default search action
Designs, Codes and Cryptography, Volume 43, 2007
Volume 43, Number 1, April 2007
- Shane Kelly:
Constructions of intriguing sets of polar spaces from field reduction and derivation. 1-8 - Fang-Wei Fu, Shu-Tao Xia:
The characterization of binary constant weight codes meeting the bound of Fu and Shen. 9-20 - Nikias de Feyter:
Classification of (0, 2)-geometries embedded in AG (3, q). 21-32 - Andrea Caggegi, Giovanni Falcone:
On 2-(n2, 2n, 2n-1) designs with three intersection numbers. 33-40 - Sabine Giese, Ralph-Hardo Schulz:
Divisible designs with dual translation group. 41-45 - Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama:
Low-density attack revisited. 47-59
Volume 43, Numbers 2-3, June 2007
- Aggelos Kiayias, Moti Yung:
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. 61-78 - Jonathan Jedwab, Matthew Geoffrey Parker:
There are no Barker arrays having more than two dimensions. 79-84 - Igor Gashkov, J. A. O. Ekberg, D. Taub:
A geometric approach to finding new lower bounds of A(n, d, w). 85-91 - Ji-Woong Jang, Jong-Seon No, Habong Chung:
Butson Hadamard matrices with partially cyclic core. 93-101 - John Arhin:
On the structure of 1-designs with at most two block intersection numbers. 103-114 - Lijun Ji:
A construction for large sets of disjoint Kirkman triple systems. 115-122 - E. J. Cheon, Tatsuya Maruta:
On the minimum length of some linear codes. 123-135 - Maria Bras-Amorós:
Algebraic-geometry codes, one-point codes, and evaluation codes. 137-145 - Bahattin Yildiz:
Weights modulo p e of linear codes over rings. 147-165 - Wen-Ai Jackson, S. Murphy:
Projective aspects of the AES inversion. 167-179
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.