nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A family of ternary quasi-perfect BCH codes
|
Danev, Danyo |
|
2008 |
49 |
1-3 |
p. 265-271 |
artikel |
2 |
An improved list decoding algorithm for the second order Reed–Muller codes and its applications
|
Fourquet, Rafaël |
|
2008 |
49 |
1-3 |
p. 323-340 |
artikel |
3 |
Bent functions embedded into the recursive framework of $${\mathbb{Z}}$$ -bent functions
|
Dobbertin, Hans |
|
2008 |
49 |
1-3 |
p. 3-22 |
artikel |
4 |
Bundles, presemifields and nonlinear functions
|
Horadam, K. J. |
|
2008 |
49 |
1-3 |
p. 79-94 |
artikel |
5 |
Characterization results on arbitrary non-weighted minihypers and on linear codes meeting the Griesmer bound
|
Beule, J. De |
|
2008 |
49 |
1-3 |
p. 187-197 |
artikel |
6 |
Composition of recursions and nonlinear complexity of periodic binary sequences
|
Petrides, George |
|
2008 |
49 |
1-3 |
p. 251-264 |
artikel |
7 |
Edge local complementation and equivalence of binary linear codes
|
Danielsen, Lars Eirik |
|
2008 |
49 |
1-3 |
p. 161-170 |
artikel |
8 |
Editorial: In memory of Hans Dobbertin
|
Charpin, Pascale |
|
2008 |
49 |
1-3 |
p. 1-2 |
artikel |
9 |
Efficient public key encryption with smallest ciphertext expansion from factoring
|
Qian, Haifeng |
|
2008 |
49 |
1-3 |
p. 233-249 |
artikel |
10 |
Error and erasure correcting algorithms for rank codes
|
Gabidulin, Ernst M. |
|
2008 |
49 |
1-3 |
p. 105-122 |
artikel |
11 |
Error detection and error correction procedures for the advanced encryption standard
|
Czapski, Mariusz |
|
2008 |
49 |
1-3 |
p. 217-232 |
artikel |
12 |
Extractors for binary elliptic curves
|
Farashahi, Reza Rezaeian |
|
2008 |
49 |
1-3 |
p. 171-186 |
artikel |
13 |
Flat tori, lattices and bounds for commutative group codes
|
Siqueira, Rogério M. |
|
2008 |
49 |
1-3 |
p. 307-321 |
artikel |
14 |
Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros
|
Sarkar, Sumanta |
|
2008 |
49 |
1-3 |
p. 95-103 |
artikel |
15 |
More DD difference sets
|
Dillon, J. F. |
|
2008 |
49 |
1-3 |
p. 23-32 |
artikel |
16 |
On binary Kloosterman sums divisible by 3
|
Garaschuk, Kseniya |
|
2008 |
49 |
1-3 |
p. 347-357 |
artikel |
17 |
On Boolean functions with the sum of every two of them being bent
|
Bey, Christian |
|
2008 |
49 |
1-3 |
p. 341-346 |
artikel |
18 |
On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
|
Paul, Goutam |
|
2008 |
49 |
1-3 |
p. 123-134 |
artikel |
19 |
On solving sparse algebraic equations over finite fields
|
Semaev, Igor |
|
2008 |
49 |
1-3 |
p. 47-60 |
artikel |
20 |
On the classification of APN functions up to dimension five
|
Brinkmann, Marcus |
|
2008 |
49 |
1-3 |
p. 273-288 |
artikel |
21 |
Periodic multisequences with large error linear complexity
|
Niederreiter, Harald |
|
2008 |
49 |
1-3 |
p. 33-45 |
artikel |
22 |
Semantic security for the McEliece cryptosystem without random oracles
|
Nojima, Ryo |
|
2008 |
49 |
1-3 |
p. 289-305 |
artikel |
23 |
Skew Hadamard designs and their codes
|
Kim, Jon-Lark |
|
2008 |
49 |
1-3 |
p. 135-145 |
artikel |
24 |
Solving Multiple Right Hand Sides linear equations
|
Raddum, Håvard |
|
2008 |
49 |
1-3 |
p. 147-160 |
artikel |
25 |
Systematic authentication codes using additive polynomials
|
Özbudak, Ferruh |
|
2008 |
49 |
1-3 |
p. 61-77 |
artikel |
26 |
The trace of an optimal normal element and low complexity normal bases
|
Christopoulou, Maria |
|
2008 |
49 |
1-3 |
p. 199-215 |
artikel |