Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Highly Regular Architectures for Finite Field Computation Using Redundant Basis., , and . CHES, volume 1717 of Lecture Notes in Computer Science, page 269-279. Springer, (1999)Conditionally Verifiable Signature., and . INDOCRYPT, volume 4329 of Lecture Notes in Computer Science, page 206-220. Springer, (2006)Decentralized Coded Caching Without File Splitting., , and . CoRR, (2017)A note on diagonal and Hermitian surfaces., , and . CoRR, (2014)Windowed Erasure Codes., and . ISIT, page 509-513. IEEE, (2006)Analytical modeling of RFID Generation-2 protocol using absorbing Markov chain theorem., , and . GLOBECOM, page 385-390. IEEE, (2012)Explicit Factorization of x2k + 1 over Fp with Prime p= 3 mod 4., , and . Appl. Algebra Eng. Commun. Comput., (1993)Algebraic-Geometry Codes., , , and . IEEE Trans. Inf. Theory, 44 (6): 2596-2618 (1998)Basic coding properties and bounds., and . Handbook of Finite Fields, CRC Press, (2013)Decoding the binary Golay code with miracle octad generators (Corresp.)., and . IEEE Trans. Inf. Theory, 24 (2): 261-264 (1978)