Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             26 results found
no title author magazine year volume issue page(s) type
1 A classification result on weighted { δ v μ + 1 , δ v μ ; N , p 3 } -minihypers Ferret, S.
2006
154 2 p. 277-293
17 p.
article
2 Affinity of permutations of F 2 n Hou, Xiang-dong
2006
154 2 p. 313-325
13 p.
article
3 A generalization of the binary Preparata code Kuzmin, A.S.
2006
154 2 p. 337-345
9 p.
article
4 A Maiorana–McFarland type construction for resilient Boolean functions on n variables (n even) with nonlinearity > 2 n - 1 - 2 n / 2 + 2 n / 2 - 2 Maitra, Subhamoy
2006
154 2 p. 357-369
13 p.
article
5 An explicit class of codes with good parameters and their duals Ling, San
2006
154 2 p. 346-356
11 p.
article
6 A wrap error attack against NTRUEncrypt Meskanen, Tommi
2006
154 2 p. 382-391
10 p.
article
7 Contents 2006
154 2 p. vii-viii
nvt p.
article
8 Editorial Board 2006
154 2 p. v-vi
nvt p.
article
9 Entity authentication schemes using braid word reduction Sibert, Hervé
2006
154 2 p. 420-436
17 p.
article
10 Enumeration of inequivalent irreducible Goppa codes Ryan, John A.
2006
154 2 p. 399-412
14 p.
article
11 Finding nonnormal bent functions Canteaut, Anne
2006
154 2 p. 202-218
17 p.
article
12 Fine-grained forward-secure signature schemes without random oracles Camenisch, Jan
2006
154 2 p. 175-188
14 p.
article
13 Guest editors 2006
154 2 p. 174-
1 p.
article
14 Guide for authors 2006
154 2 p. I-IV
nvt p.
article
15 List signature schemes Canard, Sébastien
2006
154 2 p. 189-201
13 p.
article
16 On the complexity of suboptimal decoding for list and decision feedback schemes Freudenberger, J.
2006
154 2 p. 294-304
11 p.
article
17 Polynomial interpolation of cryptographic functions related to Diffie–Hellman and discrete logarithm problem Kiltz, Eike
2006
154 2 p. 326-336
11 p.
article
18 Properties and constraints of cheating-immune secret sharing schemes D’Arco, Paolo
2006
154 2 p. 219-233
15 p.
article
19 Provably secure non-interactive key distribution based on pairings Dupont, Régis
2006
154 2 p. 270-276
7 p.
article
20 Recursive error correction for general Reed–Muller codes Dumer, Ilya
2006
154 2 p. 253-269
17 p.
article
21 Repeated-root cyclic and negacyclic codes over a finite chain ring Sălăgean, Ana
2006
154 2 p. 413-419
7 p.
article
22 Secure multi-party computation made simple Maurer, Ueli
2006
154 2 p. 370-381
12 p.
article
23 Some subsets of points in the plane associated to truncated Reed–Muller codes with good parameters Quarez, Ronan
2006
154 2 p. 392-398
7 p.
article
24 Special Issue on Coding and Cryptography Charpin, Pascale
2006
154 2 p. 173-
1 p.
article
25 Symmetric matrices and codes correcting rank errors beyond the ⌊ ( d - 1 ) / 2 ⌋ bound Gabidulin, Ernst M.
2006
154 2 p. 305-312
8 p.
article
26 Unconditionally secure key assignment schemes De Santis, Alfredo
2006
154 2 p. 234-252
19 p.
article
                             26 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands