Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             92 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A construction of maximally recoverable codes Barg, Alexander

4 p. 939-945
artikel
2 A correction on the determination of the weight enumerator polynomial of some irreducible cyclic codes Vega, Gerardo
2017
4 p. 835-840
artikel
3 A further study on the construction methods of bent functions and self-dual bent functions based on Rothaus’s bent function Su, Sihong

4 p. 1559-1580
artikel
4 A link between combinatorial designs and three-weight linear codes Olmez, Oktay
2017
4 p. 817-833
artikel
5 ε-Almost collision-flat universal hash functions and mosaics of designs Wiese, Moritz

4 p. 975-998
artikel
6 Analysing and exploiting the Mantin biases in RC4 Bricout, Remi
2017
4 p. 743-770
artikel
7 An Erdős-Ko-Rado theorem for the group $$\hbox {PSU}(3, q)$$PSU(3,q) Meagher, Karen
2018
4 p. 717-744
artikel
8 Asymptotic and constructive methods for covering perfect hash families and covering arrays Colbourn, Charles J.
2017
4 p. 907-937
artikel
9 A variation of the dual hyperoval $${\mathcal {S}}_c$$Sc using presemifields Taniguchi, Hiroaki
2018
4 p. 895-908
artikel
10 Bent partitions Anbar, Nurdagül

4 p. 1081-1101
artikel
11 Cayley sum graphs and their applications to codebooks Satake, Shohei

4 p. 1315-1333
artikel
12 Characterization and classification of optimal LCD codes Araya, Makoto

4 p. 617-640
artikel
13 Characterizations and constructions of plateaued functions on finite abelian groups Xu, Bangteng

4 p. 1261-1292
artikel
14 Codes correcting restricted errors Shparlinski, Igor E.
2018
4 p. 855-863
artikel
15 Codes with a pomset metric and constructions Gnana Sudha, Irrinki
2017
4 p. 875-892
artikel
16 Combinatorial constructions of packings in Grassmannian spaces Zhang, Tao
2017
4 p. 803-815
artikel
17 Complete traceability multimedia fingerprinting codes resistant to averaging attack and adversarial noise with optimal rate Vorobyev, Ilya

4 p. 1183-1191
artikel
18 Complexities of normal bases constructed from Gauss periods Hou, Xiang-Dong
2017
4 p. 893-905
artikel
19 Conditions for the existence of spreads in projective Hjelmslev spaces Landjev, Ivan
2018
4 p. 785-794
artikel
20 Constructions of almost secure frameproof codes with applications to fingerprinting schemes Moreira, José
2017
4 p. 785-802
artikel
21 Cryptanalysis of a rank-based signature with short public keys Aragon, Nicolas

4 p. 643-653
artikel
22 Cryptographically strong permutations from the butterfly structure Li, Kangquan

4 p. 737-761
artikel
23 Cubic surfaces over small finite fields Betten, Anton
2018
4 p. 931-953
artikel
24 Cyclic constant dimension subspace codes via the sum of Sidon spaces Li, Yun

4 p. 1193-1207
artikel
25 Dispelling myths on superposition attacks: formal security model and attack analyses Music, Luka

4 p. 881-920
artikel
26 Eggs in finite projective spaces and unitals in translation planes Monzillo, Giusy

4 p. 1475-1485
artikel
27 External points to a conic from a Baer subplane Pallozzi Lavorante, Vincenzo

4 p. 1427-1441
artikel
28 Fano Kaleidoscopes and their generalizations Buratti, Marco
2018
4 p. 769-784
artikel
29 Fast construction of binary ring FCSRs for hardware stream ciphers Lin, Zhiqiang
2017
4 p. 939-953
artikel
30 Flag-transitive 2-(v,k,λ) designs with r>λ(k-3) Zhao, Yanwei

4 p. 863-869
artikel
31 Generalized Hadamard full propelinear codes Armario, José Andrés

4 p. 599-615
artikel
32 Grain-like structures with minimal and maximal period sequences Wang, Zhongxiao

4 p. 679-693
artikel
33 Growth of the perfect sequence covering array number Iurlano, Enrico

4 p. 1487-1494
artikel
34 Hulls of linear codes from simplex codes Xu, Guangkui

4 p. 1095-1112
artikel
35 Ideal hierarchical secret sharing and lattice path matroids Mo, Songbao

4 p. 1335-1349
artikel
36 Improved bounds for permutation arrays under Chebyshev distance Bereg, Sergey

4 p. 1023-1039
artikel
37 Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher Lu, Jiqiang

4 p. 957-973
artikel
38 Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512 Lin, Li
2017
4 p. 721-741
artikel
39 Incremental symmetric puncturable encryption with support for unbounded number of punctures Sun, Shi-Feng

4 p. 1401-1426
artikel
40 Isomorphism of maximum length circuit codes Byrnes, Kevin M.

4 p. 835-850
artikel
41 Jacobi polynomials and harmonic weight enumerators of the first-order Reed–Muller codes and the extended Hamming codes Miezaki, Tsuyoshi

4 p. 1041-1049
artikel
42 Jacobi sums over Galois rings of arbitrary characters and their applications in constructing asymptotically optimal codebooks Xu, Deng-Ming

4 p. 1051-1073
artikel
43 Large subsets of Zmn without arithmetic progressions Elsholtz, Christian

4 p. 1443-1452
artikel
44 Lattice codes for lattice-based PKE Lyu, Shanxiang

4 p. 917-939
artikel
45 σ-LCD codes over finite chain rings Liu, Xiusheng

4 p. 727-746
artikel
46 Linear codes close to the Griesmer bound and the related geometric structures Rousseva, Assia
2018
4 p. 841-854
artikel
47 Linear codes from Denniston maximal arcs Bartoli, Daniele
2018
4 p. 795-806
artikel
48 Linear codes from ruled sets in finite projective spaces Kroll, Hans-Joachim

4 p. 747-754
artikel
49 Linear codes of 2-designs associated with subcodes of the ternary generalized Reed–Muller codes Ding, Cunsheng

4 p. 625-641
artikel
50 LowMS: a new rank metric code-based KEM without ideal structure Aragon, Nicolas

4 p. 1075-1093
artikel
51 Maximal arcs and extended cyclic codes Winter, Stefaan De
2018
4 p. 807-816
artikel
52 Mutually disjoint Steiner systems from BCH codes Yan, Qianqian

4 p. 885-907
artikel
53 New constructions of MDS symbol-pair codes Ding, Baokun
2017
4 p. 841-859
artikel
54 New nonbinary code bounds based on divisibility arguments Polak, Sven C.
2017
4 p. 861-874
artikel
55 New nonexistence results on (m, n)-generalized bent functions Leung, Ka Hin

4 p. 755-770
artikel
56 Non-existence of partial difference sets in Abelian groups of order $$8p^3$$8p3 Winter, Stefaan De
2018
4 p. 757-768
artikel
57 Non-existence of quasi-symmetric designs with restricted block graphs Pawale, Rajendra M.

4 p. 871-879
artikel
58 On disjoint $$(v,k,k-1)$$(v,k,k-1) difference families Buratti, Marco
2018
4 p. 745-755
artikel
59 On inverses of permutation polynomials of the form xxs-a(qm-1)/s over Fqn Zheng, Yanbin

4 p. 1165-1181
artikel
60 On the cylinder conjecture Beule, Jan De
2018
4 p. 879-893
artikel
61 On the dimension and structure of the square of the dual of a Goppa code Mora, Rocco

4 p. 1351-1372
artikel
62 On the equivalence of Zps-linear generalized Hadamard codes Bhunia, Dipak K.

4 p. 999-1022
artikel
63 On the linearity and classification of Zps-linear generalized hadamard codes Bhunia, Dipak K.

4 p. 1037-1058
artikel
64 On the list decodability of rank-metric codes containing Gabidulin codes Santonastaso, Paolo

4 p. 957-982
artikel
65 On the nonexistence of ternary linear codes attaining the Griesmer bound Kawabata, Daiki

4 p. 947-956
artikel
66 Optimal quaternary Hermitian LCD codes and their related codes Sun, Zhonghua

4 p. 1527-1558
artikel
67 Optimal quaternary (r,δ)-locally recoverable codes: their structures and complete classification Xu, Li

4 p. 1495-1526
artikel
68 Pairs of MOLS of order ten satisfying non-trivial relations Gill, Michael J.

4 p. 1293-1313
artikel
69 Perfect LRCs and k-optimal LRCs Fang, Weijun

4 p. 1209-1232
artikel
70 Practical algorithm substitution attack on extractable signatures Zhao, Yi

4 p. 921-937
artikel
71 Practical key recovery attacks on FlexAEAD Dunkelman, Orr

4 p. 983-1007
artikel
72 Preface to the special issue on finite geometries Cardinali, Ilaria
2019
4 p. 715-716
artikel
73 Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions Zhang, Liang Feng

4 p. 677-709
artikel
74 Provable lattice reduction of Zn with blocksize n/2 Ducas, Léo

4 p. 909-916
artikel
75 Random construction of partial MDS codes Neri, Alessandro

4 p. 711-725
artikel
76 Rank-metric codes, linear sets, and their duality Sheekey, John

4 p. 655-675
artikel
77 Receiver selective opening security for identity-based encryption in the multi-challenge setting Huang, Zhengan

4 p. 1233-1259
artikel
78 Relative blocking sets of unions of Baer subplanes Blokhuis, Aart
2018
4 p. 865-877
artikel
79 Roulette games and depths of words over finite commutative rings Sidana, Tania

4 p. 641-678
artikel
80 Self-dual bent sequences for complex Hadamard matrices Shi, Minjia

4 p. 1453-1474
artikel
81 Small weight code words arising from the incidence of points and hyperplanes in PG(n,q) Adriaensen, Sam

4 p. 771-788
artikel
82 Standard model leakage-resilient authenticated key exchange using inner-product extractors Alawatugoda, Janaka

4 p. 1059-1079
artikel
83 The 2-adic complexity of Yu-Gong sequences with interleaved structure and optimal autocorrelation magnitude Sun, Yuhua

4 p. 695-707
artikel
84 The classification of Steiner triple systems on 27 points with 3-rank 24 Jungnickel, Dieter
2018
4 p. 831-839
artikel
85 The completion of optimal cyclic quaternary codes of weight 3 and distance 3 Lan, Liantao

4 p. 851-862
artikel
86 The cycle structure of a class of permutation polynomials Zeng, Dan

4 p. 1373-1400
artikel
87 The primitive idempotents and weight distributions of irreducible constacyclic codes Li, Fengwei
2017
4 p. 771-784
artikel
88 The weight spectrum of certain affine Grassmann codes Piñero, Fernando
2018
4 p. 817-830
artikel
89 Three homogeneous embeddings of $$\textit{DW}(2n-1,2)$$DW(2n-1,2) Bruyn, Bart De
2018
4 p. 909-929
artikel
90 Trims and extensions of quadratic APN functions Beierle, Christof

4 p. 1009-1036
artikel
91 Unconditionally secure non-malleable secret sharing and circular external difference families Veitch, Shannon

4 p. 941-956
artikel
92 Variants of Wegman-Carter message authentication code supporting variable tag lengths Ghosh, Sebati

4 p. 709-736
artikel
                             92 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland