Author of the publication

On the Security of Digital Signature Schemes Based on Error-Correcting Codes.

, , and . Des. Codes Cryptogr., 28 (2): 187-199 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Two observations concerning optimum cyclic burst-correcting codes., and . Discrete Mathematics, 184 (1-3): 111-120 (1998)Multiple burst-correcting array codes., , and . IEEE Trans. Information Theory, 34 (5): 1061-1066 (1988)Approaching capacity by equiprobable signaling on the Gaussian channel., and . IEEE Trans. Information Theory, 39 (5): 1714-1716 (1993)Two-dimensional burst identification codes and their use in burst correction., , and . IEEE Trans. Information Theory, 34 (3): 494-504 (1988)Constructions and Properties of k out of n Visual Secret Sharing Schemes., and . Des. Codes Cryptogr., 11 (2): 179-196 (1997)On the Security of Digital Signature Schemes Based on Error-Correcting Codes., , and . Des. Codes Cryptogr., 28 (2): 187-199 (2003)Two "Dual" Families of Nearly-Linear Codes over Zp, p odd., and . Appl. Algebra Eng. Commun. Comput., 11 (4): 313-329 (2001)Chinese Remainder Theorem.. Encyclopedia of Cryptography and Security (2nd Ed.), Springer, (2011)Jack van Lint (1932-2004): A survey of his scientific work., , , , and . J. Comb. Theory, Ser. A, 113 (8): 1594-1613 (2006)Symbol synchronization in convolutionally coded systems (Corresp.)., , and . IEEE Trans. Information Theory, 25 (3): 362-365 (1979)