nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A characterization of the Grassmann embedding of H(q), with q even
|
De Wispelaere, A. |
|
2009 |
|
2-3 |
p. 121-130 |
artikel |
2 |
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
|
Okamoto, Tatsuaki |
|
2015 |
|
2-3 |
p. 725-771 |
artikel |
3 |
A Computer-Assisted Proof of the Uniqueness of the Perkel Graph
|
Coolsaet, K. |
|
2005 |
|
2-3 |
p. 155-171 |
artikel |
4 |
A construction for large sets of disjoint Kirkman triple systems
|
Ji, Lijun |
|
|
|
2-3 |
p. 115-122 |
artikel |
5 |
A construction for large sets of disjoint Kirkman triple systems
|
Ji, Lijun |
|
2007 |
|
2-3 |
p. 115-122 |
artikel |
6 |
A distance between channels: the average error of mismatched channels
|
D’Oliveira, Rafael G. L. |
|
2018 |
|
2-3 |
p. 481-493 |
artikel |
7 |
Adjacency matrices of polarity graphs and of other C4-free graphs of large size
|
Abreu, M. |
|
2010 |
|
2-3 |
p. 221-233 |
artikel |
8 |
A geometric approach to finding new lower bounds of A(n, d, w)
|
Gashkov, I. |
|
|
|
2-3 |
p. 85-91 |
artikel |
9 |
A geometric approach to finding new lower bounds of A(n, d, w)
|
Gashkov, I. |
|
2007 |
|
2-3 |
p. 85-91 |
artikel |
10 |
Algebraic Characterizations of Graph Regularity Conditions
|
Curtin, Brian |
|
2005 |
|
2-3 |
p. 241-248 |
artikel |
11 |
Algebraic-geometry codes, one-point codes, and evaluation codes
|
Bras-Amorós, Maria |
|
|
|
2-3 |
p. 137-145 |
artikel |
12 |
Algebraic-geometry codes, one-point codes, and evaluation codes
|
Bras-Amorós, Maria |
|
2007 |
|
2-3 |
p. 137-145 |
artikel |
13 |
Almost involutory recursive MDS diffusion layers
|
Gupta, Kishan Chand |
|
2018 |
|
2-3 |
p. 609-626 |
artikel |
14 |
Almost $$2$$2-perfect $$6$$6-cycle systems
|
Lindner, Charles C. |
|
2015 |
|
2-3 |
p. 321-333 |
artikel |
15 |
A new lower bound for the smallest complete (k, n)-arc in $$\mathrm {PG}(2,q)$$PG(2,q)
|
Alabdullah, S. |
|
2018 |
|
2-3 |
p. 679-683 |
artikel |
16 |
A note on the security of MST3
|
Vasco, María Isabel González |
|
2010 |
|
2-3 |
p. 189-200 |
artikel |
17 |
A Note on the Tight Spherical 7-Design in$${mathbb R}^{23}$$ and 5-Design in$${mathbb R}^{7*}$$
|
Cuypers, Hans |
|
2005 |
|
2-3 |
p. 333-337 |
artikel |
18 |
A Solution of a Problem of A. E. Brouwer
|
Muzychuk, Mikhail |
|
2005 |
|
2-3 |
p. 249-264 |
artikel |
19 |
A spectrum result on minimal blocking sets with respect to the planes of PG(3, q), q odd
|
Rößing, C. |
|
2010 |
|
2-3 |
p. 107-119 |
artikel |
20 |
Batch verifiable computation of outsourced functions
|
Zhang, Liang Feng |
|
2015 |
|
2-3 |
p. 563-585 |
artikel |
21 |
Blocking Structures of Hermitian Varieties
|
Metsch, Klaus |
|
2005 |
|
2-3 |
p. 339-360 |
artikel |
22 |
Block-transitive designs in affine spaces
|
Huber, Michael |
|
2009 |
|
2-3 |
p. 235-242 |
artikel |
23 |
Butson Hadamard matrices with partially cyclic core
|
Jang, Ji-Woong |
|
|
|
2-3 |
p. 93-101 |
artikel |
24 |
Butson Hadamard matrices with partially cyclic core
|
Jang, Ji-Woong |
|
2007 |
|
2-3 |
p. 93-101 |
artikel |
25 |
Classification of optimal (v, k, 1) binary cyclically permutable constant weight codes with $$k=5,$$k=5, 6 and 7 and small lengths
|
Baicheva, Tsonka |
|
2018 |
|
2-3 |
p. 365-374 |
artikel |
26 |
Classifying optimal binary subspace codes of length 8, constant dimension 4 and minimum distance 6
|
Heinlein, Daniel |
|
2018 |
|
2-3 |
p. 375-391 |
artikel |
27 |
Combinatorial metrics: MacWilliams-type identities, isometries and extension property
|
Pinheiro, Jerry Anderson |
|
2018 |
|
2-3 |
p. 327-340 |
artikel |
28 |
Comparing two pairing-based aggregate signature schemes
|
Chatterjee, Sanjit |
|
2009 |
|
2-3 |
p. 141-167 |
artikel |
29 |
Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile
|
Kavut, Selçuk |
|
2018 |
|
2-3 |
p. 261-276 |
artikel |
30 |
Covering arrays from cyclotomy
|
Colbourn, Charles J. |
|
2009 |
|
2-3 |
p. 201-219 |
artikel |
31 |
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice
|
Kiayias, Aggelos |
|
|
|
2-3 |
p. 61-78 |
artikel |
32 |
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice
|
Kiayias, Aggelos |
|
2007 |
|
2-3 |
p. 61-78 |
artikel |
33 |
Dense families of modular curves, prime numbers and uniform symmetric tensor rank of multiplication in certain finite fields
|
Ballet, Stéphane |
|
2018 |
|
2-3 |
p. 517-525 |
artikel |
34 |
Differential attacks: using alternative operations
|
Civino, Roberto |
|
2018 |
|
2-3 |
p. 225-247 |
artikel |
35 |
Discrete Logarithms: The Past and the Future
|
Odlyzko, Andrew |
|
2000 |
|
2-3 |
p. 129-145 |
artikel |
36 |
Distance Regular Covers of Complete Graphs from Latin Squares
|
Caen, D. De |
|
2005 |
|
2-3 |
p. 149-153 |
artikel |
37 |
Duplication-correcting codes
|
Lenz, Andreas |
|
2018 |
|
2-3 |
p. 277-298 |
artikel |
38 |
Editorial: Special issue on coding and cryptography
|
Solov’eva, Faina |
|
2019 |
|
2-3 |
p. 183-184 |
artikel |
39 |
Efficient Arithmetic on Koblitz Curves
|
Solinas, Jerome A. |
|
2000 |
|
2-3 |
p. 195-249 |
artikel |
40 |
Enclosings of λ-fold 4-cycle systems
|
Newman, N. A. |
|
2009 |
|
2-3 |
p. 297-310 |
artikel |
41 |
Enumeration of Kerdock codes of length 64
|
Phelps, Kevin |
|
2015 |
|
2-3 |
p. 357-363 |
artikel |
42 |
Enumeration of orthogonal Buekenhout unitals
|
Baker, R. D. |
|
2009 |
|
2-3 |
p. 261-283 |
artikel |
43 |
Evaluating Bernstein–Rabin–Winograd polynomials
|
Ghosh, Sebati |
|
2018 |
|
2-3 |
p. 527-546 |
artikel |
44 |
Finding shortest lattice vectors faster using quantum search
|
Laarhoven, Thijs |
|
2015 |
|
2-3 |
p. 375-400 |
artikel |
45 |
Further results on the number of rational points of hyperelliptic supersingular curves in characteristic 2
|
McGuire, Gary |
|
2015 |
|
2-3 |
p. 653-662 |
artikel |
46 |
Galois geometries and applications
|
Beule, Jan De |
|
2010 |
|
2-3 |
p. 85-86 |
artikel |
47 |
Gaps between prime numbers and tensor rank of multiplication in finite fields
|
Randriam, Hugues |
|
2018 |
|
2-3 |
p. 627-645 |
artikel |
48 |
Graphs With Least Eigenvalue —2: A New Proof of the 31 Forbidden Subgraphs Theorem
|
Cvetković, Dragoš |
|
2005 |
|
2-3 |
p. 229-240 |
artikel |
49 |
Guest Editorial
|
Koblitz, Neal |
|
2000 |
|
2-3 |
p. 75-76 |
artikel |
50 |
Guest Editorial: Special Issue in Honor of Scott A. Vanstone
|
Blake, Ian |
|
2015 |
|
2-3 |
p. 287-299 |
artikel |
51 |
High-speed Curve25519 on 8-bit, 16-bit, and 32-bit microcontrollers
|
Düll, Michael |
|
2015 |
|
2-3 |
p. 493-514 |
artikel |
52 |
Hyperbolic Fibrations and q-Clans
|
Baker, R. D. |
|
2005 |
|
2-3 |
p. 295-305 |
artikel |
53 |
Identifying an unknown code by partial Gaussian elimination
|
Carrier, Kevin |
|
2018 |
|
2-3 |
p. 685-713 |
artikel |
54 |
Improved decoding and error floor analysis of staircase codes
|
Holzbaur, Lukas |
|
2018 |
|
2-3 |
p. 647-664 |
artikel |
55 |
Improved power decoding of interleaved one-point Hermitian codes
|
Puchinger, Sven |
|
2018 |
|
2-3 |
p. 589-607 |
artikel |
56 |
Improved syndrome decoding of lifted $$L$$L-interleaved Gabidulin codes
|
Bartz, Hannes |
|
2018 |
|
2-3 |
p. 547-567 |
artikel |
57 |
Improved user-private information retrieval via finite geometry
|
Gnilke, Oliver W. |
|
2018 |
|
2-3 |
p. 665-677 |
artikel |
58 |
Infinite family of large complete arcs in PG(2, qn), with q odd and n > 1 odd
|
Korchmáros, Gábor |
|
2009 |
|
2-3 |
p. 285-296 |
artikel |
59 |
Information Security, Mathematics, and Public-Key Cryptography
|
Blake-Wilson, Simon |
|
2000 |
|
2-3 |
p. 77-99 |
artikel |
60 |
In memoriam, András Gács
|
Ball, Simeon |
|
2010 |
|
2-3 |
p. 87-88 |
artikel |
61 |
Integer Factoring
|
Lenstra, Arjen K. |
|
2000 |
|
2-3 |
p. 101-128 |
artikel |
62 |
Isogenies of abelian varieties over finite fields
|
Silverberg, Alice |
|
2015 |
|
2-3 |
p. 427-439 |
artikel |
63 |
Linear codes from weakly regular plateaued functions and their secret sharing schemes
|
Mesnager, Sihem |
|
2018 |
|
2-3 |
p. 463-480 |
artikel |
64 |
Linearly homomorphic structure-preserving signatures and their applications
|
Libert, Benoît |
|
2015 |
|
2-3 |
p. 441-477 |
artikel |
65 |
Local distributions for eigenfunctions and perfect colorings of q-ary Hamming graph
|
Vasil’eva, Anastasia |
|
2018 |
|
2-3 |
p. 509-516 |
artikel |
66 |
Maximal arcs and quasi-symmetric designs
|
Jungnickel, Dieter |
|
2015 |
|
2-3 |
p. 365-374 |
artikel |
67 |
Minimal logarithmic signatures for finite groups of Lie type
|
Singhi, Nidhi |
|
2010 |
|
2-3 |
p. 243-260 |
artikel |
68 |
Multiple blocking sets and multisets in Desarguesian planes
|
Aguglia, Angela |
|
2010 |
|
2-3 |
p. 177-181 |
artikel |
69 |
Normal forms of hyperelliptic curves of genus 3
|
Frey, Gerhard |
|
2015 |
|
2-3 |
p. 677-712 |
artikel |
70 |
Notes on APN functions, semibiplanes and dimensional dual hyperovals
|
Yoshiara, Satoshi |
|
2010 |
|
2-3 |
p. 197-218 |
artikel |
71 |
On APN exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures
|
Carlet, Claude |
|
2018 |
|
2-3 |
p. 203-224 |
artikel |
72 |
On circulant involutory MDS matrices
|
Cauchois, Victor |
|
2018 |
|
2-3 |
p. 249-260 |
artikel |
73 |
On hyperovals of polar spaces
|
De Bruyn, Bart |
|
2010 |
|
2-3 |
p. 183-195 |
artikel |
74 |
On linear sets on a projective line
|
Lavrauw, M. |
|
2010 |
|
2-3 |
p. 89-104 |
artikel |
75 |
On $$\mathbb {Z}_{2^s}$$Z2s-linear Hadamard codes: kernel and partial classification
|
Fernández-Córdoba, Cristina |
|
2018 |
|
2-3 |
p. 417-435 |
artikel |
76 |
On Meta-Thin Association Schemes
|
Hirasaka, |
|
2005 |
|
2-3 |
p. 187-201 |
artikel |
77 |
On multiple caps in finite projective spaces
|
Edel, Yves |
|
2010 |
|
2-3 |
p. 163-175 |
artikel |
78 |
On some open problems on maximal curves
|
Fanali, Stefania |
|
2010 |
|
2-3 |
p. 131-139 |
artikel |
79 |
On spherical codes with inner products in a prescribed interval
|
Boyvalenkov, P. G. |
|
2018 |
|
2-3 |
p. 299-315 |
artikel |
80 |
On the minimum length of some linear codes
|
Cheon, E. J. |
|
|
|
2-3 |
p. 123-135 |
artikel |
81 |
On the minimum length of some linear codes
|
Cheon, E. J. |
|
2007 |
|
2-3 |
p. 123-135 |
artikel |
82 |
On the structure of 1-designs with at most two block intersection numbers
|
Arhin, John |
|
|
|
2-3 |
p. 103-114 |
artikel |
83 |
On the structure of 1-designs with at most two block intersection numbers
|
Arhin, John |
|
2007 |
|
2-3 |
p. 103-114 |
artikel |
84 |
On tight bounds for binary frameproof codes
|
Guo, Chuan |
|
2015 |
|
2-3 |
p. 301-319 |
artikel |
85 |
Open problems in hash function security
|
Andreeva, Elena |
|
2015 |
|
2-3 |
p. 611-631 |
artikel |
86 |
Optimal low-power coding for error correction and crosstalk avoidance in on-chip data buses
|
Chee, Yeow Meng |
|
2015 |
|
2-3 |
p. 479-491 |
artikel |
87 |
Ovoidal blocking sets and maximal partial ovoids of Hermitian varieties
|
Marino, G. |
|
2010 |
|
2-3 |
p. 115-130 |
artikel |
88 |
PASS-Encrypt: a public key cryptosystem based on partial evaluation of polynomials
|
Hoffstein, Jeffrey |
|
2015 |
|
2-3 |
p. 541-552 |
artikel |
89 |
Perfect hash families of strength three with three rows from varieties on finite projective geometries
|
Fuji-Hara, Ryoh |
|
2015 |
|
2-3 |
p. 351-356 |
artikel |
90 |
Power map permutations and the discrete log problem
|
Landrock, Peter |
|
2015 |
|
2-3 |
p. 713-724 |
artikel |
91 |
Practical unconditionally secure two-channel message authentication
|
Mashatan, Atefeh |
|
2009 |
|
2-3 |
p. 169-188 |
artikel |
92 |
Preface
|
Blokhuis, Aart |
|
2005 |
|
2-3 |
p. 135 |
artikel |
93 |
Primitive normal bases for quartic and cubic extensions: a geometric approach
|
Hachenberger, Dirk |
|
2015 |
|
2-3 |
p. 335-350 |
artikel |
94 |
Projective aspects of the AES inversion
|
Jackson, Wen-Ai |
|
|
|
2-3 |
p. 167-179 |
artikel |
95 |
Projective aspects of the AES inversion
|
Jackson, Wen-Ai |
|
2007 |
|
2-3 |
p. 167-179 |
artikel |
96 |
Quantifying the security advantage of password expiration policies
|
Chiasson, Sonia |
|
2015 |
|
2-3 |
p. 401-408 |
artikel |
97 |
Reflections on slide with a twist attacks
|
Dinur, Itai |
|
2015 |
|
2-3 |
p. 633-651 |
artikel |
98 |
Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing
|
Egorova, Elena |
|
2018 |
|
2-3 |
p. 455-462 |
artikel |
99 |
Small point sets of PG(n, q3) intersecting each k-subspace in 1 mod q points
|
Harrach, Nóra V. |
|
2010 |
|
2-3 |
p. 235-248 |
artikel |
100 |
Some Characterizations of Finite Hermitian Veroneseans
|
Thas, Joseph A. |
|
2005 |
|
2-3 |
p. 283-293 |
artikel |
101 |
Some Interlacing Results for the Eigenvalues of Distance-regular graphs
|
Sejeong, Bang |
|
2005 |
|
2-3 |
p. 173-186 |
artikel |
102 |
Some primality tests that eluded Lucas
|
Roettger, E. L. |
|
2015 |
|
2-3 |
p. 515-539 |
artikel |
103 |
Some results on Fruit
|
Dey, Sabyasachi |
|
2018 |
|
2-3 |
p. 349-364 |
artikel |
104 |
Some two-character sets
|
Cossidente, Antonio |
|
2010 |
|
2-3 |
p. 105-113 |
artikel |
105 |
Special issue dedicated to Spyros Magliveras on the occasion of his 70th birthday
|
Mullin, Ronald C. |
|
2010 |
|
2-3 |
p. 103-105 |
artikel |
106 |
Square-Free Non-Cayley Numbers. On Vertex-Transitive Non-Cayley Graphs of Square-Free Order
|
Seress, Ákos |
|
2005 |
|
2-3 |
p. 265-281 |
artikel |
107 |
Square integer Heffter arrays with empty cells
|
Archdeacon, D. S. |
|
2015 |
|
2-3 |
p. 409-426 |
artikel |
108 |
The asymptotic existence of DR$$(v,k,k-1)$$(v,k,k-1)-BIBDs
|
Lamken, E. R. |
|
2015 |
|
2-3 |
p. 553-562 |
artikel |
109 |
The Classification of Flats in$${boldsymbol {PG}}({bf 9,2})$$ which are External to the Grassmannian$${cal G}_{bf 1,4,2}$$
|
Shaw, Ron |
|
2005 |
|
2-3 |
p. 203-227 |
artikel |
110 |
The Combinatorics of Dom de Caen
|
Dam, Edwin R. Van |
|
2005 |
|
2-3 |
p. 137-148 |
artikel |
111 |
The covering radii of a class of binary cyclic codes and some BCH codes
|
Kavut, Selçuk |
|
2018 |
|
2-3 |
p. 317-325 |
artikel |
112 |
The Diffie–Hellman Protocol
|
Maurer, Ueli M. |
|
2000 |
|
2-3 |
p. 147-171 |
artikel |
113 |
The functional graph of linear maps over finite fields and applications
|
Panario, Daniel |
|
2018 |
|
2-3 |
p. 437-453 |
artikel |
114 |
The graph structure of Chebyshev polynomials over finite fields and applications
|
Qureshi, Claudio |
|
2018 |
|
2-3 |
p. 393-416 |
artikel |
115 |
The number of designs with geometric parameters grows exponentially
|
Jungnickel, Dieter |
|
2009 |
|
2-3 |
p. 131-140 |
artikel |
116 |
The random oracle model: a twenty-year retrospective
|
Koblitz, Neal |
|
2015 |
|
2-3 |
p. 587-610 |
artikel |
117 |
There are no Barker arrays having more than two dimensions
|
Jedwab, Jonathan |
|
|
|
2-3 |
p. 79-84 |
artikel |
118 |
There are no Barker arrays having more than two dimensions
|
Jedwab, Jonathan |
|
2007 |
|
2-3 |
p. 79-84 |
artikel |
119 |
The sextuply shortened binary Golay code is optimal
|
Östergård, Patric R. J. |
|
2018 |
|
2-3 |
p. 341-347 |
artikel |
120 |
The small weight codewords of the functional codes associated to non-singular Hermitian varieties
|
Edoukou, F. A. B. |
|
2010 |
|
2-3 |
p. 219-233 |
artikel |
121 |
The State of Elliptic Curve Cryptography
|
Koblitz, Neal |
|
2000 |
|
2-3 |
p. 173-193 |
artikel |
122 |
Totally decomposed cumulative Goppa codes with improved estimations
|
Bezzateev, Sergey |
|
2018 |
|
2-3 |
p. 569-587 |
artikel |
123 |
Two Linear Transformations each Tridiagonal with Respect to an Eigenbasis of the other; Comments on the Parameter Array
|
Terwilliger, Paul |
|
2005 |
|
2-3 |
p. 307-332 |
artikel |
124 |
Two notions of differential equivalence on Sboxes
|
Boura, Christina |
|
2018 |
|
2-3 |
p. 185-202 |
artikel |
125 |
Types of spreads and duality of the parallelisms of PG(3, 5) with automorphisms of order 13
|
Topalova, Svetlana |
|
2018 |
|
2-3 |
p. 495-507 |
artikel |
126 |
Weights modulo pe of linear codes over rings
|
Yildiz, Bahattin |
|
|
|
2-3 |
p. 147-165 |
artikel |
127 |
Weights modulo pe of linear codes over rings
|
Yildiz, Bahattin |
|
2007 |
|
2-3 |
p. 147-165 |
artikel |
128 |
Whirlwind: a new cryptographic hash function
|
Barreto, Paulo |
|
2010 |
|
2-3 |
p. 141-162 |
artikel |
129 |
Zero-knowledge proofs of knowledge for group homomorphisms
|
Maurer, Ueli |
|
2015 |
|
2-3 |
p. 663-676 |
artikel |