


default search action
Designs, Codes and Cryptography, Volume 76
Volume 76, Number 1, July 2015
- Ilias S. Kotsireas, Edgar Martínez-Moro

:
Foreword: Computer Algebra in Coding Theory and Cryptography. 1-2 - Mercè Villanueva

, Fanxuan Zeng, Jaume Pujol:
Efficient representation of binary nonlinear codes: constructions and minimum distance computation. 3-21 - Natalia Dück, Karl-Heinz Zimmermann:

Heuristic decoding of linear codes using commutative algebra. 23-35 - Tom Høholdt, Fernando Piñero, Peng Zeng:

Optimal codes as Tanner codes with cyclic component codes. 37-47 - Olav Geil

, Stefano Martin:
An improvement of the Feng-Rao bound for primary codes. 49-79 - Wilson Olaya-León, Claudia Granados-Pinzón:

The second generalized Hamming weight of certain Castle codes. 81-87 - Carlos Galindo

, Fernando Hernando
:
Quantum codes from affine variety codes and their subfield-subcodes. 89-100 - Carlos Munuera

:
Hamming codes for wet paper steganography. 101-111 - Thomas W. Cusick, Bryan Johns:

Theory of 2-rotation symmetric cubic Boolean functions. 113-133
Volume 76, Number 2, August 2015
- Mauro Biliotti

, Alessandro Montinaro
, Eliana Francot:
2-(v, k, 1) Designs with a point-primitive rank 3 automorphism group of affine type. 135-171 - Ferruh Özbudak

, Seher Tutdere, Oguz Yayla
:
On some bounds on the minimum distance of cyclic codes over finite fields. 173-178 - Jooyoung Lee, Martijn Stam:

MJH: a faster alternative to MDC-2. 179-205 - Tamás Héger

, Balázs Patkós, Marcella Takáts:
Search problems in vector spaces. 207-216 - Tony Shaska

, C. Shor:
Theta functions and symmetric weight enumerators for codes over imaginary quadratic fields. 217-235 - Darcy Best, Hadi Kharaghani, Hugh Ramp:

Mutually unbiased weighing matrices. 237-256 - Edward Dobson:

Monomial isomorphisms of cyclic codes. 257-267 - José Joaquín Bernal

, Joaquim Borges
, Cristina Fernández-Córdoba
, Mercè Villanueva
:
Permutation decoding of ℤ2ℤ4-linear codes. 269-277 - Jiao Li, Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu, Jinyong Shan

:
Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks. 279-305 - Eric Zhi Chen:

A new iterative computer search algorithm for good quasi-twisted codes. 307-323 - Thomas Plantard

, Willy Susilo
, Zhenfei Zhang:
LLL for ideal lattices: re-evaluation of the security of Gentry-Halevi's FHE scheme. 325-344 - Sihuang Hu

, Shuxing Li, Tao Zhang
, Tao Feng
, Gennian Ge:
New pseudo-planar binomials in characteristic two and related schemes. 345-360 - Yuan-Hsun Lo

, Hung-Lin Fu, Yi-Hean Lin:
Weighted maximum matchings and optimal equi-difference conflict-avoiding codes. 361-372
Volume 76, Number 3, September 2015
- Masaaki Harada:

On a 5-design related to a putative extremal doubly even self-dual code of length a multiple of 24. 373-384 - Guo-qiang Liu, Chen-Hui Jin:

Differential cryptanalysis of PRESENT-like cipher. 385-408 - Bangteng Xu:

Bentness and nonlinearity of functions on finite groups. 409-430 - Orr Dunkelman, Nathan Keller, Adi Shamir:

Almost universal forgery attacks on AES-based MAC's. 431-449 - Susan G. Barwick

, Wen-Ai Jackson:
An investigation of the tangent splash of a subplane of PG(2, q3). 451-468 - Atsushi Fujioka

, Koutarou Suzuki, Keita Xagawa
, Kazuki Yoneyama:
Strongly secure authenticated key exchange from factoring, codes, and lattices. 469-504 - Tung Le, Jamshid Moori:

On the automorphisms of designs constructed from finite simple groups. 505-517 - Steven T. Dougherty, Jon-Lark Kim, Yoonjin Lee

:
Codes over rings and Hermitian lattices. 519-535 - Oktay Olmez:

Plateaued functions and one-and-half difference sets. 537-549 - Anthony B. Evans, David Fear, Rebecca J. Stones:

Diagonally cyclic equitable rectangles. 551-569 - Claude Carlet, Deng Tang

:
Enhanced Boolean functions suitable for the filter model of pseudo-random generator. 571-587 - Hengjia Wei, Hui Zhang, Gennian Ge:

Completely reducible super-simple designs with block size five and index two. 589-600 - Orr Dunkelman, Nathan Keller:

Practical-time attacks against reduced variants of MISTY1. 601-627

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














