[图书][B] Handbook of linear algebra

L Hogben - 2006 - books.google.com
The Handbook of Linear Algebra provides comprehensive coverage of linear algebra
concepts, applications, and computational software packages in an easy-to-use handbook …

Trivium

C De Canniere, B Preneel - New Stream Cipher Designs: The eSTREAM …, 2008 - Springer
In this chapter, we propose a new stream cipher construction based on block cipher design
principles. The main idea is to replace the building blocks used in block ciphers by …

Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles

C De Canniere - International Conference on Information Security, 2006 - Springer
In this paper, we propose a new stream cipher construction based on block cipher design
principles. The main idea is to replace the building blocks used in block ciphers by …

[图书][B] Concise encyclopedia of coding theory

WC Huffman, JL Kim, P Solé - 2021 - api.taylorfrancis.com
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …

Codes in the sum-rank metric: Fundamentals and applications

U Martínez-Peñas, M Shehadeh… - … and Trends® in …, 2022 - nowpublishers.com
Codes in the sum-rank metric have attracted significant attention for their applications in
distributed storage systems, multishot network coding, streaming over erasure channels …

Hypergraph-based wireless distributed storage optimization for cellular D2D underlays

L Wang, H Wu, Y Ding, W Chen… - IEEE Journal on …, 2016 - ieeexplore.ieee.org
Distributed storage that leverages cellular device-to-device (D2D) underlay has attracted
rising research interest due to its potential to offload cellular traffic, improve spectral …

Strongly-MDS convolutional codes

H Gluesing-Luerssen, J Rosenthal… - IEEE Transactions on …, 2006 - ieeexplore.ieee.org
Maximum-distance separable (MDS) convolutional codes have the property that their free
distance is maximal among all codes of the same rate and the same degree. In this paper, a …

Multi-hop cooperative caching in social IoT using matching theory

L Wang, H Wu, Z Han, P Zhang… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
It is envisioned that the Internet of Things (IoT) will provide promising opportunities to users,
manufacturers, and service providers with a wide applicability in many fields. By employing …

[图书][B] Codes and rings: theory and practice

M Shi, A Alahmadi, P Solé - 2017 - books.google.com
Codes and Rings: Theory and Practice is a systematic review of literature that focuses on
codes over rings and rings acting on codes. Since the breakthrough works on quaternary …

Quantum error correction

GG La Guardia - Quantum science and technology. Cham: Springer, 2020 - Springer
Theory of quantum information and computation has been extensively investigated in the
last two decades (see the textbook [121] by Nielsen and Chuang and the references [25, 53 …