Search the dblp DataBase
James L. Massey :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
James L. Massey The Ubiquity of Reed-Muller Codes. [Citation Graph (0, 0)][DBLP ] AAECC, 2001, pp:1-12 [Conf ] Christian Waldvogel , James L. Massey The Probability Distribution of the Diffie-Hellman Key. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:492-504 [Conf ] James L. Massey , Thomas Schaub Linear Complexity in Coding Theory. [Citation Graph (0, 0)][DBLP ] Coding Theory and Applications, 1986, pp:19-32 [Conf ] Bob Blakley , G. R. Blakley , Agnes Hui Chan , James L. Massey Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:540-548 [Conf ] James L. Massey , Shirlei Serconek A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:332-340 [Conf ] James L. Massey , Shirlei Serconek Linear Complexity of Periodic Sequences: A General Theory. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1996, pp:358-371 [Conf ] Ueli M. Maurer , James L. Massey Perfect Local Randomness in Pseudo-Random Sequences. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:100-112 [Conf ] Hakon N. Jendal , Yves J. B. Kuhn , James L. Massey An Information-Theoretic Treatment of Homophonic Substitution. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:382-394 [Conf ] Carlo Harpes , Gerhard G. Kramer , James L. Massey A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1995, pp:24-38 [Conf ] Xuejia Lai , James L. Massey A Proposal for a New Block Encryption Standard. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:389-404 [Conf ] Xuejia Lai , James L. Massey Markov Ciphers and Differentail Cryptanalysis. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:17-38 [Conf ] Xuejia Lai , James L. Massey Hash Function Based on Block Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:55-70 [Conf ] James L. Massey In Memoriam Tore Herlestam (1929 - 1986). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1987, pp:3-4 [Conf ] James L. Massey , Ueli M. Maurer , Muzhong Wang Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1987, pp:237-247 [Conf ] James L. Massey , Rainer A. Rueppel Linear Ciphers and Random Sequence Generators with Multiple Clocks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1984, pp:74-87 [Conf ] P. Schöbe , James L. Massey Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1982, pp:289-306 [Conf ] Muzhong Wang , James L. Massey The Characterization of All Binary Sequences with Perfect Linear Complexity Profiles. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1986, pp:35-36 [Conf ] James L. Massey , Michael K. Sain Inverse Problems in Coding, Automata, and Continuous Systems [Citation Graph (0, 0)][DBLP ] FOCS, 1967, pp:226-232 [Conf ] Carlo Harpes , James L. Massey Partitioning Cryptanalysis. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:13-27 [Conf ] James L. Massey SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1993, pp:1-17 [Conf ] James L. Massey SAFER K-64: One Year Later. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1994, pp:212-241 [Conf ] James L. Massey Information Theory, The Copernician System of Communications. [Citation Graph (0, 0)][DBLP ] ICC (1), 1984, pp:159-162 [Conf ] James L. Massey Whither Cryptography? [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:1- [Conf ] James L. Massey Some New Approaches to Random-Access Communication. [Citation Graph (0, 0)][DBLP ] Performance, 1987, pp:551-569 [Conf ] Gurgen H. Khachatrian , Melsik K. Kuregian , Karen R. Ispiryan , James L. Massey Fast Multiplication of Integers for Public-Key Applications. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:245-254 [Conf ] James L. Massey Reversible Codes [Citation Graph (0, 0)][DBLP ] Information and Control, 1964, v:7, n:3, pp:369-380 [Journal ] Ueli M. Maurer , James L. Massey Local Randomness in Pseudorandom Sequences. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1991, v:4, n:2, pp:135-149 [Journal ] Ueli M. Maurer , James L. Massey Cascade Ciphers: The Importance of Being First. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1993, v:6, n:1, pp:55-61 [Journal ] Douglas R. Stinson , James L. Massey An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1995, v:8, n:3, pp:167-173 [Journal ] Nguyen Q. A , László Györfi , James L. Massey Constructions of binary constant-weight cyclic codes and cyclically permutable codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1992, v:38, n:3, pp:940-949 [Journal ] Guy Castagnoli , James L. Massey , Philipp A. Schoeller , Niklaus von Seemann on repeated-root cyclic codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1991, v:37, n:2, pp:337-342 [Journal ] Walter Hirt , James L. Massey Capacity of the discrete-time Gaussian channel with intersymbol interference. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1988, v:34, n:3, pp:380-388 [Journal ] James L. Massey Randomness, arrays, differences and duality. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2002, v:48, n:6, pp:1698-1703 [Journal ] James L. Massey Guest editorial (special issue introduction). [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1985, v:31, n:2, pp:117-118 [Journal ] James L. Massey Review of 'Theory and Practice of Error Control Codes' (Blahut, R.E.; 1983). [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1985, v:31, n:4, pp:553-0 [Journal ] James L. Massey , Peter Mathys The collision channel without feedback. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1985, v:31, n:2, pp:192-204 [Journal ] Fredy D. Neeser , James L. Massey Proper complex random processes with applications to information theory. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1993, v:39, n:4, pp:1293-1302 [Journal ] M. Rupf , James L. Massey Optimum sequence multisets for synchronous code-division multiple-access channels. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1994, v:40, n:4, pp:1261-0 [Journal ] M. Schlatter , James L. Massey Capacity of interconnected ring communication systems with unique loop-free routing. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1983, v:29, n:5, pp:774-0 [Journal ] Guo-Zhen Xiao , James L. Massey A spectral characterization of correlation-immune combining functions. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1988, v:34, n:3, pp:569-0 [Journal ] Zhen Zhang , Toby Berger , James L. Massey Some families of zero- error block codes for the two-user binary adder channel with feedback. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1987, v:33, n:5, pp:613-619 [Journal ] James L. Massey Book review. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2007, v:53, n:1, pp:441-442 [Journal ] James L. Massey Linear codes with complementary duals. [Citation Graph (0, 0)][DBLP ] Discrete Mathematics, 1992, v:106, n:, pp:337-342 [Journal ] Search in 0.018secs, Finished in 0.019secs