Abstract is missing.
- The Order Bound for Toric CodesPeter Beelen, Diego Ruano. 1-10 [doi]
- An Extension of the Order Bound for AG CodesIwan M. Duursma, Radoslav Kirov. 11-22 [doi]
- Sparse Numerical SemigroupsCarlos Munuera, Fernando Torres, Juan Elmer Villanueva. 23-31 [doi]
- From the Euclidean Algorithm for Solving a Key Equation for Dual Reed-Solomon Codes to the Berlekamp-Massey AlgorithmMaria Bras-Amorós, Michael E. O Sullivan. 32-42 [doi]
- Rank for Some Families of Quaternary Reed-Muller CodesJaume Pernas, Jaume Pujol, Mercè Villanueva. 43-52 [doi]
- Optimal Bipartite Ramanujan Graphs from Balanced Incomplete Block Designs: Their Characterizations and Applications to Expander/LDPC CodesTom Høholdt, Heeralal Janwa. 53-64 [doi]
- Simulation of the Sum-Product Algorithm Using Stratified SamplingJohn Brevik, Michael E. O Sullivan, Anya Umlauf, Richard Wolski. 65-72 [doi]
- A Systems Theory Approach to Periodically Time-Varying Convolutional Codes by Means of Their Invariant EquivalentJoan-Josep Climent, Victoria Herranz, Carmen Perea, Virtudes Tomás. 73-82 [doi]
- On Elliptic Convolutional Goppa CodesJosé Ignacio Iglesias Curto. 83-91 [doi]
- The Minimum Hamming Distance of Cyclic Codes of Length 2psHakan Özadam, Ferruh Özbudak. 92-100 [doi]
- There Are Not Non-obvious Cyclic Affine-invariant CodesJosé Joaquín Bernal, Ángel del Río, Juan Jacobo Simón. 101-106 [doi]
- On Self-dual Codes over Z16Kiyoshi Nagata, Fidel R. Nemenzo, Hideo Wada. 107-116 [doi]
- A Non-abelian Group Based on Block Upper Triangular Matrices with Cryptographic ApplicationsRafael Álvarez, Leandro Tortosa, José Vicent, Antonio Zamora. 117-126 [doi]
- Word Oriented Cascade Jump sigma-LFSRGuang Zeng, Yang Yang, Wenbao Han, Shuqin Fan. 127-136 [doi]
- On Some Sequences of the Secret Pseudo-random Index j in RC4 Key SchedulingRiddhipratim Basu, Subhamoy Maitra, Goutam Paul, Tanmoy Talukdar. 137-148 [doi]
- Very-Efficient Anonymous Password-Authenticated Key Exchange and Its ExtensionsSeongHan Shin, Kazukuni Kobara, Hideki Imai. 149-158 [doi]
- Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKEYang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai. 159-168 [doi]
- Noisy Interpolation of Multivariate Sparse Polynomials in Finite FieldsÁlvar Ibeas, Arne Winterhof. 169-178 [doi]
- New Commutative Semifields and Their NucleiJürgen Bierbrauer. 179-185 [doi]
- Spreads in Projective Hjelmslev GeometriesIvan N. Landjev. 186-194 [doi]
- On the Distribution of Nonlinear Congruential Pseudorandom Numbers of Higher Orders in Residue RingsEdwin D. El-Mahassni, Domingo Gómez. 195-203 [doi]
- Rooted Trees Searching for Cocyclic Hadamard Matrices over D4tVíctor Álvarez, José Ándrés Armario, María Dolores Frau, Félix Gudiel, Amparo Osuna. 204-214 [doi]
- Interesting Examples on Maximal Irreducible Goppa CodesMarta Giorgetti. 215-218 [doi]
- Repeated Root Cyclic and Negacyclic Codes over Galois RingsSergio R. López-Permouth, Steve Szabo. 219-222 [doi]
- Construction of Additive Reed-Muller CodesJaume Pujol, Josep Rifà, L. Ronquillo. 223-226 [doi]
- Gröbner Representations of Binary MatroidsMijail Borges-Quintana, Miguel A. Borges-Trenard, Edgar Martínez-Moro. 227-230 [doi]
- A Generalization of the Zig-Zag Graph Product by Means of the Sandwich ProductDavid M. Monarres, Michael E. O Sullivan. 231-234 [doi]
- Novel Efficient Certificateless Aggregate SignaturesLei Zhang, Bo Qin, Qianhong Wu, Futai Zhang. 235-238 [doi]
- Bounds on the Number of Users for Random 2-Secure CodesManabu Hagiwara, Takahiro Yoshida, Hideki Imai. 239-242 [doi]