Sciweavers

106
Voted
DCC
2007
IEEE
16 years 4 days ago
A sequence approach to linear perfect hash families
A linear (qd, q, t)-perfect hash family of size s in a vector space V of order qd over a field F of order q consists of a set S = {1, . . . , s} of linear functionals from V to F ...
Susan G. Barwick, Wen-Ai Jackson
69
Voted
DCC
2007
IEEE
16 years 4 days ago
What is a design? How should we classify them?
R. A. Bailey, Peter J. Cameron
DCC
2007
IEEE
16 years 4 days ago
On the Hughes-Kleinfeld and Knuth's semifields two-dimensional over a weak nucleus
In 1960 Hughes and Kleinfeld [4] constructed a finite semifield which is two dimensional over a weak nucleus. In 1965 Knuth [7] constructed a further three families of finite semif...
Simeon Ball, Michel Lavrauw
87
Voted
DCC
2007
IEEE
16 years 4 days ago
Pseudo-Paley graphs and skew Hadamard difference sets from presemifields
Guobiao Weng, Weisheng Qiu, Zeying Wang, Qing Xian...
64
Voted
DCC
2007
IEEE
16 years 4 days ago
Golay complementary array pairs
Constructions and nonexistence conditions for multi-dimensional Golay complementary array pairs are reviewed. A construction for a d-dimensional Golay array pair from a (d + 1)-di...
Jonathan Jedwab, Matthew G. Parker
65
Voted
DCC
2007
IEEE
16 years 4 days ago
Mixed partitions and related designs
We define a mixed partition of = PG(d, qr) to be a partition of the points of into subspaces of two distinct types, for instance, a partition of PG(2n - 1, q2) into (n - 1)-spac...
Gary L. Ebert, Keith E. Mellinger
DCC
2007
IEEE
16 years 4 days ago
Planar polynomials for commutative semifields with specified nuclei
We consider the implications of the equivalence of commutative semifields of odd order and planar Dembowski-Ostrom polynomials. This equivalence was outlined recently by Coulter an...
Robert S. Coulter, Marie Henderson, Pamela Kosick
125
Voted
DCC
2007
IEEE
16 years 4 days ago
ID-based cryptography using symmetric primitives
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption ...
Chris J. Mitchell, Fred Piper, Peter R. Wild
78
Voted
DCC
2007
IEEE
16 years 4 days ago
There are no Barker arrays having more than two dimensions
Davis, Jedwab and Smith recently proved that there are no 2-dimensional Barker arrays except of size 2?2. We show that the existence of a (d+1)-dimensional Barker array implies th...
Jonathan Jedwab, Matthew G. Parker
109
Voted
DCC
2007
IEEE
16 years 4 days ago
Divisible designs with dual translation group
Many different divisible designs are already known. Some of them possess remarkable automorphism groups, so called dual translation groups. The existence of such an automorphism g...
Sabine Giese, Ralph-Hardo Schulz