Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc46.bht:"
@article{DBLP:journals/dcc/AbatangeloL08, author = {Vito Abatangelo and Bambina Larato}, title = {Elliptic near-MDS codes over \emph{F}\({}_{\mbox{5}}\)}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {2}, pages = {167--174}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9144-8}, doi = {10.1007/S10623-007-9144-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AbatangeloL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BierbrauerK08, author = {J{\"{u}}rgen Bierbrauer and Gohar M. M. Kyureghyan}, title = {Crooked binomials}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {3}, pages = {269--301}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9157-3}, doi = {10.1007/S10623-007-9157-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BierbrauerK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BritzS08, author = {Thomas Britz and Keisuke Shiromoto}, title = {Designs from subcode supports of linear codes}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {2}, pages = {175--189}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9145-7}, doi = {10.1007/S10623-007-9145-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BritzS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CossidenteDMPS08, author = {Antonio Cossidente and Nicola Durante and Giuseppe Marino and Tim Penttila and Alessandro Siciliano}, title = {The geometry of some two-character sets}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {2}, pages = {231--241}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9155-5}, doi = {10.1007/S10623-007-9155-5}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CossidenteDMPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CuaresmaGP08, author = {Maria Cristeta Cuaresma and Michael Giudici and Cheryl E. Praeger}, title = {Homogeneous factorisations of Johnson graphs}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {3}, pages = {303--327}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9158-2}, doi = {10.1007/S10623-007-9158-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CuaresmaGP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DavisP08, author = {James A. Davis and Laurent Poinsot}, title = {G-Perfect nonlinear functions}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {1}, pages = {83--96}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9137-7}, doi = {10.1007/S10623-007-9137-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DavisP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DingF08, author = {Cunsheng Ding and Tao Feng}, title = {Codebooks from almost difference sets}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {1}, pages = {113--126}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9140-z}, doi = {10.1007/S10623-007-9140-Z}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DingF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DonatiD08, author = {Giorgio Donati and Nicola Durante}, title = {On the intersection of two subgeometries of \emph{PG} {(} \emph{n} , \emph{q} {)}}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {3}, pages = {261--267}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9143-9}, doi = {10.1007/S10623-007-9143-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DonatiD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FackFSVW08, author = {Veerle Fack and Szabolcs L. Fancsali and Leo Storme and Geertrui Van de Voorde and Joost Winne}, title = {Small weight codewords in the codes arising from Desarguesian projective planes}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {1}, pages = {25--43}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9126-x}, doi = {10.1007/S10623-007-9126-X}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FackFSVW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Heden08, author = {Olof Heden}, title = {On perfect \emph{p}-ary codes of length \emph{p}+1}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {1}, pages = {45--56}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9133-y}, doi = {10.1007/S10623-007-9133-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Heden08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HolzmannKT08, author = {Wolf H. Holzmann and Hadi Kharaghani and Behruz Tayfeh{-}Rezaie}, title = {Williamson matrices up to order 59}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {3}, pages = {343--352}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9163-5}, doi = {10.1007/S10623-007-9163-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HolzmannKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Johnson08, author = {Norman L. Johnson}, title = {\emph{mth} -Root subgeometry partitions}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {2}, pages = {127--136}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9141-y}, doi = {10.1007/S10623-007-9141-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Johnson08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Keri08, author = {Gerzson K{\'{e}}ri}, title = {The covering radius of extreme binary 2-surjective codes}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {2}, pages = {191--198}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9150-x}, doi = {10.1007/S10623-007-9150-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Keri08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kolokotronis08, author = {Nicholas Kolokotronis}, title = {Cryptographic properties of nonlinear pseudorandom number generators}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {3}, pages = {353--363}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9164-4}, doi = {10.1007/S10623-007-9164-4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Kolokotronis08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MartirosyanT08, author = {Sosina Martirosyan and Tran van Trung}, title = {Explicit constructions for perfect hash families}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {1}, pages = {97--112}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9138-6}, doi = {10.1007/S10623-007-9138-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MartirosyanT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Meidl08, author = {Wilfried Meidl}, title = {Reducing the calculation of the linear complexity of \emph{u} 2\({}^{\mbox{ \emph{v} }}\)-periodic binary sequences to Games-Chan algorithm}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {1}, pages = {57--65}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9134-x}, doi = {10.1007/S10623-007-9134-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Meidl08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Montinaro08, author = {Alessandro Montinaro}, title = {On the Ree Unital}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {2}, pages = {199--209}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9153-7}, doi = {10.1007/S10623-007-9153-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Montinaro08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Polhill08, author = {John B. Polhill}, title = {New negative Latin square type partial difference sets in nonelementary abelian 2-groups and 3-groups}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {3}, pages = {365--377}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9165-3}, doi = {10.1007/S10623-007-9165-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Polhill08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Potechin08, author = {Aaron Potechin}, title = {Maximal caps in {AG} (6, 3)}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {3}, pages = {243--259}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9132-z}, doi = {10.1007/S10623-007-9132-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Potechin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SkachekR08, author = {Vitaly Skachek and Ron M. Roth}, title = {Probabilistic algorithm for finding roots of linearized polynomials}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {1}, pages = {17--23}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9125-y}, doi = {10.1007/S10623-007-9125-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SkachekR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SkoricKC08, author = {Boris Skoric and Stefan Katzenbeisser and Mehmet Utku Celik}, title = {Symmetric Tardos fingerprinting codes for arbitrary alphabet sizes}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {2}, pages = {137--166}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9142-x}, doi = {10.1007/S10623-007-9142-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SkoricKC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ustaoglu08, author = {Berkant Ustaoglu}, title = {Obtaining a secure and efficient key agreement protocol from {(H)MQV} and {NAXOS}}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {3}, pages = {329--342}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9159-1}, doi = {10.1007/S10623-007-9159-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ustaoglu08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangS08, author = {Jinhua Wang and Hao Shen}, title = {Existence of (\emph{v}, \emph{K}\({}_{\mbox{1(3)}}\) union \{\emph{w}\({}^{\mbox{*}}\)\})-PBDs and its applications}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {1}, pages = {1--16}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9122-1}, doi = {10.1007/S10623-007-9122-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YinYW08, author = {Jianxing Yin and Jie Yan and Chengmin Wang}, title = {Generalized balanced tournament designs and related codes}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {2}, pages = {211--230}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9154-6}, doi = {10.1007/S10623-007-9154-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YinYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangL08, author = {Weiming Zhang and Shiqu Li}, title = {A coding problem in steganography}, journal = {Des. Codes Cryptogr.}, volume = {46}, number = {1}, pages = {67--81}, year = {2008}, url = {https://doi.org/10.1007/s10623-007-9135-9}, doi = {10.1007/S10623-007-9135-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.