


default search action
Designs, Codes and Cryptography, Volume 83
Volume 83, Number 1, April 2017
- Liqiang Peng, Lei Hu, Yao Lu, Jun Xu, Zhangjie Huang:

Cryptanalysis of Dual RSA. 1-21 - Hao Zheng, Yanxun Chang, Junling Zhou:

Direct constructions of large sets of Kirkman triple systems. 23-32 - Xiao-Nan Lu

, Masakazu Jimbo:
Affine-invariant strictly cyclic Steiner quadruple systems. 33-69 - Minquan Cheng, Hung-Lin Fu, Jing Jiang, Yuan-Hsun Lo

, Ying Miao:
Codes with the identifiable parent property for multimedia fingerprinting. 71-82 - Jaehyun Ahn, Dongseok Ka, Chengju Li:

Complete weight enumerators of a class of linear codes. 83-99 - Diego Napp

, Raquel Pinto
, Marisa Toste
:
On MDS convolutional codes over Zpr. 101-114 - Nicola Pace

, Angelo Sonnino
:
On linear codes admitting large automorphism groups. 115-143 - Esteban Landerreche, David Fernández-Duque:

A case study in almost-perfect security for unconditionally secure communication. 145-168 - Denis S. Krotov

:
On the automorphism groups of the Z2 Z4 -linear 1-perfect and Preparata-like codes. 169-177 - Xiaotian Chen, Yue Zhou

:
Asynchronous channel hopping systems from difference sets. 179-196 - Hongfeng Wu

, Li Zhu, Rongquan Feng, Siman Yang:
Explicit factorizations of cyclotomic polynomials over finite fields. 197-217 - Bocong Chen, Liren Lin, San Ling

, Hongwei Liu:
Three new classes of optimal frequency-hopping sequence sets. 219-232
Volume 83, Number 2, May 2017
- Daniele Bartoli

, Stefano Marcugini, Fernanda Pambianco:
On the completeness of plane cubic curves over finite fields. 233-267 - Angela Aguglia, Luca Giuzzi

:
Intersection sets, three-character multisets and associated codes. 269-282 - Margreta Kuijper

, Raquel Pinto
:
An iterative algorithm for parametrization of shortest length linear shift registers over finite chain rings. 283-305 - Ziling Heng, Qin Yue:

Evaluation of the Hamming weights of a class of linear codes based on Gauss sums. 307-326 - Mahdi Sajadieh

, Arash Mirzaei, Hamid Mala, Vincent Rijmen
:
A new counting method to bound the number of active S-boxes in Rijndael and 3D. 327-343 - Ignacio F. Rúa

:
Primitive semifields of order 24e. 345-356 - Bart Mennink:

Optimal collision security in double block length hashing with single length key. 357-406 - Yiyuan Luo, Xuejia Lai, Yujie Zhou:

Generic attacks on the Lai-Massey scheme. 407-423 - Jingxue Ma, Tao Zhang

, Tao Feng
, Gennian Ge:
Some new results on permutation polynomials over finite fields. 425-443 - Yupeng Jiang, Jiangshuai Yang:

On the number of irreducible linear transformation shift registers. 445-454 - Xiang Wang, Fang-Wei Fu:

On the snake-in-the-box codes for rank modulation under Kendall's τ -metric. 455-465 - Yonglin Hao, Willi Meier:

Truncated differential based known-key attacks on round-reduced SIMON. 467-492
Volume 83, Number 3, June 2017
- Tran van Trung:

Simple t-designs: a recursive construction for arbitrary t. 493-502 - Tao Zhang

, Gennian Ge:
Quantum MDS codes with large minimum distance. 503-517 - Elisa Gorla

, Maike Massierer
:
An optimal representation for the trace zero subgroup. 519-548 - Esmeralda Nastase, Papa A. Sissokho

:
The structure of the minimum size supertail of a subspace partition. 549-563 - Xinxin Fan, Adilet Otemissov, Francesco Sica

, Andrey Sidorenko:
Multiple point compression on elliptic curves. 565-588 - Jon-Lark Kim, Nari Lee:

A projection decoding of a binary extremal self-dual code of length 40. 589-609 - Aras Erzurumluoglu, David A. Pike

:
Twofold triple systems without 2-intersecting Gray codes. 611-631 - Lingfei Jin, Haibin Kan:

Construction of binary linear codes via rational function fields. 633-638 - Umberto Martínez-Peñas

:
On the roots and minimum rank distance of skew cyclic codes. 639-660 - Sergey Bereg

, Linda Morales, Ivan Hal Sudborough:
Extending permutation arrays: improving MOLS bounds. 661-683 - Victor J. W. Guo, Yiting Yang:

Proof of a conjecture of Kløve on permutation codes under the Chebychev distance. 685-690 - Chunming Tang, Can Xiang

, Keqin Feng:
Linear codes with few weights from inhomogeneous quadratic functions. 691-714 - Editor's note. 715-716


manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














