default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc80.bht:"
@article{DBLP:journals/dcc/AlahmadiAHHMS16, author = {Adel Alahmadi and Hussain Alhazmi and Tor Helleseth and Rola Hijazi and Najat M. Muthana and Patrick Sol{\'{e}}}, title = {On the lifted Zetterberg code}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {561--576}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0118-y}, doi = {10.1007/S10623-015-0118-Y}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlahmadiAHHMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ballico16, author = {Edoardo Ballico}, title = {Non-special subsets of the set of points of a curve defined over a finite field}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {453--457}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0112-4}, doi = {10.1007/S10623-015-0112-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ballico16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BarwickJ16, author = {Susan G. Barwick and Wen{-}Ai Jackson}, title = {Characterising pointsets in PG(4, q) that correspond to conics}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {2}, pages = {317--332}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0093-3}, doi = {10.1007/S10623-015-0093-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BarwickJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BayramOS16, author = {Aysegul Bayram and Elif Segah Oztas and Irfan Siap}, title = {Codes over F\({}_{\mbox{4}}\)+vF\({}_{\mbox{4}}\) and some {DNA} applications}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {2}, pages = {379--393}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0100-8}, doi = {10.1007/S10623-015-0100-8}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BayramOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CandauGH16, author = {Marion Candau and Roland Gautier and Johannes Huisman}, title = {Convolutional block codes with cryptographic properties over the semi-direct product {\(\mathbb{Z}\)}/N{\(\mathbb{Z}\)} {\(\rtimes\)} {\(\mathbb{Z}\)}/M{\(\mathbb{Z}\)}}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {2}, pages = {395--407}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0101-7}, doi = {10.1007/S10623-015-0101-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CandauGH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Chen16, author = {Eric Zhi Chen}, title = {New binary h-generator quasi-cyclic codes by augmentation and new minimum distance bounds}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {1}, pages = {1--10}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0059-5}, doi = {10.1007/S10623-015-0059-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Chen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenNV16, author = {Yanling Chen and Markku Niemenmaa and A. J. Han Vinck}, title = {A general check digit system based on finite groups}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {1}, pages = {149--163}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0072-8}, doi = {10.1007/S10623-015-0072-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenNV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DavydovFGMP16, author = {Alexander A. Davydov and Giorgio Faina and Massimo Giulietti and Stefano Marcugini and Fernanda Pambianco}, title = {On constructions and parameters of symmetric configurations v\({}_{\mbox{k}}\)}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {1}, pages = {125--147}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0070-x}, doi = {10.1007/S10623-015-0070-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DavydovFGMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DorozHS16, author = {Yarkin Dor{\"{o}}z and Yin Hu and Berk Sunar}, title = {Homomorphic {AES} evaluation using the modified {LTV} scheme}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {2}, pages = {333--358}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0095-1}, doi = {10.1007/S10623-015-0095-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DorozHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DuttaRA16, author = {Sabyasachi Dutta and Raghvendra Singh Rohit and Avishek Adhikari}, title = {Constructions and analysis of some efficient t - (k, n)\({}^{\mbox{{\({_\ast}\)}}}\)-visual cryptographic schemes using linear algebraic techniques}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {1}, pages = {165--196}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0075-5}, doi = {10.1007/S10623-015-0075-5}, timestamp = {Thu, 25 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/DuttaRA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GongCTC16, author = {Junqing Gong and Zhenfu Cao and Shaohua Tang and Jie Chen}, title = {Extended dual system group and shorter unbounded hierarchical identity based encryption}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {525--559}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0117-z}, doi = {10.1007/S10623-015-0117-Z}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GongCTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuoJNS16, author = {Jian Guo and J{\'{e}}r{\'{e}}my Jean and Ivica Nikolic and Yu Sasaki}, title = {Extended meet-in-the-middle attacks on some Feistel constructions}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {587--618}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0120-4}, doi = {10.1007/S10623-015-0120-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuoJNS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuoSM16, author = {Fuchun Guo and Willy Susilo and Yi Mu}, title = {Generalized closest substring encryption}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {1}, pages = {103--124}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0068-4}, doi = {10.1007/S10623-015-0068-4}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuoSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Hachenberger16, author = {Dirk Hachenberger}, title = {Asymptotic existence results for primitive completely normal elements in extensions of Galois fields}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {577--586}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0119-x}, doi = {10.1007/S10623-015-0119-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Hachenberger16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HofheinzJ16, author = {Dennis Hofheinz and Tibor Jager}, title = {Tightly secure signatures and public-key encryption}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {1}, pages = {29--61}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0062-x}, doi = {10.1007/S10623-015-0062-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HofheinzJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HouOZ16, author = {Xiang{-}dong Hou and Ferruh {\"{O}}zbudak and Yue Zhou}, title = {Switchings of semifield multiplications}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {2}, pages = {217--239}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0081-7}, doi = {10.1007/S10623-015-0081-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HouOZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JedwabW16, author = {Jonathan Jedwab and Amy Wiebe}, title = {Constructions of complex equiangular lines from mutually unbiased bases}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {1}, pages = {73--89}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0064-8}, doi = {10.1007/S10623-015-0064-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JedwabW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Krotov16, author = {Denis S. Krotov}, title = {Perfect codes in Doob graphs}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {1}, pages = {91--102}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0066-6}, doi = {10.1007/S10623-015-0066-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Krotov16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ku-CauichM16, author = {Juan Carlos Ku{-}Cauich and Guillermo Morales{-}Luna}, title = {Authentication codes based on resilient Boolean maps}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {619--633}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0121-3}, doi = {10.1007/S10623-015-0121-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ku-CauichM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeGrowPP16, author = {Jason T. LeGrow and David A. Pike and Jonathan Poulin}, title = {Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {421--433}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0110-6}, doi = {10.1007/S10623-015-0110-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeGrowPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeH16, author = {Ga Won Lee and Jin Hong}, title = {Comparison of perfect table cryptanalytic tradeoff algorithms}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {473--523}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0116-0}, doi = {10.1007/S10623-015-0116-0}, timestamp = {Wed, 18 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LeeH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiJ16, author = {Rongjia Li and Chenhui Jin}, title = {Meet-in-the-middle attacks on 10-round {AES-256}}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {459--471}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0113-3}, doi = {10.1007/S10623-015-0113-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiYF16, author = {Chengju Li and Qin Yue and Fang{-}Wei Fu}, title = {Complete weight enumerators of some cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {2}, pages = {295--315}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0091-5}, doi = {10.1007/S10623-015-0091-5}, timestamp = {Wed, 03 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiYF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Londahl0SAA16, author = {Carl L{\"{o}}ndahl and Thomas Johansson and Masoumeh Koochak Shooshtari and Mahmoud Ahmadian{-}Attari and Mohammad Reza Aref}, title = {Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {2}, pages = {359--377}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0099-x}, doi = {10.1007/S10623-015-0099-X}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/Londahl0SAA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MoreiraFK16, author = {Jos{\'{e}} Moreira and Marcel Fern{\'{a}}ndez and Grigory Kabatiansky}, title = {Almost separating and almost secure frameproof codes over q-ary alphabets}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {1}, pages = {11--28}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0060-z}, doi = {10.1007/S10623-015-0060-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MoreiraFK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NowakO16, author = {Kathleen Nowak and Oktay {\"{O}}lmez}, title = {Partial geometric designs with prescribed automorphisms}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {435--451}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0111-5}, doi = {10.1007/S10623-015-0111-5}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NowakO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ott16, author = {Udo Ott}, title = {On Jacobi sums, difference sets and partial difference sets in Galois domains}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {2}, pages = {241--281}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0082-6}, doi = {10.1007/S10623-015-0082-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ott16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ravagnani16, author = {Alberto Ravagnani}, title = {Rank-metric codes and their duality theory}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {1}, pages = {197--216}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0077-3}, doi = {10.1007/S10623-015-0077-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ravagnani16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SchmidtW16, author = {Kai{-}Uwe Schmidt and J{\"{u}}rgen Willms}, title = {Barker sequences of odd length}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {2}, pages = {409--414}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0104-4}, doi = {10.1007/S10623-015-0104-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SchmidtW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Sheekey16, author = {John Sheekey}, title = {Dimensional dual hyperovals in classical polar spaces}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {2}, pages = {415--420}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0105-3}, doi = {10.1007/S10623-015-0105-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Sheekey16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Shparlinski16, author = {Igor E. Shparlinski}, title = {On small gaps between the elements of multiplicative subgroups of finite fields}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {1}, pages = {63--71}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0063-9}, doi = {10.1007/S10623-015-0063-9}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Shparlinski16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/StonesSLWL16, author = {Rebecca J. Stones and Ming Su and Xiaoguang Liu and Gang Wang and Sheng Lin}, title = {A Latin square autotopism secret sharing scheme}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {3}, pages = {635--650}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0123-1}, doi = {10.1007/S10623-015-0123-1}, timestamp = {Tue, 21 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/StonesSLWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YamadaM16, author = {Kohei Yamada and Nobuko Miyamoto}, title = {A construction and decomposition of orthogonal arrays with non-prime-power numbers of symbols on the complement of a Baer subplane}, journal = {Des. Codes Cryptogr.}, volume = {80}, number = {2}, pages = {283--294}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0086-2}, doi = {10.1007/S10623-015-0086-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YamadaM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.