Abstract is missing.
- Concatenated spherical codesThomas H. E. Ericson, Victor A. Zinoviev. 2-5
- A note on automorphism groups of codes and symbol error probability computationMichele Elia, Giorgio Taricco. 6-20
- A direct proof for the automorphism group of Reed-Solomon codesThierry P. Berger. 21-29
- A family of binary codes with asymptotically good distance distributionThomas Beth, Dejan E. Lazic, Vojin Senk. 30-41
- A transformation of boolean functions, its consequences on some problems related to Reed-Muller codesClaude Carlet. 42-50
- Covering radius of RM (1, 9) in RM (3, 9)Philippe Langevin. 51-59
- The weights of the duals of binary BCH codes of designed distance delta=9François Rodier. 60-64
- The minimum distance of some binary codes via the Newton s identitiesDaniel Augot, Pascale Charpin, Nicolas Sendrier. 65-73
- Minimum-change binary block-codes which are well balancedJ. Burger, Hervé Chabanne, Marc Girault. 76-86
- Construction of unequal error protection codesA. O. Mabogunje, Patrick G. Farrell. 87-93
- Unidirectional error-detecting codesGérard D. Cohen, Luisa Gargano, Ugo Vaccaro. 94-105
- Coherent partitions and codesAndré Montpetit. 106-113
- (1/lambda)-regular and (1/lambda)-homogeneous tournamentsAnnie Astié-Vidal, Vincent Dugat. 114-124
- Decoding of codes on hyperelliptic curvesDominique Le Brigand. 126-134
- Decoding of codes on the Klein QuarticD. Rotillon, J. A. Thiong-Ly. 135-149
- Asymptotically good families of geometric Goppa codes and the Gilbert-Varshamov boundConny Voss. 150-157
- Multiplicative character sums and non linear geometric codesMarc Perret. 158-165
- A survey of identification schemesMarc Girault. 168-179
- A correlation cryptographic schemeSami Harari. 180-192
- Pseudorandom permutations based on the DES schemeJacques Patarin. 193-204
- Linear complexity of transformed sequencesHarriet J. Fell. 205-214
- Some remarks on a LFSR disturbed by other sequencesGuy Chassé. 215-221
- Paramters for complex FFTs infinite residue class ringsReiner Creutzburg. 222-226
- A cryptographic tool for programs protectionJosep Domingo-Ferrer, Llorenç Huguet i Rotger. 227-240
- Decoding techniques for convolutional codesDavid Haccoun. 242-258
- A weighted-output variant of the Viterbi algorithm for concatenated schemes using a convolutional inner codeRémi Sfez, Gerard Battail. 259-270
- Coded modulation with convolutional codes over ringsRenato Baldini Filho, Patrick G. Farrell. 271-280
- A Shannon-theoretic coding theorem in authentication theoryAndrea Sgarro. 282-291
- Joint fractional entropyAnna Fioretto, Andrea Sgarro. 292-297
- On the adaptive source codingGerard Battail, Mauro Guazzo. 298-308
- Minimum codeword length and redundancy of Huffman codesRenato M. Capocelli, Alfredo De Santis. 309-317
- Binary covering codes and high speed data transmissionA. Robert Calderbank. 320-336
- Coding and modulation for the Gaussian channel, in the absence or in the presence of fluctuationsGerard Battail, Hélio Magalhães De Oliveira, Zhang Weidong. 337-349
- Comparison of two modulation-coding schemes for low-rate digital land mobile radio communicationRémi Sfez, J. C. Belfiore, K. Leeuwin, A. Fihel. 350-363
- Chernoff bound of trellis coded modulation over correlated Rayleigh channelK. Leeuwin, J. C. Belfiore, Ghassan Kawas Kaleh. 364-376
- A hybrid FEC-ARQ communication system using sequential decodingMarc M. Darmon, Philippe R. Sadot. 378-384
- A 30 Mbits/s (255, 223) Reed-Solomon decoderJean-Luc Politano, Dominique Deprey. 385-392