default search action
Massimiliano Sala
Person information
- affiliation: University of Trento, Italy
- affiliation (2002 - 2006): University College Cork, Ireland
- affiliation (PhD 2001): University of Milan, Italy
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Augustine Musukwa, Massimiliano Sala, Irene Villa, Marco Zaninelli:
On cryptographic properties of cubic and splitting Boolean functions. Appl. Algebra Eng. Commun. Comput. 35(5): 629-645 (2024) - [j41]Carla Mascia, Enrico Piccione, Massimiliano Sala:
An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG. Adv. Math. Commun. 18(6): 1710-1722 (2024) - [j40]Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa:
Searchable encryption with randomized ciphertext and randomized keyword search. J. Math. Cryptol. 18(1) (2024) - [j39]Massimiliano Sala, Daniele Taufer:
Group structure of elliptic curves over ℤ/Nℤ. J. Math. Cryptol. 18(1) (2024) - [i54]Augustine Musukwa, Massimiliano Sala:
A Note on Vectorial Boolean Functions as Embeddings. CoRR abs/2406.06429 (2024) - 2023
- [j38]Chiara Spadafora, Riccardo Longo, Massimiliano Sala:
A coercion-resistant blockchain-based E-voting protocol with receipts. Adv. Math. Commun. 17(2): 500-521 (2023) - [j37]Carla Mascia, Massimiliano Sala, Irene Villa:
A survey on functional encryption. Adv. Math. Commun. 17(5): 1251-1289 (2023) - [e7]Shin'ichiro Matsuo, Lewis Gudgeon, Ariah Klages-Mundt, Daniel Perez Hernandez, Sam Werner, Thomas Haines, Aleksander Essex, Andrea Bracciali, Massimiliano Sala:
Financial Cryptography and Data Security. FC 2022 International Workshops - CoDecFin, DeFi, Voting, WTSC, Grenada, May 6, 2022, Revised Selected Papers. Lecture Notes in Computer Science 13412, Springer 2023, ISBN 978-3-031-32414-7 [contents] - 2022
- [j36]Alessio Meneghetti, Marco Pellegrini, Massimiliano Sala:
A formula on the weight distribution of linear codes with applications to AMDS codes. Finite Fields Their Appl. 77: 101933 (2022) - [j35]Emanuele Bellini, Massimiliano Sala, Ilaria Simonetti:
Nonlinearity of Boolean Functions: An Algorithmic Approach Based on Multivariate Polynomials. Symmetry 14(2): 213 (2022) - [i53]Marco Calderini, Riccardo Longo, Massimiliano Sala, Irene Villa:
Searchable Encryption with randomized ciphertext and randomized keyword search. IACR Cryptol. ePrint Arch. 2022: 945 (2022) - 2021
- [e6]Matthew Bernhard, Andrea Bracciali, Lewis Gudgeon, Thomas Haines, Ariah Klages-Mundt, Shin'ichiro Matsuo, Daniel Perez, Massimiliano Sala, Sam Werner:
Financial Cryptography and Data Security. FC 2021 International Workshops - CoDecFin, DeFi, VOTING, and WTSC, Virtual Event, March 5, 2021, Revised Selected Papers. Lecture Notes in Computer Science 12676, Springer 2021, ISBN 978-3-662-63957-3 [contents] - [i52]Matteo Bonini, Massimiliano Sala, Lara Vicino:
Rational points on cubic surfaces and AG codes from the Norm-Trace curve. CoRR abs/2102.05478 (2021) - [i51]Carla Mascia, Massimiliano Sala, Irene Villa:
A survey on Functional Encryption. CoRR abs/2106.06306 (2021) - [i50]Alessio Meneghetti, Alex Pellegrini, Massimiliano Sala:
On explicit reductions between two purely algebraic problems: MQ and MLD. CoRR abs/2109.05806 (2021) - [i49]Carla Mascia, Enrico Piccione, Massimiliano Sala:
An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG. CoRR abs/2112.12268 (2021) - 2020
- [j34]Michela Ceria, Teo Mora, Massimiliano Sala:
HELP: a sparse error locator polynomial for BCH codes. Appl. Algebra Eng. Commun. Comput. 31(3-4): 215-233 (2020) - [j33]Augustine Musukwa, Massimiliano Sala:
On the linear structures of balanced functions and quadratic APN functions. Cryptogr. Commun. 12(5): 859-880 (2020) - [j32]Matteo Bonini, Massimiliano Sala:
Intersections between the norm-trace curve and some low degree curves. Finite Fields Their Appl. 67: 101715 (2020) - [c11]Alessio Meneghetti, Massimiliano Sala, Daniele Taufer:
A Note on an ECDLP-based PoW Model. DLT@ITASEC 2020 - [e5]Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. Rønne, Massimiliano Sala:
Financial Cryptography and Data Security - FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers. Lecture Notes in Computer Science 11599, Springer 2020, ISBN 978-3-030-43724-4 [contents] - [e4]Matthew Bernhard, Andrea Bracciali, L. Jean Camp, Shin'ichiro Matsuo, Alana Maurushat, Peter B. Rønne, Massimiliano Sala:
Financial Cryptography and Data Security - FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12063, Springer 2020, ISBN 978-3-030-54454-6 [contents] - [i48]Alessio Meneghetti, Marco Pellegrini, Massimiliano Sala:
A formula on the weight distribution of linear codes with applications to AMDS codes. CoRR abs/2003.14063 (2020) - [i47]Michele Battagliola, Riccardo Longo, Alessio Meneghetti, Massimiliano Sala:
Threshold ECDSA with an Offline Recovery Party. CoRR abs/2007.04036 (2020) - [i46]Michele Battagliola, Riccardo Longo, Alessio Meneghetti, Massimiliano Sala:
A Provably-Unforgeable Threshold EdDSA with an Offline Recovery Party. CoRR abs/2009.01631 (2020) - [i45]Riccardo Longo, Alessio Meneghetti, Massimiliano Sala:
Threshold Multi-Signature with an Offline Recovery Party. IACR Cryptol. ePrint Arch. 2020: 23 (2020) - [i44]Chiara Spadafora, Riccardo Longo, Massimiliano Sala:
Coercion-Resistant Blockchain-Based E-Voting Protocol. IACR Cryptol. ePrint Arch. 2020: 674 (2020)
2010 – 2019
- 2019
- [j31]Riccardo Aragona, Marco Calderini, Roberto Civino, Massimiliano Sala, Ilaria Zappatore:
Wave-shaped round functions and primitive groups. Adv. Math. Commun. 13(1): 67-88 (2019) - [j30]Roberto Civino, Céline Blondeau, Massimiliano Sala:
Differential attacks: using alternative operations. Des. Codes Cryptogr. 87(2-3): 225-247 (2019) - [j29]Carlo Brunetta, Marco Calderini, Massimiliano Sala:
On hidden sums compatible with a given block cipher diffusion layer. Discret. Math. 342(2): 373-386 (2019) - [j28]Marco Pellegrini, Massimiliano Sala:
Weight distribution of Hermitian codes and matrices rank. Finite Fields Their Appl. 60 (2019) - [c10]Alessio Meneghetti, Armanda Ottaviano Quintavalle, Massimiliano Sala, Alessandro Tomasi:
Two-tier blockchain timestamped notarization with incremental security. DLT@ITASEC 2019: 32-42 - [e3]Aviv Zohar, Ittay Eyal, Vanessa Teague, Jeremy Clark, Andrea Bracciali, Federico Pintore, Massimiliano Sala:
Financial Cryptography and Data Security - FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers. Lecture Notes in Computer Science 10958, Springer 2019, ISBN 978-3-662-58819-2 [contents] - [i43]Alessio Meneghetti, Armanda Ottaviano Quintavalle, Massimiliano Sala, Alessandro Tomasi:
Two-tier blockchain timestamped notarization with incremental security. CoRR abs/1902.03136 (2019) - [i42]Alessio Meneghetti, Tommaso Parise, Massimiliano Sala, Daniele Taufer:
A survey on efficient parallelization of blockchain-based smart contracts. CoRR abs/1904.00731 (2019) - [i41]Riccardo Longo, Massimiliano Sala:
Public Ledger for Sensitive Data. CoRR abs/1906.06912 (2019) - [i40]Augustine Musukwa, Massimiliano Sala, Marco Zaninelli:
On some cryptographic properties of Boolean functions and their second-order derivatives. CoRR abs/1909.10586 (2019) - [i39]Augustine Musukwa, Massimiliano Sala:
On the linear structures of Balanced functions and quadratic APN functions. CoRR abs/1909.11465 (2019) - [i38]Alessio Meneghetti, Massimiliano Sala, Daniele Taufer:
A new ECDLP-based PoW model. CoRR abs/1911.11287 (2019) - [i37]Riccardo Longo, Massimiliano Sala:
Public Ledger for Sensitive Data. IACR Cryptol. ePrint Arch. 2019: 713 (2019) - 2018
- [j27]Carla Mascia, Giancarlo Rinaldo, Massimiliano Sala:
Hilbert quasi-polynomial for order domains and application to coding theory. Adv. Math. Commun. 12(2): 287-301 (2018) - [j26]Alessandro Amadori, Federico Pintore, Massimiliano Sala:
On the discrete logarithm problem for prime-field elliptic curves. Finite Fields Their Appl. 51: 168-182 (2018) - [j25]Emanuele Bellini, Massimiliano Sala:
A deterministic algorithm for the distance and weight distribution of binary nonlinear codes. Int. J. Inf. Coding Theory 5(1): 18-35 (2018) - [i36]Matteo Bonini, Massimiliano Sala:
Intersections between the norm-trace curve and some low degree curves. CoRR abs/1812.08590 (2018) - 2017
- [j24]Riccardo Aragona, Riccardo Longo, Massimiliano Sala:
Several proofs of security for a tokenization algorithm. Appl. Algebra Eng. Commun. Comput. 28(5): 425-436 (2017) - [j23]Marco Calderini, Massimiliano Sala, Irene Villa:
A note on APN permutations in even dimension. Finite Fields Their Appl. 46: 1-16 (2017) - [j22]Alessandro Tomasi, Alessio Meneghetti, Massimiliano Sala:
Code generator matrices as RNG conditioners. Finite Fields Their Appl. 47: 46-63 (2017) - [j21]Fabrizio Caruso, Emmanuela Orsini, Massimiliano Sala, Claudia Tinnirello:
On the Shape of the General Error Locator Polynomial for Cyclic Codes. IEEE Trans. Inf. Theory 63(6): 3641-3657 (2017) - [c9]Riccardo Longo, Federico Pintore, Giancarlo Rinaldo, Massimiliano Sala:
On the security of the blockchain BIX protocol and certificates. CyCon 2017: 1-16 - [e2]Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, Markus Jakobsson:
Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10323, Springer 2017, ISBN 978-3-319-70277-3 [contents] - [i35]Riccardo Aragona, Marco Calderini, Roberto Civino, Massimiliano Sala, Ilaria Zappatore:
Generalised Round Functions for Block Ciphers and their Security. CoRR abs/1708.08814 (2017) - [i34]Alessandro Amadori, Federico Pintore, Massimiliano Sala:
On the discrete logarithm problem for prime-field elliptic curves. IACR Cryptol. ePrint Arch. 2017: 609 (2017) - [i33]Céline Blondeau, Roberto Civino, Massimiliano Sala:
Differential Attacks: Using Alternative Operations. IACR Cryptol. ePrint Arch. 2017: 610 (2017) - 2016
- [j20]Riccardo Aragona, Marco Calderini, Daniele Maccauro, Massimiliano Sala:
On weak differential uniformity of vectorial Boolean functions as a cryptographic criterion. Appl. Algebra Eng. Commun. Comput. 27(5): 359-372 (2016) - [j19]Pietro Peterlongo, Massimiliano Sala, Claudia Tinnirello:
A discrete logarithm-based approach to compute low-weight multiples of binary polynomials. Finite Fields Their Appl. 38: 57-71 (2016) - [j18]Chiara Marcolla, Marco Pellegrini, Massimiliano Sala:
On the small-weight codewords of some Hermitian codes. J. Symb. Comput. 73: 27-45 (2016) - [j17]Eleonora Guerrini, Alessio Meneghetti, Massimiliano Sala:
On Optimal Nonlinear Systematic Codes. IEEE Trans. Inf. Theory 62(6): 3103-3112 (2016) - [i32]Federico Giacon, Riccardo Aragona, Massimiliano Sala:
A proof of security for a key-policy RS-ABE scheme. CoRR abs/1603.06635 (2016) - [i31]Carla Mascia, Giancarlo Rinaldo, Massimiliano Sala:
Hilbert quasi-polynomial for order domain codes. CoRR abs/1607.07241 (2016) - [i30]Riccardo Longo, Federico Pintore, Giancarlo Rinaldo, Massimiliano Sala:
On the security of the Blockchain Bix Protocol and Certificates. CoRR abs/1607.08401 (2016) - [i29]Riccardo Longo, Massimiliano Sala, Riccardo Aragona:
Several Proofs of Security for a Tokenization Algorithm. CoRR abs/1609.00151 (2016) - [i28]Emanuele Bellini, Teo Mora, Massimiliano Sala:
An algorithmic approach using multivariate polynomials for the nonlinearity of Boolean functions. CoRR abs/1610.05932 (2016) - [i27]Riccardo Longo, Chiara Marcolla, Massimiliano Sala:
Collaborative Multi-Authority KP-ABE for Shorter Keys and Parameters. IACR Cryptol. ePrint Arch. 2016: 262 (2016) - 2015
- [c8]Marco Calderini, Massimiliano Sala:
On Differential Uniformity of Maps that May Hide an Algebraic Trapdoor. CAI 2015: 70-78 - [c7]Riccardo Longo, Chiara Marcolla, Massimiliano Sala:
Key-Policy Multi-authority Attribute-Based Encryption. CAI 2015: 152-164 - [c6]Matteo Piva, Marco Pizzato, Massimiliano Sala:
Attacking BEAR and LION Schemes in a Realistic Scenario. CAI 2015: 189-195 - [i26]Alessandro Tomasi, Alessio Meneghetti, Massimiliano Sala:
Code generator matrices as entropy extractors. CoRR abs/1502.01494 (2015) - [i25]Fabrizio Caruso, Emmanuela Orsini, Massimiliano Sala, Claudia Tinnirello:
On the shape of the general error locator polynomial for cyclic codes. CoRR abs/1502.02927 (2015) - [i24]Emanuele Bellini, Eleonora Guerrini, Alessio Meneghetti, Massimiliano Sala:
On the Griesmer bound for nonlinear codes. CoRR abs/1502.07379 (2015) - [i23]Emanuele Bellini, Massimiliano Sala:
A deterministic algorithm for the distance and weight distribution of binary nonlinear codes. CoRR abs/1505.00542 (2015) - [i22]Eleonora Guerrini, Alessio Meneghetti, Massimiliano Sala:
On optimal nonlinear systematic codes. CoRR abs/1506.03227 (2015) - [i21]Marco Calderini, Massimiliano Sala, Irene Villa:
A note on APN permutations in even dimension. CoRR abs/1511.08101 (2015) - 2014
- [j16]Franca Marinelli, Riccardo Aragona, Chiara Marcolla, Massimiliano Sala:
Some security bounds for the key sizes of DGHV scheme. Appl. Algebra Eng. Commun. Comput. 25(5): 383-392 (2014) - [j15]Riccardo Aragona, Andrea Caranti, Francesca Dalla Volta, Massimiliano Sala:
On the group generated by the round functions of translation based ciphers over arbitrary finite fields. Finite Fields Their Appl. 25: 293-305 (2014) - [j14]Chiara Marcolla, Marco Pellegrini, Massimiliano Sala:
On the Hermitian curve and its intersections with some conics. Finite Fields Their Appl. 28: 166-187 (2014) - [j13]Emanuele Bellini, Eleonora Guerrini, Massimiliano Sala:
Some Bounds on the Size of Codes. IEEE Trans. Inf. Theory 60(3): 1475-1480 (2014) - [i20]Riccardo Aragona, Marco Calderini, Daniele Maccauro, Massimiliano Sala:
On some differential properties of Boolean functions. CoRR abs/1403.7922 (2014) - [i19]Emanuele Bellini, Ilaria Simonetti, Massimiliano Sala:
Nonlinearity of Boolean functions: an algorithmic approach based on multivariate polynomials. CoRR abs/1404.2741 (2014) - [i18]Alessio Meneghetti, Massimiliano Sala, Alessandro Tomasi:
A weight-distribution bound for entropy extractors using linear binary codes. CoRR abs/1405.2820 (2014) - [i17]Pietro Peterlongo, Massimiliano Sala, Claudia Tinnirello:
A Discrete Logarithm-based Approach to Compute Low-Weight Multiples of Binary Polynomials. CoRR abs/1411.4024 (2014) - [i16]Riccardo Longo, Chiara Marcolla, Massimiliano Sala:
Two novel applications of bilinear groups to ABE encryption. CoRR abs/1412.4234 (2014) - [i15]Franca Marinelli, Riccardo Aragona, Chiara Marcolla, Massimiliano Sala:
Some security bounds for the DGHV scheme. IACR Cryptol. ePrint Arch. 2014: 68 (2014) - [i14]Francesco Aldà, Riccardo Aragona, Lorenzo Nicolodi, Massimiliano Sala:
Implementation and improvement of the Partial Sum Attack on 6-round AES. IACR Cryptol. ePrint Arch. 2014: 216 (2014) - [i13]Riccardo Longo, Chiara Marcolla, Massimiliano Sala:
Two novel applications of bilinear groups to ABE encryption. IACR Cryptol. ePrint Arch. 2014: 994 (2014) - 2013
- [j12]Edoardo Ballico, Michele Elia, Massimiliano Sala:
On the evaluation of multivariate polynomials over finite fields. J. Symb. Comput. 50: 255-262 (2013) - [c5]Marco Calderini, Massimiliano Sala:
Generalized AG Codes as Evaluation Codes. CAI 2013: 74-82 - [c4]Matteo Piva, Massimiliano Sala:
A New Bound for Cyclic Codes Beating the Roos Bound. CAI 2013: 101-112 - [i12]Matteo Piva, Massimiliano Sala:
A generalization of bounds for cyclic codes, including the HT and BS bounds. CoRR abs/1306.4849 (2013) - 2012
- [j11]Claudio Fontanari, Valentina Pulice, Anna Rimoldi, Massimiliano Sala:
On weakly APN functions and 4-bit S-Boxes. Finite Fields Their Appl. 18(3): 522-528 (2012) - [i11]Eleonora Guerrini, Emanuele Bellini, Massimiliano Sala:
A bound on the size of linear codes and systematic codes. CoRR abs/1206.6006 (2012) - 2011
- [j10]Lara Maines, Matteo Piva, Anna Rimoldi, Massimiliano Sala:
On the provable security of BEAR and LION schemes. Appl. Algebra Eng. Commun. Comput. 22(5-6): 413-423 (2011) - [i10]Claudio Fontanari, Valentina Pulice, Anna Rimoldi, Massimiliano Sala:
On weakly APN functions and 4-bit S-Boxes. CoRR abs/1102.3882 (2011) - [i9]Lara Maines, Matteo Piva, Anna Rimoldi, Massimiliano Sala:
On the provable security of BEAR and LION schemes. CoRR abs/1105.0259 (2011) - [i8]Edoardo Ballico, Michele Elia, Massimiliano Sala:
Complexity of multivariate polynomial evaluation. CoRR abs/1106.2720 (2011) - 2010
- [i7]Anna Rimoldi, Massimiliano Sala, Ilia Toli:
A possible intrinsic weakness of AES and other cryptosystems. CoRR abs/1006.5894 (2010) - [i6]Anna Rimoldi, Massimiliano Sala, Enrico Bertolazzi:
Do AES encryptions act randomly? CoRR abs/1011.2644 (2010)
2000 – 2009
- 2009
- [j9]Andrea Caranti, Francesca Dalla Volta, Massimiliano Sala:
On some block ciphers and imprimitive groups. Appl. Algebra Eng. Commun. Comput. 20(5-6): 339-350 (2009) - [j8]Andrea Caranti, Francesca Dalla Volta, Massimiliano Sala:
An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher. Des. Codes Cryptogr. 52(3): 293-301 (2009) - [j7]Rachit Agarwal, Emanuel M. Popovici, Massimiliano Sala, Brendan O'Flynn:
Error resilient data transport in sensor network applications: A generic perspective. Int. J. Circuit Theory Appl. 37(2): 377-396 (2009) - [p1]Massimiliano Sala:
Gröbner Bases, Coding, and Cryptography: a Guide to the State-of-Art. Gröbner Bases, Coding, and Cryptography 2009: 1-8 - [e1]Massimiliano Sala, Shojiro Sakata, Teo Mora, Carlo Traverso, Ludovic Perret:
Gröbner Bases, Coding, and Cryptography. Springer 2009, ISBN 978-3-540-93805-7 [contents] - [i5]Eleonora Guerrini, Massimiliano Sala:
A bound on the size of linear codes. CoRR abs/0902.1634 (2009) - [i4]Christian Spagnol, Marta Rossi, Massimiliano Sala:
Quasi-cyclic LDPC codes with high girth. CoRR abs/0906.3410 (2009) - [i3]Eleonora Guerrini, Emmanuela Orsini, Massimiliano Sala:
Computing the distance distribution of systematic non-linear codes. CoRR abs/0909.1626 (2009) - 2008
- [i2]Andrea Caranti, Francesca Dalla Volta, Massimiliano Sala:
An application of the O'Nan-Scott theorem to the group generated by the round functions of an AES-like cipher. CoRR abs/0812.1629 (2008) - 2007
- [j6]Emmanuela Orsini, Massimiliano Sala:
General Error Locator Polynomials for Binary Cyclic Codes With t<=2 and n<63. IEEE Trans. Inf. Theory 53(3): 1095-1107 (2007) - [c3]Rachit Agarwal, Emanuel M. Popovici, Massimiliano Sala, Brendan O'Flynn:
Low cost error recovery in Delay-Intolerant Wireless Sensor Networks. ECCTD 2007: 699-702 - [c2]James McDonagh, Massimiliano Sala, Antoin O'Allmhurain, Vaibhav Katewa, Emanuel M. Popovici:
Efficient construction and implementation of short LDPC codes for wireless sensor networks. ECCTD 2007: 703-706 - 2006
- [j5]E. Betti, Massimiliano Sala:
A New Bound for the Minimum Distance of a Cyclic Code From Its Defining Set. IEEE Trans. Inf. Theory 52(8): 3700-3706 (2006) - [c1]Monica Nicoli, Massimiliano Sala, Osvaldo Simeone, Luigi Sampietro, Claudio Santacesaria:
Adaptive Array Processing for Time-Varying Interference Mitigation in IEEE 802.16 Systems. PIMRC 2006: 1-5 - [i1]Andrea Caranti, Francesca Dalla Volta, Massimiliano Sala, F. Villani:
Imprimitive permutations groups generated by the round functions of key-alternating block ciphers and truncated differential cryptanalysis. CoRR abs/math/0606022 (2006) - 2003
- [j4]Massimiliano Sala:
Upper Bounds on the Dual Distance of BCH(255, k). Des. Codes Cryptogr. 30(2): 159-168 (2003) - [j3]Teo Mora, Massimiliano Sala:
On the Gröbner bases of some symmetric systems and their application to coding theory. J. Symb. Comput. 35(2): 177-194 (2003) - 2002
- [j2]Massimiliano Sala:
Groebner Bases and Distance of Cyclic Codes. Appl. Algebra Eng. Commun. Comput. 13(2): 137-162 (2002) - 2000
- [j1]Massimiliano Sala, Aldo Tamponi:
A linear programming estimate of the weight distribution of BCH(255, k). IEEE Trans. Inf. Theory 46(6): 2235-2237 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint