Search dblp for Publications

export results for "toc:db/journals/dcc/dcc46.bht:"

 download as .bib file

@article{DBLP:journals/dcc/AbatangeloL08,
  author       = {Vito Abatangelo and
                  Bambina Larato},
  title        = {Elliptic near-MDS codes over \emph{F}\({}_{\mbox{5}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {2},
  pages        = {167--174},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9144-8},
  doi          = {10.1007/S10623-007-9144-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AbatangeloL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BierbrauerK08,
  author       = {J{\"{u}}rgen Bierbrauer and
                  Gohar M. M. Kyureghyan},
  title        = {Crooked binomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {3},
  pages        = {269--301},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9157-3},
  doi          = {10.1007/S10623-007-9157-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BierbrauerK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BritzS08,
  author       = {Thomas Britz and
                  Keisuke Shiromoto},
  title        = {Designs from subcode supports of linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {2},
  pages        = {175--189},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9145-7},
  doi          = {10.1007/S10623-007-9145-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BritzS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CossidenteDMPS08,
  author       = {Antonio Cossidente and
                  Nicola Durante and
                  Giuseppe Marino and
                  Tim Penttila and
                  Alessandro Siciliano},
  title        = {The geometry of some two-character sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {2},
  pages        = {231--241},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9155-5},
  doi          = {10.1007/S10623-007-9155-5},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CossidenteDMPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CuaresmaGP08,
  author       = {Maria Cristeta Cuaresma and
                  Michael Giudici and
                  Cheryl E. Praeger},
  title        = {Homogeneous factorisations of Johnson graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {3},
  pages        = {303--327},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9158-2},
  doi          = {10.1007/S10623-007-9158-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CuaresmaGP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DavisP08,
  author       = {James A. Davis and
                  Laurent Poinsot},
  title        = {G-Perfect nonlinear functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {1},
  pages        = {83--96},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9137-7},
  doi          = {10.1007/S10623-007-9137-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DavisP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DingF08,
  author       = {Cunsheng Ding and
                  Tao Feng},
  title        = {Codebooks from almost difference sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {1},
  pages        = {113--126},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9140-z},
  doi          = {10.1007/S10623-007-9140-Z},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DingF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DonatiD08,
  author       = {Giorgio Donati and
                  Nicola Durante},
  title        = {On the intersection of two subgeometries of \emph{PG} {(} \emph{n}
                  , \emph{q} {)}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {3},
  pages        = {261--267},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9143-9},
  doi          = {10.1007/S10623-007-9143-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DonatiD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FackFSVW08,
  author       = {Veerle Fack and
                  Szabolcs L. Fancsali and
                  Leo Storme and
                  Geertrui Van de Voorde and
                  Joost Winne},
  title        = {Small weight codewords in the codes arising from Desarguesian projective
                  planes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {1},
  pages        = {25--43},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9126-x},
  doi          = {10.1007/S10623-007-9126-X},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FackFSVW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Heden08,
  author       = {Olof Heden},
  title        = {On perfect \emph{p}-ary codes of length \emph{p}+1},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {1},
  pages        = {45--56},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9133-y},
  doi          = {10.1007/S10623-007-9133-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Heden08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HolzmannKT08,
  author       = {Wolf H. Holzmann and
                  Hadi Kharaghani and
                  Behruz Tayfeh{-}Rezaie},
  title        = {Williamson matrices up to order 59},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {3},
  pages        = {343--352},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9163-5},
  doi          = {10.1007/S10623-007-9163-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HolzmannKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Johnson08,
  author       = {Norman L. Johnson},
  title        = {\emph{mth} -Root subgeometry partitions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {2},
  pages        = {127--136},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9141-y},
  doi          = {10.1007/S10623-007-9141-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Johnson08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Keri08,
  author       = {Gerzson K{\'{e}}ri},
  title        = {The covering radius of extreme binary 2-surjective codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {2},
  pages        = {191--198},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9150-x},
  doi          = {10.1007/S10623-007-9150-X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Keri08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kolokotronis08,
  author       = {Nicholas Kolokotronis},
  title        = {Cryptographic properties of nonlinear pseudorandom number generators},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {3},
  pages        = {353--363},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9164-4},
  doi          = {10.1007/S10623-007-9164-4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Kolokotronis08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MartirosyanT08,
  author       = {Sosina Martirosyan and
                  Tran van Trung},
  title        = {Explicit constructions for perfect hash families},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {1},
  pages        = {97--112},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9138-6},
  doi          = {10.1007/S10623-007-9138-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MartirosyanT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Meidl08,
  author       = {Wilfried Meidl},
  title        = {Reducing the calculation of the linear complexity of \emph{u} 2\({}^{\mbox{
                  \emph{v} }}\)-periodic binary sequences to Games-Chan algorithm},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {1},
  pages        = {57--65},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9134-x},
  doi          = {10.1007/S10623-007-9134-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Meidl08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Montinaro08,
  author       = {Alessandro Montinaro},
  title        = {On the Ree Unital},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {2},
  pages        = {199--209},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9153-7},
  doi          = {10.1007/S10623-007-9153-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Montinaro08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Polhill08,
  author       = {John B. Polhill},
  title        = {New negative Latin square type partial difference sets in nonelementary
                  abelian 2-groups and 3-groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {3},
  pages        = {365--377},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9165-3},
  doi          = {10.1007/S10623-007-9165-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Polhill08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Potechin08,
  author       = {Aaron Potechin},
  title        = {Maximal caps in {AG} (6, 3)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {3},
  pages        = {243--259},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9132-z},
  doi          = {10.1007/S10623-007-9132-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Potechin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SkachekR08,
  author       = {Vitaly Skachek and
                  Ron M. Roth},
  title        = {Probabilistic algorithm for finding roots of linearized polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {1},
  pages        = {17--23},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9125-y},
  doi          = {10.1007/S10623-007-9125-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SkachekR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SkoricKC08,
  author       = {Boris Skoric and
                  Stefan Katzenbeisser and
                  Mehmet Utku Celik},
  title        = {Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {2},
  pages        = {137--166},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9142-x},
  doi          = {10.1007/S10623-007-9142-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SkoricKC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ustaoglu08,
  author       = {Berkant Ustaoglu},
  title        = {Obtaining a secure and efficient key agreement protocol from {(H)MQV}
                  and {NAXOS}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {3},
  pages        = {329--342},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9159-1},
  doi          = {10.1007/S10623-007-9159-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ustaoglu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangS08,
  author       = {Jinhua Wang and
                  Hao Shen},
  title        = {Existence of (\emph{v}, \emph{K}\({}_{\mbox{1(3)}}\) union \{\emph{w}\({}^{\mbox{*}}\)\})-PBDs
                  and its applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {1},
  pages        = {1--16},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9122-1},
  doi          = {10.1007/S10623-007-9122-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YinYW08,
  author       = {Jianxing Yin and
                  Jie Yan and
                  Chengmin Wang},
  title        = {Generalized balanced tournament designs and related codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {2},
  pages        = {211--230},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9154-6},
  doi          = {10.1007/S10623-007-9154-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YinYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangL08,
  author       = {Weiming Zhang and
                  Shiqu Li},
  title        = {A coding problem in steganography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {46},
  number       = {1},
  pages        = {67--81},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-007-9135-9},
  doi          = {10.1007/S10623-007-9135-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics