BibTeX records: James L. Massey

download as .bib file

@inproceedings{DBLP:conf/seta/Massey10,
  author       = {James L. Massey},
  editor       = {Claude Carlet and
                  Alexander Pott},
  title        = {New Extensions and Applications of Welch-Bound-Equality Sequence Sets
                  - (Invited Paper)},
  booktitle    = {Sequences and Their Applications - {SETA} 2010 - 6th International
                  Conference, Paris, France, September 13-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6338},
  pages        = {305--308},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15874-2\_26},
  doi          = {10.1007/978-3-642-15874-2\_26},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/Massey10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/Massey08,
  author       = {James L. Massey},
  title        = {Review of Series on Arabic Origins of Cryptology},
  journal      = {Cryptologia},
  volume       = {32},
  number       = {3},
  pages        = {280--283},
  year         = {2008},
  url          = {https://doi.org/10.1080/01611190802129104},
  doi          = {10.1080/01611190802129104},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/Massey08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijscn/MasseyBV07,
  author       = {James L. Massey and
                  Giovanni Boscagli and
                  Enrico Vassallo},
  title        = {Regenerative pseudo-noise {(PN)} ranging sequences for deep-space
                  missions},
  journal      = {Int. J. Satell. Commun. Netw.},
  volume       = {25},
  number       = {3},
  pages        = {285--304},
  year         = {2007},
  url          = {https://doi.org/10.1002/sat.877},
  doi          = {10.1002/SAT.877},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijscn/MasseyBV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijscn/MasseyBV07a,
  author       = {James L. Massey and
                  Giovanni Boscagli and
                  Enrico Vassallo},
  title        = {Regenerative pseudo-noise-like {(PNL)} ranging sequences for deep-space
                  missions},
  journal      = {Int. J. Satell. Commun. Netw.},
  volume       = {25},
  number       = {3},
  pages        = {305--322},
  year         = {2007},
  url          = {https://doi.org/10.1002/sat.876},
  doi          = {10.1002/SAT.876},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijscn/MasseyBV07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey07,
  author       = {James L. Massey},
  title        = {Book review},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {53},
  number       = {1},
  pages        = {441--442},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIT.2006.887061},
  doi          = {10.1109/TIT.2006.887061},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Massey06,
  author       = {James L. Massey},
  editor       = {Rana Barua and
                  Tanja Lange},
  title        = {Whither Cryptography?},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference
                  on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4329},
  pages        = {1},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11941378\_1},
  doi          = {10.1007/11941378\_1},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Massey06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/MasseyM05,
  author       = {James L. Massey and
                  Peter C. Massey},
  title        = {Conservation of mutual and directed information},
  booktitle    = {Proceedings of the 2005 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September
                  2005},
  pages        = {157--158},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISIT.2005.1523313},
  doi          = {10.1109/ISIT.2005.1523313},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/MasseyM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey02,
  author       = {James L. Massey},
  title        = {Randomness, arrays, differences and duality},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {48},
  number       = {6},
  pages        = {1698--1703},
  year         = {2002},
  url          = {https://doi.org/10.1109/TIT.2002.1003849},
  doi          = {10.1109/TIT.2002.1003849},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/Massey01,
  author       = {James L. Massey},
  editor       = {Serdar Boztas and
                  Igor E. Shparlinski},
  title        = {The Ubiquity of Reed-Muller Codes},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  14th International Symposium, AAECC-14, Melbourne, Australia November
                  26-30, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2227},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45624-4\_1},
  doi          = {10.1007/3-540-45624-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/Massey01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KhachatrianKIM01,
  author       = {Gurgen H. Khachatrian and
                  Melsik K. Kuregian and
                  Karen R. Ispiryan and
                  James L. Massey},
  editor       = {Serge Vaudenay and
                  Amr M. Youssef},
  title        = {Fast Multiplication of Integers for Public-Key Applications},
  booktitle    = {Selected Areas in Cryptography, 8th Annual International Workshop,
                  {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2259},
  pages        = {245--254},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45537-X\_19},
  doi          = {10.1007/3-540-45537-X\_19},
  timestamp    = {Tue, 01 Jun 2021 15:22:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KhachatrianKIM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/HarpesM97,
  author       = {Carlo Harpes and
                  James L. Massey},
  editor       = {Eli Biham},
  title        = {Partitioning Cryptanalysis},
  booktitle    = {Fast Software Encryption, 4th International Workshop, {FSE} '97, Haifa,
                  Israel, January 20-22, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1267},
  pages        = {13--27},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052331},
  doi          = {10.1007/BFB0052331},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/HarpesM97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MasseyS96,
  author       = {James L. Massey and
                  Shirlei Serconek},
  editor       = {Neal Koblitz},
  title        = {Linear Complexity of Periodic Sequences: {A} General Theory},
  booktitle    = {Advances in Cryptology - {CRYPTO} '96, 16th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1109},
  pages        = {358--371},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68697-5\_27},
  doi          = {10.1007/3-540-68697-5\_27},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MasseyS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/StinsonM95,
  author       = {Douglas R. Stinson and
                  James L. Massey},
  title        = {An Infinite Class of Counterexamples to a Conjecture Concerning Nonlinear
                  Resilient Functions},
  journal      = {J. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {167--173},
  year         = {1995},
  url          = {https://doi.org/10.1007/BF00202271},
  doi          = {10.1007/BF00202271},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/StinsonM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HarpesKM95,
  author       = {Carlo Harpes and
                  Gerhard Kramer and
                  James L. Massey},
  editor       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  title        = {A Generalization of Linear Cryptanalysis and the Applicability of
                  Matsui's Piling-Up Lemma},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saint-Malo,
                  France, May 21-25, 1995, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {921},
  pages        = {24--38},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-49264-X\_3},
  doi          = {10.1007/3-540-49264-X\_3},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HarpesKM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/YangM94,
  author       = {Xiang Yang and
                  James L. Massey},
  title        = {The condition for a cyclic code to have a complementary dual},
  journal      = {Discret. Math.},
  volume       = {126},
  number       = {1-3},
  pages        = {391--393},
  year         = {1994},
  url          = {https://doi.org/10.1016/0012-365X(94)90283-6},
  doi          = {10.1016/0012-365X(94)90283-6},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/YangM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ett/Massey94,
  author       = {James L. Massey},
  title        = {Some applications of source coding in cryptography},
  journal      = {Eur. Trans. Telecommun.},
  volume       = {5},
  number       = {4},
  pages        = {421--430},
  year         = {1994},
  url          = {https://doi.org/10.1002/ett.4460050405},
  doi          = {10.1002/ETT.4460050405},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ett/Massey94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/RupfTM94,
  author       = {Marcel Rupf and
                  Felix Tark{\"{o}}y and
                  James L. Massey},
  title        = {User-separating demodulation for code-division multiple-access systems},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {12},
  number       = {5},
  pages        = {786--795},
  year         = {1994},
  url          = {https://doi.org/10.1109/49.298052},
  doi          = {10.1109/49.298052},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/RupfTM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/RupfM94,
  author       = {Marcel Rupf and
                  James L. Massey},
  title        = {Optimum sequence multisets for synchronous code-division multiple-access
                  channels},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {40},
  number       = {4},
  pages        = {1261--1266},
  year         = {1994},
  url          = {https://doi.org/10.1109/18.335940},
  doi          = {10.1109/18.335940},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/RupfM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MasseyS94,
  author       = {James L. Massey and
                  Shirlei Serconek},
  editor       = {Yvo Desmedt},
  title        = {A Fourier Transform Approach to the Linear Complexity of Nonlinearly
                  Filtered Sequences},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {332--340},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_31},
  doi          = {10.1007/3-540-48658-5\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MasseyS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Massey94,
  author       = {James L. Massey},
  editor       = {Bart Preneel},
  title        = {{SAFER} {K-64:} One Year Later},
  booktitle    = {Fast Software Encryption: Second International Workshop. Leuven, Belgium,
                  14-16 December 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1008},
  pages        = {212--241},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-60590-8\_17},
  doi          = {10.1007/3-540-60590-8\_17},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Massey94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MaurerM93,
  author       = {Ueli M. Maurer and
                  James L. Massey},
  title        = {Cascade Ciphers: The Importance of Being First},
  journal      = {J. Cryptol.},
  volume       = {6},
  number       = {1},
  pages        = {55--61},
  year         = {1993},
  url          = {https://doi.org/10.1007/BF02620231},
  doi          = {10.1007/BF02620231},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MaurerM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/NeeserM93,
  author       = {Fredy D. Neeser and
                  James L. Massey},
  title        = {Proper complex random processes with applications to information theory},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {39},
  number       = {4},
  pages        = {1293--1302},
  year         = {1993},
  url          = {https://doi.org/10.1109/18.243446},
  doi          = {10.1109/18.243446},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/NeeserM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Massey93,
  author       = {James L. Massey},
  editor       = {Ross J. Anderson},
  title        = {{SAFER} {K-64:} {A} Byte-Oriented Block-Ciphering Algorithm},
  booktitle    = {Fast Software Encryption, Cambridge Security Workshop, Cambridge,
                  UK, December 9-11, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {809},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-58108-1\_1},
  doi          = {10.1007/3-540-58108-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Massey93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/Massey92,
  author       = {James L. Massey},
  title        = {Linear codes with complementary duals},
  journal      = {Discret. Math.},
  volume       = {106-107},
  pages        = {337--342},
  year         = {1992},
  url          = {https://doi.org/10.1016/0012-365X(92)90563-U},
  doi          = {10.1016/0012-365X(92)90563-U},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/Massey92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/AGM92,
  author       = {Nguyen Q. A and
                  L{\'{a}}szl{\'{o}} Gy{\"{o}}rfi and
                  James L. Massey},
  title        = {Constructions of binary constant-weight cyclic codes and cyclically
                  permutable codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {38},
  number       = {3},
  pages        = {940--949},
  year         = {1992},
  url          = {https://doi.org/10.1109/18.135636},
  doi          = {10.1109/18.135636},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/AGM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WaldvogelM92,
  author       = {Christian Waldvogel and
                  James L. Massey},
  editor       = {Jennifer Seberry and
                  Yuliang Zheng},
  title        = {The Probability Distribution of the Diffie-Hellman Key},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and
                  Application of Cryptographic Techniques, Gold Coast, Queensland, Australia,
                  December 13-16, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {718},
  pages        = {492--504},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-57220-1\_87},
  doi          = {10.1007/3-540-57220-1\_87},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WaldvogelM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BlakleyBCM92,
  author       = {Bob Blakley and
                  G. R. Blakley and
                  Agnes Hui Chan and
                  James L. Massey},
  editor       = {Ernest F. Brickell},
  title        = {Threshold Schemes with Disenrollment},
  booktitle    = {Advances in Cryptology - {CRYPTO} '92, 12th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {740},
  pages        = {540--548},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-48071-4\_38},
  doi          = {10.1007/3-540-48071-4\_38},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BlakleyBCM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiM92,
  author       = {Xuejia Lai and
                  James L. Massey},
  editor       = {Rainer A. Rueppel},
  title        = {Hash Function Based on Block Ciphers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {55--70},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_5},
  doi          = {10.1007/3-540-47555-9\_5},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiM92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/MaurerM91,
  author       = {Ueli M. Maurer and
                  James L. Massey},
  title        = {Local Randomness in Pseudorandom Sequences},
  journal      = {J. Cryptol.},
  volume       = {4},
  number       = {2},
  pages        = {135--149},
  year         = {1991},
  url          = {https://doi.org/10.1007/BF00196773},
  doi          = {10.1007/BF00196773},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/MaurerM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/CastagnoliMSS91,
  author       = {Guy Castagnoli and
                  James L. Massey and
                  Philipp A. Schoeller and
                  Niklaus von Seemann},
  title        = {on repeated-root cyclic codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {37},
  number       = {2},
  pages        = {337--342},
  year         = {1991},
  url          = {https://doi.org/10.1109/18.75249},
  doi          = {10.1109/18.75249},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/CastagnoliMSS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiM91,
  author       = {Xuejia Lai and
                  James L. Massey and
                  Sean Murphy},
  editor       = {Donald W. Davies},
  title        = {Markov Ciphers and Differential Cryptanalysis},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {17--38},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_2},
  doi          = {10.1007/3-540-46416-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiM90,
  author       = {Xuejia Lai and
                  James L. Massey},
  editor       = {Ivan Damg{\aa}rd},
  title        = {A Proposal for a New Block Encryption Standard},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {389--404},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_35},
  doi          = {10.1007/3-540-46877-3\_35},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MaurerM89,
  author       = {Ueli M. Maurer and
                  James L. Massey},
  editor       = {Gilles Brassard},
  title        = {Perfect Local Randomness in Pseudo-Random Sequences},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {100--112},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_11},
  doi          = {10.1007/0-387-34805-0\_11},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MaurerM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/JendalKM89,
  author       = {Hakon N. Jendal and
                  Yves J. B. Kuhn and
                  James L. Massey},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {An Information-Theoretic Treatment of Homophonic Substitution},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {382--394},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_38},
  doi          = {10.1007/3-540-46885-4\_38},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/JendalKM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/Massey88,
  author       = {James L. Massey},
  title        = {An introduction to contemporary cryptology},
  journal      = {Proc. {IEEE}},
  volume       = {76},
  number       = {5},
  pages        = {533--549},
  year         = {1988},
  url          = {https://doi.org/10.1109/5.4440},
  doi          = {10.1109/5.4440},
  timestamp    = {Fri, 09 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/Massey88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/HirtM88,
  author       = {Walter Hirt and
                  James L. Massey},
  title        = {Capacity of the discrete-time Gaussian channel with intersymbol interference},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {34},
  number       = {3},
  pages        = {380--388},
  year         = {1988},
  url          = {https://doi.org/10.1109/18.6015},
  doi          = {10.1109/18.6015},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/HirtM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/XiaoM88,
  author       = {Guo{-}Zhen Xiao and
                  James L. Massey},
  title        = {A spectral characterization of correlation-immune combining functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {34},
  number       = {3},
  pages        = {569--571},
  year         = {1988},
  url          = {https://doi.org/10.1109/18.6037},
  doi          = {10.1109/18.6037},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/XiaoM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/ZhangBM87,
  author       = {Zhen Zhang and
                  Toby Berger and
                  James L. Massey},
  title        = {Some families of zero- error block codes for the two-user binary adder
                  channel with feedback},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {33},
  number       = {5},
  pages        = {613--619},
  year         = {1987},
  url          = {https://doi.org/10.1109/TIT.1987.1057358},
  doi          = {10.1109/TIT.1987.1057358},
  timestamp    = {Thu, 15 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/ZhangBM87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Massey87,
  author       = {James L. Massey},
  editor       = {David Chaum and
                  Wyn L. Price},
  title        = {In Memoriam Tore Herlestam {(1929} - 1986)},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '87, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Amsterdam, The Netherlands,
                  April 13-15, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {304},
  pages        = {3--4},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-39118-5\_1},
  doi          = {10.1007/3-540-39118-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Massey87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MasseyMW87,
  author       = {James L. Massey and
                  Ueli M. Maurer and
                  Muzhong Wang},
  editor       = {David Chaum and
                  Wyn L. Price},
  title        = {Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear
                  Ciphers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '87, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Amsterdam, The Netherlands,
                  April 13-15, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {304},
  pages        = {237--247},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-39118-5\_22},
  doi          = {10.1007/3-540-39118-5\_22},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MasseyMW87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/performance/Massey87,
  author       = {James L. Massey},
  editor       = {Pierre{-}Jacques Courtois and
                  Guy Latouche},
  title        = {Some New Approaches to Random-Access Communication},
  booktitle    = {Performance '87, Proceedings of the 12th {IFIP} {WG} 7.3 International
                  Symposium on Computer Performance Modelling, Measurement and Evaluation,
                  Brussels, Belgium, 7-9 December 1987},
  pages        = {551--569},
  publisher    = {North-Holland},
  year         = {1987},
  timestamp    = {Mon, 03 Jun 2002 11:48:33 +0200},
  biburl       = {https://dblp.org/rec/conf/performance/Massey87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/Massey86,
  author       = {James L. Massey},
  title        = {Theory and practice of error control codes},
  journal      = {Proc. {IEEE}},
  volume       = {74},
  number       = {9},
  pages        = {1293--1294},
  year         = {1986},
  url          = {https://doi.org/10.1109/PROC.1986.13626},
  doi          = {10.1109/PROC.1986.13626},
  timestamp    = {Thu, 25 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/Massey86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coding/MasseyS86,
  author       = {James L. Massey and
                  Thomas Schaub},
  editor       = {G{\'{e}}rard D. Cohen and
                  Philippe Godlewski},
  title        = {Linear Complexity in Coding Theory},
  booktitle    = {Coding Theory and Applications, 2nd International Colloquium, Cachan-Paris,
                  France, November 24-26, 1986, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {311},
  pages        = {19--32},
  publisher    = {Springer},
  year         = {1986},
  url          = {https://doi.org/10.1007/3-540-19368-5\_2},
  doi          = {10.1007/3-540-19368-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/coding/MasseyS86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/WangM86,
  author       = {Muzhong Wang and
                  James L. Massey},
  title        = {The Characterization of All Binary Sequences with Perfect Linear Complexity
                  Profiles},
  booktitle    = {{EUROCRYPT}},
  pages        = {35--36},
  year         = {1986},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/WangM86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey85,
  author       = {James L. Massey},
  title        = {Guest editorial (special issue introduction)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {31},
  number       = {2},
  pages        = {117--118},
  year         = {1985},
  url          = {https://doi.org/10.1109/TIT.1985.1057027},
  doi          = {10.1109/TIT.1985.1057027},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MasseyM85,
  author       = {James L. Massey and
                  Peter Mathys},
  title        = {The collision channel without feedback},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {31},
  number       = {2},
  pages        = {192--204},
  year         = {1985},
  url          = {https://doi.org/10.1109/TIT.1985.1057010},
  doi          = {10.1109/TIT.1985.1057010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/MasseyM85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey85a,
  author       = {James L. Massey},
  title        = {Review of 'Theory and Practice of Error Control Codes' (Blahut, R.E.;
                  1983)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {31},
  number       = {4},
  pages        = {553--554},
  year         = {1985},
  url          = {https://doi.org/10.1109/TIT.1985.1057072},
  doi          = {10.1109/TIT.1985.1057072},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey85a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/Massey84,
  author       = {James L. Massey},
  title        = {Information theory: The copernican system of communications},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {22},
  number       = {12},
  pages        = {26--28},
  year         = {1984},
  url          = {https://doi.org/10.1109/MCOM.1984.1091871},
  doi          = {10.1109/MCOM.1984.1091871},
  timestamp    = {Wed, 23 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/Massey84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MasseyR84,
  author       = {James L. Massey and
                  Rainer A. Rueppel},
  editor       = {Thomas Beth and
                  Norbert Cot and
                  Ingemar Ingemarsson},
  title        = {Linear Ciphers and Random Sequence Generators with Multiple Clocks},
  booktitle    = {Advances in Cryptology: Proceedings of {EUROCRYPT} 84, {A} Workshop
                  on the Theory and Application of of Cryptographic Techniques, Paris,
                  France, April 9-11, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {209},
  pages        = {74--87},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-39757-4\_8},
  doi          = {10.1007/3-540-39757-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MasseyR84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/Massey84,
  author       = {James L. Massey},
  title        = {Information Theory, The Copernician System of Communications},
  booktitle    = {{IEEE} International Conference on Communications: Links for the Future
                  - Science, Systems {\&} Services for Communications, {ICC} 1984,
                  Amsterdam, The Netherlands, May 14-17, 1984, Proceedings},
  pages        = {159--162},
  publisher    = {Elsevier},
  year         = {1984},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/Massey84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/SchlatterM83,
  author       = {Marcel Schlatter and
                  James L. Massey},
  title        = {Capacity of interconnected ring communication systems with unique
                  loop-free routing},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {29},
  number       = {5},
  pages        = {774--778},
  year         = {1983},
  url          = {https://doi.org/10.1109/TIT.1983.1056720},
  doi          = {10.1109/TIT.1983.1056720},
  timestamp    = {Thu, 26 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/SchlatterM83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SchobeM82,
  author       = {P. Sch{\"{o}}be and
                  James L. Massey},
  editor       = {Thomas Beth},
  title        = {Fast Authentication in a Trapdoor - Knapsack Public Key Cryptosystem},
  booktitle    = {Cryptography, Proceedings of the Workshop on Cryptography, Burg Feuerstein,
                  Germany, March 29 - April 2, 1982},
  series       = {Lecture Notes in Computer Science},
  volume       = {149},
  pages        = {289--306},
  publisher    = {Springer},
  year         = {1982},
  url          = {https://doi.org/10.1007/3-540-39466-4\_21},
  doi          = {10.1007/3-540-39466-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SchobeM82.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/Massey81,
  author       = {James L. Massey},
  title        = {Capacity, Cutoff Rate, and Coding for a Direct-Detection Optical Channel},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {29},
  number       = {11},
  pages        = {1615--1621},
  year         = {1981},
  url          = {https://doi.org/10.1109/TCOM.1981.1094916},
  doi          = {10.1109/TCOM.1981.1094916},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/Massey81.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MattM80,
  author       = {Hans J. Matt and
                  James L. Massey},
  title        = {Determining the burst-correcting limit of cyclic codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {26},
  number       = {3},
  pages        = {289--297},
  year         = {1980},
  url          = {https://doi.org/10.1109/TIT.1980.1056193},
  doi          = {10.1109/TIT.1980.1056193},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MattM80.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey76,
  author       = {James L. Massey},
  title        = {Our reviewers},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {22},
  number       = {6},
  pages        = {642--643},
  year         = {1976},
  url          = {https://doi.org/10.1109/TIT.1976.1055637},
  doi          = {10.1109/TIT.1976.1055637},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey76.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey75,
  author       = {James L. Massey},
  title        = {Editorial},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {21},
  number       = {3},
  pages        = {249},
  year         = {1975},
  url          = {https://doi.org/10.1109/TIT.1975.1055388},
  doi          = {10.1109/TIT.1975.1055388},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey75.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey74,
  author       = {James L. Massey},
  title        = {On the fractional weight of distinct binary n -tuples (Corresp.)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {20},
  number       = {1},
  pages        = {131},
  year         = {1974},
  url          = {https://doi.org/10.1109/TIT.1974.1055150},
  doi          = {10.1109/TIT.1974.1055150},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey74.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MasseyCJ73,
  author       = {James L. Massey and
                  Daniel J. Costello Jr. and
                  J{\o}rn Justesen},
  title        = {Polynomial weights and code constructions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {19},
  number       = {1},
  pages        = {101--110},
  year         = {1973},
  url          = {https://doi.org/10.1109/TIT.1973.1054936},
  doi          = {10.1109/TIT.1973.1054936},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MasseyCJ73.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey73,
  author       = {James L. Massey},
  title        = {Review of 'Error-Correcting Codes, 2nd edn.' (Peterson, W. W., and
                  Weldon, E. J., Jr.; 1972)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {19},
  number       = {3},
  pages        = {373},
  year         = {1973},
  url          = {https://doi.org/10.1109/TIT.1973.1055002},
  doi          = {10.1109/TIT.1973.1055002},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey73.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/MasseySG72,
  author       = {James L. Massey and
                  Michael K. Sain and
                  John M. Geist},
  title        = {Certain infinite Markov chains and sequential decoding},
  journal      = {Discret. Math.},
  volume       = {3},
  number       = {1-3},
  pages        = {163--175},
  year         = {1972},
  url          = {https://doi.org/10.1016/0012-365X(72)90031-3},
  doi          = {10.1016/0012-365X(72)90031-3},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/MasseySG72.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcom/Massey72,
  author       = {James L. Massey},
  title        = {Optimum Frame Synchronization},
  journal      = {{IEEE} Trans. Commun.},
  volume       = {20},
  number       = {2},
  pages        = {115--119},
  year         = {1972},
  url          = {https://doi.org/10.1109/TCOM.1972.1091127},
  doi          = {10.1109/TCOM.1972.1091127},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcom/Massey72.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey72,
  author       = {James L. Massey},
  title        = {Variable-length codes and the Fano metric},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {18},
  number       = {1},
  pages        = {196--198},
  year         = {1972},
  url          = {https://doi.org/10.1109/TIT.1972.1054750},
  doi          = {10.1109/TIT.1972.1054750},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey72.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GallagerMF71,
  author       = {Robert G. Gallager and
                  James L. Massey and
                  G. David Forney Jr.},
  title        = {Arthur Kohlenberg 1924-1970 (Obituary)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {17},
  number       = {2},
  pages        = {126},
  year         = {1971},
  url          = {https://doi.org/10.1109/TIT.1971.1054617},
  doi          = {10.1109/TIT.1971.1054617},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/GallagerMF71.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey71,
  author       = {James L. Massey},
  title        = {Review of 'An Introduction to Error-Correcting Codes' (Lin, S.; 1970)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {17},
  number       = {6},
  pages        = {768--769},
  year         = {1971},
  url          = {https://doi.org/10.1109/TIT.1971.1054715},
  doi          = {10.1109/TIT.1971.1054715},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey71.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey69,
  author       = {James L. Massey},
  title        = {Shift-register synthesis and {BCH} decoding},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {15},
  number       = {1},
  pages        = {122--127},
  year         = {1969},
  url          = {https://doi.org/10.1109/TIT.1969.1054260},
  doi          = {10.1109/TIT.1969.1054260},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey69.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/MasseyS68,
  author       = {James L. Massey and
                  Michael K. Sain},
  title        = {Inverses of Linear Sequential Circuits},
  journal      = {{IEEE} Trans. Computers},
  volume       = {17},
  number       = {4},
  pages        = {330--337},
  year         = {1968},
  url          = {https://doi.org/10.1109/TC.1968.229392},
  doi          = {10.1109/TC.1968.229392},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/MasseyS68.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/MasseyS67,
  author       = {James L. Massey and
                  Michael K. Sain},
  title        = {Inverse Problems in Coding, Automata, and Continuous Systems},
  booktitle    = {8th Annual Symposium on Switching and Automata Theory, Austin, Texas,
                  USA, October 18-20, 1967},
  pages        = {226--232},
  publisher    = {{IEEE} Computer Society},
  year         = {1967},
  url          = {https://doi.org/10.1109/FOCS.1967.17},
  doi          = {10.1109/FOCS.1967.17},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/MasseyS67.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Massey66,
  author       = {James L. Massey},
  title        = {Note on Finite-Memory Sequential Machines},
  journal      = {{IEEE} Trans. Electron. Comput.},
  volume       = {15},
  number       = {4},
  pages        = {658--659},
  year         = {1966},
  url          = {https://doi.org/10.1109/PGEC.1966.264389},
  doi          = {10.1109/PGEC.1966.264389},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Massey66.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey66,
  author       = {James L. Massey},
  title        = {Uniform codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {12},
  number       = {2},
  pages        = {132--134},
  year         = {1966},
  url          = {https://doi.org/10.1109/TIT.1966.1053886},
  doi          = {10.1109/TIT.1966.1053886},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey66.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey66a,
  author       = {James L. Massey},
  title        = {Review of 'Information Theory' (Ash, Robert; 1965)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {12},
  number       = {4},
  pages        = {488--489},
  year         = {1966},
  url          = {https://doi.org/10.1109/TIT.1966.1053917},
  doi          = {10.1109/TIT.1966.1053917},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey66a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey65,
  author       = {James L. Massey},
  title        = {Implementation of burst-correcting convolutional codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {11},
  number       = {3},
  pages        = {416--422},
  year         = {1965},
  url          = {https://doi.org/10.1109/TIT.1965.1053798},
  doi          = {10.1109/TIT.1965.1053798},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey65.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Massey65a,
  author       = {James L. Massey},
  title        = {Step-by-step decoding of the Bose-Chaudhuri- Hocquenghem codes},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {11},
  number       = {4},
  pages        = {580--585},
  year         = {1965},
  url          = {https://doi.org/10.1109/TIT.1965.1053833},
  doi          = {10.1109/TIT.1965.1053833},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Massey65a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/Massey64,
  author       = {James L. Massey},
  title        = {Reversible Codes},
  journal      = {Inf. Control.},
  volume       = {7},
  number       = {3},
  pages        = {369--380},
  year         = {1964},
  url          = {https://doi.org/10.1016/S0019-9958(64)90438-3},
  doi          = {10.1016/S0019-9958(64)90438-3},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/Massey64.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MasseyL64,
  author       = {James L. Massey and
                  R. W. Liu},
  title        = {Application of Lyapunov's direct method to the error-propagation effect
                  in convolutional codes (Corresp.)},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {10},
  number       = {3},
  pages        = {248--250},
  year         = {1964},
  url          = {https://doi.org/10.1109/TIT.1964.1053678},
  doi          = {10.1109/TIT.1964.1053678},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MasseyL64.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MasseyL64a,
  author       = {James L. Massey and
                  Ruey{-}Wen Liu},
  title        = {Equivalence of nonlinear shift-registers},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {10},
  number       = {4},
  pages        = {378--379},
  year         = {1964},
  url          = {https://doi.org/10.1109/TIT.1964.1053690},
  doi          = {10.1109/TIT.1964.1053690},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MasseyL64a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/PetersonM63,
  author       = {W. Wesley Peterson and
                  James L. Massey},
  title        = {Coding theory},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {9},
  number       = {4},
  pages        = {223--229},
  year         = {1963},
  url          = {https://doi.org/10.1109/TIT.1963.1057847},
  doi          = {10.1109/TIT.1963.1057847},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/PetersonM63.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics