Journals in DBLP
Aggelos Kiayias , Moti Yung Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:43, n:2-3, pp:61-78 [Journal ] Jonathan Jedwab , Matthew G. Parker There are no Barker arrays having more than two dimensions. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:43, n:2-3, pp:79-84 [Journal ] Igor Gashkov , J. A. O. Ekberg , D. Taub A geometric approach to finding new lower bounds of A(n, d, w). [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:43, n:2-3, pp:85-91 [Journal ] Ji-Woong Jang , Jong-Seon No , Habong Chung Butson Hadamard matrices with partially cyclic core. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:43, n:2-3, pp:93-101 [Journal ] John Arhin On the structure of 1-designs with at most two block intersection numbers. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:43, n:2-3, pp:103-114 [Journal ] Lijun Ji A construction for large sets of disjoint Kirkman triple systems. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:43, n:2-3, pp:115-122 [Journal ] E. J. Cheon , T. Maruta On the minimum length of some linear codes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:43, n:2-3, pp:123-135 [Journal ] Maria Bras-Amorós Algebraic-geometry codes, one-point codes, and evaluation codes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:43, n:2-3, pp:137-145 [Journal ] Bahattin Yildiz Weights modulo p e of linear codes over rings. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:43, n:2-3, pp:147-165 [Journal ] Wen-Ai Jackson , S. Murphy Projective aspects of the AES inversion. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2007, v:43, n:2-3, pp:167-179 [Journal ]