|
Journals in DBLP
- Laurie Law, Alfred Menezes, Minghua Qu, Jerry Solinas, Scott A. Vanstone
An Efficient Protocol for Authenticated Key Agreement. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2003, v:28, n:2, pp:119-134 [Journal]
- Sergei Konyagin, Tanja Lange, Igor Shparlinski
Linear Complexity of the Discrete Logarithm. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2003, v:28, n:2, pp:135-146 [Journal]
- Vassili C. Mavron, T. P. McDonough, Mohan S. Shrikhande
Quasi-Symmetric Designs with Good Blocks and Intersection Number One. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2003, v:28, n:2, pp:147-162 [Journal]
- Stefka Bouyuklieva, Masaaki Harada
Extremal Self-Dual [50, 25, 10] Codes with Automorphisms of Order 3 and Quasi-Symmetric 2-(49, 9, 6) Designs. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2003, v:28, n:2, pp:163-169 [Journal]
- Koichi Betsumiya, T. Aaron Gulliver, Masaaki Harada
Extremal Self-Dual Codes over F2 × F2. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2003, v:28, n:2, pp:171-186 [Journal]
- Sheng-Bo Xu, Jeroen Doumen, Henk C. A. van Tilborg
On the Security of Digital Signature Schemes Based on Error-Correcting Codes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2003, v:28, n:2, pp:187-199 [Journal]
- Svetla Nikova, Ventzislav Nikov
Improvement of the Delsarte Bound for t-Designs When It Is Not the Best Bound Possible. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2003, v:28, n:2, pp:201-222 [Journal]
|