Linear Groups of Isometries with Poset Structures Marcelo Firer, Luciano Panek, Hyun Kwang Kim and Jong Yoon Hyun
Codes identifying sets of binary words with large radii Tero
Laihonen and Sanna Ranto
Skew Hadamard Designs and their Codes Jon-Lark Kim and Patrick Solé
Idempotents in the Neighbourhood of Patterson-Wiedemann Functions
having Walsh Spectra Zeros Sumanta Sarkar and Subhamoy Maitra
On Non-negligible Bias of the First Output Byte of RC4 towards the
First Three Bytes of the Secret Key Goutam Paul, Siddheshwar Rathi and Subhamoy Maitra
Balanced Boolean Functions with (more than) Maximum Algebraic
Immunity Deepak Kumar Dalai and Subhamoy Maitra
Another class of quadratic APN binomials over $\F_{2^n}$: the case
$n$ divisible by 4 Lilya Budaghyan, Claude Carlet and Gregor Leander
Asymptotically good codes Conchita Martínez-Peréz and Wolfgang Willems
Efficient Public Key Encryption with Smallest Ciphertext Expansion
from Factoring Haifeng Qian, Yuan Zhou, Zhibin Li and Zecheng Wang
On the intersection of additive extended and non-extended perfect
codes J. Rifa, F. Solov'eva and M. Villanueva
Small weight codewords in the codes arising from the projective
plane V. Fack, Sz. L. Fancsali, L. Storme, G. Van de Voorde and J. Winne
General error locator polynomials for nth-root codes Marta
Giorgetti and Massimiliano Sala
On the Groebner test set of binary codes M. Borges-Quintana,
M. A. Borges-Trenard and E. Martinez-Moro
On the 2^{m} -variable Symmetric Boolean Functions with Maximum
Algebraic Immunity 2^{m-1} Feng Liu and Keqin Feng
An algebraic description of Boolean functions Massimiliano
Sala and Ilaria Simoetti
Constacyclic Codes over F2+uF2 Taher Abualrub and Irfan Siap
Characterization results on arbitrary (non-)weighted minihypers and
on linear codes meeting the Griesmer bound J. De Beule, K. Metsch and L. Storme
Periodic Multisequences with Large Error Linear Complexity Harald Niederreiter and Ayineedi Venkateswarlu
Solving MRHS linear equations.Extended abstract Hĺvard Raddum and Igor Semaev
Extractors for Binary Elliptic Curves Reza Rezaeian Farashahi, Ruud Pellikaan and Andrey Sidorenko
Edge Local Complementation and Equivalence of Binary Linear
Codes Lars Eirik Danielsen and Matthew G. Parker
k-Error Linear Complexity of Generalisations of Sidelnikov
Sequences Nina Brandstätter and Arne Winterhof
Recognizing reducible structures in Hamming distance codes Raphael Overbeck
Error Correction Procedures for Advanced Encryption Standard
Mariusz Czapski and Maciej Nikodem
Efficient Techniques to Find Algebraic Immunity of S-boxes Based on
Power Mappings Yassir Nawaz, Kishan Chand Gupta and Guang Gong
Traitor tracing scheme with constant ciphertext rate against
powerful pirates Thomas Sirvent
Bundles, presemifields and nonlinear functions K. J. Horadam and D. G. Farmer
On Kloosterman sums divisible by 3 Kseniya Garaschuk and Petr Lisonek
Constructions of Systematic Authentication Codes Using Additive
Polynomials Ferruh Ozbudak and Zulfukar Saygi
A Family of Ternary Quasi-Perfect Codes Danyo Danev and Stefan Dodunekov
Some Strategies to Find Self-Dual Representations of Identically
Self-Dual Matroids. Marc Heymann and Carles Padró
On solving sparse algebraic equations over finite fields. Extended
abstract Igor Semaev
Composition of Recursions and Nonlinear Complexity of Periodic
Binary Sequences G. Petrides and J. Mykkeltveit
An algebraic approach to the classification of some non-linear
codes Eleonora Guerrini and Massimiliano Sala
On LDPC Codes from $(0,1)$-Geometries\\ Induced by Finite Inversive
Spaces of Even Order Mark Flanagan, Marcus Greferath, and Cornelia Roessing
Duality of Ring-Linear Codes and a Linear Programming Bound Eimear Byrne, Marcus Greferath and Michael O'Sullivan
On the Classification of APN Functions up to Dimension Five Marcus Brinkmann and Gregor Leander
Erasure correcting by means of (n,2,n-1)-rank code based on
symmetric matrix Nina I. Pilipchuk and Ernst M. Gabidulin
The trace of an optimal normal element and low complexity normal
bases Maria Christopoulou, Theo Garefalakis, Daniel Panario and David Thomson
An association scheme of cubic bent functions Christian Bey and Gohar M. Kyureghyan
Lattices and Bounds for Commutative Group Rogerio M. Siqueira and Sueli I. R. Costa
Identity-based identification and signature schemes using
correcting codes P.-L. Cayrel, P. Gaborit and M. Girault
List Decoding of second order Reed-Muller Codes and its covering
radius implications Rafaël Fourquet and Cédric Tavernier
Semantic Security for the McEliece Cryptosystem without Random
Oracles, Easily Ryo Nojima, Hideki Imai, Kazukuni Kobara and Kirill Morozov