On the relation between A-codes and codes correcting independent errors
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
A New Approach to the Main Conjecture on Algebraic-Geometric MDS Codes
Designs, Codes and Cryptography - Special issue containing papers presented at the Second Upper Michigan Combinatorics Workshop on Designs, Codes and Geometries
McEliece Public Key Cryptosystems Using Algebraic-Geometric Codes
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Universal Hashing and Geometric Codes
Designs, Codes and Cryptography
Algorithmic complexity in coding theory and the minimum distance problem
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
Decoding algebraic-geometric codes beyond the error-correction bound
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
Excellent codes from modular curves
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
On Complete Arcs Arising from Plane Curves
Designs, Codes and Cryptography
The Newton Polygon of Plane Curves with Many Rational Points
Designs, Codes and Cryptography
Linear Codes and Polylinear Recurrences over Finite Rings and Modules
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Recursive MDS-Codes and Pseudogeometries
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
On Families of Hash Functions via Geometric Codes and Concatenation
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Efficient Traitor Tracing Algorithms Using List Decoding
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Collusion Secure q-ary Fingerprinting for Perceptual Content
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
Symbolic Hamburger-Noether expressions of plane curves and applications to AG codes
Mathematics of Computation
Hardness of Approximating the Minimum Distance of a Linear Code
FOCS '99 Proceedings of the 40th Annual Symposium on Foundations of Computer Science
Computer algebra handbook
A class of I.P.P. codes with efficient identification
Journal of Complexity - Special issue on coding and cryptography
Conjectural permutation decoding of some AG codes
ACM SIGSAM Bulletin
Toward the Determination of the Minimum Distance of Two-Point Codes on a Hermitian Curve
Designs, Codes and Cryptography
Asymptotically Good Codes from Generalized Algebraic-Geometry Codes
Designs, Codes and Cryptography
An explicit class of codes with good parameters and their duals
Discrete Applied Mathematics - Special issue: Coding and cryptography
Explicit constructions of separating hash families from algebraic curves over finite fields
Designs, Codes and Cryptography
A search algorithm for linear codes: progressive dimension growth
Designs, Codes and Cryptography
Constructions and bounds on linear error-block codes
Designs, Codes and Cryptography
Elliptic near-MDS codes over $${\mathbb{F}}_5$$
Designs, Codes and Cryptography
Dense packings from quadratic fields and codes
Journal of Combinatorial Theory Series A
Discrete Applied Mathematics
The Order Bound for Toric Codes
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
On improved asymptotic bounds for codes from global function fields
Designs, Codes and Cryptography
Improvements on parameters of algebraic-geometry codes from Hermitian curves
IEEE Transactions on Information Theory
On Linear Codes from Maximal Curves
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry Codes
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
A polynomial-time construction of self-orthogonal codes and applications to quantum error correction
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
An explicit class of codes with good parameters and their duals
Discrete Applied Mathematics - Special issue: Coding and cryptography
Efficient compromising resilient authentication schemes for large scale wireless sensor networks
Proceedings of the third ACM conference on Wireless network security
Codes from Riemann-Roch spaces for y2 = xp - x over GF(p)
International Journal of Information and Coding Theory
Good expander graphs and expander codes: parameters and decoding
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Error correcting codes over algebraic surfaces
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
A geometric view of decoding AG codes
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Strongly multiplicative ramp schemes from high degree rational points on curves
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
One-point AG codes on the GK maximal curves
IEEE Transactions on Information Theory
Asymmetric quantum codes: characterization and constructions
IEEE Transactions on Information Theory
Generalization of Steane's enlargement construction of quantum codes and applications
IEEE Transactions on Information Theory
A family of asymptotically good binary fingerprinting codes
IEEE Transactions on Information Theory
Bringing Toric Codes to the Next Dimension
SIAM Journal on Discrete Mathematics
On Lagrangian---Grassmannian codes
Designs, Codes and Cryptography
Obtaining asymptotic fingerprint codes through a new analysis of the boneh-shaw codes
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Algebraic geometric secret sharing schemes and secure multi-party computations over small fields
CRYPTO'06 Proceedings of the 26th annual international conference on Advances in Cryptology
A computability challenge: asymptotic bounds for error-correcting codes
WTCS'12 Proceedings of the 2012 international conference on Theoretical Computer Science: computation, physics and beyond
Weight enumeration of codes from finite spaces
Designs, Codes and Cryptography
On the parameters of r-dimensional toric codes
Finite Fields and Their Applications
On the completeness of certain n-tracks arising from elliptic curves
Finite Fields and Their Applications
Nonlinear codes from points of bounded height
Finite Fields and Their Applications
Further improvements on asymptotic bounds for codes using distinguished divisors
Finite Fields and Their Applications
Correlations between the ranks of submatrices and weights of random codes
Finite Fields and Their Applications
Curves related to Coulter's maximal curves
Finite Fields and Their Applications
On rational embeddings of curves in the second Garcia--Stichtenoth tower
Finite Fields and Their Applications
Finite Fields and Their Applications
Error-correcting codes on projective bundles
Finite Fields and Their Applications
Schubert varieties, linear codes and enumerative combinatorics
Finite Fields and Their Applications
Low-Discrepancy Sequences and Global Function Fields with Many Rational Places
Finite Fields and Their Applications
Editorial: A decade of Finite Fields and Their Applications
Finite Fields and Their Applications
Finite Fields and Their Applications
A Counterexample to Perret's Conjecture on Infinite Class Field Towers for Global Function Fields
Finite Fields and Their Applications
Near-Optimal collusion-secure fingerprinting codes for efficiently tracing illegal re-distribution
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Moments of the support weight distribution of linear codes
Designs, Codes and Cryptography
A new family of locally correctable codes based on degree-lifted algebraic geometry codes
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
On the unique representation of very strong algebraic geometry codes
Designs, Codes and Cryptography
Hi-index | 0.30 |