Boucher, D.; Ulmer, F. Linear codes using skew polynomials with automorphisms and derivations. (English) Zbl 1302.94065 Des. Codes Cryptography 70, No. 3, 405-431 (2014). MSC: 94B05 PDFBibTeX XMLCite \textit{D. Boucher} and \textit{F. Ulmer}, Des. Codes Cryptography 70, No. 3, 405--431 (2014; Zbl 1302.94065) Full Text: DOI HAL
Özbudak, Ferruh; Gülmez Temür, Burcu Finite number of fibre products of Kummer covers and curves with many points over finite fields. (English) Zbl 1326.11030 Des. Codes Cryptography 70, No. 3, 385-404 (2014). Reviewer: Gökhan Soydan (Bursa) MSC: 11G20 14G15 14H25 PDFBibTeX XMLCite \textit{F. Özbudak} and \textit{B. Gülmez Temür}, Des. Codes Cryptography 70, No. 3, 385--404 (2014; Zbl 1326.11030) Full Text: DOI
Bogdanov, Andrey; Rijmen, Vincent Linear hulls with correlation zero and linear cryptanalysis of block ciphers. (English) Zbl 1323.94103 Des. Codes Cryptography 70, No. 3, 369-383 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Bogdanov} and \textit{V. Rijmen}, Des. Codes Cryptography 70, No. 3, 369--383 (2014; Zbl 1323.94103) Full Text: DOI
Zheng, Qun-Xiong; Qi, Wen-Feng; Tian, Tian On the distinctness of modular reductions of primitive sequences over \(\mathbb Z/(2^{32}-1)\). (English) Zbl 1323.11013 Des. Codes Cryptography 70, No. 3, 359-368 (2014). MSC: 11B50 94A55 94A60 PDFBibTeX XMLCite \textit{Q.-X. Zheng} et al., Des. Codes Cryptography 70, No. 3, 359--368 (2014; Zbl 1323.11013) Full Text: DOI
Batoul, Aicha; Guenda, Kenza; Gulliver, T. Aaron On self-dual cyclic codes over finite chain rings. (English) Zbl 1323.94164 Des. Codes Cryptography 70, No. 3, 347-358 (2014). MSC: 94B15 94B05 PDFBibTeX XMLCite \textit{A. Batoul} et al., Des. Codes Cryptography 70, No. 3, 347--358 (2014; Zbl 1323.94164) Full Text: DOI arXiv
Herranz, Javier; Ruiz, Alexandre; Sáez, Germán Signcryption schemes with threshold unsigncryption, and applications. (English) Zbl 1323.94116 Des. Codes Cryptography 70, No. 3, 323-345 (2014). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{J. Herranz} et al., Des. Codes Cryptography 70, No. 3, 323--345 (2014; Zbl 1323.94116) Full Text: DOI Link
Lee, Myung-Kyu; Yang, Kyeongcheol The exponent of a polarizing matrix constructed from the Kronecker product. (English) Zbl 1298.94046 Des. Codes Cryptography 70, No. 3, 313-322 (2014). Reviewer: Adrian Atanasiu (Bucureşti) MSC: 94A24 11T71 20H30 PDFBibTeX XMLCite \textit{M.-K. Lee} and \textit{K. Yang}, Des. Codes Cryptography 70, No. 3, 313--322 (2014; Zbl 1298.94046) Full Text: DOI arXiv
Choi, Soohak; Hyun, Jong Yoon; Kim, Hyun Kwang Local duality theorem for \(q\)-ary 1-perfect codes. (English) Zbl 1323.94155 Des. Codes Cryptography 70, No. 3, 305-311 (2014). MSC: 94B05 PDFBibTeX XMLCite \textit{S. Choi} et al., Des. Codes Cryptography 70, No. 3, 305--311 (2014; Zbl 1323.94155) Full Text: DOI
Wu, Junhua Proofs of two conjectures on the dimensions of binary codes. (English) Zbl 1288.51008 Des. Codes Cryptography 70, No. 3, 273-304 (2014). Reviewer: Sharad Sane (Mumbai) MSC: 51E20 20C20 05B25 PDFBibTeX XMLCite \textit{J. Wu}, Des. Codes Cryptography 70, No. 3, 273--304 (2014; Zbl 1288.51008) Full Text: DOI arXiv
Ideguchi, Kota; Tischhauser, Elmar; Preneel, Bart Internal differential collision attacks on the reduced-round Grøstl-0 hash function. (English) Zbl 1291.94101 Des. Codes Cryptography 70, No. 3, 251-271 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Ideguchi} et al., Des. Codes Cryptography 70, No. 3, 251--271 (2014; Zbl 1291.94101) Full Text: DOI