Journal of Combinatorial Mathematics and Combinatorial Computing

ISSN: 0835-3026 (print) 2817-576X (online)

The Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC) began its publishing journey in April 1987 and has since become a respected platform for advancing research in combinatorics and its applications.
Open Access: The journal follows the Diamond Open Access model—completely free for both authors and readers, with no article processing charges (APCs)
Publication Frequency: From 2024 onward, JCMCC publishes four issues annually—in March, June, September, and December.
Scope: JCMCC publishes research in combinatorial mathematics and combinatorial computing, as well as in artificial intelligence and its applications across diverse fields.
Indexing & Abstracting: The journal is indexed in MathSciNet, Zentralblatt MATH, and EBSCO, enhancing its visibility and scholarly impact within the international mathematics community.
Rapid Publication: Manuscripts are reviewed and processed efficiently, with accepted papers scheduled for prompt appearance in the next available issue.
Print & Online Editions: All issues are published in both print and online formats to serve the needs of a wide readership.

Diane Donovan1, Adelle Howse1
1Centre for Discrete Mathematics and Computing, Mathematics Department, The University of Queensland, Queensland, 4072, Australia
Abstract:

This paper provides a general method for finding a critical set for any Latin square of order \(n\). This method is used to prove the existence of critical sets of various sizes. It has also been applied to all main classes of Latin squares of order seven, thereby producing a critical set for each Latin square of order seven.

I.J. Dejter1, Curt Lindner2, A. Rosa3
1Department of Mathematics, Faculty of Natural Sciences University of Puerto Rico Rio Piedras, Puerto Rico 00931
2Department of Discrete and Statistical Sciences 120 Mathematics Annex, Auburn University Auburn, Alabama 36849-5307
3 Department of Mathematics and Statistics McMaster University Hamilton, Ontario, CANADA L8S 4K1
L.J. Cummings1
1University of Waterloo Dedicated to Anne Penfold Street.
Abstract:

Anne Street wrote an expository article about de Bruijn graphs in the 1970’s. We review some subsequent lines of research, at least one of which was inspired by her article.

Robert S.Coulter1, George Havas1, Marie Henderson1
1Centre for Discrete Mathematics and Computing Department of Computer Science and Electrical Engineering The University of Queensland Queensland, 4072, Australia
Abstract:

No general algorithm is known for the functional decomposition of wild polynomials over a finite field. However, partial solutions exist. In particular, a fast functional decomposition algorithm for linearised polynomials has been developed using factoring methods in skew-polynomial rings. This algorithm is extended to a related class of wild polynomials, which are sub-linearised polynomials.

Andrew Clark1, Ed Dawson1
1Information Security Research Centre Queensland University of Technology GPO Box 2434, Brisbane 4000, Queensland, Australia
Abstract:

This paper presents a comparison of the performance of three optimisation heuristics in automated attacks on a simple classical cipher. The three optimisation heuristics considered are simulated annealing, the genetic algorithm, and the tabu search. Although similar attacks have been proposed previously, a comparison of multiple techniques has not been performed. Performance criteria such as efficiency and speed are investigated. The use of tabu search in the field of automated cryptanalysis is a largely unexplored area of research. A new attack on the simple substitution cipher utilizing tabu search is also presented in this paper.

Ghulam-Rasool Chaudhry1, Hossein Ghodosi1, Jennifer Seberry1
1Department of Computer Science Centre for Computer Security Research University of Wollongong Wollongong, NSW 2500, AUSTRALIA
Abstract:

Secret sharing schemes are one of the most important primitives in distributed systems. In perfect secret sharing schemes, collaboration between unauthorized participants cannot reduce their uncertainty about the secret. This paper presents a perfect secret sharing scheme arising from critical sets of Room squares.

Elizabeth J.Billington1, C.C. Lindner2
1 Department of Mathematics University of Queensland Brisbane, Queensland 4072 AUSTRALIA
2Department of Discrete and Statistical Sciences 120 Mathematics Annex Auburn University Auburn, Alabama 36849 USA
J.A. Bate1, G.H.J. van Rees2
1Department of Computer Science University Of Manitoba Winnipeg, Manitoba Canada R3T 2N2
2Department of Computer Science University Of Manitoba Winnipeg, Manitoba Canada R3T 2N2
Abstract:

Let \(L(n, k, p, t)\) denote the minimum number of subsets of size \(k\) (\(k\)-subsets) of a set of size \(n\) (\(n\)-set) such that any \(p\)-subset intersects at least one of these \(k\)-subsets in at least \(t\) elements. The value of \(L(n, 6, 6, 2)\) is determined for \(n \leq 54\).

A. Baliga1
1Department of Mathematics, RMIT., GPO Box 2476V, Melbourne, VIC 3001, Australia.
Abstract:

The structure of cocyclic Hadamard matrices allows for a much faster and more systematic search for binary, self-dual codes. Here, we consider \(\mathbf{Z}_{2}^{2} \times \mathbf{Z}_{t}\)-cocyclic Hadamard matrices for \(t = 3, 5, 7,\) and \(9\) to yield binary self-dual codes of lengths \(24, 40, 56,\) and \(72\). We show that the extended Golay code cannot be obtained as a member of this class and also demonstrate the existence of four apparently new codes – a \([56, 28, 8]\) code and three \([72, 36, 8]\) codes.

D.de Caen1
1Department of Mathematics and Statistics Queen’s University Kingston, Ontario K7L 3N6
Abstract:

Let \(A = (a_{ij})\) be an \(m \times n\) nonnegative matrix, with row-sums \(r_i\) and column-sums \(c_j\). We show that \[
mn \sum\limits_{i,j} a_{ij} f(r_i) f(c_j) \geq \sum\limits_{i,j} a_{ij}\sum\limits_{i} f(r_i)\sum\limits_{j} f(c_j)
\] providing the function \(f\) meets certain conditions. When \(f\) is the identity function, this inequality is one proven by Atkinson, Watterson, and Moran in 1960. We also prove another inequality, of similar type, that refines a result of Ajtai, Komlós, and Szemerédi (1981).

E-mail Alert

Add your e-mail address to receive upcoming issues of Journal of Combinatorial Mathematics and Combinatorial Computing (JCMCC).

Special Issues

The Combinatorial Press Editorial Office routinely extends invitations to scholars for the guest editing of Special Issues, focusing on topics of interest to the scientific community. We actively encourage proposals from our readers and authors, directly submitted to us, encompassing subjects within their respective fields of expertise. The Editorial Team, in conjunction with the Editor-in-Chief, will supervise the appointment of Guest Editors and scrutinize Special Issue proposals to ensure content relevance and appropriateness for the journal. To propose a Special Issue, kindly complete all required information for submission;