Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Linear-Time Maximum Likelihood Decoding of Surface Codes over the Quantum Erasure Channel., and . CoRR, (2017)LDA Lattices Without Dithering Achieve Capacity on the Gaussian Channel., , and . CoRR, (2016)A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function., , , and . Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 232-249. Springer, (2002)Generalized coset schemes for the wire-tap channel: application to biometrics., and . ISIT, page 46. IEEE, (2004)Multilevel expander codes., and . ISIT, page 1315-1319. IEEE, (2005)Universally Secure Network Coding with feedback., and . ISIT, page 2339-2343. IEEE, (2016)On expander codes.. IEEE Trans. Inf. Theory, 47 (2): 835-837 (2001)Concatenated codes: serial and parallel., and . IEEE Trans. Inf. Theory, 51 (5): 1625-1634 (2005)Upper Bounds on the Size of Grain-Correcting Codes., and . IEEE Trans. Inf. Theory, 60 (8): 4699-4709 (2014)Error exponents of expander codes., and . IEEE Trans. Inf. Theory, 48 (6): 1725-1729 (2002)