Designs, Codes and Cryptography
Designs, Codes and Cryptography > 2005 > 35 > 3 > 259-270
Designs, Codes and Cryptography > 2005 > 35 > 3 > 337-352
Designs, Codes and Cryptography > 2005 > 36 > 1 > 5-27
Designs, Codes and Cryptography > 2005 > 36 > 1 > 53-67
Designs, Codes and Cryptography > 2005 > 36 > 1 > 69-81
Designs, Codes and Cryptography > 2005 > 36 > 1 > 101-110
Designs, Codes and Cryptography > 2005 > 36 > 1 > 83-99
Designs, Codes and Cryptography > 2005 > 36 > 1 > 29-31
Designs, Codes and Cryptography > 2005 > 36 > 1 > 45-52
Designs, Codes and Cryptography > 2005 > 36 > 1 > 33-43
Designs, Codes and Cryptography > 2005 > 36 > 2 > 203-216
Designs, Codes and Cryptography > 2005 > 36 > 2 > 189-202
Designs, Codes and Cryptography > 2005 > 36 > 2 > 171-188
Designs, Codes and Cryptography > 2005 > 36 > 2 > 147-158
Designs, Codes and Cryptography > 2005 > 36 > 2 > 131-146
Designs, Codes and Cryptography > 2005 > 36 > 2 > 159-169
Designs, Codes and Cryptography > 2005 > 36 > 2 > 117-129
Designs, Codes and Cryptography > 2005 > 36 > 3 > 227-244
Designs, Codes and Cryptography > 2005 > 36 > 3 > 289-299
Designs, Codes and Cryptography > 2005 > 36 > 3 > 263-287