nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analysis and computation of multidimensional linear complexity of periodic arrays
|
Arce, Rafael |
|
|
92 |
3 |
p. 709-722 |
artikel |
2 |
An asymptotic lower bound on the number of bent functions
|
Potapov, V. N. |
|
|
92 |
3 |
p. 639-651 |
artikel |
3 |
Antipodal two-weight rank metric codes
|
Pratihar, Rakhi |
|
|
92 |
3 |
p. 753-769 |
artikel |
4 |
Classification of extremal type II Z4-codes of length 24
|
Munemasa, Akihiro |
|
|
92 |
3 |
p. 771-785 |
artikel |
5 |
Constructing irreducible polynomials recursively with a reverse composition method
|
Graner, Anna-Maurin |
|
|
92 |
3 |
p. 695-708 |
artikel |
6 |
Counting the number of non-isotopic Taniguchi semifields
|
Göloğlu, Faruk |
|
|
92 |
3 |
p. 681-694 |
artikel |
7 |
Densities of codes of various linearity degrees in translation-invariant metric spaces
|
Gruica, Anina |
|
|
92 |
3 |
p. 609-637 |
artikel |
8 |
Editorial Note: Coding and Cryptography 2022
|
|
|
|
92 |
3 |
p. 505 |
artikel |
9 |
Exploiting ROLLO’s constant-time implementations with a single-trace analysis
|
Cheriere, Agathe |
|
|
92 |
3 |
p. 587-608 |
artikel |
10 |
Hardness estimates of the code equivalence problem in the rank metric
|
Reijnders, Krijn |
|
|
92 |
3 |
p. 833-862 |
artikel |
11 |
Interpolation-based decoding of folded variants of linearized and skew Reed–Solomon codes
|
Hörmann, Felicitas |
|
|
92 |
3 |
p. 553-586 |
artikel |
12 |
Introducing nega-Forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra
|
Dutta, Suman |
|
|
92 |
3 |
p. 863-883 |
artikel |
13 |
Modified Patterson–Wiedemann construction
|
Kavut, Selçuk |
|
|
92 |
3 |
p. 653-666 |
artikel |
14 |
New quantum codes from self-dual codes over F4
|
Dastbasteh, Reza |
|
|
92 |
3 |
p. 787-801 |
artikel |
15 |
On a family of linear MRD codes with parameters [8×8,16,7]q
|
Timpanella, Marco |
|
|
92 |
3 |
p. 507-530 |
artikel |
16 |
On subfield subcodes obtained from restricted evaluation codes
|
Güneri, Cem |
|
|
92 |
3 |
p. 667-680 |
artikel |
17 |
On the (in)security of optimized Stern-like signature schemes
|
Chailloux, André |
|
|
92 |
3 |
p. 803-832 |
artikel |
18 |
Quantum impossible differential attacks: applications to AES and SKINNY
|
David, Nicolas |
|
|
92 |
3 |
p. 723-751 |
artikel |
19 |
Vectorial Boolean functions with the maximum number of bent components beyond the Nyberg’s bound
|
Bapić, Amar |
|
|
92 |
3 |
p. 531-552 |
artikel |