ct.\*:(%22Telecommunications and information theory%22)
Results 1 to 25 of 785204
Selection :
Contribution à l'optimisation d'implantation parallèle d'algorithmes itératifs récursifs. Application au filtrage adaptatif en traitement du signal = Parallel implementation and optimization of recursive algorithms. Application to adaptive filtering in signal processingSilva Castro, Jesus; Baylou, Pierre.1992, 144 p.Thesis
On Best-Possible ObfuscationGOLDWASSER, Shafi; ROTHBLUM, Guy N.Journal of cryptology. 2014, Vol 27, Num 3, pp 480-505, issn 0933-2790, 26 p.Article
Unifying running-key approach and logistic map to generate enciphering sequences : Networked digital mediaVLAD, Adriana; ILYAS, Azeem; LUCA, Adrian et al.Annales des télécommunications. 2013, Vol 68, Num 3-4, pp 179-186, issn 0003-4347, 8 p.Article
On the Construction of Cryptographically Significant Boolean Functions Using Objects in Projective Geometry SpacesPASALIC, Enes; YONGZHUANG WEI.IEEE transactions on information theory. 2012, Vol 58, Num 10, pp 6681-6693, issn 0018-9448, 13 p.Article
Expected π-Adic Security Measures of SequencesKLAPPER, Andrew M.IEEE transactions on information theory. 2010, Vol 56, Num 5, pp 2486-2501, issn 0018-9448, 16 p.Article
The Cross-Correlation of Binary Sequences With Optimal AutocorrelationCUNSHENG DING; XIAOHU TANG.IEEE transactions on information theory. 2010, Vol 56, Num 4, pp 1694-1701, issn 0018-9448, 8 p.Article
One-Wayness Equivalent to General FactoringKUROSAWA, Kaoru; TAKAGI, Tsuyoshi.IEEE transactions on information theory. 2009, Vol 55, Num 9, pp 4249-4262, issn 0018-9448, 14 p.Article
The Capacity Region of a Class of Semideterministic Interference ChannelsCHONG, Hon-Fah; MOTANI, Mehul.IEEE transactions on information theory. 2009, Vol 55, Num 2, pp 598-603, issn 0018-9448, 6 p.Article
Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash FunctionsSARKAR, Palash.IEEE transactions on information theory. 2009, Vol 55, Num 10, pp 4749-4760, issn 0018-9448, 12 p.Article
A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer ReductionsKUROSAWA, Kaoru; KISHIMOTO, Wataru; KOSHIBA, Takeshi et al.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2566-2571, issn 0018-9448, 6 p.Article
On the Oblivious-Transfer Capacity of Noisy ResourcesNASCIMENTO, Anderson C. A; WINTER, Andreas.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2572-2581, issn 0018-9448, 10 p.Article
Unconditionally Secure Steganography Against Active AttacksSHIKATA, Junji; MATSUMOTO, Tsutomu.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2690-2705, issn 0018-9448, 16 p.Article
The Bare Bounded-Storage Model : The Tight Bound on the Storage Requirement for Key AgreementDZIEMBOWSKI, Stefan; MAURER, Ueli.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2790-2792, issn 0018-9448, 3 p.Article
A new criterion for nonlinearity of block ciphersDUNKELMAN, Orr; KELLER, Nathan.IEEE transactions on information theory. 2007, Vol 53, Num 11, pp 3944-3957, issn 0018-9448, 14 p.Article
Bounds on key appearance equivocation for substitution ciphersBORISSOV, Yuri L; MOON HO LEE.IEEE transactions on information theory. 2007, Vol 53, Num 6, pp 2294-2296, issn 0018-9448, 3 p.Article
Search for boolean functions with excellent profiles in the rotation symmetric classKAVUT, Selcuk; MAITRA, Subhamoy; YÜCEL, Melek D et al.IEEE transactions on information theory. 2007, Vol 53, Num 5, pp 1743-1751, issn 0018-9448, 9 p.Article
Digital Media Asset Management: gérer et protéger les droits = Digital Media Asset Management : management and protection of rightsGOUYET, Jean-Noël.Techniques de l'ingénieur. Télécoms. 2006, Vol TEB2, Num TE5890, issn 1632-3823, TE5890.1-TE5890.24, Doc.TE5890.1-TE5890.7 [31 p.]Article
Unconditionally secure entity authenticationKUROSAWA, K.IEEE international symposium on information theory. 1998, isbn 0-7803-5000-6, p. 298Conference Paper
Unconditionally secure dynamic conference key distributionDESMEDT, Y; VISWANATHAN, V.IEEE international symposium on information theory. 1998, isbn 0-7803-5000-6, p. 383Conference Paper
Vectorial Hyperbent Trace Functions From the PSap Class—Their Exact Number and SpecificationMURATOVIC-RIBIC, Amela; PASALIC, Enes; RIBIC, Samir et al.IEEE transactions on information theory. 2014, Vol 60, Num 7, pp 4408-4413, issn 0018-9448, 6 p.Article
Natural Generalizations of Threshold Secret SharingFARRAS, Oriol; PADRO, Carles; CHAOPING XING et al.IEEE transactions on information theory. 2014, Vol 60, Num 3, pp 1652-1664, issn 0018-9448, 13 p.Conference Paper
The Proof of Lin's Conjecture via the Decimation-Hadamard TransformHONGGANG HU; SHUAI SHAO; GUANG GONG et al.IEEE transactions on information theory. 2014, Vol 60, Num 8, pp 5054-5064, issn 0018-9448, 11 p.Conference Paper
On the Density of Irreducible NFSRsTIAN TIAN; QI, Wen-Feng.IEEE transactions on information theory. 2013, Vol 59, Num 6, pp 4006-4012, issn 0018-9448, 7 p.Article
Arithmetic Correlations and Walsh TransformsKLAPPER, Andrew; GORESKY, Mark.IEEE transactions on information theory. 2012, Vol 58, Num 1, pp 479-492, issn 0018-9448, 14 p.Article
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious ModelPINTO, Adriana C. B; DOWSLEY, Rafael; MOROZOV, Kirill et al.IEEE transactions on information theory. 2011, Vol 57, Num 8, pp 5566-5571, issn 0018-9448, 6 p.Article