Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc62.bht:"
@article{DBLP:journals/dcc/ArasuM12, author = {K. T. Arasu and Siu Lun Ma}, title = {Nonexistence of CW(110, 100)}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {3}, pages = {273--278}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9516-y}, doi = {10.1007/S10623-011-9516-Y}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ArasuM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bhaintwal12, author = {Maheshanand Bhaintwal}, title = {Skew quasi-cyclic codes over Galois rings}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {1}, pages = {85--101}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9494-0}, doi = {10.1007/S10623-011-9494-0}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Bhaintwal12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BonviciniBRT12, author = {Simona Bonvicini and Marco Buratti and Gloria Rinaldi and Tommaso Traetta}, title = {Some progress on the existence of 1-rotational Steiner triple systems}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {1}, pages = {63--78}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9491-3}, doi = {10.1007/S10623-011-9491-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BonviciniBRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BritzJMS12, author = {Thomas Britz and Trygve Johnsen and Dillon Mayhew and Keisuke Shiromoto}, title = {Wei-type duality theorems for matroids}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {3}, pages = {331--341}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9524-y}, doi = {10.1007/S10623-011-9524-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BritzJMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChristopoulouGPT12, author = {Maria Christopoulou and Theodoulos Garefalakis and Daniel Panario and David Thomson}, title = {Gauss periods as constructions of low complexity normal bases}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {1}, pages = {43--62}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9490-4}, doi = {10.1007/S10623-011-9490-4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChristopoulouGPT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dempwolff12, author = {Ulrich Dempwolff}, title = {Geometric and design-theoretic aspects of semibent functions {II}}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {2}, pages = {241--252}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9511-3}, doi = {10.1007/S10623-011-9511-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dempwolff12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FanZ12, author = {Yun Fan and Guanghui Zhang}, title = {On the existence of self-dual permutation codes of finite groups}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {1}, pages = {19--29}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9487-z}, doi = {10.1007/S10623-011-9487-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FanZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Feng12, author = {Tao Feng}, title = {On cyclic codes of length 2\({}^{\mbox{2\({}^{\mbox{r}}\)-1}}\) with two zeros whose dual codes have three weights}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {3}, pages = {253--258}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9514-0}, doi = {10.1007/S10623-011-9514-0}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Feng12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GhodosiPS12, author = {Hossein Ghodosi and Josef Pieprzyk and Ron Steinfeld}, title = {Multi-party computation with conversion of secret sharing}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {3}, pages = {259--272}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9515-z}, doi = {10.1007/S10623-011-9515-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GhodosiPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Glynn12, author = {David G. Glynn}, title = {The factorization of the permanent of a matrix with minimal rank in prime characteristic}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {2}, pages = {175--177}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9501-5}, doi = {10.1007/S10623-011-9501-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Glynn12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Guenda12, author = {Kenza Guenda}, title = {New {MDS} self-dual codes over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {1}, pages = {31--42}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9489-x}, doi = {10.1007/S10623-011-9489-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Guenda12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HavlicekOS12, author = {Hans Havlicek and Boris Odehnal and Metod Saniga}, title = {On invariant notions of Segre varieties in binary projective spaces}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {3}, pages = {343--356}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9525-x}, doi = {10.1007/S10623-011-9525-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HavlicekOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Hiramine12, author = {Yutaka Hiramine}, title = {A construction for modified generalized Hadamard matrices using {QGH} matrices}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {3}, pages = {279--288}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9517-x}, doi = {10.1007/S10623-011-9517-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Hiramine12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuGLZ12, author = {Yupu Hu and Juntao Gao and Qing Liu and Yiwei Zhang}, title = {Fault analysis of Trivium}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {3}, pages = {289--311}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9518-9}, doi = {10.1007/S10623-011-9518-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuGLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JiLY12, author = {Lijun Ji and Yang Li and Jianxing Yin}, title = {Constructions of covering arrays of strength five}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {2}, pages = {199--208}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9505-1}, doi = {10.1007/S10623-011-9505-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JiLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KaiZ12, author = {Xiaoshan Kai and Shixin Zhu}, title = {Negacyclic self-dual codes over finite chain rings}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {2}, pages = {161--174}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9500-6}, doi = {10.1007/S10623-011-9500-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KaiZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KaskiKO12, author = {Petteri Kaski and Mahdad Khatirinejad and Patric R. J. {\"{O}}sterg{\aa}rd}, title = {Steiner triple systems satisfying the 4-vertex condition}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {3}, pages = {323--330}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9520-2}, doi = {10.1007/S10623-011-9520-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KaskiKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LambergerMRS12, author = {Mario Lamberger and Florian Mendel and Vincent Rijmen and Koen Simoens}, title = {Memoryless near-collisions via coding theory}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {1}, pages = {1--18}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9484-2}, doi = {10.1007/S10623-011-9484-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LambergerMRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LangS12, author = {Wolfgang Lang and Ekkehard Schneider}, title = {Turyn type Williamson matrices up to order 99}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {1}, pages = {79--84}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9492-2}, doi = {10.1007/S10623-011-9492-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LangS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiangD12, author = {Miao Liang and Beiliang Du}, title = {A new class of 3-fold perfect splitting authentication codes}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {1}, pages = {109--119}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9496-y}, doi = {10.1007/S10623-011-9496-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiangD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MarutaY12, author = {Tatsuya Maruta and Yuri Yoshida}, title = {A generalized extension theorem for linear codes}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {1}, pages = {121--130}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9497-x}, doi = {10.1007/S10623-011-9497-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MarutaY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OzbudakSS12, author = {Ferruh {\"{O}}zbudak and Elif Saygi and Z{\"{u}}lf{\"{u}}kar Saygi}, title = {A new class of quaternary {LCZ} sequence sets}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {2}, pages = {189--198}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9504-2}, doi = {10.1007/S10623-011-9504-2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OzbudakSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RifaSV12, author = {Josep Rif{\`{a}} and Faina I. Solov'eva and Merc{\`{e}} Villanueva}, title = {Intersection of Hamming codes avoiding Hamming subcodes}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {2}, pages = {209--223}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9506-0}, doi = {10.1007/S10623-011-9506-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RifaSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RohH12, author = {Dongyoung Roh and Sang Geun Hahn}, title = {The square root Diffie-Hellman problem}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {2}, pages = {179--187}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9503-3}, doi = {10.1007/S10623-011-9503-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RohH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShawGH12, author = {Ron Shaw and Neil A. Gordon and Hans Havlicek}, title = {Aspects of the Segre variety S\({}_{\mbox{1, 1, 1}}\)(2)}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {2}, pages = {225--239}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9508-y}, doi = {10.1007/S10623-011-9508-Y}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShawGH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiTY12, author = {Ce Shi and Yu Tang and Jianxing Yin}, title = {The equivalence between optimal detecting arrays and super-simple OAs}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {2}, pages = {131--142}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9498-9}, doi = {10.1007/S10623-011-9498-9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShiTY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SzonyiW12, author = {Tam{\'{a}}s Szonyi and Zsuzsa Weiner}, title = {A stability theorem for lines in Galois planes of prime order}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {1}, pages = {103--108}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9495-z}, doi = {10.1007/S10623-011-9495-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SzonyiW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TanQX12, author = {Lin Tan and Wen{-}Feng Qi and Hong Xu}, title = {Asymptotic analysis on the normalized k-error linear complexity of binary sequences}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {3}, pages = {313--321}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9519-8}, doi = {10.1007/S10623-011-9519-8}, timestamp = {Wed, 20 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/TanQX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Webster12, author = {Jordan D. Webster}, title = {Using rational idempotents to show Turyn's bound is sharp}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {3}, pages = {357--365}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9526-9}, doi = {10.1007/S10623-011-9526-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Webster12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangZG12, author = {Xiande Zhang and Hui Zhang and Gennian Ge}, title = {Optimal constant weight covering codes and nonuniform group divisible 3-designs with block size four}, journal = {Des. Codes Cryptogr.}, volume = {62}, number = {2}, pages = {143--160}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9499-8}, doi = {10.1007/S10623-011-9499-8}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangZG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.