default search action
Designs, Codes and Cryptography, Volume 71
Volume 71, Number 1, April 2014
- Aart Blokhuis, Andries E. Brouwer, Attila Sali:
Note on the size of binary Armstrong codes. 1-4 - Hiram H. Lopez, Carlos Rentería-Márquez, Rafael H. Villarreal:
Affine cartesian codes. 5-19 - Daniele Bartoli, Maarten De Boeck, Stefania Fanali, Leo Storme:
On the functional codes defined by quadrics and Hermitian varieties. 21-46 - Guangfu Wu, Hsin-Chiu Chang, Lin Wang, Trieu-Kien Truong:
Constructing rate 1/p systematic binary quasi-cyclic codes based on the matroid theory. 47-56 - Nigel P. Smart, Frederik Vercauteren:
Fully homomorphic SIMD operations. 57-81 - Thijs Laarhoven, Benne de Weger:
Optimal symmetric Tardos traitor tracing schemes. 83-103 - Pierre Loidreau:
Asymptotic behaviour of codes in rank metric over finite fields. 105-118 - Anuradha Sharma, Amit K. Sharma:
On some new m-spotty Lee weight enumerators. 119-152 - S. Arumugam, R. Lakshmanan, Atulya K. Nagar:
On (k, n)*-visual cryptography scheme. 153-162 - Tian Tian, Wen-Feng Qi:
On the largest affine sub-families of a family of NFSR sequences. 163-181
Volume 71, Number 2, May 2014
- Sihong Su, Xiaohu Tang:
Construction of rotation symmetric Boolean functions with optimal algebraic immunity and high nonlinearity. 183-199 - Yun Fan, San Ling, Hongwei Liu:
Matrix product codes over finite commutative Frobenius rings. 201-227 - Alexander Zeh, Sergey Bezzateev:
A new bound on the minimum distance of cyclic codes using small-minimum-distance cyclic codes. 229-246 - Tomas Nilson, Pia Heidtmann:
Inner balance of symmetric designs. 247-260 - Antonia Wachter-Zeh, Alexander Zeh, Martin Bossert:
Decoding interleaved Reed-Solomon codes beyond their joint error-correcting capability. 261-281 - Peter Dukes, Lea Howard:
Group divisible designs in MOLS of order ten. 283-291 - Reza Sepahi, Ron Steinfeld, Josef Pieprzyk:
Lattice-based completely non-malleable public-key encryption in the standard model. 293-313 - Peipei Dai, Jianmin Wang, Jianxing Yin:
Combinatorial constructions for optimal 2-D optical orthogonal codes with AM-OPPTS property. 315-330 - Caixue Zhou, Wan Zhou, Xiwei Dong:
Provable certificateless generalized signcryption scheme. 331-346 - Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang:
The relation and transformation between hierarchical inner product encryption and spatial encryption. 347-364
Volume 71, Number 3, June 2014
- Mingzhi Zhu, Gennian Ge:
Room squares with super-simple property. 365-381 - Vladimir Anashin, Andrei Yu. Khrennikov, Ekaterina Yurova:
T-functions revisited: new criteria for bijectivity/transitivity. 383-407 - Christophe Petit:
Towards factoring in $${SL(2, \, \mathbb{F}_{2^n})}$$. 409-431 - Maura B. Paterson, Douglas R. Stinson:
A unified approach to combinatorial key predistribution schemes for sensor networks. 433-457 - Johannes Braun, Johannes Buchmann, Ciaran Mullan, Alexander Wiesmaier:
Long term confidentiality: a survey. 459-478 - Anthony B. Evans:
Mutually orthogonal Latin squares based on general linear groups. 479-492 - Nam Yul Yu, Keqin Feng, Aixian Zhang:
A new class of near-optimal partial Fourier codebooks from an almost difference set. 493-501 - Klara Stokes, Oriol Farràs:
Linear spaces and transversal designs: k-anonymous combinatorial configurations for anonymous database search notes. 503-524 - Klara Stokes, Oriol Farràs:
Erratum to: Linear spaces and transversal designs: $$k$$ -anonymous combinatorial configurations for anonymous database search. 525 - Wakaha Ogata, Hiroshi Eguchi:
Cheating detectable threshold scheme against most powerful cheaters for long secrets. 527-539 - Susan G. Barwick, Wen-Ai Jackson:
A characterisation of tangent subplanes of PG(2, q 3). 541-545
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.