James L. Massey
According to our database1,
James L. Massey
authored at least 76 papers
between 1963 and 2010.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2010
New Extensions and Applications of Welch-Bound-Equality Sequence Sets - (Invited Paper).
Proceedings of the Sequences and Their Applications - SETA 2010, 2010
2008
2007
Int. J. Satell. Commun. Netw., 2007
Int. J. Satell. Commun. Netw., 2007
2006
2005
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005
2002
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
1996
Proceedings of the Advances in Cryptology, 1996
1995
An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions.
J. Cryptol., 1995
A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma.
Proceedings of the Advances in Cryptology, 1995
1994
IEEE Trans. Inf. Theory, 1994
IEEE J. Sel. Areas Commun., 1994
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994
A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences.
Proceedings of the Advances in Cryptology, 1994
1993
IEEE Trans. Inf. Theory, 1993
Proceedings of the Fast Software Encryption, 1993
1992
Constructions of binary constant-weight cyclic codes and cyclically permutable codes.
IEEE Trans. Inf. Theory, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Advances in Cryptology, 1990
1989
Proceedings of the Advances in Cryptology, 1989
Proceedings of the Advances in Cryptology, 1989
1988
IEEE Trans. Inf. Theory, 1988
IEEE Trans. Inf. Theory, 1988
1987
Some families of zero- error block codes for the two-user binary adder channel with feedback.
IEEE Trans. Inf. Theory, 1987
Some New Approaches to Random-Access Communication.
Proceedings of the Performance '87, 1987
Proceedings of the Advances in Cryptology, 1987
Proceedings of the Advances in Cryptology, 1987
1986
The Characterization of All Binary Sequences with Perfect Linear Complexity Profiles.
EUROCRYPT, 1986
Proceedings of the Coding Theory and Applications, 2nd International Colloquium, 1986
1985
IEEE Trans. Inf. Theory, 1985
1984
Information Theory, The Copernician System of Communications.
Proceedings of the IEEE International Conference on Communications: Links for the Future, 1984
Proceedings of the Advances in Cryptology: Proceedings of EUROCRYPT 84, 1984
1983
IEEE Trans. Inf. Theory, 1983
1982
Proceedings of the Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29, 1982
1981
IEEE Trans. Commun., 1981
1980
IEEE Trans. Inf. Theory, 1980
1976
1975
1974
IEEE Trans. Inf. Theory, 1974
1973
Review of 'Error-Correcting Codes, 2nd edn.' (Peterson, W. W., and Weldon, E. J., Jr.; 1972).
IEEE Trans. Inf. Theory, 1973
1972
1971
IEEE Trans. Inf. Theory, 1971
1969
1968
1967
Proceedings of the 8th Annual Symposium on Switching and Automata Theory, 1967
1966
1965
IEEE Trans. Inf. Theory, 1965
IEEE Trans. Inf. Theory, 1965
1964
Application of Lyapunov's direct method to the error-propagation effect in convolutional codes (Corresp.).
IEEE Trans. Inf. Theory, 1964
1963