From post

A Cellular Automata Based Approach for Generation of Large Primitive Polynomial and Its Application to RS-Coded MPSK Modulation.

, , и . ACRI, том 4173 из Lecture Notes in Computer Science, стр. 204-214. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Algorithmic study on liar's vertex-edge domination problem., и . CoRR, (2023)A Cellular Automata Based Approach for Generation of Large Primitive Polynomial and Its Application to RS-Coded MPSK Modulation., , и . ACRI, том 4173 из Lecture Notes in Computer Science, стр. 204-214. Springer, (2006)On k-vertex-edge domination of graph., и . CoRR, (2023)Reliable and secure broadcast communication over resource constrained systems., , , и . VALUETOOLS, стр. 25. ICST/ACM, (2009)New algorithms for batch verification of standard ECDSA signatures., , , , , и . J. Cryptographic Engineering, 4 (4): 237-258 (2014)Autonomous Certification with List-Based Revocation for Secure V2V Communication., , , , и . ICISS, том 7671 из Lecture Notes in Computer Science, стр. 208-222. Springer, (2012)A Near Optimal S-Box Design., , , и . ICISS, том 4812 из Lecture Notes in Computer Science, стр. 77-90. Springer, (2007)Strengthening NLS Against Crossword Puzzle Attack., , , и . ACISP, том 4586 из Lecture Notes in Computer Science, стр. 29-44. Springer, (2007)Batch Verification of ECDSA Signatures., , , , , и . AFRICACRYPT, том 7374 из Lecture Notes in Computer Science, стр. 1-18. Springer, (2012)