Search dblp for Publications

export results for "toc:db/journals/dcc/dcc70.bht:"

 download as .bib file

@article{DBLP:journals/dcc/AraujoDH14,
  author       = {Carlos A. Ara{\'{u}}jo and
                  Italo J. Dejter and
                  Peter Hor{\'{a}}k},
  title        = {A generalization of Lee codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {77--90},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9666-6},
  doi          = {10.1007/S10623-012-9666-6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AraujoDH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AugerCM14,
  author       = {David Auger and
                  G{\'{e}}rard D. Cohen and
                  Sihem Mesnager},
  title        = {Sphere coverings and identifying codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {3--7},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9638-x},
  doi          = {10.1007/S10623-012-9638-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AugerCM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BatoulGG14,
  author       = {Aicha Batoul and
                  Kenza Guenda and
                  T. Aaron Gulliver},
  title        = {On self-dual cyclic codes over finite chain rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {3},
  pages        = {347--358},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9696-0},
  doi          = {10.1007/S10623-012-9696-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BatoulGG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BernalS14,
  author       = {Jos{\'{e}} Joaqu{\'{\i}}n Bernal and
                  Juan Jacobo Sim{\'{o}}n},
  title        = {Information sets in abelian codes: defining sets and Groebner basis},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {175--188},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9735-x},
  doi          = {10.1007/S10623-012-9735-X},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BernalS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BogdanovR14,
  author       = {Andrey Bogdanov and
                  Vincent Rijmen},
  title        = {Linear hulls with correlation zero and linear cryptanalysis of block
                  ciphers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {3},
  pages        = {369--383},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9697-z},
  doi          = {10.1007/S10623-012-9697-Z},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BogdanovR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BorgesRZ14,
  author       = {Joaquim Borges and
                  Josep Rif{\`{a}} and
                  Victor A. Zinoviev},
  title        = {New families of completely regular codes and their corresponding distance
                  regular coset graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {139--148},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9713-3},
  doi          = {10.1007/S10623-012-9713-3},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BorgesRZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BorgesVZ14,
  author       = {Joaquim Borges and
                  Merc{\`{e}} Villanueva and
                  Victor A. Zinoviev},
  title        = {Editorial: 3rd International Castle Meeting on Coding Theory and Applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {1--2},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9775-2},
  doi          = {10.1007/S10623-012-9775-2},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BorgesVZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BoucherU14,
  author       = {Delphine Boucher and
                  Felix Ulmer},
  title        = {Linear codes using skew polynomials with automorphisms and derivations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {3},
  pages        = {405--431},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9704-4},
  doi          = {10.1007/S10623-012-9704-4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BoucherU14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bras-AmorosV14,
  author       = {Maria Bras{-}Amor{\'{o}}s and
                  Albert Vico{-}Oton},
  title        = {On the Geil-Matsumoto bound and the length of {AG} codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {117--125},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9703-5},
  doi          = {10.1007/S10623-012-9703-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Bras-AmorosV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChoiHK14,
  author       = {Soohak Choi and
                  Jong Yoon Hyun and
                  Hyun Kwang Kim},
  title        = {Local duality theorem for q-ary 1-perfect codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {3},
  pages        = {305--311},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9683-5},
  doi          = {10.1007/S10623-012-9683-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChoiHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CorbellaMP14,
  author       = {Irene Marquez Corbella and
                  Edgar Mart{\'{\i}}nez{-}Moro and
                  Ruud Pellikaan},
  title        = {On the unique representation of very strong algebraic geometry codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {215--230},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9758-3},
  doi          = {10.1007/S10623-012-9758-3},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CorbellaMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Feulner14,
  author       = {Thomas Feulner},
  title        = {Classification and nonexistence results for linear codes with prescribed
                  minimum distances},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {127--138},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9700-8},
  doi          = {10.1007/S10623-012-9700-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Feulner14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GalindoM14,
  author       = {Carlos Galindo and
                  Francisco Monserrat},
  title        = {Evaluation codes defined by finite families of plane valuations at
                  infinity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {189--213},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9738-7},
  doi          = {10.1007/S10623-012-9738-7},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GalindoM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GhinelliKM14,
  author       = {Dina Ghinelli and
                  Jennifer D. Key and
                  T. P. McDonough},
  title        = {Hulls of codes from incidence matrices of connected regular graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {35--54},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9635-0},
  doi          = {10.1007/S10623-012-9635-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GhinelliKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HaymakerK14,
  author       = {Kathryn Haymaker and
                  Christine A. Kelley},
  title        = {Geometric {WOM} codes and coding strategies for multilevel flash memories},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {91--104},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9681-7},
  doi          = {10.1007/S10623-012-9681-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HaymakerK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HerranzRS14,
  author       = {Javier Herranz and
                  Alexandre Ruiz and
                  Germ{\'{a}}n S{\'{a}}ez},
  title        = {Signcryption schemes with threshold unsigncryption, and applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {3},
  pages        = {323--345},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9688-0},
  doi          = {10.1007/S10623-012-9688-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HerranzRS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/IdeguchiTP14,
  author       = {Kota Ideguchi and
                  Elmar Tischhauser and
                  Bart Preneel},
  title        = {Internal differential collision attacks on the reduced-round Gr{\o}stl-0
                  hash function},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {3},
  pages        = {251--271},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9674-6},
  doi          = {10.1007/S10623-012-9674-6},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/IdeguchiTP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kampf14,
  author       = {Sabine Kampf},
  title        = {Bounds on collaborative decoding of interleaved Hermitian codes and
                  virtual extension},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {9--25},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9625-2},
  doi          = {10.1007/S10623-012-9625-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kampf14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KhanGHA14,
  author       = {Eraj Khan and
                  Ernst M. Gabidulin and
                  Bahram Honary and
                  Hassan Ahmed},
  title        = {Modified Niederreiter type of {GPT} cryptosystem based on reducible
                  rank codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {231--239},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9757-4},
  doi          = {10.1007/S10623-012-9757-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KhanGHA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeY14,
  author       = {Myung{-}Kyu Lee and
                  Kyeongcheol Yang},
  title        = {The exponent of a polarizing matrix constructed from the Kronecker
                  product},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {3},
  pages        = {313--322},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9689-z},
  doi          = {10.1007/S10623-012-9689-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MalevichW14,
  author       = {Anton Malevich and
                  Wolfgang Willems},
  title        = {On the classification of the extremal self-dual codes over small fields
                  with 2-transitive automorphism groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {69--76},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9655-9},
  doi          = {10.1007/S10623-012-9655-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MalevichW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OzbudakT14,
  author       = {Ferruh {\"{O}}zbudak and
                  Burcu G{\"{u}}lmez Temur},
  title        = {Finite number of fibre products of Kummer covers and curves with many
                  points over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {3},
  pages        = {385--404},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9706-2},
  doi          = {10.1007/S10623-012-9706-2},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/OzbudakT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PernasPV14,
  author       = {Jaume Pernas and
                  Jaume Pujol and
                  Merc{\`{e}} Villanueva},
  title        = {Characterization of the automorphism group of quaternary linear Hadamard
                  codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {105--115},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9678-2},
  doi          = {10.1007/S10623-012-9678-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PernasPV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PineroJ14,
  author       = {Fernando Pi{\~{n}}ero and
                  Heeralal Janwa},
  title        = {On the subfield subcodes of Hermitian codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {157--173},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9736-9},
  doi          = {10.1007/S10623-012-9736-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PineroJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PinhoPR14,
  author       = {Telma Pinho and
                  Raquel Pinto and
                  Paula Rocha},
  title        = {Realization of 2D convolutional codes of rate {\textdollar}{\textdollar}{\textbackslash}frac\{1\}\{n\}{\textdollar}{\textdollar}
                  by separable Roesser models},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {241--250},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9768-1},
  doi          = {10.1007/S10623-012-9768-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PinhoPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Seneviratne14,
  author       = {Padmapani Seneviratne},
  title        = {Codes associated with circulant graphs and permutation decoding},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {27--33},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9637-y},
  doi          = {10.1007/S10623-012-9637-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Seneviratne14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SidorenkoB14,
  author       = {Vladimir Sidorenko and
                  Martin Bossert},
  title        = {Fast skew-feedback shift-register synthesis},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {55--67},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9663-9},
  doi          = {10.1007/S10623-012-9663-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SidorenkoB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TomlinsonJTGA14,
  author       = {Martin Tomlinson and
                  Mubarak Jibril and
                  Cen Tjhai and
                  Markus Grassl and
                  Mohammed Zaki Ahmed},
  title        = {New binary codes from extended Goppa codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {1-2},
  pages        = {149--156},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9707-1},
  doi          = {10.1007/S10623-012-9707-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TomlinsonJTGA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Wu14,
  author       = {Junhua Wu},
  title        = {Proofs of two conjectures on the dimensions of binary codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {3},
  pages        = {273--304},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9682-6},
  doi          = {10.1007/S10623-012-9682-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Wu14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhengQT14,
  author       = {Qun{-}Xiong Zheng and
                  Wen{-}Feng Qi and
                  Tian Tian},
  title        = {On the distinctness of modular reductions of primitive sequences over
                  {Z/(232-1)}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {70},
  number       = {3},
  pages        = {359--368},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10623-012-9698-y},
  doi          = {10.1007/S10623-012-9698-Y},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhengQT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics