nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A construction of maximally recoverable codes
|
Barg, Alexander |
|
|
90 |
4 |
p. 939-945 |
artikel |
2 |
Bent partitions
|
Anbar, Nurdagül |
|
|
90 |
4 |
p. 1081-1101 |
artikel |
3 |
Dispelling myths on superposition attacks: formal security model and attack analyses
|
Music, Luka |
|
|
90 |
4 |
p. 881-920 |
artikel |
4 |
Flag-transitive 2-(v,k,λ) designs with r>λ(k-3)
|
Zhao, Yanwei |
|
|
90 |
4 |
p. 863-869 |
artikel |
5 |
Isomorphism of maximum length circuit codes
|
Byrnes, Kevin M. |
|
|
90 |
4 |
p. 835-850 |
artikel |
6 |
Non-existence of quasi-symmetric designs with restricted block graphs
|
Pawale, Rajendra M. |
|
|
90 |
4 |
p. 871-879 |
artikel |
7 |
On the linearity and classification of Zps-linear generalized hadamard codes
|
Bhunia, Dipak K. |
|
|
90 |
4 |
p. 1037-1058 |
artikel |
8 |
On the list decodability of rank-metric codes containing Gabidulin codes
|
Santonastaso, Paolo |
|
|
90 |
4 |
p. 957-982 |
artikel |
9 |
On the nonexistence of ternary linear codes attaining the Griesmer bound
|
Kawabata, Daiki |
|
|
90 |
4 |
p. 947-956 |
artikel |
10 |
Practical algorithm substitution attack on extractable signatures
|
Zhao, Yi |
|
|
90 |
4 |
p. 921-937 |
artikel |
11 |
Practical key recovery attacks on FlexAEAD
|
Dunkelman, Orr |
|
|
90 |
4 |
p. 983-1007 |
artikel |
12 |
Standard model leakage-resilient authenticated key exchange using inner-product extractors
|
Alawatugoda, Janaka |
|
|
90 |
4 |
p. 1059-1079 |
artikel |
13 |
The completion of optimal cyclic quaternary codes of weight 3 and distance 3
|
Lan, Liantao |
|
|
90 |
4 |
p. 851-862 |
artikel |
14 |
Trims and extensions of quadratic APN functions
|
Beierle, Christof |
|
|
90 |
4 |
p. 1009-1036 |
artikel |