Author of the publication

An erasures-and-errors decoding algorithm for Goppa codes (Corresp.).

, , , and . IEEE Trans. Inf. Theory, 22 (2): 238-241 (1976)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modified product codes., , , and . IEEE Trans. Inf. Theory, 30 (2): 299-305 (1984)Security of a Class of Knapsack Public-Key Cryptosystems against Low-Density Attack., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (10): 2889-2892 (2008)A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 87-A (1): 102-109 (2004)A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I).. IACR Cryptology ePrint Archive, (2011)New Classes of Public Key Cryptosystems over F28 Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)ΣΠPKC.. IACR Cryptology ePrint Archive, (2014)A New Class of Product-sum Type Public Key Cryptosystem, K(V)ΣΠPKC, Constructed Based on Maximum Length Code.. IACR Cryptology ePrint Archive, (2013)Constructions of A Large Class of Optimum Constant Weight Codes over F_2., and . CoRR, (2014)Exponential Error Bounds and Decoding Complexity for Block Codes Constructed by Unit Memory Trellis Codes of Branch Length Two., , , and . CISS, page 1-6. IEEE, (2019)A New Traitor Tracing., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (2): 481-484 (2002)A Method for Solving Key Equation for Decoding Goppa Codes, , , and . Inf. Control., 27 (1): 87-99 (January 1975)