Your selections:
Lower bound on minimum lee distance of algebraic-geometric codes over finite fields
- Wu, Xinwen, Kuijper, Margreta, Udaya, Parampalli
A Root-finding algorithm for list decoding of Reed-Muller codes
- Wu, Xinwen, Kuijper, Margreta, Udaya, Parampalli
Internet security applications of the Munn rings
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Abawajy, Jemal, Pan, L.
A Grobner-Shirshov Algorithm for Applications in Internet Security
- Kelarev, Andrei, Yearwood, John, Watters, Paul, Wu, Xinwen, Ma, Liping, Abawajy, Jemal, Pan, L.
On the security of permutation-only image encryption schemes
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
A 3D object encryption scheme which maintains dimensional and spatial stability
- Jolfaei, Alireza, Wu, Xinwen, Muthukkumarasamy, Vallipuram
Are you sure you would like to clear your session, including search history and login status?