The following pages link to Mohammad Reza Aref (Q251088):
Displaying 38 items.
- Squaring attacks on McEliece public-key cryptosystems using quasi-cyclic codes of even dimension (Q310244) (← links)
- Desynchronization attack on RAPP ultralightweight authentication protocol (Q1943635) (← links)
- A bit-vector differential model for the modular addition by a constant and its applications to differential and impossible-differential cryptanalysis (Q2161424) (← links)
- A bit-vector differential model for the modular addition by a constant (Q2692348) (← links)
- Multiple-access channel with correlated states and cooperating encoders (Q2853017) (← links)
- Symmetric relaying based on partial decoding and the capacity of a class of relay networks (Q2853126) (← links)
- Efficient secure channel coding based on quasi-cyclic low-density parity-check codes (Q2853132) (← links)
- Comprehensive partial decoding approach for two-level relay networks (Q2853134) (← links)
- New achievable rate and a certain capacity result for a stochastic two relay network with no interference (Q2853141) (← links)
- Unified approach to the capacity evaluation of the relay channel (Q2853143) (← links)
- Achievable rate region for broadcast-relay networks with two cooperative relays (Q2854451) (← links)
- Compress-and-forward strategy for relay channel with causal and non-causal channel state information (Q2854455) (← links)
- Achievable rate region for multiple-access-relay-networks (Q2854532) (← links)
- Capacity of a class of symmetric relay networks with orthogonal components (Q2854549) (← links)
- Cooperative relay broadcast channels with partial causal channel state information (Q2854602) (← links)
- An Improved Truncated Differential Cryptanalysis of Klein (Q2970272) (← links)
- Channel Simulation via Interactive Communications (Q2977399) (← links)
- Achievability Proof via Output Statistics of Random Binning (Q2983318) (← links)
- (Q3074018) (← links)
- Addressing Flaws in RFID Authentication Protocols (Q3104736) (← links)
- An LWE-based verifiable threshold secret sharing scheme (Q3383067) (← links)
- Improved Linear Cryptanalysis of Reduced-Round SIMON-32 and SIMON-48 (Q3460174) (← links)
- (Q4382309) (← links)
- A Fast Multiple-Source Detection and Localization Array Signal Processing Algorithm Using the Spatial Filtering and ML Approach (Q4564509) (← links)
- Perfectly Secure Index Coding (Q4566567) (← links)
- Statistical Performance Analysis of MDL Source Enumeration in Array Processing (Q4570089) (← links)
- Direction-of-Arrival Estimation for Temporally Correlated Narrowband Signals (Q4571556) (← links)
- BIA for the K-User Interference Channel Using Reconfigurable Antenna at Receivers (Q5123849) (← links)
- (Q5192847) (← links)
- A Correlation Measure Based on Vector-Valued $L_p$ -Norms (Q5211553) (← links)
- A Multi-Layer Encoding and Decoding Strategy for Binary Erasure Channel (Q5224061) (← links)
- On the Capacity of Interference Channel With Causal and Noncausal Generalized Feedback at the Cognitive Transmitter (Q5271950) (← links)
- The Capacity Region of p -Transmitter/ q -Receiver Multiple-Access Channels With Common Information (Q5272238) (← links)
- Symmetric Semideterministic Relay Networks With No Interference at the Relays (Q5272347) (← links)
- Slepian–Wolf Coding Over Cooperative Relay Networks (Q5273603) (← links)
- Simulation of a Channel with Another Channel (Q5347945) (← links)
- (Q5719011) (← links)
- 2D hash chain robust random key distribution scheme (Q5964825) (← links)