callback( { "result":{ "query":":facetid:toc:\"db/journals/dcc/dcc86.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"63.28" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"155", "@dc":"155", "@oc":"155", "@id":"43446504", "text":":facetid:toc:db/journals/dcc/dcc86.bht" } }, "hits":{ "@total":"155", "@computed":"100", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"2397302", "info":{"authors":{"author":[{"@pid":"93/10827","text":"Adel Alahmadi"},{"@pid":"177/9099","text":"Funda Özdemir"},{"@pid":"s/PatrickSole","text":"Patrick Solé"}]},"title":"On self-dual double circulant codes.","venue":"Des. Codes Cryptogr.","volume":"86","number":"6","pages":"1257-1265","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/AlahmadiOS18","doi":"10.1007/S10623-017-0393-X","ee":"https://doi.org/10.1007/s10623-017-0393-x","url":"https://dblp.org/rec/journals/dcc/AlahmadiOS18"}, "url":"URL#2397302" }, { "@score":"1", "@id":"2397303", "info":{"authors":{"author":[{"@pid":"175/1129","text":"Paulo José Fernandes Almeida"},{"@pid":"10/8140","text":"Diego Napp"},{"@pid":"64/4285","text":"Raquel Pinto"}]},"title":"MDS 2D convolutional codes with optimal 1D horizontal projections.","venue":"Des. Codes Cryptogr.","volume":"86","number":"2","pages":"285-302","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/AlmeidaNP18","doi":"10.1007/S10623-017-0357-1","ee":"https://doi.org/10.1007/s10623-017-0357-1","url":"https://dblp.org/rec/journals/dcc/AlmeidaNP18"}, "url":"URL#2397303" }, { "@score":"1", "@id":"2397304", "info":{"authors":{"author":[{"@pid":"166/6847","text":"Jared Antrobus"},{"@pid":"87/5564","text":"Heide Gluesing-Luerssen"}]},"title":"Lexicodes over finite principal ideal rings.","venue":"Des. Codes Cryptogr.","volume":"86","number":"11","pages":"2661-2676","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/AntrobusG18","doi":"10.1007/S10623-018-0469-2","ee":"https://doi.org/10.1007/s10623-018-0469-2","url":"https://dblp.org/rec/journals/dcc/AntrobusG18"}, "url":"URL#2397304" }, { "@score":"1", "@id":"2397305", "info":{"authors":{"author":[{"@pid":"57/2952","text":"Rafael A. Arce-Nazario"},{"@pid":"37/1882","text":"Francis N. Castro"},{"@pid":"164/2519","text":"Oscar E. González"},{"@pid":"75/10715","text":"Luis A. Medina"},{"@pid":"18/6278","text":"Ivelisse M. Rubio"}]},"title":"New families of balanced symmetric functions and a generalization of Cusick, Li and Stǎnicǎ's conjecture.","venue":"Des. Codes Cryptogr.","volume":"86","number":"3","pages":"693-701","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/Arce-NazarioCGM18","doi":"10.1007/S10623-017-0351-7","ee":"https://doi.org/10.1007/s10623-017-0351-7","url":"https://dblp.org/rec/journals/dcc/Arce-NazarioCGM18"}, "url":"URL#2397305" }, { "@score":"1", "@id":"2397306", "info":{"authors":{"author":[{"@pid":"85/3827","text":"Daniel Augot"},{"@pid":"73/2683","text":"Pierre Loidreau"},{"@pid":"130/3829","text":"Gwezheneg Robert"}]},"title":"Generalized Gabidulin codes over fields of any characteristic.","venue":"Des. Codes Cryptogr.","volume":"86","number":"8","pages":"1807-1848","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/AugotLR18","doi":"10.1007/S10623-017-0425-6","ee":"https://doi.org/10.1007/s10623-017-0425-6","url":"https://dblp.org/rec/journals/dcc/AugotLR18"}, "url":"URL#2397306" }, { "@score":"1", "@id":"2397307", "info":{"authors":{"author":[{"@pid":"10/8140","text":"Diego Napp Avelli"},{"@pid":"64/4285","text":"Raquel Pinto"},{"@pid":"18/3598","text":"Vladimir Sidorenko"}]},"title":"Concatenation of convolutional codes and rank metric codes for multi-shot network coding.","venue":"Des. Codes Cryptogr.","volume":"86","number":"2","pages":"303-318","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/AvelliPS18","doi":"10.1007/S10623-017-0346-4","ee":"https://doi.org/10.1007/s10623-017-0346-4","url":"https://dblp.org/rec/journals/dcc/AvelliPS18"}, "url":"URL#2397307" }, { "@score":"1", "@id":"2397308", "info":{"authors":{"author":[{"@pid":"96/4270","text":"Nuh Aydin"},{"@pid":"146/8556","text":"Yasemin Cengellenmis"},{"@pid":"146/8507","text":"Abdullah Dertli"}]},"title":"On some constacyclic codes over $$\\mathbb {Z}_{4}\\left[ u\\right] /\\left\\langle u{2}-1\\right\\rangle $$ , their $Z4 images, and new codes.","venue":"Des. Codes Cryptogr.","volume":"86","number":"6","pages":"1249-1255","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/AydinCD18","doi":"10.1007/S10623-017-0392-Y","ee":"https://doi.org/10.1007/s10623-017-0392-y","url":"https://dblp.org/rec/journals/dcc/AydinCD18"}, "url":"URL#2397308" }, { "@score":"1", "@id":"2397309", "info":{"authors":{"author":[{"@pid":"206/6432","text":"Khadijeh Bagheri"},{"@pid":"42/4519-1","text":"Mohammad-Reza Sadeghi 0001"},{"@pid":"71/2552","text":"Daniel Panario"}]},"title":"A non-commutative cryptosystem based on quaternion algebras.","venue":"Des. Codes Cryptogr.","volume":"86","number":"10","pages":"2345-2377","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BagheriSP18","doi":"10.1007/S10623-017-0451-4","ee":"https://doi.org/10.1007/s10623-017-0451-4","url":"https://dblp.org/rec/journals/dcc/BagheriSP18"}, "url":"URL#2397309" }, { "@score":"1", "@id":"2397310", "info":{"authors":{"author":[{"@pid":"89/2106","text":"John Bamberg"},{"@pid":"217/0369","text":"Jesse Lansdown"},{"@pid":"163/7748","text":"Melissa Lee"}]},"title":"On m-ovoids of regular near polygons.","venue":"Des. Codes Cryptogr.","volume":"86","number":"5","pages":"997-1006","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BambergLL18","doi":"10.1007/S10623-017-0373-1","ee":"https://doi.org/10.1007/s10623-017-0373-1","url":"https://dblp.org/rec/journals/dcc/BambergLL18"}, "url":"URL#2397310" }, { "@score":"1", "@id":"2397311", "info":{"authors":{"author":[{"@pid":"138/1322","text":"Ramakrishna Bandi"},{"@pid":"176/5284","text":"Alexandre Fotue Tabue"},{"@pid":"49/3688","text":"Edgar Martínez-Moro"}]},"title":"On counting subring-submodules of free modules over finite commutative frobenius rings.","venue":"Des. Codes Cryptogr.","volume":"86","number":"10","pages":"2247-2254","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BandiTM18","doi":"10.1007/S10623-017-0446-1","ee":"https://doi.org/10.1007/s10623-017-0446-1","url":"https://dblp.org/rec/journals/dcc/BandiTM18"}, "url":"URL#2397311" }, { "@score":"1", "@id":"2397312", "info":{"authors":{"author":[{"@pid":"152/1085","text":"Roland D. Barrolleta"},{"@pid":"66/5974","text":"Mercè Villanueva"}]},"title":"Partial permutation decoding for binary linear and $$Z_4$$ Z 4 -linear Hadamard codes.","venue":"Des. Codes Cryptogr.","volume":"86","number":"3","pages":"569-586","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BarrolletaV18","doi":"10.1007/S10623-017-0342-8","ee":"https://doi.org/10.1007/s10623-017-0342-8","url":"https://dblp.org/rec/journals/dcc/BarrolletaV18"}, "url":"URL#2397312" }, { "@score":"1", "@id":"2397313", "info":{"authors":{"author":[{"@pid":"89/10532","text":"Daniele Bartoli"},{"@pid":"184/0772","text":"Maria Montanucci"},{"@pid":"179/0179","text":"Giovanni Zini"}]},"title":"Multi point AG codes on the GK maximal curve.","venue":"Des. Codes Cryptogr.","volume":"86","number":"1","pages":"161-177","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BartoliMZ18","doi":"10.1007/S10623-017-0333-9","ee":"https://doi.org/10.1007/s10623-017-0333-9","url":"https://dblp.org/rec/journals/dcc/BartoliMZ18"}, "url":"URL#2397313" }, { "@score":"1", "@id":"2397314", "info":{"authors":{"author":[{"@pid":"89/10532","text":"Daniele Bartoli"},{"@pid":"184/0772","text":"Maria Montanucci"},{"@pid":"179/0179","text":"Giovanni Zini"}]},"title":"AG codes and AG quantum codes from the GGS curve.","venue":"Des. Codes Cryptogr.","volume":"86","number":"10","pages":"2315-2344","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BartoliMZ18a","doi":"10.1007/S10623-017-0450-5","ee":"https://doi.org/10.1007/s10623-017-0450-5","url":"https://dblp.org/rec/journals/dcc/BartoliMZ18a"}, "url":"URL#2397314" }, { "@score":"1", "@id":"2397315", "info":{"authors":{"author":[{"@pid":"89/10532","text":"Daniele Bartoli"},{"@pid":"31/8234","text":"Luciane Quoos"}]},"title":"Permutation polynomials of the type g(xs) over 𝔽q2n.","venue":"Des. Codes Cryptogr.","volume":"86","number":"8","pages":"1589-1599","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BartoliQ18","doi":"10.1007/S10623-017-0415-8","ee":"https://doi.org/10.1007/s10623-017-0415-8","url":"https://dblp.org/rec/journals/dcc/BartoliQ18"}, "url":"URL#2397315" }, { "@score":"1", "@id":"2397316", "info":{"authors":{"author":[{"@pid":"b/SergeyBereg","text":"Sergey Bereg"},{"@pid":"48/4706","text":"Avi Levy"},{"@pid":"s/IHSudborough","text":"Ivan Hal Sudborough"}]},"title":"Constructing permutation arrays from groups.","venue":"Des. Codes Cryptogr.","volume":"86","number":"5","pages":"1095-1111","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BeregLS18","doi":"10.1007/S10623-017-0381-1","ee":"https://doi.org/10.1007/s10623-017-0381-1","url":"https://dblp.org/rec/journals/dcc/BeregLS18"}, "url":"URL#2397316" }, { "@score":"1", "@id":"2397317", "info":{"authors":{"author":[{"@pid":"198/8175","text":"Wenquan Bi"},{"@pid":"10/1143-8","text":"Zheng Li 0008"},{"@pid":"148/1597","text":"Xiaoyang Dong"},{"@pid":"72/2266-6","text":"Lu Li 0006"},{"@pid":"w/XiaoyunWang","text":"Xiaoyun Wang 0001"}]},"title":"Conditional cube attack on round-reduced River Keyak.","venue":"Des. Codes Cryptogr.","volume":"86","number":"6","pages":"1295-1310","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BiLDLW18","doi":"10.1007/S10623-017-0396-7","ee":"https://doi.org/10.1007/s10623-017-0396-7","url":"https://dblp.org/rec/journals/dcc/BiLDLW18"}, "url":"URL#2397317" }, { "@score":"1", "@id":"2397318", "info":{"authors":{"author":[{"@pid":"70/10044","text":"Khodakhast Bibak"},{"@pid":"k/BruceMKapron","text":"Bruce M. Kapron"},{"@pid":"v/SrinivasanVenkatesh","text":"Venkatesh Srinivasan 0001"}]},"title":"Unweighted linear congruences with distinct coordinates and the Varshamov-Tenengolts codes.","venue":"Des. Codes Cryptogr.","volume":"86","number":"9","pages":"1893-1904","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BibakKS18","doi":"10.1007/S10623-017-0428-3","ee":"https://doi.org/10.1007/s10623-017-0428-3","url":"https://dblp.org/rec/journals/dcc/BibakKS18"}, "url":"URL#2397318" }, { "@score":"1", "@id":"2397319", "info":{"authors":{"author":[{"@pid":"38/48","text":"Jürgen Bierbrauer"},{"@pid":"89/10532","text":"Daniele Bartoli"},{"@pid":"89/3767","text":"Giorgio Faina"},{"@pid":"94/6970","text":"Stefano Marcugini"},{"@pid":"37/699","text":"Fernanda Pambianco"}]},"title":"A family of semifields in odd characteristic.","venue":"Des. Codes Cryptogr.","volume":"86","number":"3","pages":"611-621","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BierbrauerBFMP18","doi":"10.1007/S10623-017-0345-5","ee":"https://doi.org/10.1007/s10623-017-0345-5","url":"https://dblp.org/rec/journals/dcc/BierbrauerBFMP18"}, "url":"URL#2397319" }, { "@score":"1", "@id":"2397320", "info":{"authors":{"author":[{"@pid":"65/6994","text":"Simon R. Blackburn"},{"@pid":"g/MarcusGreferath","text":"Marcus Greferath"},{"@pid":"06/716","text":"Camilla Hollanti"},{"@pid":"10/444","text":"Mario-Osvin Pavcevic"},{"@pid":"44/4587","text":"Joachim Rosenthal"},{"@pid":"62/2591","text":"Leo Storme"},{"@pid":"28/4074","text":"Ángeles Vázquez-Castro"},{"@pid":"32/261","text":"Alfred Wassermann"}]},"title":"Preface to the special issue on network coding and designs.","venue":"Des. Codes Cryptogr.","volume":"86","number":"2","pages":"237-238","year":"2018","type":"Journal Articles","access":"open","key":"journals/dcc/BlackburnGHPRSV18","doi":"10.1007/S10623-017-0443-4","ee":"https://doi.org/10.1007/s10623-017-0443-4","url":"https://dblp.org/rec/journals/dcc/BlackburnGHPRSV18"}, "url":"URL#2397320" }, { "@score":"1", "@id":"2397321", "info":{"authors":{"author":[{"@pid":"132/9410","text":"Iván Blanco-Chacón"},{"@pid":"32/6072","text":"Eimear Byrne"},{"@pid":"67/5690","text":"Iwan M. Duursma"},{"@pid":"38/9360","text":"John Sheekey"}]},"title":"Rank metric codes and zeta functions.","venue":"Des. Codes Cryptogr.","volume":"86","number":"8","pages":"1767-1792","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/Blanco-ChaconBD18","doi":"10.1007/S10623-017-0423-8","ee":"https://doi.org/10.1007/s10623-017-0423-8","url":"https://dblp.org/rec/journals/dcc/Blanco-ChaconBD18"}, "url":"URL#2397321" }, { "@score":"1", "@id":"2397322", "info":{"authors":{"author":[{"@pid":"19/4123","text":"Joaquim Borges"},{"@pid":"16/6651","text":"Cristina Fernández-Córdoba"}]},"title":"A characterization of ℤ2ℤ2[u]-linear codes.","venue":"Des. Codes Cryptogr.","volume":"86","number":"7","pages":"1377-1389","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BorgesF18","doi":"10.1007/S10623-017-0401-1","ee":"https://doi.org/10.1007/s10623-017-0401-1","url":"https://dblp.org/rec/journals/dcc/BorgesF18"}, "url":"URL#2397322" }, { "@score":"1", "@id":"2397323", "info":{"authors":{"author":[{"@pid":"19/4123","text":"Joaquim Borges"},{"@pid":"16/6651","text":"Cristina Fernández-Córdoba"},{"@pid":"147/5259","text":"Roger Ten-Valls"}]},"title":"Z2-double cyclic codes.","venue":"Des. Codes Cryptogr.","volume":"86","number":"3","pages":"463-479","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/BorgesFT18","doi":"10.1007/S10623-017-0334-8","ee":"https://doi.org/10.1007/s10623-017-0334-8","url":"https://dblp.org/rec/journals/dcc/BorgesFT18"}, "url":"URL#2397323" }, { "@score":"1", "@id":"2397324", "info":{"authors":{"author":[{"@pid":"175/5718","text":"Rémi Bricout"},{"@pid":"91/5242","text":"Sean Murphy"},{"@pid":"39/780","text":"Kenneth G. Paterson"},{"@pid":"184/6051","text":"Thyla van der Merwe"}]},"title":"Analysing and exploiting the Mantin biases in RC4.","venue":"Des. Codes Cryptogr.","volume":"86","number":"4","pages":"743-770","year":"2018","type":"Journal Articles","access":"open","key":"journals/dcc/BricoutMPM18","doi":"10.1007/S10623-017-0355-3","ee":"https://doi.org/10.1007/s10623-017-0355-3","url":"https://dblp.org/rec/journals/dcc/BricoutMPM18"}, "url":"URL#2397324" }, { "@score":"1", "@id":"2397325", "info":{"authors":{"author":[{"@pid":"97/6074","text":"Claude Carlet"},{"@pid":"76/4763","text":"Sihem Mesnager"},{"@pid":"91/470-1","text":"Chunming Tang 0001"},{"@pid":"83/9369","text":"Yanfeng Qi"}]},"title":"Euclidean and Hermitian LCD MDS codes.","venue":"Des. Codes Cryptogr.","volume":"86","number":"11","pages":"2605-2618","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/CarletMTQ18","doi":"10.1007/S10623-018-0463-8","ee":"https://doi.org/10.1007/s10623-018-0463-8","url":"https://dblp.org/rec/journals/dcc/CarletMTQ18"}, "url":"URL#2397325" }, { "@score":"1", "@id":"2397326", "info":{"authors":{"author":[{"@pid":"37/3188","text":"Dario Catalano"},{"@pid":"99/2744-1","text":"Dario Fiore 0001"},{"@pid":"141/8423","text":"Luca Nizzardo"}]},"title":"Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions.","venue":"Des. Codes Cryptogr.","volume":"86","number":"10","pages":"2197-2246","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/CatalanoFN18","doi":"10.1007/S10623-017-0444-3","ee":"https://doi.org/10.1007/s10623-017-0444-3","url":"https://dblp.org/rec/journals/dcc/CatalanoFN18"}, "url":"URL#2397326" }, { "@score":"1", "@id":"2397327", "info":{"authors":{"author":[{"@pid":"130/9391","text":"Seunghwan Chang"},{"@pid":"10/1996","text":"Jong Yoon Hyun"}]},"title":"Linear codes from simplicial complexes.","venue":"Des. Codes Cryptogr.","volume":"86","number":"10","pages":"2167-2181","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/ChangH18","doi":"10.1007/S10623-017-0442-5","ee":"https://doi.org/10.1007/s10623-017-0442-5","url":"https://dblp.org/rec/journals/dcc/ChangH18"}, "url":"URL#2397327" }, { "@score":"1", "@id":"2397328", "info":{"authors":{"author":[{"@pid":"134/1184","text":"Jingyuan Chen"},{"@pid":"80/4917","text":"Lijun Ji"},{"@pid":"87/6284","text":"Yun Li"}]},"title":"Combinatorial constructions of optimal (m, n, 4, 2) optical orthogonal signature pattern codes.","venue":"Des. Codes Cryptogr.","volume":"86","number":"7","pages":"1499-1525","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/ChenJL18","doi":"10.1007/S10623-017-0409-6","ee":"https://doi.org/10.1007/s10623-017-0409-6","url":"https://dblp.org/rec/journals/dcc/ChenJL18"}, "url":"URL#2397328" }, { "@score":"1", "@id":"2397329", "info":{"authors":{"author":[{"@pid":"121/5686","text":"Bocong Chen"},{"@pid":"43/5900-3","text":"Hongwei Liu 0003"}]},"title":"Constructions of cyclic constant dimension codes.","venue":"Des. Codes Cryptogr.","volume":"86","number":"6","pages":"1267-1279","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/ChenL18","doi":"10.1007/S10623-017-0394-9","ee":"https://doi.org/10.1007/s10623-017-0394-9","url":"https://dblp.org/rec/journals/dcc/ChenL18"}, "url":"URL#2397329" }, { "@score":"1", "@id":"2397330", "info":{"authors":{"author":[{"@pid":"83/5841","text":"Seung Geol Choi"},{"@pid":"38/6981","text":"Dana Dachman-Soled"},{"@pid":"m/TalMalkin","text":"Tal Malkin"},{"@pid":"81/5927","text":"Hoeteck Wee"}]},"title":"Improved, black-box, non-malleable encryption from semantic security.","venue":"Des. Codes Cryptogr.","volume":"86","number":"3","pages":"641-663","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/ChoiDMW18","doi":"10.1007/S10623-017-0348-2","ee":"https://doi.org/10.1007/s10623-017-0348-2","url":"https://dblp.org/rec/journals/dcc/ChoiDMW18"}, "url":"URL#2397330" }, { "@score":"1", "@id":"2397331", "info":{"authors":{"author":{"@pid":"121/5383","text":"David Clayton"}},"title":"A note on almost difference sets in nonabelian groups.","venue":"Des. Codes Cryptogr.","volume":"86","number":"7","pages":"1405-1410","year":"2018","type":"Journal Articles","access":"closed","key":"journals/dcc/Clayton18","doi":"10.1007/S10623-017-0403-Z","ee":"https://doi.org/10.1007/s10623-017-0403-z","url":"https://dblp.org/rec/journals/dcc/Clayton18"}, "url":"URL#2397331" } ] } } } )