152 results on '"James L. Massey"'
Search Results
2. Fast Multiplication of Integers for Public-Key Applications.
3. The Ubiquity of Reed-Muller Codes.
4. Evolution of the endothelin pathway drove neural crest cell diversification
5. Review of Series on Arabic Origins of Cryptology.
6. Partitioning Cryptanalysis.
7. Regenerative pseudo-noise (PN) ranging sequences for deep-space missions.
8. Regenerative pseudo-noise-like (PNL) ranging sequences for deep-space missions.
9. Linear Complexity of Periodic Sequences: A General Theory.
10. A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma.
11. SAFER K-64: One Year Later.
12. A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences.
13. SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm.
14. The Probability Distribution of the Diffie-Hellman Key.
15. Hash Function Based on Block Ciphers.
16. Threshold Schemes with Disenrollment.
17. Randomness, arrays, differences and duality.
18. Markov Ciphers and Differential Cryptanalysis.
19. A Proposal for a New Block Encryption Standard.
20. An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions.
21. Optimum sequence multisets for synchronous code-division multiple-access channels.
22. User-separating demodulation for code-division multiple-access systems.
23. Some applications of source coding in cryptography.
24. Proper complex random processes with applications to information theory.
25. Cascade Ciphers: The Importance of Being First.
26. Linear codes with complementary duals.
27. Constructions of binary constant-weight cyclic codes and cyclically permutable codes.
28. on repeated-root cyclic codes.
29. Local Randomness in Pseudorandom Sequences.
30. Conservation of mutual and directed information.
31. The condition for a cyclic code to have a complementary dual.
32. Whither Cryptography?
33. Cooption and Specialization of Endothelin Signaling Pathways Drove Elaboration of the Neural Crest in Early Vertebrates
34. Book review.
35. Evolution of the endothelin pathway drove neural crest cell diversification
36. Some New Approaches to Random-Access Communication.
37. Information Theory, The Copernician System of Communications.
38. Linear Complexity in Coding Theory.
39. Linear Ciphers and Random Sequence Generators with Multiple Clocks.
40. Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers.
41. An Information-Theoretic Treatment of Homophonic Substitution.
42. Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem.
43. Perfect Local Randomness in Pseudo-Random Sequences.
44. Fin-fold development in paddlefish and catshark and implications for the evolution of the autopod
45. HoxD expression in the fin-fold compartment of basal gnathostomes and implications for paired appendage evolution
46. Inverse Problems in Coding, Automata, and Continuous Systems
47. Determining the burst-correcting limit of cyclic codes.
48. Capacity of interconnected ring communication systems with unique loop-free routing.
49. Capacity of the discrete-time Gaussian channel with intersymbol interference.
50. The collision channel without feedback.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.