Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Constructions of Fast-Decodable Distributed Space-Time Codes., , and . ICMCTA, volume 3 of CIM Series in Mathematical Sciences, page 43-51. Springer, (2014)Improved user-private information retrieval via finite geometry., , , , , and . Des. Codes Cryptogr., 87 (2-3): 665-677 (2019)Improved Private and Secure Distributed Matrix Multiplication., and . ISIT, page 1859-1864. IEEE, (2021)Private Information Retrieval from Colluding and Byzantine Servers with Binary Reed-Muller Codes., , , and . ISIT, page 2839-2844. IEEE, (2022)Secure Distributed Gram Matrix Multiplication., and . ITW, page 192-197. IEEE, (2023)Alphabet-Dependent Bounds for Linear Locally Repairable Codes Based on Residual Codes., , , and . CoRR, (2018)Capacity and Security of Heterogeneous Distributed Storage Systems, , , and . CoRR, (2012)Rotating Non-Uniform and High-Dimensional Constellations Using Geodesic Flow on Lie Groups., and . CoRR, (2013)Constructions and Properties of Linear Locally Repairable Codes., , , and . CoRR, (2014)Private Information Retrieval from Coded Databases with Colluding Servers., , , and . SIAM J. Appl. Algebra Geom., 1 (1): 647-664 (2017)