Author of the publication

The construction of LDPC codes based on the subspaces of singular linear space over finite field.

, , , , and . Discrete Math., Alg. and Appl., 8 (4): 1650073:1-1650073:10 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Approach for Fuzzy Connected Image Segmentation., , , and . ICFIE, volume 40 of Advances in Soft Computing, page 89-97. Springer, (2007)A fully distributed deployment algorithm for underwater strong k-barrier coverage using mobile sensors., , , and . IJDSN, (2019)Cryptanalysis of Multi-Prime \varPhi -Hiding Assumption., , , , , and . ISC, volume 9866 of Lecture Notes in Computer Science, page 440-453. Springer, (2016)Research on the Uncertainty Decision Model of the Regional Collaborative Innovation System Based on an Improved Ant Colony Algorithm., and . Scientific Programming, (2016)Cryptanalysis and Improved Construction of a Group Key Agreement for Secure Group Communication., , , , and . ISC, volume 9866 of Lecture Notes in Computer Science, page 48-58. Springer, (2016)Modelling of the Slope Solute Loss Based on Fuzzy Neural Network Model., , , and . Comput. Syst. Sci. Eng., 42 (2): 677-688 (2022)A cluster validity index for fuzzy clustering., , , and . Inf. Sci., 178 (4): 1205-1218 (2008)A Distributed Algorithm for Constructing Underwater Strong k-Barrier Coverage., , , , and . IoTaaS, volume 271 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 179-194. Springer, (2018)Certifying multi-power RSA., , and . IET Information Security, 13 (4): 330-335 (2019)Cryptanalysis of Multi-Prime Φ-Hiding Assumption., , , , , and . IACR Cryptology ePrint Archive, (2016)