Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc57.bht:"
@article{DBLP:journals/dcc/AbelB10, author = {R. Julian R. Abel and Frank E. Bennett}, title = {Existence of directed BIBDs with block size 7 and related perfect 5-deletion-correcting codes of length 7}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {3}, pages = {383--397}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9376-x}, doi = {10.1007/S10623-010-9376-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AbelB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlinovskyEL10, author = {Vladimir M. Blinovsky and Uri Erez and Simon Litsyn}, title = {Weight distribution moments of random linear/coset codes}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {2}, pages = {127--138}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9356-1}, doi = {10.1007/S10623-009-9356-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlinovskyEL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ByrneGKS10, author = {Eimear Byrne and Marcus Greferath and Axel Kohnert and Vitaly Skachek}, title = {New bounds for codes over finite Frobenius rings}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {2}, pages = {169--179}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9359-y}, doi = {10.1007/S10623-009-9359-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ByrneGKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DempwolffN10, author = {Ulrich Dempwolff and Timo Neumann}, title = {Geometric and design-theoretic aspects of semibent functions {I}}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {3}, pages = {373--381}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9375-y}, doi = {10.1007/S10623-010-9375-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DempwolffN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DonatiD10, author = {Giorgio Donati and Nicola Durante}, title = {On the intersection of a Hermitian curve with a conic}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {3}, pages = {347--360}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9371-2}, doi = {10.1007/S10623-010-9371-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DonatiD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Edel10, author = {Yves Edel}, title = {On quadratic {APN} functions and dimensional dual hyperovals}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {1}, pages = {35--44}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9347-2}, doi = {10.1007/S10623-009-9347-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Edel10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Fernandez-CordobaP10, author = {Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba and Kevin T. Phelps}, title = {On the minimum distance graph of an extended Preparata code}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {2}, pages = {161--168}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9358-z}, doi = {10.1007/S10623-009-9358-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Fernandez-CordobaP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FuelberthGS10, author = {John Fuelberth and Athula Gunawardena and C. David Shaffer}, title = {On incidence structures of nonsingular points and hyperbolic lines of ovoids in finite orthogonal spaces}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {1}, pages = {15--33}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9346-3}, doi = {10.1007/S10623-009-9346-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FuelberthGS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Hong10, author = {Jin Hong}, title = {The cost of false alarms in Hellman and rainbow tradeoffs}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {3}, pages = {293--327}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9368-x}, doi = {10.1007/S10623-010-9368-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Hong10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kim10, author = {Hyun Jin Kim}, title = {Self-dual codes with automorphism of order 3 having 8 cycles}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {3}, pages = {329--346}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9370-3}, doi = {10.1007/S10623-010-9370-3}, timestamp = {Wed, 11 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Kim10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Krotov10, author = {Denis S. Krotov}, title = {On the binary codes with parameters of doubly-shortened 1-perfect codes}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {2}, pages = {181--194}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9360-5}, doi = {10.1007/S10623-009-9360-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Krotov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Nakashima10, author = {Tohru Nakashima}, title = {{AG} codes from vector bundles}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {1}, pages = {107--115}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9354-3}, doi = {10.1007/S10623-009-9354-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Nakashima10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Park10, author = {Seungkook Park}, title = {Minimum distance of Hermitian two-point codes}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {2}, pages = {195--213}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9361-4}, doi = {10.1007/S10623-009-9361-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Park10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PasalicC10, author = {Enes Pasalic and Pascale Charpin}, title = {Some results concerning cryptographically significant mappings over GF(2\({}^{\mbox{\emph{n}}}\))}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {3}, pages = {257--269}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9365-0}, doi = {10.1007/S10623-010-9365-0}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PasalicC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Rizomiliotis10, author = {Panagiotis Rizomiliotis}, title = {On the security of the Feng-Liao-Yang Boolean functions with optimal algebraic immunity against fast algebraic attacks}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {3}, pages = {283--292}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9367-y}, doi = {10.1007/S10623-010-9367-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Rizomiliotis10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SakzadSP10, author = {Amin Sakzad and Mohammad{-}Reza Sadeghi and Daniel Panario}, title = {Codes with girth 8 Tanner graph representation}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {1}, pages = {71--81}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9349-0}, doi = {10.1007/S10623-009-9349-0}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SakzadSP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SchusterG10, author = {Ernst Schuster and Gennian Ge}, title = {On uniformly resolvable designs with block sizes 3 and 4}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {1}, pages = {45--69}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9348-1}, doi = {10.1007/S10623-009-9348-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SchusterG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShaheenW10, author = {Rasha Shaheen and Arne Winterhof}, title = {Permutations of finite fields for check digit systems}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {3}, pages = {361--371}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9374-z}, doi = {10.1007/S10623-010-9374-Z}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShaheenW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShumW10, author = {Kenneth W. Shum and Wing Shing Wong}, title = {A tight asymptotic bound on the size of constant-weight conflict-avoiding codes}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {1}, pages = {1--14}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9345-4}, doi = {10.1007/S10623-009-9345-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShumW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WalikarAS10, author = {Hanumappa B. Walikar and B. Devadas Acharya and Shailaja S. Shirkol}, title = {Designs associated with maximum independent sets of a graph}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {1}, pages = {91--105}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9351-6}, doi = {10.1007/S10623-009-9351-6}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WalikarAS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangC10, author = {Chunpeng Wang and Xiao{-}song Chen}, title = {On extended algebraic immunity}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {3}, pages = {271--281}, year = {2010}, url = {https://doi.org/10.1007/s10623-010-9366-z}, doi = {10.1007/S10623-010-9366-Z}, timestamp = {Sun, 29 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WangC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZaveruchaS10, author = {Gregory M. Zaverucha and Douglas R. Stinson}, title = {Anonymity in shared symmetric key primitives}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {2}, pages = {139--160}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9357-0}, doi = {10.1007/S10623-009-9357-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZaveruchaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangG10a, author = {Xiande Zhang and Gennian Ge}, title = {H-designs with the properties of resolvability or (1, 2)-resolvability}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {3}, pages = {225--256}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9363-2}, doi = {10.1007/S10623-009-9363-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangG10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoC10, author = {Zhengjun Zhao and Xiwang Cao}, title = {A note on the reducibility of binary affine polynomials}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {1}, pages = {83--90}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9350-7}, doi = {10.1007/S10623-009-9350-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouD10, author = {Shenglin Zhou and Huili Dong}, title = {Alternating groups and flag-transitive triplanes}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {2}, pages = {117--126}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9355-2}, doi = {10.1007/S10623-009-9355-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhouD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouT10, author = {Zhengchun Zhou and Xiaohu Tang}, title = {Optimal and perfect difference systems of sets from \emph{q}-ary sequences with difference-balanced property}, journal = {Des. Codes Cryptogr.}, volume = {57}, number = {2}, pages = {215--223}, year = {2010}, url = {https://doi.org/10.1007/s10623-009-9362-3}, doi = {10.1007/S10623-009-9362-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhouT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.