|
Journals in DBLP
- Xiang-dong Hou
Some Inequalities about the Covering Radius of Reed-Muller Codes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:3, pp:215-224 [Journal]
- Noboru Hamada, Tor Helleseth, Øyvind Ytrehus
On the Construction of [q4 + q2 - q, 5, q4 - q3 + q2 - 2q; q]-Codes Meeting the Griesmer Bound. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:3, pp:225-229 [Journal]
- Michael R. Fellows, Neal Koblitz
Self-Witnessing Polynomial-Time Complexity and Prime Factorization. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:3, pp:231-235 [Journal]
- Charles J. Colbourn, Eric Mendelsohn, Cheryl E. Praeger, Vladimir D. Tonchev
Concerning Multiplier Automorphisms of Cyclic Steiner Triple Systems. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:3, pp:237-251 [Journal]
- Ronald Shaw
A Characterization of the Primals in PG(m, 2). [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:3, pp:253-256 [Journal]
- K. T. Arasu, Qing Xiang
On the Existence of Periodic Complementary Binary Sequences. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:3, pp:257-262 [Journal]
- Alexander Pott
On Abelian Difference Set Codes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:3, pp:263-271 [Journal]
- Peter Landrock, Olaf Manz
Classical Codes as Ideals in Group Algebras. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:3, pp:273-285 [Journal]
- Thomas Beth, Volker Hatz
Design Machines: Algebraically Well Described Interconnection Networks. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:3, pp:287-298 [Journal]
|