nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A combinatorial approach to avoiding weak keys in the BIKE cryptosystem
|
Matthews, Gretchen L. |
|
|
93 |
8 |
p. 3413-3436 |
artikel |
2 |
A new method for erasure decoding of convolutional codes
|
Lieb, Julia |
|
|
93 |
8 |
p. 2897-2918 |
artikel |
3 |
Avoiding trusted setup in isogeny-based commitments
|
Tchoffo Saah, Gustave |
|
|
93 |
8 |
p. 3207-3225 |
artikel |
4 |
Characterizations for minimal codes: graph theory approach and algebraic approach over finite chain rings
|
Maji, Makhan |
|
|
93 |
8 |
p. 3303-3335 |
artikel |
5 |
Coding properties and automorphism groups of two classes of twisted generalized Reed–Solomon codes
|
Jia, Xue |
|
|
93 |
8 |
p. 3107-3133 |
artikel |
6 |
Commutative cryptanalysis as a generalization of differential cryptanalysis
|
Baudrin, Jules |
|
|
93 |
8 |
p. 3243-3281 |
artikel |
7 |
Constructions of binary cyclic codes with minimum weights exceeding the square-root lower bound
|
Liu, Hai |
|
|
93 |
8 |
p. 2971-2992 |
artikel |
8 |
Constructions of locally recoverable codes with large availability
|
Micheli, Giacomo |
|
|
93 |
8 |
p. 2931-2945 |
artikel |
9 |
Evaluation codes arising from symmetric polynomials
|
Gatti, Barbara |
|
|
93 |
8 |
p. 3361-3373 |
artikel |
10 |
Fast multiplication and the PLWE–RLWE equivalence for an infinite family of maximal real subfields of cyclotomic fields
|
Ahola, Joonas |
|
|
93 |
8 |
p. 2947-2969 |
artikel |
11 |
Knot theory and error-correcting codes
|
Kılıç, Altan B. |
|
|
93 |
8 |
p. 3029-3068 |
artikel |
12 |
Lattice codes for CRYSTALS-Kyber
|
Liu, Shuiyin |
|
|
93 |
8 |
p. 3181-3205 |
artikel |
13 |
More on codes for combinatorial composite DNA
|
Ye, Zuo |
|
|
93 |
8 |
p. 3437-3462 |
artikel |
14 |
New upper bounds for wide-sense frameproof codes
|
Sun, Chengyu |
|
|
93 |
8 |
p. 3069-3082 |
artikel |
15 |
On flag-transitive symmetric (v, k, 4) designs
|
Alavi, Seyed Hassan |
|
|
93 |
8 |
p. 3337-3359 |
artikel |
16 |
On the coding capacity of reverse-complement and palindromic duplication-correcting codes
|
Yohananov, Lev |
|
|
93 |
8 |
p. 3283-3302 |
artikel |
17 |
On tweakable correlation robust hashing against key leakages
|
Guo, Chun |
|
|
93 |
8 |
p. 3375-3412 |
artikel |
18 |
Permutations minimizing the number of collinear triples
|
Cooper, Joshua |
|
|
93 |
8 |
p. 3135-3142 |
artikel |
19 |
Quantum codes and irreducible products of characters
|
Kubischta, Eric |
|
|
93 |
8 |
p. 2919-2930 |
artikel |
20 |
Rational transformations over finite fields that are never irreducible
|
Schulz, Max |
|
|
93 |
8 |
p. 3143-3157 |
artikel |
21 |
The geometry of covering codes in the sum–rank metric
|
Bonini, Matteo |
|
|
93 |
8 |
p. 2993-3009 |
artikel |
22 |
Trace representation of a family of generalized cyclotomic binary sequences with period pn
|
Xiao, Zibi |
|
|
93 |
8 |
p. 3227-3241 |
artikel |
23 |
Understanding the new distinguisher of alternant codes at degree 2
|
Lemoine, Axel |
|
|
93 |
8 |
p. 3083-3105 |
artikel |
24 |
Utilizing two subfields to accelerate individual logarithm computation in extended tower number field sieve
|
Zhu, Yuqing |
|
|
93 |
8 |
p. 3011-3027 |
artikel |
25 |
Weak colourings of Kirkman triple systems
|
Burgess, Andrea C. |
|
|
93 |
8 |
p. 3159-3179 |
artikel |