Zero-error codes for correlated information sources (English)
- New search for: Al Jabri, A. Kh.
- New search for: Al-Issa, S.
- New search for: Al Jabri, A. Kh.
- New search for: Al-Issa, S.
In:
Crytography and Coding
;
17-22
;
1997
- Article/Chapter (Book) / Electronic Resource
-
Title:Zero-error codes for correlated information sources
-
Contributors:Al Jabri, A. Kh. ( author ) / Al-Issa, S. ( author )
-
Published in:Crytography and Coding ; 17-22Lecture Notes in Computer Science ; 1355 ; 17-22
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:1997-01-01
-
Size:6 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
The theory and application of reciprocal pairs of periodic sequencesAl-Dabbagh, Ahmed / Darnell, Michael et al. | 1997
- 17
-
Zero-error codes for correlated information sourcesAl Jabri, A. Kh. / Al-Issa, S. et al. | 1997
- 23
-
Trellis decoding techniques and their performance in the adder channel for synchronous and asynchronous CCMA codesBenachour, P. / Markarian, G. / Honary, B. et al. | 1997
- 30
-
Key agreement protocols and their security analysisBlake-Wilson, Simon / Johnson, Don / Menezes, Alfred et al. | 1997
- 46
-
Low density parity check codes based on sparse matrices with no small cyclesBond, J. / Hui, S. / Schmidt, H. et al. | 1997
- 59
-
On the SAFER cryptosystemBrincat, Karl / Meijer, Alko et al. | 1997
- 69
-
An adaptive approach to T of N user multi-access communications channel using an orthogonal coded multiplexerBrown, K. / Darnell, M. et al. | 1997
- 74
-
The breaking of the Lorenz Cipher: An introduction to the theory behind the operational role of “Colossus” at BPCarter, F. L. et al. | 1997
- 89
-
Split knowledge generation of RSA parametersCocks, Clifford et al. | 1997
- 96
-
Analysis of error control in digital trunked radio systemsFan, Pingzhi et al. | 1997
- 101
-
Reconstruction of convolutional encoders over GF(q)Filiol, Eric et al. | 1997
- 110
-
HCC: A hash function using error correcting codesHarari, Sami et al. | 1997
- 118
-
Public-key cryptosystems based on elliptic curvesHess, Erwin et al. | 1997
- 119
-
Novel application of turbo decoding for radio channelsHonary, B. / Thomas, B. / Coulton, P. / Darnell, M. et al. | 1997
- 131
-
Finding small roots of univariate modular equations revisitedHowgrave-Graham, Nicholas et al. | 1997
- 143
-
Robust Reed Solomon coded MPSK modulationHusni, E. / Sweeney, P. et al. | 1997
- 155
-
RSA-type signatures in the presence of transient faultsJoye, Marc / Quisquater, Jean-Jacques / Bao, Feng / Deng, Robert H. et al. | 1997
- 161
-
A digital signature scheme based on random error-correcting codesKabatianskii, G. / Krouk, E. / Smeets, B. et al. | 1997
- 168
-
Variable rate adaptive trellis coded QAM for high bandwidth efficiency applications under Rayleigh fading channelLau, Vincent K. N. / Macleod, Malcolm D. et al. | 1997
- 180
-
Variable rate adaptive channel coding for coherent and non-coherent rayleigh fading channelLau, Vincent K. N. / Maric, S. V. et al. | 1997
- 192
-
Labyrinth: A new ultra high speed stream cipherLin, Bo / Shepherd, Simon et al. | 1997
- 199
-
Resisting the Bergen-Hogan attack on adaptive arithmetic codingLiu, Xian / Farrell, Patrick G. / Boyd, Colin A. et al. | 1997
- 209
-
Novel decoding technique for the synchronous and quasi-synchronous multiple access adder channelMarkarian, G. / Benachour, P. / Honary, B. et al. | 1997
- 221
-
Increasing efficiency of International key escrow in mutually mistrusting domainsMartin, Keith M. et al. | 1997
- 233
-
Multi dimensional compartment schemesMaucher, Johannes et al. | 1997
- 239
-
Evaluation of standard approximation to log-likelihood ratio addition in the MAP algorithm, and Its application in block code (‘Turbo’) Iterative decoding algorithmsMcManus, S. / Farrell, P.G. et al. | 1997
- 251
-
Multiuser coding based on detecting matrices for Synchronous-CDMA systemsMow, Wai Ho et al. | 1997
- 258
-
Enumeration of convolutional codes and minimal encodersO'Donoghue, Conor P. / Burkley, Cyril J. et al. | 1997
- 265
-
On using Carmichael numbers for public key encryption systemsPinch, R. G. E. et al. | 1997
- 270
-
Hash functions and MAC algorithms based on block ciphersPreneel, B. et al. | 1997
- 283
-
Witness hiding restrictive blind signature schemeRadu, Cristian / Govaerts, René / Vandewalle, Joos et al. | 1997
- 295
-
A note on the construction and upper bounds of correlation-immune functionsSchneider, Markus et al. | 1997
- 307
-
On generalised concatenated codesSonander, S. / Honary, B. et al. | 1997
- 317
-
Error performance analysis of different interleaving strategies applied to eight track digital tape systemsTandon, A. / Farrell, P. G. et al. | 1997
- 323
-
Efficient error-propagating block chainingZnquete, André / Guedes, Paulo et al. | 1997