Abstract is missing.
- List Decoding and Pseudorandom ConstructionsVenkatesan Guruswami. 1-6 [doi]
- A Survey of Recent Attacks on the Filter GeneratorSondre Rønjom, Guang Gong, Tor Helleseth. 7-17 [doi]
- Iterative List Decoding of LDPC CodesTom Høholdt, Jørn Justesen. 18-19 [doi]
- Inverted Edwards CoordinatesDaniel J. Bernstein, Tanja Lange. 20-27 [doi]
- Spectra of Boolean Functions, Subspaces of Matrices, and Going Up Versus Going DownGary McGuire. 28-37 [doi]
- Efficient List Decoding of Explicit Codes with Optimal RedundancyAtri Rudra. 38-46 [doi]
- Algebraic Structure Theory of Tail-Biting TrellisesPriti Shankar. 47 [doi]
- Nice Codes from Nice CurvesHenning Stichtenoth. 48-49 [doi]
- Generalized Sudan s List Decoding for Order Domain CodesOlav Geil, Ryutaroh Matsumoto. 50-59 [doi]
- Bent Functions and Codes with Low Peak-to-Average Power Ratio for Multi-Code CDMAJianqin Zhou, Wai Ho Mow, Xiaoping Dai. 60-71 [doi]
- Determining the Nonlinearity of a New Family of APN FunctionsCarl Bracken, Eimear Byrne, Nadya Markin, Gary McGuire. 72-79 [doi]
- An Improvement of Tardos s Collusion-Secure Fingerprinting Codes with Very Short LengthsKoji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai. 80-89 [doi]
- Space-Time Codes from Crossed Product Algebras of Degree 4Grégory Berhuy, Frédérique E. Oggier. 90-99 [doi]
- On Non-randomness of the Permutation After RC4 Key SchedulingGoutam Paul, Subhamoy Maitra, Rohit Srivastava. 100-109 [doi]
- Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller CodesKenji Yasunaga, Toru Fujiwara. 110-119 [doi]
- Fault-Tolerant Finite Field Computation in the Public Key CryptosystemsSilvana Medos, Serdar Boztas. 120-129 [doi]
- A Note on a Class of Quadratic Permutations over F::2:::n:::::Yann Laigle-Chapuy. 130-137 [doi]
- Constructions of Orthonormal Lattices and Quaternion Division Algebras for Totally Real Number FieldsB. A. Sethuraman, Frédérique E. Oggier. 138-147 [doi]
- Quaternary Plotkin Constructions and Quaternary Reed-Muller CodesJaume Pujol, Josep Rifà, Faina I. Solov eva. 148-157 [doi]
- Joint Source-Cryptographic-Channel Coding Based on Linear Block CodesHaruhiko Kaneko, Eiji Fujiwara. 158-167 [doi]
- On the Key-Privacy Issue of McEliece Public-Key EncryptionShigenori Yamakawa, Yang Cui, Kazukuni Kobara, Manabu Hagiwara, Hideki Imai. 168-177 [doi]
- Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear FunctionDinesh Krithivasan, S. Sandeep Pradhan. 178-187 [doi]
- Linear Complexity and Autocorrelation of Prime Cube SequencesYoung-Joon Kim, Seok-Yong Jin, Hong-Yeop Song. 188-197 [doi]
- The Art of Trellis Decoding Is NP-HardNavin Kashyap. 198-207 [doi]
- On the Structure of Inversive Pseudorandom Number GeneratorsHarald Niederreiter, Arne Winterhof. 208-216 [doi]
- Subcodes of Reed-Solomon Codes Suitable for Soft DecodingSafitha J. Raj, Andrew Thangaraj. 217-226 [doi]
- Normalized Minimum Determinant Calculation for Multi-block and Asymmetric Space-Time CodesCamilla Hollanti, Hsiao-feng Lu. 227-236 [doi]
- On the Computation of Non-uniform Input for List Decoding on Bezerra-Garcia TowerM. Prem Laxman Das, Kripasindhu Sikdar. 237-246 [doi]
- Dense MIMO Matrix Lattices - A Meeting Point for Class Field Theory and Invariant TheoryJyrki T. Lahtonen, Roope Vehkalahti. 247-256 [doi]
- Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary AttacksKazuki Yoneyama, Haruki Ota, Kazuo Ohta. 257-266 [doi]
- Links Between Discriminating and Identifying Codes in the Binary Hamming SpaceIrène Charon, Gérard D. Cohen, Olivier Hudry, Antoine Lobstein. 267-270 [doi]
- Construction of Rotation Symmetric Boolean Functions on Odd Number of Variables with Maximum Algebraic ImmunitySumanta Sarkar, Subhamoy Maitra. 271-280 [doi]
- A Path to Hadamard MatricesP. Embury, A. Rao. 281-290 [doi]
- The Tangent FFTDaniel J. Bernstein. 291-300 [doi]
- Novel Algebraic Structure for Cyclic CodesDang Hoai Bac, Nguyen Binh, Nguyen Xuan Quynh. 301-310 [doi]
- Distribution of Trace Values and Two-Weight, Self-orthogonal Codes over ::::GF:::: ( ::::p:::: , 2)N. Pinnawala, A. Rao, T. Aaron Gulliver. 311-320 [doi]
- Generalized Rotation Symmetric and Dihedral Symmetric Boolean Functions - 9 Variable Boolean Functions with Nonlinearity 242Selçuk Kavut, Melek D. Yücel. 321-329 [doi]
- On Quasi-cyclic Codes over Integer Residue RingsMaheshanand, Siri Krishan Wasan. 330-336 [doi]
- Extended Norm-Trace Codes with Optimized Correction CapabilityMaria Bras-Amorós, Michael E. O Sullivan. 337-346 [doi]
- On Generalized Hamming Weights and the Covering Radius of Linear CodesHeeralal Janwa, Arbind K. Lal. 347-356 [doi]
- Homomorphic Encryptions of Sums of GroupsAkihiro Yamamura. 357-366 [doi]