Journal: Des. Codes Cryptography

Volume 7, Issue 3

187 -- 214Alexei E. Ashikhmin, Simon Litsyn. Fast Decoding Algorithms for First Order Reed-Muller and Related Codes
215 -- 221Thierry P. Berger. On the Automorphism Groups of Affine-Invariant Codes
223 -- 233T. Aaron Gulliver, Vijay K. Bhargava. New Good Rage (m-1)/pm Ternary and Quaternary Quasi-Cyclic Codes
235 -- 237Marijn van Eupen, Noboru Hamada, Yoko Watamori. The Nonexistence of Ternary [50, 5, 32] Codes
239 -- 259Rolf S. Rees, Douglas R. Stinson. Combinatorial Characterizations of Authentication Codes II

Volume 7, Issue 1-2

7 -- 9Thomas Beth, Whitfield Diffie. Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue
9 -- 12Whitfield Diffie. The National Security Establishment and the Development of Public-Key Cryptography
13 -- 15Mary Fischer. And Now For Something Completely Different (The Egyptologist and the Cryptographer: A Personal Reminiscence)
17 -- 25Thomas Beth. Watching the Bhang Meter and Flying through Dirt
27 -- 59Paul F. Syverson, Catherine Meadows. A Formal Language for Cryptographic Protocol Requirements
61 -- 81Kaisa Nyberg, Rainer A. Rueppel. Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem
83 -- 99Reihaneh Safavi-Naini, L. Tombak. Authentication Codes in Plaintext and Chosen-Content Attacks
101 -- 110Chris J. Mitchell, Fred Piper, Michael Walker, Peter R. Wild. Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes
111 -- 134Xian-Mo Zhang, Yuliang Zheng. Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors
135 -- 151Dieter Gollmann, Yongfei Han, Chris J. Mitchell. Redundant Integer Representations and Fast Exponentiation
153 -- 174Renate Scheidler, Andreas Stein, Hugh C. Williams. Key-Exchange in Real Quadratic Congruence Function Fields