173 | -- | 0 | Pascale Charpin, Gregory Kabatianski. Special Issue on Coding and Cryptography |
175 | -- | 188 | Jan Camenisch, Maciej Koprowski. Fine-grained forward-secure signature schemes without random oracles |
189 | -- | 201 | Sébastien Canard, Berry Schoenmakers, Martijn Stam, Jacques Traoré. List signature schemes |
202 | -- | 218 | Anne Canteaut, Magnus Daum, Hans Dobbertin, Gregor Leander. Finding nonnormal bent functions |
219 | -- | 233 | Paolo D Arco, Wataru Kishimoto, Douglas R. Stinson. Properties and constraints of cheating-immune secret sharing schemes |
234 | -- | 252 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci. Unconditionally secure key assignment schemes |
253 | -- | 269 | Ilya Dumer, Kirill Shabunov. Recursive error correction for general Reed-Muller codes |
270 | -- | 276 | Régis Dupont, Andreas Enge. Provably secure non-interactive key distribution based on pairings |
277 | -- | 293 | Sandy Ferret, Leo Storme. A classification result on weighted {::::delta::::::::v::::::::::µ::::+1::, ::::delta::::::::v::::::::::µ::::::;::::N::::, ::::p:::::::3:::}-minihypers |
294 | -- | 304 | Jürgen Freudenberger, Victor V. Zyablov. On the complexity of suboptimal decoding for list and decision feedback schemes |
305 | -- | 312 | Ernst M. Gabidulin, Nina I. Pilipchuk. Symmetric matrices and codes correcting rank errors beyond the [(::::d::::-1)/2] bound |
313 | -- | 325 | Xiang-dong Hou. Affinity of permutations of P::2:::::n::: |
326 | -- | 336 | Eike Kiltz, Arne Winterhof. Polynomial interpolation of cryptographic functions related to Diffie-Hellman and discrete logarithm problem |
337 | -- | 345 | Alexey S. Kuzmin, Viktor T. Markov, Alexander A. Nechaev, A. S. Neljubin. A generalization of the binary Preparata code |
346 | -- | 356 | San Ling, Chaoping Xing, Ferruh Özbudak. An explicit class of codes with good parameters and their duals |
357 | -- | 369 | Subhamoy Maitra, Enes Pasalic. A Maiorana-McFarland type construction for resilient Boolean functions on ::::n:::: variables (::::n:::: even) with nonlinearity >2:::::::n::::-1:::-2:::::::n::::/2:::+2:::::::n::::/2-2::: |
370 | -- | 381 | Ueli M. Maurer. Secure multi-party computation made simple |
382 | -- | 391 | Tommi Meskanen, Ari Renvall. A wrap error attack against NTRUEncrypt |
392 | -- | 398 | Ronan Quarez. Some subsets of points in the plane associated to truncated Reed-Muller codes with good parameters |
399 | -- | 412 | John A. Ryan, Patrick Fitzpatrick. Enumeration of inequivalent irreducible Goppa codes |
413 | -- | 419 | Ana Salagean. Repeated-root cyclic and negacyclic codes over a finite chain ring |
420 | -- | 436 | Hervé Sibert, Patrick Dehornoy, Marc Girault. Entity authentication schemes using braid word reduction |