Search results for: Shojiro Sakata
Gröbner Bases, Coding, and Cryptography > Gröbner Bases, Coding, and Cryptography: a Guide to the State-of-Art > 143-163
Gröbner Bases, Coding, and Cryptography > Gröbner Bases, Coding, and Cryptography: a Guide to the State-of-Art > 165-185
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > 280-291
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > Codes and Decoding > 302-313
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > 356-376
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > 291-310
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > 394-407
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > Codes and Algebra:Algebraic Geometry Codes > 172-181
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > 415-426
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > 414-425
Lecture Notes in Computer Science
IEEE Transactions on Information Theory > 2014 > 60 > 4 > 2054 - 2064