Exponential Error Bounds and Decoding Complexity for Block Codes Constructed by Unit Memory Trellis Codes of Branch Length Two | 0 | 0.34 | 2019 |
A Simple Scheme, for Strengthening Product-sum Type PKC. | 0 | 0.34 | 2015 |
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code. | 0 | 0.34 | 2015 |
Hybrid Inter-Organization Cryptosystem Using Elgamal Cryptosystem | 0 | 0.34 | 2015 |
New Classes of Public Key Cryptosystems over F28 Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)Σ ΠPKC. | 0 | 0.34 | 2014 |
A new class of system oriented PKC, K(I)SOPKC. | 0 | 0.34 | 2014 |
A knapsack public-key cryptosystem using two random sequences | 0 | 0.34 | 2014 |
New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over 픽2. | 0 | 0.34 | 2014 |
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems -. | 0 | 0.34 | 2013 |
Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC. | 0 | 0.34 | 2013 |
A New Class of Product-sum Type Public Key Cryptosystem, K(V)$\Sigma\Pi$ PKC, Constructed Based on Maximum Length Code. | 0 | 0.34 | 2013 |
Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)$\Sigma\Pi$PKC, Constructed Based on Maximum Length Code. | 0 | 0.34 | 2012 |
Security analysis of shifted odd knapsack public key encryption scheme | 0 | 0.34 | 2012 |
A New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0. | 1 | 0.37 | 2011 |
A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation. | 0 | 0.34 | 2011 |
Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0. | 2 | 0.40 | 2011 |
A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I). | 0 | 0.34 | 2011 |
A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)Sigma PKC. | 0 | 0.34 | 2011 |
A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme. | 3 | 0.49 | 2010 |
A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0. | 1 | 0.38 | 2010 |
An ID-based key sharing scheme based on discrete logarithm problem over a product of three primes | 0 | 0.34 | 2010 |
A knapsack cryptosystem based on multiple knapsacks | 1 | 0.35 | 2010 |
Construction of A New Class of Linear Multivariate Public Key Cryptosystem, K(I)SE(1)PKC. | 0 | 0.34 | 2009 |
Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes. | 0 | 0.34 | 2009 |
Proposal of PPS Multivariate Public Key Cryptosystems. | 0 | 0.34 | 2009 |
Security of a Class of Knapsack Public-Key Cryptosystems against Low-Density Attack | 0 | 0.34 | 2008 |
On biometric encryption using fingerprint and it's security evaluation | 2 | 0.38 | 2008 |
A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA. | 0 | 0.34 | 2007 |
Safety of templates in biometric person authentication using error-correcting code | 2 | 0.40 | 2006 |
A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness | 3 | 0.52 | 2006 |
A Construction Of Public-Key Cryptosystem Based On Singular Simultaneous Equations | 23 | 1.90 | 2005 |
Meta Ring Signature. | 0 | 0.34 | 2005 |
A Construction Of Public Key Cryptosystem For Realizing Ciphertext Of Size 100 Bit And Digital Signature Scheme | 25 | 1.60 | 2004 |
A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme | 1 | 0.50 | 2003 |
A Construction Method for Picture Information Having a Recovery Function | 0 | 0.34 | 2002 |
Upper and Lower Bounds on Maximum Nonlinearity of n-input m-output Boolean Function | 2 | 0.48 | 2001 |
A multicast hybrid ARQ scheme using MDS codes and GMD decoding | 9 | 3.66 | 1995 |
Perfect staircase profile of linear complexity for finite sequences | 3 | 1.17 | 1992 |
Separate codes on type-II hybrid ARQ systems | 6 | 0.79 | 1988 |
Variance mismatch of vector quantizers | 2 | 0.47 | 1984 |
New decoding algorithm for Reed-Muller codes | 1 | 0.41 | 1982 |
An Improvement Of Error Exponents At Low Rates For The Generalized Version Of Concatenated Codes | 0 | 0.34 | 1981 |
Certain generalizations of concatenated codes--Exponential error bounds and decoding complexity | 6 | 33.94 | 1980 |
Superimposed concatenated codes (Corresp.) | 0 | 0.34 | 1980 |
Error statistics and construction of error correcting codes for differentially encoded CPSK channels (Corresp.) | 0 | 0.34 | 1978 |
A new class of asymptotically good codes beyond the Zyablov bound | 2 | 2.40 | 1978 |
Analysis of the fundamental error statistics in DPSK systems using a Markov chain model (Corresp.) | 1 | 0.48 | 1977 |
Further results on Goppa codes and their applications to constructing efficient binary codes | 25 | 5.75 | 1976 |
New classes of binary codes constructed on the basis of concatenated codes and product codes | 10 | 19.43 | 1976 |
A Method for Solving Key Equation for Decoding Goppa Codes | 151 | 54.75 | 1975 |