Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of a new instance of McEliece cryptosystem based on QC-LDPC Codes., and . ISIT, page 2591-2595. IEEE, (2007)On the error probability of short concatenated polar and cyclic codes with interleaving., , , and . ISIT, page 1858-1862. IEEE, (2017)A class of punctured simplex codes which are proper for error detection, , , and . CoRR, (2011)Low-power Secret-key Agreement over OFDM, , , , , , , and . CoRR, (2013)Resource Allocation for Secure Gaussian Parallel Relay Channels with Finite-Length Coding and Discrete Constellations., , and . CoRR, (2018)Advanced coding schemes against jamming in telecommand links., , , , , , and . CoRR, (2013)Reproducible Codes and Cryptographic Applications., , and . IACR Cryptology ePrint Archive, (2018)Algorithmically generated malicious domain names detection based on n-grams features., , , and . Expert Syst. Appl., (2021)Resource allocation for secure Gaussian parallel relay channels with finite-length coding and discrete constellations., , and . EURASIP J. Wirel. Commun. Netw., (2019)Analysis and performance evaluation of new coding options for space telecommand links - part II: jamming channels., , , , , and . Int. J. Satell. Commun. Netw., 33 (6): 527-542 (2015)