A class of coders based on GSM (original) (raw)

New Classes of Codes for Cryptologists and Computer Scientists

Florentin Smarandache

2010

View PDFchevron_right

Error-Correction, and Finite-Delay Decodability

Stavros Konstantinidis

Zenodo (CERN European Organization for Nuclear Research), 2002

View PDFchevron_right

Applications of Derandomization Theory in Coding

Mahdi Cheraghchi, A. Shokrollahi

Arxiv preprint arXiv:1107.4709, 2011

View PDFchevron_right

Optimal Codes for Information-theoretically Covert Communication

Ishaque Kadampot

2020

View PDFchevron_right

Codes: An Introduction to Information Communication and Cryptography

Norman Biggs

Springer Undergraduate Mathematics Series, 2008

View PDFchevron_right

Communication Theory of Secrecy Systems

panagiotis kaklis

View PDFchevron_right

High Efficiency Cryptographic Systems and Data Coding for Applications of Secure Information Transmission

Dimitris Simos

math.ntua.gr

View PDFchevron_right

A note on variable length codes

Aldo Luca

Information and Control, 1976

View PDFchevron_right

On the Composition of Secret Sharing Schemes Related to Codes

Edgar Martinez-Moro

Discrete Mathematics, Algorithms and Applications, 2014

View PDFchevron_right

On secret sharing communication systems with two or three channels

Hirosuke Yamamoto

IEEE Transactions on Information Theory, 1986

View PDFchevron_right

A Mathematical Theory of Cryptography

sean gao

View PDFchevron_right

Three constructions of authentication/secrecy codes

Patrick Sole

Journal of Pure and Applied Algebra, 2005

View PDFchevron_right

On unique decodability, McMillan���s theorem and the expected length of codes

Riccardo Leonardi

2008

View PDFchevron_right

Secure-broadcast codes over linear-deterministic channels

Danilo Silva

2010 IEEE International Symposium on Information Theory, 2010

View PDFchevron_right

On the concept of code-isomorphy

IOANA CONSTANTINESCU

Journal of Geometry, 1996

View PDFchevron_right

Private Information Schemes Using Cyclic Codes

Edgar Martinez-Moro

ArXiv, 2021

View PDFchevron_right

Secret message transmission by HARQ with multiple encoding

Nicola Laurenti

2014 IEEE International Conference on Communications (ICC), 2014

View PDFchevron_right

Error-correcting codes with cryptographic algorithms

Smile Markovski

2013 21st Telecommunications Forum Telfor (TELFOR), 2013

View PDFchevron_right

Weakly secure data exchange with Generalized Reed Solomon codes

Igor Zelenko

2014

View PDFchevron_right

Coding-based oblivious transfer

Kirill Morozov

Mathematical Methods in Computer …, 2008

View PDFchevron_right

On the communication complexity of perfectly secure message transmission in directed networks

Ashish choudhary

2009

View PDFchevron_right

information theory, coding and cryptography

湛 王

View PDFchevron_right

Combinatorial Constructions of 3- and 4-Secure Codes

Jennifer Seberry, Tadeusz Wysocki

View PDFchevron_right

Algorithmic issues in coding theory

Madhu Sudan

Lecture Notes in Computer Science, 1997

View PDFchevron_right

Error decodable secret sharing and one-round perfectly secure message transmission for general adversary structures

Maura Paterson

Cryptography and Communications, 2011

View PDFchevron_right

Oblivious transfers and intersecting codes

Claude Crépeau

IEEE Transactions on Information Theory, 1996

View PDFchevron_right

Transducers and the properties of error detection, error correction and finite-delay decodability

Stavros Konstantinidis

View PDFchevron_right