nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A construction of maximally recoverable codes
|
Barg, Alexander |
|
|
|
4 |
p. 939-945 |
artikel |
2 |
A correction on the determination of the weight enumerator polynomial of some irreducible cyclic codes
|
Vega, Gerardo |
|
2017 |
|
4 |
p. 835-840 |
artikel |
3 |
A further study on the construction methods of bent functions and self-dual bent functions based on Rothaus’s bent function
|
Su, Sihong |
|
|
|
4 |
p. 1559-1580 |
artikel |
4 |
A link between combinatorial designs and three-weight linear codes
|
Olmez, Oktay |
|
2017 |
|
4 |
p. 817-833 |
artikel |
5 |
ε-Almost collision-flat universal hash functions and mosaics of designs
|
Wiese, Moritz |
|
|
|
4 |
p. 975-998 |
artikel |
6 |
Analysing and exploiting the Mantin biases in RC4
|
Bricout, Remi |
|
2017 |
|
4 |
p. 743-770 |
artikel |
7 |
An Erdős-Ko-Rado theorem for the group $$\hbox {PSU}(3, q)$$PSU(3,q)
|
Meagher, Karen |
|
2018 |
|
4 |
p. 717-744 |
artikel |
8 |
Asymptotic and constructive methods for covering perfect hash families and covering arrays
|
Colbourn, Charles J. |
|
2017 |
|
4 |
p. 907-937 |
artikel |
9 |
A variation of the dual hyperoval $${\mathcal {S}}_c$$Sc using presemifields
|
Taniguchi, Hiroaki |
|
2018 |
|
4 |
p. 895-908 |
artikel |
10 |
Bent partitions
|
Anbar, Nurdagül |
|
|
|
4 |
p. 1081-1101 |
artikel |
11 |
Cayley sum graphs and their applications to codebooks
|
Satake, Shohei |
|
|
|
4 |
p. 1315-1333 |
artikel |
12 |
Characterization and classification of optimal LCD codes
|
Araya, Makoto |
|
|
|
4 |
p. 617-640 |
artikel |
13 |
Characterizations and constructions of plateaued functions on finite abelian groups
|
Xu, Bangteng |
|
|
|
4 |
p. 1261-1292 |
artikel |
14 |
Codes correcting restricted errors
|
Shparlinski, Igor E. |
|
2018 |
|
4 |
p. 855-863 |
artikel |
15 |
Codes with a pomset metric and constructions
|
Gnana Sudha, Irrinki |
|
2017 |
|
4 |
p. 875-892 |
artikel |
16 |
Combinatorial constructions of packings in Grassmannian spaces
|
Zhang, Tao |
|
2017 |
|
4 |
p. 803-815 |
artikel |
17 |
Complete traceability multimedia fingerprinting codes resistant to averaging attack and adversarial noise with optimal rate
|
Vorobyev, Ilya |
|
|
|
4 |
p. 1183-1191 |
artikel |
18 |
Complexities of normal bases constructed from Gauss periods
|
Hou, Xiang-Dong |
|
2017 |
|
4 |
p. 893-905 |
artikel |
19 |
Conditions for the existence of spreads in projective Hjelmslev spaces
|
Landjev, Ivan |
|
2018 |
|
4 |
p. 785-794 |
artikel |
20 |
Constructions of almost secure frameproof codes with applications to fingerprinting schemes
|
Moreira, José |
|
2017 |
|
4 |
p. 785-802 |
artikel |
21 |
Cryptanalysis of a rank-based signature with short public keys
|
Aragon, Nicolas |
|
|
|
4 |
p. 643-653 |
artikel |
22 |
Cryptographically strong permutations from the butterfly structure
|
Li, Kangquan |
|
|
|
4 |
p. 737-761 |
artikel |
23 |
Cubic surfaces over small finite fields
|
Betten, Anton |
|
2018 |
|
4 |
p. 931-953 |
artikel |
24 |
Cyclic constant dimension subspace codes via the sum of Sidon spaces
|
Li, Yun |
|
|
|
4 |
p. 1193-1207 |
artikel |
25 |
Dispelling myths on superposition attacks: formal security model and attack analyses
|
Music, Luka |
|
|
|
4 |
p. 881-920 |
artikel |
26 |
Eggs in finite projective spaces and unitals in translation planes
|
Monzillo, Giusy |
|
|
|
4 |
p. 1475-1485 |
artikel |
27 |
External points to a conic from a Baer subplane
|
Pallozzi Lavorante, Vincenzo |
|
|
|
4 |
p. 1427-1441 |
artikel |
28 |
Fano Kaleidoscopes and their generalizations
|
Buratti, Marco |
|
2018 |
|
4 |
p. 769-784 |
artikel |
29 |
Fast construction of binary ring FCSRs for hardware stream ciphers
|
Lin, Zhiqiang |
|
2017 |
|
4 |
p. 939-953 |
artikel |
30 |
Flag-transitive 2-(v,k,λ) designs with r>λ(k-3)
|
Zhao, Yanwei |
|
|
|
4 |
p. 863-869 |
artikel |
31 |
Generalized Hadamard full propelinear codes
|
Armario, José Andrés |
|
|
|
4 |
p. 599-615 |
artikel |
32 |
Grain-like structures with minimal and maximal period sequences
|
Wang, Zhongxiao |
|
|
|
4 |
p. 679-693 |
artikel |
33 |
Growth of the perfect sequence covering array number
|
Iurlano, Enrico |
|
|
|
4 |
p. 1487-1494 |
artikel |
34 |
Hulls of linear codes from simplex codes
|
Xu, Guangkui |
|
|
|
4 |
p. 1095-1112 |
artikel |
35 |
Ideal hierarchical secret sharing and lattice path matroids
|
Mo, Songbao |
|
|
|
4 |
p. 1335-1349 |
artikel |
36 |
Improved bounds for permutation arrays under Chebyshev distance
|
Bereg, Sergey |
|
|
|
4 |
p. 1023-1039 |
artikel |
37 |
Improved meet-in-the-middle attack on 10 rounds of the AES-256 block cipher
|
Lu, Jiqiang |
|
|
|
4 |
p. 957-973 |
artikel |
38 |
Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512
|
Lin, Li |
|
2017 |
|
4 |
p. 721-741 |
artikel |
39 |
Incremental symmetric puncturable encryption with support for unbounded number of punctures
|
Sun, Shi-Feng |
|
|
|
4 |
p. 1401-1426 |
artikel |
40 |
Isomorphism of maximum length circuit codes
|
Byrnes, Kevin M. |
|
|
|
4 |
p. 835-850 |
artikel |
41 |
Jacobi polynomials and harmonic weight enumerators of the first-order Reed–Muller codes and the extended Hamming codes
|
Miezaki, Tsuyoshi |
|
|
|
4 |
p. 1041-1049 |
artikel |
42 |
Jacobi sums over Galois rings of arbitrary characters and their applications in constructing asymptotically optimal codebooks
|
Xu, Deng-Ming |
|
|
|
4 |
p. 1051-1073 |
artikel |
43 |
Large subsets of Zmn without arithmetic progressions
|
Elsholtz, Christian |
|
|
|
4 |
p. 1443-1452 |
artikel |
44 |
Lattice codes for lattice-based PKE
|
Lyu, Shanxiang |
|
|
|
4 |
p. 917-939 |
artikel |
45 |
σ-LCD codes over finite chain rings
|
Liu, Xiusheng |
|
|
|
4 |
p. 727-746 |
artikel |
46 |
Linear codes close to the Griesmer bound and the related geometric structures
|
Rousseva, Assia |
|
2018 |
|
4 |
p. 841-854 |
artikel |
47 |
Linear codes from Denniston maximal arcs
|
Bartoli, Daniele |
|
2018 |
|
4 |
p. 795-806 |
artikel |
48 |
Linear codes from ruled sets in finite projective spaces
|
Kroll, Hans-Joachim |
|
|
|
4 |
p. 747-754 |
artikel |
49 |
Linear codes of 2-designs associated with subcodes of the ternary generalized Reed–Muller codes
|
Ding, Cunsheng |
|
|
|
4 |
p. 625-641 |
artikel |
50 |
LowMS: a new rank metric code-based KEM without ideal structure
|
Aragon, Nicolas |
|
|
|
4 |
p. 1075-1093 |
artikel |
51 |
Maximal arcs and extended cyclic codes
|
Winter, Stefaan De |
|
2018 |
|
4 |
p. 807-816 |
artikel |
52 |
Mutually disjoint Steiner systems from BCH codes
|
Yan, Qianqian |
|
|
|
4 |
p. 885-907 |
artikel |
53 |
New constructions of MDS symbol-pair codes
|
Ding, Baokun |
|
2017 |
|
4 |
p. 841-859 |
artikel |
54 |
New nonbinary code bounds based on divisibility arguments
|
Polak, Sven C. |
|
2017 |
|
4 |
p. 861-874 |
artikel |
55 |
New nonexistence results on (m, n)-generalized bent functions
|
Leung, Ka Hin |
|
|
|
4 |
p. 755-770 |
artikel |
56 |
Non-existence of partial difference sets in Abelian groups of order $$8p^3$$8p3
|
Winter, Stefaan De |
|
2018 |
|
4 |
p. 757-768 |
artikel |
57 |
Non-existence of quasi-symmetric designs with restricted block graphs
|
Pawale, Rajendra M. |
|
|
|
4 |
p. 871-879 |
artikel |
58 |
On disjoint $$(v,k,k-1)$$(v,k,k-1) difference families
|
Buratti, Marco |
|
2018 |
|
4 |
p. 745-755 |
artikel |
59 |
On inverses of permutation polynomials of the form xxs-a(qm-1)/s over Fqn
|
Zheng, Yanbin |
|
|
|
4 |
p. 1165-1181 |
artikel |
60 |
On the cylinder conjecture
|
Beule, Jan De |
|
2018 |
|
4 |
p. 879-893 |
artikel |
61 |
On the dimension and structure of the square of the dual of a Goppa code
|
Mora, Rocco |
|
|
|
4 |
p. 1351-1372 |
artikel |
62 |
On the equivalence of Zps-linear generalized Hadamard codes
|
Bhunia, Dipak K. |
|
|
|
4 |
p. 999-1022 |
artikel |
63 |
On the linearity and classification of Zps-linear generalized hadamard codes
|
Bhunia, Dipak K. |
|
|
|
4 |
p. 1037-1058 |
artikel |
64 |
On the list decodability of rank-metric codes containing Gabidulin codes
|
Santonastaso, Paolo |
|
|
|
4 |
p. 957-982 |
artikel |
65 |
On the nonexistence of ternary linear codes attaining the Griesmer bound
|
Kawabata, Daiki |
|
|
|
4 |
p. 947-956 |
artikel |
66 |
Optimal quaternary Hermitian LCD codes and their related codes
|
Sun, Zhonghua |
|
|
|
4 |
p. 1527-1558 |
artikel |
67 |
Optimal quaternary (r,δ)-locally recoverable codes: their structures and complete classification
|
Xu, Li |
|
|
|
4 |
p. 1495-1526 |
artikel |
68 |
Pairs of MOLS of order ten satisfying non-trivial relations
|
Gill, Michael J. |
|
|
|
4 |
p. 1293-1313 |
artikel |
69 |
Perfect LRCs and k-optimal LRCs
|
Fang, Weijun |
|
|
|
4 |
p. 1209-1232 |
artikel |
70 |
Practical algorithm substitution attack on extractable signatures
|
Zhao, Yi |
|
|
|
4 |
p. 921-937 |
artikel |
71 |
Practical key recovery attacks on FlexAEAD
|
Dunkelman, Orr |
|
|
|
4 |
p. 983-1007 |
artikel |
72 |
Preface to the special issue on finite geometries
|
Cardinali, Ilaria |
|
2019 |
|
4 |
p. 715-716 |
artikel |
73 |
Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions
|
Zhang, Liang Feng |
|
|
|
4 |
p. 677-709 |
artikel |
74 |
Provable lattice reduction of Zn with blocksize n/2
|
Ducas, Léo |
|
|
|
4 |
p. 909-916 |
artikel |
75 |
Random construction of partial MDS codes
|
Neri, Alessandro |
|
|
|
4 |
p. 711-725 |
artikel |
76 |
Rank-metric codes, linear sets, and their duality
|
Sheekey, John |
|
|
|
4 |
p. 655-675 |
artikel |
77 |
Receiver selective opening security for identity-based encryption in the multi-challenge setting
|
Huang, Zhengan |
|
|
|
4 |
p. 1233-1259 |
artikel |
78 |
Relative blocking sets of unions of Baer subplanes
|
Blokhuis, Aart |
|
2018 |
|
4 |
p. 865-877 |
artikel |
79 |
Roulette games and depths of words over finite commutative rings
|
Sidana, Tania |
|
|
|
4 |
p. 641-678 |
artikel |
80 |
Self-dual bent sequences for complex Hadamard matrices
|
Shi, Minjia |
|
|
|
4 |
p. 1453-1474 |
artikel |
81 |
Small weight code words arising from the incidence of points and hyperplanes in PG(n,q)
|
Adriaensen, Sam |
|
|
|
4 |
p. 771-788 |
artikel |
82 |
Standard model leakage-resilient authenticated key exchange using inner-product extractors
|
Alawatugoda, Janaka |
|
|
|
4 |
p. 1059-1079 |
artikel |
83 |
The 2-adic complexity of Yu-Gong sequences with interleaved structure and optimal autocorrelation magnitude
|
Sun, Yuhua |
|
|
|
4 |
p. 695-707 |
artikel |
84 |
The classification of Steiner triple systems on 27 points with 3-rank 24
|
Jungnickel, Dieter |
|
2018 |
|
4 |
p. 831-839 |
artikel |
85 |
The completion of optimal cyclic quaternary codes of weight 3 and distance 3
|
Lan, Liantao |
|
|
|
4 |
p. 851-862 |
artikel |
86 |
The cycle structure of a class of permutation polynomials
|
Zeng, Dan |
|
|
|
4 |
p. 1373-1400 |
artikel |
87 |
The primitive idempotents and weight distributions of irreducible constacyclic codes
|
Li, Fengwei |
|
2017 |
|
4 |
p. 771-784 |
artikel |
88 |
The weight spectrum of certain affine Grassmann codes
|
Piñero, Fernando |
|
2018 |
|
4 |
p. 817-830 |
artikel |
89 |
Three homogeneous embeddings of $$\textit{DW}(2n-1,2)$$DW(2n-1,2)
|
Bruyn, Bart De |
|
2018 |
|
4 |
p. 909-929 |
artikel |
90 |
Trims and extensions of quadratic APN functions
|
Beierle, Christof |
|
|
|
4 |
p. 1009-1036 |
artikel |
91 |
Unconditionally secure non-malleable secret sharing and circular external difference families
|
Veitch, Shannon |
|
|
|
4 |
p. 941-956 |
artikel |
92 |
Variants of Wegman-Carter message authentication code supporting variable tag lengths
|
Ghosh, Sebati |
|
|
|
4 |
p. 709-736 |
artikel |