Search dblp for Publications

export results for "toc:db/journals/dcc/dcc57.bht:"

 download as .bib file

@article{DBLP:journals/dcc/AbelB10,
  author       = {R. Julian R. Abel and
                  Frank E. Bennett},
  title        = {Existence of directed BIBDs with block size 7 and related perfect
                  5-deletion-correcting codes of length 7},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {3},
  pages        = {383--397},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9376-x},
  doi          = {10.1007/S10623-010-9376-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AbelB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BlinovskyEL10,
  author       = {Vladimir M. Blinovsky and
                  Uri Erez and
                  Simon Litsyn},
  title        = {Weight distribution moments of random linear/coset codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {2},
  pages        = {127--138},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9356-1},
  doi          = {10.1007/S10623-009-9356-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BlinovskyEL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ByrneGKS10,
  author       = {Eimear Byrne and
                  Marcus Greferath and
                  Axel Kohnert and
                  Vitaly Skachek},
  title        = {New bounds for codes over finite Frobenius rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {2},
  pages        = {169--179},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9359-y},
  doi          = {10.1007/S10623-009-9359-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ByrneGKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DempwolffN10,
  author       = {Ulrich Dempwolff and
                  Timo Neumann},
  title        = {Geometric and design-theoretic aspects of semibent functions {I}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {3},
  pages        = {373--381},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9375-y},
  doi          = {10.1007/S10623-010-9375-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DempwolffN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DonatiD10,
  author       = {Giorgio Donati and
                  Nicola Durante},
  title        = {On the intersection of a Hermitian curve with a conic},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {3},
  pages        = {347--360},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9371-2},
  doi          = {10.1007/S10623-010-9371-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DonatiD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Edel10,
  author       = {Yves Edel},
  title        = {On quadratic {APN} functions and dimensional dual hyperovals},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {1},
  pages        = {35--44},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9347-2},
  doi          = {10.1007/S10623-009-9347-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Edel10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Fernandez-CordobaP10,
  author       = {Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba and
                  Kevin T. Phelps},
  title        = {On the minimum distance graph of an extended Preparata code},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {2},
  pages        = {161--168},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9358-z},
  doi          = {10.1007/S10623-009-9358-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Fernandez-CordobaP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FuelberthGS10,
  author       = {John Fuelberth and
                  Athula Gunawardena and
                  C. David Shaffer},
  title        = {On incidence structures of nonsingular points and hyperbolic lines
                  of ovoids in finite orthogonal spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {1},
  pages        = {15--33},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9346-3},
  doi          = {10.1007/S10623-009-9346-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FuelberthGS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Hong10,
  author       = {Jin Hong},
  title        = {The cost of false alarms in Hellman and rainbow tradeoffs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {3},
  pages        = {293--327},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9368-x},
  doi          = {10.1007/S10623-010-9368-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Hong10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kim10,
  author       = {Hyun Jin Kim},
  title        = {Self-dual codes with automorphism of order 3 having 8 cycles},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {3},
  pages        = {329--346},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9370-3},
  doi          = {10.1007/S10623-010-9370-3},
  timestamp    = {Wed, 11 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Kim10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Krotov10,
  author       = {Denis S. Krotov},
  title        = {On the binary codes with parameters of doubly-shortened 1-perfect
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {2},
  pages        = {181--194},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9360-5},
  doi          = {10.1007/S10623-009-9360-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Krotov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Nakashima10,
  author       = {Tohru Nakashima},
  title        = {{AG} codes from vector bundles},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {1},
  pages        = {107--115},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9354-3},
  doi          = {10.1007/S10623-009-9354-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Nakashima10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Park10,
  author       = {Seungkook Park},
  title        = {Minimum distance of Hermitian two-point codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {2},
  pages        = {195--213},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9361-4},
  doi          = {10.1007/S10623-009-9361-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Park10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PasalicC10,
  author       = {Enes Pasalic and
                  Pascale Charpin},
  title        = {Some results concerning cryptographically significant mappings over
                  GF(2\({}^{\mbox{\emph{n}}}\))},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {3},
  pages        = {257--269},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9365-0},
  doi          = {10.1007/S10623-010-9365-0},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PasalicC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Rizomiliotis10,
  author       = {Panagiotis Rizomiliotis},
  title        = {On the security of the Feng-Liao-Yang Boolean functions with optimal
                  algebraic immunity against fast algebraic attacks},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {3},
  pages        = {283--292},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9367-y},
  doi          = {10.1007/S10623-010-9367-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Rizomiliotis10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SakzadSP10,
  author       = {Amin Sakzad and
                  Mohammad{-}Reza Sadeghi and
                  Daniel Panario},
  title        = {Codes with girth 8 Tanner graph representation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {1},
  pages        = {71--81},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9349-0},
  doi          = {10.1007/S10623-009-9349-0},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SakzadSP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SchusterG10,
  author       = {Ernst Schuster and
                  Gennian Ge},
  title        = {On uniformly resolvable designs with block sizes 3 and 4},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {1},
  pages        = {45--69},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9348-1},
  doi          = {10.1007/S10623-009-9348-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SchusterG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShaheenW10,
  author       = {Rasha Shaheen and
                  Arne Winterhof},
  title        = {Permutations of finite fields for check digit systems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {3},
  pages        = {361--371},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9374-z},
  doi          = {10.1007/S10623-010-9374-Z},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShaheenW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShumW10,
  author       = {Kenneth W. Shum and
                  Wing Shing Wong},
  title        = {A tight asymptotic bound on the size of constant-weight conflict-avoiding
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {1},
  pages        = {1--14},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9345-4},
  doi          = {10.1007/S10623-009-9345-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShumW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WalikarAS10,
  author       = {Hanumappa B. Walikar and
                  B. Devadas Acharya and
                  Shailaja S. Shirkol},
  title        = {Designs associated with maximum independent sets of a graph},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {1},
  pages        = {91--105},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9351-6},
  doi          = {10.1007/S10623-009-9351-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WalikarAS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangC10,
  author       = {Chunpeng Wang and
                  Xiao{-}song Chen},
  title        = {On extended algebraic immunity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {3},
  pages        = {271--281},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-010-9366-z},
  doi          = {10.1007/S10623-010-9366-Z},
  timestamp    = {Sun, 29 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WangC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZaveruchaS10,
  author       = {Gregory M. Zaverucha and
                  Douglas R. Stinson},
  title        = {Anonymity in shared symmetric key primitives},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {2},
  pages        = {139--160},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9357-0},
  doi          = {10.1007/S10623-009-9357-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZaveruchaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhangG10a,
  author       = {Xiande Zhang and
                  Gennian Ge},
  title        = {H-designs with the properties of resolvability or (1, 2)-resolvability},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {3},
  pages        = {225--256},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9363-2},
  doi          = {10.1007/S10623-009-9363-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhangG10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhaoC10,
  author       = {Zhengjun Zhao and
                  Xiwang Cao},
  title        = {A note on the reducibility of binary affine polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {1},
  pages        = {83--90},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9350-7},
  doi          = {10.1007/S10623-009-9350-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhaoC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouD10,
  author       = {Shenglin Zhou and
                  Huili Dong},
  title        = {Alternating groups and flag-transitive triplanes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {2},
  pages        = {117--126},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9355-2},
  doi          = {10.1007/S10623-009-9355-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouT10,
  author       = {Zhengchun Zhou and
                  Xiaohu Tang},
  title        = {Optimal and perfect difference systems of sets from \emph{q}-ary sequences
                  with difference-balanced property},
  journal      = {Des. Codes Cryptogr.},
  volume       = {57},
  number       = {2},
  pages        = {215--223},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10623-009-9362-3},
  doi          = {10.1007/S10623-009-9362-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics