default search action
Designs, Codes and Cryptography, Volume 67
Volume 67, Number 1, April 2013
- Shuhong Gao, Raymond Heindl:
Multivariate public key cryptosystems from diophantine equations. 1-18 - Jie Li, Xiangyong Zeng, Xiaohu Tang, Chunlei Li:
A family of quadriphase sequences of period 4(2 n - 1) with low correlation and large linear span. 19-35 - Mieko Yamada:
Difference sets over Galois rings with odd extension degrees and characteristic an even power of 2. 37-57 - Yonglin Cao, Jian Gao:
Constructing quasi-cyclic codes from linear algebra theory. 59-75 - Deng Tang, WeiGuo Zhang, Xiaohu Tang:
Construction of balanced Boolean functions with high nonlinearity and good autocorrelation properties. 77-91 - Dimitri Leemans, Bernardo Gabriel Rodrigues:
Binary codes of some strongly regular subgraphs of the McLaughlin graph. 93-109 - Mausumi Bose, Aloke Dey, Rahul Mukerjee:
Key predistribution schemes for distributed sensor networks via block designs. 111-136 - John Bamberg, Michael Giudici, Gordon F. Royle:
Hemisystems of small flock generalized quadrangles. 137-157
Volume 67, Number 2, May 2013
- Dina Ghinelli, J. W. P. Hirschfeld, Dieter Jungnickel:
Obituary: Daniel R. Hughes (1927-2012). 159-162 - Dina Ghinelli, Dieter Jungnickel:
Obituary: Marialuisa J. de Resmini (1939-2012). 163-167 - Motahhareh Gharahi, Massoud Hadian Dehkordi:
The complexity of the graph access structures on six participants. 169-173 - Huajin Chen, Tian Tian, Wenfeng Qi:
On the affine equivalence relation between two classes of Boolean functions with optimal algebraic immunity. 175-185 - Ibrahim Özen, Eda Tekin:
Moments of the support weight distribution of linear codes. 187-196 - Fangguo Zhang, Ping Wang:
Speeding up elliptic curve discrete logarithm computations with point halving. 197-208 - Frederik Armknecht, Stefan Katzenbeisser, Andreas Peter:
Group homomorphic encryption: characterizations, impossibility results, and applications. 209-232 - Kun Wang, Jianxing Yin:
Further results on the existence of nested orthogonal arrays. 233-243 - Ian Goldberg, Douglas Stebila, Berkant Ustaoglu:
Anonymity and one-way authentication in key exchange protocols. 245-269 - Hoon Hong, Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park:
Simple and exact formula for minimum loop length in Ate i pairing based on Brezing-Weng curves. 271-292
Volume 67, Number 3, June 2013
- Kiyoshi Nagata, Fidel R. Nemenzo, Hideo Wada:
Mass formula and structure of self-dual codes over Z2s. 293-316 - Zhixiong Chen, Xiaoni Du:
On the linear complexity of binary threshold sequences derived from Fermat quotients. 317-323 - Pinhui Ke, Jie Zhang, Shengyuan Zhang:
On the linear complexity and the autocorrelation of generalized cyclotomic binary sequences of length 2p m. 325-339 - Kristin E. Lauter, Ning Shang:
Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields. 341-355 - Orr Dunkelman, Nathan Keller:
Cryptanalysis of the Stream Cipher LEX. 357-373 - Luca Giuzzi, Valentina Pepe:
Families of twisted tensor product codes. 375-384 - Neil I. Gillespie, Cheryl E. Praeger:
Neighbour transitivity on codes in Hamming graphs. 385-393 - Jaime Gutierrez, Álvar Ibeas, Domingo Gómez-Pérez, Igor E. Shparlinski:
Predicting masked linear pseudorandom number generators over finite fields. 395-402
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.