Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc39.bht:"
@article{DBLP:journals/dcc/AgugliaG06, author = {Angela Aguglia and Massimo Giulietti}, title = {Blocking Sets of Certain Line Sets Related to a Conic}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {3}, pages = {397--405}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6131-9}, doi = {10.1007/S10623-005-6131-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AgugliaG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AlyW06, author = {Hassan Aly and Arne Winterhof}, title = {On the Linear Complexity Profile of Nonlinear Congruential Pseudorandom Number Generators with Dickson Polynomials}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {155--162}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-3190-x}, doi = {10.1007/S10623-005-3190-X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlyW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AvgustinovichHS06, author = {Sergey V. Avgustinovich and Olof Heden and Faina I. Solov'eva}, title = {On Intersection Problem for Perfect Binary Codes}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {3}, pages = {317--322}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-4982-8}, doi = {10.1007/S10623-005-4982-8}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AvgustinovichHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BarretoV06, author = {Paulo S. L. M. Barreto and Jos{\'{e}} Felipe Voloch}, title = {Efficient Computation of Roots in Finite Fields}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {275--280}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-4017-5}, doi = {10.1007/S10623-005-4017-5}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BarretoV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeuleS06, author = {Jan De Beule and Leo Storme}, title = {Blocking All Generators of Q+(2n + 1, 3), n {\(\geq\)} 4}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {3}, pages = {323--333}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-5034-0}, doi = {10.1007/S10623-005-5034-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeuleS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bini06, author = {Gilberto Bini}, title = {A-Codes from Rational Functions over Galois Rings}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {207--214}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-3297-0}, doi = {10.1007/S10623-005-3297-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Bini06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Chang06, author = {Jen{-}Chun Chang}, title = {New Algorithms of Distance-Increasing Mappings from Binary Vectors to Permutations by Swaps}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {3}, pages = {335--345}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-5246-3}, doi = {10.1007/S10623-005-5246-3}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Chang06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenW06, author = {Kejun Chen and Ruizhong Wei}, title = {Super-simple (\emph{nu}, 5, 5) Designs}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {173--187}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-3256-9}, doi = {10.1007/S10623-005-3256-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CietJLM06, author = {Mathieu Ciet and Marc Joye and Kristin E. Lauter and Peter L. Montgomery}, title = {Trading Inversions for Multiplications in Elliptic Curve Cryptography}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {189--206}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-3299-y}, doi = {10.1007/S10623-005-3299-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CietJLM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CossidenteS06, author = {Antonio Cossidente and Alessandro Siciliano}, title = {The Automorphism Group of Plane Algebraic Curves with Singer Automorphisms}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {1}, pages = {33--37}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-2153-6}, doi = {10.1007/S10623-005-2153-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CossidenteS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Crnkovic06, author = {Dean Crnkovic}, title = {A Series of Regular Hadamard Matrices}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {247--251}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-3634-3}, doi = {10.1007/S10623-005-3634-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Crnkovic06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Darafsheh06, author = {M. R. Darafsheh}, title = {Designs from the Group PSL2(q), q Even}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {3}, pages = {311--316}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-4926-3}, doi = {10.1007/S10623-005-4926-3}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Darafsheh06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DijkCGSD06, author = {Marten van Dijk and Dwaine E. Clarke and Blaise Gassend and G. Edward Suh and Srinivas Devadas}, title = {Speeding up Exponentiation using an Untrusted Computational Resource}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {253--273}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-3710-8}, doi = {10.1007/S10623-005-3710-8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DijkCGSD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DoughertyL06, author = {Steven T. Dougherty and San Ling}, title = {Cyclic Codes Over Z\({}_{\mbox{4}}\) of Even Length}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {127--153}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-2773-x}, doi = {10.1007/S10623-005-2773-X}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DoughertyL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DoughertyP06, author = {Steven T. Dougherty and Young Ho Park}, title = {Codes Over the \emph{p}-adic Integers}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {1}, pages = {65--80}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-2542-x}, doi = {10.1007/S10623-005-2542-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DoughertyP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dover06, author = {Jeremy Dover}, title = {Subregular Spreads of Hermitian Unitals}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {1}, pages = {5--15}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-2141-x}, doi = {10.1007/S10623-005-2141-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dover06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FengC06, author = {Tao Feng and Yanxun Chang}, title = {Existence of \emph{Z}-cyclic 3PTWh (\emph{p}) for any Prime \emph{p} congruent 1 (mod 4)}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {1}, pages = {39--49}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-2327-2}, doi = {10.1007/S10623-005-2327-2}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FengC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GarcianoHY06, author = {Agnes D. Garciano and Yutaka Hiramine and Takeo Yokonuma}, title = {On Relative Difference Sets in Dihedral Groups}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {1}, pages = {51--63}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-2399-z}, doi = {10.1007/S10623-005-2399-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GarcianoHY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Giudici06, author = {Michael Giudici}, title = {Codes with a Certain Weight-preserving Transitive Group of Automorphisms}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {163--172}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-3257-8}, doi = {10.1007/S10623-005-3257-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Giudici06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuneriO06, author = {Cem G{\"{u}}neri and Ferruh {\"{O}}zbudak}, title = {Improvements on Generalized Hamming Weights of Some Trace Codes}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {215--231}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-3394-0}, doi = {10.1007/S10623-005-3394-0}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GuneriO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HommaK06b, author = {Masaaki Homma and Seon Jeong Kim}, title = {The Two-Point Codes with the Designed Distance on a Hermitian Curve in Even Characteristic}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {3}, pages = {375--386}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-5471-9}, doi = {10.1007/S10623-005-5471-9}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HommaK06b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KhatirinejadL06, author = {Mahdad Khatirinejad and Petr Lisonek}, title = {Classification and Constructions of Complete Caps in Binary Spaces}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {1}, pages = {17--31}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-2140-y}, doi = {10.1007/S10623-005-2140-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KhatirinejadL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LisonekK06, author = {Petr Lisonek and Mahdad Khatirinejad}, title = {Erratum for "A Family of Complete Caps in PG(\emph{n}, 2)"}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {307}, year = {2006}, url = {https://doi.org/10.1007/s10623-006-7835-1}, doi = {10.1007/S10623-006-7835-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LisonekK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Luyckx06, author = {Deirdre Luyckx}, title = {A Geometric Construction of the Hyperbolic Fibrations Associated with a Flock, \emph{q} Even}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {281--288}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-4388-7}, doi = {10.1007/S10623-005-4388-7}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Luyckx06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Masucci06, author = {Barbara Masucci}, title = {Sharing Multiple Secrets: Models, Schemes and Analysis}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {1}, pages = {89--111}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-2761-1}, doi = {10.1007/S10623-005-2761-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Masucci06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OBrienF06, author = {Katie O'Brien and Patrick Fitzpatrick}, title = {Bounds on Codes Derived by Counting Components in Varshamov Graphs}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {3}, pages = {387--396}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-6118-6}, doi = {10.1007/S10623-005-6118-6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OBrienF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Piret06, author = {Gilles Piret}, title = {Luby-Rackoff Revisited: On the Use of Permutations as Inner Functions of a Feistel Scheme}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {233--245}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-3562-2}, doi = {10.1007/S10623-005-3562-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Piret06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Samuel06, author = {Maffre Samuel}, title = {A Weak Key Test for Braid Based Cryptography}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {3}, pages = {347--373}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-5382-9}, doi = {10.1007/S10623-005-5382-9}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Samuel06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShawG06, author = {Ron Shaw and Neil A. Gordon}, title = {The Polynomial Degree of the Grassmannian\emph{G}\({}_{\mbox{1, }}\)n, 2}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {2}, pages = {289--306}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-4524-4}, doi = {10.1007/S10623-005-4524-4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShawG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Shparlinski06, author = {Igor E. Shparlinski}, title = {On {RSA} Moduli with Prescribed Bit Patterns}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {1}, pages = {113--122}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-3137-2}, doi = {10.1007/S10623-005-3137-2}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Shparlinski06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WinterT06, author = {Stefaan De Winter and Koen Thas}, title = {Generalized Quadrangles with an Abelian Singer Group}, journal = {Des. Codes Cryptogr.}, volume = {39}, number = {1}, pages = {81--87}, year = {2006}, url = {https://doi.org/10.1007/s10623-005-2747-z}, doi = {10.1007/S10623-005-2747-Z}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WinterT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.