callback( { "result":{ "query":":facetid:toc:\"db/journals/dcc/dcc30.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"64.62" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"19", "@dc":"19", "@oc":"19", "@id":"43446443", "text":":facetid:toc:db/journals/dcc/dcc30.bht" } }, "hits":{ "@total":"19", "@computed":"19", "@sent":"19", "@first":"0", "hit":[{ "@score":"1", "@id":"6111606", "info":{"authors":{"author":[{"@pid":"02/6168","text":"Maria Axenovich"},{"@pid":"99/497","text":"Zoltán Füredi"}]},"title":"Exact Bounds on the Sizes of Covering Codes.","venue":"Des. Codes Cryptogr.","volume":"30","number":"1","pages":"21-38","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/AxenovichF03","doi":"10.1023/A:1024703225079","ee":"https://doi.org/10.1023/A:1024703225079","url":"https://dblp.org/rec/journals/dcc/AxenovichF03"}, "url":"URL#6111606" }, { "@score":"1", "@id":"6111613", "info":{"authors":{"author":{"@pid":"96/1364","text":"Antonia W. Bluher"}},"title":"On x6 + x + a in Characteristic Three.","venue":"Des. Codes Cryptogr.","volume":"30","number":"1","pages":"85-95","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/Bluher03","doi":"10.1023/A:1024711426896","ee":"https://doi.org/10.1023/A:1024711426896","url":"https://dblp.org/rec/journals/dcc/Bluher03"}, "url":"URL#6111613" }, { "@score":"1", "@id":"6111614", "info":{"authors":{"author":[{"@pid":"57/4596","text":"Iliya Bouyukliev"},{"@pid":"01/878","text":"Juriaan Simonis"}]},"title":"Some New Results on Optimal Codes Over F5.","venue":"Des. Codes Cryptogr.","volume":"30","number":"1","pages":"97-111","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/BouyuklievS03","doi":"10.1023/A:1024763410967","ee":"https://doi.org/10.1023/A:1024763410967","url":"https://dblp.org/rec/journals/dcc/BouyuklievS03"}, "url":"URL#6111614" }, { "@score":"1", "@id":"6111616", "info":{"authors":{"author":[{"@pid":"47/4901","text":"Ilaria Cardinali"},{"@pid":"54/3426","text":"Olga Polverino"},{"@pid":"86/3879","text":"Rocco Trombetti"}]},"title":"On the Sporadic Semifield Flock.","venue":"Des. Codes Cryptogr.","volume":"30","number":"2","pages":"219-226","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/CardinaliPT03","doi":"10.1023/A:1025488922550","ee":"https://doi.org/10.1023/A:1025488922550","url":"https://dblp.org/rec/journals/dcc/CardinaliPT03"}, "url":"URL#6111616" }, { "@score":"1", "@id":"6111617", "info":{"authors":{"author":[{"@pid":"20/4214","text":"David B. Chandler"},{"@pid":"29/1945","text":"Qing Xiang"}]},"title":"Cyclic Relative Difference Sets and their p-Ranks.","venue":"Des. Codes Cryptogr.","volume":"30","number":"3","pages":"325-343","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/ChandlerX03","doi":"10.1023/A:1025750228679","ee":"https://doi.org/10.1023/A:1025750228679","url":"https://dblp.org/rec/journals/dcc/ChandlerX03"}, "url":"URL#6111617" }, { "@score":"1", "@id":"6111618", "info":{"authors":{"author":{"@pid":"32/4951","text":"Daniel B. Dalan"}},"title":"New Extremal Type I Codes of Lengths 40, 42, and 44.","venue":"Des. Codes Cryptogr.","volume":"30","number":"2","pages":"151-157","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/Dalan03","doi":"10.1023/A:1025476619824","ee":"https://doi.org/10.1023/A:1025476619824","url":"https://dblp.org/rec/journals/dcc/Dalan03"}, "url":"URL#6111618" }, { "@score":"1", "@id":"6111619", "info":{"authors":{"author":[{"@pid":"61/3094","text":"Cunsheng Ding"},{"@pid":"g/MordecaiJGolin","text":"Mordecai J. Golin"},{"@pid":"61/6070","text":"Torleiv Kløve"}]},"title":"Meeting the Welch and Karystinos-Pados Bounds on DS-CDMA Binary Signature Sets.","venue":"Des. Codes Cryptogr.","volume":"30","number":"1","pages":"73-84","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/DingGK03","doi":"10.1023/A:1024759310058","ee":"https://doi.org/10.1023/A:1024759310058","url":"https://dblp.org/rec/journals/dcc/DingGK03"}, "url":"URL#6111619" }, { "@score":"1", "@id":"6111630", "info":{"authors":{"author":[{"@pid":"69/5320","text":"Detlef Hühnlein"},{"@pid":"45/6579","text":"Michael J. Jacobson Jr."},{"@pid":"64/3387","text":"Damian Weber"}]},"title":"Towards Practical Non-Interactive Public-Key Cryptosystems Using Non-Maximal Imaginary Quadratic Orders.","venue":"Des. Codes Cryptogr.","volume":"30","number":"3","pages":"281-299","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/HuhnleinJW03","doi":"10.1023/A:1025746127771","ee":"https://doi.org/10.1023/A:1025746127771","url":"https://dblp.org/rec/journals/dcc/HuhnleinJW03"}, "url":"URL#6111630" }, { "@score":"1", "@id":"6111631", "info":{"authors":{"author":{"@pid":"54/6284","text":"Hadi Kharaghani"}},"title":"On a Class of Symmetric Balanced Generalized Weighing Matrices.","venue":"Des. Codes Cryptogr.","volume":"30","number":"2","pages":"139-149","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/Kharaghani03","doi":"10.1023/A:1025436002985","ee":"https://doi.org/10.1023/A:1025436002985","url":"https://dblp.org/rec/journals/dcc/Kharaghani03"}, "url":"URL#6111631" }, { "@score":"1", "@id":"6111632", "info":{"authors":{"author":[{"@pid":"40/4755","text":"Jon-Lark Kim"},{"@pid":"p/VPless","text":"Vera Pless"}]},"title":"Designs in Additive Codes over GF(4).","venue":"Des. Codes Cryptogr.","volume":"30","number":"2","pages":"187-199","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/KimP03","doi":"10.1023/A:1025484821641","ee":"https://doi.org/10.1023/A:1025484821641","url":"https://dblp.org/rec/journals/dcc/KimP03"}, "url":"URL#6111632" }, { "@score":"1", "@id":"6111638", "info":{"authors":{"author":[{"@pid":"83/3827","text":"San Ling"},{"@pid":"s/PatrickSole","text":"Patrick Solé"}]},"title":"On the Algebraic Structure of Quasi-cyclic Codes II: Chain Rings.","venue":"Des. Codes Cryptogr.","volume":"30","number":"1","pages":"113-130","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/LingS03","doi":"10.1023/A:1024715527805","ee":"https://doi.org/10.1023/A:1024715527805","url":"https://dblp.org/rec/journals/dcc/LingS03"}, "url":"URL#6111638" }, { "@score":"1", "@id":"6111639", "info":{"authors":{"author":[{"@pid":"22/2080-1","text":"Shengli Liu 0001"},{"@pid":"t/HenkCAvanTilborg","text":"Henk C. A. van Tilborg"},{"@pid":"32/1399","text":"Marten van Dijk"}]},"title":"A Practical Protocol for Advantage Distillation and Information Reconciliation.","venue":"Des. Codes Cryptogr.","volume":"30","number":"1","pages":"39-62","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/LiuTD03","doi":"10.1023/A:1024755209150","ee":"https://doi.org/10.1023/A:1024755209150","url":"https://dblp.org/rec/journals/dcc/LiuTD03"}, "url":"URL#6111639" }, { "@score":"1", "@id":"6111644", "info":{"authors":{"author":{"@pid":"07/7031","text":"Keith E. Mellinger"}},"title":"A Geometric Relationship Between Equivalent Spreads.","venue":"Des. Codes Cryptogr.","volume":"30","number":"1","pages":"63-71","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/Mellinger03","doi":"10.1023/A:1024707325988","ee":"https://doi.org/10.1023/A:1024707325988","url":"https://dblp.org/rec/journals/dcc/Mellinger03"}, "url":"URL#6111644" }, { "@score":"1", "@id":"6111647", "info":{"authors":{"author":{"@pid":"18/6308","text":"Siaw-Lynn Ng"}},"title":"A Representation of a Family of Secret Sharing Matroids.","venue":"Des. Codes Cryptogr.","volume":"30","number":"1","pages":"5-19","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/Ng03","doi":"10.1023/A:1024741108241","ee":"https://doi.org/10.1023/A:1024741108241","url":"https://dblp.org/rec/journals/dcc/Ng03"}, "url":"URL#6111647" }, { "@score":"1", "@id":"6111648", "info":{"authors":{"author":[{"@pid":"n/PhongQNguyen","text":"Phong Q. Nguyen"},{"@pid":"s/IgorShparlinski","text":"Igor E. Shparlinski"}]},"title":"The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces.","venue":"Des. Codes Cryptogr.","volume":"30","number":"2","pages":"201-217","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/NguyenS03","doi":"10.1023/A:1025436905711","ee":"https://doi.org/10.1023/A:1025436905711","url":"https://dblp.org/rec/journals/dcc/NguyenS03"}, "url":"URL#6111648" }, { "@score":"1", "@id":"6111650", "info":{"authors":{"author":{"@pid":"79/2247","text":"Ederlina G. Nocon"}},"title":"On the Construction of Some Type II Codes over Z4×Z4.","venue":"Des. Codes Cryptogr.","volume":"30","number":"3","pages":"301-323","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/Nocon03","doi":"10.1023/A:1025798111841","ee":"https://doi.org/10.1023/A:1025798111841","url":"https://dblp.org/rec/journals/dcc/Nocon03"}, "url":"URL#6111650" }, { "@score":"1", "@id":"6111652", "info":{"authors":{"author":{"@pid":"19/1809","text":"Massimiliano Sala"}},"title":"Upper Bounds on the Dual Distance of BCH(255, k).","venue":"Des. Codes Cryptogr.","volume":"30","number":"2","pages":"159-168","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/Sala03","doi":"10.1023/A:1025428720732","ee":"https://doi.org/10.1023/A:1025428720732","url":"https://dblp.org/rec/journals/dcc/Sala03"}, "url":"URL#6111652" }, { "@score":"1", "@id":"6111653", "info":{"authors":{"author":[{"@pid":"s/PalashSarkar","text":"Palash Sarkar 0001"},{"@pid":"70/6241","text":"Paul J. Schellenberg"}]},"title":"Construction of Symmetric Balanced Squares with Blocksize More than One.","venue":"Des. Codes Cryptogr.","volume":"30","number":"3","pages":"235-280","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/SarkarS03","doi":"10.1023/A:1025729310932","ee":"https://doi.org/10.1023/A:1025729310932","url":"https://dblp.org/rec/journals/dcc/SarkarS03"}, "url":"URL#6111653" }, { "@score":"1", "@id":"6111655", "info":{"authors":{"author":{"@pid":"90/490","text":"Kenichiro Tanabe"}},"title":"A Criterion for Designs in {\\tf="P101461" Z}_4-codes on the Symmetrized Weight Enumerator.","venue":"Des. Codes Cryptogr.","volume":"30","number":"2","pages":"169-185","year":"2003","type":"Journal Articles","access":"closed","key":"journals/dcc/Tanabe03","doi":"10.1023/A:1025432804803","ee":"https://doi.org/10.1023/A:1025432804803","url":"https://dblp.org/rec/journals/dcc/Tanabe03"}, "url":"URL#6111655" } ] } } } )