Projective interpolation of polynomial vectors and improved key recovery attack on SFLASH Weiwei CaoLei Hu OriginalPaper 09 July 2013 Pages: 719 - 730
Spatial encryption supporting non-monotone access structure Jie ChenHoon Wei LimHuaxiong Wang OriginalPaper 20 April 2013 Pages: 731 - 746
The weight distributions of some cyclic codes with three or four nonzeros over \(\mathbb F _3\) Xiaogang LiuYuan Luo OriginalPaper 09 May 2013 Pages: 747 - 768
Mutually disjoint t-designs and t-SEEDs from extremal doubly-even self-dual codes Jianying FangYanxun Chang OriginalPaper 08 May 2013 Pages: 769 - 780
A construction for t-fold perfect authentication codes with arbitration Miao LiangMingchao LiBeiliang Du OriginalPaper 03 May 2013 Pages: 781 - 790
New optimal constructions of conflict-avoiding codes of odd length and weight 3 Wenping MaChun-e ZhaoDongsu Shen OriginalPaper 05 May 2013 Pages: 791 - 804
Extremal properties of t-SEEDs and recursive constructions Yiling LinMasakazu Jimbo OriginalPaper 15 June 2013 Pages: 805 - 823
Difference sets with few character values Tao FengSihuang HuGennian Ge OriginalPaper 21 May 2013 Pages: 825 - 839
New results and applications for multi-secret sharing schemes Javier HerranzAlexandre RuizGermán Sáez OriginalPaper 23 May 2013 Pages: 841 - 864
Linear algebraic techniques to construct monochrome visual cryptographic schemes for general access structure and its applications to color images Avishek Adhikari OriginalPaper 12 June 2013 Pages: 865 - 895
Divisible difference families from Galois rings \(GR(4,n)\) and Hadamard matrices Koji MomiharaMieko Yamada OriginalPaper 08 June 2013 Pages: 897 - 909
Shorter identity-based encryption via asymmetric pairings Jie ChenHoon Wei LimHoeteck Wee OriginalPaper 07 June 2013 Pages: 911 - 947
A construction for strength-3 covering arrays from linear feedback shift register sequences Sebastian RaaphorstLucia MouraBrett Stevens OriginalPaper 08 September 2013 Pages: 949 - 968
Cameron–Liebler line classes in \(PG(n,4)\) Alexander L. GavrilyukIvan Yu. Mogilnykh OriginalPaper 13 June 2013 Pages: 969 - 982
New binary self-dual codes of lengths 50–60 Nikolay YankovMoon Ho Lee OriginalPaper 16 June 2013 Pages: 983 - 996
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures Stanislav BulyginMichael WalterJohannes Buchmann OriginalPaper 20 June 2013 Pages: 997 - 1022
Any network code comes from an algebraic curve taking osculating spaces Edoardo Ballico OriginalPaper 15 June 2013 Pages: 1023 - 1026
Erratum to: On the support designs of extremal binary doubly even self-dual codes Naoyuki HoriguchiTsuyoshi MiezakiHiroyuki Nakasora Erratum 18 July 2014 Pages: 1027 - 1028
Erratum to: Linear covering codes and error-correcting codes for limited-magnitude errors Torleiv KløveMoshe Schwartz Erratum 01 July 2014 Pages: 1029 - 1029