The SCEAS System
Navigation Menu

Journals in DBLP

Des. Codes Cryptography
2006, volume: 39, number: 2

  1. Steven T. Dougherty, San Ling
    Cyclic Codes Over Z4 of Even Length. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:127-153 [Journal]
  2. Hassan Aly, Arne Winterhof
    On the Linear Complexity Profile of Nonlinear Congruential Pseudorandom Number Generators with Dickson Polynomials. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:155-162 [Journal]
  3. Michael Giudici
    Codes with a Certain Weight-preserving Transitive Group of Automorphisms. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:163-172 [Journal]
  4. Kejun Chen, Ruizhong Wei
    Super-simple (nu, 5, 5) Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:173-187 [Journal]
  5. Mathieu Ciet, Marc Joye, Kristin Lauter, Peter L. Montgomery
    Trading Inversions for Multiplications in Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:189-206 [Journal]
  6. Gilberto Bini
    A-Codes from Rational Functions over Galois Rings. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:207-214 [Journal]
  7. Cem Güneri, Ferruh Özbudak
    Improvements on Generalized Hamming Weights of Some Trace Codes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:215-231 [Journal]
  8. Gilles Piret
    Luby-Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:233-245 [Journal]
  9. Dean Crnkovic
    A Series of Regular Hadamard Matrices. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:247-251 [Journal]
  10. Marten van Dijk, Dwaine E. Clarke, Blaise Gassend, G. Edward Suh, Srinivas Devadas
    Speeding up Exponentiation using an Untrusted Computational Resource. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:253-273 [Journal]
  11. Paulo S. L. M. Barreto, José Felipe Voloch
    Efficient Computation of Roots in Finite Fields. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:275-280 [Journal]
  12. Deirdre Luyckx
    A Geometric Construction of the Hyperbolic Fibrations Associated with a Flock, q Even. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:281-288 [Journal]
  13. Ron Shaw, Neil A. Gordon
    The Polynomial Degree of the GrassmannianG1, n, 2. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:289-306 [Journal]
  14. Petr Lisonek, Mahdad Khatirinejad
    Erratum for "A Family of Complete Caps in PG(n, 2)". [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2006, v:39, n:2, pp:307- [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002