Author of the publication

Non-Uniform PPM and Context Tree Models.

, , and . Data Compression Conference, page 279-288. IEEE Computer Society, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Keyed logic BIST for Trojan detection in SoC., , , and . ISSoC, page 1-4. IEEE, (2014)A Digital Signature Scheme Based on Random Error-Correcting Codes., , and . IMACC, volume 1355 of Lecture Notes in Computer Science, page 161-167. Springer, (1997)On A²-Codes Including Arbiter's Attacks., and . EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 456-460. Springer, (1994)Multialphabet coding with separate alphabet description., , and . SEQUENCES, page 56-65. IEEE, (1997)On the Use of the Binary Multiplying Channel in a Private Communication System.. EUROCRYPT, volume 209 of Lecture Notes in Computer Science, page 339-348. Springer, (1984)Unconditionally Secure Group Authentication., , and . Des. Codes Cryptogr., 14 (3): 281-296 (1998)On the Relation between A-Codes and Codes Correcting Independent Errors., , and . EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 1-11. Springer, (1993)A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers., , and . FSE, volume 1978 of Lecture Notes in Computer Science, page 181-195. Springer, (2000)Weighting of Double Exponential Distributed Data in Lossless Image Compression., and . Data Compression Conference, page 543. IEEE Computer Society, (1998)Windmill Generators: A Generalization and an Observation of How Many There Are., and . EUROCRYPT, volume 330 of Lecture Notes in Computer Science, page 325-330. Springer, (1988)