nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An algebraic attack to the Bluetooth stream cipher E0
|
La Scala, Roberto |
|
|
84 |
C |
p. |
artikel |
2 |
An asymptotically optimal construction of almost affinely disjoint subspaces
|
Otal, Kamil |
|
|
84 |
C |
p. |
artikel |
3 |
A note on the intersection of two distinct constacyclic codes
|
Liu, Xiusheng |
|
|
84 |
C |
p. |
artikel |
4 |
Davenport and Hasse's theorems and lifts of multiplication matrices of Gaussian periods
|
Hoshi, Akinari |
|
|
84 |
C |
p. |
artikel |
5 |
Editorial Board
|
|
|
|
84 |
C |
p. |
artikel |
6 |
Exceptional crooked functions
|
Bartoli, Daniele |
|
|
84 |
C |
p. |
artikel |
7 |
Goppa codes over the p-adic integers and integers modulo p e
|
Epelde, Markel |
|
|
84 |
C |
p. |
artikel |
8 |
Irreducible polynomials from a cubic transformation
|
Mattarei, Sandro |
|
|
84 |
C |
p. |
artikel |
9 |
Low-lying zeros in families of elliptic curve L-functions over function fields
|
Meisner, Patrick |
|
|
84 |
C |
p. |
artikel |
10 |
New classes of permutation trinomials over F q 3
|
Gupta, Rohit |
|
|
84 |
C |
p. |
artikel |
11 |
On the differential properties of the power mapping x p m + 2
|
Man, Yuying |
|
|
84 |
C |
p. |
artikel |
12 |
Pell hyperbolas in DLP–based cryptosystems
|
Alecci, Gessica |
|
|
84 |
C |
p. |
artikel |
13 |
Primitive elements with prescribed traces
|
Booker, Andrew R. |
|
|
84 |
C |
p. |
artikel |
14 |
The m-ovoids of W ( 5 , 2 ) and their generalizations
|
Ceria, Michela |
|
|
84 |
C |
p. |
artikel |