researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Des. Codes Cryptography
Home
Index
Info
Volume
Volume
12
, Issue
3
213
--
0
Evangelos Kranakis
,
Paul C. van Oorschot
.
Special Issue: Selected Areas in Cryptography - Introduction
215
--
243
Douglas R. Stinson
.
On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption
245
--
251
N. Rogier
,
Pascal Chauvaud
.
MD2 Is not Secure without the Checksum Byte
253
--
266
Vincent Rijmen
,
Bart Preneel
,
Erik De Win
.
On Weaknesses of Non-surjective Round Functions
267
--
282
J. Lee
,
Howard M. Heys
,
Stafford E. Tavares
.
Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis
283
--
316
Carlisle M. Adams
.
Constructing Symmetric Ciphers Using the CAST Design Procedure
Volume
12
, Issue
2
107
--
130
Hanno Lefmann
,
Pavel Pudlák
,
Petr Savický
.
On Sparse Parity Check Matrices
131
--
160
Vladimir I. Levenshtein
.
Split Orthogonal Arrays and Maximum Independent Resilient Systems of Functions
161
--
201
Marten van Dijk
.
A Linear Construction of Secret Sharing Schemes
Volume
12
, Issue
1
5
--
11
Iliya Boukliev
.
Some New Optimal Ternary Linear Codes
13
--
37
Mike Burmester
,
Yvo Desmedt
,
Fred Piper
,
Michael Walker
.
A General Zero-Knowledge Scheme
39
--
48
Stefka Buyuklieva
.
On the Binary Self-Dual Codes with an Automorphism of Order 2
49
--
58
Robert Craigen
,
Hadi Kharaghani
.
Hadamard Matrices from Weighing Matrices via Signed Groups
59
--
67
F. Franek
,
Alexander Rosa
,
Terry S. Griggs
.
Large Sets of Mutually Almost Disjoint Steiner Triple Systems Not From Steiner Quadruple Systems
69
--
73
John L. Hayden
.
Generalized Hadamard Matrices
75
--
82
Xiang-dong Hou
.
The Reed-Muller Code R(1, 7) Is Normal
83
--
87
Tatsuya Maruta
.
On the Achievement of the Griesmer Bound
89
--
96
Leo Storme
.
Normal Rational Curves over Prime Fields