Search dblp for Publications

export results for "toc:db/journals/dcc/dcc38.bht:"

 download as .bib file

@article{DBLP:journals/dcc/Ahmadi06,
  author       = {Omran Ahmadi},
  title        = {Self-Reciprocal Irreducible Pentanomials Over F\({}_{\mbox{2}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {3},
  pages        = {395--397},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-2031-2},
  doi          = {10.1007/S10623-005-2031-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ahmadi06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Alderson06,
  author       = {Tim L. Alderson},
  title        = {(6, 3)-MDS Codes over an Alphabet of Size 4},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {31--40},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-004-5659-4},
  doi          = {10.1007/S10623-004-5659-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Alderson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Arazi06,
  author       = {Benjamin Arazi},
  title        = {Communication-Computation Trade-off in Executing {ECDSA} in a Contactless
                  Smartcard},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {3},
  pages        = {399--415},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-2069-1},
  doi          = {10.1007/S10623-005-2069-1},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Arazi06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BallGS06,
  author       = {Simeon Ball and
                  Patrick Govaerts and
                  Leo Storme},
  title        = {On Ovoids of Parabolic Quadrics},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {131--145},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-5666-0},
  doi          = {10.1007/S10623-005-5666-0},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BallGS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarantiV06,
  author       = {Andrea Caranti and
                  Francesca Dalla Volta},
  title        = {The Round Functions of Cryptosystem {PGM} Generate the Symmetric Group},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {147--155},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-5667-z},
  doi          = {10.1007/S10623-005-5667-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarantiV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Cauchie06,
  author       = {Sara Cauchie},
  title        = {A Characterization of the Complement of a Hyperbolic Quadric in {PG}
                  (3, \emph{q}), for \emph{q} Odd},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {2},
  pages        = {195--208},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-6341-1},
  doi          = {10.1007/S10623-005-6341-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Cauchie06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ClerckWKT06,
  author       = {Frank De Clerck and
                  Stefaan De Winter and
                  Elisabeth Kuijken and
                  Cristina Tonesi},
  title        = {Distance-Regular (0, \emph{alpha})-Reguli},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {2},
  pages        = {179--194},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-0370-7},
  doi          = {10.1007/S10623-005-0370-7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ClerckWKT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CoronNDOS06,
  author       = {Jean{-}S{\'{e}}bastien Coron and
                  David Naccache and
                  Yvo Desmedt and
                  Andrew M. Odlyzko and
                  Julien P. Stern},
  title        = {Index Calculation Attacks on {RSA} Signature and Encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {41--53},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-004-5660-y},
  doi          = {10.1007/S10623-004-5660-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CoronNDOS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DoughertyGO06,
  author       = {Steven T. Dougherty and
                  T. Aaron Gulliver and
                  Manabu Oura},
  title        = {Higher Weights for Ternary and Quaternary Self-Dual Codes*},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {97--112},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-004-5663-8},
  doi          = {10.1007/S10623-004-5663-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DoughertyGO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Grolmusz06,
  author       = {Vince Grolmusz},
  title        = {Co-Orthogonal Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {3},
  pages        = {363--372},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-1495-4},
  doi          = {10.1007/S10623-005-1495-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Grolmusz06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Harada06,
  author       = {Masaaki Harada},
  title        = {Self-Orthogonal 3-(56, 12, 65) Designs and Extremal Doubly-Even Self-Dual
                  Codes of Length 56},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {5--16},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-004-5657-6},
  doi          = {10.1007/S10623-004-5657-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Harada06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Heden06,
  author       = {Olof Heden},
  title        = {A Full Rank Perfect Code of Length 31},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {125--129},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-5665-1},
  doi          = {10.1007/S10623-005-5665-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Heden06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HommaK06,
  author       = {Masaaki Homma and
                  Seon Kim},
  title        = {The Two-Point Codes on a Hermitian Curve with the Designed Minimum
                  Distance},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {55--81},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-004-5661-x},
  doi          = {10.1007/S10623-004-5661-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HommaK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HorngCT06,
  author       = {Gwoboa Horng and
                  Tzungher Chen and
                  Du{-}shiau Tsai},
  title        = {Cheating in Visual Cryptography},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {2},
  pages        = {219--236},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-6342-0},
  doi          = {10.1007/S10623-005-6342-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HorngCT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ji06,
  author       = {L. Ji},
  title        = {Asymptotic Determination of the Last Packing Number of Quadruples},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {83--95},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-004-5662-9},
  doi          = {10.1007/S10623-004-5662-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ji06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JuelsS06,
  author       = {Ari Juels and
                  Madhu Sudan},
  title        = {A Fuzzy Vault Scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {2},
  pages        = {237--257},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-6343-z},
  doi          = {10.1007/S10623-005-6343-Z},
  timestamp    = {Tue, 14 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JuelsS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KamiyaF06,
  author       = {Norifumi Kamiya and
                  Marc P. C. Fossorier},
  title        = {Quasi-Cyclic Codes from a Finite Affine Plane},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {3},
  pages        = {311--329},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-6685-6},
  doi          = {10.1007/S10623-005-6685-6},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KamiyaF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KhooGS06,
  author       = {Khoongming Khoo and
                  Guang Gong and
                  Douglas R. Stinson},
  title        = {A New Characterization of Semi-bent and Bent Functions on Finite Fields*},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {2},
  pages        = {279--295},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-6345-x},
  doi          = {10.1007/S10623-005-6345-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KhooGS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Lavrauw06,
  author       = {Michel Lavrauw},
  title        = {Sublines of Prime Order Contained in the Set of Internal Points of
                  a Conic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {113--123},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-004-5664-7},
  doi          = {10.1007/S10623-004-5664-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Lavrauw06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LingNS06,
  author       = {San Ling and
                  Harald Niederreiter and
                  Patrick Sol{\'{e}}},
  title        = {On the Algebraic Structure of Quasi-cyclic Codes {IV:} Repeated Roots},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {3},
  pages        = {337--361},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-1431-7},
  doi          = {10.1007/S10623-005-1431-7},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LingNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MeidlW06,
  author       = {Wilfried Meidl and
                  Arne Winterhof},
  title        = {Some Notes on the Linear Complexity of Sidel'nikov-Lempel-Cohn-Eastman
                  Sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {2},
  pages        = {159--178},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-6340-2},
  doi          = {10.1007/S10623-005-6340-2},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MeidlW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Merchant06,
  author       = {Eric Merchant},
  title        = {Exponentially Many Hadamard Designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {2},
  pages        = {297--308},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-6346-9},
  doi          = {10.1007/S10623-005-6346-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Merchant06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OzenS06,
  author       = {Mehmet {\"{O}}zen and
                  Irfan Siap},
  title        = {Linear Codes over F\({}_{\mbox{q}}\)[u]/(u\({}^{\mbox{s}}\)) with
                  Respect to the Rosenbloom-Tsfasman Metric},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {1},
  pages        = {17--29},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-004-5658-5},
  doi          = {10.1007/S10623-004-5658-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OzenS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Rosendahl06,
  author       = {Petri Rosendahl},
  title        = {A Generalization of Niho's Theorem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {3},
  pages        = {331--336},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-6686-5},
  doi          = {10.1007/S10623-005-6686-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Rosendahl06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ScottB06,
  author       = {Michael Scott and
                  Paulo S. L. M. Barreto},
  title        = {Generating More {MNT} Elliptic Curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {2},
  pages        = {209--217},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-0538-1},
  doi          = {10.1007/S10623-005-0538-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ScottB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Stinson06,
  author       = {Douglas R. Stinson},
  title        = {Some Observations on the Theory of Cryptographic Hash Functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {2},
  pages        = {259--277},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-6344-y},
  doi          = {10.1007/S10623-005-6344-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Stinson06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Wang06,
  author       = {Jinhua Wang},
  title        = {A New Class of Optimal 3-splitting Authentication Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {3},
  pages        = {373--381},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-1501-x},
  doi          = {10.1007/S10623-005-1501-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Wang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Weng06,
  author       = {Annegret Weng},
  title        = {A Low-Memory Algorithm for Point Counting on Picard Curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {38},
  number       = {3},
  pages        = {383--393},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10623-005-1598-y},
  doi          = {10.1007/S10623-005-1598-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Weng06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics