Author of the publication

Toward optimizing cauchy matrix for cauchy reed-solomon code.

, , , , and . IEEE Communications Letters, 13 (8): 603-605 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity Based Conference Key Distribution Scheme from Parings., , , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 845-852. Springer, (2005)Linkable Ring Signatures from Linear Feedback Shift Register., , , and . EUC Workshops, volume 4809 of Lecture Notes in Computer Science, page 716-727. Springer, (2007)Toward optimizing cauchy matrix for cauchy reed-solomon code., , , , and . IEEE Communications Letters, 13 (8): 603-605 (2009)YI Cloud: Improving user privacy with secret key recovery in cloud storage., , , , and . SOSE, page 268-272. IEEE Computer Society, (2011)Extended PEG Algorithm for High Rate LDPC Codes., , , , and . ISPA, page 494-498. IEEE Computer Society, (2009)(Almost) Optimal Constructions of UOWHFs from 1-to-1 and Known-Regular One-way Functions., , , and . IACR Cryptology ePrint Archive, (2014)Basing Diversified Services of Complex IIoT Applications on Scalable Block Graph Platform., , , and . IEEE Access, (2019)A Generic Construction for Instrusion-Resilient Signatures from Linear Feedback Shift Register., , , and . J. Inf. Sci. Eng., 24 (5): 1347-1360 (2008)Identity-Based Parallel Key-Insulated Signature Without Random Oracles., , , and . J. Inf. Sci. Eng., 24 (4): 1143-1157 (2008)Robust password changing and DoS resilience for human-centric password authentication., , , , and . Security and Communication Networks, 7 (10): 1552-1559 (2014)