Search dblp for Publications

export results for "toc:db/journals/dcc/dcc80.bht:"

 download as .bib file

@article{DBLP:journals/dcc/AlahmadiAHHMS16,
  author       = {Adel Alahmadi and
                  Hussain Alhazmi and
                  Tor Helleseth and
                  Rola Hijazi and
                  Najat M. Muthana and
                  Patrick Sol{\'{e}}},
  title        = {On the lifted Zetterberg code},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {561--576},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0118-y},
  doi          = {10.1007/S10623-015-0118-Y},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlahmadiAHHMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ballico16,
  author       = {Edoardo Ballico},
  title        = {Non-special subsets of the set of points of a curve defined over a
                  finite field},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {453--457},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0112-4},
  doi          = {10.1007/S10623-015-0112-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ballico16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BarwickJ16,
  author       = {Susan G. Barwick and
                  Wen{-}Ai Jackson},
  title        = {Characterising pointsets in PG(4, q) that correspond to conics},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {2},
  pages        = {317--332},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0093-3},
  doi          = {10.1007/S10623-015-0093-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BarwickJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BayramOS16,
  author       = {Aysegul Bayram and
                  Elif Segah Oztas and
                  Irfan Siap},
  title        = {Codes over F\({}_{\mbox{4}}\)+vF\({}_{\mbox{4}}\) and some {DNA} applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {2},
  pages        = {379--393},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0100-8},
  doi          = {10.1007/S10623-015-0100-8},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BayramOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CandauGH16,
  author       = {Marion Candau and
                  Roland Gautier and
                  Johannes Huisman},
  title        = {Convolutional block codes with cryptographic properties over the semi-direct
                  product {\(\mathbb{Z}\)}/N{\(\mathbb{Z}\)} {\(\rtimes\)} {\(\mathbb{Z}\)}/M{\(\mathbb{Z}\)}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {2},
  pages        = {395--407},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0101-7},
  doi          = {10.1007/S10623-015-0101-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CandauGH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Chen16,
  author       = {Eric Zhi Chen},
  title        = {New binary h-generator quasi-cyclic codes by augmentation and new
                  minimum distance bounds},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {1},
  pages        = {1--10},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0059-5},
  doi          = {10.1007/S10623-015-0059-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Chen16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenNV16,
  author       = {Yanling Chen and
                  Markku Niemenmaa and
                  A. J. Han Vinck},
  title        = {A general check digit system based on finite groups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {1},
  pages        = {149--163},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0072-8},
  doi          = {10.1007/S10623-015-0072-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenNV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DavydovFGMP16,
  author       = {Alexander A. Davydov and
                  Giorgio Faina and
                  Massimo Giulietti and
                  Stefano Marcugini and
                  Fernanda Pambianco},
  title        = {On constructions and parameters of symmetric configurations v\({}_{\mbox{k}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {1},
  pages        = {125--147},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0070-x},
  doi          = {10.1007/S10623-015-0070-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DavydovFGMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DorozHS16,
  author       = {Yarkin Dor{\"{o}}z and
                  Yin Hu and
                  Berk Sunar},
  title        = {Homomorphic {AES} evaluation using the modified {LTV} scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {2},
  pages        = {333--358},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0095-1},
  doi          = {10.1007/S10623-015-0095-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DorozHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DuttaRA16,
  author       = {Sabyasachi Dutta and
                  Raghvendra Singh Rohit and
                  Avishek Adhikari},
  title        = {Constructions and analysis of some efficient t - (k, n)\({}^{\mbox{{\({_\ast}\)}}}\)-visual
                  cryptographic schemes using linear algebraic techniques},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {1},
  pages        = {165--196},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0075-5},
  doi          = {10.1007/S10623-015-0075-5},
  timestamp    = {Thu, 25 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/DuttaRA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GongCTC16,
  author       = {Junqing Gong and
                  Zhenfu Cao and
                  Shaohua Tang and
                  Jie Chen},
  title        = {Extended dual system group and shorter unbounded hierarchical identity
                  based encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {525--559},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0117-z},
  doi          = {10.1007/S10623-015-0117-Z},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GongCTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuoJNS16,
  author       = {Jian Guo and
                  J{\'{e}}r{\'{e}}my Jean and
                  Ivica Nikolic and
                  Yu Sasaki},
  title        = {Extended meet-in-the-middle attacks on some Feistel constructions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {587--618},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0120-4},
  doi          = {10.1007/S10623-015-0120-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuoJNS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuoSM16,
  author       = {Fuchun Guo and
                  Willy Susilo and
                  Yi Mu},
  title        = {Generalized closest substring encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {1},
  pages        = {103--124},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0068-4},
  doi          = {10.1007/S10623-015-0068-4},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuoSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Hachenberger16,
  author       = {Dirk Hachenberger},
  title        = {Asymptotic existence results for primitive completely normal elements
                  in extensions of Galois fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {577--586},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0119-x},
  doi          = {10.1007/S10623-015-0119-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Hachenberger16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HofheinzJ16,
  author       = {Dennis Hofheinz and
                  Tibor Jager},
  title        = {Tightly secure signatures and public-key encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {1},
  pages        = {29--61},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0062-x},
  doi          = {10.1007/S10623-015-0062-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HofheinzJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HouOZ16,
  author       = {Xiang{-}dong Hou and
                  Ferruh {\"{O}}zbudak and
                  Yue Zhou},
  title        = {Switchings of semifield multiplications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {2},
  pages        = {217--239},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0081-7},
  doi          = {10.1007/S10623-015-0081-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HouOZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JedwabW16,
  author       = {Jonathan Jedwab and
                  Amy Wiebe},
  title        = {Constructions of complex equiangular lines from mutually unbiased
                  bases},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {1},
  pages        = {73--89},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0064-8},
  doi          = {10.1007/S10623-015-0064-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JedwabW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Krotov16,
  author       = {Denis S. Krotov},
  title        = {Perfect codes in Doob graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {1},
  pages        = {91--102},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0066-6},
  doi          = {10.1007/S10623-015-0066-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Krotov16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ku-CauichM16,
  author       = {Juan Carlos Ku{-}Cauich and
                  Guillermo Morales{-}Luna},
  title        = {Authentication codes based on resilient Boolean maps},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {619--633},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0121-3},
  doi          = {10.1007/S10623-015-0121-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ku-CauichM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeGrowPP16,
  author       = {Jason T. LeGrow and
                  David A. Pike and
                  Jonathan Poulin},
  title        = {Hamiltonicity and cycle extensions in 0-block-intersection graphs
                  of balanced incomplete block designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {421--433},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0110-6},
  doi          = {10.1007/S10623-015-0110-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeGrowPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeH16,
  author       = {Ga Won Lee and
                  Jin Hong},
  title        = {Comparison of perfect table cryptanalytic tradeoff algorithms},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {473--523},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0116-0},
  doi          = {10.1007/S10623-015-0116-0},
  timestamp    = {Wed, 18 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiJ16,
  author       = {Rongjia Li and
                  Chenhui Jin},
  title        = {Meet-in-the-middle attacks on 10-round {AES-256}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {459--471},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0113-3},
  doi          = {10.1007/S10623-015-0113-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiYF16,
  author       = {Chengju Li and
                  Qin Yue and
                  Fang{-}Wei Fu},
  title        = {Complete weight enumerators of some cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {2},
  pages        = {295--315},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0091-5},
  doi          = {10.1007/S10623-015-0091-5},
  timestamp    = {Wed, 03 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiYF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Londahl0SAA16,
  author       = {Carl L{\"{o}}ndahl and
                  Thomas Johansson and
                  Masoumeh Koochak Shooshtari and
                  Mahmoud Ahmadian{-}Attari and
                  Mohammad Reza Aref},
  title        = {Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic
                  codes of even dimension},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {2},
  pages        = {359--377},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0099-x},
  doi          = {10.1007/S10623-015-0099-X},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/Londahl0SAA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MoreiraFK16,
  author       = {Jos{\'{e}} Moreira and
                  Marcel Fern{\'{a}}ndez and
                  Grigory Kabatiansky},
  title        = {Almost separating and almost secure frameproof codes over q-ary alphabets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {1},
  pages        = {11--28},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0060-z},
  doi          = {10.1007/S10623-015-0060-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MoreiraFK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NowakO16,
  author       = {Kathleen Nowak and
                  Oktay {\"{O}}lmez},
  title        = {Partial geometric designs with prescribed automorphisms},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {435--451},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0111-5},
  doi          = {10.1007/S10623-015-0111-5},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NowakO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ott16,
  author       = {Udo Ott},
  title        = {On Jacobi sums, difference sets and partial difference sets in Galois
                  domains},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {2},
  pages        = {241--281},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0082-6},
  doi          = {10.1007/S10623-015-0082-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ott16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Ravagnani16,
  author       = {Alberto Ravagnani},
  title        = {Rank-metric codes and their duality theory},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {1},
  pages        = {197--216},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0077-3},
  doi          = {10.1007/S10623-015-0077-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Ravagnani16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SchmidtW16,
  author       = {Kai{-}Uwe Schmidt and
                  J{\"{u}}rgen Willms},
  title        = {Barker sequences of odd length},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {2},
  pages        = {409--414},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0104-4},
  doi          = {10.1007/S10623-015-0104-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SchmidtW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Sheekey16,
  author       = {John Sheekey},
  title        = {Dimensional dual hyperovals in classical polar spaces},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {2},
  pages        = {415--420},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0105-3},
  doi          = {10.1007/S10623-015-0105-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Sheekey16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Shparlinski16,
  author       = {Igor E. Shparlinski},
  title        = {On small gaps between the elements of multiplicative subgroups of
                  finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {1},
  pages        = {63--71},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0063-9},
  doi          = {10.1007/S10623-015-0063-9},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Shparlinski16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/StonesSLWL16,
  author       = {Rebecca J. Stones and
                  Ming Su and
                  Xiaoguang Liu and
                  Gang Wang and
                  Sheng Lin},
  title        = {A Latin square autotopism secret sharing scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {3},
  pages        = {635--650},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0123-1},
  doi          = {10.1007/S10623-015-0123-1},
  timestamp    = {Tue, 21 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/StonesSLWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YamadaM16,
  author       = {Kohei Yamada and
                  Nobuko Miyamoto},
  title        = {A construction and decomposition of orthogonal arrays with non-prime-power
                  numbers of symbols on the complement of a Baer subplane},
  journal      = {Des. Codes Cryptogr.},
  volume       = {80},
  number       = {2},
  pages        = {283--294},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0086-2},
  doi          = {10.1007/S10623-015-0086-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YamadaM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}