Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc19.bht:"
@article{DBLP:journals/dcc/Blake-Wilson00, author = {Simon Blake{-}Wilson}, title = {Information Security, Mathematics, and Public-Key Cryptography}, journal = {Des. Codes Cryptogr.}, volume = {19}, number = {2/3}, pages = {77--99}, year = {2000}, url = {https://doi.org/10.1023/A:1008345904539}, doi = {10.1023/A:1008345904539}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Blake-Wilson00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DinitzL00, author = {Jeffrey H. Dinitz and Esther R. Lamken}, title = {HOPs and COPs: Room frames with partitionable transversals}, journal = {Des. Codes Cryptogr.}, volume = {19}, number = {1}, pages = {5--26}, year = {2000}, url = {https://doi.org/10.1023/A:1008334412968}, doi = {10.1023/A:1008334412968}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DinitzL00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Koblitz00, author = {Neal Koblitz}, title = {Guest Editorial}, journal = {Des. Codes Cryptogr.}, volume = {19}, number = {2/3}, pages = {75--76}, year = {2000}, url = {https://doi.org/10.1023/A:1008311820469}, doi = {10.1023/A:1008311820469}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Koblitz00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KoblitzMV00, author = {Neal Koblitz and Alfred Menezes and Scott A. Vanstone}, title = {The State of Elliptic Curve Cryptography}, journal = {Des. Codes Cryptogr.}, volume = {19}, number = {2/3}, pages = {173--193}, year = {2000}, url = {https://doi.org/10.1023/A:1008354106356}, doi = {10.1023/A:1008354106356}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KoblitzMV00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Lenstra00, author = {Arjen K. Lenstra}, title = {Integer Factoring}, journal = {Des. Codes Cryptogr.}, volume = {19}, number = {2/3}, pages = {101--128}, year = {2000}, url = {https://doi.org/10.1023/A:1008397921377}, doi = {10.1023/A:1008397921377}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Lenstra00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaurerW00, author = {Ueli M. Maurer and Stefan Wolf}, title = {The Diffie-Hellman Protocol}, journal = {Des. Codes Cryptogr.}, volume = {19}, number = {2/3}, pages = {147--171}, year = {2000}, url = {https://doi.org/10.1023/A:1008302122286}, doi = {10.1023/A:1008302122286}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MaurerW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Odlyzko00, author = {Andrew M. Odlyzko}, title = {Discrete Logarithms: The Past and the Future}, journal = {Des. Codes Cryptogr.}, volume = {19}, number = {2/3}, pages = {129--145}, year = {2000}, url = {https://doi.org/10.1023/A:1008350005447}, doi = {10.1023/A:1008350005447}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Odlyzko00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Solinas00, author = {Jerome A. Solinas}, title = {Efficient Arithmetic on Koblitz Curves}, journal = {Des. Codes Cryptogr.}, volume = {19}, number = {2/3}, pages = {195--249}, year = {2000}, url = {https://doi.org/10.1023/A:1008306223194}, doi = {10.1023/A:1008306223194}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Solinas00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Vance00, author = {Todd D. Vance}, title = {A Gap in {GRM} Code Weight Distributions}, journal = {Des. Codes Cryptogr.}, volume = {19}, number = {1}, pages = {27--43}, year = {2000}, url = {https://doi.org/10.1023/A:1008307729806}, doi = {10.1023/A:1008307729806}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Vance00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangZI00, author = {Xian{-}Mo Zhang and Yuliang Zheng and Hideki Imai}, title = {Relating Differential Distribution Tables to Other Properties of of Substitution Boxes}, journal = {Des. Codes Cryptogr.}, volume = {19}, number = {1}, pages = {45--63}, year = {2000}, url = {https://doi.org/10.1023/A:1008359713877}, doi = {10.1023/A:1008359713877}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhangZI00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.