The SCEAS System
Navigation Menu

Search the dblp DataBase


Chris Charnes: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Chris Charnes, Martin Rötteler, Thomas Beth
    On Homogeneous Bent Functions. [Citation Graph (0, 0)][DBLP]
    AAECC, 2001, pp:249-259 [Conf]
  2. Hossein Ghodosi, Josef Pieprzyk, Chris Charnes, Reihaneh Safavi-Naini
    Cryptosystems for hierarchical groups. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:275-286 [Conf]
  3. Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini
    Cryptography based on transcendental numbers. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:96-107 [Conf]
  4. Chris Charnes, Josef Pieprzyk
    Linear Nonequivalence versus Nonlinearity. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:156-164 [Conf]
  5. Chris Charnes, Josef Pieprzyk
    Attacking the SL2 Hashing Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:322-330 [Conf]
  6. Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini
    Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:89-95 [Conf]
  7. Chris Charnes, Luke O'Connor, Josef Pieprzyk, Reihaneh Safavi-Naini, Yuliang Zheng
    Comments on Soviet Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1994, pp:433-438 [Conf]
  8. Reihaneh Safavi-Naini, Shahram Bakhtiari, Chris Charnes
    MRD Hashing. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:134-149 [Conf]
  9. Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini
    Secret sharing in hierarchical groups. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:81-86 [Conf]
  10. Yvo Desmedt, Reihaneh Safavi-Naini, Huaxiong Wang, Lynn Margaret Batten, Chris Charnes, Josef Pieprzyk
    Broadcast anti-jamming systems. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:35, n:2-3, pp:223-236 [Journal]
  11. Tianbing Xia, Jennifer Seberry, Josef Pieprzyk, Chris Charnes
    Homogeneous bent functions of degree n in 2n variables do not exist for nge3. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2004, v:142, n:1-3, pp:127-132 [Journal]
  12. Thomas Beth, Chris Charnes, Markus Grassl, Gernot Alber, Aldo Delgado, Michael Mussinger
    A New Class of Designs Which Protect against Quantum Jumps. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2003, v:29, n:1-3, pp:51-70 [Journal]
  13. Chris Charnes, Martin Rötteler, Thomas Beth
    Homogeneous Bent Functions, Invariants, and Designs. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2002, v:26, n:1-3, pp:139-154 [Journal]
  14. Reihaneh Safavi-Naini, Chris Charnes
    MRD Hashing. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2005, v:37, n:2, pp:229-242 [Journal]
  15. Chris Charnes, Thomas Beth
    Combinatorial aspects of jump codes. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 2005, v:294, n:1-2, pp:43-51 [Journal]
  16. Chris Charnes, Ulrich Dempwolff
    The eight dimensional ovoids over GF(5). [Citation Graph (0, 0)][DBLP]
    Math. Comput., 2001, v:70, n:234, pp:853-861 [Journal]
  17. Chris Charnes, Ulrich Dempwolff
    The translation planes of order 49 and their automorphism groups. [Citation Graph (0, 0)][DBLP]
    Math. Comput., 1998, v:67, n:223, pp:1207-1224 [Journal]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002