default search action
Designs, Codes and Cryptography, Volume 70
Volume 70, Numbers 1-2, January 2014
- Joaquim Borges, Mercè Villanueva, Victor A. Zinoviev:
Editorial: 3rd International Castle Meeting on Coding Theory and Applications. 1-2 - David Auger, Gérard D. Cohen, Sihem Mesnager:
Sphere coverings and identifying codes. 3-7 - Sabine Kampf:
Bounds on collaborative decoding of interleaved Hermitian codes and virtual extension. 9-25 - Padmapani Seneviratne:
Codes associated with circulant graphs and permutation decoding. 27-33 - Dina Ghinelli, Jennifer D. Key, T. P. McDonough:
Hulls of codes from incidence matrices of connected regular graphs. 35-54 - Vladimir Sidorenko, Martin Bossert:
Fast skew-feedback shift-register synthesis. 55-67 - Anton Malevich, Wolfgang Willems:
On the classification of the extremal self-dual codes over small fields with 2-transitive automorphism groups. 69-76 - Carlos A. Araújo, Italo J. Dejter, Peter Horák:
A generalization of Lee codes. 77-90 - Kathryn Haymaker, Christine A. Kelley:
Geometric WOM codes and coding strategies for multilevel flash memories. 91-104 - Jaume Pernas, Jaume Pujol, Mercè Villanueva:
Characterization of the automorphism group of quaternary linear Hadamard codes. 105-115 - Maria Bras-Amorós, Albert Vico-Oton:
On the Geil-Matsumoto bound and the length of AG codes. 117-125 - Thomas Feulner:
Classification and nonexistence results for linear codes with prescribed minimum distances. 127-138 - Joaquim Borges, Josep Rifà, Victor A. Zinoviev:
New families of completely regular codes and their corresponding distance regular coset graphs. 139-148 - Martin Tomlinson, Mubarak Jibril, Cen Tjhai, Markus Grassl, Mohammed Zaki Ahmed:
New binary codes from extended Goppa codes. 149-156 - Fernando Piñero, Heeralal Janwa:
On the subfield subcodes of Hermitian codes. 157-173 - José Joaquín Bernal, Juan Jacobo Simón:
Information sets in abelian codes: defining sets and Groebner basis. 175-188 - Carlos Galindo, Francisco Monserrat:
Evaluation codes defined by finite families of plane valuations at infinity. 189-213 - Irene Marquez Corbella, Edgar Martínez-Moro, Ruud Pellikaan:
On the unique representation of very strong algebraic geometry codes. 215-230 - Eraj Khan, Ernst M. Gabidulin, Bahram Honary, Hassan Ahmed:
Modified Niederreiter type of GPT cryptosystem based on reducible rank codes. 231-239 - Telma Pinho, Raquel Pinto, Paula Rocha:
Realization of 2D convolutional codes of rate $$\frac{1}{n}$$ by separable Roesser models. 241-250
Volume 70, Number 3, March 2014
- Kota Ideguchi, Elmar Tischhauser, Bart Preneel:
Internal differential collision attacks on the reduced-round Grøstl-0 hash function. 251-271 - Junhua Wu:
Proofs of two conjectures on the dimensions of binary codes. 273-304 - Soohak Choi, Jong Yoon Hyun, Hyun Kwang Kim:
Local duality theorem for q-ary 1-perfect codes. 305-311 - Myung-Kyu Lee, Kyeongcheol Yang:
The exponent of a polarizing matrix constructed from the Kronecker product. 313-322 - Javier Herranz, Alexandre Ruiz, Germán Sáez:
Signcryption schemes with threshold unsigncryption, and applications. 323-345 - Aicha Batoul, Kenza Guenda, T. Aaron Gulliver:
On self-dual cyclic codes over finite chain rings. 347-358 - Qun-Xiong Zheng, Wen-Feng Qi, Tian Tian:
On the distinctness of modular reductions of primitive sequences over Z/(232-1). 359-368 - Andrey Bogdanov, Vincent Rijmen:
Linear hulls with correlation zero and linear cryptanalysis of block ciphers. 369-383 - Ferruh Özbudak, Burcu Gülmez Temur:
Finite number of fibre products of Kummer covers and curves with many points over finite fields. 385-404 - Delphine Boucher, Felix Ulmer:
Linear codes using skew polynomials with automorphisms and derivations. 405-431
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.