Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             79 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A class of constacyclic codes are generalized Reed–Solomon codes Liu, Hongwei

12 p. 4143-4151
artikel
2 A gapless code-based hash proof system based on RQC and its applications Bettaieb, Slim

12 p. 3011-3044
artikel
3 Analysis of the single-permutation encrypted Davies–Meyer construction Cogliati, Benoît
2018
12 p. 2703-2723
artikel
4 A new construction of linear codes with one-dimensional hull Sok, Lin

12 p. 2823-2839
artikel
5 A new piggybacking design for systematic MDS storage codes Shangguan, Chong
2019
12 p. 2753-2770
artikel
6 An improved degree evaluation method of NFSR-based cryptosystems Ye, Chen-Dong

12 p. 2787-2806
artikel
7 A note on the weight spectrum of the Schubert code $$C_{\alpha }(2, m)$$Cα(2,m) Piñero, Fernando L.
2018
12 p. 2825-2836
artikel
8 Another look at key randomisation hypotheses Samajder, Subhabrata

12 p. 3837-3855
artikel
9 A polymatroid approach to generalized weights of rank metric codes Ghorpade, Sudhir R.

12 p. 2531-2546
artikel
10 A ring-like cascade connection and a class of NFSRs with the same cycle structures Zhao, Xiao-Xin
2018
12 p. 2775-2790
artikel
11 BCH codes with larger dimensional hull Pang, Binbin

12 p. 3933-3951
artikel
12 Binary primitive LCD BCH codes Huang, Xinmei

12 p. 2453-2473
artikel
13 Binary signed-digit integers and the Stern diatomic sequence Monroe, Laura

12 p. 2653-2662
artikel
14 Binomial permutations over finite fields with even characteristic Tu, Ziran

12 p. 2869-2888
artikel
15 Block-transitive 3-(v,4,λ) designs with sporadic or alternating socle Pang, Xuan

12 p. 3825-3835
artikel
16 Bounds for flag codes Kurz, Sascha

12 p. 2759-2785
artikel
17 Coding and bounds for partially defective memory cells Al Kim, Haider

12 p. 4019-4058
artikel
18 Construction of asymmetric Chudnovsky-type algorithms for multiplication in finite fields Ballet, Stéphane

12 p. 2783-2811
artikel
19 Construction of isodual codes from polycirculant matrices Shi, Minjia

12 p. 2547-2560
artikel
20 Construction of resilient Boolean functions in odd variables with strictly almost optimal nonlinearity Sun, Yujuan
2019
12 p. 3045-3062
artikel
21 Construction of single-deletion-correcting DNA codes using CIS codes Choi, Whan-Hyuk

12 p. 2581-2596
artikel
22 Construction of storage codes of rate approaching one on triangle-free graphs Huang, Hexiang

12 p. 3901-3913
artikel
23 Constructions and uses of incomplete pairwise balanced designs Dukes, Peter J.
2019
12 p. 2729-2751
artikel
24 Constructions of complete permutation polynomials Xu, Xiaofang
2018
12 p. 2869-2892
artikel
25 Decoding algorithms of monotone codes and azinv codes and their unified view Takahashi, Hokuto

12 p. 2893-2922
artikel
26 Efficient explicit constructions of compartmented secret sharing schemes Chen, Qi
2019
12 p. 2913-2940
artikel
27 Equidistant permutation group codes Jafari, Fatemeh

12 p. 2841-2859
artikel
28 Existence of primitive normal pairs with one prescribed trace over finite fields Sharma, Hariom

12 p. 2841-2855
artikel
29 Five families of the narrow-sense primitive BCH codes over finite fields Pang, Binbin

12 p. 2679-2696
artikel
30 Frame difference families and resolvable balanced incomplete block designs Costa, Simone
2018
12 p. 2725-2745
artikel
31 Further improvement on index bounds Wu, Yansheng

12 p. 2813-2821
artikel
32 Group invariant weighing matrices Tan, Ming Ming
2018
12 p. 2677-2702
artikel
33 Individual discrete logarithm with sublattice reduction Al Aswad, Haetham

12 p. 4059-4091
artikel
34 Johnson graph codes Duursma, Iwan

12 p. 2923-2941
artikel
35 Linear codes over $$\mathbb {F}_{q}[x]/(x^2)$$Fq[x]/(x2) and $$GR(p^2,m)$$GR(p2,m) reaching the Griesmer bound Li, Jin
2018
12 p. 2837-2855
artikel
36 Linear codes with small hulls in semi-primitive case Carlet, Claude
2019
12 p. 3063-3075
artikel
37 Linear complementary dual codes over rings Liu, Zihui
2019
12 p. 3077-3086
artikel
38 Maximal nonassociativity via fields Lisoněk, Petr

12 p. 2521-2530
artikel
39 Moderate-density parity-check codes from projective bundles Bariffi, Jessica

12 p. 2943-2966
artikel
40 More accurate results on the provable security of AES against impossible differential cryptanalysis Wang, Qian
2019
12 p. 3001-3018
artikel
41 Multidimensional quasi-twisted codes: equivalent characterizations and their relation to multidimensional convolutional codes Ling, San
2019
12 p. 2941-2965
artikel
42 Necessary field size and probability for MDP and complete MDP convolutional codes Lieb, Julia
2019
12 p. 3019-3043
artikel
43 New code-based cryptographic accumulator and fully dynamic group signature Ayebie, Edoukou Berenger

12 p. 2861-2891
artikel
44 New covering codes of radius R, codimension tR and $$tR+\frac{R}{2}$$tR+R2, and saturating sets in projective spaces Davydov, Alexander A.
2019
12 p. 2771-2792
artikel
45 New partitionings of complete designs Ahmadi, M. H.

12 p. 2715-2723
artikel
46 New rank codes based encryption scheme using partial circulant matrices Lau, Terry Shue Chien
2019
12 p. 2979-2999
artikel
47 Non-symmetric 2-designs admitting a two-dimensional projective linear group Zhan, Xiaoqin
2018
12 p. 2765-2773
artikel
48 On security properties of all-or-nothing transforms Esfahani, Navid Nasr

12 p. 2857-2867
artikel
49 On the fourth weight of generalized Reed–Muller codes Golalizadeh, Somayyeh

12 p. 3857-3879
artikel
50 On the geometry of full points of abstract unitals Mezőfi, Dávid
2019
12 p. 2967-2978
artikel
51 On the inverses of Kasami and Bracken–Leander exponents Kölsch, Lukas

12 p. 2597-2621
artikel
52 On the second Feng-Rao distance of Algebraic Geometry codes related to Arf semigroups Farrán, José I.
2018
12 p. 2893-2916
artikel
53 Optimal Ferrers diagram rank-metric codes from MRD codes Liu, Shuangqing

12 p. 3977-3993
artikel
54 Optimal minimal linear codes from posets Hyun, Jong Yoon

12 p. 2475-2492
artikel
55 Parallel sub-code construction for constant-dimension codes He, Xianmang

12 p. 2991-3001
artikel
56 Practical attacks on small private exponent RSA: new records and new insights Li, Qiang

12 p. 4107-4142
artikel
57 Practical $$\mathsf {MP} \text{- }\mathsf {LWE} $$MP-LWE-based encryption balancing security-risk versus efficiency Steinfeld, Ron
2019
12 p. 2847-2884
artikel
58 Private simultaneous messages based on quadratic residues Shinagawa, Kazumasa

12 p. 3915-3932
artikel
59 Pseudocodeword-free criterion for codes with cycle-free Tanner graph Kositwattanarerk, Wittawat
2018
12 p. 2791-2805
artikel
60 Pseudorandom functions in NC class from the standard LWE assumption Li, Yiming

12 p. 2807-2839
artikel
61 Rédei permutations with cycles of the same length Capaverde, Juliane

12 p. 2561-2579
artikel
62 Recursive constructions for s-resolvable t-designs Trung, Tran van
2019
12 p. 2835-2845
artikel
63 Scheduling to reduce close contacts: resolvable grid graph decomposition and packing Chee, Yeow Meng

12 p. 4093-4106
artikel
64 Skew differential Goppa codes and their application to Mceliece cryptosystem Gómez-Torrecillas, José

12 p. 3995-4017
artikel
65 Some (almost) optimally extendable linear codes Carlet, Claude
2019
12 p. 2813-2834
artikel
66 Some results on generalized strong external difference families Lu, Xiaojuan
2018
12 p. 2857-2868
artikel
67 Speeding up Huff form of elliptic curves Orhon, Neriman Gamze
2018
12 p. 2807-2823
artikel
68 Steganography from perfect codes on Cayley graphs over Gaussian integers, Eisenstein–Jacobi integers and Lipschitz integers Kim, Jon-Lark

12 p. 2967-2989
artikel
69 Steiner systems $$S(2, 4, \frac{3^m-1}{2})$$S(2,4,3m-12) and 2-designs from ternary linear codes of length $$\frac{3^m-1}{2}$$3m-12 Tang, Chunming
2019
12 p. 2793-2811
artikel
70 Strongly leakage resilient authenticated key exchange, revisited Yang, Guomin
2019
12 p. 2885-2911
artikel
71 Structural evaluation of AES-like ciphers against mixture differential cryptanalysis Xie, Xiaofeng

12 p. 3881-3899
artikel
72 Ternary self-orthogonal codes from weakly regular bent functions and their application in LCD Codes Heng, Ziling

12 p. 3953-3976
artikel
73 The build-up construction over a commutative non-unital ring Alahmadi, Adel

12 p. 3003-3010
artikel
74 The first families of highly symmetric Kirkman Triple Systems whose orders fill a congruence class Bonvicini, Simona

12 p. 2725-2757
artikel
75 Three classes of balanced vectorial semi-bent functions Zhang, WeiGuo

12 p. 2697-2714
artikel
76 Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model Cogliati, Benoît
2018
12 p. 2747-2763
artikel
77 Two families of two-weight codes over Z4 Shi, Minjia

12 p. 2493-2505
artikel
78 Walsh spectrum and nega spectrum of complementary arrays Chai, Jinjin

12 p. 2663-2677
artikel
79 Wide-sense 2-frameproof codes Zhou, Junling

12 p. 2507-2519
artikel
                             79 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland