| ปี พ.ศ. 2557 |
| 1 |
Matrix product codes over finite commutative Frobenius rings |
| 2 |
Hermitian self-dual abelian codes |
| ปี พ.ศ. 2556 |
| 3 |
Upper bounds on matching families in BBZ{pq}^{n} |
| 4 |
A q-polynomial approach to cyclic codes |
| 5 |
Abelian codes in principal ideal group algebras |
| 6 |
Feasibility and practicability of standardized cryptography on 4-bit micro controllers |
| 7 |
On the Fourier spectra of new APN functions |
| ปี พ.ศ. 2555 |
| 8 |
Threshold changeable secret sharing schemes revisited |
| 9 |
Standardized signature algorithms on ultra-constrained 4-bit MCU |
| 10 |
The relation and transformation between hierarchical inner product encryption and spatial encryption |
| ปี พ.ศ. 2554 |
| 11 |
On self-dual cyclic codes over finite fields |
| 12 |
Additive asymmetric quantum codes |
| 13 |
Improved Meet-in-the-Middle cryptanalysis of KTANTAN (poster) |
| 14 |
Universal cycles for minimum coverings of pairs by triples, with application to 2-radius sequences |
| 15 |
From skew-cyclic codes to asymmetric quantum codes |
| 16 |
Query-efficient locally decodable codes of subexponential length |
| 17 |
On the modular inversion hidden number problem |
| 18 |
Association schemes arising from bent functions |
| 19 |
Pushing the limits : a very compact and a threshold implementation of AES |
| 20 |
Constructing irreducible polynomials over finite fields |
| 21 |
A note on linearized polynomials and the dimension of their kernels |
| ปี พ.ศ. 2553 |
| 22 |
Skew-constacyclic codes over finite chain rings |
| 23 |
List decodability at small radii |
| 24 |
Advanced meet-in-the-middle preimage attacks : first results on full Tiger, and improved results on MD4 and SHA-2 |
| 25 |
Application of classical Hermitian self-orthogonal MDS codes to quantum MDS codes |
| 26 |
Generalization of Steane’s enlargement construction of quantum codes and applications |
| 27 |
On multidimensional linear cryptanalysis |
| 28 |
Side-channel resistant crypto for less than 2,300 GE |
| 29 |
256 bit standardized crypto for 650 GE – GOST revisited |
| 30 |
Asymmetric quantum codes : characterization and constructions |
| ปี พ.ศ. 2552 |
| 31 |
Linear size optimal q-ary constant-weight codes and constant-composition codes |
| 32 |
Practical pseudo-collisions for hash functions ARIRANG-224/384 |
| 33 |
Cryptanalysis of the LAKE hash family |
| 34 |
On the constructions of constant-composition codes from perfect nonlinear functions |
| 35 |
Properties and applications of preimage distributions of perfect nonlinear functions |
| 36 |
On the covering structures of two classes of linear codes from perfect nonlinear functions |
| ปี พ.ศ. 2551 |
| 37 |
The sizes of optimal q-ary codes of weight three and distance four : a complete solution |
| 38 |
Improved lower bounds for constant GC-content DNA codes |
| 39 |
Cycle systems in the complete bipartite graph plus a one-factor |
| 40 |
Access structures of elliptic secret sharing schemes |
| 41 |
Cyclic codes over GR(p2,m) of length pk |
| ปี พ.ศ. 2550 |
| 42 |
The PBD-closure of constant-composition codes |
| 43 |
Constructions for q-ary constant-weight codes |
| 44 |
Constructions and bounds on linear error-block codes |
| 45 |
Some constructions of (t, m, s)-nets with improved parameters |
| ปี พ.ศ. 2549 |
| 46 |
Improved p-ary codes and sequence families from Galois rings of characteristic p2 |
| 47 |
Aperiodic and odd correlations of some p-ary sequences from Galois rings |
| 48 |
On the algebraic structure of quasi-cyclic codes IV : repeated roots |
| 49 |
Cyclic codes over Z4 of even length |
| 50 |
On the reliability-order-based decoding algorithms for binary linear block codes |
| 51 |
Asymptotic bounds on quantum codes from algebraic geometry codes |
| ปี พ.ศ. 2548 |
| 52 |
On the algebraic structure of quasi-cyclic codes III : generator theory |
| 53 |
Quantum codes from concatenated algebraic-geometric codes |
| 54 |
An explicit class of codes with good parameters and their duals |
| ปี พ.ศ. 2547 |
| 55 |
A family of group character codes |
| 56 |
On viterbi-like algorithms and their application to Reed–Muller codes |
| 57 |
On the variance of average distance of subsets in the Hamming space |
| ปี พ.ศ. 2546 |
| 58 |
Process-parameter-interface model for design management |
| 59 |
Good self-dual quasi-cyclic codes exist |
| 60 |
On the algebraic structure of quasi-cyclic codes II : chain rings |
| 61 |
Nonlinear p-ary sequences |
| 62 |
New lower bounds and constructions for binary codes correcting asymmetric errors |
| 63 |
Type II codes over F2m + uF2m |
| 64 |
Z8-Kerdock codes and pseudorandom binary sequences |
| ปี พ.ศ. 2545 |
| 65 |
New binary linear codes from algebraic curves |
| 66 |
Highly symmetric expanders |
| ปี พ.ศ. 2544 |
| 67 |
Duadic codes over Z2k |
| 68 |
Asymptotically good quantum codes exceeding the Ashikhmin-Litsyn-Tsfasman bound |
| 69 |
Duadic codes over F2 + uF2 |
| 70 |
On the algebraic structure of quasi-cyclic codes I : finite fields |
| 71 |
Constructions of semi-regular relative difference sets |
| 72 |
Type II codes over F4+uF4 |
| ปี พ.ศ. 2543 |
| 73 |
A class of linear codes with good parameters from algebraic curves |
| 74 |
Elementary 2-group character codes |
| 75 |
Split group codes |
| 76 |
A class of linear codes with good parameters |
| 77 |
Secret-sharing with a class of ternary codes |
| 78 |
Maps between Jacobians of Shimura curves and congruence kernels |
| 79 |
Symmetric polynomials and some good codes |
| ปี พ.ศ. 2542 |
| 80 |
Combinatorial coverings from geometries over principal ideal rings |
| 81 |
Attack on RSA-type cryptosystems based on singular cubic curves over Z/nZ |
| ปี พ.ศ. 2541 |
| 82 |
On component groups of Jo(N) and degeneracy maps |
| 83 |
Almost perfect sequences with θ=2. |
| ปี พ.ศ. 2540 |
| 84 |
On the rational cuspidal subgroup and the rational torsion points of Jo(pq) |
| ปี พ.ศ. 2538 |
| 85 |
Shimura subgroups and degeneracy maps |
| ปี พ.ศ. 2537 |
| 86 |
The fitting ideal of J0(q)(Fpn) over the Hecke algebra |
| ปี พ.ศ. 2536 |
| 87 |
Shimura subgroups of Jacobians of Shimura curves |
| 88 |
Congruences between cusp forms and the geometry of Jacobians of modular curves |
| 89 |
Projective covering designs |