default search action
Designs, Codes and Cryptography, Volume 39, 2006
Volume 39, Number 1, April 2006
- Jeremy Dover:
Subregular Spreads of Hermitian Unitals. 5-15 - Mahdad Khatirinejad, Petr Lisonek:
Classification and Constructions of Complete Caps in Binary Spaces. 17-31 - Antonio Cossidente, Alessandro Siciliano:
The Automorphism Group of Plane Algebraic Curves with Singer Automorphisms. 33-37 - Tao Feng, Yanxun Chang:
Existence of Z-cyclic 3PTWh (p) for any Prime p congruent 1 (mod 4). 39-49 - Agnes D. Garciano, Yutaka Hiramine, Takeo Yokonuma:
On Relative Difference Sets in Dihedral Groups. 51-63 - Steven T. Dougherty, Young Ho Park:
Codes Over the p-adic Integers. 65-80 - Stefaan De Winter, Koen Thas:
Generalized Quadrangles with an Abelian Singer Group. 81-87 - Barbara Masucci:
Sharing Multiple Secrets: Models, Schemes and Analysis. 89-111 - Igor E. Shparlinski:
On RSA Moduli with Prescribed Bit Patterns. 113-122
Volume 39, Number 2, May 2006
- Steven T. Dougherty, San Ling:
Cyclic Codes Over Z4 of Even Length. 127-153 - Hassan Aly, Arne Winterhof:
On the Linear Complexity Profile of Nonlinear Congruential Pseudorandom Number Generators with Dickson Polynomials. 155-162 - Michael Giudici:
Codes with a Certain Weight-preserving Transitive Group of Automorphisms. 163-172 - Kejun Chen, Ruizhong Wei:
Super-simple (nu, 5, 5) Designs. 173-187 - Mathieu Ciet, Marc Joye, Kristin E. Lauter, Peter L. Montgomery:
Trading Inversions for Multiplications in Elliptic Curve Cryptography. 189-206 - Gilberto Bini:
A-Codes from Rational Functions over Galois Rings. 207-214 - Cem Güneri, Ferruh Özbudak:
Improvements on Generalized Hamming Weights of Some Trace Codes. 215-231 - Gilles Piret:
Luby-Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme. 233-245 - Dean Crnkovic:
A Series of Regular Hadamard Matrices. 247-251 - Marten van Dijk, Dwaine E. Clarke, Blaise Gassend, G. Edward Suh, Srinivas Devadas:
Speeding up Exponentiation using an Untrusted Computational Resource. 253-273 - Paulo S. L. M. Barreto, José Felipe Voloch:
Efficient Computation of Roots in Finite Fields. 275-280 - Deirdre Luyckx:
A Geometric Construction of the Hyperbolic Fibrations Associated with a Flock, q Even. 281-288 - Ron Shaw, Neil A. Gordon:
The Polynomial Degree of the GrassmannianG1, n, 2. 289-306 - Petr Lisonek, Mahdad Khatirinejad:
Erratum for "A Family of Complete Caps in PG(n, 2)". 307
Volume 39, Number 3, June 2006
- M. R. Darafsheh:
Designs from the Group PSL2(q), q Even. 311-316 - Sergey V. Avgustinovich, Olof Heden, Faina I. Solov'eva:
On Intersection Problem for Perfect Binary Codes. 317-322 - Jan De Beule, Leo Storme:
Blocking All Generators of Q+(2n + 1, 3), n ≥ 4. 323-333 - Jen-Chun Chang:
New Algorithms of Distance-Increasing Mappings from Binary Vectors to Permutations by Swaps. 335-345 - Maffre Samuel:
A Weak Key Test for Braid Based Cryptography. 347-373 - Masaaki Homma, Seon Jeong Kim:
The Two-Point Codes with the Designed Distance on a Hermitian Curve in Even Characteristic. 375-386 - Katie O'Brien, Patrick Fitzpatrick:
Bounds on Codes Derived by Counting Components in Varshamov Graphs. 387-396 - Angela Aguglia, Massimo Giulietti:
Blocking Sets of Certain Line Sets Related to a Conic. 397-405
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.