Items where Author is "Rosenthal, J"

Up a level
Export as [feed] RSS
Group by: Item Type | No Grouping
Number of items: 12.

ELIA, M., ROSENTHAL, J. and SCHIPANI, D., 2012. Evaluation of polynomials over finite fields and decoding of cyclic codes. PCT/EP2012/050704.

BALDI, M., BIANCHI, M., CHIARALUCE, F., ROSENTHAL, J. and SCHIPANI, D., 2012. Method and apparatus for public-key cryptography based on error correcting codes. PCT/EP2012/056005.

LOPEZ-RAMOS, J.A., ROSENTHAL, J. and SCHIPANI, D., 2012. System, apparatus and method for efficient multicast key distribution. PCT/EP2012/059707.

SCHIPANI, D., ELIA, M. and ROSENTHAL, J., 2011. Efficient evaluation of polynomials over finite fields. In: Proceedings Australian Communications Theory Workshop (AusCTW).

BALDI, M., BIANCHI, M., CHIARALUCE, F., ROSENTHAL, J. and SCHIPANI, D., 2011. Enhanced public key security for the McEliece cryptosystem.

BERMEJO, J.A., LOPEZ-RAMOS, J.A., ROSENTHAL, J. and SCHIPANI, D., 2011. Managing key multicasting through orthogonal systems. .

FONTEIN, F., MARSHALL, K., ROSENTHAL, J., SCHIPANI, D. and TRAUTMANN, A., 2011. On burst error correction and storage security of noisy data. In: Proceedings 20th International Symposium on Mathematical Theory of Networks and Systems (MTNS).

BALDI, M., BIANCHI, M., CHIARALUCE, F., ROSENTHAL, J. and SCHIPANI, D., 2011. On fuzzy syndrome hashing with LDPC coding. In: Proceedings 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL).

SCHIPANI, D., ELIA, M. and ROSENTHAL, J., 2011. On the decoding complexity of cyclic codes up to the BCH bound. In: Proceedings IEEE International Symposium on Information Theory (ISIT).

ELIA, M., ROSENTHAL, J. and SCHIPANI, D., 2011. Polynomial evaluation over finite fields: new algorithms and complexity bounds [forthcoming]. Applicable Agebra in Engineering, Communication and Computing.

BALDI, M., BIANCHI, M., CHIARALUCE, F., ROSENTHAL, J. and SCHIPANI, D., 2011. A variant of the McEliece cryptosystem with increased public key security. In: Proceedings 19th International Workshop on Coding and Cryptography (WCC).

SCHIPANI, D. and ROSENTHAL, J., 2010. Coding solutions for the secure biometric storage problem. In: Proceedings IEEE Information Theory Workshop (ITW).

This list was generated on Fri Apr 19 21:45:13 2024 UTC.