default search action
Tor Helleseth
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j225]Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Debiao He:
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences. IEEE Trans. Inf. Theory 70(7): 5376-5391 (2024) - [j224]Yongbo Xia, Furong Bao, Shaoping Chen, Chunlei Li, Tor Helleseth:
More Differential Properties of the Ness-Helleseth Function. IEEE Trans. Inf. Theory 70(8): 6076-6090 (2024) - [j223]Minjia Shi, Shitao Li, Tor Helleseth:
The Weight Enumerator Polynomials of the Lifted Codes of the Projective Solomon-Stiffler Codes. IEEE Trans. Inf. Theory 70(9): 6316-6325 (2024) - 2023
- [j222]Minjia Shi, Liqin Qian, Tor Helleseth, Patrick Solé:
Five-weight codes from three-valued correlation of M-sequences. Adv. Math. Commun. 17(4): 799-814 (2023) - [j221]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Wilfried Meidl:
Editorial: Special issue on Boolean functions and their applications 2022. Cryptogr. Commun. 15(6): 1049-1051 (2023) - [j220]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
Further investigations on permutation based constructions of bent functions. J. Comb. Theory A 199: 105779 (2023) - [j219]Minjia Shi, Hongwei Zhu, Tor Helleseth:
The Connections Among Hamming Metric, b-Symbol Metric, and r-th Generalized Hamming Metric. IEEE Trans. Inf. Theory 69(4): 2485-2493 (2023) - [j218]Gaofei Wu, Keqin Feng, Nian Li, Tor Helleseth:
New Results on the -1 Conjecture on Cross-Correlation of m-Sequences Based on Complete Permutation Polynomials. IEEE Trans. Inf. Theory 69(6): 4035-4044 (2023) - [j217]Minjia Shi, Tor Helleseth, Ferruh Özbudak:
Covering Radius of Generalized Zetterberg Type Codes Over Finite Fields of Odd Characteristic. IEEE Trans. Inf. Theory 69(11): 7025-7048 (2023) - 2022
- [j216]Zhifan Ye, Zhengchun Zhou, Yang Yang, Tor Helleseth:
New Classes of Asymptotically Optimal Spectrally-Constrained Sequences Derived from Cyclotomy. Adv. Math. Commun. 16(4): 1143-1164 (2022) - [j215]Lilya Budaghyan, Claude Carlet, Cunsheng Ding, Tor Helleseth:
Editorial: Special issue on Boolean functions and their applications 2021. Cryptogr. Commun. 14(6): 1207-1209 (2022) - [j214]Minjia Shi, Shukai Wang, Tor Helleseth, Patrick Solé:
Quadratic residue codes, rank three groups and PBIBDs. Des. Codes Cryptogr. 90(11): 2599-2611 (2022) - [j213]Yuying Man, Yongbo Xia, Chunlei Li, Tor Helleseth:
On the differential properties of the power mapping xpm+2. Finite Fields Their Appl. 84: 102100 (2022) - [j212]Hongwei Zhu, Minjia Shi, Xiaoqiang Wang, Tor Helleseth:
The q-Ary Antiprimitive BCH Codes. IEEE Trans. Inf. Theory 68(3): 1683-1695 (2022) - [j211]Dan Zhang, Tor Helleseth:
Sequences With Good Correlations Based on Circular Florentine Arrays. IEEE Trans. Inf. Theory 68(5): 3381-3388 (2022) - [j210]Minjia Shi, Tor Helleseth, Ferruh Özbudak, Patrick Solé:
Covering Radius of Melas Codes. IEEE Trans. Inf. Theory 68(7): 4354-4364 (2022) - [j209]Haode Yan, Yongbo Xia, Chunlei Li, Tor Helleseth, Maosheng Xiong, Jinquan Luo:
The Differential Spectrum of the Power Mapping xpn-3. IEEE Trans. Inf. Theory 68(8): 5535-5547 (2022) - 2021
- [j208]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Kaisa Nyberg:
Editorial: Special issue on Boolean functions and their applications 2020. Cryptogr. Commun. 13(6): 887-889 (2021) - [j207]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
Cryptographically strong permutations from the butterfly structure. Des. Codes Cryptogr. 89(4): 737-761 (2021) - [j206]Diana Davidova, Lilya Budaghyan, Claude Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila:
Relation between o-equivalence and EA-equivalence for Niho bent functions. Finite Fields Their Appl. 72: 101834 (2021) - [j205]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
Binary Linear Codes With Few Weights From Two-to-One Functions. IEEE Trans. Inf. Theory 67(7): 4263-4275 (2021) - [j204]Gaojun Luo, Xiwang Cao, Minjia Shi, Tor Helleseth:
Three New Constructions of Asymptotically Optimal Periodic Quasi-Complementary Sequence Sets With Small Alphabet Sizes. IEEE Trans. Inf. Theory 67(8): 5168-5177 (2021) - [j203]Tor Helleseth, Daniel J. Katz, Chunlei Li:
The Resolution of Niho's Last Conjecture Concerning Sequences, Codes, and Boolean Functions. IEEE Trans. Inf. Theory 67(10): 6952-6962 (2021) - [j202]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
A Complete Characterization of the APN Property of a Class of Quadrinomials. IEEE Trans. Inf. Theory 67(11): 7535-7549 (2021) - 2020
- [j201]Tor Helleseth, Wai Ho Mow, Zhengchun Zhou:
Editorial: Special issue on sequences and their applications 2018. Cryptogr. Commun. 12(3): 321-323 (2020) - [j200]Dan Zhang, Matthew Geoffrey Parker, Tor Helleseth:
Polyphase zero correlation zone sequences from generalised bent functions. Cryptogr. Commun. 12(3): 325-335 (2020) - [j199]Lilya Budaghyan, Tor Helleseth:
Editorial: Special issue on Boolean functions and their applications. Cryptogr. Commun. 12(5): 819-820 (2020) - [j198]Yongbo Xia, Xianglai Zhang, Chunlei Li, Tor Helleseth:
The differential spectrum of a ternary power mapping. Finite Fields Their Appl. 64: 101660 (2020) - [j197]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nikolay S. Kaleyski:
On the Distance Between APN Functions. IEEE Trans. Inf. Theory 66(9): 5742-5753 (2020) - [j196]Lilya Budaghyan, Tor Helleseth, Nikolay S. Kaleyski:
A New Family of APN Quadrinomials. IEEE Trans. Inf. Theory 66(11): 7081-7087 (2020) - 2019
- [j195]Lilya Budaghyan, Claude Carlet, Tor Helleseth:
Editorial: Special Issue on Boolean functions and their applications. Cryptogr. Commun. 11(1): 1-2 (2019) - [j194]Nian Li, Tor Helleseth:
New permutation trinomials from Niho exponents over finite fields with even characteristic. Cryptogr. Commun. 11(1): 129-136 (2019) - [j193]Lilya Budaghyan, Claude Carlet, Tor Helleseth:
Editorial: Special issue on Boolean functions and their applications 2018. Cryptogr. Commun. 11(6): 1145-1146 (2019) - [j192]Vladimir Edemskiy, Chunlei Li, Xiangyong Zeng, Tor Helleseth:
The linear complexity of generalized cyclotomic binary sequences of period pn. Des. Codes Cryptogr. 87(5): 1183-1197 (2019) - [j191]Haode Yan, Zhengchun Zhou, Jian Weng, Jinming Wen, Tor Helleseth, Qi Wang:
Differential Spectrum of Kasami Power Permutations Over Odd Characteristic Finite Fields. IEEE Trans. Inf. Theory 65(10): 6819-6826 (2019) - 2018
- [j190]Tor Helleseth, Bart Preneel:
Editorial: Special issue on recent trends in cryptography. Cryptogr. Commun. 10(1): 1-3 (2018) - [j189]Pan Tan, Zhengchun Zhou, Deng Tang, Tor Helleseth:
The weight distribution of a class of two-weight linear codes derived from Kloosterman sums. Cryptogr. Commun. 10(2): 291-299 (2018) - [j188]Zibi Xiao, Xiangyong Zeng, Chunlei Li, Tor Helleseth:
New generalized cyclotomic binary sequences of period p2. Des. Codes Cryptogr. 86(7): 1483-1497 (2018) - [j187]Xiaofang Xu, Chunlei Li, Xiangyong Zeng, Tor Helleseth:
Constructions of complete permutation polynomials. Des. Codes Cryptogr. 86(12): 2869-2892 (2018) - [j186]Ziran Tu, Xiangyong Zeng, Tor Helleseth:
A class of permutation quadrinomials. Discret. Math. 341(11): 3010-3020 (2018) - [j185]Ziran Tu, Xiangyong Zeng, Chunlei Li, Tor Helleseth:
A class of new permutation trinomials. Finite Fields Their Appl. 50: 178-195 (2018) - [j184]Ziran Tu, Xiangyong Zeng, Tor Helleseth:
New permutation quadrinomials over F22m. Finite Fields Their Appl. 50: 304-318 (2018) - [j183]Zhengchun Zhou, Dan Zhang, Tor Helleseth, Jinming Wen:
A Construction of Multiple Optimal ZCZ Sequence Sets With Good Cross Correlation. IEEE Trans. Inf. Theory 64(2): 1340-1346 (2018) - [j182]Guang Gong, Tor Helleseth, P. Vijay Kumar:
Solomon W. Golomb - Mathematician, Engineer, and Pioneer. IEEE Trans. Inf. Theory 64(4): 2844-2857 (2018) - [j181]Zhengchun Zhou, Tor Helleseth, Udaya Parampalli:
A Family of Polyphase Sequences With Asymptotically Optimal Correlation. IEEE Trans. Inf. Theory 64(4): 2896-2900 (2018) - [j180]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li, Bo Sun:
On Upper Bounds for Algebraic Degrees of APN Functions. IEEE Trans. Inf. Theory 64(6): 4399-4411 (2018) - 2017
- [j179]Nian Li, Tor Helleseth:
Several classes of permutation trinomials from Niho exponents. Cryptogr. Commun. 9(6): 693-705 (2017) - [j178]Adel Alahmadi, Hussain Alhazmi, Shakir Ali, Tor Helleseth, Rola Hijazi, Chunlei Li, Patrick Solé:
An analogue of the ℤ4-Goethals code in non-primitive length. J. Syst. Sci. Complex. 30(4): 950-966 (2017) - [j177]Chunming Tang, Zhengchun Zhou, Yanfeng Qi, Xiaosong Zhang, Cuiling Fan, Tor Helleseth:
Generic Construction of Bent Functions and Bent Idempotents With Any Possible Algebraic Degrees. IEEE Trans. Inf. Theory 63(10): 6149-6157 (2017) - [j176]Zhimin Sun, Xiangyong Zeng, Chunlei Li, Tor Helleseth:
Investigations on Periodic Sequences With Maximum Nonlinear Complexity. IEEE Trans. Inf. Theory 63(10): 6188-6198 (2017) - [j175]Yongbo Xia, Nian Li, Xiangyong Zeng, Tor Helleseth:
On the Correlation Distribution for a Niho Decimation. IEEE Trans. Inf. Theory 63(11): 7206-7218 (2017) - 2016
- [j174]Adel Alahmadi, Hussain Alhazmi, Tor Helleseth, Rola Hijazi, Najat M. Muthana, Patrick Solé:
On the lifted Melas code. Cryptogr. Commun. 8(1): 7-18 (2016) - [j173]Lilya Budaghyan, Tor Helleseth, Alexander Kholosha:
Editorial: Special issue on Boolean functions and their applications. Cryptogr. Commun. 8(2): 173-174 (2016) - [j172]Chunlei Li, Tor Helleseth:
Quasi-perfect linear codes from planar and APN functions. Cryptogr. Commun. 8(2): 215-227 (2016) - [j171]Adel Alahmadi, Hussain Alhazmi, Tor Helleseth, Rola Hijazi, Najat M. Muthana, Patrick Solé:
On the lifted Zetterberg code. Des. Codes Cryptogr. 80(3): 561-576 (2016) - [j170]Zhengchun Zhou, Nian Li, Cuiling Fan, Tor Helleseth:
Linear codes with two or three weights from quadratic Bent functions. Des. Codes Cryptogr. 81(2): 283-295 (2016) - [j169]Chaoyun Li, Xiangyong Zeng, Chunlei Li, Tor Helleseth, Ming Li:
Construction of de Bruijn Sequences From LFSRs With Reducible Characteristic Polynomials. IEEE Trans. Inf. Theory 62(1): 610-624 (2016) - [j168]Chunming Tang, Nian Li, Yanfeng Qi, Zhengchun Zhou, Tor Helleseth:
Linear Codes With Two or Three Weights From Weakly Regular Bent Functions. IEEE Trans. Inf. Theory 62(3): 1166-1176 (2016) - [j167]Lilya Budaghyan, Alexander Kholosha, Claude Carlet, Tor Helleseth:
Univariate Niho Bent Functions From o-Polynomials. IEEE Trans. Inf. Theory 62(4): 2254-2265 (2016) - [j166]Yongbo Xia, Nian Li, Xiangyong Zeng, Tor Helleseth:
An Open Problem on the Distribution of a Niho-Type Cross-Correlation Function. IEEE Trans. Inf. Theory 62(12): 7546-7554 (2016) - 2015
- [j165]Yongbo Xia, Tor Helleseth, Chunlei Li:
Some new classes of cyclic codes with three or six weights. Adv. Math. Commun. 9(1): 23-36 (2015) - [j164]Nian Li, Xiaohu Tang, Tor Helleseth:
A class of quaternary sequences with low correlation. Adv. Math. Commun. 9(2): 199-210 (2015) - [j163]Ziran Tu, Xiangyong Zeng, Chunlei Li, Tor Helleseth:
Permutation polynomials of the form (xpm-x+δ)s+L(x) over the finite field Fp2m of odd characteristic. Finite Fields Their Appl. 34: 20-35 (2015) - 2014
- [j162]Tor Helleseth, Jonathan Jedwab:
Special issue editorial: Sequences and their applications. Cryptogr. Commun. 6(1): 1-2 (2014) - [j161]Nian Li, Xiaohu Tang, Tor Helleseth:
New $$M$$ M -ary sequences with low autocorrelation from interleaved technique. Des. Codes Cryptogr. 73(1): 237-249 (2014) - [j160]Lilya Budaghyan, Tor Helleseth, Matthew Geoffrey Parker:
Editorial: special issue on coding and cryptography. Des. Codes Cryptogr. 73(2): 269 (2014) - [j159]Gaofei Wu, Nian Li, Tor Helleseth, Yuqing Zhang:
Some classes of monomial complete permutation polynomials over finite fields of characteristic two. Finite Fields Their Appl. 28: 148-165 (2014) - [j158]Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang:
Optimal ternary cyclic codes with minimum distance four and five. Finite Fields Their Appl. 30: 100-120 (2014) - [j157]Yongbo Xia, Shaoping Chen, Tor Helleseth, Chunlei Li:
Cross-Correlation between a p-Ary m-Sequence and Its All Decimated Sequences for d=((pm+1)(pm+p-1))/(p+1). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(4): 964-969 (2014) - [j156]Chaoyun Li, Xiangyong Zeng, Tor Helleseth, Chunlei Li, Lei Hu:
The Properties of a Class of Linear FSRs and Their Applications to the Construction of Nonlinear FSRs. IEEE Trans. Inf. Theory 60(5): 3052-3061 (2014) - [j155]Seokbeom Hong, Hosung Park, Jong-Seon No, Tor Helleseth, Young-Sik Kim:
Near-Optimal Partial Hadamard Codebook Construction Using Binary Sequences Obtained From Quadratic Residue Mapping. IEEE Trans. Inf. Theory 60(6): 3698-3705 (2014) - [j154]Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding:
The Weight Distributions of Several Classes of Cyclic Codes From APN Monomials. IEEE Trans. Inf. Theory 60(8): 4710-4721 (2014) - [j153]Honggang Hu, Shuai Shao, Guang Gong, Tor Helleseth:
The Proof of Lin's Conjecture via the Decimation-Hadamard Transform. IEEE Trans. Inf. Theory 60(8): 5054-5064 (2014) - [j152]Nian Li, Xiaohu Tang, Tor Helleseth:
New Constructions of Quadratic Bent Functions in Polynomial Form. IEEE Trans. Inf. Theory 60(9): 5760-5767 (2014) - [j151]Yongbo Xia, Chunlei Li, Xiangyong Zeng, Tor Helleseth:
Some Results on Cross-Correlation Distribution Between a \(p\) -Ary \(m\) -Sequence and Its Decimated Sequences. IEEE Trans. Inf. Theory 60(11): 7368-7381 (2014) - [j150]Chaoyun Li, Xiangyong Zeng, Chunlei Li, Tor Helleseth:
A Class of de Bruijn Sequences. IEEE Trans. Inf. Theory 60(12): 7955-7969 (2014) - 2013
- [j149]Nian Li, Tor Helleseth, Xiaohu Tang:
Further results on a class of permutation polynomials over finite fields. Finite Fields Their Appl. 22: 16-23 (2013) - [j148]Nian Li, Tor Helleseth, Xiaohu Tang, Alexander Kholosha:
Several New Classes of Bent Functions From Dillon Exponents. IEEE Trans. Inf. Theory 59(3): 1818-1831 (2013) - [j147]Nian Li, Tor Helleseth, Alexander Kholosha, Xiaohu Tang:
On the Walsh Transform of a Class of Functions From Niho Exponents. IEEE Trans. Inf. Theory 59(7): 4662-4667 (2013) - [j146]Han Cai, Xiangyong Zeng, Tor Helleseth, Xiaohu Tang, Yang Yang:
A New Construction of Zero-Difference Balanced Functions and Its Applications. IEEE Trans. Inf. Theory 59(8): 5008-5015 (2013) - [j145]Cunsheng Ding, Tor Helleseth:
Optimal Ternary Cyclic Codes From Monomials. IEEE Trans. Inf. Theory 59(9): 5898-5904 (2013) - 2012
- [j144]Guang Gong, Tor Helleseth, Honggang Hu:
A Three-Valued Walsh Transform From Decimations of Helleseth-Gong Sequences. IEEE Trans. Inf. Theory 58(2): 1158-1162 (2012) - [j143]Guang Gong, Tor Helleseth, Honggang Hu, Alexander Kholosha:
On the Dual of Certain Ternary Weakly Regular Bent Functions. IEEE Trans. Inf. Theory 58(4): 2237-2243 (2012) - [j142]Wenjie Jia, Xiangyong Zeng, Tor Helleseth, Chunlei Li:
A Class of Binomial Bent Functions Over the Finite Fields of Odd Characteristic. IEEE Trans. Inf. Theory 58(9): 6054-6063 (2012) - [j141]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Alexander Kholosha, Sihem Mesnager:
Further Results on Niho Bent Functions. IEEE Trans. Inf. Theory 58(11): 6979-6985 (2012) - 2011
- [j140]Lilya Budaghyan, Tor Helleseth:
New commutative semifields defined by new PN multinomials. Cryptogr. Commun. 3(1): 1-16 (2011) - [j139]Tor Helleseth, Alexander Kholosha:
Crosscorrelation of m-sequences, exponential sums, bent functions and Jacobsthal sums. Cryptogr. Commun. 3(4): 281-291 (2011) - [j138]Lilya Budaghyan, Tor Helleseth:
On Isotopisms of Commutative presemifields and CCZ-Equivalence of Functions. Int. J. Found. Comput. Sci. 22(6): 1243-1258 (2011) - [j137]Xiaohu Tang, Tor Helleseth:
Generic Construction of Quaternary Sequences of Period 2N With Low Correlation From Quaternary Sequences of Odd Period N. IEEE Trans. Inf. Theory 57(4): 2295-2300 (2011) - [j136]Guang Gong, Sondre Rønjom, Tor Helleseth, Honggang Hu:
Fast Discrete Fourier Spectra Attacks on Stream Ciphers. IEEE Trans. Inf. Theory 57(8): 5555-5565 (2011) - [j135]Jinquan Luo, Tor Helleseth:
Constant Composition Codes as Subcodes of Cyclic Codes. IEEE Trans. Inf. Theory 57(11): 7482-7488 (2011) - [j134]Nian Li, Xiaohu Tang, Tor Helleseth:
Several Classes of Codes and Sequences Derived From a $\BBZ_{4}$-Valued Quadratic Form. IEEE Trans. Inf. Theory 57(11): 7618-7628 (2011) - 2010
- [j133]Tor Helleseth, Alexander Kholosha:
x2l+1+x+a and related affine polynomials over GF (2k). Cryptogr. Commun. 2(1): 85-109 (2010) - [j132]Tor Helleseth:
Crosscorrelation of m-Sequences, Exponential Sums and Dickson Polynomials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 2212-2219 (2010) - [j131]Tor Helleseth, Alexander Kholosha:
New binomial bent functions over the finite fields of odd characteristic. IEEE Trans. Inf. Theory 56(9): 4646-4652 (2010) - 2009
- [j130]Xiaohu Tang, Tor Helleseth, Pingzhi Fan:
A new optimal quaternary sequence family of length 2(2n - 1) obtained from the orthogonal transformation of Families B and C. Des. Codes Cryptogr. 53(3): 137-148 (2009) - [j129]Pascale Charpin, Tor Helleseth, Victor A. Zinoviev:
Divisibility properties of classical binary Kloosterman sums. Discret. Math. 309(12): 3975-3984 (2009) - [j128]Aina Johansen, Tor Helleseth:
A Family of m -Sequences With Five-Valued Cross Correlation. IEEE Trans. Inf. Theory 55(2): 880-887 (2009) - [j127]Xiaohu Tang, Tor Helleseth, Lei Hu, Wenfeng Jiang:
Two New Families of Optimal Binary Sequences Obtained From Quaternary Sequences. IEEE Trans. Inf. Theory 55(4): 1833-1840 (2009) - [j126]Tor Helleseth, Lei Hu, Alexander Kholosha, Xiangyong Zeng, Nian Li, Wenfeng Jiang:
Period-different m-sequences with at most four-valued cross correlation. IEEE Trans. Inf. Theory 55(7): 3305-3311 (2009) - [j125]Tor Helleseth, Henk D. L. Hollmann, Alexander Kholosha, Zeying Wang, Qing Xiang:
Proofs of two conjectures on ternary weakly regular bent functions. IEEE Trans. Inf. Theory 55(11): 5272-5283 (2009) - [j124]Aina Johansen, Tor Helleseth, Alexander Kholosha:
Further results on m-sequences with five-valued cross correlation. IEEE Trans. Inf. Theory 55(12): 5792-5802 (2009) - 2008
- [j123]Cunsheng Ding, Tor Helleseth, Øyvind Ytrehus:
Preface. Des. Codes Cryptogr. 48(2): 109-110 (2008) - [j122]Pascale Charpin, Tor Helleseth:
Editorial: In memory of Hans Dobbertin. Des. Codes Cryptogr. 49(1-3): 1-2 (2008) - [j121]Tor Helleseth, Alexander Kholosha:
On the equation x2l+1+x+a=0 over GF(2k). Finite Fields Their Appl. 14(1): 159-176 (2008) - [j120]Pascale Charpin, Tor Helleseth, Victor A. Zinoviev:
On Cosets of Weight 4 of BCH(2m, 8), m Even, and Exponential Sums. SIAM J. Discret. Math. 23(1): 59-78 (2008) - [j119]Aina Johansen, Tor Helleseth, Xiaohu Tang:
The Correlation Distribution of Quaternary Sequences of Period 2(2n-1). IEEE Trans. Inf. Theory 54(7): 3130-3139 (2008) - 2007
- [j118]Tor Helleseth, Jyrki T. Lahtonen, Petri Rosendahl:
On Niho type cross-correlation functions of m-sequences. Finite Fields Their Appl. 13(2): 305-317 (2007) - [j117]Pascale Charpin, Tor Helleseth, Victor A. Zinoviev:
Propagation characteristics of xx-1 and Kloosterman sums. Finite Fields Their Appl. 13(2): 366-381 (2007) - [j116]Pascale Charpin, Tor Helleseth, Victor A. Zinoviev:
The divisibility modulo 24 of Kloosterman sums on GF(2m), m odd. J. Comb. Theory A 114(2): 322-338 (2007) - [j115]Sondre Rønjom, Tor Helleseth:
A New Attack on the Filter Generator. IEEE Trans. Inf. Theory 53(5): 1752-1758 (2007) - [j114]Cunsheng Ding, Tor Helleseth, Torleiv Kløve, X. Wang:
A Generic Construction of Cartesian Authentication Codes. IEEE Trans. Inf. Theory 53(6): 2229-2235 (2007) - [j113]Tor Helleseth, Alexander Kholosha, Geir Jarle Ness:
Characterization of m-Sequences of Lengths 22k-1 and 2k-1 With Three-Valued Cross Correlation. IEEE Trans. Inf. Theory 53(6): 2236-2245 (2007) - [j112]Geir Jarle Ness, Tor Helleseth:
A New Family of Ternary Almost Perfect Nonlinear Mappings. IEEE Trans. Inf. Theory 53(7): 2581-2586 (2007) - [j111]Geir Jarle Ness, Tor Helleseth:
A New Family of Four-Valued Cross Correlation Between m-Sequences of Different Lengths. IEEE Trans. Inf. Theory 53(11): 4308-4313 (2007) - 2006
- [j110]Leonid A. Bassalygo, Stefan M. Dodunekov, Victor A. Zinoviev, Tor Helleseth:
The Grey-Rankin bound for nonbinary codes. Probl. Inf. Transm. 42(3): 197-203 (2006) - [j109]Hans Dobbertin, Patrick Felke, Tor Helleseth, Petri Rosendahl:
Niho type cross-correlation functions via dickson polynomials and Kloosterman sums. IEEE Trans. Inf. Theory 52(2): 613-627 (2006) - [j108]Geir Jarle Ness, Tor Helleseth:
Cross correlation of m-sequences of different lengths. IEEE Trans. Inf. Theory 52(4): 1637-1648 (2006) - [j107]Pascale Charpin, Tor Helleseth, Victor A. Zinoviev:
The coset distribution of triple-error-correcting binary primitive BCH codes. IEEE Trans. Inf. Theory 52(4): 1727-1732 (2006) - [j106]Tor Helleseth, Alexander Kholosha:
Monomial and quadratic bent functions over the finite fields of odd characteristic. IEEE Trans. Inf. Theory 52(5): 2018-2032 (2006) - [j105]Geir Jarle Ness, Tor Helleseth, Alexander Kholosha:
On the correlation distribution of the Coulter-Matthews decimation. IEEE Trans. Inf. Theory 52(5): 2241-2247 (2006) - [j104]Geir Jarle Ness, Tor Helleseth:
A New Three-Valued Cross Correlation Between m-Sequences of Different Lengths. IEEE Trans. Inf. Theory 52(10): 4695-4701 (2006) - [j103]Håvard Molland, Tor Helleseth:
Linear Properties in T-Functions. IEEE Trans. Inf. Theory 52(11): 5151-5157 (2006) - 2005
- [j102]Tor Helleseth, Petri Rosendahl:
New pairs of m-sequences with 4-level cross-correlation. Finite Fields Their Appl. 11(4): 674-683 (2005) - [j101]Victor A. Zinoviev, Tor Helleseth, Pascale Charpin:
On Cosets of Weight 4 of Binary BCH Codes with Minimum Distance 8 and Exponential Sums. Probl. Inf. Transm. 41(4): 331-348 (2005) - [j100]Sang-Hyo Kim, Jong-Seon No, Habong Chung, Tor Helleseth:
New cyclic relative difference sets constructed from d-homogeneous functions with difference-balanced property. IEEE Trans. Inf. Theory 51(3): 1155-1163 (2005) - [j99]Tor Helleseth, Torleiv Kløve, Vladimir I. Levenshtein:
Error-correction capability of binary linear codes. IEEE Trans. Inf. Theory 51(4): 1408-1423 (2005) - [j98]Hans Georg Schaathun, Tor Helleseth:
The second support weight distribution of the Kasami codes. IEEE Trans. Inf. Theory 51(8): 2892-2894 (2005) - 2004
- [j97]Dong-Joon Shin, P. Vijay Kumar, Tor Helleseth:
An Assmus-Mattson-Type Approach for Identifying 3-Designs from Linear Codes over Z4. Des. Codes Cryptogr. 31(1): 75-92 (2004) - [j96]Jong-Seon No, Dong-Joon Shin, Tor Helleseth:
On the p-Ranks and Characteristic Polynomials of Cyclic Difference Sets. Des. Codes Cryptogr. 33(1): 23-37 (2004) - [j95]Tor Helleseth, Johannes Mykkeltveit:
A Proof of Simmons' Conjecture. Des. Codes Cryptogr. 33(1): 39-43 (2004) - [j94]Tor Helleseth, Victor A. Zinoviev:
On a new identity for Kloosterman sums and nonlinear system of equations over finite fields of characteristic 2. Discret. Math. 274(1-3): 109-124 (2004) - [j93]Tor Helleseth, Jyrki T. Lahtonen, Kalle Ranto:
A simple proof to the minimum distance of Z4-linear Goethals-like codes. J. Complex. 20(2-3): 297-304 (2004) - [j92]Victor A. Zinoviev, Tor Helleseth:
On Weight Distributions of Shifts of Goethals-like Codes. Probl. Inf. Transm. 40(2): 118-134 (2004) - [j91]Ji-Woong Jang, Young-Sik Kim, Jong-Seon No, Tor Helleseth:
New Family of p-ary Sequences With Optimal Correlation Property and Large Linear Span. IEEE Trans. Inf. Theory 50(8): 1839-1844 (2004) - [j90]Tor Helleseth, José Felipe Voloch:
Double Circulant Quadratic Residue Codes. IEEE Trans. Inf. Theory 50(9): 2154-2155 (2004) - [j89]Tor Helleseth, Martijn Maas, John Erik Mathiassen, Toon Segers:
Linear complexity over Fp of Sidel'nikov sequences. IEEE Trans. Inf. Theory 50(10): 2468-2472 (2004) - [j88]Tor Helleseth, Torleiv Kløve, Vladimir I. Levenshtein:
The Simplex Codes and Other Even-Weight Binary Linear Codes for Error Correction. IEEE Trans. Inf. Theory 50(11): 2818-2823 (2004) - [j87]Tor Helleseth, Hans Georg Schaathun:
On the (2, 1)-separating weight of the Kerdock code. IEEE Trans. Inf. Theory 50(12): 3312-3315 (2004) - 2003
- [j86]Dong-Joon Shin, P. Vijay Kumar, Tor Helleseth:
3-Designs from the Z4-Goethals Codes via a New Kloosterman Sum Identity. Des. Codes Cryptogr. 28(3): 247-263 (2003) - [j85]Tor Helleseth, Torleiv Kløve, Vladimir I. Levenshtein:
Hypercubic 4 and 5-Designs from Double-Error-Correcting BCH Codes. Des. Codes Cryptogr. 28(3): 265-282 (2003) - [j84]T. W. Sze, Samuel T. Chanson, Cunsheng Ding, Tor Helleseth, Matthew Geoffrey Parker:
Logarithm cartesian authentication codes. Inf. Comput. 184(1): 93-108 (2003) - [j83]Tor Helleseth, Sang-Hyo Kim, Jong-Seon No:
Linear complexity over Fp and trace representation of Lempel-Cohn-Eastman sequences. IEEE Trans. Inf. Theory 49(6): 1548-1552 (2003) - [j82]Kyeongcheol Yang, Tor Helleseth:
On the minimum distance of array codes as LDPC codes. IEEE Trans. Inf. Theory 49(12): 3268-3271 (2003) - 2002
- [j81]Cunsheng Ding, Tor Helleseth, Harald Niederreiter, Chaoping Xing:
The minimum distance of the duals of binary irreducible cyclic codes. IEEE Trans. Inf. Theory 48(10): 2679-2689 (2002) - [j80]Tor Helleseth, Guang Gong:
New nonbinary sequences with ideal two-level autocorrelation. IEEE Trans. Inf. Theory 48(11): 2868-2872 (2002) - 2001
- [j79]Tor Helleseth, P. Vijay Kumar, Halvard Martinsen:
A New Family of Ternary Sequences with Ideal Two-level Autocorrelation Function. Des. Codes Cryptogr. 23(2): 157-166 (2001) - [j78]Tor Helleseth, Chunming Rong, Kyeongcheol Yang:
New 3-designs from Goethals codes over Z4. Discret. Math. 226(1-3): 403-409 (2001) - [j77]Tor Helleseth, Chunming Rong, Kyeongcheol Yang:
On t-designs from codes over Z4. Discret. Math. 238(1-3): 67-80 (2001) - [j76]Dong-Joon Shin, P. Vijay Kumar, Tor Helleseth:
5-Designs from the lifted Golay code over Z4 via an Assmus-Mattson type approach. Discret. Math. 241(1-3): 479-487 (2001) - [j75]Tor Helleseth:
Sequences with good correlations and some open problems. Electron. Notes Discret. Math. 6: 507-517 (2001) - [j74]Cunsheng Ding, Tor Helleseth, Halvard Martinsen:
New families of binary sequences with optimal three-level autocorrelation. IEEE Trans. Inf. Theory 47(1): 428-433 (2001) - [j73]Hans Dobbertin, Tor Helleseth, P. Vijay Kumar, Halvard Martinsen:
Ternary m-sequences with three-valued cross-correlation function: New decimations of Welch and Niho type. IEEE Trans. Inf. Theory 47(4): 1473-1481 (2001) - [j72]Tor Helleseth, Victor A. Zinoviev:
Codes with the same coset weight distributions as the Z4-linear Goethals codes. IEEE Trans. Inf. Theory 47(4): 1589-1595 (2001) - [j71]Jong-Seon No, Habong Chung, Hong-Yeop Song, Kyeongcheol Yang, Jung-Do Lee, Tor Helleseth:
New construction for binary sequences of period pm-1 with Optimal autocorrelation using (z+1)d+azd+b. IEEE Trans. Inf. Theory 47(4): 1638-1644 (2001) - [j70]Tor Helleseth, Victor A. Zinoviev:
On coset weight distributions of the Z4-linear Goethals codes. IEEE Trans. Inf. Theory 47(5): 1758-1772 (2001) - [j69]K. T. Arasu, Cunsheng Ding, Tor Helleseth, P. Vijay Kumar, Halvard Martinsen:
Almost difference sets and their sequences with optimal autocorrelation. IEEE Trans. Inf. Theory 47(7): 2934-2943 (2001) - 2000
- [j68]Cunsheng Ding, Tor Helleseth, Kwok-Yan Lam:
Duadic sequences of prime lengths. Discret. Math. 218(1-3): 33-49 (2000) - [j67]Anchung Chang, Peter Gaal, Solomon W. Golomb, Guang Gong, Tor Helleseth, P. Vijay Kumar:
On a conjectured ideal autocorrelation sequence, a related triple-error correcting cyclic code. IEEE Trans. Inf. Theory 46(2): 680-687 (2000) - [j66]Noboru Hamada, Tor Helleseth, Halvard Martinsen, Øyvind Ytrehus:
There is no ternary [28, 6, 16] code. IEEE Trans. Inf. Theory 46(4): 1550-1554 (2000) - 1999
- [j65]Tor Helleseth, Victor A. Zinoviev:
On Linear Goethals Codes and Kloosterman Sums. Des. Codes Cryptogr. 17(1-3): 269-288 (1999) - [j64]Iwan M. Duursma, Tor Helleseth, Chunming Rong, Kyeongcheol Yang:
Split Weight Enumerators for the Preparata Codes with Applications to Designs. Des. Codes Cryptogr. 18(1/3): 103-124 (1999) - [j63]Tor Helleseth, Chunming Rong, Kyeongcheol Yang:
New infinite families of 3-designs from preparata codes over Z4. Discret. Math. 195(1-3): 139-156 (1999) - [j62]Tor Helleseth, H. M. Martinsen:
Binary Sequences of Period 2m-1 with Large Linear Complexity. Inf. Comput. 151(1-2): 73-91 (1999) - [j61]Cunsheng Ding, Tor Helleseth:
Generalized Cyclotomic Codes of Length p1e1 ... ptet. IEEE Trans. Inf. Theory 45(2): 467-474 (1999) - [j60]Tor Helleseth, Chunming Rong, Daniel Sandberg:
New Families of Almost Perfect Nonlinear Power Mappings. IEEE Trans. Inf. Theory 45(2): 475-485 (1999) - [j59]Tor Helleseth, Bo Hove, Kyeongcheol Yang:
Further Results on Generalized Hamming Weights for Goethals and Preparata Codes Over Z4. IEEE Trans. Inf. Theory 45(4): 1255-1258 (1999) - [j58]Chunming Rong, Tor Helleseth, Jyrki T. Lahtonen:
On algebraic decoding of the Z4-linear Calderbank-McGuire code. IEEE Trans. Inf. Theory 45(5): 1423-1434 (1999) - [j57]Cunsheng Ding, Tor Helleseth, Kwok-Yan Lam:
Several classes of binary sequences with three-level autocorrelation. IEEE Trans. Inf. Theory 45(7): 2606-2612 (1999) - 1998
- [j56]Ross J. Anderson, Cunsheng Ding, Tor Helleseth, Torleiv Kløve:
How to Build Robust Shared Control Systems. Des. Codes Cryptogr. 15(2): 111-124 (1998) - [j55]Tor Helleseth, P. Vijay Kumar, Kyeongcheol Yang:
An Infinite Family of 3-Designs from Preparata Codes over Z. Des. Codes Cryptogr. 15(2): 175-181 (1998) - [j54]Kyeongcheol Yang, Tor Helleseth:
Two New Infinite Families of 3-Designs from Kerdock Codes over Z. Des. Codes Cryptogr. 15(2): 201-214 (1998) - [j53]Cunsheng Ding, Tor Helleseth:
On Cyclotomic Generator of Order r. Inf. Process. Lett. 66(1): 21-25 (1998) - [j52]Kyeongcheol Yang, Tor Helleseth:
On the Weight Hierarchy of Goethals Codes over Z4. IEEE Trans. Inf. Theory 44(1): 304-307 (1998) - [j51]Cunsheng Ding, Tor Helleseth, Weijuan Shan:
On the Linear Complexity of Legendre Sequences. IEEE Trans. Inf. Theory 44(3): 1276-1278 (1998) - 1997
- [j50]P. Vijay Kumar, Tor Helleseth:
An Expansion for the Coordinates of the Trace Function over Galois Rings. Appl. Algebra Eng. Commun. Comput. 8(5): 353-361 (1997) - [j49]Tor Helleseth, Daniel Sandberg:
Some Power Mappings with Low Differential Uniformity. Appl. Algebra Eng. Commun. Comput. 8(5): 363-370 (1997) - [j48]Tor Helleseth, Torleiv Kløve, Vladimir I. Levenshtein:
On the information function of an error-correcting code. IEEE Trans. Inf. Theory 43(2): 549-557 (1997) - [j47]Tor Helleseth, Torleiv Kløve:
The Newton radius of codes. IEEE Trans. Inf. Theory 43(6): 1820-1831 (1997) - [j46]Kyeongcheol Yang, Tor Helleseth:
On the weight hierarchy of Preparata codes over Z4. IEEE Trans. Inf. Theory 43(6): 1832-1842 (1997) - [j45]Iliya G. Bouyukliev, Stefan M. Dodunekov, Tor Helleseth, Øyvind Ytrehus:
On the [162, 8, 80] codes. IEEE Trans. Inf. Theory 43(6): 2055-2057 (1997) - 1996
- [j44]Tor Helleseth, P. Vijay Kumar, Abhijit G. Shanbhag:
Codes with the Same Weight Distributions as the Goethals Codes and the Delsarte-Goethals Codes. Des. Codes Cryptogr. 9(3): 257-266 (1996) - [j43]Tor Helleseth, P. Vijay Kumar:
On the weight hierarchy of the semiprimitive codes. Discret. Math. 152(1-3): 185-190 (1996) - [j42]Erik R. Hauge, Tor Helleseth:
De Bruijn sequences, irreducible codes and cyclotomy. Discret. Math. 159(1-3): 143-154 (1996) - [j41]A. Robert Calderbank, Gary McGuire, P. Vijay Kumar, Tor Helleseth:
Cyclic codes over Z4, locator polynomials, and Newton's identities. IEEE Trans. Inf. Theory 42(1): 217-226 (1996) - [j40]Abhijit G. Shanbhag, P. Vijay Kumar, Tor Helleseth:
Upper bound for a hybrid sum over Galois rings with applications to aperiodic correlation of some q-ary sequences. IEEE Trans. Inf. Theory 42(1): 250-254 (1996) - [j39]P. Vijay Kumar, Tor Helleseth, A. Robert Calderbank, A. Roger Hammons Jr.:
Large families of quaternary sequences with low correlation. IEEE Trans. Inf. Theory 42(2): 579-592 (1996) - [j38]Tor Helleseth, Torleiv Kløve:
The weight hierarchies of some product codes. IEEE Trans. Inf. Theory 42(3): 1029-1034 (1996) - [j37]Tor Helleseth, P. Vijay Kumar, Oscar Moreno, Abhijit G. Shanbhag:
Improved estimates via exponential sums for the minimum distance of Z4-linear trace codes. IEEE Trans. Inf. Theory 42(4): 1212-1216 (1996) - [j36]Abhijit G. Shanbhag, P. Vijay Kumar, Tor Helleseth:
Improved binary codes and sequence families from Z4-linear codes. IEEE Trans. Inf. Theory 42(5): 1582-1587 (1996) - [j35]Kyeongcheol Yang, Tor Helleseth, P. Vijay Kumar, Abhijit G. Shanbhag:
On the weight hierarchy of Kerdock codes over Z4. IEEE Trans. Inf. Theory 42(5): 1587-1593 (1996) - 1995
- [j34]Tor Helleseth, P. Vijay Kumar:
The weight hierarchy of the Kasami codes. Discret. Math. 145(1-3): 133-143 (1995) - [j33]Noboru Hamada, Tor Helleseth:
A characterization of some {3vµ+1, 3vµ; k-1, q}-minihypers and some [n, k, qk-1 - 3qµ; q]-codes (k >= 3, q >= 5, 1 <= µ < k-1) meeting the Griesmer bound. Discret. Math. 146(1-3): 59-67 (1995) - [j32]Tor Helleseth, Torleiv Kløve, Vladimir I. Levenshtein, Øyvind Ytrehus:
Bounds on the minimum support weights. IEEE Trans. Inf. Theory 41(2): 432-440 (1995) - [j31]P. Vijay Kumar, Tor Helleseth, A. Robert Calderbank:
An upper bound for Weft exponential sums over Galois tings and applications. IEEE Trans. Inf. Theory 41(2): 456-468 (1995) - [j30]Tor Helleseth, P. Vijay Kumar:
The algebraic decoding of the Z4-linear Goethals code. IEEE Trans. Inf. Theory 41(6): 2040-2048 (1995) - 1994
- [j29]Xuemin Chen, Irving S. Reed, Tor Helleseth, Trieu-Kien Truong:
Use of Grobner bases to decode binary cyclic codes up to the true minimum distance. IEEE Trans. Inf. Theory 40(5): 1654-1660 (1994) - [j28]Xuemin Chen, Irving S. Reed, Tor Helleseth, Trieu-Kien Truong:
General principles for the algebraic decoding of cyclic codes. IEEE Trans. Inf. Theory 40(5): 1661-1663 (1994) - 1993
- [j27]Noboru Hamada, Tor Helleseth, Øyvind Ytrehus:
A New Class of Nonbinary Codes Meeting the Griesmer Bound. Discret. Appl. Math. 47(3): 219-226 (1993) - [j26]Noboru Hamada, Tor Helleseth, Øyvind Ytrehus:
Characterization of {2(q+1)+2, 2;t, q}-minihypers in PG(t, q) (t>=3, qepsilon{3, 4}). Discret. Math. 115(1-3): 175-185 (1993) - 1992
- [j25]Tor Helleseth:
Legendre sums and codes related to QR codes. Discret. Appl. Math. 35(2): 107-113 (1992) - [j24]Noboru Hamada, Tor Helleseth, Øyvind Ytrehus:
On the Construction of [q4 + q2 - q, 5, q4 - q3 + q2 - 2q; q]-Codes Meeting the Griesmer Bound. Des. Codes Cryptogr. 2(3): 225-229 (1992) - [j23]Noboru Hamada, Tor Helleseth:
A characterization of some {2ualpha+1+ugamma+1, 2ualpha+ugamma; k-1, 3}- minihypers and some (n, k, 3k-1 -2·3alpha-3gamma; 3)-codes (k>=3, 0<=alpha<gamma<k-1) meeting the Griesmer bound. Discret. Math. 104(1): 67-81 (1992) - [j22]Tor Helleseth:
Projective codes meeting the Griesmer bound. Discret. Math. 106-107: 265-271 (1992) - [j21]Tor Helleseth, Torleiv Kløve, Øyvind Ytrehus:
Generalized Hamming weights of linear codes. IEEE Trans. Inf. Theory 38(3): 1133-1140 (1992) - 1991
- [j20]Tor Helleseth, Torleiv Kløve:
The number of cross-join pairs in maximum length linear sequences. IEEE Trans. Inf. Theory 37(6): 1731-1733 (1991) - 1990
- [j19]Noboru Hamada, Tor Helleseth:
A Characterization of Some Minihypers in a Finite Projective Geometry PG(t, 4). Eur. J. Comb. 11(6): 541-548 (1990) - [j18]Øyvind Ytrehus, Tor Helleseth:
There is no binary [25, 8, 10] code (corresp.). IEEE Trans. Inf. Theory 36(3): 695-696 (1990) - 1987
- [j17]Stefan M. Dodunekov, Tor Helleseth, Nikolai L. Manev, Øyvind Ytrehus:
New bounds on binary linear codes of dimension eight. IEEE Trans. Inf. Theory 33(6): 917-919 (1987) - 1985
- [j16]Tor Helleseth:
On the covering radius of cyclic linear codes and arithmetic codes. Discret. Appl. Math. 11(2): 157-173 (1985) - [j15]Tor Helleseth, Harold F. Mattson:
On the cosets of the simplex code. Discret. Math. 56(2-3): 169-189 (1985) - 1984
- [j14]Tor Helleseth:
Further classifications of codes meeting the Griesmer bound. IEEE Trans. Inf. Theory 30(2): 395-403 (1984) - 1983
- [j13]Tor Helleseth:
New constructions of codes meeting the Griesmer bound. IEEE Trans. Inf. Theory 29(3): 434-438 (1983) - 1981
- [j12]Tor Helleseth, Torleiv Kløve:
On Group-Theoretic Codes for Assymmetric Channels. Inf. Control. 49(1): 1-9 (1981) - [j11]Tor Helleseth:
A Characterization of Codes Meeting the Griesmer Bound. Inf. Control. 50(2): 128-159 (1981) - [j10]Tor Helleseth, Henk C. A. van Tilborg:
A new class of codes meeting the Griesmer bound. IEEE Trans. Inf. Theory 27(5): 548-555 (1981) - 1979
- [j9]Tor Helleseth:
The weight distribution of the coset leaders for some classes of codes with related parity-check matrices. Discret. Math. 28(2): 161-171 (1979) - [j8]Tor Helleseth:
No primitive binary t -error-correcting BCH code with t > 2 is quasi-perfect (Corresp.). IEEE Trans. Inf. Theory 25(3): 361-362 (1979) - 1978
- [j7]Tor Helleseth:
A note on the cross-correlation function between two binary maximal length linear sequences. Discret. Math. 23(3): 301-307 (1978) - [j6]Tor Helleseth:
All binary 3-error-correcting BCH codes of length 2m-i have covering radius 5 (Corresp.). IEEE Trans. Inf. Theory 24(2): 257-258 (1978) - [j5]Tor Helleseth, Torleiv Kløve, Johannes Mykkeltveit:
On the covering radius of binary codes (Corresp.). IEEE Trans. Inf. Theory 24(5): 627-628 (1978) - 1977
- [j4]Tor Helleseth, Torleiv Kløve, Johannes Mykkeltveit:
The weight distribution of irreducible cyclic codes with block lengths n1((q1-1)/N). Discret. Math. 18(2): 179-211 (1977) - [j3]Tor Helleseth:
The weight enumerator polynomials of some classes of codes with composite parity-check polynomials. Discret. Math. 20: 21-31 (1977) - 1976
- [j2]Tor Helleseth:
Some results about the cross-correlation function between two maximal linear sequences. Discret. Math. 16(3): 209-232 (1976) - [j1]Tor Helleseth:
Some two-weight codes with composite parity-check polynomials (Corresp.). IEEE Trans. Inf. Theory 22(5): 631-632 (1976)
Conference and Workshop Papers
- 2020
- [c58]Dan Zhang, Tor Helleseth:
New Optimal Sets of Perfect Polyphase Sequences Based on Circular Florentine Arrays. ISIT 2020: 2921-2925 - 2017
- [c57]Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth:
Yoyo Tricks with AES. ASIACRYPT (1) 2017: 217-243 - [c56]Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun:
Some Results on the Known Classes of Quadratic APN Functions. C2SI 2017: 3-16 - 2016
- [c55]Tor Helleseth, Alexander Kholosha:
New ternary binomial bent functions. ISIT 2016: 101-104 - [c54]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li:
On the (non-)existence of APN (n, n)-functions of algebraic degree n. ISIT 2016: 480-484 - 2015
- [c53]Nian Li, Zhengchun Zhou, Tor Helleseth:
On a conjecture about a class of optimal ternary cyclic codes. IWSDA 2015: 62-65 - [c52]Adel Alahmadi, Tor Helleseth, Najat M. Muthana, Atiqah Almuzaini, Patrick Solé:
Irreducible cyclic ℤ4 - codes and allied sequences. IWSDA 2015: 160-164 - 2014
- [c51]Honggang Hu, Shuai Shao, Guang Gong, Tor Helleseth:
On the proof of Lin's conjecture. ISIT 2014: 1822-1826 - [c50]Lilya Budaghyan, Alexander Kholosha, Claude Carlet, Tor Helleseth:
Niho bent functions from quadratic o-monomials. ISIT 2014: 1827-1831 - [c49]Yongbo Xia, Tor Helleseth, Gaofei Wu:
A Note on Cross-Correlation Distribution Between a Ternary m -Sequence and Its Decimated Sequence. SETA 2014: 249-259 - [c48]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Alexander Kholosha:
On o-Equivalence of Niho Bent Functions. WAIFI 2014: 155-168 - 2013
- [c47]Tor Helleseth, Cees J. A. Jansen, Oleksandr Kazymyrov, Alexander Kholosha:
State space cryptanalysis of the MICKEY cipher. ITA 2013: 1-10 - 2012
- [c46]Nian Li, Xiaohu Tang, Tor Helleseth:
New classes of generalized boolean bent functions over Z4. ISIT 2012: 841-845 - [c45]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Alexander Kholosha:
Generalized bent functions and their relation to Maiorana-McFarland class. ISIT 2012: 1212-1215 - [c44]Jinquan Luo, Tor Helleseth:
Binary Niho sequences with four-valued cross correlations. ISIT 2012: 1216-1220 - [c43]Chunlei Li, Tor Helleseth:
New nonbinary sequence families with low correlation and large linear span. ISIT 2012: 1411-1415 - [c42]Guang Gong, Tor Helleseth, Honggang Hu, Chunlei Li:
New Three-Valued Walsh Transforms from Decimations of Helleseth-Gong Sequences. SETA 2012: 327-337 - 2011
- [c41]Claude Carlet, Tor Helleseth, Alexander Kholosha, Sihem Mesnager:
On the dual of bent functions with 2r Niho exponents. ISIT 2011: 703-707 - [c40]Tor Helleseth, Sondre Rønjom:
Simplifying algebraic attacks with univariate analysis. ITA 2011: 153-159 - [c39]Lilya Budaghyan, Claude Carlet, Tor Helleseth:
On bent functions associated to AB functions. ITW 2011: 150-154 - [c38]Jinquan Luo, Tor Helleseth, Alexander Kholosha:
Two nonbinary sequences with six-valued cross correlation. IWSDA 2011: 44-47 - 2010
- [c37]Tor Helleseth, Alexander Kholosha:
New binomial bent functions over the finite fields of odd characteristic. ISIT 2010: 1277-1281 - [c36]Mehdi M. Hassanzadeh, Tor Helleseth:
Algebraic attack on the Alternating Step(r, s) Generator. ISIT 2010: 2493-2497 - [c35]Tor Helleseth, Alexander Kholosha:
On generalized bent functions. ITA 2010: 178-183 - [c34]Tor Helleseth, Alexander Kholosha:
Sequences, Bent Functions and Jacobsthal Sums. SETA 2010: 416-429 - 2009
- [c33]Carl Bracken, Tor Helleseth:
Triple-error-correcting BCH-like codes. ISIT 2009: 1723-1725 - 2008
- [c32]Tor Helleseth, Alexander Kholosha, Aina Johansen:
m-sequences of different lengths with four-valued cross correlation. ISIT 2008: 2598-2602 - [c31]Pascale Charpin, Tor Helleseth, Victor A. Zinoviev:
Divisibility properties of Kloosterman sums over finite fields of characteristic two. ISIT 2008: 2608-2612 - [c30]Tor Helleseth, Alexander Kholosha:
m-Sequences of Lengths 22k-1 and 2k-1 with at Most Four-Valued Cross Correlation. SETA 2008: 106-120 - [c29]Xiaohu Tang, Tor Helleseth, Aina Johansen:
On the Correlation Distribution of Kerdock Sequences. SETA 2008: 121-129 - [c28]Lilya Budaghyan, Tor Helleseth:
New Perfect Nonlinear Multinomials over Ffor Any Odd Prime p. SETA 2008: 403-414 - 2007
- [c27]Sondre Rønjom, Guang Gong, Tor Helleseth:
A Survey of Recent Attacks on the Filter Generator. AAECC 2007: 7-17 - [c26]Pascale Charpin, Tor Helleseth, Victor A. Zinoviev:
On binary primitive BCH codes with minimum distance 8 and exponential sums. ISIT 2007: 1976-1980 - [c25]Tor Helleseth, Alexander Kholosha:
On the Dual of Monomial Quadratic p -ary Bent Functions. SSC 2007: 50-61 - [c24]Xiaohu Tang, Tor Helleseth, Lei Hu, Wenfeng Jiang:
A New Family of Gold-Like Sequences. SSC 2007: 62-69 - [c23]Sondre Rønjom, Tor Helleseth:
The Linear Vector Space Spanned by the Nonlinear Filter Generator. SSC 2007: 169-183 - [c22]Sondre Rønjom, Guang Gong, Tor Helleseth:
On Attacks on Filtering Generators Using Linear Subspace Structures. SSC 2007: 204-217 - [c21]Sondre Rønjom, Tor Helleseth:
Attacking the Filter Generator over GF (2 m ). WAIFI 2007: 264-275 - 2006
- [c20]Tor Helleseth, Torleiv Kløve, Vladimir I. Levenshtein:
A bound for codes with given minimum and maximum distances. ISIT 2006: 292-296 - [c19]Geir Jarle Ness, Tor Helleseth:
Three-Valued Crosscorrelation Between m-Sequences of Different Lengths. ISIT 2006: 1653-1657 - [c18]Leonid A. Bassalygo, Stefan M. Dodunekov, Tor Helleseth, Victor A. Zinoviev:
On a new q-ary combinatorial analog of the binary Grey-Rankin bound and codes meeting this bound. ITW 2006: 278-282 - [c17]Tor Helleseth, Cees J. A. Jansen, Shahram Khazaei, Alexander Kholosha:
Security of Jump Controlled Sequence Generators for Stream Ciphers. SETA 2006: 141-152 - 2005
- [c16]Håvard Molland, Tor Helleseth:
Alinear weakness in the Klimov-Shamir T-function. ISIT 2005: 1106-1110 - [c15]Pascale Charpin, Tor Helleseth, Victor A. Zinoviev:
Coset distribution of triple-error-correcting binary primitive BCH codes. ISIT 2005: 1972-1976 - [c14]Tor Helleseth, Alexander Kholosha:
New monomial bent functions over the finite fields of odd characteristic. ITW 2005: 72-76 - 2004
- [c13]Håvard Molland, Tor Helleseth:
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators. CRYPTO 2004: 373-389 - [c12]Tor Helleseth, John Erik Mathiassen, Martijn Maas, Toon Segers:
Linear complexity over Fp of Sidel'nikov sequences. ISIT 2004: 122 - [c11]Stefan M. Dodunekov, Tor Helleseth, Victor A. Zinoviev:
On q-ary Grey-Rankin bound and codes meeting this bound. ISIT 2004: 528 - 2003
- [c10]Hans Georg Schaathun, Tor Helleseth:
Separating and Intersecting Properties of BCH and Kasami Codes. IMACC 2003: 52-65 - [c9]Håvard Molland, John Erik Mathiassen, Tor Helleseth:
Improved Fast Correlation Attack Using Low Rate Codes. IMACC 2003: 67-81 - [c8]Tor Helleseth, Torleiv Kløve, Vladimir I. Levenshtein:
A coset weight count that proves that the simplex codes are not optimal for error correction. ITW 2003: 234-237 - 2001
- [c7]Tor Helleseth:
Codes over Z4. Computational Discrete Mathematics 2001: 47-55 - [c6]Tor Helleseth:
On the Crosscorrelation of m-Sequences and Related Sequences with Ideal Autocorrelation. SETA 2001: 34-45 - [c5]Tor Helleseth, Kyeongcheol Yang:
On Binary Sequences of Period n = pm ∓ 1 with Optimal Autocorrelation. SETA 2001: 209-217 - 1998
- [c4]Tor Helleseth:
Correlation of m-Sequences and Related Topics. SETA 1998: 49-66 - [c3]Tor Helleseth, P. Vijay Kumar, H. M. Martinsen, O. N. Vassbakk:
Correlation Distribution of the Quaternary Kasami Sequences. SETA 1998: 240-253 - 1996
- [c2]Tor Helleseth, Thomas Johansson:
Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings. CRYPTO 1996: 31-44 - 1993
- [c1]Tor Helleseth, Torleiv Kløve, Øyvind Ytrehus:
Generalizations of the Griesmer Bound. Error Control, Cryptology, and Speech Compression 1993: 41-52
Parts in Books or Collections
- 2014
- [p6]Tor Helleseth:
Open Problems on the Cross-correlation of m-Sequences. Open Problems in Mathematics and Computational Science 2014: 163-179 - 2013
- [p5]Tor Helleseth:
Correlation and autocorrelation of sequences. Handbook of Finite Fields 2013: 317-323 - [p4]Tor Helleseth, Alexander Kholosha:
Bent functions and their connections to combinatorics. Surveys in Combinatorics 2013: 91-126 - 2009
- [p3]Tor Helleseth, Michal Hojsík, Sondre Rønjom:
Algebraic Attacks on Filter and Combiner Generators. Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes 2009: 39-48 - 2008
- [p2]Tor Helleseth, Torleiv Kløve:
Algebraic Coding Theory. Wiley Encyclopedia of Computer Science and Engineering 2008 - [p1]Cees J. A. Jansen, Tor Helleseth, Alexander Kholosha:
Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher. The eSTREAM Finalists 2008: 224-243
Editorship
- 2012
- [e9]Tor Helleseth, Jonathan Jedwab:
Sequences and Their Applications - SETA 2012 - 7th International Conference, Waterloo, ON, Canada, June 4-8, 2012. Proceedings. Lecture Notes in Computer Science 7280, Springer 2012, ISBN 978-3-642-30614-3 [contents] - 2010
- [e8]M. Anwar Hasan, Tor Helleseth:
Arithmetic of Finite Fields, Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010. Proceedings. Lecture Notes in Computer Science 6087, Springer 2010, ISBN 978-3-642-13796-9 [contents] - 2007
- [e7]Tor Helleseth, P. Vijay Kumar, Øyvind Ytrehus:
Proceedings of the IEEE Information Theory Workshop on Information Theory for Wireless Networks, July 1-6, 2007, Solstrand, Norway. IEEE 2007, ISBN 1-4244-1199-8 [contents] - [e6]Solomon W. Golomb, Guang Gong, Tor Helleseth, Hong-Yeop Song:
Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers. Lecture Notes in Computer Science 4893, Springer 2007, ISBN 978-3-540-77403-7 [contents] - 2006
- [e5]Guang Gong, Tor Helleseth, Hong-Yeop Song, Kyeongcheol Yang:
Sequences and Their Applications - SETA 2006, 4th International Conference, Beijing, China, September 24-28, 2006, Proceedings. Lecture Notes in Computer Science 4086, Springer 2006, ISBN 3-540-44523-4 [contents] - 2005
- [e4]Tor Helleseth, Dilip V. Sarwate, Hong-Yeop Song, Kyeongcheol Yang:
Sequences and Their Applications - SETA 2004, Third International Conference, Seoul, Korea, October 24-28, 2004, Revised Selected Papers. Lecture Notes in Computer Science 3486, Springer 2005, ISBN 3-540-26084-6 [contents] - 2002
- [e3]Tor Helleseth, P. Vijay Kumar, Kyeongcheol Yang:
Sequences and their Applications - Proceedings of SETA 2001, Bergen, Norway, May 13-17, 2001. Discrete Mathematics and Theoretical Computer Science, Springer 2002, ISBN 978-1-85233-529-8 [contents] - 1999
- [e2]Cunsheng Ding, Tor Helleseth, Harald Niederreiter:
Sequences and their Applications - Proceedings of SETA 1998, Singapore, December 14-17, 1998. Discrete Mathematics and Theoretical Computer Science, Springer 1999, ISBN 978-1-85233-196-2 [contents] - 1994
- [e1]Tor Helleseth:
Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings. Lecture Notes in Computer Science 765, Springer 1994, ISBN 3-540-57600-2 [contents]
Reference Works
- 2011
- [r18]Tor Helleseth:
Autocorrelation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 68 - [r17]Tor Helleseth:
Cross-Correlation. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 277 - [r16]Tor Helleseth:
De Bruijn Sequence. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 315-316 - [r15]Tor Helleseth:
Gap. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 508-509 - [r14]Tor Helleseth:
Golomb's Randomness Postulates. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 516-517 - [r13]Tor Helleseth:
Maximal-Length Sequences. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 763-766 - [r12]Tor Helleseth:
Pseudo-Noise Sequences (PN-Sequences). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 992 - [r11]Tor Helleseth:
Run. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1072-1073 - [r10]Tor Helleseth:
Sequences. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1185-1188 - 2005
- [r9]Tor Helleseth:
Autocorrelation. Encyclopedia of Cryptography and Security 2005 - [r8]Tor Helleseth:
Cross-Correlation. Encyclopedia of Cryptography and Security 2005 - [r7]Tor Helleseth:
DeBruijn sequence. Encyclopedia of Cryptography and Security 2005 - [r6]Tor Helleseth:
Gap. Encyclopedia of Cryptography and Security 2005 - [r5]Tor Helleseth:
Golomb'S Randomness Postulates. Encyclopedia of Cryptography and Security 2005 - [r4]Tor Helleseth:
Maximal-Length Linear Sequence. Encyclopedia of Cryptography and Security 2005 - [r3]Tor Helleseth:
Pseudo-Noise Sequence (PN-Sequence). Encyclopedia of Cryptography and Security 2005 - [r2]Tor Helleseth:
Run. Encyclopedia of Cryptography and Security 2005 - [r1]Tor Helleseth:
Sequences. Encyclopedia of Cryptography and Security 2005
Informal and Other Publications
- 2024
- [i42]Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Debiao He:
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences. CoRR abs/2404.16313 (2024) - [i41]Tor Helleseth, Chunlei Li:
An updated review on cross-correlation of m-sequences. CoRR abs/2407.16072 (2024) - [i40]Yongbo Xia, Chunlei Li, Furong Bao, Shaoping Chen, Tor Helleseth:
Further Investigation on Differential Properties of the Generalized Ness-Helleseth Function. CoRR abs/2408.17272 (2024) - [i39]Qin Yuan, Chunlei Li, Xiangyong Zeng, Tor Helleseth, Debiao He:
Further Investigations on Nonlinear Complexity of Periodic Binary Sequences. IACR Cryptol. ePrint Arch. 2024: 632 (2024) - 2023
- [i38]Minjia Shi, Shitao Li, Tor Helleseth, Jon-Lark Kim:
Binary self-orthogonal codes which meet the Griesmer bound or have optimal minimum distances. CoRR abs/2303.16729 (2023) - [i37]Minjia Shi, Shitao Li, Tor Helleseth:
The weight enumerator polynomials of the lifted codes of the projective Solomon-Stiffler codes. CoRR abs/2310.12511 (2023) - 2022
- [i36]Yuying Man, Yongbo Xia, Chunlei Li, Tor Helleseth:
On the Differential Properties of the Power Mapping xpm+2. CoRR abs/2204.08118 (2022) - 2021
- [i35]Haode Yan, Yongbo Xia, Chunlei Li, Tor Helleseth, Maosheng Xiong, Jinquan Luo:
The Differential Spectrum of the Power Mapping xpn-3. CoRR abs/2108.03088 (2021) - [i34]Minjia Shi, Hongwei Zhu, Tor Helleseth:
The connections among Hamming metric, $b$-symbol metric, and $r$-th generalized Hamming metric. CoRR abs/2109.13764 (2021) - [i33]Hongwei Zhu, Minjia Shi, Xiaoqiang Wang, Tor Helleseth:
The $q$-ary antiprimitive BCH codes. CoRR abs/2109.13803 (2021) - 2020
- [i32]Tor Helleseth, Daniel J. Katz, Chunlei Li:
The resolution of Niho's last conjecture concerning sequences, codes, and Boolean functions. CoRR abs/2006.12239 (2020) - [i31]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
Binary linear codes with few weights from two-to-one functions. CoRR abs/2006.12395 (2020) - [i30]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
A complete characterization of the APN property of a class of quadrinomials. CoRR abs/2007.03996 (2020) - 2019
- [i29]Minjia Shi, Tor Helleseth, Patrick Solé:
Two-weight codes over the integers modulo a prime power. CoRR abs/1911.07657 (2019) - [i28]Kangquan Li, Chunlei Li, Tor Helleseth, Longjiang Qu:
Cryptographically Strong Permutations from the Butterfly Structure. CoRR abs/1912.02640 (2019) - [i27]Diana Davidova, Lilya Budaghyan, Claude Carlet, Tor Helleseth, Ferdinand Ihringer, Tim Penttila:
Relation between o-equivalence and EA-equivalence for Niho bent functions. IACR Cryptol. ePrint Arch. 2019: 789 (2019) - [i26]Lilya Budaghyan, Tor Helleseth, Nikolay S. Kaleyski:
A new family of APN quadrinomials. IACR Cryptol. ePrint Arch. 2019: 994 (2019) - 2018
- [i25]Zibi Xiao, Xiangyong Zeng, Chunlei Li, Tor Helleseth:
Corrigendum to New Generalized Cyclotomic Binary Sequences of Period p2. CoRR abs/1807.03088 (2018) - [i24]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nikolay S. Kaleyski:
Changing Points in APN Functions. IACR Cryptol. ePrint Arch. 2018: 1217 (2018) - 2017
- [i23]Sondre Rønjom, Navid Ghaedi Bardeh, Tor Helleseth:
Yoyo Tricks with AES. IACR Cryptol. ePrint Arch. 2017: 980 (2017) - 2016
- [i22]Nian Li, Tor Helleseth:
New Permutation Trinomials From Niho Exponents over Finite Fields with Even Characteristic. CoRR abs/1606.03768 (2016) - [i21]Yongbo Xia, Nian Li, Xiangyong Zeng, Tor Helleseth:
On the Correlation Distribution for a Ternary Niho Decimation. CoRR abs/1612.06686 (2016) - [i20]Nian Li, Tor Helleseth:
Several Classes of Permutation Trinomials From Niho Exponents. CoRR abs/1612.08823 (2016) - [i19]Lilya Budaghyan, Claude Carlet, Tor Helleseth, Nian Li:
On the (non-)existence of APN (n, n)-functions of algebraic degree n. IACR Cryptol. ePrint Arch. 2016: 143 (2016) - [i18]Lilya Budaghyan, Tor Helleseth, Nian Li, Bo Sun:
Some Results on the Known Classes of Quadratic APN Functions. IACR Cryptol. ePrint Arch. 2016: 1183 (2016) - 2015
- [i17]Zhengchun Zhou, Nian Li, Cuiling Fan, Tor Helleseth:
Linear Codes with Two or Three Weights From Quadratic Bent Functions. CoRR abs/1506.06830 (2015) - 2014
- [i16]Lilya Budaghyan, Alexander Kholosha, Claude Carlet, Tor Helleseth:
Univariate Niho Bent Functions from o-Polynomials. CoRR abs/1411.2394 (2014) - 2013
- [i15]Cunsheng Ding, Tor Helleseth:
Optimal Ternary Cyclic Codes from Monomials. CoRR abs/1305.0061 (2013) - [i14]Honggang Hu, Shuai Shao, Guang Gong, Tor Helleseth:
The Proof of Lin's Conjecture via the Decimation-Hadamard Transform. CoRR abs/1307.0885 (2013) - [i13]Chunlei Li, Nian Li, Tor Helleseth, Cunsheng Ding:
On the weight distributions of several classes of cyclic codes from APN monomials. CoRR abs/1308.5885 (2013) - [i12]Nian Li, Chunlei Li, Tor Helleseth, Cunsheng Ding, Xiaohu Tang:
Optimal Ternary Cyclic Codes with Minimum Distance Four and Five. CoRR abs/1309.1218 (2013) - [i11]Gaofei Wu, Nian Li, Tor Helleseth, Yuqing Zhang:
More Classes of Complete Permutation Polynomials over $\F_q$. CoRR abs/1312.4716 (2013) - 2012
- [i10]Tor Helleseth, Alexander Kholosha, Sihem Mesnager:
Niho Bent Functions and Subiaco/Adelaide Hyperovals. CoRR abs/1210.4732 (2012) - 2010
- [i9]Mehdi M. Hassanzadeh, Tor Helleseth:
Algebraic Attack on the Alternating Step(r,s)Generator. CoRR abs/1006.1735 (2010) - [i8]Tor Helleseth, Alexander Kholosha:
Sequences, Bent Functions and Jacobsthal sums. CoRR abs/1006.3112 (2010) - [i7]Lilya Budaghyan, Tor Helleseth:
On isotopisms of commutative presemifields and CCZ-equivalence of functions. IACR Cryptol. ePrint Arch. 2010: 507 (2010) - 2009
- [i6]Carl Bracken, Tor Helleseth:
Triple-Error-Correcting BCH-Like Codes. CoRR abs/0901.1827 (2009) - [i5]Tor Helleseth, Alexander Kholosha:
New Binomial Bent Function over the Finite Fields of Odd Characteristic. CoRR abs/0907.3348 (2009) - [i4]Lilya Budaghyan, Tor Helleseth:
New commutative semifields defined by PN multinomials. IACR Cryptol. ePrint Arch. 2009: 53 (2009) - 2008
- [i3]Tor Helleseth, Alexander Kholosha:
On the Equation $x^{2^l+1}+x+a=0$ over $\mathrm{GF}(2^k)$ (Extended Version). CoRR abs/0810.4015 (2008) - 2007
- [i2]Tor Helleseth, Alexander Kholosha, Aina Johansen:
m-Sequences of Different Lengths with Four-Valued Cross Correlation. CoRR abs/0712.3757 (2007) - [i1]Tor Helleseth, Alexander Kholosha, Geir Jarle Ness:
Characterization of m-Sequences of Lengths $2^{2k}-1$ and $2^k-1$ with Three-Valued Crosscorrelation. CoRR abs/cs/0702139 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-30 00:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint