researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Appl. Algebra Eng. Commun. Comput.
Home
Index
Info
Volume
Volume
28
, Issue
6
457
--
467
Yun Gao
,
Jian Gao
,
Tingting Wu
,
Fang-Wei Fu
.
2-1〉
469
--
495
Zohreh Rajabi
,
Kazem Khashyarmanesh
.
Some cyclic codes from some monomials
497
--
525
Krzysztof Ziemianski
.
Spaces of directed paths on pre-cubical sets
527
--
533
Gerardo Vega
.
An improved method for determining the weight distribution of a family of q-ary cyclic codes
535
--
547
Xiaoni Du
,
Yunqi Wan
.
Linear codes from quadratic forms
Volume
28
, Issue
5
351
--
368
Michele Rossi
,
Lea Terracini
.
A numerical ampleness criterion via Gale duality
369
--
386
W. Fish
.
Binary codes and permutation decoding sets from the graph products of cycles
387
--
408
Miriam Abdón
,
Robert Rolland
.
Hamming distances from a function to all codewords of a Generalized Reed-Muller code of order one
409
--
424
T. Aaron Gulliver
,
Masaaki Harada
.
Performance of ternary double circulant, double twistulant, and self-dual codes
425
--
436
Riccardo Aragona
,
Riccardo Longo
,
Massimiliano Sala
.
Several proofs of security for a tokenization algorithm
437
--
456
Ulrich Oberst
.
A constructive test for exponential stability of linear time-varying discrete-time systems
Volume
28
, Issue
4
281
--
282
Marc Giusti
,
Kenza Guenda
.
Special issue "International Conference on Coding and Cryptography" Algiers, Algeria, November 2-5, 2015
283
--
294
Pierre-Louis Cayrel
,
Mohammed Meziani
,
Ousmane Ndiaye
,
Richard Lindner
,
Rosemberg Silva
.
A pseudorandom number generator based on worst-case lattice problems
295
--
309
Serhii Dyshko
.
Geometric approach to the MacWilliams Extension Theorem for codes over module alphabets
311
--
320
Fatmanur Gursoy
,
Elif Segah Oztas
,
Irfan Siap
.
Reversible DNA codes using skew polynomial rings
321
--
338
Jacques Patarin
.
Mirror theory and cryptography
339
--
350
Nuh Aydin
,
Nicholas Connolly
,
John Murphree
.
New binary linear codes from quasi-cyclic codes and an augmentation algorithm
Volume
28
, Issue
3
193
--
203
László Mérai
.
Predicting the elliptic curve congruential generator
205
--
214
Alexander Bors
.
On the dynamics of endomorphisms of finite groups
215
--
223
Dabin Zheng
,
Zhen Chen
.
s + L(x)
225
--
235
B. Panbehkar
,
H. Doostie
.
An automatic semigroup of languages
237
--
255
Thierry Mefenza
,
Damien Vergnaud
.
Polynomial interpolation of the Naor-Reingold pseudo-random function
257
--
279
Yogesh Kumar
,
P. R. Mishra
,
N. Rajesh Pillai
,
Rajendra Kumar Sharma
.
n
Volume
28
, Issue
2
99
--
108
Jiang Weng
,
Yunqi Dou
,
Chuangui Ma
.
New algorithm for the elliptic curve discrete logarithm problem with auxiliary inputs
109
--
130
Palash Sarkar
,
Shashank Singh 0001
.
A simple method for obtaining relations among factor basis elements for special hyperelliptic curves
131
--
153
Jian Gao
,
Fang-Wei Fu
,
Yun Gao
.
Some classes of linear codes over $$\mathbb {Z}_4+v\mathbb {Z}_4$$ and their applications to construct good and new $$\mathbb {Z}_4$$ -linear codes
155
--
176
Guangkui Xu
,
Xiwang Cao
,
Shanding Xu
.
Several classes of Boolean functions with few Walsh transform values
177
--
192
Haibo Hong
,
Licheng Wang
,
Haseeb Ahmad
,
Jun Shao
,
Yixian Yang
.
Minimal logarithmic signatures for one type of classical groups
Volume
28
, Issue
1
1
--
10
Florian Luca
,
Pantelimon Stanica
.
Counting permutation equivalent degree six binary polynomials invariant under the cyclic group
11
--
30
Chengju Li
,
Qin Yue
,
Fang-Wei Fu
.
A construction of several classes of two-weight and three-weight linear codes
31
--
78
Graham H. Norton
.
On the annihilator ideal of an inverse form
79
--
97
Jon-Lark Kim
,
Nari Lee
.
Secret sharing schemes based on additive codes over GF(4)