The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
2005, volume: 37, number: 1

  1. Anka Golemac, Tanja Vucicic, Josko Mandic
    One (96, 20, 4)-symmetric Design and related Nonabelian Difference Sets. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:5-13 [Journal]
  2. A. J. van Zanten, I. Nengah Suparta
    On the Construction of Linear q-ary Lexicodes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:15-29 [Journal]
  3. Philippe Langevin, Pascal Véron
    On the Non-linearity of Power Functions. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:31-43 [Journal]
  4. Gerzson Kéri, Patric R. J. Östergård
    Bounds for Covering Codes over Large Alphabets. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:45-60 [Journal]
  5. Alexander A. Davydov, Giorgio Faina, Fernanda Pambianco
    Constructions of Small Complete Caps in Binary Projective Spaces. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:61-80 [Journal]
  6. John Malone-Lee
    Signcryption with Non-interactive Non-repudiation. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:81-109 [Journal]
  7. Masaaki Homma, Seon Jeong Kim
    Toward the Determination of the Minimum Distance of Two-Point Codes on a Hermitian Curve. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:111-132 [Journal]
  8. Friederike Brezing, Annegret Weng
    Elliptic Curves Suitable for Pairing Based Cryptography. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:133-141 [Journal]
  9. Behruz Tayfeh-Rezaie
    On the Existence of Large Sets of t-designs of Prime Sizes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:143-149 [Journal]
  10. Rudolf Ahlswede, Harout K. Aydinian, Levon H. Khachatrian
    Forbidden (0, 1)-vectors in Hyperplanes of Rn: The unrestricted case. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:151-167 [Journal]
  11. Pim Tuyls, Henk D. L. Hollmann, Jack H. van Lint, Ludo M. G. M. Tolhuizen
    XOR-based Visual Cryptography Schemes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:1, pp:169-186 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002