- S. S. Agaian. Hadamard Matrices and Their Applications. New York: Springer-Verlag, 1985.
- A. Aldroubi, D. Larson, W. S. Tang, and E. Weber. "Geometric Aspects of Frame Representations of Abelian Groups." Trans. Amer. Math. Soc. 356:12 (2004), 4767–4786.
- J. Benedetto and M. Fickus. "Finite Normalized Tight Frames." Adv. Comput. Math. 18:2–4 (2003), 357–385.
- P. Casazza. "The Art of Frame Theory." Taiwanese Math. J. 4:2 (2000), 129–201.
- P. Casazza and J. Kovacević. "Uniform Tight Frames for Signal Processing and Communications." SPIE Proc. 4478 (2001), 129–135.
- F. Chabaud. "On the Security of Some Cryptosystems Based on Error-Correcting Codes." In Advances in Cryptology – EUROCRYPT '94,pp. 131–139, Lecture Notes in Computer Science, 950. Berlin: Springer-Verlag, 1995.
- P. Delsarte and J. M. Goethals. "Tri-Weight Codes and Generalized Hadamard Matrices." Information and Control 15 (1969), 196–206.
- K. Dykema, D. Freeman, K. Kornelson, D. Larson, M. Ordower, and E.Weber. "Ellipsoidal Tight Frames and Projection Decompositions of Operators." Illinois J. Math. 48:2 (2004), 477–489.
- D. Han and D. Larson. "Frames, Bases, and Group Representations." Mem. Amer. Math. Soc. 147:697 (2000), 94 pp.
- J. H. van Lint. A Course in Combinatorics. Cambridge, UK: Cambridge University Press, 1992.
- A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. Orlando, FL: CRC Press, 1997.
- J. R. Miotke and L. Rebollo- Neira. "Oversampling of Fourier Coefficients for Hiding Messages." Appl. Comput. Harmon. Anal. 16:3 (2004), 203–207.
- W. D. Wallis. Combinatorics: Room Squares, Sum-Free Sets, Hadamard Matrices. Berlin: Springer- Verlag, 1972.
Encryption Schemes using Finite Frames and Hadamard Arrays
Reprints and Corporate Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
To request a reprint or corporate permissions for this article, please click on the relevant link below:
Academic Permissions
Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?
Obtain permissions instantly via Rightslink by clicking on the button below:
If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.
Related research
People also read lists articles that other readers of this article have read.
Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.
Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.