nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A construction for strength-3 covering arrays from linear feedback shift register sequences
|
Raaphorst, Sebastian |
|
2013 |
73 |
3 |
p. 949-968 |
artikel |
2 |
A construction for t-fold perfect authentication codes with arbitration
|
Liang, Miao |
|
2013 |
73 |
3 |
p. 781-790 |
artikel |
3 |
Any network code comes from an algebraic curve taking osculating spaces
|
Ballico, Edoardo |
|
2013 |
73 |
3 |
p. 1023-1026 |
artikel |
4 |
Cameron–Liebler line classes in $$PG(n,4)$$PG(n,4)
|
Gavrilyuk, Alexander L. |
|
2013 |
73 |
3 |
p. 969-982 |
artikel |
5 |
Difference sets with few character values
|
Feng, Tao |
|
2013 |
73 |
3 |
p. 825-839 |
artikel |
6 |
Divisible difference families from Galois rings $$GR(4,n)$$GR(4,n) and Hadamard matrices
|
Momihara, Koji |
|
2013 |
73 |
3 |
p. 897-909 |
artikel |
7 |
Erratum to: Linear covering codes and error-correcting codes for limited-magnitude errors
|
Kløve, Torleiv |
|
2014 |
73 |
3 |
p. 1029 |
artikel |
8 |
Erratum to: On the support designs of extremal binary doubly even self-dual codes
|
Horiguchi, Naoyuki |
|
2014 |
73 |
3 |
p. 1027-1028 |
artikel |
9 |
Extremal properties of t-SEEDs and recursive constructions
|
Lin, Yiling |
|
2013 |
73 |
3 |
p. 805-823 |
artikel |
10 |
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures
|
Bulygin, Stanislav |
|
2013 |
73 |
3 |
p. 997-1022 |
artikel |
11 |
Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images
|
Adhikari, Avishek |
|
2013 |
73 |
3 |
p. 865-895 |
artikel |
12 |
Mutually disjoint t-designs and t-SEEDs from extremal doubly-even self-dual codes
|
Fang, Jianying |
|
2013 |
73 |
3 |
p. 769-780 |
artikel |
13 |
New binary self-dual codes of lengths 50–60
|
Yankov, Nikolay |
|
2013 |
73 |
3 |
p. 983-996 |
artikel |
14 |
New optimal constructions of conflict-avoiding codes of odd length and weight 3
|
Ma, Wenping |
|
2013 |
73 |
3 |
p. 791-804 |
artikel |
15 |
New results and applications for multi-secret sharing schemes
|
Herranz, Javier |
|
2013 |
73 |
3 |
p. 841-864 |
artikel |
16 |
Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH
|
Cao, Weiwei |
|
2013 |
73 |
3 |
p. 719-730 |
artikel |
17 |
Shorter identity-based encryption via asymmetric pairings
|
Chen, Jie |
|
2013 |
73 |
3 |
p. 911-947 |
artikel |
18 |
Spatial encryption supporting non-monotone access structure
|
Chen, Jie |
|
2013 |
73 |
3 |
p. 731-746 |
artikel |
19 |
The weight distributions of some cyclic codes with three or four nonzeros over $$\mathbb F _3$$F3
|
Liu, Xiaogang |
|
2013 |
73 |
3 |
p. 747-768 |
artikel |