default search action
Search dblp for Publications
export results for "toc:db/journals/dcc/dcc85.bht:"
@article{DBLP:journals/dcc/AlhakimN17, author = {Abbas Alhakim and Maher Nouiehed}, title = {Stretching de Bruijn sequences}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {381--394}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0314-4}, doi = {10.1007/S10623-016-0314-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AlhakimN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BorgesF17, author = {Joaquim Borges and Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba}, title = {There is exactly one {\textdollar}{\textdollar}\{{\textbackslash}mathbb \{Z\}\}{\_}2\{{\textbackslash}mathbb \{Z\}\}{\_}4{\textdollar}{\textdollar}-cyclic 1-perfect code}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {3}, pages = {557--566}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0323-3}, doi = {10.1007/S10623-016-0323-3}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BorgesF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenJL17, author = {Jingyuan Chen and Lijun Ji and Yun Li}, title = {New optical orthogonal signature pattern codes with maximum collision parameter 2 and weight 4}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {299--318}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0310-8}, doi = {10.1007/S10623-016-0310-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenMYSG17, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo}, title = {Strong authenticated key exchange with auxiliary inputs}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {145--173}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0295-3}, doi = {10.1007/S10623-016-0295-3}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenMYSG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenMYSGZ17, author = {Rongmao Chen and Yi Mu and Guomin Yang and Willy Susilo and Fuchun Guo and Zheng Yang}, title = {A note on the strong authenticated key exchange with auxiliary inputs}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {175--178}, year = {2017}, url = {https://doi.org/10.1007/s10623-017-0386-9}, doi = {10.1007/S10623-017-0386-9}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenMYSGZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ChenZ17a, author = {Zongchen Chen and Da Zhao}, title = {On symmetric BIBDs with the same 3-concurrence}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {3}, pages = {425--436}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0317-1}, doi = {10.1007/S10623-016-0317-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ChenZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CossidenteP17, author = {Antonio Cossidente and Francesco Pavese}, title = {Strongly regular graphs from classical generalized quadrangles}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {3}, pages = {457--470}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0318-0}, doi = {10.1007/S10623-016-0318-0}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CossidenteP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/CuitinoT17, author = {Luis Felipe Tapia Cuiti{\~{n}}o and Andrea Luigi Tironi}, title = {Some properties of skew codes over finite fields}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {359--380}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0311-7}, doi = {10.1007/S10623-016-0311-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/CuitinoT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DongP17, author = {Junwu Dong and Dingyi Pei}, title = {Construction for de Bruijn sequences with large stage}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {343--358}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0309-1}, doi = {10.1007/S10623-016-0309-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DongP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Egan17, author = {Ronan Egan}, title = {On equivalence of negaperiodic Golay pairs}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {3}, pages = {523--532}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0320-6}, doi = {10.1007/S10623-016-0320-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Egan17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FanX17a, author = {Yun Fan and Bangteng Xu}, title = {Nonlinear functions and difference sets on group actions}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {319--341}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0312-6}, doi = {10.1007/S10623-016-0312-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FanX17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HagiwaraK17, author = {Manabu Hagiwara and Justin Kong}, title = {Consolidation for compact constraints and Kendall tau {LP} decodable permutation codes}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {3}, pages = {483--521}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0313-5}, doi = {10.1007/S10623-016-0313-5}, timestamp = {Mon, 02 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HagiwaraK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HorakST17, author = {Peter Hor{\'{a}}k and Igor A. Semaev and Zsolt Tuza}, title = {A combinatorial problem related to sparse systems of equations}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {129--144}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0294-4}, doi = {10.1007/S10623-016-0294-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HorakST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/IsikTW17, author = {Leyla Isik and Alev Topuzoglu and Arne Winterhof}, title = {Complete mappings and Carlitz rank}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {121--128}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0293-5}, doi = {10.1007/S10623-016-0293-5}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/IsikTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kolomeec17, author = {Nikolay Kolomeec}, title = {The graph of minimal distances of bent functions and its properties}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {3}, pages = {395--410}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0306-4}, doi = {10.1007/S10623-016-0306-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kolomeec17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KurosawaP17, author = {Kaoru Kurosawa and Le Trieu Phong}, title = {Anonymous and leakage resilient {IBE} and {IPE}}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {273--298}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0303-7}, doi = {10.1007/S10623-016-0303-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KurosawaP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kurz17, author = {Sascha Kurz}, title = {Improved upper bounds for partial spreads}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {97--106}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0290-8}, doi = {10.1007/S10623-016-0290-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kurz17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeLP17, author = {Kwangsu Lee and Dong Hoon Lee and Jong Hwan Park}, title = {Efficient revocable identity-based encryption via subset difference methods}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {39--76}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0287-3}, doi = {10.1007/S10623-016-0287-3}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeeLP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LiD17, author = {Jianing Li and Yingpu Deng}, title = {Nonexistence of two classes of generalized bent functions}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {3}, pages = {471--482}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0319-z}, doi = {10.1007/S10623-016-0319-Z}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/LiD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MartinsenMS17, author = {Thor Martinsen and Wilfried Meidl and Pantelimon Stanica}, title = {Partial spread and vectorial generalized bent functions}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {1--13}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0283-7}, doi = {10.1007/S10623-016-0283-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MartinsenMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/OtalO17, author = {Kamil Otal and Ferruh {\"{O}}zbudak}, title = {Cyclic subspace codes via subspace polynomials}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {191--204}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0297-1}, doi = {10.1007/S10623-016-0297-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/OtalO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/RubinW17, author = {Amir Rubin and Gera Weiss}, title = {Mapping prefer-opposite to prefer-one de Bruijn sequences}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {3}, pages = {547--555}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0322-4}, doi = {10.1007/S10623-016-0322-4}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/RubinW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ShenLFY17, author = {Gang Shen and Feng Liu and Zhengxin Fu and Bin Yu}, title = {Perfect contrast XOR-based visual cryptography schemes via linear algebra}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {15--37}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0285-5}, doi = {10.1007/S10623-016-0285-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ShenLFY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Steinke17, author = {G{\"{u}}nter F. Steinke}, title = {Collineations of finite 2-affine planes}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {107--120}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0292-6}, doi = {10.1007/S10623-016-0292-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Steinke17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/StreyC17, author = {Eleonesio Strey and Sueli I. R. Costa}, title = {Lattices from codes over Z\({}_{\mbox{q}}\) : generalization of constructions D, D' and {D} {\textasciimacron}}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {77--95}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0289-1}, doi = {10.1007/S10623-016-0289-1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/StreyC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Tonchev17a, author = {Vladimir D. Tonchev}, title = {Linearly embeddable designs}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {233--247}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0304-6}, doi = {10.1007/S10623-016-0304-6}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Tonchev17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TzanakisMPS17, author = {Georgios Tzanakis and Lucia Moura and Daniel Panario and Brett Stevens}, title = {Covering arrays from m-sequences and character sums}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {3}, pages = {437--456}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0316-2}, doi = {10.1007/S10623-016-0316-2}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/TzanakisMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/WangZYG17, author = {Xin Wang and Yiwei Zhang and Yiting Yang and Gennian Ge}, title = {New bounds of permutation codes under Hamming metric and Kendall's {\(\tau\)} -metric}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {3}, pages = {533--545}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0321-5}, doi = {10.1007/S10623-016-0321-5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/WangZYG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Yoshiara17, author = {Satoshi Yoshiara}, title = {Equivalences among plateaued {APN} functions}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {205--217}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0298-0}, doi = {10.1007/S10623-016-0298-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Yoshiara17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YuanZKL17, author = {Jian Yuan and Shixin Zhu and Xiaoshan Kai and Ping Li}, title = {On the construction of quantum constacyclic codes}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {1}, pages = {179--190}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0296-2}, doi = {10.1007/S10623-016-0296-2}, timestamp = {Wed, 11 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YuanZKL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhengCZ17a, author = {Hao Zheng and Yanxun Chang and Junling Zhou}, title = {Large sets of Kirkman triple systems of prime power sizes}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {3}, pages = {411--423}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0315-3}, doi = {10.1007/S10623-016-0315-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhengCZ17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouC17, author = {Junling Zhou and Yanxun Chang}, title = {Bounds and constructions of t-spontaneous emission error designs}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {249--271}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0300-x}, doi = {10.1007/S10623-016-0300-X}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ZhouC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ZhouPLWM17, author = {LiMengNan Zhou and Daiyuan Peng and Hongbin Liang and ChangYuan Wang and Zheng Ma}, title = {Constructions of optimal low-hit-zone frequency hopping sequence sets}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {219--232}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0299-z}, doi = {10.1007/S10623-016-0299-Z}, timestamp = {Tue, 04 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/ZhouPLWM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.