Search dblp for Publications

export results for "toc:db/journals/dcc/dcc6.bht:"

 download as .bib file

@article{DBLP:journals/dcc/Bours95,
  author       = {Patrick A. H. Bours},
  title        = {On the Construction of Perfect Deletion-Correcting Codes Using Design
                  Theory},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {5--20},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01390767},
  doi          = {10.1007/BF01390767},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Bours95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CalderbankS95,
  author       = {A. Robert Calderbank and
                  Neil J. A. Sloane},
  title        = {Modular and p-adic Cyclic Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {21--35},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01390768},
  doi          = {10.1007/BF01390768},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CalderbankS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DeyH95,
  author       = {P. Dey and
                  John L. Hayden},
  title        = {On Symmetric Incidence Matrices of Projective Planes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {179--188},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01388473},
  doi          = {10.1007/BF01388473},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DeyH95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Dijk95,
  author       = {Marten van Dijk},
  title        = {On the Information Rate of Perfect Secret Sharing Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {143--169},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01398012},
  doi          = {10.1007/BF01398012},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Dijk95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Gibson95,
  author       = {J. K. Gibson},
  title        = {Severely Denting the Gabidulin Version of the McEliece Public Key
                  Cryptosystem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {37--45},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01390769},
  doi          = {10.1007/BF01390769},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Gibson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GlynnH95,
  author       = {David G. Glynn and
                  J. W. P. Hirschfeld},
  title        = {On the Classification of Geometric Codes by Polynomial Functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {189--204},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01388474},
  doi          = {10.1007/BF01388474},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GlynnH95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HaradaK95,
  author       = {Masaaki Harada and
                  Hiroshi Kimura},
  title        = {New Extremal Doubly-Even [64, 32, 12] Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {91--96},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01398007},
  doi          = {10.1007/BF01398007},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HaradaK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuffmanT95,
  author       = {W. Cary Huffman and
                  Vladimir D. Tonchev},
  title        = {The Existence of Extremal Self-Dual [50, 25, 10] Codes and Quasi-Symmetric
                  2-(49, 9, 6) Designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {97--106},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01398008},
  doi          = {10.1007/BF01398008},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuffmanT95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HurlbertI95,
  author       = {Glenn Hurlbert and
                  Garth Isaak},
  title        = {New Constructions for De Bruijn Tori},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {47--56},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01390770},
  doi          = {10.1007/BF01390770},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HurlbertI95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Johansson95,
  author       = {Thomas Johansson},
  title        = {Authentication Codes for Nontrusting Parties Obtained from Rank Metric
                  Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {205--218},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01388475},
  doi          = {10.1007/BF01388475},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Johansson95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KleinLV95,
  author       = {Yaron Klein and
                  Simon Litsyn and
                  Alexander Vardy},
  title        = {Two New Bounds on the Size of Binary Codes with a Minimum Distance
                  of Three},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {219--227},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01388476},
  doi          = {10.1007/BF01388476},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KleinLV95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MaS95,
  author       = {Siu Lun Ma and
                  Bernhard Schmidt},
  title        = {On (p\({}^{\mbox{a}}\), p, p\({}^{\mbox{a}}\), p\({}^{\mbox{a-1}}\))-Relative
                  Difference Sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {57--71},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01390771},
  doi          = {10.1007/BF01390771},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MaS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MartinZ95,
  author       = {William J. Martin and
                  X. J. Zhu},
  title        = {Anticodes for the Grassman and Bilinear Forms Graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {1},
  pages        = {73--79},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01390772},
  doi          = {10.1007/BF01390772},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MartinZ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Meyn95,
  author       = {Helmut Meyn},
  title        = {Explicit N-Polynomials of 2-Power Degree over Finite Fields, {I}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {107--116},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01398009},
  doi          = {10.1007/BF01398009},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Meyn95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PenttilaR95,
  author       = {Tim Penttila and
                  Gordon F. Royle},
  title        = {Sets of Type (m, n) in the Affine and Projective Planes of Order Nine},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {229--245},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01388477},
  doi          = {10.1007/BF01388477},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PenttilaR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PhelpsL95,
  author       = {Kevin T. Phelps and
                  Mike LeVan},
  title        = {Kernels of Nonlinear Hamming Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {3},
  pages        = {247--257},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01388478},
  doi          = {10.1007/BF01388478},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PhelpsL95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ScheidlerW95,
  author       = {Renate Scheidler and
                  Hugh C. Williams},
  title        = {A Public-Key Cryptosystem Utilizing Cyclotomic Fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {117--131},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01398010},
  doi          = {10.1007/BF01398010},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ScheidlerW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShalabyY95,
  author       = {Nabil Shalaby and
                  Jianxing Yin},
  title        = {Directed Packings with Block Size 5 and Even v},
  journal      = {Des. Codes Cryptogr.},
  volume       = {6},
  number       = {2},
  pages        = {133--142},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF01398011},
  doi          = {10.1007/BF01398011},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShalabyY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics