Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extended Low Rank Parity Check Codes and Their Efficient Decoding for Multisource Wireless Sensor Networks., , , , and . UNet, volume 12293 of Lecture Notes in Computer Science, page 41-55. Springer, (2019)Efficient image tampering localization using semi-fragile watermarking and error control codes., , , , and . Signal Process., (2022)Construction of Extremal Type II Codes over Z., and . Des. Codes Cryptogr., 16 (3): 257-269 (1999)Weight enumerators of duadic and quadratic residue codes., , and . ISIT, page 485. IEEE, (2004)Construction of new extremal unimodular lattices.. Eur. J. Comb., 25 (4): 549-564 (2004)Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems., , , , , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 507-536. Springer, (2020)Quadratic Double Circulant Codes over Fields.. J. Comb. Theory, Ser. A, 97 (1): 85-107 (2002)s-extremal additive F4 codes., , , and . Adv. in Math. of Comm., 1 (1): 111-130 (2007)Digital Signature Schemes from Codes., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Classification of extremal and $s$-extremal binary self-dual codes of length 38, , , , and . CoRR, (2011)