default search action
Designs, Codes and Cryptography, Volume 63
Volume 63, Number 1, April 2012
- Gaetan Bisson, Andrew V. Sutherland:
A low-memory algorithm for finding short product representations in finite groups. 1-13 - Diane M. Donovan, Mike J. Grannell:
On the number of designs with affine parameters. 15-27 - Ian McLoughlin:
A group ring construction of the [48, 24, 12] type II linear block code. 29-41 - Hyun Jin Kim:
The binary extremal self-dual codes of lengths 38 and 40. 43-57 - Alina Ostafe:
Pseudorandom vector sequences of maximal period generated by triangular polynomial dynamical systems. 59-72 - Vassili C. Mavron, T. P. McDonough, Mohan S. Shrikhande:
On quasi-symmetric designs with intersection difference three. 73-86 - Li-Ping Wang, Qiang Wang:
On explicit factors of cyclotomic polynomials over finite fields. 87-104 - Han Mao Kiah, Ka Hin Leung, San Ling:
A note on cyclic codes over GR(p 2, m) of length p k. 105-112 - Steven T. Dougherty, Suat Karadeniz, Bahattin Yildiz:
Cyclic codes over R k. 113-126 - László Csirmaz, Gábor Tardos:
On-line secret sharing. 127-147
Volume 63, Number 2, May 2012
- Manohar L. Aggarwal, Andreas Klein, Leo Storme:
The characterisation of the smallest two fold blocking sets in PG(n, 2). 149-157 - Jan De Beule, Anja Hallez, Leo Storme:
A characterisation result on a particular class of non-weighted minihypers. 159-170 - Maarten De Boeck:
Small weight codewords in the dual code of points and hyperplanes in PG(n, q), q even. 171-182 - Xiang-Dong Hou:
Classification of self dual quadratic bent functions. 183-198 - Kaoru Kurosawa:
Round-efficient perfectly secure message transmission scheme against general adversary. 199-207 - Aixian Zhang, Keqin Feng:
Construction of cyclotomic codebooks nearly meeting the Welch bound. 209-224 - Paul Stankovski, Sushmita Ruj, Martin Hell, Thomas Johansson:
Improved distinguishers for HC-128. 225-240 - Derek H. Smith, Roberto Montemanni:
A new table of permutation codes. 241-253 - Oriol Farràs, Jessica Ruth Metcalf-Burton, Carles Padró, Leonor Vázquez:
On the optimization of bipartite secret sharing schemes. 255-271 - Thomas W. Cusick, Younhwan Cheon:
Affine equivalence for rotation symmetric Boolean functions with 2 k variables. 273-294
Volume 63, Number 3, June 2012
- Jong Yoon Hyun, Heisook Lee, Yoonjin Lee:
MacWilliams duality and a Gleason-type theorem on self-dual bent functions. 295-304 - Kun Wang, Jianmin Wang:
Semicyclic 4-GDDs and related two-dimensional optical orthogonal codes. 305-319 - Relinde P. M. J. Jurrius:
Weight enumeration of codes from finite spaces. 321-330 - Zhi Hu, Patrick Longa, Maozhi Xu:
Implementing the 4-dimensional GLV method on GLS elliptic curves with j-invariant 0. 331-343 - Daniela Silvesan, Nabil Shalaby:
Cyclic block designs with block size 3 from Skolem-type sequences. 345-355 - Yuemei Huang, Yanxun Chang:
Two classes of optimal two-dimensional OOCs. 357-363 - Edoardo Ballico:
Scroll codes over curves of higher genus: reducible and superstable vector bundles. 365-377 - Antonino Simone, Boris Skoric:
Accusation probabilities in Tardos codes: beyond the Gaussian approximation. 379-412 - Guobiao Weng, Xiangyong Zeng:
Further results on planar DO functions and commutative semifields. 413-423 - Daniel Panario, Olga Sosnovski, Brett Stevens, Qiang Wang:
Divisibility of polynomials over finite fields and combinatorial applications. 425-445
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.