Search dblp for Publications

export results for "toc:db/journals/dcc/dcc85.bht:"

 download as .bib file

@article{DBLP:journals/dcc/AlhakimN17,
  author       = {Abbas Alhakim and
                  Maher Nouiehed},
  title        = {Stretching de Bruijn sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {381--394},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0314-4},
  doi          = {10.1007/S10623-016-0314-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AlhakimN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BorgesF17,
  author       = {Joaquim Borges and
                  Cristina Fern{\'{a}}ndez{-}C{\'{o}}rdoba},
  title        = {There is exactly one {\textdollar}{\textdollar}\{{\textbackslash}mathbb
                  \{Z\}\}{\_}2\{{\textbackslash}mathbb \{Z\}\}{\_}4{\textdollar}{\textdollar}-cyclic
                  1-perfect code},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {3},
  pages        = {557--566},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0323-3},
  doi          = {10.1007/S10623-016-0323-3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BorgesF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenJL17,
  author       = {Jingyuan Chen and
                  Lijun Ji and
                  Yun Li},
  title        = {New optical orthogonal signature pattern codes with maximum collision
                  parameter 2 and weight 4},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {299--318},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0310-8},
  doi          = {10.1007/S10623-016-0310-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenMYSG17,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo},
  title        = {Strong authenticated key exchange with auxiliary inputs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {145--173},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0295-3},
  doi          = {10.1007/S10623-016-0295-3},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenMYSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenMYSGZ17,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Willy Susilo and
                  Fuchun Guo and
                  Zheng Yang},
  title        = {A note on the strong authenticated key exchange with auxiliary inputs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {175--178},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-017-0386-9},
  doi          = {10.1007/S10623-017-0386-9},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenMYSGZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ChenZ17a,
  author       = {Zongchen Chen and
                  Da Zhao},
  title        = {On symmetric BIBDs with the same 3-concurrence},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {3},
  pages        = {425--436},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0317-1},
  doi          = {10.1007/S10623-016-0317-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ChenZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CossidenteP17,
  author       = {Antonio Cossidente and
                  Francesco Pavese},
  title        = {Strongly regular graphs from classical generalized quadrangles},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {3},
  pages        = {457--470},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0318-0},
  doi          = {10.1007/S10623-016-0318-0},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CossidenteP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/CuitinoT17,
  author       = {Luis Felipe Tapia Cuiti{\~{n}}o and
                  Andrea Luigi Tironi},
  title        = {Some properties of skew codes over finite fields},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {359--380},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0311-7},
  doi          = {10.1007/S10623-016-0311-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/CuitinoT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DongP17,
  author       = {Junwu Dong and
                  Dingyi Pei},
  title        = {Construction for de Bruijn sequences with large stage},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {343--358},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0309-1},
  doi          = {10.1007/S10623-016-0309-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DongP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Egan17,
  author       = {Ronan Egan},
  title        = {On equivalence of negaperiodic Golay pairs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {3},
  pages        = {523--532},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0320-6},
  doi          = {10.1007/S10623-016-0320-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Egan17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FanX17a,
  author       = {Yun Fan and
                  Bangteng Xu},
  title        = {Nonlinear functions and difference sets on group actions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {319--341},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0312-6},
  doi          = {10.1007/S10623-016-0312-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FanX17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HagiwaraK17,
  author       = {Manabu Hagiwara and
                  Justin Kong},
  title        = {Consolidation for compact constraints and Kendall tau {LP} decodable
                  permutation codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {3},
  pages        = {483--521},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0313-5},
  doi          = {10.1007/S10623-016-0313-5},
  timestamp    = {Mon, 02 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HagiwaraK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HorakST17,
  author       = {Peter Hor{\'{a}}k and
                  Igor A. Semaev and
                  Zsolt Tuza},
  title        = {A combinatorial problem related to sparse systems of equations},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {129--144},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0294-4},
  doi          = {10.1007/S10623-016-0294-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HorakST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/IsikTW17,
  author       = {Leyla Isik and
                  Alev Topuzoglu and
                  Arne Winterhof},
  title        = {Complete mappings and Carlitz rank},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {121--128},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0293-5},
  doi          = {10.1007/S10623-016-0293-5},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/IsikTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kolomeec17,
  author       = {Nikolay Kolomeec},
  title        = {The graph of minimal distances of bent functions and its properties},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {3},
  pages        = {395--410},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0306-4},
  doi          = {10.1007/S10623-016-0306-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kolomeec17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KurosawaP17,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  title        = {Anonymous and leakage resilient {IBE} and {IPE}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {273--298},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0303-7},
  doi          = {10.1007/S10623-016-0303-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KurosawaP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kurz17,
  author       = {Sascha Kurz},
  title        = {Improved upper bounds for partial spreads},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {97--106},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0290-8},
  doi          = {10.1007/S10623-016-0290-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kurz17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeLP17,
  author       = {Kwangsu Lee and
                  Dong Hoon Lee and
                  Jong Hwan Park},
  title        = {Efficient revocable identity-based encryption via subset difference
                  methods},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {39--76},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0287-3},
  doi          = {10.1007/S10623-016-0287-3},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeLP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LiD17,
  author       = {Jianing Li and
                  Yingpu Deng},
  title        = {Nonexistence of two classes of generalized bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {3},
  pages        = {471--482},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0319-z},
  doi          = {10.1007/S10623-016-0319-Z},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/LiD17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/MartinsenMS17,
  author       = {Thor Martinsen and
                  Wilfried Meidl and
                  Pantelimon Stanica},
  title        = {Partial spread and vectorial generalized bent functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {1--13},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0283-7},
  doi          = {10.1007/S10623-016-0283-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/MartinsenMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/OtalO17,
  author       = {Kamil Otal and
                  Ferruh {\"{O}}zbudak},
  title        = {Cyclic subspace codes via subspace polynomials},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {191--204},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0297-1},
  doi          = {10.1007/S10623-016-0297-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/OtalO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/RubinW17,
  author       = {Amir Rubin and
                  Gera Weiss},
  title        = {Mapping prefer-opposite to prefer-one de Bruijn sequences},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {3},
  pages        = {547--555},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0322-4},
  doi          = {10.1007/S10623-016-0322-4},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/RubinW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ShenLFY17,
  author       = {Gang Shen and
                  Feng Liu and
                  Zhengxin Fu and
                  Bin Yu},
  title        = {Perfect contrast XOR-based visual cryptography schemes via linear
                  algebra},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {15--37},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0285-5},
  doi          = {10.1007/S10623-016-0285-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ShenLFY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Steinke17,
  author       = {G{\"{u}}nter F. Steinke},
  title        = {Collineations of finite 2-affine planes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {107--120},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0292-6},
  doi          = {10.1007/S10623-016-0292-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Steinke17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/StreyC17,
  author       = {Eleonesio Strey and
                  Sueli I. R. Costa},
  title        = {Lattices from codes over Z\({}_{\mbox{q}}\) : generalization of constructions
                  D, D' and {D} {\textasciimacron}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {77--95},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0289-1},
  doi          = {10.1007/S10623-016-0289-1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/StreyC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Tonchev17a,
  author       = {Vladimir D. Tonchev},
  title        = {Linearly embeddable designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {233--247},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0304-6},
  doi          = {10.1007/S10623-016-0304-6},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Tonchev17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TzanakisMPS17,
  author       = {Georgios Tzanakis and
                  Lucia Moura and
                  Daniel Panario and
                  Brett Stevens},
  title        = {Covering arrays from m-sequences and character sums},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {3},
  pages        = {437--456},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0316-2},
  doi          = {10.1007/S10623-016-0316-2},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/TzanakisMPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/WangZYG17,
  author       = {Xin Wang and
                  Yiwei Zhang and
                  Yiting Yang and
                  Gennian Ge},
  title        = {New bounds of permutation codes under Hamming metric and Kendall's
                  {\(\tau\)} -metric},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {3},
  pages        = {533--545},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0321-5},
  doi          = {10.1007/S10623-016-0321-5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/WangZYG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Yoshiara17,
  author       = {Satoshi Yoshiara},
  title        = {Equivalences among plateaued {APN} functions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {205--217},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0298-0},
  doi          = {10.1007/S10623-016-0298-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Yoshiara17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YuanZKL17,
  author       = {Jian Yuan and
                  Shixin Zhu and
                  Xiaoshan Kai and
                  Ping Li},
  title        = {On the construction of quantum constacyclic codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {1},
  pages        = {179--190},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0296-2},
  doi          = {10.1007/S10623-016-0296-2},
  timestamp    = {Wed, 11 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YuanZKL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhengCZ17a,
  author       = {Hao Zheng and
                  Yanxun Chang and
                  Junling Zhou},
  title        = {Large sets of Kirkman triple systems of prime power sizes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {3},
  pages        = {411--423},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0315-3},
  doi          = {10.1007/S10623-016-0315-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhengCZ17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouC17,
  author       = {Junling Zhou and
                  Yanxun Chang},
  title        = {Bounds and constructions of t-spontaneous emission error designs},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {249--271},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0300-x},
  doi          = {10.1007/S10623-016-0300-X},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ZhouPLWM17,
  author       = {LiMengNan Zhou and
                  Daiyuan Peng and
                  Hongbin Liang and
                  ChangYuan Wang and
                  Zheng Ma},
  title        = {Constructions of optimal low-hit-zone frequency hopping sequence sets},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {219--232},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0299-z},
  doi          = {10.1007/S10623-016-0299-Z},
  timestamp    = {Tue, 04 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/ZhouPLWM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}