Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc2.bht:"
@article{DBLP:journals/dcc/ArasuX92, author = {K. T. Arasu and Qing Xiang}, title = {On the Existence of Periodic Complementary Binary Sequences}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {3}, pages = {257--262}, year = {1992}, url = {https://doi.org/10.1007/BF00141970}, doi = {10.1007/BF00141970}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ArasuX92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bagchi92, author = {Bhaskar Bagchi}, title = {On Quasi-Symmetric Designs}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {1}, pages = {69--79}, year = {1992}, url = {https://doi.org/10.1007/BF00124210}, doi = {10.1007/BF00124210}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Bagchi92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BethH92, author = {Thomas Beth and Volker Hatz}, title = {Design Machines: Algebraically Well Described Interconnection Networks}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {3}, pages = {287--298}, year = {1992}, url = {https://doi.org/10.1007/BF00141973}, doi = {10.1007/BF00141973}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BethH92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlokhuisC92, author = {Aart Blokhuis and A. Robert Calderbank}, title = {Quasi-Symmetric Designs and the Smith Normal Form}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {2}, pages = {189--206}, year = {1992}, url = {https://doi.org/10.1007/BF00124897}, doi = {10.1007/BF00124897}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlokhuisC92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bryant92, author = {Darryn E. Bryant}, title = {Varieties of Quasigroups Arising from 2-Perfect m-Cycle Systems}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {2}, pages = {159--168}, year = {1992}, url = {https://doi.org/10.1007/BF00124894}, doi = {10.1007/BF00124894}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Bryant92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CaenGR92, author = {D. de Caen and Chris D. Godsil and Gordon F. Royle}, title = {On the p-Rank of Incidence Matrices and a Bound of Bruen and Ott}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {4}, pages = {391--394}, year = {1992}, url = {https://doi.org/10.1007/BF00125204}, doi = {10.1007/BF00125204}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CaenGR92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Cohen92, author = {Stephen D. Cohen}, title = {The Explicit Construction of Irreducible Polynomials over Finite Fields}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {2}, pages = {169--174}, year = {1992}, url = {https://doi.org/10.1007/BF00124895}, doi = {10.1007/BF00124895}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Cohen92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ColbournMPT92, author = {Charles J. Colbourn and Eric Mendelsohn and Cheryl E. Praeger and Vladimir D. Tonchev}, title = {Concerning Multiplier Automorphisms of Cyclic Steiner Triple Systems}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {3}, pages = {237--251}, year = {1992}, url = {https://doi.org/10.1007/BF00141968}, doi = {10.1007/BF00141968}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ColbournMPT92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DiffieOW92, author = {Whitfield Diffie and Paul C. van Oorschot and Michael J. Wiener}, title = {Authentication and Authenticated Key Exchanges}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {2}, pages = {107--125}, year = {1992}, url = {https://doi.org/10.1007/BF00124891}, doi = {10.1007/BF00124891}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DiffieOW92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FellowsK92, author = {Michael R. Fellows and Neal Koblitz}, title = {Self-Witnessing Polynomial-Time Complexity and Prime Factorization}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {3}, pages = {231--235}, year = {1992}, url = {https://doi.org/10.1007/BF00141967}, doi = {10.1007/BF00141967}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FellowsK92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GaoL92, author = {Shuhong Gao and Hendrik W. Lenstra Jr.}, title = {Optimal Normal Bases}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {4}, pages = {315--323}, year = {1992}, url = {https://doi.org/10.1007/BF00125200}, doi = {10.1007/BF00125200}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GaoL92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GreenoughH92, author = {Phil P. Greenough and Ray Hill}, title = {Optimal Ternary Quasi-Cyclic Codes}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {1}, pages = {81--91}, year = {1992}, url = {https://doi.org/10.1007/BF00124211}, doi = {10.1007/BF00124211}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GreenoughH92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HamadaHY92, author = {Noboru Hamada and Tor Helleseth and {\O}yvind Ytrehus}, title = {On the Construction of [q\({}^{\mbox{4}}\) + q\({}^{\mbox{2}}\) - q, 5, q\({}^{\mbox{4}}\) - q\({}^{\mbox{3}}\) + q\({}^{\mbox{2}}\) - 2q; q]-Codes Meeting the Griesmer Bound}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {3}, pages = {225--229}, year = {1992}, url = {https://doi.org/10.1007/BF00141966}, doi = {10.1007/BF00141966}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HamadaHY92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HillN92, author = {Ray Hill and David Ellis Newton}, title = {Optimal Ternary Linear Codes}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {2}, pages = {137--157}, year = {1992}, url = {https://doi.org/10.1007/BF00124893}, doi = {10.1007/BF00124893}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HillN92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Hou92, author = {Xiang{-}dong Hou}, title = {Some Inequalities about the Covering Radius of Reed-Muller Codes}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {3}, pages = {215--224}, year = {1992}, url = {https://doi.org/10.1007/BF00141965}, doi = {10.1007/BF00141965}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Hou92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JacksonW92, author = {Wen{-}Ai Jackson and Peter R. Wild}, title = {Relations between Two Perfect Ternary Sequence Constructions}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {4}, pages = {325--332}, year = {1992}, url = {https://doi.org/10.1007/BF00125201}, doi = {10.1007/BF00125201}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JacksonW92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Jedwab92, author = {Jonathan Jedwab}, title = {Generalized Perfect Arrays and \{Menon\} Difference Sets}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {1}, pages = {19--68}, year = {1992}, url = {https://doi.org/10.1007/BF00124209}, doi = {10.1007/BF00124209}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Jedwab92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JedwabL92, author = {Jonathan Jedwab and Sheelagh Lloyd}, title = {A Note on the Nonexistence of Barker Sequences}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {1}, pages = {93--97}, year = {1992}, url = {https://doi.org/10.1007/BF00124212}, doi = {10.1007/BF00124212}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JedwabL92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LandrockM92, author = {Peter Landrock and Olaf Manz}, title = {Classical Codes as Ideals in Group Algebras}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {3}, pages = {273--285}, year = {1992}, url = {https://doi.org/10.1007/BF00141972}, doi = {10.1007/BF00141972}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LandrockM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MeloneO92, author = {Nicola Melone and Udo Ott}, title = {On the Rank of Truncated Incidence Matrices of Linear Spaces}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {4}, pages = {307--313}, year = {1992}, url = {https://doi.org/10.1007/BF00125199}, doi = {10.1007/BF00125199}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MeloneO92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Pott92, author = {Alexander Pott}, title = {On Abelian Difference Set Codes}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {3}, pages = {263--271}, year = {1992}, url = {https://doi.org/10.1007/BF00141971}, doi = {10.1007/BF00141971}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Pott92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Schmidt92, author = {Bernhard Schmidt}, title = {Note on a Question by S. Bagchi and B. Bagchi}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {4}, pages = {395}, year = {1992}, url = {https://doi.org/10.1007/BF00125205}, doi = {10.1007/BF00125205}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Schmidt92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Shaw92, author = {Ronald Shaw}, title = {A Characterization of the Primals in \emph{PG}(m, 2)}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {3}, pages = {253--256}, year = {1992}, url = {https://doi.org/10.1007/BF00141969}, doi = {10.1007/BF00141969}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Shaw92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Spence92, author = {Edward Spence}, title = {A Complete Classification of Symmetric (31, 10, 3) Designs}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {2}, pages = {127--136}, year = {1992}, url = {https://doi.org/10.1007/BF00124892}, doi = {10.1007/BF00124892}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Spence92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Stinson92, author = {Douglas R. Stinson}, title = {Combinatorial Characterizations of Authentication Codes}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {2}, pages = {175--187}, year = {1992}, url = {https://doi.org/10.1007/BF00124896}, doi = {10.1007/BF00124896}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Stinson92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Stinson92a, author = {Douglas R. Stinson}, title = {An Explication of Secret Sharing Schemes}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {4}, pages = {357--390}, year = {1992}, url = {https://doi.org/10.1007/BF00125203}, doi = {10.1007/BF00125203}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Stinson92a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Wan92, author = {Zhe{-}xian Wan}, title = {Construction of Cartesian Authentication Codes from Unitary Geometry}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {4}, pages = {333--356}, year = {1992}, url = {https://doi.org/10.1007/BF00125202}, doi = {10.1007/BF00125202}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Wan92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YaghoobianB92, author = {Tomik Yaghoobian and Ian F. Blake}, title = {Hermitian Codes as Generalized Reed-Solomon Codes}, journal = {Des. Codes Cryptogr.}, volume = {2}, number = {1}, pages = {5--17}, year = {1992}, url = {https://doi.org/10.1007/BF00124208}, doi = {10.1007/BF00124208}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YaghoobianB92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.