Search dblp for Publications

export results for "toc:db/journals/dcc/dcc50.bht:"

 download as .bib file

@article{DBLP:journals/dcc/BeuleGHS09,
  author       = {Jan De Beule and
                  Patrick Govaerts and
                  Anja Hallez and
                  Leo Storme},
  title        = {Tight sets, weighted \emph{m} -covers, weighted \emph{m} -ovoids,
                  and minihypers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {2},
  pages        = {187--201},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9223-5},
  doi          = {10.1007/S10623-008-9223-5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BeuleGHS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Bierbrauer09,
  author       = {J{\"{u}}rgen Bierbrauer},
  title        = {A family of crooked functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {2},
  pages        = {235--241},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9227-1},
  doi          = {10.1007/S10623-008-9227-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Bierbrauer09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChaussadeLU09,
  author       = {Lionel Chaussade and
                  Pierre Loidreau and
                  Felix Ulmer},
  title        = {Skew codes of prescribed distance or rank},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {3},
  pages        = {267--284},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9230-6},
  doi          = {10.1007/S10623-008-9230-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChaussadeLU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Coron09,
  author       = {Jean{-}S{\'{e}}bastien Coron},
  title        = {A variant of Boneh-Franklin {IBE} with a tight reduction in the random
                  oracle model},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {1},
  pages        = {115--133},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9218-2},
  doi          = {10.1007/S10623-008-9218-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Coron09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DavydovMP09,
  author       = {Alexander A. Davydov and
                  Stefano Marcugini and
                  Fernanda Pambianco},
  title        = {Complete {(} \emph{q} \({}^{\mbox{2}}\) + \emph{q} + 8)/2-caps in
                  the spaces \emph{PG} (3, \emph{q} ), \emph{q} = 2 (mod 3) an odd prime,
                  and a complete 20-cap in \emph{PG} (3, 5)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {3},
  pages        = {359--372},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9237-z},
  doi          = {10.1007/S10623-008-9237-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DavydovMP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DoughertyKK09,
  author       = {Steven T. Dougherty and
                  Jon{-}Lark Kim and
                  Hamid Kulosman},
  title        = {{MDS} codes over finite principal ideal rings},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {1},
  pages        = {77--92},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9215-5},
  doi          = {10.1007/S10623-008-9215-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DoughertyKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Edoukou09,
  author       = {Fr{\'{e}}d{\'{e}}ric A. B. Edoukou},
  title        = {Codes defined by forms of degree 2 on non-degenerate Hermitian varieties
                  in {\textbackslash}mathbb\emph{P}\({}^{\mbox{4}}\)({\textbackslash}mathbb\emph{F}\({}_{\mbox{\emph{q}}}\))\{{\textbackslash}mathbb\{P\}\{4\}({\textbackslash}mathbb\{F\}{\_}q)\}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {1},
  pages        = {135--146},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9219-1},
  doi          = {10.1007/S10623-008-9219-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Edoukou09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FengLY09,
  author       = {Keqin Feng and
                  Qunying Liao and
                  Jing Yang},
  title        = {Maximal values of generalized algebraic immunity},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {2},
  pages        = {243--252},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9228-0},
  doi          = {10.1007/S10623-008-9228-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FengLY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FuF09,
  author       = {Wenqing Fu and
                  Tao Feng},
  title        = {On self-orthogonal group ring codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {2},
  pages        = {203--214},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9224-4},
  doi          = {10.1007/S10623-008-9224-4},
  timestamp    = {Tue, 22 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FuF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GalbraithL09,
  author       = {Steven D. Galbraith and
                  Xibin Lin},
  title        = {Computing pairings using \emph{x} -coordinates only},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {3},
  pages        = {305--324},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9233-3},
  doi          = {10.1007/S10623-008-9233-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GalbraithL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GuoG09,
  author       = {Weidong Guo and
                  Gennian Ge},
  title        = {The existence of generalized mix functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {1},
  pages        = {107--113},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9217-3},
  doi          = {10.1007/S10623-008-9217-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GuoG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Hiramine09,
  author       = {Yutaka Hiramine},
  title        = {A two-to-one map and abelian affine difference sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {3},
  pages        = {285--290},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9231-5},
  doi          = {10.1007/S10623-008-9231-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Hiramine09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HommaK09,
  author       = {Masaaki Homma and
                  Seon Jeong Kim},
  title        = {The second generalized Hamming weight for two-point codes on a Hermitian
                  curve},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {1},
  pages        = {1--40},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9210-x},
  doi          = {10.1007/S10623-008-9210-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HommaK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HuangS09,
  author       = {Yiwei Huang and
                  Bernhard Schmidt},
  title        = {Uniqueness of some cyclic projective planes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {2},
  pages        = {253--266},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9229-z},
  doi          = {10.1007/S10623-008-9229-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HuangS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Hyun09,
  author       = {Jong Yoon Hyun},
  title        = {Generalized MacWilliams identities and their applications to perfect
                  binary codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {2},
  pages        = {173--185},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9222-6},
  doi          = {10.1007/S10623-008-9222-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Hyun09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiJY09,
  author       = {Yang Li and
                  Lijun Ji and
                  Jianxing Yin},
  title        = {Covering arrays of strength 3 and 4 from holey difference matrices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {3},
  pages        = {339--350},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9235-1},
  doi          = {10.1007/S10623-008-9235-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiJY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiuWL09,
  author       = {Feng Liu and
                  Chuan Kun Wu and
                  Xi Jun Lin},
  title        = {The alignment problem of visual cryptography schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {2},
  pages        = {215--227},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9225-3},
  doi          = {10.1007/S10623-008-9225-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LiuWL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NagataNW09,
  author       = {Kiyoshi Nagata and
                  Fidel R. Nemenzo and
                  Hideo Wada},
  title        = {The number of self-dual codes over \emph{Z}\({}_{\mbox{\emph{p}\({}^{\mbox{3}}\)}}\)\{Z{\_}\{p3\}\}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {3},
  pages        = {291--303},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9232-4},
  doi          = {10.1007/S10623-008-9232-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NagataNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PanarioT09,
  author       = {Daniel Panario and
                  David Thomson},
  title        = {Efficient \emph{p} th root computations in finite fields of characteristic
                  \emph{p}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {3},
  pages        = {351--358},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9236-0},
  doi          = {10.1007/S10623-008-9236-0},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PanarioT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Park09,
  author       = {Young Ho Park},
  title        = {Modular independence and generator matrices for codes over {\textbackslash}mathbb
                  \emph{Z}\({}_{\mbox{\emph{m}}}\)\{{\textbackslash}mathbb \{Z\}{\_}m\}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {2},
  pages        = {147--162},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9220-8},
  doi          = {10.1007/S10623-008-9220-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Park09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/PiretS09,
  author       = {Gilles Piret and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Provable security of block ciphers against linear cryptanalysis: a
                  mission impossible?},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {3},
  pages        = {325--338},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9234-2},
  doi          = {10.1007/S10623-008-9234-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/PiretS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/SchillewaertT09,
  author       = {Jeroen Schillewaert and
                  Joseph A. Thas},
  title        = {Characterizations of Hermitian varieties by intersection numbers},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {1},
  pages        = {41--60},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9213-7},
  doi          = {10.1007/S10623-008-9213-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/SchillewaertT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Trinker09,
  author       = {Horst Trinker},
  title        = {A simple derivation of the MacWilliams identity for linear ordered
                  codes and orthogonal arrays},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {2},
  pages        = {229--234},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9226-2},
  doi          = {10.1007/S10623-008-9226-2},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Trinker09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WengH09,
  author       = {Guobiao Weng and
                  Lei Hu},
  title        = {Some results on skew Hadamard difference sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {1},
  pages        = {93--105},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9216-4},
  doi          = {10.1007/S10623-008-9216-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WengH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/XiaF09,
  author       = {Shu{-}Tao Xia and
                  Fang{-}Wei Fu},
  title        = {Johnson type bounds on constant dimension codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {2},
  pages        = {163--172},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9221-7},
  doi          = {10.1007/S10623-008-9221-7},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/XiaF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YanY09,
  author       = {Jie Yan and
                  Jianxing Yin},
  title        = {A class of optimal constant composition codes from GDRPs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {1},
  pages        = {61--76},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9214-6},
  doi          = {10.1007/S10623-008-9214-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YanY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics