Search dblp for Publications

export results for "toc:db/journals/dcc/dcc43.bht:"

 download as .bib file

@article{DBLP:journals/dcc/Arhin07,
  author       = {John Arhin},
  title        = {On the structure of 1-designs with at most two block intersection
                  numbers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {2-3},
  pages        = {103--114},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9067-4},
  doi          = {10.1007/S10623-007-9067-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Arhin07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bras-Amoros07,
  author       = {Maria Bras{-}Amor{\'{o}}s},
  title        = {Algebraic-geometry codes, one-point codes, and evaluation codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {2-3},
  pages        = {137--145},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9074-5},
  doi          = {10.1007/S10623-007-9074-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Bras-Amoros07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CaggegiF07,
  author       = {Andrea Caggegi and
                  Giovanni Falcone},
  title        = {On 2-(n\({}^{\mbox{2}}\), 2n, 2n-1) designs with three intersection
                  numbers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {1},
  pages        = {33--40},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9051-z},
  doi          = {10.1007/S10623-007-9051-Z},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CaggegiF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CheonM07,
  author       = {E. J. Cheon and
                  Tatsuya Maruta},
  title        = {On the minimum length of some linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {2-3},
  pages        = {123--135},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9070-9},
  doi          = {10.1007/S10623-007-9070-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CheonM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Feyter07,
  author       = {Nikias de Feyter},
  title        = {Classification of (0, 2)-geometries embedded in {AG} (3, q)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {1},
  pages        = {21--32},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9050-0},
  doi          = {10.1007/S10623-007-9050-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Feyter07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FuX07,
  author       = {Fang{-}Wei Fu and
                  Shu{-}Tao Xia},
  title        = {The characterization of binary constant weight codes meeting the bound
                  of Fu and Shen},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {1},
  pages        = {9--20},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9049-6},
  doi          = {10.1007/S10623-007-9049-6},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/FuX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GashkovET07,
  author       = {Igor Gashkov and
                  J. A. O. Ekberg and
                  D. Taub},
  title        = {A geometric approach to finding new lower bounds of A(n, d, w)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {2-3},
  pages        = {85--91},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9064-7},
  doi          = {10.1007/S10623-007-9064-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GashkovET07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GieseS07,
  author       = {Sabine Giese and
                  Ralph{-}Hardo Schulz},
  title        = {Divisible designs with dual translation group},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {1},
  pages        = {41--45},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9056-7},
  doi          = {10.1007/S10623-007-9056-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GieseS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/IzuKKS07,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Takeshi Koshiba and
                  Takeshi Shimoyama},
  title        = {Low-density attack revisited},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {1},
  pages        = {47--59},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9058-5},
  doi          = {10.1007/S10623-007-9058-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/IzuKKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JacksonM07,
  author       = {Wen{-}Ai Jackson and
                  S. Murphy},
  title        = {Projective aspects of the {AES} inversion},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {2-3},
  pages        = {167--179},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9059-4},
  doi          = {10.1007/S10623-007-9059-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JacksonM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JangNC07,
  author       = {Ji{-}Woong Jang and
                  Jong{-}Seon No and
                  Habong Chung},
  title        = {Butson Hadamard matrices with partially cyclic core},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {2-3},
  pages        = {93--101},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9065-6},
  doi          = {10.1007/S10623-007-9065-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JangNC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JedwabP07,
  author       = {Jonathan Jedwab and
                  Matthew Geoffrey Parker},
  title        = {There are no Barker arrays having more than two dimensions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {2-3},
  pages        = {79--84},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9060-y},
  doi          = {10.1007/S10623-007-9060-Y},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JedwabP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ji07,
  author       = {Lijun Ji},
  title        = {A construction for large sets of disjoint Kirkman triple systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {2-3},
  pages        = {115--122},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9069-2},
  doi          = {10.1007/S10623-007-9069-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ji07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kelly07,
  author       = {Shane Kelly},
  title        = {Constructions of intriguing sets of polar spaces from field reduction
                  and derivation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {1},
  pages        = {1--8},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9046-9},
  doi          = {10.1007/S10623-007-9046-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kelly07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KiayiasY07,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Cryptanalyzing the polynomial-reconstruction based public-key system
                  under optimal parameter choice},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {2-3},
  pages        = {61--78},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9055-8},
  doi          = {10.1007/S10623-007-9055-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KiayiasY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Yildiz07,
  author       = {Bahattin Yildiz},
  title        = {Weights modulo \emph{p} \({}^{\mbox{ \emph{e} }}\) of linear codes
                  over rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {2-3},
  pages        = {147--165},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9076-3},
  doi          = {10.1007/S10623-007-9076-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Yildiz07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics