Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             26 results found
no title author magazine year volume issue page(s) type
1 A family of ternary quasi-perfect BCH codes Danev, Danyo
2008
49 1-3 p. 265-271
article
2 An improved list decoding algorithm for the second order Reed–Muller codes and its applications Fourquet, Rafaël
2008
49 1-3 p. 323-340
article
3 Bent functions embedded into the recursive framework of $${\mathbb{Z}}$$ -bent functions Dobbertin, Hans
2008
49 1-3 p. 3-22
article
4 Bundles, presemifields and nonlinear functions Horadam, K. J.
2008
49 1-3 p. 79-94
article
5 Characterization results on arbitrary non-weighted minihypers and on linear codes meeting the Griesmer bound Beule, J. De
2008
49 1-3 p. 187-197
article
6 Composition of recursions and nonlinear complexity of periodic binary sequences Petrides, George
2008
49 1-3 p. 251-264
article
7 Edge local complementation and equivalence of binary linear codes Danielsen, Lars Eirik
2008
49 1-3 p. 161-170
article
8 Editorial: In memory of Hans Dobbertin Charpin, Pascale
2008
49 1-3 p. 1-2
article
9 Efficient public key encryption with smallest ciphertext expansion from factoring Qian, Haifeng
2008
49 1-3 p. 233-249
article
10 Error and erasure correcting algorithms for rank codes Gabidulin, Ernst M.
2008
49 1-3 p. 105-122
article
11 Error detection and error correction procedures for the advanced encryption standard Czapski, Mariusz
2008
49 1-3 p. 217-232
article
12 Extractors for binary elliptic curves Farashahi, Reza Rezaeian
2008
49 1-3 p. 171-186
article
13 Flat tori, lattices and bounds for commutative group codes Siqueira, Rogério M.
2008
49 1-3 p. 307-321
article
14 Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros Sarkar, Sumanta
2008
49 1-3 p. 95-103
article
15 More DD difference sets Dillon, J. F.
2008
49 1-3 p. 23-32
article
16 On binary Kloosterman sums divisible by 3 Garaschuk, Kseniya
2008
49 1-3 p. 347-357
article
17 On Boolean functions with the sum of every two of them being bent Bey, Christian
2008
49 1-3 p. 341-346
article
18 On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key Paul, Goutam
2008
49 1-3 p. 123-134
article
19 On solving sparse algebraic equations over finite fields Semaev, Igor
2008
49 1-3 p. 47-60
article
20 On the classification of APN functions up to dimension five Brinkmann, Marcus
2008
49 1-3 p. 273-288
article
21 Periodic multisequences with large error linear complexity Niederreiter, Harald
2008
49 1-3 p. 33-45
article
22 Semantic security for the McEliece cryptosystem without random oracles Nojima, Ryo
2008
49 1-3 p. 289-305
article
23 Skew Hadamard designs and their codes Kim, Jon-Lark
2008
49 1-3 p. 135-145
article
24 Solving Multiple Right Hand Sides linear equations Raddum, Håvard
2008
49 1-3 p. 147-160
article
25 Systematic authentication codes using additive polynomials Özbudak, Ferruh
2008
49 1-3 p. 61-77
article
26 The trace of an optimal normal element and low complexity normal bases Christopoulou, Maria
2008
49 1-3 p. 199-215
article
                             26 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands