News
This chapter introduces the basics of linear codes and provides several examples including the “perfect” Hamming and Golay codes. The McEliece cryptographic protocol is described as an ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results