Vectorial Approach to Fast Correlation Attacks Jovan DJ. GolićPhilip Hawkes OriginalPaper Pages: 5 - 19
Double Arrays, Triple Arrays and Balanced Grids John P. McsorleyN. C. K. PhillipsJ. L. Yucas OriginalPaper Pages: 21 - 45
A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares Wen-Guey TzengZhi-Jia Tzeng OriginalPaper Pages: 47 - 61
How to Mask the Structure of Codes for a Cryptographic Use Thierry P. BergerPierre Loidreau OriginalPaper Pages: 63 - 79
Support Weight Enumerators and Coset Weight Distributions of Isodual Codes Olgica Milenkovic OriginalPaper Pages: 81 - 109
On the Linear Complexity and Multidimensional Distribution of Congruential Generators over Elliptic Curves Florian HessIgor E. Shparlinski OriginalPaper Pages: 111 - 117