
The two-color Ramsey number
Let
where
This was proved (by Eggert) in the case
Černý, Horák, and Wallis introduced a generalization of Kirkman’s Schoolgirl Problem to the case where the number of schoolgirls is not a multiple of three; they require all blocks to be of size three, except that each resolution class should contain either one block of size two (when
A simple undirected graph
It is clear that if
We give a new algorithm which allows us to construct new sets of sequences with entries from the commuting variables
We show that for eight cases if the designs exist they cannot be constructed using four circulant matrices in the Goethals-Seidel array. Furthermore, we show that the necessary conditions for the existence of an
except possibly for the following
which could not be found because of the large size of the search space for a complete search. These cases remain open. In all we find
and establish
We give a new construction for
We note that all
In this paper, we review combinatorial models for secret sharing schemes. A detailed comparison of several existing combinatorial models for secret sharing schemes is conducted. We pay particular attention to the ideal instances of these combinatorial models. We show that the models under examination have a natural hierarchy, but that the ideal instances of these models have a different hierarchy. We demonstrate that, in the ideal case, the combinatorial structures underlying the combinatorial models are essentially independent of the model being used. Furthermore, we show that the matroid
associated with an ideal scheme is uniquely determined by the access structure of the scheme and is independent of the model being used. Using this result, we present a combinatorial classification of
ideal threshold schemes.
We describe several techniques for constructing
all of Jedwab’s generalized perfect binary arrays. There are many more cocyclic
is a relative difference set construction.
Two graphs are matching equivalent if they have the same matching polynomial. We prove that several infinite families of pairs of graphs are pairwise matching equivalent. We also establish some divisibility relations among matching polynomials. Furthermore, we demonstrate that the matching polynomials of certain graphs serve as a polynomial model for the Fibonacci numbers and the Lucas numbers.
In this paper, we establish necessary and sufficient conditions on
This paper contributes to the determination of all integers of the form
which has a chain
We discuss difference sets (DS) and supplementary difference sets (SDS) over rings. We survey some constructions of SDS over Galois rings where there are no short orbits. From there, we move to constructions involving short orbits, yielding new infinite families
of SDS over
Many of these families have
Using a blend of Drake’s and Saha’s techniques, we construct a
We consider the projective properties of small Hadamard matrices when viewed as two-level
projection form balanced incomplete block designs.
Let
This paper provides a general method for finding a critical set for any Latin square of order
Anne Street wrote an expository article about de Bruijn graphs in the 1970’s. We review some subsequent lines of research, at least one of which was inspired by her article.
No general algorithm is known for the functional decomposition of wild polynomials over a finite field. However, partial solutions exist. In particular, a fast functional decomposition algorithm for linearised polynomials has been developed using factoring
methods in skew-polynomial rings. This algorithm is extended to a related class of wild polynomials, which are sub-linearised polynomials.
This paper presents a comparison of the performance of three optimisation heuristics in automated attacks on a simple classical cipher. The three optimisation heuristics considered are simulated annealing, the genetic algorithm, and the tabu search. Although
similar attacks have been proposed previously, a comparison of multiple techniques has not been performed. Performance criteria such as efficiency and speed are investigated. The use of tabu search in the field of automated cryptanalysis is a largely unexplored area of research. A new attack on the simple substitution cipher utilizing tabu search is also presented in this paper.
Secret sharing schemes are one of the most important primitives in distributed systems. In perfect secret sharing schemes, collaboration between unauthorized participants cannot reduce their uncertainty about the secret. This paper presents a perfect secret sharing scheme arising from critical sets of Room squares.
Let
The structure of cocyclic Hadamard matrices allows for a much faster and more systematic search for binary, self-dual codes. Here, we consider
self-dual codes of lengths
1970-2025 CP (Manitoba, Canada) unless otherwise stated.