Journal: Des. Codes Cryptography

Volume 12, Issue 3

213 -- 0Evangelos Kranakis, Paul C. van Oorschot. Special Issue: Selected Areas in Cryptography - Introduction
215 -- 243Douglas R. Stinson. On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption
245 -- 251N. Rogier, Pascal Chauvaud. MD2 Is not Secure without the Checksum Byte
253 -- 266Vincent Rijmen, Bart Preneel, Erik De Win. On Weaknesses of Non-surjective Round Functions
267 -- 282J. Lee, Howard M. Heys, Stafford E. Tavares. Resistance of a CAST-Like Encryption Algorithm to Linear and Differential Cryptanalysis
283 -- 316Carlisle M. Adams. Constructing Symmetric Ciphers Using the CAST Design Procedure

Volume 12, Issue 2

107 -- 130Hanno Lefmann, Pavel Pudlák, Petr Savický. On Sparse Parity Check Matrices
131 -- 160Vladimir I. Levenshtein. Split Orthogonal Arrays and Maximum Independent Resilient Systems of Functions
161 -- 201Marten van Dijk. A Linear Construction of Secret Sharing Schemes

Volume 12, Issue 1

5 -- 11Iliya Boukliev. Some New Optimal Ternary Linear Codes
13 -- 37Mike Burmester, Yvo Desmedt, Fred Piper, Michael Walker. A General Zero-Knowledge Scheme
39 -- 48Stefka Buyuklieva. On the Binary Self-Dual Codes with an Automorphism of Order 2
49 -- 58Robert Craigen, Hadi Kharaghani. Hadamard Matrices from Weighing Matrices via Signed Groups
59 -- 67F. Franek, Alexander Rosa, Terry S. Griggs. Large Sets of Mutually Almost Disjoint Steiner Triple Systems Not From Steiner Quadruple Systems
69 -- 73John L. Hayden. Generalized Hadamard Matrices
75 -- 82Xiang-dong Hou. The Reed-Muller Code R(1, 7) Is Normal
83 -- 87Tatsuya Maruta. On the Achievement of the Griesmer Bound
89 -- 96Leo Storme. Normal Rational Curves over Prime Fields