ISSN:
 1930-5346

eISSN:
 1930-5338

All Issues

Volume 13, 2019

Volume 12, 2018

Volume 11, 2017

Volume 10, 2016

Volume 9, 2015

Volume 8, 2014

Volume 7, 2013

Volume 6, 2012

Volume 5, 2011

Volume 4, 2010

Volume 3, 2009

Volume 2, 2008

Volume 1, 2007

Advances in Mathematics of Communications (AMC) publishes original research papers of the highest quality in all areas of mathematics and computer science which are relevant to applications in communications technology. For this reason, submissions from many areas of mathematics are invited, provided these show a high level of originality, new techniques, an innovative approach, novel methodologies, or otherwise a high level of depth and sophistication. Any work that does not conform to these standards will be rejected.

Areas covered include coding theory, cryptology, combinatorics, finite geometry, algebra and number theory, but are not restricted to these. This journal also aims to cover the algorithmic and computational aspects of these disciplines. Hence, all mathematics and computer science contributions of appropriate depth and relevance to the above mentioned applications in communications technology are welcome.

More detailed indication of the journal's scope is given by the subject interests of the members of the board of editors.

All papers will undergo a thorough peer reviewing process unless the subject matter of the paper does not fit the journal; in this case, the author will be informed promptly. Every effort will be made to secure a decision in three months and to publish accepted papers within six months.

  • AIMS is a member of COPE. All AIMS journals adhere to the publication ethics and malpractice policies outlined by COPE.
  • Publishes 4 issues a year in February, May, August and November.
  • Publishes online only.
  • Indexed in Science Citation Index E, CompuMath Citation Index, Current Contents/Physics, Chemical, & Earth Sciences, INSPEC, Mathematical Reviews, MathSciNet, PASCAL/CNRS, Scopus, Web of Science, Zentralblatt MATH and dblp: computer science bibliography.
  • Archived in Portico and CLOCKSS.
  • Shandong University is a founding institution of AMC.
  • AMC is a publication of the American Institute of Mathematical Sciences. All rights reserved.

Note: “Most Cited” is by Cross-Ref , and “Most Downloaded” is based on available data in the new website.

Select all articles

Export/Reference:

Self-dual additive $ \mathbb{F}_4 $-codes of lengths up to 40 represented by circulant graphs
Ken Saito
2019, 13(2) : 213-220 doi: 10.3934/amc.2019014 +[Abstract](316) +[HTML](141) +[PDF](295.67KB)
Comparison analysis of Ding's RLWE-based key exchange protocol and NewHope variants
Xinwei Gao
2019, 13(2) : 221-233 doi: 10.3934/amc.2019015 +[Abstract](270) +[HTML](117) +[PDF](480.46KB)
Type-preserving matrices and security of block ciphers
Riccardo Aragona and Alessio Meneghetti
2019, 13(2) : 235-251 doi: 10.3934/amc.2019016 +[Abstract](260) +[HTML](87) +[PDF](428.21KB)
A new construction of rotation symmetric bent functions with maximal algebraic degree
Sihong Su
2019, 13(2) : 253-265 doi: 10.3934/amc.2019017 +[Abstract](211) +[HTML](95) +[PDF](378.05KB)
Some classes of LCD codes and self-orthogonal codes over finite fields
Xia Li, Feng Cheng, Chunming Tang and Zhengchun Zhou
2019, 13(2) : 267-280 doi: 10.3934/amc.2019018 +[Abstract](250) +[HTML](99) +[PDF](417.6KB)
Some new constructions of isodual and LCD codes over finite fields
Fatma-Zohra Benahmed, Kenza Guenda, Aicha Batoul and Thomas Aaron Gulliver
2019, 13(2) : 281-296 doi: 10.3934/amc.2019019 +[Abstract](276) +[HTML](112) +[PDF](410.75KB)
Further results on optimal $ (n, \{3, 4, 5\}, \Lambda_a, 1, Q) $-OOCs
Huangsheng Yu, Feifei Xie, Dianhua Wu and Hengming Zhao
2019, 13(2) : 297-312 doi: 10.3934/amc.2019020 +[Abstract](225) +[HTML](82) +[PDF](422.14KB)
Symmetries of weight enumerators and applications to Reed-Muller codes
Martino Borello and Olivier Mila
2019, 13(2) : 313-328 doi: 10.3934/amc.2019021 +[Abstract](168) +[HTML](88) +[PDF](389.76KB)
Constructions of optimal balanced $ (m, n, \{4, 5\}, 1) $-OOSPCs
Wei Li, Hengming Zhao, Rongcun Qin and Dianhua Wu
2019, 13(2) : 329-341 doi: 10.3934/amc.2019022 +[Abstract](245) +[HTML](117) +[PDF](412.45KB)
Efficient public-key operation in multivariate schemes
Felipe Cabarcas, Daniel Cabarcas and John Baena
2019, 13(2) : 343-371 doi: 10.3934/amc.2019023 +[Abstract](247) +[HTML](126) +[PDF](3517.4KB)
A new almost perfect nonlinear function which is not quadratic
Yves Edel and Alexander Pott
2009, 3(1) : 59-81 doi: 10.3934/amc.2009.3.59 +[Abstract](1618) +[PDF](288.3KB) Cited By(42)
Skew constacyclic codes over Galois rings
Delphine Boucher, Patrick Solé and Felix Ulmer
2008, 2(3) : 273-292 doi: 10.3934/amc.2008.2.273 +[Abstract](1593) +[PDF](247.3KB) Cited By(28)
A survey of perfect codes
Olof Heden
2008, 2(2) : 223-247 doi: 10.3934/amc.2008.2.223 +[Abstract](1827) +[PDF](323.1KB) Cited By(24)
A review of the available construction methods for Golomb rulers
Konstantinos Drakakis
2009, 3(3) : 235-250 doi: 10.3934/amc.2009.3.235 +[Abstract](1440) +[PDF](218.2KB) Cited By(22)
Public key cryptography based on semigroup actions
Gérard Maze, Chris Monico and Joachim Rosenthal
2007, 1(4) : 489-507 doi: 10.3934/amc.2007.1.489 +[Abstract](1787) +[PDF](248.6KB) Cited By(22)
A new family of linear maximum rank distance codes
John Sheekey
2016, 10(3) : 475-488 doi: 10.3934/amc.2016019 +[Abstract](2062) +[PDF](390.1KB) Cited By(19)
On the order bounds for one-point AG codes
Olav Geil, Carlos Munuera, Diego Ruano and Fernando Torres
2011, 5(3) : 489-504 doi: 10.3934/amc.2011.5.489 +[Abstract](1502) +[PDF](378.6KB) Cited By(18)
Efficient implementation of elliptic curve cryptography in wireless sensors
Diego F. Aranha, Ricardo Dahab, Julio López and Leonardo B. Oliveira
2010, 4(2) : 169-187 doi: 10.3934/amc.2010.4.169 +[Abstract](1888) +[PDF](304.4KB) Cited By(17)
Geometric constructions of optimal optical orthogonal codes
T. L. Alderson and K. E. Mellinger
2008, 2(4) : 451-467 doi: 10.3934/amc.2008.2.451 +[Abstract](1525) +[PDF](239.2KB) Cited By(16)
Linear nonbinary covering codes and saturating sets in projective spaces
Alexander A. Davydov, Massimo Giulietti, Stefano Marcugini and Fernanda Pambianco
2011, 5(1) : 119-147 doi: 10.3934/amc.2011.5.119 +[Abstract](2037) +[PDF](566.6KB) Cited By(15)
\begin{document}$np^s$\end{document} over \begin{document}$\mathbb{F}_{p^m}+u\mathbb{F}_{p^m}$\end{document}" >Constacyclic codes of length $np^s$ over $\mathbb{F}_{p^m}+u\mathbb{F}_{p^m}$
Yonglin Cao, Yuan Cao, Hai Q. Dinh, Fang-Wei Fu, Jian Gao and Songsak Sriboonchitta
2018, 12(2) : 231-262 doi: 10.3934/amc.2018016 +[Abstract](1535) +[HTML](366) +[PDF](555.31KB) PDF Downloads(182)
Characterization of extended Hamming and Golay codes as perfect codes in poset block spaces
B. K. Dass, Namita Sharma and Rashmi Verma
2018, 12(4) : 629-639 doi: 10.3934/amc.2018037 +[Abstract](895) +[HTML](340) +[PDF](366.18KB) PDF Downloads(150)
New families of strictly optimal frequency hopping sequence sets
Jingjun Bao
2018, 12(2) : 387-413 doi: 10.3934/amc.2018024 +[Abstract](1517) +[HTML](247) +[PDF](613.0KB) PDF Downloads(141)
Strongly secure quantum ramp secret sharing constructed from algebraic curves over finite fields
Ryutaroh Matsumoto
2019, 13(1) : 1-10 doi: 10.3934/amc.2019001 +[Abstract](893) +[HTML](248) +[PDF](344.95KB) PDF Downloads(126)
\begin{document}$ {{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{4}}$\end{document}-additive cyclic codes" >$ {{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{4}}$-additive cyclic codes
Tingting Wu, Jian Gao, Yun Gao and Fang-Wei Fu
2018, 12(4) : 641-657 doi: 10.3934/amc.2018038 +[Abstract](787) +[HTML](339) +[PDF](409.5KB) PDF Downloads(120)
Improved attacks on knapsack problem with their variants and a knapsack type ID-scheme
Konstantinos A. Draziotis and Anastasia Papadopoulou
2018, 12(3) : 429-449 doi: 10.3934/amc.2018026 +[Abstract](1007) +[HTML](194) +[PDF](543.19KB) PDF Downloads(111)
Self-dual additive $ \mathbb{F}_4 $-codes of lengths up to 40 represented by circulant graphs
Ken Saito
2019, 13(2) : 213-220 doi: 10.3934/amc.2019014 +[Abstract](316) +[HTML](141) +[PDF](295.67KB) PDF Downloads(107)
Some two-weight and three-weight linear codes
Chengju Li, Sunghan Bae and Shudi Yang
2019, 13(1) : 195-211 doi: 10.3934/amc.2019013 +[Abstract](448) +[HTML](233) +[PDF](412.73KB) PDF Downloads(104)
Some new constructions of isodual and LCD codes over finite fields
Fatma-Zohra Benahmed, Kenza Guenda, Aicha Batoul and Thomas Aaron Gulliver
2019, 13(2) : 281-296 doi: 10.3934/amc.2019019 +[Abstract](276) +[HTML](112) +[PDF](410.75KB) PDF Downloads(103)
Indiscreet logarithms in finite fields of small characteristic
Robert Granger, Thorsten Kleinjung and Jens Zumbrägel
2018, 12(2) : 263-286 doi: 10.3934/amc.2018017 +[Abstract](1720) +[HTML](303) +[PDF](541.54KB) PDF Downloads(100)

2017  Impact Factor: 0.564

Editors

Referees

Librarians

Email Alert

[Back to Top]