


default search action
Designs, Codes and Cryptography, Volume 80
Volume 80, Number 1, July 2016
- Eric Zhi Chen:

New binary h-generator quasi-cyclic codes by augmentation and new minimum distance bounds. 1-10 - José Moreira

, Marcel Fernández, Grigory Kabatiansky:
Almost separating and almost secure frameproof codes over q-ary alphabets. 11-28 - Dennis Hofheinz, Tibor Jager:

Tightly secure signatures and public-key encryption. 29-61 - Igor E. Shparlinski

:
On small gaps between the elements of multiplicative subgroups of finite fields. 63-71 - Jonathan Jedwab, Amy Wiebe:

Constructions of complex equiangular lines from mutually unbiased bases. 73-89 - Denis S. Krotov

:
Perfect codes in Doob graphs. 91-102 - Fuchun Guo

, Willy Susilo
, Yi Mu:
Generalized closest substring encryption. 103-124 - Alexander A. Davydov

, Giorgio Faina, Massimo Giulietti
, Stefano Marcugini, Fernanda Pambianco:
On constructions and parameters of symmetric configurations vk. 125-147 - Yanling Chen, Markku Niemenmaa, A. J. Han Vinck:

A general check digit system based on finite groups. 149-163 - Sabyasachi Dutta

, Raghvendra Singh Rohit, Avishek Adhikari:
Constructions and analysis of some efficient t - (k, n)∗-visual cryptographic schemes using linear algebraic techniques. 165-196 - Alberto Ravagnani:

Rank-metric codes and their duality theory. 197-216
Volume 80, Number 2, August 2016
- Xiang-dong Hou, Ferruh Özbudak

, Yue Zhou
:
Switchings of semifield multiplications. 217-239 - Udo Ott:

On Jacobi sums, difference sets and partial difference sets in Galois domains. 241-281 - Kohei Yamada, Nobuko Miyamoto:

A construction and decomposition of orthogonal arrays with non-prime-power numbers of symbols on the complement of a Baer subplane. 283-294 - Chengju Li, Qin Yue, Fang-Wei Fu:

Complete weight enumerators of some cyclic codes. 295-315 - Susan G. Barwick

, Wen-Ai Jackson:
Characterising pointsets in PG(4, q) that correspond to conics. 317-332 - Yarkin Doröz, Yin Hu, Berk Sunar:

Homomorphic AES evaluation using the modified LTV scheme. 333-358 - Carl Löndahl, Thomas Johansson

, Masoumeh Koochak Shooshtari, Mahmoud Ahmadian-Attari, Mohammad Reza Aref:
Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension. 359-377 - Aysegul Bayram, Elif Segah Oztas

, Irfan Siap
:
Codes over F4+vF4 and some DNA applications. 379-393 - Marion Candau, Roland Gautier, Johannes Huisman:

Convolutional block codes with cryptographic properties over the semi-direct product ℤ/Nℤ ⋊ ℤ/Mℤ. 395-407 - Kai-Uwe Schmidt, Jürgen Willms:

Barker sequences of odd length. 409-414 - John Sheekey

:
Dimensional dual hyperovals in classical polar spaces. 415-420
Volume 80, Number 3, September 2016
- Jason T. LeGrow

, David A. Pike, Jonathan Poulin:
Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs. 421-433 - Kathleen Nowak, Oktay Ölmez:

Partial geometric designs with prescribed automorphisms. 435-451 - Edoardo Ballico:

Non-special subsets of the set of points of a curve defined over a finite field. 453-457 - Rongjia Li, Chenhui Jin:

Meet-in-the-middle attacks on 10-round AES-256. 459-471 - Ga Won Lee, Jin Hong

:
Comparison of perfect table cryptanalytic tradeoff algorithms. 473-523 - Junqing Gong, Zhenfu Cao

, Shaohua Tang, Jie Chen:
Extended dual system group and shorter unbounded hierarchical identity based encryption. 525-559 - Adel Alahmadi, Hussain Alhazmi

, Tor Helleseth, Rola Hijazi, Najat M. Muthana, Patrick Solé:
On the lifted Zetterberg code. 561-576 - Dirk Hachenberger:

Asymptotic existence results for primitive completely normal elements in extensions of Galois fields. 577-586 - Jian Guo

, Jérémy Jean, Ivica Nikolic
, Yu Sasaki:
Extended meet-in-the-middle attacks on some Feistel constructions. 587-618 - Juan Carlos Ku-Cauich

, Guillermo Morales-Luna:
Authentication codes based on resilient Boolean maps. 619-633 - Rebecca J. Stones, Ming Su, Xiaoguang Liu, Gang Wang, Sheng Lin:

A Latin square autotopism secret sharing scheme. 635-650

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














