Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New quasi-cyclic LDPC codes with girth at least eight based on Sidon sequences., , and . ISTC, page 31-35. IEEE, (2012)Convergence rates comparison of sum-product decoding of RA codes under different message-passing schedules., , and . IEEE Communications Letters, 9 (6): 543-545 (2005)A Simple and Efficient Approach to Verfying Cryptographic Protocols., and . SEC, volume 175 of IFIP Conference Proceedings, page 191-199. Kluwer, (2000)Design of Quasi-Cyclic Cycle LDPC Codes over GF(q)., , , and . IEICE Trans. Commun., 95-B (3): 983-986 (2012)Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards., , , and . AINA Workshops (2), page 448-452. IEEE Computer Society, (2007)New Traitor Tracing Scheme against Anonymous Attack., , and . ICICIC (1), page 389-392. IEEE Computer Society, (2006)A New ID-Based Broadcast Encryption Scheme., , , and . ATC, volume 4158 of Lecture Notes in Computer Science, page 487-492. Springer, (2006)Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing., , and . ICCSA (4), volume 3483 of Lecture Notes in Computer Science, page 1046-1054. Springer, (2005)A New Low Complexity Iterative Detection for Space-Time Bit-Interleaved Coded Modulation Schemes., , , and . AINA, page 869-874. IEEE Computer Society, (2008)An AES S-Box to Increase Complexity and Cryptographic Analysis., , , and . AINA, page 724-728. IEEE Computer Society, (2005)