5 | -- | 19 | Jovan Dj. Golic, Philip Hawkes. Vectorial Approach to Fast Correlation Attacks |
21 | -- | 45 | John P. McSorley, Nicholas C. K. Phillips, Walter D. Wallis, Joseph L. Yucas. Double Arrays, Triple Arrays and Balanced Grids |
47 | -- | 61 | Wen-Guey Tzeng, Zhi-Jia Tzeng. A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares |
63 | -- | 79 | Thierry P. Berger, Pierre Loidreau. How to Mask the Structure of Codes for a Cryptographic Use |
81 | -- | 109 | Olgica Milenkovic. Support Weight Enumerators and Coset Weight Distributions of Isodual Codes |
111 | -- | 117 | Florian Hess, Igor Shparlinski. On the Linear Complexity and Multidimensional Distribution of Congruential Generators over Elliptic Curves |
119 | -- | 152 | Daniel R. L. Brown. Generic Groups, Collision Resistance, and ECDSA |