Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc6.bht:"
@article{DBLP:journals/dcc/Bours95, author = {Patrick A. H. Bours}, title = {On the Construction of Perfect Deletion-Correcting Codes Using Design Theory}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {1}, pages = {5--20}, year = {1995}, url = {https://doi.org/10.1007/BF01390767}, doi = {10.1007/BF01390767}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Bours95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CalderbankS95, author = {A. Robert Calderbank and Neil J. A. Sloane}, title = {Modular and p-adic Cyclic Codes}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {1}, pages = {21--35}, year = {1995}, url = {https://doi.org/10.1007/BF01390768}, doi = {10.1007/BF01390768}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CalderbankS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DeyH95, author = {P. Dey and John L. Hayden}, title = {On Symmetric Incidence Matrices of Projective Planes}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {3}, pages = {179--188}, year = {1995}, url = {https://doi.org/10.1007/BF01388473}, doi = {10.1007/BF01388473}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DeyH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Dijk95, author = {Marten van Dijk}, title = {On the Information Rate of Perfect Secret Sharing Schemes}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {2}, pages = {143--169}, year = {1995}, url = {https://doi.org/10.1007/BF01398012}, doi = {10.1007/BF01398012}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Dijk95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Gibson95, author = {J. K. Gibson}, title = {Severely Denting the Gabidulin Version of the McEliece Public Key Cryptosystem}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {1}, pages = {37--45}, year = {1995}, url = {https://doi.org/10.1007/BF01390769}, doi = {10.1007/BF01390769}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Gibson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GlynnH95, author = {David G. Glynn and J. W. P. Hirschfeld}, title = {On the Classification of Geometric Codes by Polynomial Functions}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {3}, pages = {189--204}, year = {1995}, url = {https://doi.org/10.1007/BF01388474}, doi = {10.1007/BF01388474}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GlynnH95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HaradaK95, author = {Masaaki Harada and Hiroshi Kimura}, title = {New Extremal Doubly-Even [64, 32, 12] Codes}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {2}, pages = {91--96}, year = {1995}, url = {https://doi.org/10.1007/BF01398007}, doi = {10.1007/BF01398007}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HaradaK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuffmanT95, author = {W. Cary Huffman and Vladimir D. Tonchev}, title = {The Existence of Extremal Self-Dual [50, 25, 10] Codes and Quasi-Symmetric 2-(49, 9, 6) Designs}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {2}, pages = {97--106}, year = {1995}, url = {https://doi.org/10.1007/BF01398008}, doi = {10.1007/BF01398008}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuffmanT95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HurlbertI95, author = {Glenn Hurlbert and Garth Isaak}, title = {New Constructions for De Bruijn Tori}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {1}, pages = {47--56}, year = {1995}, url = {https://doi.org/10.1007/BF01390770}, doi = {10.1007/BF01390770}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HurlbertI95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Johansson95, author = {Thomas Johansson}, title = {Authentication Codes for Nontrusting Parties Obtained from Rank Metric Codes}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {3}, pages = {205--218}, year = {1995}, url = {https://doi.org/10.1007/BF01388475}, doi = {10.1007/BF01388475}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Johansson95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KleinLV95, author = {Yaron Klein and Simon Litsyn and Alexander Vardy}, title = {Two New Bounds on the Size of Binary Codes with a Minimum Distance of Three}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {3}, pages = {219--227}, year = {1995}, url = {https://doi.org/10.1007/BF01388476}, doi = {10.1007/BF01388476}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KleinLV95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MaS95, author = {Siu Lun Ma and Bernhard Schmidt}, title = {On (p\({}^{\mbox{a}}\), p, p\({}^{\mbox{a}}\), p\({}^{\mbox{a-1}}\))-Relative Difference Sets}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {1}, pages = {57--71}, year = {1995}, url = {https://doi.org/10.1007/BF01390771}, doi = {10.1007/BF01390771}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MaS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MartinZ95, author = {William J. Martin and X. J. Zhu}, title = {Anticodes for the Grassman and Bilinear Forms Graphs}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {1}, pages = {73--79}, year = {1995}, url = {https://doi.org/10.1007/BF01390772}, doi = {10.1007/BF01390772}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MartinZ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Meyn95, author = {Helmut Meyn}, title = {Explicit N-Polynomials of 2-Power Degree over Finite Fields, {I}}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {2}, pages = {107--116}, year = {1995}, url = {https://doi.org/10.1007/BF01398009}, doi = {10.1007/BF01398009}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Meyn95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PenttilaR95, author = {Tim Penttila and Gordon F. Royle}, title = {Sets of Type (m, n) in the Affine and Projective Planes of Order Nine}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {3}, pages = {229--245}, year = {1995}, url = {https://doi.org/10.1007/BF01388477}, doi = {10.1007/BF01388477}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PenttilaR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PhelpsL95, author = {Kevin T. Phelps and Mike LeVan}, title = {Kernels of Nonlinear Hamming Codes}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {3}, pages = {247--257}, year = {1995}, url = {https://doi.org/10.1007/BF01388478}, doi = {10.1007/BF01388478}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PhelpsL95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ScheidlerW95, author = {Renate Scheidler and Hugh C. Williams}, title = {A Public-Key Cryptosystem Utilizing Cyclotomic Fields}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {2}, pages = {117--131}, year = {1995}, url = {https://doi.org/10.1007/BF01398010}, doi = {10.1007/BF01398010}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ScheidlerW95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShalabyY95, author = {Nabil Shalaby and Jianxing Yin}, title = {Directed Packings with Block Size 5 and Even v}, journal = {Des. Codes Cryptogr.}, volume = {6}, number = {2}, pages = {133--142}, year = {1995}, url = {https://doi.org/10.1007/BF01398011}, doi = {10.1007/BF01398011}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShalabyY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.