-
1
-
-
0347528488
-
"How to build robust shared control systems"
-
R. J. Anderson, C. Ding, T. Helleseth, and T. Kløve, "How to build robust shared control systems," Des., Codes Cryptogr., vol. 15, pp. 111-124, 1998.
-
(1998)
Des., Codes Cryptogr.
, vol.15
, pp. 111-124
-
-
Anderson, R.J.1
Ding, C.2
Helleseth, T.3
Kløve, T.4
-
2
-
-
85062838317
-
"Safeguarding cryptographic keys"
-
Proc. Nat. Computer Conf., New York, Jun
-
G. R. Blakley, "Safeguarding cryptographic keys," in Proc. Nat. Computer Conf., vol. 48, New York, Jun. 1979, pp. 313-317.
-
(1979)
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
3
-
-
20544477129
-
-
Bounds on the Minimum Distance of Linear Codes. [Online]. Available:
-
A. E. Brouwer. Bounds on the Minimum Distance of Linear Codes. [Online]. Available: http://www.win.tue.nl/aeb/voorlincod.html
-
-
-
Brouwer, A.E.1
-
4
-
-
0000827003
-
m), and cross correlation of maximum-length sequences"
-
m), and cross correlation of maximum-length sequences," SIAM J. Discr. Math., vol. 13, pp. 105-137, 2000.
-
(2000)
SIAM J. Discr. Math.
, vol.13
, pp. 105-137
-
-
Canteaut, A.1
Charpin, P.2
Dobbertin, H.3
-
5
-
-
0000805465
-
"Codes, bent functions and permutations suitable for DES-like cryptosystems"
-
C. Carlet, P. Charpin, and V. Zinoviev, "Codes, bent functions and permutations suitable for DES-like cryptosystems," Des., Codes Cryptogr., vol. 15, pp. 125-156, 1998.
-
(1998)
Des., Codes Cryptogr.
, vol.15
, pp. 125-156
-
-
Carlet, C.1
Charpin, P.2
Zinoviev, V.3
-
6
-
-
1942507994
-
"Highly nonlinear mappings"
-
C. Carlet and C. Ding, "Highly nonlinear mappings," J. Complexity, vol. 20, no. 2, pp. 205-244, 2004.
-
(2004)
J. Complexity
, vol.20
, Issue.2
, pp. 205-244
-
-
Carlet, C.1
Ding, C.2
-
7
-
-
0003043306
-
"On the minimum distances of nonbinary cyclic codes"
-
P. Charpin, A. Tietäväinen, and V. Zinoviev, "On the minimum distances of nonbinary cyclic codes," Des., Codes Cryptogr., vol. 17, pp. 81-85, 1999.
-
(1999)
Des., Codes Cryptogr.
, vol.17
, pp. 81-85
-
-
Charpin, P.1
Tietäväinen, A.2
Zinoviev, V.3
-
8
-
-
0001307838
-
"Planar functions and planes of Lenz-Barlotti class II "
-
R. S. Coulter and R. W. Mathews, "Planar functions and planes of Lenz-Barlotti class II, " Des., Codes Cryptogr., vol. 10, pp. 167-184, 1997.
-
(1997)
Des., Codes Cryptogr.
, vol.10
, pp. 167-184
-
-
Coulter, R.S.1
Mathews, R.W.2
-
9
-
-
0016554120
-
"On subfield subcodes of modified Reed-Solomon codes"
-
Sep
-
P. Delsarte, "On subfield subcodes of modified Reed-Solomon codes," IEEE Trans. Inf. Theory, vol. IT-21, no. 5, pp. 575-576, Sep. 1975.
-
(1975)
IEEE Trans. Inf. Theory
, vol.IT-21
, Issue.5
, pp. 575-576
-
-
Delsarte, P.1
-
10
-
-
20544477117
-
"A general construction of Cartesian anthentication codes"
-
to be published
-
C. Ding, T. Helleseth, T. Kløve, and X. Wang, "A general construction of Cartesian anthentication codes," Discr. Math., to be published.
-
Discr. Math.
-
-
Ding, C.1
Helleseth, T.2
Kløve, T.3
Wang, X.4
-
11
-
-
0347067855
-
"Secret sharing with a class of ternary codes"
-
C. Ding, D. Kohel, and S. Ling, "Secret sharing with a class of ternary codes," Theor. Comp. Sci., vol. 246, pp. 285-298, 2000.
-
(2000)
Theor. Comp. Sci.
, vol.246
, pp. 285-298
-
-
Ding, C.1
Kohel, D.2
Ling, S.3
-
12
-
-
35248901933
-
"Covering and secret sharing with linear codes"
-
C. S. Calude, M. J. Dinneen, and V. Vajnovszki, Eds. Heidelberg, Germany: Springer-Verlag
-
C. Ding and J. Yuan, "Covering and secret sharing with linear codes," in Discrete Mathematics and Theoretical Computer Science (Lecture Notes in Computer Science), C. S. Calude, M. J. Dinneen, and V. Vajnovszki, Eds. Heidelberg, Germany: Springer-Verlag, 2003, vol. 2731, pp. 11-25.
-
(2003)
Discrete Mathematics and Theoretical Computer Science (Lecture Notes in Computer Science)
, vol.2731
, pp. 11-25
-
-
Ding, C.1
Yuan, J.2
-
13
-
-
20544471821
-
"A new family of skew Paley-Hadamard difference sets"
-
to be published
-
C. Ding and J. Yuan, "A new family of skew Paley-Hadamard difference sets," J. Comb. Theory A, to be published.
-
J. Comb. Theory A
-
-
Ding, C.1
Yuan, J.2
-
14
-
-
0003749143
-
"Weight distribution formula for some classes of cyclic codes"
-
Coordinated Sci. Lab., University of Illinois at Urbana-Champaign, Urbana, IL, Tech. Rep. R-285 (AD 632574)
-
T. Kasami, "Weight distribution formula for some classes of cyclic codes," Coordinated Sci. Lab., University of Illinois at Urbana-Champaign, Urbana, IL, Tech. Rep. R-285 (AD 632574), 1966.
-
(1966)
-
-
Kasami, T.1
-
17
-
-
0348104460
-
"Minimal codewords and secret sharing"
-
Mölle, Sweden, Aug
-
J. L. Massey, "Minimal codewords and secret sharing," in Proc. 6th Joint Swedish-Russian Workshop on Information Theory, Mölle, Sweden, Aug. 1993, pp. 276-279.
-
(1993)
Proc. 6th Joint Swedish-Russian Workshop on Information Theory
, pp. 276-279
-
-
Massey, J.L.1
-
18
-
-
0346213336
-
"Some applications of coding theory in cryptography"
-
Esses, U.K.: Formara Ltd
-
J. L. Massey, "Some applications of coding theory in cryptography," in Codes and Ciphers: Cryptography and Coding IV. Esses, U.K.: Formara Ltd, 1995, pp. 33-47.
-
(1995)
Codes and Ciphers: Cryptography and Coding IV
, pp. 33-47
-
-
Massey, J.L.1
-
19
-
-
0019608784
-
"On sharing secrets and Reed-Solomon codes"
-
R. J. McEliece and D. V. Sarwate, "On sharing secrets and Reed-Solomon codes," Commun. ACM, vol. 24, pp. 583-584, 1981.
-
(1981)
Commun. ACM
, vol.24
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
20
-
-
20544458500
-
"Ideal secret sharing schemes from MDS codes"
-
Proc. 5th Int. Conf. Information Security and Cryptology (ICISC 2002), Seoul, Korea, Nov
-
J. Pieprzyk and X. M. Zhang, "Ideal secret sharing schemes from MDS codes," in Proc. 5th Int. Conf. Information Security and Cryptology (ICISC 2002), Seoul, Korea, Nov. 2002, pp. 269-279.
-
(2002)
, pp. 269-279
-
-
Pieprzyk, J.1
Zhang, X.M.2
-
21
-
-
84947913099
-
"The access structure of some secret-sharing schemes"
-
Heidelberg, Germany: Springer-Verlag
-
A. Renvall and C. Ding, "The access structure of some secret-sharing schemes," in Information Security and Privacy (Lecture Notes in Computer Science). Heidelberg, Germany: Springer-Verlag, 1996, vol. 1172, pp. 67-78.
-
(1996)
Information Security and Privacy (Lecture Notes in Computer Science)
, vol.1172
, pp. 67-78
-
-
Renvall, A.1
Ding, C.2
-
22
-
-
0018545449
-
"How to share a secret"
-
Dec
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, pp. 612-613, Dec. 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
23
-
-
35248837077
-
"Secret sharing schemes from two-weight codes"
-
Kolkata, India, Dec
-
J. Yuan and C. Ding, "Secret sharing schemes from two-weight codes," in Proc. The Bose Centenary Symp. Discrete Mathematics and Applications, Kolkata, India, Dec. 2002, pp. 1-7.
-
(2002)
Proc. The Bose Centenary Symp. Discrete Mathematics and Applications
, pp. 1-7
-
-
Yuan, J.1
Ding, C.2
|