Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc36.bht:"
@article{DBLP:journals/dcc/BarwickJM05, author = {Susan G. Barwick and Wen{-}Ai Jackson and Keith M. Martin}, title = {A General Approach to Robust Web Metering}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {1}, pages = {5--27}, year = {2005}, url = {https://doi.org/10.1007/s10623-003-1158-2}, doi = {10.1007/S10623-003-1158-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BarwickJM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BrackenM05, author = {Carl Bracken and Gary McGuire}, title = {Characterization of {SDP} Designs That Yield Certain Spin Models}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {1}, pages = {45--52}, year = {2005}, url = {https://doi.org/10.1007/s10623-003-1161-7}, doi = {10.1007/S10623-003-1161-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BrackenM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BrownMS05, author = {Ezra Brown and Bruce T. Myers and Jerome A. Solinas}, title = {Hyperelliptic Curves with Compact Parameters}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {3}, pages = {245--261}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1718-0}, doi = {10.1007/S10623-004-1718-0}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BrownMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Carlet05, author = {Claude Carlet}, title = {Concatenating Indicators of Flats for Designing Cryptographic Functions}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {2}, pages = {189--202}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1704-6}, doi = {10.1007/S10623-004-1704-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Carlet05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CheonKK05, author = {E. J. Cheon and Takao Kato and Seon Jeong Kim}, title = {Nonexistence of [\emph{n}, 5, \emph{d}]\({}_{\mbox{\emph{q}}}\) Codes Attaining the Griesmer Bound for \emph{q}\({}^{\mbox{4}}\)-2\emph{q}\({}^{\mbox{2}}\)-2\emph{q}+1 {\textless}= \emph{d} {\textless}= \emph{q}\({}^{\mbox{4}}\)-2\emph{q}\({}^{\mbox{2}}\)-\emph{q}}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {3}, pages = {289--299}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1720-6}, doi = {10.1007/S10623-004-1720-6}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CheonKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Chiera05, author = {F. L. Chiera}, title = {Type {II} Codes over Z/2kZ, Invariant Rings and Theta Series}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {2}, pages = {147--158}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1701-9}, doi = {10.1007/S10623-004-1701-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Chiera05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CietJ05, author = {Mathieu Ciet and Marc Joye}, title = {Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {1}, pages = {33--43}, year = {2005}, url = {https://doi.org/10.1007/s10623-003-1160-8}, doi = {10.1007/S10623-003-1160-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CietJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Cohen05, author = {Stephen D. Cohen}, title = {Finite Field Elements with Specified Order and Traces}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {3}, pages = {331--340}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1724-2}, doi = {10.1007/S10623-004-1724-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Cohen05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EisfeldSS05, author = {J{\"{o}}rg Eisfeld and Leo Storme and P{\'{e}}ter Sziklai}, title = {On the Spectrum of the Sizes of Maximal Partial Line Spreads in \emph{PG}(2\emph{n}, \emph{q}), \emph{n} {\textgreater}= 3}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {1}, pages = {101--110}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1165-y}, doi = {10.1007/S10623-004-1165-Y}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EisfeldSS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Galati05, author = {John C. Galati}, title = {On the Non-existence of Semiregular Relative Difference Sets in Groups with All Sylow Subgroups Cyclic}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {1}, pages = {29--31}, year = {2005}, url = {https://doi.org/10.1007/s10623-003-1159-1}, doi = {10.1007/S10623-003-1159-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Galati05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuptaBL05, author = {Manish K. Gupta and Mahesh C. Bhandari and Arbind K. Lal}, title = {On Linear Codes over Z\({}_{\mbox{2\({}^{\mbox{s}}\)}}\)}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {3}, pages = {227--244}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1717-1}, doi = {10.1007/S10623-004-1717-1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuptaBL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Jha05, author = {Vikram Jha}, title = {Local Schur's Lemma and Commutative Semifields}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {2}, pages = {203--216}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1705-5}, doi = {10.1007/S10623-004-1705-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Jha05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JiWZ05, author = {L. Ji and Dianhua Wu and Lei Zhu}, title = {Existence of Generalized Steiner Systems \emph{GS}(2, 4, v, 2)}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {1}, pages = {83--99}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1164-z}, doi = {10.1007/S10623-004-1164-Z}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/JiWZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kaey05, author = {Joris De Kaey}, title = {On a More General Characterisation of Steiner Systems}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {2}, pages = {117--129}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1699-z}, doi = {10.1007/S10623-004-1699-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kaey05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LangevinZ05, author = {Philippe Langevin and Jean{-}Pierre Zanotti}, title = {Nonlinearity of Some Invariant Boolean Functions}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {2}, pages = {131--146}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1700-x}, doi = {10.1007/S10623-004-1700-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LangevinZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeungS05, author = {Ka Hin Leung and Bernhard Schmidt}, title = {The Field Descent Method}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {2}, pages = {171--188}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1703-7}, doi = {10.1007/S10623-004-1703-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeungS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LinHC05, author = {Iuon{-}Chang Lin and Min{-}Shiang Hwang and Chin{-}Chen Chang}, title = {The General Pay-Word: {A} Micro-payment Scheme Based on \emph{n}-dimension One-way Hash Chain}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {1}, pages = {53--67}, year = {2005}, url = {https://doi.org/10.1007/s10623-003-1162-6}, doi = {10.1007/S10623-003-1162-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LinHC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Lofvenberg05, author = {Jacob L{\"{o}}fvenberg}, title = {Binary Fingerprinting Codes}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {1}, pages = {69--81}, year = {2005}, url = {https://doi.org/10.1007/s10623-003-1163-5}, doi = {10.1007/S10623-003-1163-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Lofvenberg05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MartinSWW05, author = {Keith M. Martin and Reihaneh Safavi{-}Naini and Huaxiong Wang and Peter R. Wild}, title = {Distributing the Encryption and Decryption of a Block Cipher}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {3}, pages = {263--287}, year = {2005}, url = {https://doi.org/10.1007/s10623-003-1719-4}, doi = {10.1007/S10623-003-1719-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MartinSWW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NietoBD05, author = {Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd and Ed Dawson}, title = {A Public Key Cryptosystem Based On {A} Subgroup Membership Problem}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {3}, pages = {301--316}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1721-5}, doi = {10.1007/S10623-004-1721-5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NietoBD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ostergard05, author = {Patric R. J. {\"{O}}sterg{\aa}rd}, title = {Two New Four-Error-Correcting Binary Codes}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {3}, pages = {327--329}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1723-3}, doi = {10.1007/S10623-004-1723-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ostergard05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Veron05, author = {Pascal V{\'{e}}ron}, title = {Proof of Conjectures on the True Dimension of Some Binary Goppa Codes}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {3}, pages = {317--325}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1722-4}, doi = {10.1007/S10623-004-1722-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Veron05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Zhou05, author = {Shenglin Zhou}, title = {Block Primitive 2-(\emph{v}, \emph{k}, 1) Designs Admitting a Ree Group of Characteristic Two}, journal = {Des. Codes Cryptogr.}, volume = {36}, number = {2}, pages = {159--169}, year = {2005}, url = {https://doi.org/10.1007/s10623-004-1702-8}, doi = {10.1007/S10623-004-1702-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Zhou05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.