


default search action
2. IWCC 2009: Zhangjiajie, China
- Yeow Meng Chee, Chao Li, San Ling

, Huaxiong Wang, Chaoping Xing:
Coding and Cryptology, Second International Workshop, IWCC 2009, Zhangjiajie, China, June 1-5, 2009. Proceedings. Lecture Notes in Computer Science 5557, Springer 2009, ISBN 978-3-642-01813-8 - Claude Carlet, Keqin Feng:

An Infinite Class of Balanced Vectorial Boolean Functions with Optimum Algebraic Immunity and Good Nonlinearity. 1-11 - Gérard D. Cohen:

Separation and Witnesses. 12-21 - Charles J. Colbourn, Gerzson Kéri

:
Binary Covering Arrays and Existentially Closed Graphs. 22-33 - Cunsheng Ding

:
A Class of Three-Weight and Four-Weight Codes. 34-42 - Ilya Dumer

:
Equal-Weight Fingerprinting Codes. 43-51 - Tuvi Etzion:

Problems on Two-Dimensional Synchronization Patterns. 52-62 - Dengguo Feng, Jing Xu:

A New Client-to-Client Password-Authenticated Key Agreement Protocol. 63-76 - John B. Friedlander, Igor E. Shparlinski

:
Elliptic Twin Prime Conjecture. 77-81 - Gerard van der Geer:

Hunting for Curves with Many Points. 82-96 - Venkatesan Guruswami:

List Decoding of Binary Codes-A Brief Survey of Some Recent Results. 97-106 - Wen-Ching Winnie Li, Min Lu, Chenying Wang:

Recent Developments in Low-Density Parity-Check Codes. 107-123 - Keith M. Martin:

On the Applicability of Combinatorial Designs to Key Predistribution for Wireless Sensor Networks. 124-145 - Gretchen L. Matthews

:
On Weierstrass Semigroups of Some Triples on Norm-Trace Curves. 146-156 - V. Kumar Murty, Nikolajs Volkovs:

ERINDALE: A Polynomial Based Hashing Algorithm. 157-170 - Frédérique E. Oggier:

A Survey of Algebraic Unitary Codes. 171-187 - Dingyi Pei:

New Family of Non-Cartesian Perfect Authentication Codes. 188-201 - Raphael C.-W. Phan

, Serge Vaudenay:
On the Impossibility of Strong Encryption Over . 202-218 - Longjiang Qu, Chao Li:

Minimum Distance between Bent and Resilient Boolean Functions. 219-232 - Dongvu Tonien

, Reihaneh Safavi-Naini, Peter Nickolas
, Yvo Desmedt:
Unconditionally Secure Approximate Message Authentication. 233-247 - Nam Yul Yu

, Guang Gong:
Multiplexing Realizations of the Decimation-Hadamard Transform of Two-Level Autocorrelation Sequences. 248-258 - Gilles Zémor

:
On Cayley Graphs, Surface Codes, and the Limits of Homological Coding for Quantum Error Correction. 259-273

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














