default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc43.bht:"
@article{DBLP:journals/dcc/Arhin07, author = {John Arhin}, title = {On the structure of 1-designs with at most two block intersection numbers}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {2-3}, pages = {103--114}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9067-4}, doi = {10.1007/S10623-007-9067-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Arhin07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bras-Amoros07, author = {Maria Bras{-}Amor{\'{o}}s}, title = {Algebraic-geometry codes, one-point codes, and evaluation codes}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {2-3}, pages = {137--145}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9074-5}, doi = {10.1007/S10623-007-9074-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Bras-Amoros07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CaggegiF07, author = {Andrea Caggegi and Giovanni Falcone}, title = {On 2-(n\({}^{\mbox{2}}\), 2n, 2n-1) designs with three intersection numbers}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {1}, pages = {33--40}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9051-z}, doi = {10.1007/S10623-007-9051-Z}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CaggegiF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CheonM07, author = {E. J. Cheon and Tatsuya Maruta}, title = {On the minimum length of some linear codes}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {2-3}, pages = {123--135}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9070-9}, doi = {10.1007/S10623-007-9070-9}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CheonM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Feyter07, author = {Nikias de Feyter}, title = {Classification of (0, 2)-geometries embedded in {AG} (3, q)}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {1}, pages = {21--32}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9050-0}, doi = {10.1007/S10623-007-9050-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Feyter07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FuX07, author = {Fang{-}Wei Fu and Shu{-}Tao Xia}, title = {The characterization of binary constant weight codes meeting the bound of Fu and Shen}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {1}, pages = {9--20}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9049-6}, doi = {10.1007/S10623-007-9049-6}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/FuX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GashkovET07, author = {Igor Gashkov and J. A. O. Ekberg and D. Taub}, title = {A geometric approach to finding new lower bounds of A(n, d, w)}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {2-3}, pages = {85--91}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9064-7}, doi = {10.1007/S10623-007-9064-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GashkovET07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GieseS07, author = {Sabine Giese and Ralph{-}Hardo Schulz}, title = {Divisible designs with dual translation group}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {1}, pages = {41--45}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9056-7}, doi = {10.1007/S10623-007-9056-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GieseS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/IzuKKS07, author = {Tetsuya Izu and Jun Kogure and Takeshi Koshiba and Takeshi Shimoyama}, title = {Low-density attack revisited}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {1}, pages = {47--59}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9058-5}, doi = {10.1007/S10623-007-9058-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/IzuKKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JacksonM07, author = {Wen{-}Ai Jackson and S. Murphy}, title = {Projective aspects of the {AES} inversion}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {2-3}, pages = {167--179}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9059-4}, doi = {10.1007/S10623-007-9059-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JacksonM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JangNC07, author = {Ji{-}Woong Jang and Jong{-}Seon No and Habong Chung}, title = {Butson Hadamard matrices with partially cyclic core}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {2-3}, pages = {93--101}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9065-6}, doi = {10.1007/S10623-007-9065-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JangNC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JedwabP07, author = {Jonathan Jedwab and Matthew Geoffrey Parker}, title = {There are no Barker arrays having more than two dimensions}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {2-3}, pages = {79--84}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9060-y}, doi = {10.1007/S10623-007-9060-Y}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JedwabP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Ji07, author = {Lijun Ji}, title = {A construction for large sets of disjoint Kirkman triple systems}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {2-3}, pages = {115--122}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9069-2}, doi = {10.1007/S10623-007-9069-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Ji07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kelly07, author = {Shane Kelly}, title = {Constructions of intriguing sets of polar spaces from field reduction and derivation}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {1}, pages = {1--8}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9046-9}, doi = {10.1007/S10623-007-9046-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kelly07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KiayiasY07, author = {Aggelos Kiayias and Moti Yung}, title = {Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {2-3}, pages = {61--78}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9055-8}, doi = {10.1007/S10623-007-9055-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KiayiasY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Yildiz07, author = {Bahattin Yildiz}, title = {Weights modulo \emph{p} \({}^{\mbox{ \emph{e} }}\) of linear codes over rings}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {2-3}, pages = {147--165}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9076-3}, doi = {10.1007/S10623-007-9076-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Yildiz07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.