Author of the publication

Soft Decoding Based on Ordered Subsets of Verification Equations of Turbo-Productive Codes.

, , , , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 873-884. CEUR-WS.org, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biometric Images Attacks Detecting Using Convolutional Neural Networks., , , , , and . CybHyg, volume 2654 of CEUR Workshop Proceedings, page 107-121. CEUR-WS.org, (2019)Full Non-Binary Constant-Weight Codes., , , , and . SN Comput. Sci., 2 (4): 337 (2021)Methods for Comparing Numbers in Non-Positional Notation of Residual Classes., , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 581-595. CEUR-WS.org, (2019)Merkle Trees in Blockchain: A Study of Collision Probability and Security Implications., , , , , and . CoRR, (2024)Soft Decoding Based on Ordered Subsets of Verification Equations of Turbo-Productive Codes., , , , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 873-884. CEUR-WS.org, (2019)Discrete Signals with Special Correlation Properties., , , , , and . CMIS, volume 2353 of CEUR Workshop Proceedings, page 618-629. CEUR-WS.org, (2019)Enhanced Security and Efficiency in Blockchain with Aggregated Zero-Knowledge Proof Mechanisms., , , , , and . CoRR, (2024)Information Hiding Using 3D-Printing Technology., , , , , and . IDAACS, page 701-706. IEEE, (2019)The data errors control in the modular number system based on the nullification procedure., , , and . CMIS, volume 2608 of CEUR Workshop Proceedings, page 580-593. CEUR-WS.org, (2020)Data Hiding Scheme Based on Spread Sequence Addressing., , , and . CITRisk, volume 2805 of CEUR Workshop Proceedings, page 44-58. CEUR-WS.org, (2020)