Helleseth T (2014), "Open Problems on the Cross-correlation of m-Sequences", In Open Problems in Mathematics and Computational Science. , pp. 163-179.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:books/sp/14/Helleseth14,
author = {Helleseth, Tor},
title = {Open Problems on the Cross-correlation of m-Sequences},
booktitle = {Open Problems in Mathematics and Computational Science},
year = {2014},
pages = {163--179},
url = {https://doi.org/10.1007/978-3-319-10683-0_8},
doi = {10.1007/978-3-319-10683-0_8}
}
|
Helleseth T and Kholosha A (2013), "Bent functions and their connections to combinatorics", In Surveys in Combinatorics 2013. , pp. 91-126.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:books/cu/p/HellesethK13,
author = {Helleseth, Tor and Kholosha, Alexander},
title = {Bent functions and their connections to combinatorics},
booktitle = {Surveys in Combinatorics 2013},
year = {2013},
pages = {91--126},
url = {https://doi.org/10.1017/CBO9781139506748.004},
doi = {10.1017/CBO9781139506748.004}
}
|
Helleseth T (2011), "Autocorrelation", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 68.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11,
author = {Helleseth, Tor},
title = {Autocorrelation},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
year = {2011},
pages = {68},
url = {https://doi.org/10.1007/978-1-4419-5906-5_334},
doi = {10.1007/978-1-4419-5906-5_334}
}
|
Helleseth T (2011), "Cross-Correlation", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 277.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11a,
author = {Helleseth, Tor},
title = {Cross-Correlation},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
year = {2011},
pages = {277},
url = {https://doi.org/10.1007/978-1-4419-5906-5_341},
doi = {10.1007/978-1-4419-5906-5_341}
}
|
Helleseth T (2011), "De Bruijn Sequence", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 315-316.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11b,
author = {Helleseth, Tor},
title = {De Bruijn Sequence},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
year = {2011},
pages = {315--316},
url = {https://doi.org/10.1007/978-1-4419-5906-5_344},
doi = {10.1007/978-1-4419-5906-5_344}
}
|
Helleseth T (2011), "Gap", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 508-509.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11c,
author = {Helleseth, Tor},
title = {Gap},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
year = {2011},
pages = {508--509},
url = {https://doi.org/10.1007/978-1-4419-5906-5_350},
doi = {10.1007/978-1-4419-5906-5_350}
}
|
Helleseth T (2011), "Golomb's Randomness Postulates", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 516-517.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11d,
author = {Helleseth, Tor},
title = {Golomb's Randomness Postulates},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
year = {2011},
pages = {516--517},
url = {https://doi.org/10.1007/978-1-4419-5906-5_351},
doi = {10.1007/978-1-4419-5906-5_351}
}
|
Helleseth T (2011), "Maximal-Length Sequences", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 763-766.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11e,
author = {Helleseth, Tor},
title = {Maximal-Length Sequences},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
year = {2011},
pages = {763--766},
url = {https://doi.org/10.1007/978-1-4419-5906-5_359},
doi = {10.1007/978-1-4419-5906-5_359}
}
|
Helleseth T (2011), "Pseudo-Noise Sequences (PN-Sequences)", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 992.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11f,
author = {Helleseth, Tor},
title = {Pseudo-Noise Sequences (PN-Sequences)},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
year = {2011},
pages = {992},
url = {https://doi.org/10.1007/978-1-4419-5906-5_364},
doi = {10.1007/978-1-4419-5906-5_364}
}
|
Helleseth T (2011), "Run", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 1072-1073.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11g,
author = {Helleseth, Tor},
title = {Run},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
year = {2011},
pages = {1072--1073},
url = {https://doi.org/10.1007/978-1-4419-5906-5_367},
doi = {10.1007/978-1-4419-5906-5_367}
}
|
Helleseth T (2011), "Sequences", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 1185-1188.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11h,
author = {Helleseth, Tor},
title = {Sequences},
booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
year = {2011},
pages = {1185--1188},
url = {https://doi.org/10.1007/978-1-4419-5906-5_372},
doi = {10.1007/978-1-4419-5906-5_372}
}
|
Helleseth T, Hojs\ik M and Rønjom S (2009), "Algebraic Attacks on Filter and Combiner Generators", In Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes. , pp. 39-48.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:series/natosec/HellesethHR09,
author = {Helleseth, Tor and Hojs\ik, Michal and Rønjom, Sondre},
title = {Algebraic Attacks on Filter and Combiner Generators},
booktitle = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes},
year = {2009},
pages = {39--48},
url = {https://doi.org/10.3233/978-1-60750-002-5-39},
doi = {10.3233/978-1-60750-002-5-39}
}
|
Helleseth T and Kløve T (2008), "Algebraic Coding Theory", In Wiley Encyclopedia of Computer Science and Engineering.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/wiley/HellesethK08,
author = {Helleseth, Tor and Kløve, Torleiv},
title = {Algebraic Coding Theory},
booktitle = {Wiley Encyclopedia of Computer Science and Engineering},
year = {2008},
url = {https://doi.org/10.1002/9780470050118.ecse011},
doi = {10.1002/9780470050118.ecse011}
}
|
Jansen C, Helleseth T and Kholosha A (2008), "Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher", In New Stream Cipher Designs - The eSTREAM Finalists. , pp. 224-243.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:series/lncs/JansenHK08,
author = {Jansen, Cees and Helleseth, Tor and Kholosha, Alexander},
title = {Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher},
booktitle = {New Stream Cipher Designs - The eSTREAM Finalists},
year = {2008},
pages = {224--243},
url = {https://doi.org/10.1007/978-3-540-68351-3_17},
doi = {10.1007/978-3-540-68351-3_17}
}
|
Helleseth T (2005), "Autocorrelation", In Encyclopedia of Cryptography and Security.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05,
author = {Helleseth, Tor},
title = {Autocorrelation},
booktitle = {Encyclopedia of Cryptography and Security},
year = {2005},
url = {https://doi.org/10.1007/0-387-23483-7_21},
doi = {10.1007/0-387-23483-7_21}
}
|
Helleseth T (2005), "Cross-Correlation", In Encyclopedia of Cryptography and Security.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05a,
author = {Helleseth, Tor},
title = {Cross-Correlation},
booktitle = {Encyclopedia of Cryptography and Security},
year = {2005},
url = {https://doi.org/10.1007/0-387-23483-7_86},
doi = {10.1007/0-387-23483-7_86}
}
|
Helleseth T (2005), "DeBruijn sequence", In Encyclopedia of Cryptography and Security.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05b,
author = {Helleseth, Tor},
title = {DeBruijn sequence},
booktitle = {Encyclopedia of Cryptography and Security},
year = {2005},
url = {https://doi.org/10.1007/0-387-23483-7_98},
doi = {10.1007/0-387-23483-7_98}
}
|
Helleseth T (2005), "Gap", In Encyclopedia of Cryptography and Security.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05c,
author = {Helleseth, Tor},
title = {Gap},
booktitle = {Encyclopedia of Cryptography and Security},
year = {2005},
url = {https://doi.org/10.1007/0-387-23483-7_173},
doi = {10.1007/0-387-23483-7_173}
}
|
Helleseth T (2005), "Golomb'S Randomness Postulates", In Encyclopedia of Cryptography and Security.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05d,
author = {Helleseth, Tor},
title = {Golomb'S Randomness Postulates},
booktitle = {Encyclopedia of Cryptography and Security},
year = {2005},
url = {https://doi.org/10.1007/0-387-23483-7_178},
doi = {10.1007/0-387-23483-7_178}
}
|
Helleseth T (2005), "Maximal-Length Linear Sequence", In Encyclopedia of Cryptography and Security.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05e,
author = {Helleseth, Tor},
title = {Maximal-Length Linear Sequence},
booktitle = {Encyclopedia of Cryptography and Security},
year = {2005},
url = {https://doi.org/10.1007/0-387-23483-7_247},
doi = {10.1007/0-387-23483-7_247}
}
|
Helleseth T (2005), "Pseudo-Noise Sequence (PN-Sequence)", In Encyclopedia of Cryptography and Security.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05f,
author = {Helleseth, Tor},
title = {Pseudo-Noise Sequence (PN-Sequence)},
booktitle = {Encyclopedia of Cryptography and Security},
year = {2005},
url = {https://doi.org/10.1007/0-387-23483-7_326},
doi = {10.1007/0-387-23483-7_326}
}
|
Helleseth T (2005), "Run", In Encyclopedia of Cryptography and Security.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05g,
author = {Helleseth, Tor},
title = {Run},
booktitle = {Encyclopedia of Cryptography and Security},
year = {2005},
url = {https://doi.org/10.1007/0-387-23483-7_365},
doi = {10.1007/0-387-23483-7_365}
}
|
Helleseth T (2005), "Sequences", In Encyclopedia of Cryptography and Security.
[BibTeX] [DOI] [URL]
|
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05h,
author = {Helleseth, Tor},
title = {Sequences},
booktitle = {Encyclopedia of Cryptography and Security},
year = {2005},
url = {https://doi.org/10.1007/0-387-23483-7_385},
doi = {10.1007/0-387-23483-7_385}
}
|