-
The weight hierarchy of decreasing norm-trace codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-04-01
Eduardo Camps-Moreno, Hiram H. López, Gretchen L. Matthews, Rodrigo San-JoséThe Generalized Hamming weights and their relative version, which generalize the minimum distance of a linear code, are relevant to numerous applications, including coding on the wire-tap channel of type II, t-resilient functions, bounding the cardinality of the output in list decoding algorithms, ramp secret sharing schemes, and quantum error correction. The generalized Hamming weights have been determined
-
Efficient BEM for thin-walled inhomogeneous potential problems: Theory and MATLAB code Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-31
Xiaotong Gao, Yan Gu, Bo Yu, Wenzhen Qu, Haodong MaThe traditional boundary element method (BEM) often faces challenges in efficiently solving inhomogeneous problems, particularly in thin-walled geometries, due to the need for domain discretization and the handling of nearly singular integrals. In this study, we propose an efficient hybrid algorithm that combines the BEM with physics-informed neural networks (PINNs) to solve inhomogeneous potential
-
On the cycle structure of a class of Galois NFSRs: component sequences possessing identical periods Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-29
Xiao-juan Wang, Tian Tian, Wen-feng QiNonlinear feedback shift registers (NFSRs) are widely used in the design of stream ciphers and the cycle structure of an NFSR is a fundamental problem still open. In this paper, a new configuration of Galois NFSRs, called F-Ring NFSRs, is proposed. It is shown that an n-bit F-Ring NFSR generates n sequences with the same period simultaneously, that is, sequences from all bit registers have the same
-
A two-phase coupled FEM-MPM framework for large deformation analysis of slopes considering multiple influencing factors Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-30
Dezhi Zai, Rui Pang, Yang Zhou, Jun LiuNumerical simulation of slope instability remains a critical challenge in geotechnical engineering, particularly for large deformations and long-term seepage. The traditional finite element method (FEM) is prone to mesh distortion in large-deformation modeling, while the material point method (MPM) is less efficient for small deformations associated with long-term seepage. To overcome these limitations
-
An alternative dual reciprocity BEM for P-SV wave propagation problems: A comparative study Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-30
Pouya Kavandi, Mehdi Panji, Navid Ganjian, Jafar Asgari MarnaniThis research introduces a dual reciprocity boundary element method (BEM) designed to analyze the transient scattering of vertically travelling incident P-SV waves. By using static fundamental solutions and appropriate predictor operations, the domain inertia integrals from the equilibrium equation were transformed into boundary integral equations. The computable format of the integral equations was
-
On the improvement of the local boundary conditions in GFEMgl Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-29
Túlio R.E. Marques, Gabriela M. Fonseca, Rafael M. Lins, Felício B. BarrosIn this work, the ZZ-BD recovered stress field is first used to enhance the data transferred from the global to the local scale models in the Generalized Finite Element Method with Global–Local enrichments (GFEMgl). The recovered stress field is constructed by solving a block-diagonal system of equations resulting from an L2 approximate function projection associated with the singular stress field
-
High-precision meshless method for 3D radiation diffusion problem in sphere and cylinder Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-29
Nan Ma, Qiuyan Xu, Zhiyong Liu, Jiye YangThe problem of radiation diffusion is extremely challenging due to the complex physical processes and nonlinear characteristics of the equation involved. In this paper, we propose a class of high-precision meshless methods for 3D nonlinear radiation diffusion equations applicable to spherical and cylindrical walls. Firstly, when the energy density is linearly related to temperature, we use a full-implicit
-
A virtual material point peridynamic model for failure investigation of anisotropic laminated composites Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-28
Xiongwu Yang, Dongsheng Mao, Zhanhui LiuIn this study, a new virtual material point peridynamic model (abbreviated as VMPPD) is proposed to capture the fracture behavior of composite laminates with arbitrary fiber orientation. The unique feature is that virtual material points serve as intermediate variables to achieve load transfer in a regularized discrete grid. As a result, a PD model for describing the reinforcement characteristics of
-
Thermo-magneto-mechanical analysis of curved laminated structures with arbitrary variation of the material properties and novel recovery procedure Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-28
Francesco Tornabene, Matteo Viscoti, Rossana Dimitri, Timon RabczukThe paper introduces a novel methodology based on a generalized formulation and higher-order-theories for the fully-coupled multifield analysis of laminated curved structures subjected to thermal, magnetic, and mechanical loads. The formulation follows the Equivalent Single Layer approach, taking into account a generalized through-the-thickness expansion of displacement field components, scalar magnetic
-
Artificial neural network-based approach for simulating influenza dynamics: A nonlinear SVEIR model with spatial diffusion Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-28
Rahat ZarinArtificial Neural Networks (ANNs) have revolutionized machine learning by enabling systems to learn from data and generalize to new, unseen examples. As biologically inspired models, ANNs consist of interconnected neurons organized in layers, mimicking the human brain’s functioning. Their ability to model complex, nonlinear processes makes them powerful tools in various domains. In this study, the
-
Studying the isomorphism of NFSRs via a general framework of bijections Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-27
Jingtao Xiong, Jianghua Zhong, Dongdai LinNonlinear feedback shift registers (NFSRs) are used in many recent stream ciphers as their main building blocks. Two NFSRs are said to be isomorphic if their state diagrams are isomorphic, and to be equivalent if their sets of output sequences are equal. So far, numerous work has been done on the equivalence of NFSRs with same bit number, but much less has been done on their isomorphism. Actually,
-
Universal partial tori Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-27
William D. Carey, Matthew David Kearney, Rachel Kirsch, Stefan PopescuA De Bruijn cycle is a cyclic sequence in which every word of length n over an alphabet \(\mathcal {A}\) appears exactly once. De Bruijn tori are a two-dimensional analogue. Motivated by recent progress on universal partial cycles and words, which shorten De Bruijn cycles using a wildcard character, we introduce universal partial tori and matrices. We find them computationally and construct infinitely
-
A novel fracture model for composite laminates based on bond-based peridynamics Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-27
Guanghui Zhang, Zili DaiTraditional model for composite laminae based on bond-based peridynamics (BB-PD) involves only two material parameters, which is insufficient to fully describe the complicated engineering properties of composite laminae. This limitation results in constrained Poisson's ratio and shear modulus in the PD model. In this study, a novel fracture model for composite laminae is proposed based on BB-PD, which
-
Uncertainty quantification for the 3D half-space sound scattering problem of IGABEM based on the Catmull–Clark subdivision surfaces Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-27
Xiaohui Yuan, Ruijin Huo, Qingxiang Pei, Gaochao Zhao, Yongsong LiThe generalized nth-order perturbation method for the quantitative uncertainty analysis in half-space acoustic problems proposed in this study is based on the isogeometric boundary element method, where the acoustic wave frequency is defined as a stochastic variable. We derive the Taylor series expansion and the kernel function formulation of the acoustic boundary integral equation for the half-space
-
RBF based backward differentiation methods for stiff differential equations Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-27
A. Sreedhar, Manoj Kumar Yadav, Chirala SatyanarayanaNumerical solutions of initial value problems (IVPs) for stiff differential equations via explicit methods such as Euler’s method, trapezoidal method and Runge–Kutta methods suffer from stability issues and demand unacceptably small time steps. Backward differentiation formulas (BDF), a class of implicit methods, have been successfully used for resolving stiff IVPs. Classical BDF methods are derived
-
PD-KINN: Kolmogorov–Arnold representation theorem enhanced peridynamic-informed neural network for predicting elastic deformation and brittle damage Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-26
Yonghua Nie, Ying Zhang, Yan Zhu, Xu GuoFracture initiation in solids fundamentally arises from pre-existing discontinuities, such as crack networks and void distributions, which are ubiquitously observed in engineering structures. This paper presents an innovative unsupervised learning framework, termed Kolmogorov–Arnold representation theorem enhanced peridynamic-informed neural network (PD-KINN), designed to address challenges in elastic
-
Research on energy loss of Mechatronic Electro-Hydraulic Coupler using radial basis function collocation method Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-25
Yiming Jiang, Hongxin Zhang, Lin Qiu, Minghao Li, Lingfeng ZhangThe Mechatronic Electro-Hydraulic Coupler (MEHC) integrates a swashplate axial piston pump with a permanent magnet synchronous motor, enabling flexible conversion between mechanical, electrical, and hydraulic energy. The efficiency of the MEHC plays a crucial role in the selection of loading and control strategy. However, specific research on its hydraulic energy loss is lacking. This paper proposes
-
The complete weight enumerator of the square of one-weight irreducible cyclic codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-22
Canze ZhuIn this paper, for an odd prime power q and an integer \(m\ge 2\), let \(\mathcal {C}(q,m)\) be a one-weight irreducible cyclic code with parameters \([q^m-1,m,(q-1)q^{m-1}]\), we consider the complete weight enumerator and the weight distribution of the square \(\big (\mathcal {C}(q,m)\big )^2\), whose dual has \(\lfloor \frac{m}{2}\rfloor +1\) zeros. Using the character sums method and the known
-
Limitations of the decoding-to-LPN reduction via code smoothing Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-22
Madhura Pathegama, Alexander BargThe learning parity with noise (LPN) problem underlines several classic cryptographic primitives. Researchers have attempted to show the algorithmic difficulty of this problem by finding a reduction from the decoding problem of linear codes, for which several hardness results exist. Earlier studies used code smoothing as a technical tool to achieve such reductions for codes with vanishing rate. This
-
An advanced semi-analytical method for modeling dynamic behavior of multi-layered piezoelectric laminates with arrays of electrically circuited electrodes Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-22
Sergey I. Fomenko, Mikhail V. Golub, Yanzheng Wang, Ali Chen, Zheng-Yang Li, Dongjia Yan, Chuanzeng ZhangDetailed studies of peculiar wave phenomena in piezoelectric metamaterials require advanced and accurate numerical methods. An extended boundary integral equation method based on the employment of the Fourier transform of Green’s matrices and the Bubnov–Galerkin method is presented for the wave motion simulation of a multi-layered piezoelectric laminate with electrode arrays connected pairwise via
-
Binary stretch embedding of weighted graphs Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-21
Javad Ebrahimi Boroojeni, Mehri Oghbaei BonabIn this paper, we introduce and study the problem of binary stretch embedding of edge-weighted graphs in both integer and fractional settings. Roughly speaking, the binary stretch embedding problem for a weighted graph G is to find a mapping from the vertex set of G, to the vertices of a hypercube graph such that the distance between every pair of the vertices is not reduced under the mapping, hence
-
High accuracy analysis of three-dimensional axisymmetric nonlinear boundary integral equations Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-21
Hu Li, Jin HuangIn this paper, we consider the numerical solutions of three-dimensional axisymmetric nonlinear boundary integral equations with logarithmic kernel. A numerical algorithm with using extrapolation twice is developed to solve the equations, which possesses the low computing complexities and high accuracy. The asymptotic compact operator theory is used to prove the convergence of the algorithm. The efficiency
-
Seismic evaluation of arbitrary number of buildings resting on a layered half-space under incident Rayleigh waves Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-21
Zhenning Ba, Feixiang Yu, Chenyang Kuo, Zhonghan Liu, Jianwen LiangUnderstanding the Site-City Interaction (SCI) induced by surface wave is vital for accurate seismic analysis and urban planning. Based on the elastodynamics theory and wave equations, this paper proposes a semi-analytical method to investigate SCI effect induced by Rayleigh wave. The proposed approach integrates the Dynamic Stiffness Matrix Method (DSMM) with substructure method, and can effectively
-
An online reduced-order method for dynamic sensitivity analysis Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-21
Shuhao Li, Jichao Yin, Yaya Zhang, Hu WangThis study introduces an online reduced-order methodology designed to avoid the need for generating additional samples during the offline phase, a requirement typically associated with the classical reduced basis method. The proposed methodology is implemented for accelerating the sensitivity analysis in the dynamic topology optimization. The dominant Proper Orthogonal Mode (POM) of the adjoint sensitivity
-
Additive combinatorial designs Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-20
Marco Buratti, Francesca Merola, Anamari NakićA \(2-(v, k, \lambda )\) design is additive if, up to isomorphism, the point set is a subset of an abelian group G and every block is zero-sum. This definition was introduced in Caggegi et al. (J Algebr Comb 45:271-294, 2017) and was the starting point of an interesting new theory. Although many additive designs have been constructed and known designs have been shown to be additive, these structures
-
Development of a fully non-linear circular numerical wave basin based on the HOBEM and omni-controlling sources Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-19
Lei Fu, Dezhi Ning, Deborah Greaves, Lars JohanningA novel fully nonlinear circular numerical wave basin is developed based on potential flow theory and high-order boundary element methods (HOBEM). By controlling the vector input of wave velocity from wave-making sources uniformly distributed on the three-dimensional cylindrical surface, the wave basin is capable of generating waves in all directions. The wave basin is used to simulate nonlinear waves
-
BEM solution for scattering of water waves by dual thick rigid structures over non-periodic bottom morphologies Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-19
Nidhi Sharma, Deepali Goyal, S.C. MarthaThe combined effect of dual rigid structures over non-periodic bottom morphologies is examined through a boundary value problem to characterize the scattering phenomenon. Three different types of bottom morphologies: (a) monotonically decreasing oscillatory, (b) exponential decreasing oscillatory and (c) Gaussian oscillatory are taken into consideration. Utilizing the boundary element method (BEM)
-
An attack on p-adic lattice public-key encryption cryptosystems and signature schemes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-18
Chi ZhangLattices have many significant applications in cryptography. In 2021, the p-adic signature scheme and public-key encryption cryptosystem were introduced. They are based on the Longest Vector Problem (LVP) and the Closest Vector Problem (CVP) in p-adic lattices. These problems are considered to be challenging and there are no known deterministic polynomial time algorithms to solve them. In this paper
-
Linear and nonlinear transient response of sandwich beams made of FG-GPLRC faces and FGP core under moving distributed masses Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-18
Nuttawit Wattanasakulpong, Wachirawit SongsuwanThis study considers transient response of sandwich beams produced from functionally graded graphene platelets-reinforced composite faces and functionally graded porous core under the action of various types of moving distributed masses. The equations of motion are developed by the energy method using a von Kármán type nonlinear strain-displacement relationship. Different micromechanical models are
-
Synthetic seismograms in transversely isotropic and elastic media below ocean floor Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-18
Jiangcun Zhou, Ernian Pan, Zhiqing ZhangEarthquakes can occur onshore and offshore. When it occurs offshore, an analytical model is needed where both the water layers and rock layers have to be considered. In this paper, we develop such a new solution when a general dislocation source is located in any layer of the transversely isotropic and elastic rock media. This novel and comprehensive method is based on the Fourier-Bessel series system
-
A new framework for fast homomorphic matrix multiplication Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-15
Xiaopeng Zheng, Hongbo Li, Dingkang WangHomomorphic encryption (HE) is one of the mainstream cryptographic tools used to enable secure outsourced computation. A typical task is secure matrix computation, which is a fundamental operation used in various outsourced computing applications such as statistical analysis and machine learning. In this paper, we present a new framework for secure multiplication of two matrices with size \(r \times
-
[formula omitted]-matrices for translation-invariant kernel functions Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-15
Steffen Börm, Janne HenningsenBoundary element methods for elliptic partial differential equations typically lead to boundary integral operators with translation-invariant kernel functions. Taking advantage of this property is not straightforward if general unstructured meshes and general basis functions are used, since we need the supports of these basis functions to be contained in a hierarchy of subdomains with translational
-
Resolution of the exceptional APN conjecture in the Gold degree case Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-14
Carlos Agrinsoni, Heeralal Janwa, Moises DelgadoA function \(f: {\mathbb {F}}_q \rightarrow {\mathbb {F}}_q\), is called an almost perfect nonlinear (APN) if \(f(X+a)-f(X) =b\) has at most 2 solutions for every \(b,a \in {\mathbb {F}}_q\), with a nonzero. Furthermore, it is called an exceptional APN if it is an APN on infinitely many extensions of \({\mathbb {F}}_q\). These problems are equivalent to finding rational points on the corresponding
-
Generalized impossible differential attacks on block ciphers: application to SKINNY and ForkSKINNY Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-14
Ling Song, Qinggan Fu, Qianqian Yang, Yin Lv, Lei HuImpossible differential cryptanalysis is a crucial cryptanalytical method for symmetric ciphers. Given an impossible differential, the key recovery attack typically proceeds in two steps: generating pairs of data and then identifying wrong keys using the guess-and-filtering method. At CRYPTO 2023, Boura et al. first proposed a new key recovery technique—the differential meet-in-the-middle attack, which
-
Galois subcovers of the Hermitian curve in characteristic p with respect to subgroups of order dp with $$d\not =p$$ prime Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-14
Arianna Dionigi, Barbara GattiA problem of current interest, also motivated by applications to Coding theory, is to find explicit equations for maximal curves, that are projective, geometrically irreducible, non-singular curves defined over a finite field \(\mathbb {F}_{q^2}\) whose number of \(\mathbb {F}_{q^2}\)-rational points attains the Hasse-Weil upper bound \(q^2+2\mathfrak {g}q+1\) where \(\mathfrak {g}\) is the genus of
-
Multiphase Lagrangian Differencing Dynamics method with sharp interfaces Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-14
Manigandan Paneer, Josip Bašić, Damir Sedlar, Chong PengMultiphase flow simulations are complex due to the intricate interactions between phases when high density and viscosity ratios are involved. These complexities often lead to challenges in capturing sharp interfaces and managing pressure jumps across phases, which can induce numerical instability. Extending the Lagrangian Differencing Dynamics (LDD) method which differs from other meshless methods
-
Perfectly Matched Layer for meshless analysis of wave propagation in layered elastic-poroelastic half-space Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-14
Kamal Shaker, Morteza Eskandari-Ghadi, Soheil MohammadiDynamic response of a transversely isotropic layered half-space composed of alternatively arbitrary poroelastic and elastic materials is numerically investigated through the Meshless Local Petrov–Galerkin (MLPG) method. The governing equations of the porous layers are the u−p formulation of the Biot’s theory, and the equations of motion for single-phase elastic media are considered for pure elastic
-
Assessments and preventions of the damages and their modes in the second and third spans of the RC highway straight girder bridge under surface blast using the FEM-SPH coupling Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-13
Shuvra Saha, Somnath KarmakarThe blast threats have become a global safety concern for the ecosystems. Rigorous research using blasts over infrastructures improves the assessment methods, damages and failure modes, either experimentally or numerically. However, experimental blast analysis over a full-scale bridge is not feasible and is against the country's federal law. Alternatively, numerical analysis with experimentally validated
-
A polyhedral scaled boundary finite element method solving three-dimensional heat conduction problems Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-13
Mingjiao Yan, Yang Yang, Chao Su, Zongliang Zhang, Qingsong Duan, Dengmiao Hao, Jian ZhouIn this study, we derived a three-dimensional scaled boundary finite element formulation for heat conduction problems. By incorporating Wachspress shape functions, a polyhedral scaled boundary finite element method (PSBFEM) was proposed to address heat conduction challenges in complex geometries. To address the complexity of traditional methods, this work introduced polygonal discretization techniques
-
Three-dimensional seepage analysis for the tunnel in nonhomogeneous porous media with physics-informed deep learning Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-12
Shan Lin, Miao Dong, Hongming Luo, Hongwei Guo, Hong ZhengTunnel engineering is one of the hot spots of research in the field of geotechnical engineering, and the seepage analysis of tunnels is an important research direction at present. In recent years, physics-informed deep learning based on priori fusion data has become a cross-disciplinary hotspot for solving forward and inverse problems based on partial differential equations (PDEs). In this paper, physics-informed
-
Forward and inverse problem solvers for Reynolds-averaged Navier–Stokes equations with fractional Laplacian Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-12
Rui Du, Tongtong Zhou, Guofei PangIt has recently been demonstrated that turbulent flow could be described by the fractional Laplacian Reynolds-averaged Navier–Stokes equations fL-RANS equations, (Epps and Cushman-Roisin, 2018). In this paper, we propose a numerical approach for solving the equations, and then provide a deep-learning based approach for inferring the unknown parameters of the equations. First, we construct a lattice
-
Admissible parameters for the Crossbred algorithm and semi-regular sequences over finite fields Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-11
John Baena, Daniel Cabarcas, Sharwan K. Tiwari, Javier Verbel, Luis VillotaMultivariate public key cryptography (MPKC) is one of the most promising alternatives to build quantum-resistant signature schemes, as evidenced in NIST’s call for additional post-quantum signature schemes. The main assumption in MPKC is the hardness of the Multivariate Quadratic (MQ) problem, which seeks for a common root to a system of quadratic polynomials over a finite field. Although the Crossbred
-
A high-speed numerical simulation method for diverse boundary conditions for real time applications unleashing MeshGraphNet Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-11
Avishek Mukherjee, Surjya Kanta Pal, Debashish ChakravartyThe study presents an adapted MeshGraphNet for real-time field prediction in digital twins, surpassing traditional FEM in efficiency and boundary condition adaptability but falling short of real-time computational demands. Trained with true labels, MeshGraphNet accurately predicts nodal variables on coarse graphs and reduces simulation time through parallel sub-mesh processing. Applied to a 1D mesh
-
An efficient midpoint and Richardson extrapolation-based rapid Quadrature for fracture problems using Radial Point Interpolation Method Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-11
Sai Naga Kishore Vutla, Thamarai Selvan Vasu, Jeyakarthikeyan P.V.An efficient numerical integration technique, namely the Element Midpoint(EM) Method, is successfully applied to meshless methods to solve the fracture problem, which is modeled using the Radial point interpolation method. The results were compared with standard (3×3) points Gauss quadrature and (6×6) points Gauss quadrature in 2D to validate the presented numerical methods. To demonstrate the efficiency
-
A framework for constructing impossible differential distinguishers and its applications Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-10
Wenya Li, Kai Zhang, Bin HuThe Internet of Things (IoT) has become a necessary part of modern technology, enabling devices to connect and interact with each other. Unless applicable cryptographic components have adequate security protection, the IoT could easily leak private data. Impossible differential cryptanalysis (IDC) is one of the best-known techniques for cryptanalysis of block ciphers. Several papers are aimed at formalizing
-
Extended discontinuous deformation analysis for brittle failure simulation of transversely isotropic rocks under static and dynamic conditions Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-10
Qinglong Deng, Fei Zheng, Zhi Li, Yu-Yong JiaoDiscontinuous numerical methods have been widely applied to investigate rock deformation and failure behavior in rock engineering scenarios such as tunnel excavation and oil/gas exploitation. Compared to discontinuous numerical methods with explicit formulations, discontinuous deformation analysis (DDA) has the advantages of unconditional stability and strict contact convergence with its implicit formulation
-
Nonexistence of generalized bent functions and the quadratic norm form equations Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-09
Chang Lv, Yuqing ZhuWe present a new result on the nonexistence of generalized bent functions (GBFs) from \((\mathbb {Z}/t\mathbb {Z})^n\) to \(\mathbb {Z}/t\mathbb {Z}\) (called type [n, t]) for a large class. Assume p is an odd prime number. By showing certain quadratic norm form equations having no integral points, we obtain a universal result on the nonexistence of GBFs with type \([n, 2p^e]\) when p and n satisfy
-
Real-time prediction method of three-dimensional flow field for pumping station units operation under geometrically variable conditions based on reduced-order model and machine learning Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-09
Chao Wang, Yaofei Zhang, Sherong Zhang, Xiaohua WangIn large-scale water diversion projects, the rapid and accurate evaluation of pumping station unit performance is crucial to ensure that flow rates meet delivery requirements. Computational fluid dynamics (CFD) is effective in analyzing unit performance but is constrained by its high computational complexity and time consumption. Reduced-order models (ROMs) partially alleviate these issues; however
-
An improved numerical manifold method for stability of heterogeneous gravity dams Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-09
Yujie Xu, Yuan Wang, Lingfeng Zhou, Qi DongIn the study of the stability of gravity dam, the situation of dam and rock mass is complicated, there may be pore water and various kinds of heterogeneous materials to affect the stability of rock mass, among which the deformation and failure of the dam cannot be ignored. In this paper, an improved high-order covering function is applied to the Numerical Manifold Method (NMM), and the Hermite form
-
Bounds on sphere sizes in the sum-rank metric and coordinate-additive metrics Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-08
Hugo Sauerbier Couvée, Thomas Jerkovits, Jessica BariffiThis paper provides new bounds on the size of spheres in any coordinate-additive metric with a particular focus on improving existing bounds in the sum-rank metric. We derive improved upper and lower bounds based on the entropy of a distribution related to the Boltzmann distribution, which work for any coordinate-additive metric. Additionally, we derive new closed-form upper and lower bounds specifically
-
A class of ternary codes with few weights Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-06
Kaimin ChengLet \(\ell ^m\) be a power with \(\ell \) a prime greater than 3 and \(m\) a positive integer such that 3 is a primitive root modulo \(2\ell ^m\). Let \(\mathbb {F}_3\) be the finite field of order 3, and let \(\mathbb {F}\) be the \(\ell ^{m-1}(\ell -1)\)-th extension field of \(\mathbb {F}_3\). Denote by \(\text {Tr}\) the absolute trace map from \(\mathbb {F}\) to \(\mathbb {F}_3\). For any \(\alpha
-
How to lose some weight: a practical template syndrome decoding attack Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-07
Sebastian Bitzer, Jeroen Delvaux, Elena Kirshanova, Sebastian Maaßen, Alexander May, Antonia Wachter-ZehWe study the hardness of the Syndrome Decoding problem, the base of most code-based cryptographic schemes, such as Classic McEliece, in the presence of side-channel information. We use ChipWhisperer equipment to perform a template attack on Classic McEliece running on an ARM Cortex-M4, and accurately classify the Hamming weights of consecutive 32-bit blocks of the secret error vector \(\textbf{e}\in
-
The weight distribution of the fourth-order Reed–Muller code of length 512 Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-07
Miroslav Markov, Yuri BorissovWe compute the weight distribution of the binary Reed–Muller code \({\mathcal {R}} (4,9)\) by combining the methodology described in D. V. Sarwate’s Ph.D. thesis from 1973 with newer results on the affine equivalence classification of Boolean functions. More specifically, to address this problem posed, e.g., in the book of MacWilliams and Sloane, we apply an enhanced approach based on the classification
-
On linear equivalence, canonical forms, and digital signatures Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-07
Tung Chou, Edoardo Persichetti, Paolo SantiniGiven two linear codes, the code equivalence problem asks to find an isometry mapping one code into the other. The problem can be described in terms of group actions and, as such, finds a natural application in signatures derived from a Zero-Knowledge Proof system. A recent paper, presented at Asiacrypt 2023, showed how a proof of equivalence can be significantly compressed by describing how the isometry
-
Nonlinear numerical assessment of damped oscillation of SMA Timoshenko curved beams under impulsive loading Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-07
Ali Cheraghback, M. Botshekanan Dehkordi, Y. KianiDue to the many applications of shape memory alloys (SMAs) to make the structures more intelligent, these materials are getting great attention of researchers. Meanwhile, the nonlinear dynamic analysis of curved beams made of SMAs has not been investigated so far. Therefore, this work focuses on a nonlinear dynamic analysis of SMA curved beams under transverse impulse loading taking into account the
-
Singular layer PINN methods for steep reaction–diffusion equations in a smooth convex domain Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-07
Chang-Yeol Jung, Junghwa Kim, Eaint Phoo NgonWe introduce a novel semi-analytic method for solving singularly perturbed reaction–diffusion problems in a smooth domain using neural network architectures. To manage steep solution transitions near the boundary, we utilize the boundary-fitted coordinates and perform boundary layer analysis to construct a corrector function which describes the singular behavior of the solution near the boundary. By
-
A computationally efficient peridynamic framework for modeling damage in viscoelastic fiber-reinforced lamina Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-06
Alireza Masoumi, Amirreza Moradi, Mohammad Ravandi, Manouchehr SalehiA novel computational framework based on modified bond-based peridynamics is proposed for viscoelastic laminas. The framework accurately captures deformations, damage initiation, and propagation under mechanical and thermal loads. It reduces numerical complexity by directly assessing viscoelastic strains each time step, eliminating real-time increment constraints. Constitutive component models, including
-
Method of fundamental solutions formulations for biharmonic problems Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-06
Csaba Gáspár, Andreas KarageorghisWe consider various method of fundamental solution (MFS) formulations for the numerical solution of two-dimensional boundary value problems (BVPs) governed by the homogeneous biharmonic equation. The motivation for employing the proposed techniques comes from the corresponding boundary integral representations. These are carefully analyzed in the case the domain of the BVP under consideration is a
-
A class of triple-twisted GRS codes Des. Codes Cryptogr. (IF 1.4) Pub Date : 2025-03-05
Kapish Chand Meena, Piyush Pachauri, Ambrish Awasthi, Maheshanand BhaintwalThis paper focuses on the study of triple-twisted generalized Reed–Solomon (TTGRS) codes over a finite field \({\mathbb {F}}_q\), having twists \(\varvec{t} = (1, 2, 3)\) and hooks \(\varvec{h} = (0, 1, 2)\). We have obtained the necessary and sufficient conditions for such TTGRS codes to be MDS, AMDS, and AAMDS via algebraic techniques. We have also enumerated these codes for some particular values
-
Corrigendum to “S-PEEC-DI: Surface Partial Element Equivalent Circuit method with decoupling integrals” [Engineering Analysis with Boundary Elements 173 (2025) 106152] Eng. Anal. Bound. Elem. (IF 4.2) Pub Date : 2025-03-05
Maria De Lauretis, Elena Haller, Daniele Romano, Giulio Antonini, Jonas Ekman, Ivana Kovačević-Badstübner, Ulrike Grossner