Matching entries: 0
settings...
Tan P, Zhou Z, Tang D and Helleseth T (2018), "The weight distribution of a class of two-weight linear codes derived from Kloosterman sums", Cryptography and Communications. Vol. 10(2), pp. 291-299.
BibTeX:
@article{DBLP:journals/ccds/TanZTH18,
  author = {Tan, Pan and Zhou, Zhengchun and Tang, Deng and Helleseth, Tor},
  title = {The weight distribution of a class of two-weight linear codes derived from Kloosterman sums},
  journal = {Cryptography and Communications},
  year = {2018},
  volume = {10},
  number = {2},
  pages = {291--299},
  url = {https://doi.org/10.1007/s12095-017-0221-1},
  doi = {10.1007/s12095-017-0221-1}
}
Tu Z, Zeng X and Helleseth T (2018), "New permutation quadrinomials over F22m", Finite Fields and Their Applications. Vol. 50, pp. 304-318.
BibTeX:
@article{DBLP:journals/ffa/TuZH18,
  author = {Tu, Ziran and Zeng, Xiangyong and Helleseth, Tor},
  title = {New permutation quadrinomials over F22m},
  journal = {Finite Fields and Their Applications},
  year = {2018},
  volume = {50},
  pages = {304--318},
  url = {https://doi.org/10.1016/j.ffa.2017.11.013},
  doi = {10.1016/j.ffa.2017.11.013}
}
Tu Z, Zeng X, Li C and Helleseth T (2018), "A class of new permutation trinomials", Finite Fields and Their Applications. Vol. 50, pp. 178-195.
BibTeX:
@article{DBLP:journals/ffa/TuZLH18,
  author = {Tu, Ziran and Zeng, Xiangyong and Li, Chunlei and Helleseth, Tor},
  title = {A class of new permutation trinomials},
  journal = {Finite Fields and Their Applications},
  year = {2018},
  volume = {50},
  pages = {178--195},
  url = {https://doi.org/10.1016/j.ffa.2017.11.009},
  doi = {10.1016/j.ffa.2017.11.009}
}
Gong G, Helleseth T and Kumar PV (2018), "Solomon W. Golomb - Mathematician, Engineer, and Pioneer", IEEE Trans. Information Theory. Vol. 64(4), pp. 2844-2857.
BibTeX:
@article{DBLP:journals/tit/GongHK18,
  author = {Guang Gong and Tor Helleseth and P. Vijay Kumar},
  title = {Solomon W. Golomb - Mathematician, Engineer, and Pioneer},
  journal = {IEEE Trans. Information Theory},
  year = {2018},
  volume = {64},
  number = {4},
  pages = {2844--2857},
  url = {https://doi.org/10.1109/TIT.2018.2809497},
  doi = {10.1109/TIT.2018.2809497}
}
Zhou Z, Helleseth T and Parampalli U (2018), "A Family of Polyphase Sequences With Asymptotically Optimal Correlation", IEEE Trans. Information Theory. Vol. 64(4), pp. 2896-2900.
BibTeX:
@article{DBLP:journals/tit/ZhouHP18,
  author = {Zhou, Zhengchun and Helleseth, Tor and Parampalli, Udaya},
  title = {A Family of Polyphase Sequences With Asymptotically Optimal Correlation},
  journal = {IEEE Trans. Information Theory},
  year = {2018},
  volume = {64},
  number = {4},
  pages = {2896--2900},
  url = {https://doi.org/10.1109/TIT.2018.2796597},
  doi = {10.1109/TIT.2018.2796597}
}
Zhou Z, Zhang D, Helleseth T and Wen J (2018), "A Construction of Multiple Optimal ZCZ Sequence Sets With Good Cross Correlation", IEEE Trans. Information Theory. Vol. 64(2), pp. 1340-1346.
BibTeX:
@article{DBLP:journals/tit/ZhouZHW18,
  author = {Zhou, Zhengchun and Zhang, Dan and Helleseth, Tor and Wen, Jinming},
  title = {A Construction of Multiple Optimal ZCZ Sequence Sets With Good Cross Correlation},
  journal = {IEEE Trans. Information Theory},
  year = {2018},
  volume = {64},
  number = {2},
  pages = {1340--1346},
  url = {https://doi.org/10.1109/TIT.2017.2756845},
  doi = {10.1109/TIT.2017.2756845}
}
Li N and Helleseth T (2017), "Several classes of permutation trinomials from Niho exponents", Cryptography and Communications. Vol. 9(6), pp. 693-705.
BibTeX:
@article{DBLP:journals/ccds/LiH17,
  author = {Li, Nian and Helleseth, Tor},
  title = {Several classes of permutation trinomials from Niho exponents},
  journal = {Cryptography and Communications},
  year = {2017},
  volume = {9},
  number = {6},
  pages = {693--705},
  url = {https://doi.org/10.1007/s12095-016-0210-9},
  doi = {10.1007/s12095-016-0210-9}
}
Horák P, Semaev IA and Tuza Z (2017), "A combinatorial problem related to sparse systems of equations", Des. Codes Cryptography. Vol. 85(1), pp. 129-144.
BibTeX:
@article{DBLP:journals/dcc/HorakST17,
  author = {Horák, Peter and Semaev, Igor A. and Tuza, Zsolt},
  title = {A combinatorial problem related to sparse systems of equations},
  journal = {Des. Codes Cryptography},
  year = {2017},
  volume = {85},
  number = {1},
  pages = {129--144},
  url = {https://doi.org/10.1007/s10623-016-0294-4},
  doi = {10.1007/s10623-016-0294-4}
}
Fauskanger S and Semaev IA (2017), "Separable Statistics and Multidimensional Linear Cryptanalysis", IACR Cryptology ePrint Archive. Vol. 2017, pp. 994.
BibTeX:
@article{DBLP:journals/iacr/FauskangerS17,
  author = {Fauskanger, Stian and Semaev, Igor A.},
  title = {Separable Statistics and Multidimensional Linear Cryptanalysis},
  journal = {IACR Cryptology ePrint Archive},
  year = {2017},
  volume = {2017},
  pages = {994},
  url = {http://eprint.iacr.org/2017/994}
}
Alahmadi A, Alhazmi H, Ali S, Helleseth T, Hijazi R, Li C and Solé P (2017), "An analogue of the Z_4-Goethals code in non-primitive length", J. Systems Science & Complexity. Vol. 30(4), pp. 950-966.
BibTeX:
@article{DBLP:journals/jossac/AlahmadiAAHHLS17,
  author = {Alahmadi, Adel and Alhazmi, Hussain and Ali, Shakir and Helleseth, Tor and Hijazi, Rola and Li, Chunlei and Solé, Patrick},
  title = {An analogue of the Z_4-Goethals code in non-primitive length},
  journal = {J. Systems Science & Complexity},
  year = {2017},
  volume = {30},
  number = {4},
  pages = {950--966},
  url = {https://doi.org/10.1007/s11424-017-5244-3},
  doi = {10.1007/s11424-017-5244-3}
}
Sun Z, Zeng X, Li C and Helleseth T (2017), "Investigations on Periodic Sequences With Maximum Nonlinear Complexity", IEEE Trans. Information Theory. Vol. 63(10), pp. 6188-6198.
BibTeX:
@article{DBLP:journals/tit/SunZLH17,
  author = {Sun, Zhimin and Zeng, Xiangyong and Li, Chunlei and Helleseth, Tor},
  title = {Investigations on Periodic Sequences With Maximum Nonlinear Complexity},
  journal = {IEEE Trans. Information Theory},
  year = {2017},
  volume = {63},
  number = {10},
  pages = {6188--6198},
  url = {https://doi.org/10.1109/TIT.2017.2714681},
  doi = {10.1109/TIT.2017.2714681}
}
Tang C, Zhou Z, Qi Y, Zhang X, Fan C and Helleseth T (2017), "Generic Construction of Bent Functions and Bent Idempotents With Any Possible Algebraic Degrees", IEEE Trans. Information Theory. Vol. 63(10), pp. 6149-6157.
BibTeX:
@article{DBLP:journals/tit/TangZQZFH17,
  author = {Tang, Chunming and Zhou, Zhengchun and Qi, Yanfeng and Zhang, Xiaosong and Fan, Cuiling and Helleseth, Tor},
  title = {Generic Construction of Bent Functions and Bent Idempotents With Any Possible Algebraic Degrees},
  journal = {IEEE Trans. Information Theory},
  year = {2017},
  volume = {63},
  number = {10},
  pages = {6149--6157},
  url = {https://doi.org/10.1109/TIT.2017.2717966},
  doi = {10.1109/TIT.2017.2717966}
}
Xia Y, Li N, Zeng X and Helleseth T (2017), "On the Correlation Distribution for a Niho Decimation", IEEE Trans. Information Theory. Vol. 63(11), pp. 7206-7218.
BibTeX:
@article{DBLP:journals/tit/XiaLZH17,
  author = {Xia, Yongbo and Li, Nian and Zeng, Xiangyong and Helleseth, Tor},
  title = {On the Correlation Distribution for a Niho Decimation},
  journal = {IEEE Trans. Information Theory},
  year = {2017},
  volume = {63},
  number = {11},
  pages = {7206--7218},
  url = {https://doi.org/10.1109/TIT.2017.2750665},
  doi = {10.1109/TIT.2017.2750665}
}
Mofrad AA and Parker MG (2017), "Nested-Clique Network Model of Neural Associative Memory", Neural Computation. Vol. 29(6), pp. 1681-1695.
BibTeX:
@article{Mofrad2017,
  author = {Mofrad, Asieh Abolpour and Parker, Matthew G.},
  title = {Nested-Clique Network Model of Neural Associative Memory},
  journal = {Neural Computation},
  year = {2017},
  volume = {29},
  number = {6},
  pages = {1681--1695},
  url = {https://doi.org/10.1162/NECO_a_00964},
  doi = {10.1162/NECO_a_00964}
}
Xia Y and Li C (2017), "Three-weight ternary linear codes from a family of power functions", Finite Fields and Their Applications. Vol. 46, pp. 17-37.
BibTeX:
@article{Xia2017,
  author = {Xia, Yongbo and Li, Chunlei},
  title = {Three-weight ternary linear codes from a family of power functions},
  journal = {Finite Fields and Their Applications},
  year = {2017},
  volume = {46},
  pages = {17--37},
  url = {https://doi.org/10.1016/j.ffa.2017.03.003},
  doi = {10.1016/j.ffa.2017.03.003}
}
Alahmadi A, Alhazmi H, Helleseth T, Hijazi R, Muthana NM and Solé P (2016), "On the lifted Melas code", Cryptography and Communications. Vol. 8(1), pp. 7-18.
BibTeX:
@article{DBLP:journals/ccds/AlahmadiAHHMS16,
  author = {Alahmadi, Adel and Alhazmi, Hussain and Helleseth, Tor and Hijazi, Rola and Muthana, Najat M. and Solé, Patrick},
  title = {On the lifted Melas code},
  journal = {Cryptography and Communications},
  year = {2016},
  volume = {8},
  number = {1},
  pages = {7--18},
  url = {https://doi.org/10.1007/s12095-015-0135-8},
  doi = {10.1007/s12095-015-0135-8}
}
Li C and Helleseth T (2016), "Quasi-perfect linear codes from planar and APN functions", Cryptography and Communications. Vol. 8(2), pp. 215-227.
BibTeX:
@article{DBLP:journals/ccds/LiH16,
  author = {Li, Chunlei and Helleseth, Tor},
  title = {Quasi-perfect linear codes from planar and APN functions},
  journal = {Cryptography and Communications},
  year = {2016},
  volume = {8},
  number = {2},
  pages = {215--227},
  url = {https://doi.org/10.1007/s12095-015-0132-y},
  doi = {10.1007/s12095-015-0132-y}
}
Alahmadi A, Alhazmi H, Helleseth T, Hijazi R, Muthana NM and Solé P (2016), "On the lifted Zetterberg code", Des. Codes Cryptography. Vol. 80(3), pp. 561-576.
BibTeX:
@article{DBLP:journals/dcc/AlahmadiAHHMS16,
  author = {Alahmadi, Adel and Alhazmi, Hussain and Helleseth, Tor and Hijazi, Rola and Muthana, Najat M. and Solé, Patrick},
  title = {On the lifted Zetterberg code},
  journal = {Des. Codes Cryptography},
  year = {2016},
  volume = {80},
  number = {3},
  pages = {561--576},
  url = {https://doi.org/10.1007/s10623-015-0118-y},
  doi = {10.1007/s10623-015-0118-y}
}
Semaev IA (2016), "MaxMinMax problem and sparse equations over finite fields", Des. Codes Cryptography. Vol. 79(2), pp. 383-404.
BibTeX:
@article{DBLP:journals/dcc/Semaev16,
  author = {Semaev, Igor A.},
  title = {MaxMinMax problem and sparse equations over finite fields},
  journal = {Des. Codes Cryptography},
  year = {2016},
  volume = {79},
  number = {2},
  pages = {383--404},
  url = {https://doi.org/10.1007/s10623-015-0058-6},
  doi = {10.1007/s10623-015-0058-6}
}
Zhou Z, Li N, Fan C and Helleseth T (2016), "Linear codes with two or three weights from quadratic Bent functions", Des. Codes Cryptography. Vol. 81(2), pp. 283-295.
BibTeX:
@article{DBLP:journals/dcc/ZhouLFH16,
  author = {Zhou, Zhengchun and Li, Nian and Fan, Cuiling and Helleseth, Tor},
  title = {Linear codes with two or three weights from quadratic Bent functions},
  journal = {Des. Codes Cryptography},
  year = {2016},
  volume = {81},
  number = {2},
  pages = {283--295},
  url = {https://doi.org/10.1007/s10623-015-0144-9},
  doi = {10.1007/s10623-015-0144-9}
}
Budaghyan L, Carlet C, Helleseth T and Li N (2016), "On the (non-)existence of APN (n, n)-functions of algebraic degree n", IACR Cryptology ePrint Archive. Vol. 2016, pp. 143.
BibTeX:
@article{DBLP:journals/iacr/BudaghyanCHL16,
  author = {Budaghyan, Lilya and Carlet, Claude and Helleseth, Tor and Li, Nian},
  title = {On the (non-)existence of APN (n, n)-functions of algebraic degree n},
  journal = {IACR Cryptology ePrint Archive},
  year = {2016},
  volume = {2016},
  pages = {143},
  url = {http://eprint.iacr.org/2016/143}
}
Budaghyan L, Helleseth T, Li N and Sun B (2016), "Some Results on the Known Classes of Quadratic APN Functions", IACR Cryptology ePrint Archive. Vol. 2016, pp. 1183.
BibTeX:
@article{DBLP:journals/iacr/BudaghyanHLS16,
  author = {Budaghyan, Lilya and Helleseth, Tor and Li, Nian and Sun, Bo},
  title = {Some Results on the Known Classes of Quadratic APN Functions},
  journal = {IACR Cryptology ePrint Archive},
  year = {2016},
  volume = {2016},
  pages = {1183},
  url = {http://eprint.iacr.org/2016/1183}
}
Semaev IA (2016), "On low degree polynomials in 2-round AES", IACR Cryptology ePrint Archive. Vol. 2016, pp. 141.
BibTeX:
@article{DBLP:journals/iacr/Semaev16,
  author = {Semaev, Igor A.},
  title = {On low degree polynomials in 2-round AES},
  journal = {IACR Cryptology ePrint Archive},
  year = {2016},
  volume = {2016},
  pages = {141},
  url = {http://eprint.iacr.org/2016/141}
}
Budaghyan L, Kholosha A, Carlet C and Helleseth T (2016), "Univariate Niho Bent Functions From o-Polynomials", IEEE Trans. Information Theory. Vol. 62(4), pp. 2254-2265.
BibTeX:
@article{DBLP:journals/tit/BudaghyanKCH16,
  author = {Budaghyan, Lilya and Kholosha, Alexander and Carlet, Claude and Helleseth, Tor},
  title = {Univariate Niho Bent Functions From o-Polynomials},
  journal = {IEEE Trans. Information Theory},
  year = {2016},
  volume = {62},
  number = {4},
  pages = {2254--2265},
  url = {https://doi.org/10.1109/TIT.2016.2530083},
  doi = {10.1109/TIT.2016.2530083}
}
Li C, Zeng X, Li C, Helleseth T and Li M (2016), "Construction of de Bruijn Sequences From LFSRs With Reducible Characteristic Polynomials", IEEE Trans. Information Theory. Vol. 62(1), pp. 610-624.
BibTeX:
@article{DBLP:journals/tit/LiZLHL16,
  author = {Li, Chaoyun and Zeng, Xiangyong and Li, Chunlei and Helleseth, Tor and Li, Ming},
  title = {Construction of de Bruijn Sequences From LFSRs With Reducible Characteristic Polynomials},
  journal = {IEEE Trans. Information Theory},
  year = {2016},
  volume = {62},
  number = {1},
  pages = {610--624},
  url = {https://doi.org/10.1109/TIT.2015.2496946},
  doi = {10.1109/TIT.2015.2496946}
}
Tang C, Li N, Qi Y, Zhou Z and Helleseth T (2016), "Linear Codes With Two or Three Weights From Weakly Regular Bent Functions", IEEE Trans. Information Theory. Vol. 62(3), pp. 1166-1176.
BibTeX:
@article{DBLP:journals/tit/TangLQZH16,
  author = {Tang, Chunming and Li, Nian and Qi, Yanfeng and Zhou, Zhengchun and Helleseth, Tor},
  title = {Linear Codes With Two or Three Weights From Weakly Regular Bent Functions},
  journal = {IEEE Trans. Information Theory},
  year = {2016},
  volume = {62},
  number = {3},
  pages = {1166--1176},
  url = {https://doi.org/10.1109/TIT.2016.2518678},
  doi = {10.1109/TIT.2016.2518678}
}
Xia Y, Li N, Zeng X and Helleseth T (2016), "An Open Problem on the Distribution of a Niho-Type Cross-Correlation Function", IEEE Trans. Information Theory. Vol. 62(12), pp. 7546-7554.
BibTeX:
@article{DBLP:journals/tit/XiaLZH16,
  author = {Xia, Yongbo and Li, Nian and Zeng, Xiangyong and Helleseth, Tor},
  title = {An Open Problem on the Distribution of a Niho-Type Cross-Correlation Function},
  journal = {IEEE Trans. Information Theory},
  year = {2016},
  volume = {62},
  number = {12},
  pages = {7546--7554},
  url = {https://doi.org/10.1109/TIT.2016.2614333},
  doi = {10.1109/TIT.2016.2614333}
}
Ding C, Li C, Li N and Zhou Z (2016), "Three-weight cyclic codes and their weight distributions", Discrete Mathematics. Vol. 339(2), pp. 415-427.
BibTeX:
@article{Ding2016,
  author = {Ding, Cunsheng and Li, Chunlei and Li, Nian and Zhou, Zhengchun},
  title = {Three-weight cyclic codes and their weight distributions},
  journal = {Discrete Mathematics},
  year = {2016},
  volume = {339},
  number = {2},
  pages = {415--427},
  url = {https://doi.org/10.1016/j.disc.2015.09.001},
  doi = {10.1016/j.disc.2015.09.001}
}
Kløve T (2016), "On covering sets for limited-magnitude errors", Cryptography and Communications. Vol. 8(3), pp. 415-433.
BibTeX:
@article{Klove2016,
  author = {Kløve, Torleiv},
  title = {On covering sets for limited-magnitude errors},
  journal = {Cryptography and Communications},
  year = {2016},
  volume = {8},
  number = {3},
  pages = {415--433},
  url = {https://doi.org/10.1007/s12095-015-0154-5},
  doi = {10.1007/s12095-015-0154-5}
}
Kløve T (2016), "Two Constructions of Covering Sets for Limited-Magnitude Errors", IEEE Trans. Information Theory. Vol. 62(3), pp. 1177-1182.
BibTeX:
@article{Klove2016a,
  author = {Kløve, Torleiv},
  title = {Two Constructions of Covering Sets for Limited-Magnitude Errors},
  journal = {IEEE Trans. Information Theory},
  year = {2016},
  volume = {62},
  number = {3},
  pages = {1177--1182},
  url = {https://doi.org/10.1109/TIT.2016.2519406},
  doi = {10.1109/TIT.2016.2519406}
}
Mofrad AA, Parker MG, Ferdosi Z and Tadayon MH (2016), "Clique-Based Neural Associative Memories with Local Coding and Precoding", Neural Computation. Vol. 28(8), pp. 1553-1573.
BibTeX:
@article{Mofrad2016,
  author = {Mofrad, Asieh Abolpour and Parker, Matthew G. and Ferdosi, Zahra and Tadayon, Mohammad Hesam},
  title = {Clique-Based Neural Associative Memories with Local Coding and Precoding},
  journal = {Neural Computation},
  year = {2016},
  volume = {28},
  number = {8},
  pages = {1553--1573},
  url = {https://doi.org/10.1162/NECO_a_00856},
  doi = {10.1162/NECO_a_00856}
}
Danielsen LE, Parker MG, Riera C and Knudsen JG (2015), "On graphs and codes preserved by edge local complementation", Des. Codes Cryptography. Vol. 74(3), pp. 601-621.
BibTeX:
@article{Danielsen2015,
  author = {Danielsen, Lars Eirik and Parker, Matthew G. and Riera, Constanza and Knudsen, Joakim Grahl},
  title = {On graphs and codes preserved by edge local complementation},
  journal = {Des. Codes Cryptography},
  year = {2015},
  volume = {74},
  number = {3},
  pages = {601--621},
  url = {https://doi.org/10.1007/s10623-013-9876-6},
  doi = {10.1007/s10623-013-9876-6}
}
Li N, Tang X and Helleseth T (2015), "A class of quaternary sequences with low correlation", Adv. in Math. of Comm.. Vol. 9(2), pp. 199-210.
BibTeX:
@article{DBLP:journals/amco/LiTH15,
  author = {Li, Nian and Tang, Xiaohu and Helleseth, Tor},
  title = {A class of quaternary sequences with low correlation},
  journal = {Adv. in Math. of Comm.},
  year = {2015},
  volume = {9},
  number = {2},
  pages = {199--210},
  url = {http://aimsciences.org/journals/displayArticlesnew.jsp?paperID=11171}
}
Xia Y, Helleseth T and Li C (2015), "Some new classes of cyclic codes with three or six weights", Adv. in Math. of Comm.. Vol. 9(1), pp. 23-36.
BibTeX:
@article{DBLP:journals/amco/XiaHL15,
  author = {Xia, Yongbo and Helleseth, Tor and Li, Chunlei},
  title = {Some new classes of cyclic codes with three or six weights},
  journal = {Adv. in Math. of Comm.},
  year = {2015},
  volume = {9},
  number = {1},
  pages = {23--36},
  url = {http://aimsciences.org/journals/displayArticlesnew.jsp?paperID=10828}
}
Semaev IA (2015), "New algorithm for the discrete logarithm problem on elliptic curves", CoRR. Vol. abs/1504.01175
BibTeX:
@article{DBLP:journals/corr/Semaev15,
  author = {Semaev, Igor A.},
  title = {New algorithm for the discrete logarithm problem on elliptic curves},
  journal = {CoRR},
  year = {2015},
  volume = {abs/1504.01175},
  url = {http://arxiv.org/abs/1504.01175}
}
Semaev IA (2015), "Experimental Study of DIGIPASS GO3 and the Security of Authentication", CoRR. Vol. abs/1506.06332
BibTeX:
@article{DBLP:journals/corr/Semaev15a,
  author = {Semaev, Igor A.},
  title = {Experimental Study of DIGIPASS GO3 and the Security of Authentication},
  journal = {CoRR},
  year = {2015},
  volume = {abs/1506.06332},
  url = {http://arxiv.org/abs/1506.06332}
}
Horák P, Semaev IA and Tuza Z (2015), "An application of Combinatorics in Cryptography", Electronic Notes in Discrete Mathematics. Vol. 49, pp. 31-35.
BibTeX:
@article{DBLP:journals/endm/HorakST15,
  author = {Horák, Peter and Semaev, Igor A. and Tuza, Zsolt},
  title = {An application of Combinatorics in Cryptography},
  journal = {Electronic Notes in Discrete Mathematics},
  year = {2015},
  volume = {49},
  pages = {31--35},
  url = {https://doi.org/10.1016/j.endm.2015.06.006},
  doi = {10.1016/j.endm.2015.06.006}
}
Tu Z, Zeng X, Li C and Helleseth T (2015), "Permutation polynomials of the form (x^p\({}^{\mbox{m}}\)-x+δ)^s+L(x) over the finite field _F_p_2_m of odd characteristic", Finite Fields and Their Applications. Vol. 34, pp. 20-35.
BibTeX:
@article{DBLP:journals/ffa/TuZLH15,
  author = {Tu, Ziran and Zeng, Xiangyong and Li, Chunlei and Helleseth, Tor},
  title = {Permutation polynomials of the form (x^p\({}^{\mbox{m}}\)-x+δ)^s+L(x) over the finite field _F_p_2_m of odd characteristic},
  journal = {Finite Fields and Their Applications},
  year = {2015},
  volume = {34},
  pages = {20--35},
  url = {https://doi.org/10.1016/j.ffa.2015.01.002},
  doi = {10.1016/j.ffa.2015.01.002}
}
Fauskanger S and Semaev IA (2015), "Statistical and Algebraic Properties of DES", IACR Cryptology ePrint Archive. Vol. 2015, pp. 803.
BibTeX:
@article{DBLP:journals/iacr/FauskangerS15,
  author = {Fauskanger, Stian and Semaev, Igor A.},
  title = {Statistical and Algebraic Properties of DES},
  journal = {IACR Cryptology ePrint Archive},
  year = {2015},
  volume = {2015},
  pages = {803},
  url = {http://eprint.iacr.org/2015/803}
}
Semaev IA (2015), "New algorithm for the discrete logarithm problem on elliptic curves", IACR Cryptology ePrint Archive. Vol. 2015, pp. 310.
BibTeX:
@article{DBLP:journals/iacr/Semaev15,
  author = {Semaev, Igor A.},
  title = {New algorithm for the discrete logarithm problem on elliptic curves},
  journal = {IACR Cryptology ePrint Archive},
  year = {2015},
  volume = {2015},
  pages = {310},
  url = {http://eprint.iacr.org/2015/310}
}
Semaev IA (2015), "Experimental Study of DIGIPASS GO3 and the Security of Authentication", IACR Cryptology ePrint Archive. Vol. 2015, pp. 609.
BibTeX:
@article{DBLP:journals/iacr/Semaev15a,
  author = {Semaev, Igor A.},
  title = {Experimental Study of DIGIPASS GO3 and the Security of Authentication},
  journal = {IACR Cryptology ePrint Archive},
  year = {2015},
  volume = {2015},
  pages = {609},
  url = {http://eprint.iacr.org/2015/609}
}
Li J, Carlet C, Zeng X, Li C, Hu L and Shan J (2015), "Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks", Des. Codes Cryptography. Vol. 76(2), pp. 279-305.
BibTeX:
@article{Li2015,
  author = {Li, Jiao and Carlet, Claude and Zeng, Xiangyong and Li, Chunlei and Hu, Lei and Shan, Jinyong},
  title = {Two constructions of balanced Boolean functions with optimal algebraic immunity, high nonlinearity and good behavior against fast algebraic attacks},
  journal = {Des. Codes Cryptography},
  year = {2015},
  volume = {76},
  number = {2},
  pages = {279--305},
  url = {https://doi.org/10.1007/s10623-014-9949-1},
  doi = {10.1007/s10623-014-9949-1}
}
Li N, Tang X and Helleseth T (2014), "New textdollartextdollarMtextdollartextdollar M -ary sequences with low autocorrelation from interleaved technique", Des. Codes Cryptography. Vol. 73(1), pp. 237-249.
BibTeX:
@article{DBLP:journals/dcc/LiTH14,
  author = {Li, Nian and Tang, Xiaohu and Helleseth, Tor},
  title = {New textdollartextdollarMtextdollartextdollar M -ary sequences with low autocorrelation from interleaved technique},
  journal = {Des. Codes Cryptography},
  year = {2014},
  volume = {73},
  number = {1},
  pages = {237--249},
  url = {https://doi.org/10.1007/s10623-013-9821-8},
  doi = {10.1007/s10623-013-9821-8}
}
Li N, Li C, Helleseth T, Ding C and Tang X (2014), "Optimal ternary cyclic codes with minimum distance four and five", Finite Fields and Their Applications. Vol. 30, pp. 100-120.
BibTeX:
@article{DBLP:journals/ffa/LiLHDT14,
  author = {Li, Nian and Li, Chunlei and Helleseth, Tor and Ding, Cunsheng and Tang, Xiaohu},
  title = {Optimal ternary cyclic codes with minimum distance four and five},
  journal = {Finite Fields and Their Applications},
  year = {2014},
  volume = {30},
  pages = {100--120},
  url = {https://doi.org/10.1016/j.ffa.2014.06.001},
  doi = {10.1016/j.ffa.2014.06.001}
}
Wu G, Li N, Helleseth T and Zhang Y (2014), "Some classes of monomial complete permutation polynomials over finite fields of characteristic two", Finite Fields and Their Applications. Vol. 28, pp. 148-165.
BibTeX:
@article{DBLP:journals/ffa/WuLHZ14,
  author = {Wu, Gaofei and Li, Nian and Helleseth, Tor and Zhang, Yuqing},
  title = {Some classes of monomial complete permutation polynomials over finite fields of characteristic two},
  journal = {Finite Fields and Their Applications},
  year = {2014},
  volume = {28},
  pages = {148--165},
  url = {https://doi.org/10.1016/j.ffa.2014.01.011},
  doi = {10.1016/j.ffa.2014.01.011}
}
Semaev IA (2014), "MaxMinMax problem and sparse equations over finite fields", IACR Cryptology ePrint Archive. Vol. 2014, pp. 4.
BibTeX:
@article{DBLP:journals/iacr/Semaev14,
  author = {Semaev, Igor A.},
  title = {MaxMinMax problem and sparse equations over finite fields},
  journal = {IACR Cryptology ePrint Archive},
  year = {2014},
  volume = {2014},
  pages = {4},
  url = {http://eprint.iacr.org/2014/004}
}
Semaev IA (2014), "New Results in the Linear Cryptanalysis of DES", IACR Cryptology ePrint Archive. Vol. 2014, pp. 361.
BibTeX:
@article{DBLP:journals/iacr/Semaev14a,
  author = {Semaev, Igor A.},
  title = {New Results in the Linear Cryptanalysis of DES},
  journal = {IACR Cryptology ePrint Archive},
  year = {2014},
  volume = {2014},
  pages = {361},
  url = {http://eprint.iacr.org/2014/361}
}
Xia Y, Chen S, Helleseth T and Li C (2014), "Cross-Correlation between a p-Ary m-Sequence and Its All Decimated Sequences for textdollard= rac(p{\^{}}\{m\}+1)(p{\^{}}\{m\}+p-1)\p+1\textdollar", IEICE Transactions. Vol. 97-A(4), pp. 964-969.
BibTeX:
@article{DBLP:journals/ieicet/XiaCHL14,
  author = {Xia, Yongbo and Chen, Shaoping and Helleseth, Tor and Li, Chunlei},
  title = {Cross-Correlation between a p-Ary m-Sequence and Its All Decimated Sequences for textdollard= rac(p{\^{}}\{m\}+1)(p{\^{}}\{m\}+p-1)\p+1\textdollar},
  journal = {IEICE Transactions},
  year = {2014},
  volume = {97-A},
  number = {4},
  pages = {964--969},
  url = {http://search.ieice.org/bin/summary.php?id=e97-a_4_964}
}
Hong S, Park H, No J, Helleseth T and Kim Y (2014), "Near-Optimal Partial Hadamard Codebook Construction Using Binary Sequences Obtained From Quadratic Residue Mapping", IEEE Trans. Information Theory. Vol. 60(6), pp. 3698-3705.
BibTeX:
@article{DBLP:journals/tit/HongPNHK14,
  author = {Hong, Seokbeom and Park, Hosung and No, Jong-Seon and Helleseth, Tor and Kim, Young-Sik},
  title = {Near-Optimal Partial Hadamard Codebook Construction Using Binary Sequences Obtained From Quadratic Residue Mapping},
  journal = {IEEE Trans. Information Theory},
  year = {2014},
  volume = {60},
  number = {6},
  pages = {3698--3705},
  url = {https://doi.org/10.1109/TIT.2014.2314298},
  doi = {10.1109/TIT.2014.2314298}
}
Hu H, Shao S, Gong G and Helleseth T (2014), "The Proof of Lin's Conjecture via the Decimation-Hadamard Transform", IEEE Trans. Information Theory. Vol. 60(8), pp. 5054-5064.
BibTeX:
@article{DBLP:journals/tit/HuSGH14,
  author = {Hu, Honggang and Shao, Shuai and Gong, Guang and Helleseth, Tor},
  title = {The Proof of Lin's Conjecture via the Decimation-Hadamard Transform},
  journal = {IEEE Trans. Information Theory},
  year = {2014},
  volume = {60},
  number = {8},
  pages = {5054--5064},
  url = {https://doi.org/10.1109/TIT.2014.2327625},
  doi = {10.1109/TIT.2014.2327625}
}
Li C, Li N, Helleseth T and Ding C (2014), "The Weight Distributions of Several Classes of Cyclic Codes From APN Monomials", IEEE Trans. Information Theory. Vol. 60(8), pp. 4710-4721.
BibTeX:
@article{DBLP:journals/tit/LiLHD14,
  author = {Li, Chunlei and Li, Nian and Helleseth, Tor and Ding, Cunsheng},
  title = {The Weight Distributions of Several Classes of Cyclic Codes From APN Monomials},
  journal = {IEEE Trans. Information Theory},
  year = {2014},
  volume = {60},
  number = {8},
  pages = {4710--4721},
  url = {https://doi.org/10.1109/TIT.2014.2329694},
  doi = {10.1109/TIT.2014.2329694}
}
Li N, Tang X and Helleseth T (2014), "New Constructions of Quadratic Bent Functions in Polynomial Form", IEEE Trans. Information Theory. Vol. 60(9), pp. 5760-5767.
BibTeX:
@article{DBLP:journals/tit/LiTH14,
  author = {Li, Nian and Tang, Xiaohu and Helleseth, Tor},
  title = {New Constructions of Quadratic Bent Functions in Polynomial Form},
  journal = {IEEE Trans. Information Theory},
  year = {2014},
  volume = {60},
  number = {9},
  pages = {5760--5767},
  url = {https://doi.org/10.1109/TIT.2014.2339861},
  doi = {10.1109/TIT.2014.2339861}
}
Li C, Zeng X, Helleseth T, Li C and Hu L (2014), "The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs", IEEE Trans. Information Theory. Vol. 60(5), pp. 3052-3061.
BibTeX:
@article{DBLP:journals/tit/LiZHLH14,
  author = {Li, Chaoyun and Zeng, Xiangyong and Helleseth, Tor and Li, Chunlei and Hu, Lei},
  title = {The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs},
  journal = {IEEE Trans. Information Theory},
  year = {2014},
  volume = {60},
  number = {5},
  pages = {3052--3061},
  url = {https://doi.org/10.1109/TIT.2014.2310748},
  doi = {10.1109/TIT.2014.2310748}
}
Li C, Zeng X, Li C and Helleseth T (2014), "A Class of de Bruijn Sequences", IEEE Trans. Information Theory. Vol. 60(12), pp. 7955-7969.
BibTeX:
@article{DBLP:journals/tit/LiZLH14,
  author = {Li, Chaoyun and Zeng, Xiangyong and Li, Chunlei and Helleseth, Tor},
  title = {A Class of de Bruijn Sequences},
  journal = {IEEE Trans. Information Theory},
  year = {2014},
  volume = {60},
  number = {12},
  pages = {7955--7969},
  url = {https://doi.org/10.1109/TIT.2014.2361522},
  doi = {10.1109/TIT.2014.2361522}
}
Xia Y, Li C, Zeng X and Helleseth T (2014), "Some Results on Cross-Correlation Distribution Between a \(p\) -Ary \(m\) -Sequence and Its Decimated Sequences", IEEE Trans. Information Theory. Vol. 60(11), pp. 7368-7381.
BibTeX:
@article{DBLP:journals/tit/XiaLZH14,
  author = {Xia, Yongbo and Li, Chunlei and Zeng, Xiangyong and Helleseth, Tor},
  title = {Some Results on Cross-Correlation Distribution Between a \(p\) -Ary \(m\) -Sequence and Its Decimated Sequences},
  journal = {IEEE Trans. Information Theory},
  year = {2014},
  volume = {60},
  number = {11},
  pages = {7368--7381},
  url = {https://doi.org/10.1109/TIT.2014.2350775},
  doi = {10.1109/TIT.2014.2350775}
}
Kløve T and Schwartz M (2014), "Linear covering codes and error-correcting codes for limited-magnitude errors", Des. Codes Cryptography. Vol. 73(2), pp. 329-354.
BibTeX:
@article{Klove2014,
  author = {Kløve, Torleiv and Schwartz, Moshe},
  title = {Linear covering codes and error-correcting codes for limited-magnitude errors},
  journal = {Des. Codes Cryptography},
  year = {2014},
  volume = {73},
  number = {2},
  pages = {329--354},
  url = {https://doi.org/10.1007/s10623-013-9917-1},
  doi = {10.1007/s10623-013-9917-1}
}
Kløve T and Schwartz M (2014), "Erratum to: Linear covering codes and error-correcting codes for limited-magnitude errors", Des. Codes Cryptography. Vol. 73(3), pp. 1029.
BibTeX:
@article{Klove2014a,
  author = {Kløve, Torleiv and Schwartz, Moshe},
  title = {Erratum to: Linear covering codes and error-correcting codes for limited-magnitude errors},
  journal = {Des. Codes Cryptography},
  year = {2014},
  volume = {73},
  number = {3},
  pages = {1029},
  url = {https://doi.org/10.1007/s10623-014-9991-z},
  doi = {10.1007/s10623-014-9991-z}
}
Wang Z, Parker MG, Gong G and Wu G (2014), "On the PMEPR of Binary Golay Sequences of Length textdollar2ˆn\textdollar", IEEE Trans. Information Theory. Vol. 60(4), pp. 2391-2398.
BibTeX:
@article{Wang2014,
  author = {Wang, Zilong and Parker, Matthew G. and Gong, Guang and Wu, Gaofei},
  title = {On the PMEPR of Binary Golay Sequences of Length textdollar2ˆn\textdollar},
  journal = {IEEE Trans. Information Theory},
  year = {2014},
  volume = {60},
  number = {4},
  pages = {2391--2398},
  url = {https://doi.org/10.1109/TIT.2014.2300867},
  doi = {10.1109/TIT.2014.2300867}
}
Wu G and Parker MG (2014), "A complementary construction using mutually unbiased bases", Cryptography and Communications. Vol. 6(1), pp. 3-25.
BibTeX:
@article{Wu2014,
  author = {Wu, Gaofei and Parker, Matthew G.},
  title = {A complementary construction using mutually unbiased bases},
  journal = {Cryptography and Communications},
  year = {2014},
  volume = {6},
  number = {1},
  pages = {3--25},
  url = {https://doi.org/10.1007/s12095-013-0095-9},
  doi = {10.1007/s12095-013-0095-9}
}
Danielsen LE and Parker MG (2013), "The selfnegadual properties of generalised quadratic Boolean functions", Des. Codes Cryptography. Vol. 66(1-3), pp. 305-316.
BibTeX:
@article{Danielsen2013,
  author = {Danielsen, Lars Eirik and Parker, Matthew G.},
  title = {The selfnegadual properties of generalised quadratic Boolean functions},
  journal = {Des. Codes Cryptography},
  year = {2013},
  volume = {66},
  number = {1-3},
  pages = {305--316},
  url = {https://doi.org/10.1007/s10623-012-9693-3},
  doi = {10.1007/s10623-012-9693-3}
}
Li N, Helleseth T and Tang X (2013), "Further results on a class of permutation polynomials over finite fields", Finite Fields and Their Applications. Vol. 22, pp. 16-23.
BibTeX:
@article{DBLP:journals/ffa/LiHT13,
  author = {Li, Nian and Helleseth, Tor and Tang, Xiaohu},
  title = {Further results on a class of permutation polynomials over finite fields},
  journal = {Finite Fields and Their Applications},
  year = {2013},
  volume = {22},
  pages = {16--23},
  url = {https://doi.org/10.1016/j.ffa.2013.02.004},
  doi = {10.1016/j.ffa.2013.02.004}
}
Semaev IA (2013), "Improved Agreeing-Gluing Algorithm", Mathematics in Computer Science. Vol. 7(3), pp. 321-339.
BibTeX:
@article{DBLP:journals/mics/Semaev13,
  author = {Semaev, Igor A.},
  title = {Improved Agreeing-Gluing Algorithm},
  journal = {Mathematics in Computer Science},
  year = {2013},
  volume = {7},
  number = {3},
  pages = {321--339},
  url = {https://doi.org/10.1007/s11786-013-0163-8},
  doi = {10.1007/s11786-013-0163-8}
}
Cai H, Zeng X, Helleseth T, Tang X and Yang Y (2013), "A New Construction of Zero-Difference Balanced Functions and Its Applications", IEEE Trans. Information Theory. Vol. 59(8), pp. 5008-5015.
BibTeX:
@article{DBLP:journals/tit/CaiZHTY13,
  author = {Cai, Han and Zeng, Xiangyong and Helleseth, Tor and Tang, Xiaohu and Yang, Yang},
  title = {A New Construction of Zero-Difference Balanced Functions and Its Applications},
  journal = {IEEE Trans. Information Theory},
  year = {2013},
  volume = {59},
  number = {8},
  pages = {5008--5015},
  url = {https://doi.org/10.1109/TIT.2013.2255114},
  doi = {10.1109/TIT.2013.2255114}
}
Ding C and Helleseth T (2013), "Optimal Ternary Cyclic Codes From Monomials", IEEE Trans. Information Theory. Vol. 59(9), pp. 5898-5904.
BibTeX:
@article{DBLP:journals/tit/DingH13,
  author = {Ding, Cunsheng and Helleseth, Tor},
  title = {Optimal Ternary Cyclic Codes From Monomials},
  journal = {IEEE Trans. Information Theory},
  year = {2013},
  volume = {59},
  number = {9},
  pages = {5898--5904},
  url = {https://doi.org/10.1109/TIT.2013.2260795},
  doi = {10.1109/TIT.2013.2260795}
}
Li N, Helleseth T, Kholosha A and Tang X (2013), "On the Walsh Transform of a Class of Functions From Niho Exponents", IEEE Trans. Information Theory. Vol. 59(7), pp. 4662-4667.
BibTeX:
@article{DBLP:journals/tit/LiHKT13,
  author = {Li, Nian and Helleseth, Tor and Kholosha, Alexander and Tang, Xiaohu},
  title = {On the Walsh Transform of a Class of Functions From Niho Exponents},
  journal = {IEEE Trans. Information Theory},
  year = {2013},
  volume = {59},
  number = {7},
  pages = {4662--4667},
  url = {https://doi.org/10.1109/TIT.2013.2252053},
  doi = {10.1109/TIT.2013.2252053}
}
Li N, Helleseth T, Tang X and Kholosha A (2013), "Several New Classes of Bent Functions From Dillon Exponents", IEEE Trans. Information Theory. Vol. 59(3), pp. 1818-1831.
BibTeX:
@article{DBLP:journals/tit/LiHTK13,
  author = {Li, Nian and Helleseth, Tor and Tang, Xiaohu and Kholosha, Alexander},
  title = {Several New Classes of Bent Functions From Dillon Exponents},
  journal = {IEEE Trans. Information Theory},
  year = {2013},
  volume = {59},
  number = {3},
  pages = {1818--1831},
  url = {https://doi.org/10.1109/TIT.2012.2229782},
  doi = {10.1109/TIT.2012.2229782}
}
Li J, Zeng X, Tang X and Li C (2013), "A family of quadriphase sequences of period 4(2^n - 1) with low correlation and large linear span", Des. Codes Cryptography. Vol. 67(1), pp. 19-35.
BibTeX:
@article{Li2013,
  author = {Li, Jie and Zeng, Xiangyong and Tang, Xiaohu and Li, Chunlei},
  title = {A family of quadriphase sequences of period 4(2^n - 1) with low correlation and large linear span},
  journal = {Des. Codes Cryptography},
  year = {2013},
  volume = {67},
  number = {1},
  pages = {19--35},
  url = {https://doi.org/10.1007/s10623-011-9583-0},
  doi = {10.1007/s10623-011-9583-0}
}
Yari S, Kløve T and Bose B (2013), "Some Codes Correcting Unbalanced Errors of Limited Magnitude for Flash Memories", IEEE Trans. Information Theory. Vol. 59(11), pp. 7278-7287.
BibTeX:
@article{Yari2013,
  author = {Yari, Somaye and Kløve, Torleiv and Bose, Bella},
  title = {Some Codes Correcting Unbalanced Errors of Limited Magnitude for Flash Memories},
  journal = {IEEE Trans. Information Theory},
  year = {2013},
  volume = {59},
  number = {11},
  pages = {7278--7287},
  url = {https://doi.org/10.1109/TIT.2013.2279792},
  doi = {10.1109/TIT.2013.2279792}
}
Baldi M, Bianchi M, Chiaraluce F and Kløve T (2012), "A Class of Punctured Simplex Codes Which Are Proper for Error Detection", IEEE Trans. Information Theory. Vol. 58(6), pp. 3861-3880.
BibTeX:
@article{Baldi2012,
  author = {Baldi, Marco and Bianchi, Marco and Chiaraluce, Franco and Kløve, Torleiv},
  title = {A Class of Punctured Simplex Codes Which Are Proper for Error Detection},
  journal = {IEEE Trans. Information Theory},
  year = {2012},
  volume = {58},
  number = {6},
  pages = {3861--3880},
  url = {https://doi.org/10.1109/TIT.2012.2188711},
  doi = {10.1109/TIT.2012.2188711}
}
Budaghyan L, Carlet C, Helleseth T, Kholosha A and Mesnager S (2012), "Further Results on Niho Bent Functions", IEEE Trans. Information Theory. Vol. 58(11), pp. 6979-6985.
BibTeX:
@article{DBLP:journals/tit/BudaghyanCHKM12,
  author = {Budaghyan, Lilya and Carlet, Claude and Helleseth, Tor and Kholosha, Alexander and Mesnager, Sihem},
  title = {Further Results on Niho Bent Functions},
  journal = {IEEE Trans. Information Theory},
  year = {2012},
  volume = {58},
  number = {11},
  pages = {6979--6985},
  url = {https://doi.org/10.1109/TIT.2012.2206557},
  doi = {10.1109/TIT.2012.2206557}
}
Gong G, Helleseth T and Hu H (2012), "A Three-Valued Walsh Transform From Decimations of Helleseth-Gong Sequences", IEEE Trans. Information Theory. Vol. 58(2), pp. 1158-1162.
BibTeX:
@article{DBLP:journals/tit/GongHH12,
  author = {Gong, Guang and Helleseth, Tor and Hu, Honggang},
  title = {A Three-Valued Walsh Transform From Decimations of Helleseth-Gong Sequences},
  journal = {IEEE Trans. Information Theory},
  year = {2012},
  volume = {58},
  number = {2},
  pages = {1158--1162},
  url = {https://doi.org/10.1109/TIT.2011.2169297},
  doi = {10.1109/TIT.2011.2169297}
}
Gong G, Helleseth T, Hu H and Kholosha A (2012), "On the Dual of Certain Ternary Weakly Regular Bent Functions", IEEE Trans. Information Theory. Vol. 58(4), pp. 2237-2243.
BibTeX:
@article{DBLP:journals/tit/GongHHK12,
  author = {Gong, Guang and Helleseth, Tor and Hu, Honggang and Kholosha, Alexander},
  title = {On the Dual of Certain Ternary Weakly Regular Bent Functions},
  journal = {IEEE Trans. Information Theory},
  year = {2012},
  volume = {58},
  number = {4},
  pages = {2237--2243},
  url = {https://doi.org/10.1109/TIT.2011.2176312},
  doi = {10.1109/TIT.2011.2176312}
}
Jia W, Zeng X, Helleseth T and Li C (2012), "A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic", IEEE Trans. Information Theory. Vol. 58(9), pp. 6054-6063.
BibTeX:
@article{DBLP:journals/tit/JiaZHL12,
  author = {Jia, Wenjie and Zeng, Xiangyong and Helleseth, Tor and Li, Chunlei},
  title = {A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic},
  journal = {IEEE Trans. Information Theory},
  year = {2012},
  volume = {58},
  number = {9},
  pages = {6054--6063},
  url = {https://doi.org/10.1109/TIT.2012.2199736},
  doi = {10.1109/TIT.2012.2199736}
}
Kløve T, Luo J and Yari S (2012), "Codes Correcting Single Errors of Limited Magnitude", IEEE Trans. Information Theory. Vol. 58(4), pp. 2206-2219.
BibTeX:
@article{Klove2012,
  author = {Kløve, Torleiv and Luo, Jinquan and Yari, Somaye},
  title = {Codes Correcting Single Errors of Limited Magnitude},
  journal = {IEEE Trans. Information Theory},
  year = {2012},
  volume = {58},
  number = {4},
  pages = {2206--2219},
  url = {https://doi.org/10.1109/TIT.2011.2179007},
  doi = {10.1109/TIT.2011.2179007}
}
Kløve T and Luo J (2012), "Upper Bounds on the Weight Distribution Function for Some Classes of Linear Codes", IEEE Trans. Information Theory. Vol. 58(8), pp. 5512-5521.
BibTeX:
@article{Klove2012a,
  author = {Kløve, Torleiv and Luo, Jinquan},
  title = {Upper Bounds on the Weight Distribution Function for Some Classes of Linear Codes},
  journal = {IEEE Trans. Information Theory},
  year = {2012},
  volume = {58},
  number = {8},
  pages = {5512--5521},
  url = {https://doi.org/10.1109/TIT.2012.2197176},
  doi = {10.1109/TIT.2012.2197176}
}
Knudsen JG, Riera C, Danielsen LE, Parker MG and Rosnes E (2012), "Random Edge-Local Complementation with Applications to Iterative Decoding of High-Density Parity-Check Codes", IEEE Trans. Communications. Vol. 60(10), pp. 2796-2808.
BibTeX:
@article{Knudsen2012,
  author = {Knudsen, Joakim Grahl and Riera, Constanza and Danielsen, Lars Eirik and Parker, Matthew G. and Rosnes, Eirik},
  title = {Random Edge-Local Complementation with Applications to Iterative Decoding of High-Density Parity-Check Codes},
  journal = {IEEE Trans. Communications},
  year = {2012},
  volume = {60},
  number = {10},
  pages = {2796--2808},
  url = {https://doi.org/10.1109/TCOMM.2012.081012.110406},
  doi = {10.1109/TCOMM.2012.081012.110406}
}
Li C, Li N and Parker MG (2012), "Complementary Sequence Pairs of Types II and III", IEICE Transactions. Vol. 95-A(11), pp. 1819-1826.
BibTeX:
@article{Li2012,
  author = {Li, Chunlei and Li, Nian and Parker, Matthew G.},
  title = {Complementary Sequence Pairs of Types II and III},
  journal = {IEICE Transactions},
  year = {2012},
  volume = {95-A},
  number = {11},
  pages = {1819--1826},
  url = {http://search.ieice.org/bin/summary.php?id=e95-a_11_1819}
}
Budaghyan L and Carlet C (2011), "CCZ-equivalence of bent vectorial functions and related constructions", Des. Codes Cryptography. Vol. 59(1-3), pp. 69-87.
BibTeX:
@article{Budaghyan2011a,
  author = {Budaghyan, Lilya and Carlet, Claude},
  title = {CCZ-equivalence of bent vectorial functions and related constructions},
  journal = {Des. Codes Cryptography},
  year = {2011},
  volume = {59},
  number = {1-3},
  pages = {69--87},
  url = {https://doi.org/10.1007/s10623-010-9466-9},
  doi = {10.1007/s10623-010-9466-9}
}
Danielsen LE and Parker MG (2011), "Directed graph representation of half-rate additive codes over GF(4)", Des. Codes Cryptography. Vol. 59(1-3), pp. 119-130.
BibTeX:
@article{Danielsen2011,
  author = {Danielsen, Lars Eirik and Parker, Matthew G.},
  title = {Directed graph representation of half-rate additive codes over GF(4)},
  journal = {Des. Codes Cryptography},
  year = {2011},
  volume = {59},
  number = {1-3},
  pages = {119--130},
  url = {https://doi.org/10.1007/s10623-010-9469-6},
  doi = {10.1007/s10623-010-9469-6}
}
Budaghyan L and Helleseth T (2011), "New commutative semifields defined by new PN multinomials", Cryptography and Communications. Vol. 3(1), pp. 1-16.
BibTeX:
@article{DBLP:journals/ccds/BudaghyanH11,
  author = {Budaghyan, Lilya and Helleseth, Tor},
  title = {New commutative semifields defined by new PN multinomials},
  journal = {Cryptography and Communications},
  year = {2011},
  volume = {3},
  number = {1},
  pages = {1--16},
  url = {https://doi.org/10.1007/s12095-010-0022-2},
  doi = {10.1007/s12095-010-0022-2}
}
Helleseth T and Kholosha A (2011), "Crosscorrelation of m-sequences, exponential sums, bent functions and Jacobsthal sums", Cryptography and Communications. Vol. 3(4), pp. 281-291.
BibTeX:
@article{DBLP:journals/ccds/HellesethK11,
  author = {Helleseth, Tor and Kholosha, Alexander},
  title = {Crosscorrelation of m-sequences, exponential sums, bent functions and Jacobsthal sums},
  journal = {Cryptography and Communications},
  year = {2011},
  volume = {3},
  number = {4},
  pages = {281--291},
  url = {https://doi.org/10.1007/s12095-011-0048-0},
  doi = {10.1007/s12095-011-0048-0}
}
Semaev IA (2011), "Sparse Boolean equations and circuit lattices", Des. Codes Cryptography. Vol. 59(1-3), pp. 349-364.
BibTeX:
@article{DBLP:journals/dcc/Semaev11,
  author = {Semaev, Igor A.},
  title = {Sparse Boolean equations and circuit lattices},
  journal = {Des. Codes Cryptography},
  year = {2011},
  volume = {59},
  number = {1-3},
  pages = {349--364},
  url = {https://doi.org/10.1007/s10623-010-9465-x},
  doi = {10.1007/s10623-010-9465-x}
}
Semaev IA (2011), "Local limit theorem for large deviations and statistical box-tests", IACR Cryptology ePrint Archive. Vol. 2011, pp. 298.
BibTeX:
@article{DBLP:journals/iacr/Semaev11,
  author = {Semaev, Igor A.},
  title = {Local limit theorem for large deviations and statistical box-tests},
  journal = {IACR Cryptology ePrint Archive},
  year = {2011},
  volume = {2011},
  pages = {298},
  url = {http://eprint.iacr.org/2011/298}
}
Semaev IA and Hassanzadeh MM (2011), "New Statistical Box-Test and its Power", IACR Cryptology ePrint Archive. Vol. 2011, pp. 297.
BibTeX:
@article{DBLP:journals/iacr/SemaevH11,
  author = {Semaev, Igor A. and Hassanzadeh, Mehdi M.},
  title = {New Statistical Box-Test and its Power},
  journal = {IACR Cryptology ePrint Archive},
  year = {2011},
  volume = {2011},
  pages = {297},
  url = {http://eprint.iacr.org/2011/297}
}
Budaghyan L and Helleseth T (2011), "On Isotopisms of Commutative presemifields and CCZ-Equivalence of Functions", Int. J. Found. Comput. Sci.. Vol. 22(6), pp. 1243-1258.
BibTeX:
@article{DBLP:journals/ijfcs/BudaghyanH11,
  author = {Budaghyan, Lilya and Helleseth, Tor},
  title = {On Isotopisms of Commutative presemifields and CCZ-Equivalence of Functions},
  journal = {Int. J. Found. Comput. Sci.},
  year = {2011},
  volume = {22},
  number = {6},
  pages = {1243--1258},
  url = {https://doi.org/10.1142/S0129054111008684},
  doi = {10.1142/S0129054111008684}
}
Gong G, Rønjom S, Helleseth T and Hu H (2011), "Fast Discrete Fourier Spectra Attacks on Stream Ciphers", IEEE Trans. Information Theory. Vol. 57(8), pp. 5555-5565.
BibTeX:
@article{DBLP:journals/tit/GongRHH11,
  author = {Gong, Guang and Rønjom, Sondre and Helleseth, Tor and Hu, Honggang},
  title = {Fast Discrete Fourier Spectra Attacks on Stream Ciphers},
  journal = {IEEE Trans. Information Theory},
  year = {2011},
  volume = {57},
  number = {8},
  pages = {5555--5565},
  url = {https://doi.org/10.1109/TIT.2011.2158480},
  doi = {10.1109/TIT.2011.2158480}
}
Li N, Tang X and Helleseth T (2011), "Several Classes of Codes and Sequences Derived From a textdollar\BBZ4\textdollar-Valued Quadratic Form", IEEE Trans. Information Theory. Vol. 57(11), pp. 7618-7628.
BibTeX:
@article{DBLP:journals/tit/LiTH11,
  author = {Li, Nian and Tang, Xiaohu and Helleseth, Tor},
  title = {Several Classes of Codes and Sequences Derived From a textdollar\BBZ4\textdollar-Valued Quadratic Form},
  journal = {IEEE Trans. Information Theory},
  year = {2011},
  volume = {57},
  number = {11},
  pages = {7618--7628},
  url = {https://doi.org/10.1109/TIT.2011.2156382},
  doi = {10.1109/TIT.2011.2156382}
}
Luo J and Helleseth T (2011), "Constant Composition Codes as Subcodes of Cyclic Codes", IEEE Trans. Information Theory. Vol. 57(11), pp. 7482-7488.
BibTeX:
@article{DBLP:journals/tit/LuoH11a,
  author = {Luo, Jinquan and Helleseth, Tor},
  title = {Constant Composition Codes as Subcodes of Cyclic Codes},
  journal = {IEEE Trans. Information Theory},
  year = {2011},
  volume = {57},
  number = {11},
  pages = {7482--7488},
  url = {https://doi.org/10.1109/TIT.2011.2161631},
  doi = {10.1109/TIT.2011.2161631}
}
Tang X and Helleseth T (2011), "Generic Construction of Quaternary Sequences of Period 2N With Low Correlation From Quaternary Sequences of Odd Period N", IEEE Trans. Information Theory. Vol. 57(4), pp. 2295-2300.
BibTeX:
@article{DBLP:journals/tit/TangH11,
  author = {Tang, Xiaohu and Helleseth, Tor},
  title = {Generic Construction of Quaternary Sequences of Period 2N With Low Correlation From Quaternary Sequences of Odd Period N},
  journal = {IEEE Trans. Information Theory},
  year = {2011},
  volume = {57},
  number = {4},
  pages = {2295--2300},
  url = {https://doi.org/10.1109/TIT.2011.2110290},
  doi = {10.1109/TIT.2011.2110290}
}
Gulliver TA and Parker MG (2011), "Extended Binary Linear Codes from Legendre Sequences", Ars Comb.. Vol. 100, pp. 435-447.
BibTeX:
@article{Gulliver2011,
  author = {Gulliver, T. Aaron and Parker, Matthew G.},
  title = {Extended Binary Linear Codes from Legendre Sequences},
  journal = {Ars Comb.},
  year = {2011},
  volume = {100},
  pages = {435--447}
}
Kløve T (2011), "Lower bounds on the size of spheres of permutations under the Chebychev distance", Des. Codes Cryptography. Vol. 59(1-3), pp. 183-191.
BibTeX:
@article{Klove2011,
  author = {Kløve, Torleiv},
  title = {Lower bounds on the size of spheres of permutations under the Chebychev distance},
  journal = {Des. Codes Cryptography},
  year = {2011},
  volume = {59},
  number = {1-3},
  pages = {183--191},
  url = {https://doi.org/10.1007/s10623-010-9454-0},
  doi = {10.1007/s10623-010-9454-0}
}
Kløve T, Bose B and Elarief N (2011), "Systematic, Single Limited Magnitude Error Correcting Codes for Flash Memories", IEEE Trans. Information Theory. Vol. 57(7), pp. 4477-4487.
BibTeX:
@article{Klove2011a,
  author = {Kløve, Torleiv and Bose, Bella and Elarief, Noha},
  title = {Systematic, Single Limited Magnitude Error Correcting Codes for Flash Memories},
  journal = {IEEE Trans. Information Theory},
  year = {2011},
  volume = {57},
  number = {7},
  pages = {4477--4487},
  url = {https://doi.org/10.1109/TIT.2011.2146330},
  doi = {10.1109/TIT.2011.2146330}
}
Kløve T, Luo J, Naydenova I and Yari S (2011), "Some Codes Correcting Asymmetric Errors of Limited Magnitude", IEEE Trans. Information Theory. Vol. 57(11), pp. 7459-7472.
BibTeX:
@article{Klove2011b,
  author = {Kløve, Torleiv and Luo, Jinquan and Naydenova, Irina and Yari, Somaye},
  title = {Some Codes Correcting Asymmetric Errors of Limited Magnitude},
  journal = {IEEE Trans. Information Theory},
  year = {2011},
  volume = {57},
  number = {11},
  pages = {7459--7472},
  url = {https://doi.org/10.1109/TIT.2011.2160839},
  doi = {10.1109/TIT.2011.2160839}
}
Parker MG, Kholosha S, Charpin P and Rosnes E (2011), "Editorial", Des. Codes Cryptography. Vol. 59(1-3), pp. 1.
BibTeX:
@article{Parker2011,
  author = {Parker, Matthew G. and Kholosha, Sasha and Charpin, Pascale and Rosnes, Eirik},
  title = {Editorial},
  journal = {Des. Codes Cryptography},
  year = {2011},
  volume = {59},
  number = {1-3},
  pages = {1},
  url = {https://doi.org/10.1007/s10623-010-9473-x},
  doi = {10.1007/s10623-010-9473-x}
}
Zhang H, Li C and Tang M (2011), "Capability of evolutionary cryptosystems against differential cryptanalysis", SCIENCE CHINA Information Sciences. Vol. 54(10), pp. 1991-2000.
BibTeX:
@article{Zhang2011,
  author = {Zhang, Huanguo and Li, Chunlei and Tang, Ming},
  title = {Capability of evolutionary cryptosystems against differential cryptanalysis},
  journal = {SCIENCE CHINA Information Sciences},
  year = {2011},
  volume = {54},
  number = {10},
  pages = {1991--2000},
  url = {https://doi.org/10.1007/s11432-011-4430-5},
  doi = {10.1007/s11432-011-4430-5}
}
Zhang H, Li C and Tang M (2011), "Evolutionary cryptography against multidimensional linear cryptanalysis", SCIENCE CHINA Information Sciences. Vol. 54(12), pp. 2565-2577.
BibTeX:
@article{Zhang2011a,
  author = {Zhang, Huanguo and Li, Chunlei and Tang, Ming},
  title = {Evolutionary cryptography against multidimensional linear cryptanalysis},
  journal = {SCIENCE CHINA Information Sciences},
  year = {2011},
  volume = {54},
  number = {12},
  pages = {2565--2577},
  url = {https://doi.org/10.1007/s11432-011-4494-2},
  doi = {10.1007/s11432-011-4494-2}
}
Carlet C, Danielsen LE, Parker MG and Solé P (2010), "Self-dual bent functions", IJICoT. Vol. 1(4), pp. 384-399.
BibTeX:
@article{Carlet2010,
  author = {Carlet, Claude and Danielsen, Lars Eirik and Parker, Matthew G. and Solé, Patrick},
  title = {Self-dual bent functions},
  journal = {IJICoT},
  year = {2010},
  volume = {1},
  number = {4},
  pages = {384--399},
  url = {https://doi.org/10.1504/IJICOT.2010.032864},
  doi = {10.1504/IJICOT.2010.032864}
}
Danielsen LE and Parker MG (2010), "Interlace polynomials: Enumeration, unimodality and connections to codes", Discrete Applied Mathematics. Vol. 158(6), pp. 636-648.
BibTeX:
@article{Danielsen2010,
  author = {Danielsen, Lars Eirik and Parker, Matthew G.},
  title = {Interlace polynomials: Enumeration, unimodality and connections to codes},
  journal = {Discrete Applied Mathematics},
  year = {2010},
  volume = {158},
  number = {6},
  pages = {636--648},
  url = {https://doi.org/10.1016/j.dam.2009.11.011},
  doi = {10.1016/j.dam.2009.11.011}
}
Helleseth T and Kholosha A (2010), "x^2^l+1+x+a and related affine polynomials over GF(2^k)", Cryptography and Communications. Vol. 2(1), pp. 85-109.
BibTeX:
@article{DBLP:journals/ccds/HellesethK10,
  author = {Helleseth, Tor and Kholosha, Alexander},
  title = {x^2^l+1+x+a and related affine polynomials over GF(2^k)},
  journal = {Cryptography and Communications},
  year = {2010},
  volume = {2},
  number = {1},
  pages = {85--109},
  url = {https://doi.org/10.1007/s12095-009-0018-y},
  doi = {10.1007/s12095-009-0018-y}
}
Budaghyan L and Helleseth T (2010), "On isotopisms of commutative presemifields and CCZ-equivalence of functions", IACR Cryptology ePrint Archive. Vol. 2010, pp. 507.
BibTeX:
@article{DBLP:journals/iacr/BudaghyanH10a,
  author = {Budaghyan, Lilya and Helleseth, Tor},
  title = {On isotopisms of commutative presemifields and CCZ-equivalence of functions},
  journal = {IACR Cryptology ePrint Archive},
  year = {2010},
  volume = {2010},
  pages = {507},
  url = {http://eprint.iacr.org/2010/507}
}
Semaev IA (2010), "Improved Agreeing-Gluing Algorithm", IACR Cryptology ePrint Archive. Vol. 2010, pp. 140.
BibTeX:
@article{DBLP:journals/iacr/Semaev10,
  author = {Semaev, Igor A.},
  title = {Improved Agreeing-Gluing Algorithm},
  journal = {IACR Cryptology ePrint Archive},
  year = {2010},
  volume = {2010},
  pages = {140},
  url = {http://eprint.iacr.org/2010/140}
}
Helleseth T (2010), "Crosscorrelation of m-Sequences, Exponential Sums and Dickson Polynomials", IEICE Transactions. Vol. 93-A(11), pp. 2212-2219.
BibTeX:
@article{DBLP:journals/ieicet/Helleseth10,
  author = {Helleseth, Tor},
  title = {Crosscorrelation of m-Sequences, Exponential Sums and Dickson Polynomials},
  journal = {IEICE Transactions},
  year = {2010},
  volume = {93-A},
  number = {11},
  pages = {2212--2219},
  url = {http://search.ieice.org/bin/summary.php?id=e93-a_11_2212}
}
Helleseth T and Kholosha A (2010), "New binomial bent functions over the finite fields of odd characteristic", IEEE Trans. Information Theory. Vol. 56(9), pp. 4646-4652.
BibTeX:
@article{DBLP:journals/tit/HellesethK10,
  author = {Helleseth, Tor and Kholosha, Alexander},
  title = {New binomial bent functions over the finite fields of odd characteristic},
  journal = {IEEE Trans. Information Theory},
  year = {2010},
  volume = {56},
  number = {9},
  pages = {4646--4652},
  url = {https://doi.org/10.1109/TIT.2010.2055130},
  doi = {10.1109/TIT.2010.2055130}
}
Kløve T, Lin T, Tsai S and Tzeng W (2010), "Permutation arrays under the Chebyshev distance", IEEE Trans. Information Theory. Vol. 56(6), pp. 2611-2617.
BibTeX:
@article{Klove2010,
  author = {Kløve, Torleiv and Lin, Te-Tsung and Tsai, Shi-Chun and Tzeng, Wen-Guey},
  title = {Permutation arrays under the Chebyshev distance},
  journal = {IEEE Trans. Information Theory},
  year = {2010},
  volume = {56},
  number = {6},
  pages = {2611--2617},
  url = {https://doi.org/10.1109/TIT.2010.2046212},
  doi = {10.1109/TIT.2010.2046212}
}
Naydenova I and Kløve T (2010), "Some necessary conditions for codes to be good for error detection", IEEE Trans. Information Theory. Vol. 56(3), pp. 1023-1027.
BibTeX:
@article{Naydenova2010,
  author = {Naydenova, Irina and Kløve, Torleiv},
  title = {Some necessary conditions for codes to be good for error detection},
  journal = {IEEE Trans. Information Theory},
  year = {2010},
  volume = {56},
  number = {3},
  pages = {1023--1027},
  url = {https://doi.org/10.1109/TIT.2009.2039044},
  doi = {10.1109/TIT.2009.2039044}
}
Wang H, Zhang H, Wu Q, Zhang Y, Li C and Zhang X (2010), "Design theory and method of multivariate hash function", SCIENCE CHINA Information Sciences. Vol. 53(10), pp. 1977-1987.
BibTeX:
@article{Wang2010,
  author = {Wang, Houzhen and Zhang, Huanguo and Wu, Qianhong and Zhang, Yu and Li, Chunlei and Zhang, Xinyu},
  title = {Design theory and method of multivariate hash function},
  journal = {SCIENCE CHINA Information Sciences},
  year = {2010},
  volume = {53},
  number = {10},
  pages = {1977--1987},
  url = {https://doi.org/10.1007/s11432-010-4062-1},
  doi = {10.1007/s11432-010-4062-1}
}
Budaghyan L and Pott A (2009), "On differential uniformity and nonlinearity of functions", Discrete Mathematics. Vol. 309(2), pp. 371-384.
BibTeX:
@article{Budaghyan2009,
  author = {Budaghyan, Lilya and Pott, Alexander},
  title = {On differential uniformity and nonlinearity of functions},
  journal = {Discrete Mathematics},
  year = {2009},
  volume = {309},
  number = {2},
  pages = {371--384},
  url = {https://doi.org/10.1016/j.disc.2007.12.025},
  doi = {10.1016/j.disc.2007.12.025}
}
Budaghyan L, Carlet C and Leander G (2009), "Constructing new APN functions from known ones", Finite Fields and Their Applications. Vol. 15(2), pp. 150-159.
BibTeX:
@article{Budaghyan2009a,
  author = {Budaghyan, Lilya and Carlet, Claude and Leander, Gregor},
  title = {Constructing new APN functions from known ones},
  journal = {Finite Fields and Their Applications},
  year = {2009},
  volume = {15},
  number = {2},
  pages = {150--159},
  url = {https://doi.org/10.1016/j.ffa.2008.10.001},
  doi = {10.1016/j.ffa.2008.10.001}
}
Carlet C, Zeng X, Li C and Hu L (2009), "Further properties of several classes of Boolean functions with optimum algebraic immunity", Des. Codes Cryptography. Vol. 52(3), pp. 303-338.
BibTeX:
@article{Carlet2009,
  author = {Carlet, Claude and Zeng, Xiangyong and Li, Chunlei and Hu, Lei},
  title = {Further properties of several classes of Boolean functions with optimum algebraic immunity},
  journal = {Des. Codes Cryptography},
  year = {2009},
  volume = {52},
  number = {3},
  pages = {303--338},
  url = {https://doi.org/10.1007/s10623-009-9284-0},
  doi = {10.1007/s10623-009-9284-0}
}
Tang X, Helleseth T and Fan P (2009), "A new optimal quaternary sequence family of length 2(2^\emph{n} - 1) obtained from the orthogonal transformation of Families B and C", Des. Codes Cryptography. Vol. 53(3), pp. 137-148.
BibTeX:
@article{DBLP:journals/dcc/TangHF09,
  author = {Tang, Xiaohu and Helleseth, Tor and Fan, Pingzhi},
  title = {A new optimal quaternary sequence family of length 2(2^\emph{n} - 1) obtained from the orthogonal transformation of Families B and C},
  journal = {Des. Codes Cryptography},
  year = {2009},
  volume = {53},
  number = {3},
  pages = {137--148},
  url = {https://doi.org/10.1007/s10623-009-9294-y},
  doi = {10.1007/s10623-009-9294-y}
}
Charpin P, Helleseth T and Zinoviev VA (2009), "Divisibility properties of classical binary Kloosterman sums", Discrete Mathematics. Vol. 309(12), pp. 3975-3984.
BibTeX:
@article{DBLP:journals/dm/CharpinHZ09,
  author = {Charpin, Pascale and Helleseth, Tor and Zinoviev, Victor A.},
  title = {Divisibility properties of classical binary Kloosterman sums},
  journal = {Discrete Mathematics},
  year = {2009},
  volume = {309},
  number = {12},
  pages = {3975--3984},
  url = {https://doi.org/10.1016/j.disc.2008.11.010},
  doi = {10.1016/j.disc.2008.11.010}
}
Budaghyan L and Helleseth T (2009), "New commutative semifields defined by PN multinomials", IACR Cryptology ePrint Archive. Vol. 2009, pp. 53.
BibTeX:
@article{DBLP:journals/iacr/BudaghyanH09,
  author = {Budaghyan, Lilya and Helleseth, Tor},
  title = {New commutative semifields defined by PN multinomials},
  journal = {IACR Cryptology ePrint Archive},
  year = {2009},
  volume = {2009},
  pages = {53},
  url = {http://eprint.iacr.org/2009/053}
}
Semaev IA (2009), "Sparse Boolean equations and circuit lattices", IACR Cryptology ePrint Archive. Vol. 2009, pp. 252.
BibTeX:
@article{DBLP:journals/iacr/Semaev09,
  author = {Semaev, Igor A.},
  title = {Sparse Boolean equations and circuit lattices},
  journal = {IACR Cryptology ePrint Archive},
  year = {2009},
  volume = {2009},
  pages = {252},
  url = {http://eprint.iacr.org/2009/252}
}
Semaev IA (2009), "Sparse Algebraic Equations over Finite Fields", SIAM J. Comput.. Vol. 39(2), pp. 388-409.
BibTeX:
@article{DBLP:journals/siamcomp/Semaev09,
  author = {Semaev, Igor A.},
  title = {Sparse Algebraic Equations over Finite Fields},
  journal = {SIAM J. Comput.},
  year = {2009},
  volume = {39},
  number = {2},
  pages = {388--409},
  url = {https://doi.org/10.1137/070700371},
  doi = {10.1137/070700371}
}
Helleseth T, Hollmann HDL, Kholosha A, Wang Z and Xiang Q (2009), "Proofs of two conjectures on ternary weakly regular bent functions", IEEE Trans. Information Theory. Vol. 55(11), pp. 5272-5283.
BibTeX:
@article{DBLP:journals/tit/HellesethHKWX09,
  author = {Helleseth, Tor and Hollmann, Henk D. L. and Kholosha, Alexander and Wang, Zeying and Xiang, Qing},
  title = {Proofs of two conjectures on ternary weakly regular bent functions},
  journal = {IEEE Trans. Information Theory},
  year = {2009},
  volume = {55},
  number = {11},
  pages = {5272--5283},
  url = {https://doi.org/10.1109/TIT.2009.2030465},
  doi = {10.1109/TIT.2009.2030465}
}
Helleseth T, Hu L, Kholosha A, Zeng X, Li N and Jiang W (2009), "Period-different m-sequences with at most four-valued cross correlation", IEEE Trans. Information Theory. Vol. 55(7), pp. 3305-3311.
BibTeX:
@article{DBLP:journals/tit/HellesethHKZLJ09,
  author = {Helleseth, Tor and Hu, Lei and Kholosha, Alexander and Zeng, Xiangyong and Li, Nian and Jiang, Wenfeng},
  title = {Period-different m-sequences with at most four-valued cross correlation},
  journal = {IEEE Trans. Information Theory},
  year = {2009},
  volume = {55},
  number = {7},
  pages = {3305--3311},
  url = {https://doi.org/10.1109/TIT.2009.2021312},
  doi = {10.1109/TIT.2009.2021312}
}
Johansen A and Helleseth T (2009), "A Family of m -Sequences With Five-Valued Cross Correlation", IEEE Trans. Information Theory. Vol. 55(2), pp. 880-887.
BibTeX:
@article{DBLP:journals/tit/JohansenH09,
  author = {Johansen, Aina and Helleseth, Tor},
  title = {A Family of m -Sequences With Five-Valued Cross Correlation},
  journal = {IEEE Trans. Information Theory},
  year = {2009},
  volume = {55},
  number = {2},
  pages = {880--887},
  url = {https://doi.org/10.1109/TIT.2008.2009810},
  doi = {10.1109/TIT.2008.2009810}
}
Johansen A, Helleseth T and Kholosha A (2009), "Further results on m-sequences with five-valued cross correlation", IEEE Trans. Information Theory. Vol. 55(12), pp. 5792-5802.
BibTeX:
@article{DBLP:journals/tit/JohansenHK09,
  author = {Johansen, Aina and Helleseth, Tor and Kholosha, Alexander},
  title = {Further results on m-sequences with five-valued cross correlation},
  journal = {IEEE Trans. Information Theory},
  year = {2009},
  volume = {55},
  number = {12},
  pages = {5792--5802},
  url = {https://doi.org/10.1109/TIT.2009.2032854},
  doi = {10.1109/TIT.2009.2032854}
}
Tang X, Helleseth T, Hu L and Jiang W (2009), "Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences", IEEE Trans. Information Theory. Vol. 55(4), pp. 1833-1840.
BibTeX:
@article{DBLP:journals/tit/TangHHJ09,
  author = {Tang, Xiaohu and Helleseth, Tor and Hu, Lei and Jiang, Wenfeng},
  title = {Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences},
  journal = {IEEE Trans. Information Theory},
  year = {2009},
  volume = {55},
  number = {4},
  pages = {1833--1840},
  url = {https://doi.org/10.1109/TIT.2009.2013023},
  doi = {10.1109/TIT.2009.2013023}
}
Kløve T (2009), "Generating Functions for the Number of Permutations with Limited Displacement", Electr. J. Comb.. Vol. 16(1)
BibTeX:
@article{Klove2009,
  author = {Kløve, Torleiv},
  title = {Generating Functions for the Number of Permutations with Limited Displacement},
  journal = {Electr. J. Comb.},
  year = {2009},
  volume = {16},
  number = {1},
  url = {http://www.combinatorics.org/Volume_16/Abstracts/v16i1r104.html}
}
Kløve T (2009), "Constructing proper codes for error detection", IEEE Trans. Information Theory. Vol. 55(8), pp. 3520-3525.
BibTeX:
@article{Klove2009a,
  author = {Kløve, Torleiv},
  title = {Constructing proper codes for error detection},
  journal = {IEEE Trans. Information Theory},
  year = {2009},
  volume = {55},
  number = {8},
  pages = {3520--3525},
  url = {https://doi.org/10.1109/TIT.2009.2023712},
  doi = {10.1109/TIT.2009.2023712}
}
Naydenova I and Kløve T (2009), "Some optimal binary and ternary t-EC-AUED codes", IEEE Trans. Information Theory. Vol. 55(11), pp. 4898-4904.
BibTeX:
@article{Naydenova2009,
  author = {Naydenova, Irina and Kløve, Torleiv},
  title = {Some optimal binary and ternary t-EC-AUED codes},
  journal = {IEEE Trans. Information Theory},
  year = {2009},
  volume = {55},
  number = {11},
  pages = {4898--4904},
  url = {https://doi.org/10.1109/TIT.2009.2030480},
  doi = {10.1109/TIT.2009.2030480}
}
Schmidt K, Jedwab J and Parker MG (2009), "Two binary sequence families with large merit factor", Adv. in Math. of Comm.. Vol. 3(2), pp. 135-156.
BibTeX:
@article{Schmidt2009,
  author = {Schmidt, Kai-Uwe and Jedwab, Jonathan and Parker, Matthew G.},
  title = {Two binary sequence families with large merit factor},
  journal = {Adv. in Math. of Comm.},
  year = {2009},
  volume = {3},
  number = {2},
  pages = {135--156},
  url = {https://doi.org/10.3934/amc.2009.3.135},
  doi = {10.3934/amc.2009.3.135}
}
Baldi M, Chiaraluce F and Kløve T (2008), "Exact and Approximate Expressions for the Probability of Undetected Errors of Varshamov-Tenengol'ts Codes", IEEE Trans. Information Theory. Vol. 54(11), pp. 5019-5029.
BibTeX:
@article{Baldi2008,
  author = {Baldi, Marco and Chiaraluce, Franco and Kløve, Torleiv},
  title = {Exact and Approximate Expressions for the Probability of Undetected Errors of Varshamov-Tenengol'ts Codes},
  journal = {IEEE Trans. Information Theory},
  year = {2008},
  volume = {54},
  number = {11},
  pages = {5019--5029},
  url = {https://doi.org/10.1109/TIT.2008.929912},
  doi = {10.1109/TIT.2008.929912}
}
Budaghyan L and Carlet C (2008), "Classes of Quadratic APN Trinomials and Hexanomials and Related Structures", IEEE Trans. Information Theory. Vol. 54(5), pp. 2354-2357.
BibTeX:
@article{Budaghyan2008,
  author = {Budaghyan, Lilya and Carlet, Claude},
  title = {Classes of Quadratic APN Trinomials and Hexanomials and Related Structures},
  journal = {IEEE Trans. Information Theory},
  year = {2008},
  volume = {54},
  number = {5},
  pages = {2354--2357},
  url = {https://doi.org/10.1109/TIT.2008.920246},
  doi = {10.1109/TIT.2008.920246}
}
Budaghyan L, Carlet C and Leander G (2008), "Two Classes of Quadratic APN Binomials Inequivalent to Power Functions", IEEE Trans. Information Theory. Vol. 54(9), pp. 4218-4229.
BibTeX:
@article{Budaghyan2008a,
  author = {Budaghyan, Lilya and Carlet, Claude and Leander, Gregor},
  title = {Two Classes of Quadratic APN Binomials Inequivalent to Power Functions},
  journal = {IEEE Trans. Information Theory},
  year = {2008},
  volume = {54},
  number = {9},
  pages = {4218--4229},
  url = {https://doi.org/10.1109/TIT.2008.928275},
  doi = {10.1109/TIT.2008.928275}
}
Danielsen LE and Parker MG (2008), "Edge local complementation and equivalence of binary linear codes", Des. Codes Cryptography. Vol. 49(1-3), pp. 161-170.
BibTeX:
@article{Danielsen2008,
  author = {Danielsen, Lars Eirik and Parker, Matthew G.},
  title = {Edge local complementation and equivalence of binary linear codes},
  journal = {Des. Codes Cryptography},
  year = {2008},
  volume = {49},
  number = {1-3},
  pages = {161--170},
  url = {https://doi.org/10.1007/s10623-008-9190-x},
  doi = {10.1007/s10623-008-9190-x}
}
Charpin P and Helleseth T (2008), "Editorial: In memory of Hans Dobbertin", Des. Codes Cryptography. Vol. 49(1-3), pp. 1-2.
BibTeX:
@article{DBLP:journals/dcc/CharpinH08,
  author = {Charpin, Pascale and Helleseth, Tor},
  title = {Editorial: In memory of Hans Dobbertin},
  journal = {Des. Codes Cryptography},
  year = {2008},
  volume = {49},
  number = {1-3},
  pages = {1--2},
  url = {https://doi.org/10.1007/s10623-008-9186-6},
  doi = {10.1007/s10623-008-9186-6}
}
Ding C, Helleseth T and Ytrehus Ø (2008), "Preface", Des. Codes Cryptography. Vol. 48(2), pp. 109-110.
BibTeX:
@article{DBLP:journals/dcc/DingHY08,
  author = {Ding, Cunsheng and Helleseth, Tor and Ytrehus, Øyvind},
  title = {Preface},
  journal = {Des. Codes Cryptography},
  year = {2008},
  volume = {48},
  number = {2},
  pages = {109--110},
  url = {https://doi.org/10.1007/s10623-008-9169-7},
  doi = {10.1007/s10623-008-9169-7}
}
Raddum H and Semaev IA (2008), "Solving Multiple Right Hand Sides linear equations", Des. Codes Cryptography. Vol. 49(1-3), pp. 147-160.
BibTeX:
@article{DBLP:journals/dcc/RaddumS08,
  author = {Raddum, Håvard and Semaev, Igor A.},
  title = {Solving Multiple Right Hand Sides linear equations},
  journal = {Des. Codes Cryptography},
  year = {2008},
  volume = {49},
  number = {1-3},
  pages = {147--160},
  url = {https://doi.org/10.1007/s10623-008-9180-z},
  doi = {10.1007/s10623-008-9180-z}
}
Semaev IA (2008), "On solving sparse algebraic equations over finite fields", Des. Codes Cryptography. Vol. 49(1-3), pp. 47-60.
BibTeX:
@article{DBLP:journals/dcc/Semaev08,
  author = {Semaev, Igor A.},
  title = {On solving sparse algebraic equations over finite fields},
  journal = {Des. Codes Cryptography},
  year = {2008},
  volume = {49},
  number = {1-3},
  pages = {47--60},
  url = {https://doi.org/10.1007/s10623-008-9182-x},
  doi = {10.1007/s10623-008-9182-x}
}
Helleseth T and Kholosha A (2008), "On the equation x^2\({}^{\mbox{l}}\)+1+x+a=0 over GF(2^k)", Finite Fields and Their Applications. Vol. 14(1), pp. 159-176.
BibTeX:
@article{DBLP:journals/ffa/HellesethK08,
  author = {Helleseth, Tor and Kholosha, Alexander},
  title = {On the equation x^2\({}^{\mbox{l}}\)+1+x+a=0 over GF(2^k)},
  journal = {Finite Fields and Their Applications},
  year = {2008},
  volume = {14},
  number = {1},
  pages = {159--176},
  url = {https://doi.org/10.1016/j.ffa.2007.09.009},
  doi = {10.1016/j.ffa.2007.09.009}
}
Semaev IA (2008), "New hash function designs", IACR Cryptology ePrint Archive. Vol. 2008, pp. 455.
BibTeX:
@article{DBLP:journals/iacr/Semaev08,
  author = {Semaev, Igor A.},
  title = {New hash function designs},
  journal = {IACR Cryptology ePrint Archive},
  year = {2008},
  volume = {2008},
  pages = {455},
  url = {http://eprint.iacr.org/2008/455}
}
Charpin P, Helleseth T and Zinoviev VA (2008), "On Cosets of Weight 4 of BCH(2^m, 8), m Even, and Exponential Sums", SIAM J. Discrete Math.. Vol. 23(1), pp. 59-78.
BibTeX:
@article{DBLP:journals/siamdm/CharpinHZ08,
  author = {Charpin, Pascale and Helleseth, Tor and Zinoviev, Victor A.},
  title = {On Cosets of Weight 4 of BCH(2^m, 8), m Even, and Exponential Sums},
  journal = {SIAM J. Discrete Math.},
  year = {2008},
  volume = {23},
  number = {1},
  pages = {59--78},
  url = {https://doi.org/10.1137/070692649},
  doi = {10.1137/070692649}
}
Johansen A, Helleseth T and Tang X (2008), "The Correlation Distribution of Quaternary Sequences of Period 2(2^n-1)", IEEE Trans. Information Theory. Vol. 54(7), pp. 3130-3139.
BibTeX:
@article{DBLP:journals/tit/JohansenHT08,
  author = {Johansen, Aina and Helleseth, Tor and Tang, Xiaohu},
  title = {The Correlation Distribution of Quaternary Sequences of Period 2(2^n-1)},
  journal = {IEEE Trans. Information Theory},
  year = {2008},
  volume = {54},
  number = {7},
  pages = {3130--3139},
  url = {https://doi.org/10.1109/TIT.2008.924727},
  doi = {10.1109/TIT.2008.924727}
}
Fiedler F, Jedwab J and Parker MG (2008), "A multi-dimensional approach to the construction and enumeration of Golay complementary sequences", J. Comb. Theory, Ser. A. Vol. 115(5), pp. 753-776.
BibTeX:
@article{Fiedler2008,
  author = {Fiedler, Frank and Jedwab, Jonathan and Parker, Matthew G.},
  title = {A multi-dimensional approach to the construction and enumeration of Golay complementary sequences},
  journal = {J. Comb. Theory, Ser. A},
  year = {2008},
  volume = {115},
  number = {5},
  pages = {753--776},
  url = {https://doi.org/10.1016/j.jcta.2007.10.001},
  doi = {10.1016/j.jcta.2007.10.001}
}
Fiedler F, Jedwab J and Parker MG (2008), "A Framework for the Construction ofGolay Sequences", IEEE Trans. Information Theory. Vol. 54(7), pp. 3114-3129.
BibTeX:
@article{Fiedler2008a,
  author = {Fiedler, Frank and Jedwab, Jonathan and Parker, Matthew G.},
  title = {A Framework for the Construction ofGolay Sequences},
  journal = {IEEE Trans. Information Theory},
  year = {2008},
  volume = {54},
  number = {7},
  pages = {3114--3129},
  url = {https://doi.org/10.1109/TIT.2008.924667},
  doi = {10.1109/TIT.2008.924667}
}
Lin J, Chang J, Chen R and Kløve T (2008), "Distance-Preserving and Distance-Increasing Mappings From Ternary Vectors to Permutations", IEEE Trans. Information Theory. Vol. 54(3), pp. 1334-1339.
BibTeX:
@article{Lin2008,
  author = {Lin, Jyh-Shyan and Chang, Jen-Chun and Chen, Rong-Jaye and Kløve, Torleiv},
  title = {Distance-Preserving and Distance-Increasing Mappings From Ternary Vectors to Permutations},
  journal = {IEEE Trans. Information Theory},
  year = {2008},
  volume = {54},
  number = {3},
  pages = {1334--1339},
  url = {https://doi.org/10.1109/TIT.2007.915706},
  doi = {10.1109/TIT.2007.915706}
}
Riera C, Jacob S and Parker MG (2008), "From graph states to two-graph states", Des. Codes Cryptography. Vol. 48(2), pp. 179-206.
BibTeX:
@article{Riera2008,
  author = {Riera, Constanza and Jacob, Stéphane and Parker, Matthew G.},
  title = {From graph states to two-graph states},
  journal = {Des. Codes Cryptography},
  year = {2008},
  volume = {48},
  number = {2},
  pages = {179--206},
  url = {https://doi.org/10.1007/s10623-008-9167-9},
  doi = {10.1007/s10623-008-9167-9}
}
Carlet C, Zeng X, Li C and Hu L (2007), "Further Properties of Several Classes of Boolean Functions with Optimum Algebraic Immunity", IACR Cryptology ePrint Archive. Vol. 2007, pp. 370.
BibTeX:
@article{Carlet2007,
  author = {Carlet, Claude and Zeng, Xiangyong and Li, Chunlei and Hu, Lei},
  title = {Further Properties of Several Classes of Boolean Functions with Optimum Algebraic Immunity},
  journal = {IACR Cryptology ePrint Archive},
  year = {2007},
  volume = {2007},
  pages = {370},
  url = {http://eprint.iacr.org/2007/370}
}
Charpin P, Helleseth T and Zinoviev VA (2007), "Propagation characteristics of xx^-1 and Kloosterman sums", Finite Fields and Their Applications. Vol. 13(2), pp. 366-381.
BibTeX:
@article{DBLP:journals/ffa/CharpinHZ07,
  author = {Charpin, Pascale and Helleseth, Tor and Zinoviev, Victor A.},
  title = {Propagation characteristics of xx^-1 and Kloosterman sums},
  journal = {Finite Fields and Their Applications},
  year = {2007},
  volume = {13},
  number = {2},
  pages = {366--381},
  url = {https://doi.org/10.1016/j.ffa.2005.08.007},
  doi = {10.1016/j.ffa.2005.08.007}
}
Helleseth T, Lahtonen JT and Rosendahl P (2007), "On Niho type cross-correlation functions of m-sequences", Finite Fields and Their Applications. Vol. 13(2), pp. 305-317.
BibTeX:
@article{DBLP:journals/ffa/HellesethLR07,
  author = {Helleseth, Tor and Lahtonen, Jyrki T. and Rosendahl, Petri},
  title = {On Niho type cross-correlation functions of m-sequences},
  journal = {Finite Fields and Their Applications},
  year = {2007},
  volume = {13},
  number = {2},
  pages = {305--317},
  url = {https://doi.org/10.1016/j.ffa.2005.09.004},
  doi = {10.1016/j.ffa.2005.09.004}
}
Raddum H and Semaev IA (2007), "Solving MRHS linear equations", IACR Cryptology ePrint Archive. Vol. 2007, pp. 285.
BibTeX:
@article{DBLP:journals/iacr/RaddumS07,
  author = {Raddum, Håvard and Semaev, Igor A.},
  title = {Solving MRHS linear equations},
  journal = {IACR Cryptology ePrint Archive},
  year = {2007},
  volume = {2007},
  pages = {285},
  url = {http://eprint.iacr.org/2007/285}
}
Semaev IA (2007), "On solving sparse algebraic equations over finite fields II", IACR Cryptology ePrint Archive. Vol. 2007, pp. 280.
BibTeX:
@article{DBLP:journals/iacr/Semaev07,
  author = {Semaev, Igor A.},
  title = {On solving sparse algebraic equations over finite fields II},
  journal = {IACR Cryptology ePrint Archive},
  year = {2007},
  volume = {2007},
  pages = {280},
  url = {http://eprint.iacr.org/2007/280}
}
Charpin P, Helleseth T and Zinoviev VA (2007), "The divisibility modulo 24 of Kloosterman sums on GF(2^\emph{m}), m odd", J. Comb. Theory, Ser. A. Vol. 114(2), pp. 322-338.
BibTeX:
@article{DBLP:journals/jct/CharpinHZ07,
  author = {Charpin, Pascale and Helleseth, Tor and Zinoviev, Victor A.},
  title = {The divisibility modulo 24 of Kloosterman sums on GF(2^\emph{m}), m odd},
  journal = {J. Comb. Theory, Ser. A},
  year = {2007},
  volume = {114},
  number = {2},
  pages = {322--338},
  url = {https://doi.org/10.1016/j.jcta.2006.06.002},
  doi = {10.1016/j.jcta.2006.06.002}
}
Ding C, Helleseth T, Kløve T and Wang X (2007), "A Generic Construction of Cartesian Authentication Codes", IEEE Trans. Information Theory. Vol. 53(6), pp. 2229-2235.
BibTeX:
@article{DBLP:journals/tit/DingHKW07,
  author = {Ding, Cunsheng and Helleseth, Tor and Kløve, Torleiv and Wang, X.},
  title = {A Generic Construction of Cartesian Authentication Codes},
  journal = {IEEE Trans. Information Theory},
  year = {2007},
  volume = {53},
  number = {6},
  pages = {2229--2235},
  url = {https://doi.org/10.1109/TIT.2007.896872},
  doi = {10.1109/TIT.2007.896872}
}
Helleseth T, Kholosha A and Ness GJ (2007), "Characterization of m-Sequences of Lengths 2^2k-1 and 2^k-1 With Three-Valued Cross Correlation", IEEE Trans. Information Theory. Vol. 53(6), pp. 2236-2245.
BibTeX:
@article{DBLP:journals/tit/HellesethKN07,
  author = {Helleseth, Tor and Kholosha, Alexander and Ness, Geir Jarle},
  title = {Characterization of m-Sequences of Lengths 2^2k-1 and 2^k-1 With Three-Valued Cross Correlation},
  journal = {IEEE Trans. Information Theory},
  year = {2007},
  volume = {53},
  number = {6},
  pages = {2236--2245},
  url = {https://doi.org/10.1109/TIT.2007.896881},
  doi = {10.1109/TIT.2007.896881}
}
Ness GJ and Helleseth T (2007), "A New Family of Ternary Almost Perfect Nonlinear Mappings", IEEE Trans. Information Theory. Vol. 53(7), pp. 2581-2586.
BibTeX:
@article{DBLP:journals/tit/NessH07,
  author = {Ness, Geir Jarle and Helleseth, Tor},
  title = {A New Family of Ternary Almost Perfect Nonlinear Mappings},
  journal = {IEEE Trans. Information Theory},
  year = {2007},
  volume = {53},
  number = {7},
  pages = {2581--2586},
  url = {https://doi.org/10.1109/TIT.2007.899508},
  doi = {10.1109/TIT.2007.899508}
}
Ness GJ and Helleseth T (2007), "A New Family of Four-Valued Cross Correlation Between m-Sequences of Different Lengths", IEEE Trans. Information Theory. Vol. 53(11), pp. 4308-4313.
BibTeX:
@article{DBLP:journals/tit/NessH07a,
  author = {Ness, Geir Jarle and Helleseth, Tor},
  title = {A New Family of Four-Valued Cross Correlation Between m-Sequences of Different Lengths},
  journal = {IEEE Trans. Information Theory},
  year = {2007},
  volume = {53},
  number = {11},
  pages = {4308--4313},
  url = {https://doi.org/10.1109/TIT.2007.907447},
  doi = {10.1109/TIT.2007.907447}
}
Rønjom S and Helleseth T (2007), "A New Attack on the Filter Generator", IEEE Trans. Information Theory. Vol. 53(5), pp. 1752-1758.
BibTeX:
@article{DBLP:journals/tit/RonjomH07,
  author = {Rønjom, Sondre and Helleseth, Tor},
  title = {A New Attack on the Filter Generator},
  journal = {IEEE Trans. Information Theory},
  year = {2007},
  volume = {53},
  number = {5},
  pages = {1752--1758},
  url = {https://doi.org/10.1109/TIT.2007.894690},
  doi = {10.1109/TIT.2007.894690}
}
Jedwab J and Parker MG (2007), "There are no Barker arrays having more than two dimensions", Des. Codes Cryptography. Vol. 43(2-3), pp. 79-84.
BibTeX:
@article{Jedwab2007,
  author = {Jedwab, Jonathan and Parker, Matthew G.},
  title = {There are no Barker arrays having more than two dimensions},
  journal = {Des. Codes Cryptography},
  year = {2007},
  volume = {43},
  number = {2-3},
  pages = {79--84},
  url = {https://doi.org/10.1007/s10623-007-9060-y},
  doi = {10.1007/s10623-007-9060-y}
}
Jedwab J and Parker MG (2007), "Golay complementary array pairs", Des. Codes Cryptography. Vol. 44(1-3), pp. 209-216.
BibTeX:
@article{Jedwab2007a,
  author = {Jedwab, Jonathan and Parker, Matthew G.},
  title = {Golay complementary array pairs},
  journal = {Des. Codes Cryptography},
  year = {2007},
  volume = {44},
  number = {1-3},
  pages = {209--216},
  url = {https://doi.org/10.1007/s10623-007-9088-z},
  doi = {10.1007/s10623-007-9088-z}
}
Naydenova I and Kløve T (2007), "Generalized Bose-Lin Codes, a Class of Codes Detecting Asymmetric Errors", IEEE Trans. Information Theory. Vol. 53(3), pp. 1188-1193.
BibTeX:
@article{Naydenova2007,
  author = {Naydenova, Irina and Kløve, Torleiv},
  title = {Generalized Bose-Lin Codes, a Class of Codes Detecting Asymmetric Errors},
  journal = {IEEE Trans. Information Theory},
  year = {2007},
  volume = {53},
  number = {3},
  pages = {1188--1193},
  url = {https://doi.org/10.1109/TIT.2006.890776},
  doi = {10.1109/TIT.2006.890776}
}
Budaghyan L, Carlet C and Pott A (2006), "New classes of almost bent and almost perfect nonlinear polynomials", IEEE Trans. Information Theory. Vol. 52(3), pp. 1141-1152.
BibTeX:
@article{Budaghyan2006,
  author = {Budaghyan, Lilya and Carlet, Claude and Pott, Alexander},
  title = {New classes of almost bent and almost perfect nonlinear polynomials},
  journal = {IEEE Trans. Information Theory},
  year = {2006},
  volume = {52},
  number = {3},
  pages = {1141--1152},
  url = {https://doi.org/10.1109/TIT.2005.864481},
  doi = {10.1109/TIT.2005.864481}
}
Danielsen LE, Gulliver TA and Parker MG (2006), "Aperiodic propagation criteria for Boolean functions", Inf. Comput.. Vol. 204(5), pp. 741-770.
BibTeX:
@article{Danielsen2006,
  author = {Danielsen, Lars Eirik and Gulliver, T. Aaron and Parker, Matthew G.},
  title = {Aperiodic propagation criteria for Boolean functions},
  journal = {Inf. Comput.},
  year = {2006},
  volume = {204},
  number = {5},
  pages = {741--770},
  url = {https://doi.org/10.1016/j.ic.2006.01.004},
  doi = {10.1016/j.ic.2006.01.004}
}
Danielsen LE and Parker MG (2006), "On the classification of all self-dual additive codes over GF(4) of length up to 12", J. Comb. Theory, Ser. A. Vol. 113(7), pp. 1351-1367.
BibTeX:
@article{Danielsen2006a,
  author = {Danielsen, Lars Eirik and Parker, Matthew G.},
  title = {On the classification of all self-dual additive codes over GF(4) of length up to 12},
  journal = {J. Comb. Theory, Ser. A},
  year = {2006},
  volume = {113},
  number = {7},
  pages = {1351--1367},
  url = {https://doi.org/10.1016/j.jcta.2005.12.004},
  doi = {10.1016/j.jcta.2005.12.004}
}
Raddum H and Semaev IA (2006), "New Technique for Solving Sparse Equation Systems", IACR Cryptology ePrint Archive. Vol. 2006, pp. 475.
BibTeX:
@article{DBLP:journals/iacr/RaddumS06,
  author = {Raddum, Håvard and Semaev, Igor A.},
  title = {New Technique for Solving Sparse Equation Systems},
  journal = {IACR Cryptology ePrint Archive},
  year = {2006},
  volume = {2006},
  pages = {475},
  url = {http://eprint.iacr.org/2006/475}
}
Bassalygo LA, Dodunekov SM, Zinoviev VA and Helleseth T (2006), "The Grey-Rankin bound for nonbinary codes", Probl. Inf. Transm.. Vol. 42(3), pp. 197-203.
BibTeX:
@article{DBLP:journals/poit/BassalygoDZH06,
  author = {Bassalygo, Leonid A. and Dodunekov, Stefan M. and Zinoviev, Victor A. and Helleseth, Tor},
  title = {The Grey-Rankin bound for nonbinary codes},
  journal = {Probl. Inf. Transm.},
  year = {2006},
  volume = {42},
  number = {3},
  pages = {197--203},
  url = {https://doi.org/10.1134/S0032946006030033},
  doi = {10.1134/S0032946006030033}
}
Charpin P, Helleseth T and Zinoviev VA (2006), "The coset distribution of triple-error-correcting binary primitive BCH codes", IEEE Trans. Information Theory. Vol. 52(4), pp. 1727-1732.
BibTeX:
@article{DBLP:journals/tit/CharpinHZ06,
  author = {Charpin, Pascale and Helleseth, Tor and Zinoviev, Victor A.},
  title = {The coset distribution of triple-error-correcting binary primitive BCH codes},
  journal = {IEEE Trans. Information Theory},
  year = {2006},
  volume = {52},
  number = {4},
  pages = {1727--1732},
  url = {https://doi.org/10.1109/TIT.2006.871605},
  doi = {10.1109/TIT.2006.871605}
}
Dobbertin H, Felke P, Helleseth T and Rosendahl P (2006), "Niho type cross-correlation functions via dickson polynomials and Kloosterman sums", IEEE Trans. Information Theory. Vol. 52(2), pp. 613-627.
BibTeX:
@article{DBLP:journals/tit/DobbertinFHR06,
  author = {Dobbertin, Hans and Felke, Patrick and Helleseth, Tor and Rosendahl, Petri},
  title = {Niho type cross-correlation functions via dickson polynomials and Kloosterman sums},
  journal = {IEEE Trans. Information Theory},
  year = {2006},
  volume = {52},
  number = {2},
  pages = {613--627},
  url = {https://doi.org/10.1109/TIT.2005.862094},
  doi = {10.1109/TIT.2005.862094}
}
Helleseth T and Kholosha A (2006), "Monomial and quadratic bent functions over the finite fields of odd characteristic", IEEE Trans. Information Theory. Vol. 52(5), pp. 2018-2032.
BibTeX:
@article{DBLP:journals/tit/HellesethK06,
  author = {Helleseth, Tor and Kholosha, Alexander},
  title = {Monomial and quadratic bent functions over the finite fields of odd characteristic},
  journal = {IEEE Trans. Information Theory},
  year = {2006},
  volume = {52},
  number = {5},
  pages = {2018--2032},
  url = {https://doi.org/10.1109/TIT.2006.872854},
  doi = {10.1109/TIT.2006.872854}
}
Molland H and Helleseth T (2006), "Linear Properties in T-Functions", IEEE Trans. Information Theory. Vol. 52(11), pp. 5151-5157.
BibTeX:
@article{DBLP:journals/tit/MollandH06,
  author = {Molland, Håvard and Helleseth, Tor},
  title = {Linear Properties in T-Functions},
  journal = {IEEE Trans. Information Theory},
  year = {2006},
  volume = {52},
  number = {11},
  pages = {5151--5157},
  url = {https://doi.org/10.1109/TIT.2006.883624},
  doi = {10.1109/TIT.2006.883624}
}
Ness GJ and Helleseth T (2006), "Cross correlation of m-sequences of different lengths", IEEE Trans. Information Theory. Vol. 52(4), pp. 1637-1648.
BibTeX:
@article{DBLP:journals/tit/NessH06,
  author = {Ness, Geir Jarle and Helleseth, Tor},
  title = {Cross correlation of m-sequences of different lengths},
  journal = {IEEE Trans. Information Theory},
  year = {2006},
  volume = {52},
  number = {4},
  pages = {1637--1648},
  url = {https://doi.org/10.1109/TIT.2006.871049},
  doi = {10.1109/TIT.2006.871049}
}
Ness GJ and Helleseth T (2006), "A New Three-Valued Cross Correlation Between m-Sequences of Different Lengths", IEEE Trans. Information Theory. Vol. 52(10), pp. 4695-4701.
BibTeX:
@article{DBLP:journals/tit/NessH06a,
  author = {Ness, Geir Jarle and Helleseth, Tor},
  title = {A New Three-Valued Cross Correlation Between m-Sequences of Different Lengths},
  journal = {IEEE Trans. Information Theory},
  year = {2006},
  volume = {52},
  number = {10},
  pages = {4695--4701},
  url = {https://doi.org/10.1109/TIT.2006.881715},
  doi = {10.1109/TIT.2006.881715}
}
Ness GJ, Helleseth T and Kholosha A (2006), "On the correlation distribution of the Coulter-Matthews decimation", IEEE Trans. Information Theory. Vol. 52(5), pp. 2241-2247.
BibTeX:
@article{DBLP:journals/tit/NessHK06,
  author = {Ness, Geir Jarle and Helleseth, Tor and Kholosha, Alexander},
  title = {On the correlation distribution of the Coulter-Matthews decimation},
  journal = {IEEE Trans. Information Theory},
  year = {2006},
  volume = {52},
  number = {5},
  pages = {2241--2247},
  url = {https://doi.org/10.1109/TIT.2006.872857},
  doi = {10.1109/TIT.2006.872857}
}
Riera C and Parker MG (2006), "Generalized Bent Criteria for Boolean Functions (I)", IEEE Trans. Information Theory. Vol. 52(9), pp. 4142-4159.
BibTeX:
@article{Riera2006,
  author = {Riera, Constanza and Parker, Matthew G.},
  title = {Generalized Bent Criteria for Boolean Functions (I)},
  journal = {IEEE Trans. Information Theory},
  year = {2006},
  volume = {52},
  number = {9},
  pages = {4142--4159},
  url = {https://doi.org/10.1109/TIT.2006.880069},
  doi = {10.1109/TIT.2006.880069}
}
Helleseth T and Rosendahl P (2005), "New pairs of m-sequences with 4-level cross-correlation", Finite Fields and Their Applications. Vol. 11(4), pp. 674-683.
BibTeX:
@article{DBLP:journals/ffa/HellesethR05,
  author = {Helleseth, Tor and Rosendahl, Petri},
  title = {New pairs of m-sequences with 4-level cross-correlation},
  journal = {Finite Fields and Their Applications},
  year = {2005},
  volume = {11},
  number = {4},
  pages = {674--683},
  url = {https://doi.org/10.1016/j.ffa.2004.09.001},
  doi = {10.1016/j.ffa.2004.09.001}
}
Zinoviev VA, Helleseth T and Charpin P (2005), "On Cosets of Weight 4 of Binary BCH Codes with Minimum Distance 8 and Exponential Sums", Probl. Inf. Transm.. Vol. 41(4), pp. 331-348.
BibTeX:
@article{DBLP:journals/poit/ZinovievHC05,
  author = {Zinoviev, Victor A. and Helleseth, Tor and Charpin, Pascale},
  title = {On Cosets of Weight 4 of Binary BCH Codes with Minimum Distance 8 and Exponential Sums},
  journal = {Probl. Inf. Transm.},
  year = {2005},
  volume = {41},
  number = {4},
  pages = {331--348},
  url = {https://doi.org/10.1007/s11122-006-0003-4},
  doi = {10.1007/s11122-006-0003-4}
}
Helleseth T, Kløve T and Levenshtein VI (2005), "Error-correction capability of binary linear codes", IEEE Trans. Information Theory. Vol. 51(4), pp. 1408-1423.
BibTeX:
@article{DBLP:journals/tit/HellesethKL05,
  author = {Helleseth, Tor and Kløve, Torleiv and Levenshtein, Vladimir I.},
  title = {Error-correction capability of binary linear codes},
  journal = {IEEE Trans. Information Theory},
  year = {2005},
  volume = {51},
  number = {4},
  pages = {1408--1423},
  url = {https://doi.org/10.1109/TIT.2005.844080},
  doi = {10.1109/TIT.2005.844080}
}
Kim S, No J, Chung H and Helleseth T (2005), "New cyclic relative difference sets constructed from d-homogeneous functions with difference-balanced property", IEEE Trans. Information Theory. Vol. 51(3), pp. 1155-1163.
BibTeX:
@article{DBLP:journals/tit/KimNCH05,
  author = {Kim, Sang-Hyo and No, Jong-Seon and Chung, Habong and Helleseth, Tor},
  title = {New cyclic relative difference sets constructed from d-homogeneous functions with difference-balanced property},
  journal = {IEEE Trans. Information Theory},
  year = {2005},
  volume = {51},
  number = {3},
  pages = {1155--1163},
  url = {https://doi.org/10.1109/TIT.2004.842712},
  doi = {10.1109/TIT.2004.842712}
}
Schaathun HG and Helleseth T (2005), "The second support weight distribution of the Kasami codes", IEEE Trans. Information Theory. Vol. 51(8), pp. 2892-2894.
BibTeX:
@article{DBLP:journals/tit/SchaathunH05,
  author = {Schaathun, Hans Georg and Helleseth, Tor},
  title = {The second support weight distribution of the Kasami codes},
  journal = {IEEE Trans. Information Theory},
  year = {2005},
  volume = {51},
  number = {8},
  pages = {2892--2894},
  url = {https://doi.org/10.1109/TIT.2005.851770},
  doi = {10.1109/TIT.2005.851770}
}
Kløve T, Oprisan P and Bose B (2005), "Diversity combining for the Z-channel", IEEE Trans. Information Theory. Vol. 51(3), pp. 1174-1178.
BibTeX:
@article{Klove2005,
  author = {Kløve, Torleiv and Oprisan, Paul and Bose, Bella},
  title = {Diversity combining for the Z-channel},
  journal = {IEEE Trans. Information Theory},
  year = {2005},
  volume = {51},
  number = {3},
  pages = {1174--1178},
  url = {https://doi.org/10.1109/TIT.2004.842771},
  doi = {10.1109/TIT.2004.842771}
}
Kløve T, Oprisan P and Bose B (2005), "The probability of undetected error for a class of asymmetric error detecting codes", IEEE Trans. Information Theory. Vol. 51(3), pp. 1202-1205.
BibTeX:
@article{Klove2005a,
  author = {Kløve, Torleiv and Oprisan, Paul and Bose, Bella},
  title = {The probability of undetected error for a class of asymmetric error detecting codes},
  journal = {IEEE Trans. Information Theory},
  year = {2005},
  volume = {51},
  number = {3},
  pages = {1202--1205},
  url = {https://doi.org/10.1109/TIT.2004.842757},
  doi = {10.1109/TIT.2004.842757}
}
Chen W and Kløve T (2004), "On the second greedy weight for linear codes of dimension at least 4", IEEE Trans. Information Theory. Vol. 50(2), pp. 354-356.
BibTeX:
@article{Chen2004,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {On the second greedy weight for linear codes of dimension at least 4},
  journal = {IEEE Trans. Information Theory},
  year = {2004},
  volume = {50},
  number = {2},
  pages = {354--356},
  url = {https://doi.org/10.1109/TIT.2003.822601},
  doi = {10.1109/TIT.2003.822601}
}
Colbourn CJ, Kløve T and Ling ACH (2004), "Permutation Arrays for Powerline Communication and Mutually Orthogonal Latin Squares", IEEE Trans. Information Theory. Vol. 50(6), pp. 1289-1291.
BibTeX:
@article{Colbourn2004,
  author = {Colbourn, Charles J. and Kløve, Torleiv and Ling, Alan C. H.},
  title = {Permutation Arrays for Powerline Communication and Mutually Orthogonal Latin Squares},
  journal = {IEEE Trans. Information Theory},
  year = {2004},
  volume = {50},
  number = {6},
  pages = {1289--1291},
  url = {https://doi.org/10.1109/TIT.2004.828150},
  doi = {10.1109/TIT.2004.828150}
}
Helleseth T and Mykkeltveit J (2004), "A Proof of Simmons' Conjecture", Des. Codes Cryptography. Vol. 33(1), pp. 39-43.
BibTeX:
@article{DBLP:journals/dcc/HellesethM04,
  author = {Helleseth, Tor and Mykkeltveit, Johannes},
  title = {A Proof of Simmons' Conjecture},
  journal = {Des. Codes Cryptography},
  year = {2004},
  volume = {33},
  number = {1},
  pages = {39--43},
  url = {https://doi.org/10.1023/B:DESI.0000032605.98142.7f},
  doi = {10.1023/B:DESI.0000032605.98142.7f}
}
No J, Shin D and Helleseth T (2004), "On the p-Ranks and Characteristic Polynomials of Cyclic Difference Sets", Des. Codes Cryptography. Vol. 33(1), pp. 23-37.
BibTeX:
@article{DBLP:journals/dcc/NoSH04,
  author = {No, Jong-Seon and Shin, Dong-Joon and Helleseth, Tor},
  title = {On the p-Ranks and Characteristic Polynomials of Cyclic Difference Sets},
  journal = {Des. Codes Cryptography},
  year = {2004},
  volume = {33},
  number = {1},
  pages = {23--37},
  url = {https://doi.org/10.1023/B:DESI.0000032604.18844.31},
  doi = {10.1023/B:DESI.0000032604.18844.31}
}
Shin D, Kumar PV and Helleseth T (2004), "An Assmus-Mattson-Type Approach for Identifying 3-Designs from Linear Codes over Z_4", Des. Codes Cryptography. Vol. 31(1), pp. 75-92.
BibTeX:
@article{DBLP:journals/dcc/ShinKH04,
  author = {Shin, Dong-Joon and Kumar, P. Vijay and Helleseth, Tor},
  title = {An Assmus-Mattson-Type Approach for Identifying 3-Designs from Linear Codes over Z_4},
  journal = {Des. Codes Cryptography},
  year = {2004},
  volume = {31},
  number = {1},
  pages = {75--92},
  url = {https://doi.org/10.1023/A:1027338603957},
  doi = {10.1023/A:1027338603957}
}
Helleseth T and Zinoviev VA (2004), "On a new identity for Kloosterman sums and nonlinear system of equations over finite fields of characteristic 2", Discrete Mathematics. Vol. 274(1-3), pp. 109-124.
BibTeX:
@article{DBLP:journals/dm/HellesethZ04,
  author = {Helleseth, Tor and Zinoviev, Victor A.},
  title = {On a new identity for Kloosterman sums and nonlinear system of equations over finite fields of characteristic 2},
  journal = {Discrete Mathematics},
  year = {2004},
  volume = {274},
  number = {1-3},
  pages = {109--124},
  url = {https://doi.org/10.1016/S0012-365X(03)00083-9},
  doi = {10.1016/S0012-365X(03)00083-9}
}
Semaev IA (2004), "Summation polynomials and the discrete logarithm problem on elliptic curves", IACR Cryptology ePrint Archive. Vol. 2004, pp. 31.
BibTeX:
@article{DBLP:journals/iacr/Semaev04,
  author = {Semaev, Igor A.},
  title = {Summation polynomials and the discrete logarithm problem on elliptic curves},
  journal = {IACR Cryptology ePrint Archive},
  year = {2004},
  volume = {2004},
  pages = {31},
  url = {http://eprint.iacr.org/2004/031}
}
Helleseth T, Lahtonen JT and Ranto K (2004), "A simple proof to the minimum distance of Z_4-linear Goethals-like codes", J. Complexity. Vol. 20(2-3), pp. 297-304.
BibTeX:
@article{DBLP:journals/jc/HellesethLR04,
  author = {Helleseth, Tor and Lahtonen, Jyrki T. and Ranto, Kalle},
  title = {A simple proof to the minimum distance of Z_4-linear Goethals-like codes},
  journal = {J. Complexity},
  year = {2004},
  volume = {20},
  number = {2-3},
  pages = {297--304},
  url = {https://doi.org/10.1016/j.jco.2003.08.024},
  doi = {10.1016/j.jco.2003.08.024}
}
Zinoviev VA and Helleseth T (2004), "On Weight Distributions of Shifts of Goethals-like Codes", Probl. Inf. Transm.. Vol. 40(2), pp. 118-134.
BibTeX:
@article{DBLP:journals/poit/ZinovievH04,
  author = {Zinoviev, Victor A. and Helleseth, Tor},
  title = {On Weight Distributions of Shifts of Goethals-like Codes},
  journal = {Probl. Inf. Transm.},
  year = {2004},
  volume = {40},
  number = {2},
  pages = {118--134},
  url = {https://doi.org/10.1023/B%3APRIT.0000043926.60991.7e},
  doi = {10.1023/B%3APRIT.0000043926.60991.7e}
}
Helleseth T, Kløve T and Levenshtein VI (2004), "The Simplex Codes and Other Even-Weight Binary Linear Codes for Error Correction", IEEE Trans. Information Theory. Vol. 50(11), pp. 2818-2823.
BibTeX:
@article{DBLP:journals/tit/HellesethKL04,
  author = {Helleseth, Tor and Kløve, Torleiv and Levenshtein, Vladimir I.},
  title = {The Simplex Codes and Other Even-Weight Binary Linear Codes for Error Correction},
  journal = {IEEE Trans. Information Theory},
  year = {2004},
  volume = {50},
  number = {11},
  pages = {2818--2823},
  url = {https://doi.org/10.1109/TIT.2004.836708},
  doi = {10.1109/TIT.2004.836708}
}
Helleseth T, Maas M, Mathiassen JE and Segers T (2004), "Linear complexity over F_p of Sidel'nikov sequences", IEEE Trans. Information Theory. Vol. 50(10), pp. 2468-2472.
BibTeX:
@article{DBLP:journals/tit/HellesethMMS04,
  author = {Helleseth, Tor and Maas, M. and Mathiassen, John Erik and Segers, T.},
  title = {Linear complexity over F_p of Sidel'nikov sequences},
  journal = {IEEE Trans. Information Theory},
  year = {2004},
  volume = {50},
  number = {10},
  pages = {2468--2472},
  url = {https://doi.org/10.1109/TIT.2004.834854},
  doi = {10.1109/TIT.2004.834854}
}
Helleseth T and Schaathun HG (2004), "On the (2, 1)-separating weight of the Kerdock code", IEEE Trans. Information Theory. Vol. 50(12), pp. 3312-3315.
BibTeX:
@article{DBLP:journals/tit/HellesethS04,
  author = {Helleseth, Tor and Schaathun, Hans Georg},
  title = {On the (2, 1)-separating weight of the Kerdock code},
  journal = {IEEE Trans. Information Theory},
  year = {2004},
  volume = {50},
  number = {12},
  pages = {3312--3315},
  url = {https://doi.org/10.1109/TIT.2004.838106},
  doi = {10.1109/TIT.2004.838106}
}
Helleseth T and Voloch JF (2004), "Double Circulant Quadratic Residue Codes", IEEE Trans. Information Theory. Vol. 50(9), pp. 2154-2155.
BibTeX:
@article{DBLP:journals/tit/HellesethV04,
  author = {Helleseth, Tor and Voloch, José Felipe},
  title = {Double Circulant Quadratic Residue Codes},
  journal = {IEEE Trans. Information Theory},
  year = {2004},
  volume = {50},
  number = {9},
  pages = {2154--2155},
  url = {https://doi.org/10.1109/TIT.2004.833371},
  doi = {10.1109/TIT.2004.833371}
}
Jang J, Kim Y, No J and Helleseth T (2004), "New Family of p-ary Sequences With Optimal Correlation Property and Large Linear Span", IEEE Trans. Information Theory. Vol. 50(8), pp. 1839-1844.
BibTeX:
@article{DBLP:journals/tit/JangKNH04,
  author = {Jang, Ji-Woong and Kim, Young-Sik and No, Jong-Seon and Helleseth, Tor},
  title = {New Family of p-ary Sequences With Optimal Correlation Property and Large Linear Span},
  journal = {IEEE Trans. Information Theory},
  year = {2004},
  volume = {50},
  number = {8},
  pages = {1839--1844},
  url = {https://doi.org/10.1109/TIT.2004.831837},
  doi = {10.1109/TIT.2004.831837}
}
Fu F and Kløve T (2004), "Two constructions of permutation arrays", IEEE Trans. Information Theory. Vol. 50(5), pp. 881-883.
BibTeX:
@article{Fu2004,
  author = {Fu, Fang-Wei and Kløve, Torleiv},
  title = {Two constructions of permutation arrays},
  journal = {IEEE Trans. Information Theory},
  year = {2004},
  volume = {50},
  number = {5},
  pages = {881--883},
  url = {https://doi.org/10.1109/TIT.2004.826659},
  doi = {10.1109/TIT.2004.826659}
}
Kristiansen RA and Parker MG (2004), "Binary sequences with merit factor ge6.3", IEEE Trans. Information Theory. Vol. 50(12), pp. 3385-3389.
BibTeX:
@article{Kristiansen2004,
  author = {Kristiansen, Raymond A. and Parker, Matthew G.},
  title = {Binary sequences with merit factor ge6.3},
  journal = {IEEE Trans. Information Theory},
  year = {2004},
  volume = {50},
  number = {12},
  pages = {3385--3389},
  url = {https://doi.org/10.1109/TIT.2004.838343},
  doi = {10.1109/TIT.2004.838343}
}
Chang J, Chen R, Kløve T and Tsai S (2003), "Distance-preserving mappings from binary vectors to permutations", IEEE Trans. Information Theory. Vol. 49(4), pp. 1054-1059.
BibTeX:
@article{Chang2003,
  author = {Chang, Jen-Chun and Chen, Rong-Jaye and Kløve, Torleiv and Tsai, Shi-Chun},
  title = {Distance-preserving mappings from binary vectors to permutations},
  journal = {IEEE Trans. Information Theory},
  year = {2003},
  volume = {49},
  number = {4},
  pages = {1054--1059},
  url = {https://doi.org/10.1109/TIT.2003.809507},
  doi = {10.1109/TIT.2003.809507}
}
Chen W and Kløve T (2003), "Weight hierarchies of linear codes satisfying the almost chain condition", Science in China Series F: Information Sciences. Vol. 46(3), pp. 175-186.
BibTeX:
@article{Chen2003,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {Weight hierarchies of linear codes satisfying the almost chain condition},
  journal = {Science in China Series F: Information Sciences},
  year = {2003},
  volume = {46},
  number = {3},
  pages = {175--186},
  url = {https://doi.org/10.1360/03yf9015},
  doi = {10.1360/03yf9015}
}
Helleseth T, Kløve T and Levenshtein VI (2003), "Hypercubic 4 and 5-Designs from Double-Error-Correcting BCH Codes", Des. Codes Cryptography. Vol. 28(3), pp. 265-282.
BibTeX:
@article{DBLP:journals/dcc/HellesethKL03,
  author = {Helleseth, Tor and Kløve, Torleiv and Levenshtein, Vladimir I.},
  title = {Hypercubic 4 and 5-Designs from Double-Error-Correcting BCH Codes},
  journal = {Des. Codes Cryptography},
  year = {2003},
  volume = {28},
  number = {3},
  pages = {265--282},
  url = {https://doi.org/10.1023/A:1024110021836},
  doi = {10.1023/A:1024110021836}
}
Shin D, Kumar PV and Helleseth T (2003), "3-Designs from the Z_4-Goethals Codes via a New Kloosterman Sum Identity", Des. Codes Cryptography. Vol. 28(3), pp. 247-263.
BibTeX:
@article{DBLP:journals/dcc/ShinKH03,
  author = {Shin, Dong-Joon and Kumar, P. Vijay and Helleseth, Tor},
  title = {3-Designs from the Z_4-Goethals Codes via a New Kloosterman Sum Identity},
  journal = {Des. Codes Cryptography},
  year = {2003},
  volume = {28},
  number = {3},
  pages = {247--263},
  url = {https://doi.org/10.1023/A:1024153804090},
  doi = {10.1023/A:1024153804090}
}
Semaev IA (2003), "A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves", IACR Cryptology ePrint Archive. Vol. 2003, pp. 166.
BibTeX:
@article{DBLP:journals/iacr/Semaev03,
  author = {Semaev, Igor A.},
  title = {A reduction of the space for the parallelized Pollard lambda search on elliptic curves over prime finite fields and on anomalous binary elliptic curves},
  journal = {IACR Cryptology ePrint Archive},
  year = {2003},
  volume = {2003},
  pages = {166},
  url = {http://eprint.iacr.org/2003/166}
}
Sze TW, Chanson ST, Ding C, Helleseth T and Parker MG (2003), "Logarithm cartesian authentication codes", Inf. Comput.. Vol. 184(1), pp. 93-108.
BibTeX:
@article{DBLP:journals/iandc/SzeCDHP03,
  author = {Sze, T. W. and Chanson, Samuel T. and Ding, Cunsheng and Helleseth, Tor and Parker, Matthew G.},
  title = {Logarithm cartesian authentication codes},
  journal = {Inf. Comput.},
  year = {2003},
  volume = {184},
  number = {1},
  pages = {93--108},
  url = {https://doi.org/10.1016/S0890-5401(03)00053-1},
  doi = {10.1016/S0890-5401(03)00053-1}
}
Helleseth T, Kim S and No J (2003), "Linear complexity over F_p and trace representation of Lempel-Cohn-Eastman sequences", IEEE Trans. Information Theory. Vol. 49(6), pp. 1548-1552.
BibTeX:
@article{DBLP:journals/tit/HellesethKN03,
  author = {Helleseth, Tor and Kim, Sang-Hyo and No, Jong-Seon},
  title = {Linear complexity over F_p and trace representation of Lempel-Cohn-Eastman sequences},
  journal = {IEEE Trans. Information Theory},
  year = {2003},
  volume = {49},
  number = {6},
  pages = {1548--1552},
  url = {https://doi.org/10.1109/TIT.2003.811924},
  doi = {10.1109/TIT.2003.811924}
}
Yang K and Helleseth T (2003), "On the minimum distance of array codes as LDPC codes", IEEE Trans. Information Theory. Vol. 49(12), pp. 3268-3271.
BibTeX:
@article{DBLP:journals/tit/KyeongcheolH03,
  author = {Yang, Kyeongcheol and Helleseth, Tor},
  title = {On the minimum distance of array codes as LDPC codes},
  journal = {IEEE Trans. Information Theory},
  year = {2003},
  volume = {49},
  number = {12},
  pages = {3268--3271},
  url = {https://doi.org/10.1109/TIT.2003.820053},
  doi = {10.1109/TIT.2003.820053}
}
Ding C, Golin MJ and Kløve T (2003), "Meeting the Welch and Karystinos-Pados Bounds on DS-CDMA Binary Signature Sets", Des. Codes Cryptography. Vol. 30(1), pp. 73-84.
BibTeX:
@article{Ding2003,
  author = {Ding, Cunsheng and Golin, Mordecai J. and Kløve, Torleiv},
  title = {Meeting the Welch and Karystinos-Pados Bounds on DS-CDMA Binary Signature Sets},
  journal = {Des. Codes Cryptography},
  year = {2003},
  volume = {30},
  number = {1},
  pages = {73--84},
  url = {https://doi.org/10.1023/A:1024759310058},
  doi = {10.1023/A:1024759310058}
}
Fu F, Kløve T, Yuan L and Wei VK (2003), "On Equidistant Constant Weight Codes", Discrete Applied Mathematics. Vol. 128(1), pp. 157-164.
BibTeX:
@article{Fu2003,
  author = {Fu, Fang-Wei and Kløve, Torleiv and Yuan, Luo and Wei, Victor K.},
  title = {On Equidistant Constant Weight Codes},
  journal = {Discrete Applied Mathematics},
  year = {2003},
  volume = {128},
  number = {1},
  pages = {157--164},
  url = {https://doi.org/10.1016/S0166-218X(02)00442-0},
  doi = {10.1016/S0166-218X(02)00442-0}
}
Fu F, Kløve T and Wei VK (2003), "On the undetected error probability for binary codes", IEEE Trans. Information Theory. Vol. 49(2), pp. 382-390.
BibTeX:
@article{Fu2003a,
  author = {Fu, Fang-Wei and Kløve, Torleiv and Wei, Victor K.-W.},
  title = {On the undetected error probability for binary codes},
  journal = {IEEE Trans. Information Theory},
  year = {2003},
  volume = {49},
  number = {2},
  pages = {382--390},
  url = {https://doi.org/10.1109/TIT.2002.807299},
  doi = {10.1109/TIT.2002.807299}
}
Semaev IA (2002), "Special prime numbers and discrete logs in finite prime fields", Math. Comput.. Vol. 71(237), pp. 363-377.
BibTeX:
@article{DBLP:journals/moc/Semaev02,
  author = {Semaev, Igor A.},
  title = {Special prime numbers and discrete logs in finite prime fields},
  journal = {Math. Comput.},
  year = {2002},
  volume = {71},
  number = {237},
  pages = {363--377},
  url = {https://doi.org/10.1090/S0025-5718-00-01308-9},
  doi = {10.1090/S0025-5718-00-01308-9}
}
Ding C, Helleseth T, Niederreiter H and Xing C (2002), "The minimum distance of the duals of binary irreducible cyclic codes", IEEE Trans. Information Theory. Vol. 48(10), pp. 2679-2689.
BibTeX:
@article{DBLP:journals/tit/DingHNX02,
  author = {Ding, Cunsheng and Helleseth, Tor and Niederreiter, Harald and Xing, Chaoping},
  title = {The minimum distance of the duals of binary irreducible cyclic codes},
  journal = {IEEE Trans. Information Theory},
  year = {2002},
  volume = {48},
  number = {10},
  pages = {2679--2689},
  url = {https://doi.org/10.1109/TIT.2002.802593},
  doi = {10.1109/TIT.2002.802593}
}
Helleseth T and Gong G (2002), "New nonbinary sequences with ideal two-level autocorrelation", IEEE Trans. Information Theory. Vol. 48(11), pp. 2868-2872.
BibTeX:
@article{DBLP:journals/tit/HellesethG02,
  author = {Helleseth, Tor and Gong, Guang},
  title = {New nonbinary sequences with ideal two-level autocorrelation},
  journal = {IEEE Trans. Information Theory},
  year = {2002},
  volume = {48},
  number = {11},
  pages = {2868--2872},
  url = {https://doi.org/10.1109/TIT.2002.804052},
  doi = {10.1109/TIT.2002.804052}
}
Ding C, Fu F, Kløve T and Wei VK (2002), "Constructions of permutation arrays", IEEE Trans. Information Theory. Vol. 48(4), pp. 977-980.
BibTeX:
@article{Ding2002,
  author = {Ding, Cunsheng and Fu, Fang-Wei and Kløve, Torleiv and Wei, Victor K.-W.},
  title = {Constructions of permutation arrays},
  journal = {IEEE Trans. Information Theory},
  year = {2002},
  volume = {48},
  number = {4},
  pages = {977--980},
  url = {https://doi.org/10.1109/18.992812},
  doi = {10.1109/18.992812}
}
Chen W and Kløve T (2001), "Weight hierarchies of binary linear codes of dimension 4", Discrete Mathematics. Vol. 238(1-3), pp. 27-34.
BibTeX:
@article{Chen2001,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {Weight hierarchies of binary linear codes of dimension 4},
  journal = {Discrete Mathematics},
  year = {2001},
  volume = {238},
  number = {1-3},
  pages = {27--34},
  url = {https://doi.org/10.1016/S0012-365X(00)00411-8},
  doi = {10.1016/S0012-365X(00)00411-8}
}
Chen W and Kløve T (2001), "On the second greedy weight for linear codes of dimension 3", Discrete Mathematics. Vol. 241(1-3), pp. 171-187.
BibTeX:
@article{Chen2001a,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {On the second greedy weight for linear codes of dimension 3},
  journal = {Discrete Mathematics},
  year = {2001},
  volume = {241},
  number = {1-3},
  pages = {171--187},
  url = {https://doi.org/10.1016/S0012-365X(01)00116-9},
  doi = {10.1016/S0012-365X(01)00116-9}
}
Helleseth T, Kumar PV and Martinsen H (2001), "A New Family of Ternary Sequences with Ideal Two-level Autocorrelation Function", Des. Codes Cryptography. Vol. 23(2), pp. 157-166.
BibTeX:
@article{DBLP:journals/dcc/HellesethKM01,
  author = {Helleseth, Tor and Kumar, P. Vijay and Martinsen, Halvard},
  title = {A New Family of Ternary Sequences with Ideal Two-level Autocorrelation Function},
  journal = {Des. Codes Cryptography},
  year = {2001},
  volume = {23},
  number = {2},
  pages = {157--166}
}
Helleseth T, Rong C and Yang K (2001), "On t-designs from codes over Z_4", Discrete Mathematics. Vol. 238(1-3), pp. 67-80.
BibTeX:
@article{DBLP:journals/dm/HellesethRY01,
  author = {Helleseth, Tor and Rong, Chunming and Yang, Kyeongcheol},
  title = {On t-designs from codes over Z_4},
  journal = {Discrete Mathematics},
  year = {2001},
  volume = {238},
  number = {1-3},
  pages = {67--80},
  url = {https://doi.org/10.1016/S0012-365X(00)00417-9},
  doi = {10.1016/S0012-365X(00)00417-9}
}
Helleseth T, Rong C and Yang K (2001), "New 3-designs from Goethals codes over Z_4", Discrete Mathematics. Vol. 226(1-3), pp. 403-409.
BibTeX:
@article{DBLP:journals/dm/HellesethRY01a,
  author = {Helleseth, Tor and Rong, Chunming and Yang, Kyeongcheol},
  title = {New 3-designs from Goethals codes over Z_4},
  journal = {Discrete Mathematics},
  year = {2001},
  volume = {226},
  number = {1-3},
  pages = {403--409},
  url = {https://doi.org/10.1016/S0012-365X(00)00161-8},
  doi = {10.1016/S0012-365X(00)00161-8}
}
Shin D, Kumar PV and Helleseth T (2001), "5-Designs from the lifted Golay code over Z_4 via an Assmus-Mattson type approach", Discrete Mathematics. Vol. 241(1-3), pp. 479-487.
BibTeX:
@article{DBLP:journals/dm/ShinKH01,
  author = {Shin, Dong-Joon and Kumar, P. Vijay and Helleseth, Tor},
  title = {5-Designs from the lifted Golay code over Z_4 via an Assmus-Mattson type approach},
  journal = {Discrete Mathematics},
  year = {2001},
  volume = {241},
  number = {1-3},
  pages = {479--487},
  url = {https://doi.org/10.1016/S0012-365X(01)00156-X},
  doi = {10.1016/S0012-365X(01)00156-X}
}
Helleseth T (2001), "Sequences with good correlations and some open problems", Electronic Notes in Discrete Mathematics. Vol. 6, pp. 507-517.
BibTeX:
@article{DBLP:journals/endm/Helleseth01,
  author = {Helleseth, Tor},
  title = {Sequences with good correlations and some open problems},
  journal = {Electronic Notes in Discrete Mathematics},
  year = {2001},
  volume = {6},
  pages = {507--517},
  url = {https://doi.org/10.1016/S1571-0653(04)00203-3},
  doi = {10.1016/S1571-0653(04)00203-3}
}
Arasu KT, Ding C, Helleseth T, Kumar PV and Martinsen H (2001), "Almost difference sets and their sequences with optimal autocorrelation", IEEE Trans. Information Theory. Vol. 47(7), pp. 2934-2943.
BibTeX:
@article{DBLP:journals/tit/ArasuDHKM01,
  author = {Arasu, K. T. and Ding, Cunsheng and Helleseth, Tor and Kumar, P. Vijay and Martinsen, Halvard},
  title = {Almost difference sets and their sequences with optimal autocorrelation},
  journal = {IEEE Trans. Information Theory},
  year = {2001},
  volume = {47},
  number = {7},
  pages = {2934--2943},
  url = {https://doi.org/10.1109/18.959271},
  doi = {10.1109/18.959271}
}
Ding C, Helleseth T and Martinsen H (2001), "New families of binary sequences with optimal three-level autocorrelation", IEEE Trans. Information Theory. Vol. 47(1), pp. 428-433.
BibTeX:
@article{DBLP:journals/tit/DingHM01,
  author = {Ding, Cunsheng and Helleseth, Tor and Martinsen, Halvard},
  title = {New families of binary sequences with optimal three-level autocorrelation},
  journal = {IEEE Trans. Information Theory},
  year = {2001},
  volume = {47},
  number = {1},
  pages = {428--433},
  url = {https://doi.org/10.1109/18.904555},
  doi = {10.1109/18.904555}
}
Dobbertin H, Helleseth T, Kumar PV and Martinsen H (2001), "Ternary m-sequences with three-valued cross-correlation function: New decimations of Welch and Niho type", IEEE Trans. Information Theory. Vol. 47(4), pp. 1473-1481.
BibTeX:
@article{DBLP:journals/tit/DobbertinHKM01,
  author = {Dobbertin, Hans and Helleseth, Tor and Kumar, P. Vijay and Martinsen, Halvard},
  title = {Ternary m-sequences with three-valued cross-correlation function: New decimations of Welch and Niho type},
  journal = {IEEE Trans. Information Theory},
  year = {2001},
  volume = {47},
  number = {4},
  pages = {1473--1481},
  url = {https://doi.org/10.1109/18.923728},
  doi = {10.1109/18.923728}
}
Helleseth T and Zinoviev VA (2001), "Codes with the same coset weight distributions as the Z_4-linear Goethals codes", IEEE Trans. Information Theory. Vol. 47(4), pp. 1589-1595.
BibTeX:
@article{DBLP:journals/tit/HellesethZ01,
  author = {Helleseth, Tor and Zinoviev, Victor A.},
  title = {Codes with the same coset weight distributions as the Z_4-linear Goethals codes},
  journal = {IEEE Trans. Information Theory},
  year = {2001},
  volume = {47},
  number = {4},
  pages = {1589--1595},
  url = {https://doi.org/10.1109/18.923741},
  doi = {10.1109/18.923741}
}
Helleseth T and Zinoviev VA (2001), "On coset weight distributions of the Z4-linear Goethals codes", IEEE Trans. Information Theory. Vol. 47(5), pp. 1758-1772.
BibTeX:
@article{DBLP:journals/tit/HellesethZ01a,
  author = {Helleseth, Tor and Zinoviev, Victor A.},
  title = {On coset weight distributions of the Z4-linear Goethals codes},
  journal = {IEEE Trans. Information Theory},
  year = {2001},
  volume = {47},
  number = {5},
  pages = {1758--1772},
  url = {https://doi.org/10.1109/18.930916},
  doi = {10.1109/18.930916}
}
No J, Chung H, Song H, Yang K, Lee J and Helleseth T (2001), "New construction for binary sequences of period p^m-1 with Optimal autocorrelation using (z+1)^d+az^d+b", IEEE Trans. Information Theory. Vol. 47(4), pp. 1638-1644.
BibTeX:
@article{DBLP:journals/tit/NoCSYLH01,
  author = {No, Jong-Seon and Chung, Habong and Song, Hong-Yeop and Yang, Kyeongcheol and Lee, Jung-Do and Helleseth, Tor},
  title = {New construction for binary sequences of period p^m-1 with Optimal autocorrelation using (z+1)^d+az^d+b},
  journal = {IEEE Trans. Information Theory},
  year = {2001},
  volume = {47},
  number = {4},
  pages = {1638--1644},
  url = {https://doi.org/10.1109/18.923752},
  doi = {10.1109/18.923752}
}
Ding C, Kløve T and Sica F (2001), "Two classes of ternary codes and their weight distributions", Discrete Applied Mathematics. Vol. 111(1-2), pp. 37-53.
BibTeX:
@article{Ding2001,
  author = {Ding, Cunsheng and Kløve, Torleiv and Sica, Francesco},
  title = {Two classes of ternary codes and their weight distributions},
  journal = {Discrete Applied Mathematics},
  year = {2001},
  volume = {111},
  number = {1-2},
  pages = {37--53},
  url = {https://doi.org/10.1016/S0166-218X(00)00343-7},
  doi = {10.1016/S0166-218X(00)00343-7}
}
Fu F, Kløve T, Luo Y and Wei VK (2001), "On Equidistant Constant Weight Codes", Electronic Notes in Discrete Mathematics. Vol. 6, pp. 187-194.
BibTeX:
@article{Fu2001,
  author = {Fu, Fang-Wei and Kløve, Torleiv and Luo, Yuan and Wei, Victor K.},
  title = {On Equidistant Constant Weight Codes},
  journal = {Electronic Notes in Discrete Mathematics},
  year = {2001},
  volume = {6},
  pages = {187--194},
  url = {https://doi.org/10.1016/S1571-0653(04)00170-2},
  doi = {10.1016/S1571-0653(04)00170-2}
}
Fu F, Kløve T, Yuan L and Wei VK (2001), "On the Svanström bound for ternary constant-weight codes", IEEE Trans. Information Theory. Vol. 47(5), pp. 2061-2064.
BibTeX:
@article{Fu2001a,
  author = {Fu, Fang-Wei and Kløve, Torleiv and Yuan, Luo and Wei, Victor K.},
  title = {On the Svanström bound for ternary constant-weight codes},
  journal = {IEEE Trans. Information Theory},
  year = {2001},
  volume = {47},
  number = {5},
  pages = {2061--2064},
  url = {https://doi.org/10.1109/18.930943},
  doi = {10.1109/18.930943}
}
Kløve T (2001), "Relations between the covering and Newton radii of binary codes", Discrete Mathematics. Vol. 238(1-3), pp. 81-88.
BibTeX:
@article{Klove2001,
  author = {Kløve, Torleiv},
  title = {Relations between the covering and Newton radii of binary codes},
  journal = {Discrete Mathematics},
  year = {2001},
  volume = {238},
  number = {1-3},
  pages = {81--88},
  url = {https://doi.org/10.1016/S0012-365X(00)00412-X},
  doi = {10.1016/S0012-365X(00)00412-X}
}
Parker MG (2001), "Quantum factor graphs", Annales des Télécommunications. Vol. 56(7-8), pp. 472-483.
BibTeX:
@article{Parker2001,
  author = {Parker, Matthew G.},
  title = {Quantum factor graphs},
  journal = {Annales des Télécommunications},
  year = {2001},
  volume = {56},
  number = {7-8},
  pages = {472--483},
  url = {https://doi.org/10.1007/BF02995457},
  doi = {10.1007/BF02995457}
}
Parker MG and Tellambura C (2001), "Generalised Rudin-Shapiro Constructions", Electronic Notes in Discrete Mathematics. Vol. 6, pp. 364-374.
BibTeX:
@article{Parker2001a,
  author = {Parker, Matthew G. and Tellambura, Chintha},
  title = {Generalised Rudin-Shapiro Constructions},
  journal = {Electronic Notes in Discrete Mathematics},
  year = {2001},
  volume = {6},
  pages = {364--374},
  url = {https://doi.org/10.1016/S1571-0653(04)00188-X},
  doi = {10.1016/S1571-0653(04)00188-X}
}
Ding C, Helleseth T and Lam K (2000), "Duadic sequences of prime lengths", Discrete Mathematics. Vol. 218(1-3), pp. 33-49.
BibTeX:
@article{DBLP:journals/dm/DingHL00,
  author = {Ding, Cunsheng and Helleseth, Tor and Lam, Kwok-Yan},
  title = {Duadic sequences of prime lengths},
  journal = {Discrete Mathematics},
  year = {2000},
  volume = {218},
  number = {1-3},
  pages = {33--49},
  url = {https://doi.org/10.1016/S0012-365X(99)00367-2},
  doi = {10.1016/S0012-365X(99)00367-2}
}
Chang A, Gaal P, Golomb SW, Gong G, Helleseth T and Kumar PV (2000), "On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code", IEEE Trans. Information Theory. Vol. 46(2), pp. 680-687.
BibTeX:
@article{DBLP:journals/tit/ChangGGGHK00,
  author = {Chang, Anchung and Gaal, Peter and Golomb, Solomon W. and Gong, Guang and Helleseth, Tor and Kumar, P. Vijay},
  title = {On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code},
  journal = {IEEE Trans. Information Theory},
  year = {2000},
  volume = {46},
  number = {2},
  pages = {680--687},
  url = {https://doi.org/10.1109/18.825842},
  doi = {10.1109/18.825842}
}
Hamada N, Helleseth T, Martinsen H and Ytrehus Ø (2000), "There is no ternary [28, 6, 16] code", IEEE Trans. Information Theory. Vol. 46(4), pp. 1550-1554.
BibTeX:
@article{DBLP:journals/tit/HamadaHMY00,
  author = {Hamada, Noboru and Helleseth, Tor and Martinsen, Halvard and Ytrehus, Øyvind},
  title = {There is no ternary [28, 6, 16] code},
  journal = {IEEE Trans. Information Theory},
  year = {2000},
  volume = {46},
  number = {4},
  pages = {1550--1554},
  url = {https://doi.org/10.1109/18.850693},
  doi = {10.1109/18.850693}
}
Fu F, Kløve T and Xia S (2000), "The undetected error probability threshold of m-out-of-n codes", IEEE Trans. Information Theory. Vol. 46(4), pp. 1597-1599.
BibTeX:
@article{Fu2000,
  author = {Fu, Fang-Wei and Kløve, Torleiv and Xia, Shu-Tao},
  title = {The undetected error probability threshold of m-out-of-n codes},
  journal = {IEEE Trans. Information Theory},
  year = {2000},
  volume = {46},
  number = {4},
  pages = {1597--1599},
  url = {https://doi.org/10.1109/18.850701},
  doi = {10.1109/18.850701}
}
Chen W and Kløve T (1999), "Weight Hierarchies of Extremal Non-Chain Binary Codes of Dimension 4", IEEE Trans. Information Theory. Vol. 45(1), pp. 276-281.
BibTeX:
@article{Chen1999,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {Weight Hierarchies of Extremal Non-Chain Binary Codes of Dimension 4},
  journal = {IEEE Trans. Information Theory},
  year = {1999},
  volume = {45},
  number = {1},
  pages = {276--281},
  url = {https://doi.org/10.1109/18.746811},
  doi = {10.1109/18.746811}
}
Duursma IM, Helleseth T, Rong C and Yang K (1999), "Split Weight Enumerators for the Preparata Codes with Applications to Designs", Des. Codes Cryptography. Vol. 18(1/3), pp. 103-124.
BibTeX:
@article{DBLP:journals/dcc/DuursmaHRY99,
  author = {Duursma, Iwan M. and Helleseth, Tor and Rong, Chunming and Yang, Kyeongcheol},
  title = {Split Weight Enumerators for the Preparata Codes with Applications to Designs},
  journal = {Des. Codes Cryptography},
  year = {1999},
  volume = {18},
  number = {1/3},
  pages = {103--124},
  url = {https://doi.org/10.1023/A:1008337219570},
  doi = {10.1023/A:1008337219570}
}
Helleseth T and Zinoviev VA (1999), "On Linear Goethals Codes and Kloosterman Sums", Des. Codes Cryptography. Vol. 17(1-3), pp. 269-288.
BibTeX:
@article{DBLP:journals/dcc/HellesethZ99,
  author = {Helleseth, Tor and Zinoviev, Victor A.},
  title = {On Linear Goethals Codes and Kloosterman Sums},
  journal = {Des. Codes Cryptography},
  year = {1999},
  volume = {17},
  number = {1-3},
  pages = {269--288},
  url = {https://doi.org/10.1023/A:1026491513009},
  doi = {10.1023/A:1026491513009}
}
Helleseth T, Rong C and Yang K (1999), "New infinite families of 3-designs from preparata codes over Z_4", Discrete Mathematics. Vol. 195(1-3), pp. 139-156.
BibTeX:
@article{DBLP:journals/dm/HellesethRY99,
  author = {Helleseth, Tor and Rong, Chunming and Yang, Kyeongcheol},
  title = {New infinite families of 3-designs from preparata codes over Z_4},
  journal = {Discrete Mathematics},
  year = {1999},
  volume = {195},
  number = {1-3},
  pages = {139--156},
  url = {https://doi.org/10.1016/S0012-365X(98)00123-X},
  doi = {10.1016/S0012-365X(98)00123-X}
}
Helleseth T and Martinsen HM (1999), "Binary Sequences of Period 2m-1 with Large Linear Complexity", Inf. Comput.. Vol. 151(1-2), pp. 73-91.
BibTeX:
@article{DBLP:journals/iandc/HellesethM99,
  author = {Helleseth, Tor and Martinsen, H. M.},
  title = {Binary Sequences of Period 2m-1 with Large Linear Complexity},
  journal = {Inf. Comput.},
  year = {1999},
  volume = {151},
  number = {1-2},
  pages = {73--91},
  url = {https://doi.org/10.1006/inco.1998.2765},
  doi = {10.1006/inco.1998.2765}
}
Ding C and Helleseth T (1999), "Generalized Cyclotomic Codes of Length p_1^e\({}^{\mbox{1}}\) ... p_t^e\({}^{\mbox{t}}\)", IEEE Trans. Information Theory. Vol. 45(2), pp. 467-474.
BibTeX:
@article{DBLP:journals/tit/DingH99,
  author = {Ding, Cunsheng and Helleseth, Tor},
  title = {Generalized Cyclotomic Codes of Length p_1^e\({}^{\mbox{1}}\) ... p_t^e\({}^{\mbox{t}}\)},
  journal = {IEEE Trans. Information Theory},
  year = {1999},
  volume = {45},
  number = {2},
  pages = {467--474},
  url = {https://doi.org/10.1109/18.748996},
  doi = {10.1109/18.748996}
}
Ding C, Helleseth T and Lam K (1999), "Several classes of binary sequences with three-level autocorrelation", IEEE Trans. Information Theory. Vol. 45(7), pp. 2606-2612.
BibTeX:
@article{DBLP:journals/tit/DingHL99,
  author = {Ding, Cunsheng and Helleseth, Tor and Lam, Kwok-Yan},
  title = {Several classes of binary sequences with three-level autocorrelation},
  journal = {IEEE Trans. Information Theory},
  year = {1999},
  volume = {45},
  number = {7},
  pages = {2606--2612},
  url = {https://doi.org/10.1109/18.796414},
  doi = {10.1109/18.796414}
}
Helleseth T, Hove B and Yang K (1999), "Further Results on Generalized Hamming Weights for Goethals and Preparata Codes Over Z_4", IEEE Trans. Information Theory. Vol. 45(4), pp. 1255-1258.
BibTeX:
@article{DBLP:journals/tit/HellesethHY99,
  author = {Helleseth, Tor and Hove, Bo and Yang, Kyeongcheol},
  title = {Further Results on Generalized Hamming Weights for Goethals and Preparata Codes Over Z_4},
  journal = {IEEE Trans. Information Theory},
  year = {1999},
  volume = {45},
  number = {4},
  pages = {1255--1258},
  url = {https://doi.org/10.1109/18.761279},
  doi = {10.1109/18.761279}
}
Helleseth T, Rong C and Sandberg D (1999), "New Families of Almost Perfect Nonlinear Power Mappings", IEEE Trans. Information Theory. Vol. 45(2), pp. 475-485.
BibTeX:
@article{DBLP:journals/tit/HellesethRS99,
  author = {Helleseth, Tor and Rong, Chunming and Sandberg, Daniel},
  title = {New Families of Almost Perfect Nonlinear Power Mappings},
  journal = {IEEE Trans. Information Theory},
  year = {1999},
  volume = {45},
  number = {2},
  pages = {475--485},
  url = {https://doi.org/10.1109/18.748997},
  doi = {10.1109/18.748997}
}
Rong C, Helleseth T and Lahtonen JT (1999), "On algebraic decoding of the Z_4-linear Calderbank-McGuire code", IEEE Trans. Information Theory. Vol. 45(5), pp. 1423-1434.
BibTeX:
@article{DBLP:journals/tit/RongHL99,
  author = {Rong, Chunming and Helleseth, Tor and Lahtonen, Jyrki T.},
  title = {On algebraic decoding of the Z_4-linear Calderbank-McGuire code},
  journal = {IEEE Trans. Information Theory},
  year = {1999},
  volume = {45},
  number = {5},
  pages = {1423--1434},
  url = {https://doi.org/10.1109/18.771144},
  doi = {10.1109/18.771144}
}
Fu F, Kløve T and Shen S (1999), "On the Hamming Distance Between Two i.i.d. Random n-Tuples over a Finite Set", IEEE Trans. Information Theory. Vol. 45(2), pp. 803-807.
BibTeX:
@article{Fu1999,
  author = {Fu, Fang-Wei and Kløve, Torleiv and Shen, Shi-Yi},
  title = {On the Hamming Distance Between Two i.i.d. Random n-Tuples over a Finite Set},
  journal = {IEEE Trans. Information Theory},
  year = {1999},
  volume = {45},
  number = {2},
  pages = {803--807},
  url = {https://doi.org/10.1109/18.749033},
  doi = {10.1109/18.749033}
}
Gabidulin EM and Kløve T (1999), "On the Newton and covering radii of linear codes", IEEE Trans. Information Theory. Vol. 45(7), pp. 2534-2536.
BibTeX:
@article{Gabidulin1999,
  author = {Gabidulin, Ernst M. and Kløve, Torleiv},
  title = {On the Newton and covering radii of linear codes},
  journal = {IEEE Trans. Information Theory},
  year = {1999},
  volume = {45},
  number = {7},
  pages = {2534--2536},
  url = {https://doi.org/10.1109/18.796399},
  doi = {10.1109/18.796399}
}
Tellambura C, Parker MG, Guo YJ, Shepherd SJ and Barton SK (1999), "Optimal sequences for channel estimation using discrete Fourier transform techniques", IEEE Trans. Communications. Vol. 47(2), pp. 230-238.
BibTeX:
@article{Tellambura1999,
  author = {Tellambura, Chintha and Parker, Matthew G. and Guo, Y. Jay and Shepherd, Simon J. and Barton, Stephen K.},
  title = {Optimal sequences for channel estimation using discrete Fourier transform techniques},
  journal = {IEEE Trans. Communications},
  year = {1999},
  volume = {47},
  number = {2},
  pages = {230--238},
  url = {https://doi.org/10.1109/26.752128},
  doi = {10.1109/26.752128}
}
Chen W and Kløve T (1998), "Weight Hierarchies of Linear Codes Satisfying the Chain Condition", Des. Codes Cryptography. Vol. 15(1), pp. 47-66.
BibTeX:
@article{Chen1998,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {Weight Hierarchies of Linear Codes Satisfying the Chain Condition},
  journal = {Des. Codes Cryptography},
  year = {1998},
  volume = {15},
  number = {1},
  pages = {47--66},
  url = {https://doi.org/10.1023/A:1008225524987},
  doi = {10.1023/A:1008225524987}
}
Chen W, Chen Z and Kløve T (1998), "New Constructions of Disjoint Distinct Difference Sets", Des. Codes Cryptography. Vol. 15(2), pp. 157-165.
BibTeX:
@article{Chen1998a,
  author = {Chen, Wende and Chen, Zhi and Kløve, Torleiv},
  title = {New Constructions of Disjoint Distinct Difference Sets},
  journal = {Des. Codes Cryptography},
  year = {1998},
  volume = {15},
  number = {2},
  pages = {157--165},
  url = {https://doi.org/10.1023/A:1008359416200},
  doi = {10.1023/A:1008359416200}
}
Anderson RJ, Ding C, Helleseth T and Kløve T (1998), "How to Build Robust Shared Control Systems", Des. Codes Cryptography. Vol. 15(2), pp. 111-124.
BibTeX:
@article{DBLP:journals/dcc/AndersonDHK98,
  author = {Anderson, Ross J. and Ding, Cunsheng and Helleseth, Tor and Kløve, Torleiv},
  title = {How to Build Robust Shared Control Systems},
  journal = {Des. Codes Cryptography},
  year = {1998},
  volume = {15},
  number = {2},
  pages = {111--124},
  url = {https://doi.org/10.1023/A:1026421315292},
  doi = {10.1023/A:1026421315292}
}
Helleseth T, Kumar PV and Yang K (1998), "An Infinite Family of 3-Designs from Preparata Codes over Z", Des. Codes Cryptography. Vol. 15(2), pp. 175-181.
BibTeX:
@article{DBLP:journals/dcc/HellesethKY98,
  author = {Helleseth, Tor and Kumar, P. Vijay and Yang, Kyeongcheol},
  title = {An Infinite Family of 3-Designs from Preparata Codes over Z},
  journal = {Des. Codes Cryptography},
  year = {1998},
  volume = {15},
  number = {2},
  pages = {175--181},
  url = {https://doi.org/10.1023/A:1008363617109},
  doi = {10.1023/A:1008363617109}
}
Yang K and Helleseth T (1998), "Two New Infinite Families of 3-Designs from Kerdock Codes over Z", Des. Codes Cryptography. Vol. 15(2), pp. 201-214.
BibTeX:
@article{DBLP:journals/dcc/YangH98,
  author = {Yang, Kyeongcheol and Helleseth, Tor},
  title = {Two New Infinite Families of 3-Designs from Kerdock Codes over Z},
  journal = {Des. Codes Cryptography},
  year = {1998},
  volume = {15},
  number = {2},
  pages = {201--214},
  url = {https://doi.org/10.1023/A:1008319818926},
  doi = {10.1023/A:1008319818926}
}
Ding C and Helleseth T (1998), "On Cyclotomic Generator of Order r", Inf. Process. Lett.. Vol. 66(1), pp. 21-25.
BibTeX:
@article{DBLP:journals/ipl/DingH98,
  author = {Ding, Cunsheng and Helleseth, Tor},
  title = {On Cyclotomic Generator of Order r},
  journal = {Inf. Process. Lett.},
  year = {1998},
  volume = {66},
  number = {1},
  pages = {21--25},
  url = {https://doi.org/10.1016/S0020-0190(98)00025-8},
  doi = {10.1016/S0020-0190(98)00025-8}
}
Semaev IA (1998), "Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p", Math. Comput.. Vol. 67(221), pp. 353-356.
BibTeX:
@article{DBLP:journals/moc/Semaev98,
  author = {Semaev, Igor A.},
  title = {Evaluation of discrete logarithms in a group of p-torsion points of an elliptic curve in characteristic p},
  journal = {Math. Comput.},
  year = {1998},
  volume = {67},
  number = {221},
  pages = {353--356},
  url = {https://doi.org/10.1090/S0025-5718-98-00887-4},
  doi = {10.1090/S0025-5718-98-00887-4}
}
Semaev IA (1998), "An algorithm for evaluation of discrete logarithms in some nonprime finite fields", Math. Comput.. Vol. 67(224), pp. 1679-1689.
BibTeX:
@article{DBLP:journals/moc/Semaev98a,
  author = {Semaev, Igor A.},
  title = {An algorithm for evaluation of discrete logarithms in some nonprime finite fields},
  journal = {Math. Comput.},
  year = {1998},
  volume = {67},
  number = {224},
  pages = {1679--1689},
  url = {https://doi.org/10.1090/S0025-5718-98-00969-7},
  doi = {10.1090/S0025-5718-98-00969-7}
}
Ding C, Helleseth T and Shan W (1998), "On the Linear Complexity of Legendre Sequences", IEEE Trans. Information Theory. Vol. 44(3), pp. 1276-1278.
BibTeX:
@article{DBLP:journals/tit/DingHS98,
  author = {Ding, Cunsheng and Helleseth, Tor and Shan, Weijuan},
  title = {On the Linear Complexity of Legendre Sequences},
  journal = {IEEE Trans. Information Theory},
  year = {1998},
  volume = {44},
  number = {3},
  pages = {1276--1278},
  url = {https://doi.org/10.1109/18.669398},
  doi = {10.1109/18.669398}
}
Yang K and Helleseth T (1998), "On the Weight Hierarchy of Goethals Codes over Z_4", IEEE Trans. Information Theory. Vol. 44(1), pp. 304-307.
BibTeX:
@article{DBLP:journals/tit/YangH98,
  author = {Yang, Kyeongcheol and Helleseth, Tor},
  title = {On the Weight Hierarchy of Goethals Codes over Z_4},
  journal = {IEEE Trans. Information Theory},
  year = {1998},
  volume = {44},
  number = {1},
  pages = {304--307},
  url = {https://doi.org/10.1109/18.651055},
  doi = {10.1109/18.651055}
}
Chen W and Kløve T (1997), "Bounds on the Weight Hierarchies of Extremal Non-chain Codes of Dimension 4", Appl. Algebra Eng. Commun. Comput.. Vol. 8(5), pp. 379-386.
BibTeX:
@article{Chen1997,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {Bounds on the Weight Hierarchies of Extremal Non-chain Codes of Dimension 4},
  journal = {Appl. Algebra Eng. Commun. Comput.},
  year = {1997},
  volume = {8},
  number = {5},
  pages = {379--386},
  url = {https://doi.org/10.1007/s002000050075},
  doi = {10.1007/s002000050075}
}
Chen W and Kløve T (1997), "Disjoint sets of distinct sum sets", Discrete Mathematics. Vol. 175(1-3), pp. 69-77.
BibTeX:
@article{Chen1997a,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {Disjoint sets of distinct sum sets},
  journal = {Discrete Mathematics},
  year = {1997},
  volume = {175},
  number = {1-3},
  pages = {69--77},
  url = {https://doi.org/10.1016/S0012-365X(96)00142-2},
  doi = {10.1016/S0012-365X(96)00142-2}
}
Chen W and Kløve T (1997), "Bounds on the weight hierarchies of linear codes of dimension 4", IEEE Trans. Information Theory. Vol. 43(6), pp. 2047-2054.
BibTeX:
@article{Chen1997b,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {Bounds on the weight hierarchies of linear codes of dimension 4},
  journal = {IEEE Trans. Information Theory},
  year = {1997},
  volume = {43},
  number = {6},
  pages = {2047--2054},
  url = {https://doi.org/10.1109/18.641575},
  doi = {10.1109/18.641575}
}
Helleseth T and Sandberg D (1997), "Some Power Mappings with Low Differential Uniformity", Appl. Algebra Eng. Commun. Comput.. Vol. 8(5), pp. 363-370.
BibTeX:
@article{DBLP:journals/aaecc/HellesethS97,
  author = {Helleseth, Tor and Sandberg, Daniel},
  title = {Some Power Mappings with Low Differential Uniformity},
  journal = {Appl. Algebra Eng. Commun. Comput.},
  year = {1997},
  volume = {8},
  number = {5},
  pages = {363--370},
  url = {https://doi.org/10.1007/s002000050073},
  doi = {10.1007/s002000050073}
}
Kumar PV and Helleseth T (1997), "An Expansion for the Coordinates of the Trace Function over Galois Rings", Appl. Algebra Eng. Commun. Comput.. Vol. 8(5), pp. 353-361.
BibTeX:
@article{DBLP:journals/aaecc/KumarH97,
  author = {Kumar, P. Vijay and Helleseth, Tor},
  title = {An Expansion for the Coordinates of the Trace Function over Galois Rings},
  journal = {Appl. Algebra Eng. Commun. Comput.},
  year = {1997},
  volume = {8},
  number = {5},
  pages = {353--361},
  url = {https://doi.org/10.1007/s002000050072},
  doi = {10.1007/s002000050072}
}
Boukliev I, Dodunekov SM, Helleseth T and Ytrehus Ø (1997), "On the [162, 8, 80] codes", IEEE Trans. Information Theory. Vol. 43(6), pp. 2055-2057.
BibTeX:
@article{DBLP:journals/tit/BouklievDHY97,
  author = {Boukliev, Iliya and Dodunekov, Stefan M. and Helleseth, Tor and Ytrehus, Øyvind},
  title = {On the [162, 8, 80] codes},
  journal = {IEEE Trans. Information Theory},
  year = {1997},
  volume = {43},
  number = {6},
  pages = {2055--2057},
  url = {https://doi.org/10.1109/18.641576},
  doi = {10.1109/18.641576}
}
Helleseth T and Kløve T (1997), "The Newton radius of codes", IEEE Trans. Information Theory. Vol. 43(6), pp. 1820-1831.
BibTeX:
@article{DBLP:journals/tit/HellesethK97,
  author = {Helleseth, Tor and Kløve, Torleiv},
  title = {The Newton radius of codes},
  journal = {IEEE Trans. Information Theory},
  year = {1997},
  volume = {43},
  number = {6},
  pages = {1820--1831},
  url = {https://doi.org/10.1109/18.641548},
  doi = {10.1109/18.641548}
}
Helleseth T, Kløve T and Levenshtein VI (1997), "On the information function of an error-correcting code", IEEE Trans. Information Theory. Vol. 43(2), pp. 549-557.
BibTeX:
@article{DBLP:journals/tit/HellesethKL97,
  author = {Helleseth, Tor and Kløve, Torleiv and Levenshtein, Vladimir I.},
  title = {On the information function of an error-correcting code},
  journal = {IEEE Trans. Information Theory},
  year = {1997},
  volume = {43},
  number = {2},
  pages = {549--557},
  url = {https://doi.org/10.1109/18.556112},
  doi = {10.1109/18.556112}
}
Yang K and Helleseth T (1997), "On the weight hierarchy of Preparata codes over Z_4", IEEE Trans. Information Theory. Vol. 43(6), pp. 1832-1842.
BibTeX:
@article{DBLP:journals/tit/YangH97,
  author = {Yang, Kyeongcheol and Helleseth, Tor},
  title = {On the weight hierarchy of Preparata codes over Z_4},
  journal = {IEEE Trans. Information Theory},
  year = {1997},
  volume = {43},
  number = {6},
  pages = {1832--1842},
  url = {https://doi.org/10.1109/18.641549},
  doi = {10.1109/18.641549}
}
Dodunekova R, Dodunekov SM and Kløve T (1997), "Almost-MDS and near-MDS codes for error detection", IEEE Trans. Information Theory. Vol. 43(1), pp. 285-289.
BibTeX:
@article{Dodunekova1997,
  author = {Dodunekova, Rossitza and Dodunekov, Stefan M. and Kløve, Torleiv},
  title = {Almost-MDS and near-MDS codes for error detection},
  journal = {IEEE Trans. Information Theory},
  year = {1997},
  volume = {43},
  number = {1},
  pages = {285--289},
  url = {https://doi.org/10.1109/18.567708},
  doi = {10.1109/18.567708}
}
Kløve T (1997), "On codes satisfying the double chain condition", Discrete Mathematics. Vol. 175(1-3), pp. 173-195.
BibTeX:
@article{Klove1997,
  author = {Kløve, Torleiv},
  title = {On codes satisfying the double chain condition},
  journal = {Discrete Mathematics},
  year = {1997},
  volume = {175},
  number = {1-3},
  pages = {173--195},
  url = {https://doi.org/10.1016/S0012-365X(96)00149-5},
  doi = {10.1016/S0012-365X(96)00149-5}
}
Chen W and Kløve T (1996), "Lower bounds on multiple distinct sums sets", Discrete Mathematics. Vol. 148(1-3), pp. 15-35.
BibTeX:
@article{Chen1996,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {Lower bounds on multiple distinct sums sets},
  journal = {Discrete Mathematics},
  year = {1996},
  volume = {148},
  number = {1-3},
  pages = {15--35},
  url = {https://doi.org/10.1016/0012-365X(94)00259-L},
  doi = {10.1016/0012-365X(94)00259-L}
}
Chen W and Kløve T (1996), "The weight hierarchies of q -ary codes of dimension 4", IEEE Trans. Information Theory. Vol. 42(6), pp. 2265-2272.
BibTeX:
@article{Chen1996a,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {The weight hierarchies of q -ary codes of dimension 4},
  journal = {IEEE Trans. Information Theory},
  year = {1996},
  volume = {42},
  number = {6},
  pages = {2265--2272},
  url = {https://doi.org/10.1109/18.556621},
  doi = {10.1109/18.556621}
}
Helleseth T, Kumar PV and Shanbhag AG (1996), "Codes with the Same Weight Distributions as the Goethals Codes and the Delsarte-Goethals Codes", Des. Codes Cryptography. Vol. 9(3), pp. 257-266.
BibTeX:
@article{DBLP:journals/dcc/HellesethKS96,
  author = {Helleseth, Tor and Kumar, P. Vijay and Shanbhag, Abhijit G.},
  title = {Codes with the Same Weight Distributions as the Goethals Codes and the Delsarte-Goethals Codes},
  journal = {Des. Codes Cryptography},
  year = {1996},
  volume = {9},
  number = {3},
  pages = {257--266},
  url = {https://doi.org/10.1023/A:1027376421176},
  doi = {10.1023/A:1027376421176}
}
Hauge ER and Helleseth T (1996), "De Bruijn sequences, irreducible codes and cyclotomy", Discrete Mathematics. Vol. 159(1-3), pp. 143-154.
BibTeX:
@article{DBLP:journals/dm/HaugeH96,
  author = {Hauge, Erik R. and Helleseth, Tor},
  title = {De Bruijn sequences, irreducible codes and cyclotomy},
  journal = {Discrete Mathematics},
  year = {1996},
  volume = {159},
  number = {1-3},
  pages = {143--154},
  url = {https://doi.org/10.1016/0012-365X(96)00106-9},
  doi = {10.1016/0012-365X(96)00106-9}
}
Helleseth T and Kumar PV (1996), "On the weight hierarchy of the semiprimitive codes", Discrete Mathematics. Vol. 152(1-3), pp. 185-190.
BibTeX:
@article{DBLP:journals/dm/HellesethK96,
  author = {Helleseth, Tor and Kumar, P. Vijay},
  title = {On the weight hierarchy of the semiprimitive codes},
  journal = {Discrete Mathematics},
  year = {1996},
  volume = {152},
  number = {1-3},
  pages = {185--190},
  url = {https://doi.org/10.1016/0012-365X(94)00234-A},
  doi = {10.1016/0012-365X(94)00234-A}
}
Calderbank AR, McGuire G, Kumar PV and Helleseth T (1996), "Cyclic codes over Z_4, locator polynomials, and Newton's identities", IEEE Trans. Information Theory. Vol. 42(1), pp. 217-226.
BibTeX:
@article{DBLP:journals/tit/CalderbankMKH96,
  author = {Calderbank, A. Robert and McGuire, Gary and Kumar, P. Vijay and Helleseth, Tor},
  title = {Cyclic codes over Z_4, locator polynomials, and Newton's identities},
  journal = {IEEE Trans. Information Theory},
  year = {1996},
  volume = {42},
  number = {1},
  pages = {217--226},
  url = {https://doi.org/10.1109/18.481791},
  doi = {10.1109/18.481791}
}
Helleseth T and Kløve T (1996), "The weight hierarchies of some product codes", IEEE Trans. Information Theory. Vol. 42(3), pp. 1029-1034.
BibTeX:
@article{DBLP:journals/tit/HellesethK96,
  author = {Helleseth, Tor and Kløve, Torleiv},
  title = {The weight hierarchies of some product codes},
  journal = {IEEE Trans. Information Theory},
  year = {1996},
  volume = {42},
  number = {3},
  pages = {1029--1034},
  url = {https://doi.org/10.1109/18.490571},
  doi = {10.1109/18.490571}
}
Helleseth T, Kumar PV, Moreno O and Shanbhag AG (1996), "Improved estimates via exponential sums for the minimum distance of Z_4-linear trace codes", IEEE Trans. Information Theory. Vol. 42(4), pp. 1212-1216.
BibTeX:
@article{DBLP:journals/tit/HellesethKMS96,
  author = {Helleseth, Tor and Kumar, P. Vijay and Moreno, Oscar and Shanbhag, Abhijit G.},
  title = {Improved estimates via exponential sums for the minimum distance of Z_4-linear trace codes},
  journal = {IEEE Trans. Information Theory},
  year = {1996},
  volume = {42},
  number = {4},
  pages = {1212--1216},
  url = {https://doi.org/10.1109/18.508843},
  doi = {10.1109/18.508843}
}
Kumar PV, Helleseth T, Calderbank AR and Jr. ARH (1996), "Large families of quaternary sequences with low correlation", IEEE Trans. Information Theory. Vol. 42(2), pp. 579-592.
BibTeX:
@article{DBLP:journals/tit/KumarHCH96,
  author = {Kumar, P. Vijay and Helleseth, Tor and Calderbank, A. Robert and Jr., A. Roger Hammons},
  title = {Large families of quaternary sequences with low correlation},
  journal = {IEEE Trans. Information Theory},
  year = {1996},
  volume = {42},
  number = {2},
  pages = {579--592},
  url = {https://doi.org/10.1109/18.485726},
  doi = {10.1109/18.485726}
}
Shanbhag AG, Kumar PV and Helleseth T (1996), "Upper bound for a hybrid sum over Galois rings with applications to aperiodic correlation of some q-ary sequences", IEEE Trans. Information Theory. Vol. 42(1), pp. 250-254.
BibTeX:
@article{DBLP:journals/tit/ShanbhagKH96,
  author = {Shanbhag, Abhijit G. and Kumar, P. Vijay and Helleseth, Tor},
  title = {Upper bound for a hybrid sum over Galois rings with applications to aperiodic correlation of some q-ary sequences},
  journal = {IEEE Trans. Information Theory},
  year = {1996},
  volume = {42},
  number = {1},
  pages = {250--254},
  url = {https://doi.org/10.1109/18.481796},
  doi = {10.1109/18.481796}
}
Shanbhag AG, Kumar PV and Helleseth T (1996), "Improved binary codes and sequence families from Z_4-linear codes", IEEE Trans. Information Theory. Vol. 42(5), pp. 1582-1587.
BibTeX:
@article{DBLP:journals/tit/ShanbhagKH96a,
  author = {Shanbhag, Abhijit G. and Kumar, P. Vijay and Helleseth, Tor},
  title = {Improved binary codes and sequence families from Z_4-linear codes},
  journal = {IEEE Trans. Information Theory},
  year = {1996},
  volume = {42},
  number = {5},
  pages = {1582--1587},
  url = {https://doi.org/10.1109/18.532904},
  doi = {10.1109/18.532904}
}
Yang K, Helleseth T, Kumar PV and Shanbhag AG (1996), "On the weight hierarchy of Kerdock codes over Z_4", IEEE Trans. Information Theory. Vol. 42(5), pp. 1587-1593.
BibTeX:
@article{DBLP:journals/tit/YangHKS96,
  author = {Yang, Kyeongcheol and Helleseth, Tor and Kumar, P. Vijay and Shanbhag, Abhijit G.},
  title = {On the weight hierarchy of Kerdock codes over Z_4},
  journal = {IEEE Trans. Information Theory},
  year = {1996},
  volume = {42},
  number = {5},
  pages = {1587--1593},
  url = {https://doi.org/10.1109/18.532905},
  doi = {10.1109/18.532905}
}
Kløve T (1996), "The worst case probability of undetected error for linear codes on the local binomial channel", IEEE Trans. Information Theory. Vol. 42(1), pp. 172-179.
BibTeX:
@article{Klove1996,
  author = {Kløve, Torleiv},
  title = {The worst case probability of undetected error for linear codes on the local binomial channel},
  journal = {IEEE Trans. Information Theory},
  year = {1996},
  volume = {42},
  number = {1},
  pages = {172--179},
  url = {https://doi.org/10.1109/18.481787},
  doi = {10.1109/18.481787}
}
Kløve T (1996), "Reed-Muller codes for error detection: the good, the bad, and the ugly", IEEE Trans. Information Theory. Vol. 42(5), pp. 1615-1622.
BibTeX:
@article{Klove1996a,
  author = {Kløve, Torleiv},
  title = {Reed-Muller codes for error detection: the good, the bad, and the ugly},
  journal = {IEEE Trans. Information Theory},
  year = {1996},
  volume = {42},
  number = {5},
  pages = {1615--1622},
  url = {https://doi.org/10.1109/18.532910},
  doi = {10.1109/18.532910}
}
Kløve T (1996), "Bounds on the weight distribution of cosets", IEEE Trans. Information Theory. Vol. 42(6), pp. 2257-2260.
BibTeX:
@article{Klove1996b,
  author = {Kløve, Torleiv},
  title = {Bounds on the weight distribution of cosets},
  journal = {IEEE Trans. Information Theory},
  year = {1996},
  volume = {42},
  number = {6},
  pages = {2257--2260},
  url = {https://doi.org/10.1109/18.556619},
  doi = {10.1109/18.556619}
}
Hamada N and Helleseth T (1995), "A characterization of some 3v\({}_{\mbox{{\(\mathrm{\mu}\)}+1}}\), 3v\({}_{\mbox{{\(\mathrm{\mu}\)}}}\); k-1, q\-minihypers and some [n, k, q^k-1 - 3q^{\(\mathrm{\mu}\)}; q]-codes (k textgreater= 3, q textgreater= 5, 1 textless= \mu textless k-1) meeting the Griesmer bound", Discrete Mathematics. Vol. 146(1-3), pp. 59-67.
BibTeX:
@article{DBLP:journals/dm/HamadaH95,
  author = {Hamada, Noboru and Helleseth, Tor},
  title = {A characterization of some 3v\({}_{\mbox{{\(\mathrm{\mu}\)}+1}}\), 3v\({}_{\mbox{{\(\mathrm{\mu}\)}}}\); k-1, q\-minihypers and some [n, k, q^k-1 - 3q^{\(\mathrm{\mu}\)}; q]-codes (k textgreater= 3, q textgreater= 5, 1 textless= \mu textless k-1) meeting the Griesmer bound},
  journal = {Discrete Mathematics},
  year = {1995},
  volume = {146},
  number = {1-3},
  pages = {59--67},
  url = {https://doi.org/10.1016/0012-365X(94)00157-3},
  doi = {10.1016/0012-365X(94)00157-3}
}
Helleseth T and Kumar PV (1995), "The weight hierarchy of the Kasami codes", Discrete Mathematics. Vol. 145(1-3), pp. 133-143.
BibTeX:
@article{DBLP:journals/dm/HellesethK95,
  author = {Helleseth, Tor and Kumar, P. Vijay},
  title = {The weight hierarchy of the Kasami codes},
  journal = {Discrete Mathematics},
  year = {1995},
  volume = {145},
  number = {1-3},
  pages = {133--143},
  url = {https://doi.org/10.1016/0012-365X(94)00030-M},
  doi = {10.1016/0012-365X(94)00030-M}
}
Helleseth T and Kumar PV (1995), "The algebraic decoding of the Z_4-linear Goethals code", IEEE Trans. Information Theory. Vol. 41(6), pp. 2040-2048.
BibTeX:
@article{DBLP:journals/tit/HellesethK95,
  author = {Helleseth, Tor and Kumar, P. Vijay},
  title = {The algebraic decoding of the Z_4-linear Goethals code},
  journal = {IEEE Trans. Information Theory},
  year = {1995},
  volume = {41},
  number = {6},
  pages = {2040--2048},
  url = {https://doi.org/10.1109/18.476333},
  doi = {10.1109/18.476333}
}
Helleseth T, Kløve T, Levenshtein VI and Ytrehus Ø (1995), "Bounds on the minimum support weights", IEEE Trans. Information Theory. Vol. 41(2), pp. 432-440.
BibTeX:
@article{DBLP:journals/tit/HellesethKLY95,
  author = {Helleseth, Tor and Kløve, Torleiv and Levenshtein, Vladimir I. and Ytrehus, Øyvind},
  title = {Bounds on the minimum support weights},
  journal = {IEEE Trans. Information Theory},
  year = {1995},
  volume = {41},
  number = {2},
  pages = {432--440},
  url = {https://doi.org/10.1109/18.370144},
  doi = {10.1109/18.370144}
}
Kumar PV, Helleseth T and Calderbank AR (1995), "An upper bound for Weft exponential sums over Galois tings and applications", IEEE Trans. Information Theory. Vol. 41(2), pp. 456-468.
BibTeX:
@article{DBLP:journals/tit/KumarHC95,
  author = {Kumar, P. Vijay and Helleseth, Tor and Calderbank, A. Robert},
  title = {An upper bound for Weft exponential sums over Galois tings and applications},
  journal = {IEEE Trans. Information Theory},
  year = {1995},
  volume = {41},
  number = {2},
  pages = {456--468},
  url = {https://doi.org/10.1109/18.370147},
  doi = {10.1109/18.370147}
}
Kløve T (1995), "Codes correcting a single insertion/deletion of a zero or a single peak-shift", IEEE Trans. Information Theory. Vol. 41(1), pp. 279-283.
BibTeX:
@article{Klove1995,
  author = {Kløve, Torleiv},
  title = {Codes correcting a single insertion/deletion of a zero or a single peak-shift},
  journal = {IEEE Trans. Information Theory},
  year = {1995},
  volume = {41},
  number = {1},
  pages = {279--283},
  url = {https://doi.org/10.1109/18.370100},
  doi = {10.1109/18.370100}
}
Kløve T (1995), "Bounds on the worst case probability of undetected error", IEEE Trans. Information Theory. Vol. 41(1), pp. 298-300.
BibTeX:
@article{Klove1995a,
  author = {Kløve, Torleiv},
  title = {Bounds on the worst case probability of undetected error},
  journal = {IEEE Trans. Information Theory},
  year = {1995},
  volume = {41},
  number = {1},
  pages = {298--300},
  url = {https://doi.org/10.1109/18.370096},
  doi = {10.1109/18.370096}
}
Chen X, Reed IS, Helleseth T and Truong T (1994), "General principles for the algebraic decoding of cyclic codes", IEEE Trans. Information Theory. Vol. 40(5), pp. 1661-1663.
BibTeX:
@article{DBLP:journals/tit/ChenRHT94,
  author = {Chen, Xuemin and Reed, Irving S. and Helleseth, Tor and Truong, Trieu-Kien},
  title = {General principles for the algebraic decoding of cyclic codes},
  journal = {IEEE Trans. Information Theory},
  year = {1994},
  volume = {40},
  number = {5},
  pages = {1661--1663},
  url = {https://doi.org/10.1109/18.333886},
  doi = {10.1109/18.333886}
}
Chen X, Reed IS, Helleseth T and Truong T (1994), "Use of Grobner bases to decode binary cyclic codes up to the true minimum distance", IEEE Trans. Information Theory. Vol. 40(5), pp. 1654-1660.
BibTeX:
@article{DBLP:journals/tit/ChenRHT94a,
  author = {Chen, Xuemin and Reed, Irving S. and Helleseth, Tor and Truong, Trieu-Kien},
  title = {Use of Grobner bases to decode binary cyclic codes up to the true minimum distance},
  journal = {IEEE Trans. Information Theory},
  year = {1994},
  volume = {40},
  number = {5},
  pages = {1654--1660},
  url = {https://doi.org/10.1109/18.333885},
  doi = {10.1109/18.333885}
}
Encheva SB and Kløve T (1994), "Codes satisfying the chain condition", IEEE Trans. Information Theory. Vol. 40(1), pp. 175-180.
BibTeX:
@article{Encheva1994,
  author = {Encheva, Sylvia B. and Kløve, Torleiv},
  title = {Codes satisfying the chain condition},
  journal = {IEEE Trans. Information Theory},
  year = {1994},
  volume = {40},
  number = {1},
  pages = {175--180},
  url = {https://doi.org/10.1109/18.272476},
  doi = {10.1109/18.272476}
}
Kløve T (1994), "The weight distribution of cosets", IEEE Trans. Information Theory. Vol. 40(3), pp. 911-913.
BibTeX:
@article{Klove1994,
  author = {Kløve, Torleiv},
  title = {The weight distribution of cosets},
  journal = {IEEE Trans. Information Theory},
  year = {1994},
  volume = {40},
  number = {3},
  pages = {911--913},
  url = {https://doi.org/10.1109/18.335902},
  doi = {10.1109/18.335902}
}
Hamada N, Helleseth T and Ytrehus Ø (1993), "A New Class of Nonbinary Codes Meeting the Griesmer Bound", Discrete Applied Mathematics. Vol. 47(3), pp. 219-226.
BibTeX:
@article{DBLP:journals/dam/HamadaHY93,
  author = {Hamada, Noboru and Helleseth, Tor and Ytrehus, Øyvind},
  title = {A New Class of Nonbinary Codes Meeting the Griesmer Bound},
  journal = {Discrete Applied Mathematics},
  year = {1993},
  volume = {47},
  number = {3},
  pages = {219--226},
  url = {https://doi.org/10.1016/0166-218X(93)90127-A},
  doi = {10.1016/0166-218X(93)90127-A}
}
Hamada N, Helleseth T and Ytrehus Ø (1993), "Characterization of 2(q+1)+2, 2;t, q\-minihypers in PG(t, q) (ttextgreater=3, qepsilon3, 4\)", Discrete Mathematics. Vol. 115(1-3), pp. 175-185.
BibTeX:
@article{DBLP:journals/dm/HamadaHY93,
  author = {Hamada, Noboru and Helleseth, Tor and Ytrehus, Øyvind},
  title = {Characterization of 2(q+1)+2, 2;t, q\-minihypers in PG(t, q) (ttextgreater=3, qepsilon3, 4\)},
  journal = {Discrete Mathematics},
  year = {1993},
  volume = {115},
  number = {1-3},
  pages = {175--185},
  url = {https://doi.org/10.1016/0012-365X(93)90487-E},
  doi = {10.1016/0012-365X(93)90487-E}
}
Kløve T (1993), "Minimum support weights of binary codes", IEEE Trans. Information Theory. Vol. 39(2), pp. 648-654.
BibTeX:
@article{Klove1993,
  author = {Kløve, Torleiv},
  title = {Minimum support weights of binary codes},
  journal = {IEEE Trans. Information Theory},
  year = {1993},
  volume = {39},
  number = {2},
  pages = {648--654},
  url = {https://doi.org/10.1109/18.212298},
  doi = {10.1109/18.212298}
}
Helleseth T (1992), "Legendre sums and codes related to QR codes", Discrete Applied Mathematics. Vol. 35(2), pp. 107-113.
BibTeX:
@article{DBLP:journals/dam/Helleseth92,
  author = {Helleseth, Tor},
  title = {Legendre sums and codes related to QR codes},
  journal = {Discrete Applied Mathematics},
  year = {1992},
  volume = {35},
  number = {2},
  pages = {107--113},
  url = {https://doi.org/10.1016/0166-218X(92)90035-9},
  doi = {10.1016/0166-218X(92)90035-9}
}
Hamada N, Helleseth T and Ytrehus Ø (1992), "On the Construction of [q^4 + q^2 - q, 5, q^4 - q^3 + q^2 - 2q; q]-Codes Meeting the Griesmer Bound", Des. Codes Cryptography. Vol. 2(3), pp. 225-229.
BibTeX:
@article{DBLP:journals/dcc/HamadaHY92,
  author = {Hamada, Noboru and Helleseth, Tor and Ytrehus, Øyvind},
  title = {On the Construction of [q^4 + q^2 - q, 5, q^4 - q^3 + q^2 - 2q; q]-Codes Meeting the Griesmer Bound},
  journal = {Des. Codes Cryptography},
  year = {1992},
  volume = {2},
  number = {3},
  pages = {225--229},
  url = {https://doi.org/10.1007/BF00141966},
  doi = {10.1007/BF00141966}
}
Hamada N and Helleseth T (1992), "A characterization of some 2u\({}_{\mbox{alpha+1}}\)+u\({}_{\mbox{gamma+1}}\), 2u\({}_{\mbox{alpha}}\)+u\({}_{\mbox{gamma}}\); k-1, 3\- minihypers and some (n, k, 3^k-1 -2⋅3^alpha-3^gamma; 3)-codes (ktextgreater=3, 0textless=alphatextlessgammatextlessk-1) meeting the Griesmer bound", Discrete Mathematics. Vol. 104(1), pp. 67-81.
BibTeX:
@article{DBLP:journals/dm/HamadaH92,
  author = {Hamada, Noboru and Helleseth, Tor},
  title = {A characterization of some 2u\({}_{\mbox{alpha+1}}\)+u\({}_{\mbox{gamma+1}}\), 2u\({}_{\mbox{alpha}}\)+u\({}_{\mbox{gamma}}\); k-1, 3\- minihypers and some (n, k, 3^k-1 -2⋅3^alpha-3^gamma; 3)-codes (ktextgreater=3, 0textless=alphatextlessgammatextlessk-1) meeting the Griesmer bound},
  journal = {Discrete Mathematics},
  year = {1992},
  volume = {104},
  number = {1},
  pages = {67--81},
  url = {https://doi.org/10.1016/0012-365X(92)90625-P},
  doi = {10.1016/0012-365X(92)90625-P}
}
Helleseth T (1992), "Projective codes meeting the Griesmer bound", Discrete Mathematics. Vol. 106-107, pp. 265-271.
BibTeX:
@article{DBLP:journals/dm/Helleseth92,
  author = {Helleseth, Tor},
  title = {Projective codes meeting the Griesmer bound},
  journal = {Discrete Mathematics},
  year = {1992},
  volume = {106-107},
  pages = {265--271},
  url = {https://doi.org/10.1016/0012-365X(92)90553-R},
  doi = {10.1016/0012-365X(92)90553-R}
}
Helleseth T, Kløve T and Ytrehus Ø (1992), "Generalized Hamming weights of linear codes", IEEE Trans. Information Theory. Vol. 38(3), pp. 1133-1140.
BibTeX:
@article{DBLP:journals/tit/HellesethKY92,
  author = {Helleseth, Tor and Kløve, Torleiv and Ytrehus, Øyvind},
  title = {Generalized Hamming weights of linear codes},
  journal = {IEEE Trans. Information Theory},
  year = {1992},
  volume = {38},
  number = {3},
  pages = {1133--1140},
  url = {https://doi.org/10.1109/18.135655},
  doi = {10.1109/18.135655}
}
Kløve T (1992), "Support weight distribution of linear codes", Discrete Mathematics. Vol. 106-107, pp. 311-316.
BibTeX:
@article{Klove1992,
  author = {Kløve, Torleiv},
  title = {Support weight distribution of linear codes},
  journal = {Discrete Mathematics},
  year = {1992},
  volume = {106-107},
  pages = {311--316},
  url = {https://doi.org/10.1016/0012-365X(92)90559-X},
  doi = {10.1016/0012-365X(92)90559-X}
}
Kløve T (1992), "Optimal codes for error detection", IEEE Trans. Information Theory. Vol. 38(2), pp. 479-489.
BibTeX:
@article{Klove1992a,
  author = {Kløve, Torleiv},
  title = {Optimal codes for error detection},
  journal = {IEEE Trans. Information Theory},
  year = {1992},
  volume = {38},
  number = {2},
  pages = {479--489},
  url = {https://doi.org/10.1109/18.119708},
  doi = {10.1109/18.119708}
}
Chen W and Kløve T (1991), "Lower bounds on multiple difference sets", Discrete Mathematics. Vol. 98(1), pp. 9-21.
BibTeX:
@article{Chen1991,
  author = {Chen, Wende and Kløve, Torleiv},
  title = {Lower bounds on multiple difference sets},
  journal = {Discrete Mathematics},
  year = {1991},
  volume = {98},
  number = {1},
  pages = {9--21},
  url = {https://doi.org/10.1016/0012-365X(91)90408-T},
  doi = {10.1016/0012-365X(91)90408-T}
}
Helleseth T and Kløve T (1991), "The number of cross-join pairs in maximum length linear sequences", IEEE Trans. Information Theory. Vol. 37(6), pp. 1731-1733.
BibTeX:
@article{DBLP:journals/tit/HellesethK91,
  author = {Helleseth, Tor and Kløve, Torleiv},
  title = {The number of cross-join pairs in maximum length linear sequences},
  journal = {IEEE Trans. Information Theory},
  year = {1991},
  volume = {37},
  number = {6},
  pages = {1731--1733},
  url = {https://doi.org/10.1109/18.104342},
  doi = {10.1109/18.104342}
}
Hamada N and Helleseth T (1990), "A Characterization of Some Minihypers in a Finite Projective Geometry PG(t, 4)", Eur. J. Comb.. Vol. 11(6), pp. 541-548.
BibTeX:
@article{DBLP:journals/ejc/HamadaH90,
  author = {Hamada, Noboru and Helleseth, Tor},
  title = {A Characterization of Some Minihypers in a Finite Projective Geometry PG(t, 4)},
  journal = {Eur. J. Comb.},
  year = {1990},
  volume = {11},
  number = {6},
  pages = {541--548},
  url = {https://doi.org/10.1016/S0195-6698(13)80039-X},
  doi = {10.1016/S0195-6698(13)80039-X}
}
Ytrehus Ø and Helleseth T (1990), "There is no binary [25, 8, 10] code (corresp.)", IEEE Trans. Information Theory. Vol. 36(3), pp. 695-696.
BibTeX:
@article{DBLP:journals/tit/YtrehusH90,
  author = {Ytrehus, Øyvind and Helleseth, Tor},
  title = {There is no binary [25, 8, 10] code (corresp.)},
  journal = {IEEE Trans. Information Theory},
  year = {1990},
  volume = {36},
  number = {3},
  pages = {695--696},
  url = {https://doi.org/10.1109/18.54894},
  doi = {10.1109/18.54894}
}
Kløve T (1990), "Bounds and constructions of disjoint sets of distinct difference sets", IEEE Trans. Information Theory. Vol. 36(1), pp. 184-190.
BibTeX:
@article{Klove1990,
  author = {Kløve, Torleiv},
  title = {Bounds and constructions of disjoint sets of distinct difference sets},
  journal = {IEEE Trans. Information Theory},
  year = {1990},
  volume = {36},
  number = {1},
  pages = {184--190},
  url = {https://doi.org/10.1109/18.50389},
  doi = {10.1109/18.50389}
}
Kløve T (1989), "Bounds and construction for difference triangle sets", IEEE Trans. Information Theory. Vol. 35(4), pp. 879-886.
BibTeX:
@article{Klove1989,
  author = {Kløve, Torleiv},
  title = {Bounds and construction for difference triangle sets},
  journal = {IEEE Trans. Information Theory},
  year = {1989},
  volume = {35},
  number = {4},
  pages = {879--886},
  url = {https://doi.org/10.1109/18.32165},
  doi = {10.1109/18.32165}
}
Kløve T (1988), "Bounds on the size of optimal difference triangle sets", IEEE Trans. Information Theory. Vol. 34(2), pp. 355-361.
BibTeX:
@article{Klove1988,
  author = {Kløve, Torleiv},
  title = {Bounds on the size of optimal difference triangle sets},
  journal = {IEEE Trans. Information Theory},
  year = {1988},
  volume = {34},
  number = {2},
  pages = {355--361},
  url = {https://doi.org/10.1109/18.2652},
  doi = {10.1109/18.2652}
}
Dodunekov SM, Helleseth T, Manev NL and Ytrehus Ø (1987), "New bounds on binary linear codes of dimension eight", IEEE Trans. Information Theory. Vol. 33(6), pp. 917-919.
BibTeX:
@article{DBLP:journals/tit/DodunekovHMY87,
  author = {Dodunekov, Stefan M. and Helleseth, Tor and Manev, Nikolai L. and Ytrehus, Øyvind},
  title = {New bounds on binary linear codes of dimension eight},
  journal = {IEEE Trans. Information Theory},
  year = {1987},
  volume = {33},
  number = {6},
  pages = {917--919},
  url = {https://doi.org/10.1109/TIT.1987.1057363},
  doi = {10.1109/TIT.1987.1057363}
}
Helleseth T (1985), "On the covering radius of cyclic linear codes and arithmetic codes", Discrete Applied Mathematics. Vol. 11(2), pp. 157-173.
BibTeX:
@article{DBLP:journals/dam/Helleseth85,
  author = {Helleseth, Tor},
  title = {On the covering radius of cyclic linear codes and arithmetic codes},
  journal = {Discrete Applied Mathematics},
  year = {1985},
  volume = {11},
  number = {2},
  pages = {157--173},
  url = {https://doi.org/10.1016/S0166-218X(85)80006-8},
  doi = {10.1016/S0166-218X(85)80006-8}
}
Helleseth T and Mattson HF (1985), "On the cosets of the simplex code", Discrete Mathematics. Vol. 56(2-3), pp. 169-189.
BibTeX:
@article{DBLP:journals/dm/HellesethM85,
  author = {Helleseth, Tor and Mattson, H. F.},
  title = {On the cosets of the simplex code},
  journal = {Discrete Mathematics},
  year = {1985},
  volume = {56},
  number = {2-3},
  pages = {169--189},
  url = {https://doi.org/10.1016/0012-365X(85)90025-1},
  doi = {10.1016/0012-365X(85)90025-1}
}
Helleseth T (1984), "Further classifications of codes meeting the Griesmer bound", IEEE Trans. Information Theory. Vol. 30(2), pp. 395-403.
BibTeX:
@article{DBLP:journals/tit/Helleseth84,
  author = {Helleseth, Tor},
  title = {Further classifications of codes meeting the Griesmer bound},
  journal = {IEEE Trans. Information Theory},
  year = {1984},
  volume = {30},
  number = {2},
  pages = {395--403},
  url = {https://doi.org/10.1109/TIT.1984.1056867},
  doi = {10.1109/TIT.1984.1056867}
}
Kløve T and Miller M (1984), "The Detection of Errors After Error-Correction Decoding", IEEE Trans. Communications. Vol. 32(5), pp. 511-517.
BibTeX:
@article{Klove1984,
  author = {Kløve, Torleiv and Miller, Michael},
  title = {The Detection of Errors After Error-Correction Decoding},
  journal = {IEEE Trans. Communications},
  year = {1984},
  volume = {32},
  number = {5},
  pages = {511--517},
  url = {https://doi.org/10.1109/TCOM.1984.1096094},
  doi = {10.1109/TCOM.1984.1096094}
}
Kløve T (1984), "The probability of undetected error when a code is used for error correction and detection", IEEE Trans. Information Theory. Vol. 30(2), pp. 388-392.
BibTeX:
@article{Klove1984a,
  author = {Kløve, Torleiv},
  title = {The probability of undetected error when a code is used for error correction and detection},
  journal = {IEEE Trans. Information Theory},
  year = {1984},
  volume = {30},
  number = {2},
  pages = {388--392},
  url = {https://doi.org/10.1109/TIT.1984.1056865},
  doi = {10.1109/TIT.1984.1056865}
}
Kløve T (1984), "Generalizations of the Korzhik bound", IEEE Trans. Information Theory. Vol. 30(5), pp. 771-773.
BibTeX:
@article{Klove1984b,
  author = {Kløve, Torleiv},
  title = {Generalizations of the Korzhik bound},
  journal = {IEEE Trans. Information Theory},
  year = {1984},
  volume = {30},
  number = {5},
  pages = {771--773},
  url = {https://doi.org/10.1109/TIT.1984.1056945},
  doi = {10.1109/TIT.1984.1056945}
}
Kløve T (1984), "Using codes for error correction and detection", IEEE Trans. Information Theory. Vol. 30(6), pp. 868-870.
BibTeX:
@article{Klove1984c,
  author = {Kløve, Torleiv},
  title = {Using codes for error correction and detection},
  journal = {IEEE Trans. Information Theory},
  year = {1984},
  volume = {30},
  number = {6},
  pages = {868--870},
  url = {https://doi.org/10.1109/TIT.1984.1056972},
  doi = {10.1109/TIT.1984.1056972}
}
Helleseth T (1983), "New constructions of codes meeting the Griesmer bound", IEEE Trans. Information Theory. Vol. 29(3), pp. 434-438.
BibTeX:
@article{DBLP:journals/tit/Helleseth83,
  author = {Helleseth, Tor},
  title = {New constructions of codes meeting the Griesmer bound},
  journal = {IEEE Trans. Information Theory},
  year = {1983},
  volume = {29},
  number = {3},
  pages = {434--438},
  url = {https://doi.org/10.1109/TIT.1983.1056658},
  doi = {10.1109/TIT.1983.1056658}
}
Kasami T, Kløve T and Lin S (1983), "Linear block codes for error detection", IEEE Trans. Information Theory. Vol. 29(1), pp. 131-136.
BibTeX:
@article{Kasami1983,
  author = {Kasami, Tadao and Kløve, Torleiv and Lin, Shu},
  title = {Linear block codes for error detection},
  journal = {IEEE Trans. Information Theory},
  year = {1983},
  volume = {29},
  number = {1},
  pages = {131--136},
  url = {https://doi.org/10.1109/TIT.1983.1056615},
  doi = {10.1109/TIT.1983.1056615}
}
Kløve T (1983), "On Robinson's coding problem", IEEE Trans. Information Theory. Vol. 29(3), pp. 450.
BibTeX:
@article{Klove1983,
  author = {Kløve, Torleiv},
  title = {On Robinson's coding problem},
  journal = {IEEE Trans. Information Theory},
  year = {1983},
  volume = {29},
  number = {3},
  pages = {450}
}
Helleseth T (1981), "A Characterization of Codes Meeting the Griesmer Bound", Information and Control. Vol. 50(2), pp. 128-159.
BibTeX:
@article{DBLP:journals/iandc/Helleseth81,
  author = {Helleseth, Tor},
  title = {A Characterization of Codes Meeting the Griesmer Bound},
  journal = {Information and Control},
  year = {1981},
  volume = {50},
  number = {2},
  pages = {128--159},
  url = {https://doi.org/10.1016/S0019-9958(81)90184-4},
  doi = {10.1016/S0019-9958(81)90184-4}
}
Helleseth T and Kløve T (1981), "On Group-Theoretic Codes for Assymmetric Channels", Information and Control. Vol. 49(1), pp. 1-9.
BibTeX:
@article{DBLP:journals/iandc/HellesethK81,
  author = {Helleseth, Tor and Kløve, Torleiv},
  title = {On Group-Theoretic Codes for Assymmetric Channels},
  journal = {Information and Control},
  year = {1981},
  volume = {49},
  number = {1},
  pages = {1--9},
  url = {https://doi.org/10.1016/S0019-9958(81)90432-0},
  doi = {10.1016/S0019-9958(81)90432-0}
}
Helleseth T and van Tilborg HCA (1981), "A new class of codes meeting the Griesmer bound", IEEE Trans. Information Theory. Vol. 27(5), pp. 548-555.
BibTeX:
@article{DBLP:journals/tit/HellesethT81,
  author = {Helleseth, Tor and van Tilborg, Henk C. A.},
  title = {A new class of codes meeting the Griesmer bound},
  journal = {IEEE Trans. Information Theory},
  year = {1981},
  volume = {27},
  number = {5},
  pages = {548--555},
  url = {https://doi.org/10.1109/TIT.1981.1056405},
  doi = {10.1109/TIT.1981.1056405}
}
Kløve T (1981), "The modular n-queen problem II", Discrete Mathematics. Vol. 36(1), pp. 33-48.
BibTeX:
@article{Klove1981,
  author = {Kløve, Torleiv},
  title = {The modular n-queen problem II},
  journal = {Discrete Mathematics},
  year = {1981},
  volume = {36},
  number = {1},
  pages = {33--48},
  url = {https://doi.org/10.1016/0012-365X(81)90171-0},
  doi = {10.1016/0012-365X(81)90171-0}
}
Kløve T (1981), "Upper bounds on codes correcting asymmetric errors", IEEE Trans. Information Theory. Vol. 27(1), pp. 128-131.
BibTeX:
@article{Klove1981a,
  author = {Kløve, Torleiv},
  title = {Upper bounds on codes correcting asymmetric errors},
  journal = {IEEE Trans. Information Theory},
  year = {1981},
  volume = {27},
  number = {1},
  pages = {128--131},
  url = {https://doi.org/10.1109/TIT.1981.1056291},
  doi = {10.1109/TIT.1981.1056291}
}
Kløve T (1981), "A lower bound for A(n, 4, w)", IEEE Trans. Information Theory. Vol. 27(2), pp. 257.
BibTeX:
@article{Klove1981b,
  author = {Kløve, Torleiv},
  title = {A lower bound for A(n, 4, w)},
  journal = {IEEE Trans. Information Theory},
  year = {1981},
  volume = {27},
  number = {2},
  pages = {257}
}
Helleseth T (1979), "The weight distribution of the coset leaders for some classes of codes with related parity-check matrices", Discrete Mathematics. Vol. 28(2), pp. 161-171.
BibTeX:
@article{DBLP:journals/dm/Helleseth79,
  author = {Helleseth, Tor},
  title = {The weight distribution of the coset leaders for some classes of codes with related parity-check matrices},
  journal = {Discrete Mathematics},
  year = {1979},
  volume = {28},
  number = {2},
  pages = {161--171},
  url = {https://doi.org/10.1016/0012-365X(79)90093-1},
  doi = {10.1016/0012-365X(79)90093-1}
}
Helleseth T (1979), "No primitive binary t -error-correcting BCH code with t textgreater 2 is quasi-perfect (Corresp.)", IEEE Trans. Information Theory. Vol. 25(3), pp. 361-362.
BibTeX:
@article{DBLP:journals/tit/Helleseth79,
  author = {Helleseth, Tor},
  title = {No primitive binary t -error-correcting BCH code with t textgreater 2 is quasi-perfect (Corresp.)},
  journal = {IEEE Trans. Information Theory},
  year = {1979},
  volume = {25},
  number = {3},
  pages = {361--362},
  url = {https://doi.org/10.1109/TIT.1979.1056043},
  doi = {10.1109/TIT.1979.1056043}
}
Kløve T (1979), "On the No-Three-in-Line Problem, III", J. Comb. Theory, Ser. A. Vol. 26(1), pp. 82-83.
BibTeX:
@article{Klove1979,
  author = {Kløve, Torleiv},
  title = {On the No-Three-in-Line Problem, III},
  journal = {J. Comb. Theory, Ser. A},
  year = {1979},
  volume = {26},
  number = {1},
  pages = {82--83},
  url = {https://doi.org/10.1016/0097-3165(79)90055-4},
  doi = {10.1016/0097-3165(79)90055-4}
}
Helleseth T (1978), "A note on the cross-correlation function between two binary maximal length linear sequences", Discrete Mathematics. Vol. 23(3), pp. 301-307.
BibTeX:
@article{DBLP:journals/dm/Helleseth78,
  author = {Helleseth, Tor},
  title = {A note on the cross-correlation function between two binary maximal length linear sequences},
  journal = {Discrete Mathematics},
  year = {1978},
  volume = {23},
  number = {3},
  pages = {301--307},
  url = {https://doi.org/10.1016/0012-365X(78)90010-9},
  doi = {10.1016/0012-365X(78)90010-9}
}
Helleseth T (1978), "All binary 3-error-correcting BCH codes of length 2^m-i have covering radius 5 (Corresp.)", IEEE Trans. Information Theory. Vol. 24(2), pp. 257-258.
BibTeX:
@article{DBLP:journals/tit/Helleseth78,
  author = {Helleseth, Tor},
  title = {All binary 3-error-correcting BCH codes of length 2^m-i have covering radius 5 (Corresp.)},
  journal = {IEEE Trans. Information Theory},
  year = {1978},
  volume = {24},
  number = {2},
  pages = {257--258},
  url = {https://doi.org/10.1109/TIT.1978.1055847},
  doi = {10.1109/TIT.1978.1055847}
}
Helleseth T, Kløve T and Mykkeltveit J (1978), "On the covering radius of binary codes (Corresp.)", IEEE Trans. Information Theory. Vol. 24(5), pp. 627-628.
BibTeX:
@article{DBLP:journals/tit/HellesethKM78,
  author = {Helleseth, Tor and Kløve, Torleiv and Mykkeltveit, Johannes},
  title = {On the covering radius of binary codes (Corresp.)},
  journal = {IEEE Trans. Information Theory},
  year = {1978},
  volume = {24},
  number = {5},
  pages = {627--628},
  url = {https://doi.org/10.1109/TIT.1978.1055928},
  doi = {10.1109/TIT.1978.1055928}
}
Kløve T (1978), "On Complements of Unary L Languages", J. Comput. Syst. Sci.. Vol. 16(1), pp. 56-66.
BibTeX:
@article{Klove1978a,
  author = {Kløve, Torleiv},
  title = {On Complements of Unary L Languages},
  journal = {J. Comput. Syst. Sci.},
  year = {1978},
  volume = {16},
  number = {1},
  pages = {56--66},
  url = {https://doi.org/10.1016/0022-0000(78)90050-8},
  doi = {10.1016/0022-0000(78)90050-8}
}
Helleseth T (1977), "The weight enumerator polynomials of some classes of codes with composite parity-check polynomials", Discrete Mathematics. Vol. 20, pp. 21-31.
BibTeX:
@article{DBLP:journals/dm/Helleseth77,
  author = {Helleseth, Tor},
  title = {The weight enumerator polynomials of some classes of codes with composite parity-check polynomials},
  journal = {Discrete Mathematics},
  year = {1977},
  volume = {20},
  pages = {21--31},
  url = {https://doi.org/10.1016/0012-365X(77)90039-5},
  doi = {10.1016/0012-365X(77)90039-5}
}
Helleseth T, Kløve T and Mykkeltveit J (1977), "The weight distribution of irreducible cyclic codes with block lengths n_1((q^1-1)/N)", Discrete Mathematics. Vol. 18(2), pp. 179-211.
BibTeX:
@article{DBLP:journals/dm/HellesethKM77,
  author = {Helleseth, Tor and Kløve, Torleiv and Mykkeltveit, Johannes},
  title = {The weight distribution of irreducible cyclic codes with block lengths n_1((q^1-1)/N)},
  journal = {Discrete Mathematics},
  year = {1977},
  volume = {18},
  number = {2},
  pages = {179--211},
  url = {https://doi.org/10.1016/0012-365X(77)90078-4},
  doi = {10.1016/0012-365X(77)90078-4}
}
Kløve T (1977), "The weight distribution for a class of irreducible cyclic codes", Discrete Mathematics. Vol. 20, pp. 87-90.
BibTeX:
@article{Klove1977a,
  author = {Kløve, Torleiv},
  title = {The weight distribution for a class of irreducible cyclic codes},
  journal = {Discrete Mathematics},
  year = {1977},
  volume = {20},
  pages = {87--90},
  url = {https://doi.org/10.1016/0012-365X(77)90047-4},
  doi = {10.1016/0012-365X(77)90047-4}
}
Helleseth T (1976), "Some results about the cross-correlation function between two maximal linear sequences", Discrete Mathematics. Vol. 16(3), pp. 209-232.
BibTeX:
@article{DBLP:journals/dm/Helleseth76,
  author = {Helleseth, Tor},
  title = {Some results about the cross-correlation function between two maximal linear sequences},
  journal = {Discrete Mathematics},
  year = {1976},
  volume = {16},
  number = {3},
  pages = {209--232},
  url = {https://doi.org/10.1016/0012-365X(76)90100-X},
  doi = {10.1016/0012-365X(76)90100-X}
}
Helleseth T (1976), "Some two-weight codes with composite parity-check polynomials (Corresp.)", IEEE Trans. Information Theory. Vol. 22(5), pp. 631-632.
BibTeX:
@article{DBLP:journals/tit/Helleseth76,
  author = {Helleseth, Tor},
  title = {Some two-weight codes with composite parity-check polynomials (Corresp.)},
  journal = {IEEE Trans. Information Theory},
  year = {1976},
  volume = {22},
  number = {5},
  pages = {631--632},
  url = {https://doi.org/10.1109/TIT.1976.1055600},
  doi = {10.1109/TIT.1976.1055600}
}