no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A classification result on weighted { δ v μ + 1 , δ v μ ; N , p 3 } -minihypers
|
Ferret, S. |
|
2006 |
154 |
2 |
p. 277-293 17 p. |
article |
2 |
Affinity of permutations of F 2 n
|
Hou, Xiang-dong |
|
2006 |
154 |
2 |
p. 313-325 13 p. |
article |
3 |
A generalization of the binary Preparata code
|
Kuzmin, A.S. |
|
2006 |
154 |
2 |
p. 337-345 9 p. |
article |
4 |
A Maiorana–McFarland type construction for resilient Boolean functions on n variables (n even) with nonlinearity > 2 n - 1 - 2 n / 2 + 2 n / 2 - 2
|
Maitra, Subhamoy |
|
2006 |
154 |
2 |
p. 357-369 13 p. |
article |
5 |
An explicit class of codes with good parameters and their duals
|
Ling, San |
|
2006 |
154 |
2 |
p. 346-356 11 p. |
article |
6 |
A wrap error attack against NTRUEncrypt
|
Meskanen, Tommi |
|
2006 |
154 |
2 |
p. 382-391 10 p. |
article |
7 |
Contents
|
|
|
2006 |
154 |
2 |
p. vii-viii nvt p. |
article |
8 |
Editorial Board
|
|
|
2006 |
154 |
2 |
p. v-vi nvt p. |
article |
9 |
Entity authentication schemes using braid word reduction
|
Sibert, Hervé |
|
2006 |
154 |
2 |
p. 420-436 17 p. |
article |
10 |
Enumeration of inequivalent irreducible Goppa codes
|
Ryan, John A. |
|
2006 |
154 |
2 |
p. 399-412 14 p. |
article |
11 |
Finding nonnormal bent functions
|
Canteaut, Anne |
|
2006 |
154 |
2 |
p. 202-218 17 p. |
article |
12 |
Fine-grained forward-secure signature schemes without random oracles
|
Camenisch, Jan |
|
2006 |
154 |
2 |
p. 175-188 14 p. |
article |
13 |
Guest editors
|
|
|
2006 |
154 |
2 |
p. 174- 1 p. |
article |
14 |
Guide for authors
|
|
|
2006 |
154 |
2 |
p. I-IV nvt p. |
article |
15 |
List signature schemes
|
Canard, Sébastien |
|
2006 |
154 |
2 |
p. 189-201 13 p. |
article |
16 |
On the complexity of suboptimal decoding for list and decision feedback schemes
|
Freudenberger, J. |
|
2006 |
154 |
2 |
p. 294-304 11 p. |
article |
17 |
Polynomial interpolation of cryptographic functions related to Diffie–Hellman and discrete logarithm problem
|
Kiltz, Eike |
|
2006 |
154 |
2 |
p. 326-336 11 p. |
article |
18 |
Properties and constraints of cheating-immune secret sharing schemes
|
D’Arco, Paolo |
|
2006 |
154 |
2 |
p. 219-233 15 p. |
article |
19 |
Provably secure non-interactive key distribution based on pairings
|
Dupont, Régis |
|
2006 |
154 |
2 |
p. 270-276 7 p. |
article |
20 |
Recursive error correction for general Reed–Muller codes
|
Dumer, Ilya |
|
2006 |
154 |
2 |
p. 253-269 17 p. |
article |
21 |
Repeated-root cyclic and negacyclic codes over a finite chain ring
|
Sălăgean, Ana |
|
2006 |
154 |
2 |
p. 413-419 7 p. |
article |
22 |
Secure multi-party computation made simple
|
Maurer, Ueli |
|
2006 |
154 |
2 |
p. 370-381 12 p. |
article |
23 |
Some subsets of points in the plane associated to truncated Reed–Muller codes with good parameters
|
Quarez, Ronan |
|
2006 |
154 |
2 |
p. 392-398 7 p. |
article |
24 |
Special Issue on Coding and Cryptography
|
Charpin, Pascale |
|
2006 |
154 |
2 |
p. 173- 1 p. |
article |
25 |
Symmetric matrices and codes correcting rank errors beyond the ⌊ ( d - 1 ) / 2 ⌋ bound
|
Gabidulin, Ernst M. |
|
2006 |
154 |
2 |
p. 305-312 8 p. |
article |
26 |
Unconditionally secure key assignment schemes
|
De Santis, Alfredo |
|
2006 |
154 |
2 |
p. 234-252 19 p. |
article |