector space partitions and spreads of quadrics

2024-6-27

Security analysis of the ISO standard $$\textsf{OFB}$$-$$\textsf{DRBG}$$

2024-6-27

A survey of compositional inverses of permutation polynomials over finite fields

2024-6-27

Finding orientations of supersingular elliptic curves and quaternion orders

2024-6-26

On the maximum size of variable-length non-overlapping codes

2024-6-25

The existence of $$(\mathbb {Z}_v,4,1)$$-disjoint difference families

2024-6-20

Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers

2024-6-18

帮你贴心管理全部的文献

研飞ivySCI,高效的论文管理

投稿经验分享

分享我的经验,帮你走得更远

Built withby Ivy Science
Copyright © 2020-2024
版权所有:南京青藤格致信息科技有限公司