The SCEAS System
Navigation Menu

Conferences in DBLP

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC) (aaecc)
2006 (conf/aaecc/2006)

  1. Claude Carlet
    On Bent and Highly Nonlinear Balanced/Resilient Functions and Their Algebraic Immunities. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:1-28 [Conf]
  2. Robert J. McEliece, Edwin Soedarmadji
    On Generalized Parity Checks. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:29-34 [Conf]
  3. Tatsuaki Okamoto
    Cryptography Based on Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:35-50 [Conf]
  4. Tom Høholdt
    The Merit Factor Problem for Binary Sequences. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:51-59 [Conf]
  5. Florina Piroi, Arne Winterhof
    Quantum Period Reconstruction of Binary Sequences. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:60-67 [Conf]
  6. Li-Ping Wang
    The Vector Key Equation and Multisequence Shift Register Synthesis. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:68-75 [Conf]
  7. Mijail Borges-Quintana, Miguel A. Borges-Trenard, Edgar Martínez-Moro
    A General Framework for Applying FGLM Techniques to Linear Codes. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:76-86 [Conf]
  8. Kathy J. Horadam
    A Theory of Highly Nonlinear Functions. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:87-100 [Conf]
  9. Kalle Ranto, Petri Rosendahl
    The Solutions of the Third Power Sum Equation for Niho Type Decimations. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:101-107 [Conf]
  10. Drue Coles
    On Constructing AG Codes Without Basis Functions for Riemann-Roch Spaces. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:108-117 [Conf]
  11. Jeffrey B. Farr, Shuhong Gao
    Computing Gröbner Bases for Vanishing Ideals of Finite Sets of Points. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:118-127 [Conf]
  12. Francis N. Castro, Ernesto Gomez, Oscar Moreno
    A Class of Fermat Curves for which Weil-Serre's Bound Can Be Improved. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:128-135 [Conf]
  13. Pradeep Kiran Sarvepalli, Andreas Klappenecker
    Nonbinary Quantum Codes from Hermitian Curves. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:136-143 [Conf]
  14. V. Álvarez, J. A. Armario, M. D. Frau, P. Real
    A Genetic Algorithm for Cocyclic Hadamard Matrices. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:144-153 [Conf]
  15. Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai
    Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:154-162 [Conf]
  16. Nobuyuki Sugio, Shunichi Nambu, Toshinobu Kaneko
    A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:163-172 [Conf]
  17. Yang Cui, Kazukuni Kobara, Hideki Imai
    On Achieving Chosen Ciphertext Security with Decryption Errors. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:173-182 [Conf]
  18. Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai
    Applying Fujisaki-Okamoto to Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:183-192 [Conf]
  19. Manabu Hagiwara, Goichiro Hanaoka, Hideki Imai
    A Short Random Fingerprinting Code Against a Small Number of Pirates. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:193-202 [Conf]
  20. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:203-214 [Conf]
  21. Simon McNicol, Serdar Boztas, Asha Rao
    Traitor Tracing Against Powerful Attacks Using Combinatorial Designs. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:215-224 [Conf]
  22. Moshe Schwartz, Alexander Vardy
    New Bounds on the Capacity of Multi-dimensional RLL-Constrained Systems. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:225-234 [Conf]
  23. Xiaowei Jin, Teng Li, Thomas E. Fuja, Oliver M. Collins
    LDPC Codes for Fading Channels: Two Strategies. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:235-244 [Conf]
  24. Shadi Abu-Surra, Gianluigi Liva, William E. Ryan
    Low-Floor Tanner Codes Via Hamming-Node or RSCC-Node Doping. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:245-254 [Conf]
  25. Lan Lan, Lingqi Zeng, Ying Y. Tai, Lei Chen, Shu Lin, Khaled A. S. Abdel-Ghaffar
    Algebraic Constructions of Quasi-cyclic LDPC Codes - Part I: For AWGN and Binary Random Erasure Channels. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:255-264 [Conf]
  26. Ying Y. Tai, Lingqi Zeng, Lan Lan, Shumei Song, Shu Lin, Khaled A. S. Abdel-Ghaffar
    Algebraic Construction of Quasi-cyclic LDPC Codes - Part II: For AWGN and Binary Random and Burst Erasure Channels. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:265-274 [Conf]
  27. Lan Lan, Ying Y. Tai, Shu Lin, Behshad Memari, Bahram Honary
    New Constructions of Quasi-cyclic LDPC Codes Based on Two Classes of Balanced Incomplete Block Designs: For AWGN and Binary Erasure Channels. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:275-284 [Conf]
  28. Tali Kaufman, Simon Litsyn
    Long Extended BCH Codes Are Spanned by Minimum Weight Words. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:285-294 [Conf]
  29. Olav Geil, Christian Thommesen
    On the Feng-Rao Bound for Generalized Hamming Weights. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:295-306 [Conf]
  30. Hans Georg Schaathun, Gérard D. Cohen
    Nested Codes for Constrained Memory and for Dirty Paper. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:307-316 [Conf]
  31. Chao-Yu Chen, Chung-Hsuan Wang, Chi-chao Chao
    Complementary Sets and Reed-Muller Codes for Peak-to-Average Power Ratio Reduction in OFDM. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:317-327 [Conf]
  32. Kevin T. Phelps, Josep Rifà, Mercè Villanueva
    Hadamard Codes of Length 2ts (s Odd). Rank and Kernel. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:328-337 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002