Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
2Activity

Table Of Contents

Crypto applications of combinatorial group theory
Generating rooted trees ofmnodes uniformly at random
On Jacobsthal Binary Sequences
The arithmetic of genus two curves1
Sequences and arrayswith desirable correlation properties1
Finite Groups, Designs and Codes1
Matrices for graphs, designs and codes
Multi-structured designs and their applications
Codes and modules associated with designs and t-uniform hypergraphs
Finite geometry designs, codes, and Hamada’s conjecture
0 of .
Results for:
No results containing your search query
P. 1
Information Security, Coding Theory

Information Security, Coding Theory

Ratings: (0)|Views: 32 |Likes:
Published by phoeberamos
Coding
Coding

More info:

Published by: phoeberamos on Jun 27, 2013
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

10/28/2013

pdf

text

original

You're Reading a Free Preview
Pages 10 to 211 are not shown in this preview.
You're Reading a Free Preview
Pages 221 to 224 are not shown in this preview.
You're Reading a Free Preview
Pages 234 to 235 are not shown in this preview.
You're Reading a Free Preview
Pages 245 to 460 are not shown in this preview.

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->