Journal: Des. Codes Cryptography

Volume 40, Issue 3

255 -- 267Mausumi Bose, Rahul Mukerjee. Optimal (2, ::::n::::) visual cryptographic schemes
269 -- 284Brendan D. McKay, Jeanette C. McLeod, Ian M. Wanless. The number of transversals in a Latin square
285 -- 302Christopher Wolf, An Braeken, Bart Preneel. On the security of stepwise triangular systems
303 -- 317Gennian Ge, Ying Miao, L. Zhu. GOB designs for authentication codes with arbitration
319 -- 333Olof Heden, Martin Hessler. On the classification of perfect codes: side class structures
335 -- 341David G. Glynn, Johannes G. Maks, Rey Casse. The polynomial degree of the Grassmannian ::::G::::(1, ::::n, q::::) of lines in finite projective space ::::PG::::(::::n, q::::)
343 -- 356Sean V. Droms, Keith E. Mellinger, Chris Meyer. LDPC codes generated by conics in the classical projective plane
357 -- 367Peter Horák, Bader F. AlBdaiwi. Fast decoding of quasi-perfect Lee distance codes
369 -- 374Hassan Aly, Arne Winterhof. On the ::::k::::-error linear complexity over /mathbb::::F::::::::::p:::::: of Legendre and Sidelnikov sequences

Volume 40, Issue 2

139 -- 155Yen-Ying Huang, Shi-Chun Tsai, Hsin-Lung Wu. On the Construction of Permutation Arrays via Mappings from Binary Vectors to Permutations
157 -- 165Cunsheng Ding, Jianxing Yin. A Construction of Optimal Constant Composition Codes
167 -- 185Yanxun Chang, Cunsheng Ding. Constructions of External Difference Families and Disjoint Difference Families
187 -- 190Octavio Páez Osuna. There are 1239 Steiner Triple Systems STS(31) of 2-rank 27
191 -- 209Shoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong. Generalised Cumulative Arrays in Secret Sharing
211 -- 224R. Julian R. Abel, Frank E. Bennett. The Existence of (::::nu::::, 6, lambda)-Perfect Mendelsohn Designs with lambda > 1
225 -- 236Mike J. Grannell, Terry S. Griggs, Anne Penfold Street. A Flaw in the Use of Minimal Defining Sets for Secret Sharing Schemes
237 -- 252Andreas Faldum, Julio Lafuente, Gustavo Ochoa, Wolfgang Willems. Error Probabilities for Bounded Distance Decoding

Volume 40, Issue 1

5 -- 24Masaaki Homma, Seon Jeong Kim. The Complete Determination of the Minimum Distance of Two-Point Codes on a Hermitian Curve
25 -- 39Peter J. Grabner, Clemens Heuberger. On the Number of Optimal Base 2 Representations of Integers
41 -- 58Deepak Kumar Dalai, Subhamoy Maitra, Sumanta Sarkar. Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity
59 -- 70François Rodier. Asymptotic Nonlinearity of Boolean Functions
71 -- 79Claude Carlet, Cunsheng Ding, Harald Niederreiter. Authentication Schemes from Highly Nonlinear Functions
81 -- 102Hiroki Koga, Etsuyo Ueda. Basic Properties of the (::::t::::, ::::n::::)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels
103 -- 120Javier Herranz, Germán Sáez. Distributed Ring Signatures from General Dual Access Structures
121 -- 130Anthony B. Evans. Latin Squares without Orthogonal Mates
131 -- 135Ian M. Wanless, Bridget S. Webb. The Existence of Latin Squares without Orthogonal Mates