| Publication | Date of Publication | Type |
|---|
A tight upper bound on the number of nonzero weights of a quasi-cyclic code Designs, Codes and Cryptography | 2026-03-31 | Paper |
Griesmer bound and constructions of linear codes in b-symbol metric IEEE Transactions on Information Theory | 2025-01-23 | Paper |
| Succinct non-subsequence arguments | 2025-01-10 | Paper |
| Fully dynamic attribute-based signatures for circuits from codes | 2024-11-12 | Paper |
Improved spectral bound for quasi-cyclic codes IEEE Transactions on Information Theory | 2024-07-23 | Paper |
On linear codes whose Hermitian hulls are MDS IEEE Transactions on Information Theory | 2024-07-23 | Paper |
On the weights of linear codes with prescribed automorphisms IEEE Transactions on Information Theory | 2024-07-23 | Paper |
Explicit low-bandwidth evaluation schemes for weighted sums of Reed-Solomon-coded symbols IEEE Transactions on Information Theory | 2024-07-23 | Paper |
A Construction of Maximum Distance Profile Convolutional Codes With Small Alphabet Sizes IEEE Transactions on Information Theory | 2024-03-19 | Paper |
New Families of MDS Symbol-Pair Codes From Matrix-Product Codes IEEE Transactions on Information Theory | 2024-03-19 | Paper |
Hulls of Reed-Solomon Codes via Algebraic Geometry Codes IEEE Transactions on Information Theory | 2024-03-18 | Paper |
Three New Constructions of Optimal Locally Repairable Codes From Matrix-Product Codes IEEE Transactions on Information Theory | 2024-03-14 | Paper |
Efficient generation of elliptic curve cryptosystems Lecture Notes in Computer Science | 2024-01-29 | Paper |
Constructing quantum error-correcting codes that require a variable amount of entanglement Quantum Information Processing | 2024-01-25 | Paper |
| A Construction of Asymptotically Optimal Cascaded CDC Schemes via Combinatorial Designs | 2023-09-08 | Paper |
Type-II polyadic constacyclic codes over finite fields Discrete Mathematics, Algorithms and Applications | 2023-07-14 | Paper |
| Sharper Asymptotically Optimal CDC Schemes via Combinatorial Designs | 2023-07-09 | Paper |
Two new classes of Hermitian self-orthogonal non-GRS MDS codes and their applications Advances in Mathematics of Communications | 2023-07-07 | Paper |
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors Journal of Cryptology | 2023-07-05 | Paper |
Generalized negacyclic codes over finite fields Journal of Applied Mathematics and Computing | 2023-04-20 | Paper |
On the construction of self-dual cyclic codes over \(\mathbb{Z}_4\) with arbitrary even length Cryptography and Communications | 2022-10-06 | Paper |
Asymmetric quantum Griesmer codes detecting a single bit-flip error Discrete Mathematics | 2022-09-26 | Paper |
| Lattice-Based Group Signatures: Achieving Full Dynamicity with Ease | 2022-07-01 | Paper |
A new framework for deniable secure key exchange Information and Computation | 2022-06-08 | Paper |
Application of optimal \(p\)-ary linear codes to alphabet-optimal locally repairable codes Designs, Codes and Cryptography | 2022-04-28 | Paper |
| Zero-knowledge proofs for committed symmetric Boolean functions | 2022-03-22 | Paper |
A Comparison of Distance Bounds for Quasi-Twisted Codes IEEE Transactions on Information Theory | 2022-02-17 | Paper |
Quasi-cyclic codes (available as arXiv preprint) | 2021-11-26 | Paper |
Patch-Based Holographic Image Sensing SIAM Journal on Imaging Sciences | 2021-11-19 | Paper |
Adaptive oblivious transfer with access control from lattice assumptions Theoretical Computer Science | 2021-10-21 | Paper |
New bounds on the minimum distance of cyclic codes Advances in Mathematics of Communications | 2021-05-12 | Paper |
An explicit expression for Euclidean self-dual cyclic codes of length \(2^k\) over Galois ring \(\mathrm{GR}(4,m)\) Finite Fields and their Applications | 2021-04-08 | Paper |
Public key encryption with equality test in the standard model Information Sciences | 2021-03-31 | Paper |
Public key encryption with equality test from generic assumptions in the random oracle model Information Sciences | 2020-12-10 | Paper |
Lightweight Key Encapsulation Using LDPC Codes on FPGAs IEEE Transactions on Computers | 2020-10-02 | Paper |
Provably Secure Group Signature Schemes From Code-Based Assumptions IEEE Transactions on Information Theory | 2020-09-29 | Paper |
On the Bounded Distance Decoding Problem for Lattices Constructed and Their Cryptographic Applications IEEE Transactions on Information Theory | 2020-09-29 | Paper |
Threshold changeable ramp secret sharing Cryptology and Network Security | 2020-07-20 | Paper |
Perfect state transfer on Cayley graphs over dihedral groups: the non-normal case The Electronic Journal of Combinatorics | 2020-06-04 | Paper |
Holographic sensing Applied and Computational Harmonic Analysis | 2020-04-27 | Paper |
Robust positioning patterns with low redundancy SIAM Journal on Computing | 2020-03-25 | Paper |
Forward-secure group signatures from lattices (available as arXiv preprint) | 2020-02-25 | Paper |
Semi-generic construction of public key encryption and identity-based encryption with equality test Information Sciences | 2020-02-06 | Paper |
Accountable tracing signatures from lattices (available as arXiv preprint) | 2020-01-28 | Paper |
Burst-deletion-correcting codes for permutations and multipermutations IEEE Transactions on Information Theory | 2020-01-28 | Paper |
Multidimensional quasi-twisted codes: equivalent characterizations and their relation to multidimensional convolutional codes Designs, Codes and Cryptography | 2019-11-07 | Paper |
| Self-dual and complementary dual abelian codes over Galois rings | 2019-10-30 | Paper |
Binary robust positioning patterns with low redundancy and efficient locating algorithms Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms | 2019-10-15 | Paper |
Construction and enumeration for self-dual cyclic codes over \(\mathbb Z_4\) of oddly even length Designs, Codes and Cryptography | 2019-09-12 | Paper |
Lattice-based group signatures: achieving full dynamicity (and deniability) with ease Theoretical Computer Science | 2019-08-13 | Paper |
Capacity-Achieving Codes That Mitigate Intercell Interference and Charge Leakage in Flash Memories IEEE Transactions on Information Theory | 2019-07-19 | Paper |
On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials Designs, Codes and Cryptography | 2019-05-17 | Paper |
| New MILP modeling: improved conditional cube attacks on KECCAK-based constructions | 2019-01-23 | Paper |
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption Theoretical Computer Science | 2019-01-18 | Paper |
| Revocable predicate encryption from lattices | 2018-11-07 | Paper |
| Lattice-based zero-knowledge arguments for integer relations | 2018-09-26 | Paper |
The cycle structure of LFSR with arbitrary characteristic polynomial over finite fields Cryptography and Communications | 2018-08-28 | Paper |
| scientific article; zbMATH DE number 6900640 (Why is no real title available?) | 2018-07-09 | Paper |
| Constant-size group signatures from lattices | 2018-05-29 | Paper |
A lattice-based group signature scheme with verifier-local revocation Theoretical Computer Science | 2018-05-17 | Paper |
Adaptive oblivious transfer with access control from lattice assumptions Advances in Cryptology – ASIACRYPT 2017 | 2018-04-06 | Paper |
| Zero-knowledge arguments for lattice-based PRFs and applications to E-cash | 2018-02-23 | Paper |
Construction of de Bruijn sequences from product of two irreducible polynomials Cryptography and Communications | 2018-02-14 | Paper |
Hardness of \(k\)-LWE and applications in traitor tracing Algorithmica | 2018-01-05 | Paper |
On the Covering Structures of Two Classes of Linear Codes From Perfect Nonlinear Functions IEEE Transactions on Information Theory | 2017-08-08 | Paper |
Properties and Applications of Preimage Distributions of Perfect Nonlinear Functions IEEE Transactions on Information Theory | 2017-08-08 | Paper |
Hulls of cyclic and negacyclic codes over finite fields Finite Fields and their Applications | 2017-08-03 | Paper |
Asymmetric Quantum Codes: Characterization and Constructions IEEE Transactions on Information Theory | 2017-07-27 | Paper |
On Self-Dual Cyclic Codes Over Finite Fields IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Application of Classical Hermitian Self-Orthogonal MDS Codes to Quantum MDS Codes IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Linear Size Optimal $q$-ary Constant-Weight Codes and Constant-Composition Codes IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Generalization of Steane's Enlargement Construction of Quantum Codes and Applications IEEE Transactions on Information Theory | 2017-07-27 | Paper |
Additive Asymmetric Quantum Codes IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Authentication of Digital Streams IEEE Transactions on Information Theory | 2017-07-12 | Paper |
CSS-Like Constructions of Asymmetric Quantum Codes IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Abelian Codes in Principal Ideal Group Algebras IEEE Transactions on Information Theory | 2017-06-08 | Paper |
Upper Bounds on Matching Families in <formula formulatype="inline"> <tex Notation="TeX">$\BBZ_{pq}^{n}$</tex></formula> IEEE Transactions on Information Theory | 2017-06-08 | Paper |
External Difference Families from Finite Fields Journal of Combinatorial Designs | 2017-05-23 | Paper |
Hermitian Self-Dual Abelian Codes IEEE Transactions on Information Theory | 2017-05-16 | Paper |
Application of Constacyclic Codes to Quantum MDS Codes IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Polyadic Constacyclic Codes IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Spectral Analysis of Quasi-Cyclic Product Codes IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Three new classes of optimal frequency-hopping sequence sets Designs, Codes and Cryptography | 2017-03-23 | Paper |
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
On the implausibility of constant-round public-coin zero-knowledge proofs Lecture Notes in Computer Science | 2016-10-21 | Paper |
On self-dual cyclic codes of length \(p^a\) over \(\mathrm{GR}(p^2,s)\) Advances in Mathematics of Communications | 2016-10-12 | Paper |
Enumeration formulas for self-dual cyclic codes Finite Fields and their Applications | 2016-10-10 | Paper |
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Analysis of Gong et al.'s CCA2-secure homomorphic encryption Theoretical Computer Science | 2016-07-05 | Paper |
A provably secure group signature scheme from code-based assumptions Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers Selected Areas in Cryptography | 2015-12-04 | Paper |
Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based Lecture Notes in Computer Science | 2015-08-27 | Paper |
Quasi-abelian codes Designs, Codes and Cryptography | 2015-03-12 | Paper |
| Construction of Quasi-Cyclic Product Codes | 2015-01-26 | Paper |
Low probability differentials and the cryptanalysis of full-round CLEFIA-128 Lecture Notes in Computer Science | 2015-01-16 | Paper |
On the Multidimensional Distribution of the Naor–Reingold Pseudo-Random Function Mathematics of Computation | 2014-09-10 | Paper |
A relation between embedding degrees and class numbers of binary quadratic forms Mathematics of Computation | 2014-09-10 | Paper |
Shorter identity-based encryption via asymmetric pairings Designs, Codes and Cryptography | 2014-09-04 | Paper |
Spatial encryption supporting non-monotone access structure Designs, Codes and Cryptography | 2014-09-04 | Paper |
Homogeneous weights of matrix product codes over finite principal ideal rings Finite Fields and their Applications | 2014-09-02 | Paper |
Hardness of \(k\)-LWE and applications in traitor tracing Advances in Cryptology – CRYPTO 2014 | 2014-08-07 | Paper |
The resistance of PRESENT-80 against related-key differential attacks Cryptography and Communications | 2014-06-20 | Paper |
Matrix product codes over finite commutative Frobenius rings Designs, Codes and Cryptography | 2014-04-29 | Paper |
Matrix product codes over finite commutative Frobenius rings Designs, Codes and Cryptography | 2014-04-29 | Paper |
The relation and transformation between hierarchical inner product encryption and spatial encryption Designs, Codes and Cryptography | 2014-04-29 | Paper |
New results on two hypercube coloring problems Discrete Applied Mathematics | 2014-04-23 | Paper |
Lattice-based group signature scheme with verifier-local revocation Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Revocable IBE systems with almost constant-size key update Pairing-Based Cryptography – Pairing 2013 | 2014-02-18 | Paper |
On the Fourier spectra of new APN functions SIAM Journal on Discrete Mathematics | 2013-09-26 | Paper |
Pure asymmetric quantum MDS codes from CSS construction: a complete characterization International Journal of Quantum Information | 2013-08-28 | Paper |
Algebraic curves in cryptography Discrete Mathematics and its Applications | 2013-07-15 | Paper |
Improved zero-knowledge proofs of knowledge for the ISIS problem, and applications Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Query-efficient locally decodable codes of subexponential length Computational Complexity | 2013-04-11 | Paper |
Query-efficient locally decodable codes of subexponential length Computational Complexity | 2013-04-11 | Paper |
Shorter IBE and signatures via asymmetric pairings Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU Advances in Information and Computer Security | 2013-04-04 | Paper |
A \(q\)-polynomial approach to cyclic codes Finite Fields and their Applications | 2013-03-20 | Paper |
Differential attacks against stream cipher ZUC Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Fully secure attribute-based systems with short ciphertexts/signatures and threshold access structures Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
On the (in)security of IDEA in various hashing modes Fast Software Encryption | 2013-01-08 | Paper |
Revocable Identity-Based Encryption from Lattices Information Security and Privacy | 2012-09-07 | Paper |
NTRUCCA: how to strengthen NTRUEncrypt to chosen-ciphertext security in the standard model Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Constructing irreducible polynomials over finite fields Mathematics of Computation | 2012-06-29 | Paper |
Skew constacyclic codes over finite chain rings Advances in Mathematics of Communications | 2012-05-11 | Paper |
On the modular inversion hidden number problem Journal of Symbolic Computation | 2012-05-04 | Paper |
Threshold changeable secret sharing schemes revisited Theoretical Computer Science | 2012-03-13 | Paper |
A note on cyclic codes over \(\mathrm{GR}(p^{2},m)\) of length \(p^{k}\) Designs, Codes and Cryptography | 2012-03-01 | Paper |
Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences Mathematics of Computation | 2012-02-17 | Paper |
A note on linearized polynomials and the dimension of their kernels Finite Fields and their Applications | 2012-02-11 | Paper |
Side-channel resistant crypto for less than 2,300 GE Journal of Cryptology | 2012-01-18 | Paper |
Structure of functional codes defined on non-degenerate Hermitian varieties Journal of Combinatorial Theory. Series A | 2011-10-21 | Paper |
List decodability at small radii Designs, Codes and Cryptography | 2011-09-27 | Paper |
List decodability at small radii Designs, Codes and Cryptography | 2011-09-27 | Paper |
Improved meet-in-the-middle cryptanalysis of KTANTAN (poster) Information Security and Privacy | 2011-07-07 | Paper |
Pushing the limits: a very compact and a threshold implementation of AES Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
From skew-cyclic codes to asymmetric quantum codes Advances in Mathematics of Communications | 2011-05-17 | Paper |
Association schemes arising from bent functions Designs, Codes and Cryptography | 2011-04-08 | Paper |
| Checkable Codes from Group Rings | 2010-12-26 | Paper |
Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 Advances in Cryptology - ASIACRYPT 2010 | 2010-12-07 | Paper |
256 bit standardized crypto for 650 GE -- GOST revisited Cryptographic Hardware and Embedded Systems, CHES 2010 | 2010-08-17 | Paper |
On the constructions of constant-composition codes from perfect nonlinear functions Science in China. Series F | 2010-02-26 | Paper |
Key predistribution schemes and one-time broadcast encryption schemes from algebraic geometry codes Cryptography and Coding | 2010-01-07 | Paper |
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 Selected Areas in Cryptography | 2009-12-09 | Paper |
Cryptanalysis of the LAKE Hash Family Fast Software Encryption | 2009-08-11 | Paper |
| New informations on the structure of the functional codes defined by forms of degree $h$ on non-degenerate Hermitian varieties in $\mathbb{P}^{n(\mathbb{F}_q)$} | 2009-07-27 | Paper |
| Intersection of two quadrics with no common hyperplane in $\mathbb{P}^{n}(\mathbb{F}_q)$}} | 2009-07-27 | Paper |
Constructions and bounds on linear error-block codes Designs, Codes and Cryptography | 2009-03-31 | Paper |
Improved Lower Bounds for Constant GC-Content DNA Codes IEEE Transactions on Information Theory | 2009-02-24 | Paper |
The Sizes of Optimal $q$-Ary Codes of Weight Three and Distance Four: A Complete Solution IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Access Structures of Elliptic Secret Sharing Schemes IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes Advances in Cryptology - ASIACRYPT 2008 | 2009-02-10 | Paper |
Polyadic Codes Revisited IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On the Algebraic Structure of Quasi-Cyclic Codes III: Generator Theory IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Asymptotic bounds on quantum codes from algebraic geometry codes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Constructions for $q$-Ary Constant-Weight Codes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Quantum Codes From Concatenated Algebraic-Geometric Codes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
New lower bounds and constructions for binary codes correcting asymmetric errors IEEE Transactions on Information Theory | 2008-12-21 | Paper |
The Probability of Undetected Error for Binary Constant-Weight Codes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
A Lower Bound on the Probability of Undetected Error for Binary Constant Weight Codes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
An Improvement on the Bounds of Weil Exponential Sums Over Galois Rings With Some Applications IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On the reliability-order-based decoding algorithms for binary linear block codes IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Cycle Systems in the Complete Bipartite Graph Plus a One-Factor SIAM Journal on Discrete Mathematics | 2008-12-05 | Paper |
Cryptanalysis of Rabbit Lecture Notes in Computer Science | 2008-11-20 | Paper |
Cryptanalysis of LASH Fast Software Encryption | 2008-09-18 | Paper |
Cyclic codes over \(\text{GR}(p^2,m)\) of length \(p^k\) Finite Fields and their Applications | 2008-08-27 | Paper |
Some constructions of \((t,m,s)\)-nets with improved parameters Finite Fields and their Applications | 2008-08-27 | Paper |
Improved p-ary Codes and Sequence Families from Galois Rings Sequences and Their Applications - SETA 2004 | 2008-03-14 | Paper |
Coding and Cryptography Lecture Notes in Computer Science | 2007-05-02 | Paper |
Improved p-ary Codes and Sequence Families from Galois Rings of Characteristic p2 SIAM Journal on Discrete Mathematics | 2006-06-01 | Paper |
On the algebraic structure of quasi-cyclic codes. IV: Repeated roots Designs, Codes and Cryptography | 2006-05-29 | Paper |
Cyclic codes over \(\mathbb Z_4\) of even length Designs, Codes and Cryptography | 2006-05-29 | Paper |
An explicit class of codes with good parameters and their duals Discrete Applied Mathematics | 2006-04-28 | Paper |
A class of Artin-Schreier towers with finite genus Bulletin of the Brazilian Mathematical Society. New Series | 2006-01-17 | Paper |
Good self-dual quasi-cyclic codes exist IEEE Transactions on Information Theory | 2005-06-01 | Paper |
Z(p/sup k+1/)-linear codes IEEE Transactions on Information Theory | 2005-05-11 | Paper |
On the variance of average distance of subsets in the Hamming space Discrete Applied Mathematics | 2005-02-23 | Paper |
| scientific article; zbMATH DE number 2127868 (Why is no real title available?) | 2005-01-14 | Paper |
| scientific article; zbMATH DE number 2127874 (Why is no real title available?) | 2005-01-14 | Paper |
A family of group character codes European Journal of Combinatorics | 2004-08-06 | Paper |
\(\mathbb Z_{8}\)-Kerdock codes and pseudorandom binary sequences Journal of Complexity | 2004-08-06 | Paper |
On Viterbi-like algorithms and their application to Reed-Muller codes Journal of Complexity | 2004-08-06 | Paper |
Duadic codes over \(\mathbb{F}_2+u\mathbb{F}_2\) Applicable Algebra in Engineering, Communication and Computing | 2004-02-18 | Paper |
Type II codes over \(\mathbb{F}_{2^m} + u\mathbb{F}_{2^m}\) Discrete Mathematics | 2004-02-02 | Paper |
Symmetric polynomials and some good codes Finite Fields and their Applications | 2003-09-30 | Paper |
On the algebraic structure of quasi-cyclic codes. II: Chain rings Designs, Codes and Cryptography | 2003-09-07 | Paper |
Nonlinear \(p\)-ary sequences Applicable Algebra in Engineering, Communication and Computing | 2003-09-01 | Paper |
| scientific article; zbMATH DE number 1866920 (Why is no real title available?) | 2003-07-22 | Paper |
Highly symmetric expanders Finite Fields and their Applications | 2002-09-30 | Paper |
On the algebraic structure of quasi-cyclic codes .I. Finite fields IEEE Transactions on Information Theory | 2002-08-04 | Paper |
Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound IEEE Transactions on Information Theory | 2002-08-04 | Paper |
Duadic codes over Z/sub 2k/ IEEE Transactions on Information Theory | 2002-08-04 | Paper |
New binary linear codes from algebraic curves IEEE Transactions on Information Theory | 2002-08-04 | Paper |
| scientific article; zbMATH DE number 1740049 (Why is no real title available?) | 2002-05-14 | Paper |
Type II codes over \(\mathbb{F}_4+u\mathbb{F}_4\) European Journal of Combinatorics | 2002-05-05 | Paper |
Maps between Jacobians of Shimura curves and congruence kernels Mathematische Annalen | 2002-05-04 | Paper |
| Decomposing quasi-cyclic codes | 2001-10-15 | Paper |
Constructions of semi-regular relative difference sets Finite Fields and their Applications | 2001-09-11 | Paper |
| scientific article; zbMATH DE number 1588488 (Why is no real title available?) | 2001-07-17 | Paper |
A class of linear codes with good parameters IEEE Transactions on Information Theory | 2001-03-19 | Paper |
Secret-sharing with a class of ternary codes Theoretical Computer Science | 2000-10-26 | Paper |
Component group of the \(p\)-new subvariety of \(J_0 (Mp)\) Israel Journal of Mathematics | 2000-09-19 | Paper |
Elementary 2-group character codes IEEE Transactions on Information Theory | 2000-09-07 | Paper |
A class of linear codes with good parameters from algebraic curves IEEE Transactions on Information Theory | 2000-09-07 | Paper |
Split group codes IEEE Transactions on Information Theory | 2000-09-07 | Paper |
Attack on RSA-type cryptosystems based on singular cubic curves over \(\mathbb{Z}/n\mathbb{Z}\) Theoretical Computer Science | 2000-08-23 | Paper |
| scientific article; zbMATH DE number 1465652 (Why is no real title available?) | 2000-06-26 | Paper |
| Combinatorial coverings from geometries over principal ideal rings | 2000-06-07 | Paper |
The rank of a latin square associated to an abelian group Communications in Algebra | 2000-03-23 | Paper |
On component groups of 𝐽₀(𝑁) and degeneracy maps Proceedings of the American Mathematical Society | 1998-09-22 | Paper |
Almost perfect sequences with \(\theta =2\) Archiv der Mathematik | 1998-07-13 | Paper |
| scientific article; zbMATH DE number 1088272 (Why is no real title available?) | 1997-12-15 | Paper |
On the \(\mathbb{Q}\)-rational cuspidal subgroup and the component group of \(J_0(p^r)\) Israel Journal of Mathematics | 1997-12-14 | Paper |
On the rational cuspidal subgroup and the rational torsion points of $J_0(pq)$ Proceedings of the American Mathematical Society | 1997-12-11 | Paper |
Shimura subgroups and degeneracy maps Journal of Number Theory | 1996-10-27 | Paper |
The old subvariety of \(J_ 0(pq)\) and the Eisenstein kernel in Jacobians Israel Journal of Mathematics | 1994-11-27 | Paper |
| Shimura Subgroups of Jacobians of Shimura Curves | 1994-09-15 | Paper |
Congruences between cusp forms and the geometry of Jacobians of modular curves Mathematische Annalen | 1994-06-16 | Paper |
The Fitting ideal of \(J_ 0(q)(\mathbb{F}_{p^ n})\) over the Hecke algebra Journal of Algebra | 1994-06-06 | Paper |
Projective Covering Designs Bulletin of the London Mathematical Society | 1994-05-03 | Paper |
| scientific article; zbMATH DE number 124555 (Why is no real title available?) | 1993-02-21 | Paper |