Designs, Codes, and Cryptography
短名 | Des. Codes Cryptogr. |
Journal Impact | 1.44 |
国际分区 | MATHEMATICS, APPLIED(Q2) |
期刊索引 | SCI Q2中科院 2 区 |
ISSN | 0925-1022, 1573-7586 |
h-index | 68 |
国内分区 | 数学(2区)数学计算机理论方法(2区)数学应用数学(2区) |
DESIGNS, CODES AND CRYPTOGRAPHY 是一份经过档案同行评审的技术期刊,在指定领域发表原创研究论文。在设计理论、编码理论和密码学方面有大量的活动,包括大量的研究,这些研究汇集了不止一个学科。虽然每个单独的领域都有许多期刊,但很少有人鼓励学科之间的互动。该期刊的成立是为了满足在这些领域工作的数学家、工程师和计算机科学家的需求,他们的兴趣超出了任何一个学科的范围。个别学科。该杂志为其三个领域的高质量研究提供了一个论坛,特别欢迎涉及多个领域的论文。该杂志还考虑有限域和有限几何密切相关领域的高质量提交,这为研究提供了重要工具设计、代码和密码系统的构建和实际应用。特别是,它包括(主要是理论的)关于有限域计算方面的论文。它还考虑了序列设计中的主题,这些主题经常承认期刊主要领域中的等效公式。设计、代码和密码学以数学为导向,强调其所涵盖领域的代数和几何方面。该杂志考虑理论和实践性质的高质量论文,只要它们包含大量的数学。
期刊主页投稿网址涉及主题 | 数学计算机科学组合数学离散数学纯数学物理算法程序设计语言几何学数学分析工程类统计哲学量子力学计算机安全操作系统计算机网络生物 |
出版信息 | 出版商: Springer Netherlands,出版周期: Monthly,期刊类型: journal |
基本数据 | 创刊年份: 1991,原创研究文献占比: 100.00%,自引率:14.30%, Gold OA占比: 17.93% |
平均审稿周期 | 网友分享经验:平均9.0个月 |
平均录用比例 | 网友分享经验:容易 |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
最新文章
On the uniqueness of balanced complex orthogonal design
2024-9-3
Minimal abundant packings and choosability with separation
2024-9-3
Moments of autocorrelation demerit factors of binary sequences
2024-9-1
Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field
2024-9-1
Storage codes and recoverable systems on lines and grids
2024-9-1
Time-based attribute-based proxy re-encryption with decryption key update
2024-8-31
Frequency distance sequences for packet detection in physical-layer security
2024-8-31
On the construction of certain odd degree irreducible polynomials over finite fields
2024-8-27
An algebraic approach to circulant column parity mixers
2024-8-21
On Boolean functions derived from linear maps over $$\mathbb {Z}_4$$ and their application to secret sharing
2024-8-16
On the maximum size of ultrametric orthogonal sets over discrete valued fields
2024-8-16
New distance bounds for quasi-cyclic codes
2024-8-14
Involutions of finite abelian groups with explicit constructions on finite fields
2024-8-12
Functional commitments for arbitrary circuits of bounded sizes
2024-8-12
Optimal $$(2,\delta )$$ locally repairable codes via punctured simplex codes
2024-8-12
An algebraic algorithm for breaking NTRU with multiple keys
2024-8-10
Reduction for block-transitive t-$$(k^2,k,\lambda )$$ designs
2024-8-9
Towards a classification of permutation binomials of the form $$x^i+ax$$ over $${\mathbb {F}}_{2^n}$$
2024-8-9
Nontrivial t-designs in polar spaces exist for all t
2024-8-7
Cryptanalysis of a key exchange protocol based on a modified tropical structure
2024-8-3
The classifications of o-monomials and of 2-to-1 binomials are equivalent
2024-7-30
Investigation of the permutation and linear codes from the Welch APN function
2024-7-27
$$\textsf {TOPAS}$$2-pass key exchange with full perfect forward secrecy and optimal communication complexity
2024-7-27
Compact FE for unbounded attribute-weighted sums for logspace from SXDH
2024-7-27
Utilizing FWT in linear cryptanalysis of block ciphers with various structures
2024-7-25
Two new constructions of cyclic subspace codes via Sidon spaces
2024-7-24
MDS array codes with efficient repair and small sub-packetization level
2024-7-23
Security analysis of P-SPN schemes against invariant subspace attack with inactive S-boxes
2024-7-21
A class of functions and their application in constructing semisymmetric designs
2024-7-20
eSTARK: extending STARKs with arguments
2024-7-20
New and improved formally self-dual codes with small hulls from polynomial four Toeplitz codes
2024-7-20
Non-canonical maximum cliques without a design structure in the block graphs of 2-designs
2024-7-18
Curve-lifted codes for local recovery using lines
2024-7-17
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist
2024-7-17
Hulls of cyclic codes with respect to the regular permutation inner product
2024-7-15
Explicit constructions of NMDS self-dual codes
2024-7-12
New spence difference sets
2024-7-10
Vectorial negabent concepts: similarities, differences, and generalizations
2024-7-5
Additivity of symmetric and subspace 2-designs
2024-7-5
Around LCD group codes
2024-7-5
Some self-dual codes and isodual codes constructed by matrix product codes
2024-7-4
Some constacyclic BCH codes with good parameters
2024-7-2
Constructions for t-designs and s-resolvable t-designs
2024-6-27
Affine vector space partitions and spreads of quadrics
2024-6-27
Security analysis of the ISO standard $$\textsf{OFB}$$-$$\textsf{DRBG}$$
2024-6-27
A survey of compositional inverses of permutation polynomials over finite fields
2024-6-27
Finding orientations of supersingular elliptic curves and quaternion orders
2024-6-26
On the maximum size of variable-length non-overlapping codes
2024-6-25
The existence of $$(\mathbb {Z}_v,4,1)$$-disjoint difference families
2024-6-20
Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers
2024-6-18
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远