Journal: Des. Codes Cryptography

Volume 52, Issue 3

249 -- 262Tian Tian, Wen-Feng Qi. Linearity properties of binary FCSR sequences
263 -- 274Brian Curtin, Ibtisam Daqqa. The subconstituent algebra of strongly regular graphs associated with a Latin square
275 -- 291Miwako Mishima, Hung-Lin Fu, Shoichi Uruno. Optimal conflict-avoiding codes of length ::::n:::: = 0 (mod 16) and weight 3
293 -- 301A. Caranti, Francesca Dalla Volta, M. Sala. An application of the O Nan-Scott theorem to the group generated by the round functions of an AES-like cipher
303 -- 338Claude Carlet, Xiangyong Zeng, Chunlei Li, Lei Hu. Further properties of several classes of Boolean functions with optimum algebraic immunity
339 -- 362Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai. An improvement of discrete Tardos fingerprinting codes
363 -- 380Jon-Lark Kim, Xiaoyu Liu. A generalized Gleason-Pierce-Ward theorem
381 -- 390Dustin Moody. The Diffie-Hellman problem and generalization of Verheul's theorem

Volume 52, Issue 2

129 -- 154Tamir Tassa, Jorge L. Villar. On proper secrets, ( ::::t:::: , ::::k:::: )-bases and linear codes
155 -- 162Bader F. AlBdaiwi, Peter Horák, Lorenzo Milazzo. Enumerating and decoding perfect linear Lee codes
163 -- 169John B. Polhill. Paley type partial difference sets in non ::::p::::-groups
171 -- 183E. J. Cheon, T. Maruta. A new extension theorem for 3-weight modulo ::::q:::: linear codes over /mathbb::::F::::::::::q::::::{/mathbb{F}_q}
185 -- 208Clemens Heuberger, James A. Muir. Unbalanced digit sets and the closest choice strategy for minimal weight integer representations
209 -- 218Paul Dorbec, Sylvain Gravier, Iiro S. Honkala, Michel Mollard. Weighted codes in Lee metrics
219 -- 241Kenneth G. Paterson, Sriramkrishnan Srinivasan. On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
243 -- 247Alan R. Prince. Pure partial planes of order 6 with 25 lines

Volume 52, Issue 1

1 -- 14Jaume Martí-Farré, Carles Padró. Ideal secret sharing schemes whose minimal qualified subsets have at most three participants
15 -- 24Lein Harn, Changlu Lin. Detection and identification of cheaters in ( ::::t:::: , ::::n:::: ) secret sharing scheme
25 -- 55Charles J. Colbourn, Alan C. H. Ling. Linear hash families and forbidden configurations
57 -- 81Markus Grassl, T. Aaron Gulliver. On circulant self-dual codes over small fields
83 -- 91Yu-Ru Liu, Craig V. Spencer. A generalization of Meshulam s theorem on subsets of finite abelian groups with no 3-term arithmetic progression
93 -- 105Darryn E. Bryant, Judith Egan, Barbara M. Maenhaut, Ian M. Wanless. Indivisible plexes in latin squares
107 -- 124Bin Wen, Jianmin Wang, Jianxing Yin. Optimal grid holey packings with block size 3 and 4
125 -- 127Masaaki Harada, Akihiro Munemasa. There exists no self-dual [24, 12, 10] code over /mathbb ::::F::::::5::{{/mathbb F}_5}