
Journals in DBLP
 Nicola Melone, Udo Ott
On the Rank of Truncated Incidence Matrices of Linear Spaces. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:4, pp:307313 [Journal]
 Shuhong Gao, Hendrik W. Lenstra Jr.
Optimal Normal Bases. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:4, pp:315323 [Journal]
 WenAi Jackson, Peter R. Wild
Relations between Two Perfect Ternary Sequence Constructions. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:4, pp:325332 [Journal]
 Zhexian Wan
Construction of Cartesian Authentication Codes from Unitary Geometry. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:4, pp:333356 [Journal]
 Douglas R. Stinson
An Explication of Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:4, pp:357390 [Journal]
 D. de Caen, Chris D. Godsil, Gordon F. Royle
On the pRank of Incidence Matrices and a Bound of Bruen and Ott. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:4, pp:391394 [Journal]
 Bernhard Schmidt
Note on a Question by S. Bagchi and B. Bagchi. [Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 1992, v:2, n:4, pp:395 [Journal]
