Browsing by Author LAM KWOK YAN,KARCH

Select a letter below to browse by last name or type
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Showing results 1 to 20 of 25  next >
Issue DateTitleAuthor(s)
Oct-1995A cardinalised binary representation for exponentiationLam, K.-Y. ; Sung, K. ; Hui, L.C.-K. 
2000A fast algorithm for determining the linear complexity of a sequence with period p n over G F (q)Xiao, G.; Wei, S.; Lam, K.Y. ; Imamura, K.
1999A generalization of algebraic-geometry codesXing, C. ; Niederreiter, H.; Lam, K.Y. 
2000Cnstructions of authentication codes from algebraic curves over finite fieldsXing, C. ; Wang, H. ; Lam, K.Y. ; Xing, C.P. 
1999Construction and enumeration of all binary duadic codes of length pmDing, C. ; Lam, K.Y. ; Xing, C. 
1999Constructions of algebraic-geometry codesXing, C. ; Niederreiter, H. ; Lam, K.Y. 
1999Constructions of sequences with almost perfect linear complexity profile from curves over finite fieldsXing, C. ; Niederreiter, H.; Lam, K.Y. ; Ding, C. 
Aug-1996Designing a system infrastructure for distributed programsLam, K.-Y. ; Hui, L.C.-K. 
2000Duadic sequences of prime lengthsDing, C. ; Helleseth, T.; Lam, K.Y. 
8-Dec-1994Efficiency of SS(l) square-and-multiply exponentiation algorithmsLam, K.-Y. ; Hui, L.C.K. 
Oct-1996Efficient nearer-ancestor algorithm for network routingLam, K.-Y. ; Hui, L.C.K. 
1-Jan-1994Fast square-and-multiply exponentiation for RSAHui, L.C.K. ; Lam, K.-Y. 
6-Nov-1997Hash function based on block cipherYi, X.; Lam, K.Y. 
Apr-1997Implementing a highly available network directory serviceLam, K.-Y. ; Salkield, T.
1999Mobile IP registration protocol: a security attack and new secure minimal public-key based authenticationSufatrio, Kwok Yan Lam 
Dec-1995Multivariate data analysis software for enhancing system securityLam, K.-Y. ; Hui, L. ; Chung, S.-L. 
1999New construction of algebraic-geometry codesNiederreiter, H.; Xing, C. ; Lam, K.Y. 
2003On identification secret sharing schemesCai, N.; Lam, K.Y. 
Oct-1998On the Efficient Implementation of Fair Non-repudiationYou, C.-H.; Zhou, J.; Lam, K.-Y. 
Dec-1995Replay tolerance of authentication protocolsLam, K.-Y.