Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the minimum distance of ternary cyclic codes., and . IEEE Trans. Inf. Theory, 39 (2): 409-422 (1993)An addition to the paper: A polarisation based visual crypto system and its secret sharing schemes., , , and . IACR Cryptology ePrint Archive, (2002)Protection of Software Algorithms Executed on Secure Microprocessors., , , and . CARDIS, (1996)On the minimum distance of cyclic codes., and . IEEE Trans. Inf. Theory, 32 (1): 23-40 (1986)Construction of strongly regular graphs, two-weight codes and partial geometries by finite fields., and . Combinatorica, 1 (1): 63-73 (1981)Recent Results on Covering Problems.. AAECC, volume 357 of Lecture Notes in Computer Science, page 7-21. Springer, (1988)A course in combinatorics., and . Cambridge University Press, (1992)Order Functions and Evaluation Codes., , and . AAECC, volume 1255 of Lecture Notes in Computer Science, page 138-150. Springer, (1997)Generalized quadratic residue codes., and . IEEE Trans. Inf. Theory, 24 (6): 730-737 (1978)Generalized Reed - Solomon codes from algebraic geometry., and . IEEE Trans. Inf. Theory, 33 (3): 305-309 (1987)