Author of the publication

Theoretic approach to BP-based WBF decoding algorithm of LDPC codes.

, , and . ISWPC, page 1-4. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Design of traceable security system., , and . Appl. Math. Comput., 168 (2): 933-944 (2005)New bit-parallel systolic multipliers for a class of GF(2m)., , and . ISCAS (4), page 578-581. IEEE, (2001)Low-Complexity Bit-Parallel Systolic Multipliers over GF(2m)., , , and . SMC, page 1160-1165. IEEE, (2006)Word-Based AES Encryption Without Data Expansion., , and . J. Inf. Sci. Eng., 32 (4): 849-861 (2016)Low-Complexity Bit-Parallel Systolic Montgomery Multipliers for Special Classes of GF(2m)., , , and . IEEE Trans. Computers, 54 (9): 1061-1070 (2005)Improvement of turbo decoding using cross-entropy., , and . Comput. Commun., 32 (6): 1034-1038 (2009)A conference key distribution system based on the Lagrange interpolating polynomial., , , and . INFOCOM, page 1092-1094. IEEE, (1988)Combined circuit architecture for computing normal basis and montgomery multiplications over GF(2m)., , and . Mobility Conference, page 46. ACM, (2008)A Mobile RFID-based Mutual Authentication Protocol using Elliptic Curve Cryptography for Security Patrolling Application., , , and . RFIDSec Asia, volume 8 of Cryptology and Information Security Series, page 63-71. IOS Press, (2012)A New Method for Evaluating Error Magnitudes of Reed-Solomon Codes., , and . IEEE Communications Letters, 18 (2): 340-343 (2014)