H-designs with the properties of resolvability or (1, 2)-resolvability Xiande ZhangGennian Ge OriginalPaper 26 January 2010 Pages: 225 - 256
Some results concerning cryptographically significant mappings over GF(2 n ) E. PasalicP. Charpin OriginalPaper 06 February 2010 Pages: 257 - 269
On extended algebraic immunity Chun-peng WangXiao-song Chen OriginalPaper 25 February 2010 Pages: 271 - 281
On the security of the Feng–Liao–Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks Panagiotis Rizomiliotis OriginalPaper 07 February 2010 Pages: 283 - 292
The cost of false alarms in Hellman and rainbow tradeoffs Jin Hong OriginalPaper 21 February 2010 Pages: 293 - 327
Self-dual codes with automorphism of order 3 having 8 cycles Hyun Jin Kim OriginalPaper 17 February 2010 Pages: 329 - 346
On the intersection of a Hermitian curve with a conic Giorgio DonatiNicola Durante OriginalPaper 17 February 2010 Pages: 347 - 360
Permutations of finite fields for check digit systems Rasha ShaheenArne Winterhof OriginalPaper 27 February 2010 Pages: 361 - 371
Geometric and design-theoretic aspects of semibent functions I Ulrich DempwolffTimo Neumann OriginalPaper 10 March 2010 Pages: 373 - 381
Existence of directed BIBDs with block size 7 and related perfect 5-deletion-correcting codes of length 7 R. J. R. AbelF. E. Bennett OriginalPaper 21 March 2010 Pages: 383 - 397