The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
2005, volume: 35, number: 1

  1. Jovan Dj. Golic, Philip Hawkes
    Vectorial Approach to Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:35, n:1, pp:5-19 [Journal]
  2. John P. McSorley, Nicholas C. K. Phillips, Walter D. Wallis, Joseph L. Yucas
    Double Arrays, Triple Arrays and Balanced Grids. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:35, n:1, pp:21-45 [Journal]
  3. Wen-Guey Tzeng, Zhi-Jia Tzeng
    A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:35, n:1, pp:47-61 [Journal]
  4. Thierry P. Berger, Pierre Loidreau
    How to Mask the Structure of Codes for a Cryptographic Use. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:35, n:1, pp:63-79 [Journal]
  5. Olgica Milenkovic
    Support Weight Enumerators and Coset Weight Distributions of Isodual Codes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:35, n:1, pp:81-109 [Journal]
  6. Florian Hess, Igor Shparlinski
    On the Linear Complexity and Multidimensional Distribution of Congruential Generators over Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:35, n:1, pp:111-117 [Journal]
  7. Daniel R. L. Brown
    Generic Groups, Collision Resistance, and ECDSA. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:35, n:1, pp:119-152 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002