The SCEAS System
Navigation Menu

Conferences in DBLP

International Workshop on Coding and Cryptography (wcc)
2005 (conf/wcc/2005)

  1. Keisuke Shiromoto
    Second Support Weights for Binary Self-dual Codes. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:1-13 [Conf]
  2. Nina I. Pilipchuk, Ernst M. Gabidulin
    On Codes Correcting Symmetric Rank Errors. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:14-21 [Conf]
  3. Georg Schmidt, Vladimir Sidorenko, Martin Bossert
    Error and Erasure Correction of Interleaved Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:22-35 [Conf]
  4. Pierre Loidreau
    A Welch-Berlekamp Like Algorithm for Decoding Gabidulin Codes. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:36-45 [Conf]
  5. Yves Aubry, Philippe Langevin
    On the Weights of Binary Irreducible Cyclic Codes. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:46-54 [Conf]
  6. Jyrki T. Lahtonen, Kalle Ranto, Roope Vehkalahti
    3-Designs from Z4-Goethals-Like Codes and Variants of Cyclotomic Polynomials. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:55-68 [Conf]
  7. A. Roger Hammons Jr.
    Space-Time Code Designs Based on the Generalized Binary Rank Criterion with Applications to Cooperative Diversity. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:69-84 [Conf]
  8. Tatsuya Maruta, Kei Okamoto
    Geometric Conditions for the Extendability of Ternary Linear Codes. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:85-99 [Conf]
  9. Olgica Milenkovic, Navin Kashyap
    On the Design of Codes for DNA Computing. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:100-119 [Conf]
  10. Anne Canteaut
    Open Problems Related to Algebraic Attacks on Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:120-134 [Conf]
  11. Nina Brandstätter, Tanja Lange, Arne Winterhof
    On the Non-linearity and Sparsity of Boolean Functions Related to the Discrete Logarithm in Finite Fields of Characteristic Two. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:135-143 [Conf]
  12. Clemens Adelmann, Arne Winterhof
    Interpolation of Functions Related to the Integer Factoring Problem. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:144-154 [Conf]
  13. Takakazu Satoh
    On Degrees of Polynomial Interpolations Related to Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:155-163 [Conf]
  14. Krystian Matusiewicz, Josef Pieprzyk
    Finding Good Differential Patterns for Attacks on SHA-1. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:164-177 [Conf]
  15. Raphael Overbeck
    Extending Gibson's Attacks on the GPT Cryptosystem. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:178-188 [Conf]
  16. Maffre Samuel
    Reduction of Conjugacy Problem in Braid Groups, Using Two Garside Structures. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:189-201 [Conf]
  17. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:202-217 [Conf]
  18. Quan Son Nguyen
    Multi-Dimensional Hash Chains and Application to Micropayment Schemes. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:218-228 [Conf]
  19. Patrick Felke
    On the Affine Transformations of HFE-Cryptosystems and Systems with Branches. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:229-241 [Conf]
  20. Adama Diene, Jintai Ding, Jason E. Gower, Timothy J. Hodges, Zhijun Yin
    Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:242-251 [Conf]
  21. Damien Vergnaud
    RSA-Based Secret Handshakes. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:252-274 [Conf]
  22. Ventzislav Nikov, Svetla Nikova
    On a Relation Between Verifiable Secret Sharing Schemes and a Class of Error-Correcting Codes. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:275-290 [Conf]
  23. Lihua Wang, Eiji Okamoto, Ying Miao, Takeshi Okamoto, Hiroshi Doi
    ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:291-303 [Conf]
  24. Cédric Faure, Pierre Loidreau
    A New Public-Key Cryptosystem Based on the Problem of Reconstructing p-Polynomials. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:304-315 [Conf]
  25. Françoise Levy-dit-Vehel, Ludovic Perret
    On the Wagner-Magyarik Cryptosystem. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:316-329 [Conf]
  26. Kai-Uwe Schmidt, Adolf Finger
    Constructions of Complementary Sequences for Power-Controlled OFDM Transmission. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:330-345 [Conf]
  27. Xiangyong Zeng, Lei Hu, Qingchong Liu
    A Novel Method for Constructing Almost Perfect Polyphase Sequences. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:346-353 [Conf]
  28. Berndt M. Gammel, Rainer Göttfert
    Linear Filtering of Nonlinear Shift-Register Sequences. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:354-370 [Conf]
  29. Nam Yul Yu, Guang Gong
    Realizations from Decimation Hadamard Transform for Special Classes of Binary Sequences with Two-Level Autocorrelation. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:371-385 [Conf]
  30. Yun-Pyo Hong, Hong-Yeop Song
    Frequency/Time Hopping Sequences with Large Linear Complexities. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:386-396 [Conf]
  31. Constanza Riera, Matthew G. Parker
    One and Two-Variable Interlace Polynomials: A Spectral Interpretation. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:397-411 [Conf]
  32. San Ling, Ferruh Özbudak
    Improved Bounds on Weil Sums over Galois Rings and Homogeneous Weights. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:412-426 [Conf]
  33. Ruben G. Lobo, Donald L. Bitzer, Mladen A. Vouk
    Locally Invertible Multivariate Polynomial Matrices. [Citation Graph (0, 0)][DBLP]
    WCC, 2005, pp:427-441 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002