Bounds for Coding Theory over Rings | 0 | 0.34 | 2022 |
A deterministic algorithm for the discrete logarithm problem in a semigroup | 0 | 0.34 | 2022 |
Erasure Decoding Of Convolutional Codes Using First-Order Representations | 0 | 0.34 | 2021 |
Construction Of Ldpc Convolutional Codes Via Difference Triangle Sets | 0 | 0.34 | 2021 |
Construction of Rate (n — 1 )/n Non-Binary LDPC Convolutional Codes via Difference Triangle Sets | 0 | 0.34 | 2020 |
Encryption Scheme Based On Expanded Reed-Solomon Codes | 1 | 0.41 | 2019 |
On the Security of Generalized Reed-Solomon Code-Based Cryptosystems | 1 | 0.35 | 2019 |
On q-Steiner systems from rank metric codes. | 0 | 0.34 | 2018 |
Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes. | 1 | 0.38 | 2018 |
Generalization of the Ball-Collision Algorithm. | 1 | 0.36 | 2018 |
On the Genericity of Maximum Rank Distance and Gabidulin Codes. | 7 | 0.62 | 2018 |
Extension of Overbeck's attack for Gabidulin-based cryptosystems. | 0 | 0.34 | 2018 |
Preface to the special issue on network coding and designs. | 0 | 0.34 | 2018 |
A decoding algorithm for twisted Gabidulin codes. | 1 | 0.43 | 2017 |
Correction to "Cyclic Orbit Codes". | 0 | 0.34 | 2017 |
Fuzzy Authentication Using Rank Distance | 0 | 0.34 | 2017 |
Variations of the McEliece Cryptosystem. | 0 | 0.34 | 2016 |
An application of group theory in confidential network communications | 1 | 0.36 | 2016 |
An Active Attack on a Multiparty Key Exchange Protocol | 1 | 0.36 | 2015 |
Extension of Overbeck's Attack for Gabidulin Based Cryptosystems. | 3 | 0.53 | 2015 |
List Decoding of Lifted Gabidulin Codes via the Plücker Embedding | 0 | 0.34 | 2013 |
Using Ldgm Codes And Sparse Syndromes To Achieve Digital Signatures | 8 | 0.58 | 2013 |
On Burst Error Correction and Storage Security of Noisy Data | 1 | 0.38 | 2012 |
Decoding of Subspace Codes, a Problem of Schubert Calculus over Finite Fields | 2 | 0.38 | 2012 |
Subspace Fuzzy Vault | 0 | 0.34 | 2012 |
New Improvements on the Echelon-Ferrers Construction | 14 | 0.65 | 2011 |
On fuzzy syndrome hashing with LDPC coding | 5 | 0.53 | 2011 |
Managing key multicasting through orthogonal systems | 1 | 0.37 | 2011 |
Polynomial evaluation over finite fields: new algorithms and complexity bounds | 2 | 0.49 | 2011 |
Coding Theory (Dagstuhl Seminar 11461). | 0 | 0.34 | 2011 |
Enhanced public key security for the McEliece cryptosystem | 23 | 0.95 | 2011 |
Efficient evaluation of polynomials over finite fields | 0 | 0.34 | 2011 |
Coding Solutions For The Secure Biometric Storage Problem | 4 | 0.50 | 2007 |
Geometrical and Numerical Design of Structured Unitary Space–Time Constellations | 8 | 0.59 | 2006 |
Strongly-MDS convolutional codes | 23 | 1.08 | 2006 |
Upper bound analysis of diversity for unitary space time constellations | 0 | 0.34 | 2004 |
The Multiplicative Inverse Eigenvalue Problem over an Algebraically Closed Field | 0 | 0.34 | 2001 |
Constructions of MDS-convolutional codes | 34 | 1.87 | 2001 |