[PDF][PDF] Threshold decoding
JL Massey - 1963 - dspace.mit.edu
Two procedures for decoding linear systematic codes, majority decoding and a posteriori
probability decoding, are formulated. The essential feature of both methods is a linear …
probability decoding, are formulated. The essential feature of both methods is a linear …
A proposal for a new block encryption standard
X Lai, JL Massey - Advances in Cryptology—EUROCRYPT'90: Workshop …, 1991 - Springer
A new secret-key block cipher is proposed as a candidate for a new encryption standard. In
the proposed cipher, the plaintext and the ciphertext are 64 bit blocks, while the secret key is …
the proposed cipher, the plaintext and the ciphertext are 64 bit blocks, while the secret key is …
Markov ciphers and differential cryptanalysis
X Lai, JL Massey, S Murphy - … —EUROCRYPT'91: Workshop on the Theory …, 1991 - Springer
This paper considers the security of iterated block ciphers against the differential cryptanalysis
introduced by Biham and Shamir. Differential cryptanalysis is a chosen-plaintext attack on …
introduced by Biham and Shamir. Differential cryptanalysis is a chosen-plaintext attack on …
Proper complex random processes with applications to information theory
FD Neeser, JL Massey - IEEE transactions on information …, 1993 - ieeexplore.ieee.org
The covariance of complex random variables and processes, when defined consistently with
the corresponding notion for real random variables, is shown to be determined by the usual …
the corresponding notion for real random variables, is shown to be determined by the usual …
Social control and delinquent behavior: An examination of the elements of the social bond
MD Krohn, JL Massey - The sociological quarterly, 1980 - Taylor & Francis
This research examines the overall and relative effects of the elements of Hirschi's Social
Bonding Theory on four separate measures of deviance using data drawn from a sample of …
Bonding Theory on four separate measures of deviance using data drawn from a sample of …
A spectral characterization of correlation-immune combining functions
GZ Xiao, JL Massey - IEEE Transactions on information theory, 1988 - ieeexplore.ieee.org
It is shown that a Boolean combining function f(x) of n variables is mth-order correlation-immune
if and only if its Walsh transform F( omega ) vanishes for all omega with Hamming …
if and only if its Walsh transform F( omega ) vanishes for all omega with Hamming …
Guessing and entropy
JL Massey - … of 1994 IEEE International Symposium on …, 1994 - ieeexplore.ieee.org
It is shown that the average number of successive guesses, E[G], required with an optimum
strategy until one correctly guesses the value of a discrete random X, is underbounded by …
strategy until one correctly guesses the value of a discrete random X, is underbounded by …
Linear codes with complementary duals
JL Massey - Discrete Mathematics, 1992 - Elsevier
A linear code with a complementary dual (or an LCD code) is defined to be a linear code C
whose dual code C ⊥ satisfies C∩C ⊥ = { 0 } . The algebraic characterization of LCD codes …
whose dual code C ⊥ satisfies C∩C ⊥ = { 0 } . The algebraic characterization of LCD codes …
[PDF][PDF] Minimal codewords and secret sharing
JL Massey - Proceedings of the 6th joint Swedish-Russian …, 1993 - isiweb.ee.ethz.ch
The use of a linear code to" split" secrets into equal-size shares is considered. The determination
of which sets of shares can be used to obtain the secret leads to the apparently new …
of which sets of shares can be used to obtain the secret leads to the apparently new …
Collision-resolution algorithms and random-access communications
JL Massey - Multi-user communication systems, 1981 - Springer
Communications engineers have a long acquaintance with the" multiple-access" problem, ie,
the problern of providing the means whereby many senders of information can share a …
the problern of providing the means whereby many senders of information can share a …