


default search action
Designs, Codes and Cryptography, Volume 48, 2008
Volume 48, Number 1, July 2008
- Eimear Byrne, Marcus Greferath, Thomas Honold:

Ring geometries, two-weight codes, and strongly regular graphs. 1-16 - Dameng Deng, Rolf S. Rees, Hao Shen:

On the existence of nearly Kirkman triple systems with subsystems. 17-33 - Landang Yuan, Qingde Kang:

Another construction for large sets of Kirkman triple systems. 35-42 - Sunghyu Han, Jon-Lark Kim:

On self-dual codes over F5. 43-58 - L. Ji:

2-idempotent 3-quasigroups with a conjugate invariant subgroup consisting of a single cycle of length four. 59-68 - Andrew Blinco, Saad I. El-Zanati, G. F. Seelinger, Papa Amar Sissokho

, L. E. Spence, Charles Vanden Eynden:
On vector space partitions and uniformly resolvable designs. 69-77 - Oded Blayer, Tamir Tassa:

Improved versions of Tardos' fingerprinting scheme. 79-103 - Koen Thas:

Note on the existence of translation nets. 105-107
Volume 48, Number 2, August 2008
- Cunsheng Ding

, Tor Helleseth, Øyvind Ytrehus:
Preface. 109-110 - Zihui Liu, Wende Chen, Yuan Luo:

The relative generalized Hamming weight of linear q -ary codes and their subcodes. 111-123 - Shu-Tao Xia, Fang-Wei Fu:

Undetected error probability of q -ary constant weight codes. 125-140 - Khmaies Ouahada

, Theo G. Swart
, Hendrik C. Ferreira
, Ling Cheng:
Binary permutation sequences as subsets of Levenshtein codes, spectral null codes, run-length limited codes and constant weight codes. 141-154 - Radinka Yorgova, Alfred Wassermann:

Binary self-dual codes with automorphisms of order 23. 155-164 - Gerzson Kéri

, Patric R. J. Östergård:
On the minimum size of binary codes with length 2 R + 4 and covering radius R. 165-169 - Ernst M. Gabidulin:

Attacks and counter-attacks on the GPT public key cryptosystem. 171-177 - Constanza Riera, Stéphane Jacob, Matthew Geoffrey Parker:

From graph states to two-graph states. 179-206
Volume 48, Number 3, September 2008
- A. J. van Zanten, Loeky Haryanto:

Sets of disjoint snakes based on a Reed-Muller code and covering the hypercube. 207-229 - Michel Lavrauw

, Leo Storme
, Geertrui Van de Voorde
:
On the code generated by the incidence matrix of points and hyperplanes in PG(n, q) and its dual. 231-245 - Jong Yoon Hyun, Hyun Kwang Kim:

Maximum distance separable poset codes. 247-261 - Alan R. Prince:

Further translation planes of order 192 admitting SL(2, 5), obtained by nest replacement. 263-267 - Andreas Klein:

Attacks on the RC4 stream cipher. 269-286 - Hans Ludwig de Vries:

On orthogonal resolutions of the classical Steiner quadruple system SQS(16). 287-292 - Zheng Gong, Xuejia Lai, Kefei Chen:

A synthetic indifferentiability analysis of some block-cipher-based hash functions. 293-305 - Ulrich Dempwolff, William M. Kantor:

Distorting symmetric designs. 307-322 - Olav Geil

:
On the second weight of generalized Reed-Muller codes. 323-330 - Jianmin Wang:

Some combinatorial constructions for optimal perfect deletion-correcting codes. 331-347

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














