Pascal and Francis Bibliographic Databases

Help

Search results

Your search

ct.\*:(%22Telecommunications and information theory%22)

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 785204

  • Page / 31409
Export

Selection :

  • and

Contribution à l'optimisation d'implantation parallèle d'algorithmes itératifs récursifs. Application au filtrage adaptatif en traitement du signal = Parallel implementation and optimization of recursive algorithms. Application to adaptive filtering in signal processingSilva Castro, Jesus; Baylou, Pierre.1992, 144 p.Thesis

On Best-Possible ObfuscationGOLDWASSER, Shafi; ROTHBLUM, Guy N.Journal of cryptology. 2014, Vol 27, Num 3, pp 480-505, issn 0933-2790, 26 p.Article

Unifying running-key approach and logistic map to generate enciphering sequences : Networked digital mediaVLAD, Adriana; ILYAS, Azeem; LUCA, Adrian et al.Annales des télécommunications. 2013, Vol 68, Num 3-4, pp 179-186, issn 0003-4347, 8 p.Article

On the Construction of Cryptographically Significant Boolean Functions Using Objects in Projective Geometry SpacesPASALIC, Enes; YONGZHUANG WEI.IEEE transactions on information theory. 2012, Vol 58, Num 10, pp 6681-6693, issn 0018-9448, 13 p.Article

Expected π-Adic Security Measures of SequencesKLAPPER, Andrew M.IEEE transactions on information theory. 2010, Vol 56, Num 5, pp 2486-2501, issn 0018-9448, 16 p.Article

The Cross-Correlation of Binary Sequences With Optimal AutocorrelationCUNSHENG DING; XIAOHU TANG.IEEE transactions on information theory. 2010, Vol 56, Num 4, pp 1694-1701, issn 0018-9448, 8 p.Article

One-Wayness Equivalent to General FactoringKUROSAWA, Kaoru; TAKAGI, Tsuyoshi.IEEE transactions on information theory. 2009, Vol 55, Num 9, pp 4249-4262, issn 0018-9448, 14 p.Article

The Capacity Region of a Class of Semideterministic Interference ChannelsCHONG, Hon-Fah; MOTANI, Mehul.IEEE transactions on information theory. 2009, Vol 55, Num 2, pp 598-603, issn 0018-9448, 6 p.Article

Efficient Tweakable Enciphering Schemes From (Block-Wise) Universal Hash FunctionsSARKAR, Palash.IEEE transactions on information theory. 2009, Vol 55, Num 10, pp 4749-4760, issn 0018-9448, 12 p.Article

A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer ReductionsKUROSAWA, Kaoru; KISHIMOTO, Wataru; KOSHIBA, Takeshi et al.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2566-2571, issn 0018-9448, 6 p.Article

On the Oblivious-Transfer Capacity of Noisy ResourcesNASCIMENTO, Anderson C. A; WINTER, Andreas.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2572-2581, issn 0018-9448, 10 p.Article

Unconditionally Secure Steganography Against Active AttacksSHIKATA, Junji; MATSUMOTO, Tsutomu.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2690-2705, issn 0018-9448, 16 p.Article

The Bare Bounded-Storage Model : The Tight Bound on the Storage Requirement for Key AgreementDZIEMBOWSKI, Stefan; MAURER, Ueli.IEEE transactions on information theory. 2008, Vol 54, Num 6, pp 2790-2792, issn 0018-9448, 3 p.Article

A new criterion for nonlinearity of block ciphersDUNKELMAN, Orr; KELLER, Nathan.IEEE transactions on information theory. 2007, Vol 53, Num 11, pp 3944-3957, issn 0018-9448, 14 p.Article

Bounds on key appearance equivocation for substitution ciphersBORISSOV, Yuri L; MOON HO LEE.IEEE transactions on information theory. 2007, Vol 53, Num 6, pp 2294-2296, issn 0018-9448, 3 p.Article

Search for boolean functions with excellent profiles in the rotation symmetric classKAVUT, Selcuk; MAITRA, Subhamoy; YÜCEL, Melek D et al.IEEE transactions on information theory. 2007, Vol 53, Num 5, pp 1743-1751, issn 0018-9448, 9 p.Article

Digital Media Asset Management: gérer et protéger les droits = Digital Media Asset Management : management and protection of rightsGOUYET, Jean-Noël.Techniques de l'ingénieur. Télécoms. 2006, Vol TEB2, Num TE5890, issn 1632-3823, TE5890.1-TE5890.24, Doc.TE5890.1-TE5890.7 [31 p.]Article

Unconditionally secure entity authenticationKUROSAWA, K.IEEE international symposium on information theory. 1998, isbn 0-7803-5000-6, p. 298Conference Paper

Unconditionally secure dynamic conference key distributionDESMEDT, Y; VISWANATHAN, V.IEEE international symposium on information theory. 1998, isbn 0-7803-5000-6, p. 383Conference Paper

Vectorial Hyperbent Trace Functions From the PSap Class—Their Exact Number and SpecificationMURATOVIC-RIBIC, Amela; PASALIC, Enes; RIBIC, Samir et al.IEEE transactions on information theory. 2014, Vol 60, Num 7, pp 4408-4413, issn 0018-9448, 6 p.Article

Natural Generalizations of Threshold Secret SharingFARRAS, Oriol; PADRO, Carles; CHAOPING XING et al.IEEE transactions on information theory. 2014, Vol 60, Num 3, pp 1652-1664, issn 0018-9448, 13 p.Conference Paper

The Proof of Lin's Conjecture via the Decimation-Hadamard TransformHONGGANG HU; SHUAI SHAO; GUANG GONG et al.IEEE transactions on information theory. 2014, Vol 60, Num 8, pp 5054-5064, issn 0018-9448, 11 p.Conference Paper

On the Density of Irreducible NFSRsTIAN TIAN; QI, Wen-Feng.IEEE transactions on information theory. 2013, Vol 59, Num 6, pp 4006-4012, issn 0018-9448, 7 p.Article

Arithmetic Correlations and Walsh TransformsKLAPPER, Andrew; GORESKY, Mark.IEEE transactions on information theory. 2012, Vol 58, Num 1, pp 479-492, issn 0018-9448, 14 p.Article

Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious ModelPINTO, Adriana C. B; DOWSLEY, Rafael; MOROZOV, Kirill et al.IEEE transactions on information theory. 2011, Vol 57, Num 8, pp 5566-5571, issn 0018-9448, 6 p.Article

  • Page / 31409