nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A general family of Plotkin-optimal two-weight codes over Z4
|
Tang, Hopein Christofen |
|
|
91 |
5 |
p. 1737-1750 |
artikel |
2 |
A geometric description of the Figueroa plane
|
Barwick, S. G. |
|
|
91 |
5 |
p. 1581-1593 |
artikel |
3 |
An improved method for predicting truncated multiple recursive generators with unknown parameters
|
Yu, Han-Bing |
|
|
91 |
5 |
p. 1713-1736 |
artikel |
4 |
A recursive method for the construction and enumeration of self-orthogonal and self-dual codes over the quasi-Galois ring F2r[u]/
|
Yadav, Monika |
|
|
91 |
5 |
p. 1973-2003 |
artikel |
5 |
Constructions of multi-permutation codes correcting a single burst of deletions
|
Han, Hui |
|
|
91 |
5 |
p. 1923-1934 |
artikel |
6 |
Cyclic codes of length 5p with MDS symbol-pair
|
Li, Fengwei |
|
|
91 |
5 |
p. 1873-1888 |
artikel |
7 |
Derivatives of bent functions in connection with the bent sum decomposition problem
|
Shaporenko, Alexander |
|
|
91 |
5 |
p. 1607-1625 |
artikel |
8 |
(d,σ)-Veronese variety and some applications
|
Durante, N. |
|
|
91 |
5 |
p. 1911-1921 |
artikel |
9 |
Grassl–Rötteler cyclic and consta-cyclic MDS codes are generalised Reed–Solomon codes
|
Ball, Simeon |
|
|
91 |
5 |
p. 1685-1694 |
artikel |
10 |
Guess-and-determine attacks on SNOW-Vi stream cipher
|
Jiao, Lin |
|
|
91 |
5 |
p. 2021-2055 |
artikel |
11 |
Maliciously circuit-private multi-key FHE and MPC based on LWE
|
Attrapadung, Nuttapong |
|
|
91 |
5 |
p. 1645-1684 |
artikel |
12 |
Minimum distance and parameter ranges of locally recoverable codes with availability from fiber products of curves
|
Chara, María |
|
|
91 |
5 |
p. 2077-2105 |
artikel |
13 |
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures
|
Eriguchi, Reo |
|
|
91 |
5 |
p. 1751-1778 |
artikel |
14 |
New cryptanalysis of LowMC with algebraic techniques
|
Qiao, Wenxiao |
|
|
91 |
5 |
p. 2057-2075 |
artikel |
15 |
On some batch code properties of the simplex code
|
Hollmann, Henk D. L. |
|
|
91 |
5 |
p. 1595-1605 |
artikel |
16 |
Polar sampler: A novel Bernoulli sampler using polar codes with application to integer Gaussian sampling
|
Wang, Jiabo |
|
|
91 |
5 |
p. 1779-1811 |
artikel |
17 |
Quasi optimal anticodes: structure and invariants
|
Gorla, Elisa |
|
|
91 |
5 |
p. 2005-2020 |
artikel |
18 |
Rank weight hierarchy of some classes of polynomial codes
|
Ducoat, Jérôme |
|
|
91 |
5 |
p. 1627-1644 |
artikel |
19 |
Secret sharing on regular bipartite access structures
|
Gyarmati, Máté |
|
|
91 |
5 |
p. 1951-1971 |
artikel |
20 |
Short attribute-based signatures for arbitrary Turing machines from standard assumptions
|
Datta, Pratish |
|
|
91 |
5 |
p. 1845-1872 |
artikel |
21 |
Signed difference sets
|
Gordon, Daniel M. |
|
|
91 |
5 |
p. 2107-2115 |
artikel |
22 |
Some restrictions on the weight enumerators of near-extremal ternary self-dual codes and quaternary Hermitian self-dual codes
|
Araya, Makoto |
|
|
91 |
5 |
p. 1813-1843 |
artikel |
23 |
Symplectic 4-dimensional semifields of order 84 and 94
|
Lavrauw, Michel |
|
|
91 |
5 |
p. 1935-1949 |
artikel |
24 |
The decomposition of an NFSR into the cascade connection of two smaller NFSRs revisited
|
Wang, Zhongxiao |
|
|
91 |
5 |
p. 1889-1910 |
artikel |
25 |
The differential spectrum and boomerang spectrum of a class of locally-APN functions
|
Hu, Zhao |
|
|
91 |
5 |
p. 1695-1711 |
artikel |