Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Code-Based Cryptosystem Based on Binary Image of Generalized Reed-Solomon Code., , and . REDUNDANCY, page 66-69. IEEE, (2021)Concatenated codes with convolutional inner codes., , and . IEEE Trans. Inf. Theory, 34 (5): 1217-1225 (1988)On the multiple threshold decoding of LDPC codes over GF(q)., and . ISIT, page 2673-2677. IEEE, (2015)On the capacity of a multiple-access vector adder channel., and . Probl. Inf. Transm., 50 (2): 133-143 (2014)Partial Unit Memory Codes on the Base of Subcodes of Hadamard Codes., and . Error Control, Cryptology, and Speech Compression, volume 829 of Lecture Notes in Computer Science, page 69-73. Springer, (1993)On the user capacity for a multiple-access system in a vector disjunctive channel with errors., , and . Probl. Inf. Transm., 49 (4): 308-321 (2013)Low-density parity-check codes based on steiner systems and permutation matrices., and . Probl. Inf. Transm., 49 (4): 333-347 (2013)Asymptotically Good Woven Codes with Fixed Constituent Convolutional Codes., , , and . ISIT, page 2326-2330. IEEE, (2007)Asymptotic performances of woven graph codes., , , and . ISIT, page 1025-1029. IEEE, (2008)Unequal error protection for convolutional codes., , and . IEEE Trans. Inf. Theory, 52 (2): 700-708 (2006)