default search action
BibTeX records: James L. Massey
@inproceedings{DBLP:conf/seta/Massey10, author = {James L. Massey}, editor = {Claude Carlet and Alexander Pott}, title = {New Extensions and Applications of Welch-Bound-Equality Sequence Sets - (Invited Paper)}, booktitle = {Sequences and Their Applications - {SETA} 2010 - 6th International Conference, Paris, France, September 13-17, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6338}, pages = {305--308}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15874-2\_26}, doi = {10.1007/978-3-642-15874-2\_26}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/seta/Massey10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/Massey08, author = {James L. Massey}, title = {Review of Series on Arabic Origins of Cryptology}, journal = {Cryptologia}, volume = {32}, number = {3}, pages = {280--283}, year = {2008}, url = {https://doi.org/10.1080/01611190802129104}, doi = {10.1080/01611190802129104}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/Massey08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijscn/MasseyBV07, author = {James L. Massey and Giovanni Boscagli and Enrico Vassallo}, title = {Regenerative pseudo-noise {(PN)} ranging sequences for deep-space missions}, journal = {Int. J. Satell. Commun. Netw.}, volume = {25}, number = {3}, pages = {285--304}, year = {2007}, url = {https://doi.org/10.1002/sat.877}, doi = {10.1002/SAT.877}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijscn/MasseyBV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijscn/MasseyBV07a, author = {James L. Massey and Giovanni Boscagli and Enrico Vassallo}, title = {Regenerative pseudo-noise-like {(PNL)} ranging sequences for deep-space missions}, journal = {Int. J. Satell. Commun. Netw.}, volume = {25}, number = {3}, pages = {305--322}, year = {2007}, url = {https://doi.org/10.1002/sat.876}, doi = {10.1002/SAT.876}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijscn/MasseyBV07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey07, author = {James L. Massey}, title = {Book review}, journal = {{IEEE} Trans. Inf. Theory}, volume = {53}, number = {1}, pages = {441--442}, year = {2007}, url = {https://doi.org/10.1109/TIT.2006.887061}, doi = {10.1109/TIT.2006.887061}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Massey06, author = {James L. Massey}, editor = {Rana Barua and Tanja Lange}, title = {Whither Cryptography?}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {1}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_1}, doi = {10.1007/11941378\_1}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Massey06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/MasseyM05, author = {James L. Massey and Peter C. Massey}, title = {Conservation of mutual and directed information}, booktitle = {Proceedings of the 2005 {IEEE} International Symposium on Information Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September 2005}, pages = {157--158}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ISIT.2005.1523313}, doi = {10.1109/ISIT.2005.1523313}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/MasseyM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey02, author = {James L. Massey}, title = {Randomness, arrays, differences and duality}, journal = {{IEEE} Trans. Inf. Theory}, volume = {48}, number = {6}, pages = {1698--1703}, year = {2002}, url = {https://doi.org/10.1109/TIT.2002.1003849}, doi = {10.1109/TIT.2002.1003849}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/Massey01, author = {James L. Massey}, editor = {Serdar Boztas and Igor E. Shparlinski}, title = {The Ubiquity of Reed-Muller Codes}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 14th International Symposium, AAECC-14, Melbourne, Australia November 26-30, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2227}, pages = {1--12}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45624-4\_1}, doi = {10.1007/3-540-45624-4\_1}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/Massey01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KhachatrianKIM01, author = {Gurgen H. Khachatrian and Melsik K. Kuregian and Karen R. Ispiryan and James L. Massey}, editor = {Serge Vaudenay and Amr M. Youssef}, title = {Fast Multiplication of Integers for Public-Key Applications}, booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2259}, pages = {245--254}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45537-X\_19}, doi = {10.1007/3-540-45537-X\_19}, timestamp = {Tue, 01 Jun 2021 15:22:31 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KhachatrianKIM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/HarpesM97, author = {Carlo Harpes and James L. Massey}, editor = {Eli Biham}, title = {Partitioning Cryptanalysis}, booktitle = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa, Israel, January 20-22, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1267}, pages = {13--27}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052331}, doi = {10.1007/BFB0052331}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/HarpesM97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MasseyS96, author = {James L. Massey and Shirlei Serconek}, editor = {Neal Koblitz}, title = {Linear Complexity of Periodic Sequences: {A} General Theory}, booktitle = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1109}, pages = {358--371}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68697-5\_27}, doi = {10.1007/3-540-68697-5\_27}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MasseyS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/StinsonM95, author = {Douglas R. Stinson and James L. Massey}, title = {An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear Resilient Functions}, journal = {J. Cryptol.}, volume = {8}, number = {3}, pages = {167--173}, year = {1995}, url = {https://doi.org/10.1007/BF00202271}, doi = {10.1007/BF00202271}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/StinsonM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HarpesKM95, author = {Carlo Harpes and Gerhard Kramer and James L. Massey}, editor = {Louis C. Guillou and Jean{-}Jacques Quisquater}, title = {A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma}, booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {921}, pages = {24--38}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-49264-X\_3}, doi = {10.1007/3-540-49264-X\_3}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HarpesKM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/YangM94, author = {Xiang Yang and James L. Massey}, title = {The condition for a cyclic code to have a complementary dual}, journal = {Discret. Math.}, volume = {126}, number = {1-3}, pages = {391--393}, year = {1994}, url = {https://doi.org/10.1016/0012-365X(94)90283-6}, doi = {10.1016/0012-365X(94)90283-6}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/YangM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/Massey94, author = {James L. Massey}, title = {Some applications of source coding in cryptography}, journal = {Eur. Trans. Telecommun.}, volume = {5}, number = {4}, pages = {421--430}, year = {1994}, url = {https://doi.org/10.1002/ett.4460050405}, doi = {10.1002/ETT.4460050405}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/Massey94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/RupfTM94, author = {Marcel Rupf and Felix Tark{\"{o}}y and James L. Massey}, title = {User-separating demodulation for code-division multiple-access systems}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {12}, number = {5}, pages = {786--795}, year = {1994}, url = {https://doi.org/10.1109/49.298052}, doi = {10.1109/49.298052}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/RupfTM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/RupfM94, author = {Marcel Rupf and James L. Massey}, title = {Optimum sequence multisets for synchronous code-division multiple-access channels}, journal = {{IEEE} Trans. Inf. Theory}, volume = {40}, number = {4}, pages = {1261--1266}, year = {1994}, url = {https://doi.org/10.1109/18.335940}, doi = {10.1109/18.335940}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/RupfM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MasseyS94, author = {James L. Massey and Shirlei Serconek}, editor = {Yvo Desmedt}, title = {A Fourier Transform Approach to the Linear Complexity of Nonlinearly Filtered Sequences}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {332--340}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_31}, doi = {10.1007/3-540-48658-5\_31}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MasseyS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Massey94, author = {James L. Massey}, editor = {Bart Preneel}, title = {{SAFER} {K-64:} One Year Later}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {212--241}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_17}, doi = {10.1007/3-540-60590-8\_17}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Massey94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MaurerM93, author = {Ueli M. Maurer and James L. Massey}, title = {Cascade Ciphers: The Importance of Being First}, journal = {J. Cryptol.}, volume = {6}, number = {1}, pages = {55--61}, year = {1993}, url = {https://doi.org/10.1007/BF02620231}, doi = {10.1007/BF02620231}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MaurerM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/NeeserM93, author = {Fredy D. Neeser and James L. Massey}, title = {Proper complex random processes with applications to information theory}, journal = {{IEEE} Trans. Inf. Theory}, volume = {39}, number = {4}, pages = {1293--1302}, year = {1993}, url = {https://doi.org/10.1109/18.243446}, doi = {10.1109/18.243446}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/NeeserM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Massey93, author = {James L. Massey}, editor = {Ross J. Anderson}, title = {{SAFER} {K-64:} {A} Byte-Oriented Block-Ciphering Algorithm}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {1--17}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_1}, doi = {10.1007/3-540-58108-1\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Massey93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/Massey92, author = {James L. Massey}, title = {Linear codes with complementary duals}, journal = {Discret. Math.}, volume = {106-107}, pages = {337--342}, year = {1992}, url = {https://doi.org/10.1016/0012-365X(92)90563-U}, doi = {10.1016/0012-365X(92)90563-U}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/Massey92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/AGM92, author = {Nguyen Q. A and L{\'{a}}szl{\'{o}} Gy{\"{o}}rfi and James L. Massey}, title = {Constructions of binary constant-weight cyclic codes and cyclically permutable codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {38}, number = {3}, pages = {940--949}, year = {1992}, url = {https://doi.org/10.1109/18.135636}, doi = {10.1109/18.135636}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/AGM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WaldvogelM92, author = {Christian Waldvogel and James L. Massey}, editor = {Jennifer Seberry and Yuliang Zheng}, title = {The Probability Distribution of the Diffie-Hellman Key}, booktitle = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {718}, pages = {492--504}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-57220-1\_87}, doi = {10.1007/3-540-57220-1\_87}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/WaldvogelM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BlakleyBCM92, author = {Bob Blakley and G. R. Blakley and Agnes Hui Chan and James L. Massey}, editor = {Ernest F. Brickell}, title = {Threshold Schemes with Disenrollment}, booktitle = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {740}, pages = {540--548}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-48071-4\_38}, doi = {10.1007/3-540-48071-4\_38}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BlakleyBCM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiM92, author = {Xuejia Lai and James L. Massey}, editor = {Rainer A. Rueppel}, title = {Hash Function Based on Block Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {55--70}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_5}, doi = {10.1007/3-540-47555-9\_5}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiM92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MaurerM91, author = {Ueli M. Maurer and James L. Massey}, title = {Local Randomness in Pseudorandom Sequences}, journal = {J. Cryptol.}, volume = {4}, number = {2}, pages = {135--149}, year = {1991}, url = {https://doi.org/10.1007/BF00196773}, doi = {10.1007/BF00196773}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MaurerM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/CastagnoliMSS91, author = {Guy Castagnoli and James L. Massey and Philipp A. Schoeller and Niklaus von Seemann}, title = {on repeated-root cyclic codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {37}, number = {2}, pages = {337--342}, year = {1991}, url = {https://doi.org/10.1109/18.75249}, doi = {10.1109/18.75249}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/CastagnoliMSS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiM91, author = {Xuejia Lai and James L. Massey and Sean Murphy}, editor = {Donald W. Davies}, title = {Markov Ciphers and Differential Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {17--38}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_2}, doi = {10.1007/3-540-46416-6\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiM90, author = {Xuejia Lai and James L. Massey}, editor = {Ivan Damg{\aa}rd}, title = {A Proposal for a New Block Encryption Standard}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {389--404}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_35}, doi = {10.1007/3-540-46877-3\_35}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MaurerM89, author = {Ueli M. Maurer and James L. Massey}, editor = {Gilles Brassard}, title = {Perfect Local Randomness in Pseudo-Random Sequences}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {100--112}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_11}, doi = {10.1007/0-387-34805-0\_11}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MaurerM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/JendalKM89, author = {Hakon N. Jendal and Yves J. B. Kuhn and James L. Massey}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {An Information-Theoretic Treatment of Homophonic Substitution}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {382--394}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_38}, doi = {10.1007/3-540-46885-4\_38}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/JendalKM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/Massey88, author = {James L. Massey}, title = {An introduction to contemporary cryptology}, journal = {Proc. {IEEE}}, volume = {76}, number = {5}, pages = {533--549}, year = {1988}, url = {https://doi.org/10.1109/5.4440}, doi = {10.1109/5.4440}, timestamp = {Fri, 09 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/Massey88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/HirtM88, author = {Walter Hirt and James L. Massey}, title = {Capacity of the discrete-time Gaussian channel with intersymbol interference}, journal = {{IEEE} Trans. Inf. Theory}, volume = {34}, number = {3}, pages = {380--388}, year = {1988}, url = {https://doi.org/10.1109/18.6015}, doi = {10.1109/18.6015}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/HirtM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/XiaoM88, author = {Guo{-}Zhen Xiao and James L. Massey}, title = {A spectral characterization of correlation-immune combining functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {34}, number = {3}, pages = {569--571}, year = {1988}, url = {https://doi.org/10.1109/18.6037}, doi = {10.1109/18.6037}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/XiaoM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/ZhangBM87, author = {Zhen Zhang and Toby Berger and James L. Massey}, title = {Some families of zero- error block codes for the two-user binary adder channel with feedback}, journal = {{IEEE} Trans. Inf. Theory}, volume = {33}, number = {5}, pages = {613--619}, year = {1987}, url = {https://doi.org/10.1109/TIT.1987.1057358}, doi = {10.1109/TIT.1987.1057358}, timestamp = {Thu, 15 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/ZhangBM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Massey87, author = {James L. Massey}, editor = {David Chaum and Wyn L. Price}, title = {In Memoriam Tore Herlestam {(1929} - 1986)}, booktitle = {Advances in Cryptology - {EUROCRYPT} '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {304}, pages = {3--4}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-39118-5\_1}, doi = {10.1007/3-540-39118-5\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Massey87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MasseyMW87, author = {James L. Massey and Ueli M. Maurer and Muzhong Wang}, editor = {David Chaum and Wyn L. Price}, title = {Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers}, booktitle = {Advances in Cryptology - {EUROCRYPT} '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {304}, pages = {237--247}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-39118-5\_22}, doi = {10.1007/3-540-39118-5\_22}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MasseyMW87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/performance/Massey87, author = {James L. Massey}, editor = {Pierre{-}Jacques Courtois and Guy Latouche}, title = {Some New Approaches to Random-Access Communication}, booktitle = {Performance '87, Proceedings of the 12th {IFIP} {WG} 7.3 International Symposium on Computer Performance Modelling, Measurement and Evaluation, Brussels, Belgium, 7-9 December 1987}, pages = {551--569}, publisher = {North-Holland}, year = {1987}, timestamp = {Mon, 03 Jun 2002 11:48:33 +0200}, biburl = {https://dblp.org/rec/conf/performance/Massey87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/Massey86, author = {James L. Massey}, title = {Theory and practice of error control codes}, journal = {Proc. {IEEE}}, volume = {74}, number = {9}, pages = {1293--1294}, year = {1986}, url = {https://doi.org/10.1109/PROC.1986.13626}, doi = {10.1109/PROC.1986.13626}, timestamp = {Thu, 25 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/Massey86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coding/MasseyS86, author = {James L. Massey and Thomas Schaub}, editor = {G{\'{e}}rard D. Cohen and Philippe Godlewski}, title = {Linear Complexity in Coding Theory}, booktitle = {Coding Theory and Applications, 2nd International Colloquium, Cachan-Paris, France, November 24-26, 1986, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {311}, pages = {19--32}, publisher = {Springer}, year = {1986}, url = {https://doi.org/10.1007/3-540-19368-5\_2}, doi = {10.1007/3-540-19368-5\_2}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/coding/MasseyS86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WangM86, author = {Muzhong Wang and James L. Massey}, title = {The Characterization of All Binary Sequences with Perfect Linear Complexity Profiles}, booktitle = {{EUROCRYPT}}, pages = {35--36}, year = {1986}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WangM86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey85, author = {James L. Massey}, title = {Guest editorial (special issue introduction)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {31}, number = {2}, pages = {117--118}, year = {1985}, url = {https://doi.org/10.1109/TIT.1985.1057027}, doi = {10.1109/TIT.1985.1057027}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MasseyM85, author = {James L. Massey and Peter Mathys}, title = {The collision channel without feedback}, journal = {{IEEE} Trans. Inf. Theory}, volume = {31}, number = {2}, pages = {192--204}, year = {1985}, url = {https://doi.org/10.1109/TIT.1985.1057010}, doi = {10.1109/TIT.1985.1057010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/MasseyM85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey85a, author = {James L. Massey}, title = {Review of 'Theory and Practice of Error Control Codes' (Blahut, R.E.; 1983)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {31}, number = {4}, pages = {553--554}, year = {1985}, url = {https://doi.org/10.1109/TIT.1985.1057072}, doi = {10.1109/TIT.1985.1057072}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey85a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/Massey84, author = {James L. Massey}, title = {Information theory: The copernican system of communications}, journal = {{IEEE} Commun. Mag.}, volume = {22}, number = {12}, pages = {26--28}, year = {1984}, url = {https://doi.org/10.1109/MCOM.1984.1091871}, doi = {10.1109/MCOM.1984.1091871}, timestamp = {Wed, 23 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/Massey84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MasseyR84, author = {James L. Massey and Rainer A. Rueppel}, editor = {Thomas Beth and Norbert Cot and Ingemar Ingemarsson}, title = {Linear Ciphers and Random Sequence Generators with Multiple Clocks}, booktitle = {Advances in Cryptology: Proceedings of {EUROCRYPT} 84, {A} Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {209}, pages = {74--87}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-39757-4\_8}, doi = {10.1007/3-540-39757-4\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MasseyR84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/Massey84, author = {James L. Massey}, title = {Information Theory, The Copernician System of Communications}, booktitle = {{IEEE} International Conference on Communications: Links for the Future - Science, Systems {\&} Services for Communications, {ICC} 1984, Amsterdam, The Netherlands, May 14-17, 1984, Proceedings}, pages = {159--162}, publisher = {Elsevier}, year = {1984}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/Massey84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/SchlatterM83, author = {Marcel Schlatter and James L. Massey}, title = {Capacity of interconnected ring communication systems with unique loop-free routing}, journal = {{IEEE} Trans. Inf. Theory}, volume = {29}, number = {5}, pages = {774--778}, year = {1983}, url = {https://doi.org/10.1109/TIT.1983.1056720}, doi = {10.1109/TIT.1983.1056720}, timestamp = {Thu, 26 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/SchlatterM83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SchobeM82, author = {P. Sch{\"{o}}be and James L. Massey}, editor = {Thomas Beth}, title = {Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem}, booktitle = {Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein, Germany, March 29 - April 2, 1982}, series = {Lecture Notes in Computer Science}, volume = {149}, pages = {289--306}, publisher = {Springer}, year = {1982}, url = {https://doi.org/10.1007/3-540-39466-4\_21}, doi = {10.1007/3-540-39466-4\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SchobeM82.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/Massey81, author = {James L. Massey}, title = {Capacity, Cutoff Rate, and Coding for a Direct-Detection Optical Channel}, journal = {{IEEE} Trans. Commun.}, volume = {29}, number = {11}, pages = {1615--1621}, year = {1981}, url = {https://doi.org/10.1109/TCOM.1981.1094916}, doi = {10.1109/TCOM.1981.1094916}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/Massey81.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MattM80, author = {Hans J. Matt and James L. Massey}, title = {Determining the burst-correcting limit of cyclic codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {26}, number = {3}, pages = {289--297}, year = {1980}, url = {https://doi.org/10.1109/TIT.1980.1056193}, doi = {10.1109/TIT.1980.1056193}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MattM80.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey76, author = {James L. Massey}, title = {Our reviewers}, journal = {{IEEE} Trans. Inf. Theory}, volume = {22}, number = {6}, pages = {642--643}, year = {1976}, url = {https://doi.org/10.1109/TIT.1976.1055637}, doi = {10.1109/TIT.1976.1055637}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey76.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey75, author = {James L. Massey}, title = {Editorial}, journal = {{IEEE} Trans. Inf. Theory}, volume = {21}, number = {3}, pages = {249}, year = {1975}, url = {https://doi.org/10.1109/TIT.1975.1055388}, doi = {10.1109/TIT.1975.1055388}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey75.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey74, author = {James L. Massey}, title = {On the fractional weight of distinct binary n -tuples (Corresp.)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {20}, number = {1}, pages = {131}, year = {1974}, url = {https://doi.org/10.1109/TIT.1974.1055150}, doi = {10.1109/TIT.1974.1055150}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey74.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MasseyCJ73, author = {James L. Massey and Daniel J. Costello Jr. and J{\o}rn Justesen}, title = {Polynomial weights and code constructions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {19}, number = {1}, pages = {101--110}, year = {1973}, url = {https://doi.org/10.1109/TIT.1973.1054936}, doi = {10.1109/TIT.1973.1054936}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MasseyCJ73.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey73, author = {James L. Massey}, title = {Review of 'Error-Correcting Codes, 2nd edn.' (Peterson, W. W., and Weldon, E. J., Jr.; 1972)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {19}, number = {3}, pages = {373}, year = {1973}, url = {https://doi.org/10.1109/TIT.1973.1055002}, doi = {10.1109/TIT.1973.1055002}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey73.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/MasseySG72, author = {James L. Massey and Michael K. Sain and John M. Geist}, title = {Certain infinite Markov chains and sequential decoding}, journal = {Discret. Math.}, volume = {3}, number = {1-3}, pages = {163--175}, year = {1972}, url = {https://doi.org/10.1016/0012-365X(72)90031-3}, doi = {10.1016/0012-365X(72)90031-3}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/MasseySG72.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcom/Massey72, author = {James L. Massey}, title = {Optimum Frame Synchronization}, journal = {{IEEE} Trans. Commun.}, volume = {20}, number = {2}, pages = {115--119}, year = {1972}, url = {https://doi.org/10.1109/TCOM.1972.1091127}, doi = {10.1109/TCOM.1972.1091127}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcom/Massey72.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey72, author = {James L. Massey}, title = {Variable-length codes and the Fano metric}, journal = {{IEEE} Trans. Inf. Theory}, volume = {18}, number = {1}, pages = {196--198}, year = {1972}, url = {https://doi.org/10.1109/TIT.1972.1054750}, doi = {10.1109/TIT.1972.1054750}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey72.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GallagerMF71, author = {Robert G. Gallager and James L. Massey and G. David Forney Jr.}, title = {Arthur Kohlenberg 1924-1970 (Obituary)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {17}, number = {2}, pages = {126}, year = {1971}, url = {https://doi.org/10.1109/TIT.1971.1054617}, doi = {10.1109/TIT.1971.1054617}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GallagerMF71.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey71, author = {James L. Massey}, title = {Review of 'An Introduction to Error-Correcting Codes' (Lin, S.; 1970)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {17}, number = {6}, pages = {768--769}, year = {1971}, url = {https://doi.org/10.1109/TIT.1971.1054715}, doi = {10.1109/TIT.1971.1054715}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey71.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey69, author = {James L. Massey}, title = {Shift-register synthesis and {BCH} decoding}, journal = {{IEEE} Trans. Inf. Theory}, volume = {15}, number = {1}, pages = {122--127}, year = {1969}, url = {https://doi.org/10.1109/TIT.1969.1054260}, doi = {10.1109/TIT.1969.1054260}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey69.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/MasseyS68, author = {James L. Massey and Michael K. Sain}, title = {Inverses of Linear Sequential Circuits}, journal = {{IEEE} Trans. Computers}, volume = {17}, number = {4}, pages = {330--337}, year = {1968}, url = {https://doi.org/10.1109/TC.1968.229392}, doi = {10.1109/TC.1968.229392}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/MasseyS68.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/MasseyS67, author = {James L. Massey and Michael K. Sain}, title = {Inverse Problems in Coding, Automata, and Continuous Systems}, booktitle = {8th Annual Symposium on Switching and Automata Theory, Austin, Texas, USA, October 18-20, 1967}, pages = {226--232}, publisher = {{IEEE} Computer Society}, year = {1967}, url = {https://doi.org/10.1109/FOCS.1967.17}, doi = {10.1109/FOCS.1967.17}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/MasseyS67.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Massey66, author = {James L. Massey}, title = {Note on Finite-Memory Sequential Machines}, journal = {{IEEE} Trans. Electron. Comput.}, volume = {15}, number = {4}, pages = {658--659}, year = {1966}, url = {https://doi.org/10.1109/PGEC.1966.264389}, doi = {10.1109/PGEC.1966.264389}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Massey66.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey66, author = {James L. Massey}, title = {Uniform codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {12}, number = {2}, pages = {132--134}, year = {1966}, url = {https://doi.org/10.1109/TIT.1966.1053886}, doi = {10.1109/TIT.1966.1053886}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey66.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey66a, author = {James L. Massey}, title = {Review of 'Information Theory' (Ash, Robert; 1965)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {12}, number = {4}, pages = {488--489}, year = {1966}, url = {https://doi.org/10.1109/TIT.1966.1053917}, doi = {10.1109/TIT.1966.1053917}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey66a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey65, author = {James L. Massey}, title = {Implementation of burst-correcting convolutional codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {11}, number = {3}, pages = {416--422}, year = {1965}, url = {https://doi.org/10.1109/TIT.1965.1053798}, doi = {10.1109/TIT.1965.1053798}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey65.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Massey65a, author = {James L. Massey}, title = {Step-by-step decoding of the Bose-Chaudhuri- Hocquenghem codes}, journal = {{IEEE} Trans. Inf. Theory}, volume = {11}, number = {4}, pages = {580--585}, year = {1965}, url = {https://doi.org/10.1109/TIT.1965.1053833}, doi = {10.1109/TIT.1965.1053833}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Massey65a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/Massey64, author = {James L. Massey}, title = {Reversible Codes}, journal = {Inf. Control.}, volume = {7}, number = {3}, pages = {369--380}, year = {1964}, url = {https://doi.org/10.1016/S0019-9958(64)90438-3}, doi = {10.1016/S0019-9958(64)90438-3}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/Massey64.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MasseyL64, author = {James L. Massey and R. W. Liu}, title = {Application of Lyapunov's direct method to the error-propagation effect in convolutional codes (Corresp.)}, journal = {{IEEE} Trans. Inf. Theory}, volume = {10}, number = {3}, pages = {248--250}, year = {1964}, url = {https://doi.org/10.1109/TIT.1964.1053678}, doi = {10.1109/TIT.1964.1053678}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MasseyL64.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MasseyL64a, author = {James L. Massey and Ruey{-}Wen Liu}, title = {Equivalence of nonlinear shift-registers}, journal = {{IEEE} Trans. Inf. Theory}, volume = {10}, number = {4}, pages = {378--379}, year = {1964}, url = {https://doi.org/10.1109/TIT.1964.1053690}, doi = {10.1109/TIT.1964.1053690}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MasseyL64a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/PetersonM63, author = {W. Wesley Peterson and James L. Massey}, title = {Coding theory}, journal = {{IEEE} Trans. Inf. Theory}, volume = {9}, number = {4}, pages = {223--229}, year = {1963}, url = {https://doi.org/10.1109/TIT.1963.1057847}, doi = {10.1109/TIT.1963.1057847}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/PetersonM63.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.