Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

s-extremal additive F4 codes., , , and . Adv. in Math. of Comm., 1 (1): 111-130 (2007)Digital Signature Schemes from Codes., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Classification of extremal and $s$-extremal binary self-dual codes of length 38, , , , and . CoRR, (2011)Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes., , , , and . CoRR, (2013)Cryptanalysis of a code-based one-time signature., and . IACR Cryptology ePrint Archive, (2018)On Quadratic Double Circulant Codes over Fields.. Electron. Notes Discret. Math., (2001)On the non Z4-linearity of certain good binary codes., and . IEEE Trans. Inf. Theory, 45 (5): 1674-1677 (1999)On the Hardness of the Decoding and the Minimum Distance Problems for Rank Codes., and . IEEE Trans. Inf. Theory, 62 (12): 7245-7252 (2016)Extended Low Rank Parity Check Codes and Their Efficient Decoding for Multisource Wireless Sensor Networks., , , , and . UNet, volume 12293 of Lecture Notes in Computer Science, page 41-55. Springer, (2019)Efficient image tampering localization using semi-fragile watermarking and error control codes., , , , and . Signal Process., (2022)