Author of the publication

Analysis of a measure of correlation between two binary strings of different lengths.

, , and . Australas. J Comb., (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vectorial Boolean functions and induced algebraic equations.. IACR Cryptology ePrint Archive, (2004)A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence., and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 165-175. Springer, (1990)Techniques for Random Masking in Hardware.. IEEE Trans. Circuits Syst. I Regul. Pap., 54-I (2): 291-300 (2007)Moving dispersion method for statistical anomaly detection in intrusion detection systems.. ISeCure, 1 (2): 71-90 (2009)Characterisations of Extended Resiliency and Extended Immunity of S-Boxes., , and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 210-228. Springer, (2005)Analysis of a measure of correlation between two binary strings of different lengths., , and . Australas. J Comb., (2002)Random correlation matrices.. Australas. J Comb., (1998)Exact Probabilistic Analysis of Memoryless Combiners.. IEEE Trans. Inf. Theory, 53 (11): 3958-3972 (2007)Entropy Analysis and New Constructions of Biometric Key Generation Systems., and . IEEE Trans. Inf. Theory, 54 (5): 2026-2040 (2008)Iterative optimum symbol-by-symbol decoding and fast correlation attacks.. IEEE Trans. Inf. Theory, 47 (7): 3040-3049 (2001)