Search dblp for Publications

export results for "toc:db/journals/ccds/ccds2.bht:"

 download as .bib file

@article{DBLP:journals/ccds/ArasuG10,
  author       = {Krishnasamy Thiru Arasu and
                  Alex J. Gutman},
  title        = {Circulant weighing matrices},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {155--171},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0025-z},
  doi          = {10.1007/S12095-010-0025-Z},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/ArasuG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Armario10,
  author       = {Jos{\'{e}} Andr{\'{e}}s Armario},
  title        = {On an inequivalence criterion for cocyclic Hadamard matrices},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {247--259},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0024-0},
  doi          = {10.1007/S12095-010-0024-0},
  timestamp    = {Tue, 14 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/Armario10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BestK10,
  author       = {Darcy Best and
                  Hadi Kharaghani},
  title        = {Unbiased complex Hadamard matrices and bases},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {199--209},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0029-8},
  doi          = {10.1007/S12095-010-0029-8},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BestK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CanfieldGGMR10,
  author       = {E. Rodney Canfield and
                  Zhicheng Gao and
                  Catherine S. Greenhill and
                  Brendan D. McKay and
                  Robert W. Robinson},
  title        = {Asymptotic enumeration of correlation-immune boolean functions},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {1},
  pages        = {111--126},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0019-x},
  doi          = {10.1007/S12095-010-0019-X},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CanfieldGGMR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CathainS10,
  author       = {Padraig {\'{O}} Cath{\'{a}}in and
                  Richard M. Stafford},
  title        = {On twin prime power Hadamard matrices},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {261--269},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0030-2},
  doi          = {10.1007/S12095-010-0030-2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CathainS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Dillon10,
  author       = {J. F. Dillon},
  title        = {Some {REALLY} beautiful Hadamard matrices},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {271--292},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0031-1},
  doi          = {10.1007/S12095-010-0031-1},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Dillon10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/FlanneryH10,
  author       = {Dane L. Flannery and
                  Kathy J. Horadam},
  title        = {Guest editorial for the special issue on design theory},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {127--128},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0035-x},
  doi          = {10.1007/S12095-010-0035-X},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/FlanneryH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/GodeG10,
  author       = {Ruchi Gode and
                  Sugata Gangopadhyay},
  title        = {Third-order nonlinearities of a subclass of Kasami functions},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {1},
  pages        = {69--83},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-009-0017-z},
  doi          = {10.1007/S12095-009-0017-Z},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/GodeG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/HellesethK10,
  author       = {Tor Helleseth and
                  Alexander Kholosha},
  title        = {x\({}^{\mbox{2\({}^{\mbox{l}}\)+1}}\)+x+a and related affine polynomials
                  over {GF} (2\({}^{\mbox{\emph{k}}}\))},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {1},
  pages        = {85--109},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-009-0018-y},
  doi          = {10.1007/S12095-009-0018-Y},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/HellesethK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Horadam10,
  author       = {Kathy J. Horadam},
  title        = {Hadamard matrices and their applications: Progress 2007-2010},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {129--154},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0032-0},
  doi          = {10.1007/S12095-010-0032-0},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Horadam10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Huber10,
  author       = {Michael Huber},
  title        = {Combinatorial bounds and characterizations of splitting authentication
                  codes},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {173--185},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0020-4},
  doi          = {10.1007/S12095-010-0020-4},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Huber10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/JamingMM10,
  author       = {Philippe Jaming and
                  M{\'{a}}t{\'{e}} Matolcsi and
                  P{\'{e}}ter M{\'{o}}ra},
  title        = {The problem of mutually unbiased bases in dimension 6},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {211--220},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0023-1},
  doi          = {10.1007/S12095-010-0023-1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/JamingMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/KircanskiY10,
  author       = {Aleksandar Kircanski and
                  Amr M. Youssef},
  title        = {On the structural weakness of the {GGHN} stream cipher},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {1},
  pages        = {1--17},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-009-0013-3},
  doi          = {10.1007/S12095-009-0013-3},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/KircanskiY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/LauneyG10,
  author       = {Warwick de Launey and
                  Daniel M. Gordon},
  title        = {On the density of the set of known Hadamard orders},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {233--246},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0028-9},
  doi          = {10.1007/S12095-010-0028-9},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/LauneyG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/LauneyL10,
  author       = {Warwick de Launey and
                  David A. Levin},
  title        = {A Fourier-analytic approach to counting partial Hadamard matrices},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {307--334},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0033-z},
  doi          = {10.1007/S12095-010-0033-Z},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/LauneyL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/OstafeS10,
  author       = {Alina Ostafe and
                  Igor E. Shparlinski},
  title        = {Pseudorandom numbers and hash functions from iterations of multivariate
                  polynomials},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {1},
  pages        = {49--67},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-009-0016-0},
  doi          = {10.1007/S12095-009-0016-0},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/OstafeS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Pelto10,
  author       = {Mikko Pelto},
  title        = {New bounds for (\emph{r}, {\textless}= 2)-identifying codes in the
                  infinite king grid},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {1},
  pages        = {41--47},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-009-0015-1},
  doi          = {10.1007/S12095-009-0015-1},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Pelto10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/RaoDH10,
  author       = {Asha Rao and
                  Diane M. Donovan and
                  Joanne L. Hall},
  title        = {Mutually orthogonal Latin squares and mutually unbiased bases in dimensions
                  of odd prime power - {MOLS} and MUBs in odd prime power dimensions},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {221--231},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0027-x},
  doi          = {10.1007/S12095-010-0027-X},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/RaoDH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Rolland10,
  author       = {Robert Rolland},
  title        = {The second weight of generalized Reed-Muller codes in most cases},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {1},
  pages        = {19--40},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-009-0014-2},
  doi          = {10.1007/S12095-009-0014-2},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Rolland10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/SeberryM10,
  author       = {Jennifer Seberry and
                  Marilena Mitrouli},
  title        = {Some remarks on Hadamard matrices},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {293--306},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0036-9},
  doi          = {10.1007/S12095-010-0036-9},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/SeberryM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Szollosi10,
  author       = {Ferenc Sz{\"{o}}ll{\"{o}}si},
  title        = {Exotic complex Hadamard matrices and their equivalence},
  journal      = {Cryptogr. Commun.},
  volume       = {2},
  number       = {2},
  pages        = {187--198},
  year         = {2010},
  url          = {https://doi.org/10.1007/s12095-010-0021-3},
  doi          = {10.1007/S12095-010-0021-3},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Szollosi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics