Sciweavers

DCC
2007
IEEE
14 years 4 months ago
A sequence approach to linear perfect hash families
A linear (qd, q, t)-perfect hash family of size s in a vector space V of order qd over a field F of order q consists of a set S = {1, . . . , s} of linear functionals from V to F ...
Susan G. Barwick, Wen-Ai Jackson
DCC
2007
IEEE
14 years 4 months ago
What is a design? How should we classify them?
R. A. Bailey, Peter J. Cameron
DCC
2007
IEEE
14 years 4 months ago
On the Hughes-Kleinfeld and Knuth's semifields two-dimensional over a weak nucleus
In 1960 Hughes and Kleinfeld [4] constructed a finite semifield which is two dimensional over a weak nucleus. In 1965 Knuth [7] constructed a further three families of finite semif...
Simeon Ball, Michel Lavrauw
DCC
2007
IEEE
14 years 4 months ago
Pseudo-Paley graphs and skew Hadamard difference sets from presemifields
Guobiao Weng, Weisheng Qiu, Zeying Wang, Qing Xian...
DCC
2007
IEEE
14 years 4 months ago
Golay complementary array pairs
Constructions and nonexistence conditions for multi-dimensional Golay complementary array pairs are reviewed. A construction for a d-dimensional Golay array pair from a (d + 1)-di...
Jonathan Jedwab, Matthew G. Parker
DCC
2007
IEEE
14 years 4 months ago
Mixed partitions and related designs
We define a mixed partition of = PG(d, qr) to be a partition of the points of into subspaces of two distinct types, for instance, a partition of PG(2n - 1, q2) into (n - 1)-spac...
Gary L. Ebert, Keith E. Mellinger
DCC
2007
IEEE
14 years 4 months ago
Planar polynomials for commutative semifields with specified nuclei
We consider the implications of the equivalence of commutative semifields of odd order and planar Dembowski-Ostrom polynomials. This equivalence was outlined recently by Coulter an...
Robert S. Coulter, Marie Henderson, Pamela Kosick
DCC
2007
IEEE
14 years 4 months ago
ID-based cryptography using symmetric primitives
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption ...
Chris J. Mitchell, Fred Piper, Peter R. Wild
DCC
2007
IEEE
14 years 4 months ago
There are no Barker arrays having more than two dimensions
Davis, Jedwab and Smith recently proved that there are no 2-dimensional Barker arrays except of size 2?2. We show that the existence of a (d+1)-dimensional Barker array implies th...
Jonathan Jedwab, Matthew G. Parker
DCC
2007
IEEE
14 years 4 months ago
Divisible designs with dual translation group
Many different divisible designs are already known. Some of them possess remarkable automorphism groups, so called dual translation groups. The existence of such an automorphism g...
Sabine Giese, Ralph-Hardo Schulz