Search dblp for Publications

export results for "toc:db/journals/dcc/dcc78.bht:"

 download as .bib file

@article{DBLP:journals/dcc/BeuleDMR16,
  author       = {Jan De Beule and
                  Jeroen Demeyer and
                  Klaus Metsch and
                  Morgan Rodgers},
  title        = {A new family of tight sets in Q\({}^{\mbox{+}}\)(5, q)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {3},
  pages        = {655--678},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0023-9},
  doi          = {10.1007/S10623-014-0023-9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeuleDMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Braun16,
  author       = {Michael Braun},
  title        = {q-Analogs of t-wise balanced designs from Borel subgroups},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {383--390},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0002-1},
  doi          = {10.1007/S10623-014-0002-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Braun16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BroadbentS16,
  author       = {Anne Broadbent and
                  Christian Schaffner},
  title        = {Quantum cryptography beyond quantum key distribution},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {351--382},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0157-4},
  doi          = {10.1007/S10623-015-0157-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BroadbentS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletGT16,
  author       = {Claude Carlet and
                  Guang Gong and
                  Yin Tan},
  title        = {Quadratic zero-difference balanced functions, {APN} functions and
                  strongly regular graphs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {3},
  pages        = {629--654},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0022-x},
  doi          = {10.1007/S10623-014-0022-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletGT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CarletM16,
  author       = {Claude Carlet and
                  Sihem Mesnager},
  title        = {Four decades of research on bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {5--50},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0145-8},
  doi          = {10.1007/S10623-015-0145-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CarletM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CaullerySZ16,
  author       = {Florian Caullery and
                  Kai{-}Uwe Schmidt and
                  Yue Zhou},
  title        = {Exceptional planar polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {3},
  pages        = {605--613},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0017-7},
  doi          = {10.1007/S10623-014-0017-7},
  timestamp    = {Thu, 16 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/CaullerySZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenZLZ16,
  author       = {Yu Chen and
                  Jiang Zhang and
                  Dongdai Lin and
                  Zhenfeng Zhang},
  title        = {Generic constructions of integrated {PKE} and {PEKS}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {493--526},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0014-x},
  doi          = {10.1007/S10623-014-0014-X},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenZLZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CossidenteP16,
  author       = {Antonio Cossidente and
                  Francesco Pavese},
  title        = {On subspace codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {527--531},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0018-6},
  doi          = {10.1007/S10623-014-0018-6},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CossidenteP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CruzKW16,
  author       = {Javier de la Cruz and
                  Michael Kiermaier and
                  Alfred Wassermann},
  title        = {The automorphism group of an extremal [120, 60, 24] code does not
                  contain elements of order 29},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {3},
  pages        = {693--702},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0025-7},
  doi          = {10.1007/S10623-014-0025-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CruzKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DagdelenGVAC16,
  author       = {{\"{O}}zg{\"{u}}r Dagdelen and
                  David Galindo and
                  Pascal V{\'{e}}ron and
                  Sidi Mohamed El Yousfi Alaoui and
                  Pierre{-}Louis Cayrel},
  title        = {Extended security arguments for signature schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {441--461},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0009-7},
  doi          = {10.1007/S10623-014-0009-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DagdelenGVAC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DelfsG16,
  author       = {Christina Delfs and
                  Steven D. Galbraith},
  title        = {Computing isogenies between supersingular elliptic curves over {\(\mathbb{F}\)}\({}_{\mbox{p}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {425--440},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0010-1},
  doi          = {10.1007/S10623-014-0010-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DelfsG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/EtzionS16,
  author       = {Tuvi Etzion and
                  Leo Storme},
  title        = {Galois geometries and coding theory},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {311--350},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0156-5},
  doi          = {10.1007/S10623-015-0156-5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EtzionS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FragouliS16,
  author       = {Christina Fragouli and
                  Emina Soljanin},
  title        = {(Secure) Linear network coding multicast - {A} theoretical minimum
                  and some open problems},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {269--310},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0155-6},
  doi          = {10.1007/S10623-015-0155-6},
  timestamp    = {Fri, 19 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/FragouliS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GalbraithG16,
  author       = {Steven D. Galbraith and
                  Pierrick Gaudry},
  title        = {Recent progress on the elliptic curve discrete logarithm problem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {51--72},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0146-7},
  doi          = {10.1007/S10623-015-0146-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GalbraithG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GauravaramBK16,
  author       = {Praveen Gauravaram and
                  Nasour Bagheri and
                  Lars R. Knudsen},
  title        = {Building indifferentiable compression functions from the {PGV} compression
                  functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {547--581},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0020-z},
  doi          = {10.1007/S10623-014-0020-Z},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GauravaramBK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GordonS16,
  author       = {Daniel M. Gordon and
                  Bernhard Schmidt},
  title        = {A survey of the multiplier conjecture},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {221--236},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0153-8},
  doi          = {10.1007/S10623-015-0153-8},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GordonS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JouxP16,
  author       = {Antoine Joux and
                  C{\'{e}}cile Pierrot},
  title        = {Technical history of discrete logarithms in small characteristic finite
                  fields - The road from subexponential to quasi-polynomial complexity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {73--85},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0147-6},
  doi          = {10.1007/S10623-015-0147-6},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/JouxP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JungnickelKMMW16,
  author       = {Dieter Jungnickel and
                  Jennifer D. Key and
                  Chris J. Mitchell and
                  Ronald C. Mullin and
                  Peter R. Wild},
  title        = {Editorial for the 25th anniversary issue},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {1--3},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0158-3},
  doi          = {10.1007/S10623-015-0158-3},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/JungnickelKMMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KoblitzM16,
  author       = {Neal Koblitz and
                  Alfred J. Menezes},
  title        = {Cryptocash, cryptocurrencies, and cryptocontracts},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {87--102},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0148-5},
  doi          = {10.1007/S10623-015-0148-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KoblitzM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LavrauwS16,
  author       = {Michel Lavrauw and
                  John Sheekey},
  title        = {On BEL-configurations and finite semifields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {3},
  pages        = {583--603},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0015-9},
  doi          = {10.1007/S10623-014-0015-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LavrauwS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LinMJ16,
  author       = {Yiling Lin and
                  Miwako Mishima and
                  Masakazu Jimbo},
  title        = {Optimal equi-difference conflict-avoiding codes of weight four},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {3},
  pages        = {747--776},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0030-x},
  doi          = {10.1007/S10623-014-0030-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LinMJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LoWF16,
  author       = {Yuan{-}Hsun Lo and
                  Wing Shing Wong and
                  Hung{-}Lin Fu},
  title        = {Partially user-irrepressible sequence sets and conflict-avoiding codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {3},
  pages        = {679--691},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0024-8},
  doi          = {10.1007/S10623-014-0024-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LoWF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MadisonW16,
  author       = {Adonus L. Madison and
                  Junhua Wu},
  title        = {Conics arising from external points and their binary codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {473--491},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0013-y},
  doi          = {10.1007/S10623-014-0013-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MadisonW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MartinezV16,
  author       = {Fabio Enrique Brochero Mart{\'{\i}}nez and
                  Carmen Rosa Giraldo Vergara},
  title        = {Weight enumerator of some irreducible cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {3},
  pages        = {703--712},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0026-6},
  doi          = {10.1007/S10623-014-0026-6},
  timestamp    = {Mon, 03 Mar 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/MartinezV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MouraMP16,
  author       = {Lucia Moura and
                  Gary L. Mullen and
                  Daniel Panario},
  title        = {Finite field constructions of combinatorial arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {197--219},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0152-9},
  doi          = {10.1007/S10623-015-0152-9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MouraMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NgP16,
  author       = {Siaw{-}Lynn Ng and
                  Maura Beth Paterson},
  title        = {Disjoint difference families and their applications},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {103--127},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0149-4},
  doi          = {10.1007/S10623-015-0149-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NgP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Niederreiter16,
  author       = {Harald Niederreiter},
  title        = {A survey of some applications of finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {129--139},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0150-y},
  doi          = {10.1007/S10623-015-0150-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Niederreiter16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Pott16,
  author       = {Alexander Pott},
  title        = {Almost perfect and planar functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {141--195},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0151-x},
  doi          = {10.1007/S10623-015-0151-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Pott16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/QuTLG16,
  author       = {Longjiang Qu and
                  Yin Tan and
                  Chao Li and
                  Guang Gong},
  title        = {More constructions of differentially 4-uniform permutations on {\(\mathbb{F}\)}\({}_{\mbox{2\({}^{\mbox{2k}}\)}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {391--408},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0006-x},
  doi          = {10.1007/S10623-014-0006-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/QuTLG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Schmidt16,
  author       = {Kai{-}Uwe Schmidt},
  title        = {Sequences with small correlation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {237--267},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0154-7},
  doi          = {10.1007/S10623-015-0154-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Schmidt16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SilbersteinG16,
  author       = {Natalia Silberstein and
                  Anna G{\'{a}}l},
  title        = {Optimal combinatorial batch codes based on block designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {409--424},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0007-9},
  doi          = {10.1007/S10623-014-0007-9},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SilbersteinG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SteinbachH16,
  author       = {Martin Steinbach and
                  Dirk Hachenberger},
  title        = {A class of quaternary linear codes improving known minimum distances},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {3},
  pages        = {615--627},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0021-y},
  doi          = {10.1007/S10623-014-0021-Y},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SteinbachH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Suda16,
  author       = {Sho Suda},
  title        = {A two-fold cover of strongly regular graphs with spreads and association
                  schemes of class five},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {463--471},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0012-z},
  doi          = {10.1007/S10623-014-0012-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Suda16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WuQC16,
  author       = {Di Wu and
                  Wenfeng Qi and
                  Huajin Chen},
  title        = {On the spectral immunity of periodic sequences restricted to binary
                  annihilators},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {533--545},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0019-5},
  doi          = {10.1007/S10623-014-0019-5},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/WuQC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XiongLZD16,
  author       = {Maosheng Xiong and
                  Nian Li and
                  Zhengchun Zhou and
                  Cunsheng Ding},
  title        = {Weight distribution of cyclic codes with arbitrary number of generalized
                  Niho type zeroes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {3},
  pages        = {713--730},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0027-5},
  doi          = {10.1007/S10623-014-0027-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/XiongLZD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YuL16,
  author       = {Long Yu and
                  Hongwei Liu},
  title        = {The weight distribution of a family of p-ary cyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {3},
  pages        = {731--745},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0029-3},
  doi          = {10.1007/S10623-014-0029-3},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YuL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}