Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc38.bht:"
@article{DBLP:journals/dcc/Ahmadi06, author = {Omran Ahmadi}, title = {Self-Reciprocal Irreducible Pentanomials Over F\({}_{\mbox{2}}\)}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {3}, pages = {395--397}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-2031-2}, doi = {10.1007/S10623-005-2031-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ahmadi06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Alderson06, author = {Tim L. Alderson}, title = {(6, 3)-MDS Codes over an Alphabet of Size 4}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {31--40}, year = {2006}, url = {https://doi.org/10.1007/s10623-004-5659-4}, doi = {10.1007/S10623-004-5659-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Alderson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Arazi06, author = {Benjamin Arazi}, title = {Communication-Computation Trade-off in Executing {ECDSA} in a Contactless Smartcard}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {3}, pages = {399--415}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-2069-1}, doi = {10.1007/S10623-005-2069-1}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Arazi06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BallGS06, author = {Simeon Ball and Patrick Govaerts and Leo Storme}, title = {On Ovoids of Parabolic Quadrics}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {131--145}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-5666-0}, doi = {10.1007/S10623-005-5666-0}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BallGS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarantiV06, author = {Andrea Caranti and Francesca Dalla Volta}, title = {The Round Functions of Cryptosystem {PGM} Generate the Symmetric Group}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {147--155}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-5667-z}, doi = {10.1007/S10623-005-5667-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarantiV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Cauchie06, author = {Sara Cauchie}, title = {A Characterization of the Complement of a Hyperbolic Quadric in {PG} (3, \emph{q}), for \emph{q} Odd}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {2}, pages = {195--208}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6341-1}, doi = {10.1007/S10623-005-6341-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Cauchie06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ClerckWKT06, author = {Frank De Clerck and Stefaan De Winter and Elisabeth Kuijken and Cristina Tonesi}, title = {Distance-Regular (0, \emph{alpha})-Reguli}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {2}, pages = {179--194}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-0370-7}, doi = {10.1007/S10623-005-0370-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ClerckWKT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CoronNDOS06, author = {Jean{-}S{\'{e}}bastien Coron and David Naccache and Yvo Desmedt and Andrew M. Odlyzko and Julien P. Stern}, title = {Index Calculation Attacks on {RSA} Signature and Encryption}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {41--53}, year = {2006}, url = {https://doi.org/10.1007/s10623-004-5660-y}, doi = {10.1007/S10623-004-5660-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CoronNDOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DoughertyGO06, author = {Steven T. Dougherty and T. Aaron Gulliver and Manabu Oura}, title = {Higher Weights for Ternary and Quaternary Self-Dual Codes*}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {97--112}, year = {2006}, url = {https://doi.org/10.1007/s10623-004-5663-8}, doi = {10.1007/S10623-004-5663-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DoughertyGO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Grolmusz06, author = {Vince Grolmusz}, title = {Co-Orthogonal Codes}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {3}, pages = {363--372}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-1495-4}, doi = {10.1007/S10623-005-1495-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Grolmusz06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Harada06, author = {Masaaki Harada}, title = {Self-Orthogonal 3-(56, 12, 65) Designs and Extremal Doubly-Even Self-Dual Codes of Length 56}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {5--16}, year = {2006}, url = {https://doi.org/10.1007/s10623-004-5657-6}, doi = {10.1007/S10623-004-5657-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Harada06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Heden06, author = {Olof Heden}, title = {A Full Rank Perfect Code of Length 31}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {125--129}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-5665-1}, doi = {10.1007/S10623-005-5665-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Heden06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HommaK06, author = {Masaaki Homma and Seon Kim}, title = {The Two-Point Codes on a Hermitian Curve with the Designed Minimum Distance}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {55--81}, year = {2006}, url = {https://doi.org/10.1007/s10623-004-5661-x}, doi = {10.1007/S10623-004-5661-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HommaK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HorngCT06, author = {Gwoboa Horng and Tzungher Chen and Du{-}shiau Tsai}, title = {Cheating in Visual Cryptography}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {2}, pages = {219--236}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6342-0}, doi = {10.1007/S10623-005-6342-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HorngCT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ji06, author = {L. Ji}, title = {Asymptotic Determination of the Last Packing Number of Quadruples}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {83--95}, year = {2006}, url = {https://doi.org/10.1007/s10623-004-5662-9}, doi = {10.1007/S10623-004-5662-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ji06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JuelsS06, author = {Ari Juels and Madhu Sudan}, title = {A Fuzzy Vault Scheme}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {2}, pages = {237--257}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6343-z}, doi = {10.1007/S10623-005-6343-Z}, timestamp = {Tue, 14 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JuelsS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KamiyaF06, author = {Norifumi Kamiya and Marc P. C. Fossorier}, title = {Quasi-Cyclic Codes from a Finite Affine Plane}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {3}, pages = {311--329}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6685-6}, doi = {10.1007/S10623-005-6685-6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KamiyaF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KhooGS06, author = {Khoongming Khoo and Guang Gong and Douglas R. Stinson}, title = {A New Characterization of Semi-bent and Bent Functions on Finite Fields*}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {2}, pages = {279--295}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6345-x}, doi = {10.1007/S10623-005-6345-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KhooGS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Lavrauw06, author = {Michel Lavrauw}, title = {Sublines of Prime Order Contained in the Set of Internal Points of a Conic}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {113--123}, year = {2006}, url = {https://doi.org/10.1007/s10623-004-5664-7}, doi = {10.1007/S10623-004-5664-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Lavrauw06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LingNS06, author = {San Ling and Harald Niederreiter and Patrick Sol{\'{e}}}, title = {On the Algebraic Structure of Quasi-cyclic Codes {IV:} Repeated Roots}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {3}, pages = {337--361}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-1431-7}, doi = {10.1007/S10623-005-1431-7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LingNS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MeidlW06, author = {Wilfried Meidl and Arne Winterhof}, title = {Some Notes on the Linear Complexity of Sidel'nikov-Lempel-Cohn-Eastman Sequences}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {2}, pages = {159--178}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6340-2}, doi = {10.1007/S10623-005-6340-2}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MeidlW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Merchant06, author = {Eric Merchant}, title = {Exponentially Many Hadamard Designs}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {2}, pages = {297--308}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6346-9}, doi = {10.1007/S10623-005-6346-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Merchant06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OzenS06, author = {Mehmet {\"{O}}zen and Irfan Siap}, title = {Linear Codes over F\({}_{\mbox{q}}\)[u]/(u\({}^{\mbox{s}}\)) with Respect to the Rosenbloom-Tsfasman Metric}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {1}, pages = {17--29}, year = {2006}, url = {https://doi.org/10.1007/s10623-004-5658-5}, doi = {10.1007/S10623-004-5658-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OzenS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Rosendahl06, author = {Petri Rosendahl}, title = {A Generalization of Niho's Theorem}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {3}, pages = {331--336}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6686-5}, doi = {10.1007/S10623-005-6686-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Rosendahl06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ScottB06, author = {Michael Scott and Paulo S. L. M. Barreto}, title = {Generating More {MNT} Elliptic Curves}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {2}, pages = {209--217}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-0538-1}, doi = {10.1007/S10623-005-0538-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ScottB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Stinson06, author = {Douglas R. Stinson}, title = {Some Observations on the Theory of Cryptographic Hash Functions}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {2}, pages = {259--277}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6344-y}, doi = {10.1007/S10623-005-6344-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Stinson06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Wang06, author = {Jinhua Wang}, title = {A New Class of Optimal 3-splitting Authentication Codes}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {3}, pages = {373--381}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-1501-x}, doi = {10.1007/S10623-005-1501-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Wang06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Weng06, author = {Annegret Weng}, title = {A Low-Memory Algorithm for Point Counting on Picard Curves}, journal = {Des. Codes Cryptogr.}, volume = {38}, number = {3}, pages = {383--393}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-1598-y}, doi = {10.1007/S10623-005-1598-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Weng06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.