Fault Detection in Combinational Networks by Reed-Muller Transforms
IEEE Transactions on Computers
Codes Based on Complete Graphs
Designs, Codes and Cryptography - Special issue dedicated to Hanfried Lenz
Lexicographic Order and Linearity
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Split Orthogonal Arrays and Maximum Independent ResilientSystems of Functions
Designs, Codes and Cryptography
Bounds on Spectra of Codes with Known Dual Distance
Designs, Codes and Cryptography
On Upper Bounds for Minimum Distance and Covering Radiusof Non-binary Codes
Designs, Codes and Cryptography
Chinese remaindering with errors
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
On the Characterization of Linear Uniquely Decodable Codes
Designs, Codes and Cryptography - Special issue on designs and codes—a memorial tribute to Ed Assmus
On the Nonexistence of q-ary Linear Codesof Dimension Five
Designs, Codes and Cryptography
Error-Correcting Codes over an Alphabet of Four Elements
Designs, Codes and Cryptography
Guessing secrets efficiently via list decoding
SODA '02 Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms
Association Schemes Related to Kasami Codes and KerdockSets
Designs, Codes and Cryptography
Hypergraphical Codes Arising from Binary Trades
Designs, Codes and Cryptography
Comments on "Synthetic Traces for Trace-Driven Simulation of Cache Memories"
IEEE Transactions on Computers
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Collusion-Secure Fingerprinting for Digital Data (Extended Abstract)
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
New Minimal Modified Radix-r Representation with Applications to Smart Cards
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
On equidistant constant weight codes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
More efficient PAC-learning of DNF with membership queries under the uniform distribution
Journal of Computer and System Sciences
A New Minimal Average Weight Representation for Left-to-Right Point Multiplication Methods
IEEE Transactions on Computers
Error linear complexity measures for multisequences
Journal of Complexity
FAST'08 Proceedings of the 6th USENIX Conference on File and Storage Technologies
Periodic multisequences with large error linear complexity
Designs, Codes and Cryptography
COMPUCHEM'08 Proceedings of the 2nd WSEAS international conference on Computational chemistry
Bat chirps with good properties: Zak space construction of perfect polyphase sequences
IEEE Transactions on Information Theory
Note: Tight embeddings of partial quadrilateral packings
Journal of Combinatorial Theory Series A
ACM Transactions on Storage (TOS)
Computation, cooperation, and life
On the incompressibility of monotone DNFs
FCT'05 Proceedings of the 15th international conference on Fundamentals of Computation Theory
Performance analysis of error-correcting binary decision diagrams
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part II
Two-weight cyclic codes constructed as the direct sum of two one-weight cyclic codes
Finite Fields and Their Applications
Homomorphic fingerprints under misalignments: sketching edit and shift distances
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
Is it really you?: user identification via adaptive behavior fingerprinting
Proceedings of the 4th ACM conference on Data and application security and privacy
Asymptotic behaviour of codes in rank metric over finite fields
Designs, Codes and Cryptography
Hi-index | 0.07 |