Journal: Des. Codes Cryptography

Volume 38, Issue 3

311 -- 329Norifumi Kamiya, Marc P. C. Fossorier. Quasi-Cyclic Codes from a Finite Affine Plane
331 -- 336Petri Rosendahl. A Generalization of Niho s Theorem
337 -- 361San Ling, Harald Niederreiter, Patrick Solé. On the Algebraic Structure of Quasi-cyclic Codes IV: Repeated Roots
363 -- 372Vince Grolmusz. Co-Orthogonal Codes
373 -- 381Jinhua Wang. A New Class of Optimal 3-splitting Authentication Codes
383 -- 393Annegret Weng. A Low-Memory Algorithm for Point Counting on Picard Curves
395 -- 397Omran Ahmadi. Self-Reciprocal Irreducible Pentanomials Over F::2::
399 -- 415Benjamin Arazi. Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard

Volume 38, Issue 2

159 -- 178Wilfried Meidl, Arne Winterhof. Some Notes on the Linear Complexity of Sidel nikov-Lempel-Cohn-Eastman Sequences
179 -- 194Frank De Clerck, Stefaan De Winter, Elisabeth Kuijken, Cristina Tonesi. Distance-Regular (0, ::::alpha::::)-Reguli
195 -- 208Sara Cauchie. A Characterization of the Complement of a Hyperbolic Quadric in PG (3, ::::q::::), for ::::q:::: Odd
209 -- 217Michael Scott, Paulo S. L. M. Barreto. Generating More MNT Elliptic Curves
219 -- 236Gwoboa Horng, Tzungher Chen, Du-shiau Tsai. Cheating in Visual Cryptography
237 -- 257Ari Juels, Madhu Sudan. A Fuzzy Vault Scheme
259 -- 277Douglas R. Stinson. Some Observations on the Theory of Cryptographic Hash Functions
279 -- 295Khoongming Khoo, Guang Gong, Douglas R. Stinson. A New Characterization of Semi-bent and Bent Functions on Finite Fields*
297 -- 308Eric Merchant. Exponentially Many Hadamard Designs

Volume 38, Issue 1

5 -- 16Masaaki Harada. Self-Orthogonal 3-(56, 12, 65) Designs and Extremal Doubly-Even Self-Dual Codes of Length 56
17 -- 29Mehmet Ozen, Irfan Siap. Linear Codes over F::q::[u]/(u:::s:::) with Respect to the Rosenbloom-Tsfasman Metric
31 -- 40T. Alderson. (6, 3)-MDS Codes over an Alphabet of Size 4
41 -- 53Jean-SĂ©bastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern. Index Calculation Attacks on RSA Signature and Encryption
55 -- 81Masaaki Homma, Seon Kim. The Two-Point Codes on a Hermitian Curve with the Designed Minimum Distance
83 -- 95L. Ji. Asymptotic Determination of the Last Packing Number of Quadruples
97 -- 112Steven T. Dougherty, T. Aaron Gulliver, Manabu Oura. Higher Weights for Ternary and Quaternary Self-Dual Codes*
113 -- 123Michel Lavrauw. Sublines of Prime Order Contained in the Set of Internal Points of a Conic
125 -- 129Olof Heden. A Full Rank Perfect Code of Length 31
131 -- 145Simeon Ball, Patrick Govaerts, Leo Storme. On Ovoids of Parabolic Quadrics
147 -- 155A. Caranti, Francesca Dalla Volta. The Round Functions of Cryptosystem PGM Generate the Symmetric Group