Designs, Codes and Cryptography
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 39-55
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 231-242
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 221-230
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 75-97
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 257-273
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 145-156
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 57-73
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 17-26
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 391-399
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 157-174
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 363-373
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 111-127
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 27-38
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 243-256
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 305-316
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 375-390
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 275-289
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 195-220
Designs, Codes and Cryptography > 2013 > 66 > 1-3 > 99-109