Search dblp for Publications

export results for "toc:db/journals/dcc/dcc62.bht:"

 download as .bib file

@article{DBLP:journals/dcc/ArasuM12,
  author       = {K. T. Arasu and
                  Siu Lun Ma},
  title        = {Nonexistence of CW(110, 100)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {3},
  pages        = {273--278},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9516-y},
  doi          = {10.1007/S10623-011-9516-Y},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ArasuM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bhaintwal12,
  author       = {Maheshanand Bhaintwal},
  title        = {Skew quasi-cyclic codes over Galois rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {1},
  pages        = {85--101},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9494-0},
  doi          = {10.1007/S10623-011-9494-0},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Bhaintwal12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BonviciniBRT12,
  author       = {Simona Bonvicini and
                  Marco Buratti and
                  Gloria Rinaldi and
                  Tommaso Traetta},
  title        = {Some progress on the existence of 1-rotational Steiner triple systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {1},
  pages        = {63--78},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9491-3},
  doi          = {10.1007/S10623-011-9491-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BonviciniBRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BritzJMS12,
  author       = {Thomas Britz and
                  Trygve Johnsen and
                  Dillon Mayhew and
                  Keisuke Shiromoto},
  title        = {Wei-type duality theorems for matroids},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {3},
  pages        = {331--341},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9524-y},
  doi          = {10.1007/S10623-011-9524-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BritzJMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChristopoulouGPT12,
  author       = {Maria Christopoulou and
                  Theodoulos Garefalakis and
                  Daniel Panario and
                  David Thomson},
  title        = {Gauss periods as constructions of low complexity normal bases},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {1},
  pages        = {43--62},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9490-4},
  doi          = {10.1007/S10623-011-9490-4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChristopoulouGPT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dempwolff12,
  author       = {Ulrich Dempwolff},
  title        = {Geometric and design-theoretic aspects of semibent functions {II}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {2},
  pages        = {241--252},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9511-3},
  doi          = {10.1007/S10623-011-9511-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dempwolff12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FanZ12,
  author       = {Yun Fan and
                  Guanghui Zhang},
  title        = {On the existence of self-dual permutation codes of finite groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {1},
  pages        = {19--29},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9487-z},
  doi          = {10.1007/S10623-011-9487-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FanZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Feng12,
  author       = {Tao Feng},
  title        = {On cyclic codes of length 2\({}^{\mbox{2\({}^{\mbox{r}}\)-1}}\) with
                  two zeros whose dual codes have three weights},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {3},
  pages        = {253--258},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9514-0},
  doi          = {10.1007/S10623-011-9514-0},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Feng12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GhodosiPS12,
  author       = {Hossein Ghodosi and
                  Josef Pieprzyk and
                  Ron Steinfeld},
  title        = {Multi-party computation with conversion of secret sharing},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {3},
  pages        = {259--272},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9515-z},
  doi          = {10.1007/S10623-011-9515-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GhodosiPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Glynn12,
  author       = {David G. Glynn},
  title        = {The factorization of the permanent of a matrix with minimal rank in
                  prime characteristic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {2},
  pages        = {175--177},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9501-5},
  doi          = {10.1007/S10623-011-9501-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Glynn12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Guenda12,
  author       = {Kenza Guenda},
  title        = {New {MDS} self-dual codes over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {1},
  pages        = {31--42},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9489-x},
  doi          = {10.1007/S10623-011-9489-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Guenda12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HavlicekOS12,
  author       = {Hans Havlicek and
                  Boris Odehnal and
                  Metod Saniga},
  title        = {On invariant notions of Segre varieties in binary projective spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {3},
  pages        = {343--356},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9525-x},
  doi          = {10.1007/S10623-011-9525-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HavlicekOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Hiramine12,
  author       = {Yutaka Hiramine},
  title        = {A construction for modified generalized Hadamard matrices using {QGH}
                  matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {3},
  pages        = {279--288},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9517-x},
  doi          = {10.1007/S10623-011-9517-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Hiramine12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuGLZ12,
  author       = {Yupu Hu and
                  Juntao Gao and
                  Qing Liu and
                  Yiwei Zhang},
  title        = {Fault analysis of Trivium},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {3},
  pages        = {289--311},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9518-9},
  doi          = {10.1007/S10623-011-9518-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuGLZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JiLY12,
  author       = {Lijun Ji and
                  Yang Li and
                  Jianxing Yin},
  title        = {Constructions of covering arrays of strength five},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {2},
  pages        = {199--208},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9505-1},
  doi          = {10.1007/S10623-011-9505-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JiLY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KaiZ12,
  author       = {Xiaoshan Kai and
                  Shixin Zhu},
  title        = {Negacyclic self-dual codes over finite chain rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {2},
  pages        = {161--174},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9500-6},
  doi          = {10.1007/S10623-011-9500-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KaiZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KaskiKO12,
  author       = {Petteri Kaski and
                  Mahdad Khatirinejad and
                  Patric R. J. {\"{O}}sterg{\aa}rd},
  title        = {Steiner triple systems satisfying the 4-vertex condition},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {3},
  pages        = {323--330},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9520-2},
  doi          = {10.1007/S10623-011-9520-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KaskiKO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LambergerMRS12,
  author       = {Mario Lamberger and
                  Florian Mendel and
                  Vincent Rijmen and
                  Koen Simoens},
  title        = {Memoryless near-collisions via coding theory},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {1},
  pages        = {1--18},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9484-2},
  doi          = {10.1007/S10623-011-9484-2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LambergerMRS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LangS12,
  author       = {Wolfgang Lang and
                  Ekkehard Schneider},
  title        = {Turyn type Williamson matrices up to order 99},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {1},
  pages        = {79--84},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9492-2},
  doi          = {10.1007/S10623-011-9492-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LangS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiangD12,
  author       = {Miao Liang and
                  Beiliang Du},
  title        = {A new class of 3-fold perfect splitting authentication codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {1},
  pages        = {109--119},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9496-y},
  doi          = {10.1007/S10623-011-9496-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiangD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MarutaY12,
  author       = {Tatsuya Maruta and
                  Yuri Yoshida},
  title        = {A generalized extension theorem for linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {1},
  pages        = {121--130},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9497-x},
  doi          = {10.1007/S10623-011-9497-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MarutaY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OzbudakSS12,
  author       = {Ferruh {\"{O}}zbudak and
                  Elif Saygi and
                  Z{\"{u}}lf{\"{u}}kar Saygi},
  title        = {A new class of quaternary {LCZ} sequence sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {2},
  pages        = {189--198},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9504-2},
  doi          = {10.1007/S10623-011-9504-2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OzbudakSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RifaSV12,
  author       = {Josep Rif{\`{a}} and
                  Faina I. Solov'eva and
                  Merc{\`{e}} Villanueva},
  title        = {Intersection of Hamming codes avoiding Hamming subcodes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {2},
  pages        = {209--223},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9506-0},
  doi          = {10.1007/S10623-011-9506-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RifaSV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RohH12,
  author       = {Dongyoung Roh and
                  Sang Geun Hahn},
  title        = {The square root Diffie-Hellman problem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {2},
  pages        = {179--187},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9503-3},
  doi          = {10.1007/S10623-011-9503-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RohH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShawGH12,
  author       = {Ron Shaw and
                  Neil A. Gordon and
                  Hans Havlicek},
  title        = {Aspects of the Segre variety S\({}_{\mbox{1, 1, 1}}\)(2)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {2},
  pages        = {225--239},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9508-y},
  doi          = {10.1007/S10623-011-9508-Y},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShawGH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiTY12,
  author       = {Ce Shi and
                  Yu Tang and
                  Jianxing Yin},
  title        = {The equivalence between optimal detecting arrays and super-simple
                  OAs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {2},
  pages        = {131--142},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9498-9},
  doi          = {10.1007/S10623-011-9498-9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiTY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SzonyiW12,
  author       = {Tam{\'{a}}s Szonyi and
                  Zsuzsa Weiner},
  title        = {A stability theorem for lines in Galois planes of prime order},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {1},
  pages        = {103--108},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9495-z},
  doi          = {10.1007/S10623-011-9495-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SzonyiW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TanQX12,
  author       = {Lin Tan and
                  Wen{-}Feng Qi and
                  Hong Xu},
  title        = {Asymptotic analysis on the normalized k-error linear complexity of
                  binary sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {3},
  pages        = {313--321},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9519-8},
  doi          = {10.1007/S10623-011-9519-8},
  timestamp    = {Wed, 20 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/TanQX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Webster12,
  author       = {Jordan D. Webster},
  title        = {Using rational idempotents to show Turyn's bound is sharp},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {3},
  pages        = {357--365},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9526-9},
  doi          = {10.1007/S10623-011-9526-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Webster12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangZG12,
  author       = {Xiande Zhang and
                  Hui Zhang and
                  Gennian Ge},
  title        = {Optimal constant weight covering codes and nonuniform group divisible
                  3-designs with block size four},
  journal      = {Des. Codes Cryptogr.},
  volume       = {62},
  number       = {2},
  pages        = {143--160},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9499-8},
  doi          = {10.1007/S10623-011-9499-8},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangZG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics