


default search action
Designs, Codes and Cryptography, Volume 36, 2005
Volume 36, Number 1, July 2005
- Susan G. Barwick  , Wen-Ai Jackson, Keith M. Martin: , Wen-Ai Jackson, Keith M. Martin:
 A General Approach to Robust Web Metering. 5-27
- John C. Galati: 
 On the Non-existence of Semiregular Relative Difference Sets in Groups with All Sylow Subgroups Cyclic. 29-31
- Mathieu Ciet, Marc Joye: 
 Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. 33-43
- Carl Bracken, Gary McGuire: 
 Characterization of SDP Designs That Yield Certain Spin Models. 45-52
- Iuon-Chang Lin, Min-Shiang Hwang, Chin-Chen Chang: 
 The General Pay-Word: A Micro-payment Scheme Based on n-dimension One-way Hash Chain. 53-67
- Jacob Löfvenberg: 
 Binary Fingerprinting Codes. 69-81
- L. Ji, Dianhua Wu, Lei Zhu: 
 Existence of Generalized Steiner Systems GS(2, 4, v, 2). 83-99
- Jörg Eisfeld, Leo Storme  , Péter Sziklai: , Péter Sziklai:
 On the Spectrum of the Sizes of Maximal Partial Line Spreads in PG(2n, q), n >= 3. 101-110
Volume 36, Number 2, August 2005
- Joris De Kaey: 
 On a More General Characterisation of Steiner Systems. 117-129
- Philippe Langevin, Jean-Pierre Zanotti: 
 Nonlinearity of Some Invariant Boolean Functions. 131-146
- F. L. Chiera: 
 Type II Codes over Z/2kZ, Invariant Rings and Theta Series. 147-158
- Shenglin Zhou: 
 Block Primitive 2-(v, k, 1) Designs Admitting a Ree Group of Characteristic Two. 159-169
- Ka Hin Leung, Bernhard Schmidt: 
 The Field Descent Method. 171-188
- Claude Carlet: 
 Concatenating Indicators of Flats for Designing Cryptographic Functions. 189-202
- Vikram Jha: 
 Local Schur's Lemma and Commutative Semifields. 203-216
Volume 36, Number 3, September 2005
- Manish K. Gupta  , Mahesh C. Bhandari, Arbind K. Lal: , Mahesh C. Bhandari, Arbind K. Lal:
 On Linear Codes over Z2s. 227-244
- Ezra Brown, Bruce T. Myers, Jerome A. Solinas: 
 Hyperelliptic Curves with Compact Parameters. 245-261
- Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild: 
 Distributing the Encryption and Decryption of a Block Cipher. 263-287
- E. J. Cheon, Takao Kato, Seon Jeong Kim: 
 Nonexistence of [n, 5, d]q Codes Attaining the Griesmer Bound for q4-2q2-2q+1 <= d <= q4-2q2-q. 289-299
- Juan Manuel González Nieto, Colin Boyd, Ed Dawson  : :
 A Public Key Cryptosystem Based On A Subgroup Membership Problem. 301-316
- Pascal Véron  : :
 Proof of Conjectures on the True Dimension of Some Binary Goppa Codes. 317-325
- Patric R. J. Östergård: 
 Two New Four-Error-Correcting Binary Codes. 327-329
- Stephen D. Cohen  : :
 Finite Field Elements with Specified Order and Traces. 331-340

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














