The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
2006, volume: 38, number: 1

  1. Masaaki Harada
    Self-Orthogonal 3-(56, 12, 65) Designs and Extremal Doubly-Even Self-Dual Codes of Length 56. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:1, pp:5-16 [Journal]
  2. Mehmet Ozen, Irfan Siap
    Linear Codes over Fq[u]/(us) with Respect to the Rosenbloom-Tsfasman Metric. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:1, pp:17-29 [Journal]
  3. T. Alderson
    (6, 3)-MDS Codes over an Alphabet of Size 4. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:1, pp:31-40 [Journal]
  4. Jean-Sébastien Coron, David Naccache, Yvo Desmedt, Andrew M. Odlyzko, Julien P. Stern
    Index Calculation Attacks on RSA Signature and Encryption. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:1, pp:41-53 [Journal]
  5. Masaaki Homma, Seon Kim
    The Two-Point Codes on a Hermitian Curve with the Designed Minimum Distance. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:1, pp:55-81 [Journal]
  6. L. Ji
    Asymptotic Determination of the Last Packing Number of Quadruples. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:1, pp:83-95 [Journal]
  7. Steven T. Dougherty, T. Aaron Gulliver, Manabu Oura
    Higher Weights for Ternary and Quaternary Self-Dual Codes*. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:1, pp:97-112 [Journal]
  8. Michel Lavrauw
    Sublines of Prime Order Contained in the Set of Internal Points of a Conic. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:1, pp:113-123 [Journal]
  9. Olof Heden
    A Full Rank Perfect Code of Length 31. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:1, pp:125-129 [Journal]
  10. Simeon Ball, Patrick Govaerts, Leo Storme
    On Ovoids of Parabolic Quadrics. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:1, pp:131-145 [Journal]
  11. A. Caranti, F. Volta
    The Round Functions of Cryptosystem PGM Generate the Symmetric Group. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:38, n:1, pp:147-155 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002