Journal: Des. Codes Cryptography

Volume 6, Issue 3

179 -- 188P. Dey, John L. Hayden. On Symmetric Incidence Matrices of Projective Planes
189 -- 204David G. Glynn, J. W. P. Hirschfeld. On the Classification of Geometric Codes by Polynomial Functions
205 -- 218Thomas Johansson. Authentication Codes for Nontrusting Parties Obtained from Rank Metric Codes
219 -- 227Yaron Klein, Simon Litsyn, Alexander Vardy. Two New Bounds on the Size of Binary Codes with a Minimum Distance of Three
229 -- 245Tim Penttila, Gordon F. Royle. Sets of Type (m, n) in the Affine and Projective Planes of Order Nine
247 -- 257Kevin T. Phelps, Mike LeVan. Kernels of Nonlinear Hamming Codes

Volume 6, Issue 2

91 -- 96Masaaki Harada, Hiroshi Kimura. New Extremal Doubly-Even [64, 32, 12] Codes
97 -- 106W. Cary Huffman, Vladimir D. Tonchev. The Existence of Extremal Self-Dual [50, 25, 10] Codes and Quasi-Symmetric 2-(49, 9, 6) Designs
107 -- 116Helmut Meyn. Explicit N-Polynomials of 2-Power Degree over Finite Fields, I
117 -- 131Renate Scheidler, Hugh C. Williams. A Public-Key Cryptosystem Utilizing Cyclotomic Fields
133 -- 142Nabil Shalaby, Jianxing Yin. Directed Packings with Block Size 5 and Even v
143 -- 169Marten van Dijk. On the Information Rate of Perfect Secret Sharing Schemes

Volume 6, Issue 1

5 -- 20Patrick A. H. Bours. On the Construction of Perfect Deletion-Correcting Codes Using Design Theory
21 -- 35A. Robert Calderbank, Neil J. A. Sloane. Modular and p-adic Cyclic Codes
37 -- 45J. K. Gibson. Severely Denting the Gabidulin Version of the McEliece Public Key Cryptosystem
47 -- 56Glenn Hurlbert, Garth Isaak. New Constructions for De Bruijn Tori
57 -- 71Siu Lun Ma, Bernhard Schmidt. On (p:::a:::, p, p:::a:::, p:::a-1:::)-Relative Difference Sets
73 -- 79William J. Martin, X. J. Zhu. Anticodes for the Grassman and Bilinear Forms Graphs