Sciweavers

DCC
2008
IEEE
14 years 4 months ago
Attacks on the RC4 stream cipher
In this article we present some weaknesses in the RC4 cipher and their cryptographic applications. Especially we improve the attack described in [2] in such a way, that it will wo...
Andreas Klein
DCC
2008
IEEE
14 years 4 months ago
Skew Hadamard designs and their codes
Skew Hadamard designs (4n-1, 2n-1, n-1) are associated to order 4n skew Hadamard matrices in the natural way. We study the codes spanned by their incidence matrices A and by I +A a...
Jon-Lark Kim, Patrick Solé
DCC
2008
IEEE
14 years 4 months ago
From graph states to two-graph states
The name `graph state' is used to describe a certain class of pure quantum state which models a physical structure on which one can perform measurement-based quantum computin...
Constanza Riera, Stéphane Jacob, Matthew G. Parke...
DCC
2008
IEEE
14 years 4 months ago
Improved versions of Tardos' fingerprinting scheme
We study the Tardos' probabilistic fingerprinting scheme and show that its codeword length may be shortened by a factor of approximately 4. We achieve this by retracing Tardo...
Oded Blayer, Tamir Tassa
DCC
2008
IEEE
14 years 4 months ago
On vector space partitions and uniformly resolvable designs
Let Vn(q) denote a vector space of dimension n over the field with q elements. A set P of subspaces of Vn(q) is a partition of Vn(q) if every nonzero vector in Vn(q) is contained ...
Andrew Blinco, Saad El-Zanati, G. F. Seelinger, P....
DCC
2008
IEEE
14 years 4 months ago
Divisible designs from twisted dual numbers
Andrea Blunck, Hans Havlicek, Corrado Zanella
DCC
2008
IEEE
14 years 4 months ago
On the graph of a function in many variables over a finite field
Some improved bounds on the number of directions not determined by a point set in the affine space AG(k, q) are presented. More precisely, if there are more than pe (q -1) directio...
Simeon Ball
DCC
2008
IEEE
14 years 4 months ago
Twisted tensor product codes
We present two families of constacyclic linear codes with large automorphism groups. The codes are obtained from the twisted tensor product construction. AMS subject classificatio...
Anton Betten
DCC
2008
IEEE
14 years 4 months ago
Partial ovoids and partial spreads in hermitian polar spaces
We present improved lower bounds on the sizes of small maximal partial ovoids in the classical hermitian polar spaces, and improved upper bounds on the sizes of large maximal part...
Jan De Beule, Andreas Klein, Klaus Metsch, Leo Sto...
DCC
2008
IEEE
14 years 4 months ago
Coprimitive sets and inextendable codes
Complete (n, r)-arcs in PG(k - 1, q) and projective (n, k, n - r)q-codes that admit no projective extensions are equivalent objects. We show that projective codes of reasonable le...
T. L. Alderson, Aiden A. Bruen