Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             129 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A characterization of the Grassmann embedding of H(q), with q even De Wispelaere, A.
2009
2-3 p. 121-130
artikel
2 Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption Okamoto, Tatsuaki
2015
2-3 p. 725-771
artikel
3 A Computer-Assisted Proof of the Uniqueness of the Perkel Graph Coolsaet, K.
2005
2-3 p. 155-171
artikel
4 A construction for large sets of disjoint Kirkman triple systems Ji, Lijun

2-3 p. 115-122
artikel
5 A construction for large sets of disjoint Kirkman triple systems Ji, Lijun
2007
2-3 p. 115-122
artikel
6 A distance between channels: the average error of mismatched channels D’Oliveira, Rafael G. L.
2018
2-3 p. 481-493
artikel
7 Adjacency matrices of polarity graphs and of other C4-free graphs of large size Abreu, M.
2010
2-3 p. 221-233
artikel
8 A geometric approach to finding new lower bounds of A(n, d, w) Gashkov, I.

2-3 p. 85-91
artikel
9 A geometric approach to finding new lower bounds of A(n, d, w) Gashkov, I.
2007
2-3 p. 85-91
artikel
10 Algebraic Characterizations of Graph Regularity Conditions Curtin, Brian
2005
2-3 p. 241-248
artikel
11 Algebraic-geometry codes, one-point codes, and evaluation codes Bras-Amorós, Maria

2-3 p. 137-145
artikel
12 Algebraic-geometry codes, one-point codes, and evaluation codes Bras-Amorós, Maria
2007
2-3 p. 137-145
artikel
13 Almost involutory recursive MDS diffusion layers Gupta, Kishan Chand
2018
2-3 p. 609-626
artikel
14 Almost $$2$$2-perfect $$6$$6-cycle systems Lindner, Charles C.
2015
2-3 p. 321-333
artikel
15 A new lower bound for the smallest complete (k, n)-arc in $$\mathrm {PG}(2,q)$$PG(2,q) Alabdullah, S.
2018
2-3 p. 679-683
artikel
16 A note on the security of MST3 Vasco, María Isabel González
2010
2-3 p. 189-200
artikel
17 A Note on the Tight Spherical 7-Design in$${mathbb R}^{23}$$ and 5-Design in$${mathbb R}^{7*}$$ Cuypers, Hans
2005
2-3 p. 333-337
artikel
18 A Solution of a Problem of A. E. Brouwer Muzychuk, Mikhail
2005
2-3 p. 249-264
artikel
19 A spectrum result on minimal blocking sets with respect to the planes of PG(3, q), q odd Rößing, C.
2010
2-3 p. 107-119
artikel
20 Batch verifiable computation of outsourced functions Zhang, Liang Feng
2015
2-3 p. 563-585
artikel
21 Blocking Structures of Hermitian Varieties Metsch, Klaus
2005
2-3 p. 339-360
artikel
22 Block-transitive designs in affine spaces Huber, Michael
2009
2-3 p. 235-242
artikel
23 Butson Hadamard matrices with partially cyclic core Jang, Ji-Woong

2-3 p. 93-101
artikel
24 Butson Hadamard matrices with partially cyclic core Jang, Ji-Woong
2007
2-3 p. 93-101
artikel
25 Classification of optimal (v, k, 1) binary cyclically permutable constant weight codes with $$k=5,$$k=5, 6 and 7 and small lengths Baicheva, Tsonka
2018
2-3 p. 365-374
artikel
26 Classifying optimal binary subspace codes of length 8, constant dimension 4 and minimum distance 6 Heinlein, Daniel
2018
2-3 p. 375-391
artikel
27 Combinatorial metrics: MacWilliams-type identities, isometries and extension property Pinheiro, Jerry Anderson
2018
2-3 p. 327-340
artikel
28 Comparing two pairing-based aggregate signature schemes Chatterjee, Sanjit
2009
2-3 p. 141-167
artikel
29 Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile Kavut, Selçuk
2018
2-3 p. 261-276
artikel
30 Covering arrays from cyclotomy Colbourn, Charles J.
2009
2-3 p. 201-219
artikel
31 Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice Kiayias, Aggelos

2-3 p. 61-78
artikel
32 Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice Kiayias, Aggelos
2007
2-3 p. 61-78
artikel
33 Dense families of modular curves, prime numbers and uniform symmetric tensor rank of multiplication in certain finite fields Ballet, Stéphane
2018
2-3 p. 517-525
artikel
34 Differential attacks: using alternative operations Civino, Roberto
2018
2-3 p. 225-247
artikel
35 Discrete Logarithms: The Past and the Future Odlyzko, Andrew
2000
2-3 p. 129-145
artikel
36 Distance Regular Covers of Complete Graphs from Latin Squares Caen, D. De
2005
2-3 p. 149-153
artikel
37 Duplication-correcting codes Lenz, Andreas
2018
2-3 p. 277-298
artikel
38 Editorial: Special issue on coding and cryptography Solov’eva, Faina
2019
2-3 p. 183-184
artikel
39 Efficient Arithmetic on Koblitz Curves Solinas, Jerome A.
2000
2-3 p. 195-249
artikel
40 Enclosings of λ-fold 4-cycle systems Newman, N. A.
2009
2-3 p. 297-310
artikel
41 Enumeration of Kerdock codes of length 64 Phelps, Kevin
2015
2-3 p. 357-363
artikel
42 Enumeration of orthogonal Buekenhout unitals Baker, R. D.
2009
2-3 p. 261-283
artikel
43 Evaluating Bernstein–Rabin–Winograd polynomials Ghosh, Sebati
2018
2-3 p. 527-546
artikel
44 Finding shortest lattice vectors faster using quantum search Laarhoven, Thijs
2015
2-3 p. 375-400
artikel
45 Further results on the number of rational points of hyperelliptic supersingular curves in characteristic 2 McGuire, Gary
2015
2-3 p. 653-662
artikel
46 Galois geometries and applications Beule, Jan De
2010
2-3 p. 85-86
artikel
47 Gaps between prime numbers and tensor rank of multiplication in finite fields Randriam, Hugues
2018
2-3 p. 627-645
artikel
48 Graphs With Least Eigenvalue —2: A New Proof of the 31 Forbidden Subgraphs Theorem Cvetković, Dragoš
2005
2-3 p. 229-240
artikel
49 Guest Editorial Koblitz, Neal
2000
2-3 p. 75-76
artikel
50 Guest Editorial: Special Issue in Honor of Scott A. Vanstone Blake, Ian
2015
2-3 p. 287-299
artikel
51 High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers Düll, Michael
2015
2-3 p. 493-514
artikel
52 Hyperbolic Fibrations and q-Clans Baker, R. D.
2005
2-3 p. 295-305
artikel
53 Identifying an unknown code by partial Gaussian elimination Carrier, Kevin
2018
2-3 p. 685-713
artikel
54 Improved decoding and error floor analysis of staircase codes Holzbaur, Lukas
2018
2-3 p. 647-664
artikel
55 Improved power decoding of interleaved one-point Hermitian codes Puchinger, Sven
2018
2-3 p. 589-607
artikel
56 Improved syndrome decoding of lifted $$L$$L-interleaved Gabidulin codes Bartz, Hannes
2018
2-3 p. 547-567
artikel
57 Improved user-private information retrieval via finite geometry Gnilke, Oliver W.
2018
2-3 p. 665-677
artikel
58 Infinite family of large complete arcs in PG(2, qn), with q odd and n > 1 odd Korchmáros, Gábor
2009
2-3 p. 285-296
artikel
59 Information Security, Mathematics, and Public-Key Cryptography Blake-Wilson, Simon
2000
2-3 p. 77-99
artikel
60 In memoriam, András Gács Ball, Simeon
2010
2-3 p. 87-88
artikel
61 Integer Factoring Lenstra, Arjen K.
2000
2-3 p. 101-128
artikel
62 Isogenies of abelian varieties over finite fields Silverberg, Alice
2015
2-3 p. 427-439
artikel
63 Linear codes from weakly regular plateaued functions and their secret sharing schemes Mesnager, Sihem
2018
2-3 p. 463-480
artikel
64 Linearly homomorphic structure-preserving signatures and their applications Libert, Benoît
2015
2-3 p. 441-477
artikel
65 Local distributions for eigenfunctions and perfect colorings of q-ary Hamming graph Vasil’eva, Anastasia
2018
2-3 p. 509-516
artikel
66 Maximal arcs and quasi-symmetric designs Jungnickel, Dieter
2015
2-3 p. 365-374
artikel
67 Minimal logarithmic signatures for finite groups of Lie type Singhi, Nidhi
2010
2-3 p. 243-260
artikel
68 Multiple blocking sets and multisets in Desarguesian planes Aguglia, Angela
2010
2-3 p. 177-181
artikel
69 Normal forms of hyperelliptic curves of genus 3 Frey, Gerhard
2015
2-3 p. 677-712
artikel
70 Notes on APN functions, semibiplanes and dimensional dual hyperovals Yoshiara, Satoshi
2010
2-3 p. 197-218
artikel
71 On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures Carlet, Claude
2018
2-3 p. 203-224
artikel
72 On circulant involutory MDS matrices Cauchois, Victor
2018
2-3 p. 249-260
artikel
73 On hyperovals of polar spaces De Bruyn, Bart
2010
2-3 p. 183-195
artikel
74 On linear sets on a projective line Lavrauw, M.
2010
2-3 p. 89-104
artikel
75 On $$\mathbb {Z}_{2^s}$$Z2s-linear Hadamard codes: kernel and partial classification Fernández-Córdoba, Cristina
2018
2-3 p. 417-435
artikel
76 On Meta-Thin Association Schemes Hirasaka,
2005
2-3 p. 187-201
artikel
77 On multiple caps in finite projective spaces Edel, Yves
2010
2-3 p. 163-175
artikel
78 On some open problems on maximal curves Fanali, Stefania
2010
2-3 p. 131-139
artikel
79 On spherical codes with inner products in a prescribed interval Boyvalenkov, P. G.
2018
2-3 p. 299-315
artikel
80 On the minimum length of some linear codes Cheon, E. J.

2-3 p. 123-135
artikel
81 On the minimum length of some linear codes Cheon, E. J.
2007
2-3 p. 123-135
artikel
82 On the structure of 1-designs with at most two block intersection numbers Arhin, John

2-3 p. 103-114
artikel
83 On the structure of 1-designs with at most two block intersection numbers Arhin, John
2007
2-3 p. 103-114
artikel
84 On tight bounds for binary frameproof codes Guo, Chuan
2015
2-3 p. 301-319
artikel
85 Open problems in hash function security Andreeva, Elena
2015
2-3 p. 611-631
artikel
86 Optimal low-power coding for error correction and crosstalk avoidance in on-chip data buses Chee, Yeow Meng
2015
2-3 p. 479-491
artikel
87 Ovoidal blocking sets and maximal partial ovoids of Hermitian varieties Marino, G.
2010
2-3 p. 115-130
artikel
88 PASS-Encrypt: a public key cryptosystem based on partial evaluation of polynomials Hoffstein, Jeffrey
2015
2-3 p. 541-552
artikel
89 Perfect hash families of strength three with three rows from varieties on finite projective geometries Fuji-Hara, Ryoh
2015
2-3 p. 351-356
artikel
90 Power map permutations and the discrete log problem Landrock, Peter
2015
2-3 p. 713-724
artikel
91 Practical unconditionally secure two-channel message authentication Mashatan, Atefeh
2009
2-3 p. 169-188
artikel
92 Preface Blokhuis, Aart
2005
2-3 p. 135
artikel
93 Primitive normal bases for quartic and cubic extensions: a geometric approach Hachenberger, Dirk
2015
2-3 p. 335-350
artikel
94 Projective aspects of the AES inversion Jackson, Wen-Ai

2-3 p. 167-179
artikel
95 Projective aspects of the AES inversion Jackson, Wen-Ai
2007
2-3 p. 167-179
artikel
96 Quantifying the security advantage of password expiration policies Chiasson, Sonia
2015
2-3 p. 401-408
artikel
97 Reflections on slide with a twist attacks Dinur, Itai
2015
2-3 p. 633-651
artikel
98 Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing Egorova, Elena
2018
2-3 p. 455-462
artikel
99 Small point sets of PG(n, q3) intersecting each k-subspace in 1 mod q points Harrach, Nóra V.
2010
2-3 p. 235-248
artikel
100 Some Characterizations of Finite Hermitian Veroneseans Thas, Joseph A.
2005
2-3 p. 283-293
artikel
101 Some Interlacing Results for the Eigenvalues of Distance-regular graphs Sejeong, Bang
2005
2-3 p. 173-186
artikel
102 Some primality tests that eluded Lucas Roettger, E. L.
2015
2-3 p. 515-539
artikel
103 Some results on Fruit Dey, Sabyasachi
2018
2-3 p. 349-364
artikel
104 Some two-character sets Cossidente, Antonio
2010
2-3 p. 105-113
artikel
105 Special issue dedicated to Spyros Magliveras on the occasion of his 70th birthday Mullin, Ronald C.
2010
2-3 p. 103-105
artikel
106 Square-Free Non-Cayley Numbers. On Vertex-Transitive Non-Cayley Graphs of Square-Free Order Seress, Ákos
2005
2-3 p. 265-281
artikel
107 Square integer Heffter arrays with empty cells Archdeacon, D. S.
2015
2-3 p. 409-426
artikel
108 The asymptotic existence of DR$$(v,k,k-1)$$(v,k,k-1)-BIBDs Lamken, E. R.
2015
2-3 p. 553-562
artikel
109 The Classification of Flats in$${boldsymbol {PG}}({bf 9,2})$$ which are External to the Grassmannian$${cal G}_{bf 1,4,2}$$ Shaw, Ron
2005
2-3 p. 203-227
artikel
110 The Combinatorics of Dom de Caen Dam, Edwin R. Van
2005
2-3 p. 137-148
artikel
111 The covering radii of a class of binary cyclic codes and some BCH codes Kavut, Selçuk
2018
2-3 p. 317-325
artikel
112 The Diffie–Hellman Protocol Maurer, Ueli M.
2000
2-3 p. 147-171
artikel
113 The functional graph of linear maps over finite fields and applications Panario, Daniel
2018
2-3 p. 437-453
artikel
114 The graph structure of Chebyshev polynomials over finite fields and applications Qureshi, Claudio
2018
2-3 p. 393-416
artikel
115 The number of designs with geometric parameters grows exponentially Jungnickel, Dieter
2009
2-3 p. 131-140
artikel
116 The random oracle model: a twenty-year retrospective Koblitz, Neal
2015
2-3 p. 587-610
artikel
117 There are no Barker arrays having more than two dimensions Jedwab, Jonathan

2-3 p. 79-84
artikel
118 There are no Barker arrays having more than two dimensions Jedwab, Jonathan
2007
2-3 p. 79-84
artikel
119 The sextuply shortened binary Golay code is optimal Östergård, Patric R. J.
2018
2-3 p. 341-347
artikel
120 The small weight codewords of the functional codes associated to non-singular Hermitian varieties Edoukou, F. A. B.
2010
2-3 p. 219-233
artikel
121 The State of Elliptic Curve Cryptography Koblitz, Neal
2000
2-3 p. 173-193
artikel
122 Totally decomposed cumulative Goppa codes with improved estimations Bezzateev, Sergey
2018
2-3 p. 569-587
artikel
123 Two Linear Transformations each Tridiagonal with Respect to an Eigenbasis of the other; Comments on the Parameter Array Terwilliger, Paul
2005
2-3 p. 307-332
artikel
124 Two notions of differential equivalence on Sboxes Boura, Christina
2018
2-3 p. 185-202
artikel
125 Types of spreads and duality of the parallelisms of PG(3, 5) with automorphisms of order 13 Topalova, Svetlana
2018
2-3 p. 495-507
artikel
126 Weights modulo pe of linear codes over rings Yildiz, Bahattin

2-3 p. 147-165
artikel
127 Weights modulo pe of linear codes over rings Yildiz, Bahattin
2007
2-3 p. 147-165
artikel
128 Whirlwind: a new cryptographic hash function Barreto, Paulo
2010
2-3 p. 141-162
artikel
129 Zero-knowledge proofs of knowledge for group homomorphisms Maurer, Ueli
2015
2-3 p. 663-676
artikel
                             129 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland