nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Blind key-generation attribute-based encryption for general predicates
|
Abe, Masayuki |
|
|
90 |
10 |
p. 2271-2299 |
artikel |
2 |
Block avoiding point sequencings of partial Steiner systems
|
Horsley, Daniel |
|
|
90 |
10 |
p. 2375-2383 |
artikel |
3 |
Classification of weighted posets and digraphs admitting the extended Hamming code to be a perfect code
|
Kim, Hyun Kwang |
|
|
90 |
10 |
p. 2249-2269 |
artikel |
4 |
Combinational constructions of splitting authentication codes with perfect secrecy
|
Ji, Lijun |
|
|
90 |
10 |
p. 2491-2515 |
artikel |
5 |
Constructions of MDS symbol-pair codes with minimum distance seven or eight
|
Ma, Junru |
|
|
90 |
10 |
p. 2337-2359 |
artikel |
6 |
Covering polynomials and projections of self-dual codes
|
Janusz, Gerald J. |
|
|
90 |
10 |
p. 2481-2489 |
artikel |
7 |
Cryptanalysis of Boyen’s attribute-based encryption scheme in TCC 2013
|
Agrawal, Shweta |
|
|
90 |
10 |
p. 2301-2318 |
artikel |
8 |
Designing preference functions for de Bruijn sequences with forbidden words
|
Alhakim, Abbas |
|
|
90 |
10 |
p. 2319-2335 |
artikel |
9 |
Efficient and extensive search for precise linear approximations with high correlations of full SNOW-V
|
Zhou, Zhaocun |
|
|
90 |
10 |
p. 2449-2479 |
artikel |
10 |
Improved key-recovery attacks on reduced-round WEM-8
|
Liu, Jun |
|
|
90 |
10 |
p. 2419-2448 |
artikel |
11 |
On the c-differential spectrum of power functions over finite fields
|
Yan, Haode |
|
|
90 |
10 |
p. 2385-2405 |
artikel |
12 |
The linearity of Carlet’s Gray image of linear codes over Z8
|
Eyvazi, Hamidreza |
|
|
90 |
10 |
p. 2361-2373 |
artikel |
13 |
The number of irreducible polynomials over finite fields with vanishing trace and reciprocal trace
|
Çakıroğlu, Yağmur |
|
|
90 |
10 |
p. 2407-2417 |
artikel |