The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
2005, volume: 36, number: 2

  1. Joris De Kaey
    On a More General Characterisation of Steiner Systems. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:2, pp:117-129 [Journal]
  2. Philippe Langevin, Jean-Pierre Zanotti
    Nonlinearity of Some Invariant Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:2, pp:131-146 [Journal]
  3. F. L. Chiera
    Type II Codes over Z/2kZ, Invariant Rings and Theta Series. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:2, pp:147-158 [Journal]
  4. Shenglin Zhou
    Block Primitive 2-(v, k, 1) Designs Admitting a Ree Group of Characteristic Two. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:2, pp:159-169 [Journal]
  5. Ka Hin Leung, Bernhard Schmidt
    The Field Descent Method. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:2, pp:171-188 [Journal]
  6. Claude Carlet
    Concatenating Indicators of Flats for Designing Cryptographic Functions. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:2, pp:189-202 [Journal]
  7. Vikram Jha
    Local Schur's Lemma and Commutative Semifields. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:36, n:2, pp:203-216 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002