- Robert J. McEliece, Edwin Soedarmadji:
On Generalized Parity Checks. AAECC 2006: 29-34 - Simon McNicol, Serdar Boztas
, Asha Rao
:
Traitor Tracing Against Powerful Attacks Using Combinatorial Designs. AAECC 2006: 215-224 - Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. AAECC 2006: 203-214 - Tatsuaki Okamoto:
Cryptography Based on Bilinear Maps. AAECC 2006: 35-50 - Kevin T. Phelps, Josep Rifà
, Mercè Villanueva
:
Hadamard Codes of Length 2ts (s Odd). Rank and Kernel. AAECC 2006: 328-337 - Florina Piroi
, Arne Winterhof
:
Quantum Period Reconstruction of Binary Sequences. AAECC 2006: 60-67 - Kalle Ranto, Petri Rosendahl:
The Solutions of the Third Power Sum Equation for Niho Type Decimations. AAECC 2006: 101-107 - Pradeep Kiran Sarvepalli
, Andreas Klappenecker:
Nonbinary Quantum Codes from Hermitian Curves. AAECC 2006: 136-143 - Hans Georg Schaathun, Gérard D. Cohen:
Nested Codes for Constrained Memory and for Dirty Paper. AAECC 2006: 307-316 - Moshe Schwartz, Alexander Vardy
:
New Bounds on the Capacity of Multi-dimensional RLL-Constrained Systems. AAECC 2006: 225-234 - Nobuyuki Sugio, Shunichi Nambu, Toshinobu Kaneko:
A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI. AAECC 2006: 163-172 - Ying Yu Tai, Lingqi Zeng, Lan Lan, Shumei Song, Shu Lin, Khaled A. S. Abdel-Ghaffar:
Algebraic Construction of Quasi-cyclic LDPC Codes - Part II: For AWGN and Binary Random and Burst Erasure Channels. AAECC 2006: 265-274 - Li-Ping Wang:
The Vector Key Equation and Multisequence Shift Register Synthesis. AAECC 2006: 68-75 - Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura
, Hideki Imai:
Applying Fujisaki-Okamoto to Identity-Based Encryption. AAECC 2006: 183-192 - Marc P. C. Fossorier, Hideki Imai, Shu Lin, Alain Poli:
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings. Lecture Notes in Computer Science 3857, Springer 2006, ISBN 3-540-31423-7 [contents] - 2003
- Olivier Billet
, Marc Joye:
The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. AAECC 2003: 34-42 - Athanasios Bouganis:
Error Correcting Codes over Algebraic Surfaces. AAECC 2003: 169-179 - Athanasios Bouganis, Drue Coles:
A Geometric View of Decoding AG Codes. AAECC 2003: 180-190 - Maria Bras-Amorós
:
Improvements to Evaluation Codes and New Characterizations of Arf Semigroups. AAECC 2003: 204-215 - Eric Brier, Marc Joye:
Fast Point Multiplication on Elliptic Curves through Isogenies. AAECC 2003: 43-50 - Rodrigo Gusmão Cavalcante, Reginaldo Palazzo Júnior:
Performance Analysis of M-PSK Signal Constellations in Riemannian Varieties. AAECC 2003: 191-203 - Cunsheng Ding, Arto Salomaa, Patrick Solé, Xiaojian Tian:
Three Constructions of Authentication/Secrecy Codes. AAECC 2003: 24-33 - Ivana Djurdjevic, Jun Xu, Khaled A. S. Abdel-Ghaffar, Shu Lin:
A Class of Low-Density Parity-Check Codes Constructed Based on Reed-Solomon Codes with Two Information Symbols. AAECC 2003: 98-107 - Sylvia B. Encheva, Gérard D. Cohen:
Copyright Control and Separating Systems. AAECC 2003: 79-86 - Andreas Enge, François Morain:
Fast Decomposition of Polynomials with Known Galois Group. AAECC 2003: 254-264 - Fabien Galand:
On the Minimum Distance of Some Families of Z2k-Linear Codes. AAECC 2003: 235-243 - Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko:
An Optimized Algebraic Method for Higher Order Differential Attack. AAECC 2003: 61-70 - Kathy J. Horadam:
Differentially 2-Uniform Cocycles - The Binary Case. AAECC 2003: 150-157 - Heeralal Janwa:
Good Expander Graphs and Expander Codes: Parameters and Decoding. AAECC 2003: 119-128 - L. S. Kazarin, V. M. Sidelnikov, Igor Gashkov:
Relative Duality in MacWilliams Identity. AAECC 2003: 108-118