Designs, Codes and Cryptography
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 209-220
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 33-46
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 81-91
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 161-169
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 17-31
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 129-141
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 61-80
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 105-128
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 221-227
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 195-208
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 153-160
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 47-60
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 171-193
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 93-103
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 143-151
Designs, Codes and Cryptography > 2012 > 64 > 1-2 > 3-15
Designs, Codes and Cryptography > 2012 > 64 > 3 > 241-253
Designs, Codes and Cryptography > 2012 > 64 > 3 > 265-274
Designs, Codes and Cryptography > 2012 > 64 > 3 > 255-263