Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc49.bht:"
@article{DBLP:journals/dcc/BeuleMS08, author = {Jan De Beule and Klaus Metsch and Leo Storme}, title = {Characterization results on arbitrary non-weighted minihypers and on linear codes meeting the Griesmer bound}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {187--197}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9191-9}, doi = {10.1007/S10623-008-9191-9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeuleMS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeyK08, author = {Christian Bey and Gohar M. Kyureghyan}, title = {On Boolean functions with the sum of every two of them being bent}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {341--346}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9196-4}, doi = {10.1007/S10623-008-9196-4}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeyK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BrinkmannL08, author = {Marcus Brinkmann and Gregor Leander}, title = {On the classification of {APN} functions up to dimension five}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {273--288}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9194-6}, doi = {10.1007/S10623-008-9194-6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BrinkmannL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CharpinH08, author = {Pascale Charpin and Tor Helleseth}, title = {Editorial: In memory of Hans Dobbertin}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {1--2}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9186-6}, doi = {10.1007/S10623-008-9186-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CharpinH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChristopoulouGPT08, author = {Maria Christopoulou and Theodoulos Garefalakis and Daniel Panario and David Thomson}, title = {The trace of an optimal normal element and low complexity normal bases}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {199--215}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9195-5}, doi = {10.1007/S10623-008-9195-5}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChristopoulouGPT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CzapskiN08, author = {Mariusz Czapski and Maciej Nikodem}, title = {Error detection and error correction procedures for the advanced encryption standard}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {217--232}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9192-8}, doi = {10.1007/S10623-008-9192-8}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CzapskiN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DanevD08, author = {Danyo Danev and Stefan M. Dodunekov}, title = {A family of ternary quasi-perfect {BCH} codes}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {265--271}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9193-7}, doi = {10.1007/S10623-008-9193-7}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DanevD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DanielsenP08, author = {Lars Eirik Danielsen and Matthew Geoffrey Parker}, title = {Edge local complementation and equivalence of binary linear codes}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {161--170}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9190-x}, doi = {10.1007/S10623-008-9190-X}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DanielsenP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dillon08, author = {J. F. Dillon}, title = {More {DD} difference sets}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {23--32}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9188-4}, doi = {10.1007/S10623-008-9188-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dillon08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DobbertinL08, author = {Hans Dobbertin and Gregor Leander}, title = {Bent functions embedded into the recursive framework of {\(\mathbb{Z}\)}-bent functions}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {3--22}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9189-3}, doi = {10.1007/S10623-008-9189-3}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DobbertinL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FarashahiPS08, author = {Reza Rezaeian Farashahi and Ruud Pellikaan and Andrey Sidorenko}, title = {Extractors for binary elliptic curves}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {171--186}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9187-5}, doi = {10.1007/S10623-008-9187-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FarashahiPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FourquetT08, author = {Rafa{\"{e}}l Fourquet and C{\'{e}}dric Tavernier}, title = {An improved list decoding algorithm for the second order Reed-Muller codes and its applications}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {323--340}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9184-8}, doi = {10.1007/S10623-008-9184-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FourquetT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GabidulinP08, author = {Ernst M. Gabidulin and Nina I. Pilipchuk}, title = {Error and erasure correcting algorithms for rank codes}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {105--122}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9185-7}, doi = {10.1007/S10623-008-9185-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GabidulinP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GaraschukL08, author = {Kseniya Garaschuk and Petr Lisonek}, title = {On binary Kloosterman sums divisible by 3}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {347--357}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9171-0}, doi = {10.1007/S10623-008-9171-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GaraschukL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HoradamF08, author = {Kathy J. Horadam and David G. Farmer}, title = {Bundles, presemifields and nonlinear functions}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {79--94}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9172-z}, doi = {10.1007/S10623-008-9172-Z}, timestamp = {Fri, 20 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/HoradamF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KimS08, author = {Jon{-}Lark Kim and Patrick Sol{\'{e}}}, title = {Skew Hadamard designs and their codes}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {135--145}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9173-y}, doi = {10.1007/S10623-008-9173-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KimS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NiederreiterV08, author = {Harald Niederreiter and Ayineedi Venkateswarlu}, title = {Periodic multisequences with large error linear complexity}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {33--45}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9174-x}, doi = {10.1007/S10623-008-9174-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NiederreiterV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NojimaIKM08, author = {Ryo Nojima and Hideki Imai and Kazukuni Kobara and Kirill Morozov}, title = {Semantic security for the McEliece cryptosystem without random oracles}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {289--305}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9175-9}, doi = {10.1007/S10623-008-9175-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NojimaIKM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OzbudakS08, author = {Ferruh {\"{O}}zbudak and Z{\"{u}}lf{\"{u}}kar Saygi}, title = {Systematic authentication codes using additive polynomials}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {61--77}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9176-8}, doi = {10.1007/S10623-008-9176-8}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OzbudakS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PaulRM08, author = {Goutam Paul and Siddheshwar Rathi and Subhamoy Maitra}, title = {On non-negligible bias of the first output byte of {RC4} towards the first three bytes of the secret key}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {123--134}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9177-7}, doi = {10.1007/S10623-008-9177-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PaulRM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PetridesM08, author = {George Petrides and Johannes Mykkeltveit}, title = {Composition of recursions and nonlinear complexity of periodic binary sequences}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {251--264}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9178-6}, doi = {10.1007/S10623-008-9178-6}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PetridesM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/QianZLWZ08, author = {Haifeng Qian and Yuan Zhou and Zhibin Li and Zecheng Wang and Bing Zhang}, title = {Efficient public key encryption with smallest ciphertext expansion from factoring}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {233--249}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9179-5}, doi = {10.1007/S10623-008-9179-5}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/QianZLWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RaddumS08, author = {H{\aa}vard Raddum and Igor A. Semaev}, title = {Solving Multiple Right Hand Sides linear equations}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {147--160}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9180-z}, doi = {10.1007/S10623-008-9180-Z}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RaddumS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SarkarM08, author = {Sumanta Sarkar and Subhamoy Maitra}, title = {Idempotents in the neighbourhood of Patterson-Wiedemann functions having Walsh spectra zeros}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {95--103}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9181-y}, doi = {10.1007/S10623-008-9181-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SarkarM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Semaev08, author = {Igor A. Semaev}, title = {On solving sparse algebraic equations over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {47--60}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9182-x}, doi = {10.1007/S10623-008-9182-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Semaev08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SiqueiraC08, author = {Rog{\'{e}}rio M. Siqueira and Sueli I. Rodrigues Costa}, title = {Flat tori, lattices and bounds for commutative group codes}, journal = {Des. Codes Cryptogr.}, volume = {49}, number = {1-3}, pages = {307--321}, year = {2008}, url = {https://doi.org/10.1007/s10623-008-9183-9}, doi = {10.1007/S10623-008-9183-9}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/SiqueiraC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.