First Page | Document Content | |
---|---|---|
![]() Date: 2015-04-09 11:13:04Discrete mathematics Mathematics Finite fields Computer arithmetic Post-quantum cryptography Hamming code McEliece cryptosystem Cyclic code Reed–Solomon error correction Coding theory Error detection and correction Information theory | Source URL: csrc.nist.govDownload Document from Source WebsiteFile Size: 423,12 KBShare Document on Facebook |
![]() | Decoding of Reed Solomon codes beyond the error-correction bound Madhu Sudan ∗DocID: 1kzOU - View Document |
![]() | Multicast Authentication in Fully Adversarial Networks Anna Lysyanskaya Roberto Tamassia Nikos Triandopoulos Brown University Department of Computer ScienceDocID: 1gBnT - View Document |
![]() | LT Codes Michael Luby Digital Fountain, Inc. AbstractDocID: 1gozW - View Document |
![]() | Aquatic 42597P 42503P 42500DocID: 1gfPL - View Document |
![]() | EXTERNAL FEC DESIGN TO INCREASE DATA TRANSFER RATES OVER BAMS RADIOS Dr. Stéphane Pigeon - Maj. Bart Scheers - Prof. Patrick Verlinde Royal Military Academy CISS LaboratoryDocID: 1gbNd - View Document |