255 | -- | 267 | Mausumi Bose, Rahul Mukerjee. Optimal (2, ::::n::::) visual cryptographic schemes |
269 | -- | 284 | Brendan D. McKay, Jeanette C. McLeod, Ian M. Wanless. The number of transversals in a Latin square |
285 | -- | 302 | Christopher Wolf, An Braeken, Bart Preneel. On the security of stepwise triangular systems |
303 | -- | 317 | Gennian Ge, Ying Miao, L. Zhu. GOB designs for authentication codes with arbitration |
319 | -- | 333 | Olof Heden, Martin Hessler. On the classification of perfect codes: side class structures |
335 | -- | 341 | David G. Glynn, Johannes G. Maks, Rey Casse. The polynomial degree of the Grassmannian ::::G::::(1, ::::n, q::::) of lines in finite projective space ::::PG::::(::::n, q::::) |
343 | -- | 356 | Sean V. Droms, Keith E. Mellinger, Chris Meyer. LDPC codes generated by conics in the classical projective plane |
357 | -- | 367 | Peter Horák, Bader F. AlBdaiwi. Fast decoding of quasi-perfect Lee distance codes |
369 | -- | 374 | Hassan Aly, Arne Winterhof. On the ::::k::::-error linear complexity over /mathbb::::F::::::::::p:::::: of Legendre and Sidelnikov sequences |