Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comments on "New Results on Frame-Proof Codes and Traceability Schemes"., and . IEEE Trans. Information Theory, 56 (11): 5888-5889 (2010)Attacks on quantum key distribution protocols that employ non-ITS authentication, , , , , , and . CoRR, (2012)Comment on "New Results on Frame-Proof Codes and Traceability Schemes", and . CoRR, (2009)Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key., and . IACR Cryptology ePrint Archive, (2013)Attacks on quantum key distribution protocols that employ non-ITS authentication., , , , , , and . Quantum Information Processing, 15 (1): 327-362 (2016)Gaussian approximation of the LLR distribution for the ML and partial marginalization MIMO detectors., , , and . ICASSP, page 3232-3235. IEEE, (2011)Approximating the LLR Distribution for a Class of Soft-Output MIMO Detectors., , , and . IEEE Trans. Signal Processing, 60 (12): 6421-6434 (2012)Direct proof of security of Wegman-Carter authentication with partially known key., and . Quantum Information Processing, 13 (10): 2155-2170 (2014)Systems of imprimitivity for the clifford group., , , , , and . Quantum Information & Computation, 14 (3-4): 339-360 (2014)New Universal Hash Functions., and . WEWoRC, volume 7242 of Lecture Notes in Computer Science, page 99-108. Springer, (2011)