Journal: Des. Codes Cryptography

Volume 37, Issue 3

367 -- 389Susan G. Barwick, Wen-Ai Jackson. An Optimal Multisecret Threshold Scheme Construction
391 -- 404A. Ya. Dorofeev, L. S. Kazarin, V. M. Sidelnikov, M. E. Tuzhilin. Matrix Groups Related to the Quaternion Group and Spherical Orbit Codes
405 -- 419G. Belyavskaya, V. Izbash, G. Mullen. Check Character Systems Using Quasigroups: II
421 -- 434E. J. Cheon, T. Kato, S. Kim. On the Minimum Length of some Linear Codes of Dimension 5
435 -- 448A. De Wispelaere, Hendrik Van Maldeghem. Codes from Generalized Hexagons
449 -- 464Claude Carlet, Joseph L. Yucas. Piecewise Constructions of Bent and Almost Optimal Boolean Functions
465 -- 471T. Aaron Gulliver, Masaaki Harada, Takuji Nishimura, Patric R. J. Östergård. Near-Extremal Formally Self-Dual Even Codes of Lengths 24 and 32
473 -- 492Gretchen L. Matthews. Weierstrass Semigroups and Codes from a Quotient of the Hermitian Curve
493 -- 507Omran Ahmadi, Alfred Menezes. On the Number of Trace-One Elements in Polynomial Bases for F::2:::n:::::
509 -- 524Jens-Matthias Bohli, Rainer Steinwandt, Maria Isabel Gonzalez Vasco, Consuelo Martínez. Weak Keys in ::::MST::::::1::
525 -- 528Chihiro Suetake. The Existence of a Symmetric Transversal Design ::::STD::::::7::[21; 3]

Volume 37, Issue 2

195 -- 210Miin Huey Ang, Siu Lun Ma. Symmetric Weighing Matrices Constructed using Group Matrices
211 -- 214Jürgen Bierbrauer, Yves Edel. A Family of Binary (::::t::::, ::::m::::, ::::s::::)-Nets of Strength 5
215 -- 227G. B. Belyavskaya, V. I. Izbash, Gary L. Mullen. Check Character Systems using Quasigroups: I
229 -- 242Reihaneh Safavi-Naini, Chris Charnes. MRD Hashing
243 -- 261Kevin T. Phelps, Josep Rifà, Mercè Villanueva. Kernels and ::::p::::-Kernels of ::::p:::::::::::r:::::::-ary 1-Perfect Codes
263 -- 280Bart De Bruyn. Slim Near Polygons
281 -- 292Jianxing Yin. Cyclic Difference Packing and Covering Arrays
293 -- 304Chihiro Suetake. The Classification of Symmetric Transversal Designs ::::STD::::::4::[12; 3] s
305 -- 312Antonino Giorgio Spera. Asymptotically Good Codes from Generalized Algebraic-Geometry Codes
313 -- 318John P. McSorley. Double Arrays, Triple Arrays and Balanced Grids with ::::v::::=::::r::::+::::c:::: - 1
319 -- 346Pascale Charpin, Enes Pasalic. Highly Nonlinear Resilient Functions Through Disjoint Codes in Projective Spaces
347 -- 353Rajendra M. Pawale. Non Existence of Triangle Free Quasi-symmetric Designs
355 -- 358Masaaki Harada. Remark on a 5-Design Related to a Putative Extremal Doubly-Even Self-Dual [96, 48, 20] Code

Volume 37, Issue 1

5 -- 13Anka Golemac, Tanja Vucicic, Josko Mandic. One (96, 20, 4)-symmetric Design and related Nonabelian Difference Sets
15 -- 29A. J. van Zanten, I. Nengah Suparta. On the Construction of Linear ::::q::::-ary Lexicodes
31 -- 43Philippe Langevin, Pascal Véron. On the Non-linearity of Power Functions
45 -- 60Gerzson Kéri, Patric R. J. Östergård. Bounds for Covering Codes over Large Alphabets
61 -- 80Alexander A. Davydov, Giorgio Faina, Fernanda Pambianco. Constructions of Small Complete Caps in Binary Projective Spaces
81 -- 109John Malone-Lee. Signcryption with Non-interactive Non-repudiation
111 -- 132Masaaki Homma, Seon Jeong Kim. Toward the Determination of the Minimum Distance of Two-Point Codes on a Hermitian Curve
133 -- 141Friederike Brezing, Annegret Weng. Elliptic Curves Suitable for Pairing Based Cryptography
143 -- 149Behruz Tayfeh-Rezaie. On the Existence of Large Sets of ::::t::::-designs of Prime Sizes
151 -- 167Rudolf Ahlswede, Harout K. Aydinian, Levon H. Khachatrian. Forbidden (0, 1)-vectors in Hyperplanes of R:::n:::: The unrestricted case
169 -- 186Pim Tuyls, Henk D. L. Hollmann, Jack H. van Lint, Ludo M. G. M. Tolhuizen. XOR-based Visual Cryptography Schemes