kw.\*:("Coding")
Results 1 to 25 of 78106
Selection :
The state of cryptographic hash functionsPRENEEL, B.Lecture notes in computer science. 1999, pp 158-182, issn 0302-9743, isbn 3-540-65757-6Conference Paper
Cryptanalysis of SPEEDHALL, C; KELSEY, J; RIJMEN, V et al.Lecture notes in computer science. 1999, pp 319-338, issn 0302-9743, isbn 3-540-65894-7Conference Paper
Codec de visoconférence à 2,048 Mbit/s = Videoconference codec at 2048 Mbit/sTEMIME, J.-P; JOLIVET, J.-C; MIONET, H et al.Commutation & transmission. 1983, Vol 5, Num 4, pp 33-50, issn 0242-1283Article
Almost k-wise independent sample spaces and their cryptologic applicationsKUROSAWA, Kaoru; JOHANSSON, Thomas; STINSON, Douglas R et al.Journal of cryptology. 2001, Vol 14, Num 4, pp 231-253, issn 0933-2790Article
UMAC : Fast and secure message authenticationBLACK, J; HALEVI, S; KRAWCZYK, H et al.Lecture notes in computer science. 1999, pp 216-233, issn 0302-9743, isbn 3-540-66347-9Conference Paper
SQUARE HASH : Fast message authentication via optimized universal hash functionsETZEL, M; PATEL, S; RAMZAN, Z et al.Lecture notes in computer science. 1999, pp 234-251, issn 0302-9743, isbn 3-540-66347-9Conference Paper
Motion-compensated coder for videoconferencingSRINIVASAN, R; RAO, K. R.IEEE transactions on communications. 1987, Vol 35, Num 3, pp 297-304, issn 0090-6778Conference Paper
Observation of couple conflicts : Clinical assessment applications, stubborn truths, and shaky foundations : Clinical applications of analogue behavioral observationHEYMAN, Richard E.Psychological assessment. 2001, Vol 13, Num 1, pp 5-35, issn 1040-3590Article
Cryptographic hash functionsPRENEEL, B.European transactions on telecommunications and related technologies. 1994, Vol 5, Num 4, pp 431-448, issn 1120-3862Article
Coding performance of motion-compensated interframe, interfield, and intrafield adaptive prediction coding for composite and component TV signalsMATSUMOTO, S; MURAKAMI, H; YAMAMOTO, H et al.SMPTE journal (1976). 1986, Vol 95, Num 5, pp 542-549, issn 0036-1682Article
Development of a 4 kbit/s hybrid sinusoidal/CELP speech coderHEIKKINEN, Ari.Speech communication. 2004, Vol 42, Num 3-4, pp 353-371, issn 0167-6393, 19 p.Article
Single-error-correcting perfect and near perfect AN codes in symmetric multivalued number representationGOTO, M.Transactions of the Institute of Electronics and Communication Engineers of Japan. Section E. 1984, Vol 67, Num 7, pp 359-362, issn 0387-236XArticle
Equidistant binary arithmetic codesCLARK, W. E; LIANG, J. J.IEEE transactions on information theory. 1986, Vol 32, Num 1, pp 106-108, issn 0018-9448Article
Single error correcting and multiple unidirectional error detecting cyclic an arithmetic codesGAITANIS, N.Electronics Letters. 1984, Vol 20, Num 15, pp 638-640, issn 0013-5194Article
On the covering radius of cyclic linear codes and arithmetic codesHELLESETH, T.Discrete applied mathematics. 1985, Vol 11, Num 2, pp 157-173, issn 0166-218XArticle
New non-linear codes with a minimum distance of 3LITSYN, S. N.Problems of control and information theory. 1984, Vol 13, Num 1, pp 13-15, issn 0370-2529Article
Architecture design of a high-quality speech synthesizer based on the multipulse LPC techniqueSHARMA, R.IEEE journal on selected areas in communications. 1985, Vol 3, Num 2, pp 377-383, issn 0733-8716Article
CODES PARFAITS ET UNIFORMEMENT EMPILES.COHEN G; DEZA M.1976; REV. CETHEDOC; FR.; DA. 1976; VOL. 13; NO 49; PP. 35-44; BIBL. 2 P.Article
Progressive coding of information with progressively coded side informationJIA WANG; JUN SUN.IEEE International Symposium on Information Theory. 2004, isbn 0-7803-8280-3, 1Vol, p. 364Conference Paper
A method for extending binary linear codesALLTOP, W. O.IEEE transactions on information theory. 1984, Vol 30, Num 6, pp 871-872, issn 0018-9448Article
Some results on the existence of binary linear codesELIA, M.IEEE transactions on information theory. 1983, Vol 29, Num 6, pp 933-934, issn 0018-9448Article
Reducing the number of operations in certain finite-field transformsMANDELBAUM, D. M.IEEE transactions on information theory. 1984, Vol 30, Num 3, pp 546-547, issn 0018-9448Article
Weaknesses in the SL2(IF2n) hashing schemeSTEINWANDT, R; GRASSL, M; GEISELMANN, W et al.Lecture notes in computer science. 2000, pp 287-299, issn 0302-9743, isbn 3-540-67907-3Conference Paper
New constructions for secure hash functions: (extended abstract)AIELLO, W; HABER, S; VENKATESAN, R et al.Lecture notes in computer science. 1998, pp 150-167, issn 0302-9743, isbn 3-540-64265-XConference Paper
Computationally efficient algorithm for implementing multipulse LPC analysisGUILLEMIN, B. J; NGUYEN, D. T.Electronics Letters. 1985, Vol 21, Num 9, pp 366-367, issn 0013-5194Article