Search results
Cryptography and Communications > 2019 > 11 > 4 > 717-734
Designs, Codes and Cryptography > 2019 > 87 > 1 > 173-182
Cryptography and Communications > 2019 > 11 > 2 > 259-268
Designs, Codes and Cryptography > 2018 > 86 > 11 > 2605-2618
Designs, Codes and Cryptography > 2018 > 86 > 11 > 2485-2494
Designs, Codes and Cryptography > 2018 > 86 > 9 > 2115-2138
Applicable Algebra in Engineering, Communication and Computing > 2018 > 29 > 4 > 303-312
Finite Fields and Their Applications > 2017 > 47 > Complete > 183-202
Applied Mathematics and Computation > 2017 > 306 > C > 86-91
Journal of Applied Mathematics and Computing > 2018 > 57 > 1-2 > 629-646
Finite Fields and Their Applications > 2017 > 46 > C > 271-279
Cryptography and Communications > 2018 > 10 > 3 > 519-530
Journal of Applied Mathematics and Computing > 2018 > 57 > 1-2 > 523-546
IEEE Transactions on Information Theory > 2017 > 63 > 3 > 1434 - 1438
Electronic Notes in Discrete Mathematics > 2017 > 57 > C > 73-78
Information Processing Letters > 2017 > 118 > C > 21-24
Discrete Applied Mathematics > 2017 > 217 > P3 > 512-524
Discrete Mathematics > 2016 > 339 > 9 > 2209-2214
Applicable Algebra in Engineering, Communication and Computing > 2017 > 28 > 2 > 131-153
Designs, Codes and Cryptography > 2017 > 83 > 3 > 589-609