The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

James L. Massey: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. James L. Massey
    The Ubiquity of Reed-Muller Codes. [Citation Graph (0, 0)][DBLP]
    AAECC, 2001, pp:1-12 [Conf]
  2. Christian Waldvogel, James L. Massey
    The Probability Distribution of the Diffie-Hellman Key. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:492-504 [Conf]
  3. James L. Massey, Thomas Schaub
    Linear Complexity in Coding Theory. [Citation Graph (0, 0)][DBLP]
    Coding Theory and Applications, 1986, pp:19-32 [Conf]
  4. Bob Blakley, G. R. Blakley, Agnes Hui Chan, James L. Massey
    Threshold Schemes with Disenrollment. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1992, pp:540-548 [Conf]
  5. James L. Massey, Shirlei Serconek
    A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:332-340 [Conf]
  6. James L. Massey, Shirlei Serconek
    Linear Complexity of Periodic Sequences: A General Theory. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1996, pp:358-371 [Conf]
  7. Ueli M. Maurer, James L. Massey
    Perfect Local Randomness in Pseudo-Random Sequences. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:100-112 [Conf]
  8. Hakon N. Jendal, Yves J. B. Kuhn, James L. Massey
    An Information-Theoretic Treatment of Homophonic Substitution. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:382-394 [Conf]
  9. Carlo Harpes, Gerhard G. Kramer, James L. Massey
    A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1995, pp:24-38 [Conf]
  10. Xuejia Lai, James L. Massey
    A Proposal for a New Block Encryption Standard. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:389-404 [Conf]
  11. Xuejia Lai, James L. Massey
    Markov Ciphers and Differentail Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:17-38 [Conf]
  12. Xuejia Lai, James L. Massey
    Hash Function Based on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:55-70 [Conf]
  13. James L. Massey
    In Memoriam Tore Herlestam (1929 - 1986). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1987, pp:3-4 [Conf]
  14. James L. Massey, Ueli M. Maurer, Muzhong Wang
    Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1987, pp:237-247 [Conf]
  15. James L. Massey, Rainer A. Rueppel
    Linear Ciphers and Random Sequence Generators with Multiple Clocks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1984, pp:74-87 [Conf]
  16. P. Schöbe, James L. Massey
    Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1982, pp:289-306 [Conf]
  17. Muzhong Wang, James L. Massey
    The Characterization of All Binary Sequences with Perfect Linear Complexity Profiles. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:35-36 [Conf]
  18. James L. Massey, Michael K. Sain
    Inverse Problems in Coding, Automata, and Continuous Systems [Citation Graph (0, 0)][DBLP]
    FOCS, 1967, pp:226-232 [Conf]
  19. Carlo Harpes, James L. Massey
    Partitioning Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:13-27 [Conf]
  20. James L. Massey
    SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:1-17 [Conf]
  21. James L. Massey
    SAFER K-64: One Year Later. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:212-241 [Conf]
  22. James L. Massey
    Information Theory, The Copernician System of Communications. [Citation Graph (0, 0)][DBLP]
    ICC (1), 1984, pp:159-162 [Conf]
  23. James L. Massey
    Whither Cryptography? [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:1- [Conf]
  24. James L. Massey
    Some New Approaches to Random-Access Communication. [Citation Graph (0, 0)][DBLP]
    Performance, 1987, pp:551-569 [Conf]
  25. Gurgen H. Khachatrian, Melsik K. Kuregian, Karen R. Ispiryan, James L. Massey
    Fast Multiplication of Integers for Public-Key Applications. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2001, pp:245-254 [Conf]
  26. James L. Massey
    Reversible Codes [Citation Graph (0, 0)][DBLP]
    Information and Control, 1964, v:7, n:3, pp:369-380 [Journal]
  27. Ueli M. Maurer, James L. Massey
    Local Randomness in Pseudorandom Sequences. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1991, v:4, n:2, pp:135-149 [Journal]
  28. Ueli M. Maurer, James L. Massey
    Cascade Ciphers: The Importance of Being First. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1993, v:6, n:1, pp:55-61 [Journal]
  29. Douglas R. Stinson, James L. Massey
    An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1995, v:8, n:3, pp:167-173 [Journal]
  30. Nguyen Q. A, László Györfi, James L. Massey
    Constructions of binary constant-weight cyclic codes and cyclically permutable codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1992, v:38, n:3, pp:940-949 [Journal]
  31. Guy Castagnoli, James L. Massey, Philipp A. Schoeller, Niklaus von Seemann
    on repeated-root cyclic codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:2, pp:337-342 [Journal]
  32. Walter Hirt, James L. Massey
    Capacity of the discrete-time Gaussian channel with intersymbol interference. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1988, v:34, n:3, pp:380-388 [Journal]
  33. James L. Massey
    Randomness, arrays, differences and duality. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2002, v:48, n:6, pp:1698-1703 [Journal]
  34. James L. Massey
    Guest editorial (special issue introduction). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1985, v:31, n:2, pp:117-118 [Journal]
  35. James L. Massey
    Review of 'Theory and Practice of Error Control Codes' (Blahut, R.E.; 1983). [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1985, v:31, n:4, pp:553-0 [Journal]
  36. James L. Massey, Peter Mathys
    The collision channel without feedback. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1985, v:31, n:2, pp:192-204 [Journal]
  37. Fredy D. Neeser, James L. Massey
    Proper complex random processes with applications to information theory. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:4, pp:1293-1302 [Journal]
  38. M. Rupf, James L. Massey
    Optimum sequence multisets for synchronous code-division multiple-access channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1994, v:40, n:4, pp:1261-0 [Journal]
  39. M. Schlatter, James L. Massey
    Capacity of interconnected ring communication systems with unique loop-free routing. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1983, v:29, n:5, pp:774-0 [Journal]
  40. Guo-Zhen Xiao, James L. Massey
    A spectral characterization of correlation-immune combining functions. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1988, v:34, n:3, pp:569-0 [Journal]
  41. Zhen Zhang, Toby Berger, James L. Massey
    Some families of zero- error block codes for the two-user binary adder channel with feedback. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1987, v:33, n:5, pp:613-619 [Journal]
  42. James L. Massey
    Book review. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2007, v:53, n:1, pp:441-442 [Journal]
  43. James L. Massey
    Linear codes with complementary duals. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1992, v:106, n:, pp:337-342 [Journal]

Search in 0.018secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002