Search dblp for Publications

export results for "toc:db/journals/dcc/dcc86.bht:"

 download as .bib file

@article{DBLP:journals/dcc/AlahmadiOS18,
  author       = {Adel Alahmadi and
                  Funda {\"{O}}zdemir and
                  Patrick Sol{\'{e}}},
  title        = {On self-dual double circulant codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1257--1265},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0393-x},
  doi          = {10.1007/S10623-017-0393-X},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlahmadiOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AlmeidaNP18,
  author       = {Paulo Jos{\'{e}} Fernandes Almeida and
                  Diego Napp and
                  Raquel Pinto},
  title        = {{MDS} 2D convolutional codes with optimal 1D horizontal projections},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {285--302},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0357-1},
  doi          = {10.1007/S10623-017-0357-1},
  timestamp    = {Tue, 23 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlmeidaNP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AntrobusG18,
  author       = {Jared Antrobus and
                  Heide Gluesing{-}Luerssen},
  title        = {Lexicodes over finite principal ideal rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2661--2676},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0469-2},
  doi          = {10.1007/S10623-018-0469-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AntrobusG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Arce-NazarioCGM18,
  author       = {Rafael A. Arce{-}Nazario and
                  Francis N. Castro and
                  Oscar E. Gonz{\'{a}}lez and
                  Luis A. Medina and
                  Ivelisse M. Rubio},
  title        = {New families of balanced symmetric functions and a generalization
                  of Cusick, Li and St{\unicode{462}}nic{\unicode{462}}'s conjecture},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {693--701},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0351-7},
  doi          = {10.1007/S10623-017-0351-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Arce-NazarioCGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AugotLR18,
  author       = {Daniel Augot and
                  Pierre Loidreau and
                  Gwezheneg Robert},
  title        = {Generalized Gabidulin codes over fields of any characteristic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1807--1848},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0425-6},
  doi          = {10.1007/S10623-017-0425-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AugotLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AvelliPS18,
  author       = {Diego Napp Avelli and
                  Raquel Pinto and
                  Vladimir Sidorenko},
  title        = {Concatenation of convolutional codes and rank metric codes for multi-shot
                  network coding},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {303--318},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0346-4},
  doi          = {10.1007/S10623-017-0346-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AvelliPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AydinCD18,
  author       = {Nuh Aydin and
                  Yasemin Cengellenmis and
                  Abdullah Dertli},
  title        = {On some constacyclic codes over {\textdollar}{\textdollar}{\textbackslash}mathbb
                  \{Z\}{\_}\{4\}{\textbackslash}left[ u{\textbackslash}right] /{\textbackslash}left{\textbackslash}langle
                  u\{2\}-1{\textbackslash}right{\textbackslash}rangle {\textdollar}{\textdollar}
                  , their {\textdollar}Z\({}_{\mbox{4}}\) images, and new codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1249--1255},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0392-y},
  doi          = {10.1007/S10623-017-0392-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AydinCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BagheriSP18,
  author       = {Khadijeh Bagheri and
                  Mohammad{-}Reza Sadeghi and
                  Daniel Panario},
  title        = {A non-commutative cryptosystem based on quaternion algebras},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2345--2377},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0451-4},
  doi          = {10.1007/S10623-017-0451-4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BagheriSP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BambergLL18,
  author       = {John Bamberg and
                  Jesse Lansdown and
                  Melissa Lee},
  title        = {On m-ovoids of regular near polygons},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {997--1006},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0373-1},
  doi          = {10.1007/S10623-017-0373-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BambergLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BandiTM18,
  author       = {Ramakrishna Bandi and
                  Alexandre Fotue Tabue and
                  Edgar Mart{\'{\i}}nez{-}Moro},
  title        = {On counting subring-submodules of free modules over finite commutative
                  frobenius rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2247--2254},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0446-1},
  doi          = {10.1007/S10623-017-0446-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BandiTM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BarrolletaV18,
  author       = {Roland D. Barrolleta and
                  Merc{\`{e}} Villanueva},
  title        = {Partial permutation decoding for binary linear and {\textdollar}{\textdollar}Z{\_}4{\textdollar}{\textdollar}
                  {Z} 4 -linear Hadamard codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {569--586},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0342-8},
  doi          = {10.1007/S10623-017-0342-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BarrolletaV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartoliMZ18,
  author       = {Daniele Bartoli and
                  Maria Montanucci and
                  Giovanni Zini},
  title        = {Multi point {AG} codes on the {GK} maximal curve},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {161--177},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0333-9},
  doi          = {10.1007/S10623-017-0333-9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BartoliMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartoliMZ18a,
  author       = {Daniele Bartoli and
                  Maria Montanucci and
                  Giovanni Zini},
  title        = {{AG} codes and {AG} quantum codes from the {GGS} curve},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2315--2344},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0450-5},
  doi          = {10.1007/S10623-017-0450-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BartoliMZ18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BartoliQ18,
  author       = {Daniele Bartoli and
                  Luciane Quoos},
  title        = {Permutation polynomials of the type g(x\({}^{\mbox{s}}\)) over {\(\mathbb{F}\)}\({}_{\mbox{q\({}^{\mbox{2n}}\)}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1589--1599},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0415-8},
  doi          = {10.1007/S10623-017-0415-8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BartoliQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeregLS18,
  author       = {Sergey Bereg and
                  Avi Levy and
                  Ivan Hal Sudborough},
  title        = {Constructing permutation arrays from groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1095--1111},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0381-1},
  doi          = {10.1007/S10623-017-0381-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeregLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BiLDLW18,
  author       = {Wenquan Bi and
                  Zheng Li and
                  Xiaoyang Dong and
                  Lu Li and
                  Xiaoyun Wang},
  title        = {Conditional cube attack on round-reduced River Keyak},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1295--1310},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0396-7},
  doi          = {10.1007/S10623-017-0396-7},
  timestamp    = {Thu, 16 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BiLDLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BibakKS18,
  author       = {Khodakhast Bibak and
                  Bruce M. Kapron and
                  Venkatesh Srinivasan},
  title        = {Unweighted linear congruences with distinct coordinates and the Varshamov-Tenengolts
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1893--1904},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0428-3},
  doi          = {10.1007/S10623-017-0428-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BibakKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BierbrauerBFMP18,
  author       = {J{\"{u}}rgen Bierbrauer and
                  Daniele Bartoli and
                  Giorgio Faina and
                  Stefano Marcugini and
                  Fernanda Pambianco},
  title        = {A family of semifields in odd characteristic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {611--621},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0345-5},
  doi          = {10.1007/S10623-017-0345-5},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BierbrauerBFMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlackburnGHPRSV18,
  author       = {Simon R. Blackburn and
                  Marcus Greferath and
                  Camilla Hollanti and
                  Mario{-}Osvin Pavcevic and
                  Joachim Rosenthal and
                  Leo Storme and
                  {\'{A}}ngeles V{\'{a}}zquez{-}Castro and
                  Alfred Wassermann},
  title        = {Preface to the special issue on network coding and designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {237--238},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0443-4},
  doi          = {10.1007/S10623-017-0443-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlackburnGHPRSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Blanco-ChaconBD18,
  author       = {Iv{\'{a}}n Blanco{-}Chac{\'{o}}n and
                  Eimear Byrne and
                  Iwan M. Duursma and
                  John Sheekey},
  title        = {Rank metric codes and zeta functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1767--1792},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0423-8},
  doi          = {10.1007/S10623-017-0423-8},
  timestamp    = {Thu, 17 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Blanco-ChaconBD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BorgesF18,
  author       = {Joaquim Borges and
                  Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba},
  title        = {A characterization of {\(\mathbb{Z}\)}\({}_{\mbox{2}}\){\(\mathbb{Z}\)}\({}_{\mbox{2}}\)[u]-linear
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1377--1389},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0401-1},
  doi          = {10.1007/S10623-017-0401-1},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BorgesF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BorgesFT18,
  author       = {Joaquim Borges and
                  Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba and
                  Roger Ten{-}Valls},
  title        = {Z\({}_{\mbox{2}}\)-double cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {463--479},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0334-8},
  doi          = {10.1007/S10623-017-0334-8},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BorgesFT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BricoutMPM18,
  author       = {R{\'{e}}mi Bricout and
                  Sean Murphy and
                  Kenneth G. Paterson and
                  Thyla van der Merwe},
  title        = {Analysing and exploiting the Mantin biases in {RC4}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {743--770},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0355-3},
  doi          = {10.1007/S10623-017-0355-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BricoutMPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletMTQ18,
  author       = {Claude Carlet and
                  Sihem Mesnager and
                  Chunming Tang and
                  Yanfeng Qi},
  title        = {Euclidean and Hermitian {LCD} {MDS} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2605--2618},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0463-8},
  doi          = {10.1007/S10623-018-0463-8},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletMTQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CatalanoFN18,
  author       = {Dario Catalano and
                  Dario Fiore and
                  Luca Nizzardo},
  title        = {Homomorphic signatures with sublinear public keys via asymmetric programmable
                  hash functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2197--2246},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0444-3},
  doi          = {10.1007/S10623-017-0444-3},
  timestamp    = {Thu, 06 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CatalanoFN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChangH18,
  author       = {Seunghwan Chang and
                  Jong Yoon Hyun},
  title        = {Linear codes from simplicial complexes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2167--2181},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0442-5},
  doi          = {10.1007/S10623-017-0442-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChangH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenJL18,
  author       = {Jingyuan Chen and
                  Lijun Ji and
                  Yun Li},
  title        = {Combinatorial constructions of optimal (m, n, 4, 2) optical orthogonal
                  signature pattern codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1499--1525},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0409-6},
  doi          = {10.1007/S10623-017-0409-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenJL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenL18,
  author       = {Bocong Chen and
                  Hongwei Liu},
  title        = {Constructions of cyclic constant dimension codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1267--1279},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0394-9},
  doi          = {10.1007/S10623-017-0394-9},
  timestamp    = {Tue, 23 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChoiDMW18,
  author       = {Seung Geol Choi and
                  Dana Dachman{-}Soled and
                  Tal Malkin and
                  Hoeteck Wee},
  title        = {Improved, black-box, non-malleable encryption from semantic security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {641--663},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0348-2},
  doi          = {10.1007/S10623-017-0348-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChoiDMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Clayton18,
  author       = {David Clayton},
  title        = {A note on almost difference sets in nonabelian groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1405--1410},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0403-z},
  doi          = {10.1007/S10623-017-0403-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Clayton18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Cogliati18,
  author       = {Beno{\^{\i}}t Cogliati},
  title        = {Tweaking a block cipher: multi-user beyond-birthday-bound security
                  in the standard model},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2747--2763},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0471-8},
  doi          = {10.1007/S10623-018-0471-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Cogliati18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CogliatiS18,
  author       = {Beno{\^{\i}}t Cogliati and
                  Yannick Seurin},
  title        = {Analysis of the single-permutation encrypted Davies-Meyer construction},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2703--2723},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0470-9},
  doi          = {10.1007/S10623-018-0470-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CogliatiS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ColbournLS18,
  author       = {Charles J. Colbourn and
                  Erin Lanus and
                  Kaushik Sarkar},
  title        = {Asymptotic and constructive methods for covering perfect hash families
                  and covering arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {907--937},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0369-x},
  doi          = {10.1007/S10623-017-0369-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ColbournLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CossidenteP18,
  author       = {Antonio Cossidente and
                  Francesco Pavese},
  title        = {On intriguing sets of finite symplectic spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1161--1174},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0387-8},
  doi          = {10.1007/S10623-017-0387-8},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CossidenteP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CostaFW18,
  author       = {Simone Costa and
                  Tao Feng and
                  Xiaomiao Wang},
  title        = {Frame difference families and resolvable balanced incomplete block
                  designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2725--2745},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0472-7},
  doi          = {10.1007/S10623-018-0472-7},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CostaFW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CruzGLR18,
  author       = {Javier de la Cruz and
                  Elisa Gorla and
                  Hiram H. L{\'{o}}pez and
                  Alberto Ravagnani},
  title        = {Weight distribution of rank-metric codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {1--16},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-016-0325-1},
  doi          = {10.1007/S10623-016-0325-1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CruzGLR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CruzW18,
  author       = {Javier de la Cruz and
                  Wolfgang Willems},
  title        = {On group codes with complementary duals},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {2065--2073},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0437-2},
  doi          = {10.1007/S10623-017-0437-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CruzW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DavisO18,
  author       = {James A. Davis and
                  Oktay {\"{O}}lmez},
  title        = {A framework for constructing partial geometric difference sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1367--1375},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0400-2},
  doi          = {10.1007/S10623-017-0400-2},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DavisO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dempwolff18,
  author       = {Ulrich Dempwolff},
  title        = {{CCZ} equivalence of power functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {665--692},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0350-8},
  doi          = {10.1007/S10623-017-0350-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dempwolff18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DerlerS18,
  author       = {David Derler and
                  Daniel Slamanig},
  title        = {Practical witness encryption for algebraic languages or how to encrypt
                  under Groth-Sahai proofs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2525--2547},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0460-y},
  doi          = {10.1007/S10623-018-0460-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DerlerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ding18,
  author       = {Cunsheng Ding},
  title        = {Infinite families of 3-designs from a type of five-weight code},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {703--719},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0352-6},
  doi          = {10.1007/S10623-017-0352-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ding18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DingGZZZ18,
  author       = {Baokun Ding and
                  Gennian Ge and
                  Jun Zhang and
                  Tao Zhang and
                  Yiwei Zhang},
  title        = {New constructions of {MDS} symbol-pair codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {841--859},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0365-1},
  doi          = {10.1007/S10623-017-0365-1},
  timestamp    = {Thu, 13 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DingGZZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DinhSPS18,
  author       = {Hai Q. Dinh and
                  Abhay Kumar Singh and
                  Sukhamoy Pattanayak and
                  Songsak Sriboonchitta},
  title        = {Cyclic {DNA} codes over the ring {\(\mathbb{F}\)}\({}_{\mbox{2}}\)+u{\(\mathbb{F}\)}\({}_{\mbox{2}}\)+v{\(\mathbb{F}\)}\({}_{\mbox{2}}\)+uv{\(\mathbb{F}\)}\({}_{\mbox{2}}\)+v\({}^{\mbox{2}}\){\(\mathbb{F}\)}\({}_{\mbox{2}}\)+uv\({}^{\mbox{2}}\){\(\mathbb{F}\)}\({}_{\mbox{2}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1451--1467},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0405-x},
  doi          = {10.1007/S10623-017-0405-X},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DinhSPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DonatiD18,
  author       = {Giorgio Donati and
                  Nicola Durante},
  title        = {A generalization of the normal rational curve in PG(d, q\({}^{\mbox{n}}\))
                  and its associated non-linear {MRD} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1175--1184},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0388-7},
  doi          = {10.1007/S10623-017-0388-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DonatiD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DoughertyGTT18,
  author       = {Steven T. Dougherty and
                  Joe Gildea and
                  Rhian Taylor and
                  Alexander Tylyshchak},
  title        = {Group rings, G-codes and constructions of self-dual and formally self-dual
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {2115--2138},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0440-7},
  doi          = {10.1007/S10623-017-0440-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DoughertyGTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DrapalV18,
  author       = {Ales Dr{\'{a}}pal and
                  Viliam Valent},
  title        = {Few associative triples, isotopisms and groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {555--568},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0341-9},
  doi          = {10.1007/S10623-017-0341-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DrapalV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DucasW18,
  author       = {L{\'{e}}o Ducas and
                  Wessel P. J. van Woerden},
  title        = {The closest vector problem in tensored root lattices of type {A} and
                  in their duals},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {137--150},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0332-x},
  doi          = {10.1007/S10623-017-0332-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DucasW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EmuraHNOMY18,
  author       = {Keita Emura and
                  Goichiro Hanaoka and
                  Koji Nuida and
                  Go Ohtake and
                  Takahiro Matsuda and
                  Shota Yamada},
  title        = {Chosen ciphertext secure keyed-homomorphic public-key cryptosystems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1623--1683},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0417-6},
  doi          = {10.1007/S10623-017-0417-6},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EmuraHNOMY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Fan18,
  author       = {Cuiling Fan},
  title        = {The linear complexity of a class of binary sequences with optimal
                  autocorrelation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2441--2450},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0456-7},
  doi          = {10.1007/S10623-018-0456-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Fan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FanX18,
  author       = {Yun Fan and
                  Bangteng Xu},
  title        = {Fourier transforms and bent functions on finite groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {2091--2113},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0439-0},
  doi          = {10.1007/S10623-017-0439-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FanX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FarranGH18,
  author       = {Jos{\'{e}} Ignacio Farr{\'{a}}n and
                  Pedro A. Garc{\'{\i}}a{-}S{\'{a}}nchez and
                  Benjam{\'{\i}}n A. Heredia},
  title        = {On the second Feng-Rao distance of Algebraic Geometry codes related
                  to Arf semigroups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2893--2916},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0483-4},
  doi          = {10.1007/S10623-018-0483-4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FarranGH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FarranGHL18,
  author       = {Jos{\'{e}} Ignacio Farr{\'{a}}n and
                  Pedro A. Garc{\'{\i}}a{-}S{\'{a}}nchez and
                  Benjam{\'{\i}}n A. Heredia and
                  Micah J. Leamer},
  title        = {The second Feng-Rao number for codes coming from telescopic semigroups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1849--1864},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0426-5},
  doi          = {10.1007/S10623-017-0426-5},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FarranGHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FaugereW18,
  author       = {Jean{-}Charles Faug{\`{e}}re and
                  Alexandre Wallet},
  title        = {The point decomposition problem over hyperelliptic curves - Toward
                  efficient computation of discrete logarithms in even characteristic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2279--2314},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0449-y},
  doi          = {10.1007/S10623-017-0449-Y},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FaugereW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FeltzC18,
  author       = {Mich{\`{e}}le Feltz and
                  Cas Cremers},
  title        = {Strengthening the security of authenticated key exchange against bad
                  randomness},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {481--516},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0337-5},
  doi          = {10.1007/S10623-017-0337-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FeltzC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Fernando18,
  author       = {Neranga Fernando},
  title        = {Self-reciprocal polynomials and coterm polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1707--1726},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0419-4},
  doi          = {10.1007/S10623-017-0419-4},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Fernando18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GaboritOK18,
  author       = {Philippe Gaborit and
                  Ayoub Otmani and
                  Herv{\'{e}} Tal{\'{e}} Kalachi},
  title        = {Polynomial-time key recovery attack on the Faure-Loidreau scheme based
                  on Gabidulin codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1391--1403},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0402-0},
  doi          = {10.1007/S10623-017-0402-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GaboritOK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GangopadhyayMS18,
  author       = {Sugata Gangopadhyay and
                  Bimal Mandal and
                  Pantelimon Stanica},
  title        = {Gowers U\({}_{\mbox{3}}\) norm of some classes of bent Boolean functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1131--1148},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0383-z},
  doi          = {10.1007/S10623-017-0383-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GangopadhyayMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GavrilyukMP18,
  author       = {Alexander L. Gavrilyuk and
                  Ilia Matkin and
                  Tim Penttila},
  title        = {Derivation of Cameron-Liebler line classes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {231--236},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0338-4},
  doi          = {10.1007/S10623-017-0338-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GavrilyukMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GeSFWS18,
  author       = {Chunpeng Ge and
                  Willy Susilo and
                  Liming Fang and
                  Jiandong Wang and
                  Yunqing Shi},
  title        = {A CCA-secure key-policy attribute-based proxy re-encryption in the
                  adaptive corruption model for dropbox data sharing system},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2587--2603},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0462-9},
  doi          = {10.1007/S10623-018-0462-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GeSFWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GnilkeGP18,
  author       = {Oliver Wilhelm Gnilke and
                  Marcus Greferath and
                  Mario{-}Osvin Pavcevic},
  title        = {Mosaics of combinatorial designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {85--95},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0328-6},
  doi          = {10.1007/S10623-017-0328-6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GnilkeGP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuendaJG18,
  author       = {Kenza Guenda and
                  Somphong Jitman and
                  T. Aaron Gulliver},
  title        = {Constructions of good entanglement-assisted quantum error correcting
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {121--136},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0330-z},
  doi          = {10.1007/S10623-017-0330-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuendaJG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HanLL18,
  author       = {Shuai Han and
                  Shengli Liu and
                  Lin Lyu},
  title        = {Super-strong {RKA} secure MAC, {PKE} and {SE} from tag-based hash
                  proof system},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1411--1449},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0404-y},
  doi          = {10.1007/S10623-017-0404-Y},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HanLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HanLQG18,
  author       = {Shuai Han and
                  Shengli Liu and
                  Baodong Qin and
                  Dawu Gu},
  title        = {Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {517--554},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0339-3},
  doi          = {10.1007/S10623-017-0339-3},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HanLQG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Harada18,
  author       = {Masaaki Harada},
  title        = {Binary extremal self-dual codes of length 60 and related codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1085--1094},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0380-2},
  doi          = {10.1007/S10623-017-0380-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Harada18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HeroldKM18,
  author       = {Gottfried Herold and
                  Elena Kirshanova and
                  Alexander May},
  title        = {On the asymptotic complexity of solving {LWE}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {55--83},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-016-0326-0},
  doi          = {10.1007/S10623-016-0326-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HeroldKM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HodajKKT18,
  author       = {Jezerca Hodaj and
                  Melissa S. Keranen and
                  Donald L. Kreher and
                  Leah Tollefson},
  title        = {Some new Kirkman signal sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2183--2195},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0445-2},
  doi          = {10.1007/S10623-017-0445-2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HodajKKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Horlemann-Trautmann18,
  author       = {Anna{-}Lena Horlemann{-}Trautmann and
                  Kyle Marshall and
                  Joachim Rosenthal},
  title        = {Extension of Overbeck's attack for Gabidulin-based cryptosystems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {319--340},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0343-7},
  doi          = {10.1007/S10623-017-0343-7},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Horlemann-Trautmann18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Horlemann-Trautmann18a,
  author       = {Anna{-}Lena Horlemann{-}Trautmann},
  title        = {Message encoding and retrieval for spread and cyclic orbit codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {365--386},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0377-x},
  doi          = {10.1007/S10623-017-0377-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Horlemann-Trautmann18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Hou18,
  author       = {Xiang{-}Dong Hou},
  title        = {Complexities of normal bases constructed from Gauss periods},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {893--905},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0368-y},
  doi          = {10.1007/S10623-017-0368-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Hou18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuY18,
  author       = {Chuangqiang Hu and
                  Shudi Yang},
  title        = {Multi-point codes over Kummer extensions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {211--230},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0335-7},
  doi          = {10.1007/S10623-017-0335-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuiR18,
  author       = {Alice M. W. Hui and
                  Bernardo Gabriel Rodrigues},
  title        = {Switched graphs of some strongly regular graphs related to the symplectic
                  graph},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {179--194},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0340-x},
  doi          = {10.1007/S10623-017-0340-X},
  timestamp    = {Fri, 16 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuiR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/IhringerM18,
  author       = {Ferdinand Ihringer and
                  Karen Meagher},
  title        = {Mikl{\'{o}}s-Manickam-Singhi conjectures on partial geometries},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1311--1327},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0397-6},
  doi          = {10.1007/S10623-017-0397-6},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/IhringerM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ji18,
  author       = {Lijun Ji},
  title        = {Group divisible designs with large block sizes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2255--2260},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0448-z},
  doi          = {10.1007/S10623-017-0448-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ji18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JohnsenV18,
  author       = {Trygve Johnsen and
                  Hugues Verdure},
  title        = {Flags of almost affine codes and the two-party wire-tap channel of
                  type {II}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {2075--2090},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0438-1},
  doi          = {10.1007/S10623-017-0438-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JohnsenV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JungnickelT18,
  author       = {Dieter Jungnickel and
                  Vladimir D. Tonchev},
  title        = {On Bonisoli's theorem and the block codes of Steiner triple systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {449--462},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0406-9},
  doi          = {10.1007/S10623-017-0406-9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JungnickelT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JungnickelZT18,
  author       = {Dieter Jungnickel and
                  Yue Zhou and
                  Vladimir D. Tonchev},
  title        = {Extension sets, affine designs, and Hamada's conjecture},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {587--610},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0344-6},
  doi          = {10.1007/S10623-017-0344-6},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JungnickelZT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KharaghaniS18,
  author       = {Hadi Kharaghani and
                  Sho Suda},
  title        = {Unbiased orthogonal designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1573--1588},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0414-9},
  doi          = {10.1007/S10623-017-0414-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KharaghaniS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KiermaierKW18,
  author       = {Michael Kiermaier and
                  Sascha Kurz and
                  Alfred Wassermann},
  title        = {The order of the automorphism group of a binary q -analog of the Fano
                  plane is at most two},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {239--250},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0360-6},
  doi          = {10.1007/S10623-017-0360-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KiermaierKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KiermaierLW18,
  author       = {Michael Kiermaier and
                  Reinhard Laue and
                  Alfred Wassermann},
  title        = {A new series of large sets of subspace designs over the binary field},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {251--268},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0349-1},
  doi          = {10.1007/S10623-017-0349-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KiermaierLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimSGA18,
  author       = {Jongkil Kim and
                  Willy Susilo and
                  Fuchun Guo and
                  Man Ho Au},
  title        = {Functional encryption for computational hiding in prime order groups
                  via pair encodings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {97--120},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0327-7},
  doi          = {10.1007/S10623-017-0327-7},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KimSGA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KogaMS18,
  author       = {Yoshitaka Koga and
                  Tatsuya Maruta and
                  Keisuke Shiromoto},
  title        = {On critical exponents of Dowling matroids},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1947--1962},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0431-8},
  doi          = {10.1007/S10623-017-0431-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KogaMS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kositwattanarerk18,
  author       = {Wittawat Kositwattanarerk},
  title        = {Pseudocodeword-free criterion for codes with cycle-free Tanner graph},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2791--2805},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0476-3},
  doi          = {10.1007/S10623-018-0476-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kositwattanarerk18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LanCW18,
  author       = {Liantao Lan and
                  Yanxun Chang and
                  Lidong Wang},
  title        = {Constructions of cyclic quaternary constant-weight codes of weight
                  three and distance four},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1063--1083},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0379-8},
  doi          = {10.1007/S10623-017-0379-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LanCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Lee18,
  author       = {Jooyoung Lee},
  title        = {Key alternating ciphers based on involutions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {955--988},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0371-3},
  doi          = {10.1007/S10623-017-0371-3},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Lee18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeCL18,
  author       = {Chong{-}Dao Lee and
                  Yaotsu Chang and
                  Chia{-}an Liu},
  title        = {A construction of group divisible designs with block sizes 3 to 7},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1281--1293},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0395-8},
  doi          = {10.1007/S10623-017-0395-8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeLMM18,
  author       = {Jooyoung Lee and
                  Atul Luykx and
                  Bart Mennink and
                  Kazuhiko Minematsu},
  title        = {Connecting tweakable and multi-key blockcipher security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {623--640},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0347-3},
  doi          = {10.1007/S10623-017-0347-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeLMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeP18,
  author       = {Kwangsu Lee and
                  Seunghwan Park},
  title        = {Revocable hierarchical identity-based encryption with shorter private
                  keys and update keys},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2407--2440},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0453-2},
  doi          = {10.1007/S10623-017-0453-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Li18,
  author       = {Chengju Li},
  title        = {Hermitian {LCD} codes from cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2261--2278},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0447-0},
  doi          = {10.1007/S10623-017-0447-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Li18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiLDC18,
  author       = {Mingchao Li and
                  Miao Liang and
                  Beiliang Du and
                  Jingyuan Chen},
  title        = {A construction for optimal c-splitting authentication and secrecy
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1739--1755},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0421-x},
  doi          = {10.1007/S10623-017-0421-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiLDC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiQW18,
  author       = {Kangquan Li and
                  Longjiang Qu and
                  Qiang Wang},
  title        = {New constructions of permutation polynomials of the form x\({}^{\mbox{r}}\)
                  h(x \({}^{\mbox{q - 1}}\)) over {\(\mathbb{F}\)}\({}_{\mbox{q\({}^{\mbox{2}}\)}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2379--2405},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0452-3},
  doi          = {10.1007/S10623-017-0452-3},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiQW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiY18,
  author       = {Fengwei Li and
                  Qin Yue},
  title        = {The primitive idempotents and weight distributions of irreducible
                  constacyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {771--784},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0356-2},
  doi          = {10.1007/S10623-017-0356-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiZF18,
  author       = {Jin Li and
                  Aixian Zhang and
                  Keqin Feng},
  title        = {Linear codes over F\({}_{\mbox{q}}\)[x]/(x\({}^{\mbox{2}}\)) and GR(p\({}^{\mbox{2}}\),
                  m) reaching the Griesmer bound},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2837--2855},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0479-0},
  doi          = {10.1007/S10623-018-0479-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiZF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiangZ18,
  author       = {Hongxue Liang and
                  Shenglin Zhou},
  title        = {Flag-transitive point-primitive automorphism groups of non-symmetric
                  2-(v, k, 3) designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1757--1766},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0422-9},
  doi          = {10.1007/S10623-017-0422-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiangZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiebholdNV18,
  author       = {Dirk Liebhold and
                  Gabriele Nebe and
                  {\'{A}}ngeles V{\'{a}}zquez{-}Castro},
  title        = {Network coding with flags},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {269--284},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0361-5},
  doi          = {10.1007/S10623-017-0361-5},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiebholdNV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LimniotisK18,
  author       = {Konstantinos Limniotis and
                  Nicholas Kolokotronis},
  title        = {Boolean functions with maximum algebraic immunity: further extensions
                  of the Carlet-Feng construction},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1685--1706},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0418-5},
  doi          = {10.1007/S10623-017-0418-5},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LimniotisK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LinPLZ18,
  author       = {Zhiqiang Lin and
                  Dingyi Pei and
                  Dongdai Lin and
                  Xiaolei Zhang},
  title        = {Fast construction of binary ring FCSRs for hardware stream ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {939--953},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0370-4},
  doi          = {10.1007/S10623-017-0370-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LinPLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LinW18,
  author       = {Li Lin and
                  Wenling Wu},
  title        = {Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256
                  and Kalyna-256/512},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {721--741},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0353-5},
  doi          = {10.1007/S10623-017-0353-5},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LinW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuJKW18,
  author       = {Jia Liu and
                  Tibor Jager and
                  Saqib A. Kakvi and
                  Bogdan Warinschi},
  title        = {How to build time-lock encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2549--2586},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0461-x},
  doi          = {10.1007/S10623-018-0461-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuJKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuKC18,
  author       = {Weihua Liu and
                  Andrew Klapper and
                  Zhixiong Chen},
  title        = {Solving the {FCSR} synthesis problem for multi-sequences by lattice
                  basis reduction},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1023--1038},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0375-z},
  doi          = {10.1007/S10623-017-0375-Z},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuKC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuRL18,
  author       = {Yunwen Liu and
                  Vincent Rijmen and
                  Gregor Leander},
  title        = {Nonlinear diffusion layers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2469--2484},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0458-5},
  doi          = {10.1007/S10623-018-0458-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuRL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LuNC18,
  author       = {Xiaojuan Lu and
                  Xiaolei Niu and
                  Haitao Cao},
  title        = {Some results on generalized strong external difference families},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2857--2868},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0481-6},
  doi          = {10.1007/S10623-018-0481-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LuNC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Merai18,
  author       = {L{\'{a}}szl{\'{o}} M{\'{e}}rai},
  title        = {On the elliptic curve endomorphism generator},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1113--1129},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0382-0},
  doi          = {10.1007/S10623-017-0382-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Merai18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MesnagerOS18,
  author       = {Sihem Mesnager and
                  Ferruh {\"{O}}zbudak and
                  Ahmet Sinak},
  title        = {On the p-ary (cubic) bent and plateaued (vectorial) functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1865--1892},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0427-4},
  doi          = {10.1007/S10623-017-0427-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MesnagerOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MogilnykhS18,
  author       = {Ivan Yu. Mogilnykh and
                  Faina I. Solov'eva},
  title        = {On explicit minimum weight bases for extended cyclic codes related
                  to Gold functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2619--2627},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0464-7},
  doi          = {10.1007/S10623-018-0464-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MogilnykhS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MoralesT18,
  author       = {John Vincent S. Morales and
                  Hajime Tanaka},
  title        = {An Assmus-Mattson theorem for codes over commutative association schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1039--1062},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0376-y},
  doi          = {10.1007/S10623-017-0376-Y},
  timestamp    = {Tue, 12 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MoralesT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MoreiraFK18,
  author       = {Jos{\'{e}} Moreira and
                  Marcel Fern{\'{a}}ndez and
                  Grigory Kabatiansky},
  title        = {Constructions of almost secure frameproof codes with applications
                  to fingerprinting schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {785--802},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0359-z},
  doi          = {10.1007/S10623-017-0359-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MoreiraFK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NeriHRR18,
  author       = {Alessandro Neri and
                  Anna{-}Lena Horlemann{-}Trautmann and
                  Tovohery Randrianarisoa and
                  Joachim Rosenthal},
  title        = {On the genericity of maximum rank distance and Gabidulin codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {341--363},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0354-4},
  doi          = {10.1007/S10623-017-0354-4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/NeriHRR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Olmez18,
  author       = {Oktay Olmez},
  title        = {A link between combinatorial designs and three-weight linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {817--833},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0363-3},
  doi          = {10.1007/S10623-017-0363-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Olmez18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OrhonH18,
  author       = {Neriman Gamze Orhon and
                  H{\"{u}}seyin Hisil},
  title        = {Speeding up Huff form of elliptic curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2807--2823},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0475-4},
  doi          = {10.1007/S10623-018-0475-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OrhonH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OtmaniKN18,
  author       = {Ayoub Otmani and
                  Herv{\'{e}} Tal{\'{e}} Kalachi and
                  S{\'{e}}lestin Ndjeya},
  title        = {Improved cryptanalysis of rank metric schemes based on Gabidulin codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1983--1996},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0434-5},
  doi          = {10.1007/S10623-017-0434-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OtmaniKN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PaulR18,
  author       = {Goutam Paul and
                  Souvik Ray},
  title        = {On data complexity of distinguishing attacks versus message recovery
                  attacks on stream ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1211--1247},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0391-z},
  doi          = {10.1007/S10623-017-0391-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/PaulR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PineroS18,
  author       = {Fernando L. Pi{\~{n}}ero and
                  Prasant Singh},
  title        = {A note on the weight spectrum of the Schubert code C\({}_{\mbox{{\(\alpha\)}}}\)(2,
                  m)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2825--2836},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0477-2},
  doi          = {10.1007/S10623-018-0477-2},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PineroS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Polak18,
  author       = {Sven C. Polak},
  title        = {New nonbinary code bounds based on divisibility arguments},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {861--874},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0366-0},
  doi          = {10.1007/S10623-017-0366-0},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Polak18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/QianZ18,
  author       = {Jianfa Qian and
                  Lina Zhang},
  title        = {On {MDS} linear complementary dual codes and entanglement-assisted
                  quantum codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1565--1572},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0413-x},
  doi          = {10.1007/S10623-017-0413-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/QianZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ravagnani18,
  author       = {Alberto Ravagnani},
  title        = {Duality of codes supported on regular lattices, with an application
                  to enumerative combinatorics},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {2035--2063},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0436-3},
  doi          = {10.1007/S10623-017-0436-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ravagnani18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RavivYM18,
  author       = {Netanel Raviv and
                  Eitan Yaakobi and
                  Muriel M{\'{e}}dard},
  title        = {Coding for locality in reconstructing permutations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {387--418},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0378-9},
  doi          = {10.1007/S10623-017-0378-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RavivYM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RifaS18,
  author       = {Josep Rif{\`{a}} and
                  Emilio Su{\'{a}}rez{-}Canedo},
  title        = {Hadamard full propelinear codes of type Q; rank and kernel},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1905--1921},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0429-2},
  doi          = {10.1007/S10623-017-0429-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RifaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ryabko18,
  author       = {Boris Ryabko},
  title        = {Properties of two Shannon's ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {989--995},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0372-2},
  doi          = {10.1007/S10623-017-0372-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ryabko18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Schmidt18,
  author       = {Kai{-}Uwe Schmidt},
  title        = {Hermitian rank distance codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1469--1481},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0407-8},
  doi          = {10.1007/S10623-017-0407-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Schmidt18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SchmidtZ18,
  author       = {Kai{-}Uwe Schmidt and
                  Yue Zhou},
  title        = {On the number of inequivalent Gabidulin codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1973--1982},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0433-6},
  doi          = {10.1007/S10623-017-0433-6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SchmidtZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShangguanMG18,
  author       = {Chong Shangguan and
                  Jingxue Ma and
                  Gennian Ge},
  title        = {New upper bounds for parent-identifying codes and traceability codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1727--1737},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0420-y},
  doi          = {10.1007/S10623-017-0420-Y},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShangguanMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiQS18,
  author       = {Minjia Shi and
                  Liqin Qian and
                  Patrick Sol{\'{e}}},
  title        = {On self-dual negacirculant codes of index two and four},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2485--2494},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0455-0},
  doi          = {10.1007/S10623-017-0455-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiQS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShiSAS18,
  author       = {Minjia Shi and
                  Zahra Sepasdar and
                  Adel Alahmadi and
                  Patrick Sol{\'{e}}},
  title        = {On two-weight Z\({}_{\mbox{2\({}^{\mbox{k}}\)}}\) -codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1201--1209},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0390-0},
  doi          = {10.1007/S10623-017-0390-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShiSAS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShuaiL18,
  author       = {Shuai Li and
                  Li Miao},
  title        = {A method to calculate differential uniformity for permutations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1553--1563},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0412-y},
  doi          = {10.1007/S10623-017-0412-Y},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ShuaiL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SilbersteinZ18,
  author       = {Natalia Silberstein and
                  Alexander Zeh},
  title        = {Anticode-based locally repairable codes with high availability},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {2},
  pages        = {419--445},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0358-0},
  doi          = {10.1007/S10623-017-0358-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SilbersteinZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/StinsonW18,
  author       = {Douglas R. Stinson and
                  Ruizhong Wei},
  title        = {Combinatorial repairability for threshold schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {195--210},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0336-6},
  doi          = {10.1007/S10623-017-0336-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/StinsonW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SuYF18,
  author       = {Wei Su and
                  Yang Yang and
                  Cuiling Fan},
  title        = {New optimal binary sequences with period 4p via interleaving Ding-Helleseth-Lam
                  sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1329--1338},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0398-5},
  doi          = {10.1007/S10623-017-0398-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SuYF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SudhaS18,
  author       = {Irrinki Gnana Sudha and
                  R. S. Selvaraj},
  title        = {Codes with a pomset metric and constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {875--892},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0367-z},
  doi          = {10.1007/S10623-017-0367-Z},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SudhaS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SunCW18,
  author       = {Ling Sun and
                  Huaifeng Chen and
                  Meiqin Wang},
  title        = {Zero-correlation attacks: statistical models independent of the number
                  of approximations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1923--1945},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0430-9},
  doi          = {10.1007/S10623-017-0430-9},
  timestamp    = {Tue, 07 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/SunCW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Tan18,
  author       = {Ming Ming Tan},
  title        = {Group invariant weighing matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2677--2702},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0466-5},
  doi          = {10.1007/S10623-018-0466-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Tan18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TianLWY18,
  author       = {Song Tian and
                  Bao Li and
                  Kunpeng Wang and
                  Wei Yu},
  title        = {Cover attacks for elliptic curves with cofactor two},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2451--2468},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0457-6},
  doi          = {10.1007/S10623-018-0457-6},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TianLWY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Torres-JimenezI18,
  author       = {Jose Torres{-}Jimenez and
                  Idelfonso Izquierdo{-}Marquez},
  title        = {Covering arrays of strength three from extended permutation vectors},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2629--2643},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0465-6},
  doi          = {10.1007/S10623-018-0465-6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Torres-JimenezI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Trung18,
  author       = {Tran van Trung},
  title        = {A recursive construction for simple t-designs using resolutions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1185--1200},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0389-6},
  doi          = {10.1007/S10623-017-0389-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Trung18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Vega18,
  author       = {Gerardo Vega},
  title        = {A correction on the determination of the weight enumerator polynomial
                  of some irreducible cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {835--840},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0364-2},
  doi          = {10.1007/S10623-017-0364-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Vega18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangHL18,
  author       = {SenPeng Wang and
                  Bin Hu and
                  Yan Liu},
  title        = {The autocorrelation properties of single cycle polynomial T-functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1527--1540},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0410-0},
  doi          = {10.1007/S10623-017-0410-0},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangJ18,
  author       = {Qian Wang and
                  Chenhui Jin},
  title        = {Upper bound of the length of truncated impossible differentials for
                  {AES}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1541--1552},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0411-z},
  doi          = {10.1007/S10623-017-0411-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangTP18,
  author       = {Qichun Wang and
                  Chik How Tan and
                  Theo Fanuela Prabowo},
  title        = {On the covering radius of the third order Reed-Muller code RM(3, 7)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {151--159},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0329-5},
  doi          = {10.1007/S10623-017-0329-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangTP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WatanabeS18,
  author       = {Yohei Watanabe and
                  Junji Shikata},
  title        = {Timed-release computational secret sharing and threshold encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {1},
  pages        = {17--54},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-016-0324-2},
  doi          = {10.1007/S10623-016-0324-2},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WatanabeS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WenLH18,
  author       = {Yunhua Wen and
                  Shengli Liu and
                  Shuai Han},
  title        = {Reusable fuzzy extractor from the decisional Diffie-Hellman assumption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2495--2512},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0459-4},
  doi          = {10.1007/S10623-018-0459-4},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WenLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WenYFF18,
  author       = {Jiejing Wen and
                  Minghui Yang and
                  Fang{-}Wei Fu and
                  Keqin Feng},
  title        = {Cyclotomic construction of strong external difference families in
                  finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1149--1159},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0384-y},
  doi          = {10.1007/S10623-017-0384-Y},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WenYFF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/X18,
  title        = {Editor's note},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {447},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0467-4},
  doi          = {10.1007/S10623-018-0467-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/X18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XiaoZLH18,
  author       = {Zibi Xiao and
                  Xiangyong Zeng and
                  Chunlei Li and
                  Tor Helleseth},
  title        = {New generalized cyclotomic binary sequences of period p\({}^{\mbox{2}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {7},
  pages        = {1483--1497},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0408-7},
  doi          = {10.1007/S10623-017-0408-7},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/XiaoZLH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XiongYY18,
  author       = {Maosheng Xiong and
                  Haode Yan and
                  Pingzhi Yuan},
  title        = {On a conjecture of differentially 8-uniform power functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1601--1621},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0416-7},
  doi          = {10.1007/S10623-017-0416-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XiongYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuLZH18,
  author       = {Xiaofang Xu and
                  Chunlei Li and
                  Xiangyong Zeng and
                  Tor Helleseth},
  title        = {Constructions of complete permutation polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2869--2892},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0480-7},
  doi          = {10.1007/S10623-018-0480-7},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/XuLZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XuSHHP18,
  author       = {Jun Xu and
                  Santanu Sarkar and
                  Lei Hu and
                  Zhangjie Huang and
                  Liqiang Peng},
  title        = {Solving a class of modular polynomial equations and its relation to
                  modular inversion hidden number problem and inversive congruential
                  generator},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1997--2033},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0435-4},
  doi          = {10.1007/S10623-017-0435-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XuSHHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YoshidaO18,
  author       = {Maki Yoshida and
                  Satoshi Obana},
  title        = {On the (in)efficiency of non-interactive secure multiparty computation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1793--1805},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0424-7},
  doi          = {10.1007/S10623-017-0424-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YoshidaO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhanZ18,
  author       = {Xiaoqin Zhan and
                  Shenglin Zhou},
  title        = {Non-symmetric 2-designs admitting a two-dimensional projective linear
                  group},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2765--2773},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0474-5},
  doi          = {10.1007/S10623-018-0474-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhanZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangCGGM18,
  author       = {Jie Zhang and
                  Jie Chen and
                  Junqing Gong and
                  Aijun Ge and
                  Chuangui Ma},
  title        = {Leakage-resilient attribute based encryption in prime-order groups
                  via predicate encodings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {6},
  pages        = {1339--1366},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0399-4},
  doi          = {10.1007/S10623-017-0399-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangCGGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangG18,
  author       = {Tao Zhang and
                  Gennian Ge},
  title        = {Combinatorial constructions of packings in Grassmannian spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {4},
  pages        = {803--815},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0362-4},
  doi          = {10.1007/S10623-017-0362-4},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangYS18,
  author       = {Hui Zhang and
                  Eitan Yaakobi and
                  Natalia Silberstein},
  title        = {Multiset combinatorial batch codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2645--2660},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0468-3},
  doi          = {10.1007/S10623-018-0468-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangYS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangZ18,
  author       = {Zhilin Zhang and
                  Shenglin Zhou},
  title        = {Flag-transitive point-quasiprimitive 2-(v, k, 2) designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {9},
  pages        = {1963--1971},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0432-7},
  doi          = {10.1007/S10623-017-0432-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoTQ18,
  author       = {Xiao{-}Xin Zhao and
                  Tian Tian and
                  Wen{-}Feng Qi},
  title        = {A ring-like cascade connection and a class of NFSRs with the same
                  cycle structures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {12},
  pages        = {2775--2790},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-018-0473-6},
  doi          = {10.1007/S10623-018-0473-6},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoTQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhengB18,
  author       = {Dabin Zheng and
                  Jingjun Bao},
  title        = {Four classes of linear codes from cyclotomic cosets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {5},
  pages        = {1007--1022},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0374-0},
  doi          = {10.1007/S10623-017-0374-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhengB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Zhou18,
  author       = {Zhengchun Zhou},
  title        = {Three-weight ternary linear codes from a family of cyclic difference
                  sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {11},
  pages        = {2513--2523},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0454-1},
  doi          = {10.1007/S10623-017-0454-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Zhou18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhuSL18,
  author       = {Shixin Zhu and
                  Zhonghua Sun and
                  Ping Li},
  title        = {A class of negacyclic {BCH} codes and its application to quantum codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {10},
  pages        = {2139--2165},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0441-6},
  doi          = {10.1007/S10623-017-0441-6},
  timestamp    = {Wed, 11 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhuSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics