Search dblp for Publications

export results for "toc:db/journals/dcc/dcc49.bht:"

 download as .bib file

@article{DBLP:journals/dcc/BeuleMS08,
  author       = {Jan De Beule and
                  Klaus Metsch and
                  Leo Storme},
  title        = {Characterization results on arbitrary non-weighted minihypers and
                  on linear codes meeting the Griesmer bound},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {187--197},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9191-9},
  doi          = {10.1007/S10623-008-9191-9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeuleMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeyK08,
  author       = {Christian Bey and
                  Gohar M. Kyureghyan},
  title        = {On Boolean functions with the sum of every two of them being bent},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {341--346},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9196-4},
  doi          = {10.1007/S10623-008-9196-4},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeyK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BrinkmannL08,
  author       = {Marcus Brinkmann and
                  Gregor Leander},
  title        = {On the classification of {APN} functions up to dimension five},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {273--288},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9194-6},
  doi          = {10.1007/S10623-008-9194-6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BrinkmannL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CharpinH08,
  author       = {Pascale Charpin and
                  Tor Helleseth},
  title        = {Editorial: In memory of Hans Dobbertin},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {1--2},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9186-6},
  doi          = {10.1007/S10623-008-9186-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CharpinH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChristopoulouGPT08,
  author       = {Maria Christopoulou and
                  Theodoulos Garefalakis and
                  Daniel Panario and
                  David Thomson},
  title        = {The trace of an optimal normal element and low complexity normal bases},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {199--215},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9195-5},
  doi          = {10.1007/S10623-008-9195-5},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChristopoulouGPT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CzapskiN08,
  author       = {Mariusz Czapski and
                  Maciej Nikodem},
  title        = {Error detection and error correction procedures for the advanced encryption
                  standard},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {217--232},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9192-8},
  doi          = {10.1007/S10623-008-9192-8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CzapskiN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DanevD08,
  author       = {Danyo Danev and
                  Stefan M. Dodunekov},
  title        = {A family of ternary quasi-perfect {BCH} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {265--271},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9193-7},
  doi          = {10.1007/S10623-008-9193-7},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DanevD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DanielsenP08,
  author       = {Lars Eirik Danielsen and
                  Matthew Geoffrey Parker},
  title        = {Edge local complementation and equivalence of binary linear codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {161--170},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9190-x},
  doi          = {10.1007/S10623-008-9190-X},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DanielsenP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dillon08,
  author       = {J. F. Dillon},
  title        = {More {DD} difference sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {23--32},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9188-4},
  doi          = {10.1007/S10623-008-9188-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dillon08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DobbertinL08,
  author       = {Hans Dobbertin and
                  Gregor Leander},
  title        = {Bent functions embedded into the recursive framework of {\(\mathbb{Z}\)}-bent
                  functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {3--22},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9189-3},
  doi          = {10.1007/S10623-008-9189-3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DobbertinL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FarashahiPS08,
  author       = {Reza Rezaeian Farashahi and
                  Ruud Pellikaan and
                  Andrey Sidorenko},
  title        = {Extractors for binary elliptic curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {171--186},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9187-5},
  doi          = {10.1007/S10623-008-9187-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FarashahiPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FourquetT08,
  author       = {Rafa{\"{e}}l Fourquet and
                  C{\'{e}}dric Tavernier},
  title        = {An improved list decoding algorithm for the second order Reed-Muller
                  codes and its applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {323--340},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9184-8},
  doi          = {10.1007/S10623-008-9184-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FourquetT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GabidulinP08,
  author       = {Ernst M. Gabidulin and
                  Nina I. Pilipchuk},
  title        = {Error and erasure correcting algorithms for rank codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {105--122},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9185-7},
  doi          = {10.1007/S10623-008-9185-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GabidulinP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GaraschukL08,
  author       = {Kseniya Garaschuk and
                  Petr Lisonek},
  title        = {On binary Kloosterman sums divisible by 3},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {347--357},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9171-0},
  doi          = {10.1007/S10623-008-9171-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GaraschukL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HoradamF08,
  author       = {Kathy J. Horadam and
                  David G. Farmer},
  title        = {Bundles, presemifields and nonlinear functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {79--94},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9172-z},
  doi          = {10.1007/S10623-008-9172-Z},
  timestamp    = {Fri, 20 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/HoradamF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KimS08,
  author       = {Jon{-}Lark Kim and
                  Patrick Sol{\'{e}}},
  title        = {Skew Hadamard designs and their codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {135--145},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9173-y},
  doi          = {10.1007/S10623-008-9173-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KimS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NiederreiterV08,
  author       = {Harald Niederreiter and
                  Ayineedi Venkateswarlu},
  title        = {Periodic multisequences with large error linear complexity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {33--45},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9174-x},
  doi          = {10.1007/S10623-008-9174-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NiederreiterV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NojimaIKM08,
  author       = {Ryo Nojima and
                  Hideki Imai and
                  Kazukuni Kobara and
                  Kirill Morozov},
  title        = {Semantic security for the McEliece cryptosystem without random oracles},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {289--305},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9175-9},
  doi          = {10.1007/S10623-008-9175-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NojimaIKM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OzbudakS08,
  author       = {Ferruh {\"{O}}zbudak and
                  Z{\"{u}}lf{\"{u}}kar Saygi},
  title        = {Systematic authentication codes using additive polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {61--77},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9176-8},
  doi          = {10.1007/S10623-008-9176-8},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OzbudakS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PaulRM08,
  author       = {Goutam Paul and
                  Siddheshwar Rathi and
                  Subhamoy Maitra},
  title        = {On non-negligible bias of the first output byte of {RC4} towards the
                  first three bytes of the secret key},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {123--134},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9177-7},
  doi          = {10.1007/S10623-008-9177-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PaulRM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PetridesM08,
  author       = {George Petrides and
                  Johannes Mykkeltveit},
  title        = {Composition of recursions and nonlinear complexity of periodic binary
                  sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {251--264},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9178-6},
  doi          = {10.1007/S10623-008-9178-6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PetridesM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/QianZLWZ08,
  author       = {Haifeng Qian and
                  Yuan Zhou and
                  Zhibin Li and
                  Zecheng Wang and
                  Bing Zhang},
  title        = {Efficient public key encryption with smallest ciphertext expansion
                  from factoring},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {233--249},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9179-5},
  doi          = {10.1007/S10623-008-9179-5},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/QianZLWZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RaddumS08,
  author       = {H{\aa}vard Raddum and
                  Igor A. Semaev},
  title        = {Solving Multiple Right Hand Sides linear equations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {147--160},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9180-z},
  doi          = {10.1007/S10623-008-9180-Z},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RaddumS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SarkarM08,
  author       = {Sumanta Sarkar and
                  Subhamoy Maitra},
  title        = {Idempotents in the neighbourhood of Patterson-Wiedemann functions
                  having Walsh spectra zeros},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {95--103},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9181-y},
  doi          = {10.1007/S10623-008-9181-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SarkarM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Semaev08,
  author       = {Igor A. Semaev},
  title        = {On solving sparse algebraic equations over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {47--60},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9182-x},
  doi          = {10.1007/S10623-008-9182-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Semaev08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SiqueiraC08,
  author       = {Rog{\'{e}}rio M. Siqueira and
                  Sueli I. Rodrigues Costa},
  title        = {Flat tori, lattices and bounds for commutative group codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {49},
  number       = {1-3},
  pages        = {307--321},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10623-008-9183-9},
  doi          = {10.1007/S10623-008-9183-9},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/SiqueiraC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics