Search

Showing total 1,429 results

Search Constraints

Start Over You searched for: Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Journal designs, codes and cryptography Remove constraint Journal: designs, codes and cryptography
1,429 results

Search Results

1. Hamming codes for wet paper steganography

3. New $$M$$ M -ary sequences with low autocorrelation from interleaved technique

4. Code-based signatures from new proofs of knowledge for the syndrome decoding problem

5. Subset sums and block designs in a finite vector space

6. A study of the separating property in Reed-Solomon codes by bounding the minimum distance

7. A family of linear codes from constant dimension subspace codes

8. Diagonal groups and arcs over groups

9. Combinatorial invariants for nets of conics in $$\mathrm {PG}(2,q)$$

10. On the properties of generalized cyclotomic binary sequences of period $$2p^m$$

11. Construction of $${\text {MDS}}$$ matrices from generalized Feistel structures

12. Secret sharing schemes with partial broadcast channels

13. Fast decoding of quasi-perfect Lee distance codes

14. The polynomial degree of the Grassmannian G(1,n,q) of lines in finite projective space PG(n, q)

15. GOB designs for authentication codes with arbitration

16. On the classification of perfect codes: side class structures

17. Optimal (2, n) visual cryptographic schemes

18. Constructions of External Difference Families and Disjoint Difference Families

19. The Existence of (ν,6, λ)-Perfect Mendelsohn Designs with λ > 1

20. On the Construction of Permutation Arrays via Mappings from Binary Vectors to Permutations

21. A Construction of Optimal Constant Composition Codes

22. Error Probabilities for Bounded Distance Decoding

23. Generalised Cumulative Arrays in Secret Sharing

25. Basic Theory in Construction of Boolean Functions with Maximum Possible Annihilator Immunity

26. Latin Squares without Orthogonal Mates

27. Basic Properties of the (t, n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels

28. Asymptotic Nonlinearity of Boolean Functions

29. The Two-Point Codes with the Designed Distance on a Hermitian Curve in Even Characteristic

30. New Algorithms of Distance-Increasing Mappings from Binary Vectors to Permutations by Swaps

31. Blocking Sets of Certain Line Sets Related to a Conic

32. Trading Inversions for Multiplications in Elliptic Curve Cryptography

33. A-Codes from Rational Functions over Galois Rings

34. A Geometric Construction of the Hyperbolic Fibrations Associated with a Flock, qEven

35. Luby–Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme

36. Sharing Multiple Secrets: Models, Schemes and Analysis

37. Communication-Computation Trade-off in Executing ECDSA in a Contactless Smartcard

38. Slim Near Polygons

39. Forbidden (0,1)-vectors in Hyperplanes of <img src="/fulltext-image.asp?format=htmlnonpaginated&src=X03502L413N5T848_html\10623_2004_Article_3811_TeX2GIFIEq1.gif" border="0" alt="$$\mathbb{R}^{n}$$" />: The unrestricted case

40. On the Construction of Linear q-ary Lexicodes

41. Resolvable Maximum Packings with Quadruples

42. The Near Resolvable 2-(13, 4, 3) Designs and Thirteen-Player Whist Tournaments

43. Register Synthesis for Algebraic Feedback Shift Registers Based on Non-Primes

44. A Criterion for Designs in ℤ4-codes on the Symmetrized Weight Enumerator

45. Forbidden (0,1)-Vectors in Hyperplanes of ℝn: The Restricted Case

46. Constructions of Nested Partial Difference Sets with Galois Rings

47. How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves

48. The Diffie–Hellman Protocol

49. The Eigenspaces of the Bose-Mesner-Algebras of the Association Schemes Corresponding to Projective Spaces and Polar Spaces

50. The phantom of differential characteristics