×

Found 65 Documents (Results 1–65)

Security against related randomness attacks via reconstructive extractors. (English) Zbl 1376.94042

Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 23-40 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Data is a stream: security of stream-based channels. (English) Zbl 1369.94535

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 545-564 (2015).
MSC:  94A60 68P30
PDFBibTeX XMLCite
Full Text: DOI

Plaintext recovery attacks against WPA/TKIP. (English) Zbl 1382.94152

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 325-349 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms. (English) Zbl 1319.94078

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 3-26 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On symmetric encryption with distinguishable decryption failures. (English) Zbl 1321.94044

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 367-390 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Big bias hunting in Amazonia: large-scale computation and exploitation of RC4 biases (invited paper). (English) Zbl 1306.94082

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 398-419 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Related-key security for pseudorandom functions beyond the linear barrier. (English) Zbl 1343.94035

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 77-94 (2014).
MSC:  94A60 65C10
PDFBibTeX XMLCite
Full Text: DOI

Security of symmetric encryption against mass surveillance. (English) Zbl 1317.94084

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 1-19 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Related randomness attacks for public key encryption. (English) Zbl 1335.94072

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 465-482 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

ASICS: Authenticated key exchange security incorporating certification systems. (English) Zbl 1443.94089

Crampton, Jason (ed.) et al., Computer security – ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9–13, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8134, 381-399 (2013).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Programmable hash functions in the multilinear setting. (English) Zbl 1310.94145

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 513-530 (2013).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On the security of the TLS protocol: a systematic analysis. (English) Zbl 1310.94158

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 429-448 (2013).
PDFBibTeX XMLCite
Full Text: DOI

Robust encryption, revisited. (English) Zbl 1314.94068

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 352-368 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive key exchange. (English) Zbl 1314.94069

Kurosawa, Kaoru (ed.) et al., Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). Lecture Notes in Computer Science 7778, 254-271 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simple, efficient and strongly KI-secure hierarchical key assignment schemes. (English) Zbl 1312.94050

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 101-114 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A coding-theoretic approach to recovering noisy RSA keys. (English) Zbl 1292.94126

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 386-403 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

RKA security beyond the linear barrier: IBE, encryption and signatures. (English) Zbl 1292.94028

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 331-348 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Anonymous broadcast encryption: adaptive security and efficient constructions in the standard model. (English) Zbl 1290.94107

Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 206-224 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security of symmetric encryption in the presence of ciphertext fragmentation. (English) Zbl 1297.94053

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 682-699 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the joint security of encryption and signature in EMV. (English) Zbl 1292.94053

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 116-135 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Authenticated-encryption with padding: a formal security treatment. (English) Zbl 1285.94111

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 83-107 (2012).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Breaking an identity-based encryption scheme based on DHIES. (English) Zbl 1291.94042

Chen, Liqun (ed.), Cryptography and coding. 13th IMA international conference, IMACC 2011, Oxford, UK, December 12–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25515-1/pbk). Lecture Notes in Computer Science 7089, 344-355 (2011).
MSC:  94A60 13P10
PDFBibTeX XMLCite
Full Text: DOI

Tag size does matter: attacks and proofs for the TLS record protocol. (English) Zbl 1227.94060

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 372-389 (2011).
MSC:  94A60 68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

On the joint security of encryption and signature, revisited. (English) Zbl 1227.94061

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 161-178 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On cipher-dependent related-key attacks in the ideal-cipher model. (English) Zbl 1282.94030

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 128-145 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Provably secure key assignment schemes from factoring. (English) Zbl 1295.94066

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 292-309 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – EUROCRYPT 2011. 30th annual international conference on the theory and applications of cryptographic techniques, Tallinn, Estonia, May 15–19, 2011. Proceedings. (English) Zbl 1214.94003

Lecture Notes in Computer Science 6632. Berlin: Springer (ISBN 978-3-642-20464-7/pbk). xiv, 628 p. (2011).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Time-specific encryption. (English) Zbl 1291.68163

Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 1-16 (2010).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Plaintext-dependent decryption: a formal security treatment of SSH-CTR. (English) Zbl 1280.94090

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 345-361 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Building key-private public-key encryption schemes. (English) Zbl 1284.94098

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 276-292 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security and anonymity of identity-based encryption with multiple trusted authorities. (English) Zbl 1186.94465

Galbraith, Steven D. (ed.) et al., Pairing-based cryptography – Pairing 2008. Second international conference, Egham, UK, September 1–3, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85503-3/pbk). Lecture Notes in Computer Science 5209, 354-375 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Immunising CBC mode against padding oracle attacks: A formal security treatment. (English) Zbl 1180.94060

Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 340-357 (2008).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Pairing-based cryptography – Pairing 2008. Second international conference, Egham, UK, September 1–3, 2008. Proceedings. (English) Zbl 1155.94002

Lecture Notes in Computer Science 5209. Berlin: Springer (ISBN 978-3-540-85503-3/pbk). xi, 377 p. (2008).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Efficient one-round key exchange in the standard model. (English) Zbl 1279.94057

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 69-83 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Certificateless encryption schemes strongly secure in the standard model. (English) Zbl 1162.94352

Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 344-359 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Proxy signatures secure against proxy key exposure. (English) Zbl 1162.94400

Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 141-161 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Multi-key hierarchical identity-based signatures. (English) Zbl 1154.94467

Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 384-402 (2007).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptography in theory and practice: the case of encryption in IPsec. (English) Zbl 1129.94034

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 12-29 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient identity-based signatures secure in the standard model. (English) Zbl 1176.94056

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 207-222 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Modular security proofs for key agreement protocols. (English) Zbl 1154.94464

Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 549-565 (2005).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Non-interactive designated verifier proofs and undeniable signatures. (English) Zbl 1122.94048

Smart, Nigel P. (ed.), Cryptography and coding. 10th IMA international conference, Cirencester, UK, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30276-X/pbk). Lecture Notes in Computer Science 3796, 136-154 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Padding oracle attacks on CBC-mode encryption with secret and random IVs. (English) Zbl 1140.68394

Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 299-319 (2005).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

CBE from CL-PKE: a generic construction and efficient schemes. (English) Zbl 1081.94514

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 398-415 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Advances in elliptic curve cryptography. (English) Zbl 1089.94018

London Mathematical Society Lecture Note Series 317. Cambridge: Cambridge University Press (ISBN 0-521-60415-X). xvi, 281 p. (2005).
PDFBibTeX XMLCite
Full Text: DOI

Padding oracle attacks on the ISO CBC mode encryption standard. (English) Zbl 1196.94064

Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 305-323 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Concurrent signatures. (English) Zbl 1122.94412

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 287-305 (2004).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of a message authentication code due to Cary and Venkatesan. (English) Zbl 1079.68538

Roy, Bimal (ed.) et al., Fast software encryption. 11th international workshop, FSE 2004, Delhi, India, February 5–7, 2004. Revised papers. Berlin: Springer (ISBN 3-540-22171-9/pbk). Lecture Notes in Computer Science 3017, 446-453 (2004).
MSC:  68P25 68N99 94A62
PDFBibTeX XMLCite
Full Text: DOI

Key agreement using statically keyed authenticators. (English) Zbl 1103.68508

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 248-262 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Certificateless public key cryptography. (English) Zbl 1205.94072

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 452-473 (2003).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Tripartite authenticated key agreement protocols from pairings. (English) Zbl 1123.94374

Paterson, Kenneth G. (ed.), Cryptography and coding. 9th IMA international conference, Cirencester, UK, December 16–18, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20663-9/pbk). Lect. Notes Comput. Sci. 2898, 332-359 (2003).
MSC:  94A62 68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

RSA-based undeniable signatures for general moduli. (English) Zbl 1048.94511

Preneel, Bart (ed.), Topics in cryptology - CT-RSA 2002. The cryptographers’ track at the RSA conference 2002, San José, CA, USA, February 18–22, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43224-8). Lect. Notes Comput. Sci. 2271, 200-217 (2002).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

Existence of good codes with low peak-to-average power ratios for multicarrier communications. (English) Zbl 1039.94003

Blahut, Richard E. (ed.) et al., Codes, graphs, and systems. A celebration of the life and career of G. David Forney, Jr. on the occasion of his sixtieth birthday. Foreword by James L. Massey. Boston, MA: Kluwer Academic Publishers (ISBN 0-7923-7686-2/hbk). Kluwer Int. Ser. Eng. Comput. Sci. 670, 187-197 (2002).
MSC:  94A24
PDFBibTeX XMLCite

Sequences for OFDM and multi-code CDMA: Two problems in algebraic coding theory. (English) Zbl 1043.94535

Helleseth, Tor (ed.) et al., Sequences and their applications. Proceedings of the 2nd international conference (SETA’01), Bergen, Norway, May 13–17, 2001. London: Springer (ISBN 1-85233-529-7). Discrete Mathematics and Theoretical Computer Science, 46-71 (2002).
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software