default search action
Designs, Codes and Cryptography, Volume 57, 2010
Volume 57, Number 1, October 2010
- Kenneth W. Shum, Wing Shing Wong:
A tight asymptotic bound on the size of constant-weight conflict-avoiding codes. 1-14 - John Fuelberth, Athula Gunawardena, C. David Shaffer:
On incidence structures of nonsingular points and hyperbolic lines of ovoids in finite orthogonal spaces. 15-33 - Yves Edel:
On quadratic APN functions and dimensional dual hyperovals. 35-44 - Ernst Schuster, Gennian Ge:
On uniformly resolvable designs with block sizes 3 and 4. 45-69 - Amin Sakzad, Mohammad-Reza Sadeghi, Daniel Panario:
Codes with girth 8 Tanner graph representation. 71-81 - Zhengjun Zhao, Xiwang Cao:
A note on the reducibility of binary affine polynomials. 83-90 - Hanumappa B. Walikar, B. Devadas Acharya, Shailaja S. Shirkol:
Designs associated with maximum independent sets of a graph. 91-105 - Tohru Nakashima:
AG codes from vector bundles. 107-115
Volume 57, Number 2, November 2010
- Shenglin Zhou, Huili Dong:
Alternating groups and flag-transitive triplanes. 117-126 - Vladimir M. Blinovsky, Uri Erez, Simon Litsyn:
Weight distribution moments of random linear/coset codes. 127-138 - Gregory M. Zaverucha, Douglas R. Stinson:
Anonymity in shared symmetric key primitives. 139-160 - Cristina Fernández-Córdoba, Kevin T. Phelps:
On the minimum distance graph of an extended Preparata code. 161-168 - Eimear Byrne, Marcus Greferath, Axel Kohnert, Vitaly Skachek:
New bounds for codes over finite Frobenius rings. 169-179 - Denis S. Krotov:
On the binary codes with parameters of doubly-shortened 1-perfect codes. 181-194 - Seungkook Park:
Minimum distance of Hermitian two-point codes. 195-213 - Zhengchun Zhou, Xiaohu Tang:
Optimal and perfect difference systems of sets from q-ary sequences with difference-balanced property. 215-223
Volume 57, Number 3, December 2010
- Xiande Zhang, Gennian Ge:
H-designs with the properties of resolvability or (1, 2)-resolvability. 225-256 - Enes Pasalic, Pascale Charpin:
Some results concerning cryptographically significant mappings over GF(2n). 257-269 - Chunpeng Wang, Xiao-song Chen:
On extended algebraic immunity. 271-281 - Panagiotis Rizomiliotis:
On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks. 283-292 - Jin Hong:
The cost of false alarms in Hellman and rainbow tradeoffs. 293-327 - Hyun Jin Kim:
Self-dual codes with automorphism of order 3 having 8 cycles. 329-346 - Giorgio Donati, Nicola Durante:
On the intersection of a Hermitian curve with a conic. 347-360 - Rasha Shaheen, Arne Winterhof:
Permutations of finite fields for check digit systems. 361-371 - Ulrich Dempwolff, Timo Neumann:
Geometric and design-theoretic aspects of semibent functions I. 373-381 - R. Julian R. Abel, Frank E. Bennett:
Existence of directed BIBDs with block size 7 and related perfect 5-deletion-correcting codes of length 7. 383-397
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.