ปี พ.ศ. 2557 |
1 |
Matrix product codes over finite commutative Frobenius rings |
2 |
Hermitian self-dual abelian codes |
ปี พ.ศ. 2556 |
3 |
Upper bounds on matching families in BBZ{pq}^{n} |
4 |
A q-polynomial approach to cyclic codes |
5 |
Abelian codes in principal ideal group algebras |
6 |
Feasibility and practicability of standardized cryptography on 4-bit micro controllers |
7 |
On the Fourier spectra of new APN functions |
ปี พ.ศ. 2555 |
8 |
Threshold changeable secret sharing schemes revisited |
9 |
Standardized signature algorithms on ultra-constrained 4-bit MCU |
10 |
The relation and transformation between hierarchical inner product encryption and spatial encryption |
ปี พ.ศ. 2554 |
11 |
On self-dual cyclic codes over finite fields |
12 |
Additive asymmetric quantum codes |
13 |
Improved Meet-in-the-Middle cryptanalysis of KTANTAN (poster) |
14 |
Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences |
15 |
From skew-cyclic codes to asymmetric quantum codes |
16 |
Query-efficient locally decodable codes of subexponential length |
17 |
On the modular inversion hidden number problem |
18 |
Association schemes arising from bent functions |
19 |
Pushing the limits : a very compact and a threshold implementation of AES |
20 |
Constructing irreducible polynomials over finite fields |
21 |
A note on linearized polynomials and the dimension of their kernels |
ปี พ.ศ. 2553 |
22 |
Skew-constacyclic codes over finite chain rings |
23 |
List decodability at small radii |
24 |
Advanced meet-in-the-middle preimage attacks : first results on full Tiger, and improved results on MD4 and SHA-2 |
25 |
Application of classical Hermitian self-orthogonal MDS codes to quantum MDS codes |
26 |
Generalization of Steane’s enlargement construction of quantum codes and applications |
27 |
On multidimensional linear cryptanalysis |
28 |
Side-channel resistant crypto for less than 2,300 GE |
29 |
256 bit standardized crypto for 650 GE – GOST revisited |
30 |
Asymmetric quantum codes : characterization and constructions |
ปี พ.ศ. 2552 |
31 |
Linear size optimal q-ary constant-weight codes and constant-composition codes |
32 |
Practical pseudo-collisions for hash functions ARIRANG-224/384 |
33 |
Cryptanalysis of the LAKE hash family |
34 |
On the constructions of constant-composition codes from perfect nonlinear functions |
35 |
Properties and applications of preimage distributions of perfect nonlinear functions |
36 |
On the covering structures of two classes of linear codes from perfect nonlinear functions |
ปี พ.ศ. 2551 |
37 |
The sizes of optimal q-ary codes of weight three and distance four : a complete solution |
38 |
Improved lower bounds for constant GC-content DNA codes |
39 |
Cycle systems in the complete bipartite graph plus a one-factor |
40 |
Access structures of elliptic secret sharing schemes |
41 |
Cyclic codes over GR(p2,m) of length pk |
ปี พ.ศ. 2550 |
42 |
The PBD-closure of constant-composition codes |
43 |
Constructions for q-ary constant-weight codes |
44 |
Constructions and bounds on linear error-block codes |
45 |
Some constructions of (t, m, s)-nets with improved parameters |
ปี พ.ศ. 2549 |
46 |
Improved p-ary codes and sequence families from Galois rings of characteristic p2 |
47 |
Aperiodic and odd correlations of some p-ary sequences from Galois rings |
48 |
On the algebraic structure of quasi-cyclic codes IV : repeated roots |
49 |
Cyclic codes over Z4 of even length |
50 |
On the reliability-order-based decoding algorithms for binary linear block codes |
51 |
Asymptotic bounds on quantum codes from algebraic geometry codes |
ปี พ.ศ. 2548 |
52 |
On the algebraic structure of quasi-cyclic codes III : generator theory |
53 |
Quantum codes from concatenated algebraic-geometric codes |
54 |
An explicit class of codes with good parameters and their duals |
ปี พ.ศ. 2547 |
55 |
A family of group character codes |
56 |
On viterbi-like algorithms and their application to Reed–Muller codes |
57 |
On the variance of average distance of subsets in the Hamming space |
ปี พ.ศ. 2546 |
58 |
Process-parameter-interface model for design management |
59 |
Good self-dual quasi-cyclic codes exist |
60 |
On the algebraic structure of quasi-cyclic codes II : chain rings |
61 |
Nonlinear p-ary sequences |
62 |
New lower bounds and constructions for binary codes correcting asymmetric errors |
63 |
Type II codes over F2m + uF2m |
64 |
Z8-Kerdock codes and pseudorandom binary sequences |
ปี พ.ศ. 2545 |
65 |
New binary linear codes from algebraic curves |
66 |
Highly symmetric expanders |
ปี พ.ศ. 2544 |
67 |
Duadic codes over Z2k |
68 |
Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound |
69 |
Duadic codes over F2 + uF2 |
70 |
On the algebraic structure of quasi-cyclic codes I : finite fields |
71 |
Constructions of semi-regular relative difference sets |
72 |
Type II codes over F4+uF4 |
ปี พ.ศ. 2543 |
73 |
A class of linear codes with good parameters from algebraic curves |
74 |
Elementary 2-group character codes |
75 |
Split group codes |
76 |
A class of linear codes with good parameters |
77 |
Secret-sharing with a class of ternary codes |
78 |
Maps between Jacobians of Shimura curves and congruence kernels |
79 |
Symmetric polynomials and some good codes |
ปี พ.ศ. 2542 |
80 |
Combinatorial coverings from geometries over principal ideal rings |
81 |
Attack on RSA-type cryptosystems based on singular cubic curves over Z/nZ |
ปี พ.ศ. 2541 |
82 |
On component groups of Jo(N) and degeneracy maps |
83 |
Almost perfect sequences with θ=2. |
ปี พ.ศ. 2540 |
84 |
On the rational cuspidal subgroup and the rational torsion points of Jo(pq) |
ปี พ.ศ. 2538 |
85 |
Shimura subgroups and degeneracy maps |
ปี พ.ศ. 2537 |
86 |
The fitting ideal of J0(q)(Fpn) over the Hecke algebra |
ปี พ.ศ. 2536 |
87 |
Shimura subgroups of Jacobians of Shimura curves |
88 |
Congruences between cusp forms and the geometry of Jacobians of modular curves |
89 |
Projective covering designs |