nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A construction for circulant type dropout designs
|
Chisaki, Shoko |
|
|
89 |
8 |
p. 1839-1852 |
artikel |
2 |
Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity
|
Takayasu, Atsushi |
|
|
89 |
8 |
p. 1965-1992 |
artikel |
3 |
A family of projective two-weight linear codes
|
Heng, Ziling |
|
|
89 |
8 |
p. 1993-2007 |
artikel |
4 |
Binary linear codes with few weights from Boolean functions
|
Wang, Xiaoqiang |
|
|
89 |
8 |
p. 2009-2030 |
artikel |
5 |
Breaking tweakable enciphering schemes using Simon’s algorithm
|
Ghosh, Sebati |
|
|
89 |
8 |
p. 1907-1926 |
artikel |
6 |
Correction to: Good polynomials for optimal LRC of low locality
|
Chen, Ruikai |
|
|
89 |
8 |
p. 2031 |
artikel |
7 |
Hamming weight distributions of multi-twisted codes over finite fields
|
Chauhan, Varsha |
|
|
89 |
8 |
p. 1787-1837 |
artikel |
8 |
Scattered subspaces and related codes
|
Zini, Giovanni |
|
|
89 |
8 |
p. 1853-1873 |
artikel |
9 |
Security analysis of Subterranean 2.0
|
Song, Ling |
|
|
89 |
8 |
p. 1875-1905 |
artikel |
10 |
Simple and efficient FE for quadratic functions
|
Gong, Junqing |
|
|
89 |
8 |
p. 1757-1786 |
artikel |
11 |
Tag-based ABE in prime-order groups via pair encoding
|
Takayasu, Atsushi |
|
|
89 |
8 |
p. 1927-1963 |
artikel |