Search dblp for Publications

export results for "toc:db/journals/dcc/dcc2.bht:"

 download as .bib file

@article{DBLP:journals/dcc/ArasuX92,
  author       = {K. T. Arasu and
                  Qing Xiang},
  title        = {On the Existence of Periodic Complementary Binary Sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {257--262},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00141970},
  doi          = {10.1007/BF00141970},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ArasuX92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bagchi92,
  author       = {Bhaskar Bagchi},
  title        = {On Quasi-Symmetric Designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {69--79},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124210},
  doi          = {10.1007/BF00124210},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Bagchi92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BethH92,
  author       = {Thomas Beth and
                  Volker Hatz},
  title        = {Design Machines: Algebraically Well Described Interconnection Networks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {287--298},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00141973},
  doi          = {10.1007/BF00141973},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BethH92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlokhuisC92,
  author       = {Aart Blokhuis and
                  A. Robert Calderbank},
  title        = {Quasi-Symmetric Designs and the Smith Normal Form},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {189--206},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124897},
  doi          = {10.1007/BF00124897},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlokhuisC92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bryant92,
  author       = {Darryn E. Bryant},
  title        = {Varieties of Quasigroups Arising from 2-Perfect m-Cycle Systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {159--168},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124894},
  doi          = {10.1007/BF00124894},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Bryant92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CaenGR92,
  author       = {D. de Caen and
                  Chris D. Godsil and
                  Gordon F. Royle},
  title        = {On the p-Rank of Incidence Matrices and a Bound of Bruen and Ott},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {391--394},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00125204},
  doi          = {10.1007/BF00125204},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CaenGR92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Cohen92,
  author       = {Stephen D. Cohen},
  title        = {The Explicit Construction of Irreducible Polynomials over Finite Fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {169--174},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124895},
  doi          = {10.1007/BF00124895},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Cohen92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ColbournMPT92,
  author       = {Charles J. Colbourn and
                  Eric Mendelsohn and
                  Cheryl E. Praeger and
                  Vladimir D. Tonchev},
  title        = {Concerning Multiplier Automorphisms of Cyclic Steiner Triple Systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {237--251},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00141968},
  doi          = {10.1007/BF00141968},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ColbournMPT92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DiffieOW92,
  author       = {Whitfield Diffie and
                  Paul C. van Oorschot and
                  Michael J. Wiener},
  title        = {Authentication and Authenticated Key Exchanges},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {107--125},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124891},
  doi          = {10.1007/BF00124891},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DiffieOW92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FellowsK92,
  author       = {Michael R. Fellows and
                  Neal Koblitz},
  title        = {Self-Witnessing Polynomial-Time Complexity and Prime Factorization},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {231--235},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00141967},
  doi          = {10.1007/BF00141967},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FellowsK92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GaoL92,
  author       = {Shuhong Gao and
                  Hendrik W. Lenstra Jr.},
  title        = {Optimal Normal Bases},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {315--323},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00125200},
  doi          = {10.1007/BF00125200},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GaoL92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GreenoughH92,
  author       = {Phil P. Greenough and
                  Ray Hill},
  title        = {Optimal Ternary Quasi-Cyclic Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {81--91},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124211},
  doi          = {10.1007/BF00124211},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GreenoughH92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HamadaHY92,
  author       = {Noboru Hamada and
                  Tor Helleseth and
                  {\O}yvind Ytrehus},
  title        = {On the Construction of [q\({}^{\mbox{4}}\) + q\({}^{\mbox{2}}\) -
                  q, 5, q\({}^{\mbox{4}}\) - q\({}^{\mbox{3}}\) + q\({}^{\mbox{2}}\)
                  - 2q; q]-Codes Meeting the Griesmer Bound},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {225--229},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00141966},
  doi          = {10.1007/BF00141966},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HamadaHY92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HillN92,
  author       = {Ray Hill and
                  David Ellis Newton},
  title        = {Optimal Ternary Linear Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {137--157},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124893},
  doi          = {10.1007/BF00124893},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HillN92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Hou92,
  author       = {Xiang{-}dong Hou},
  title        = {Some Inequalities about the Covering Radius of Reed-Muller Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {215--224},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00141965},
  doi          = {10.1007/BF00141965},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Hou92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JacksonW92,
  author       = {Wen{-}Ai Jackson and
                  Peter R. Wild},
  title        = {Relations between Two Perfect Ternary Sequence Constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {325--332},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00125201},
  doi          = {10.1007/BF00125201},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JacksonW92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Jedwab92,
  author       = {Jonathan Jedwab},
  title        = {Generalized Perfect Arrays and \{Menon\} Difference Sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {19--68},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124209},
  doi          = {10.1007/BF00124209},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Jedwab92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JedwabL92,
  author       = {Jonathan Jedwab and
                  Sheelagh Lloyd},
  title        = {A Note on the Nonexistence of Barker Sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {93--97},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124212},
  doi          = {10.1007/BF00124212},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JedwabL92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LandrockM92,
  author       = {Peter Landrock and
                  Olaf Manz},
  title        = {Classical Codes as Ideals in Group Algebras},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {273--285},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00141972},
  doi          = {10.1007/BF00141972},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LandrockM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MeloneO92,
  author       = {Nicola Melone and
                  Udo Ott},
  title        = {On the Rank of Truncated Incidence Matrices of Linear Spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {307--313},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00125199},
  doi          = {10.1007/BF00125199},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MeloneO92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Pott92,
  author       = {Alexander Pott},
  title        = {On Abelian Difference Set Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {263--271},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00141971},
  doi          = {10.1007/BF00141971},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Pott92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Schmidt92,
  author       = {Bernhard Schmidt},
  title        = {Note on a Question by S. Bagchi and B. Bagchi},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {395},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00125205},
  doi          = {10.1007/BF00125205},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Schmidt92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Shaw92,
  author       = {Ronald Shaw},
  title        = {A Characterization of the Primals in \emph{PG}(m, 2)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {253--256},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00141969},
  doi          = {10.1007/BF00141969},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Shaw92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Spence92,
  author       = {Edward Spence},
  title        = {A Complete Classification of Symmetric (31, 10, 3) Designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {127--136},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124892},
  doi          = {10.1007/BF00124892},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Spence92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Stinson92,
  author       = {Douglas R. Stinson},
  title        = {Combinatorial Characterizations of Authentication Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {175--187},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124896},
  doi          = {10.1007/BF00124896},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Stinson92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Stinson92a,
  author       = {Douglas R. Stinson},
  title        = {An Explication of Secret Sharing Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {357--390},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00125203},
  doi          = {10.1007/BF00125203},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Stinson92a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Wan92,
  author       = {Zhe{-}xian Wan},
  title        = {Construction of Cartesian Authentication Codes from Unitary Geometry},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {333--356},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00125202},
  doi          = {10.1007/BF00125202},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Wan92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YaghoobianB92,
  author       = {Tomik Yaghoobian and
                  Ian F. Blake},
  title        = {Hermitian Codes as Generalized Reed-Solomon Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {5--17},
  year         = {1992},
  url          = {https://doi.org/10.1007/BF00124208},
  doi          = {10.1007/BF00124208},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YaghoobianB92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics