All Issues

Volume 13, 2019

Volume 12, 2018

Volume 11, 2017

Volume 10, 2016

Volume 9, 2015

Volume 8, 2014

Volume 7, 2013

Volume 6, 2012

Volume 5, 2011

Volume 4, 2010

Volume 3, 2009

Volume 2, 2008

Volume 1, 2007

Advances in Mathematics of Communications (AMC) publishes original research papers of the highest quality in all areas of mathematics and computer science which are relevant to applications in communications technology. For this reason, submissions from many areas of mathematics are invited, provided these show a high level of originality, new techniques, an innovative approach, novel methodologies, or otherwise a high level of depth and sophistication. Any work that does not conform to these standards will be rejected.

Areas covered include coding theory, cryptology, combinatorics, finite geometry, algebra and number theory, but are not restricted to these. This journal also aims to cover the algorithmic and computational aspects of these disciplines. Hence, all mathematics and computer science contributions of appropriate depth and relevance to the above mentioned applications in communications technology are welcome.

More detailed indication of the journal's scope is given by the subject interests of the members of the board of editors.

All papers will undergo a thorough peer reviewing process unless the subject matter of the paper does not fit the journal; in this case, the author will be informed promptly. Every effort will be made to secure a decision in three months and to publish accepted papers within six months.

  • AIMS is a member of COPE. All AIMS journals adhere to the publication ethics and malpractice policies outlined by COPE.
  • Publishes 4 issues a year in February, May, August and November.
  • Publishes online only.
  • Indexed in Science Citation Index E, CompuMath Citation Index, Current Contents/Physics, Chemical, & Earth Sciences, INSPEC, Mathematical Reviews, MathSciNet, PASCAL/CNRS, Scopus, Web of Science, Zentralblatt MATH and dblp: computer science bibliography.
  • Archived in Portico and CLOCKSS.
  • Shandong University is a founding institution of AMC.
  • AMC is a publication of the American Institute of Mathematical Sciences. All rights reserved.

Note: “Most Cited” is by Cross-Ref , and “Most Downloaded” is based on available data in the new website.

Select all articles


Guest editorial
Subhamoy Maitra
2019, 13(4) : ⅰ-ⅱ doi: 10.3934/amc.2019033 +[Abstract](187) +[HTML](102) +[PDF](96.27KB)
Critical perspectives on provable security: Fifteen years of "another look" papers
Neal Koblitz and Alfred Menezes
2019, 13(4) : 517-558 doi: 10.3934/amc.2019034 +[Abstract](352) +[HTML](172) +[PDF](437.66KB)
Some cryptanalytic and coding-theoretic applications of a soft stern algorithm
Qian Guo, Thomas Johansson, Erik Mårtensson and Paul Stankovski Wagner
2019, 13(4) : 559-578 doi: 10.3934/amc.2019035 +[Abstract](137) +[HTML](90) +[PDF](1677.02KB)
Differential uniformity and the associated codes of cryptographic functions
Pascale Charpin and Jie Peng
2019, 13(4) : 579-600 doi: 10.3934/amc.2019036 +[Abstract](149) +[HTML](85) +[PDF](378.02KB)
A network reliability approach to the analysis of combinatorial repairable threshold schemes
Bailey Kacsmar and Douglas R. Stinson
2019, 13(4) : 601-612 doi: 10.3934/amc.2019037 +[Abstract](154) +[HTML](89) +[PDF](336.96KB)
Landscape Boolean functions
Constanza Riera and Pantelimon Stănică
2019, 13(4) : 613-627 doi: 10.3934/amc.2019038 +[Abstract](156) +[HTML](86) +[PDF](355.1KB)
Embedding cover-free families and cryptographical applications
Thais Bardini Idalino and Lucia Moura
2019, 13(4) : 629-643 doi: 10.3934/amc.2019039 +[Abstract](151) +[HTML](86) +[PDF](396.53KB)
Another look at success probability of linear cryptanalysis
Subhabrata Samajder and Palash Sarkar
2019, 13(4) : 645-688 doi: 10.3934/amc.2019040 +[Abstract](154) +[HTML](99) +[PDF](599.4KB)
Revisiting design principles of Salsa and ChaCha
Sabyasachi Dey, Tapabrata Roy and Santanu Sarkar
2019, 13(4) : 689-704 doi: 10.3934/amc.2019041 +[Abstract](139) +[HTML](103) +[PDF](356.95KB)
$\textsf{DWCDM+}$: A BBB secure nonce based MAC
Nilanjan Datta, Avijit Dutta, Mridul Nandi and Kan Yasuda
2019, 13(4) : 705-732 doi: 10.3934/amc.2019042 +[Abstract](136) +[HTML](76) +[PDF](588.23KB)
The secure link prediction problem
Laltu Sardar and Sushmita Ruj
2019, 13(4) : 733-757 doi: 10.3934/amc.2019043 +[Abstract](155) +[HTML](82) +[PDF](877.52KB)
Identity-based key aggregate cryptosystem from multilinear maps
Sikhar Patranabis and Debdeep Mukhopadhyay
2019, 13(4) : 759-778 doi: 10.3934/amc.2019044 +[Abstract](148) +[HTML](87) +[PDF](390.05KB)
Cryptographically significant mds matrices over finite fields: A brief survey and some generalized results
Kishan Chand Gupta, Sumit Kumar Pandey, Indranil Ghosh Ray and Susanta Samanta
2019, 13(4) : 779-843 doi: 10.3934/amc.2019045 +[Abstract](167) +[HTML](144) +[PDF](673.93KB)
A new almost perfect nonlinear function which is not quadratic
Yves Edel and Alexander Pott
2009, 3(1) : 59-81 doi: 10.3934/amc.2009.3.59 +[Abstract](2196) +[PDF](288.3KB) Cited By(42)
Skew constacyclic codes over Galois rings
Delphine Boucher, Patrick Solé and Felix Ulmer
2008, 2(3) : 273-292 doi: 10.3934/amc.2008.2.273 +[Abstract](2128) +[PDF](247.3KB) Cited By(28)
A survey of perfect codes
Olof Heden
2008, 2(2) : 223-247 doi: 10.3934/amc.2008.2.223 +[Abstract](2526) +[PDF](323.1KB) Cited By(24)
A review of the available construction methods for Golomb rulers
Konstantinos Drakakis
2009, 3(3) : 235-250 doi: 10.3934/amc.2009.3.235 +[Abstract](1962) +[PDF](218.2KB) Cited By(22)
Public key cryptography based on semigroup actions
Gérard Maze, Chris Monico and Joachim Rosenthal
2007, 1(4) : 489-507 doi: 10.3934/amc.2007.1.489 +[Abstract](2456) +[PDF](248.6KB) Cited By(22)
A new family of linear maximum rank distance codes
John Sheekey
2016, 10(3) : 475-488 doi: 10.3934/amc.2016019 +[Abstract](2785) +[PDF](390.1KB) Cited By(19)
On the order bounds for one-point AG codes
Olav Geil, Carlos Munuera, Diego Ruano and Fernando Torres
2011, 5(3) : 489-504 doi: 10.3934/amc.2011.5.489 +[Abstract](2031) +[PDF](378.6KB) Cited By(18)
Efficient implementation of elliptic curve cryptography in wireless sensors
Diego F. Aranha, Ricardo Dahab, Julio López and Leonardo B. Oliveira
2010, 4(2) : 169-187 doi: 10.3934/amc.2010.4.169 +[Abstract](2551) +[PDF](304.4KB) Cited By(17)
Geometric constructions of optimal optical orthogonal codes
T. L. Alderson and K. E. Mellinger
2008, 2(4) : 451-467 doi: 10.3934/amc.2008.2.451 +[Abstract](2024) +[PDF](239.2KB) Cited By(16)
Linear nonbinary covering codes and saturating sets in projective spaces
Alexander A. Davydov, Massimo Giulietti, Stefano Marcugini and Fernanda Pambianco
2011, 5(1) : 119-147 doi: 10.3934/amc.2011.5.119 +[Abstract](2588) +[PDF](566.6KB) Cited By(15)
New families of strictly optimal frequency hopping sequence sets
Jingjun Bao
2018, 12(2) : 387-413 doi: 10.3934/amc.2018024 +[Abstract](2780) +[HTML](248) +[PDF](613.0KB) PDF Downloads(186)
\begin{document}$np^s$\end{document} over \begin{document}$\mathbb{F}_{p^m}+u\mathbb{F}_{p^m}$\end{document}" >Constacyclic codes of length $np^s$ over $\mathbb{F}_{p^m}+u\mathbb{F}_{p^m}$
Yonglin Cao, Yuan Cao, Hai Q. Dinh, Fang-Wei Fu, Jian Gao and Songsak Sriboonchitta
2018, 12(2) : 231-262 doi: 10.3934/amc.2018016 +[Abstract](2735) +[HTML](369) +[PDF](555.31KB) PDF Downloads(182)
Characterization of extended Hamming and Golay codes as perfect codes in poset block spaces
B. K. Dass, Namita Sharma and Rashmi Verma
2018, 12(4) : 629-639 doi: 10.3934/amc.2018037 +[Abstract](1915) +[HTML](340) +[PDF](366.18KB) PDF Downloads(152)
Strongly secure quantum ramp secret sharing constructed from algebraic curves over finite fields
Ryutaroh Matsumoto
2019, 13(1) : 1-10 doi: 10.3934/amc.2019001 +[Abstract](1670) +[HTML](394) +[PDF](344.95KB) PDF Downloads(141)
Self-dual additive $ \mathbb{F}_4 $-codes of lengths up to 40 represented by circulant graphs
Ken Saito
2019, 13(2) : 213-220 doi: 10.3934/amc.2019014 +[Abstract](1013) +[HTML](410) +[PDF](295.67KB) PDF Downloads(139)
Some new constructions of isodual and LCD codes over finite fields
Fatma-Zohra Benahmed, Kenza Guenda, Aicha Batoul and Thomas Aaron Gulliver
2019, 13(2) : 281-296 doi: 10.3934/amc.2019019 +[Abstract](1172) +[HTML](385) +[PDF](410.75KB) PDF Downloads(127)
\begin{document}$ {{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{4}}$\end{document}-additive cyclic codes" >$ {{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{2}}{{\mathbb{Z}}_{4}}$-additive cyclic codes
Tingting Wu, Jian Gao, Yun Gao and Fang-Wei Fu
2018, 12(4) : 641-657 doi: 10.3934/amc.2018038 +[Abstract](1854) +[HTML](341) +[PDF](409.5KB) PDF Downloads(123)
Some classes of LCD codes and self-orthogonal codes over finite fields
Xia Li, Feng Cheng, Chunming Tang and Zhengchun Zhou
2019, 13(2) : 267-280 doi: 10.3934/amc.2019018 +[Abstract](1285) +[HTML](354) +[PDF](417.6KB) PDF Downloads(116)
Improved attacks on knapsack problem with their variants and a knapsack type ID-scheme
Konstantinos A. Draziotis and Anastasia Papadopoulou
2018, 12(3) : 429-449 doi: 10.3934/amc.2018026 +[Abstract](2066) +[HTML](196) +[PDF](543.19KB) PDF Downloads(112)
Some two-weight and three-weight linear codes
Chengju Li, Sunghan Bae and Shudi Yang
2019, 13(1) : 195-211 doi: 10.3934/amc.2019013 +[Abstract](1347) +[HTML](325) +[PDF](412.73KB) PDF Downloads(111)

2018  Impact Factor: 0.879




Email Alert

[Back to Top]