Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

s-extremal additive F4 codes., , , and . Adv. in Math. of Comm., 1 (1): 111-130 (2007)Distinguisher-Based Attacks on Public-Key Cryptosystems Using Reed-Solomon Codes., , , , and . CoRR, (2013)Weight enumerators of duadic and quadratic residue codes., , and . ISIT, page 485. IEEE, (2004)On Quadratic Double Circulant Codes over Fields.. Electron. Notes Discret. Math., (2001)On the non Z4-linearity of certain good binary codes., and . IEEE Trans. Inf. Theory, 45 (5): 1674-1677 (1999)Construction of new extremal unimodular lattices.. Eur. J. Comb., 25 (4): 549-564 (2004)Extended Low Rank Parity Check Codes and Their Efficient Decoding for Multisource Wireless Sensor Networks., , , , and . UNet, volume 12293 of Lecture Notes in Computer Science, page 41-55. Springer, (2019)Digital Signature Schemes from Codes., and . Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Code-based Signatures from New Proofs of Knowledge for the Syndrome Decoding Problem., , , and . CoRR, (2022)Improvements of Algebraic Attacks for Solving the Rank Decoding and MinRank Problems., , , , , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 507-536. Springer, (2020)