Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/dcc:"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/dcc/AragonDGLRW24, author = {Nicolas Aragon and Victor Dyseryn and Philippe Gaborit and Pierre Loidreau and Julian Renner and Antonia Wachter{-}Zeh}, title = {LowMS: a new rank metric code-based {KEM} without ideal structure}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {4}, pages = {1075--1093}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01330-5}, doi = {10.1007/S10623-023-01330-5}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AragonDGLRW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ArceNazarioHORT24, author = {Rafael A. Arce{-}Nazario and Carlos Hern{\'{a}}ndez and Jos{\'{e}} R. Ortiz{-}Ubarri and Ivelisse Rubio and Jaziel Torres}, title = {Analysis and computation of multidimensional linear complexity of periodic arrays}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {709--722}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01274-w}, doi = {10.1007/S10623-023-01274-W}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ArceNazarioHORT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bamberg24, author = {John Bamberg}, title = {On the 430-cap of rmPG(6,4) having two intersection sizes with respect to hyperplanes}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {495--503}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01318-1}, doi = {10.1007/S10623-023-01318-1}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Bamberg24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BapicPPP24, author = {Amar Bapic and Enes Pasalic and Alexandr Polujan and Alexander Pott}, title = {Vectorial Boolean functions with the maximum number of bent components beyond the Nyberg's bound}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {531--552}, year = {2024}, url = {https://doi.org/10.1007/s10623-022-01180-7}, doi = {10.1007/S10623-022-01180-7}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BapicPPP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartzJR24, author = {Hannes Bartz and Thomas Jerkovits and Johan Rosenkilde}, title = {Fast K{\"{o}}tter-Nielsen-H{\o}holdt interpolation over skew polynomial rings and its application in coding theory}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {435--465}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01315-4}, doi = {10.1007/S10623-023-01315-4}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BartzJR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeregHMS24, author = {Sergey Bereg and Mohammadreza Haghpanah and Brian Malouf and Ivan Hal Sudborough}, title = {Improved bounds for permutation arrays under Chebyshev distance}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {4}, pages = {1023--1039}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01326-1}, doi = {10.1007/S10623-023-01326-1}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeregHMS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BhattacharjeeBDNR24, author = {Arghya Bhattacharjee and Ritam Bhaumik and Avijit Dutta and Mridul Nandi and Anik Raychaudhuri}, title = {{BBB} security for 5-round even-Mansour-based key-alternating Feistel ciphers}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {1}, pages = {13--49}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01288-4}, doi = {10.1007/S10623-023-01288-4}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BhattacharjeeBDNR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BhuniaFVV24, author = {Dipak K. Bhunia and Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba and Carlos Vela and Merc{\`{e}} Villanueva}, title = {On the equivalence of {\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{ps\}{\textdollar}-linear generalized Hadamard codes}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {4}, pages = {999--1022}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01325-2}, doi = {10.1007/S10623-023-01325-2}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BhuniaFVV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CanJR24, author = {Mahir Bilen Can and Roy Joshua and Girivaru V. Ravindra}, title = {Defects of codes from higher dimensional algebraic varieties}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {477--494}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01317-2}, doi = {10.1007/S10623-023-01317-2}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CanJR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CeriaM24, author = {Michela Ceria and Teo Mora}, title = {Towards a Gr{\"{o}}bner-free approach to coding}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {1}, pages = {179--204}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01302-9}, doi = {10.1007/S10623-023-01302-9}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CeriaM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChaillouxE24, author = {Andr{\'{e}} Chailloux and Simona Etinski}, title = {On the (in)security of optimized Stern-like signature schemes}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {803--832}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01329-y}, doi = {10.1007/S10623-023-01329-Y}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChaillouxE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CheriereMRM24, author = {Agathe Cheriere and Lina Mortajine and Tania Richmond and Nadia El Mrabet}, title = {Exploiting ROLLO's constant-time implementations with a single-trace analysis}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {587--608}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01227-3}, doi = {10.1007/S10623-023-01227-3}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CheriereMRM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Coolsaet24, author = {Kris Coolsaet}, title = {Nonsingular hypercubes and nonintersecting hyperboloids}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {1}, pages = {93--112}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01297-3}, doi = {10.1007/S10623-023-01297-3}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Coolsaet24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DastbastehL24, author = {Reza Dastbasteh and Petr Lisonek}, title = {New quantum codes from self-dual codes over {\textdollar}{\textbackslash}mathbb \{F\}{\_}4{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {787--801}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01306-5}, doi = {10.1007/S10623-023-01306-5}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DastbastehL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DavidNS24, author = {Nicolas David and Mar{\'{\i}}a Naya{-}Plasencia and Andr{\'{e}} Schrottenloher}, title = {Quantum impossible differential attacks: applications to {AES} and {SKINNY}}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {723--751}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01280-y}, doi = {10.1007/S10623-023-01280-Y}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DavidNS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DonovanGY24, author = {Diane M. Donovan and Mike J. Grannell and Emine Sule Yazici}, title = {On maximal partial Latin hypercubes}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {419--433}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01314-5}, doi = {10.1007/S10623-023-01314-5}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DonovanGY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ducas24, author = {L{\'{e}}o Ducas}, title = {Provable lattice reduction of {\textdollar}{\textbackslash}mathbb \{Z\}n{\textdollar} with blocksize n/2}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {4}, pages = {909--916}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01320-7}, doi = {10.1007/S10623-023-01320-7}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ducas24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DunkelmanKRS24, author = {Orr Dunkelman and Nathan Keller and Eyal Ronen and Adi Shamir}, title = {Quantum time/memory/data tradeoff attacks}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {1}, pages = {159--177}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01300-x}, doi = {10.1007/S10623-023-01300-X}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DunkelmanKRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DuttaM24, author = {Suman Dutta and Subhamoy Maitra}, title = {Introducing nega-Forrelation: quantum algorithms in analyzing nega-Hadamard and nega-crosscorrelation spectra}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {863--883}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01346-x}, doi = {10.1007/S10623-023-01346-X}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DuttaM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FanWX24, author = {Cuiling Fan and An Wang and Li Xu}, title = {New classes of {NMDS} codes with dimension 3}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {397--418}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01313-6}, doi = {10.1007/S10623-023-01313-6}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FanWX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GavrilyukS24, author = {Alexander L. Gavrilyuk and Sho Suda}, title = {Uniqueness of an association scheme related to the Witt design on 11 points}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {1}, pages = {205--209}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01303-8}, doi = {10.1007/S10623-023-01303-8}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GavrilyukS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GologluK24, author = {Faruk G{\"{o}}loglu and Lukas K{\"{o}}lsch}, title = {Counting the number of non-isotopic Taniguchi semifields}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {681--694}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01262-0}, doi = {10.1007/S10623-023-01262-0}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GologluK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GranerK24, author = {Anna{-}Maurin Graner and Gohar M. Kyureghyan}, title = {Constructing irreducible polynomials recursively with a reverse composition method}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {695--708}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01271-z}, doi = {10.1007/S10623-023-01271-Z}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GranerK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GruicaHRW24, author = {Anina Gruica and Anna{-}Lena Horlemann and Alberto Ravagnani and Nadja Willenborg}, title = {Densities of codes of various linearity degrees in translation-invariant metric spaces}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {609--637}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01236-2}, doi = {10.1007/S10623-023-01236-2}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GruicaHRW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuneriOS24, author = {Cem G{\"{u}}neri and Ferruh {\"{O}}zbudak and Selcen Sayici}, title = {On subfield subcodes obtained from restricted evaluation codes}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {667--680}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01261-1}, doi = {10.1007/S10623-023-01261-1}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuneriOS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HeL24, author = {Boyi He and Qunying Liao}, title = {The properties and the error-correcting pair for lengthened {GRS} codes}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {1}, pages = {211--225}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01304-7}, doi = {10.1007/S10623-023-01304-7}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/HeL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HodzicRA24, author = {Samir Hodzic and Arnab Roy and Elena Andreeva}, title = {Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {227--257}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01305-6}, doi = {10.1007/S10623-023-01305-6}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HodzicRA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HormannB24, author = {Felicitas H{\"{o}}rmann and Hannes Bartz}, title = {Interpolation-based decoding of folded variants of linearized and skew Reed-Solomon codes}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {553--586}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01214-8}, doi = {10.1007/S10623-023-01214-8}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HormannB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kavut24, author = {Sel{\c{c}}uk Kavut}, title = {Modified Patterson-Wiedemann construction}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {653--666}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01248-y}, doi = {10.1007/S10623-023-01248-Y}, timestamp = {Sat, 27 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kavut24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KolomeecB24, author = {Nikolay Kolomeec and Denis Bykov}, title = {On the image of an affine subspace under the inverse function within a finite field}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {467--476}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01316-3}, doi = {10.1007/S10623-023-01316-3}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/KolomeecB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kutsenko24, author = {Aleksandr Kutsenko}, title = {Decomposing self-dual bent functions}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {1}, pages = {113--144}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01298-2}, doi = {10.1007/S10623-023-01298-2}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Kutsenko24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuLQ24, author = {Hai Liu and Chengju Li and Haifeng Qian}, title = {Parameters of several families of binary duadic codes and their related codes}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {1}, pages = {1--12}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01285-7}, doi = {10.1007/S10623-023-01285-7}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiuLQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LuZ24, author = {Ziwei Lu and Shenglin Zhou}, title = {Flag-transitive symmetric 2-designs of prime order}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {259--266}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01307-4}, doi = {10.1007/S10623-023-01307-4}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LuZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LuZ24a, author = {Jiqiang Lu and Wenchang Zhou}, title = {Improved meet-in-the-middle attack on 10 rounds of the {AES-256} block cipher}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {4}, pages = {957--973}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01323-4}, doi = {10.1007/S10623-023-01323-4}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LuZ24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LyuLLLC24, author = {Shanxiang Lyu and Ling Liu and Cong Ling and Junzuo Lai and Hao Chen}, title = {Lattice codes for lattice-based {PKE}}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {4}, pages = {917--939}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01321-6}, doi = {10.1007/S10623-023-01321-6}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LyuLLLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaL24, author = {Wen Ma and Jinquan Luo}, title = {Codes with respect to weighted poset block metric}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {341--363}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01311-8}, doi = {10.1007/S10623-023-01311-8}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MaL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MiezakiM24, author = {Tsuyoshi Miezaki and Akihiro Munemasa}, title = {Jacobi polynomials and harmonic weight enumerators of the first-order Reed-Muller codes and the extended Hamming codes}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {4}, pages = {1041--1049}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01327-0}, doi = {10.1007/S10623-023-01327-0}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MiezakiM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MunemasaB24, author = {Akihiro Munemasa and Rowena Alma L. Betty}, title = {Classification of extremal type {II} {\textdollar}{\textbackslash}mathbb \{Z\}{\_}4{\textdollar}-codes of length 24}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {771--785}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01293-7}, doi = {10.1007/S10623-023-01293-7}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MunemasaB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PanQW24, author = {Jiaxin Pan and Chen Qian and Benedikt Wagner}, title = {Generic constructions of master-key {KDM} secure attribute-based encryption}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {1}, pages = {51--92}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01296-4}, doi = {10.1007/S10623-023-01296-4}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/PanQW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PotapovTT24, author = {Vladimir N. Potapov and Anna A. Taranenko and Yuriy V. Tarannikov}, title = {An asymptotic lower bound on the number of bent functions}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {639--651}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01239-z}, doi = {10.1007/S10623-023-01239-Z}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PotapovTT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PratiharR24, author = {Rakhi Pratihar and Tovohery Hajatiana Randrianarisoa}, title = {Antipodal two-weight rank metric codes}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {753--769}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01283-9}, doi = {10.1007/S10623-023-01283-9}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PratiharR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ReijndersST24, author = {Krijn Reijnders and Simona Samardjiska and Monika Trimoska}, title = {Hardness estimates of the code equivalence problem in the rank metric}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {833--862}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01338-x}, doi = {10.1007/S10623-023-01338-X}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ReijndersST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SagarS24, author = {Vidya Sagar and Ritumoni Sarma}, title = {Minimal and optimal binary codes obtained using C\({}_{\mbox{D}}\)-construction over the non-unital ring {I}}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {1}, pages = {145--157}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01299-1}, doi = {10.1007/S10623-023-01299-1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/SagarS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SuTH24, author = {Xiaowei Su and Zihong Tian and Guohui Hao}, title = {Determination of the sizes of optimal geometric orthogonal codes with parameters (n{\(^\times\)} m,k,{\(\lambda\)} ,k-1)}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {365--395}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01312-7}, doi = {10.1007/S10623-023-01312-7}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SuTH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TakahashiHO24, author = {Kota Takahashi and Keitaro Hashimoto and Wakaha Ogata}, title = {Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {277--301}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01309-2}, doi = {10.1007/S10623-023-01309-2}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/TakahashiHO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TimpanellaZ24, author = {Marco Timpanella and Giovanni Zini}, title = {On a family of linear {MRD} codes with parameters [8{\(^\times\)} 8,16,7]\({}_{\mbox{q}}\)}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {507--530}, year = {2024}, url = {https://doi.org/10.1007/s10623-022-01179-0}, doi = {10.1007/S10623-022-01179-0}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TimpanellaZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/VeitchS24, author = {Shannon Veitch and Douglas R. Stinson}, title = {Unconditionally secure non-malleable secret sharing and circular external difference families}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {4}, pages = {941--956}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01322-5}, doi = {10.1007/S10623-023-01322-5}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/VeitchS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WieseB24, author = {Moritz Wiese and Holger Boche}, title = {{\(\epsilon\)}-Almost collision-flat universal hash functions and mosaics of designs}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {4}, pages = {975--998}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01324-3}, doi = {10.1007/S10623-023-01324-3}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WieseB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WuY24, author = {Danyao Wu and Pingzhi Yuan}, title = {Permutation polynomials and their compositional inverses over finite fields by a local method}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {267--276}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01308-3}, doi = {10.1007/S10623-023-01308-3}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WuY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/X24, title = {Editorial Note: Coding and Cryptography 2022}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {3}, pages = {505}, year = {2024}, url = {https://doi.org/10.1007/s10623-024-01365-2}, doi = {10.1007/S10623-024-01365-2}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/X24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuLCX24, author = {Guangkui Xu and Gaojun Luo and Xiwang Cao and Heqian Xu}, title = {Hulls of linear codes from simplex codes}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {4}, pages = {1095--1112}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01331-4}, doi = {10.1007/S10623-023-01331-4}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XuLCX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuWMGF24, author = {Deng{-}Ming Xu and Gang Wang and Sihem Mesnager and You Gao and Fang{-}Wei Fu}, title = {Jacobi sums over Galois rings of arbitrary characters and their applications in constructing asymptotically optimal codebooks}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {4}, pages = {1051--1073}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01328-z}, doi = {10.1007/S10623-023-01328-Z}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XuWMGF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YadavS24, author = {Monika Yadav and Anuradha Sharma}, title = {Construction and enumeration of self-orthogonal and self-dual codes over Galois rings of even characteristic}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {2}, pages = {303--339}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01310-9}, doi = {10.1007/S10623-023-01310-9}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/YadavS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YanZ24, author = {Qianqian Yan and Junling Zhou}, title = {Mutually disjoint Steiner systems from {BCH} codes}, journal = {Des. Codes Cryptogr.}, volume = {92}, number = {4}, pages = {885--907}, year = {2024}, url = {https://doi.org/10.1007/s10623-023-01319-0}, doi = {10.1007/S10623-023-01319-0}, timestamp = {Wed, 24 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YanZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/00010D23, author = {Xiaoqiang Wang and Zhonghua Sun and Cunsheng Ding}, title = {Two families of negacyclic {BCH} codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2395--2420}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01208-6}, doi = {10.1007/S10623-023-01208-6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/00010D23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/0001L23, author = {Tao Feng and Jianbing Lu}, title = {On finite generalized quadrangles with rmPSL(2, q) as an automorphism group}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {6}, pages = {2347--2364}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01203-x}, doi = {10.1007/S10623-023-01203-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/0001L23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/000223, author = {Marco Pavone}, title = {Subset sums and block designs in a finite vector space}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2585--2603}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01213-9}, doi = {10.1007/S10623-023-01213-9}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/000223.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AguirreCN23, author = {Josimar J. R. Aguirre and C{\'{\i}}cero Carvalho and Victor G. L. Neumann}, title = {About r-primitive and k-normal elements in finite fields}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {115--126}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01101-8}, doi = {10.1007/S10623-022-01101-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AguirreCN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AkreAHP23, author = {Dev Akre and Nuh Aydin and Matthew J. Harrington and Saurav R. Pandey}, title = {A generalization of cyclic code equivalence algorithm to constacyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {763--777}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01124-1}, doi = {10.1007/S10623-022-01124-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AkreAHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AmesHIV23, author = {Scott Ames and Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, title = {Ligero: lightweight sublinear arguments without a trusted setup}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3379--3424}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01222-8}, doi = {10.1007/S10623-023-01222-8}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AmesHIV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AnbarKM23, author = {Nurdag{\"{u}}l Anbar and Tekg{\"{u}}l Kalayci and Wilfried Meidl}, title = {Generalized semifield spreads}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {545--562}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01115-2}, doi = {10.1007/S10623-022-01115-2}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AnbarKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AranhaHG23, author = {Diego F. Aranha and Youssef El Housni and Aurore Guillevic}, title = {A survey of elliptic curves for proof systems}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3333--3378}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01135-y}, doi = {10.1007/S10623-022-01135-Y}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AranhaHG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ArayaH23, author = {Makoto Araya and Masaaki Harada}, title = {Some restrictions on the weight enumerators of near-extremal ternary self-dual codes and quaternary Hermitian self-dual codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1813--1843}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01172-7}, doi = {10.1007/S10623-022-01172-7}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ArayaH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ArayaHM23, author = {Makoto Araya and Masaaki Harada and Koji Momihara}, title = {Hadamard matrices related to a certain series of ternary self-dual codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {795--805}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01127-y}, doi = {10.1007/S10623-022-01127-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ArayaHM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ArmarioBE23, author = {Jos{\'{e}} Andr{\'{e}}s Armario and Iv{\'{a}}n Bailera and Ronan Egan}, title = {Butson full propelinear codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {333--351}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01110-7}, doi = {10.1007/S10623-022-01110-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ArmarioBE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AsgarliGY23, author = {Shamil Asgarli and Dragos Ghioca and Chi Hoi Yip}, title = {Plane curves giving rise to blocking sets over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3643--3669}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01264-y}, doi = {10.1007/S10623-023-01264-Y}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AsgarliGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AswadP23, author = {Haetham Al Aswad and C{\'{e}}cile Pierrot}, title = {Individual discrete logarithm with sublattice reduction}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {4059--4091}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01282-w}, doi = {10.1007/S10623-023-01282-W}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AswadP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AttrapadungHHMS23, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Ryo Hiromasa and Takahiro Matsuda and Jacob C. N. Schuldt}, title = {Maliciously circuit-private multi-key {FHE} and {MPC} based on {LWE}}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1645--1684}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01160-x}, doi = {10.1007/S10623-022-01160-X}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AttrapadungHHMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AugotBN23, author = {Daniel Augot and Sarah Bordage and Jade Nardi}, title = {Efficient multivariate low-degree tests via interactive oracle proofs of proximity for polynomial codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {1111--1151}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01134-z}, doi = {10.1007/S10623-022-01134-Z}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AugotBN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bagherpour23, author = {Bagher Bagherpour}, title = {A bivariate polynomial-based cryptographic hard problem and its applications}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2723--2735}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01229-1}, doi = {10.1007/S10623-023-01229-1}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Bagherpour23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ball23, author = {Simeon Ball}, title = {Grassl-R{\"{o}}tteler cyclic and consta-cyclic {MDS} codes are generalised Reed-Solomon codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1685--1694}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01174-5}, doi = {10.1007/S10623-022-01174-5}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ball23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BannaiMN23, author = {Eiichi Bannai and Tsuyoshi Miezaki and Hiroyuki Nakasora}, title = {A note on the Assmus-Mattson theorem for some binary codes {II}}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2509--2522}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01212-w}, doi = {10.1007/S10623-023-01212-W}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BannaiMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bao23, author = {Jingjun Bao}, title = {Constructions of column-orthogonal strong orthogonal arrays via matchings of bipartite graphs}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3741--3755}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01267-9}, doi = {10.1007/S10623-023-01267-9}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Bao23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BardetBBGT23, author = {Magali Bardet and Pierre Briaud and Maxime Bros and Philippe Gaborit and Jean{-}Pierre Tillich}, title = {Revisiting algebraic attacks on MinRank and on the rank decoding problem}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3671--3707}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01265-x}, doi = {10.1007/S10623-023-01265-X}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BardetBBGT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartoliFG23, author = {Daniele Bartoli and Giuliana Fatabbi and Francesco Ghiandoni}, title = {On the exceptionality of rational {APN} functions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3167--3186}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01246-0}, doi = {10.1007/S10623-023-01246-0}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BartoliFG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BarwickHJ23, author = {Susan G. Barwick and Alice M. W. Hui and Wen{-}Ai Jackson}, title = {A geometric description of the Figueroa plane}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1581--1593}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01158-5}, doi = {10.1007/S10623-022-01158-5}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BarwickHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BaumDSW23, author = {Carsten Baum and Samuel Dittmer and Peter Scholl and Xiao Wang}, title = {Sok: vector OLE-based zero-knowledge protocols}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3527--3561}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01292-8}, doi = {10.1007/S10623-023-01292-8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BaumDSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeierleC23, author = {Christof Beierle and Claude Carlet}, title = {Gold functions and switched cube functions are not 0-extendable in dimension n {\textgreater} 5}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {433--449}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01111-6}, doi = {10.1007/S10623-022-01111-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeierleC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BenarrochCFGK23, author = {Daniel Benarroch and Matteo Campanelli and Dario Fiore and Kobi Gurkan and Dimitris Kolonelos}, title = {Zero-knowledge proofs for set membership: efficient, succinct, modular}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3457--3525}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01245-1}, doi = {10.1007/S10623-023-01245-1}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BenarrochCFGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BettiBGSV23, author = {Livia Betti and Jim Brown and Fernando Gaitan and Aiyana Spear and Japheth Varlack}, title = {Lattices in real quadratic fields and associated theta series arising from codes over bfF\({}_{\mbox{4}}\) and bfF\({}_{\mbox{2}}\) {\(^\times\)} bfF\({}_{\mbox{2}}\)}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3305--3319}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01258-w}, doi = {10.1007/S10623-023-01258-W}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BettiBGSV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeullensDKLP23, author = {Ward Beullens and Samuel Dobson and Shuichi Katsumata and Yi{-}Fu Lai and Federico Pintore}, title = {Group signatures and more from isogenies and lattices: generic, simple, and efficient}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {6}, pages = {2141--2200}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01192-x}, doi = {10.1007/S10623-023-01192-X}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeullensDKLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeullensFGP23, author = {Ward Beullens and Luca De Feo and Steven D. Galbraith and Christophe Petit}, title = {Proving knowledge of isogenies: a survey}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3425--3456}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01243-3}, doi = {10.1007/S10623-023-01243-3}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BeullensFGP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BidouxGKM23, author = {Lo{\"{\i}}c Bidoux and Philippe Gaborit and Mukul Kulkarni and V{\'{\i}}ctor Mateu}, title = {Code-based signatures from new proofs of knowledge for the syndrome decoding problem}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {497--544}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01114-3}, doi = {10.1007/S10623-022-01114-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BidouxGKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BoeckV23, author = {Maarten De Boeck and Geertrui Van de Voorde}, title = {Embedded antipodal planes and the minimum weight of the dual code of points and lines in projective planes of order p\({}^{\mbox{2}}\)}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {895--920}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01131-2}, doi = {10.1007/S10623-022-01131-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BoeckV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BouvierCP23, author = {Cl{\'{e}}mence Bouvier and Anne Canteaut and L{\'{e}}o Perrin}, title = {On the algebraic degree of iterated power functions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {997--1033}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01136-x}, doi = {10.1007/S10623-022-01136-X}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BouvierCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ByrneCIJS23, author = {Eimear Byrne and Michela Ceria and Sorina Ionica and Relinde P. M. J. Jurrius and Elif Sa{\c{c}}ikara}, title = {Constructions of new matroids and designs over {\textdollar}\{{\textbackslash}mathbb \{F\}\}{\_}q{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {451--473}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01087-3}, doi = {10.1007/S10623-022-01087-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ByrneCIJS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ByrneDLPP23, author = {Isabel Byrne and Natalie Dodson and Ryan Lynch and Eric Pab{\'{o}}n{-}Cancel and Fernando Pi{\~{n}}ero{-}Gonz{\'{a}}lez}, title = {Improving the minimum distance bound of Trace Goppa codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2649--2663}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01216-6}, doi = {10.1007/S10623-023-01216-6}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ByrneDLPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CaoWPC23, author = {Jinzheng Cao and Jian Weng and Yanbin Pan and Qingfeng Cheng}, title = {Generalized attack on {ECDSA:} known bits in arbitrary positions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3803--3823}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01269-7}, doi = {10.1007/S10623-023-01269-7}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CaoWPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletKN23, author = {Claude Carlet and Rebeka Kiss and G{\'{a}}bor P{\'{e}}ter Nagy}, title = {Simplicity conditions for binary orthogonal arrays}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {151--163}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01105-4}, doi = {10.1007/S10623-022-01105-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarusoD23, author = {Xavier Caruso and Amaury Durand}, title = {Duals of linearized Reed-Solomon codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {241--271}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01102-7}, doi = {10.1007/S10623-022-01102-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarusoD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CastoldiMCS23, author = {Andr{\'{e}} Guerino Castoldi and Anderson Novaes Martinh{\~{a}}o and Emerson L. Monte Carmelo and Ot{\'{a}}vio J. N. T. N. dos Santos}, title = {Covering schemes of strength t}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3563--3580}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01252-2}, doi = {10.1007/S10623-023-01252-2}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CastoldiMCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CeriaCMP23, author = {Michela Ceria and Antonio Cossidente and Giuseppe Marino and Francesco Pavese}, title = {On near-MDS codes and caps}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {1095--1110}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01141-0}, doi = {10.1007/S10623-022-01141-0}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CeriaCMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChakrabortyMO23, author = {Himadri Shekhar Chakraborty and Tsuyoshi Miezaki and Manabu Oura}, title = {Harmonic Tutte polynomials of matroids}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {6}, pages = {2223--2236}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01196-7}, doi = {10.1007/S10623-023-01196-7}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChakrabortyMO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CharaKMTW23, author = {Mar{\'{\i}}a Chara and Sam Kottler and Beth Malmskog and Bianca Thompson and Mckenzie West}, title = {Minimum distance and parameter ranges of locally recoverable codes with availability from fiber products of curves}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {2077--2105}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01189-6}, doi = {10.1007/S10623-023-01189-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CharaKMTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CheeLVZ23, author = {Yeow Meng Chee and Alan Chi Hung Ling and Van Khu Vu and Hui Zhang}, title = {Scheduling to reduce close contacts: resolvable grid graph decomposition and packing}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {4093--4106}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01291-9}, doi = {10.1007/S10623-023-01291-9}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CheeLVZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Chen23, author = {Hao Chen}, title = {New {MDS} entanglement-assisted quantum codes from {MDS} Hermitian self-orthogonal codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2665--2676}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01232-6}, doi = {10.1007/S10623-023-01232-6}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Chen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenN23, author = {Guangzhou Chen and Xiaodong Niu}, title = {Constructions for new orthogonal arrays based on large sets of orthogonal arrays}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2605--2625}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01217-5}, doi = {10.1007/S10623-023-01217-5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CorrellS23, author = {Bill Correll Jr. and Christopher N. Swanson}, title = {Difference-based structural properties of costas arrays}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {779--794}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01125-0}, doi = {10.1007/S10623-022-01125-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CorrellS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CrnkovicS23, author = {Dean Crnkovic and Andrea Svob}, title = {{LCD} subspace codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3215--3226}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01251-3}, doi = {10.1007/S10623-023-01251-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CrnkovicS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DaiLZZ23, author = {Yu Dai and Kaizhan Lin and Chang{-}An Zhao and Zijian Zhou}, title = {Fast subgroup membership testings for {\textdollar}{\textbackslash}mathbb \{G\}{\_}1{\textdollar}, {\textdollar}{\textbackslash}mathbb \{G\}{\_}2{\textdollar} and {\textdollar}{\textbackslash}mathbb \{G\}{\_}T{\textdollar} on pairing-friendly curves}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3141--3166}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01223-7}, doi = {10.1007/S10623-023-01223-7}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DaiLZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DattaDM23, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Short attribute-based signatures for arbitrary Turing machines from standard assumptions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1845--1872}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01163-8}, doi = {10.1007/S10623-022-01163-8}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DattaDM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DattaJ23, author = {Mrinmoy Datta and Trygve Johnsen}, title = {Codes from symmetric polynomials}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {747--761}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01123-2}, doi = {10.1007/S10623-022-01123-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DattaJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DattaP23, author = {Pratish Datta and Tapas Pal}, title = {(Compact) Adaptively secure {FE} for attribute-weighted sums from k-Lin}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {9}, pages = {2917--3034}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01219-3}, doi = {10.1007/S10623-023-01219-3}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DattaP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DelgadoJA23, author = {Moises Delgado and Heeralal Janwa and Carlos Agrinsoni}, title = {Some new techniques and progress towards the resolution of the conjecture of exceptional {APN} functions and absolutely irreducibility of a class of polynomials}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2481--2495}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01202-y}, doi = {10.1007/S10623-023-01202-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DelgadoJA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DingLLW23, author = {Jian Ding and Changlu Lin and Fuchun Lin and Huaxiong Wang}, title = {Full threshold change range of threshold changeable secret sharing}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2421--2447}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01205-9}, doi = {10.1007/S10623-023-01205-9}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DingLLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DoulgerakisLW23, author = {Emmanouil Doulgerakis and Thijs Laarhoven and Benne de Weger}, title = {The irreducible vectors of a lattice}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {609--643}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01119-y}, doi = {10.1007/S10623-022-01119-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DoulgerakisLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DuJM23, author = {Xiaoni Du and Wengang Jin and Sihem Mesnager}, title = {Several classes of new weakly regular bent functions outside {\(\mathscr{R}\)}{\(\mathscr{F}\)}, their duals and some related (minimal) codes with few weights}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {6}, pages = {2273--2307}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01198-5}, doi = {10.1007/S10623-023-01198-5}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DuJM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DucoatO23, author = {J{\'{e}}r{\^{o}}me Ducoat and Fr{\'{e}}d{\'{e}}rique E. Oggier}, title = {Rank weight hierarchy of some classes of polynomial codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1627--1644}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01181-6}, doi = {10.1007/S10623-022-01181-6}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DucoatO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DupinMR23, author = {Aur{\'{e}}lien Dupin and Pierrick M{\'{e}}aux and M{\'{e}}lissa Rossi}, title = {On the algebraic immunity - resiliency trade-off, implications for Goldreich's pseudorandom generator}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {9}, pages = {3035--3079}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01220-w}, doi = {10.1007/S10623-023-01220-W}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DupinMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DuranteLP23, author = {Nicola Durante and Giovanni Longobardi and Valentina Pepe}, title = {{\textdollar}(d,{\textbackslash}varvec\{{\textbackslash}sigma \}){\textdollar}-Veronese variety and some applications}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1911--1921}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01186-9}, doi = {10.1007/S10623-023-01186-9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DuranteLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ElsholtzKL23, author = {Christian Elsholtz and Benjamin Klahn and Gabriel F. Lipnik}, title = {Large subsets of {\textdollar}{\textbackslash}mathbb \{Z\}{\_}mn{\textdollar} without arithmetic progressions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1443--1452}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01145-w}, doi = {10.1007/S10623-022-01145-W}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ElsholtzKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EriguchiKN23, author = {Reo Eriguchi and Noboru Kunihiro and Koji Nuida}, title = {Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1751--1778}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01177-2}, doi = {10.1007/S10623-022-01177-2}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EriguchiKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FangCXFC23, author = {Weijun Fang and Bin Chen and Shu{-}Tao Xia and Fang{-}Wei Fu and Xiangyu Chen}, title = {Perfect LRCs and k-optimal LRCs}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1209--1232}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01148-7}, doi = {10.1007/S10623-022-01148-7}, timestamp = {Sat, 01 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FangCXFC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FeneuilJR23, author = {Thibauld Feneuil and Antoine Joux and Matthieu Rivain}, title = {Shared permutation for syndrome decoding: new zero-knowledge protocol and code-based signature}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {563--608}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01116-1}, doi = {10.1007/S10623-022-01116-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FeneuilJR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Feng23, author = {Rongquan Feng}, title = {Obituary of Professor Zhexian Wan}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {9}, pages = {2809--2810}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01273-x}, doi = {10.1007/S10623-023-01273-X}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Feng23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GadouleauMP23, author = {Maximilien Gadouleau and Luca Mariot and Stjepan Picek}, title = {Bent functions in the partial spread class generated by linear recurring sequences}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {63--82}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01097-1}, doi = {10.1007/S10623-022-01097-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GadouleauMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GalbraithGRS23, author = {Steven D. Galbraith and Rosario Gennaro and Carla R{\`{a}}fols and Ron Steinfeld}, title = {Guest editorial: Special issue on Mathematics of Zero-Knowledge}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3331--3332}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01260-2}, doi = {10.1007/S10623-023-01260-2}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GalbraithGRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GillW23, author = {Michael J. Gill and Ian M. Wanless}, title = {Pairs of {MOLS} of order ten satisfying non-trivial relations}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1293--1313}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01149-6}, doi = {10.1007/S10623-022-01149-6}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GillW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GlasbyIM23, author = {S. P. Glasby and Ferdinand Ihringer and Sam Mattheus}, title = {The proportion of non-degenerate complementary subspaces in classical spaces}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {9}, pages = {2879--2891}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01235-3}, doi = {10.1007/S10623-023-01235-3}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GlasbyIM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GolalizadehS23, author = {Somayyeh Golalizadeh and Nasrin Soltankhah}, title = {On the fourth weight of generalized Reed-Muller codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {3857--3879}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01276-8}, doi = {10.1007/S10623-023-01276-8}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GolalizadehS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GomezTorrecillasLN23, author = {Jos{\'{e}} G{\'{o}}mez{-}Torrecillas and Francisco Javier Lobillo and Gabriel Navarro}, title = {Skew differential Goppa codes and their application to Mceliece cryptosystem}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {3995--4017}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01286-6}, doi = {10.1007/S10623-023-01286-6}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GomezTorrecillasLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Gordon23, author = {Daniel M. Gordon}, title = {Signed difference sets}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {2107--2115}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01171-8}, doi = {10.1007/S10623-022-01171-8}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Gordon23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GorlaL23, author = {Elisa Gorla and Cristina Landolina}, title = {Quasi optimal anticodes: structure and invariants}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {2005--2020}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01188-7}, doi = {10.1007/S10623-023-01188-7}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GorlaL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuoWG23, author = {Fei Guo and Zilong Wang and Guang Gong}, title = {Several secondary methods for constructing bent-negabent functions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {971--995}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01133-0}, doi = {10.1007/S10623-022-01133-0}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuoWG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Gyarmati23, author = {M{\'{a}}t{\'{e}} Gyarmati}, title = {Secret sharing on regular bipartite access structures}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1951--1971}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01187-8}, doi = {10.1007/S10623-023-01187-8}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Gyarmati23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HammerL23, author = {James M. Hammer and John Lorch}, title = {Diagonal cellular factor pair Latin squares}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {6}, pages = {2309--2322}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01200-0}, doi = {10.1007/S10623-023-01200-0}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HammerL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HanMJHZ23, author = {Hui Han and Jianjun Mu and Xiaopeng Jiao and Yu{-}Cheng He and Zhanzhan Zhao}, title = {Constructions of multi-permutation codes correcting a single burst of deletions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1923--1934}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01190-z}, doi = {10.1007/S10623-023-01190-Z}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HanMJHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HengLL23, author = {Ziling Heng and Dexiang Li and Fenjin Liu}, title = {Ternary self-orthogonal codes from weakly regular bent functions and their application in {LCD} Codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {3953--3976}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01287-5}, doi = {10.1007/S10623-023-01287-5}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/HengLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Hoepman23, author = {Jaap{-}Henk Hoepman}, title = {Two faces of blindness}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2705--2721}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01228-2}, doi = {10.1007/S10623-023-01228-2}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Hoepman23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HollmannKRS23, author = {Henk D. L. Hollmann and Karan Khathuria and Ago{-}Erik Riet and Vitaly Skachek}, title = {On some batch code properties of the simplex code}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1595--1605}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01173-6}, doi = {10.1007/S10623-022-01173-6}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HollmannKRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HongC23, author = {Xiaoqin Hong and Xiwang Cao}, title = {Improved generalized block inserting construction of constant dimension codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {475--495}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01117-0}, doi = {10.1007/S10623-022-01117-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HongC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuLXZT23, author = {Zhao Hu and Nian Li and Linjie Xu and Xiangyong Zeng and Xiaohu Tang}, title = {The differential spectrum and boomerang spectrum of a class of locally-APN functions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1695--1711}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01161-w}, doi = {10.1007/S10623-022-01161-W}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuLXZT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuangLZM23, author = {Zhengan Huang and Junzuo Lai and Gongxian Zeng and Xin Mu}, title = {Receiver selective opening security for identity-based encryption in the multi-challenge setting}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1233--1259}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01147-8}, doi = {10.1007/S10623-022-01147-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuangLZM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuangX23, author = {Hexiang Huang and Qing Xiang}, title = {Construction of storage codes of rate approaching one on triangle-free graphs}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {3901--3913}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01278-6}, doi = {10.1007/S10623-023-01278-6}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/HuangX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Iurlano23, author = {Enrico Iurlano}, title = {Growth of the perfect sequence covering array number}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1487--1494}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01168-3}, doi = {10.1007/S10623-022-01168-3}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Iurlano23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Jho023, author = {Nam{-}Su Jho and Jooyoung Lee}, title = {Partition and mix: generalizing the swap-or-not shuffle}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {6}, pages = {2237--2254}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01199-4}, doi = {10.1007/S10623-023-01199-4}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Jho023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Jiang23, author = {Yupeng Jiang}, title = {A relation between sequences generated by Golomb's preference algorithm}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {285--291}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01108-1}, doi = {10.1007/S10623-022-01108-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Jiang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JiaoHL23, author = {Lin Jiao and Yonglin Hao and Yongqiang Li}, title = {Guess-and-determine attacks on SNOW-Vi stream cipher}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {2021--2055}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01150-z}, doi = {10.1007/S10623-022-01150-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JiaoHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KatsumataTY23, author = {Shuichi Katsumata and Toi Tomita and Shota Yamada}, title = {Direct computation of branching programs and its applications to more efficient lattice-based cryptography}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {391--431}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01104-5}, doi = {10.1007/S10623-022-01104-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KatsumataTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KhaefiAK23, author = {Yasamin Khaefi and Zeinab Akhlaghi and Behrooz Khosravi}, title = {On the subgroup perfect codes in Cayley graphs}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {55--61}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01098-0}, doi = {10.1007/S10623-022-01098-0}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/KhaefiAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KharaghaniSZ23, author = {Hadi Kharaghani and Sho Suda and Vlad Zaitsev}, title = {On a class of optimal constant weight ternary codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {45--54}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01096-2}, doi = {10.1007/S10623-022-01096-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KharaghaniSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KiermaierKSSW23, author = {Michael Kiermaier and Sascha Kurz and Patrick Sol{\'{e}} and Michael Stoll and Alfred Wassermann}, title = {On strongly walk regular graphs, triple sum sets and their codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {645--675}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01118-z}, doi = {10.1007/S10623-022-01118-Z}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KiermaierKSSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimL23, author = {Jiseung Kim and Changmin Lee}, title = {A polynomial time algorithm for breaking {NTRU} encryption with multiple keys}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2779--2789}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01233-5}, doi = {10.1007/S10623-023-01233-5}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KimL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimPTW23, author = {Haider Al Kim and Sven Puchinger and Ludo Tolhuizen and Antonia Wachter{-}Zeh}, title = {Coding and bounds for partially defective memory cells}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {4019--4058}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01270-0}, doi = {10.1007/S10623-023-01270-0}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/KimPTW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimSAP23, author = {Hyoseung Kim and Olivier Sanders and Michel Abdalla and Jong Hwan Park}, title = {Practical dynamic group signatures without knowledge extractors}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {853--893}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01129-w}, doi = {10.1007/S10623-022-01129-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KimSAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kobayashi0MS23, author = {Hirokazu Kobayashi and Yohei Watanabe and Kazuhiko Minematsu and Junji Shikata}, title = {Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2523--2562}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01211-x}, doi = {10.1007/S10623-023-01211-X}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kobayashi0MS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KolschKK23, author = {Lukas K{\"{o}}lsch and Bj{\"{o}}rn Kriepke and Gohar M. Kyureghyan}, title = {Image sets of perfectly nonlinear maps}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {1--27}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01094-4}, doi = {10.1007/S10623-022-01094-4}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KolschKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Krotov23, author = {Denis S. Krotov}, title = {Projective tilings and full-rank perfect codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3293--3303}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01256-y}, doi = {10.1007/S10623-023-01256-Y}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Krotov23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LanLY23, author = {Ting Lan and Weijun Liu and Fugang Yin}, title = {Block-transitive 3-(v, k, 1) designs associated with alternating groups}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2791--2807}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01215-7}, doi = {10.1007/S10623-023-01215-7}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LanLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Lavorante23, author = {Vincenzo Pallozzi Lavorante}, title = {External points to a conic from a Baer subplane}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1427--1441}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01156-7}, doi = {10.1007/S10623-022-01156-7}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Lavorante23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LavoranteS23, author = {Vincenzo Pallozzi Lavorante and Valentino Smaldore}, title = {New hemisystems of the Hermitian surface}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {293--307}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01107-2}, doi = {10.1007/S10623-022-01107-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LavoranteS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LavrauwS23, author = {Michel Lavrauw and John Sheekey}, title = {Symplectic 4-dimensional semifields of order 8\({}^{\mbox{4}}\) and 9\({}^{\mbox{4}}\)}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1935--1949}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01183-y}, doi = {10.1007/S10623-023-01183-Y}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LavrauwS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Lee23, author = {Kwangsu Lee}, title = {Decentralized multi-client functional encryption for set intersection with improved efficiency}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {1053--1093}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01139-8}, doi = {10.1007/S10623-022-01139-8}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Lee23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeS23, author = {Hyung Tae Lee and Jae Hong Seo}, title = {On the security of functional encryption in the generic group model}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {9}, pages = {3081--3114}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01237-1}, doi = {10.1007/S10623-023-01237-1}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeeS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeV23, author = {Melissa Lee and Gabriel Verret}, title = {Extremely primitive groups and linear spaces}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3227--3240}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01244-2}, doi = {10.1007/S10623-023-01244-2}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LeeV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LemosNR23, author = {Ab{\'{\i}}lio Lemos and Victor G. L. Neumann and S{\'{a}}vio Ribas}, title = {On arithmetic progressions in finite fields}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {6}, pages = {2323--2346}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01201-z}, doi = {10.1007/S10623-023-01201-Z}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LemosNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Li23, author = {Fengwei Li}, title = {Cyclic codes of length 5p with {MDS} symbol-pair}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1873--1888}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01184-x}, doi = {10.1007/S10623-023-01184-X}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Li23a, author = {Rupert Li}, title = {Unique optima of the Delsarte linear program}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {6}, pages = {2117--2140}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01191-y}, doi = {10.1007/S10623-023-01191-Y}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Li23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiJL23, author = {Ming Li and Yupeng Jiang and Dongdai Lin}, title = {Properties of the cycles that contain all vectors of weight {\textdollar}{\textbackslash}le k{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {221--239}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01100-9}, doi = {10.1007/S10623-022-01100-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiL23, author = {Yun Li and Hongwei Liu}, title = {Cyclic constant dimension subspace codes via the sum of Sidon spaces}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1193--1207}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01146-9}, doi = {10.1007/S10623-022-01146-9}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiSW23, author = {Shitao Li and Minjia Shi and Juan Wang}, title = {An improved method for constructing formally self-dual codes with small hulls}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2563--2583}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01210-y}, doi = {10.1007/S10623-023-01210-Y}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiZQ23, author = {Qiang Li and Qun{-}Xiong Zheng and Wenfeng Qi}, title = {Practical attacks on small private exponent {RSA:} new records and new insights}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {4107--4142}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01295-5}, doi = {10.1007/S10623-023-01295-5}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiZQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Liu23, author = {Shuangqing Liu}, title = {Optimal Ferrers diagram rank-metric codes from {MRD} codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {3977--3993}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01284-8}, doi = {10.1007/S10623-023-01284-8}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Liu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuL23, author = {Xiusheng Liu and Hualu Liu}, title = {{LCP} of group codes over finite Frobenius rings}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {695--708}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01120-5}, doi = {10.1007/S10623-022-01120-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuL23a, author = {Yan Liu and Jianguo Lei}, title = {More results on large sets of Kirkman triple systems}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2677--2686}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01221-9}, doi = {10.1007/S10623-023-01221-9}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuL23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuL23b, author = {Hongwei Liu and Shengwei Liu}, title = {A class of constacyclic codes are generalized Reed-Solomon codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {4143--4151}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01294-6}, doi = {10.1007/S10623-023-01294-6}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiuL23b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuZAL23, author = {Kaiqiang Liu and Zhengchun Zhou and Avik Ranjan Adhikary and Rong Luo}, title = {New sets of non-orthogonal spreading sequences with low correlation and low {PAPR} using extended Boolean functions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3115--3139}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01247-z}, doi = {10.1007/S10623-023-01247-Z}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuZAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LuWWC23, author = {Wei Lu and Xia Wu and Yufei Wang and Xiwang Cao}, title = {A general construction of regular complete permutation polynomials}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2627--2647}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01224-6}, doi = {10.1007/S10623-023-01224-6}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LuWWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaL23, author = {Wen Ma and Jinquan Luo}, title = {Block codes in pomset metric over {\textdollar}\{{\textbackslash}mathbb \{Z\}\}{\_}m{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3263--3284}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01249-x}, doi = {10.1007/S10623-023-01249-X}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MaL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MengGFM23, author = {Xiangrui Meng and Jian Gao and Fang{-}Wei Fu and Fanghui Ma}, title = {Weight distributions of {Q2DC} codes over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {807--830}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01128-x}, doi = {10.1007/S10623-022-01128-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MengGFM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MesnagerQC23, author = {Sihem Mesnager and Liqin Qian and Xiwang Cao}, title = {Further projective binary linear codes derived from two-to-one functions and their duals}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {719--746}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01122-3}, doi = {10.1007/S10623-022-01122-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MesnagerQC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Mo23, author = {Songbao Mo}, title = {Ideal hierarchical secret sharing and lattice path matroids}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1335--1349}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01154-9}, doi = {10.1007/S10623-022-01154-9}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Mo23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MontanucciT23, author = {Maria Montanucci and Guilherme C. Tizziotti}, title = {Generalized Weierstrass semigroups at several points on certain maximal curves which cannot be covered by the Hermitian curve}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {831--851}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01130-3}, doi = {10.1007/S10623-022-01130-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MontanucciT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MonzilloPS23, author = {Giusy Monzillo and Tim Penttila and Alessandro Siciliano}, title = {Eggs in finite projective spaces and unitals in translation planes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1475--1485}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01162-9}, doi = {10.1007/S10623-022-01162-9}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MonzilloPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MoraT23, author = {Rocco Mora and Jean{-}Pierre Tillich}, title = {On the dimension and structure of the square of the dual of a Goppa code}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1351--1372}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01153-w}, doi = {10.1007/S10623-022-01153-W}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MoraT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NaJL23, author = {Jingzhou Na and Jonathan Jedwab and Shuxing Li}, title = {A group-based structure for perfect sequence covering arrays}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {951--970}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01132-1}, doi = {10.1007/S10623-022-01132-1}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NaJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PangZ23, author = {Xuan Pang and Xiaoqin Zhan}, title = {Block-transitive 3-(v,4,{\(\lambda\)} {)} designs with sporadic or alternating socle}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {3825--3835}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01275-9}, doi = {10.1007/S10623-023-01275-9}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/PangZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PangZYG23, author = {Binbin Pang and Shixin Zhu and Tian Yang and Jun Gao}, title = {{BCH} codes with larger dimensional hull}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {3933--3951}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01281-x}, doi = {10.1007/S10623-023-01281-X}, timestamp = {Mon, 13 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/PangZYG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PasalicBZW23, author = {Enes Pasalic and Amar Bapic and Fengrong Zhang and Yongzhuang Wei}, title = {Explicit infinite families of bent functions outside the completed Maiorana-McFarland class}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2365--2393}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01204-w}, doi = {10.1007/S10623-023-01204-W}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PasalicBZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/QiaoYSHJ23, author = {Wenxiao Qiao and Hailun Yan and Siwei Sun and Lei Hu and Jiwu Jing}, title = {New cryptanalysis of LowMC with algebraic techniques}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {2057--2075}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01178-1}, doi = {10.1007/S10623-022-01178-1}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/QiaoYSHJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Reis23, author = {Lucas Reis}, title = {The average density of K-normal elements over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3285--3292}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01257-x}, doi = {10.1007/S10623-023-01257-X}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Reis23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ryabko23, author = {Boris Ryabko}, title = {Unconditionally secure short key ciphers based on data compression and randomization}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {6}, pages = {2201--2212}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01195-8}, doi = {10.1007/S10623-023-01195-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ryabko23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SamajderS23, author = {Subhabrata Samajder and Palash Sarkar}, title = {Another look at key randomisation hypotheses}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {3837--3855}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01272-y}, doi = {10.1007/S10623-023-01272-Y}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/SamajderS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SatakeG23, author = {Shohei Satake and Yujie Gu}, title = {Cayley sum graphs and their applications to codebooks}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1315--1333}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01152-x}, doi = {10.1007/S10623-022-01152-X}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SatakeG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Shaporenko23, author = {Alexander Shaporenko}, title = {Derivatives of bent functions in connection with the bent sum decomposition problem}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1607--1625}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01167-4}, doi = {10.1007/S10623-022-01167-4}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Shaporenko23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShenCZ23, author = {Jiaxin Shen and Jianfu Chen and Shenglin Zhou}, title = {Flag-transitive 2-designs with prime square replication number and alternating groups}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {709--717}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01121-4}, doi = {10.1007/S10623-022-01121-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShenCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShenMYZ23, author = {Bingsheng Shen and Hua Meng and Yang Yang and Zhengchun Zhou}, title = {New constructions of Z-complementary code sets and mutually orthogonal complementary sequence sets}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {353--371}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01112-5}, doi = {10.1007/S10623-022-01112-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShenMYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiLCCKS23, author = {Minjia Shi and Yaya Li and Wei Cheng and Dean Crnkovic and Denis S. Krotov and Patrick Sol{\'{e}}}, title = {Self-dual bent sequences for complex Hadamard matrices}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1453--1474}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01157-6}, doi = {10.1007/S10623-022-01157-6}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShiLCCKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiLKS23, author = {Minjia Shi and Na Liu and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {Additive complementary dual codes over {\textdollar}{\textbackslash}mathbb \{F\}{\_}4{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {273--284}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01106-3}, doi = {10.1007/S10623-022-01106-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShiLKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiWKS23, author = {Minjia Shi and Shukai Wang and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {Self-orthogonal codes over a non-unital ring and combinatorial matrices}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {677--689}, year = {2023}, url = {https://doi.org/10.1007/s10623-021-00948-7}, doi = {10.1007/S10623-021-00948-7}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShiWKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiWKS23a, author = {Minjia Shi and Shukai Wang and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {Correction: Self-orthogonal codes over a non-unital ring and combinatorial matrices}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {691}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01170-9}, doi = {10.1007/S10623-022-01170-9}, timestamp = {Tue, 14 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShiWKS23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShinagawaESN23, author = {Kazumasa Shinagawa and Reo Eriguchi and Shohei Satake and Koji Nuida}, title = {Private simultaneous messages based on quadratic residues}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {3915--3932}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01279-5}, doi = {10.1007/S10623-023-01279-5}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShinagawaESN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Shparlinski23, author = {Igor E. Shparlinski}, title = {Fixed points of the subset sum pseudorandom number generators}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2473--2479}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01209-5}, doi = {10.1007/S10623-023-01209-5}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Shparlinski23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Stanojkovski23, author = {Mima Stanojkovski}, title = {Submodule codes as spherical codes in buildings}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2449--2472}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01207-7}, doi = {10.1007/S10623-023-01207-7}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Stanojkovski23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SuG23, author = {Sihong Su and Xiaoqi Guo}, title = {A further study on the construction methods of bent functions and self-dual bent functions based on Rothaus's bent function}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1559--1580}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01169-2}, doi = {10.1007/S10623-022-01169-2}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SuG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SunHZ23, author = {Zhonghua Sun and Sujuan Huang and Shixin Zhu}, title = {Optimal quaternary Hermitian {LCD} codes and their related codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1527--1558}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01166-5}, doi = {10.1007/S10623-022-01166-5}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SunHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SunSS23, author = {Shifeng Sun and Ron Steinfeld and Amin Sakzad}, title = {Incremental symmetric puncturable encryption with support for unbounded number of punctures}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1401--1426}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01143-y}, doi = {10.1007/S10623-022-01143-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SunSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SunWD23, author = {Zhonghua Sun and Xiaoqiang Wang and Cunsheng Ding}, title = {Several families of irreducible constacyclic and cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {9}, pages = {2821--2843}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01242-4}, doi = {10.1007/S10623-023-01242-4}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SunWD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TanFDTZ23, author = {Pan Tan and Cuiling Fan and Cunsheng Ding and Chunming Tang and Zhengchun Zhou}, title = {The minimum locality of linear codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {83--114}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01099-z}, doi = {10.1007/S10623-022-01099-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TanFDTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TanY23, author = {Xiantong Tan and Haode Yan}, title = {Differential spectrum of a class of {APN} power functions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2755--2768}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01218-4}, doi = {10.1007/S10623-023-01218-4}, timestamp = {Tue, 01 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TanY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TangS23, author = {Hopein Christofen Tang and Djoko Suprijanto}, title = {A general family of Plotkin-optimal two-weight codes over {\textdollar}{\textbackslash}mathbb \{Z\}{\_}4{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1737--1750}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01176-3}, doi = {10.1007/S10623-022-01176-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TangS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TianLZ23, author = {Shizhu Tian and Yitong Liu and Xiangyong Zeng}, title = {A further study on bridge structures and constructing bijective S-boxes for low-latency masking}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3709--3739}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01266-w}, doi = {10.1007/S10623-023-01266-W}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/TianLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TongZZXR23, author = {Yan Tong and Xiangyong Zeng and Shasha Zhang and Shiwei Xu and Zhengwei Ren}, title = {The estimates of trigonometric sums and new bounds on a mean value, a sequence and a cryptographic function}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {921--949}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01140-1}, doi = {10.1007/S10623-022-01140-1}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TongZZXR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Trung23, author = {Tran van Trung}, title = {Point-missing s-resolvable t-designs: infinite series of 4-designs with constant index}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2497--2508}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01206-8}, doi = {10.1007/S10623-023-01206-8}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Trung23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TsengLY23, author = {Pin{-}Chieh Tseng and Ching{-}Yi Lai and Wei{-}Hsuan Yu}, title = {Semidefinite programming bounds for binary codes from a split Terwilliger algebra}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3241--3262}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01250-4}, doi = {10.1007/S10623-023-01250-4}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TsengLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Vega23, author = {Gerardo Vega}, title = {The b-symbol weight distributions of all semiprimitive irreducible cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {6}, pages = {2213--2221}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01193-w}, doi = {10.1007/S10623-023-01193-W}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Vega23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/VenemaAH23, author = {Marloes Venema and Greg Alp{\'{a}}r and Jaap{-}Henk Hoepman}, title = {Systematizing core properties of pairing-based attribute-based encryption to uncover remaining challenges in enforcing access control in practice}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {165--220}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01093-5}, doi = {10.1007/S10623-022-01093-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/VenemaAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Vorobyev23, author = {Ilya Vorobyev}, title = {Complete traceability multimedia fingerprinting codes resistant to averaging attack and adversarial noise with optimal rate}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1183--1191}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01144-x}, doi = {10.1007/S10623-022-01144-X}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Vorobyev23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangF23, author = {Jiaxin Wang and Fang{-}Wei Fu}, title = {New results on vectorial dual-bent functions and partial difference sets}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {127--149}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01103-6}, doi = {10.1007/S10623-022-01103-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangFHGZS23, author = {Senpeng Wang and Dengguo Feng and Bin Hu and Jie Guan and Kai Zhang and Tairong Shi}, title = {New method for combining Matsui's bounding conditions with sequential encoding method}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3603--3642}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01259-9}, doi = {10.1007/S10623-023-01259-9}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WangFHGZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangL23, author = {Jiabo Wang and Cong Ling}, title = {Polar sampler: {A} novel Bernoulli sampler using polar codes with application to integer Gaussian sampling}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1779--1811}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01164-7}, doi = {10.1007/S10623-022-01164-7}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangZZFS23, author = {Zhongxiao Wang and Xiaoxin Zhao and Qunxiong Zheng and Xiutao Feng and Zehao Sun}, title = {The decomposition of an {NFSR} into the cascade connection of two smaller NFSRs revisited}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1889--1910}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01182-z}, doi = {10.1007/S10623-023-01182-Z}, timestamp = {Tue, 25 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangZZFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WeiDHDZ23, author = {Congming Wei and Bingyou Dong and Jialiang Hua and Xiaoyang Dong and Guoyan Zhang}, title = {Improved attacks against reduced-round Whirlwind}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3581--3602}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01254-0}, doi = {10.1007/S10623-023-01254-0}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WeiDHDZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XieLZTY23, author = {Xi Xie and Nian Li and Xiangyong Zeng and Xiaohu Tang and Yao Yao}, title = {Several classes of bent functions over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {309--332}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01109-0}, doi = {10.1007/S10623-022-01109-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XieLZTY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XieT23, author = {Xiaofeng Xie and Tian Tian}, title = {Structural evaluation of AES-like ciphers against mixture differential cryptanalysis}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {12}, pages = {3881--3899}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01277-7}, doi = {10.1007/S10623-023-01277-7}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/XieT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Xu23, author = {Bangteng Xu}, title = {Characterizations and constructions of plateaued functions on finite abelian groups}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1261--1292}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01151-y}, doi = {10.1007/S10623-022-01151-Y}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Xu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuZTC23, author = {Jie Xu and Zhiyong Zheng and Kun Tian and Man Chen}, title = {Two properties of prefix codes and uniquely decodable codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3321--3330}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01253-1}, doi = {10.1007/S10623-023-01253-1}, timestamp = {Tue, 10 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XuZTC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuZZM23, author = {Li Xu and Zhengchun Zhou and Jun Zhang and Sihem Mesnager}, title = {Optimal quaternary (r,{\(\delta\)} )-locally recoverable codes: their structures and complete classification}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1495--1526}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01165-6}, doi = {10.1007/S10623-022-01165-6}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XuZZM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XueW23, author = {Erzhong Xue and Zilong Wang}, title = {The q-ary Golay arrays of size 2{\(^\times\)} 2{\(^\times\)} ... {\(^\times\)} 2 are standard}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2769--2778}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01230-8}, doi = {10.1007/S10623-023-01230-8}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XueW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YadavS23, author = {Monika Yadav and Anuradha Sharma}, title = {A recursive method for the construction and enumeration of self-orthogonal and self-dual codes over the quasi-Galois ring {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{2r\}[u]/{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1973--2003}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01185-w}, doi = {10.1007/S10623-023-01185-W}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YadavS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YuZLBDXWCCWS23, author = {Han{-}Bing Yu and Qun{-}Xiong Zheng and Yi{-}Jian Liu and Jingguo Bi and Yu{-}Fei Duan and Jing{-}Wen Xue and You Wu and Yue Cao and Rong Cheng and Lin Wang and Bai{-}Shun Sun}, title = {An improved method for predicting truncated multiple recursive generators with unknown parameters}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1713--1736}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01175-4}, doi = {10.1007/S10623-022-01175-4}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YuZLBDXWCCWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZengZLX23, author = {Dan Zeng and Xiangyong Zeng and Lisha Li and Yunge Xu}, title = {The cycle structure of a class of permutation polynomials}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1373--1400}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01155-8}, doi = {10.1007/S10623-022-01155-8}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZengZLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhanZLW23, author = {Yu Zhan and Ziqian Zhang and Qian Liu and Baocang Wang}, title = {Hiding the input-size in multi-party private set intersection}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {9}, pages = {2893--2915}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01238-0}, doi = {10.1007/S10623-023-01238-0}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhanZLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Zhang23, author = {Zihan Zhang}, title = {A new metric on symmetric groups and applications to block permutation codes}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {6}, pages = {2255--2271}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01197-6}, doi = {10.1007/S10623-023-01197-6}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Zhang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Zhang23a, author = {Junyang Zhang}, title = {Characterizing subgroup perfect codes by 2-subgroups}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {9}, pages = {2811--2819}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01240-6}, doi = {10.1007/S10623-023-01240-6}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Zhang23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangLGH23, author = {Kai Zhang and Xuejia Lai and Jie Guan and Bin Hu}, title = {Weak rotational property and its application}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {10}, pages = {3187--3214}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01241-5}, doi = {10.1007/S10623-023-01241-5}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangLGH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangLWGHWS23, author = {Kai Zhang and Xuejia Lai and Lei Wang and Jie Guan and Bin Hu and Senpeng Wang and Tairong Shi}, title = {Meet-in-the-middle attack with splice-and-cut technique and a general automatic framework}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {9}, pages = {2845--2878}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01226-4}, doi = {10.1007/S10623-023-01226-4}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangLWGHWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangPLZX23, author = {WeiGuo Zhang and Enes Pasalic and Yiran Liu and Liupiao Zhang and Chunlei Xie}, title = {A design and flexible assignment of orthogonal binary sequence sets for {(QS)-CDMA} systems}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {373--389}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01113-4}, doi = {10.1007/S10623-022-01113-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangPLZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangQG23, author = {Zhongliang Zhang and Zhen Qin and Chun Guo}, title = {Just tweak! Asymptotically optimal security for the cascaded {LRW1} tweakable blockcipher}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {1035--1052}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01137-w}, doi = {10.1007/S10623-022-01137-W}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangQG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangT23, author = {He Zhang and Chunming Tang}, title = {Constructions of large cyclic constant dimension codes via Sidon spaces}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {1}, pages = {29--44}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01095-3}, doi = {10.1007/S10623-022-01095-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangWSW23, author = {Zhongya Zhang and Wenling Wu and Han Sui and Bolin Wang}, title = {Post-quantum security on the Lai-Massey scheme}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2687--2704}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01225-5}, doi = {10.1007/S10623-023-01225-5}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangWSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangZ23, author = {Wanbao Zhang and Shenglin Zhou}, title = {Extremely line-primitive automorphism groups of finite linear spaces}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {3}, pages = {1153--1163}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01138-9}, doi = {10.1007/S10623-022-01138-9}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhengYZZ23, author = {Yanbin Zheng and Yuyin Yu and Zhengbang Zha and Xingchen Zhou}, title = {On inverses of permutation polynomials of the form {\textdollar}x{\textbackslash}left( x\{s\} -a{\textbackslash}right) \{(qm-1)/s\}{\textdollar} over {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{qn\}{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {4}, pages = {1165--1181}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01142-z}, doi = {10.1007/S10623-022-01142-Z}, timestamp = {Tue, 18 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhengYZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouYQXZM23, author = {Yanwei Zhou and Bo Yang and Zirui Qiao and Zhe Xia and Mingwu Zhang and Yi Mu}, title = {Leakage-resilient identity-based cryptography from minimal assumptions}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3757--3801}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01268-8}, doi = {10.1007/S10623-023-01268-8}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhouYQXZM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Zhu23, author = {Yan Zhu}, title = {Optimal and extremal graphical designs on regular graphs associated with classical parameters}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {8}, pages = {2737--2754}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01231-7}, doi = {10.1007/S10623-023-01231-7}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Zhu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiWL23, title = {{RETRACTED} {ARTICLE:} {\textdollar}{\textbackslash}mathbb \{Z\}{\_}p{\textbackslash}mathbb \{Z\}{\_}\{p2\}{\textdollar}-linear codes: rank and kernel}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {2}, pages = {693}, year = {2023}, note = {Withdrawn.}, url = {https://doi.org/10.1007/s10623-021-00947-8}, doi = {10.1007/S10623-021-00947-8}, timestamp = {Tue, 21 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShiWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AbeA22, author = {Masayuki Abe and Miguel Ambrona}, title = {Blind key-generation attribute-based encryption for general predicates}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2271--2299}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01069-5}, doi = {10.1007/S10623-022-01069-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AbeA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AbiadBDK22, author = {Aida Abiad and Bart De Bruyn and Jozefien D'haeseleer and Jack H. Koolen}, title = {Neumaier graphs with few eigenvalues}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {2003--2019}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00856-w}, doi = {10.1007/S10623-021-00856-W}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AbiadBDK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AbreuFKL22, author = {Mari{\'{e}}n Abreu and Martin Funk and Vedran Krcadinac and Domenico Labbate}, title = {Strongly regular configurations}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {8}, pages = {1881--1897}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01080-w}, doi = {10.1007/S10623-022-01080-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AbreuFKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AgrawalBNXXY22, author = {Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada}, title = {Cryptanalysis of Boyen's attribute-based encryption scheme in {TCC} 2013}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2301--2318}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01076-6}, doi = {10.1007/S10623-022-01076-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AgrawalBNXXY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AgugliaCG22, author = {Angela Aguglia and Michela Ceria and Luca Giuzzi}, title = {Some hypersurfaces over finite fields, minimal codes and secret sharing schemes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {6}, pages = {1503--1519}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01051-1}, doi = {10.1007/S10623-022-01051-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AgugliaCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlahmadiAABSS22, author = {Adel Alahmadi and Amani Alkathiry and Alaa Altassan and Alexis Bonnecaze and Hatoon Shoaib and Patrick Sol{\'{e}}}, title = {The build-up construction over a commutative non-unital ring}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {12}, pages = {3003--3010}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01044-0}, doi = {10.1007/S10623-022-01044-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlahmadiAABSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlawatugodaO22, author = {Janaka Alawatugoda and Tatsuaki Okamoto}, title = {Standard model leakage-resilient authenticated key exchange using inner-product extractors}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {1059--1079}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01028-0}, doi = {10.1007/S10623-022-01028-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlawatugodaO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Alhakim22, author = {Abbas Alhakim}, title = {Designing preference functions for de Bruijn sequences with forbidden words}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2319--2335}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01077-5}, doi = {10.1007/S10623-022-01077-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Alhakim22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AmarraDP22, author = {Carmen Amarra and Alice Devillers and Cheryl E. Praeger}, title = {Delandtsheer-Doyen parameters for block-transitive point-imprimitive 2-designs}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {2205--2221}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01015-5}, doi = {10.1007/S10623-022-01015-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AmarraDP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AnbarM22, author = {Nurdag{\"{u}}l Anbar and Wilfried Meidl}, title = {Bent partitions}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {1081--1101}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01029-z}, doi = {10.1007/S10623-022-01029-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AnbarM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AydinLY22, author = {Nuh Aydin and Peihan Liu and Bryan Yoshino}, title = {Polycyclic codes associated with trinomials: good codes and open questions}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {5}, pages = {1241--1269}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01038-y}, doi = {10.1007/S10623-022-01038-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AydinLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AyebieS22, author = {Edoukou Berenger Ayebie and El Mamoun Souidi}, title = {New code-based cryptographic accumulator and fully dynamic group signature}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {12}, pages = {2861--2891}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01007-5}, doi = {10.1007/S10623-022-01007-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AyebieS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AzimiRSMAR22, author = {Seyyed Arash Azimi and Adri{\'{a}}n Ranea and Mahmoud Salmasizadeh and Javad Mohajeri and Mohammad Reza Aref and Vincent Rijmen}, title = {A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {8}, pages = {1797--1855}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01074-8}, doi = {10.1007/S10623-022-01074-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AzimiRSMAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BaileyCKP22, author = {Rosemary A. Bailey and Peter J. Cameron and Michael Kinyon and Cheryl E. Praeger}, title = {Diagonal groups and arcs over groups}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {2069--2080}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00907-2}, doi = {10.1007/S10623-021-00907-2}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BaileyCKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BallD22, author = {Simeon Ball and James Dixon}, title = {The equivalence of linear codes implies semi-linear equivalence}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {7}, pages = {1557--1565}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01055-x}, doi = {10.1007/S10623-022-01055-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BallD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BallLS22, author = {Simeon Ball and Michel Lavrauw and Tam{\'{a}}s Szonyi}, title = {Contributions by Aart Blokhuis to finite geometry, discrete mathematics, and combinatorics}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {1959--1961}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01072-w}, doi = {10.1007/S10623-022-01072-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BallLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BalletBBT22, author = {St{\'{e}}phane Ballet and Nicolas Baudru and Alexis Bonnecaze and Mila Tukumuli}, title = {Construction of asymmetric Chudnovsky-type algorithms for multiplication in finite fields}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {12}, pages = {2783--2811}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00986-1}, doi = {10.1007/S10623-021-00986-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BalletBBT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BaoJ22, author = {Jingjun Bao and Lijun Ji}, title = {Large sets of t-designs over finite fields exist for all t}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {7}, pages = {1599--1609}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01061-z}, doi = {10.1007/S10623-022-01061-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BaoJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BargCT22, author = {Alexander Barg and Zitan Chen and Itzhak Tamo}, title = {A construction of maximally recoverable codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {939--945}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01020-8}, doi = {10.1007/S10623-022-01020-8}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BargCT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BariffiMNR22, author = {Jessica Bariffi and Sam Mattheus and Alessandro Neri and Joachim Rosenthal}, title = {Moderate-density parity-check codes from projective bundles}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {12}, pages = {2943--2966}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01054-y}, doi = {10.1007/S10623-022-01054-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BariffiMNR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeierleLP22, author = {Christof Beierle and Gregor Leander and L{\'{e}}o Perrin}, title = {Trims and extensions of quadratic {APN} functions}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {1009--1036}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01024-4}, doi = {10.1007/S10623-022-01024-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeierleLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeregMMSS22, author = {Sergey Bereg and Brian Malouf and Linda Morales and Thomas Stanley and Ivan Hal Sudborough}, title = {Using permutation rational functions to obtain permutation arrays with large hamming distance}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {7}, pages = {1659--1677}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01039-x}, doi = {10.1007/S10623-022-01039-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeregMMSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BettaiebBBCG22, author = {Slim Bettaieb and Lo{\"{\i}}c Bidoux and Olivier Blazy and Yann Connan and Philippe Gaborit}, title = {A gapless code-based hash proof system based on {RQC} and its applications}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {12}, pages = {3011--3044}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01075-7}, doi = {10.1007/S10623-022-01075-7}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BettaiebBBCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BettenK22, author = {Anton Betten and Fatma Karaoglu}, title = {The Eckardt point configuration of cubic surfaces revisited}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {2159--2180}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00999-w}, doi = {10.1007/S10623-021-00999-W}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BettenK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeuleMS22, author = {Jan De Beule and Jonathan Mannaert and Leo Storme}, title = {Cameron-Liebler k-sets in subspaces and non-existence conditions}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {633--651}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00995-0}, doi = {10.1007/S10623-021-00995-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeuleMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BhattacharjeeDL22, author = {Arghya Bhattacharjee and Avijit Dutta and Eik List and Mridul Nandi}, title = {CENCPP\({}^{\mbox{*}}\): beyond-birthday-secure encryption from public permutations}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {6}, pages = {1381--1425}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01045-z}, doi = {10.1007/S10623-022-01045-Z}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BhattacharjeeDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BhuniaFV22, author = {Dipak K. Bhunia and Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba and Merc{\`{e}} Villanueva}, title = {On the linearity and classification of {\textdollar}\{{\textbackslash}mathbb \{Z\}\}{\_}\{ps\}{\textdollar}-linear generalized hadamard codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {1037--1058}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01026-2}, doi = {10.1007/S10623-022-01026-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BhuniaFV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BibakZ22, author = {Khodakhast Bibak and Behrouz Zolfaghari}, title = {The Modular Subset-Sum Problem and the size of deletion correcting codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {8}, pages = {1721--1734}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01073-9}, doi = {10.1007/S10623-022-01073-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BibakZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BiswasB22, author = {Soumak Biswas and Maheshanand Bhaintwal}, title = {Quantum codes from {\textdollar}{\textbackslash}mathbb \{Z\}{\_}2{\textbackslash}mathbb \{Z\}{\_}2[u]/{\textbackslash}langle u4 {\textbackslash}rangle {\textdollar}-cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {2}, pages = {343--366}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00978-1}, doi = {10.1007/S10623-021-00978-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BiswasB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlokhuisBD22, author = {Aart Blokhuis and Maarten De Boeck and Jozefien D'haeseleer}, title = {Correction to: Cameron-Liebler sets of k-spaces in {\textdollar}\{\{{\textbackslash}, {\textbackslash}mathrm\{PG\}{\textbackslash}, \}\}(n, q){\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {2}, pages = {477--487}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00983-4}, doi = {10.1007/S10623-021-00983-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlokhuisBD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlokhuisBD22a, author = {Aart Blokhuis and Maarten De Boeck and Jozefien D'haeseleer}, title = {On the sunflower bound for k-spaces, pairwise intersecting in a point}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {2101--2111}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00949-6}, doi = {10.1007/S10623-021-00949-6}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlokhuisBD22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlokhuisPS22, author = {Aart Blokhuis and Ruud Pellikaan and Tam{\'{a}}s Szonyi}, title = {The extended coset leader weight enumerator of a twisted cubic code}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {2223--2247}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01060-0}, doi = {10.1007/S10623-022-01060-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlokhuisPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BorelloGSS22, author = {Martino Borello and Cem G{\"{u}}neri and Elif Sa{\c{c}}ikara and Patrick Sol{\'{e}}}, title = {The concatenated structure of quasi-abelian codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2647--2661}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00921-4}, doi = {10.1007/S10623-021-00921-4}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BorelloGSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BoudgoustSS22, author = {Katharina Boudgoust and Amin Sakzad and Ron Steinfeld}, title = {Vandermonde meets Regev: public key encryption schemes based on partial Vandermonde problems}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {8}, pages = {1899--1936}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01083-7}, doi = {10.1007/S10623-022-01083-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BoudgoustSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BruynG22, author = {Bart De Bruyn and Mou Gao}, title = {Pseudo-embeddings and quadratic sets of quadrics}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {1}, pages = {199--213}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00971-8}, doi = {10.1007/S10623-021-00971-8}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BruynG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BruynG22a, author = {Bart De Bruyn and Mou Gao}, title = {A characterization of the Coxeter cap}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {1963--1981}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00855-x}, doi = {10.1007/S10623-021-00855-X}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BruynG22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Byrnes22, author = {Kevin M. Byrnes}, title = {Isomorphism of maximum length circuit codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {835--850}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-01005-z}, doi = {10.1007/S10623-021-01005-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Byrnes22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CakirogluYY22, author = {Yagmur {\c{C}}akiroglu and Oguz Yayla and Emrah Sercan Yilmaz}, title = {The number of irreducible polynomials over finite fields with vanishing trace and reciprocal trace}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2407--2417}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01088-2}, doi = {10.1007/S10623-022-01088-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CakirogluYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChakrabortyM22, author = {Himadri Shekhar Chakraborty and Tsuyoshi Miezaki}, title = {Variants of Jacobi polynomials in coding theory}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2583--2597}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00923-2}, doi = {10.1007/S10623-021-00923-2}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ChakrabortyM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenFSFZLWWG22, author = {Shiyao Chen and Yanhong Fan and Ling Sun and Yong Fu and Haibo Zhou and Yongqing Li and Meiqin Wang and Weijia Wang and Chun Guo}, title = {{SAND:} an {AND-RX} Feistel lightweight block cipher supporting S-box-based security evaluations}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {1}, pages = {155--198}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00970-9}, doi = {10.1007/S10623-021-00970-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenFSFZLWWG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChengZZ22, author = {Qi Cheng and Jun Zhang and Jincheng Zhuang}, title = {{LWE} from non-commutative group rings}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {1}, pages = {239--263}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00973-6}, doi = {10.1007/S10623-021-00973-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChengZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CheonCKK22, author = {Jung Hee Cheon and Wonhee Cho and Jeong Han Kim and Jiseung Kim}, title = {Adventures in crypto dark matter: attacks, fixes and analysis for weak pseudorandom functions}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {8}, pages = {1735--1760}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01071-x}, doi = {10.1007/S10623-022-01071-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CheonCKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChoiK22, author = {Whan{-}Hyuk Choi and Jon{-}Lark Kim}, title = {An improved upper bound on self-dual codes over finite fields GF(11), GF(19), and {GF(23)}}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2735--2751}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00968-3}, doi = {10.1007/S10623-021-00968-3}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ChoiK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CrnkovicHS22, author = {Dean Crnkovic and Daniel R. Hawtin and Andrea Svob}, title = {Neighbour-transitive codes and partial spreads in generalised quadrangles}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {6}, pages = {1521--1533}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01053-z}, doi = {10.1007/S10623-022-01053-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CrnkovicHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CrnkovicS22, author = {Dean Crnkovic and Andrea Svob}, title = {Switching for 2-designs}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {7}, pages = {1585--1593}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01059-7}, doi = {10.1007/S10623-022-01059-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CrnkovicS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DalaiPS22, author = {Deepak Kumar Dalai and Santu Pal and Santanu Sarkar}, title = {A state bit recovery algorithm with {TMDTO} attack on Lizard and Grain-128a}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {489--521}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00984-3}, doi = {10.1007/S10623-021-00984-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DalaiPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DemirbasK22, author = {Fatih Demirbas and Orhun Kara}, title = {Integral characteristics by keyspace partitioning}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {2}, pages = {443--472}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00989-y}, doi = {10.1007/S10623-021-00989-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DemirbasK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dempwolff22, author = {Ulrich Dempwolff}, title = {Correction to: {CCZ} equivalence of power functions}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {2}, pages = {473--475}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00979-0}, doi = {10.1007/S10623-021-00979-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dempwolff22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Denaux22, author = {Lins Denaux}, title = {Constructing saturating sets in projective spaces using subgeometries}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {2113--2144}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00951-y}, doi = {10.1007/S10623-021-00951-Y}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Denaux22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DoseMPS22, author = {Valerio Dose and Pietro Mercuri and Ankan Pal and Claudio Stirpe}, title = {High order elements in finite fields arising from recursive towers}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {6}, pages = {1347--1368}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01041-3}, doi = {10.1007/S10623-022-01041-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DoseMPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dougherty22, author = {Steven T. Dougherty}, title = {The neighbor graph of binary self-dual codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {2}, pages = {409--425}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00985-2}, doi = {10.1007/S10623-021-00985-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dougherty22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DukesFM22, author = {Austin Dukes and Andrea Ferraguti and Giacomo Micheli}, title = {Optimal selection for good polynomials of degree up to five}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {6}, pages = {1427--1436}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01046-y}, doi = {10.1007/S10623-022-01046-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DukesFM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DunkelmanEKKLS22, author = {Orr Dunkelman and Maria Eichlseder and Daniel Kales and Nathan Keller and Ga{\"{e}}tan Leurent and Markus Schofnegger}, title = {Practical key recovery attacks on FlexAEAD}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {983--1007}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01023-5}, doi = {10.1007/S10623-022-01023-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DunkelmanEKKLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DuursmaL22, author = {Iwan M. Duursma and Xiao Li}, title = {Johnson graph codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {12}, pages = {2923--2941}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-01003-1}, doi = {10.1007/S10623-021-01003-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DuursmaL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DyshkoW22, author = {Serhii Dyshko and Jay A. Wood}, title = {MacWilliams extension property for arbitrary weights on linear codes over module alphabets}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2683--2701}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00945-w}, doi = {10.1007/S10623-021-00945-W}, timestamp = {Thu, 10 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DyshkoW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EyvaziSS22, author = {Hamidreza Eyvazi and Karim Samei and Batoul Savari}, title = {The linearity of Carlet's Gray image of linear codes over {\textdollar}\{{\textbackslash}mathbb \{Z\}\}{\_}\{8\}{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2361--2373}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01084-6}, doi = {10.1007/S10623-022-01084-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EyvaziSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FernandezU22, author = {Marcel Fernandez and Jorge Jim{\'{e}}nez Urroz}, title = {A study of the separating property in Reed-Solomon codes by bounding the minimum distance}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {2}, pages = {427--442}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00988-z}, doi = {10.1007/S10623-021-00988-Z}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FernandezU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FuL22, author = {Yuqing Fu and Hongwei Liu}, title = {Galois self-orthogonal constacyclic codes over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2703--2733}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00957-6}, doi = {10.1007/S10623-021-00957-6}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/FuL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GalindoH22, author = {Carlos Galindo and Fernando Hernando}, title = {On the generalization of the construction of quantum codes from Hermitian self-orthogonal codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {5}, pages = {1103--1112}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01018-2}, doi = {10.1007/S10623-022-01018-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GalindoH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GaoMF22, author = {Jian Gao and Xiangrui Meng and Fang{-}Wei Fu}, title = {Weight distribution of double cyclic codes over Galois rings}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2529--2549}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00914-3}, doi = {10.1007/S10623-021-00914-3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GaoMF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Geil22, author = {Olav Geil}, title = {From primary to dual affine variety codes over the Klein quartic}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {523--543}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00990-5}, doi = {10.1007/S10623-021-00990-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Geil22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ghatak22, author = {Anirban Ghatak}, title = {Extending Coggia-Couvreur attack on Loidreau's rank-metric cryptosystem}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {1}, pages = {215--238}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00972-7}, doi = {10.1007/S10623-021-00972-7}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Ghatak22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GildeaKR22, author = {Joe Gildea and Adrian Korban and Adam Michael Roberts}, title = {New binary self-dual codes of lengths 80, 84 and 96 from composite matrices}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {2}, pages = {317--342}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00976-3}, doi = {10.1007/S10623-021-00976-3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GildeaKR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HaemersM22, author = {Willem H. Haemers and Leila Parsaei Majd}, title = {Spectral symmetry in conference matrices}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {1983--1990}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00858-8}, doi = {10.1007/S10623-021-00858-8}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HaemersM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HaraMHT22, author = {Keisuke Hara and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {Generic transformation from broadcast encryption to round-optimal deniable ring authentication}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {2}, pages = {277--316}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00975-4}, doi = {10.1007/S10623-021-00975-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HaraMHT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HeCZZ22, author = {Xianmang He and Yindong Chen and Zusheng Zhang and Kunxiao Zhou}, title = {Parallel sub-code construction for constant-dimension codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {12}, pages = {2991--3001}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01065-9}, doi = {10.1007/S10623-022-01065-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HeCZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HorsleyC22, author = {Daniel Horsley and Padraig {\'{O}} Cath{\'{a}}in}, title = {Block avoiding point sequencings of partial Steiner systems}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2375--2383}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01085-5}, doi = {10.1007/S10623-022-01085-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HorsleyC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuangLWD22, author = {Yuwen Huang and Chengju Li and Qi Wang and Zongrun Du}, title = {Parameters and characterizations of hulls of some projective narrow-sense {BCH} codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {1}, pages = {87--106}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00965-6}, doi = {10.1007/S10623-021-00965-6}, timestamp = {Mon, 27 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuangLWD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuffmanKS22, author = {W. Cary Huffman and Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {Guest editorial: On coding theory and combinatorics - in memory of Vera Pless}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2517--2527}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01126-z}, doi = {10.1007/S10623-022-01126-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuffmanKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JafariABKS22, author = {Fatemeh Jafari and Alireza Abdollahi and Javad Bagherian and Maryam Khatami and Reza Sobhani}, title = {Equidistant permutation group codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {12}, pages = {2841--2859}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00997-y}, doi = {10.1007/S10623-021-00997-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JafariABKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Janusz22, author = {Gerald J. Janusz}, title = {Covering polynomials and projections of self-dual codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2481--2489}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01091-7}, doi = {10.1007/S10623-022-01091-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Janusz22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JanzerN22, author = {Oliver Janzer and Zolt{\'{a}}n L{\'{o}}r{\'{a}}nt Nagy}, title = {Coloring linear hypergraphs: the Erd{\H{o}}s-Faber-Lov{\'{a}}sz conjecture and the Combinatorial Nullstellensatz}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {1991--2001}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00859-7}, doi = {10.1007/S10623-021-00859-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JanzerN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JenaV22, author = {Dibyayoti Jena and Geertrui Van de Voorde}, title = {The geometric field of linearity of linear sets}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {779--799}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01011-9}, doi = {10.1007/S10623-022-01011-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JenaV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JiLW22, author = {Lijun Ji and Miao Liang and Yanting Wang}, title = {Combinational constructions of splitting authentication codes with perfect secrecy}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2491--2515}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01092-6}, doi = {10.1007/S10623-022-01092-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JiLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JunnilaLL22, author = {Ville Junnila and Tero Laihonen and Tuomo Lehtil{\"{a}}}, title = {Improved lower bound for locating-dominating codes in binary Hamming spaces}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {1}, pages = {67--85}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00963-8}, doi = {10.1007/S10623-021-00963-8}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/JunnilaLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kantor22, author = {William M. Kantor}, title = {Automorphism subgroups for designs with {\(\lambda\)} =1}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {2145--2157}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00936-x}, doi = {10.1007/S10623-021-00936-X}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kantor22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KawabataM22, author = {Daiki Kawabata and Tatsuya Maruta}, title = {On the nonexistence of ternary linear codes attaining the Griesmer bound}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {947--956}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01021-7}, doi = {10.1007/S10623-022-01021-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KawabataM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kiermaier22, author = {Michael Kiermaier}, title = {On {\(\alpha\)}-points of q-analogs of the Fano plane}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {6}, pages = {1335--1345}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01033-3}, doi = {10.1007/S10623-022-01033-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kiermaier22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimK22, author = {Hyun Kwang Kim and Jieun Kwon}, title = {Classification of weighted posets and digraphs admitting the extended Hamming code to be a perfect code}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2249--2269}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01066-8}, doi = {10.1007/S10623-022-01066-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KimK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimMCLLJ22, author = {Kwang Ho Kim and Sihem Mesnager and Jong Hyok Choe and Dok Nam Lee and Sengsan Lee and Myong Chol Jo}, title = {On permutation quadrinomials with boomerang uniformity 4 and the best-known nonlinearity}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {6}, pages = {1437--1461}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01047-x}, doi = {10.1007/S10623-022-01047-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KimMCLLJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimP22, author = {Jon{-}Lark Kim and Junyong Park}, title = {Steganography from perfect codes on Cayley graphs over Gaussian integers, Eisenstein-Jacobi integers and Lipschitz integers}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {12}, pages = {2967--2989}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01063-x}, doi = {10.1007/S10623-022-01063-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KimP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KorbanSU22, author = {Adrian Korban and Serap Sahinkaya and Deniz Ustun}, title = {Reversible G\({}^{\mbox{k}}\)-codes with applications to {DNA} codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {7}, pages = {1679--1694}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01067-7}, doi = {10.1007/S10623-022-01067-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KorbanSU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Koshelev22, author = {Dmitrii I. Koshelev}, title = {Indifferentiable hashing to ordinary elliptic {\textdollar}\{{\textbackslash}mathbb \{F\}\}{\_}\{{\textbackslash}!q\}{\textdollar}-curves of j=0 with the cost of one exponentiation in {\textdollar}\{{\textbackslash}mathbb \{F\}\}{\_}\{{\textbackslash}!q\}{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {801--812}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01012-8}, doi = {10.1007/S10623-022-01012-8}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Koshelev22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KudinP22, author = {Sadmir Kudin and Enes Pasalic}, title = {A complete characterization of {\textdollar}\{{\textbackslash}mathcal \{D\}\}{\_}0 {\textbackslash}cap \{{\textbackslash}mathcal \{M\}\}{\textbackslash}{\#}{\textdollar} and a general framework for specifying bent functions in \emph{C} outside \emph{M}\({}^{\mbox{{\#}}}\)}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {8}, pages = {1783--1796}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01079-3}, doi = {10.1007/S10623-022-01079-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KudinP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LanCW22, author = {Liantao Lan and Yanxun Chang and Lidong Wang}, title = {The completion of optimal cyclic quaternary codes of weight 3 and distance 3}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {851--862}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01006-6}, doi = {10.1007/S10623-022-01006-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LanCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LauT22, author = {Terry Shue Chien Lau and Chik How Tan}, title = {On the design and security of Lee metric McEliece cryptosystems}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {695--717}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-01002-2}, doi = {10.1007/S10623-021-01002-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LauT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LavrauwPS22, author = {Michel Lavrauw and Tomasz Popiel and John Sheekey}, title = {Combinatorial invariants for nets of conics in {\textdollar}{\textbackslash}mathrm \{PG\}(2, q){\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {2021--2067}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00881-9}, doi = {10.1007/S10623-021-00881-9}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LavrauwPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LazebnikL22, author = {Felix Lazebnik and Lorinda Leshock}, title = {On Pappus configurations in Hall planes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {5}, pages = {1203--1219}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01036-0}, doi = {10.1007/S10623-022-01036-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LazebnikL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeS22, author = {Kwangsu Lee and Minhye Seo}, title = {Functional encryption for set intersection in the multi-client setting}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {1}, pages = {17--47}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00961-w}, doi = {10.1007/S10623-021-00961-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeeS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiHXZ22, author = {Nian Li and Zhao Hu and Maosheng Xiong and Xiangyong Zeng}, title = {A note on "Cryptographically strong permutations from the butterfly structure"}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {2}, pages = {265--276}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00974-5}, doi = {10.1007/S10623-021-00974-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiHXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiL22, author = {Fei Li and Xiumei Li}, title = {Weight distributions and weight hierarchies of a family of p-ary linear codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {1}, pages = {49--66}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00962-9}, doi = {10.1007/S10623-021-00962-9}, timestamp = {Fri, 09 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiY22, author = {Xia Li and Qin Yue}, title = {Non-binary irreducible quasi-cyclic parity-check subcodes of Goppa codes and extended Goppa codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {7}, pages = {1629--1647}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01062-y}, doi = {10.1007/S10623-022-01062-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiYT22, author = {Xia Li and Qin Yue and Deng Tang}, title = {A family of linear codes from constant dimension subspace codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {1}, pages = {1--15}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00960-x}, doi = {10.1007/S10623-021-00960-X}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuLQWSS22, author = {Jiang Liu and Qin Li and Junyu Quan and Can Wang and Jinjing Shi and Haozhen Situ}, title = {Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {577--591}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00993-2}, doi = {10.1007/S10623-021-00993-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuLQWSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuWHCW22, author = {Jun Liu and Dachao Wang and Yupu Hu and Jie Chen and Baocang Wang}, title = {Improved key-recovery attacks on reduced-round {WEM-8}}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2419--2448}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01089-1}, doi = {10.1007/S10623-022-01089-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuWHCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LongobardiST22, author = {Giovanni Longobardi and Leo Storme and Rocco Trombetti}, title = {On sets of subspaces with two intersection dimensions and a geometrical junta bound}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {2081--2099}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00931-2}, doi = {10.1007/S10623-021-00931-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LongobardiST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LuMCFW22, author = {Zhenyu Lu and Sihem Mesnager and Tingting Cui and Yanhong Fan and Meiqin Wang}, title = {An STP-based model toward designing S-boxes with good cryptographic properties}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {5}, pages = {1179--1202}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01034-2}, doi = {10.1007/S10623-022-01034-2}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LuMCFW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LuoA22, author = {Fucai Luo and Saif M. Al{-}Kuwari}, title = {Attribute-based signatures from lattices: unbounded attributes and semi-adaptive security}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {5}, pages = {1157--1177}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01027-1}, doi = {10.1007/S10623-022-01027-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LuoA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LuoL22, author = {Gaojun Luo and San Ling}, title = {Application of optimal p-ary linear codes to alphabet-optimal locally repairable codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {5}, pages = {1271--1287}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01040-4}, doi = {10.1007/S10623-022-01040-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LuoL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaL22, author = {Junru Ma and Jinquan Luo}, title = {{MDS} symbol-pair codes from repeated-root cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {1}, pages = {121--137}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00967-4}, doi = {10.1007/S10623-021-00967-4}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MaL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaL22a, author = {Junru Ma and Jinquan Luo}, title = {Constructions of {MDS} symbol-pair codes with minimum distance seven or eight}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2337--2359}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01081-9}, doi = {10.1007/S10623-022-01081-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MaL22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Martinez22, author = {Federico N. Mart{\'{\i}}nez}, title = {Symmetric functions and spherical t-designs in {\textdollar}{\textbackslash}pmb \{{\textbackslash}mathbb \{R\}2\}{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2563--2581}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00922-3}, doi = {10.1007/S10623-021-00922-3}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Martinez22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MashahdiBZ22, author = {Samaneh Mashahdi and Bagher Bagherpour and Ali Zaghian}, title = {A non-interactive (t, n)-publicly verifiable multi-secret sharing scheme}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {8}, pages = {1761--1782}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01082-8}, doi = {10.1007/S10623-022-01082-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MashahdiBZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MiezakiN22, author = {Tsuyoshi Miezaki and Hiroyuki Nakasora}, title = {A note on the Assmus-Mattson theorem for some binary codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {6}, pages = {1485--1502}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01050-2}, doi = {10.1007/S10623-022-01050-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MiezakiN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MusicCK22, author = {Luka Music and C{\'{e}}line Chevalier and Elham Kashefi}, title = {Dispelling myths on superposition attacks: formal security model and attack analyses}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {881--920}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01017-3}, doi = {10.1007/S10623-022-01017-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MusicCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MusicCK22a, author = {Luka Music and C{\'{e}}line Chevalier and Elham Kashefi}, title = {Correction to: Dispelling myths on superposition attacks: formal security model and attack analyses}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {6}, pages = {1535}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01042-2}, doi = {10.1007/S10623-022-01042-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MusicCK22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OngH22, author = {Kai Lin Ong and Ang Miin Huey}, title = {On equivalence of cyclic and dihedral zero-divisor codes having nilpotents of nilpotency degree two as generators}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {5}, pages = {1127--1138}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01025-3}, doi = {10.1007/S10623-022-01025-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OngH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OzbudakT22, author = {Ferruh {\"{O}}zbudak and Burcu G{\"{u}}lmez Tem{\"{u}}r}, title = {Classification of permutation polynomials of the form x\({}^{\mbox{3g(x\({}^{\mbox{q-1}}\))}}\) of {\unicode{54589}}\({}_{\mbox{q\({}^{\mbox{2}}\)}}\) where g(x)=x\({}^{\mbox{3+bx+c}}\) and {\textdollar}b, c {\textbackslash}in \{{\textbackslash}mathbb F\}{\_}q*{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {7}, pages = {1537--1556}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01052-0}, doi = {10.1007/S10623-022-01052-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OzbudakT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PanABFUW22, author = {Rong Pan and R. Julian R. Abel and Yudhistira A. Bunjamin and Tao Feng and Tiana J. Tsang Ung and Xiaomiao Wang}, title = {Difference matrices with five rows over finite abelian groups}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {2}, pages = {367--386}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00981-6}, doi = {10.1007/S10623-021-00981-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PanABFUW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PatelP22, author = {Shikha Patel and Om Prakash}, title = {({\texttheta} , {\(\delta\)} \({}_{\mbox{{\texttheta}}}\) )-Cyclic codes over {\textdollar}{\textbackslash}mathbb \{F\}{\_}q[u, v]/{\textbackslash}langle u2-u, v2-v, uv-vu {\textbackslash}rangle {\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2763--2781}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00964-7}, doi = {10.1007/S10623-021-00964-7}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/PatelP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PawaleSR22, author = {Rajendra M. Pawale and Mohan S. Shrikhande and Kusum S. Rajbhar}, title = {Non-existence of quasi-symmetric designs with restricted block graphs}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {871--879}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01016-4}, doi = {10.1007/S10623-022-01016-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PawaleSR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Penttila22, author = {Tim Penttila}, title = {Uniqueness of the inversive plane of order sixty-four}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {827--834}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01014-6}, doi = {10.1007/S10623-022-01014-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Penttila22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/QianCLS22, author = {Liqin Qian and Xiwang Cao and Wei Lu and Patrick Sol{\'{e}}}, title = {A new method for constructing linear codes with small hulls}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2663--2682}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00940-1}, doi = {10.1007/S10623-021-00940-1}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/QianCLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/QinZY22, author = {Rongcun Qin and Hengming Zhao and Huangsheng Yu}, title = {Compatible difference packing set systems and their applications to multilength variable-weight OOCs}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2613--2645}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00927-y}, doi = {10.1007/S10623-021-00927-Y}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/QinZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RajputB22, author = {Charul Rajput and Maheshanand Bhaintwal}, title = {On the locality of quasi-cyclic codes over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {759--777}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01009-3}, doi = {10.1007/S10623-022-01009-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RajputB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Romankov22, author = {Vitaly Roman'kov}, title = {An improvement of the Diffie-Hellman noncommutative protocol}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {1}, pages = {139--153}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00969-2}, doi = {10.1007/S10623-021-00969-2}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Romankov22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Romanov22, author = {Alexander M. Romanov}, title = {On the number of q-ary quasi-perfect codes with covering radius 2}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {8}, pages = {1713--1719}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01070-y}, doi = {10.1007/S10623-022-01070-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Romanov22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SantonastasoZ22, author = {Paolo Santonastaso and Ferdinando Zullo}, title = {On the list decodability of rank-metric codes containing Gabidulin codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {957--982}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01022-6}, doi = {10.1007/S10623-022-01022-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SantonastasoZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SenelO22, author = {Engin Senel and Figen {\"{O}}ke}, title = {On the automorphisms of generalized algebraic geometry codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {6}, pages = {1369--1379}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01043-1}, doi = {10.1007/S10623-022-01043-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SenelO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiWHS22, author = {Minjia Shi and Shukai Wang and Tor Helleseth and Patrick Sol{\'{e}}}, title = {Quadratic residue codes, rank three groups and PBIBDs}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2599--2611}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00918-z}, doi = {10.1007/S10623-021-00918-Z}, timestamp = {Thu, 10 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShiWHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Sok22, author = {Lin Sok}, title = {A new construction of linear codes with one-dimensional hull}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {12}, pages = {2823--2839}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00991-4}, doi = {10.1007/S10623-021-00991-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Sok22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SuiZS22, author = {Junzhen Sui and Xiaomeng Zhu and Xueying Shi}, title = {{MDS} and near-MDS codes via twisted Reed-Solomon codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {8}, pages = {1937--1958}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01049-9}, doi = {10.1007/S10623-022-01049-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SuiZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TakahashiH22, author = {Hokuto Takahashi and Manabu Hagiwara}, title = {Decoding algorithms of monotone codes and azinv codes and their unified view}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {12}, pages = {2893--2922}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-01004-0}, doi = {10.1007/S10623-021-01004-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TakahashiH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TanFMG22, author = {Pan Tan and Cuiling Fan and Sihem Mesnager and Wei Guo}, title = {Linear codes from support designs of ternary cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {681--693}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-01001-3}, doi = {10.1007/S10623-021-01001-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TanFMG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TanRC22, author = {Xinyu Tan and Narayanan Rengaswamy and A. Robert Calderbank}, title = {Approximate unitary 3-designs from transvection Markov chains}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {9}, pages = {2181--2204}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-01000-4}, doi = {10.1007/S10623-021-01000-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TanRC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Tonchev22, author = {Vladimir D. Tonchev}, title = {Book Review: "Designs from Linear Codes", second edition, by Cunsheng Ding and Chunming Tang, World Scientific, 2022}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {7}, pages = {1595--1597}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01058-8}, doi = {10.1007/S10623-022-01058-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Tonchev22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Tonchev22a, author = {Vladimir D. Tonchev}, title = {On Pless symmetry codes, ternary {QR} codes, and related Hadamard matrices and designs}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2753--2762}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00941-0}, doi = {10.1007/S10623-021-00941-0}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Tonchev22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Trung22, author = {Tran van Trung}, title = {A method of constructing 2-resolvable t-designs for t=3, 4}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {7}, pages = {1567--1583}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01056-w}, doi = {10.1007/S10623-022-01056-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Trung22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangCFTW22, author = {Lidong Wang and Lulu Cai and Tao Feng and Zihong Tian and Xiaomiao Wang}, title = {Geometric orthogonal codes and geometrical difference packings}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {8}, pages = {1857--1879}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01078-4}, doi = {10.1007/S10623-022-01078-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangCFTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangHWH22, author = {Yan Wang and Xilin Han and Weiqiong Wang and Ziling Heng}, title = {Linear complexity over {\textdollar}\{{\textbackslash}mathbb \{F\}{\_}\{\{q\}\}\}{\textdollar} and 2-adic complexity of a class of binary generalized cyclotomic sequences with good autocorrelation}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {8}, pages = {1695--1712}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01068-6}, doi = {10.1007/S10623-022-01068-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangHWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangTQ22, author = {Xiao{-}Juan Wang and Tian Tian and Wen{-}Feng Qi}, title = {A generic method for investigating nonsingular Galois NFSRs}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {2}, pages = {387--408}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00982-5}, doi = {10.1007/S10623-021-00982-5}, timestamp = {Thu, 18 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangTQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WenC22, author = {Jinming Wen and Xiao{-}Wen Chang}, title = {Sharper bounds on four lattice constants}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {6}, pages = {1463--1484}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01048-w}, doi = {10.1007/S10623-022-01048-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WenC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WieseB22, author = {Moritz Wiese and Holger Boche}, title = {Mosaics of combinatorial designs for information-theoretic security}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {593--632}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00994-1}, doi = {10.1007/S10623-021-00994-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WieseB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WuLW22, author = {Yansheng Wu and Yoonjin Lee and Qiang Wang}, title = {Further improvement on index bounds}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {12}, pages = {2813--2821}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00987-0}, doi = {10.1007/S10623-021-00987-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WuLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WuS22, author = {Rongsheng Wu and Minjia Shi}, title = {On {\textdollar}{\textbackslash}mathbb \{Z\}{\_}2{\textbackslash}mathbb \{Z\}{\_}4{\textdollar}-additive polycyclic codes and their Gray images}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {11}, pages = {2551--2562}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00917-0}, doi = {10.1007/S10623-021-00917-0}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WuS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WuZ22, author = {Haoxuan Wu and Jincheng Zhuang}, title = {Improving the Gaudry-Schost algorithm for multidimensional discrete logarithms}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {1}, pages = {107--119}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00966-5}, doi = {10.1007/S10623-021-00966-5}, timestamp = {Tue, 08 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WuZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XiangTL22, author = {Can Xiang and Chunming Tang and Qi Liu}, title = {An infinite family of antiprimitive cyclic codes supporting Steiner systems S(3, 8, 7\({}^{\mbox{m+1)}}\)}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {6}, pages = {1319--1333}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01032-4}, doi = {10.1007/S10623-022-01032-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XiangTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuZZ22, author = {Xiaofang Xu and Xiangyong Zeng and Shasha Zhang}, title = {Regular complete permutation polynomials over {\textdollar}\{{\textbackslash}mathbb \{F\}\}{\_}\{2\{n\}\}{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {545--575}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00992-3}, doi = {10.1007/S10623-021-00992-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XuZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YanZ22, author = {Haode Yan and Kun Zhang}, title = {On the c-differential spectrum of power functions over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2385--2405}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01086-4}, doi = {10.1007/S10623-022-01086-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YanZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YuanTA22, author = {Quan Yuan and Mehdi Tibouchi and Masayuki Abe}, title = {On subset-resilient hash function families}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {719--758}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01008-4}, doi = {10.1007/S10623-022-01008-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YuanTA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangFM22, author = {Hui Zhang and Cuiling Fan and Sihem Mesnager}, title = {Constructions of two-dimensional Z-complementary array pairs with large {ZCZ} ratio}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {5}, pages = {1221--1239}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01035-1}, doi = {10.1007/S10623-022-01035-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangFM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangFW22, author = {Menglong Zhang and Tao Feng and Xiaomiao Wang}, title = {The existence of cyclic (v, 4, 1)-designs}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {7}, pages = {1611--1628}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01057-9}, doi = {10.1007/S10623-022-01057-9}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangFW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangPRW22, author = {Fengrong Zhang and Enes Pasalic and Ren{\'{e}} Rodr{\'{\i}}guez and Yongzhuang Wei}, title = {Minimal binary linear codes: a general framework based on bent concatenation}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {5}, pages = {1289--1318}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01037-z}, doi = {10.1007/S10623-022-01037-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangPRW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangPZ22, author = {WeiGuo Zhang and Enes Pasalic and Liupiao Zhang}, title = {Phase orthogonal sequence sets for {(QS)CDMA} communications}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {5}, pages = {1139--1156}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01031-5}, doi = {10.1007/S10623-022-01031-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangPZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangZT22, author = {Jun Zhang and Zhengchun Zhou and Chunming Tang}, title = {A class of twisted generalized Reed-Solomon codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {7}, pages = {1649--1658}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01064-w}, doi = {10.1007/S10623-022-01064-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangZT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoFT22, author = {Mengzhen Zhao and Cuiling Fan and Zihong Tian}, title = {Nearly optimal balanced quaternary sequence pairs of prime period N=uiv 5{\(\pm\)}od 8}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {813--826}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01013-7}, doi = {10.1007/S10623-022-01013-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoFT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoLZYMP22, author = {Yi Zhao and Kaitai Liang and Yanqi Zhao and Bo Yang and Yang Ming and Emmanouil Panaousis}, title = {Practical algorithm substitution attack on extractable signatures}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {921--937}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01019-1}, doi = {10.1007/S10623-022-01019-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoLZYMP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoWZPC22, author = {H. Zhao and Yongzhuang Wei and Fengrong Zhang and Enes Pasalic and Nastja Cepak}, title = {Two secondary constructions of bent functions without initial conditions}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {3}, pages = {653--679}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00996-z}, doi = {10.1007/S10623-021-00996-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoWZPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoZ22, author = {Yanwei Zhao and Shenglin Zhou}, title = {Flag-transitive 2-(v, k, {\(\lambda\)} {)} designs with r{\textgreater}{\(\lambda\)} (k-3)}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {4}, pages = {863--869}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01010-w}, doi = {10.1007/S10623-022-01010-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouFZ22, author = {Zhaocun Zhou and Dengguo Feng and Bin Zhang}, title = {Efficient and extensive search for precise linear approximations with high correlations of full {SNOW-V}}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2449--2479}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01090-8}, doi = {10.1007/S10623-022-01090-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhouFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhuSO22, author = {Hongwei Zhu and Minjia Shi and Ferruh {\"{O}}zbudak}, title = {Complete b-symbol weight distribution of some irreducible cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {5}, pages = {1113--1125}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01030-6}, doi = {10.1007/S10623-022-01030-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhuSO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/0002ZJL21, author = {Xiaojing Chen and Shixin Zhu and Wan Jiang and Gaojun Luo}, title = {A new family of {EAQMDS} codes constructed from constacyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {9}, pages = {2179--2193}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00908-1}, doi = {10.1007/S10623-021-00908-1}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/0002ZJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Abdukhalikov21, author = {Kanat S. Abdukhalikov}, title = {Equivalence classes of Niho bent functions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1509--1534}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00885-5}, doi = {10.1007/S10623-021-00885-5}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Abdukhalikov21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AbdukhalikovH21, author = {Kanat S. Abdukhalikov and Duy Ho}, title = {Extended cyclic codes, maximal arcs and ovoids}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {10}, pages = {2283--2294}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00915-2}, doi = {10.1007/S10623-021-00915-2}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AbdukhalikovH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AgugliaGS21, author = {Angela Aguglia and Luca Giuzzi and Angelo Sonnino}, title = {Near-MDS codes from elliptic curves}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {965--972}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00852-0}, doi = {10.1007/S10623-021-00852-0}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AgugliaGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AhmadiAKS21, author = {M. H. Ahmadi and N. Akhlaghinia and Gholamreza B. Khosrovshahi and S. Sadri}, title = {New partitionings of complete designs}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {12}, pages = {2715--2723}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00950-z}, doi = {10.1007/S10623-021-00950-Z}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AhmadiAKS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlfaranoLR21, author = {Gianira N. Alfarano and Julia Lieb and Joachim Rosenthal}, title = {Construction of {LDPC} convolutional codes via difference triangle sets}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {10}, pages = {2235--2254}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00912-5}, doi = {10.1007/S10623-021-00912-5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AlfaranoLR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlmeidaA21, author = {Paulo Jos{\'{e}} Fernandes Almeida and Diego Napp Avelli}, title = {A new rank metric for convolutional codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {1}, pages = {53--73}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00808-w}, doi = {10.1007/S10623-020-00808-W}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AlmeidaA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Alonso-Gonzalez21, author = {Clementa Alonso{-}Gonz{\'{a}}lez and Miguel {\'{A}}ngel Navarro{-}P{\'{e}}rez}, title = {Cyclic orbit flag codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {10}, pages = {2331--2356}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00920-5}, doi = {10.1007/S10623-021-00920-5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Alonso-Gonzalez21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AnkurK21, author = {Ankur and Pramod Kumar Kewat}, title = {Self-dual codes over {\textdollar}\{{\textbackslash}mathbb \{F\}\}{\_}2[u]/{\textbackslash}langle u4 {\textbackslash}rangle {\textdollar} and Jacobi forms over a totally real subfield of {\textdollar}\{{\textbackslash}mathbb \{Q\}\}({\textbackslash}zeta {\_}8){\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {1091--1109}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00860-0}, doi = {10.1007/S10623-021-00860-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AnkurK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AragonBDKPS21, author = {Nicolas Aragon and Marco Baldi and Jean{-}Christophe Deneuville and Karan Khathuria and Edoardo Persichetti and Paolo Santini}, title = {Cryptanalysis of a code-based full-time signature}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {9}, pages = {2097--2112}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00902-7}, doi = {10.1007/S10623-021-00902-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AragonBDKPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ArayaHS21, author = {Makoto Araya and Masaaki Harada and Ken Saito}, title = {Characterization and classification of optimal {LCD} codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {4}, pages = {617--640}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00834-8}, doi = {10.1007/S10623-020-00834-8}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ArayaHS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ArmarioBE21, author = {Jos{\'{e}} Andr{\'{e}}s Armario and Iv{\'{a}}n Bailera and Ronan Egan}, title = {Generalized Hadamard full propelinear codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {4}, pages = {599--615}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00827-7}, doi = {10.1007/S10623-020-00827-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ArmarioBE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ball21, author = {Simeon Ball}, title = {Some constructions of quantum {MDS} codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {811--821}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00846-y}, doi = {10.1007/S10623-021-00846-Y}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ball21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ballico21, author = {Edoardo Ballico}, title = {Locally Recoverable Codes correcting many erasures over small fields}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {9}, pages = {2157--2162}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00905-4}, doi = {10.1007/S10623-021-00905-4}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Ballico21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BallicoFGM21, author = {Edoardo Ballico and Giuseppe Favacchio and Elena Guardo and Lorenzo Milazzo}, title = {Steiner systems and configurations of points}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {2}, pages = {199--219}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00815-x}, doi = {10.1007/S10623-020-00815-X}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BallicoFGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BamiloshinBFP21, author = {Michael Bamiloshin and Aner Ben{-}Efraim and Oriol Farr{\`{a}}s and Carles Padr{\'{o}}}, title = {Common information, matroid representation, and secret sharing for matroid ports}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {1}, pages = {143--166}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00811-1}, doi = {10.1007/S10623-020-00811-1}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BamiloshinBFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BannaiOZ21, author = {Eiichi Bannai and Manabu Oura and Da Zhao}, title = {The complex conjugate invariants of Clifford groups}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {2}, pages = {341--350}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00819-7}, doi = {10.1007/S10623-020-00819-7}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BannaiOZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BapicP21, author = {Amar Bapic and Enes Pasalic}, title = {A new method for secondary constructions of vectorial bent functions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {11}, pages = {2463--2475}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00930-3}, doi = {10.1007/S10623-021-00930-3}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BapicP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartoliBT21, author = {Daniele Bartoli and Matteo Bonini and Marco Timpanella}, title = {On the weight distribution of some minimal codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {3}, pages = {471--487}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00826-8}, doi = {10.1007/S10623-020-00826-8}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BartoliBT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartoliMZ21, author = {Daniele Bartoli and Maria Montanucci and Giovanni Zini}, title = {On certain self-orthogonal {AG} codes with applications to Quantum error-correcting codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1221--1239}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00870-y}, doi = {10.1007/S10623-021-00870-Y}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BartoliMZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BhaumikNR21, author = {Ritam Bhaumik and Mridul Nandi and Anik Raychaudhuri}, title = {Improved indifferentiability security proof for 3-round tweakable Luby-Rackoff}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {10}, pages = {2255--2281}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00913-4}, doi = {10.1007/S10623-021-00913-4}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BhaumikNR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BonviciniBGRT21, author = {Simona Bonvicini and Marco Buratti and Martino Garonzi and Gloria Rinaldi and Tommaso Traetta}, title = {The first families of highly symmetric Kirkman Triple Systems whose orders fill a congruence class}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {12}, pages = {2725--2757}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00952-x}, doi = {10.1007/S10623-021-00952-X}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BonviciniBGRT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bouyuklieva21, author = {Stefka Bouyuklieva}, title = {Optimal binary {LCD} codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {11}, pages = {2445--2461}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00929-w}, doi = {10.1007/S10623-021-00929-W}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Bouyuklieva21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BudaghyanCCCV21, author = {Lilya Budaghyan and Marco Calderini and Claude Carlet and Robert S. Coulter and Irene Villa}, title = {Generalized isotopic shift construction for {APN} functions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {1}, pages = {19--32}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00803-1}, doi = {10.1007/S10623-020-00803-1}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BudaghyanCCCV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Calderini21, author = {Marco Calderini}, title = {Differentially low uniform permutations from known 4-uniform functions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {1}, pages = {33--52}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00807-x}, doi = {10.1007/S10623-020-00807-X}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Calderini21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletKM21, author = {Claude Carlet and Kwang Ho Kim and Sihem Mesnager}, title = {A direct proof of APN-ness of the Kasami functions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {3}, pages = {441--446}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00830-y}, doi = {10.1007/S10623-020-00830-Y}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CarletKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarvalhoN21, author = {C{\'{\i}}cero Carvalho and Victor G. L. Neumann}, title = {Towards the Complete Determination of Next-to-Minimal Weights of Projective Reed-Muller Codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {2}, pages = {301--315}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00821-z}, doi = {10.1007/S10623-020-00821-Z}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CarvalhoN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CavenaghMW21, author = {Nicholas J. Cavenagh and Adam Mammoliti and Ian M. Wanless}, title = {Maximal sets of mutually orthogonal frequency squares}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {3}, pages = {525--558}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00832-w}, doi = {10.1007/S10623-020-00832-W}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CavenaghMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CesmeliogluMP21, author = {Ay{\c{c}}a {\c{C}}esmelioglu and Wilfried Meidl and Isabel Pirsic}, title = {Vectorial bent functions and partial difference sets}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {10}, pages = {2313--2330}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00919-y}, doi = {10.1007/S10623-021-00919-Y}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CesmeliogluMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChaiWX21, author = {Jinjin Chai and Zilong Wang and Erzhong Xue}, title = {Walsh spectrum and nega spectrum of complementary arrays}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {12}, pages = {2663--2677}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00938-9}, doi = {10.1007/S10623-021-00938-9}, timestamp = {Thu, 16 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ChaiWX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChakrabortyFP21, author = {Olive Chakraborty and Jean{-}Charles Faug{\`{e}}re and Ludovic Perret}, title = {Cryptanalysis of the extension field cancellation cryptosystem}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1335--1364}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00873-9}, doi = {10.1007/S10623-021-00873-9}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChakrabortyFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChakrabortyM21, author = {Pranab Chakraborty and Subhamoy Maitra}, title = {Further clarification on Mantin's Digraph Repetition Bias in {RC4}}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {1}, pages = {127--141}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00814-y}, doi = {10.1007/S10623-020-00814-Y}, timestamp = {Mon, 25 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ChakrabortyM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChakrabortyM21a, author = {Himadri Shekhar Chakraborty and Tsuyoshi Miezaki}, title = {Average of complete joint weight enumerators and self-dual codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1241--1254}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00874-8}, doi = {10.1007/S10623-021-00874-8}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChakrabortyM21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChauhanSSY21, author = {Varsha Chauhan and Anuradha Sharma and Sandeep Sharma and Monika Yadav}, title = {Hamming weight distributions of multi-twisted codes over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {8}, pages = {1787--1837}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00889-1}, doi = {10.1007/S10623-021-00889-1}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChauhanSSY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenMZ21, author = {Ruikai Chen and Sihem Mesnager and Chang{-}An Zhao}, title = {Good polynomials for optimal {LRC} of low locality}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1639--1660}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00886-4}, doi = {10.1007/S10623-021-00886-4}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenMZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenMZ21a, author = {Ruikai Chen and Sihem Mesnager and Chang{-}An Zhao}, title = {Correction to: Good polynomials for optimal {LRC} of low locality}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {8}, pages = {2031}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00909-0}, doi = {10.1007/S10623-021-00909-0}, timestamp = {Thu, 12 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenMZ21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenXTT21, author = {Yu{-}Chi Chen and Xin Xie and Hung{-}Yu Tsao and Raylin Tso}, title = {Public key encryption with filtered equality test revisited}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {10}, pages = {2357--2372}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00924-1}, doi = {10.1007/S10623-021-00924-1}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenXTT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenZ21, author = {Jianfu Chen and Shenglin Zhou}, title = {Flag-transitive, point-imprimitive 2-(v, k, {\(\lambda\)} {)} symmetric designs with k and {\(\lambda\)} prime powers}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1255--1260}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00869-5}, doi = {10.1007/S10623-021-00869-5}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenZJ21, author = {Xiaojing Chen and Shixin Zhu and Wan Jiang}, title = {Cyclic codes and some new entanglement-assisted quantum {MDS} codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {11}, pages = {2533--2551}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00935-y}, doi = {10.1007/S10623-021-00935-Y}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenZJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChisakiFM21, author = {Shoko Chisaki and Ryoh Fuji{-}Hara and Nobuko Miyamoto}, title = {A construction for circulant type dropout designs}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {8}, pages = {1839--1852}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00890-8}, doi = {10.1007/S10623-021-00890-8}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChisakiFM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChoKL21, author = {Wonhee Cho and Jiseung Kim and Changmin Lee}, title = {(In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {973--1016}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00854-y}, doi = {10.1007/S10623-021-00854-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChoKL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Colbourn21, author = {Charles J. Colbourn}, title = {Egalitarian Steiner triple systems for data popularity}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {10}, pages = {2373--2395}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00925-0}, doi = {10.1007/S10623-021-00925-0}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Colbourn21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CuiLGW21, author = {Nan Cui and Shengli Liu and Dawu Gu and Jian Weng}, title = {Robustly reusable fuzzy extractor with imperfect randomness}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {1017--1059}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00843-1}, doi = {10.1007/S10623-021-00843-1}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CuiLGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DavisHKLRSSS21, author = {James A. Davis and J. J. Hoo and Connor Kissane and Ziming Liu and Calvin Reedy and Kartikey Sharma and Ken Smith and Yiwei Sun}, title = {Abelian difference sets with the symmetric difference property}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {3}, pages = {517--523}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00829-5}, doi = {10.1007/S10623-020-00829-5}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DavisHKLRSSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DavydovMP21, author = {Alexander A. Davydov and Stefano Marcugini and Fernanda Pambianco}, title = {Twisted cubic and point-line incidence matrix in {\textdollar}{\textbackslash}mathrm \{PG\}(3, q){\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {10}, pages = {2211--2233}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00911-6}, doi = {10.1007/S10623-021-00911-6}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DavydovMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DingTT21, author = {Cunsheng Ding and Chunming Tang and Vladimir D. Tonchev}, title = {The projective general linear group {\textdollar}\{{\textbackslash}mathrm \{PGL\}\}(2, 2m){\textdollar} and linear codes of length 2\({}^{\mbox{m+1}}\)}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1713--1734}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00888-2}, doi = {10.1007/S10623-021-00888-2}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DingTT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dong21, author = {Huili Dong}, title = {Flag-transitive 4-designs and PSL(2, q) groups}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1147--1157}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00867-7}, doi = {10.1007/S10623-021-00867-7}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dong21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DoughertyGKK21, author = {Steven T. Dougherty and Joe Gildea and Adrian Korban and Abidin Kaya}, title = {Composite matrices from group rings, composite G-codes and constructions of self-dual codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1615--1638}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00882-8}, doi = {10.1007/S10623-021-00882-8}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DoughertyGKK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EmuraTW21, author = {Keita Emura and Atsushi Takayasu and Yohei Watanabe}, title = {Adaptively secure revocable hierarchical {IBE} from k-linear assumption}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1535--1574}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00880-w}, doi = {10.1007/S10623-021-00880-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EmuraTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EmuraTW21a, author = {Keita Emura and Atsushi Takayasu and Yohei Watanabe}, title = {Efficient identity-based encryption with Hierarchical key-insulation from {HIBE}}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {10}, pages = {2397--2431}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00926-z}, doi = {10.1007/S10623-021-00926-Z}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EmuraTW21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EsfahaniS21, author = {Navid Nasr Esfahani and Douglas R. Stinson}, title = {On security properties of all-or-nothing transforms}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {12}, pages = {2857--2867}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00958-5}, doi = {10.1007/S10623-021-00958-5}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/EsfahaniS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EtzionZ21, author = {Tuvi Etzion and Junling Zhou}, title = {Large sets with multiplicity}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1661--1690}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00878-4}, doi = {10.1007/S10623-021-00878-4}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EtzionZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FalconeP21, author = {Giovanni Falcone and Marco Pavone}, title = {Binary Hamming codes and Boolean designs}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1261--1277}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00853-z}, doi = {10.1007/S10623-021-00853-Z}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/FalconeP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FarrasRR21, author = {Oriol Farr{\`{a}}s and Jordi Ribes{-}Gonz{\'{a}}lez and Sara Ricci}, title = {Privacy-preserving data splitting: a combinatorial approach}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1735--1756}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00884-6}, doi = {10.1007/S10623-021-00884-6}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/FarrasRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FengLLLW21, author = {Hanwen Feng and Jianwei Liu and Dawei Li and Ya{-}Nan Li and Qianhong Wu}, title = {Traceable ring signatures: general framework and post-quantum security}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1111--1145}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00863-x}, doi = {10.1007/S10623-021-00863-X}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FengLLLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FickusIJK21, author = {Matthew Fickus and Joseph W. Iverson and John Jasper and Emily J. King}, title = {Grassmannian codes from paired difference sets}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {11}, pages = {2553--2576}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00937-w}, doi = {10.1007/S10623-021-00937-W}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FickusIJK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GhasemiKKPR21, author = {Fatemeh Ghasemi and Reza Kaboli and Shahram Khazaei and Maghsoud Parviz and Mohammad{-}Mahdi Rafiei}, title = {On ideal homomorphic secret sharing schemes and their decomposition}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {9}, pages = {2079--2096}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00901-8}, doi = {10.1007/S10623-021-00901-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GhasemiKKPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GhoshS21, author = {Sebati Ghosh and Palash Sarkar}, title = {Variants of Wegman-Carter message authentication code supporting variable tag lengths}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {4}, pages = {709--736}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00840-w}, doi = {10.1007/S10623-020-00840-W}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GhoshS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GhoshS21a, author = {Sebati Ghosh and Palash Sarkar}, title = {Breaking tweakable enciphering schemes using Simon's algorithm}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {8}, pages = {1907--1926}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00893-5}, doi = {10.1007/S10623-021-00893-5}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GhoshS21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Gluesing-Luerssen21, author = {Heide Gluesing{-}Luerssen and Hunter Lehmann}, title = {Distance Distributions of Cyclic Orbit Codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {3}, pages = {447--470}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00823-x}, doi = {10.1007/S10623-020-00823-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Gluesing-Luerssen21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GongQ21, author = {Junqing Gong and Haifeng Qian}, title = {Simple and efficient {FE} for quadratic functions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {8}, pages = {1757--1786}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00871-x}, doi = {10.1007/S10623-021-00871-X}, timestamp = {Thu, 07 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GongQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GrezetH21, author = {Matthias Grezet and Camilla Hollanti}, title = {The complete hierarchical locality of the punctured Simplex code}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {1}, pages = {105--125}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00810-2}, doi = {10.1007/S10623-020-00810-2}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GrezetH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Guo21, author = {Jun Guo}, title = {Cameron-Liebler sets in bilinear forms graphs}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1159--1180}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00864-w}, doi = {10.1007/S10623-021-00864-W}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Guo21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuoZ21, author = {Chun Guo and Guoyan Zhang}, title = {Beyond-birthday security for permutation-based Feistel networks}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {3}, pages = {407--440}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00820-0}, doi = {10.1007/S10623-020-00820-0}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuoZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Harada21, author = {Masaaki Harada}, title = {Construction of binary {LCD} codes, ternary {LCD} codes and quaternary Hermitian {LCD} codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {10}, pages = {2295--2312}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00916-1}, doi = {10.1007/S10623-021-00916-1}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Harada21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HasanPRS21, author = {Sartaj Ul Hasan and Mohit Pal and Constanza Riera and Pantelimon Stanica}, title = {On the c-differential uniformity of certain maps over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {2}, pages = {221--239}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00812-0}, doi = {10.1007/S10623-020-00812-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HasanPRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HasanPS21, author = {Sartaj Ul Hasan and Mohit Pal and Pantelimon Stanica}, title = {Boomerang uniformity of a class of power maps}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {11}, pages = {2627--2636}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00944-x}, doi = {10.1007/S10623-021-00944-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HasanPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Hawtin21, author = {Daniel R. Hawtin}, title = {s-Elusive codes in Hamming graphs}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1211--1220}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00868-6}, doi = {10.1007/S10623-021-00868-6}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Hawtin21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HengLDC21, author = {Ziling Heng and Dexiang Li and Jiao Du and Fuling Chen}, title = {A family of projective two-weight linear codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {8}, pages = {1993--2007}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00896-2}, doi = {10.1007/S10623-021-00896-2}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HengLDC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuL21, author = {Peng Hu and Xiusheng Liu}, title = {Linear complementary pairs of codes over rings}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {11}, pages = {2495--2509}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00933-0}, doi = {10.1007/S10623-021-00933-0}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuangYNL21, author = {Daitao Huang and Qin Yue and Yongfeng Niu and Xia Li}, title = {{MDS} or {NMDS} self-dual codes from twisted generalized Reed-Solomon codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {9}, pages = {2195--2209}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00910-7}, doi = {10.1007/S10623-021-00910-7}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuangYNL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/InnamoratiZ21, author = {Stefano Innamorati and Fulvio Zuanni}, title = {Classifying sets of class [1, q+1, 2q+1, q\({}^{\mbox{2}}\)+q+1]\({}_{\mbox{2}}\) in PG(r, q), {\textdollar}r{\textbackslash}ge 3{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {3}, pages = {489--496}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00833-9}, doi = {10.1007/S10623-020-00833-9}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/InnamoratiZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JaramilloPV21, author = {Delio Jaramillo and Maria Vaz Pinto and Rafael H. Villarreal}, title = {Evaluation codes and their basic parameters}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {2}, pages = {269--300}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00818-8}, doi = {10.1007/S10623-020-00818-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JaramilloPV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JiaL21, author = {Dingding Jia and Beno{\^{\i}}t Libert}, title = {{SO-CCA} secure {PKE} from pairing based all-but-many lossy trapdoor functions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {895--923}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00849-9}, doi = {10.1007/S10623-021-00849-9}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JiaL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JohnsenV21, author = {Trygve Johnsen and Hugues Verdure}, title = {Greedy weights for matroids}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {2}, pages = {387--405}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00824-w}, doi = {10.1007/S10623-020-00824-W}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JohnsenV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JohnsenV21a, author = {Trygve Johnsen and Hugues Verdure}, title = {M{\"{o}}bius and coboundary polynomials for matroids}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {9}, pages = {2163--2177}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00906-3}, doi = {10.1007/S10623-021-00906-3}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/JohnsenV21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KharaghaniPS21, author = {Hadi Kharaghani and Thomas Pender and Sho Suda}, title = {Balancedly splittable orthogonal designs and equiangular tight frames}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {9}, pages = {2033--2050}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00897-1}, doi = {10.1007/S10623-021-00897-1}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KharaghaniPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KuchtaSSL21, author = {Veronika Kuchta and Amin Sakzad and Ron Steinfeld and Joseph K. Liu}, title = {Lattice-based zero-knowledge arguments for additive and multiplicative relations}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {925--963}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00851-1}, doi = {10.1007/S10623-021-00851-1}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KuchtaSSL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kurz21, author = {Sascha Kurz}, title = {Bounds for flag codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {12}, pages = {2759--2785}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00953-w}, doi = {10.1007/S10623-021-00953-W}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Kurz21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KurzY21, author = {Sascha Kurz and Eitan Yaakobi}, title = {{PIR} Codes with Short Block Length}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {3}, pages = {559--587}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00828-6}, doi = {10.1007/S10623-020-00828-6}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/KurzY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiLHG21, author = {Yiming Li and Shengli Liu and Shuai Han and Dawu Gu}, title = {Pseudorandom functions in {NC} class from the standard {LWE} assumption}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {12}, pages = {2807--2839}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00955-8}, doi = {10.1007/S10623-021-00955-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiLHG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiLHQ21, author = {Kangquan Li and Chunlei Li and Tor Helleseth and Longjiang Qu}, title = {Cryptographically strong permutations from the butterfly structure}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {4}, pages = {737--761}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00837-5}, doi = {10.1007/S10623-020-00837-5}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiLHQ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LigetiST21, author = {P{\'{e}}ter Ligeti and P{\'{e}}ter Sziklai and Marcella Tak{\'{a}}ts}, title = {Generalized threshold secret sharing and finite geometry}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {9}, pages = {2067--2078}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00900-9}, doi = {10.1007/S10623-021-00900-9}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LigetiST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuHL21, author = {Hualu Liu and Peng Hu and Xiusheng Liu}, title = {Asymmetric entanglement-assisted quantum codes: bound and constructions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {797--809}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00845-z}, doi = {10.1007/S10623-021-00845-Z}, timestamp = {Tue, 11 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuL21, author = {Huaning Liu and Xi Liu}, title = {On the properties of generalized cyclotomic binary sequences of period 2p\({}^{\mbox{m}}\)}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1691--1712}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00887-3}, doi = {10.1007/S10623-021-00887-3}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuL21a, author = {Hongwei Liu and Shengwei Liu}, title = {Construction of {MDS} twisted Reed-Solomon codes and {LCD} {MDS} codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {9}, pages = {2051--2065}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00899-z}, doi = {10.1007/S10623-021-00899-Z}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiuL21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LopezMMPW21, author = {Hiram H. L{\'{o}}pez and Beth Malmskog and Gretchen L. Matthews and Fernando Pi{\~{n}}ero{-}Gonz{\'{a}}lez and Mary Wootters}, title = {Hermitian-lifted codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {3}, pages = {497--515}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00836-6}, doi = {10.1007/S10623-020-00836-6}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LopezMMPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LopezSV21, author = {Hiram H. L{\'{o}}pez and Ivan Soprunov and Rafael H. Villarreal}, title = {The dual of an evaluation code}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1367--1403}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00872-w}, doi = {10.1007/S10623-021-00872-W}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LopezSV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MeidlP21, author = {Wilfried Meidl and Isabel Pirsic}, title = {Bent and {\textdollar}\{\{{\textbackslash}mathbb \{Z\}\}\}{\_}\{2k\}{\textdollar}-Bent functions from spread-like partitions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {1}, pages = {75--89}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00805-z}, doi = {10.1007/S10623-020-00805-Z}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MeidlP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MengZW21, author = {Zhaoping Meng and Bin Zhang and Zhanggui Wu}, title = {Constructions of doubly resolvable Steiner quadruple systems}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {781--795}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00844-0}, doi = {10.1007/S10623-021-00844-0}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MengZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MenninkN21, author = {Bart Mennink and Samuel Neves}, title = {On the Resilience of Even-Mansour to Invariant Permutations}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {859--893}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00850-2}, doi = {10.1007/S10623-021-00850-2}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MenninkN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MesnagerSZ21, author = {Sihem Mesnager and Sihong Su and Hui Zhang}, title = {A construction method of balanced rotation symmetric Boolean functions on arbitrary even number of variables with optimal algebraic immunity}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {1}, pages = {1--17}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00806-y}, doi = {10.1007/S10623-020-00806-Y}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MesnagerSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Miezaki21, author = {Tsuyoshi Miezaki}, title = {Design-theoretic analogies between codes, lattices, and vertex operator algebras}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {763--780}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00842-2}, doi = {10.1007/S10623-021-00842-2}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Miezaki21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MiezakiMN21, author = {Tsuyoshi Miezaki and Akihiro Munemasa and Hiroyuki Nakasora}, title = {A note on Assmus-Mattson type theorems}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {843--858}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00848-w}, doi = {10.1007/S10623-021-00848-W}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MiezakiMN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Monroe21, author = {Laura Monroe}, title = {Binary signed-digit integers and the Stern diatomic sequence}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {12}, pages = {2653--2662}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00903-6}, doi = {10.1007/S10623-021-00903-6}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Monroe21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Oblaukhov21, author = {Alexey Oblaukhov}, title = {On metric regularity of Reed-Muller codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {1}, pages = {167--197}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00813-z}, doi = {10.1007/S10623-020-00813-Z}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Oblaukhov21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PangZK21, author = {Binbin Pang and Shixin Zhu and Xiaoshan Kai}, title = {Five families of the narrow-sense primitive {BCH} codes over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {12}, pages = {2679--2696}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00942-z}, doi = {10.1007/S10623-021-00942-Z}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/PangZK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PolujanP21, author = {Alexandr A. Polujan and Alexander Pott}, title = {Correction to: Cubic bent functions outside the completed Maiorana-McFarland class}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1365--1366}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00877-5}, doi = {10.1007/S10623-021-00877-5}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PolujanP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RennerNP21, author = {Julian Renner and Alessandro Neri and Sven Puchinger}, title = {Low-rank parity-check codes over Galois rings}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {2}, pages = {351--386}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00825-9}, doi = {10.1007/S10623-020-00825-9}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RennerNP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RennerPW21, author = {Julian Renner and Sven Puchinger and Antonia Wachter{-}Zeh}, title = {{LIGA:} a cryptosystem based on the hardness of rank-metric list and interleaved decoding}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1279--1319}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00861-z}, doi = {10.1007/S10623-021-00861-Z}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RennerPW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RozhkovS21, author = {Michail I. Rozhkov and Alexander V. Sorokin}, title = {Some conditions for absence of affine functions in {NFSR} output stream}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {11}, pages = {2433--2443}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00928-x}, doi = {10.1007/S10623-021-00928-X}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/RozhkovS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SadeghiRB21, author = {Sadegh Sadeghi and Vincent Rijmen and Nasour Bagheri}, title = {Proposing an MILP-based method for the experimental verification of difference-based trails: application to SPECK, {SIMECK}}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {9}, pages = {2113--2155}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00904-5}, doi = {10.1007/S10623-021-00904-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SadeghiRB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SajadiehM21, author = {Mahdi Sajadieh and Mohsen Mousavi}, title = {Construction of {MDS} matrices from generalized Feistel structures}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1433--1452}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00876-6}, doi = {10.1007/S10623-021-00876-6}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SajadiehM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShafieinejadE21, author = {Masoumeh Shafieinejad and Navid Nasr Esfahani}, title = {A scalable post-quantum hash-based group signature}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {1061--1090}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00857-9}, doi = {10.1007/S10623-021-00857-9}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShafieinejadE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SharmaS21, author = {Hariom Sharma and R. K. Sharma}, title = {Existence of primitive normal pairs with one prescribed trace over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {12}, pages = {2841--2855}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00956-7}, doi = {10.1007/S10623-021-00956-7}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/SharmaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiWHGW21, author = {Tairong Shi and Wenling Wu and Bin Hu and Jie Guan and Sengpeng Wang}, title = {Breaking {LWC} candidates: sESTATE and Elephant in quantum setting}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1405--1432}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00875-7}, doi = {10.1007/S10623-021-00875-7}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShiWHGW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SidanaS21, author = {Tania Sidana and Anuradha Sharma}, title = {Roulette games and depths of words over finite commutative rings}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {4}, pages = {641--678}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00838-4}, doi = {10.1007/S10623-020-00838-4}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SidanaS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Sok21, author = {Lin Sok}, title = {New families of self-dual codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {5}, pages = {823--841}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00847-x}, doi = {10.1007/S10623-021-00847-X}, timestamp = {Tue, 11 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Sok21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SongTSH21, author = {Ling Song and Yi Tu and Danping Shi and Lei Hu}, title = {Security analysis of Subterranean 2.0}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {8}, pages = {1875--1905}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00892-6}, doi = {10.1007/S10623-021-00892-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SongTSH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SunYW21, author = {Yuhua Sun and Tongjiang Yan and Qiuyan Wang}, title = {The 2-adic complexity of Yu-Gong sequences with interleaved structure and optimal autocorrelation magnitude}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {4}, pages = {695--707}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00841-9}, doi = {10.1007/S10623-020-00841-9}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SunYW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Takayasu21, author = {Atsushi Takayasu}, title = {Tag-based {ABE} in prime-order groups via pair encoding}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {8}, pages = {1927--1963}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00894-4}, doi = {10.1007/S10623-021-00894-4}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Takayasu21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Takayasu21a, author = {Atsushi Takayasu}, title = {Adaptively secure lattice-based revocable {IBE} in the {QROM:} compact parameters, tight security, and anonymity}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {8}, pages = {1965--1992}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00895-3}, doi = {10.1007/S10623-021-00895-3}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Takayasu21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TomidaKN21, author = {Junichi Tomida and Yuto Kawahara and Ryo Nishimaki}, title = {Fast, compact, and expressive attribute-based encryption}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {11}, pages = {2577--2626}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00939-8}, doi = {10.1007/S10623-021-00939-8}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/TomidaKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Trung21, author = {Tran van Trung}, title = {An extending theorem for s-resolvable t-designs}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {3}, pages = {589--597}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00835-7}, doi = {10.1007/S10623-020-00835-7}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Trung21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TuZJL21, author = {Ziran Tu and Xiangyong Zeng and Yupeng Jiang and Yan Li}, title = {Binomial permutations over finite fields with even characteristic}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {12}, pages = {2869--2888}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00959-4}, doi = {10.1007/S10623-021-00959-4}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/TuZJL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TurnerKBG21, author = {Jonathan S. Turner and Ilias S. Kotsireas and Dursun A. Bulutoglu and Andrew J. Geyer}, title = {A Legendre pair of length 77 using complementary binary matrices with fixed marginals}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1321--1333}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00862-y}, doi = {10.1007/S10623-021-00862-Y}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TurnerKBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Wang21, author = {Xin Wang}, title = {Improved upper bounds for parent-identifying set systems and separable codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {1}, pages = {91--104}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00809-9}, doi = {10.1007/S10623-020-00809-9}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Wang21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangJ21, author = {Qian Wang and Chenhui Jin}, title = {Bounding the length of impossible differentials for {SPN} block ciphers}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {11}, pages = {2477--2493}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00932-1}, doi = {10.1007/S10623-021-00932-1}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangWYF21, author = {Xiang Wang and Yuanjie Wang and Wenjuan Yin and Fang{-}Wei Fu}, title = {Nonexistence of perfect permutation codes under the Kendall {\(\tau\)}-metric}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {11}, pages = {2511--2531}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00934-z}, doi = {10.1007/S10623-021-00934-Z}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangWYF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangZZ21, author = {Xiaoqiang Wang and Dabin Zheng and Yan Zhang}, title = {Binary linear codes with few weights from Boolean functions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {8}, pages = {2009--2030}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00898-0}, doi = {10.1007/S10623-021-00898-0}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangZZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangZZF21, author = {Zhongxiao Wang and Qunxiong Zheng and Xiao{-}Xin Zhao and Xiutao Feng}, title = {Grain-like structures with minimal and maximal period sequences}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {4}, pages = {679--693}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00839-3}, doi = {10.1007/S10623-020-00839-3}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangZZF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WuLZ21, author = {Yanan Wu and Nian Li and Xiangyong Zeng}, title = {New PcN and APcN functions over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {11}, pages = {2637--2651}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00946-9}, doi = {10.1007/S10623-021-00946-9}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WuLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YanL21, author = {Haode Yan and Chengju Li}, title = {Differential spectra of a class of power permutations with characteristic 5}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1181--1191}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00865-9}, doi = {10.1007/S10623-021-00865-9}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YanL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YangZW21, author = {Yumeng Yang and Xiangyong Zeng and Shi Wang}, title = {Construction of lightweight involutory {MDS} matrices}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1453--1483}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00879-3}, doi = {10.1007/S10623-021-00879-3}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YangZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YeT21, author = {Chen{-}Dong Ye and Tian Tian}, title = {An improved degree evaluation method of NFSR-based cryptosystems}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {12}, pages = {2787--2806}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00954-9}, doi = {10.1007/S10623-021-00954-9}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/YeT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YeTZ21, author = {Chen{-}Dong Ye and Tian Tian and Fan{-}Yang Zeng}, title = {The MILP-aided conditional differential attack and its application to Trivium}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {2}, pages = {317--339}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00822-y}, doi = {10.1007/S10623-020-00822-Y}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/YeTZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaH21, author = {Zhengbang Zha and Lei Hu}, title = {Some classes of power functions with low c-differential uniformity over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {6}, pages = {1193--1210}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00866-8}, doi = {10.1007/S10623-021-00866-8}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhaH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangPRW21, author = {Fengrong Zhang and Enes Pasalic and Ren{\'{e}} Rodr{\'{\i}}guez and Yongzhuang Wei}, title = {Wide minimal binary linear codes from the general Maiorana-McFarland class}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1485--1507}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00883-7}, doi = {10.1007/S10623-021-00883-7}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangPRW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangSP21, author = {WeiGuo Zhang and Yujuan Sun and Enes Pasalic}, title = {Three classes of balanced vectorial semi-bent functions}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {12}, pages = {2697--2714}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00943-y}, doi = {10.1007/S10623-021-00943-Y}, timestamp = {Thu, 07 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoCDS21, author = {Xiaopeng Zhao and Zhenfu Cao and Xiaolei Dong and Jun Shao}, title = {Extended Galbraith's test on the anonymity of {IBE} schemes from higher residuosity}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {2}, pages = {241--253}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00816-w}, doi = {10.1007/S10623-020-00816-W}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoCDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouHC21, author = {Jingkun Zhou and Zhiwen He and Zhao Chai}, title = {Two kinds of constructions of directed strongly regular graphs}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {2}, pages = {255--268}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00817-9}, doi = {10.1007/S10623-020-00817-9}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhouHC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouYXZM21, author = {Yanwei Zhou and Bo Yang and Zhe Xia and Mingwu Zhang and Yi Mu}, title = {Novel generic construction of leakage-resilient {PKE} scheme with {CCA} security}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {7}, pages = {1575--1614}, year = {2021}, url = {https://doi.org/10.1007/s10623-020-00831-x}, doi = {10.1007/S10623-020-00831-X}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhouYXZM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZiniZ21, author = {Giovanni Zini and Ferdinando Zullo}, title = {Scattered subspaces and related codes}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {8}, pages = {1853--1873}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00891-7}, doi = {10.1007/S10623-021-00891-7}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZiniZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AdriaensenDSW20, author = {Sam Adriaensen and Lins Denaux and Leo Storme and Zsuzsa Weiner}, title = {Small weight code words arising from the incidence of points and hyperplanes in PG(n, q)}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {4}, pages = {771--788}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00710-0}, doi = {10.1007/S10623-019-00710-0}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AdriaensenDSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlacaM20, author = {Saban Alaca and Goldwyn Millar}, title = {Shift-inequivalent decimations of the Sidelnikov-Lempel-Cohn-Eastman sequences}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {3}, pages = {567--583}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00697-8}, doi = {10.1007/S10623-019-00697-8}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AlacaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlaviBCD20, author = {Seyed Hassan Alavi and Mohsen Bayat and Jalal Choulaki and Ashraf Daneshkhah}, title = {Flag-transitive block designs with prime replication number and almost simple groups}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {5}, pages = {971--992}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00724-z}, doi = {10.1007/S10623-020-00724-Z}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlaviBCD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlaviDP20, author = {Seyed Hassan Alavi and Ashraf Daneshkhah and Cheryl E. Praeger}, title = {Symmetries of biplanes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {11}, pages = {2337--2359}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00784-1}, doi = {10.1007/S10623-020-00784-1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlaviDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AragonBDGLTX20, author = {Nicolas Aragon and Olivier Blazy and Jean{-}Christophe Deneuville and Philippe Gaborit and Terry Shue Chien Lau and Chik How Tan and Keita Xagawa}, title = {Cryptanalysis of a rank-based signature with short public keys}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {4}, pages = {643--653}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00702-0}, doi = {10.1007/S10623-019-00702-0}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AragonBDGLTX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BallL20, author = {Simeon Ball and Michel Lavrauw}, title = {Arcs and tensors}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {17--31}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00668-z}, doi = {10.1007/S10623-019-00668-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BallL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BarwickHJS20, author = {Susan G. Barwick and Alice M. W. Hui and Wen{-}Ai Jackson and Jeroen Schillewaert}, title = {Characterising hyperbolic hyperplanes of a non-singular quadric in PG(4, q)}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {33--39}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00669-y}, doi = {10.1007/S10623-019-00669-Y}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BarwickHJS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeelenGMW20, author = {Peter Beelen and Olav Geil and Edgar Mart{\'{\i}}nez{-}Moro and Xin{-}Wen Wu}, title = {Foreword - Special Issue: Codes, Cryptology and Curves in honour of Ruud Pellikaan}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {8}, pages = {1477--1478}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00780-5}, doi = {10.1007/S10623-020-00780-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeelenGMW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeregD20, author = {Sergey Bereg and Peter J. Dukes}, title = {A lower bound on permutation codes of distance n-1}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {63--72}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00670-5}, doi = {10.1007/S10623-019-00670-5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeregD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeregMMS20, author = {Sergey Bereg and Luis Gerardo Mojica and Linda Morales and Ivan Hal Sudborough}, title = {Constructing permutation arrays using partition and extension}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {311--339}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00684-z}, doi = {10.1007/S10623-019-00684-Z}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BeregMMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BhowmickTMBB20, author = {Sanjit Bhowmick and Alexandre Fotue Tabue and Edgar Mart{\'{\i}}nez{-}Moro and Ramakrishna Bandi and Satya Bagchi}, title = {Do non-free {LCD} codes over finite commutative Frobenius rings exist?}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {5}, pages = {825--840}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00713-x}, doi = {10.1007/S10623-019-00713-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BhowmickTMBB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bibak20, author = {Khodakhast Bibak}, title = {Deletion correcting codes meet the Littlewood-Offord problem}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {11}, pages = {2387--2396}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00787-y}, doi = {10.1007/S10623-020-00787-Y}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Bibak20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Boucher20, author = {Delphine Boucher}, title = {An algorithm for decoding skew Reed-Solomon codes with respect to the skew metric}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1991--2005}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00789-w}, doi = {10.1007/S10623-020-00789-W}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Boucher20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BoyadzhiyskaDS20, author = {Simona Boyadzhiyska and Shagnik Das and Tibor Szab{\'{o}}}, title = {Enumerating extensions of mutually orthogonal Latin squares}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2187--2206}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00771-6}, doi = {10.1007/S10623-020-00771-6}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BoyadzhiyskaDS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BoyvalenkovDHSS20, author = {Peter G. Boyvalenkov and Peter D. Dragnev and Douglas P. Hardin and Edward B. Saff and Maya Stoyanova}, title = {Upper bounds for energies of spherical codes of given cardinality and separation}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1811--1826}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00733-y}, doi = {10.1007/S10623-020-00733-Y}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BoyvalenkovDHSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bras-AmorosDH20, author = {Maria Bras{-}Amor{\'{o}}s and Iwan M. Duursma and Euijin Hong}, title = {Isometry-dual flags of {AG} codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {8}, pages = {1617--1638}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00752-9}, doi = {10.1007/S10623-020-00752-9}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Bras-AmorosDH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BritzMS20, author = {Thomas Britz and Adam Mammoliti and Keisuke Shiromoto}, title = {Wei-type duality theorems for rank metric codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {8}, pages = {1503--1519}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00688-9}, doi = {10.1007/S10623-019-00688-9}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BritzMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BruynG20, author = {Bart De Bruyn and Mou Gao}, title = {On four codes with automorphism group P{\(\Sigma\)} L(3, 4) and pseudo-embeddings of the large Witt designs}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {429--452}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00690-1}, doi = {10.1007/S10623-019-00690-1}, timestamp = {Wed, 29 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BruynG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BudaghyanKRS20, author = {Lilya Budaghyan and Nikolay S. Kaleyski and Constanza Riera and Pantelimon Stanica}, title = {Partially {APN} functions with APN-like polynomial representations}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1159--1177}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00739-6}, doi = {10.1007/S10623-020-00739-6}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BudaghyanKRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CanteautKPU20, author = {Anne Canteaut and Gohar M. Kyureghyan and Alexander Pott and Felix Ulmer}, title = {Editorial: Coding and Cryptography 2019}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1699}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00791-2}, doi = {10.1007/S10623-020-00791-2}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CanteautKPU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CapaverdeMR20, author = {Juliane Capaverde and Ariane M. Masuda and Virginia M. Rodrigues}, title = {R{\'{e}}dei permutations with cycles of the same length}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {12}, pages = {2561--2579}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00801-3}, doi = {10.1007/S10623-020-00801-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CapaverdeMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CartorS20, author = {Ryann Cartor and Daniel Smith{-}Tone}, title = {All in the C\({}^{\mbox{*}}\) family}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1023--1036}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00723-0}, doi = {10.1007/S10623-020-00723-0}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CartorS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CastellanosB20, author = {Alonso Sep{\'{u}}lveda Castellanos and Maria Bras{-}Amor{\'{o}}s}, title = {Weierstrass semigroup at m+1 rational points in maximal curves which cannot be covered by the Hermitian curve}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {8}, pages = {1595--1616}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00757-4}, doi = {10.1007/S10623-020-00757-4}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CastellanosB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CharaPT20, author = {Mar{\'{\i}}a Chara and Ricardo A. Podest{\'{a}} and Ricardo Toledano}, title = {Block transitive codes attaining the Tsfasman-Vladut-Zink bound}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1227--1253}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00743-w}, doi = {10.1007/S10623-020-00743-W}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CharaPT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CheeCDGLLM20, author = {Yeow Meng Chee and Charles J. Colbourn and Hoang Dau and Ryan Gabrys and Alan C. H. Ling and Dylan Lusi and Olgica Milenkovic}, title = {Access balancing in storage systems by labeling partial Steiner systems}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {11}, pages = {2361--2376}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00786-z}, doi = {10.1007/S10623-020-00786-Z}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CheeCDGLLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChirvasituC20, author = {Alexandru Chirvasitu and Thomas W. Cusick}, title = {Affine equivalence for quadratic rotation symmetric Boolean functions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {7}, pages = {1301--1329}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00748-5}, doi = {10.1007/S10623-020-00748-5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChirvasituC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChoiKL20, author = {Whan{-}Hyuk Choi and Hyun Jin Kim and Yoonjin Lee}, title = {Construction of single-deletion-correcting {DNA} codes using {CIS} codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {12}, pages = {2581--2596}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00802-2}, doi = {10.1007/S10623-020-00802-2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ChoiKL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChristensenG20, author = {Ren{\'{e}} B{\o}dker Christensen and Olav Geil}, title = {Steane-enlargement of quantum codes from the Hermitian function field}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {8}, pages = {1639--1652}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00709-7}, doi = {10.1007/S10623-019-00709-7}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChristensenG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CoggiaC20, author = {Daniel Coggia and Alain Couvreur}, title = {On the security of a Loidreau rank metric code based encryption scheme}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1941--1957}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00781-4}, doi = {10.1007/S10623-020-00781-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CoggiaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CouvreurP20, author = {Alain Couvreur and Isabella Panaccione}, title = {Power error locating pairs}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {8}, pages = {1561--1593}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00774-3}, doi = {10.1007/S10623-020-00774-3}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CouvreurP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DasHPWZ20, author = {Dipayan Das and Jeffrey Hoffstein and Jill Pipher and William Whyte and Zhenfei Zhang}, title = {Modular lattice signatures, revisited}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {3}, pages = {505--532}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00694-x}, doi = {10.1007/S10623-019-00694-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DasHPWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Datta20, author = {Mrinmoy Datta}, title = {Relative generalized Hamming weights of affine Cartesian codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1273--1284}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00745-8}, doi = {10.1007/S10623-020-00745-8}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Datta20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DeneuvilleG20, author = {Jean{-}Christophe Deneuville and Philippe Gaborit}, title = {Cryptanalysis of a code-based one-time signature}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1857--1866}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00737-8}, doi = {10.1007/S10623-020-00737-8}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DeneuvilleG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DeyS20, author = {Sabyasachi Dey and Santanu Sarkar}, title = {Proving the biases of Salsa and ChaCha in differential attack}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1827--1856}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00736-9}, doi = {10.1007/S10623-020-00736-9}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DeyS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DietrichS20, author = {Heiko Dietrich and Jeroen Schillewaert}, title = {On a duality for codes over non-abelian groups}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {5}, pages = {789--805}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00711-z}, doi = {10.1007/S10623-019-00711-Z}, timestamp = {Tue, 05 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DietrichS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DingTT20, author = {Cunsheng Ding and Chunming Tang and Vladimir D. Tonchev}, title = {Linear codes of 2-designs associated with subcodes of the ternary generalized Reed-Muller codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {4}, pages = {625--641}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00701-1}, doi = {10.1007/S10623-019-00701-1}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DingTT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DongDW20, author = {Xiaoyang Dong and Bingyou Dong and Xiaoyun Wang}, title = {Quantum attacks on some feistel block ciphers}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1179--1203}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00741-y}, doi = {10.1007/S10623-020-00741-Y}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DongDW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Duc20, author = {Tai Do Duc}, title = {Necessary conditions for the existence of group-invariant Butson Hadamard matrices and a new family of perfect arrays}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {73--90}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00671-4}, doi = {10.1007/S10623-019-00671-4}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Duc20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EgorovaFK20, author = {Elena Egorova and Marcel Fernandez and Grigory Kabatiansky}, title = {On non-binary traceability set systems}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1885--1892}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00749-4}, doi = {10.1007/S10623-020-00749-4}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/EgorovaFK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ekera20, author = {Martin Eker{\aa}}, title = {On post-processing in the quantum algorithm for computing short discrete logarithms}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {11}, pages = {2313--2335}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00783-2}, doi = {10.1007/S10623-020-00783-2}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ekera20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ElsholtzP20, author = {Christian Elsholtz and P{\'{e}}ter P{\'{a}}l Pach}, title = {Caps and progression-free sets in {\textdollar}\{\{{\textbackslash}mathbb \{Z\}\}\}{\_}mn{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2133--2170}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00769-0}, doi = {10.1007/S10623-020-00769-0}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ElsholtzP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EtzionKOO20, author = {Tuvi Etzion and Sascha Kurz and Kamil Otal and Ferruh {\"{O}}zbudak}, title = {Subspace packings: constructions and bounds}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1781--1810}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00732-z}, doi = {10.1007/S10623-020-00732-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/EtzionKOO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FadaviF20, author = {Mojtaba Fadavi and Reza Rezaeian Farashahi}, title = {Uniform encodings to elliptic curves and indistinguishable point representation}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {8}, pages = {1479--1502}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00753-8}, doi = {10.1007/S10623-020-00753-8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FadaviF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FalkHR20, author = {Brett Hemenway Falk and Nadia Heninger and Michael Rudow}, title = {Properties of constacyclic codes under the Schur product}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {993--1021}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00720-3}, doi = {10.1007/S10623-020-00720-3}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FalkHR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FangLLL20, author = {Xiaolei Fang and Khawla Lebed and Hongwei Liu and Jinquan Luo}, title = {New {MDS} self-dual codes over finite fields of odd characteristic}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1127--1138}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00734-x}, doi = {10.1007/S10623-020-00734-X}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/FangLLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FangZ20, author = {Zenghui Fang and Junling Zhou}, title = {The sizes of maximal (v, k, k-2, k-1) optical orthogonal codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {5}, pages = {807--824}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00714-1}, doi = {10.1007/S10623-020-00714-1}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FerragutiM20, author = {Andrea Ferraguti and Giacomo Micheli}, title = {Full classification of permutation rational functions and complete rational functions of degree three over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {5}, pages = {867--886}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00715-0}, doi = {10.1007/S10623-020-00715-0}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FerragutiM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GalvezK20, author = {Lucky Galvez and Jon{-}Lark Kim}, title = {Construction of self-dual matrix codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {8}, pages = {1541--1560}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00740-z}, doi = {10.1007/S10623-020-00740-Z}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GalvezK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GaoYW20, author = {Yanyan Gao and Qin Yue and Yansheng Wu}, title = {{LCD} codes and self-orthogonal codes in generalized dihedral group algebras}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {11}, pages = {2275--2287}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00778-z}, doi = {10.1007/S10623-020-00778-Z}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GaoYW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Garcia-MarcoMR20, author = {Ignacio Garc{\'{\i}}a{-}Marco and Irene M{\'{a}}rquez{-}Corbella and Diego Ruano}, title = {High dimensional affine codes whose square has a designed minimum distance}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {8}, pages = {1653--1672}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00764-5}, doi = {10.1007/S10623-020-00764-5}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Garcia-MarcoMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GerikeK20, author = {Daniel Gerike and Gohar M. Kyureghyan}, title = {Permutations on finite fields with invariant cycle structure on lines}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1723--1740}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00721-2}, doi = {10.1007/S10623-020-00721-2}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GerikeK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GhorpadeJ20, author = {Sudhir R. Ghorpade and Trygve Johnsen}, title = {A polymatroid approach to generalized weights of rank metric codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {12}, pages = {2531--2546}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00798-9}, doi = {10.1007/S10623-020-00798-9}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GhorpadeJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Gomez-Torrecillas20, author = {Jos{\'{e}} G{\'{o}}mez{-}Torrecillas and Erik Hieta{-}aho and Francisco Javier Lobillo and Sergio R. L{\'{o}}pez{-}Permouth and Gabriel Navarro}, title = {Some remarks on non projective Frobenius algebras and linear codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {1--15}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00666-1}, doi = {10.1007/S10623-019-00666-1}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Gomez-Torrecillas20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GongZ20, author = {Xinxin Gong and Bin Zhang}, title = {Fast computation of linear approximation over certain composition functions and applications to {SNOW} 2.0 and {SNOW} 3G}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {11}, pages = {2407--2431}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00790-3}, doi = {10.1007/S10623-020-00790-3}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GongZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GrassiR20, author = {Lorenzo Grassi and Christian Rechberger}, title = {Revisiting Gilbert's known-key distinguisher}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {7}, pages = {1401--1445}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00756-5}, doi = {10.1007/S10623-020-00756-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GrassiR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuS20, author = {Yujie Gu and Shohei Satake}, title = {On 2-parent-identifying set systems of block size 4}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2067--2076}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00763-6}, doi = {10.1007/S10623-020-00763-6}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuendaGJT20, author = {Kenza Guenda and T. Aaron Gulliver and Somphong Jitman and Satanan Thipworawimon}, title = {Linear {\(\mathscr{l}\)}-intersection pairs of codes and their applications}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {133--152}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00676-z}, doi = {10.1007/S10623-019-00676-Z}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuendaGJT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuillevicMT20, author = {Aurore Guillevic and Simon Masson and Emmanuel Thom{\'{e}}}, title = {Cocks-Pinch curves of embedding degrees five to eight and optimal ate pairing computation}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1047--1081}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00727-w}, doi = {10.1007/S10623-020-00727-W}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuillevicMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuneriMS20, author = {Cem G{\"{u}}neri and Edgar Mart{\'{\i}}nez{-}Moro and Selcen Sayici}, title = {Linear complementary pair of group codes over finite chain rings}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {11}, pages = {2397--2405}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00792-1}, doi = {10.1007/S10623-020-00792-1}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GuneriMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Gupta20, author = {Rohit Gupta}, title = {Several new permutation quadrinomials over finite fields of odd characteristic}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {223--239}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00680-3}, doi = {10.1007/S10623-019-00680-3}, timestamp = {Mon, 30 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Gupta20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HodzicPG20, author = {Samir Hodzic and Enes Pasalic and Sugata Gangopadhyay}, title = {Generic constructions of {\textdollar}{\textbackslash}mathbb \{Z\}{\textdollar}-bent functions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {3}, pages = {601--623}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00700-2}, doi = {10.1007/S10623-019-00700-2}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/HodzicPG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HodzicPW20, author = {Samir Hodzic and Enes Pasalic and Yongzhuang Wei}, title = {A general framework for secondary constructions of bent and plateaued functions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2007--2035}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00760-9}, doi = {10.1007/S10623-020-00760-9}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HodzicPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuangYWSM20, author = {Xinmei Huang and Qin Yue and Yansheng Wu and Xiaoping Shi and Jerod Michel}, title = {Binary primitive {LCD} {BCH} codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {12}, pages = {2453--2473}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00795-y}, doi = {10.1007/S10623-020-00795-Y}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/HuangYWSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HyunKWY20, author = {Jong Yoon Hyun and Hyun Kwang Kim and Yansheng Wu and Qin Yue}, title = {Optimal minimal linear codes from posets}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {12}, pages = {2475--2492}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00793-0}, doi = {10.1007/S10623-020-00793-0}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/HyunKWY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HyunLL20, author = {Jong Yoon Hyun and Jungyun Lee and Yoonjin Lee}, title = {Ramanujan graphs and expander families constructed from p-ary bent functions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {453--470}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00692-z}, doi = {10.1007/S10623-019-00692-Z}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/HyunLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JiaLL20, author = {Dingding Jia and Yamin Liu and Bao Li}, title = {{IBE} with tight security against selective opening and chosen-ciphertext attacks}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {7}, pages = {1371--1400}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00755-6}, doi = {10.1007/S10623-020-00755-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JiaLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JiangGC20, author = {Jing Jiang and Yujie Gu and Minquan Cheng}, title = {Multimedia {IPP} codes with efficient tracing}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {5}, pages = {851--866}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00717-y}, doi = {10.1007/S10623-020-00717-Y}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/JiangGC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JiangL20, author = {Yupeng Jiang and Dongdai Lin}, title = {Longest subsequences shared by two de Bruijn sequences}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {7}, pages = {1463--1475}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00759-2}, doi = {10.1007/S10623-020-00759-2}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JiangL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KampPJ20, author = {Tim van de Kamp and Andreas Peter and Willem Jonker}, title = {A multi-authority approach to various predicate encryption types}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {363--390}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00686-x}, doi = {10.1007/S10623-019-00686-X}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/KampPJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KesarwaniRSM20, author = {Abhishek Kesarwani and Dibyendu Roy and Santanu Sarkar and Willi Meier}, title = {New cube distinguishers on NFSR-based stream ciphers}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {173--199}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00674-1}, doi = {10.1007/S10623-019-00674-1}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KesarwaniRSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimL20, author = {Boran Kim and Yoonjin Lee}, title = {Classification of self-dual cyclic codes over the chain ring {\(\mathbb{Z}\)}\({}_{\mbox{p}}\)[u]/ u\({}^{\mbox{3}}\) {\textgreater}}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2247--2273}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00776-1}, doi = {10.1007/S10623-020-00776-1}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KimL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KirshanovaNSW20, author = {Elena Kirshanova and Huyen Nguyen and Damien Stehl{\'{e}} and Alexandre Wallet}, title = {On the smoothing parameter and last minimum of random orthogonal lattices}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {5}, pages = {931--950}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00719-w}, doi = {10.1007/S10623-020-00719-W}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KirshanovaNSW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KolblTDB20, author = {Stefan K{\"{o}}lbl and Elmar Tischhauser and Patrick Derbez and Andrey Bogdanov}, title = {Troika: a ternary cryptographic hash function}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {91--117}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00673-2}, doi = {10.1007/S10623-019-00673-2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/KolblTDB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kolsch20, author = {Lukas K{\"{o}}lsch}, title = {On the inverses of Kasami and Bracken-Leander exponents}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {12}, pages = {2597--2621}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00804-0}, doi = {10.1007/S10623-020-00804-0}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kolsch20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KrollV20, author = {Hans{-}Joachim Kroll and Rita Vincenti}, title = {Linear codes from ruled sets in finite projective spaces}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {4}, pages = {747--754}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00707-9}, doi = {10.1007/S10623-019-00707-9}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KrollV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kurz20, author = {Sascha Kurz}, title = {Subspaces intersecting in at most a point}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {3}, pages = {595--599}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00699-6}, doi = {10.1007/S10623-019-00699-6}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Kurz20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kutsenko20, author = {Aleksandr Kutsenko}, title = {Metrical properties of self-dual bent functions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {201--222}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00678-x}, doi = {10.1007/S10623-019-00678-X}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Kutsenko20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LambinDF20, author = {Baptiste Lambin and Patrick Derbez and Pierre{-}Alain Fouque}, title = {Linearly equivalent S-boxes and the division property}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2207--2231}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00773-4}, doi = {10.1007/S10623-020-00773-4}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LambinDF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LavauzelleR20, author = {Julien Lavauzelle and Julian Renner}, title = {Cryptanalysis of a system based on twisted Reed-Solomon codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {7}, pages = {1285--1300}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00747-6}, doi = {10.1007/S10623-020-00747-6}, timestamp = {Mon, 22 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LavauzelleR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeLP20, author = {Youngkyung Lee and Dong Hoon Lee and Jong Hwan Park}, title = {Tightly CCA-secure encryption scheme in a multi-user setting with corruptions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {11}, pages = {2433--2452}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00794-z}, doi = {10.1007/S10623-020-00794-Z}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeeLP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeungW20, author = {Ka Hin Leung and Qi Wang}, title = {New nonexistence results on (m, n)-generalized bent functions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {4}, pages = {755--770}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00708-8}, doi = {10.1007/S10623-019-00708-8}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeungW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiY20, author = {Xia Li and Qin Yue}, title = {Four classes of minimal binary linear codes with w\({}_{\mbox{min}}\)/w\({}_{\mbox{max}}\){\textless}1/2 derived from Boolean functions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {257--271}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00682-1}, doi = {10.1007/S10623-019-00682-1}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiYLQ20, author = {Yubo Li and Zhichao Yang and Kangquan Li and Longjiang Qu}, title = {A new algorithm on the minimal rational fraction representation of feedback with carry shift registers}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {3}, pages = {533--552}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00695-w}, doi = {10.1007/S10623-019-00695-W}, timestamp = {Tue, 31 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiYLQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LingMQT20, author = {Xin Ling and Sihem Mesnager and Yanfeng Qi and Chunming Tang}, title = {A class of narrow-sense {BCH} codes over {\textdollar}{\textbackslash}mathbb \{F\}{\_}q{\textdollar} of length {\textdollar}{\textbackslash}frac\{qm-1\}\{2\}{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {413--427}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00691-0}, doi = {10.1007/S10623-019-00691-0}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LingMQT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Lisonek20, author = {Petr Lisonek}, title = {Maximal nonassociativity via fields}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {12}, pages = {2521--2530}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00800-4}, doi = {10.1007/S10623-020-00800-4}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Lisonek20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuCL20, author = {Yan Liu and Xiwang Cao and Wei Lu}, title = {On some conjectures about optimal ternary cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {297--309}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00679-w}, doi = {10.1007/S10623-019-00679-W}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuL20, author = {Xiusheng Liu and Hualu Liu}, title = {{\(\sigma\)}-LCD codes over finite chain rings}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {4}, pages = {727--746}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00706-w}, doi = {10.1007/S10623-019-00706-W}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuMT20, author = {Jian Liu and Sihem Mesnager and Deng Tang}, title = {Constructions of optimal locally recoverable codes via Dickson polynomials}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1759--1780}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00731-0}, doi = {10.1007/S10623-020-00731-0}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiuMT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuP20, author = {Hongwei Liu and Xu Pan}, title = {Galois hulls of linear codes over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {241--255}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00681-2}, doi = {10.1007/S10623-019-00681-2}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiuP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuZSRLLFC20, author = {Yunwen Liu and Wenying Zhang and Bing Sun and Vincent Rijmen and Guoqiang Liu and Chao Li and Shaojing Fu and Meichun Cao}, title = {The phantom of differential characteristics}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {11}, pages = {2289--2311}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00782-3}, doi = {10.1007/S10623-020-00782-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuZSRLLFC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LopezMS20, author = {Hiram H. L{\'{o}}pez and Gretchen L. Matthews and Ivan Soprunov}, title = {Monomial-Cartesian codes and their duals, with applications to {LCD} codes, quantum codes, and locally recoverable codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {8}, pages = {1673--1685}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00726-x}, doi = {10.1007/S10623-020-00726-X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LopezMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LuWCC20, author = {Wei Lu and Xia Wu and Xiwang Cao and Ming Chen}, title = {Six constructions of asymptotically optimal codebooks via the character sums}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1139--1158}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00735-w}, doi = {10.1007/S10623-020-00735-W}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LuWCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaFW20, author = {Xuanlong Ma and Min Feng and Kaishun Wang}, title = {Subgroup perfect codes in Cayley sum graphs}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {7}, pages = {1447--1461}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00758-3}, doi = {10.1007/S10623-020-00758-3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MaFW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MariotGFL20, author = {Luca Mariot and Maximilien Gadouleau and Enrico Formenti and Alberto Leporati}, title = {Mutually orthogonal latin squares based on cellular automata}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {391--411}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00689-8}, doi = {10.1007/S10623-019-00689-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MariotGFL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Marquez-Corbella20, author = {Irene M{\'{a}}rquez{-}Corbella and Edgar Mart{\'{\i}}nez{-}Moro and Carlos Munuera}, title = {Computing sharp recovery structures for locally recoverable codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {8}, pages = {1687--1698}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00746-7}, doi = {10.1007/S10623-020-00746-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Marquez-Corbella20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Martinez-Bernal20, author = {Jos{\'{e}} Mart{\'{\i}}nez{-}Bernal and Miguel A. Valencia{-}Bucio and Rafael H. Villarreal}, title = {Linear codes over signed graphs}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {273--296}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00683-0}, doi = {10.1007/S10623-019-00683-0}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Martinez-Bernal20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Martinez-Penas20, author = {Umberto Mart{\'{\i}}nez{-}Pe{\~{n}}as}, title = {Hamming and simplex codes for the sum-rank metric}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {8}, pages = {1521--1539}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00772-5}, doi = {10.1007/S10623-020-00772-5}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Martinez-Penas20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Matsumoto20, author = {Ryutaroh Matsumoto}, title = {Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1893--1907}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00751-w}, doi = {10.1007/S10623-020-00751-W}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Matsumoto20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MatthewsP20, author = {Gretchen L. Matthews and Fernando Pi{\~{n}}ero}, title = {Codes with locality from cyclic extensions of Deligne-Lusztig curves}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1909--1924}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00767-2}, doi = {10.1007/S10623-020-00767-2}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MatthewsP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MesnagerKJCHL20, author = {Sihem Mesnager and Kwang Ho Kim and Dujin Jo and Junyop Choe and Munhyon Han and Dok Nam Lee}, title = {A proof of the Beierle-Kranz-Leander conjecture related to lightweight multiplication in {\textdollar}{\textbackslash}mathbb \{F\}{\_}\{2n\}{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {51--62}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00665-2}, doi = {10.1007/S10623-019-00665-2}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MesnagerKJCHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MesnagerTX20, author = {Sihem Mesnager and Chunming Tang and Maosheng Xiong}, title = {On the boomerang uniformity of quadratic permutations}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2233--2246}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00775-2}, doi = {10.1007/S10623-020-00775-2}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MesnagerTX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NeriH20, author = {Alessandro Neri and Anna{-}Lena Horlemann{-}Trautmann}, title = {Random construction of partial {MDS} codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {4}, pages = {711--725}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00705-x}, doi = {10.1007/S10623-019-00705-X}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NeriH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OngH20, author = {Kai Lin Ong and Ang Miin Huey}, title = {On equivalency of zero-divisor codes via classifying their idempotent generator}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2051--2065}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00762-7}, doi = {10.1007/S10623-020-00762-7}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OngH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PanFWW20, author = {Rong Pan and Tao Feng and Lidong Wang and Xiaomiao Wang}, title = {Optimal optical orthogonal signature pattern codes with weight three and cross-correlation constraint one}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {119--131}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00675-0}, doi = {10.1007/S10623-019-00675-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PanFWW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PolujanP20, author = {Alexandr Polujan and Alexander Pott}, title = {Cubic bent functions outside the completed Maiorana-McFarland class}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1701--1722}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00712-y}, doi = {10.1007/S10623-019-00712-Y}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PolujanP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Potapov20, author = {Vladimir N. Potapov}, title = {On q-ary bent and plateaued functions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2037--2049}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00761-8}, doi = {10.1007/S10623-020-00761-8}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Potapov20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Randrianarisoa20, author = {Tovohery Hajatiana Randrianarisoa}, title = {A geometric approach to rank metric codes and a classification of constant weight codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {7}, pages = {1331--1348}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00750-x}, doi = {10.1007/S10623-020-00750-X}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Randrianarisoa20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RoussevaL20, author = {Assia Rousseva and Ivan N. Landjev}, title = {The geometric approach to the existence of some quaternary Griesmer codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1925--1940}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00777-0}, doi = {10.1007/S10623-020-00777-0}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RoussevaL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Salagean20, author = {Ana Salagean}, title = {Discrete antiderivatives for functions over {\textdollar}{\textbackslash}mathop \{\{{\textbackslash}mathbb \{F\}\}\}{\_}pn{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {3}, pages = {471--486}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00687-w}, doi = {10.1007/S10623-019-00687-W}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Salagean20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SalageanO20, author = {Ana Salagean and Ferruh {\"{O}}zbudak}, title = {Counting Boolean functions with faster points}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1867--1883}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00738-7}, doi = {10.1007/S10623-020-00738-7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SalageanO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShaoM20, author = {Minfeng Shao and Ying Miao}, title = {On optimal weak algebraic manipulation detection codes and weighted external difference families}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {7}, pages = {1349--1369}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00754-7}, doi = {10.1007/S10623-020-00754-7}, timestamp = {Tue, 29 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShaoM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SheekeyV20, author = {John Sheekey and Geertrui Van de Voorde}, title = {Rank-metric codes, linear sets, and their duality}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {4}, pages = {655--675}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00703-z}, doi = {10.1007/S10623-019-00703-Z}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SheekeyV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiXK20, author = {Minjia Shi and Li Xu and Denis S. Krotov}, title = {On the number of resolvable Steiner triple systems of small 3-rank}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1037--1046}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00725-y}, doi = {10.1007/S10623-020-00725-Y}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShiXK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiXS20, author = {Minjia Shi and Wang Xuan and Patrick Sol{\'{e}}}, title = {Two families of two-weight codes over {\textdollar}{\textbackslash}mathbb \{Z\}{\_}4{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {12}, pages = {2493--2505}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00796-x}, doi = {10.1007/S10623-020-00796-X}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShiXS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiXS20a, author = {Minjia Shi and Li Xu and Patrick Sol{\'{e}}}, title = {Construction of isodual codes from polycirculant matrices}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {12}, pages = {2547--2560}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00799-8}, doi = {10.1007/S10623-020-00799-8}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShiXS20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SinghGB20, author = {Jasvinder Singh and Manish Gupta and Jaskarn Singh Bhullar}, title = {Construction of girth-8 (3, {L)-QC-LDPC} codes of smallest {CPM} size using column multipliers}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {41--49}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00667-0}, doi = {10.1007/S10623-019-00667-0}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/SinghGB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SunZZ20, author = {Hong{-}Yu Sun and Xuan{-}Yong Zhu and Qun{-}Xiong Zheng}, title = {Predicting truncated multiple recursive generators with unknown parameters}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1083--1102}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00729-8}, doi = {10.1007/S10623-020-00729-8}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SunZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TanZSP20, author = {Pan Tan and Zhengchun Zhou and Vladimir Sidorenko and Udaya Parampalli}, title = {Two classes of optimal LRCs with information (r, t)-locality}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1741--1757}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00728-9}, doi = {10.1007/S10623-020-00728-9}, timestamp = {Mon, 21 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TanZSP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TianBP20, author = {Shizhu Tian and Christina Boura and L{\'{e}}o Perrin}, title = {Boomerang uniformity of popular S-box constructions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {9}, pages = {1959--1989}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00785-0}, doi = {10.1007/S10623-020-00785-0}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TianBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangF20, author = {Xiang Wang and Fang{-}Wei Fu}, title = {Snake-in-the-box codes under the {\(\mathscr{l}\)} \({}_{\mbox{{\(\infty\)} }}\)-metric for rank modulation}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {3}, pages = {487--503}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00693-y}, doi = {10.1007/S10623-019-00693-Y}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WangF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangLCMD20, author = {Gaoli Wang and Fukang Liu and Binbin Cui and Florian Mendel and Christoph Dobraunig}, title = {Improved (semi-free-start/near-) collision and distinguishing attacks on round-reduced {RIPEMD-160}}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {5}, pages = {887--930}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00718-x}, doi = {10.1007/S10623-020-00718-X}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WangLCMD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WuLW20, author = {Mengna Wu and Chengju Li and Zilong Wang}, title = {Characterizations and constructions of triple-cycle permutations of the form x\({}^{\mbox{rh(x\({}^{\mbox{s)}}\)}}\)}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2119--2132}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00768-1}, doi = {10.1007/S10623-020-00768-1}, timestamp = {Fri, 09 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WuLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WuLZ20, author = {Yanan Wu and Nian Li and Xiangyong Zeng}, title = {Linear codes with few weights from cyclotomic classes and weakly regular bent functions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1255--1272}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00744-9}, doi = {10.1007/S10623-020-00744-9}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WuLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XiangLW20, author = {Can Xiang and Xin Ling and Qi Wang}, title = {Combinatorial t-designs from quadratic functions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {3}, pages = {553--565}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00696-9}, doi = {10.1007/S10623-019-00696-9}, timestamp = {Wed, 17 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XiangLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuBJ20, author = {Juanjuan Xu and Jingjun Bao and Lijun Ji}, title = {Doubly resolvable Steiner quadruple systems of orders 2\({}^{\mbox{2n+1}}\)}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {11}, pages = {2377--2386}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00788-x}, doi = {10.1007/S10623-020-00788-X}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XuBJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuHS20, author = {Jun Xu and Lei Hu and Santanu Sarkar}, title = {Cryptanalysis of elliptic curve hidden number problem from {PKC} 2017}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {2}, pages = {341--361}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00685-y}, doi = {10.1007/S10623-019-00685-Y}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/XuHS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YasudaNY20, author = {Masaya Yasuda and Satoshi Nakamura and Junpei Yamaguchi}, title = {Analysis of DeepBKZ reduction for finding short lattice vectors}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2077--2100}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00765-4}, doi = {10.1007/S10623-020-00765-4}, timestamp = {Mon, 27 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/YasudaNY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Yuster20, author = {Raphael Yuster}, title = {Perfect sequence covering arrays}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {3}, pages = {585--593}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00698-7}, doi = {10.1007/S10623-019-00698-7}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Yuster20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangS20, author = {Liang Feng Zhang and Reihaneh Safavi{-}Naini}, title = {Protecting data privacy in publicly verifiable delegation of matrix and polynomial functions}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {4}, pages = {677--709}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00704-y}, doi = {10.1007/S10623-019-00704-Y}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoDMJW20, author = {Boxin Zhao and Xiaoyang Dong and Willi Meier and Keting Jia and Gaoli Wang}, title = {Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to {SKINNY} and {GIFT}}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1103--1126}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00730-1}, doi = {10.1007/S10623-020-00730-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoDMJW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoQZ20, author = {Xiao{-}Xin Zhao and Wen{-}Feng Qi and Jia{-}Min Zhang}, title = {Further results on the equivalence between Galois NFSRs and Fibonacci NFSRs}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {1}, pages = {153--171}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00677-y}, doi = {10.1007/S10623-019-00677-Y}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoQZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoZWQ20, author = {Xiao{-}Xin Zhao and Qun{-}Xiong Zheng and Zhong{-}Xiao Wang and Wen{-}Feng Qi}, title = {On a class of isomorphic NFSRs}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {1205--1226}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00742-x}, doi = {10.1007/S10623-020-00742-X}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoZWQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhengPKLL20, author = {Lijing Zheng and Jie Peng and Haibin Kan and Yanjun Li and Juan Luo}, title = {On constructions and properties of (n, m)-functions with maximal number of bent components}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2171--2186}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00770-7}, doi = {10.1007/S10623-020-00770-7}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhengPKLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Zhou20, author = {Yue Zhou}, title = {On equivalence of maximum additive symmetric rank-distance codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {5}, pages = {841--850}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00716-z}, doi = {10.1007/S10623-020-00716-Z}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Zhou20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouZ20, author = {Junling Zhou and Wenling Zhou}, title = {Wide-sense 2-frameproof codes}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {12}, pages = {2507--2519}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00797-w}, doi = {10.1007/S10623-020-00797-W}, timestamp = {Sat, 14 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhouZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhuW20, author = {Yan Zhu and Naoki Watamura}, title = {Relative t-designs in Johnson association schemes for P-polynomial structure}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {10}, pages = {2101--2118}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00766-3}, doi = {10.1007/S10623-020-00766-3}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhuW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhuZC20, author = {Bohua Zhu and Junling Zhou and Yanxun Chang}, title = {2-(v, 5; m) spontaneous emission error designs}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {5}, pages = {951--970}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00722-1}, doi = {10.1007/S10623-020-00722-1}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhuZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlabdullahH19, author = {S. Alabdullah and J. W. P. Hirschfeld}, title = {A new lower bound for the smallest complete (k, n)-arc in {\textdollar}{\textdollar}{\textbackslash}mathrm \{PG\}(2, q){\textdollar}{\textdollar} {PG} {(} 2 , q {)}}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {679--683}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00592-8}, doi = {10.1007/S10623-018-00592-8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlabdullahH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ArmarioF19, author = {Jos{\'{e}} Andr{\'{e}}s Armario and Dane L. Flannery}, title = {Generalized binary arrays from quasi-orthogonal cocycles}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2405--2417}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00626-9}, doi = {10.1007/S10623-019-00626-9}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ArmarioF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AydinLV19, author = {Nuh Aydin and Jonathan G. G. Lambrinos and Oliver VandenBerg}, title = {On equivalence of cyclic codes, generalization of a quasi-twisted search algorithm, and new linear codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2199--2212}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00613-0}, doi = {10.1007/S10623-019-00613-0}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AydinLV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bagchi19, author = {Bhaskar Bagchi}, title = {A coding theoretic approach to the uniqueness conjecture for projective planes of prime order}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2375--2389}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00623-y}, doi = {10.1007/S10623-019-00623-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Bagchi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BaiL19, author = {Liang Bai and Zihui Liu}, title = {On the third greedy weight of 4-dimensional codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2213--2230}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00614-z}, doi = {10.1007/S10623-019-00614-Z}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BaiL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BaichevaT19, author = {Tsonka Baicheva and Svetlana Topalova}, title = {Classification of optimal (v, k, 1) binary cyclically permutable constant weight codes with {\textdollar}{\textdollar}k=5, {\textdollar}{\textdollar} k = 5 , 6 and 7 and small lengths}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {365--374}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0534-x}, doi = {10.1007/S10623-018-0534-X}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BaichevaT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BalletZ19, author = {St{\'{e}}phane Ballet and Alexey Zykin}, title = {Dense families of modular curves, prime numbers and uniform symmetric tensor rank of multiplication in certain finite fields}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {517--525}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0560-8}, doi = {10.1007/S10623-018-0560-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BalletZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartoliB19, author = {Daniele Bartoli and Matteo Bonini}, title = {Minimum weight codewords in dual algebraic-geometric codes from the Giulietti-Korchm{\'{a}}ros curve}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1433--1445}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0541-y}, doi = {10.1007/S10623-018-0541-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BartoliB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartoliGM19, author = {Daniele Bartoli and Massimo Giulietti and Maria Montanucci}, title = {Linear codes from Denniston maximal arcs}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {795--806}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0515-0}, doi = {10.1007/S10623-018-0515-0}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BartoliGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartzS19, author = {Hannes Bartz and Vladimir Sidorenko}, title = {Improved syndrome decoding of lifted {\textdollar}{\textdollar}L{\textdollar}{\textdollar} {L} -interleaved Gabidulin codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {547--567}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0563-5}, doi = {10.1007/S10623-018-0563-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BartzS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BassaS19, author = {Alp Bassa and Henning Stichtenoth}, title = {Self-dual codes better than the Gilbert-Varshamov bound}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {173--182}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0497-y}, doi = {10.1007/S10623-018-0497-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BassaS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeregMMMS19, author = {Sergey Bereg and Zevi Miller and Luis Gerardo Mojica and Linda Morales and Ivan Hal Sudborough}, title = {New lower bounds for permutation arrays using contraction}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {2105--2128}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00607-y}, doi = {10.1007/S10623-019-00607-Y}, timestamp = {Thu, 05 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeregMMMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BestMSW19, author = {Darcy Best and Trent G. Marbach and Rebecca J. Stones and Ian M. Wanless}, title = {Covers and partial transversals of Latin squares}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {1109--1136}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0499-9}, doi = {10.1007/S10623-018-0499-9}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BestMSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BettenK19, author = {Anton Betten and Fatma Karaoglu}, title = {Cubic surfaces over small finite fields}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {931--953}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0590-2}, doi = {10.1007/S10623-018-0590-2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BettenK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeuleDMS19, author = {Jan De Beule and Jeroen Demeyer and Sam Mattheus and P{\'{e}}ter Sziklai}, title = {On the cylinder conjecture}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {879--893}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0571-5}, doi = {10.1007/S10623-018-0571-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeuleDMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BezzateevS19, author = {Sergey Bezzateev and Natalia A. Shekhunova}, title = {Totally decomposed cumulative Goppa codes with improved estimations}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {569--587}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0566-2}, doi = {10.1007/S10623-018-0566-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BezzateevS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BiDLZW19, author = {Wenquan Bi and Xiaoyang Dong and Zheng Li and Rui Zong and Xiaoyun Wang}, title = {MILP-aided cube-attack-like cryptanalysis on Keccak Keyed modes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1271--1296}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0526-x}, doi = {10.1007/S10623-018-0526-X}, timestamp = {Thu, 16 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BiDLZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlokhuisBD19, author = {Aart Blokhuis and Maarten De Boeck and Jozefien D'haeseleer}, title = {Cameron-Liebler sets of k-spaces in {\textdollar}{\textdollar}\{\{{\textbackslash}mathrm\{PG\}\}\}(n, q){\textdollar}{\textdollar} {PG} {(} n , q {)}}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1839--1856}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0583-1}, doi = {10.1007/S10623-018-0583-1}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BlokhuisBD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlokhuisSS19, author = {Aart Blokhuis and Leo Storme and Tam{\'{a}}s Szonyi}, title = {Relative blocking sets of unions of Baer subplanes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {865--877}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0575-1}, doi = {10.1007/S10623-018-0575-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlokhuisSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BouraCJS19, author = {Christina Boura and Anne Canteaut and J{\'{e}}r{\'{e}}my Jean and Valentin Suder}, title = {Two notions of differential equivalence on Sboxes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {185--202}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0496-z}, doi = {10.1007/S10623-018-0496-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BouraCJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BoyvalenkovDHSS19, author = {Peter G. Boyvalenkov and Peter D. Dragnev and Douglas P. Hardin and Edward B. Saff and Maya Stoyanova}, title = {On spherical codes with inner products in a prescribed interval}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {299--315}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0524-z}, doi = {10.1007/S10623-018-0524-Z}, timestamp = {Wed, 26 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BoyvalenkovDHSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BrouwerP19, author = {Andries E. Brouwer and Sven C. Polak}, title = {Uniqueness of codes using semidefinite programming}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1881--1895}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0589-8}, doi = {10.1007/S10623-018-0589-8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BrouwerP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bruyn19, author = {Bart De Bruyn}, title = {Three homogeneous embeddings of {DW} (2n-1, 2)}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {909--929}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0531-0}, doi = {10.1007/S10623-018-0531-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Bruyn19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Buratti19, author = {Marco Buratti}, title = {On disjoint (v, k, k-1) difference families}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {745--755}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0511-4}, doi = {10.1007/S10623-018-0511-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Buratti19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BurattiJ19, author = {Marco Buratti and Dieter Jungnickel}, title = {Partitioned difference families versus zero-difference balanced functions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2461--2467}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00632-x}, doi = {10.1007/S10623-019-00632-X}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BurattiJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BurattiM19, author = {Marco Buratti and Francesca Merola}, title = {Fano Kaleidoscopes and their generalizations}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {769--784}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0538-6}, doi = {10.1007/S10623-018-0538-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BurattiM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Byrnes19, author = {Kevin M. Byrnes}, title = {The maximum length of circuit codes with long bit runs and a new characterization theorem}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2671--2681}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00646-5}, doi = {10.1007/S10623-019-00646-5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Byrnes19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CaoCDL19, author = {Yuan Cao and Yonglin Cao and Steven T. Dougherty and San Ling}, title = {Construction and enumeration for self-dual cyclic codes over Z\({}_{\mbox{4}}\) of oddly even length}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2419--2446}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00629-6}, doi = {10.1007/S10623-019-00629-6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CaoCDL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CardinaliLMP19, author = {Ilaria Cardinali and Michel Lavrauw and Klaus Metsch and Alexander Pott}, title = {Preface to the special issue on finite geometries}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {715--716}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00600-x}, doi = {10.1007/S10623-018-00600-X}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CardinaliLMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Carlet19, author = {Claude Carlet}, title = {On {APN} exponents, characterizations of differentially uniform functions by the Walsh transform, and related cyclic-difference-set-like structures}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {203--224}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0512-3}, doi = {10.1007/S10623-018-0512-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Carlet19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletCQ19, author = {Claude Carlet and Xi Chen and Longjiang Qu}, title = {Constructing infinite families of low differential uniformity (n, m)-functions with m {\textgreater} n / 2}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1577--1599}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0553-7}, doi = {10.1007/S10623-018-0553-7}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletCQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletLM19, author = {Claude Carlet and Chengju Li and Sihem Mesnager}, title = {Some (almost) optimally extendable linear codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2813--2834}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00652-7}, doi = {10.1007/S10623-019-00652-7}, timestamp = {Wed, 06 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CarletLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletLM19a, author = {Claude Carlet and Chengju Li and Sihem Mesnager}, title = {Linear codes with small hulls in semi-primitive case}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {3063--3075}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00663-4}, doi = {10.1007/S10623-019-00663-4}, timestamp = {Wed, 06 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CarletLM19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarrierT19, author = {K{\'{e}}vin Carrier and Jean{-}Pierre Tillich}, title = {Identifying an unknown code by partial Gaussian elimination}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {685--713}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00593-7}, doi = {10.1007/S10623-018-00593-7}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CarrierT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarvalhoRNT19, author = {C{\'{\i}}cero Carvalho and Xavier Ram{\'{\i}}rez{-}Mondrag{\'{o}}n and Victor G. L. Neumann and Horacio Tapia{-}Recillas}, title = {Projective Reed-Muller type codes on higher dimensional scrolls}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {2027--2042}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00603-8}, doi = {10.1007/S10623-018-00603-8}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarvalhoRNT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CauchoisL19, author = {Victor Cauchois and Pierre Loidreau}, title = {On circulant involutory {MDS} matrices}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {249--260}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0520-3}, doi = {10.1007/S10623-018-0520-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CauchoisL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChangELW19, author = {Zuling Chang and Martianus Frederic Ezerman and San Ling and Huaxiong Wang}, title = {On binary de Bruijn sequences from LFSRs with arbitrary characteristic polynomials}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {1137--1160}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0509-y}, doi = {10.1007/S10623-018-0509-Y}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChangELW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChangZZ19, author = {Yanxun Chang and Hao Zheng and Junling Zhou}, title = {Existence of frame-derived H-designs}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1415--1431}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0536-8}, doi = {10.1007/S10623-018-0536-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChangZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CharpinL19, author = {Pascale Charpin and Philippe Langevin}, title = {Obituary of Jacques Wolfmann {(1932-2018)}}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {955--956}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00631-y}, doi = {10.1007/S10623-019-00631-Y}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CharpinL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenGK19, author = {Zhixiong Chen and Ting Gu and Andrew Klapper}, title = {On the q-bentness of Boolean functions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {163--171}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0494-1}, doi = {10.1007/S10623-018-0494-1}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenGK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenTL19, author = {Qi Chen and Chunming Tang and Zhiqiang Lin}, title = {Efficient explicit constructions of compartmented secret sharing schemes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2913--2940}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00657-2}, doi = {10.1007/S10623-019-00657-2}, timestamp = {Fri, 22 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ChenTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChengJW19, author = {Minquan Cheng and Jing Jiang and Qiang Wang}, title = {Improved bounds on 2-frameproof codes with length 4}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {97--106}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0490-5}, doi = {10.1007/S10623-018-0490-5}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChengJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Cheraghchi19, author = {Mahdi Cheraghchi}, title = {Nearly optimal robust secret sharing}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1777--1796}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0578-y}, doi = {10.1007/S10623-018-0578-Y}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Cheraghchi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChisakiKM19, author = {Shoko Chisaki and Yui Kimura and Nobuko Miyamoto}, title = {A recursive construction for difference systems of sets}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {1059--1068}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0505-2}, doi = {10.1007/S10623-018-0505-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChisakiKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CivinoBS19, author = {Roberto Civino and C{\'{e}}line Blondeau and Massimiliano Sala}, title = {Differential attacks: using alternative operations}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {225--247}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0516-z}, doi = {10.1007/S10623-018-0516-Z}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CivinoBS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CogliatiT19, author = {Beno{\^{\i}}t Cogliati and Titouan Tanguy}, title = {Multi-user security bound for filter permutators in the random oracle model}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1621--1638}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0555-5}, doi = {10.1007/S10623-018-0555-5}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CogliatiT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CossidenteP19, author = {Antonio Cossidente and Francesco Pavese}, title = {On line covers of finite projective and polar spaces}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {1985--2002}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00599-1}, doi = {10.1007/S10623-018-00599-1}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CossidenteP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DOliveiraF19, author = {Rafael G. L. D'Oliveira and Marcelo Firer}, title = {A distance between channels: the average error of mismatched channels}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {481--493}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0557-3}, doi = {10.1007/S10623-018-0557-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DOliveiraF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DavydovMP19, author = {Alexander A. Davydov and Stefano Marcugini and Fernanda Pambianco}, title = {New covering codes of radius R, codimension tR and {\textdollar}{\textdollar}tR+{\textbackslash}frac\{R\}\{2\}{\textdollar}{\textdollar}, and saturating sets in projective spaces}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2771--2792}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00649-2}, doi = {10.1007/S10623-019-00649-2}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DavydovMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DerlerS19, author = {David Derler and Daniel Slamanig}, title = {Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1373--1413}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0535-9}, doi = {10.1007/S10623-018-0535-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DerlerS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DeyRS19, author = {Sabyasachi Dey and Tapabrata Roy and Santanu Sarkar}, title = {Some results on Fruit}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {349--364}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0533-y}, doi = {10.1007/S10623-018-0533-Y}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DeyRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dinur19, author = {Itai Dinur}, title = {An algorithmic framework for the generalized birthday problem}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1897--1926}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00594-6}, doi = {10.1007/S10623-018-00594-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dinur19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DucasP19, author = {L{\'{e}}o Ducas and C{\'{e}}cile Pierrot}, title = {Polynomial time bounded distance decoding near Minkowski's bound in discrete logarithm lattices}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1737--1748}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0573-3}, doi = {10.1007/S10623-018-0573-3}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DucasP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DukesL19, author = {Peter J. Dukes and Esther R. Lamken}, title = {Constructions and uses of incomplete pairwise balanced designs}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2729--2751}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00645-6}, doi = {10.1007/S10623-019-00645-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DukesL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DuttaAR19, author = {Sabyasachi Dutta and Avishek Adhikari and Sushmita Ruj}, title = {Maximal contrast color visual secret sharing schemes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1699--1711}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0570-6}, doi = {10.1007/S10623-018-0570-6}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DuttaAR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Duursma19, author = {Iwan M. Duursma}, title = {Matrix theory for minimal trellises}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2507--2536}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00627-8}, doi = {10.1007/S10623-019-00627-8}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Duursma19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dyshko19, author = {Serhii Dyshko}, title = {The extension theorem for Lee and Euclidean weight codes over integer residue rings}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1253--1269}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0521-2}, doi = {10.1007/S10623-018-0521-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dyshko19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EdemskiyLZH19, author = {Vladimir Edemskiy and Chunlei Li and Xiangyong Zeng and Tor Helleseth}, title = {The linear complexity of generalized cyclotomic binary sequences of period p\({}^{\mbox{n}}\)}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {1183--1197}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0513-2}, doi = {10.1007/S10623-018-0513-2}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/EdemskiyLZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Egan19, author = {Ronan Egan}, title = {Phased unitary Golay pairs, Butson Hadamard matrices and a conjecture of Ito's}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {67--74}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0485-2}, doi = {10.1007/S10623-018-0485-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Egan19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EgorovaFKL19, author = {Elena Egorova and Marcel Fernandez and Grigory Kabatiansky and Moon Ho Lee}, title = {Signature codes for weighted noisy adder channel, multimedia fingerprinting and compressed sensing}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {455--462}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0551-9}, doi = {10.1007/S10623-018-0551-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EgorovaFKL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EthierM19, author = {John T. Ethier and Gary L. Mullen}, title = {Sets of mutually orthogonal Sudoku frequency squares}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {57--65}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0487-0}, doi = {10.1007/S10623-018-0487-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EthierM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FanGSSS19, author = {Xinxin Fan and Guang Gong and Berry Schoenmakers and Francesco Sica and Andrey Sidorenko}, title = {Secure simultaneous bit extraction from Koblitz curves}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {1--13}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0484-3}, doi = {10.1007/S10623-018-0484-3}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FanGSSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FarrasRR19, author = {Oriol Farr{\`{a}}s and Jordi Ribes{-}Gonz{\'{a}}lez and Sara Ricci}, title = {Local bounds for the optimal information ratio of secret sharing schemes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1323--1344}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0529-7}, doi = {10.1007/S10623-018-0529-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FarrasRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FengWW19, author = {Tao Feng and Lidong Wang and Xiaomiao Wang}, title = {Optimal 2-D (n {\texttimes} m , 3 , 2 , 1)-optical orthogonal codes and related equi-difference conflict avoiding codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1499--1520}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0549-3}, doi = {10.1007/S10623-018-0549-3}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/FengWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Fernandez-Cordoba19, author = {Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba and Carlos Vela and Merc{\`{e}} Villanueva}, title = {On {\textdollar}{\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{2s\}{\textdollar}{\textdollar} {Z} 2 s -linear Hadamard codes: kernel and partial classification}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {417--435}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0546-6}, doi = {10.1007/S10623-018-0546-6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Fernandez-Cordoba19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FickusJ19, author = {Matthew Fickus and John Jasper}, title = {Equiangular tight frames from group divisible designs}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1673--1697}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0569-z}, doi = {10.1007/S10623-018-0569-Z}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FickusJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FuF19, author = {Shihui Fu and Xiutao Feng}, title = {Involutory differentially 4-uniform permutations from known constructions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {31--56}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0482-5}, doi = {10.1007/S10623-018-0482-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FuF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FuFLW19, author = {Shihui Fu and Xiutao Feng and Dongdai Lin and Qiang Wang}, title = {A recursive construction of permutation polynomials over F\({}_{\mbox{q\({}^{\mbox{2}}\)}}\) with odd characteristic related to R{\'{e}}dei functions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1481--1498}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0548-4}, doi = {10.1007/S10623-018-0548-4}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FuFLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GarefalakisK19, author = {Theodoulos Garefalakis and Giorgos Kapetanakis}, title = {Further Results on the Morgan-Mullen Conjecture}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2639--2654}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00643-8}, doi = {10.1007/S10623-019-00643-8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GarefalakisK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GhoshS19, author = {Sebati Ghosh and Palash Sarkar}, title = {Evaluating Bernstein-Rabin-Winograd polynomials}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {527--546}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0561-7}, doi = {10.1007/S10623-018-0561-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GhoshS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GnilkeGHPCS19, author = {Oliver W. Gnilke and Marcus Greferath and Camilla Hollanti and Guillermo Nu{\~{n}}ez Ponasso and Padraig {\'{O}} Cath{\'{a}}in and Eric Swartz}, title = {Improved user-private information retrieval via finite geometry}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {665--677}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00591-9}, doi = {10.1007/S10623-018-00591-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GnilkeGHPCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GomezGR19, author = {Ana{-}Isabel G{\'{o}}mez and Domingo G{\'{o}}mez{-}P{\'{e}}rez and Gu{\'{e}}na{\"{e}}l Renault}, title = {A probabilistic analysis on a lattice attack against {DSA}}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2469--2488}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00633-w}, doi = {10.1007/S10623-019-00633-W}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GomezGR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuoSWG19, author = {Chun Guo and Yaobin Shen and Lei Wang and Dawu Gu}, title = {Beyond-birthday secure domain-preserving PRFs from a single permutation}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1297--1322}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0528-8}, doi = {10.1007/S10623-018-0528-8}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuoSWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuptaPV19, author = {Kishan Chand Gupta and Sumit Kumar Pandey and Ayineedi Venkateswarlu}, title = {Almost involutory recursive {MDS} diffusion layers}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {609--626}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0582-2}, doi = {10.1007/S10623-018-0582-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuptaPV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HeinleinHKKW19, author = {Daniel Heinlein and Thomas Honold and Michael Kiermaier and Sascha Kurz and Alfred Wassermann}, title = {Classifying optimal binary subspace codes of length 8, constant dimension 4 and minimum distance 6}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {375--391}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0544-8}, doi = {10.1007/S10623-018-0544-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HeinleinHKKW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HengD19, author = {Ziling Heng and Cunsheng Ding}, title = {A construction of q-ary linear codes with irreducible cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {1087--1108}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0507-0}, doi = {10.1007/S10623-018-0507-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HengD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HolzbaurBW19, author = {Lukas Holzbaur and Hannes Bartz and Antonia Wachter{-}Zeh}, title = {Improved decoding and error floor analysis of staircase codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {647--664}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0587-x}, doi = {10.1007/S10623-018-0587-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HolzbaurBW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Hou19, author = {Xiang{-}Dong Hou}, title = {Optimal binary constant weight codes and affine linear groups over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1815--1838}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0581-3}, doi = {10.1007/S10623-018-0581-3}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Hou19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuJ19, author = {Yupu Hu and Huiwen Jia}, title = {A new Gaussian sampling for trapdoor lattices with arbitrary modulus}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2553--2570}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00635-8}, doi = {10.1007/S10623-019-00635-8}, timestamp = {Thu, 17 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuangLCAPL19, author = {Zhengan Huang and Junzuo Lai and Wenbin Chen and Man Ho Au and Zhen Peng and Jin Li}, title = {Simulation-based selective opening security for receivers under chosen-ciphertext attacks}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1345--1371}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0530-1}, doi = {10.1007/S10623-018-0530-1}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuangLCAPL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuiSZ19, author = {Alice M. W. Hui and Muhammad Adib Surani and Sanming Zhou}, title = {The vertex-isoperimetric number of the incidence and non-incidence graphs of unitals}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {957--970}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0498-x}, doi = {10.1007/S10623-018-0498-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuiSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/IhringerM19, author = {Ferdinand Ihringer and Karen Meagher}, title = {Correction to: Mikl{\'{o}}s-Manickam-Singhi conjectures on partial geometries}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1457}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00611-2}, doi = {10.1007/S10623-019-00611-2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/IhringerM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JiaZZ19, author = {Dongdong Jia and Sumei Zhang and Gengsheng Zhang}, title = {Erasure combinatorial batch codes based on nonadaptive group testing}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1647--1656}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0564-4}, doi = {10.1007/S10623-018-0564-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JiaZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JungnickelMTW19, author = {Dieter Jungnickel and Spyros S. Magliveras and Vladimir D. Tonchev and Alfred Wassermann}, title = {The classification of Steiner triple systems on 27 points with 3-rank 24}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {831--839}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0502-5}, doi = {10.1007/S10623-018-0502-5}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JungnickelMTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KapetanakisR19, author = {Giorgos Kapetanakis and Lucas Reis}, title = {Variations of the Primitive Normal Basis Theorem}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1459--1480}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0543-9}, doi = {10.1007/S10623-018-0543-9}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KapetanakisR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KavutMT19, author = {Sel{\c{c}}uk Kavut and Subhamoy Maitra and Deng Tang}, title = {Construction and search of balanced Boolean functions on even number of variables towards excellent autocorrelation profile}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {261--276}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0522-1}, doi = {10.1007/S10623-018-0522-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KavutMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KavutT19, author = {Sel{\c{c}}uk Kavut and Seher Tutdere}, title = {The covering radii of a class of binary cyclic codes and some {BCH} codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {317--325}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0525-y}, doi = {10.1007/S10623-018-0525-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KavutT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KharaghaniS19, author = {Hadi Kharaghani and Sho Suda}, title = {Linked systems of symmetric group divisible designs of type {II}}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2341--2360}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00622-z}, doi = {10.1007/S10623-019-00622-Z}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KharaghaniS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimPC19, author = {Jon{-}Lark Kim and Junyong Park and Soohak Choi}, title = {Steganographic schemes from perfect codes on Cayley graphs}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2361--2374}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00624-x}, doi = {10.1007/S10623-019-00624-X}, timestamp = {Tue, 31 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KimPC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KoikeKMM19, author = {Hiroki Koike and Istv{\'{a}}n Kov{\'{a}}cs and Dragan Marusic and Mikhail E. Muzychuk}, title = {Cyclic groups are CI-groups for balanced configurations}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1227--1235}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0517-y}, doi = {10.1007/S10623-018-0517-Y}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KoikeKMM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KotovMU19, author = {Matvei Kotov and Anton Menshov and Alexander Ushakov}, title = {An attack on the Walnut digital signature algorithm}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2231--2250}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00615-y}, doi = {10.1007/S10623-019-00615-Y}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/KotovMU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LaiC19, author = {Ching{-}Yi Lai and Kai{-}Min Chung}, title = {Quantum encryption and generalized Shannon impossibility}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {1961--1972}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00597-3}, doi = {10.1007/S10623-018-00597-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LaiC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LandjevG19, author = {Ivan N. Landjev and Nevyana Georgieva}, title = {Conditions for the existence of spreads in projective Hjelmslev spaces}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {785--794}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0540-z}, doi = {10.1007/S10623-018-0540-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LandjevG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LauT19, author = {Terry Shue Chien Lau and Chik How Tan}, title = {New rank codes based encryption scheme using partial circulant matrices}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2979--2999}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00659-0}, doi = {10.1007/S10623-019-00659-0}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LauT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Lavauzelle19, author = {Julien Lavauzelle}, title = {Lifted projective Reed-Solomon codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1541--1575}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0552-8}, doi = {10.1007/S10623-018-0552-8}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Lavauzelle19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LenzWY19, author = {Andreas Lenz and Antonia Wachter{-}Zeh and Eitan Yaakobi}, title = {Duplication-correcting codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {277--298}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0523-0}, doi = {10.1007/S10623-018-0523-0}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LenzWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Li19, author = {Shuxing Li}, title = {On the weight distribution of second order Reed-Muller codes and their relatives}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2447--2460}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00630-z}, doi = {10.1007/S10623-019-00630-Z}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Li19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiW19, author = {Yanbin Li and Meiqin Wang}, title = {Cryptanalysis of {MORUS}}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {1035--1058}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0501-6}, doi = {10.1007/S10623-018-0501-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiangJ19, author = {Miao Liang and Lijun Ji}, title = {On (t, L)-fold perfect authentication and secrecy codes with arbitration}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {2003--2026}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00602-9}, doi = {10.1007/S10623-018-00602-9}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiangJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Lieb19, author = {Julia Lieb}, title = {Necessary field size and probability for {MDP} and complete {MDP} convolutional codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {3019--3043}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00661-6}, doi = {10.1007/S10623-019-00661-6}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Lieb19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LingO19, author = {San Ling and Buket {\"{O}}zkaya}, title = {Multidimensional quasi-twisted codes: equivalent characterizations and their relation to multidimensional convolutional codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2941--2965}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00655-4}, doi = {10.1007/S10623-019-00655-4}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LingO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuJZL19, author = {Junying Liu and Yupeng Jiang and Qunxiong Zheng and Dongdai Lin}, title = {A new construction of zero-difference balanced functions and two applications}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2251--2265}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00616-x}, doi = {10.1007/S10623-019-00616-X}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuJZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuL19, author = {Haibo Liu and Qunying Liao}, title = {Several classes of linear codes with a few weights from defining sets over {\textdollar}{\textdollar}{\textbackslash}mathbb \{F\}{\_}p+u{\textbackslash}mathbb \{F\}{\_}p{\textdollar}{\textdollar} {F} p + u {F} p}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {15--29}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0478-1}, doi = {10.1007/S10623-018-0478-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuM19, author = {Jian Liu and Sihem Mesnager}, title = {Weightwise perfectly balanced functions with high weightwise nonlinearity profile}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1797--1813}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0579-x}, doi = {10.1007/S10623-018-0579-X}, timestamp = {Wed, 26 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuW19, author = {Zihui Liu and Jinliang Wang}, title = {Linear complementary dual codes over rings}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {3077--3086}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00664-3}, doi = {10.1007/S10623-019-00664-3}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiuW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuZ19, author = {Xing Liu and Liang Zhou}, title = {Improved Singleton bound on frequency hopping sequences and optimal constructions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1713--1733}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0572-4}, doi = {10.1007/S10623-018-0572-4}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiuZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuZ19a, author = {Xing Liu and Liang Zhou}, title = {Correction to: Improved Singleton bound on frequency hopping sequences and optimal constructions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1735--1736}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00618-9}, doi = {10.1007/S10623-019-00618-9}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiuZ19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Martinez-Penas19, author = {Umberto Mart{\'{\i}}nez{-}Pe{\~{n}}as}, title = {Theory of supports for linear codes endowed with the sum-rank metric}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2295--2320}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00619-8}, doi = {10.1007/S10623-019-00619-8}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Martinez-Penas19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaxwellPSW19, author = {Gregory Maxwell and Andrew Poelstra and Yannick Seurin and Pieter Wuille}, title = {Simple Schnorr multi-signatures with applications to Bitcoin}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {2139--2164}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00608-x}, doi = {10.1007/S10623-019-00608-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MaxwellPSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Meagher19, author = {Karen Meagher}, title = {An Erd{\H{o}}s-Ko-Rado theorem for the group {\textdollar}{\textdollar}{\textbackslash}hbox \{PSU\}(3, q){\textdollar}{\textdollar} {PSU} {(} 3 , q {)}}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {717--744}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0537-7}, doi = {10.1007/S10623-018-0537-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Meagher19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MefenzaV19, author = {Thierry Mefenza and Damien Vergnaud}, title = {Polynomial interpolation of the generalized Diffie-Hellman and Naor-Reingold functions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {75--85}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0486-1}, doi = {10.1007/S10623-018-0486-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MefenzaV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MengMY19, author = {Keju Meng and Fuyou Miao and Yue Yu}, title = {A secure and efficient on-line/off-line group key distribution protocol}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1601--1620}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0554-6}, doi = {10.1007/S10623-018-0554-6}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MengMY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MesnagerOS19, author = {Sihem Mesnager and Ferruh {\"{O}}zbudak and Ahmet Sinak}, title = {Linear codes from weakly regular plateaued functions and their secret sharing schemes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {463--480}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0556-4}, doi = {10.1007/S10623-018-0556-4}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MesnagerOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MesnagerZTZ19, author = {Sihem Mesnager and Fengrong Zhang and Chunming Tang and Yong Zhou}, title = {Further study on the maximum number of bent components of vectorial functions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2597--2610}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00639-4}, doi = {10.1007/S10623-019-00639-4}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MesnagerZTZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MeszkaT19, author = {Mariusz Meszka and Magdalena Tyniec}, title = {Orthogonal one-factorizations of complete multipartite graphs}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {987--993}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0504-3}, doi = {10.1007/S10623-018-0504-3}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MeszkaT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MezofiN19, author = {D{\'{a}}vid Mezofi and G{\'{a}}bor P{\'{e}}ter Nagy}, title = {On the geometry of full points of abstract unitals}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2967--2978}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00658-1}, doi = {10.1007/S10623-019-00658-1}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MezofiN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MichelW19, author = {Jerod Michel and Qi Wang}, title = {Almost difference sets in nonabelian groups}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1243--1251}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0519-9}, doi = {10.1007/S10623-018-0519-9}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MichelW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MichelW19a, author = {Jerod Michel and Qi Wang}, title = {Almost designs and their links with balanced incomplete block designs}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {1945--1960}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00596-4}, doi = {10.1007/S10623-018-00596-4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MichelW19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MichelW19b, author = {Jerod Michel and Qi Wang}, title = {Partial geometric designs from group actions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2655--2670}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00644-7}, doi = {10.1007/S10623-019-00644-7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MichelW19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MicheliW19, author = {Giacomo Micheli and Violetta Weger}, title = {Cryptanalysis of the CLR-cryptosystem}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {1069--1086}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0500-7}, doi = {10.1007/S10623-018-0500-7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MicheliW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MiezakiO19, author = {Tsuyoshi Miezaki and Manabu Oura}, title = {On the cycle index and the weight enumerator}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1237--1242}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0518-x}, doi = {10.1007/S10623-018-0518-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MiezakiO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NgP19, author = {Siaw{-}Lynn Ng and Maura B. Paterson}, title = {Functional repair codes: a view from projective geometry}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2701--2722}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00647-4}, doi = {10.1007/S10623-019-00647-4}, timestamp = {Thu, 17 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NgP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OlsonS19, author = {Torger Olson and Eric Swartz}, title = {Transitive PSL(2, 11)-invariant k-arcs in PG(4, q)}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1871--1879}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0588-9}, doi = {10.1007/S10623-018-0588-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OlsonS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ostergard19, author = {Patric R. J. {\"{O}}sterg{\aa}rd}, title = {The sextuply shortened binary Golay code is optimal}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {341--347}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0532-z}, doi = {10.1007/S10623-018-0532-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ostergard19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OuyangX19, author = {Yi Ouyang and Xianhong Xie}, title = {Linear complexity of generalized cyclotomic sequences of period 2p\({}^{\mbox{m}}\)}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2585--2596}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00638-5}, doi = {10.1007/S10623-019-00638-5}, timestamp = {Fri, 25 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OuyangX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PanarioR19, author = {Daniel Panario and Lucas Reis}, title = {The functional graph of linear maps over finite fields and applications}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {437--453}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0547-5}, doi = {10.1007/S10623-018-0547-5}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PanarioR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PineroS19, author = {Fernando Pi{\~{n}}ero and Prasant Singh}, title = {The weight spectrum of certain affine Grassmann codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {817--830}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0567-1}, doi = {10.1007/S10623-018-0567-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PineroS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PinheiroMF19, author = {Jerry Anderson Pinheiro and Roberto Assis Machado and Marcelo Firer}, title = {Combinatorial metrics: MacWilliams-type identities, isometries and extension property}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {327--340}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0527-9}, doi = {10.1007/S10623-018-0527-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PinheiroMF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Polhill19, author = {John B. Polhill}, title = {A new family of partial difference sets in 3-groups}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1639--1646}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0562-6}, doi = {10.1007/S10623-018-0562-6}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Polhill19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PuchingerRB19, author = {Sven Puchinger and Johan Rosenkilde and Irene I. Bouw}, title = {Improved power decoding of interleaved one-point Hermitian codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {589--607}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0577-z}, doi = {10.1007/S10623-018-0577-Z}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PuchingerRB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/QiX19, author = {Minglong Qi and Shengwu Xiong}, title = {A correction to: on the linear complexity of the Sidelnikov-Lempel-Cohn-Eastman sequences}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2391--2393}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00625-w}, doi = {10.1007/S10623-019-00625-W}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/QiX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/QureshiP19, author = {Claudio M. Qureshi and Daniel Panario}, title = {The graph structure of Chebyshev polynomials over finite fields and applications}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {393--416}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0545-7}, doi = {10.1007/S10623-018-0545-7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/QureshiP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Randriam19, author = {Hugues Randriam}, title = {Gaps between prime numbers and tensor rank of multiplication in finite fields}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {627--645}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0584-0}, doi = {10.1007/S10623-018-0584-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Randriam19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Reis19, author = {Lucas Reis}, title = {Factorization of a class of composed polynomials}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1657--1671}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0568-0}, doi = {10.1007/S10623-018-0568-0}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Reis19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Romanov19, author = {Alexander M. Romanov}, title = {On non-full-rank perfect codes over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {995--1003}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0506-1}, doi = {10.1007/S10623-018-0506-1}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Romanov19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RoussevaL19, author = {Assia Rousseva and Ivan N. Landjev}, title = {Linear codes close to the Griesmer bound and the related geometric structures}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {841--854}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0565-3}, doi = {10.1007/S10623-018-0565-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RoussevaL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShangguanG19, author = {Chong Shangguan and Gennian Ge}, title = {A new piggybacking design for systematic {MDS} storage codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2753--2770}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00650-9}, doi = {10.1007/S10623-019-00650-9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShangguanG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Sheekey19, author = {John Sheekey}, title = {Binary additive {MRD} codes with minimum distance n-1 must contain a semifield spread set}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2571--2583}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00637-6}, doi = {10.1007/S10623-019-00637-6}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Sheekey19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiHK19, author = {Minjia Shi and Daitao Huang and Denis S. Krotov}, title = {Additive perfect codes in Doob graphs}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1857--1869}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0586-y}, doi = {10.1007/S10623-018-0586-Y}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShiHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiKS19, author = {Minjia Shi and Denis S. Krotov and Patrick Sol{\'{e}}}, title = {A new distance-regular graph of diameter 3 on 1024 vertices}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {2091--2101}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00609-w}, doi = {10.1007/S10623-019-00609-W}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShiKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiKS19a, author = {Minjia Shi and Denis S. Krotov and Patrick Sol{\'{e}}}, title = {Correction to: {A} new distance-regular graph of diameter 3 on 1024 vertices}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {2103}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00672-3}, doi = {10.1007/S10623-019-00672-3}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShiKS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiLRSS19, author = {Minjia Shi and Yan Liu and Hugues Randriam and Lin Sok and Patrick Sol{\'{e}}}, title = {Trace codes over Z\({}_{\mbox{4}}\), and Boolean functions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1447--1455}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0542-x}, doi = {10.1007/S10623-018-0542-X}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShiLRSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiS19, author = {Minjia Shi and Patrick Sol{\'{e}}}, title = {Three-weight codes, triple sum sets, and strongly walk regular graphs}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2395--2404}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00628-7}, doi = {10.1007/S10623-019-00628-7}, timestamp = {Sat, 14 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShiS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiYW19, author = {Xueying Shi and Qin Yue and Yansheng Wu}, title = {The dual-containing primitive {BCH} codes with the maximum designed distance and their applications to quantum codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {2165--2183}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00610-3}, doi = {10.1007/S10623-019-00610-3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShiYW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiZSC19, author = {Minjia Shi and Hongwei Zhu and Patrick Sol{\'{e}} and G{\'{e}}rard D. Cohen}, title = {How many weights can a linear code have?}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {87--95}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0488-z}, doi = {10.1007/S10623-018-0488-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShiZSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShikataW19, author = {Junji Shikata and Yohei Watanabe}, title = {Identity-based encryption with hierarchical key-insulation in the standard model}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {1005--1033}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0503-4}, doi = {10.1007/S10623-018-0503-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShikataW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Shiromoto19, author = {Keisuke Shiromoto}, title = {Codes with the rank metric and matroids}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1765--1776}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0576-0}, doi = {10.1007/S10623-018-0576-0}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Shiromoto19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShparlinskiW19, author = {Igor E. Shparlinski and Arne Winterhof}, title = {Codes correcting restricted errors}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {855--863}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0585-z}, doi = {10.1007/S10623-018-0585-Z}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShparlinskiW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SobhaniABK19, author = {Reza Sobhani and Alireza Abdollahi and Javad Bagherian and Maryam Khatami}, title = {A note on good permutation codes from Reed-Solomon codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2335--2340}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00621-0}, doi = {10.1007/S10623-019-00621-0}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SobhaniABK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SoleimanianK19, author = {Azam Soleimanian and Shahram Khazaei}, title = {Publicly verifiable searchable symmetric encryption based on efficient cryptographic components}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {123--147}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0489-y}, doi = {10.1007/S10623-018-0489-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SoleimanianK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SolovevaAJMZ19, author = {Faina I. Solov'eva and Daniel Augot and Thomas Johansson and Marine Minier and Victor A. Zinoviev}, title = {Editorial: Special issue on coding and cryptography}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {183--184}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00601-w}, doi = {10.1007/S10623-018-00601-W}, timestamp = {Wed, 20 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/SolovevaAJMZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SongS19, author = {Min Kyu Song and Hong{-}Yeop Song}, title = {Hamming correlation properties of the array structure of Sidelnikov sequences}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2537--2551}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00636-7}, doi = {10.1007/S10623-019-00636-7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SongS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SteinfeldSZ19, author = {Ron Steinfeld and Amin Sakzad and Raymond K. Zhao}, title = {Practical {\textdollar}{\textdollar}{\textbackslash}mathsf \{MP\} {\textbackslash}text\{- \}{\textbackslash}mathsf \{LWE\} {\textdollar}{\textdollar} -based encryption balancing security-risk versus efficiency}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2847--2884}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00654-5}, doi = {10.1007/S10623-019-00654-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SteinfeldSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SunZG19, author = {Yujuan Sun and Jia{-}Fang Zhang and Sugata Gangopadhyay}, title = {Construction of resilient Boolean functions in odd variables with strictly almost optimal nonlinearity}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {3045--3062}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00662-5}, doi = {10.1007/S10623-019-00662-5}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/SunZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TangDX19, author = {Chunming Tang and Cunsheng Ding and Maosheng Xiong}, title = {Steiner systems {\textdollar}{\textdollar}S(2, 4, {\textbackslash}frac\{3m-1\}\{2\}){\textdollar}{\textdollar} and 2-designs from ternary linear codes of length {\textdollar}{\textdollar}{\textbackslash}frac\{3m-1\}\{2\}{\textdollar}{\textdollar}}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2793--2811}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00651-8}, doi = {10.1007/S10623-019-00651-8}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/TangDX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Taniguchi19, author = {Hiroaki Taniguchi}, title = {A variation of the dual hyperoval S\({}_{\mbox{c}}\) using presemifields}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {895--908}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0539-5}, doi = {10.1007/S10623-018-0539-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Taniguchi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Taniguchi19a, author = {Hiroaki Taniguchi}, title = {On some quadratic {APN} functions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {1973--1983}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00598-2}, doi = {10.1007/S10623-018-00598-2}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Taniguchi19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TianZQ19, author = {Tian Tian and Jia{-}Min Zhang and Wen{-}Feng Qi}, title = {On the uniqueness of a type of cascade connection representations for NFSRs}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2267--2294}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00617-w}, doi = {10.1007/S10623-019-00617-W}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/TianZQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TopalovaZ19, author = {Svetlana Topalova and Stela Zhelezova}, title = {Types of spreads and duality of the parallelisms of PG(3, 5) with automorphisms of order 13}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {495--507}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0558-2}, doi = {10.1007/S10623-018-0558-2}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/TopalovaZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Trung19, author = {Tran van Trung}, title = {On existence theorems for simple t-designs}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {7}, pages = {1521--1540}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0550-x}, doi = {10.1007/S10623-018-0550-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Trung19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Trung19a, author = {Tran van Trung}, title = {Recursive constructions for s-resolvable t-designs}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2835--2845}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00653-6}, doi = {10.1007/S10623-019-00653-6}, timestamp = {Wed, 06 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Trung19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Vandendriessche19, author = {Peter Vandendriessche}, title = {On KM-arcs in non-Desarguesian projective planes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {2129--2137}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00606-z}, doi = {10.1007/S10623-019-00606-Z}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Vandendriessche19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Vasileva19, author = {Anastasia Vasil'eva}, title = {Local distributions for eigenfunctions and perfect colorings of q-ary Hamming graph}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {2-3}, pages = {509--516}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0559-1}, doi = {10.1007/S10623-018-0559-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Vasileva19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Wang19, author = {Qichun Wang}, title = {Hadamard matrices, d-linearly independent sets and correlation-immune Boolean functions with minimum Hamming weights}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2321--2333}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00620-1}, doi = {10.1007/S10623-019-00620-1}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Wang19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangCJ19, author = {Xin Wang and Jie Cui and Lijun Ji}, title = {Linear (2, p, p)-AONTs exist for all primes p}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {10}, pages = {2185--2197}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00612-1}, doi = {10.1007/S10623-019-00612-1}, timestamp = {Tue, 10 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WangCJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangJ19, author = {Qian Wang and Chenhui Jin}, title = {More accurate results on the provable security of {AES} against impossible differential cryptanalysis}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {3001--3018}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00660-7}, doi = {10.1007/S10623-019-00660-7}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WangJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangS19, author = {Qichun Wang and Pantelimon Stanica}, title = {A trigonometric sum sharp estimate and new bounds on the nonlinearity of some cryptographic Boolean functions}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1749--1763}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0574-2}, doi = {10.1007/S10623-018-0574-2}, timestamp = {Fri, 05 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangS19a, author = {Qichun Wang and Pantelimon Stanica}, title = {Transparency order for Boolean functions: analysis and construction}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {2043--2059}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00604-1}, doi = {10.1007/S10623-019-00604-1}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WinterDT19, author = {Stefaan De Winter and Cunsheng Ding and Vladimir D. Tonchev}, title = {Maximal arcs and extended cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {807--816}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0514-1}, doi = {10.1007/S10623-018-0514-1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WinterDT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WinterW19, author = {Stefaan De Winter and Zeying Wang}, title = {Non-existence of partial difference sets in Abelian groups of order 8p\({}^{\mbox{3}}\)}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {4}, pages = {757--768}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0508-z}, doi = {10.1007/S10623-018-0508-Z}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WinterW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WuYS19, author = {Yansheng Wu and Qin Yue and Xueying Shi}, title = {At most three-weight binary linear codes from generalized Moisio's exponential sums}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {8}, pages = {1927--1943}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-00595-5}, doi = {10.1007/S10623-018-00595-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WuYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XieY19, author = {Huiqin Xie and Li Yang}, title = {Using Bernstein-Vazirani algorithm to attack block ciphers}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {1161--1182}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0510-5}, doi = {10.1007/S10623-018-0510-5}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XieY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuZG19, author = {Zixiang Xu and Yiwei Zhang and Gennian Ge}, title = {New theoretical bounds and constructions of permutation codes under block permutation metric}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2625--2637}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00641-w}, doi = {10.1007/S10623-019-00641-W}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XuZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YangCMSGL19, author = {Guomin Yang and Rongmao Chen and Yi Mu and Willy Susilo and Fuchun Guo and Jie Li}, title = {Strongly leakage resilient authenticated key exchange, revisited}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {12}, pages = {2885--2911}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00656-3}, doi = {10.1007/S10623-019-00656-3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YangCMSGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YangQC19, author = {Dong Yang and Wen{-}Feng Qi and Hua{-}Jin Chen}, title = {Provable security against impossible differential and zero correlation linear cryptanalysis of some feistel structures}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2683--2700}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00642-9}, doi = {10.1007/S10623-019-00642-9}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/YangQC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YasudaY19, author = {Masaya Yasuda and Junpei Yamaguchi}, title = {A new polynomial-time variant of {LLL} with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2489--2505}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00634-9}, doi = {10.1007/S10623-019-00634-9}, timestamp = {Thu, 17 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YasudaY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Zanten19, author = {A. J. van Zanten}, title = {Primitive idempotent tables of cyclic and constacyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {6}, pages = {1199--1225}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0495-0}, doi = {10.1007/S10623-018-0495-0}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Zanten19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhanDB19, author = {Xiaoqin Zhan and Suyun Ding and Shuyi Bai}, title = {Flag-transitive 2-designs from PSL(2, q) with block size 4}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2723--2728}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00648-3}, doi = {10.1007/S10623-019-00648-3}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhanDB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangC19, author = {Shiyong Zhang and Gongliang Chen}, title = {New results on the state cycles of Trivium}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {149--162}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0493-2}, doi = {10.1007/S10623-018-0493-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangG19, author = {Tao Zhang and Gennian Ge}, title = {Constructions of optimal Ferrers diagram rank metric codes}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {1}, pages = {107--121}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0491-4}, doi = {10.1007/S10623-018-0491-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangG19a, author = {Yiwei Zhang and Gennian Ge}, title = {A general private information retrieval scheme for {MDS} coded databases with colluding servers}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {11}, pages = {2611--2623}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00640-x}, doi = {10.1007/S10623-019-00640-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouYM19, author = {Yanwei Zhou and Bo Yang and Yi Mu}, title = {Continuous leakage-resilient identity-based encryption with leakage amplification}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {9}, pages = {2061--2090}, year = {2019}, url = {https://doi.org/10.1007/s10623-019-00605-0}, doi = {10.1007/S10623-019-00605-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhouYM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhuZYLL19, author = {Yuqing Zhu and Jincheng Zhuang and Hairong Yi and Chang Lv and Dongdai Lin}, title = {A variant of the Galbraith-Ruprai algorithm for discrete logarithms with improved complexity}, journal = {Des. Codes Cryptogr.}, volume = {87}, number = {5}, pages = {971--986}, year = {2019}, url = {https://doi.org/10.1007/s10623-018-0492-3}, doi = {10.1007/S10623-018-0492-3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhuZYLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlahmadiOS18, author = {Adel Alahmadi and Funda {\"{O}}zdemir and Patrick Sol{\'{e}}}, title = {On self-dual double circulant codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1257--1265}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0393-x}, doi = {10.1007/S10623-017-0393-X}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlahmadiOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlmeidaNP18, author = {Paulo Jos{\'{e}} Fernandes Almeida and Diego Napp and Raquel Pinto}, title = {{MDS} 2D convolutional codes with optimal 1D horizontal projections}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {285--302}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0357-1}, doi = {10.1007/S10623-017-0357-1}, timestamp = {Tue, 23 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlmeidaNP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AntrobusG18, author = {Jared Antrobus and Heide Gluesing{-}Luerssen}, title = {Lexicodes over finite principal ideal rings}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2661--2676}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0469-2}, doi = {10.1007/S10623-018-0469-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AntrobusG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Arce-NazarioCGM18, author = {Rafael A. Arce{-}Nazario and Francis N. Castro and Oscar E. Gonz{\'{a}}lez and Luis A. Medina and Ivelisse M. Rubio}, title = {New families of balanced symmetric functions and a generalization of Cusick, Li and St{\unicode{462}}nic{\unicode{462}}'s conjecture}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {693--701}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0351-7}, doi = {10.1007/S10623-017-0351-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Arce-NazarioCGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AugotLR18, author = {Daniel Augot and Pierre Loidreau and Gwezheneg Robert}, title = {Generalized Gabidulin codes over fields of any characteristic}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1807--1848}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0425-6}, doi = {10.1007/S10623-017-0425-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AugotLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AvelliPS18, author = {Diego Napp Avelli and Raquel Pinto and Vladimir Sidorenko}, title = {Concatenation of convolutional codes and rank metric codes for multi-shot network coding}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {303--318}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0346-4}, doi = {10.1007/S10623-017-0346-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AvelliPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AydinCD18, author = {Nuh Aydin and Yasemin Cengellenmis and Abdullah Dertli}, title = {On some constacyclic codes over {\textdollar}{\textdollar}{\textbackslash}mathbb \{Z\}{\_}\{4\}{\textbackslash}left[ u{\textbackslash}right] /{\textbackslash}left{\textbackslash}langle u\{2\}-1{\textbackslash}right{\textbackslash}rangle {\textdollar}{\textdollar} , their {\textdollar}Z\({}_{\mbox{4}}\) images, and new codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1249--1255}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0392-y}, doi = {10.1007/S10623-017-0392-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AydinCD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BagheriSP18, author = {Khadijeh Bagheri and Mohammad{-}Reza Sadeghi and Daniel Panario}, title = {A non-commutative cryptosystem based on quaternion algebras}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2345--2377}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0451-4}, doi = {10.1007/S10623-017-0451-4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BagheriSP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BambergLL18, author = {John Bamberg and Jesse Lansdown and Melissa Lee}, title = {On m-ovoids of regular near polygons}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {997--1006}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0373-1}, doi = {10.1007/S10623-017-0373-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BambergLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BandiTM18, author = {Ramakrishna Bandi and Alexandre Fotue Tabue and Edgar Mart{\'{\i}}nez{-}Moro}, title = {On counting subring-submodules of free modules over finite commutative frobenius rings}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2247--2254}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0446-1}, doi = {10.1007/S10623-017-0446-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BandiTM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BarrolletaV18, author = {Roland D. Barrolleta and Merc{\`{e}} Villanueva}, title = {Partial permutation decoding for binary linear and {\textdollar}{\textdollar}Z{\_}4{\textdollar}{\textdollar} {Z} 4 -linear Hadamard codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {569--586}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0342-8}, doi = {10.1007/S10623-017-0342-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BarrolletaV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartoliMZ18, author = {Daniele Bartoli and Maria Montanucci and Giovanni Zini}, title = {Multi point {AG} codes on the {GK} maximal curve}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {161--177}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0333-9}, doi = {10.1007/S10623-017-0333-9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BartoliMZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartoliMZ18a, author = {Daniele Bartoli and Maria Montanucci and Giovanni Zini}, title = {{AG} codes and {AG} quantum codes from the {GGS} curve}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2315--2344}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0450-5}, doi = {10.1007/S10623-017-0450-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BartoliMZ18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BartoliQ18, author = {Daniele Bartoli and Luciane Quoos}, title = {Permutation polynomials of the type g(x\({}^{\mbox{s}}\)) over {\(\mathbb{F}\)}\({}_{\mbox{q\({}^{\mbox{2n}}\)}}\)}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1589--1599}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0415-8}, doi = {10.1007/S10623-017-0415-8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BartoliQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeregLS18, author = {Sergey Bereg and Avi Levy and Ivan Hal Sudborough}, title = {Constructing permutation arrays from groups}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1095--1111}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0381-1}, doi = {10.1007/S10623-017-0381-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeregLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BiLDLW18, author = {Wenquan Bi and Zheng Li and Xiaoyang Dong and Lu Li and Xiaoyun Wang}, title = {Conditional cube attack on round-reduced River Keyak}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1295--1310}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0396-7}, doi = {10.1007/S10623-017-0396-7}, timestamp = {Thu, 16 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BiLDLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BibakKS18, author = {Khodakhast Bibak and Bruce M. Kapron and Venkatesh Srinivasan}, title = {Unweighted linear congruences with distinct coordinates and the Varshamov-Tenengolts codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1893--1904}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0428-3}, doi = {10.1007/S10623-017-0428-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BibakKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BierbrauerBFMP18, author = {J{\"{u}}rgen Bierbrauer and Daniele Bartoli and Giorgio Faina and Stefano Marcugini and Fernanda Pambianco}, title = {A family of semifields in odd characteristic}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {611--621}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0345-5}, doi = {10.1007/S10623-017-0345-5}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BierbrauerBFMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BlackburnGHPRSV18, author = {Simon R. Blackburn and Marcus Greferath and Camilla Hollanti and Mario{-}Osvin Pavcevic and Joachim Rosenthal and Leo Storme and {\'{A}}ngeles V{\'{a}}zquez{-}Castro and Alfred Wassermann}, title = {Preface to the special issue on network coding and designs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {237--238}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0443-4}, doi = {10.1007/S10623-017-0443-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BlackburnGHPRSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Blanco-ChaconBD18, author = {Iv{\'{a}}n Blanco{-}Chac{\'{o}}n and Eimear Byrne and Iwan M. Duursma and John Sheekey}, title = {Rank metric codes and zeta functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1767--1792}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0423-8}, doi = {10.1007/S10623-017-0423-8}, timestamp = {Thu, 17 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Blanco-ChaconBD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BorgesF18, author = {Joaquim Borges and Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba}, title = {A characterization of {\(\mathbb{Z}\)}\({}_{\mbox{2}}\){\(\mathbb{Z}\)}\({}_{\mbox{2}}\)[u]-linear codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1377--1389}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0401-1}, doi = {10.1007/S10623-017-0401-1}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BorgesF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BorgesFT18, author = {Joaquim Borges and Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba and Roger Ten{-}Valls}, title = {Z\({}_{\mbox{2}}\)-double cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {463--479}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0334-8}, doi = {10.1007/S10623-017-0334-8}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BorgesFT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BricoutMPM18, author = {R{\'{e}}mi Bricout and Sean Murphy and Kenneth G. Paterson and Thyla van der Merwe}, title = {Analysing and exploiting the Mantin biases in {RC4}}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {743--770}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0355-3}, doi = {10.1007/S10623-017-0355-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BricoutMPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletMTQ18, author = {Claude Carlet and Sihem Mesnager and Chunming Tang and Yanfeng Qi}, title = {Euclidean and Hermitian {LCD} {MDS} codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2605--2618}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0463-8}, doi = {10.1007/S10623-018-0463-8}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CarletMTQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CatalanoFN18, author = {Dario Catalano and Dario Fiore and Luca Nizzardo}, title = {Homomorphic signatures with sublinear public keys via asymmetric programmable hash functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2197--2246}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0444-3}, doi = {10.1007/S10623-017-0444-3}, timestamp = {Thu, 06 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CatalanoFN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChangH18, author = {Seunghwan Chang and Jong Yoon Hyun}, title = {Linear codes from simplicial complexes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2167--2181}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0442-5}, doi = {10.1007/S10623-017-0442-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChangH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenJL18, author = {Jingyuan Chen and Lijun Ji and Yun Li}, title = {Combinatorial constructions of optimal (m, n, 4, 2) optical orthogonal signature pattern codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1499--1525}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0409-6}, doi = {10.1007/S10623-017-0409-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenJL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenL18, author = {Bocong Chen and Hongwei Liu}, title = {Constructions of cyclic constant dimension codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1267--1279}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0394-9}, doi = {10.1007/S10623-017-0394-9}, timestamp = {Tue, 23 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChoiDMW18, author = {Seung Geol Choi and Dana Dachman{-}Soled and Tal Malkin and Hoeteck Wee}, title = {Improved, black-box, non-malleable encryption from semantic security}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {641--663}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0348-2}, doi = {10.1007/S10623-017-0348-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChoiDMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Clayton18, author = {David Clayton}, title = {A note on almost difference sets in nonabelian groups}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1405--1410}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0403-z}, doi = {10.1007/S10623-017-0403-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Clayton18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Cogliati18, author = {Beno{\^{\i}}t Cogliati}, title = {Tweaking a block cipher: multi-user beyond-birthday-bound security in the standard model}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2747--2763}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0471-8}, doi = {10.1007/S10623-018-0471-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Cogliati18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CogliatiS18, author = {Beno{\^{\i}}t Cogliati and Yannick Seurin}, title = {Analysis of the single-permutation encrypted Davies-Meyer construction}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2703--2723}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0470-9}, doi = {10.1007/S10623-018-0470-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CogliatiS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ColbournLS18, author = {Charles J. Colbourn and Erin Lanus and Kaushik Sarkar}, title = {Asymptotic and constructive methods for covering perfect hash families and covering arrays}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {907--937}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0369-x}, doi = {10.1007/S10623-017-0369-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ColbournLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CossidenteP18, author = {Antonio Cossidente and Francesco Pavese}, title = {On intriguing sets of finite symplectic spaces}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1161--1174}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0387-8}, doi = {10.1007/S10623-017-0387-8}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CossidenteP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CostaFW18, author = {Simone Costa and Tao Feng and Xiaomiao Wang}, title = {Frame difference families and resolvable balanced incomplete block designs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2725--2745}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0472-7}, doi = {10.1007/S10623-018-0472-7}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CostaFW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CruzGLR18, author = {Javier de la Cruz and Elisa Gorla and Hiram H. L{\'{o}}pez and Alberto Ravagnani}, title = {Weight distribution of rank-metric codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {1--16}, year = {2018}, url = {https://doi.org/10.1007/s10623-016-0325-1}, doi = {10.1007/S10623-016-0325-1}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CruzGLR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CruzW18, author = {Javier de la Cruz and Wolfgang Willems}, title = {On group codes with complementary duals}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {2065--2073}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0437-2}, doi = {10.1007/S10623-017-0437-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CruzW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DavisO18, author = {James A. Davis and Oktay {\"{O}}lmez}, title = {A framework for constructing partial geometric difference sets}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1367--1375}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0400-2}, doi = {10.1007/S10623-017-0400-2}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DavisO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dempwolff18, author = {Ulrich Dempwolff}, title = {{CCZ} equivalence of power functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {665--692}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0350-8}, doi = {10.1007/S10623-017-0350-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dempwolff18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DerlerS18, author = {David Derler and Daniel Slamanig}, title = {Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2525--2547}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0460-y}, doi = {10.1007/S10623-018-0460-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DerlerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ding18, author = {Cunsheng Ding}, title = {Infinite families of 3-designs from a type of five-weight code}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {703--719}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0352-6}, doi = {10.1007/S10623-017-0352-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ding18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DingGZZZ18, author = {Baokun Ding and Gennian Ge and Jun Zhang and Tao Zhang and Yiwei Zhang}, title = {New constructions of {MDS} symbol-pair codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {841--859}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0365-1}, doi = {10.1007/S10623-017-0365-1}, timestamp = {Thu, 13 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DingGZZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DinhSPS18, author = {Hai Q. Dinh and Abhay Kumar Singh and Sukhamoy Pattanayak and Songsak Sriboonchitta}, title = {Cyclic {DNA} codes over the ring {\(\mathbb{F}\)}\({}_{\mbox{2}}\)+u{\(\mathbb{F}\)}\({}_{\mbox{2}}\)+v{\(\mathbb{F}\)}\({}_{\mbox{2}}\)+uv{\(\mathbb{F}\)}\({}_{\mbox{2}}\)+v\({}^{\mbox{2}}\){\(\mathbb{F}\)}\({}_{\mbox{2}}\)+uv\({}^{\mbox{2}}\){\(\mathbb{F}\)}\({}_{\mbox{2}}\)}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1451--1467}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0405-x}, doi = {10.1007/S10623-017-0405-X}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DinhSPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DonatiD18, author = {Giorgio Donati and Nicola Durante}, title = {A generalization of the normal rational curve in PG(d, q\({}^{\mbox{n}}\)) and its associated non-linear {MRD} codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1175--1184}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0388-7}, doi = {10.1007/S10623-017-0388-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DonatiD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DoughertyGTT18, author = {Steven T. Dougherty and Joe Gildea and Rhian Taylor and Alexander Tylyshchak}, title = {Group rings, G-codes and constructions of self-dual and formally self-dual codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {2115--2138}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0440-7}, doi = {10.1007/S10623-017-0440-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DoughertyGTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DrapalV18, author = {Ales Dr{\'{a}}pal and Viliam Valent}, title = {Few associative triples, isotopisms and groups}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {555--568}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0341-9}, doi = {10.1007/S10623-017-0341-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DrapalV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DucasW18, author = {L{\'{e}}o Ducas and Wessel P. J. van Woerden}, title = {The closest vector problem in tensored root lattices of type {A} and in their duals}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {137--150}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0332-x}, doi = {10.1007/S10623-017-0332-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DucasW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EmuraHNOMY18, author = {Keita Emura and Goichiro Hanaoka and Koji Nuida and Go Ohtake and Takahiro Matsuda and Shota Yamada}, title = {Chosen ciphertext secure keyed-homomorphic public-key cryptosystems}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1623--1683}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0417-6}, doi = {10.1007/S10623-017-0417-6}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EmuraHNOMY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Fan18, author = {Cuiling Fan}, title = {The linear complexity of a class of binary sequences with optimal autocorrelation}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2441--2450}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0456-7}, doi = {10.1007/S10623-018-0456-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Fan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FanX18, author = {Yun Fan and Bangteng Xu}, title = {Fourier transforms and bent functions on finite groups}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {2091--2113}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0439-0}, doi = {10.1007/S10623-017-0439-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FanX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FarranGH18, author = {Jos{\'{e}} Ignacio Farr{\'{a}}n and Pedro A. Garc{\'{\i}}a{-}S{\'{a}}nchez and Benjam{\'{\i}}n A. Heredia}, title = {On the second Feng-Rao distance of Algebraic Geometry codes related to Arf semigroups}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2893--2916}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0483-4}, doi = {10.1007/S10623-018-0483-4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FarranGH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FarranGHL18, author = {Jos{\'{e}} Ignacio Farr{\'{a}}n and Pedro A. Garc{\'{\i}}a{-}S{\'{a}}nchez and Benjam{\'{\i}}n A. Heredia and Micah J. Leamer}, title = {The second Feng-Rao number for codes coming from telescopic semigroups}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1849--1864}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0426-5}, doi = {10.1007/S10623-017-0426-5}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FarranGHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FaugereW18, author = {Jean{-}Charles Faug{\`{e}}re and Alexandre Wallet}, title = {The point decomposition problem over hyperelliptic curves - Toward efficient computation of discrete logarithms in even characteristic}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2279--2314}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0449-y}, doi = {10.1007/S10623-017-0449-Y}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FaugereW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FeltzC18, author = {Mich{\`{e}}le Feltz and Cas Cremers}, title = {Strengthening the security of authenticated key exchange against bad randomness}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {481--516}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0337-5}, doi = {10.1007/S10623-017-0337-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FeltzC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Fernando18, author = {Neranga Fernando}, title = {Self-reciprocal polynomials and coterm polynomials}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1707--1726}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0419-4}, doi = {10.1007/S10623-017-0419-4}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Fernando18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GaboritOK18, author = {Philippe Gaborit and Ayoub Otmani and Herv{\'{e}} Tal{\'{e}} Kalachi}, title = {Polynomial-time key recovery attack on the Faure-Loidreau scheme based on Gabidulin codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1391--1403}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0402-0}, doi = {10.1007/S10623-017-0402-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GaboritOK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GangopadhyayMS18, author = {Sugata Gangopadhyay and Bimal Mandal and Pantelimon Stanica}, title = {Gowers U\({}_{\mbox{3}}\) norm of some classes of bent Boolean functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1131--1148}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0383-z}, doi = {10.1007/S10623-017-0383-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GangopadhyayMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GavrilyukMP18, author = {Alexander L. Gavrilyuk and Ilia Matkin and Tim Penttila}, title = {Derivation of Cameron-Liebler line classes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {231--236}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0338-4}, doi = {10.1007/S10623-017-0338-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GavrilyukMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GeSFWS18, author = {Chunpeng Ge and Willy Susilo and Liming Fang and Jiandong Wang and Yunqing Shi}, title = {A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2587--2603}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0462-9}, doi = {10.1007/S10623-018-0462-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GeSFWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GnilkeGP18, author = {Oliver Wilhelm Gnilke and Marcus Greferath and Mario{-}Osvin Pavcevic}, title = {Mosaics of combinatorial designs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {85--95}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0328-6}, doi = {10.1007/S10623-017-0328-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GnilkeGP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuendaJG18, author = {Kenza Guenda and Somphong Jitman and T. Aaron Gulliver}, title = {Constructions of good entanglement-assisted quantum error correcting codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {121--136}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0330-z}, doi = {10.1007/S10623-017-0330-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuendaJG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HanLL18, author = {Shuai Han and Shengli Liu and Lin Lyu}, title = {Super-strong {RKA} secure MAC, {PKE} and {SE} from tag-based hash proof system}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1411--1449}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0404-y}, doi = {10.1007/S10623-017-0404-Y}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HanLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HanLQG18, author = {Shuai Han and Shengli Liu and Baodong Qin and Dawu Gu}, title = {Tightly CCA-secure identity-based encryption with ciphertext pseudorandomness}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {517--554}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0339-3}, doi = {10.1007/S10623-017-0339-3}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HanLQG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Harada18, author = {Masaaki Harada}, title = {Binary extremal self-dual codes of length 60 and related codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1085--1094}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0380-2}, doi = {10.1007/S10623-017-0380-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Harada18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HeroldKM18, author = {Gottfried Herold and Elena Kirshanova and Alexander May}, title = {On the asymptotic complexity of solving {LWE}}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {55--83}, year = {2018}, url = {https://doi.org/10.1007/s10623-016-0326-0}, doi = {10.1007/S10623-016-0326-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HeroldKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HodajKKT18, author = {Jezerca Hodaj and Melissa S. Keranen and Donald L. Kreher and Leah Tollefson}, title = {Some new Kirkman signal sets}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2183--2195}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0445-2}, doi = {10.1007/S10623-017-0445-2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HodajKKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Horlemann-Trautmann18, author = {Anna{-}Lena Horlemann{-}Trautmann and Kyle Marshall and Joachim Rosenthal}, title = {Extension of Overbeck's attack for Gabidulin-based cryptosystems}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {319--340}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0343-7}, doi = {10.1007/S10623-017-0343-7}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Horlemann-Trautmann18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Horlemann-Trautmann18a, author = {Anna{-}Lena Horlemann{-}Trautmann}, title = {Message encoding and retrieval for spread and cyclic orbit codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {365--386}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0377-x}, doi = {10.1007/S10623-017-0377-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Horlemann-Trautmann18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Hou18, author = {Xiang{-}Dong Hou}, title = {Complexities of normal bases constructed from Gauss periods}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {893--905}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0368-y}, doi = {10.1007/S10623-017-0368-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Hou18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuY18, author = {Chuangqiang Hu and Shudi Yang}, title = {Multi-point codes over Kummer extensions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {211--230}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0335-7}, doi = {10.1007/S10623-017-0335-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuiR18, author = {Alice M. W. Hui and Bernardo Gabriel Rodrigues}, title = {Switched graphs of some strongly regular graphs related to the symplectic graph}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {179--194}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0340-x}, doi = {10.1007/S10623-017-0340-X}, timestamp = {Fri, 16 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuiR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/IhringerM18, author = {Ferdinand Ihringer and Karen Meagher}, title = {Mikl{\'{o}}s-Manickam-Singhi conjectures on partial geometries}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1311--1327}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0397-6}, doi = {10.1007/S10623-017-0397-6}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/IhringerM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ji18, author = {Lijun Ji}, title = {Group divisible designs with large block sizes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2255--2260}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0448-z}, doi = {10.1007/S10623-017-0448-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ji18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JohnsenV18, author = {Trygve Johnsen and Hugues Verdure}, title = {Flags of almost affine codes and the two-party wire-tap channel of type {II}}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {2075--2090}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0438-1}, doi = {10.1007/S10623-017-0438-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JohnsenV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JungnickelT18, author = {Dieter Jungnickel and Vladimir D. Tonchev}, title = {On Bonisoli's theorem and the block codes of Steiner triple systems}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {449--462}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0406-9}, doi = {10.1007/S10623-017-0406-9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JungnickelT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JungnickelZT18, author = {Dieter Jungnickel and Yue Zhou and Vladimir D. Tonchev}, title = {Extension sets, affine designs, and Hamada's conjecture}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {587--610}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0344-6}, doi = {10.1007/S10623-017-0344-6}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JungnickelZT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KharaghaniS18, author = {Hadi Kharaghani and Sho Suda}, title = {Unbiased orthogonal designs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1573--1588}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0414-9}, doi = {10.1007/S10623-017-0414-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KharaghaniS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KiermaierKW18, author = {Michael Kiermaier and Sascha Kurz and Alfred Wassermann}, title = {The order of the automorphism group of a binary q -analog of the Fano plane is at most two}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {239--250}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0360-6}, doi = {10.1007/S10623-017-0360-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KiermaierKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KiermaierLW18, author = {Michael Kiermaier and Reinhard Laue and Alfred Wassermann}, title = {A new series of large sets of subspace designs over the binary field}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {251--268}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0349-1}, doi = {10.1007/S10623-017-0349-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KiermaierLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimSGA18, author = {Jongkil Kim and Willy Susilo and Fuchun Guo and Man Ho Au}, title = {Functional encryption for computational hiding in prime order groups via pair encodings}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {97--120}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0327-7}, doi = {10.1007/S10623-017-0327-7}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KimSGA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KogaMS18, author = {Yoshitaka Koga and Tatsuya Maruta and Keisuke Shiromoto}, title = {On critical exponents of Dowling matroids}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1947--1962}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0431-8}, doi = {10.1007/S10623-017-0431-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KogaMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kositwattanarerk18, author = {Wittawat Kositwattanarerk}, title = {Pseudocodeword-free criterion for codes with cycle-free Tanner graph}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2791--2805}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0476-3}, doi = {10.1007/S10623-018-0476-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kositwattanarerk18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LanCW18, author = {Liantao Lan and Yanxun Chang and Lidong Wang}, title = {Constructions of cyclic quaternary constant-weight codes of weight three and distance four}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1063--1083}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0379-8}, doi = {10.1007/S10623-017-0379-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LanCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Lee18, author = {Jooyoung Lee}, title = {Key alternating ciphers based on involutions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {955--988}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0371-3}, doi = {10.1007/S10623-017-0371-3}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Lee18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeCL18, author = {Chong{-}Dao Lee and Yaotsu Chang and Chia{-}an Liu}, title = {A construction of group divisible designs with block sizes 3 to 7}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1281--1293}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0395-8}, doi = {10.1007/S10623-017-0395-8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeeCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeLMM18, author = {Jooyoung Lee and Atul Luykx and Bart Mennink and Kazuhiko Minematsu}, title = {Connecting tweakable and multi-key blockcipher security}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {623--640}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0347-3}, doi = {10.1007/S10623-017-0347-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeeLMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeP18, author = {Kwangsu Lee and Seunghwan Park}, title = {Revocable hierarchical identity-based encryption with shorter private keys and update keys}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2407--2440}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0453-2}, doi = {10.1007/S10623-017-0453-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeeP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Li18, author = {Chengju Li}, title = {Hermitian {LCD} codes from cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2261--2278}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0447-0}, doi = {10.1007/S10623-017-0447-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Li18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiLDC18, author = {Mingchao Li and Miao Liang and Beiliang Du and Jingyuan Chen}, title = {A construction for optimal c-splitting authentication and secrecy codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1739--1755}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0421-x}, doi = {10.1007/S10623-017-0421-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiLDC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiQW18, author = {Kangquan Li and Longjiang Qu and Qiang Wang}, title = {New constructions of permutation polynomials of the form x\({}^{\mbox{r}}\) h(x \({}^{\mbox{q - 1}}\)) over {\(\mathbb{F}\)}\({}_{\mbox{q\({}^{\mbox{2}}\)}}\)}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2379--2405}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0452-3}, doi = {10.1007/S10623-017-0452-3}, timestamp = {Fri, 18 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiQW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiY18, author = {Fengwei Li and Qin Yue}, title = {The primitive idempotents and weight distributions of irreducible constacyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {771--784}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0356-2}, doi = {10.1007/S10623-017-0356-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiZF18, author = {Jin Li and Aixian Zhang and Keqin Feng}, title = {Linear codes over F\({}_{\mbox{q}}\)[x]/(x\({}^{\mbox{2}}\)) and GR(p\({}^{\mbox{2}}\), m) reaching the Griesmer bound}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2837--2855}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0479-0}, doi = {10.1007/S10623-018-0479-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiZF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiangZ18, author = {Hongxue Liang and Shenglin Zhou}, title = {Flag-transitive point-primitive automorphism groups of non-symmetric 2-(v, k, 3) designs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1757--1766}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0422-9}, doi = {10.1007/S10623-017-0422-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiangZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiebholdNV18, author = {Dirk Liebhold and Gabriele Nebe and {\'{A}}ngeles V{\'{a}}zquez{-}Castro}, title = {Network coding with flags}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {269--284}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0361-5}, doi = {10.1007/S10623-017-0361-5}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiebholdNV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LimniotisK18, author = {Konstantinos Limniotis and Nicholas Kolokotronis}, title = {Boolean functions with maximum algebraic immunity: further extensions of the Carlet-Feng construction}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1685--1706}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0418-5}, doi = {10.1007/S10623-017-0418-5}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LimniotisK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LinPLZ18, author = {Zhiqiang Lin and Dingyi Pei and Dongdai Lin and Xiaolei Zhang}, title = {Fast construction of binary ring FCSRs for hardware stream ciphers}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {939--953}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0370-4}, doi = {10.1007/S10623-017-0370-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LinPLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LinW18, author = {Li Lin and Wenling Wu}, title = {Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {721--741}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0353-5}, doi = {10.1007/S10623-017-0353-5}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LinW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuJKW18, author = {Jia Liu and Tibor Jager and Saqib A. Kakvi and Bogdan Warinschi}, title = {How to build time-lock encryption}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2549--2586}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0461-x}, doi = {10.1007/S10623-018-0461-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuJKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuKC18, author = {Weihua Liu and Andrew Klapper and Zhixiong Chen}, title = {Solving the {FCSR} synthesis problem for multi-sequences by lattice basis reduction}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1023--1038}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0375-z}, doi = {10.1007/S10623-017-0375-Z}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuKC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuRL18, author = {Yunwen Liu and Vincent Rijmen and Gregor Leander}, title = {Nonlinear diffusion layers}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2469--2484}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0458-5}, doi = {10.1007/S10623-018-0458-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuRL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LuNC18, author = {Xiaojuan Lu and Xiaolei Niu and Haitao Cao}, title = {Some results on generalized strong external difference families}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2857--2868}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0481-6}, doi = {10.1007/S10623-018-0481-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LuNC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Merai18, author = {L{\'{a}}szl{\'{o}} M{\'{e}}rai}, title = {On the elliptic curve endomorphism generator}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1113--1129}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0382-0}, doi = {10.1007/S10623-017-0382-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Merai18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MesnagerOS18, author = {Sihem Mesnager and Ferruh {\"{O}}zbudak and Ahmet Sinak}, title = {On the p-ary (cubic) bent and plateaued (vectorial) functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1865--1892}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0427-4}, doi = {10.1007/S10623-017-0427-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MesnagerOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MogilnykhS18, author = {Ivan Yu. Mogilnykh and Faina I. Solov'eva}, title = {On explicit minimum weight bases for extended cyclic codes related to Gold functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2619--2627}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0464-7}, doi = {10.1007/S10623-018-0464-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MogilnykhS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MoralesT18, author = {John Vincent S. Morales and Hajime Tanaka}, title = {An Assmus-Mattson theorem for codes over commutative association schemes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1039--1062}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0376-y}, doi = {10.1007/S10623-017-0376-Y}, timestamp = {Tue, 12 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MoralesT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MoreiraFK18, author = {Jos{\'{e}} Moreira and Marcel Fern{\'{a}}ndez and Grigory Kabatiansky}, title = {Constructions of almost secure frameproof codes with applications to fingerprinting schemes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {785--802}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0359-z}, doi = {10.1007/S10623-017-0359-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MoreiraFK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NeriHRR18, author = {Alessandro Neri and Anna{-}Lena Horlemann{-}Trautmann and Tovohery Randrianarisoa and Joachim Rosenthal}, title = {On the genericity of maximum rank distance and Gabidulin codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {341--363}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0354-4}, doi = {10.1007/S10623-017-0354-4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/NeriHRR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Olmez18, author = {Oktay Olmez}, title = {A link between combinatorial designs and three-weight linear codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {817--833}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0363-3}, doi = {10.1007/S10623-017-0363-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Olmez18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OrhonH18, author = {Neriman Gamze Orhon and H{\"{u}}seyin Hisil}, title = {Speeding up Huff form of elliptic curves}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2807--2823}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0475-4}, doi = {10.1007/S10623-018-0475-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OrhonH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OtmaniKN18, author = {Ayoub Otmani and Herv{\'{e}} Tal{\'{e}} Kalachi and S{\'{e}}lestin Ndjeya}, title = {Improved cryptanalysis of rank metric schemes based on Gabidulin codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1983--1996}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0434-5}, doi = {10.1007/S10623-017-0434-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OtmaniKN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PaulR18, author = {Goutam Paul and Souvik Ray}, title = {On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1211--1247}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0391-z}, doi = {10.1007/S10623-017-0391-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/PaulR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PineroS18, author = {Fernando L. Pi{\~{n}}ero and Prasant Singh}, title = {A note on the weight spectrum of the Schubert code C\({}_{\mbox{{\(\alpha\)}}}\)(2, m)}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2825--2836}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0477-2}, doi = {10.1007/S10623-018-0477-2}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PineroS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Polak18, author = {Sven C. Polak}, title = {New nonbinary code bounds based on divisibility arguments}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {861--874}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0366-0}, doi = {10.1007/S10623-017-0366-0}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Polak18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/QianZ18, author = {Jianfa Qian and Lina Zhang}, title = {On {MDS} linear complementary dual codes and entanglement-assisted quantum codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1565--1572}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0413-x}, doi = {10.1007/S10623-017-0413-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/QianZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ravagnani18, author = {Alberto Ravagnani}, title = {Duality of codes supported on regular lattices, with an application to enumerative combinatorics}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {2035--2063}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0436-3}, doi = {10.1007/S10623-017-0436-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ravagnani18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RavivYM18, author = {Netanel Raviv and Eitan Yaakobi and Muriel M{\'{e}}dard}, title = {Coding for locality in reconstructing permutations}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {387--418}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0378-9}, doi = {10.1007/S10623-017-0378-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RavivYM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RifaS18, author = {Josep Rif{\`{a}} and Emilio Su{\'{a}}rez{-}Canedo}, title = {Hadamard full propelinear codes of type Q; rank and kernel}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1905--1921}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0429-2}, doi = {10.1007/S10623-017-0429-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RifaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ryabko18, author = {Boris Ryabko}, title = {Properties of two Shannon's ciphers}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {989--995}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0372-2}, doi = {10.1007/S10623-017-0372-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ryabko18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Schmidt18, author = {Kai{-}Uwe Schmidt}, title = {Hermitian rank distance codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1469--1481}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0407-8}, doi = {10.1007/S10623-017-0407-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Schmidt18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SchmidtZ18, author = {Kai{-}Uwe Schmidt and Yue Zhou}, title = {On the number of inequivalent Gabidulin codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1973--1982}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0433-6}, doi = {10.1007/S10623-017-0433-6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SchmidtZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShangguanMG18, author = {Chong Shangguan and Jingxue Ma and Gennian Ge}, title = {New upper bounds for parent-identifying codes and traceability codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1727--1737}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0420-y}, doi = {10.1007/S10623-017-0420-Y}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShangguanMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiQS18, author = {Minjia Shi and Liqin Qian and Patrick Sol{\'{e}}}, title = {On self-dual negacirculant codes of index two and four}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2485--2494}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0455-0}, doi = {10.1007/S10623-017-0455-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShiQS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShiSAS18, author = {Minjia Shi and Zahra Sepasdar and Adel Alahmadi and Patrick Sol{\'{e}}}, title = {On two-weight Z\({}_{\mbox{2\({}^{\mbox{k}}\)}}\) -codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1201--1209}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0390-0}, doi = {10.1007/S10623-017-0390-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShiSAS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShuaiL18, author = {Shuai Li and Li Miao}, title = {A method to calculate differential uniformity for permutations}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1553--1563}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0412-y}, doi = {10.1007/S10623-017-0412-Y}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ShuaiL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SilbersteinZ18, author = {Natalia Silberstein and Alexander Zeh}, title = {Anticode-based locally repairable codes with high availability}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {2}, pages = {419--445}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0358-0}, doi = {10.1007/S10623-017-0358-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SilbersteinZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/StinsonW18, author = {Douglas R. Stinson and Ruizhong Wei}, title = {Combinatorial repairability for threshold schemes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {195--210}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0336-6}, doi = {10.1007/S10623-017-0336-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/StinsonW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SuYF18, author = {Wei Su and Yang Yang and Cuiling Fan}, title = {New optimal binary sequences with period 4p via interleaving Ding-Helleseth-Lam sequences}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1329--1338}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0398-5}, doi = {10.1007/S10623-017-0398-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SuYF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SudhaS18, author = {Irrinki Gnana Sudha and R. S. Selvaraj}, title = {Codes with a pomset metric and constructions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {875--892}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0367-z}, doi = {10.1007/S10623-017-0367-Z}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SudhaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SunCW18, author = {Ling Sun and Huaifeng Chen and Meiqin Wang}, title = {Zero-correlation attacks: statistical models independent of the number of approximations}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1923--1945}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0430-9}, doi = {10.1007/S10623-017-0430-9}, timestamp = {Tue, 07 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/SunCW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Tan18, author = {Ming Ming Tan}, title = {Group invariant weighing matrices}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2677--2702}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0466-5}, doi = {10.1007/S10623-018-0466-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Tan18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TianLWY18, author = {Song Tian and Bao Li and Kunpeng Wang and Wei Yu}, title = {Cover attacks for elliptic curves with cofactor two}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2451--2468}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0457-6}, doi = {10.1007/S10623-018-0457-6}, timestamp = {Thu, 08 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TianLWY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Torres-JimenezI18, author = {Jose Torres{-}Jimenez and Idelfonso Izquierdo{-}Marquez}, title = {Covering arrays of strength three from extended permutation vectors}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2629--2643}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0465-6}, doi = {10.1007/S10623-018-0465-6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Torres-JimenezI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Trung18, author = {Tran van Trung}, title = {A recursive construction for simple t-designs using resolutions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1185--1200}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0389-6}, doi = {10.1007/S10623-017-0389-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Trung18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Vega18, author = {Gerardo Vega}, title = {A correction on the determination of the weight enumerator polynomial of some irreducible cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {835--840}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0364-2}, doi = {10.1007/S10623-017-0364-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Vega18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangHL18, author = {SenPeng Wang and Bin Hu and Yan Liu}, title = {The autocorrelation properties of single cycle polynomial T-functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1527--1540}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0410-0}, doi = {10.1007/S10623-017-0410-0}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangJ18, author = {Qian Wang and Chenhui Jin}, title = {Upper bound of the length of truncated impossible differentials for {AES}}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1541--1552}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0411-z}, doi = {10.1007/S10623-017-0411-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangTP18, author = {Qichun Wang and Chik How Tan and Theo Fanuela Prabowo}, title = {On the covering radius of the third order Reed-Muller code RM(3, 7)}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {151--159}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0329-5}, doi = {10.1007/S10623-017-0329-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangTP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WatanabeS18, author = {Yohei Watanabe and Junji Shikata}, title = {Timed-release computational secret sharing and threshold encryption}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {1}, pages = {17--54}, year = {2018}, url = {https://doi.org/10.1007/s10623-016-0324-2}, doi = {10.1007/S10623-016-0324-2}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WatanabeS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WenLH18, author = {Yunhua Wen and Shengli Liu and Shuai Han}, title = {Reusable fuzzy extractor from the decisional Diffie-Hellman assumption}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2495--2512}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0459-4}, doi = {10.1007/S10623-018-0459-4}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WenLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WenYFF18, author = {Jiejing Wen and Minghui Yang and Fang{-}Wei Fu and Keqin Feng}, title = {Cyclotomic construction of strong external difference families in finite fields}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1149--1159}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0384-y}, doi = {10.1007/S10623-017-0384-Y}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WenYFF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/X18, title = {Editor's note}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {447}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0467-4}, doi = {10.1007/S10623-018-0467-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/X18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XiaoZLH18, author = {Zibi Xiao and Xiangyong Zeng and Chunlei Li and Tor Helleseth}, title = {New generalized cyclotomic binary sequences of period p\({}^{\mbox{2}}\)}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {7}, pages = {1483--1497}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0408-7}, doi = {10.1007/S10623-017-0408-7}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/XiaoZLH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XiongYY18, author = {Maosheng Xiong and Haode Yan and Pingzhi Yuan}, title = {On a conjecture of differentially 8-uniform power functions}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1601--1621}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0416-7}, doi = {10.1007/S10623-017-0416-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XiongYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuLZH18, author = {Xiaofang Xu and Chunlei Li and Xiangyong Zeng and Tor Helleseth}, title = {Constructions of complete permutation polynomials}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2869--2892}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0480-7}, doi = {10.1007/S10623-018-0480-7}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/XuLZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XuSHHP18, author = {Jun Xu and Santanu Sarkar and Lei Hu and Zhangjie Huang and Liqiang Peng}, title = {Solving a class of modular polynomial equations and its relation to modular inversion hidden number problem and inversive congruential generator}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1997--2033}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0435-4}, doi = {10.1007/S10623-017-0435-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XuSHHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YoshidaO18, author = {Maki Yoshida and Satoshi Obana}, title = {On the (in)efficiency of non-interactive secure multiparty computation}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1793--1805}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0424-7}, doi = {10.1007/S10623-017-0424-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YoshidaO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhanZ18, author = {Xiaoqin Zhan and Shenglin Zhou}, title = {Non-symmetric 2-designs admitting a two-dimensional projective linear group}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2765--2773}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0474-5}, doi = {10.1007/S10623-018-0474-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhanZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangCGGM18, author = {Jie Zhang and Jie Chen and Junqing Gong and Aijun Ge and Chuangui Ma}, title = {Leakage-resilient attribute based encryption in prime-order groups via predicate encodings}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {6}, pages = {1339--1366}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0399-4}, doi = {10.1007/S10623-017-0399-4}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangCGGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangG18, author = {Tao Zhang and Gennian Ge}, title = {Combinatorial constructions of packings in Grassmannian spaces}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {4}, pages = {803--815}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0362-4}, doi = {10.1007/S10623-017-0362-4}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangYS18, author = {Hui Zhang and Eitan Yaakobi and Natalia Silberstein}, title = {Multiset combinatorial batch codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2645--2660}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0468-3}, doi = {10.1007/S10623-018-0468-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangYS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhangZ18, author = {Zhilin Zhang and Shenglin Zhou}, title = {Flag-transitive point-quasiprimitive 2-(v, k, 2) designs}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {9}, pages = {1963--1971}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0432-7}, doi = {10.1007/S10623-017-0432-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhangZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhaoTQ18, author = {Xiao{-}Xin Zhao and Tian Tian and Wen{-}Feng Qi}, title = {A ring-like cascade connection and a class of NFSRs with the same cycle structures}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {12}, pages = {2775--2790}, year = {2018}, url = {https://doi.org/10.1007/s10623-018-0473-6}, doi = {10.1007/S10623-018-0473-6}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhaoTQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhengB18, author = {Dabin Zheng and Jingjun Bao}, title = {Four classes of linear codes from cyclotomic cosets}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {5}, pages = {1007--1022}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0374-0}, doi = {10.1007/S10623-017-0374-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhengB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Zhou18, author = {Zhengchun Zhou}, title = {Three-weight ternary linear codes from a family of cyclic difference sets}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {11}, pages = {2513--2523}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0454-1}, doi = {10.1007/S10623-017-0454-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Zhou18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhuSL18, author = {Shixin Zhu and Zhonghua Sun and Ping Li}, title = {A class of negacyclic {BCH} codes and its application to quantum codes}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {10}, pages = {2139--2165}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0441-6}, doi = {10.1007/S10623-017-0441-6}, timestamp = {Wed, 11 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhuSL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AbdollahiDJ17, author = {Alireza Abdollahi and Edwin R. van Dam and Mojtaba Jazaeri}, title = {Distance-regular Cayley graphs with least eigenvalue -2}, journal = {Des. Codes Cryptogr.}, volume = {84}, number = {1-2}, pages = {73--85}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0209-4}, doi = {10.1007/S10623-016-0209-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AbdollahiDJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AgugliaG17, author = {Angela Aguglia and Luca Giuzzi}, title = {Intersection sets, three-character multisets and associated codes}, journal = {Des. Codes Cryptogr.}, volume = {83}, number = {2}, pages = {269--282}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0302-8}, doi = {10.1007/S10623-016-0302-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AgugliaG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AhnKL17, author = {Jaehyun Ahn and Dongseok Ka and Chengju Li}, title = {Complete weight enumerators of a class of linear codes}, journal = {Des. Codes Cryptogr.}, volume = {83}, number = {1}, pages = {83--99}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0205-8}, doi = {10.1007/S10623-016-0205-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AhnKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlamelouBCG17, author = {Quentin Alam{\'{e}}lou and Olivier Blazy and St{\'{e}}phane Cauchie and Philippe Gaborit}, title = {A code-based group signature scheme}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {1-2}, pages = {469--493}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0276-6}, doi = {10.1007/S10623-016-0276-6}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AlamelouBCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlhakimN17, author = {Abbas Alhakim and Maher Nouiehed}, title = {Stretching de Bruijn sequences}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {381--394}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0314-4}, doi = {10.1007/S10623-016-0314-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlhakimN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.