Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             19 results found
no title author magazine year volume issue page(s) type
1 Analysis and computation of multidimensional linear complexity of periodic arrays Arce, Rafael

92 3 p. 709-722
article
2 An asymptotic lower bound on the number of bent functions Potapov, V. N.

92 3 p. 639-651
article
3 Antipodal two-weight rank metric codes Pratihar, Rakhi

92 3 p. 753-769
article
4 Classification of extremal type II Z4-codes of length 24 Munemasa, Akihiro

92 3 p. 771-785
article
5 Constructing irreducible polynomials recursively with a reverse composition method Graner, Anna-Maurin

92 3 p. 695-708
article
6 Counting the number of non-isotopic Taniguchi semifields Göloğlu, Faruk

92 3 p. 681-694
article
7 Densities of codes of various linearity degrees in translation-invariant metric spaces Gruica, Anina

92 3 p. 609-637
article
8 Editorial Note: Coding and Cryptography 2022
92 3 p. 505
article
9 Exploiting ROLLO’s constant-time implementations with a single-trace analysis Cheriere, Agathe

92 3 p. 587-608
article
10 Hardness estimates of the code equivalence problem in the rank metric Reijnders, Krijn

92 3 p. 833-862
article
11 Interpolation-based decoding of folded variants of linearized and skew Reed–Solomon codes Hörmann, Felicitas

92 3 p. 553-586
article
12 Introducing nega-Forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra Dutta, Suman

92 3 p. 863-883
article
13 Modified Patterson–Wiedemann construction Kavut, Selçuk

92 3 p. 653-666
article
14 New quantum codes from self-dual codes over F4 Dastbasteh, Reza

92 3 p. 787-801
article
15 On a family of linear MRD codes with parameters [8×8,16,7]q Timpanella, Marco

92 3 p. 507-530
article
16 On subfield subcodes obtained from restricted evaluation codes Güneri, Cem

92 3 p. 667-680
article
17 On the (in)security of optimized Stern-like signature schemes Chailloux, André

92 3 p. 803-832
article
18 Quantum impossible differential attacks: applications to AES and SKINNY David, Nicolas

92 3 p. 723-751
article
19 Vectorial Boolean functions with the maximum number of bent components beyond the Nyberg’s bound Bapić, Amar

92 3 p. 531-552
article
                             19 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands