Chris Charnes

According to our database1, Chris Charnes authored at least 24 papers between 1992 and 2008.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2008
The eight variable homogeneous degree three bent functions.
J. Discrete Algorithms, 2008

2007
An Algebraic Analysis of Trivium Ciphers based on the Boolean Satisfiability Problem.
IACR Cryptol. ePrint Arch., 2007

2005
Combinatorial aspects of jump codes.
Discret. Math., 2005

MRD Hashing.
Des. Codes Cryptogr., 2005

2004
Homogeneous bent functions of degree <i>n</i> in <i>2n</i> variables do not exist for <i>n</i>ge3.
Discret. Appl. Math., 2004

2003
A New Class of Designs Which Protect against Quantum Jumps.
Des. Codes Cryptogr., 2003

2002
Homogeneous Bent Functions, Invariants, and Designs.
Des. Codes Cryptogr., 2002

2001
The eight dimensional ovoids over GF(5).
Math. Comput., 2001

A lattice-based McEliece scheme for encryption and signature.
Electron. Notes Discret. Math., 2001

Broadcast anti-jamming systems.
Comput. Networks, 2001

On Homogeneous Bent Functions.
Proceedings of the Applied Algebra, 2001

1999
Broadcast anti-jamming systems.
Proceedings of the IEEE International Conference on Networks 1999, 1999

Crypto Topics and Applications II.
Proceedings of the Algorithms and Theory of Computation Handbook., 1999

Crypto Topics and Applications I.
Proceedings of the Algorithms and Theory of Computation Handbook., 1999

1998
The translation planes of order 49 and their automorphism groups.
Math. Comput., 1998

Hadamard Matrices, Self-Dual Codes Over the Integers Modulo 4 and their Gray Images.
Proceedings of the Sequences and their Applications, 1998

MRD Hashing.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

1997
Secret sharing in hierarchical groups.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
Cryptography based on transcendental numbers.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

Cryptosystems for hierarchical groups.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1994
Comments on Soviet Encryption Algorithm.
Proceedings of the Advances in Cryptology, 1994

Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
Proceedings of the CCS '94, 1994

Attacking the SL<sub>2</sub> Hashing Scheme.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1992
Linear Nonequivalence versus Nonlinearity.
Proceedings of the Advances in Cryptology, 1992


  Loading...