Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function., , , and . Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 232-249. Springer, (2002)Generalized coset schemes for the wire-tap channel: application to biometrics., and . ISIT, page 46. IEEE, (2004)Universally Secure Network Coding with feedback., and . ISIT, page 2339-2343. IEEE, (2016)Multilevel expander codes., and . ISIT, page 1315-1319. IEEE, (2005)Concatenated codes: serial and parallel., and . IEEE Trans. Inf. Theory, 51 (5): 1625-1634 (2005)Error exponents of expander codes., and . IEEE Trans. Inf. Theory, 48 (6): 1725-1729 (2002)Quantum Tanner codes., and . FOCS, page 872-883. IEEE, (2022)A Worst-Case Analysis of a Renormalisation Decoder for Kitaev's Toric Code., and . ISIT, page 625-629. IEEE, (2023)Multilevel expander codes., and . Algebraic Coding Theory and Information Theory, volume 68 of DIMACS Series in Discrete Mathematics and Theoretical Computer Science, page 69-84. DIMACS/AMS, (2003)Multidimensional reconciliation for continuous-variable quantum key distribution., , , , and . ISIT, page 1020-1024. IEEE, (2008)