#### Filter Results:

- Full text PDF available (59)

#### Publication Year

1960

2017

- This year (0)
- Last 5 years (1)
- Last 10 years (3)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- James L. Massey
- IEEE Trans. Information Theory
- 1969

It is shown in this paper that the iterative algorithm introduced by Berlekamp for decoding BCH codes actually provides a general solution to the problem of synthesizing the shortest linear feedback… (More)

- James L. Massey
- 1990

It is shown that the "usual definition" of a discrete memoryless channel (DMC) in fact prohibits the use of feedback. The difficulty stems from the confusion of causality and statistical dependence.… (More)

- Xuejia Lai, James L. Massey
- EUROCRYPT
- 1990

A new secret-key block cipher is proposed as a candidate for a new encryption standard. In the proposed cipher, the plaintext and the ciphertext are 64 bit blocks, while the secret key is 128 bit… (More)

- Fredy D. Neeser, James L. Massey
- IEEE Trans. Information Theory
- 1993

The “covariance” of complex random variables and processes, when defined consistently with the corresponding notion for real random variables, is shown to be determined by the usual (complex)… (More)

- Xuejia Lai, James L. Massey, Sean Murphy
- EUROCRYPT
- 1991

This paper considers the security of iterated block ciphers against the di erential cryptanalysis introduced by Biham and Shamir Di erential cryptanalysis is a chosen plaintext attack on secret key… (More)

- James L. Massey, Peter Mathys
- IEEE Trans. Information Theory
- 1985

Ahstrucf-A model is proposed for the situation where M users share a common communication resource but, because of unknown time offsets among their clocks, cannot transmit their data packets in a… (More)

- Marcel Rupf, James L. Massey
- IEEE Trans. Information Theory
- 1994

- James L. Massey
- 1972

This paper considers the optimum method for locating a sync word periodically imbedded in binary data and received over the additive white Gaussian noise channel. It is shown that the optimum rule is… (More)

- Xuejia Lai, James L. Massey
- EUROCRYPT
- 1992

Iterated hash functions based on block ciphers are treated. Five attacks on an iterated hash function and on its round function are formulated. The wisdom of strengthening such hash functions by… (More)

- Guo-Zhen Xiao, James L. Massey
- IEEE Trans. Information Theory
- 1988

It is shown that a Boolean combining function f(x) of n variables is mth-order correlation immune if and only if its Walsh transform F(w) vanishes for all w with Hamming weights between 1 and m,… (More)