2008 |
44 | EE | James L. Massey:
Review of Series on Arabic Origins of Cryptology.
Cryptologia 32(3): 280-283 (2008) |
2007 |
43 | EE | James L. Massey:
Book review.
IEEE Transactions on Information Theory 53(1): 441-442 (2007) |
2006 |
42 | EE | James L. Massey:
Whither Cryptography?
INDOCRYPT 2006: 1 |
2002 |
41 | | James L. Massey:
Randomness, arrays, differences and duality.
IEEE Transactions on Information Theory 48(6): 1698-1703 (2002) |
2001 |
40 | EE | James L. Massey:
The Ubiquity of Reed-Muller Codes.
AAECC 2001: 1-12 |
39 | EE | Gurgen H. Khachatrian,
Melsik K. Kuregian,
Karen R. Ispiryan,
James L. Massey:
Fast Multiplication of Integers for Public-Key Applications.
Selected Areas in Cryptography 2001: 245-254 |
1997 |
38 | EE | Carlo Harpes,
James L. Massey:
Partitioning Cryptanalysis.
FSE 1997: 13-27 |
1996 |
37 | EE | James L. Massey,
Shirlei Serconek:
Linear Complexity of Periodic Sequences: A General Theory.
CRYPTO 1996: 358-371 |
1995 |
36 | EE | Carlo Harpes,
Gerhard G. Kramer,
James L. Massey:
A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma.
EUROCRYPT 1995: 24-38 |
35 | | Douglas R. Stinson,
James L. Massey:
An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions.
J. Cryptology 8(3): 167-173 (1995) |
1994 |
34 | EE | James L. Massey,
Shirlei Serconek:
A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences.
CRYPTO 1994: 332-340 |
33 | | James L. Massey:
SAFER K-64: One Year Later.
FSE 1994: 212-241 |
32 | | M. Rupf,
James L. Massey:
Optimum sequence multisets for synchronous code-division multiple-access channels.
IEEE Transactions on Information Theory 40(4): 1261- (1994) |
1993 |
31 | | James L. Massey:
SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm.
FSE 1993: 1-17 |
30 | | Fredy D. Neeser,
James L. Massey:
Proper complex random processes with applications to information theory.
IEEE Transactions on Information Theory 39(4): 1293-1302 (1993) |
29 | | Ueli M. Maurer,
James L. Massey:
Cascade Ciphers: The Importance of Being First.
J. Cryptology 6(1): 55-61 (1993) |
1992 |
28 | | Christian Waldvogel,
James L. Massey:
The Probability Distribution of the Diffie-Hellman Key.
AUSCRYPT 1992: 492-504 |
27 | EE | Bob Blakley,
G. R. Blakley,
Agnes Hui Chan,
James L. Massey:
Threshold Schemes with Disenrollment.
CRYPTO 1992: 540-548 |
26 | EE | Xuejia Lai,
James L. Massey:
Hash Function Based on Block Ciphers.
EUROCRYPT 1992: 55-70 |
25 | EE | James L. Massey:
Linear codes with complementary duals.
Discrete Mathematics 106-107: 337-342 (1992) |
24 | | Nguyen Q. A,
László Györfi,
James L. Massey:
Constructions of binary constant-weight cyclic codes and cyclically permutable codes.
IEEE Transactions on Information Theory 38(3): 940-949 (1992) |
1991 |
23 | EE | Xuejia Lai,
James L. Massey:
Markov Ciphers and Differentail Cryptanalysis.
EUROCRYPT 1991: 17-38 |
22 | | Guy Castagnoli,
James L. Massey,
Philipp A. Schoeller,
Niklaus von Seemann:
on repeated-root cyclic codes.
IEEE Transactions on Information Theory 37(2): 337-342 (1991) |
21 | | Ueli M. Maurer,
James L. Massey:
Local Randomness in Pseudorandom Sequences.
J. Cryptology 4(2): 135-149 (1991) |
1990 |
20 | EE | Xuejia Lai,
James L. Massey:
A Proposal for a New Block Encryption Standard.
EUROCRYPT 1990: 389-404 |
1989 |
19 | EE | Ueli M. Maurer,
James L. Massey:
Perfect Local Randomness in Pseudo-Random Sequences.
CRYPTO 1989: 100-112 |
18 | EE | Hakon N. Jendal,
Yves J. B. Kuhn,
James L. Massey:
An Information-Theoretic Treatment of Homophonic Substitution.
EUROCRYPT 1989: 382-394 |
1988 |
17 | | Walter Hirt,
James L. Massey:
Capacity of the discrete-time Gaussian channel with intersymbol interference.
IEEE Transactions on Information Theory 34(3): 380-388 (1988) |
16 | | Guo-Zhen Xiao,
James L. Massey:
A spectral characterization of correlation-immune combining functions.
IEEE Transactions on Information Theory 34(3): 569- (1988) |
1987 |
15 | EE | James L. Massey,
Ueli M. Maurer,
Muzhong Wang:
Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers.
EUROCRYPT 1987: 237-247 |
14 | EE | James L. Massey:
In Memoriam Tore Herlestam (1929 - 1986).
EUROCRYPT 1987: 3-4 |
13 | | James L. Massey:
Some New Approaches to Random-Access Communication.
Performance 1987: 551-569 |
12 | | Zhen Zhang,
Toby Berger,
James L. Massey:
Some families of zero- error block codes for the two-user binary adder channel with feedback.
IEEE Transactions on Information Theory 33(5): 613-619 (1987) |
1986 |
11 | | James L. Massey,
Thomas Schaub:
Linear Complexity in Coding Theory.
Coding Theory and Applications 1986: 19-32 |
10 | | Muzhong Wang,
James L. Massey:
The Characterization of All Binary Sequences with Perfect Linear Complexity Profiles.
EUROCRYPT 1986: 35-36 |
1985 |
9 | | James L. Massey:
Guest editorial (special issue introduction).
IEEE Transactions on Information Theory 31(2): 117-118 (1985) |
8 | | James L. Massey,
Peter Mathys:
The collision channel without feedback.
IEEE Transactions on Information Theory 31(2): 192-204 (1985) |
7 | | James L. Massey:
Review of 'Theory and Practice of Error Control Codes' (Blahut, R.E.; 1983).
IEEE Transactions on Information Theory 31(4): 553- (1985) |
1984 |
6 | EE | James L. Massey,
Rainer A. Rueppel:
Linear Ciphers and Random Sequence Generators with Multiple Clocks.
EUROCRYPT 1984: 74-87 |
5 | | James L. Massey:
Information Theory, The Copernician System of Communications.
ICC (1) 1984: 159-162 |
1983 |
4 | | M. Schlatter,
James L. Massey:
Capacity of interconnected ring communication systems with unique loop-free routing.
IEEE Transactions on Information Theory 29(5): 774- (1983) |
1982 |
3 | EE | P. Schöbe,
James L. Massey:
Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem.
EUROCRYPT 1982: 289-306 |
1967 |
2 | | James L. Massey,
Michael K. Sain:
Inverse Problems in Coding, Automata, and Continuous Systems
FOCS 1967: 226-232 |
1964 |
1 | | James L. Massey:
Reversible Codes
Information and Control 7(3): 369-380 (1964) |