Search dblp for Publications

export results for "toc:db/journals/dcc/dcc7.bht:"

 download as .bib file

@article{DBLP:journals/dcc/AshikhminL96,
  author       = {Alexei E. Ashikhmin and
                  Simon Litsyn},
  title        = {Fast Decoding Algorithms for First Order Reed-Muller and Related Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {187--214},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018057506207},
  doi          = {10.1023/A:1018057506207},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AshikhminL96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Berger96,
  author       = {Thierry P. Berger},
  title        = {On the Automorphism Groups of Affine-Invariant Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {215--221},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018038723045},
  doi          = {10.1023/A:1018038723045},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Berger96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Beth96,
  author       = {Thomas Beth},
  title        = {Watching the Bhang Meter and Flying through Dirt},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {17--25},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018092528398},
  doi          = {10.1023/A:1018092528398},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Beth96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BethD96,
  author       = {Thomas Beth and
                  Whitfield Diffie},
  title        = {Special Issue Dedicated to Gustavus J. Simmons - Foreword to this
                  issue},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {7--9},
  year         = {1996},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BethD96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Diffie96,
  author       = {Whitfield Diffie},
  title        = {The National Security Establishment and the Development of Public-Key
                  Cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {9--12},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018032210651},
  doi          = {10.1023/A:1018032210651},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Diffie96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EupenHW96,
  author       = {Marijn van Eupen and
                  Noboru Hamada and
                  Yoko Watamori},
  title        = {The Nonexistence of Ternary [50, 5, 32] Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {235--237},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018042823954},
  doi          = {10.1023/A:1018042823954},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EupenHW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Fischer96,
  author       = {Mary Fischer},
  title        = {"And Now For Something Completely Different" (The Egyptologist and
                  the Cryptographer: {A} Personal Reminiscence)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {13--15},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018040527489},
  doi          = {10.1023/A:1018040527489},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Fischer96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GollmannHM96,
  author       = {Dieter Gollmann and
                  Yongfei Han and
                  Chris J. Mitchell},
  title        = {Redundant Integer Representations and Fast Exponentiation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {135--151},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018013116103},
  doi          = {10.1023/A:1018013116103},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GollmannHM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GulliverB96,
  author       = {T. Aaron Gulliver and
                  Vijay K. Bhargava},
  title        = {New Good Rage (m-1)/pm Ternary and Quaternary Quasi-Cyclic Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {223--233},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018090707115},
  doi          = {10.1023/A:1018090707115},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GulliverB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MitchellPWW96,
  author       = {Chris J. Mitchell and
                  Fred Piper and
                  Michael Walker and
                  Peter R. Wild},
  title        = {Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy
                  and Secret Sharing Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {101--110},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018052831124},
  doi          = {10.1023/A:1018052831124},
  timestamp    = {Tue, 12 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MitchellPWW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NybergR96,
  author       = {Kaisa Nyberg and
                  Rainer A. Rueppel},
  title        = {Message Recovery for Signature Schemes Based on the Discrete Logarithm
                  Problem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {61--81},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018096612468},
  doi          = {10.1023/A:1018096612468},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NybergR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ReesS96,
  author       = {Rolf S. Rees and
                  Douglas R. Stinson},
  title        = {Combinatorial Characterizations of Authentication Codes {II}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {3},
  pages        = {239--259},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018094824862},
  doi          = {10.1023/A:1018094824862},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ReesS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Safavi-NainiT96,
  author       = {Reihaneh Safavi{-}Naini and
                  Leonid M. Tombak},
  title        = {Authentication Codes in Plaintext and Chosen-Content Attacks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {83--99},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018048713377},
  doi          = {10.1023/A:1018048713377},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Safavi-NainiT96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ScheidlerSW96,
  author       = {Renate Scheidler and
                  Andreas Stein and
                  Hugh C. Williams},
  title        = {Key-Exchange in Real Quadratic Congruence Function Fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {153--174},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018065117011},
  doi          = {10.1023/A:1018065117011},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ScheidlerSW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SyversonM96,
  author       = {Paul F. Syverson and
                  Catherine Meadows},
  title        = {A Formal Language for Cryptographic Protocol Requirements},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {27--59},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018069220646},
  doi          = {10.1023/A:1018069220646},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SyversonM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangZ96,
  author       = {Xian{-}Mo Zhang and
                  Yuliang Zheng},
  title        = {Characterizing the Structures of Cryptographic Functions Satisfying
                  the Propagation Criterion for Almost All Vectors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {7},
  number       = {1-2},
  pages        = {111--134},
  year         = {1996},
  url          = {https://doi.org/10.1023/A:1018009032032},
  doi          = {10.1023/A:1018009032032},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangZ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics