Search the dblp DataBase
Ben J. M. Smeets :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jürgen Bierbrauer , Thomas Johansson , Gregory Kabatianskii , Ben J. M. Smeets On Families of Hash Functions via Geometric Codes and Concatenation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:331-342 [Conf ] Jan Åberg , Yuri M. Shtarkov , Ben J. M. Smeets Towards Understanding and Improving Escape Probabilities in PPM. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 1997, pp:22-31 [Conf ] Jan Åberg , Yuri M. Shtarkov , Ben J. M. Smeets Non-Uniform PPM and Context Tree Models. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 1998, pp:279-288 [Conf ] Nicklas Ekstrand , Bela Rathonyi , Yuri M. Shtarkov , Ben J. M. Smeets The Qualitative Modeling and Compression of the Request Sequences in ARQ Protocols. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 2001, pp:494- [Conf ] Nicklas Ekstrand , Ben J. M. Smeets Some Notes on the Context Mapping Function in Lossless Data Compression. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 2000, pp:553- [Conf ] Nicklas Ekstrand , Ben J. M. Smeets Weighting of Double Exponential Distributed Data in Lossless Image Compression. [Citation Graph (0, 0)][DBLP ] Data Compression Conference, 1998, pp:543- [Conf ] Vladimor V. Chepyzhov , Ben J. M. Smeets On A Fast Correlation Attack on Certain Stream Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:176-185 [Conf ] Thomas Johansson , Gregory Kabatianskii , Ben J. M. Smeets On the Relation between A-Codes and Codes Correcting Independent Errors. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:1-11 [Conf ] Thomas Johansson , Ben J. M. Smeets On A²-Codes Including Arbiter's Attacks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:456-460 [Conf ] Ben J. M. Smeets On the Use of the Binary Multiplying Channel in a Private Communication System. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:339-348 [Conf ] Ben J. M. Smeets , William G. Chambers Windmill Generators: A Generalization and an Observation of How Many There Are. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:325-330 [Conf ] Ben J. M. Smeets , Peter Vanroose , Zhe-xian Wan On the Construction of Authentication Codes With Secrecy and Codes Withstanding Spoofing Attacks of Order L >= 2. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:306-312 [Conf ] Valentine Afanassiev , Christian Gehrmann , Ben J. M. Smeets Fast Message Authentication Using Efficient Polynomial Evaluation. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:190-204 [Conf ] Vladimor V. Chepyzhov , Thomas Johansson , Ben J. M. Smeets A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:181-195 [Conf ] Patrik Ekdahl , Ben J. M. Smeets Incremental Authentication of Tree-Structured Documents. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:275-283 [Conf ] Gregory Kabatianskii , E. Krouk , Ben J. M. Smeets A Digital Signature Scheme Based on Random Error-Correcting Codes. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1997, pp:161-167 [Conf ] Marten van Dijk , Christian Gehrmann , Ben J. M. Smeets Unconditionally Secure Group Authentication. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 1998, v:14, n:3, pp:281-296 [Journal ] Vladimir V. Chepyzhov , Ben J. M. Smeets , Kamil Sh. Zigangirov The free distance of fixed convolutional rate 2/4 codes meets the Costello bound. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1992, v:38, n:4, pp:1360-0 [Journal ] Gregory Kabatianskii , Ben J. M. Smeets , Thomas Johansson On the cardinality of systematic authentication codes via error-correcting codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1996, v:42, n:2, pp:566-578 [Journal ] Ben J. M. Smeets Bounds on the probability of deception in multiple authentication. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1994, v:40, n:5, pp:1586-0 [Journal ] Zhe-xian Wan , Ben J. M. Smeets , Peter Vanroose On the construction of cartesian authentication codes over symplectic spaces. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1994, v:40, n:3, pp:920-0 [Journal ] Search in 0.002secs, Finished in 0.003secs