


default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc78.bht:"
@article{DBLP:journals/dcc/BeuleDMR16, author = {Jan De Beule and Jeroen Demeyer and Klaus Metsch and Morgan Rodgers}, title = {A new family of tight sets in Q\({}^{\mbox{+}}\)(5, q)}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {3}, pages = {655--678}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0023-9}, doi = {10.1007/S10623-014-0023-9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeuleDMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Braun16, author = {Michael Braun}, title = {q-Analogs of t-wise balanced designs from Borel subgroups}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {383--390}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0002-1}, doi = {10.1007/S10623-014-0002-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Braun16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BroadbentS16, author = {Anne Broadbent and Christian Schaffner}, title = {Quantum cryptography beyond quantum key distribution}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {351--382}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0157-4}, doi = {10.1007/S10623-015-0157-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BroadbentS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletGT16, author = {Claude Carlet and Guang Gong and Yin Tan}, title = {Quadratic zero-difference balanced functions, {APN} functions and strongly regular graphs}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {3}, pages = {629--654}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0022-x}, doi = {10.1007/S10623-014-0022-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletGT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CarletM16, author = {Claude Carlet and Sihem Mesnager}, title = {Four decades of research on bent functions}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {5--50}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0145-8}, doi = {10.1007/S10623-015-0145-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CarletM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CaullerySZ16, author = {Florian Caullery and Kai{-}Uwe Schmidt and Yue Zhou}, title = {Exceptional planar polynomials}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {3}, pages = {605--613}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0017-7}, doi = {10.1007/S10623-014-0017-7}, timestamp = {Thu, 16 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/CaullerySZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenZLZ16, author = {Yu Chen and Jiang Zhang and Dongdai Lin and Zhenfeng Zhang}, title = {Generic constructions of integrated {PKE} and {PEKS}}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {493--526}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0014-x}, doi = {10.1007/S10623-014-0014-X}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenZLZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CossidenteP16, author = {Antonio Cossidente and Francesco Pavese}, title = {On subspace codes}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {527--531}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0018-6}, doi = {10.1007/S10623-014-0018-6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CossidenteP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CruzKW16, author = {Javier de la Cruz and Michael Kiermaier and Alfred Wassermann}, title = {The automorphism group of an extremal [120, 60, 24] code does not contain elements of order 29}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {3}, pages = {693--702}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0025-7}, doi = {10.1007/S10623-014-0025-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CruzKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DagdelenGVAC16, author = {{\"{O}}zg{\"{u}}r Dagdelen and David Galindo and Pascal V{\'{e}}ron and Sidi Mohamed El Yousfi Alaoui and Pierre{-}Louis Cayrel}, title = {Extended security arguments for signature schemes}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {441--461}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0009-7}, doi = {10.1007/S10623-014-0009-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DagdelenGVAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DelfsG16, author = {Christina Delfs and Steven D. Galbraith}, title = {Computing isogenies between supersingular elliptic curves over {\(\mathbb{F}\)}\({}_{\mbox{p}}\)}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {425--440}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0010-1}, doi = {10.1007/S10623-014-0010-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DelfsG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/EtzionS16, author = {Tuvi Etzion and Leo Storme}, title = {Galois geometries and coding theory}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {311--350}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0156-5}, doi = {10.1007/S10623-015-0156-5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EtzionS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FragouliS16, author = {Christina Fragouli and Emina Soljanin}, title = {(Secure) Linear network coding multicast - {A} theoretical minimum and some open problems}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {269--310}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0155-6}, doi = {10.1007/S10623-015-0155-6}, timestamp = {Fri, 19 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/FragouliS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GalbraithG16, author = {Steven D. Galbraith and Pierrick Gaudry}, title = {Recent progress on the elliptic curve discrete logarithm problem}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {51--72}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0146-7}, doi = {10.1007/S10623-015-0146-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GalbraithG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GauravaramBK16, author = {Praveen Gauravaram and Nasour Bagheri and Lars R. Knudsen}, title = {Building indifferentiable compression functions from the {PGV} compression functions}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {547--581}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0020-z}, doi = {10.1007/S10623-014-0020-Z}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GauravaramBK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GordonS16, author = {Daniel M. Gordon and Bernhard Schmidt}, title = {A survey of the multiplier conjecture}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {221--236}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0153-8}, doi = {10.1007/S10623-015-0153-8}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GordonS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JouxP16, author = {Antoine Joux and C{\'{e}}cile Pierrot}, title = {Technical history of discrete logarithms in small characteristic finite fields - The road from subexponential to quasi-polynomial complexity}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {73--85}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0147-6}, doi = {10.1007/S10623-015-0147-6}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/JouxP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JungnickelKMMW16, author = {Dieter Jungnickel and Jennifer D. Key and Chris J. Mitchell and Ronald C. Mullin and Peter R. Wild}, title = {Editorial for the 25th anniversary issue}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {1--3}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0158-3}, doi = {10.1007/S10623-015-0158-3}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/JungnickelKMMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KoblitzM16, author = {Neal Koblitz and Alfred J. Menezes}, title = {Cryptocash, cryptocurrencies, and cryptocontracts}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {87--102}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0148-5}, doi = {10.1007/S10623-015-0148-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KoblitzM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LavrauwS16, author = {Michel Lavrauw and John Sheekey}, title = {On BEL-configurations and finite semifields}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {3}, pages = {583--603}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0015-9}, doi = {10.1007/S10623-014-0015-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LavrauwS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LinMJ16, author = {Yiling Lin and Miwako Mishima and Masakazu Jimbo}, title = {Optimal equi-difference conflict-avoiding codes of weight four}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {3}, pages = {747--776}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0030-x}, doi = {10.1007/S10623-014-0030-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LinMJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LoWF16, author = {Yuan{-}Hsun Lo and Wing Shing Wong and Hung{-}Lin Fu}, title = {Partially user-irrepressible sequence sets and conflict-avoiding codes}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {3}, pages = {679--691}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0024-8}, doi = {10.1007/S10623-014-0024-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LoWF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MadisonW16, author = {Adonus L. Madison and Junhua Wu}, title = {Conics arising from external points and their binary codes}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {473--491}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0013-y}, doi = {10.1007/S10623-014-0013-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MadisonW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MartinezV16, author = {Fabio Enrique Brochero Mart{\'{\i}}nez and Carmen Rosa Giraldo Vergara}, title = {Weight enumerator of some irreducible cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {3}, pages = {703--712}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0026-6}, doi = {10.1007/S10623-014-0026-6}, timestamp = {Mon, 03 Mar 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/MartinezV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MouraMP16, author = {Lucia Moura and Gary L. Mullen and Daniel Panario}, title = {Finite field constructions of combinatorial arrays}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {197--219}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0152-9}, doi = {10.1007/S10623-015-0152-9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MouraMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NgP16, author = {Siaw{-}Lynn Ng and Maura Beth Paterson}, title = {Disjoint difference families and their applications}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {103--127}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0149-4}, doi = {10.1007/S10623-015-0149-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NgP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Niederreiter16, author = {Harald Niederreiter}, title = {A survey of some applications of finite fields}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {129--139}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0150-y}, doi = {10.1007/S10623-015-0150-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Niederreiter16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Pott16, author = {Alexander Pott}, title = {Almost perfect and planar functions}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {141--195}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0151-x}, doi = {10.1007/S10623-015-0151-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Pott16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/QuTLG16, author = {Longjiang Qu and Yin Tan and Chao Li and Guang Gong}, title = {More constructions of differentially 4-uniform permutations on {\(\mathbb{F}\)}\({}_{\mbox{2\({}^{\mbox{2k}}\)}}\)}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {391--408}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0006-x}, doi = {10.1007/S10623-014-0006-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/QuTLG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Schmidt16, author = {Kai{-}Uwe Schmidt}, title = {Sequences with small correlation}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {237--267}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0154-7}, doi = {10.1007/S10623-015-0154-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Schmidt16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SilbersteinG16, author = {Natalia Silberstein and Anna G{\'{a}}l}, title = {Optimal combinatorial batch codes based on block designs}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {409--424}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0007-9}, doi = {10.1007/S10623-014-0007-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SilbersteinG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SteinbachH16, author = {Martin Steinbach and Dirk Hachenberger}, title = {A class of quaternary linear codes improving known minimum distances}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {3}, pages = {615--627}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0021-y}, doi = {10.1007/S10623-014-0021-Y}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SteinbachH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Suda16, author = {Sho Suda}, title = {A two-fold cover of strongly regular graphs with spreads and association schemes of class five}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {463--471}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0012-z}, doi = {10.1007/S10623-014-0012-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Suda16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WuQC16, author = {Di Wu and Wenfeng Qi and Huajin Chen}, title = {On the spectral immunity of periodic sequences restricted to binary annihilators}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {533--545}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0019-5}, doi = {10.1007/S10623-014-0019-5}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/WuQC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XiongLZD16, author = {Maosheng Xiong and Nian Li and Zhengchun Zhou and Cunsheng Ding}, title = {Weight distribution of cyclic codes with arbitrary number of generalized Niho type zeroes}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {3}, pages = {713--730}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0027-5}, doi = {10.1007/S10623-014-0027-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/XiongLZD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YuL16, author = {Long Yu and Hongwei Liu}, title = {The weight distribution of a family of p-ary cyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {3}, pages = {731--745}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0029-3}, doi = {10.1007/S10623-014-0029-3}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YuL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.