


default search action
Designs, Codes and Cryptography, Volume 50, 2009
Volume 50, Number 1, January 2009
- Masaaki Homma, Seon Jeong Kim:
The second generalized Hamming weight for two-point codes on a Hermitian curve. 1-40 - Jeroen Schillewaert, Joseph A. Thas:
Characterizations of Hermitian varieties by intersection numbers. 41-60 - Jie Yan, Jianxing Yin:
A class of optimal constant composition codes from GDRPs. 61-76 - Steven T. Dougherty, Jon-Lark Kim, Hamid Kulosman:
MDS codes over finite principal ideal rings. 77-92 - Guobiao Weng, Lei Hu:
Some results on skew Hadamard difference sets. 93-105 - Weidong Guo, Gennian Ge:
The existence of generalized mix functions. 107-113 - Jean-Sébastien Coron:
A variant of Boneh-Franklin IBE with a tight reduction in the random oracle model. 115-133 - Frédéric A. B. Edoukou:
Codes defined by forms of degree 2 on non-degenerate Hermitian varieties in \mathbbP4(\mathbbFq){\mathbb{P}^{4}(\mathbb{F}_q)}. 135-146
Volume 50, Number 2, February 2009
- Young Ho Park:
Modular independence and generator matrices for codes over \mathbb Zm{\mathbb {Z}_m}. 147-162 - Shu-Tao Xia, Fang-Wei Fu:
Johnson type bounds on constant dimension codes. 163-172 - Jong Yoon Hyun:
Generalized MacWilliams identities and their applications to perfect binary codes. 173-185 - Jan De Beule
, Patrick Govaerts, Anja Hallez, Leo Storme
:
Tight sets, weighted m -covers, weighted m -ovoids, and minihypers. 187-201 - Wenqing Fu, Tao Feng
:
On self-orthogonal group ring codes. 203-214 - Feng Liu, Chuan Kun Wu, Xi Jun Lin:
The alignment problem of visual cryptography schemes. 215-227 - Horst Trinker:
A simple derivation of the MacWilliams identity for linear ordered codes and orthogonal arrays. 229-234 - Jürgen Bierbrauer:
A family of crooked functions. 235-241 - Keqin Feng, Qunying Liao, Jing Yang:
Maximal values of generalized algebraic immunity. 243-252 - Yiwei Huang, Bernhard Schmidt:
Uniqueness of some cyclic projective planes. 253-266
Volume 50, Number 3, March 2009
- Lionel Chaussade, Pierre Loidreau, Felix Ulmer:
Skew codes of prescribed distance or rank. 267-284 - Yutaka Hiramine:
A two-to-one map and abelian affine difference sets. 285-290 - Kiyoshi Nagata, Fidel R. Nemenzo, Hideo Wada:
The number of self-dual codes over Zp3{Z_{p^3}}. 291-303 - Steven D. Galbraith
, Xibin Lin:
Computing pairings using x -coordinates only. 305-324 - Gilles Piret, François-Xavier Standaert
:
Provable security of block ciphers against linear cryptanalysis: a mission impossible? 325-338 - Yang Li, Lijun Ji, Jianxing Yin:
Covering arrays of strength 3 and 4 from holey difference matrices. 339-350 - Daniel Panario
, David Thomson:
Efficient p th root computations in finite fields of characteristic p. 351-358 - Alexander A. Davydov
, Stefano Marcugini, Fernanda Pambianco:
Complete ( q 2 + q + 8)/2-caps in the spaces PG (3, q ), q = 2 (mod 3) an odd prime, and a complete 20-cap in PG (3, 5). 359-372

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.