In this paper, we describe a new infinite family of q2 −1 2 -tight sets in the hyperbolic quadrics Q+ (5, q), for q ≡ 5 or 9 mod 12. Under the Klein correspondence, these cor...
Jan De Beule, Jeroen Demeyer, Klaus Metsch, Morgan...
Abstract. One of the central challenges for mathematical cryptography is to create a payment system that provides the advantages of cash in a digital world. In this expository arti...
Quantum cryptography is the art and science of exploiting quantum mechanical effects in order to perform cryptographic tasks. While the most well-known example of this discipline...
Planar functions are special functions from a finite field to itself that give rise to finite projective planes and other combinatorial objects. We consider polynomials over a ...
In this paper we investigate the topic of integrated public-key encryption (PKE) and public-key encryption with keyword search (PEKS) schemes (PKE-PEKS as shorthand). We first fo...
Cloud storage is very popular since it has many advantages, but there is a new threat to cloud storage that was not considered before. Self-updatable encryption that updates a pas...
We survey recent work on the elliptic curve discrete logarithm problem. In particular we review index calculus algorithms using summation polynomials, and claims about their comple...
The structure of binary self-dual codes invariant under the action of a cyclic group of order pq for odd primes p ̸= q is considered. As an application we prove the nonexistence ...
Stefka Bouyuklieva, Wolfgang Willems, Nikolay Yank...
A very popular trend in code-based cryptography is to decrease the public-key size by focusing on subclasses of alternant/Goppa codes which admit a very compact public matrix, typi...
We review the current status of the multiplier conjecture for difference sets, present some new results on it, and determine the open cases of the conjecture for abelian groups of...