Abstract is missing.
- Second Support Weights for Binary Self-dual CodesKeisuke Shiromoto. 1-13 [doi]
- On Codes Correcting Symmetric Rank ErrorsNina I. Pilipchuk, Ernst M. Gabidulin. 14-21 [doi]
- Error and Erasure Correction of Interleaved Reed-Solomon CodesGeorg Schmidt, Vladimir Sidorenko, Martin Bossert. 22-35 [doi]
- A Welch-Berlekamp Like Algorithm for Decoding Gabidulin CodesPierre Loidreau. 36-45 [doi]
- On the Weights of Binary Irreducible Cyclic CodesYves Aubry, Philippe Langevin. 46-54 [doi]
- 3-Designs from Z::4::-Goethals-Like Codes and Variants of Cyclotomic PolynomialsJyrki T. Lahtonen, Kalle Ranto, Roope Vehkalahti. 55-68 [doi]
- Space-Time Code Designs Based on the Generalized Binary Rank Criterion with Applications to Cooperative DiversityA. Roger Hammons Jr.. 69-84 [doi]
- Geometric Conditions for the Extendability of Ternary Linear CodesTatsuya Maruta, Kei Okamoto. 85-99 [doi]
- On the Design of Codes for DNA ComputingOlgica Milenkovic, Navin Kashyap. 100-119 [doi]
- Open Problems Related to Algebraic Attacks on Stream CiphersAnne Canteaut. 120-134 [doi]
- On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic TwoNina Brandstätter, Tanja Lange, Arne Winterhof. 135-143 [doi]
- Interpolation of Functions Related to the Integer Factoring ProblemClemens Adelmann, Arne Winterhof. 144-154 [doi]
- On Degrees of Polynomial Interpolations Related to Elliptic Curve CryptographyTakakazu Satoh. 155-163 [doi]
- Finding Good Differential Patterns for Attacks on SHA-1Krystian Matusiewicz, Josef Pieprzyk. 164-177 [doi]
- Extending Gibson s Attacks on the GPT CryptosystemRaphael Overbeck. 178-188 [doi]
- Reduction of Conjugacy Problem in Braid Groups, Using Two Garside StructuresMaffre Samuel. 189-201 [doi]
- A New Key Assignment Scheme for Access Control in a Complete Tree HierarchyAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci. 202-217 [doi]
- Multi-Dimensional Hash Chains and Application to Micropayment SchemesQuan Son Nguyen. 218-228 [doi]
- On the Affine Transformations of HFE-Cryptosystems and Systems with BranchesPatrick Felke. 229-241 [doi]
- Dimension of the Linearization Equations of the Matsumoto-Imai CryptosystemsAdama Diene, Jintai Ding, Jason E. Gower, Timothy J. Hodges, Zhijun Yin. 242-251 [doi]
- RSA-Based Secret HandshakesDamien Vergnaud. 252-274 [doi]
- On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting CodesVentzislav Nikov, Svetla Nikova. 275-290 [doi]
- ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear MapsLihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi. 291-303 [doi]
- A New Public-Key Cryptosystem Based on the Problem of Reconstructing ::::p::::-PolynomialsCédric Faure, Pierre Loidreau. 304-315 [doi]
- On the Wagner-Magyarik CryptosystemFrançoise Levy-dit-Vehel, Ludovic Perret. 316-329 [doi]
- Constructions of Complementary Sequences for Power-Controlled OFDM TransmissionKai-Uwe Schmidt, Adolf Finger. 330-345 [doi]
- A Novel Method for Constructing Almost Perfect Polyphase SequencesXiangyong Zeng, Lei Hu, Qingchong Liu. 346-353 [doi]
- Linear Filtering of Nonlinear Shift-Register SequencesBerndt M. Gammel, Rainer Göttfert. 354-370 [doi]
- Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level AutocorrelationNam Yul Yu, Guang Gong. 371-385 [doi]
- Frequency/Time Hopping Sequences with Large Linear ComplexitiesYun-Pyo Hong, Hong-Yeop Song. 386-396 [doi]
- One and Two-Variable Interlace Polynomials: A Spectral InterpretationConstanza Riera, Matthew G. Parker. 397-411 [doi]
- Improved Bounds on Weil Sums over Galois Rings and Homogeneous WeightsSan Ling, Ferruh Özbudak. 412-426 [doi]
- Locally Invertible Multivariate Polynomial MatricesRuben G. Lobo, Donald L. Bitzer, Mladen A. Vouk. 427-441 [doi]