default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc7.bht:"
@article{DBLP:journals/dcc/AshikhminL96, author = {Alexei E. Ashikhmin and Simon Litsyn}, title = {Fast Decoding Algorithms for First Order Reed-Muller and Related Codes}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {3}, pages = {187--214}, year = {1996}, url = {https://doi.org/10.1023/A:1018057506207}, doi = {10.1023/A:1018057506207}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AshikhminL96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Berger96, author = {Thierry P. Berger}, title = {On the Automorphism Groups of Affine-Invariant Codes}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {3}, pages = {215--221}, year = {1996}, url = {https://doi.org/10.1023/A:1018038723045}, doi = {10.1023/A:1018038723045}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Berger96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Beth96, author = {Thomas Beth}, title = {Watching the Bhang Meter and Flying through Dirt}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {17--25}, year = {1996}, url = {https://doi.org/10.1023/A:1018092528398}, doi = {10.1023/A:1018092528398}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Beth96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BethD96, author = {Thomas Beth and Whitfield Diffie}, title = {Special Issue Dedicated to Gustavus J. Simmons - Foreword to this issue}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {7--9}, year = {1996}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BethD96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Diffie96, author = {Whitfield Diffie}, title = {The National Security Establishment and the Development of Public-Key Cryptography}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {9--12}, year = {1996}, url = {https://doi.org/10.1023/A:1018032210651}, doi = {10.1023/A:1018032210651}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Diffie96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EupenHW96, author = {Marijn van Eupen and Noboru Hamada and Yoko Watamori}, title = {The Nonexistence of Ternary [50, 5, 32] Codes}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {3}, pages = {235--237}, year = {1996}, url = {https://doi.org/10.1023/A:1018042823954}, doi = {10.1023/A:1018042823954}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EupenHW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Fischer96, author = {Mary Fischer}, title = {"And Now For Something Completely Different" (The Egyptologist and the Cryptographer: {A} Personal Reminiscence)}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {13--15}, year = {1996}, url = {https://doi.org/10.1023/A:1018040527489}, doi = {10.1023/A:1018040527489}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Fischer96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GollmannHM96, author = {Dieter Gollmann and Yongfei Han and Chris J. Mitchell}, title = {Redundant Integer Representations and Fast Exponentiation}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {135--151}, year = {1996}, url = {https://doi.org/10.1023/A:1018013116103}, doi = {10.1023/A:1018013116103}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GollmannHM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GulliverB96, author = {T. Aaron Gulliver and Vijay K. Bhargava}, title = {New Good Rage (m-1)/pm Ternary and Quaternary Quasi-Cyclic Codes}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {3}, pages = {223--233}, year = {1996}, url = {https://doi.org/10.1023/A:1018090707115}, doi = {10.1023/A:1018090707115}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GulliverB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MitchellPWW96, author = {Chris J. Mitchell and Fred Piper and Michael Walker and Peter R. Wild}, title = {Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {101--110}, year = {1996}, url = {https://doi.org/10.1023/A:1018052831124}, doi = {10.1023/A:1018052831124}, timestamp = {Tue, 12 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MitchellPWW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NybergR96, author = {Kaisa Nyberg and Rainer A. Rueppel}, title = {Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {61--81}, year = {1996}, url = {https://doi.org/10.1023/A:1018096612468}, doi = {10.1023/A:1018096612468}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NybergR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ReesS96, author = {Rolf S. Rees and Douglas R. Stinson}, title = {Combinatorial Characterizations of Authentication Codes {II}}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {3}, pages = {239--259}, year = {1996}, url = {https://doi.org/10.1023/A:1018094824862}, doi = {10.1023/A:1018094824862}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ReesS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Safavi-NainiT96, author = {Reihaneh Safavi{-}Naini and Leonid M. Tombak}, title = {Authentication Codes in Plaintext and Chosen-Content Attacks}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {83--99}, year = {1996}, url = {https://doi.org/10.1023/A:1018048713377}, doi = {10.1023/A:1018048713377}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Safavi-NainiT96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ScheidlerSW96, author = {Renate Scheidler and Andreas Stein and Hugh C. Williams}, title = {Key-Exchange in Real Quadratic Congruence Function Fields}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {153--174}, year = {1996}, url = {https://doi.org/10.1023/A:1018065117011}, doi = {10.1023/A:1018065117011}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ScheidlerSW96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SyversonM96, author = {Paul F. Syverson and Catherine Meadows}, title = {A Formal Language for Cryptographic Protocol Requirements}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {27--59}, year = {1996}, url = {https://doi.org/10.1023/A:1018069220646}, doi = {10.1023/A:1018069220646}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SyversonM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangZ96, author = {Xian{-}Mo Zhang and Yuliang Zheng}, title = {Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors}, journal = {Des. Codes Cryptogr.}, volume = {7}, number = {1-2}, pages = {111--134}, year = {1996}, url = {https://doi.org/10.1023/A:1018009032032}, doi = {10.1023/A:1018009032032}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhangZ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.