Showing results 1 to 11 of 11
Complete weight enumerators of some linear codes and their applications Li, Chengju; Bae, Sunghan; Ahn, Jaehyun; Yang, Shudi; Yao, Zheng-An, DESIGNS CODES AND CRYPTOGRAPHY, v.81, no.1, pp.153 - 168, 2016-10 |
Diversity-multiplexing tradeoff and outage performance for Rician MIMO channels Shin, WY; Chung, Sae-Young; Lee, Yong-Hoon, IEEE TRANSACTIONS ON INFORMATION THEORY, v.54, no.3, pp.1186 - 1196, 2008-03 |
Exponential Decay of Intersection Volume With Applications on List-Decodability and Gilbert-Varshamov Type Bound Kim, Jaehoon; Liu, Hong; Tran, Tuan, IEEE TRANSACTIONS ON INFORMATION THEORY, v.69, no.5, pp.2841 - 2854, 2023-05 |
Learners production of passives during syntactic priming activities Kim, Youjin; Mcdonough, Kim, APPLIED LINGUISTICS, v.29, no.1, pp.149 - 154, 2008-03 |
MJH: a faster alternative to MDC-2 Lee, Jooyoung; Stam, Martijn, DESIGNS CODES AND CRYPTOGRAPHY, v.76, no.2, pp.179 - 205, 2015-08 |
Multiproperty-Preserving Domain Extension Using Polynomial-Based Modes of Operation Lee, Jooyoung; Steinberger, John, IEEE TRANSACTIONS ON INFORMATION THEORY, v.58, no.9, pp.6165 - 6182, 2012-09 |
Preimage resistance of LPmkr with r = m-1 Lee, Jooyoung; Park, Je Hong, INFORMATION PROCESSING LETTERS, v.110, no.14-15, pp.602 - 608, 2010-07 |
Security of permutation-based compression function lp231 Lee, Jooyoung; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07 |
The effect of mutation on link concordance, 3-manifolds, and the Milnor invariants Cha J.C., JOURNAL OF KNOT THEORY AND ITS RAMIFICATIONS, v.15, no.2, pp.239 - 257, 2006 |
The Security of Abreast-DM in the Ideal Cipher Model Lee, Jooyoung; Kwon, Daesung, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E94A, no.1, pp.104 - 109, 2011-01 |
Uniqueness of some optimal superimposed codes Hong S.; Kapralov S.; Kim H.K.; Oh, Dong Hoon, PROBLEMS OF INFORMATION TRANSMISSION, v.43, no.2, pp.113 - 123, 2007 |
Discover