Search dblp for Publications

export results for "toc:db/journals/dcc/dcc36.bht:"

 download as .bib file

@article{DBLP:journals/dcc/BarwickJM05,
  author       = {Susan G. Barwick and
                  Wen{-}Ai Jackson and
                  Keith M. Martin},
  title        = {A General Approach to Robust Web Metering},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {1},
  pages        = {5--27},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-003-1158-2},
  doi          = {10.1007/S10623-003-1158-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BarwickJM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BrackenM05,
  author       = {Carl Bracken and
                  Gary McGuire},
  title        = {Characterization of {SDP} Designs That Yield Certain Spin Models},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {1},
  pages        = {45--52},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-003-1161-7},
  doi          = {10.1007/S10623-003-1161-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BrackenM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BrownMS05,
  author       = {Ezra Brown and
                  Bruce T. Myers and
                  Jerome A. Solinas},
  title        = {Hyperelliptic Curves with Compact Parameters},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {3},
  pages        = {245--261},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1718-0},
  doi          = {10.1007/S10623-004-1718-0},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BrownMS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Carlet05,
  author       = {Claude Carlet},
  title        = {Concatenating Indicators of Flats for Designing Cryptographic Functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {2},
  pages        = {189--202},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1704-6},
  doi          = {10.1007/S10623-004-1704-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Carlet05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CheonKK05,
  author       = {E. J. Cheon and
                  Takao Kato and
                  Seon Jeong Kim},
  title        = {Nonexistence of [\emph{n}, 5, \emph{d}]\({}_{\mbox{\emph{q}}}\) Codes
                  Attaining the Griesmer Bound for \emph{q}\({}^{\mbox{4}}\)-2\emph{q}\({}^{\mbox{2}}\)-2\emph{q}+1
                  {\textless}= \emph{d} {\textless}= \emph{q}\({}^{\mbox{4}}\)-2\emph{q}\({}^{\mbox{2}}\)-\emph{q}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {3},
  pages        = {289--299},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1720-6},
  doi          = {10.1007/S10623-004-1720-6},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CheonKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Chiera05,
  author       = {F. L. Chiera},
  title        = {Type {II} Codes over Z/2kZ, Invariant Rings and Theta Series},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {2},
  pages        = {147--158},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1701-9},
  doi          = {10.1007/S10623-004-1701-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Chiera05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CietJ05,
  author       = {Mathieu Ciet and
                  Marc Joye},
  title        = {Elliptic Curve Cryptosystems in the Presence of Permanent and Transient
                  Faults},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {1},
  pages        = {33--43},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-003-1160-8},
  doi          = {10.1007/S10623-003-1160-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CietJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Cohen05,
  author       = {Stephen D. Cohen},
  title        = {Finite Field Elements with Specified Order and Traces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {3},
  pages        = {331--340},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1724-2},
  doi          = {10.1007/S10623-004-1724-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Cohen05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EisfeldSS05,
  author       = {J{\"{o}}rg Eisfeld and
                  Leo Storme and
                  P{\'{e}}ter Sziklai},
  title        = {On the Spectrum of the Sizes of Maximal Partial Line Spreads in \emph{PG}(2\emph{n},
                  \emph{q}), \emph{n} {\textgreater}= 3},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {1},
  pages        = {101--110},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1165-y},
  doi          = {10.1007/S10623-004-1165-Y},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EisfeldSS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Galati05,
  author       = {John C. Galati},
  title        = {On the Non-existence of Semiregular Relative Difference Sets in Groups
                  with All Sylow Subgroups Cyclic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {1},
  pages        = {29--31},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-003-1159-1},
  doi          = {10.1007/S10623-003-1159-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Galati05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuptaBL05,
  author       = {Manish K. Gupta and
                  Mahesh C. Bhandari and
                  Arbind K. Lal},
  title        = {On Linear Codes over Z\({}_{\mbox{2\({}^{\mbox{s}}\)}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {3},
  pages        = {227--244},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1717-1},
  doi          = {10.1007/S10623-004-1717-1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuptaBL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Jha05,
  author       = {Vikram Jha},
  title        = {Local Schur's Lemma and Commutative Semifields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {2},
  pages        = {203--216},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1705-5},
  doi          = {10.1007/S10623-004-1705-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Jha05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JiWZ05,
  author       = {L. Ji and
                  Dianhua Wu and
                  Lei Zhu},
  title        = {Existence of Generalized Steiner Systems \emph{GS}(2, 4, v, 2)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {1},
  pages        = {83--99},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1164-z},
  doi          = {10.1007/S10623-004-1164-Z},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/JiWZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kaey05,
  author       = {Joris De Kaey},
  title        = {On a More General Characterisation of Steiner Systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {2},
  pages        = {117--129},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1699-z},
  doi          = {10.1007/S10623-004-1699-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kaey05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LangevinZ05,
  author       = {Philippe Langevin and
                  Jean{-}Pierre Zanotti},
  title        = {Nonlinearity of Some Invariant Boolean Functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {2},
  pages        = {131--146},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1700-x},
  doi          = {10.1007/S10623-004-1700-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LangevinZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeungS05,
  author       = {Ka Hin Leung and
                  Bernhard Schmidt},
  title        = {The Field Descent Method},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {2},
  pages        = {171--188},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1703-7},
  doi          = {10.1007/S10623-004-1703-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeungS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LinHC05,
  author       = {Iuon{-}Chang Lin and
                  Min{-}Shiang Hwang and
                  Chin{-}Chen Chang},
  title        = {The General Pay-Word: {A} Micro-payment Scheme Based on \emph{n}-dimension
                  One-way Hash Chain},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {1},
  pages        = {53--67},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-003-1162-6},
  doi          = {10.1007/S10623-003-1162-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LinHC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Lofvenberg05,
  author       = {Jacob L{\"{o}}fvenberg},
  title        = {Binary Fingerprinting Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {1},
  pages        = {69--81},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-003-1163-5},
  doi          = {10.1007/S10623-003-1163-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Lofvenberg05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MartinSWW05,
  author       = {Keith M. Martin and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Peter R. Wild},
  title        = {Distributing the Encryption and Decryption of a Block Cipher},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {3},
  pages        = {263--287},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-003-1719-4},
  doi          = {10.1007/S10623-003-1719-4},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MartinSWW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NietoBD05,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd and
                  Ed Dawson},
  title        = {A Public Key Cryptosystem Based On {A} Subgroup Membership Problem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {3},
  pages        = {301--316},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1721-5},
  doi          = {10.1007/S10623-004-1721-5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NietoBD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ostergard05,
  author       = {Patric R. J. {\"{O}}sterg{\aa}rd},
  title        = {Two New Four-Error-Correcting Binary Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {3},
  pages        = {327--329},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1723-3},
  doi          = {10.1007/S10623-004-1723-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ostergard05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Veron05,
  author       = {Pascal V{\'{e}}ron},
  title        = {Proof of Conjectures on the True Dimension of Some Binary Goppa Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {3},
  pages        = {317--325},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1722-4},
  doi          = {10.1007/S10623-004-1722-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Veron05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Zhou05,
  author       = {Shenglin Zhou},
  title        = {Block Primitive 2-(\emph{v}, \emph{k}, 1) Designs Admitting a Ree
                  Group of Characteristic Two},
  journal      = {Des. Codes Cryptogr.},
  volume       = {36},
  number       = {2},
  pages        = {159--169},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10623-004-1702-8},
  doi          = {10.1007/S10623-004-1702-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Zhou05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics