default search action
Designs, Codes and Cryptography, Volume 80
Volume 80, Number 1, July 2016
- Eric Zhi Chen:
New binary h-generator quasi-cyclic codes by augmentation and new minimum distance bounds. 1-10 - José Moreira, Marcel Fernández, Grigory Kabatiansky:
Almost separating and almost secure frameproof codes over q-ary alphabets. 11-28 - Dennis Hofheinz, Tibor Jager:
Tightly secure signatures and public-key encryption. 29-61 - Igor E. Shparlinski:
On small gaps between the elements of multiplicative subgroups of finite fields. 63-71 - Jonathan Jedwab, Amy Wiebe:
Constructions of complex equiangular lines from mutually unbiased bases. 73-89 - Denis S. Krotov:
Perfect codes in Doob graphs. 91-102 - Fuchun Guo, Willy Susilo, Yi Mu:
Generalized closest substring encryption. 103-124 - Alexander A. Davydov, Giorgio Faina, Massimo Giulietti, Stefano Marcugini, Fernanda Pambianco:
On constructions and parameters of symmetric configurations vk. 125-147 - Yanling Chen, Markku Niemenmaa, A. J. Han Vinck:
A general check digit system based on finite groups. 149-163 - Sabyasachi Dutta, Raghvendra Singh Rohit, Avishek Adhikari:
Constructions and analysis of some efficient t - (k, n)∗-visual cryptographic schemes using linear algebraic techniques. 165-196 - Alberto Ravagnani:
Rank-metric codes and their duality theory. 197-216
Volume 80, Number 2, August 2016
- Xiang-dong Hou, Ferruh Özbudak, Yue Zhou:
Switchings of semifield multiplications. 217-239 - Udo Ott:
On Jacobi sums, difference sets and partial difference sets in Galois domains. 241-281 - Kohei Yamada, Nobuko Miyamoto:
A construction and decomposition of orthogonal arrays with non-prime-power numbers of symbols on the complement of a Baer subplane. 283-294 - Chengju Li, Qin Yue, Fang-Wei Fu:
Complete weight enumerators of some cyclic codes. 295-315 - Susan G. Barwick, Wen-Ai Jackson:
Characterising pointsets in PG(4, q) that correspond to conics. 317-332 - Yarkin Doröz, Yin Hu, Berk Sunar:
Homomorphic AES evaluation using the modified LTV scheme. 333-358 - Carl Löndahl, Thomas Johansson, Masoumeh Koochak Shooshtari, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension. 359-377 - Aysegul Bayram, Elif Segah Oztas, Irfan Siap:
Codes over F4+vF4 and some DNA applications. 379-393 - Marion Candau, Roland Gautier, Johannes Huisman:
Convolutional block codes with cryptographic properties over the semi-direct product ℤ/Nℤ ⋊ ℤ/Mℤ. 395-407 - Kai-Uwe Schmidt, Jürgen Willms:
Barker sequences of odd length. 409-414 - John Sheekey:
Dimensional dual hyperovals in classical polar spaces. 415-420
Volume 80, Number 3, September 2016
- Jason T. LeGrow, David A. Pike, Jonathan Poulin:
Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs. 421-433 - Kathleen Nowak, Oktay Ölmez:
Partial geometric designs with prescribed automorphisms. 435-451 - Edoardo Ballico:
Non-special subsets of the set of points of a curve defined over a finite field. 453-457 - Rongjia Li, Chenhui Jin:
Meet-in-the-middle attacks on 10-round AES-256. 459-471 - Ga Won Lee, Jin Hong:
Comparison of perfect table cryptanalytic tradeoff algorithms. 473-523 - Junqing Gong, Zhenfu Cao, Shaohua Tang, Jie Chen:
Extended dual system group and shorter unbounded hierarchical identity based encryption. 525-559 - Adel Alahmadi, Hussain Alhazmi, Tor Helleseth, Rola Hijazi, Najat M. Muthana, Patrick Solé:
On the lifted Zetterberg code. 561-576 - Dirk Hachenberger:
Asymptotic existence results for primitive completely normal elements in extensions of Galois fields. 577-586 - Jian Guo, Jérémy Jean, Ivica Nikolic, Yu Sasaki:
Extended meet-in-the-middle attacks on some Feistel constructions. 587-618 - Juan Carlos Ku-Cauich, Guillermo Morales-Luna:
Authentication codes based on resilient Boolean maps. 619-633 - Rebecca J. Stones, Ming Su, Xiaoguang Liu, Gang Wang, Sheng Lin:
A Latin square autotopism secret sharing scheme. 635-650
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.