Conferences in DBLP
Claude Carlet On Bent and Highly Nonlinear Balanced/Resilient Functions and Their Algebraic Immunities. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:1-28 [Conf ] Robert J. McEliece , Edwin Soedarmadji On Generalized Parity Checks. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:29-34 [Conf ] Tatsuaki Okamoto Cryptography Based on Bilinear Maps. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:35-50 [Conf ] Tom Høholdt The Merit Factor Problem for Binary Sequences. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:51-59 [Conf ] Florina Piroi , Arne Winterhof Quantum Period Reconstruction of Binary Sequences. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:60-67 [Conf ] Li-Ping Wang The Vector Key Equation and Multisequence Shift Register Synthesis. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:68-75 [Conf ] Mijail Borges-Quintana , Miguel A. Borges-Trenard , Edgar Martínez-Moro A General Framework for Applying FGLM Techniques to Linear Codes. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:76-86 [Conf ] Kathy J. Horadam A Theory of Highly Nonlinear Functions. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:87-100 [Conf ] Kalle Ranto , Petri Rosendahl The Solutions of the Third Power Sum Equation for Niho Type Decimations. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:101-107 [Conf ] Drue Coles On Constructing AG Codes Without Basis Functions for Riemann-Roch Spaces. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:108-117 [Conf ] Jeffrey B. Farr , Shuhong Gao Computing Gröbner Bases for Vanishing Ideals of Finite Sets of Points. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:118-127 [Conf ] Francis N. Castro , Ernesto Gomez , Oscar Moreno A Class of Fermat Curves for which Weil-Serre's Bound Can Be Improved. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:128-135 [Conf ] Pradeep Kiran Sarvepalli , Andreas Klappenecker Nonbinary Quantum Codes from Hermitian Curves. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:136-143 [Conf ] V. Álvarez , J. A. Armario , M. D. Frau , P. Real A Genetic Algorithm for Cocyclic Hadamard Matrices. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:144-153 [Conf ] Goichiro Hanaoka , Yumiko Hanaoka , Manabu Hagiwara , Hajime Watanabe , Hideki Imai Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:154-162 [Conf ] Nobuyuki Sugio , Shunichi Nambu , Toshinobu Kaneko A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:163-172 [Conf ] Yang Cui , Kazukuni Kobara , Hideki Imai On Achieving Chosen Ciphertext Security with Decryption Errors. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:173-182 [Conf ] Peng Yang 0002 , Takashi Kitagawa , Goichiro Hanaoka , Rui Zhang 0002 , Kanta Matsuura , Hideki Imai Applying Fujisaki-Okamoto to Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:183-192 [Conf ] Manabu Hagiwara , Goichiro Hanaoka , Hideki Imai A Short Random Fingerprinting Code Against a Small Number of Pirates. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:193-202 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:203-214 [Conf ] Simon McNicol , Serdar Boztas , Asha Rao Traitor Tracing Against Powerful Attacks Using Combinatorial Designs. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:215-224 [Conf ] Moshe Schwartz , Alexander Vardy New Bounds on the Capacity of Multi-dimensional RLL-Constrained Systems. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:225-234 [Conf ] Xiaowei Jin , Teng Li , Thomas E. Fuja , Oliver M. Collins LDPC Codes for Fading Channels: Two Strategies. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:235-244 [Conf ] Shadi Abu-Surra , Gianluigi Liva , William E. Ryan Low-Floor Tanner Codes Via Hamming-Node or RSCC-Node Doping. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:245-254 [Conf ] Lan Lan , Lingqi Zeng , Ying Y. Tai , Lei Chen , Shu Lin , Khaled A. S. Abdel-Ghaffar Algebraic Constructions of Quasi-cyclic LDPC Codes - Part I: For AWGN and Binary Random Erasure Channels. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:255-264 [Conf ] Ying Y. Tai , Lingqi Zeng , Lan Lan , Shumei Song , Shu Lin , Khaled A. S. Abdel-Ghaffar Algebraic Construction of Quasi-cyclic LDPC Codes - Part II: For AWGN and Binary Random and Burst Erasure Channels. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:265-274 [Conf ] Lan Lan , Ying Y. Tai , Shu Lin , Behshad Memari , Bahram Honary New Constructions of Quasi-cyclic LDPC Codes Based on Two Classes of Balanced Incomplete Block Designs: For AWGN and Binary Erasure Channels. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:275-284 [Conf ] Tali Kaufman , Simon Litsyn Long Extended BCH Codes Are Spanned by Minimum Weight Words. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:285-294 [Conf ] Olav Geil , Christian Thommesen On the Feng-Rao Bound for Generalized Hamming Weights. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:295-306 [Conf ] Hans Georg Schaathun , Gérard D. Cohen Nested Codes for Constrained Memory and for Dirty Paper. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:307-316 [Conf ] Chao-Yu Chen , Chung-Hsuan Wang , Chi-chao Chao Complementary Sets and Reed-Muller Codes for Peak-to-Average Power Ratio Reduction in OFDM. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:317-327 [Conf ] Kevin T. Phelps , Josep Rifà , Mercè Villanueva Hadamard Codes of Length 2t s (s Odd). Rank and Kernel. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:328-337 [Conf ]