We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 41-60 of 10,000 results
  1. Subgroup total perfect codes in Cayley sum graphs

    **aomeng Wang, Lina Wei, ... Sanming Zhou in Designs, Codes and Cryptography
    Article 29 April 2024
  2. Special directions on the finite affine plane

    In this paper we study the number of special directions of sets of cardinality divisible by p on a finite plane of order p , where p is a prime. We...

    Gergely Kiss, Gábor Somlai in Designs, Codes and Cryptography
    Article Open access 29 April 2024
  3. Further results on covering codes with radius R and codimension \(tR+1\)

    Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco in Designs, Codes and Cryptography
    Article 27 April 2024
  4. Chain-imprimitive, flag-transitive 2-designs

    We consider 2-designs which admit a group of automorphisms that is flag-transitive and leaves invariant a chain of nontrivial point-partitions. We...

    Carmen Amarra, Alice Devillers, Cheryl E. Praeger in Designs, Codes and Cryptography
    Article Open access 20 April 2024
  5. Meet-in-the-middle attacks on AES with value constraints

    In meet-in-the-middle (MITM) attacks, the sizes of the precomputation tables determine the effectiveness. In this paper, value constraints are...

    **aoli Dong, Jun Liu, ... Jie Chen in Designs, Codes and Cryptography
    Article 18 April 2024
  6. Symmetric 2-adic complexity of Tang–Gong interleaved sequences from generalized GMW sequence pair

    Tang–Gong interleaved sequences constructed from the generalized GMW sequence pair are a class of binary sequences with optimal autocorrelation...

    Bo Yang, Kangkang He, ... Zibi **ao in Designs, Codes and Cryptography
    Article 16 April 2024
  7. Fast decoding of lifted interleaved linearized Reed–Solomon codes for multishot network coding

    Martínez-Peñas and Kschischang (IEEE Trans. Inf. Theory 65(8):4785–4803, 2019) proposed lifted linearized Reed–Solomon codes as suitable codes for...

    Hannes Bartz, Sven Puchinger in Designs, Codes and Cryptography
    Article Open access 16 April 2024
  8. Constructing linked systems of relative difference sets via Schur rings

    In the present paper, we study relative difference sets (RDSs) and linked systems of them. It is shown that a closed linked system of RDSs is always...

    Mikhail Muzychuk, Grigory Ryabov in Designs, Codes and Cryptography
    Article 16 April 2024
  9. New constructions of signed difference sets

    Zhiwen He, Tingting Chen, Gennian Ge in Designs, Codes and Cryptography
    Article 10 April 2024
  10. Jacobi polynomials for the first-order generalized Reed–Muller codes

    In this paper, we give the Jacobi polynomials for first-order generalized Reed–Muller codes. We show as a corollary the nonexistence of combinatorial...

    Ryosuke Yamaguchi in Designs, Codes and Cryptography
    Article Open access 08 April 2024
  11. Ovoids of Q(6, q) of low degree

    Daniele Bartoli, Nicola Durante, Giovanni Giuseppe Grimaldi in Designs, Codes and Cryptography
    Article Open access 06 April 2024
  12. Anonymous attribute-based broadcast encryption with hidden multiple access structures

    Due to the high demands of data communication, the broadcasting system streams the data daily. This service not only sends out the message to the...

    Tran Viet Xuan Phuong in Designs, Codes and Cryptography
    Article Open access 06 April 2024
Did you find what you were looking for? Share feedback.