Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc86.bht:"
@article{DBLP:journals/dcc/AlahmadiOS18, author = {Adel Alahmadi and Funda {\"{O}}zdemir and Patrick Sol{\'{e}}}, title = {On self-dual double circulant codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1257--1265}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0393-x}, doi = {10.1007/S10623-017-0393-X}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlahmadiOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlmeidaNP18, author = {Paulo Jos{\'{e}} Fernandes Almeida and Diego Napp and Raquel Pinto}, title = {{MDS} 2D convolutional codes with optimal 1D horizontal projections}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {285--302}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0357-1}, doi = {10.1007/S10623-017-0357-1}, timestamp = {Tue, 23 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlmeidaNP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AntrobusG18, author = {Jared Antrobus and Heide Gluesing{-}Luerssen}, title = {Lexicodes over finite principal ideal rings}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2661--2676}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0469-2}, doi = {10.1007/S10623-018-0469-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AntrobusG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Arce-NazarioCGM18, author = {Rafael A. Arce{-}Nazario and Francis N. Castro and Oscar E. Gonz{\'{a}}lez and Luis A. Medina and Ivelisse M. Rubio}, title = {New families of balanced symmetric functions and a generalization of Cusick, Li and St{\unicode{462}}nic{\unicode{462}}'s conjecture}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {693--701}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0351-7}, doi = {10.1007/S10623-017-0351-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Arce-NazarioCGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AugotLR18, author = {Daniel Augot and Pierre Loidreau and Gwezheneg Robert}, title = {Generalized Gabidulin codes over fields of any characteristic}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1807--1848}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0425-6}, doi = {10.1007/S10623-017-0425-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AugotLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AvelliPS18, author = {Diego Napp Avelli and Raquel Pinto and Vladimir Sidorenko}, title = {Concatenation of convolutional codes and rank metric codes for multi-shot network coding}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {303--318}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0346-4}, doi = {10.1007/S10623-017-0346-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AvelliPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AydinCD18, author = {Nuh Aydin and Yasemin Cengellenmis and Abdullah Dertli}, title = {On some constacyclic codes over {\textdollar}{\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{4\}{\textbackslash}left[ u{\textbackslash}right] /{\textbackslash}left{\textbackslash}langle u\{2\}-1{\textbackslash}right{\textbackslash}rangle {\textdollar}{\textdollar} , their {\textdollar}Z\({}_{\mbox{4}}\) images, and new codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1249--1255}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0392-y}, doi = {10.1007/S10623-017-0392-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AydinCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BagheriSP18, author = {Khadijeh Bagheri and Mohammad{-}Reza Sadeghi and Daniel Panario}, title = {A non-commutative cryptosystem based on quaternion algebras}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2345--2377}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0451-4}, doi = {10.1007/S10623-017-0451-4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BagheriSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BambergLL18, author = {John Bamberg and Jesse Lansdown and Melissa Lee}, title = {On m-ovoids of regular near polygons}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {997--1006}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0373-1}, doi = {10.1007/S10623-017-0373-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BambergLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BandiTM18, author = {Ramakrishna Bandi and Alexandre Fotue Tabue and Edgar Mart{\'{\i}}nez{-}Moro}, title = {On counting subring-submodules of free modules over finite commutative frobenius rings}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2247--2254}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0446-1}, doi = {10.1007/S10623-017-0446-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BandiTM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BarrolletaV18, author = {Roland D. Barrolleta and Merc{\`{e}} Villanueva}, title = {Partial permutation decoding for binary linear and {\textdollar}{\textdollar}Z{\_}4{\textdollar}{\textdollar} {Z} 4 -linear Hadamard codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {569--586}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0342-8}, doi = {10.1007/S10623-017-0342-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BarrolletaV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartoliMZ18, author = {Daniele Bartoli and Maria Montanucci and Giovanni Zini}, title = {Multi point {AG} codes on the {GK} maximal curve}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {161--177}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0333-9}, doi = {10.1007/S10623-017-0333-9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BartoliMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartoliMZ18a, author = {Daniele Bartoli and Maria Montanucci and Giovanni Zini}, title = {{AG} codes and {AG} quantum codes from the {GGS} curve}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2315--2344}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0450-5}, doi = {10.1007/S10623-017-0450-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BartoliMZ18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartoliQ18, author = {Daniele Bartoli and Luciane Quoos}, title = {Permutation polynomials of the type g(x\({}^{\mbox{s}}\)) over {\(\mathbb{F}\)}\({}_{\mbox{q\({}^{\mbox{2n}}\)}}\)}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1589--1599}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0415-8}, doi = {10.1007/S10623-017-0415-8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BartoliQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeregLS18, author = {Sergey Bereg and Avi Levy and Ivan Hal Sudborough}, title = {Constructing permutation arrays from groups}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1095--1111}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0381-1}, doi = {10.1007/S10623-017-0381-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeregLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BiLDLW18, author = {Wenquan Bi and Zheng Li and Xiaoyang Dong and Lu Li and Xiaoyun Wang}, title = {Conditional cube attack on round-reduced River Keyak}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1295--1310}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0396-7}, doi = {10.1007/S10623-017-0396-7}, timestamp = {Thu, 16 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BiLDLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BibakKS18, author = {Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan}, title = {Unweighted linear congruences with distinct coordinates and the Varshamov-Tenengolts codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1893--1904}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0428-3}, doi = {10.1007/S10623-017-0428-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BibakKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BierbrauerBFMP18, author = {J{\"{u}}rgen Bierbrauer and Daniele Bartoli and Giorgio Faina and Stefano Marcugini and Fernanda Pambianco}, title = {A family of semifields in odd characteristic}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {611--621}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0345-5}, doi = {10.1007/S10623-017-0345-5}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BierbrauerBFMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlackburnGHPRSV18, author = {Simon R. Blackburn and Marcus Greferath and Camilla Hollanti and Mario{-}Osvin Pavcevic and Joachim Rosenthal and Leo Storme and {\'{A}}ngeles V{\'{a}}zquez{-}Castro and Alfred Wassermann}, title = {Preface to the special issue on network coding and designs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {237--238}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0443-4}, doi = {10.1007/S10623-017-0443-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlackburnGHPRSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Blanco-ChaconBD18, author = {Iv{\'{a}}n Blanco{-}Chac{\'{o}}n and Eimear Byrne and Iwan M. Duursma and John Sheekey}, title = {Rank metric codes and zeta functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1767--1792}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0423-8}, doi = {10.1007/S10623-017-0423-8}, timestamp = {Thu, 17 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Blanco-ChaconBD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BorgesF18, author = {Joaquim Borges and Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba}, title = {A characterization of {\(\mathbb{Z}\)}\({}_{\mbox{2}}\){\(\mathbb{Z}\)}\({}_{\mbox{2}}\)[u]-linear codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1377--1389}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0401-1}, doi = {10.1007/S10623-017-0401-1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BorgesF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BorgesFT18, author = {Joaquim Borges and Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba and Roger Ten{-}Valls}, title = {Z\({}_{\mbox{2}}\)-double cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {463--479}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0334-8}, doi = {10.1007/S10623-017-0334-8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BorgesFT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BricoutMPM18, author = {R{\'{e}}mi Bricout and Sean Murphy and Kenneth G. Paterson and Thyla van der Merwe}, title = {Analysing and exploiting the Mantin biases in {RC4}}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {743--770}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0355-3}, doi = {10.1007/S10623-017-0355-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BricoutMPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletMTQ18, author = {Claude Carlet and Sihem Mesnager and Chunming Tang and Yanfeng Qi}, title = {Euclidean and Hermitian {LCD} {MDS} codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2605--2618}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0463-8}, doi = {10.1007/S10623-018-0463-8}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CarletMTQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CatalanoFN18, author = {Dario Catalano and Dario Fiore and Luca Nizzardo}, title = {Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2197--2246}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0444-3}, doi = {10.1007/S10623-017-0444-3}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CatalanoFN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChangH18, author = {Seunghwan Chang and Jong Yoon Hyun}, title = {Linear codes from simplicial complexes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2167--2181}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0442-5}, doi = {10.1007/S10623-017-0442-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChangH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenJL18, author = {Jingyuan Chen and Lijun Ji and Yun Li}, title = {Combinatorial constructions of optimal (m, n, 4, 2) optical orthogonal signature pattern codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1499--1525}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0409-6}, doi = {10.1007/S10623-017-0409-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenL18, author = {Bocong Chen and Hongwei Liu}, title = {Constructions of cyclic constant dimension codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1267--1279}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0394-9}, doi = {10.1007/S10623-017-0394-9}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChoiDMW18, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, title = {Improved, black-box, non-malleable encryption from semantic security}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {641--663}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0348-2}, doi = {10.1007/S10623-017-0348-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChoiDMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Clayton18, author = {David Clayton}, title = {A note on almost difference sets in nonabelian groups}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1405--1410}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0403-z}, doi = {10.1007/S10623-017-0403-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Clayton18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Cogliati18, author = {Beno{\^{\i}}t Cogliati}, title = {Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2747--2763}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0471-8}, doi = {10.1007/S10623-018-0471-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Cogliati18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CogliatiS18, author = {Beno{\^{\i}}t Cogliati and Yannick Seurin}, title = {Analysis of the single-permutation encrypted Davies-Meyer construction}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2703--2723}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0470-9}, doi = {10.1007/S10623-018-0470-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CogliatiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ColbournLS18, author = {Charles J. Colbourn and Erin Lanus and Kaushik Sarkar}, title = {Asymptotic and constructive methods for covering perfect hash families and covering arrays}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {907--937}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0369-x}, doi = {10.1007/S10623-017-0369-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ColbournLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CossidenteP18, author = {Antonio Cossidente and Francesco Pavese}, title = {On intriguing sets of finite symplectic spaces}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1161--1174}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0387-8}, doi = {10.1007/S10623-017-0387-8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CossidenteP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CostaFW18, author = {Simone Costa and Tao Feng and Xiaomiao Wang}, title = {Frame difference families and resolvable balanced incomplete block designs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2725--2745}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0472-7}, doi = {10.1007/S10623-018-0472-7}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CostaFW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CruzGLR18, author = {Javier de la Cruz and Elisa Gorla and Hiram H. L{\'{o}}pez and Alberto Ravagnani}, title = {Weight distribution of rank-metric codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {1--16}, year = {2018}, url = {https://doi.org/10.1007/s10623-016-0325-1}, doi = {10.1007/S10623-016-0325-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CruzGLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CruzW18, author = {Javier de la Cruz and Wolfgang Willems}, title = {On group codes with complementary duals}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {2065--2073}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0437-2}, doi = {10.1007/S10623-017-0437-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CruzW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DavisO18, author = {James A. Davis and Oktay {\"{O}}lmez}, title = {A framework for constructing partial geometric difference sets}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1367--1375}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0400-2}, doi = {10.1007/S10623-017-0400-2}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DavisO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dempwolff18, author = {Ulrich Dempwolff}, title = {{CCZ} equivalence of power functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {665--692}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0350-8}, doi = {10.1007/S10623-017-0350-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dempwolff18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DerlerS18, author = {David Derler and Daniel Slamanig}, title = {Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2525--2547}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0460-y}, doi = {10.1007/S10623-018-0460-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DerlerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ding18, author = {Cunsheng Ding}, title = {Infinite families of 3-designs from a type of five-weight code}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {703--719}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0352-6}, doi = {10.1007/S10623-017-0352-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ding18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DingGZZZ18, author = {Baokun Ding and Gennian Ge and Jun Zhang and Tao Zhang and Yiwei Zhang}, title = {New constructions of {MDS} symbol-pair codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {841--859}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0365-1}, doi = {10.1007/S10623-017-0365-1}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DingGZZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DinhSPS18, author = {Hai Q. Dinh and Abhay Kumar Singh and Sukhamoy Pattanayak and Songsak Sriboonchitta}, title = {Cyclic {DNA} codes over the ring {\(\mathbb{F}\)}\({}_{\mbox{2}}\)+u{\(\mathbb{F}\)}\({}_{\mbox{2}}\)+v{\(\mathbb{F}\)}\({}_{\mbox{2}}\)+uv{\(\mathbb{F}\)}\({}_{\mbox{2}}\)+v\({}^{\mbox{2}}\){\(\mathbb{F}\)}\({}_{\mbox{2}}\)+uv\({}^{\mbox{2}}\){\(\mathbb{F}\)}\({}_{\mbox{2}}\)}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1451--1467}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0405-x}, doi = {10.1007/S10623-017-0405-X}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DinhSPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DonatiD18, author = {Giorgio Donati and Nicola Durante}, title = {A generalization of the normal rational curve in PG(d, q\({}^{\mbox{n}}\)) and its associated non-linear {MRD} codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1175--1184}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0388-7}, doi = {10.1007/S10623-017-0388-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DonatiD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DoughertyGTT18, author = {Steven T. Dougherty and Joe Gildea and Rhian Taylor and Alexander Tylyshchak}, title = {Group rings, G-codes and constructions of self-dual and formally self-dual codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {2115--2138}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0440-7}, doi = {10.1007/S10623-017-0440-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DoughertyGTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DrapalV18, author = {Ales Dr{\'{a}}pal and Viliam Valent}, title = {Few associative triples, isotopisms and groups}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {555--568}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0341-9}, doi = {10.1007/S10623-017-0341-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DrapalV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DucasW18, author = {L{\'{e}}o Ducas and Wessel P. J. van Woerden}, title = {The closest vector problem in tensored root lattices of type {A} and in their duals}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {137--150}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0332-x}, doi = {10.1007/S10623-017-0332-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DucasW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EmuraHNOMY18, author = {Keita Emura and Goichiro Hanaoka and Koji Nuida and Go Ohtake and Takahiro Matsuda and Shota Yamada}, title = {Chosen ciphertext secure keyed-homomorphic public-key cryptosystems}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1623--1683}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0417-6}, doi = {10.1007/S10623-017-0417-6}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EmuraHNOMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Fan18, author = {Cuiling Fan}, title = {The linear complexity of a class of binary sequences with optimal autocorrelation}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2441--2450}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0456-7}, doi = {10.1007/S10623-018-0456-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Fan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FanX18, author = {Yun Fan and Bangteng Xu}, title = {Fourier transforms and bent functions on finite groups}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {2091--2113}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0439-0}, doi = {10.1007/S10623-017-0439-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FanX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FarranGH18, author = {Jos{\'{e}} Ignacio Farr{\'{a}}n and Pedro A. Garc{\'{\i}}a{-}S{\'{a}}nchez and Benjam{\'{\i}}n A. Heredia}, title = {On the second Feng-Rao distance of Algebraic Geometry codes related to Arf semigroups}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2893--2916}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0483-4}, doi = {10.1007/S10623-018-0483-4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FarranGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FarranGHL18, author = {Jos{\'{e}} Ignacio Farr{\'{a}}n and Pedro A. Garc{\'{\i}}a{-}S{\'{a}}nchez and Benjam{\'{\i}}n A. Heredia and Micah J. Leamer}, title = {The second Feng-Rao number for codes coming from telescopic semigroups}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1849--1864}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0426-5}, doi = {10.1007/S10623-017-0426-5}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FarranGHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FaugereW18, author = {Jean{-}Charles Faug{\`{e}}re and Alexandre Wallet}, title = {The point decomposition problem over hyperelliptic curves - Toward efficient computation of discrete logarithms in even characteristic}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2279--2314}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0449-y}, doi = {10.1007/S10623-017-0449-Y}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FaugereW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FeltzC18, author = {Mich{\`{e}}le Feltz and Cas Cremers}, title = {Strengthening the security of authenticated key exchange against bad randomness}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {481--516}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0337-5}, doi = {10.1007/S10623-017-0337-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FeltzC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Fernando18, author = {Neranga Fernando}, title = {Self-reciprocal polynomials and coterm polynomials}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1707--1726}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0419-4}, doi = {10.1007/S10623-017-0419-4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Fernando18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GaboritOK18, author = {Philippe Gaborit and Ayoub Otmani and Herv{\'{e}} Tal{\'{e}} Kalachi}, title = {Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1391--1403}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0402-0}, doi = {10.1007/S10623-017-0402-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GaboritOK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GangopadhyayMS18, author = {Sugata Gangopadhyay and Bimal Mandal and Pantelimon Stanica}, title = {Gowers U\({}_{\mbox{3}}\) norm of some classes of bent Boolean functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1131--1148}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0383-z}, doi = {10.1007/S10623-017-0383-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GangopadhyayMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GavrilyukMP18, author = {Alexander L. Gavrilyuk and Ilia Matkin and Tim Penttila}, title = {Derivation of Cameron-Liebler line classes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {231--236}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0338-4}, doi = {10.1007/S10623-017-0338-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GavrilyukMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GeSFWS18, author = {Chunpeng Ge and Willy Susilo and Liming Fang and Jiandong Wang and Yunqing Shi}, title = {A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2587--2603}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0462-9}, doi = {10.1007/S10623-018-0462-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GeSFWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GnilkeGP18, author = {Oliver Wilhelm Gnilke and Marcus Greferath and Mario{-}Osvin Pavcevic}, title = {Mosaics of combinatorial designs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {85--95}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0328-6}, doi = {10.1007/S10623-017-0328-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GnilkeGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuendaJG18, author = {Kenza Guenda and Somphong Jitman and T. Aaron Gulliver}, title = {Constructions of good entanglement-assisted quantum error correcting codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {121--136}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0330-z}, doi = {10.1007/S10623-017-0330-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuendaJG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HanLL18, author = {Shuai Han and Shengli Liu and Lin Lyu}, title = {Super-strong {RKA} secure MAC, {PKE} and {SE} from tag-based hash proof system}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1411--1449}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0404-y}, doi = {10.1007/S10623-017-0404-Y}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HanLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HanLQG18, author = {Shuai Han and Shengli Liu and Baodong Qin and Dawu Gu}, title = {Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {517--554}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0339-3}, doi = {10.1007/S10623-017-0339-3}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HanLQG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Harada18, author = {Masaaki Harada}, title = {Binary extremal self-dual codes of length 60 and related codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1085--1094}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0380-2}, doi = {10.1007/S10623-017-0380-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Harada18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HeroldKM18, author = {Gottfried Herold and Elena Kirshanova and Alexander May}, title = {On the asymptotic complexity of solving {LWE}}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {55--83}, year = {2018}, url = {https://doi.org/10.1007/s10623-016-0326-0}, doi = {10.1007/S10623-016-0326-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HeroldKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HodajKKT18, author = {Jezerca Hodaj and Melissa S. Keranen and Donald L. Kreher and Leah Tollefson}, title = {Some new Kirkman signal sets}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2183--2195}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0445-2}, doi = {10.1007/S10623-017-0445-2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HodajKKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Horlemann-Trautmann18, author = {Anna{-}Lena Horlemann{-}Trautmann and Kyle Marshall and Joachim Rosenthal}, title = {Extension of Overbeck's attack for Gabidulin-based cryptosystems}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {319--340}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0343-7}, doi = {10.1007/S10623-017-0343-7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Horlemann-Trautmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Horlemann-Trautmann18a, author = {Anna{-}Lena Horlemann{-}Trautmann}, title = {Message encoding and retrieval for spread and cyclic orbit codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {365--386}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0377-x}, doi = {10.1007/S10623-017-0377-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Horlemann-Trautmann18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Hou18, author = {Xiang{-}Dong Hou}, title = {Complexities of normal bases constructed from Gauss periods}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {893--905}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0368-y}, doi = {10.1007/S10623-017-0368-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Hou18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuY18, author = {Chuangqiang Hu and Shudi Yang}, title = {Multi-point codes over Kummer extensions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {211--230}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0335-7}, doi = {10.1007/S10623-017-0335-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuiR18, author = {Alice M. W. Hui and Bernardo Gabriel Rodrigues}, title = {Switched graphs of some strongly regular graphs related to the symplectic graph}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {179--194}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0340-x}, doi = {10.1007/S10623-017-0340-X}, timestamp = {Fri, 16 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuiR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/IhringerM18, author = {Ferdinand Ihringer and Karen Meagher}, title = {Mikl{\'{o}}s-Manickam-Singhi conjectures on partial geometries}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1311--1327}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0397-6}, doi = {10.1007/S10623-017-0397-6}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/IhringerM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ji18, author = {Lijun Ji}, title = {Group divisible designs with large block sizes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2255--2260}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0448-z}, doi = {10.1007/S10623-017-0448-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ji18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JohnsenV18, author = {Trygve Johnsen and Hugues Verdure}, title = {Flags of almost affine codes and the two-party wire-tap channel of type {II}}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {2075--2090}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0438-1}, doi = {10.1007/S10623-017-0438-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JohnsenV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JungnickelT18, author = {Dieter Jungnickel and Vladimir D. Tonchev}, title = {On Bonisoli's theorem and the block codes of Steiner triple systems}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {449--462}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0406-9}, doi = {10.1007/S10623-017-0406-9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JungnickelT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JungnickelZT18, author = {Dieter Jungnickel and Yue Zhou and Vladimir D. Tonchev}, title = {Extension sets, affine designs, and Hamada's conjecture}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {587--610}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0344-6}, doi = {10.1007/S10623-017-0344-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JungnickelZT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KharaghaniS18, author = {Hadi Kharaghani and Sho Suda}, title = {Unbiased orthogonal designs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1573--1588}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0414-9}, doi = {10.1007/S10623-017-0414-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KharaghaniS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KiermaierKW18, author = {Michael Kiermaier and Sascha Kurz and Alfred Wassermann}, title = {The order of the automorphism group of a binary q -analog of the Fano plane is at most two}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {239--250}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0360-6}, doi = {10.1007/S10623-017-0360-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KiermaierKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KiermaierLW18, author = {Michael Kiermaier and Reinhard Laue and Alfred Wassermann}, title = {A new series of large sets of subspace designs over the binary field}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {251--268}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0349-1}, doi = {10.1007/S10623-017-0349-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KiermaierLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimSGA18, author = {Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au}, title = {Functional encryption for computational hiding in prime order groups via pair encodings}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {97--120}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0327-7}, doi = {10.1007/S10623-017-0327-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KimSGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KogaMS18, author = {Yoshitaka Koga and Tatsuya Maruta and Keisuke Shiromoto}, title = {On critical exponents of Dowling matroids}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1947--1962}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0431-8}, doi = {10.1007/S10623-017-0431-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KogaMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kositwattanarerk18, author = {Wittawat Kositwattanarerk}, title = {Pseudocodeword-free criterion for codes with cycle-free Tanner graph}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2791--2805}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0476-3}, doi = {10.1007/S10623-018-0476-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kositwattanarerk18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LanCW18, author = {Liantao Lan and Yanxun Chang and Lidong Wang}, title = {Constructions of cyclic quaternary constant-weight codes of weight three and distance four}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1063--1083}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0379-8}, doi = {10.1007/S10623-017-0379-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LanCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Lee18, author = {Jooyoung Lee}, title = {Key alternating ciphers based on involutions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {955--988}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0371-3}, doi = {10.1007/S10623-017-0371-3}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Lee18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeCL18, author = {Chong{-}Dao Lee and Yaotsu Chang and Chia{-}an Liu}, title = {A construction of group divisible designs with block sizes 3 to 7}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1281--1293}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0395-8}, doi = {10.1007/S10623-017-0395-8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeeCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeLMM18, author = {Jooyoung Lee and Atul Luykx and Bart Mennink and Kazuhiko Minematsu}, title = {Connecting tweakable and multi-key blockcipher security}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {623--640}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0347-3}, doi = {10.1007/S10623-017-0347-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeeLMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeP18, author = {Kwangsu Lee and Seunghwan Park}, title = {Revocable hierarchical identity-based encryption with shorter private keys and update keys}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2407--2440}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0453-2}, doi = {10.1007/S10623-017-0453-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeeP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Li18, author = {Chengju Li}, title = {Hermitian {LCD} codes from cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2261--2278}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0447-0}, doi = {10.1007/S10623-017-0447-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Li18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiLDC18, author = {Mingchao Li and Miao Liang and Beiliang Du and Jingyuan Chen}, title = {A construction for optimal c-splitting authentication and secrecy codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1739--1755}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0421-x}, doi = {10.1007/S10623-017-0421-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiLDC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiQW18, author = {Kangquan Li and Longjiang Qu and Qiang Wang}, title = {New constructions of permutation polynomials of the form x\({}^{\mbox{r}}\) h(x \({}^{\mbox{q - 1}}\)) over {\(\mathbb{F}\)}\({}_{\mbox{q\({}^{\mbox{2}}\)}}\)}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2379--2405}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0452-3}, doi = {10.1007/S10623-017-0452-3}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiQW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiY18, author = {Fengwei Li and Qin Yue}, title = {The primitive idempotents and weight distributions of irreducible constacyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {771--784}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0356-2}, doi = {10.1007/S10623-017-0356-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiZF18, author = {Jin Li and Aixian Zhang and Keqin Feng}, title = {Linear codes over F\({}_{\mbox{q}}\)[x]/(x\({}^{\mbox{2}}\)) and GR(p\({}^{\mbox{2}}\), m) reaching the Griesmer bound}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2837--2855}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0479-0}, doi = {10.1007/S10623-018-0479-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiZF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiangZ18, author = {Hongxue Liang and Shenglin Zhou}, title = {Flag-transitive point-primitive automorphism groups of non-symmetric 2-(v, k, 3) designs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1757--1766}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0422-9}, doi = {10.1007/S10623-017-0422-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiangZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiebholdNV18, author = {Dirk Liebhold and Gabriele Nebe and {\'{A}}ngeles V{\'{a}}zquez{-}Castro}, title = {Network coding with flags}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {269--284}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0361-5}, doi = {10.1007/S10623-017-0361-5}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiebholdNV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LimniotisK18, author = {Konstantinos Limniotis and Nicholas Kolokotronis}, title = {Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1685--1706}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0418-5}, doi = {10.1007/S10623-017-0418-5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LimniotisK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LinPLZ18, author = {Zhiqiang Lin and Dingyi Pei and Dongdai Lin and Xiaolei Zhang}, title = {Fast construction of binary ring FCSRs for hardware stream ciphers}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {939--953}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0370-4}, doi = {10.1007/S10623-017-0370-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LinPLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LinW18, author = {Li Lin and Wenling Wu}, title = {Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {721--741}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0353-5}, doi = {10.1007/S10623-017-0353-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LinW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuJKW18, author = {Jia Liu and Tibor Jager and Saqib A. Kakvi and Bogdan Warinschi}, title = {How to build time-lock encryption}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2549--2586}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0461-x}, doi = {10.1007/S10623-018-0461-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuJKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuKC18, author = {Weihua Liu and Andrew Klapper and Zhixiong Chen}, title = {Solving the {FCSR} synthesis problem for multi-sequences by lattice basis reduction}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1023--1038}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0375-z}, doi = {10.1007/S10623-017-0375-Z}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuRL18, author = {Yunwen Liu and Vincent Rijmen and Gregor Leander}, title = {Nonlinear diffusion layers}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2469--2484}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0458-5}, doi = {10.1007/S10623-018-0458-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuRL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LuNC18, author = {Xiaojuan Lu and Xiaolei Niu and Haitao Cao}, title = {Some results on generalized strong external difference families}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2857--2868}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0481-6}, doi = {10.1007/S10623-018-0481-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LuNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Merai18, author = {L{\'{a}}szl{\'{o}} M{\'{e}}rai}, title = {On the elliptic curve endomorphism generator}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1113--1129}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0382-0}, doi = {10.1007/S10623-017-0382-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Merai18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MesnagerOS18, author = {Sihem Mesnager and Ferruh {\"{O}}zbudak and Ahmet Sinak}, title = {On the p-ary (cubic) bent and plateaued (vectorial) functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1865--1892}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0427-4}, doi = {10.1007/S10623-017-0427-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MesnagerOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MogilnykhS18, author = {Ivan Yu. Mogilnykh and Faina I. Solov'eva}, title = {On explicit minimum weight bases for extended cyclic codes related to Gold functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2619--2627}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0464-7}, doi = {10.1007/S10623-018-0464-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MogilnykhS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MoralesT18, author = {John Vincent S. Morales and Hajime Tanaka}, title = {An Assmus-Mattson theorem for codes over commutative association schemes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1039--1062}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0376-y}, doi = {10.1007/S10623-017-0376-Y}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MoralesT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MoreiraFK18, author = {Jos{\'{e}} Moreira and Marcel Fern{\'{a}}ndez and Grigory Kabatiansky}, title = {Constructions of almost secure frameproof codes with applications to fingerprinting schemes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {785--802}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0359-z}, doi = {10.1007/S10623-017-0359-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MoreiraFK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NeriHRR18, author = {Alessandro Neri and Anna{-}Lena Horlemann{-}Trautmann and Tovohery Randrianarisoa and Joachim Rosenthal}, title = {On the genericity of maximum rank distance and Gabidulin codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {341--363}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0354-4}, doi = {10.1007/S10623-017-0354-4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/NeriHRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Olmez18, author = {Oktay Olmez}, title = {A link between combinatorial designs and three-weight linear codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {817--833}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0363-3}, doi = {10.1007/S10623-017-0363-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Olmez18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OrhonH18, author = {Neriman Gamze Orhon and H{\"{u}}seyin Hisil}, title = {Speeding up Huff form of elliptic curves}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2807--2823}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0475-4}, doi = {10.1007/S10623-018-0475-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OrhonH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OtmaniKN18, author = {Ayoub Otmani and Herv{\'{e}} Tal{\'{e}} Kalachi and S{\'{e}}lestin Ndjeya}, title = {Improved cryptanalysis of rank metric schemes based on Gabidulin codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1983--1996}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0434-5}, doi = {10.1007/S10623-017-0434-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OtmaniKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PaulR18, author = {Goutam Paul and Souvik Ray}, title = {On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1211--1247}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0391-z}, doi = {10.1007/S10623-017-0391-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/PaulR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PineroS18, author = {Fernando L. Pi{\~{n}}ero and Prasant Singh}, title = {A note on the weight spectrum of the Schubert code C\({}_{\mbox{{\(\alpha\)}}}\)(2, m)}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2825--2836}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0477-2}, doi = {10.1007/S10623-018-0477-2}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PineroS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Polak18, author = {Sven C. Polak}, title = {New nonbinary code bounds based on divisibility arguments}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {861--874}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0366-0}, doi = {10.1007/S10623-017-0366-0}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Polak18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/QianZ18, author = {Jianfa Qian and Lina Zhang}, title = {On {MDS} linear complementary dual codes and entanglement-assisted quantum codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1565--1572}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0413-x}, doi = {10.1007/S10623-017-0413-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/QianZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ravagnani18, author = {Alberto Ravagnani}, title = {Duality of codes supported on regular lattices, with an application to enumerative combinatorics}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {2035--2063}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0436-3}, doi = {10.1007/S10623-017-0436-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ravagnani18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RavivYM18, author = {Netanel Raviv and Eitan Yaakobi and Muriel M{\'{e}}dard}, title = {Coding for locality in reconstructing permutations}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {387--418}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0378-9}, doi = {10.1007/S10623-017-0378-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RavivYM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RifaS18, author = {Josep Rif{\`{a}} and Emilio Su{\'{a}}rez{-}Canedo}, title = {Hadamard full propelinear codes of type Q; rank and kernel}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1905--1921}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0429-2}, doi = {10.1007/S10623-017-0429-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RifaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ryabko18, author = {Boris Ryabko}, title = {Properties of two Shannon's ciphers}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {989--995}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0372-2}, doi = {10.1007/S10623-017-0372-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ryabko18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Schmidt18, author = {Kai{-}Uwe Schmidt}, title = {Hermitian rank distance codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1469--1481}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0407-8}, doi = {10.1007/S10623-017-0407-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Schmidt18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SchmidtZ18, author = {Kai{-}Uwe Schmidt and Yue Zhou}, title = {On the number of inequivalent Gabidulin codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1973--1982}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0433-6}, doi = {10.1007/S10623-017-0433-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SchmidtZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShangguanMG18, author = {Chong Shangguan and Jingxue Ma and Gennian Ge}, title = {New upper bounds for parent-identifying codes and traceability codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1727--1737}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0420-y}, doi = {10.1007/S10623-017-0420-Y}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShangguanMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiQS18, author = {Minjia Shi and Liqin Qian and Patrick Sol{\'{e}}}, title = {On self-dual negacirculant codes of index two and four}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2485--2494}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0455-0}, doi = {10.1007/S10623-017-0455-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShiQS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiSAS18, author = {Minjia Shi and Zahra Sepasdar and Adel Alahmadi and Patrick Sol{\'{e}}}, title = {On two-weight Z\({}_{\mbox{2\({}^{\mbox{k}}\)}}\) -codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1201--1209}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0390-0}, doi = {10.1007/S10623-017-0390-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShiSAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShuaiL18, author = {Shuai Li and Li Miao}, title = {A method to calculate differential uniformity for permutations}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1553--1563}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0412-y}, doi = {10.1007/S10623-017-0412-Y}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShuaiL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SilbersteinZ18, author = {Natalia Silberstein and Alexander Zeh}, title = {Anticode-based locally repairable codes with high availability}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {419--445}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0358-0}, doi = {10.1007/S10623-017-0358-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SilbersteinZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/StinsonW18, author = {Douglas R. Stinson and Ruizhong Wei}, title = {Combinatorial repairability for threshold schemes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {195--210}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0336-6}, doi = {10.1007/S10623-017-0336-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/StinsonW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SuYF18, author = {Wei Su and Yang Yang and Cuiling Fan}, title = {New optimal binary sequences with period 4p via interleaving Ding-Helleseth-Lam sequences}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1329--1338}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0398-5}, doi = {10.1007/S10623-017-0398-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SuYF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SudhaS18, author = {Irrinki Gnana Sudha and R. S. Selvaraj}, title = {Codes with a pomset metric and constructions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {875--892}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0367-z}, doi = {10.1007/S10623-017-0367-Z}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SudhaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SunCW18, author = {Ling Sun and Huaifeng Chen and Meiqin Wang}, title = {Zero-correlation attacks: statistical models independent of the number of approximations}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1923--1945}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0430-9}, doi = {10.1007/S10623-017-0430-9}, timestamp = {Tue, 07 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/SunCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Tan18, author = {Ming Ming Tan}, title = {Group invariant weighing matrices}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2677--2702}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0466-5}, doi = {10.1007/S10623-018-0466-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Tan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TianLWY18, author = {Song Tian and Bao Li and Kunpeng Wang and Wei Yu}, title = {Cover attacks for elliptic curves with cofactor two}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2451--2468}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0457-6}, doi = {10.1007/S10623-018-0457-6}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TianLWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Torres-JimenezI18, author = {Jose Torres{-}Jimenez and Idelfonso Izquierdo{-}Marquez}, title = {Covering arrays of strength three from extended permutation vectors}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2629--2643}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0465-6}, doi = {10.1007/S10623-018-0465-6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Torres-JimenezI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Trung18, author = {Tran van Trung}, title = {A recursive construction for simple t-designs using resolutions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1185--1200}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0389-6}, doi = {10.1007/S10623-017-0389-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Trung18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Vega18, author = {Gerardo Vega}, title = {A correction on the determination of the weight enumerator polynomial of some irreducible cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {835--840}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0364-2}, doi = {10.1007/S10623-017-0364-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Vega18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangHL18, author = {SenPeng Wang and Bin Hu and Yan Liu}, title = {The autocorrelation properties of single cycle polynomial T-functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1527--1540}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0410-0}, doi = {10.1007/S10623-017-0410-0}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangJ18, author = {Qian Wang and Chenhui Jin}, title = {Upper bound of the length of truncated impossible differentials for {AES}}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1541--1552}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0411-z}, doi = {10.1007/S10623-017-0411-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangTP18, author = {Qichun Wang and Chik How Tan and Theo Fanuela Prabowo}, title = {On the covering radius of the third order Reed-Muller code RM(3, 7)}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {151--159}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0329-5}, doi = {10.1007/S10623-017-0329-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangTP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WatanabeS18, author = {Yohei Watanabe and Junji Shikata}, title = {Timed-release computational secret sharing and threshold encryption}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {17--54}, year = {2018}, url = {https://doi.org/10.1007/s10623-016-0324-2}, doi = {10.1007/S10623-016-0324-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WatanabeS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WenLH18, author = {Yunhua Wen and Shengli Liu and Shuai Han}, title = {Reusable fuzzy extractor from the decisional Diffie-Hellman assumption}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2495--2512}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0459-4}, doi = {10.1007/S10623-018-0459-4}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WenLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WenYFF18, author = {Jiejing Wen and Minghui Yang and Fang{-}Wei Fu and Keqin Feng}, title = {Cyclotomic construction of strong external difference families in finite fields}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1149--1159}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0384-y}, doi = {10.1007/S10623-017-0384-Y}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WenYFF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/X18, title = {Editor's note}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {447}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0467-4}, doi = {10.1007/S10623-018-0467-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/X18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XiaoZLH18, author = {Zibi Xiao and Xiangyong Zeng and Chunlei Li and Tor Helleseth}, title = {New generalized cyclotomic binary sequences of period p\({}^{\mbox{2}}\)}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1483--1497}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0408-7}, doi = {10.1007/S10623-017-0408-7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/XiaoZLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XiongYY18, author = {Maosheng Xiong and Haode Yan and Pingzhi Yuan}, title = {On a conjecture of differentially 8-uniform power functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1601--1621}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0416-7}, doi = {10.1007/S10623-017-0416-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XiongYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuLZH18, author = {Xiaofang Xu and Chunlei Li and Xiangyong Zeng and Tor Helleseth}, title = {Constructions of complete permutation polynomials}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2869--2892}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0480-7}, doi = {10.1007/S10623-018-0480-7}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/XuLZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuSHHP18, author = {Jun Xu and Santanu Sarkar and Lei Hu and Zhangjie Huang and Liqiang Peng}, title = {Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1997--2033}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0435-4}, doi = {10.1007/S10623-017-0435-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XuSHHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YoshidaO18, author = {Maki Yoshida and Satoshi Obana}, title = {On the (in)efficiency of non-interactive secure multiparty computation}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1793--1805}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0424-7}, doi = {10.1007/S10623-017-0424-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YoshidaO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhanZ18, author = {Xiaoqin Zhan and Shenglin Zhou}, title = {Non-symmetric 2-designs admitting a two-dimensional projective linear group}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2765--2773}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0474-5}, doi = {10.1007/S10623-018-0474-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhanZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangCGGM18, author = {Jie Zhang and Jie Chen and Junqing Gong and Aijun Ge and Chuangui Ma}, title = {Leakage-resilient attribute based encryption in prime-order groups via predicate encodings}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1339--1366}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0399-4}, doi = {10.1007/S10623-017-0399-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangCGGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangG18, author = {Tao Zhang and Gennian Ge}, title = {Combinatorial constructions of packings in Grassmannian spaces}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {803--815}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0362-4}, doi = {10.1007/S10623-017-0362-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangYS18, author = {Hui Zhang and Eitan Yaakobi and Natalia Silberstein}, title = {Multiset combinatorial batch codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2645--2660}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0468-3}, doi = {10.1007/S10623-018-0468-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangZ18, author = {Zhilin Zhang and Shenglin Zhou}, title = {Flag-transitive point-quasiprimitive 2-(v, k, 2) designs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1963--1971}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0432-7}, doi = {10.1007/S10623-017-0432-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoTQ18, author = {Xiao{-}Xin Zhao and Tian Tian and Wen{-}Feng Qi}, title = {A ring-like cascade connection and a class of NFSRs with the same cycle structures}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2775--2790}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0473-6}, doi = {10.1007/S10623-018-0473-6}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoTQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhengB18, author = {Dabin Zheng and Jingjun Bao}, title = {Four classes of linear codes from cyclotomic cosets}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1007--1022}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0374-0}, doi = {10.1007/S10623-017-0374-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhengB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Zhou18, author = {Zhengchun Zhou}, title = {Three-weight ternary linear codes from a family of cyclic difference sets}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2513--2523}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0454-1}, doi = {10.1007/S10623-017-0454-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Zhou18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhuSL18, author = {Shixin Zhu and Zhonghua Sun and Ping Li}, title = {A class of negacyclic {BCH} codes and its application to quantum codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2139--2165}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0441-6}, doi = {10.1007/S10623-017-0441-6}, timestamp = {Wed, 11 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhuSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.