researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Des. Codes Cryptography
Home
Index
Info
Volume
Volume
5
, Issue
3
183
--
187
Marco Carpentieri
.
A Perfect Threshold Secret Sharing Scheme to Identify Cheaters
189
--
197
Charles J. Colbourn
,
Jeffrey H. Dinitz
,
Mieczyslaw Wojtas
.
Thwarts in Transversal Designs
199
--
216
Robert Craigen
.
The Structure of Weighing Matrices Having Large Weights
217
--
239
Tuvi Etzion
,
Victor K. Wei
,
Zhen Zhang
.
Bounds on the Sizes of Constant Weight Covering Codes
241
--
251
K. Gopalakrishnan
,
Douglas R. Stinson
.
Three Characterizations of Non-binary Correlation-Immune and Resilient Functions
253
--
259
Akihiro Munemasa
.
On Perfect t-Shift Codes in Abelian Groups
261
--
267
Christine M. O Keefe
.
Key Distribution Patterns Using Minkowski Planes
269
--
280
Tran van Trung
.
On the Construction of Authentication and Secrecy Codes
Volume
5
, Issue
2
91
--
107
Ahmed M. Assaf
.
On Covering Designs with Block Size 5 and Index 5
109
--
114
David Gillman
,
Ronald L. Rivest
.
Complete Variable-Length Fix-Free Codes
115
--
138
Kenneth G. Paterson
.
Perfect Factors in the de Bruijn Graph
139
--
153
René Peeters
.
On the p-Ranks of Net Graphs
155
--
174
Stephan J. Suchower
.
Nonisomorphic Complete Sets of F-Rectangles with Prime Power Dimensions
Volume
5
, Issue
1
5
--
12
K. T. Arasu
,
Surinder K. Sehgal
.
Difference Sets in {Abelian} Groups of p-Rank Two
13
--
25
Marco Buratti
.
A Powerful Method for Constructing Difference Families and Optimal Optical Orthogonal Codes
27
--
42
Matthijs J. Coster
,
Willem H. Haemers
.
Quasi-Symmetric Designs Related to the Triangular Graph
43
--
55
Clement W. H. Lam
,
Larry H. Thiel
,
Vladimir D. Tonchev
.
On Quasi-Symmetric 2-(28, 12, 11) and 2-(36, 16, 12) Designs
57
--
72
Rudolf Mathon
,
Gordon F. Royle
.
The Translation Planes of Order 49
73
--
80
David Naccache
,
David M Raïhi
,
Dan Raphaeli
.
Can Montgomery Parasites Be Avoided? A Design Methodology Based on Key and Cryptosystem Modifications