Report date: Dec 2,2025 Conflict count: 369596 Publisher: Springer-Verlag Title count: 336 Conflict count: 5397 ========================================================== Created: 2025-07-29 02:29:33 ConfID: 8233076 CauseID: 1706175739 OtherID: 114653063 JT: Designs Codes and Cryptography MD: Mitchell,7,1-2,101,1996,Authentication Schemes, Perfect Local Randomizers, Perfect Secrecy and Secret Sharing Schemes DOI: 10.1023/A:1018052831124(Journal) (8233076-N) DOI: 10.1007/BF00125078(Journal) ========================================================== Created: 2025-07-29 02:29:31 ConfID: 8233056 CauseID: 1706175493 OtherID: 1369370046 JT: Designs Codes and Cryptography MD: de Boer,9,2,143,1996,Almost MDS Codes DOI: 10.1023/A:1018014013461(Journal) (8233056-N) DOI: 10.1007/BF00124590(Journal) ========================================================== Created: 2025-07-29 02:29:16 ConfID: 8233036 CauseID: 1706175313 OtherID: 114654279 JT: Designs Codes and Cryptography MD: Tallini,9,3,247,1996,Combinatorial Problems in Infinite Spaces DOI: 10.1023/A:1027372320267(Journal) (8233036-N) DOI: 10.1007/BF00129766(Journal) ========================================================== Created: 2025-07-29 02:29:19 ConfID: 8233017 CauseID: 1706175297 OtherID: 114790478 JT: Designs Codes and Cryptography MD: Baartmans,8,1-2,29,1996,On the Binary Codes of Steiner Triple Systems DOI: 10.1023/A:1018068422276(Journal) (8233017-N) DOI: 10.1007/BF00130567(Journal) ========================================================== Created: 2025-07-29 02:29:17 ConfID: 8233016 CauseID: 1706175288 OtherID: 1368962012 JT: Designs Codes and Cryptography MD: Van Eupen,7,3,235,1996,The Nonexistence of Ternary [50,5,32] Codes DOI: 10.1023/A:1018042823954(Journal) (8233016-N) DOI: 10.1007/BF00124514(Journal) ========================================================== Created: 2025-07-29 02:29:17 ConfID: 8232996 CauseID: 1706175218 OtherID: 113957124 JT: Designs Codes and Cryptography MD: Park,9,2,157,1996,The New Minimum Distance Bounds of Goppa Codes and Their Decoding DOI: 10.1023/A:1018066030299(Journal) (8232996-N) DOI: 10.1007/BF00124591(Journal) ========================================================== Created: 2025-07-29 02:29:17 ConfID: 8232976 CauseID: 1706175139 OtherID: 114791149 JT: Designs Codes and Cryptography MD: Gulliver,7,3,223,1996,New Good Rate (m-1)/pm Ternary and Quaternary Quasi-Cyclic Codes DOI: 10.1023/A:1018090707115(Journal) (8232976-N) DOI: 10.1007/BF00124513(Journal) ========================================================== Created: 2025-07-29 02:29:42 ConfID: 8233136 CauseID: 1706176280 OtherID: 114654279 JT: Designs Codes and Cryptography MD: Jackson,9,3,287,1996,A Construction for Multisecret Threshold Schemes DOI: 10.1023/A:1027380522085(Journal) (8233136-N) DOI: 10.1007/BF00129770(Journal) ========================================================== Created: 2025-07-29 02:29:37 ConfID: 8233116 CauseID: 1706176155 OtherID: 114790478 JT: Designs Codes and Cryptography MD: Bryant,8,1-2,103,1996,5-Cycle Systems with Holes DOI: 10.1023/A:1018028824093(Journal) (8233116-N) DOI: 10.1007/BF00130571(Journal) ========================================================== Created: 2025-07-29 02:29:32 ConfID: 8233096 CauseID: 1706175858 OtherID: 114654279 JT: Designs Codes and Cryptography MD: Jackson,9,3,267,1996,Perfect Secret Sharing Schemes on Five Participants DOI: 10.1023/A:1027328505246(Journal) (8233096-N) DOI: 10.1007/BF00129769(Journal) ========================================================== Created: 2025-07-29 02:29:20 ConfID: 8232816 CauseID: 1706174829 OtherID: 113957124 JT: Designs Codes and Cryptography MD: Roth,9,2,177,1996,Spectral-Null Codes and Null Spaces of Hadamard Submatrices DOI: 10.1023/A:1018018114369(Journal) (8232816-N) DOI: 10.1007/BF00124592(Journal) ========================================================== Created: 2025-07-29 02:29:17 ConfID: 8232797 CauseID: 1706175107 OtherID: 114653063 JT: Designs Codes and Cryptography MD: Gollmann,7,1-2,135,1996,Redundant Integer Representations and Fast Exponentiation DOI: 10.1023/A:1018013116103(Journal) (8232797-N) DOI: 10.1007/BF00125080(Journal) ========================================================== Created: 2025-07-29 02:29:17 ConfID: 8232796 CauseID: 1706174877 OtherID: 114653063 JT: Designs Codes and Cryptography MD: Beth,7,1-2,17,1996,Watching the Bhang Meter and Flying through Dirt DOI: 10.1023/A:1018092528398(Journal) (8232796-N) DOI: 10.1007/BF00125074(Journal) ========================================================== Created: 2025-07-29 02:29:20 ConfID: 8232777 CauseID: 1706175076 OtherID: 113957124 JT: Designs Codes and Cryptography MD: Buyuklieva,9,2,131,1996,Singly-Even Self-Dual Codes of Length 40 DOI: 10.1023/A:1018057829391(Journal) (8232777-N) DOI: 10.1007/BF00124589(Journal) ========================================================== Created: 2025-07-29 02:29:15 ConfID: 8232776 CauseID: 1706174819 OtherID: 1463550180 JT: Designs Codes and Cryptography MD: Assmus,9,1,7,1996,Designs and Codes: An update DOI: 10.1023/A:1027359905521(Journal) (8232776-N) DOI: 10.1007/BF00169770(Journal) ========================================================== Created: 2025-07-29 02:29:16 ConfID: 8232778 CauseID: 1706175331 OtherID: 114654279 JT: Designs Codes and Cryptography MD: Maurer,9,3,305,1996,A Non-interactive Public-Key Distribution System DOI: 10.1023/A:1027332606155(Journal) (8232778-N) DOI: 10.1007/BF00129771(Journal) ========================================================== Created: 2025-07-29 02:29:19 ConfID: 8232757 CauseID: 1706174839 OtherID: 1369995559 JT: Designs Codes and Cryptography MD: Jungnickel,8,1-2,159,1996,Codes Based on Complete Graphs DOI: 10.1023/A:1018089026819(Journal) (8232757-N) DOI: 10.1007/BF00130575(Journal) ========================================================== Created: 2025-07-29 02:29:21 ConfID: 8232756 CauseID: 1706174782 OtherID: 390924820 JT: Designs Codes and Cryptography MD: Szőnyi,8,3,327,1996,On Cyclic Caps in Projective Spaces DOI: 10.1023/A:1027307908013(Journal) (8232756-N) DOI: 10.1007/BF00173303(Journal) ========================================================== Created: 2025-07-29 02:29:20 ConfID: 8232759 CauseID: 1706175443 OtherID: 114654279 JT: Designs Codes and Cryptography MD: Huybrechts,9,3,317,1996,On c n-2.c * Geometries of Order 2 DOI: 10.1023/A:1027384622993(Journal) (8232759-N) DOI: 10.1007/BF00129772(Journal) ========================================================== Created: 2025-07-29 02:29:19 ConfID: 8232758 CauseID: 1706175349 OtherID: 113957124 JT: Designs Codes and Cryptography MD: Scheerhorn,9,2,193,1996,Dickson Polynomials, Completely Normal Polynomials and the Cyclic Module Structure of Specific Extensions of Finite Fields DOI: 10.1023/A:1018070131208(Journal) (8232758-N) DOI: 10.1007/BF00124593(Journal) ========================================================== Created: 2025-07-29 02:29:23 ConfID: 8232956 CauseID: 1706175085 OtherID: 114654279 JT: Designs Codes and Cryptography MD: Blackburn,9,3,251,1996,A Note on Sequences with the Shift and Add Property DOI: 10.1023/A:1027324404338(Journal) (8232956-N) DOI: 10.1007/BF00129767(Journal) ========================================================== Created: 2025-07-29 02:29:19 ConfID: 8232937 CauseID: 1706175455 OtherID: 114791149 JT: Designs Codes and Cryptography MD: Rees,7,3,239,1996,Combinatorial Characterizations of Authentication Codes II DOI: 10.1023/A:1018094824862(Journal) (8232937-N) DOI: 10.1007/BF00124515(Journal) ========================================================== Created: 2025-07-29 02:29:16 ConfID: 8232936 CauseID: 1706175041 OtherID: 114790478 JT: Designs Codes and Cryptography MD: Haemers,8,1-2,145,1996,Spreads in Strongly Regular Graphs DOI: 10.1023/A:1018037025910(Journal) (8232936-N) DOI: 10.1007/BF00130574(Journal) ========================================================== Created: 2025-07-29 02:29:25 ConfID: 8232917 CauseID: 1706175007 OtherID: 114653063 JT: Designs Codes and Cryptography MD: Syverson,7,1-2,27,1996,A Formal Language for Cryptographic Protocol Requirements DOI: 10.1023/A:1018069220646(Journal) (8232917-N) DOI: 10.1007/BF00125075(Journal) ========================================================== Created: 2025-07-29 02:29:23 ConfID: 8232916 CauseID: 1706174997 OtherID: 114653063 JT: Designs Codes and Cryptography MD: Scheidler,7,1-2,153,1996,Key-Exchange in Real Quadratic Congruence Function Fields DOI: 10.1023/A:1018065117011(Journal) (8232916-N) DOI: 10.1007/BF00125081(Journal) ========================================================== Created: 2025-07-29 02:29:28 ConfID: 8232896 CauseID: 1706174772 OtherID: 114791149 JT: Designs Codes and Cryptography MD: Ashikhmin,7,3,187,1996,Fast Decoding Algorithms for First Order Reed-Muller and Related Codes DOI: 10.1023/A:1018057506207(Journal) (8232896-N) DOI: 10.1007/BF00124511(Journal) ========================================================== Created: 2025-07-29 02:29:16 ConfID: 8232877 CauseID: 1706175125 OtherID: 114654279 JT: Designs Codes and Cryptography MD: Helleseth,9,3,257,1996,Codes with the Same Weight Distributions as the Goethals Codes and the Delsarte-Goethals Codes DOI: 10.1023/A:1027376421176(Journal) (8232877-N) DOI: 10.1007/BF00129768(Journal) ========================================================== Created: 2025-07-29 02:29:15 ConfID: 8232876 CauseID: 1706174768 OtherID: 114790478 JT: Designs Codes and Cryptography MD: Cameron,8,1-2,109,1996,Stories about Groups and Sequences DOI: 10.1023/A:1018080825002(Journal) (8232876-N) DOI: 10.1007/BF00130572(Journal) ========================================================== Created: 2025-07-29 02:29:54 ConfID: 8232879 CauseID: 1706175738 OtherID: 114653063 JT: Designs Codes and Cryptography MD: Nyberg,7,1-2,61,1996,Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem DOI: 10.1023/A:1018096612468(Journal) (8232879-N) DOI: 10.1007/BF00125076(Journal) ========================================================== Created: 2025-07-29 02:29:24 ConfID: 8232878 CauseID: 1706175367 OtherID: 114653063 JT: Designs Codes and Cryptography MD: Safavi-Naini,7,1-2,83,1996,Authentication Codes in Plaintext and Chosen-Content Attacks DOI: 10.1023/A:1018048713377(Journal) (8232878-N) DOI: 10.1007/BF00125077(Journal) ========================================================== Created: 2025-07-29 02:29:17 ConfID: 8232857 CauseID: 1706174921 OtherID: 114653063 JT: Designs Codes and Cryptography MD: Zhang,7,1-2,111,1996,Characterizing the Structures of Cryptographic Functions Satisfying the Propagation Criterion for Almost All Vectors DOI: 10.1023/A:1018009032032(Journal) (8232857-N) DOI: 10.1007/BF00125079(Journal) ========================================================== Created: 2025-07-29 02:29:18 ConfID: 8232856 CauseID: 1706174919 OtherID: 113957124 JT: Designs Codes and Cryptography MD: Shokrollahi,9,2,203,1996,Stickelberger Codes DOI: 10.1023/A:1018022215278(Journal) (8232856-N) DOI: 10.1007/BF00124594(Journal) ========================================================== Created: 2025-07-29 02:29:22 ConfID: 8232836 CauseID: 1706174918 OtherID: 114790478 JT: Designs Codes and Cryptography MD: Bailey,8,1-2,45,1996,Orthogonal Partitions in Designed Experiments DOI: 10.1023/A:1018072606346(Journal) (8232836-N) DOI: 10.1007/BF00130568(Journal)