default search action
Designs, Codes and Cryptography, Volume 48, 2008
Volume 48, Number 1, July 2008
- Eimear Byrne, Marcus Greferath, Thomas Honold:
Ring geometries, two-weight codes, and strongly regular graphs. 1-16 - Dameng Deng, Rolf S. Rees, Hao Shen:
On the existence of nearly Kirkman triple systems with subsystems. 17-33 - Landang Yuan, Qingde Kang:
Another construction for large sets of Kirkman triple systems. 35-42 - Sunghyu Han, Jon-Lark Kim:
On self-dual codes over F5. 43-58 - L. Ji:
2-idempotent 3-quasigroups with a conjugate invariant subgroup consisting of a single cycle of length four. 59-68 - Andrew Blinco, Saad I. El-Zanati, G. F. Seelinger, Papa Amar Sissokho, L. E. Spence, Charles Vanden Eynden:
On vector space partitions and uniformly resolvable designs. 69-77 - Oded Blayer, Tamir Tassa:
Improved versions of Tardos' fingerprinting scheme. 79-103 - Koen Thas:
Note on the existence of translation nets. 105-107
Volume 48, Number 2, August 2008
- Cunsheng Ding, Tor Helleseth, Øyvind Ytrehus:
Preface. 109-110 - Zihui Liu, Wende Chen, Yuan Luo:
The relative generalized Hamming weight of linear q -ary codes and their subcodes. 111-123 - Shu-Tao Xia, Fang-Wei Fu:
Undetected error probability of q -ary constant weight codes. 125-140 - Khmaies Ouahada, Theo G. Swart, Hendrik C. Ferreira, Ling Cheng:
Binary permutation sequences as subsets of Levenshtein codes, spectral null codes, run-length limited codes and constant weight codes. 141-154 - Radinka Yorgova, Alfred Wassermann:
Binary self-dual codes with automorphisms of order 23. 155-164 - Gerzson Kéri, Patric R. J. Östergård:
On the minimum size of binary codes with length 2 R + 4 and covering radius R. 165-169 - Ernst M. Gabidulin:
Attacks and counter-attacks on the GPT public key cryptosystem. 171-177 - Constanza Riera, Stéphane Jacob, Matthew Geoffrey Parker:
From graph states to two-graph states. 179-206
Volume 48, Number 3, September 2008
- A. J. van Zanten, Loeky Haryanto:
Sets of disjoint snakes based on a Reed-Muller code and covering the hypercube. 207-229 - Michel Lavrauw, Leo Storme, Geertrui Van de Voorde:
On the code generated by the incidence matrix of points and hyperplanes in PG(n, q) and its dual. 231-245 - Jong Yoon Hyun, Hyun Kwang Kim:
Maximum distance separable poset codes. 247-261 - Alan R. Prince:
Further translation planes of order 192 admitting SL(2, 5), obtained by nest replacement. 263-267 - Andreas Klein:
Attacks on the RC4 stream cipher. 269-286 - Hans Ludwig de Vries:
On orthogonal resolutions of the classical Steiner quadruple system SQS(16). 287-292 - Zheng Gong, Xuejia Lai, Kefei Chen:
A synthetic indifferentiability analysis of some block-cipher-based hash functions. 293-305 - Ulrich Dempwolff, William M. Kantor:
Distorting symmetric designs. 307-322 - Olav Geil:
On the second weight of generalized Reed-Muller codes. 323-330 - Jianmin Wang:
Some combinatorial constructions for optimal perfect deletion-correcting codes. 331-347
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.