


default search action
Designs, Codes and Cryptography, Volume 67
Volume 67, Number 1, April 2013
- Shuhong Gao, Raymond Heindl:

Multivariate public key cryptosystems from diophantine equations. 1-18 - Jie Li, Xiangyong Zeng, Xiaohu Tang, Chunlei Li:

A family of quadriphase sequences of period 4(2 n - 1) with low correlation and large linear span. 19-35 - Mieko Yamada:

Difference sets over Galois rings with odd extension degrees and characteristic an even power of 2. 37-57 - Yonglin Cao

, Jian Gao:
Constructing quasi-cyclic codes from linear algebra theory. 59-75 - Deng Tang

, WeiGuo Zhang, Xiaohu Tang:
Construction of balanced Boolean functions with high nonlinearity and good autocorrelation properties. 77-91 - Dimitri Leemans

, Bernardo Gabriel Rodrigues:
Binary codes of some strongly regular subgraphs of the McLaughlin graph. 93-109 - Mausumi Bose, Aloke Dey, Rahul Mukerjee:

Key predistribution schemes for distributed sensor networks via block designs. 111-136 - John Bamberg

, Michael Giudici
, Gordon F. Royle
:
Hemisystems of small flock generalized quadrangles. 137-157
Volume 67, Number 2, May 2013
- Dina Ghinelli, J. W. P. Hirschfeld, Dieter Jungnickel:

Obituary: Daniel R. Hughes (1927-2012). 159-162 - Dina Ghinelli, Dieter Jungnickel:

Obituary: Marialuisa J. de Resmini (1939-2012). 163-167 - Motahhareh Gharahi, Massoud Hadian Dehkordi:

The complexity of the graph access structures on six participants. 169-173 - Huajin Chen, Tian Tian, Wenfeng Qi:

On the affine equivalence relation between two classes of Boolean functions with optimal algebraic immunity. 175-185 - Ibrahim Özen

, Eda Tekin
:
Moments of the support weight distribution of linear codes. 187-196 - Fangguo Zhang

, Ping Wang
:
Speeding up elliptic curve discrete logarithm computations with point halving. 197-208 - Frederik Armknecht

, Stefan Katzenbeisser, Andreas Peter:
Group homomorphic encryption: characterizations, impossibility results, and applications. 209-232 - Kun Wang, Jianxing Yin:

Further results on the existence of nested orthogonal arrays. 233-243 - Ian Goldberg, Douglas Stebila

, Berkant Ustaoglu
:
Anonymity and one-way authentication in key exchange protocols. 245-269 - Hoon Hong, Eunjeong Lee, Hyang-Sook Lee, Cheol-Min Park:

Simple and exact formula for minimum loop length in Ate i pairing based on Brezing-Weng curves. 271-292
Volume 67, Number 3, June 2013
- Kiyoshi Nagata, Fidel R. Nemenzo, Hideo Wada:

Mass formula and structure of self-dual codes over Z2s. 293-316 - Zhixiong Chen, Xiaoni Du:

On the linear complexity of binary threshold sequences derived from Fermat quotients. 317-323 - Pinhui Ke, Jie Zhang, Shengyuan Zhang:

On the linear complexity and the autocorrelation of generalized cyclotomic binary sequences of length 2p m. 325-339 - Kristin E. Lauter, Ning Shang:

Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields. 341-355 - Orr Dunkelman

, Nathan Keller:
Cryptanalysis of the Stream Cipher LEX. 357-373 - Luca Giuzzi

, Valentina Pepe:
Families of twisted tensor product codes. 375-384 - Neil I. Gillespie, Cheryl E. Praeger

:
Neighbour transitivity on codes in Hamming graphs. 385-393 - Jaime Gutierrez

, Álvar Ibeas, Domingo Gómez-Pérez
, Igor E. Shparlinski
:
Predicting masked linear pseudorandom number generators over finite fields. 395-402

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














