Sciweavers

DCC
2005
IEEE
14 years 4 months ago
XOR-based Visual Cryptography Schemes
A recent publication introduced a Visual Crypto (VC) system, based on the polarisation of light. This VC system has good resolution, contrast and colour properties. Mathematically,...
Pim Tuyls, Henk D. L. Hollmann, Jack H. van Lint, ...
DCC
2005
IEEE
14 years 4 months ago
New Constructions for IPP Codes
Identifiable parent property (IPP) codes are introduced to provide protection against illegal producing of copyrighted digital material. In this paper we consider explicit constru...
Tran van Trung, Sosina Martirosyan
DCC
2005
IEEE
14 years 4 months ago
On the Existence of Large Sets of t-designs of Prime Sizes
In this paper, we employ the known recursive construction methods to obtain some new existence results for large sets of t-designs of prime sizes. We also present a new recursive ...
Behruz Tayfeh-Rezaie
DCC
2005
IEEE
14 years 4 months ago
Support Weight Enumerators and Coset Weight Distributions of Isodual Codes
In this paper various methods for computing the support weight enumerators of binary, linear, even, isodual codes are described. It is shown that there exist relationships between...
Olgica Milenkovic
DCC
2005
IEEE
14 years 4 months ago
Double Arrays, Triple Arrays and Balanced Grids
Triple arrays are a class of designs introduced by Agrawal in 1966 for two-way elimination of heterogeneity in experiments. In this paper we investigate their existence and their ...
John P. McSorley, Nicholas C. K. Phillips, Walter ...
DCC
2005
IEEE
14 years 4 months ago
Double Arrays, Triple Arrays and Balanced Grids with v=r+c - 1
In Theorem 6.1 of [3] it was shown that, when v = r + c - 1, every triple array TA(v, k, rr, cc, k : r ? c) is a balanced grid BG(v, k, k : r?c). Here we prove the converse of thi...
John P. McSorley
DCC
2005
IEEE
14 years 4 months ago
Weierstrass Semigroups and Codes from a Quotient of the Hermitian Curve
We consider the quotient of the Hermitian curve defined by the
Gretchen L. Matthews
DCC
2005
IEEE
14 years 4 months ago
Signcryption with Non-interactive Non-repudiation
Signcryption [35] is a public key primitive that achieves the functionality of both an encryption scheme and a signature scheme simultaneously. It does this more efficiently than a...
John Malone-Lee
DCC
2005
IEEE
14 years 4 months ago
A Family of Complete Caps in PG(n, 2)
We give a combinatorial construction of a one-parameter and a two-parameter family of complete caps in finite projective spaces over GF(2). As an application of our construction w...
Petr Lisonek, Mahdad Khatirinejad