Symmetric matrices and codes correcting rank errors beyond the ⌊(d - 1)/2⌋ bound
Discrete Applied Mathematics - Special issue: Coding and cryptography
Attacks and counter-attacks on the GPT public key cryptosystem
Designs, Codes and Cryptography
Error and erasure correcting algorithms for rank codes
Designs, Codes and Cryptography
One family of algebraic codes for network coding
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 4
On improving security of GPT cryptosystems
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Symmetric matrices and codes correcting rank errors beyond the ⌊(d-1)/2⌋ bound
Discrete Applied Mathematics - Special issue: Coding and cryptography
The security of the Gabidulin public key cryptosystem
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Decoding of random network codes
Problems of Information Transmission
On codes correcting symmetric rank errors
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
A welch–berlekamp like algorithm for decoding gabidulin codes
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
A new public-key cryptosystem based on the problem of reconstructing p-polynomials
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Designing an efficient and secure public-key cryptosystem based on reducible rank codes
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Designing a rank metric based mceliece cryptosystem
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Fast decoding of Gabidulin codes
Designs, Codes and Cryptography
Rank subcodes in multicomponent network coding
Problems of Information Transmission
Information security in a random network coding network
Problems of Information Transmission
Linear codes using skew polynomials with automorphisms and derivations
Designs, Codes and Cryptography
Hi-index | 0.01 |