In this work, we consider q-ary signature codes of length k and size n
f...
Cryptographic algorithms rely on the secrecy of their corresponding keys...
In this paper, a new problem of transmitting information over the advers...
This work compares the performance of software implementations of differ...
The Learning with Errors (LWE) problem is an 𝒩𝒫-hard problem that
lies t...
We give an overview of applications of the rubber method. The rubber met...
In this paper, we consider encoding strategies for the Z-channel with
no...
In digital systems such as fiber optical communications the ratio betwee...