![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc50.bht:"
@article{DBLP:journals/dcc/BeuleGHS09, author = {Jan De Beule and Patrick Govaerts and Anja Hallez and Leo Storme}, title = {Tight sets, weighted \emph{m} -covers, weighted \emph{m} -ovoids, and minihypers}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {2}, pages = {187--201}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9223-5}, doi = {10.1007/S10623-008-9223-5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BeuleGHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Bierbrauer09, author = {J{\"{u}}rgen Bierbrauer}, title = {A family of crooked functions}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {2}, pages = {235--241}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9227-1}, doi = {10.1007/S10623-008-9227-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Bierbrauer09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChaussadeLU09, author = {Lionel Chaussade and Pierre Loidreau and Felix Ulmer}, title = {Skew codes of prescribed distance or rank}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {3}, pages = {267--284}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9230-6}, doi = {10.1007/S10623-008-9230-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChaussadeLU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Coron09, author = {Jean{-}S{\'{e}}bastien Coron}, title = {A variant of Boneh-Franklin {IBE} with a tight reduction in the random oracle model}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {1}, pages = {115--133}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9218-2}, doi = {10.1007/S10623-008-9218-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Coron09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DavydovMP09, author = {Alexander A. Davydov and Stefano Marcugini and Fernanda Pambianco}, title = {Complete {(} \emph{q} \({}^{\mbox{2}}\) + \emph{q} + 8)/2-caps in the spaces \emph{PG} (3, \emph{q} ), \emph{q} = 2 (mod 3) an odd prime, and a complete 20-cap in \emph{PG} (3, 5)}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {3}, pages = {359--372}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9237-z}, doi = {10.1007/S10623-008-9237-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DavydovMP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DoughertyKK09, author = {Steven T. Dougherty and Jon{-}Lark Kim and Hamid Kulosman}, title = {{MDS} codes over finite principal ideal rings}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {1}, pages = {77--92}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9215-5}, doi = {10.1007/S10623-008-9215-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DoughertyKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Edoukou09, author = {Fr{\'{e}}d{\'{e}}ric A. B. Edoukou}, title = {Codes defined by forms of degree 2 on non-degenerate Hermitian varieties in {\textbackslash}mathbb\emph{P}\({}^{\mbox{4}}\)({\textbackslash}mathbb\emph{F}\({}_{\mbox{\emph{q}}}\))\{{\textbackslash}mathbb\{P\}\{4\}({\textbackslash}mathbb\{F\}{\_}q)\}}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {1}, pages = {135--146}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9219-1}, doi = {10.1007/S10623-008-9219-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Edoukou09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FengLY09, author = {Keqin Feng and Qunying Liao and Jing Yang}, title = {Maximal values of generalized algebraic immunity}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {2}, pages = {243--252}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9228-0}, doi = {10.1007/S10623-008-9228-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FengLY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FuF09, author = {Wenqing Fu and Tao Feng}, title = {On self-orthogonal group ring codes}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {2}, pages = {203--214}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9224-4}, doi = {10.1007/S10623-008-9224-4}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FuF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GalbraithL09, author = {Steven D. Galbraith and Xibin Lin}, title = {Computing pairings using \emph{x} -coordinates only}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {3}, pages = {305--324}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9233-3}, doi = {10.1007/S10623-008-9233-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GalbraithL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GuoG09, author = {Weidong Guo and Gennian Ge}, title = {The existence of generalized mix functions}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {1}, pages = {107--113}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9217-3}, doi = {10.1007/S10623-008-9217-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GuoG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Hiramine09, author = {Yutaka Hiramine}, title = {A two-to-one map and abelian affine difference sets}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {3}, pages = {285--290}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9231-5}, doi = {10.1007/S10623-008-9231-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Hiramine09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HommaK09, author = {Masaaki Homma and Seon Jeong Kim}, title = {The second generalized Hamming weight for two-point codes on a Hermitian curve}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {1}, pages = {1--40}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9210-x}, doi = {10.1007/S10623-008-9210-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HommaK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HuangS09, author = {Yiwei Huang and Bernhard Schmidt}, title = {Uniqueness of some cyclic projective planes}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {2}, pages = {253--266}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9229-z}, doi = {10.1007/S10623-008-9229-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HuangS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Hyun09, author = {Jong Yoon Hyun}, title = {Generalized MacWilliams identities and their applications to perfect binary codes}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {2}, pages = {173--185}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9222-6}, doi = {10.1007/S10623-008-9222-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Hyun09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiJY09, author = {Yang Li and Lijun Ji and Jianxing Yin}, title = {Covering arrays of strength 3 and 4 from holey difference matrices}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {3}, pages = {339--350}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9235-1}, doi = {10.1007/S10623-008-9235-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiJY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiuWL09, author = {Feng Liu and Chuan Kun Wu and Xi Jun Lin}, title = {The alignment problem of visual cryptography schemes}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {2}, pages = {215--227}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9225-3}, doi = {10.1007/S10623-008-9225-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LiuWL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NagataNW09, author = {Kiyoshi Nagata and Fidel R. Nemenzo and Hideo Wada}, title = {The number of self-dual codes over \emph{Z}\({}_{\mbox{\emph{p}\({}^{\mbox{3}}\)}}\)\{Z{\_}\{p3\}\}}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {3}, pages = {291--303}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9232-4}, doi = {10.1007/S10623-008-9232-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NagataNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PanarioT09, author = {Daniel Panario and David Thomson}, title = {Efficient \emph{p} th root computations in finite fields of characteristic \emph{p}}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {3}, pages = {351--358}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9236-0}, doi = {10.1007/S10623-008-9236-0}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PanarioT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Park09, author = {Young Ho Park}, title = {Modular independence and generator matrices for codes over {\textbackslash}mathbb \emph{Z}\({}_{\mbox{\emph{m}}}\)\{{\textbackslash}mathbb \{Z\}{\_}m\}}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {2}, pages = {147--162}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9220-8}, doi = {10.1007/S10623-008-9220-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Park09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/PiretS09, author = {Gilles Piret and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Provable security of block ciphers against linear cryptanalysis: a mission impossible?}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {3}, pages = {325--338}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9234-2}, doi = {10.1007/S10623-008-9234-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/PiretS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/SchillewaertT09, author = {Jeroen Schillewaert and Joseph A. Thas}, title = {Characterizations of Hermitian varieties by intersection numbers}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {1}, pages = {41--60}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9213-7}, doi = {10.1007/S10623-008-9213-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/SchillewaertT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Trinker09, author = {Horst Trinker}, title = {A simple derivation of the MacWilliams identity for linear ordered codes and orthogonal arrays}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {2}, pages = {229--234}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9226-2}, doi = {10.1007/S10623-008-9226-2}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Trinker09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WengH09, author = {Guobiao Weng and Lei Hu}, title = {Some results on skew Hadamard difference sets}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {1}, pages = {93--105}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9216-4}, doi = {10.1007/S10623-008-9216-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WengH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/XiaF09, author = {Shu{-}Tao Xia and Fang{-}Wei Fu}, title = {Johnson type bounds on constant dimension codes}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {2}, pages = {163--172}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9221-7}, doi = {10.1007/S10623-008-9221-7}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/XiaF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YanY09, author = {Jie Yan and Jianxing Yin}, title = {A class of optimal constant composition codes from GDRPs}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {1}, pages = {61--76}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9214-6}, doi = {10.1007/S10623-008-9214-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YanY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.