Author of the publication

Determination of the Local Weight Distribution of Binary Linear Block Codes.

, and . IEEE Trans. Inf. Theory, 52 (10): 4444-4454 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Model Extraction Attacks against Recurrent Neural Networks., , and . CoRR, (2020)Extraction of RNA from an intact single plant cell with cell wall using focused electric field., , , , , and . MHS, page 1-2. IEEE, (2019)Suboptimum decoding of decomposable block codes., , , , and . IEEE Trans. Inf. Theory, 40 (5): 1392-1405 (1994)Verification of the Security against Inference Attacks on XML Databases., , , , and . IEICE Trans. Inf. Syst., 92-D (5): 1022-1032 (2009)On correctable errors of binary linear codes., and . IEEE Trans. Inf. Theory, 56 (6): 2537-2548 (2010)Determination of the Local Weight Distribution of Binary Linear Block Codes., and . IEEE Trans. Inf. Theory, 52 (10): 4444-4454 (2006)Tighter Reductions for Deterministic Identity-Based Signatures., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (1): 64-76 (2018)The Absolute Consistency Problem for Relational Schema Mappings with Functional Dependencies., , and . IEICE Trans. Inf. Syst., 103-D (11): 2278-2288 (2020)SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative Learning., , , and . DPM/CBT@ESORICS, volume 13140 of Lecture Notes in Computer Science, page 89-105. Springer, (2021)ISDSR: Secure DSR with ID-based Sequential Aggregate Signature., , , and . SECRYPT, page 376-387. SciTePress, (2016)