Matching entries: 0
settings...
Helleseth T (2014), "Open Problems on the Cross-correlation of m-Sequences", In Open Problems in Mathematics and Computational Science. , pp. 163-179.
BibTeX:
@incollection{DBLP:books/sp/14/Helleseth14,
  author = {Helleseth, Tor},
  title = {Open Problems on the Cross-correlation of m-Sequences},
  booktitle = {Open Problems in Mathematics and Computational Science},
  year = {2014},
  pages = {163--179},
  url = {https://doi.org/10.1007/978-3-319-10683-0_8},
  doi = {10.1007/978-3-319-10683-0_8}
}
Helleseth T and Kholosha A (2013), "Bent functions and their connections to combinatorics", In Surveys in Combinatorics 2013. , pp. 91-126.
BibTeX:
@incollection{DBLP:books/cu/p/HellesethK13,
  author = {Helleseth, Tor and Kholosha, Alexander},
  title = {Bent functions and their connections to combinatorics},
  booktitle = {Surveys in Combinatorics 2013},
  year = {2013},
  pages = {91--126},
  url = {https://doi.org/10.1017/CBO9781139506748.004},
  doi = {10.1017/CBO9781139506748.004}
}
Helleseth T (2011), "Autocorrelation", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 68.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11,
  author = {Helleseth, Tor},
  title = {Autocorrelation},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  year = {2011},
  pages = {68},
  url = {https://doi.org/10.1007/978-1-4419-5906-5_334},
  doi = {10.1007/978-1-4419-5906-5_334}
}
Helleseth T (2011), "Cross-Correlation", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 277.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11a,
  author = {Helleseth, Tor},
  title = {Cross-Correlation},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  year = {2011},
  pages = {277},
  url = {https://doi.org/10.1007/978-1-4419-5906-5_341},
  doi = {10.1007/978-1-4419-5906-5_341}
}
Helleseth T (2011), "De Bruijn Sequence", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 315-316.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11b,
  author = {Helleseth, Tor},
  title = {De Bruijn Sequence},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  year = {2011},
  pages = {315--316},
  url = {https://doi.org/10.1007/978-1-4419-5906-5_344},
  doi = {10.1007/978-1-4419-5906-5_344}
}
Helleseth T (2011), "Gap", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 508-509.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11c,
  author = {Helleseth, Tor},
  title = {Gap},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  year = {2011},
  pages = {508--509},
  url = {https://doi.org/10.1007/978-1-4419-5906-5_350},
  doi = {10.1007/978-1-4419-5906-5_350}
}
Helleseth T (2011), "Golomb's Randomness Postulates", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 516-517.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11d,
  author = {Helleseth, Tor},
  title = {Golomb's Randomness Postulates},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  year = {2011},
  pages = {516--517},
  url = {https://doi.org/10.1007/978-1-4419-5906-5_351},
  doi = {10.1007/978-1-4419-5906-5_351}
}
Helleseth T (2011), "Maximal-Length Sequences", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 763-766.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11e,
  author = {Helleseth, Tor},
  title = {Maximal-Length Sequences},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  year = {2011},
  pages = {763--766},
  url = {https://doi.org/10.1007/978-1-4419-5906-5_359},
  doi = {10.1007/978-1-4419-5906-5_359}
}
Helleseth T (2011), "Pseudo-Noise Sequences (PN-Sequences)", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 992.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11f,
  author = {Helleseth, Tor},
  title = {Pseudo-Noise Sequences (PN-Sequences)},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  year = {2011},
  pages = {992},
  url = {https://doi.org/10.1007/978-1-4419-5906-5_364},
  doi = {10.1007/978-1-4419-5906-5_364}
}
Helleseth T (2011), "Run", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 1072-1073.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11g,
  author = {Helleseth, Tor},
  title = {Run},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  year = {2011},
  pages = {1072--1073},
  url = {https://doi.org/10.1007/978-1-4419-5906-5_367},
  doi = {10.1007/978-1-4419-5906-5_367}
}
Helleseth T (2011), "Sequences", In Encyclopedia of Cryptography and Security, 2nd Ed.. , pp. 1185-1188.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth11h,
  author = {Helleseth, Tor},
  title = {Sequences},
  booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed.},
  year = {2011},
  pages = {1185--1188},
  url = {https://doi.org/10.1007/978-1-4419-5906-5_372},
  doi = {10.1007/978-1-4419-5906-5_372}
}
Helleseth T, Hojs\ik M and Rønjom S (2009), "Algebraic Attacks on Filter and Combiner Generators", In Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes. , pp. 39-48.
BibTeX:
@incollection{DBLP:series/natosec/HellesethHR09,
  author = {Helleseth, Tor and Hojs\ik, Michal and Rønjom, Sondre},
  title = {Algebraic Attacks on Filter and Combiner Generators},
  booktitle = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes},
  year = {2009},
  pages = {39--48},
  url = {https://doi.org/10.3233/978-1-60750-002-5-39},
  doi = {10.3233/978-1-60750-002-5-39}
}
Helleseth T and Kløve T (2008), "Algebraic Coding Theory", In Wiley Encyclopedia of Computer Science and Engineering.
BibTeX:
@incollection{DBLP:reference/wiley/HellesethK08,
  author = {Helleseth, Tor and Kløve, Torleiv},
  title = {Algebraic Coding Theory},
  booktitle = {Wiley Encyclopedia of Computer Science and Engineering},
  year = {2008},
  url = {https://doi.org/10.1002/9780470050118.ecse011},
  doi = {10.1002/9780470050118.ecse011}
}
Jansen C, Helleseth T and Kholosha A (2008), "Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher", In New Stream Cipher Designs - The eSTREAM Finalists. , pp. 224-243.
BibTeX:
@incollection{DBLP:series/lncs/JansenHK08,
  author = {Jansen, Cees and Helleseth, Tor and Kholosha, Alexander},
  title = {Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher},
  booktitle = {New Stream Cipher Designs - The eSTREAM Finalists},
  year = {2008},
  pages = {224--243},
  url = {https://doi.org/10.1007/978-3-540-68351-3_17},
  doi = {10.1007/978-3-540-68351-3_17}
}
Helleseth T (2005), "Autocorrelation", In Encyclopedia of Cryptography and Security.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05,
  author = {Helleseth, Tor},
  title = {Autocorrelation},
  booktitle = {Encyclopedia of Cryptography and Security},
  year = {2005},
  url = {https://doi.org/10.1007/0-387-23483-7_21},
  doi = {10.1007/0-387-23483-7_21}
}
Helleseth T (2005), "Cross-Correlation", In Encyclopedia of Cryptography and Security.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05a,
  author = {Helleseth, Tor},
  title = {Cross-Correlation},
  booktitle = {Encyclopedia of Cryptography and Security},
  year = {2005},
  url = {https://doi.org/10.1007/0-387-23483-7_86},
  doi = {10.1007/0-387-23483-7_86}
}
Helleseth T (2005), "DeBruijn sequence", In Encyclopedia of Cryptography and Security.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05b,
  author = {Helleseth, Tor},
  title = {DeBruijn sequence},
  booktitle = {Encyclopedia of Cryptography and Security},
  year = {2005},
  url = {https://doi.org/10.1007/0-387-23483-7_98},
  doi = {10.1007/0-387-23483-7_98}
}
Helleseth T (2005), "Gap", In Encyclopedia of Cryptography and Security.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05c,
  author = {Helleseth, Tor},
  title = {Gap},
  booktitle = {Encyclopedia of Cryptography and Security},
  year = {2005},
  url = {https://doi.org/10.1007/0-387-23483-7_173},
  doi = {10.1007/0-387-23483-7_173}
}
Helleseth T (2005), "Golomb'S Randomness Postulates", In Encyclopedia of Cryptography and Security.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05d,
  author = {Helleseth, Tor},
  title = {Golomb'S Randomness Postulates},
  booktitle = {Encyclopedia of Cryptography and Security},
  year = {2005},
  url = {https://doi.org/10.1007/0-387-23483-7_178},
  doi = {10.1007/0-387-23483-7_178}
}
Helleseth T (2005), "Maximal-Length Linear Sequence", In Encyclopedia of Cryptography and Security.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05e,
  author = {Helleseth, Tor},
  title = {Maximal-Length Linear Sequence},
  booktitle = {Encyclopedia of Cryptography and Security},
  year = {2005},
  url = {https://doi.org/10.1007/0-387-23483-7_247},
  doi = {10.1007/0-387-23483-7_247}
}
Helleseth T (2005), "Pseudo-Noise Sequence (PN-Sequence)", In Encyclopedia of Cryptography and Security.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05f,
  author = {Helleseth, Tor},
  title = {Pseudo-Noise Sequence (PN-Sequence)},
  booktitle = {Encyclopedia of Cryptography and Security},
  year = {2005},
  url = {https://doi.org/10.1007/0-387-23483-7_326},
  doi = {10.1007/0-387-23483-7_326}
}
Helleseth T (2005), "Run", In Encyclopedia of Cryptography and Security.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05g,
  author = {Helleseth, Tor},
  title = {Run},
  booktitle = {Encyclopedia of Cryptography and Security},
  year = {2005},
  url = {https://doi.org/10.1007/0-387-23483-7_365},
  doi = {10.1007/0-387-23483-7_365}
}
Helleseth T (2005), "Sequences", In Encyclopedia of Cryptography and Security.
BibTeX:
@incollection{DBLP:reference/crypt/Helleseth05h,
  author = {Helleseth, Tor},
  title = {Sequences},
  booktitle = {Encyclopedia of Cryptography and Security},
  year = {2005},
  url = {https://doi.org/10.1007/0-387-23483-7_385},
  doi = {10.1007/0-387-23483-7_385}
}