Now showing items 19-21 of 57

    • An Enciphering Module for Multics 

      Benedict, G. Gordon (1974-07)
      Recently IBM Corporation has declassified an algorithm for encryption usable for computer-to-computer or computer-to-terminal communications. Their algorithm was implemented in a hardware device called Lucifer. A software ...
    • Complete Classification of (24,12) and (22,11) Self-dual Codes 

      Pless, Vera; Sloane, N.J.A. (1974-06)
      A complete classification is given of all [22, 11] and [24, 12] self-dual codes. For each code we give the order of its group, the number of codes equivalent to it, and its weight distribution. There is a unique [24, 12, ...
    • The Reduction Method for Establishing Lower Bounds on the Number of Additions 

      Kedem, Zvi M. (1974-06)
      A method for establishing lower bounds on the number of multiplications and divisions has been developed by Pan, Winograd and Strassen. A similar method is developed for establishing lower bounds on the number of additions ...