Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Coding")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 78106

  • Page / 3125
Export

Selection :

  • and

The state of cryptographic hash functionsPRENEEL, B.Lecture notes in computer science. 1999, pp 158-182, issn 0302-9743, isbn 3-540-65757-6Conference Paper

Cryptanalysis of SPEEDHALL, C; KELSEY, J; RIJMEN, V et al.Lecture notes in computer science. 1999, pp 319-338, issn 0302-9743, isbn 3-540-65894-7Conference Paper

Codec de visoconférence à 2,048 Mbit/s = Videoconference codec at 2048 Mbit/sTEMIME, J.-P; JOLIVET, J.-C; MIONET, H et al.Commutation & transmission. 1983, Vol 5, Num 4, pp 33-50, issn 0242-1283Article

Almost k-wise independent sample spaces and their cryptologic applicationsKUROSAWA, Kaoru; JOHANSSON, Thomas; STINSON, Douglas R et al.Journal of cryptology. 2001, Vol 14, Num 4, pp 231-253, issn 0933-2790Article

UMAC : Fast and secure message authenticationBLACK, J; HALEVI, S; KRAWCZYK, H et al.Lecture notes in computer science. 1999, pp 216-233, issn 0302-9743, isbn 3-540-66347-9Conference Paper

SQUARE HASH : Fast message authentication via optimized universal hash functionsETZEL, M; PATEL, S; RAMZAN, Z et al.Lecture notes in computer science. 1999, pp 234-251, issn 0302-9743, isbn 3-540-66347-9Conference Paper

Motion-compensated coder for videoconferencingSRINIVASAN, R; RAO, K. R.IEEE transactions on communications. 1987, Vol 35, Num 3, pp 297-304, issn 0090-6778Conference Paper

Observation of couple conflicts : Clinical assessment applications, stubborn truths, and shaky foundations : Clinical applications of analogue behavioral observationHEYMAN, Richard E.Psychological assessment. 2001, Vol 13, Num 1, pp 5-35, issn 1040-3590Article

Cryptographic hash functionsPRENEEL, B.European transactions on telecommunications and related technologies. 1994, Vol 5, Num 4, pp 431-448, issn 1120-3862Article

Coding performance of motion-compensated interframe, interfield, and intrafield adaptive prediction coding for composite and component TV signalsMATSUMOTO, S; MURAKAMI, H; YAMAMOTO, H et al.SMPTE journal (1976). 1986, Vol 95, Num 5, pp 542-549, issn 0036-1682Article

Development of a 4 kbit/s hybrid sinusoidal/CELP speech coderHEIKKINEN, Ari.Speech communication. 2004, Vol 42, Num 3-4, pp 353-371, issn 0167-6393, 19 p.Article

Single-error-correcting perfect and near perfect AN codes in symmetric multivalued number representationGOTO, M.Transactions of the Institute of Electronics and Communication Engineers of Japan. Section E. 1984, Vol 67, Num 7, pp 359-362, issn 0387-236XArticle

Equidistant binary arithmetic codesCLARK, W. E; LIANG, J. J.IEEE transactions on information theory. 1986, Vol 32, Num 1, pp 106-108, issn 0018-9448Article

Single error correcting and multiple unidirectional error detecting cyclic an arithmetic codesGAITANIS, N.Electronics Letters. 1984, Vol 20, Num 15, pp 638-640, issn 0013-5194Article

On the covering radius of cyclic linear codes and arithmetic codesHELLESETH, T.Discrete applied mathematics. 1985, Vol 11, Num 2, pp 157-173, issn 0166-218XArticle

New non-linear codes with a minimum distance of 3LITSYN, S. N.Problems of control and information theory. 1984, Vol 13, Num 1, pp 13-15, issn 0370-2529Article

Architecture design of a high-quality speech synthesizer based on the multipulse LPC techniqueSHARMA, R.IEEE journal on selected areas in communications. 1985, Vol 3, Num 2, pp 377-383, issn 0733-8716Article

CODES PARFAITS ET UNIFORMEMENT EMPILES.COHEN G; DEZA M.1976; REV. CETHEDOC; FR.; DA. 1976; VOL. 13; NO 49; PP. 35-44; BIBL. 2 P.Article

Progressive coding of information with progressively coded side informationJIA WANG; JUN SUN.IEEE International Symposium on Information Theory. 2004, isbn 0-7803-8280-3, 1Vol, p. 364Conference Paper

A method for extending binary linear codesALLTOP, W. O.IEEE transactions on information theory. 1984, Vol 30, Num 6, pp 871-872, issn 0018-9448Article

Some results on the existence of binary linear codesELIA, M.IEEE transactions on information theory. 1983, Vol 29, Num 6, pp 933-934, issn 0018-9448Article

Reducing the number of operations in certain finite-field transformsMANDELBAUM, D. M.IEEE transactions on information theory. 1984, Vol 30, Num 3, pp 546-547, issn 0018-9448Article

Weaknesses in the SL2(IF2n) hashing schemeSTEINWANDT, R; GRASSL, M; GEISELMANN, W et al.Lecture notes in computer science. 2000, pp 287-299, issn 0302-9743, isbn 3-540-67907-3Conference Paper

New constructions for secure hash functions: (extended abstract)AIELLO, W; HABER, S; VENKATESAN, R et al.Lecture notes in computer science. 1998, pp 150-167, issn 0302-9743, isbn 3-540-64265-XConference Paper

Computationally efficient algorithm for implementing multipulse LPC analysisGUILLEMIN, B. J; NGUYEN, D. T.Electronics Letters. 1985, Vol 21, Num 9, pp 366-367, issn 0013-5194Article

  • Page / 3125