default search action
James L. Massey
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [c26]James L. Massey:
New Extensions and Applications of Welch-Bound-Equality Sequence Sets - (Invited Paper). SETA 2010: 305-308
2000 – 2009
- 2008
- [j49]James L. Massey:
Review of Series on Arabic Origins of Cryptology. Cryptologia 32(3): 280-283 (2008) - 2007
- [j48]James L. Massey, Giovanni Boscagli, Enrico Vassallo:
Regenerative pseudo-noise (PN) ranging sequences for deep-space missions. Int. J. Satell. Commun. Netw. 25(3): 285-304 (2007) - [j47]James L. Massey, Giovanni Boscagli, Enrico Vassallo:
Regenerative pseudo-noise-like (PNL) ranging sequences for deep-space missions. Int. J. Satell. Commun. Netw. 25(3): 305-322 (2007) - [j46]James L. Massey:
Book review. IEEE Trans. Inf. Theory 53(1): 441-442 (2007) - 2006
- [c25]James L. Massey:
Whither Cryptography? INDOCRYPT 2006: 1 - 2005
- [c24]James L. Massey, Peter C. Massey:
Conservation of mutual and directed information. ISIT 2005: 157-158 - 2002
- [j45]James L. Massey:
Randomness, arrays, differences and duality. IEEE Trans. Inf. Theory 48(6): 1698-1703 (2002) - 2001
- [c23]James L. Massey:
The Ubiquity of Reed-Muller Codes. AAECC 2001: 1-12 - [c22]Gurgen H. Khachatrian, Melsik K. Kuregian, Karen R. Ispiryan, James L. Massey:
Fast Multiplication of Integers for Public-Key Applications. Selected Areas in Cryptography 2001: 245-254
1990 – 1999
- 1997
- [c21]Carlo Harpes, James L. Massey:
Partitioning Cryptanalysis. FSE 1997: 13-27 - 1996
- [c20]James L. Massey, Shirlei Serconek:
Linear Complexity of Periodic Sequences: A General Theory. CRYPTO 1996: 358-371 - 1995
- [j44]Douglas R. Stinson, James L. Massey:
An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions. J. Cryptol. 8(3): 167-173 (1995) - [c19]Carlo Harpes, Gerhard Kramer, James L. Massey:
A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma. EUROCRYPT 1995: 24-38 - 1994
- [j43]Xiang Yang, James L. Massey:
The condition for a cyclic code to have a complementary dual. Discret. Math. 126(1-3): 391-393 (1994) - [j42]James L. Massey:
Some applications of source coding in cryptography. Eur. Trans. Telecommun. 5(4): 421-430 (1994) - [j41]Marcel Rupf, Felix Tarköy, James L. Massey:
User-separating demodulation for code-division multiple-access systems. IEEE J. Sel. Areas Commun. 12(5): 786-795 (1994) - [j40]Marcel Rupf, James L. Massey:
Optimum sequence multisets for synchronous code-division multiple-access channels. IEEE Trans. Inf. Theory 40(4): 1261-1266 (1994) - [c18]James L. Massey, Shirlei Serconek:
A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences. CRYPTO 1994: 332-340 - [c17]James L. Massey:
SAFER K-64: One Year Later. FSE 1994: 212-241 - 1993
- [j39]Ueli M. Maurer, James L. Massey:
Cascade Ciphers: The Importance of Being First. J. Cryptol. 6(1): 55-61 (1993) - [j38]Fredy D. Neeser, James L. Massey:
Proper complex random processes with applications to information theory. IEEE Trans. Inf. Theory 39(4): 1293-1302 (1993) - [c16]James L. Massey:
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. FSE 1993: 1-17 - 1992
- [j37]James L. Massey:
Linear codes with complementary duals. Discret. Math. 106-107: 337-342 (1992) - [j36]Nguyen Q. A, László Györfi, James L. Massey:
Constructions of binary constant-weight cyclic codes and cyclically permutable codes. IEEE Trans. Inf. Theory 38(3): 940-949 (1992) - [c15]Christian Waldvogel, James L. Massey:
The Probability Distribution of the Diffie-Hellman Key. AUSCRYPT 1992: 492-504 - [c14]Bob Blakley, G. R. Blakley, Agnes Hui Chan, James L. Massey:
Threshold Schemes with Disenrollment. CRYPTO 1992: 540-548 - [c13]Xuejia Lai, James L. Massey:
Hash Function Based on Block Ciphers. EUROCRYPT 1992: 55-70 - 1991
- [j35]Ueli M. Maurer, James L. Massey:
Local Randomness in Pseudorandom Sequences. J. Cryptol. 4(2): 135-149 (1991) - [j34]Guy Castagnoli, James L. Massey, Philipp A. Schoeller, Niklaus von Seemann:
on repeated-root cyclic codes. IEEE Trans. Inf. Theory 37(2): 337-342 (1991) - [c12]Xuejia Lai, James L. Massey, Sean Murphy:
Markov Ciphers and Differential Cryptanalysis. EUROCRYPT 1991: 17-38 - 1990
- [c11]Xuejia Lai, James L. Massey:
A Proposal for a New Block Encryption Standard. EUROCRYPT 1990: 389-404
1980 – 1989
- 1989
- [c10]Ueli M. Maurer, James L. Massey:
Perfect Local Randomness in Pseudo-Random Sequences. CRYPTO 1989: 100-112 - [c9]Hakon N. Jendal, Yves J. B. Kuhn, James L. Massey:
An Information-Theoretic Treatment of Homophonic Substitution. EUROCRYPT 1989: 382-394 - 1988
- [j33]James L. Massey:
An introduction to contemporary cryptology. Proc. IEEE 76(5): 533-549 (1988) - [j32]Walter Hirt, James L. Massey:
Capacity of the discrete-time Gaussian channel with intersymbol interference. IEEE Trans. Inf. Theory 34(3): 380-388 (1988) - [j31]Guo-Zhen Xiao, James L. Massey:
A spectral characterization of correlation-immune combining functions. IEEE Trans. Inf. Theory 34(3): 569-571 (1988) - 1987
- [j30]Zhen Zhang, Toby Berger, James L. Massey:
Some families of zero- error block codes for the two-user binary adder channel with feedback. IEEE Trans. Inf. Theory 33(5): 613-619 (1987) - [c8]James L. Massey:
In Memoriam Tore Herlestam (1929 - 1986). EUROCRYPT 1987: 3-4 - [c7]James L. Massey, Ueli M. Maurer, Muzhong Wang:
Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers. EUROCRYPT 1987: 237-247 - [c6]James L. Massey:
Some New Approaches to Random-Access Communication. Performance 1987: 551-569 - 1986
- [j29]James L. Massey:
Theory and practice of error control codes. Proc. IEEE 74(9): 1293-1294 (1986) - [c5]James L. Massey, Thomas Schaub:
Linear Complexity in Coding Theory. Coding Theory and Applications 1986: 19-32 - [i1]Muzhong Wang, James L. Massey:
The Characterization of All Binary Sequences with Perfect Linear Complexity Profiles. EUROCRYPT 1986: 35-36 - 1985
- [j28]James L. Massey:
Guest editorial (special issue introduction). IEEE Trans. Inf. Theory 31(2): 117-118 (1985) - [j27]James L. Massey, Peter Mathys:
The collision channel without feedback. IEEE Trans. Inf. Theory 31(2): 192-204 (1985) - [j26]James L. Massey:
Review of 'Theory and Practice of Error Control Codes' (Blahut, R.E.; 1983). IEEE Trans. Inf. Theory 31(4): 553-554 (1985) - 1984
- [j25]James L. Massey:
Information theory: The copernican system of communications. IEEE Commun. Mag. 22(12): 26-28 (1984) - [c4]James L. Massey, Rainer A. Rueppel:
Linear Ciphers and Random Sequence Generators with Multiple Clocks. EUROCRYPT 1984: 74-87 - [c3]James L. Massey:
Information Theory, The Copernician System of Communications. ICC (1) 1984: 159-162 - 1983
- [j24]Marcel Schlatter, James L. Massey:
Capacity of interconnected ring communication systems with unique loop-free routing. IEEE Trans. Inf. Theory 29(5): 774-778 (1983) - 1982
- [c2]P. Schöbe, James L. Massey:
Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem. EUROCRYPT 1982: 289-306 - 1981
- [j23]James L. Massey:
Capacity, Cutoff Rate, and Coding for a Direct-Detection Optical Channel. IEEE Trans. Commun. 29(11): 1615-1621 (1981) - 1980
- [j22]Hans J. Matt, James L. Massey:
Determining the burst-correcting limit of cyclic codes. IEEE Trans. Inf. Theory 26(3): 289-297 (1980)
1970 – 1979
- 1976
- [j21]James L. Massey:
Our reviewers. IEEE Trans. Inf. Theory 22(6): 642-643 (1976) - 1975
- [j20]James L. Massey:
Editorial. IEEE Trans. Inf. Theory 21(3): 249 (1975) - 1974
- [j19]James L. Massey:
On the fractional weight of distinct binary n -tuples (Corresp.). IEEE Trans. Inf. Theory 20(1): 131 (1974) - 1973
- [j18]James L. Massey, Daniel J. Costello Jr., Jørn Justesen:
Polynomial weights and code constructions. IEEE Trans. Inf. Theory 19(1): 101-110 (1973) - [j17]James L. Massey:
Review of 'Error-Correcting Codes, 2nd edn.' (Peterson, W. W., and Weldon, E. J., Jr.; 1972). IEEE Trans. Inf. Theory 19(3): 373 (1973) - 1972
- [j16]James L. Massey, Michael K. Sain, John M. Geist:
Certain infinite Markov chains and sequential decoding. Discret. Math. 3(1-3): 163-175 (1972) - [j15]James L. Massey:
Optimum Frame Synchronization. IEEE Trans. Commun. 20(2): 115-119 (1972) - [j14]James L. Massey:
Variable-length codes and the Fano metric. IEEE Trans. Inf. Theory 18(1): 196-198 (1972) - 1971
- [j13]Robert G. Gallager, James L. Massey, G. David Forney Jr.:
Arthur Kohlenberg 1924-1970 (Obituary). IEEE Trans. Inf. Theory 17(2): 126 (1971) - [j12]James L. Massey:
Review of 'An Introduction to Error-Correcting Codes' (Lin, S.; 1970). IEEE Trans. Inf. Theory 17(6): 768-769 (1971)
1960 – 1969
- 1969
- [j11]James L. Massey:
Shift-register synthesis and BCH decoding. IEEE Trans. Inf. Theory 15(1): 122-127 (1969) - 1968
- [j10]James L. Massey, Michael K. Sain:
Inverses of Linear Sequential Circuits. IEEE Trans. Computers 17(4): 330-337 (1968) - 1967
- [c1]James L. Massey, Michael K. Sain:
Inverse Problems in Coding, Automata, and Continuous Systems. SWAT 1967: 226-232 - 1966
- [j9]James L. Massey:
Note on Finite-Memory Sequential Machines. IEEE Trans. Electron. Comput. 15(4): 658-659 (1966) - [j8]James L. Massey:
Uniform codes. IEEE Trans. Inf. Theory 12(2): 132-134 (1966) - [j7]James L. Massey:
Review of 'Information Theory' (Ash, Robert; 1965). IEEE Trans. Inf. Theory 12(4): 488-489 (1966) - 1965
- [j6]James L. Massey:
Implementation of burst-correcting convolutional codes. IEEE Trans. Inf. Theory 11(3): 416-422 (1965) - [j5]James L. Massey:
Step-by-step decoding of the Bose-Chaudhuri- Hocquenghem codes. IEEE Trans. Inf. Theory 11(4): 580-585 (1965) - 1964
- [j4]James L. Massey:
Reversible Codes. Inf. Control. 7(3): 369-380 (1964) - [j3]James L. Massey, R. W. Liu:
Application of Lyapunov's direct method to the error-propagation effect in convolutional codes (Corresp.). IEEE Trans. Inf. Theory 10(3): 248-250 (1964) - [j2]James L. Massey, Ruey-Wen Liu:
Equivalence of nonlinear shift-registers. IEEE Trans. Inf. Theory 10(4): 378-379 (1964) - 1963
- [j1]W. Wesley Peterson, James L. Massey:
Coding theory. IEEE Trans. Inf. Theory 9(4): 223-229 (1963)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint