


default search action
Designs, Codes and Cryptography, Volume 51, 2009
Volume 51, Number 1, April 2009
- Tian Tian, Wen-Feng Qi:
A note on the crosscorrelation of maximal length FCSR sequences. 1-8 - E. J. Cheon:
A class of optimal linear codes of length one above the Griesmer bound. 9-20 - Yu. I. Lyubich:
On tight projective designs. 21-31 - Wilfried Meidl:
Remarks on a cyclotomic sequence. 33-43 - Krzysztof Petelczyc
, Malgorzata Prazmowska:
103-configurations and projective realizability of multiplied configurations. 45-54 - Steven T. Dougherty, Hongwei Liu:
Independence of vectors in codes over rings. 55-68 - Sunghyu Han, Jon-Lark Kim:
The nonexistence of near-extremal formally self-dual codes. 69-77 - R. Julian R. Abel, Norman J. Finizio, Malcolm Greig, Luis B. Morales
:
Existence of (2, 8) GWhD( v ) and (4, 8) GWhD( v ) with v .0, 1 (mod 8){v \equiv 0, 1 (mod 8)}. 79-97 - Dimitrios Poulakis:
A variant of Digital Signature Algorithm. 99-104
Volume 51, Number 2, May 2009
- Iliya Bouyukliev
, Veerle Fack, Joost Winne:
2-(31, 15, 7), 2-(35, 17, 8) and 2-(36, 15, 6) designs with automorphisms of odd prime order, and their related Hadamard matrices and codes. 105-122 - Antonio Cossidente
:
Some constructions on the Hermitian surface. 123-129 - Dieter Jungnickel, Vladimir D. Tonchev
:
Polarities, quasi-symmetric designs, and Hamada's conjecture. 131-140 - Ron Shaw, Neil A. Gordon
:
The cubic Segre variety in PG(5, 2). 141-156 - John Bamberg
, Frank De Clerck, Nicola Durante:
A hemisystem of a nonclassical generalised quadrangle. 157-165 - Michael J. Collins:
Upper bounds for parent-identifying set systems. 167-173 - Tao Feng
:
Difference sets with n = 5 p r . 175-194 - Jooyoung Lee, Yongjin Yeom
:
Efficient RFID authentication protocols based on pseudorandom sequence generators. 195-210 - M. R. Darafsheh, Ali Iranmanesh
, R. Kahkeshani:
Some designs and codes invariant under the groups S 9 and A 8. 211-223
Volume 51, Number 3, June 2009
- Haitao Cao, Jeffrey H. Dinitz, Donald L. Kreher
, Douglas R. Stinson, Ruizhong Wei:
On orthogonal generalized equitable rectangles. 225-230 - Derek H. Smith
, Richard P. Ward, Stephanie Perkins
:
Gold codes, Hadamard partitions and the security of CDMA systems. 231-243 - Sarah Spence Adams, Matthew Crawford, Caitlin Greeley, Bryce Lee, Mathav Kishore Murugan:
Multilevel and multidimensional Hadamard matrices. 245-252 - Koji Momihara:
Strong difference families, difference covers, and their applications for relative difference families. 253-273 - Silvia P. Boumova, Peter G. Boyvalenkov
, Hristina N. Kulina
, Maya Stoyanova
:
Polynomial techniques for investigation of spherical designs. 275-288 - José Joaquín Bernal
, Ángel del Río
, Juan Jacobo Simón:
An intrinsical description of group codes. 289-300 - Jessica F. Burkhart, Neil J. Calkin
, Shuhong Gao, Justine C. Hyde-Volpe, Kevin James
, Hiren Maharaj
, Shelly Manber, Jared Ruiz, Ethan Smith:
Finite field elements of high order arising from modular curves. 301-314 - Thomas Martin
, Keith M. Martin, Peter R. Wild:
Establishing the broadcast efficiency of the Subset Difference Revocation Scheme. 315-334

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.