ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Coding and Cryptography - Lecture Notes in Computer Science
Latest Publications
TOTAL DOCUMENTS
33
(FIVE YEARS 0)
H-INDEX
7
(FIVE YEARS 0)
Published By Springer Berlin Heidelberg
9783540354819, 9783540354826
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
3-Designs from Z 4-Goethals-Like Codes and Variants of Cyclotomic Polynomials
Coding and Cryptography - Lecture Notes in Computer Science
◽
10.1007/11779360_6
◽
2006
◽
pp. 55-68
◽
Cited By ~ 1
Author(s):
Jyrki Lahtonen
◽
Kalle Ranto
◽
Roope Vehkalahti
Keyword(s):
Cyclotomic Polynomials
Download Full-text
Improved Bounds on Weil Sums over Galois Rings and Homogeneous Weights
Coding and Cryptography - Lecture Notes in Computer Science
◽
10.1007/11779360_32
◽
2006
◽
pp. 412-426
◽
Cited By ~ 1
Author(s):
San Ling
◽
Ferruh Özbudak
Keyword(s):
Galois Rings
◽
Homogeneous Weights
◽
Weil Sums
Download Full-text
A Novel Method for Constructing Almost Perfect Polyphase Sequences
Coding and Cryptography - Lecture Notes in Computer Science
◽
10.1007/11779360_27
◽
2006
◽
pp. 346-353
◽
Cited By ~ 3
Author(s):
Xiangyong Zeng
◽
Lei Hu
◽
Qingchong Liu
Keyword(s):
Novel Method
Download Full-text
Constructions of Complementary Sequences for Power-Controlled OFDM Transmission
Coding and Cryptography - Lecture Notes in Computer Science
◽
10.1007/11779360_26
◽
2006
◽
pp. 330-345
◽
Cited By ~ 2
Author(s):
Kai-Uwe Schmidt
◽
Adolf Finger
Keyword(s):
Complementary Sequences
Download Full-text
Space-Time Code Designs Based on the Generalized Binary Rank Criterion with Applications to Cooperative Diversity
Coding and Cryptography - Lecture Notes in Computer Science
◽
10.1007/11779360_7
◽
2006
◽
pp. 69-84
◽
Cited By ~ 6
Author(s):
A. Roger Hammons
Keyword(s):
Cooperative Diversity
◽
Space Time
◽
Time Code
Download Full-text
Dimension of the Linearization Equations of the Matsumoto-Imai Cryptosystems
Coding and Cryptography - Lecture Notes in Computer Science
◽
10.1007/11779360_20
◽
2006
◽
pp. 242-251
◽
Cited By ~ 3
Author(s):
Adama Diene
◽
Jintai Ding
◽
Jason E. Gower
◽
Timothy J. Hodges
◽
Zhijun Yin
Download Full-text
Frequency/Time Hopping Sequences with Large Linear Complexities
Coding and Cryptography - Lecture Notes in Computer Science
◽
10.1007/11779360_30
◽
2006
◽
pp. 386-396
◽
Cited By ~ 1
Author(s):
Yun-Pyo Hong
◽
Hong-Yeop Song
Keyword(s):
Time Hopping
Download Full-text
Finding Good Differential Patterns for Attacks on SHA-1
Coding and Cryptography - Lecture Notes in Computer Science
◽
10.1007/11779360_14
◽
2006
◽
pp. 164-177
◽
Cited By ~ 11
Author(s):
Krystian Matusiewicz
◽
Josef Pieprzyk
Download Full-text
Open Problems Related to Algebraic Attacks on Stream Ciphers
Coding and Cryptography - Lecture Notes in Computer Science
◽
10.1007/11779360_10
◽
2006
◽
pp. 120-134
◽
Cited By ~ 30
Author(s):
Anne Canteaut
Keyword(s):
Stream Ciphers
◽
Open Problems
◽
Algebraic Attacks
Download Full-text
RSA-Based Secret Handshakes
Coding and Cryptography - Lecture Notes in Computer Science
◽
10.1007/11779360_21
◽
2006
◽
pp. 252-274
◽
Cited By ~ 23
Author(s):
Damien Vergnaud
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close