Applying Compression Coding in Cryptography / C. Boyd1: |
Performance Limits for Combined Coding and Modulation Schemes: A Geometric Approach / A.G. Burr2: |
Enumeration Results on Linear Complexity Profiles / G. Carter3: |
Algorithmic Information Theory / G. Chaitin4: |
Multi-Level Complementary Sequence Sets: Synthesis and Applications / M. Darnell ; A.H. Kemp5: |
Automata Theory and Cryptoanalysis / D. Gollmann6: |
Optimal Linear Codes / R. Hill7: |
Embedded Modulation and Coding for HF Channels / B. Honary ; F.S. Arani8: |
Nonexistence Results for Barker Arrays / J. Jedwab9: |
An Algebraic Zero-knowledge Identification Scheme / N. Jefferies ; M. Walker10: |
Standards for Data Security / R.W. Jones11: |
A Strategy for Designing Multilevel Codes with Defined Spectral and Error Control Properties / A. Kokkos ; J.J. O'Reilly12: |
Characterising and Counting Functions Satisfying the Strict Avalanche Criterion of Order (n-3) / S.A. Lloyd13: |
Some Number-theoretic Conjectures and their Relation to the Generation of Cryptographic Primes / U.M. Maurer14: |
Recognising Elements of Finite Fields / R.G.E. Pinch15: |
Design and Implementation of Binary Combined Error Control and Line Coding Schemes / A. Popplewell ; S. Williams16: |
Applying Compression Coding in Cryptography / C. Boyd1: |
Performance Limits for Combined Coding and Modulation Schemes: A Geometric Approach / A.G. Burr2: |
Enumeration Results on Linear Complexity Profiles / G. Carter3: |