Matching entries: 0
settings...
Battaglioni M, Chiaraluce F and Kløve T (2017), "On Non-Linear Codes Correcting Errors of Limited Size", In 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, December 4-8, 2017. , pp. 1-7.
BibTeX:
@inproceedings{Battaglioni2017,
  author = {Battaglioni, Massimo and Chiaraluce, Franco and Kløve, Torleiv},
  title = {On Non-Linear Codes Correcting Errors of Limited Size},
  booktitle = {2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, December 4-8, 2017},
  year = {2017},
  pages = {1--7},
  url = {https://doi.org/10.1109/GLOCOM.2017.8254423},
  doi = {10.1109/GLOCOM.2017.8254423}
}
Chen X, Li C and Rong C (2016), "Perfect Gaussian integer sequences from cyclic difference sets", In IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016. , pp. 115-119.
BibTeX:
@inproceedings{Chen2016,
  author = {Chen, Xinjiao and Li, Chunlei and Rong, Chunming},
  title = {Perfect Gaussian integer sequences from cyclic difference sets},
  booktitle = {IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016},
  year = {2016},
  pages = {115--119},
  url = {https://doi.org/10.1109/ISIT.2016.7541272},
  doi = {10.1109/ISIT.2016.7541272}
}
Fauskanger S and Semaev IA (2015), "Statistical and Algebraic Properties of DES", In Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers. , pp. 93-107.
BibTeX:
@inproceedings{DBLP:conf/cisc/FauskangerS15,
  author = {Fauskanger, Stian and Semaev, Igor A.},
  title = {Statistical and Algebraic Properties of DES},
  booktitle = {Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers},
  year = {2015},
  pages = {93--107},
  url = {https://doi.org/10.1007/978-3-319-38898-4_6},
  doi = {10.1007/978-3-319-38898-4_6}
}
Kløve T (2015), "Codes of Length 2 Correcting Single Errors of Limited Size", In Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings. , pp. 190-201.
BibTeX:
@inproceedings{Klove2015,
  author = {Kløve, Torleiv},
  title = {Codes of Length 2 Correcting Single Errors of Limited Size},
  booktitle = {Cryptography and Coding - 15th IMA International Conference, IMACC 2015, Oxford, UK, December 15-17, 2015. Proceedings},
  year = {2015},
  pages = {190--201},
  url = {https://doi.org/10.1007/978-3-319-27239-9_12},
  doi = {10.1007/978-3-319-27239-9_12}
}
Mofrad AA, Ferdosi Z, Parker MG and Tadayon MH (2015), "Neural network associative memories with local coding", In 14th IEEE Canadian Workshop on Information Theory, CWIT 2015, St. John's, NL, Canada, July 6-9, 2015. , pp. 178-181.
BibTeX:
@inproceedings{Mofrad2015,
  author = {Mofrad, Asieh Abolpour and Ferdosi, Zahra and Parker, Matthew G. and Tadayon, Mohammad Hesam},
  title = {Neural network associative memories with local coding},
  booktitle = {14th IEEE Canadian Workshop on Information Theory, CWIT 2015, St. John's, NL, Canada, July 6-9, 2015},
  year = {2015},
  pages = {178--181},
  url = {https://doi.org/10.1109/CWIT.2015.7255180},
  doi = {10.1109/CWIT.2015.7255180}
}
Baldi M, Bianchi M, Cancellieri G, Chiaraluce F and Kløve T (2012), "On the generator matrix of array LDPC codes", In 20th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2012 , Split, Croatia, September 11-13, 2012. , pp. 1-5.
BibTeX:
@inproceedings{Baldi2012a,
  author = {Baldi, Marco and Bianchi, Marco and Cancellieri, Giovanni and Chiaraluce, Franco and Kløve, Torleiv},
  title = {On the generator matrix of array LDPC codes},
  booktitle = {20th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2012 , Split, Croatia, September 11-13, 2012},
  year = {2012},
  pages = {1--5},
  url = {http://ieeexplore.ieee.org/document/6347593/}
}
Budaghyan L and Kazymyrov O (2012), "Verification of Restricted EA-Equivalence for Vectorial Boolean Functions", In Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012. Proceedings. , pp. 108-118.
BibTeX:
@inproceedings{Budaghyan2012b,
  author = {Budaghyan, Lilya and Kazymyrov, Oleksandr},
  title = {Verification of Restricted EA-Equivalence for Vectorial Boolean Functions},
  booktitle = {Arithmetic of Finite Fields - 4th International Workshop, WAIFI 2012, Bochum, Germany, July 16-19, 2012. Proceedings},
  year = {2012},
  pages = {108--118},
  url = {https://doi.org/10.1007/978-3-642-31662-3_8},
  doi = {10.1007/978-3-642-31662-3_8}
}
Kløve T (2012), "On some linear codes that are proper for error detection", In 2012 Information Theory and Applications Workshop, ITA 2012, San Diego, CA, USA, February 5-10, 2012. , pp. 33-38.
BibTeX:
@inproceedings{Klove2012b,
  author = {Kløve, Torleiv},
  title = {On some linear codes that are proper for error detection},
  booktitle = {2012 Information Theory and Applications Workshop, ITA 2012, San Diego, CA, USA, February 5-10, 2012},
  year = {2012},
  pages = {33--38},
  url = {https://doi.org/10.1109/ITA.2012.6181823},
  doi = {10.1109/ITA.2012.6181823}
}
Parker MG and Riera C (2011), "Generalised Complementary Arrays", In Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings. , pp. 41-60.
BibTeX:
@inproceedings{Parker2011a,
  author = {Parker, Matthew G. and Riera, Constanza},
  title = {Generalised Complementary Arrays},
  booktitle = {Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings},
  year = {2011},
  pages = {41--60},
  url = {https://doi.org/10.1007/978-3-642-25516-8_4},
  doi = {10.1007/978-3-642-25516-8_4}
}
Kløve T and Yari S (2010), "Proper self-complementary codes", In Proceedings of the International Symposium on Information Theory and its Applications, ISITA 2010, 17-20 October 2010, Taichung, Taiwan. , pp. 118-122.
BibTeX:
@inproceedings{Klove2010a,
  author = {Kløve, Torleiv and Yari, Somaye},
  title = {Proper self-complementary codes},
  booktitle = {Proceedings of the International Symposium on Information Theory and its Applications, ISITA 2010, 17-20 October 2010, Taichung, Taiwan},
  year = {2010},
  pages = {118--122},
  url = {https://doi.org/10.1109/ISITA.2010.5649432},
  doi = {10.1109/ISITA.2010.5649432}
}
Knudsen JG, Riera C, Danielsen LE, Parker MG and Rosnes E (2010), "Improved adaptive belief propagation decoding using edge-local complementation", In IEEE International Symposium on Information Theory, ISIT 2010, June 13-18, 2010, Austin, Texas, USA, Proceedings. , pp. 774-778.
BibTeX:
@inproceedings{Knudsen2010,
  author = {Knudsen, Joakim Grahl and Riera, Constanza and Danielsen, Lars Eirik and Parker, Matthew G. and Rosnes, Eirik},
  title = {Improved adaptive belief propagation decoding using edge-local complementation},
  booktitle = {IEEE International Symposium on Information Theory, ISIT 2010, June 13-18, 2010, Austin, Texas, USA, Proceedings},
  year = {2010},
  pages = {774--778},
  url = {https://doi.org/10.1109/ISIT.2010.5513625},
  doi = {10.1109/ISIT.2010.5513625}
}
Bjørstad TE and Parker MG (2009), "Equivalence Between Certain Complementary Pairs of Types I and III", In Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes. , pp. 203-221.
BibTeX:
@inproceedings{Bjorstad2009,
  author = {Bjørstad, Tor E. and Parker, Matthew G.},
  title = {Equivalence Between Certain Complementary Pairs of Types I and III},
  booktitle = {Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes},
  year = {2009},
  pages = {203--221},
  url = {https://doi.org/10.3233/978-1-60750-002-5-203},
  doi = {10.3233/978-1-60750-002-5-203}
}
Danielsen LE, Parker MG and Solé P (2009), "The Rayleigh Quotient of Bent Functions", In Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings. , pp. 418-432.
BibTeX:
@inproceedings{Danielsen2009,
  author = {Danielsen, Lars Eirik and Parker, Matthew G. and Solé, Patrick},
  title = {The Rayleigh Quotient of Bent Functions},
  booktitle = {Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  year = {2009},
  pages = {418--432},
  url = {https://doi.org/10.1007/978-3-642-10868-6_25},
  doi = {10.1007/978-3-642-10868-6_25}
}
Kløve T (2009), "On the existence of proper codes for error detection", In IEEE International Symposium on Information Theory, ISIT 2009, June 28 - July 3, 2009, Seoul, Korea, Proceedings. , pp. 239-243.
BibTeX:
@inproceedings{Klove2009b,
  author = {Kløve, Torleiv},
  title = {On the existence of proper codes for error detection},
  booktitle = {IEEE International Symposium on Information Theory, ISIT 2009, June 28 - July 3, 2009, Seoul, Korea, Proceedings},
  year = {2009},
  pages = {239--243},
  url = {https://doi.org/10.1109/ISIT.2009.5205998},
  doi = {10.1109/ISIT.2009.5205998}
}
Knudsen JG, Riera C, Danielsen LE, Parker MG and Rosnes E (2009), "Iterative decoding on multiple tanner graphs using random edge local complementation", In IEEE International Symposium on Information Theory, ISIT 2009, June 28 - July 3, 2009, Seoul, Korea, Proceedings. , pp. 899-903.
BibTeX:
@inproceedings{Knudsen2009,
  author = {Knudsen, Joakim Grahl and Riera, Constanza and Danielsen, Lars Eirik and Parker, Matthew G. and Rosnes, Eirik},
  title = {Iterative decoding on multiple tanner graphs using random edge local complementation},
  booktitle = {IEEE International Symposium on Information Theory, ISIT 2009, June 28 - July 3, 2009, Seoul, Korea, Proceedings},
  year = {2009},
  pages = {899--903},
  url = {https://doi.org/10.1109/ISIT.2009.5205625},
  doi = {10.1109/ISIT.2009.5205625}
}
Knudsen JG, Riera C, Parker MG and Rosnes E (2008), "Adaptive Soft-Decision Iterative Decoding Using Edge Local Complementation", In Coding Theory and Applications, Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings. , pp. 82-94.
BibTeX:
@inproceedings{Knudsen2008,
  author = {Knudsen, Joakim Grahl and Riera, Constanza and Parker, Matthew G. and Rosnes, Eirik},
  title = {Adaptive Soft-Decision Iterative Decoding Using Edge Local Complementation},
  booktitle = {Coding Theory and Applications, Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings},
  year = {2008},
  pages = {82--94},
  url = {https://doi.org/10.1007/978-3-540-87448-5_10},
  doi = {10.1007/978-3-540-87448-5_10}
}
Parker MG (2008), "Close Encounters with Boolean Functions of Three Different Kinds", In Coding Theory and Applications, Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings. , pp. 137-153.
BibTeX:
@inproceedings{Parker2008,
  author = {Parker, Matthew G.},
  title = {Close Encounters with Boolean Functions of Three Different Kinds},
  booktitle = {Coding Theory and Applications, Second International Castle Meeting, ICMCTA 2008, Castillo de la Mota, Medina del Campo, Spain, September 15-19, 2008. Proceedings},
  year = {2008},
  pages = {137--153},
  url = {https://doi.org/10.1007/978-3-540-87448-5_15},
  doi = {10.1007/978-3-540-87448-5_15}
}
Schmidt K, Parker MG and Pott A (2008), "Negabent Functions in the Maiorana-McFarland Class", In Sequences and Their Applications - SETA 2008, 5th International Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings. , pp. 390-402.
BibTeX:
@inproceedings{Schmidt2008,
  author = {Schmidt, Kai-Uwe and Parker, Matthew G. and Pott, Alexander},
  title = {Negabent Functions in the Maiorana-McFarland Class},
  booktitle = {Sequences and Their Applications - SETA 2008, 5th International Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings},
  year = {2008},
  pages = {390--402},
  url = {https://doi.org/10.1007/978-3-540-85912-3_34},
  doi = {10.1007/978-3-540-85912-3_34}
}
Budaghyan L (2007), "The Simplest Method for Constructing APN Polynomials EA-Inequivalent to Power Functions", In Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings. , pp. 177-188.
BibTeX:
@inproceedings{Budaghyan2007,
  author = {Budaghyan, Lilya},
  title = {The Simplest Method for Constructing APN Polynomials EA-Inequivalent to Power Functions},
  booktitle = {Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings},
  year = {2007},
  pages = {177--188},
  url = {https://doi.org/10.1007/978-3-540-73074-3_14},
  doi = {10.1007/978-3-540-73074-3_14}
}
Chiaraluce F, Baldi M, Spinsante S and Kløve T (2007), "The Probability of Undetected Error for Varshamov-Tenengol'ts Codes", In Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, 24-28 June 2007. , pp. 1119-1124.
BibTeX:
@inproceedings{Chiaraluce2007,
  author = {Chiaraluce, Franco and Baldi, Marco and Spinsante, Susanna and Kløve, Torleiv},
  title = {The Probability of Undetected Error for Varshamov-Tenengol'ts Codes},
  booktitle = {Proceedings of IEEE International Conference on Communications, ICC 2007, Glasgow, Scotland, 24-28 June 2007},
  year = {2007},
  pages = {1119--1124},
  url = {https://doi.org/10.1109/ICC.2007.190},
  doi = {10.1109/ICC.2007.190}
}
Parker MG and Pott A (2007), "On Boolean Functions Which Are Bent and Negabent", In Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers. , pp. 9-23.
BibTeX:
@inproceedings{Parker2007,
  author = {Parker, Matthew G. and Pott, Alexander},
  title = {On Boolean Functions Which Are Bent and Negabent},
  booktitle = {Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers},
  year = {2007},
  pages = {9--23},
  url = {https://doi.org/10.1007/978-3-540-77404-4_2},
  doi = {10.1007/978-3-540-77404-4_2}
}
Commeine A and Semaev IA (2006), "An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve", In Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings. , pp. 174-190.
BibTeX:
@inproceedings{DBLP:conf/pkc/CommeineS06,
  author = {Commeine, An and Semaev, Igor A.},
  title = {An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve},
  booktitle = {Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings},
  year = {2006},
  pages = {174--190},
  url = {https://doi.org/10.1007/11745853_12},
  doi = {10.1007/11745853_12}
}
Kløve T (2006), "Binary Linear Codes That Are Optimal for Error Correction", In General Theory of Information Transfer and Combinatorics. , pp. 1081-1083.
BibTeX:
@inproceedings{Klove2006,
  author = {Kløve, Torleiv},
  title = {Binary Linear Codes That Are Optimal for Error Correction},
  booktitle = {General Theory of Information Transfer and Combinatorics},
  year = {2006},
  pages = {1081--1083},
  url = {https://doi.org/10.1007/11889342_75},
  doi = {10.1007/11889342_75}
}
Braeken A and Semaev IA (2005), "The ANF of the Composition of Addition and Multiplication mod 2^n with a Boolean Function", In Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers. , pp. 112-125.
BibTeX:
@inproceedings{DBLP:conf/fse/BraekenS05,
  author = {Braeken, An and Semaev, Igor A.},
  title = {The ANF of the Composition of Addition and Multiplication mod 2^n with a Boolean Function},
  booktitle = {Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers},
  year = {2005},
  pages = {112--125},
  url = {https://doi.org/10.1007/11502760_8},
  doi = {10.1007/11502760_8}
}
Riera C and Parker MG (2005), "One and Two-Variable Interlace Polynomials: A Spectral Interpretation", In Coding and Cryptography, International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers. , pp. 397-411.
BibTeX:
@inproceedings{Riera2005,
  author = {Riera, Constanza and Parker, Matthew G.},
  title = {One and Two-Variable Interlace Polynomials: A Spectral Interpretation},
  booktitle = {Coding and Cryptography, International Workshop, WCC 2005, Bergen, Norway, March 14-18, 2005. Revised Selected Papers},
  year = {2005},
  pages = {397--411},
  url = {https://doi.org/10.1007/11779360_31},
  doi = {10.1007/11779360_31}
}
Danielsen LE and Parker MG (2004), "Spectral Orbits and Peak-to-Average Power Ratio of Boolean Functions with Respect to the I, H, N\^n Transform", In Sequences and Their Applications - SETA 2004, Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers. , pp. 373-388.
BibTeX:
@inproceedings{Danielsen2004,
  author = {Danielsen, Lars Eirik and Parker, Matthew G.},
  title = {Spectral Orbits and Peak-to-Average Power Ratio of Boolean Functions with Respect to the I, H, N\^n Transform},
  booktitle = {Sequences and Their Applications - SETA 2004, Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers},
  year = {2004},
  pages = {373--388},
  url = {https://doi.org/10.1007/11423461_28},
  doi = {10.1007/11423461_28}
}
Parker MG (2004), "Univariate and Multivariate Merit Factors", In Sequences and Their Applications - SETA 2004, Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers. , pp. 72-100.
BibTeX:
@inproceedings{Parker2004,
  author = {Parker, Matthew G.},
  title = {Univariate and Multivariate Merit Factors},
  booktitle = {Sequences and Their Applications - SETA 2004, Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers},
  year = {2004},
  pages = {72--100},
  url = {https://doi.org/10.1007/11423461_4},
  doi = {10.1007/11423461_4}
}
Semaev IA (2001), "A 3-Dimensional Lattice Reduction Algorithm", In Cryptography and Lattices, International Conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001, Revised Papers. , pp. 181-193.
BibTeX:
@inproceedings{DBLP:conf/calc/Semaev01,
  author = {Semaev, Igor A.},
  title = {A 3-Dimensional Lattice Reduction Algorithm},
  booktitle = {Cryptography and Lattices, International Conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001, Revised Papers},
  year = {2001},
  pages = {181--193},
  url = {https://doi.org/10.1007/3-540-44670-2_13},
  doi = {10.1007/3-540-44670-2_13}
}
Parker MG (2001), "Even Length Binary Sequence Families with Low Negaperiodic Autocorrelation", In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 14th International Symposium, AAECC-14, Melbourne, Australia November 26-30, 2001, Proceedings. , pp. 200-209.
BibTeX:
@inproceedings{Parker2001b,
  author = {Parker, Matthew G.},
  title = {Even Length Binary Sequence Families with Low Negaperiodic Autocorrelation},
  booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 14th International Symposium, AAECC-14, Melbourne, Australia November 26-30, 2001, Proceedings},
  year = {2001},
  pages = {200--209},
  url = {https://doi.org/10.1007/3-540-45624-4_21},
  doi = {10.1007/3-540-45624-4_21}
}
Parker MG (2001), "Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement", In Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings. , pp. 339-354.
BibTeX:
@inproceedings{Parker2001c,
  author = {Parker, Matthew G.},
  title = {Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement},
  booktitle = {Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings},
  year = {2001},
  pages = {339--354},
  url = {https://doi.org/10.1007/3-540-45325-3_30},
  doi = {10.1007/3-540-45325-3_30}
}
Parker MG (1999), "Conjectures on the Size of Constellations Constructed from Direct Sums of PSK Kernels", In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November 15-19, 1999, Proceedings. , pp. 420-429.
BibTeX:
@inproceedings{Parker1999,
  author = {Parker, Matthew G.},
  title = {Conjectures on the Size of Constellations Constructed from Direct Sums of PSK Kernels},
  booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November 15-19, 1999, Proceedings},
  year = {1999},
  pages = {420--429},
  url = {https://doi.org/10.1007/3-540-46796-3_40},
  doi = {10.1007/3-540-46796-3_40}
}
Semaev IA (1998), "Evaluation of Linear Relations between Vectors of a Lattice in Euclidean Space", In Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings. , pp. 311-322.
BibTeX:
@inproceedings{DBLP:conf/ants/Semaev98,
  author = {Semaev, Igor A.},
  title = {Evaluation of Linear Relations between Vectors of a Lattice in Euclidean Space},
  booktitle = {Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings},
  year = {1998},
  pages = {311--322},
  url = {https://doi.org/10.1007/BFb0054871},
  doi = {10.1007/BFb0054871}
}
Rønjom S, Bardeh NG and Helleseth T (2017), "Yoyo Tricks with AES", In Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. , pp. 217-243.
BibTeX:
@inproceedings{DBLP:conf/asiacrypt/RonjomBH17,
  author = {Rønjom, Sondre and Bardeh, Navid Ghaedi and Helleseth, Tor},
  title = {Yoyo Tricks with AES},
  booktitle = {Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I},
  year = {2017},
  pages = {217--243},
  url = {https://doi.org/10.1007/978-3-319-70694-8_8},
  doi = {10.1007/978-3-319-70694-8_8}
}
Budaghyan L, Helleseth T, Li N and Sun B (2017), "Some Results on the Known Classes of Quadratic APN Functions", In Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet. , pp. 3-16.
BibTeX:
@inproceedings{DBLP:conf/c2si/BudaghyanHLS17,
  author = {Budaghyan, Lilya and Helleseth, Tor and Li, Nian and Sun, Bo},
  title = {Some Results on the Known Classes of Quadratic APN Functions},
  booktitle = {Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet},
  year = {2017},
  pages = {3--16},
  url = {https://doi.org/10.1007/978-3-319-55589-8_1},
  doi = {10.1007/978-3-319-55589-8_1}
}
Budaghyan L, Carlet C, Helleseth T and Li N (2016), "On the (non-)existence of APN (n, n)-functions of algebraic degree n", In IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016. , pp. 480-484.
BibTeX:
@inproceedings{DBLP:conf/isit/BudaghyanCHL16,
  author = {Budaghyan, Lilya and Carlet, Claude and Helleseth, Tor and Li, Nian},
  title = {On the (non-)existence of APN (n, n)-functions of algebraic degree n},
  booktitle = {IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016},
  year = {2016},
  pages = {480--484},
  url = {https://doi.org/10.1109/ISIT.2016.7541345},
  doi = {10.1109/ISIT.2016.7541345}
}
Helleseth T and Kholosha A (2016), "New ternary binomial bent functions", In IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016. , pp. 101-104.
BibTeX:
@inproceedings{DBLP:conf/isit/HellesethK16,
  author = {Helleseth, Tor and Kholosha, Alexander},
  title = {New ternary binomial bent functions},
  booktitle = {IEEE International Symposium on Information Theory, ISIT 2016, Barcelona, Spain, July 10-15, 2016},
  year = {2016},
  pages = {101--104},
  url = {https://doi.org/10.1109/ISIT.2016.7541269},
  doi = {10.1109/ISIT.2016.7541269}
}
Alahmadi A, Helleseth T, Muthana NM, Almuzaini A and Solé P (2015), "Irreducible cyclic Z_4 - codes and allied sequences", In Seventh International Workshop on Signal Design and its Applications in Communications, IWSDA 2015, Bengaluru, India, September 14-18, 2015. , pp. 160-164.
BibTeX:
@inproceedings{DBLP:conf/iwsda/AlahmadiHMAS15,
  author = {Alahmadi, Adel and Helleseth, Tor and Muthana, Najat M. and Almuzaini, Atiqah and Solé, Patrick},
  title = {Irreducible cyclic Z_4 - codes and allied sequences},
  booktitle = {Seventh International Workshop on Signal Design and its Applications in Communications, IWSDA 2015, Bengaluru, India, September 14-18, 2015},
  year = {2015},
  pages = {160--164},
  url = {https://doi.org/10.1109/IWSDA.2015.7458395},
  doi = {10.1109/IWSDA.2015.7458395}
}
Li N, Zhou Z and Helleseth T (2015), "On a conjecture about a class of optimal ternary cyclic codes", In Seventh International Workshop on Signal Design and its Applications in Communications, IWSDA 2015, Bengaluru, India, September 14-18, 2015. , pp. 62-65.
BibTeX:
@inproceedings{DBLP:conf/iwsda/LiZH15,
  author = {Li, Nian and Zhou, Zhengchun and Helleseth, Tor},
  title = {On a conjecture about a class of optimal ternary cyclic codes},
  booktitle = {Seventh International Workshop on Signal Design and its Applications in Communications, IWSDA 2015, Bengaluru, India, September 14-18, 2015},
  year = {2015},
  pages = {62--65},
  url = {https://doi.org/10.1109/IWSDA.2015.7458415},
  doi = {10.1109/IWSDA.2015.7458415}
}
Budaghyan L, Kholosha A, Carlet C and Helleseth T (2014), "Niho bent functions from quadratic o-monomials", In 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014. , pp. 1827-1831.
BibTeX:
@inproceedings{DBLP:conf/isit/BudaghyanKCH14,
  author = {Budaghyan, Lilya and Kholosha, Alexander and Carlet, Claude and Helleseth, Tor},
  title = {Niho bent functions from quadratic o-monomials},
  booktitle = {2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014},
  year = {2014},
  pages = {1827--1831},
  url = {https://doi.org/10.1109/ISIT.2014.6875149},
  doi = {10.1109/ISIT.2014.6875149}
}
Hu H, Shao S, Gong G and Helleseth T (2014), "On the proof of Lin's conjecture", In 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014. , pp. 1822-1826.
BibTeX:
@inproceedings{DBLP:conf/isit/HuSGH14,
  author = {Hu, Honggang and Shao, Shuai and Gong, Guang and Helleseth, Tor},
  title = {On the proof of Lin's conjecture},
  booktitle = {2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29 - July 4, 2014},
  year = {2014},
  pages = {1822--1826},
  url = {https://doi.org/10.1109/ISIT.2014.6875148},
  doi = {10.1109/ISIT.2014.6875148}
}
Xia Y, Helleseth T and Wu G (2014), "A Note on Cross-Correlation Distribution Between a Ternary m -Sequence and Its Decimated Sequence", In Sequences and Their Applications - SETA 2014 - 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings. , pp. 249-259.
BibTeX:
@inproceedings{DBLP:conf/seta/XiaHW14,
  author = {Xia, Yongbo and Helleseth, Tor and Wu, Gaofei},
  title = {A Note on Cross-Correlation Distribution Between a Ternary m -Sequence and Its Decimated Sequence},
  booktitle = {Sequences and Their Applications - SETA 2014 - 8th International Conference, Melbourne, VIC, Australia, November 24-28, 2014, Proceedings},
  year = {2014},
  pages = {249--259},
  url = {https://doi.org/10.1007/978-3-319-12325-7_21},
  doi = {10.1007/978-3-319-12325-7_21}
}
Budaghyan L, Carlet C, Helleseth T and Kholosha A (2014), "On o-Equivalence of Niho Bent Functions", In Arithmetic of Finite Fields - 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers. , pp. 155-168.
BibTeX:
@inproceedings{DBLP:conf/waifi/BudaghyanCHK14,
  author = {Budaghyan, Lilya and Carlet, Claude and Helleseth, Tor and Kholosha, Alexander},
  title = {On o-Equivalence of Niho Bent Functions},
  booktitle = {Arithmetic of Finite Fields - 5th International Workshop, WAIFI 2014, Gebze, Turkey, September 27-28, 2014. Revised Selected Papers},
  year = {2014},
  pages = {155--168},
  url = {https://doi.org/10.1007/978-3-319-16277-5_9},
  doi = {10.1007/978-3-319-16277-5_9}
}
Helleseth T, Jansen CJA, Kazymyrov O and Kholosha A (2013), "State space cryptanalysis of the MICKEY cipher", In 2013 Information Theory and Applications Workshop, ITA 2013, San Diego, CA, USA, February 10-15, 2013. , pp. 1-10.
BibTeX:
@inproceedings{DBLP:conf/ita/HellesethJKK13,
  author = {Helleseth, Tor and Jansen, Cees J. A. and Kazymyrov, Oleksandr and Kholosha, Alexander},
  title = {State space cryptanalysis of the MICKEY cipher},
  booktitle = {2013 Information Theory and Applications Workshop, ITA 2013, San Diego, CA, USA, February 10-15, 2013},
  year = {2013},
  pages = {1--10},
  url = {https://doi.org/10.1109/ITA.2013.6502941},
  doi = {10.1109/ITA.2013.6502941}
}
Budaghyan L, Carlet C, Helleseth T and Kholosha A (2012), "Generalized bent functions and their relation to Maiorana-McFarland class", In Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012. , pp. 1212-1215.
BibTeX:
@inproceedings{DBLP:conf/isit/BudaghyanCHK12,
  author = {Budaghyan, Lilya and Carlet, Claude and Helleseth, Tor and Kholosha, Alexander},
  title = {Generalized bent functions and their relation to Maiorana-McFarland class},
  booktitle = {Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012},
  year = {2012},
  pages = {1212--1215},
  url = {https://doi.org/10.1109/ISIT.2012.6283049},
  doi = {10.1109/ISIT.2012.6283049}
}
Li C and Helleseth T (2012), "New nonbinary sequence families with low correlation and large linear span", In Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012. , pp. 1411-1415.
BibTeX:
@inproceedings{DBLP:conf/isit/LiH12,
  author = {Li, Chunlei and Helleseth, Tor},
  title = {New nonbinary sequence families with low correlation and large linear span},
  booktitle = {Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012},
  year = {2012},
  pages = {1411--1415},
  url = {https://doi.org/10.1109/ISIT.2012.6283494},
  doi = {10.1109/ISIT.2012.6283494}
}
Li N, Tang X and Helleseth T (2012), "New classes of generalized boolean bent functions over Z4", In Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012. , pp. 841-845.
BibTeX:
@inproceedings{DBLP:conf/isit/LiTH12,
  author = {Li, Nian and Tang, Xiaohu and Helleseth, Tor},
  title = {New classes of generalized boolean bent functions over Z4},
  booktitle = {Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012},
  year = {2012},
  pages = {841--845},
  url = {https://doi.org/10.1109/ISIT.2012.6284679},
  doi = {10.1109/ISIT.2012.6284679}
}
Luo J and Helleseth T (2012), "Binary Niho sequences with four-valued cross correlations", In Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012. , pp. 1216-1220.
BibTeX:
@inproceedings{DBLP:conf/isit/LuoH12,
  author = {Luo, Jinquan and Helleseth, Tor},
  title = {Binary Niho sequences with four-valued cross correlations},
  booktitle = {Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012},
  year = {2012},
  pages = {1216--1220},
  url = {https://doi.org/10.1109/ISIT.2012.6283050},
  doi = {10.1109/ISIT.2012.6283050}
}
Gong G, Helleseth T, Hu H and Li C (2012), "New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences", In Sequences and Their Applications - SETA 2012 - 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings. , pp. 327-337.
BibTeX:
@inproceedings{DBLP:conf/seta/GongHHL12,
  author = {Gong, Guang and Helleseth, Tor and Hu, Honggang and Li, Chunlei},
  title = {New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences},
  booktitle = {Sequences and Their Applications - SETA 2012 - 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings},
  year = {2012},
  pages = {327--337},
  url = {https://doi.org/10.1007/978-3-642-30615-0_30},
  doi = {10.1007/978-3-642-30615-0_30}
}
Carlet C, Helleseth T, Kholosha A and Mesnager S (2011), "On the dual of bent functions with 2^r Niho exponents", In 2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011, St. Petersburg, Russia, July 31 - August 5, 2011. , pp. 703-707.
BibTeX:
@inproceedings{DBLP:conf/isit/CarletHKM11,
  author = {Carlet, Claude and Helleseth, Tor and Kholosha, Alexander and Mesnager, Sihem},
  title = {On the dual of bent functions with 2^r Niho exponents},
  booktitle = {2011 IEEE International Symposium on Information Theory Proceedings, ISIT 2011, St. Petersburg, Russia, July 31 - August 5, 2011},
  year = {2011},
  pages = {703--707},
  url = {https://doi.org/10.1109/ISIT.2011.6034224},
  doi = {10.1109/ISIT.2011.6034224}
}
Helleseth T and Rønjom S (2011), "Simplifying algebraic attacks with univariate analysis", In Information Theory and Applications Workshop, ITA 2011, San Diego, California, USA, February 6-11, 2011. , pp. 153-159.
BibTeX:
@inproceedings{DBLP:conf/ita/HellesethR11,
  author = {Helleseth, Tor and Rønjom, Sondre},
  title = {Simplifying algebraic attacks with univariate analysis},
  booktitle = {Information Theory and Applications Workshop, ITA 2011, San Diego, California, USA, February 6-11, 2011},
  year = {2011},
  pages = {153--159},
  url = {https://doi.org/10.1109/ITA.2011.5743578},
  doi = {10.1109/ITA.2011.5743578}
}
Budaghyan L, Carlet C and Helleseth T (2011), "On bent functions associated to AB functions", In 2011 IEEE Information Theory Workshop, ITW 2011, Paraty, Brazil, October 16-20, 2011. , pp. 150-154.
BibTeX:
@inproceedings{DBLP:conf/itw/BudaghyanCH11,
  author = {Budaghyan, Lilya and Carlet, Claude and Helleseth, Tor},
  title = {On bent functions associated to AB functions},
  booktitle = {2011 IEEE Information Theory Workshop, ITW 2011, Paraty, Brazil, October 16-20, 2011},
  year = {2011},
  pages = {150--154},
  url = {https://doi.org/10.1109/ITW.2011.6089365},
  doi = {10.1109/ITW.2011.6089365}
}
Luo J, Helleseth T and Kholosha A (2011), "Two nonbinary sequences with six-valued cross correlation", In Fifth International Workshop on Signal Design and its Applications in Communications, IWSDA 2011, Guilin, China, October 10-14, 2011. , pp. 44-47.
BibTeX:
@inproceedings{DBLP:conf/iwsda/LuoHK11,
  author = {Luo, Jinquan and Helleseth, Tor and Kholosha, Alexander},
  title = {Two nonbinary sequences with six-valued cross correlation},
  booktitle = {Fifth International Workshop on Signal Design and its Applications in Communications, IWSDA 2011, Guilin, China, October 10-14, 2011},
  year = {2011},
  pages = {44--47},
  url = {https://doi.org/10.1109/IWSDA.2011.6159435},
  doi = {10.1109/IWSDA.2011.6159435}
}
Parker MG (2011), "Complementary arrays - New directions", In Fifth International Workshop on Signal Design and its Applications in Communications, IWSDA 2011, Guilin, China, October 10-14, 2011. , pp. 2.
BibTeX:
@inproceedings{Parker2011b,
  author = {Parker, Matthew G.},
  title = {Complementary arrays - New directions},
  booktitle = {Fifth International Workshop on Signal Design and its Applications in Communications, IWSDA 2011, Guilin, China, October 10-14, 2011},
  year = {2011},
  pages = {2},
  url = {https://doi.org/10.1109/IWSDA.2011.6159425},
  doi = {10.1109/IWSDA.2011.6159425}
}
Hassanzadeh MM and Helleseth T (2010), "Algebraic attack on the Alternating Step(r, s) Generator", In IEEE International Symposium on Information Theory, ISIT 2010, June 13-18, 2010, Austin, Texas, USA, Proceedings. , pp. 2493-2497.
BibTeX:
@inproceedings{DBLP:conf/isit/HassanzadehH10,
  author = {Hassanzadeh, Mehdi M. and Helleseth, Tor},
  title = {Algebraic attack on the Alternating Step(r, s) Generator},
  booktitle = {IEEE International Symposium on Information Theory, ISIT 2010, June 13-18, 2010, Austin, Texas, USA, Proceedings},
  year = {2010},
  pages = {2493--2497},
  url = {https://doi.org/10.1109/ISIT.2010.5513443},
  doi = {10.1109/ISIT.2010.5513443}
}
Helleseth T and Kholosha A (2010), "New binomial bent functions over the finite fields of odd characteristic", In IEEE International Symposium on Information Theory, ISIT 2010, June 13-18, 2010, Austin, Texas, USA, Proceedings. , pp. 1277-1281.
BibTeX:
@inproceedings{DBLP:conf/isit/HellesethK10,
  author = {Helleseth, Tor and Kholosha, Alexander},
  title = {New binomial bent functions over the finite fields of odd characteristic},
  booktitle = {IEEE International Symposium on Information Theory, ISIT 2010, June 13-18, 2010, Austin, Texas, USA, Proceedings},
  year = {2010},
  pages = {1277--1281},
  url = {https://doi.org/10.1109/ISIT.2010.5513704},
  doi = {10.1109/ISIT.2010.5513704}
}
Helleseth T and Kholosha A (2010), "On generalized bent functions", In Information Theory and Applications Workshop, ITA 2010, San Diego, California, USA, January 31 - February 5, 2010. , pp. 178-183.
BibTeX:
@inproceedings{DBLP:conf/ita/HellesethK10,
  author = {Helleseth, Tor and Kholosha, Alexander},
  title = {On generalized bent functions},
  booktitle = {Information Theory and Applications Workshop, ITA 2010, San Diego, California, USA, January 31 - February 5, 2010},
  year = {2010},
  pages = {178--183},
  url = {https://doi.org/10.1109/ITA.2010.5454124},
  doi = {10.1109/ITA.2010.5454124}
}
Helleseth T and Kholosha A (2010), "Sequences, Bent Functions and Jacobsthal Sums", In Sequences and Their Applications - SETA 2010 - 6th International Conference, Paris, France, September 13-17, 2010. Proceedings. , pp. 416-429.
BibTeX:
@inproceedings{DBLP:conf/seta/HellesethK10,
  author = {Helleseth, Tor and Kholosha, Alexander},
  title = {Sequences, Bent Functions and Jacobsthal Sums},
  booktitle = {Sequences and Their Applications - SETA 2010 - 6th International Conference, Paris, France, September 13-17, 2010. Proceedings},
  year = {2010},
  pages = {416--429},
  url = {https://doi.org/10.1007/978-3-642-15874-2_35},
  doi = {10.1007/978-3-642-15874-2_35}
}
Bracken C and Helleseth T (2009), "Triple-error-correcting BCH-like codes", In IEEE International Symposium on Information Theory, ISIT 2009, June 28 - July 3, 2009, Seoul, Korea, Proceedings. , pp. 1723-1725.
BibTeX:
@inproceedings{DBLP:conf/isit/BrackenH09,
  author = {Bracken, Carl and Helleseth, Tor},
  title = {Triple-error-correcting BCH-like codes},
  booktitle = {IEEE International Symposium on Information Theory, ISIT 2009, June 28 - July 3, 2009, Seoul, Korea, Proceedings},
  year = {2009},
  pages = {1723--1725},
  url = {https://doi.org/10.1109/ISIT.2009.5205249},
  doi = {10.1109/ISIT.2009.5205249}
}
Charpin P, Helleseth T and Zinoviev VA (2008), "Divisibility properties of Kloosterman sums over finite fields of characteristic two", In 2008 IEEE International Symposium on Information Theory, ISIT 2008, Toronto, ON, Canada, July 6-11, 2008. , pp. 2608-2612.
BibTeX:
@inproceedings{DBLP:conf/isit/CharpinHZ08,
  author = {Charpin, Pascale and Helleseth, Tor and Zinoviev, Victor A.},
  title = {Divisibility properties of Kloosterman sums over finite fields of characteristic two},
  booktitle = {2008 IEEE International Symposium on Information Theory, ISIT 2008, Toronto, ON, Canada, July 6-11, 2008},
  year = {2008},
  pages = {2608--2612},
  url = {https://doi.org/10.1109/ISIT.2008.4595463},
  doi = {10.1109/ISIT.2008.4595463}
}
Helleseth T, Kholosha A and Johansen A (2008), "m-sequences of different lengths with four-valued cross correlation", In 2008 IEEE International Symposium on Information Theory, ISIT 2008, Toronto, ON, Canada, July 6-11, 2008. , pp. 2598-2602.
BibTeX:
@inproceedings{DBLP:conf/isit/HellesethKJ08,
  author = {Helleseth, Tor and Kholosha, Alexander and Johansen, Aina},
  title = {m-sequences of different lengths with four-valued cross correlation},
  booktitle = {2008 IEEE International Symposium on Information Theory, ISIT 2008, Toronto, ON, Canada, July 6-11, 2008},
  year = {2008},
  pages = {2598--2602},
  url = {https://doi.org/10.1109/ISIT.2008.4595461},
  doi = {10.1109/ISIT.2008.4595461}
}
Budaghyan L and Helleseth T (2008), "New Perfect Nonlinear Multinomials over Ffor Any Odd Prime p", In Sequences and Their Applications - SETA 2008, 5th International Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings. , pp. 403-414.
BibTeX:
@inproceedings{DBLP:conf/seta/BudaghyanH08,
  author = {Budaghyan, Lilya and Helleseth, Tor},
  title = {New Perfect Nonlinear Multinomials over Ffor Any Odd Prime p},
  booktitle = {Sequences and Their Applications - SETA 2008, 5th International Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings},
  year = {2008},
  pages = {403--414},
  url = {https://doi.org/10.1007/978-3-540-85912-3_35},
  doi = {10.1007/978-3-540-85912-3_35}
}
Helleseth T and Kholosha A (2008), "m-Sequences of Lengths 2^2k-1 and 2^k-1 with at Most Four-Valued Cross Correlation", In Sequences and Their Applications - SETA 2008, 5th International Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings. , pp. 106-120.
BibTeX:
@inproceedings{DBLP:conf/seta/HellesethK08,
  author = {Helleseth, Tor and Kholosha, Alexander},
  title = {m-Sequences of Lengths 2^2k-1 and 2^k-1 with at Most Four-Valued Cross Correlation},
  booktitle = {Sequences and Their Applications - SETA 2008, 5th International Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings},
  year = {2008},
  pages = {106--120},
  url = {https://doi.org/10.1007/978-3-540-85912-3_10},
  doi = {10.1007/978-3-540-85912-3_10}
}
Tang X, Helleseth T and Johansen A (2008), "On the Correlation Distribution of Kerdock Sequences", In Sequences and Their Applications - SETA 2008, 5th International Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings. , pp. 121-129.
BibTeX:
@inproceedings{DBLP:conf/seta/TangHJ08,
  author = {Tang, Xiaohu and Helleseth, Tor and Johansen, Aina},
  title = {On the Correlation Distribution of Kerdock Sequences},
  booktitle = {Sequences and Their Applications - SETA 2008, 5th International Conference, Lexington, KY, USA, September 14-18, 2008, Proceedings},
  year = {2008},
  pages = {121--129},
  url = {https://doi.org/10.1007/978-3-540-85912-3_11},
  doi = {10.1007/978-3-540-85912-3_11}
}
Rønjom S, Gong G and Helleseth T (2007), "A Survey of Recent Attacks on the Filter Generator", In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings. , pp. 7-17.
BibTeX:
@inproceedings{DBLP:conf/aaecc/RonjomGH07,
  author = {Rønjom, Sondre and Gong, Guang and Helleseth, Tor},
  title = {A Survey of Recent Attacks on the Filter Generator},
  booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings},
  year = {2007},
  pages = {7--17},
  url = {https://doi.org/10.1007/978-3-540-77224-8_2},
  doi = {10.1007/978-3-540-77224-8_2}
}
Helleseth T and Kholosha A (2007), "On the Dual of Monomial Quadratic p -ary Bent Functions", In Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers. , pp. 50-61.
BibTeX:
@inproceedings{DBLP:conf/ssc/HellesethK07,
  author = {Helleseth, Tor and Kholosha, Alexander},
  title = {On the Dual of Monomial Quadratic p -ary Bent Functions},
  booktitle = {Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers},
  year = {2007},
  pages = {50--61},
  url = {https://doi.org/10.1007/978-3-540-77404-4_5},
  doi = {10.1007/978-3-540-77404-4_5}
}
Rønjom S, Gong G and Helleseth T (2007), "On Attacks on Filtering Generators Using Linear Subspace Structures", In Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers. , pp. 204-217.
BibTeX:
@inproceedings{DBLP:conf/ssc/RonjomGH07,
  author = {Rønjom, Sondre and Gong, Guang and Helleseth, Tor},
  title = {On Attacks on Filtering Generators Using Linear Subspace Structures},
  booktitle = {Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers},
  year = {2007},
  pages = {204--217},
  url = {https://doi.org/10.1007/978-3-540-77404-4_20},
  doi = {10.1007/978-3-540-77404-4_20}
}
Rønjom S and Helleseth T (2007), "The Linear Vector Space Spanned by the Nonlinear Filter Generator", In Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers. , pp. 169-183.
BibTeX:
@inproceedings{DBLP:conf/ssc/RonjomH07,
  author = {Rønjom, Sondre and Helleseth, Tor},
  title = {The Linear Vector Space Spanned by the Nonlinear Filter Generator},
  booktitle = {Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers},
  year = {2007},
  pages = {169--183},
  url = {https://doi.org/10.1007/978-3-540-77404-4_17},
  doi = {10.1007/978-3-540-77404-4_17}
}
Tang X, Helleseth T, Hu L and Jiang W (2007), "A New Family of Gold-Like Sequences", In Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers. , pp. 62-69.
BibTeX:
@inproceedings{DBLP:conf/ssc/TangHHJ07,
  author = {Tang, Xiaohu and Helleseth, Tor and Hu, Lei and Jiang, Wenfeng},
  title = {A New Family of Gold-Like Sequences},
  booktitle = {Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers},
  year = {2007},
  pages = {62--69},
  url = {https://doi.org/10.1007/978-3-540-77404-4_6},
  doi = {10.1007/978-3-540-77404-4_6}
}
Rønjom S and Helleseth T (2007), "Attacking the Filter Generator over GF(2^m)", In Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings. , pp. 264-275.
BibTeX:
@inproceedings{DBLP:conf/waifi/RonjomH07,
  author = {Rønjom, Sondre and Helleseth, Tor},
  title = {Attacking the Filter Generator over GF(2^m)},
  booktitle = {Arithmetic of Finite Fields, First International Workshop, WAIFI 2007, Madrid, Spain, June 21-22, 2007, Proceedings},
  year = {2007},
  pages = {264--275},
  url = {https://doi.org/10.1007/978-3-540-73074-3_20},
  doi = {10.1007/978-3-540-73074-3_20}
}
Helleseth T, Jansen CJA, Khazaei S and Kholosha A (2006), "Security of Jump Controlled Sequence Generators for Stream Ciphers", In Sequences and Their Applications - SETA 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings. , pp. 141-152.
BibTeX:
@inproceedings{DBLP:conf/seta/HellesethJKK06,
  author = {Helleseth, Tor and Jansen, Cees J. A. and Khazaei, Shahram and Kholosha, Alexander},
  title = {Security of Jump Controlled Sequence Generators for Stream Ciphers},
  booktitle = {Sequences and Their Applications - SETA 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings},
  year = {2006},
  pages = {141--152},
  url = {https://doi.org/10.1007/11863854_12},
  doi = {10.1007/11863854_12}
}
Molland H and Helleseth T (2004), "An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators", In Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings. , pp. 373-389.
BibTeX:
@inproceedings{DBLP:conf/crypto/MollandH04,
  author = {Molland, Håvard and Helleseth, Tor},
  title = {An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators},
  booktitle = {Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings},
  year = {2004},
  pages = {373--389},
  url = {https://doi.org/10.1007/978-3-540-28628-8_23},
  doi = {10.1007/978-3-540-28628-8_23}
}
Molland H, Mathiassen JE and Helleseth T (2003), "Improved Fast Correlation Attack Using Low Rate Codes", In Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings. , pp. 67-81.
BibTeX:
@inproceedings{DBLP:conf/ima/MollandMH03,
  author = {Molland, Håvard and Mathiassen, John Erik and Helleseth, Tor},
  title = {Improved Fast Correlation Attack Using Low Rate Codes},
  booktitle = {Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings},
  year = {2003},
  pages = {67--81},
  url = {https://doi.org/10.1007/978-3-540-40974-8_7},
  doi = {10.1007/978-3-540-40974-8_7}
}
Schaathun HG and Helleseth T (2003), "Separating and Intersecting Properties of BCH and Kasami Codes", In Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings. , pp. 52-65.
BibTeX:
@inproceedings{DBLP:conf/ima/SchaathunH03,
  author = {Schaathun, Hans Georg and Helleseth, Tor},
  title = {Separating and Intersecting Properties of BCH and Kasami Codes},
  booktitle = {Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings},
  year = {2003},
  pages = {52--65},
  url = {https://doi.org/10.1007/978-3-540-40974-8_5},
  doi = {10.1007/978-3-540-40974-8_5}
}
Helleseth T (2001), "Codes over Z_4", In Computational Discrete Mathematics, Advanced Lectures. , pp. 47-55.
BibTeX:
@inproceedings{DBLP:conf/ac/Helleseth01,
  author = {Helleseth, Tor},
  title = {Codes over Z_4},
  booktitle = {Computational Discrete Mathematics, Advanced Lectures},
  year = {2001},
  pages = {47--55},
  url = {https://doi.org/10.1007/3-540-45506-X_4},
  doi = {10.1007/3-540-45506-X_4}
}
Chen W and Kløve T (1999), "On the Second Greedy Weight for Binary Linear Codes", In Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November 15-19, 1999, Proceedings. , pp. 131-141.
BibTeX:
@inproceedings{Chen1999a,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {On the Second Greedy Weight for Binary Linear Codes},
  booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November 15-19, 1999, Proceedings},
  year = {1999},
  pages = {131--141},
  url = {https://doi.org/10.1007/3-540-46796-3_13},
  doi = {10.1007/3-540-46796-3_13}
}
Helleseth T and Johansson T (1996), "Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings", In Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings. , pp. 31-44.
BibTeX:
@inproceedings{DBLP:conf/crypto/HellesethJ96,
  author = {Helleseth, Tor and Johansson, Thomas},
  title = {Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings},
  booktitle = {Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings},
  year = {1996},
  pages = {31--44},
  url = {https://doi.org/10.1007/3-540-68697-5_3},
  doi = {10.1007/3-540-68697-5_3}
}
Helleseth T, Kløve T and Ytrehus Ø (1993), "Generalizations of the Griesmer Bound", In Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers. , pp. 41-52.
BibTeX:
@inproceedings{DBLP:conf/eccsp/HellesethKY93,
  author = {Helleseth, Tor and Kløve, Torleiv and Ytrehus, Øyvind},
  title = {Generalizations of the Griesmer Bound},
  booktitle = {Error Control, Cryptology, and Speech Compression - Workshop on Information Protection, Moscow, Russia, December 6-9, 1993, Selected Papers},
  year = {1993},
  pages = {41--52},
  url = {https://doi.org/10.1007/3-540-58265-7_6},
  doi = {10.1007/3-540-58265-7_6}
}