The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
2005, volume: 37, number: 3

  1. Susan G. Barwick, Wen-Ai Jackson
    An Optimal Multisecret Threshold Scheme Construction. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:367-389 [Journal]
  2. A. Ya. Dorofeev, L. S. Kazarin, V. M. Sidelnikov, M. E. Tuzhilin
    Matrix Groups Related to the Quaternion Group and Spherical Orbit Codes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:391-404 [Journal]
  3. G. Belyavskaya, V. Izbash, G. Mullen
    Check Character Systems Using Quasigroups: II. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:405-419 [Journal]
  4. E. J. Cheon, T. Kato, S. Kim
    On the Minimum Length of some Linear Codes of Dimension 5. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:421-434 [Journal]
  5. A. De Wispelaere, H. Van Maldeghem
    Codes from Generalized Hexagons. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:435-448 [Journal]
  6. Claude Carlet, Joseph L. Yucas
    Piecewise Constructions of Bent and Almost Optimal Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:449-464 [Journal]
  7. T. Aaron Gulliver, Masaaki Harada, Takuji Nishimura, Patric R. J. Östergård
    Near-Extremal Formally Self-Dual Even Codes of Lengths 24 and 32. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:465-471 [Journal]
  8. Gretchen L. Matthews
    Weierstrass Semigroups and Codes from a Quotient of the Hermitian Curve. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:473-492 [Journal]
  9. Omran Ahmadi, Alfred Menezes
    On the Number of Trace-One Elements in Polynomial Bases for F2n. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:493-507 [Journal]
  10. Jens-Matthias Bohli, Rainer Steinwandt, Maria Isabel Gonzalez Vasco, Consuelo Martínez
    Weak Keys in MST1. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:509-524 [Journal]
  11. Chihiro Suetake
    The Existence of a Symmetric Transversal Design STD7[21; 3]. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:3, pp:525-528 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002