The SCEAS System
Navigation Menu

Journals in DBLP

Discrete Applied Mathematics
2006, volume: 154, number: 2

  1. Pascale Charpin, Gregory Kabatianski
    Special Issue on Coding and Cryptography. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:173- [Journal]
  2. Jan Camenisch, Maciej Koprowski
    Fine-grained forward-secure signature schemes without random oracles. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:175-188 [Journal]
  3. Sébastien Canard, Berry Schoenmakers, Martijn Stam, Jacques Traoré
    List signature schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:189-201 [Journal]
  4. Anne Canteaut, Magnus Daum, Hans Dobbertin, Gregor Leander
    Finding nonnormal bent functions. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:202-218 [Journal]
  5. Paolo D'Arco, Wataru Kishimoto, Douglas R. Stinson
    Properties and constraints of cheating-immune secret sharing schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:219-233 [Journal]
  6. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    Unconditionally secure key assignment schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:234-252 [Journal]
  7. Ilya Dumer, Kirill Shabunov
    Recursive error correction for general Reed-Muller codes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:253-269 [Journal]
  8. Régis Dupont, Andreas Enge
    Provably secure non-interactive key distribution based on pairings. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:270-276 [Journal]
  9. Sandy Ferret, Leo Storme
    A classification result on weighted {deltavµ+1, deltavµ;N, p3}-minihypers. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:277-293 [Journal]
  10. Jürgen Freudenberger, Victor V. Zyablov
    On the complexity of suboptimal decoding for list and decision feedback schemes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:294-304 [Journal]
  11. Ernst M. Gabidulin, Nina I. Pilipchuk
    Symmetric matrices and codes correcting rank errors beyond the [(d-1)/2] bound. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:305-312 [Journal]
  12. Xiang-dong Hou
    Affinity of permutations of P2n. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:313-325 [Journal]
  13. Eike Kiltz, Arne Winterhof
    Polynomial interpolation of cryptographic functions related to Diffie-Hellman and discrete logarithm problem. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:326-336 [Journal]
  14. Alexey S. Kuzmin, Viktor T. Markov, Alexander A. Nechaev, A. S. Neljubin
    A generalization of the binary Preparata code. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:337-345 [Journal]
  15. San Ling, Chaoping Xing, Ferruh Özbudak
    An explicit class of codes with good parameters and their duals. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:346-356 [Journal]
  16. Subhamoy Maitra, Enes Pasalic
    A Maiorana-McFarland type construction for resilient Boolean functions on n variables (n even) with nonlinearity >2n-1-2n/2+2n/2-2. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:357-369 [Journal]
  17. Ueli M. Maurer
    Secure multi-party computation made simple. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:370-381 [Journal]
  18. Tommi Meskanen, Ari Renvall
    A wrap error attack against NTRUEncrypt. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:382-391 [Journal]
  19. Ronan Quarez
    Some subsets of points in the plane associated to truncated Reed-Muller codes with good parameters. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:392-398 [Journal]
  20. John A. Ryan, Patrick Fitzpatrick
    Enumeration of inequivalent irreducible Goppa codes. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:399-412 [Journal]
  21. Ana Salagean
    Repeated-root cyclic and negacyclic codes over a finite chain ring. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:413-419 [Journal]
  22. Hervé Sibert, Patrick Dehornoy, Marc Girault
    Entity authentication schemes using braid word reduction. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2006, v:154, n:2, pp:420-436 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002