From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

s-extremal additive F4 codes., , , и . Adv. in Math. of Comm., 1 (1): 111-130 (2007)Digital Signature Schemes from Codes., и . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Classification of extremal and $s$-extremal binary self-dual codes of length 38, , , , и . CoRR, (2011)Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes., , , , и . CoRR, (2013)Cryptanalysis of a code-based one-time signature., и . IACR Cryptology ePrint Archive, (2018)On Quadratic Double Circulant Codes over Fields.. Electron. Notes Discret. Math., (2001)On the non Z4-linearity of certain good binary codes., и . IEEE Trans. Inf. Theory, 45 (5): 1674-1677 (1999)On the Hardness of the Decoding and the Minimum Distance Problems for Rank Codes., и . IEEE Trans. Inf. Theory, 62 (12): 7245-7252 (2016)Extended Low Rank Parity Check Codes and Their Efficient Decoding for Multisource Wireless Sensor Networks., , , , и . UNet, том 12293 из Lecture Notes in Computer Science, стр. 41-55. Springer, (2019)Efficient image tampering localization using semi-fragile watermarking and error control codes., , , , и . Signal Process., (2022)