


default search action
Designs, Codes and Cryptography, Volume 38, 2006
Volume 38, Number 1, January 2006
- Masaaki Harada:

Self-Orthogonal 3-(56, 12, 65) Designs and Extremal Doubly-Even Self-Dual Codes of Length 56. 5-16 - Mehmet Özen, Irfan Siap

:
Linear Codes over Fq[u]/(us) with Respect to the Rosenbloom-Tsfasman Metric. 17-29 - Tim L. Alderson

:
(6, 3)-MDS Codes over an Alphabet of Size 4. 31-40 - Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern:

Index Calculation Attacks on RSA Signature and Encryption. 41-53 - Masaaki Homma, Seon Kim:

The Two-Point Codes on a Hermitian Curve with the Designed Minimum Distance. 55-81 - L. Ji:

Asymptotic Determination of the Last Packing Number of Quadruples. 83-95 - Steven T. Dougherty, T. Aaron Gulliver, Manabu Oura:

Higher Weights for Ternary and Quaternary Self-Dual Codes*. 97-112 - Michel Lavrauw

:
Sublines of Prime Order Contained in the Set of Internal Points of a Conic. 113-123 - Olof Heden:

A Full Rank Perfect Code of Length 31. 125-129 - Simeon Ball

, Patrick Govaerts, Leo Storme
:
On Ovoids of Parabolic Quadrics. 131-145 - Andrea Caranti, Francesca Dalla Volta:

The Round Functions of Cryptosystem PGM Generate the Symmetric Group. 147-155
Volume 38, Number 2, February 2006
- Wilfried Meidl, Arne Winterhof

:
Some Notes on the Linear Complexity of Sidel'nikov-Lempel-Cohn-Eastman Sequences. 159-178 - Frank De Clerck, Stefaan De Winter

, Elisabeth Kuijken, Cristina Tonesi:
Distance-Regular (0, alpha)-Reguli. 179-194 - Sara Cauchie:

A Characterization of the Complement of a Hyperbolic Quadric in PG (3, q), for q Odd. 195-208 - Michael Scott, Paulo S. L. M. Barreto:

Generating More MNT Elliptic Curves. 209-217 - Gwoboa Horng

, Tzungher Chen
, Du-shiau Tsai:
Cheating in Visual Cryptography. 219-236 - Ari Juels, Madhu Sudan:

A Fuzzy Vault Scheme. 237-257 - Douglas R. Stinson:

Some Observations on the Theory of Cryptographic Hash Functions. 259-277 - Khoongming Khoo, Guang Gong, Douglas R. Stinson:

A New Characterization of Semi-bent and Bent Functions on Finite Fields*. 279-295 - Eric Merchant:

Exponentially Many Hadamard Designs. 297-308
Volume 38, Number 3, March 2006
- Norifumi Kamiya

, Marc P. C. Fossorier:
Quasi-Cyclic Codes from a Finite Affine Plane. 311-329 - Petri Rosendahl:

A Generalization of Niho's Theorem. 331-336 - San Ling

, Harald Niederreiter, Patrick Solé:
On the Algebraic Structure of Quasi-cyclic Codes IV: Repeated Roots. 337-361 - Vince Grolmusz

:
Co-Orthogonal Codes. 363-372 - Jinhua Wang:

A New Class of Optimal 3-splitting Authentication Codes. 373-381 - Annegret Weng:

A Low-Memory Algorithm for Point Counting on Picard Curves. 383-393 - Omran Ahmadi:

Self-Reciprocal Irreducible Pentanomials Over F2. 395-397 - Benjamin Arazi

:
Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard. 399-415

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














