Joos Vandewalle

Affiliations:
  • Catholic University of Leuven, Belgium


According to our database1, Joos Vandewalle authored at least 236 papers between 1974 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Awards

IEEE Fellow

IEEE Fellow 1992, "For contributions to the mathematics of nonlinear circuits and systems".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
The crucial role of mathematics in circuits, systems and signal processing research and education.
Proceedings of the Signal Processing: Algorithms, 2016

2015
Analytical representation of the state-dependent coefficients in the SDRE/SDDRE scheme for multivariable systems.
Autom., 2015

2014
QoS prediction for web service compositions using kernel-based quantile estimation with online adaptation of the constant offset.
Inf. Sci., 2014

2013

2012
Reducing the Number of Support Vectors of SVM Classifiers Using the Smoothed Separable Case Approximation.
IEEE Trans. Neural Networks Learn. Syst., 2012

Shortcuts in circuits and systems education with a case study of the Thévenin/Helmholtz and Norton/Mayer equivalents.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

Robustness of kernel based regression: Influence and weight functions.
Proceedings of the 2012 International Joint Conference on Neural Networks (IJCNN), 2012

Joint Regression and Linear Combination of Time Series for Optimal Prediction.
Proceedings of the 20th European Symposium on Artificial Neural Networks, 2012

Visualizing high dimensional datasets using parallel coordinates: Application to gene prioritization.
Proceedings of the 12th IEEE International Conference on Bioinformatics & Bioengineering, 2012

2011
Machine learning in side-channel analysis: a first study.
J. Cryptogr. Eng., 2011

Nullators and norators in circuits education: A benefit or an obstacle?
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

ISCAS 2011 special sessions on education innovations and experiences.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011

2010
Coupled Simulated Annealing.
IEEE Trans. Syst. Man Cybern. Part B, 2010

A concepts inventory for an attractive teaching approach of the mathematics of circuits and systems.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

Important questions related to the education of the mathematics of circuits and systems.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2010), May 30, 2010

2009
Critical issues and current views on teaching basic circuits and systems in electrical engineering education.
Proceedings of the 19th European Conference on Circuit Theory and Design, 2009

2008
Hardware implementation of an elliptic curve processor over GF(p) with Montgomery modular multiplier.
Int. J. Embed. Syst., 2008

2007
Super-Resolution From Unregistered and Totally Aliased Signals Using Subspace Methods.
IEEE Trans. Signal Process., 2007

Efficiently updating and tracking the dominant kernel principal components.
Neural Networks, 2007

Partial Synchronization in oscillator Arrays with Asymmetric Coupling.
Int. J. Bifurc. Chaos, 2007

State-of-the-Art and Evolution in Public Data Sets and Competitions for System Identification, Time Series Prediction and Pattern Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2007

2006
Learning of spatiotemporal behaviour in cellular neural networks.
Int. J. Circuit Theory Appl., 2006

Special Section on Nonlinear Theory and its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Multi-scroll and hypercube attractors from Josephson junctions.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2006), 2006

2005
A prewhitening-induced bound on the identification error in independent component analysis.
IEEE Trans. Circuits Syst. I Regul. Pap., 2005

Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degree <i>l</i> and order <i>k</i>.
Inf. Process. Lett., 2005

Subset based least squares subspace regression in RKHS.
Neurocomputing, 2005

Spatiotemporal pattern formation in the ACE16k CNN chip.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2005), 2005

2004
True random bit generation from a double-scroll attractor.
IEEE Trans. Circuits Syst. I Regul. Pap., 2004

Toward CNN chip-specific robustness.
IEEE Trans. Circuits Syst. I Regul. Pap., 2004

Computation of the Canonical Decomposition by Means of a Simultaneous Generalized Schur Decomposition.
SIAM J. Matrix Anal. Appl., 2004

Benchmarking Least Squares Support Vector Machine Classifiers.
Mach. Learn., 2004

Watermarking on CNN-UM for image and video authentication.
Int. J. Circuit Theory Appl., 2004

An FPGA Implementation of a Montgomery Multiplier Over GF(2^m).
Comput. Artif. Intell., 2004

A double scroll based true random bit generator.
Proceedings of the 2004 International Symposium on Circuits and Systems, 2004

A Comparison of Pruning Algorithms for Sparse Least Squares Support Vector Machines.
Proceedings of the Neural Information Processing, 11th International Conference, 2004

How to take advantage of aliasing in bandlimited signals.
Proceedings of the 2004 IEEE International Conference on Acoustics, 2004

Dimensionality Reduction in ICA and Rank-(R<sub>1</sub>, R<sub>2</sub>, ..., R<sub>N</sub>) Reduction in Multilinear Algebra.
Proceedings of the Independent Component Analysis and Blind Signal Separation, 2004

A Grassmann-Rayleigh Quotient Iteration for Dimensionality Reduction in ICA.
Proceedings of the Independent Component Analysis and Blind Signal Separation, 2004

The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
(How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions.
ACM Trans. Internet Techn., 2003

A support vector machine formulation to PCA analysis and its kernel version.
IEEE Trans. Neural Networks, 2003

A new inequality in discrete Fourier theory.
IEEE Trans. Inf. Theory, 2003

Revocable anonymous access to the Internet?
Internet Res., 2003

Hardware architectures for public key cryptography.
Integr., 2003

The MESH Block Ciphers.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

Coupled chaotic simulated annealing processes.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

Hardware Implementation of a Montgomery Modular Multiplier in a Systolic Array.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Cryptanalysis of SOBER-t32.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

Kernel PLS variants for regression.
Proceedings of the 11th European Symposium on Artificial Neural Networks, 2003

Cryptanalysis of 3-Pass HAVAL.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

Hardware Implementation of an Elliptic Curve Processor over GF(p).
Proceedings of the 14th IEEE International Conference on Application-Specific Systems, 2003

2002
Multiclass LS SVMs Moderated Outputs and Coding Decoding Schemes.
Neural Process. Lett., 2002

Bayesian Framework for Least-Squares Support Vector Machine Classifiers, Gaussian Processes, and Kernel Fisher Discriminant Analysis.
Neural Comput., 2002

Combining World Wide Web and wireless security.
Informatica (Slovenia), 2002

Special issue on fundamental and information processing aspects of neurocomputing.
Neurocomputing, 2002

Weighted least squares support vector machines: robustness and sparse approximation.
Neurocomputing, 2002

Families of scroll Grid attractors.
Int. J. Bifurc. Chaos, 2002

Applying General Access Structure to Proactive Secret Sharing Schemes.
IACR Cryptol. ePrint Arch., 2002

Applying General Access Structure to Metering Schemes.
IACR Cryptol. ePrint Arch., 2002

A note on Weak Keys of PES, IDEA and some Extended Variants.
IACR Cryptol. ePrint Arch., 2002

Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher.
IACR Cryptol. ePrint Arch., 2002

A Tangled World Wide Web of Security Issues.
First Monday, 2002

On the Security of Today's Online Electronic Banking Systems.
Comput. Secur., 2002

On a Resynchronization Weakness in a Class of Combiners with Memory.
Proceedings of the Security in Communication Networks, Third International Conference, 2002

On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem.
Proceedings of the Public Key Cryptography, 2002

On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.
Proceedings of the Progress in Cryptology, 2002

On Unconditionally Secure Distributed Oblivious Transfer.
Proceedings of the Progress in Cryptology, 2002

New Weak-Key Classes of IDEA.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Robust Cross-Validation Score Function for Non-linear Function Estimation.
Proceedings of the Artificial Neural Networks, 2002

Least Squares Support Vector Machines
World Scientific, ISBN: 978-981-4487-59-7, 2002

2001
Independent component analysis and (simultaneous) third-order tensor diagonalization.
IEEE Trans. Signal Process., 2001

Financial time series prediction using least squares support vector machines within the evidence framework.
IEEE Trans. Neural Networks, 2001

Optimal control by least squares support vector machines.
Neural Networks, 2001

Improved Long-Term Temperature Prediction by Chaining of Neural Networks.
Int. J. Neural Syst., 2001

Master-Slave Synchronization of Lur'e Systems with Time-Delay.
Int. J. Bifurc. Chaos, 2001

Intelligence and Cooperative Search by Coupled Local Minimizers.
Int. J. Bifurc. Chaos, 2001

SQUARE Attacks on Reduced-Round PES and IDEA Block Ciphers.
IACR Cryptol. ePrint Arch., 2001

New (Two-Track-)MAC Based on the Two Trails of RIPEMD.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

Artificial Neural Networks in Hydrological Watershed Modeling: Surface Flow Contribution from the Ungauged Parts of a Catchment.
Proceedings of the 13th IEEE International Conference on Tools with Artificial Intelligence, 2001

Kernel Canonical Correlation Analysis and Least Squares Support Vector Machines.
Proceedings of the Artificial Neural Networks, 2001

Producing Collisions for PANAMA.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Improved SQUARE Attacks against Reduced-Round HIEROCRYPT.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

A Memory Efficient Version of Satoh's Algorithm.
Proceedings of the Advances in Cryptology, 2001

Automatic relevance determination for Least Squares Support Vector Machines classifiers.
Proceedings of the 9th European Symposium on Artificial Neural Networks, 2001

Secure Communication for Secure Agent-Based Electronic Commerce Applications.
Proceedings of the E-Commerce Agents, 2001

Secure Meeting Scheduling with agenTA.
Proceedings of the Communications and Multimedia Security Issues of the New Century, 2001

Extended Bayesian Regression Models: A Symbiotic Application of Belief Networks and Multilayer Perceptrons for the Classification of Ovarian Tumors.
Proceedings of the Artificial Intelligence Medicine, 2001

2000
Robust local stability of multilayer recurrent neural networks.
IEEE Trans. Neural Networks Learn. Syst., 2000

Constructing fuzzy models with linguistic integrity from numerical data-AFRELI algorithm.
IEEE Trans. Fuzzy Syst., 2000

Fetal electrocardiogram extraction by blind source subspace separation.
IEEE Trans. Biomed. Eng., 2000

On the Best Rank-1 and Rank-(<i>R</i><sub>1</sub> , <i>R</i><sub>2</sub>, ... , <i>R<sub>N</sub></i>) Approximation of Higher-Order Tensors.
SIAM J. Matrix Anal. Appl., 2000

A Multilinear Singular Value Decomposition.
SIAM J. Matrix Anal. Appl., 2000

In Memoriam - Vitold Belevitch.
Int. J. Circuit Theory Appl., 2000

Chaos Synchronization: a Lagrange Programming Network Approach.
Int. J. Bifurc. Chaos, 2000

An algebraic approach to the blind identification of paraunitary filters.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Sparse approximation using least squares support vector machines.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2000

SVD-based methodologies for fetal electrocardiogram extraction.
Proceedings of the IEEE International Conference on Acoustics, 2000

Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

An algebraic ICA algorithm for 3 sources and 2 sensors.
Proceedings of the 10th European Signal Processing Conference, 2000

The K.U.Leuven competition data: a challenge for advanced neural network techniques.
Proceedings of the 8th European Symposium on Artificial Neural Networks, 2000

Sparse least squares Support Vector Machine classifiers.
Proceedings of the 8th European Symposium on Artificial Neural Networks, 2000

1999
CNN Algorithms for Video Authentication and Copyright Protection.
J. VLSI Signal Process., 1999

Training multilayer perceptron classifiers based on a modified support vector method.
IEEE Trans. Neural Networks, 1999

Lur'e systems with multilayer perceptron and recurrent neural networks: absolute stability and dissipativity.
IEEE Trans. Autom. Control., 1999

Least Squares Support Vector Machine Classifiers.
Neural Process. Lett., 1999

Embedding recurrent neural networks into predator-prey models.
Neural Networks, 1999

Chaos control using least‐squares support vector machines.
Int. J. Circuit Theory Appl., 1999

Guest editorial: Special issue on communications, information processing and control using chaos.
Int. J. Circuit Theory Appl., 1999

On the realization of n-scroll attractors.
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999

Continuous time NLq theory: absolute stability criteria.
Proceedings of the International Joint Conference Neural Networks, 1999

Multiclass least squares support vector machines.
Proceedings of the International Joint Conference Neural Networks, 1999

Linear Cryptanalysis of RC5 and RC6.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Predictive control using fuzzy models - Comparative study.
Proceedings of the 5th European Control Conference, 1999

A hybrid system for fraud detection in mobile communications.
Proceedings of the 7th European Symposium on Artificial Neural Networks, 1999

1998
On-Line Learning Fokker-Planck Machine.
Neural Process. Lett., 1998

Theory, design and applications of Cellular Neural Networks.
Int. J. Circuit Theory Appl., 1998

Invertible operations on a Cellular Neural Network Universal Machine.
Int. J. Circuit Theory Appl., 1998

Application of NL<sub>q</sub> Neural Control Theory to a Ball and Beam System.
Eur. J. Control, 1998

Setting up a Secure Web Server and Clients on an Intranet.
Proceedings of the 7th Workshop on Enabling Technologies (WETICE '98), 1998

A residual bound for the mixing matrix in ICA.
Proceedings of the 9th European Signal Processing Conference, 1998

Improved generalization ability of neurocontrollers by imposing NLq stability constraints.
Proceedings of the 6th European Symposium on Artificial Neural Networks, 1998

To stop learning using the evidence.
Proceedings of the 6th European Symposium on Artificial Neural Networks, 1998

Ultrasound medical image processing using cellular neural networks.
Proceedings of the 6th European Symposium on Artificial Neural Networks, 1998

1997
NL<sub>q</sub> theory: checking and imposing stability of recurrent neural networks for nonlinear modeling.
IEEE Trans. Signal Process., 1997

An improved stochastic gradient algorithm for principal component analysis and subspace tracking.
IEEE Trans. Signal Process., 1997

Improved methods for exponential parameter estimation in the presence of known poles and noise.
IEEE Trans. Signal Process., 1997

NL<sub>q</sub> Theory: A Neural Control Framework with Global Asymptotic Stability Criteria.
Neural Networks, 1997

How Role Based Access Control is Implemented in SESAME.
Proceedings of the 6th Workshop on Enabling Technologies (WET-ICE '97), 1997

How to trust systems.
Proceedings of the Information Security in Research and Business, 1997

Use of a Multi-Layer Perceptron to Predict Malignancy in Ovarian Tumors.
Proceedings of the Advances in Neural Information Processing Systems 10, 1997

Witness Hiding Restrictive Blind Signature Scheme.
Proceedings of the Cryptography and Coding, 1997

Robust NL<sub>q</sub> neural control theory.
Proceedings of International Conference on Neural Networks (ICNN'97), 1997

Detection of Mobile Phone Fraud Using Supervised Neural Networks: A First Prototype.
Proceedings of the Artificial Neural Networks, 1997

Efficient Electronic Cash with Restricted Privacy.
Proceedings of the Financial Cryptography, 1997

SHA: A Design for Parallel Architectures?
Proceedings of the Advances in Cryptology, 1997

Composition methods for the integration of dynamical neural networks.
Proceedings of the 5th Eurorean Symposium on Artificial Neural Networks, 1997

1996
Bandpass prefiltering for exponential data fitting with known frequency region of interest.
Signal Process., 1996

Guest Editorial.
Int. J. Circuit Theory Appl., 1996

Guest Editorial: Special Issue: Cellular Neural Networks.
Int. J. Circuit Theory Appl., 1996

Discrete Time Interconnected Cellular Neural Networks Within NLq Theory.
Int. J. Circuit Theory Appl., 1996

Cellular neural network realizations of neuron models with diverse spiking patterns.
Int. J. Circuit Theory Appl., 1996

Statistical characterization and optimization of integrated circuits based on singular value decomposition.
Proceedings of Third International Conference on Electronics, Circuits, and Systems, 1996

State-space based approximation methods for the harmonic retrieval problem in the presence of known signal poles.
Proceedings of the 1996 IEEE International Conference on Acoustics, 1996

Blind source separation by simultaneous third-order tensor diagonalization.
Proceedings of the 8th European Signal Processing Conference, 1996

An improved fully parallel stochastic gradient algorithm for subspace tracking.
Proceedings of the 8th European Signal Processing Conference, 1996

Prediction of dynamical systems with composition networks.
Proceedings of the 4th European Symposium on Artificial Neural Networks, 1996

Fast Hashing on the Pentium.
Proceedings of the Advances in Cryptology, 1996

A Restrictive Blind Signature Scheme with Applications to Electronic Cash.
Proceedings of the Communications and Multimedia Security II, 1996

A Fast Software Implementation for Arithmetic Operations in GF(2<sup>n</sup>).
Proceedings of the Advances in Cryptology, 1996

Artificial neural networks for modelling and control of non-linear systems.
Kluwer, ISBN: 978-0-7923-9678-9, 1996

1995
Efficient identification of RBF neural net models for nonlinear discrete-time multivariable dynamical systems.
Neurocomputing, 1995

A New Learning Algorithm for RBF Neural Networks with Applications to Nonlinear System Identification.
Proceedings of the 1995 IEEE International Symposium on Circuits and Systems, ISCAS 1995, Seattle, Washington, USA, April 30, 1995

Generalized Cellular Neural Networks Represented in he NL<i><sub>q</sub></i> Framework.
Proceedings of the 1995 IEEE International Symposium on Circuits and Systems, ISCAS 1995, Seattle, Washington, USA, April 30, 1995

Prepaid Electronic Cheques Using Public-Key Certificates.
Proceedings of the Cryptography and Coding, 1995

On the identification of a chaotic system by means of recurrent neural state space models.
Proceedings of International Conference on Neural Networks (ICNN'95), Perth, WA, Australia, November 27, 1995

Global asymptotic stability criteria for multilayer recurrent neural networks with applications to modelling and control.
Proceedings of International Conference on Neural Networks (ICNN'95), Perth, WA, Australia, November 27, 1995

NLq theory: unifications in the theory of neural networks, systems and control.
Proceedings of the 3rd European Symposium on Artificial Neural Networks, 1995

Adaptive signal processing with unidirectional Hebbian adaptation laws.
Proceedings of the 3rd European Symposium on Artificial Neural Networks, 1995

1994
Static and dynamic stabilizing neural controllers, applicable to transition between equilibrium points.
Neural Networks, 1994

A Jacobi-Type Systolic Algorithm for Riccati and Lyapunov Equations.
J. Parallel Distributed Comput., 1994

Locally Implementable Matrix Flows and their Application to Neural Network Learning.
J. Circuits Syst. Comput., 1994

On the design of feedforward neural networks for binary mappings.
Neurocomputing, 1994

Predictive Control of Nonlinear Systems Based on Identification by Backpropagation Networks.
Int. J. Neural Syst., 1994

A New Model of Neural Associative Memories.
Int. J. Neural Syst., 1994

Closse Approximations of Sigmoid Functions by Sum of Step for VLSI Implementation of Neural Networks.
Sci. Ann. Cuza Univ., 1994

Cellular Neural Networks: the Analogic Microprocessor?
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994

Correlation Matrices.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

VLSI complexity reduction by piece-wise approximation of the sigmoid function.
Proceedings of the 2nd European Symposium on Artificial Neural Networks, 1994

1993
A Systolic Array for SVD Updating.
SIAM J. Matrix Anal. Appl., April, 1993

A systolic array for recursive least squares computations.
IEEE Trans. Signal Process., 1993

A Rule-Based Neural Controller For Inverted Pendulum System.
Int. J. Neural Syst., 1993

A New Approach to Block Cipher Design.
Proceedings of the Fast Software Encryption, 1993

Resynchronization Weaknesses in Synchronous Stream Ciphers.
Proceedings of the Advances in Cryptology, 1993

Locally implementable learning with isospectral matrix flows.
Proceedings of the 1st European Symposium on Artificial Neural Networks, 1993

Efficient decomposition of comparison and its applications.
Proceedings of the 1st European Symposium on Artificial Neural Networks, 1993

Hash Functions Based on Block Ciphers: A Synthetic Approach.
Proceedings of the Advances in Cryptology, 1993

Weak Keys for IDEA.
Proceedings of the Advances in Cryptology, 1993

Comparison of Three Modular Reduction Functions.
Proceedings of the Advances in Cryptology, 1993

Differential Cryptanalysis of Hash Functions Based on Block Ciphers.
Proceedings of the CCS '93, 1993

1992
A Singular Value Decomposition Updating Algorithm for Subspace Tracking.
SIAM J. Matrix Anal. Appl., 1992

The generalized linear complementarity problem and an algorithm to find all its solutions.
Math. Program., 1992

Pattern Storage and Hopfield Neural Associative Memory with Hidden Structure.
Int. J. Neural Syst., 1992

A path-following method for finding multiple equilibrium points in cellular neural networks.
Int. J. Circuit Theory Appl., 1992

A Hardware Design Model for Cryptographic Algorithms.
Proceedings of the Computer Security, 1992

Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic Algorithms.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

An Attack on Two Hash Functions by Zheng-Matsumoto-Imai.
Proceedings of the Advances in Cryptology, 1992

On the Power of Memory in the Design of Collision Resistant Hash Functions.
Proceedings of the Advances in Cryptology, 1992

1991
In-place memory management of algebraic algorithms on application specific ICs.
J. VLSI Signal Process., 1991

A square root covariance algorithm for constrained recursive least squares estimation.
J. VLSI Signal Process., 1991

A note on 'Efficient numerically stabilized rank-one eigenstructure updating' [and reply].
IEEE Trans. Signal Process., 1991

A systolic algorithm for QSVD updating.
Signal Process., 1991

Jacobi-Type Algorithms for LDC and Cholesky Factorization.
J. Parallel Distributed Comput., 1991

A continuous Deformation Algorithm for DC-Analysis of Active nonlinear Circuits.
J. Circuits Syst. Comput., 1991

Boolean Functions Satisfying Higher Order Propagation Criteria.
Proceedings of the Advances in Cryptology, 1991

A Framework for the Design of One-Way Hash Functions Including Cryptanalysis of Damgård's One-Way Function Based on a Cellular Automaton.
Proceedings of the Advances in Cryptology, 1991

Collisions for Schnorr's Hash Function FFT-Hash Presented at Crypto '91.
Proceedings of the Advances in Cryptology, 1991

ISO-OSI Security Architecture.
Proceedings of the Computer Security and Industrial Cryptography, 1991

Technical Approaches to Thwart Computer Fraud.
Proceedings of the Computer Security and Industrial Cryptography, 1991

Information Authentication: Hash Functions and Digital Signatures.
Proceedings of the Computer Security and Industrial Cryptography, 1991

Cryptography Within Phase I of the EEC-RACE Programme.
Proceedings of the Computer Security and Industrial Cryptography, 1991

Total least squares problem - computational aspects and analysis.
Frontiers in applied mathematics 9, SIAM, ISBN: 978-0-89871-275-9, 1991

1990
An efficient microcode compiler for application specific DSP processors.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1990

Multichannel adaptive enhancement of the electrogastrogram.
IEEE Trans. Biomed. Eng., 1990

Recursive least squares with stabilized inverse factorization.
Signal Process., 1990

Variable dimension algorithms for solving resistive circuits.
Int. J. Circuit Theory Appl., 1990

Cryptanalysis of a fast cryptographic checksum algorithm.
Comput. Secur., 1990

Remarks on the stability of asymmetric dynamical neural networks.
Proceedings of the IJCNN 1990, 1990

Propagation Characteristics of Boolean Functions.
Proceedings of the Advances in Cryptology, 1990

Cellular Neural Networks: Dynamic Properties and Adaptive Learning Algorithm.
Proceedings of the Neural Networks, 1990

1989
On the accuracy of total least squares and least squares techniques in the presence of errors on all data.
Autom., 1989

Study of adaptive nonlinear echo canceller with Volterra expansion.
Proceedings of the IEEE International Conference on Acoustics, 1989

A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation.
Proceedings of the Advances in Cryptology, 1989

Loop Optimization in Register-Transfer Scheduling for DSP-Systems.
Proceedings of the 26th ACM/IEEE Design Automation Conference, 1989

A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang.
Proceedings of the Advances in Cryptology, 1989

1988
Security and performance optimization of a new DES data encryption chip.
IEEE J. Solid State Circuits, June, 1988

Separation of 2-D nonsingular MIMO digital filters into a cascade of 1-D filters.
IEEE Trans. Acoust. Speech Signal Process., 1988

Architectural strategies for an application-specific synchronous multiprocessor environment.
IEEE Trans. Acoust. Speech Signal Process., 1988

Computing all invariant states of a neural network.
Neural Networks, 1988

SAMURAI: A general and efficient simulated-annealing schedule with fully adaptive annealing parameters.
Integr., 1988

A geometrical approach for the identification of state space models with singular value decomposition.
Proceedings of the IEEE International Conference on Acoustics, 1988

A new structure for sub-band acoustic echo canceler.
Proceedings of the IEEE International Conference on Acoustics, 1988

Fast RSA-Hardware: Dream or Reality?
Proceedings of the Advances in Cryptology, 1988

1987
Two Methods for Optimal MECG Elimination and FECG Detection from Skin Electrode Signals.
IEEE Trans. Biomed. Eng., 1987

Security Considerations in the Design and Implementation of a new DES chip.
Proceedings of the Advances in Cryptology, 1987

Extension of Brickell's Algorithm for Breaking High Density Knapsacks.
Proceedings of the Advances in Cryptology, 1987

1986
Additional Properties in the S-Boxes of the DES.
EUROCRYPT, 1986

1985
CAD Tools for the optimized design of custom VLSI wave digital filters.
Proceedings of the IEEE International Conference on Acoustics, 1985

Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System.
Proceedings of the Advances in Cryptology, 1985

1984
A critical analysis of the security of knapsack public-key algorithms.
IEEE Trans. Inf. Theory, 1984

Cryptography: How to Attack, What to Protect?
Proceedings of the IEEE International Conference on Communications: Links for the Future, 1984

Efficient CAD tools for the coefficient optimisation of arbitrary integrated digital filters.
Proceedings of the IEEE International Conference on Acoustics, 1984

1983
Analytical Characteristics of the DES.
Proceedings of the Advances in Cryptology, 1983

1975
On the minimal spectral factorization of nonsingular positive rational matrices.
IEEE Trans. Inf. Theory, 1975

On the Calculation of the Piecewise Linear Approximation to a Discrete Function.
IEEE Trans. Computers, 1975

1974
Design of Weighted Counters with Rational Scale Using Continued Fraction Expansion.
IEEE Trans. Computers, 1974


  Loading...