Abstract is missing.
- Extended EVENODD+ Codes with Asymptotically Optimal Updates and Efficient Encoding/DecodingHong Fu, Hanxu Hou, Li Zhang. 1-6 [doi]
- Multi-Server Private Linear Computation with Joint and Individual Privacy GuaranteesNahid Esmati, Anoosheh Heidarzadeh, Alex Sprintson. 1-6 [doi]
- Construction of a pseudo-random number generator whose output is a normal sequenceBoris Ryabko, Viacheslav Zhuravlev. 1-4 [doi]
- Design of Codebooks Optimized for Noncoherent Transmission over Fast Fading ChannelAlexander B. Sergienko, Polina V. Apalina. 5-10 [doi]
- Novel order statistics-based detector and coded modulation for a DHA FH OFDMA systemDmitry Osipov 0002. 11-16 [doi]
- On Unsourced Random Access for the MIMO ChannelKirill V. Andreev, Alexey A. Frolov. 17-21 [doi]
- Computer Modeling System of Allocating and Planning Processes of Heterogeneous Resources in Industrial Telecommunication NetworksDmitry A. Perepelkin, Minh Pham. 22-27 [doi]
- Estimation of average delay in systems with unsourced random access and multiple departureAnna Borisovskaya, Anton Glebov, Andrey M. Turlikov. 28-33 [doi]
- Gateway Data Encoding, Packaging and Compression method for heterogeneous IoT-satellite networkLeonid Voskov, Alexei Rolich, Gleb Bakanov, Polina Podkopaeva. 34-38 [doi]
- Differential properties of authenticated encryption mode based on universal hash function (XTSMAC)Alexey Nesterenko. 39-44 [doi]
- Eliminating Broadband Covert Channels in DSA-Like SignaturesAndrey Fionov, Alexandr Klevtsov. 45-48 [doi]
- On the Efficiency of Metaheuristic Optimization for Adaptive Image Steganography in the DFT DomainAnna Melman, Oleg Evsutin. 49-54 [doi]
- On Squares of Dihedral CodesKirill Vedenev, Yury Kosolapov. 55-60 [doi]
- Application of algorithmic information theory to calibrate tests of random number generatorsBoris Ryabko. 61-65 [doi]
- New Code-Based Cryptosystem Based on Binary Image of Generalized Reed-Solomon CodeFedor Ivanov, Eugenii Krouk, Victor V. Zyablov. 66-69 [doi]
- Development of an information-theoretical method of attribution of literary textsBoris Ryabko, Nadezhda Savina. 70-73 [doi]
- Gaussian One-Armed Bandit ProblemAlexander V. Kolnogorov. 74-79 [doi]
- On the conditions of convergence of the functional from the sum of independent random variables to the functional from the Wiener processAlexey Los, Aleksandr Belov. 80-84 [doi]
- Schemes for LQG Control over Gaussian Channels with Side InformationOmri Lev, Anatoly Khina. 85-90 [doi]
- Variational Autoencoders with Euclidean and Hyperbolic Latent Spaces for Population GeneticsIgor Bogdanov, Vladimir Shchur. 91-94 [doi]
- An Upper Bound on the Number of Bent FunctionsVladimir N. Potapov. 95-96 [doi]
- On parallelisms of PG(5, 2) invariant under a cyclic subgroup of order 21Svetlana Topalova, Stela Zhelezova. 97-100 [doi]
- On spherical 4-distance 7-designsPeter G. Boyvalenkov, Navid Safaei. 101-105 [doi]
- Fast Decoding of Union-Free CodesIlya Vorobyev. 106-109 [doi]
- Group Testing with Non-identical Infection ProbabilitiesMustafa Doger, Sennur Ulukus. 110-115 [doi]
- On Weight Spectrum of Linear CodesVladimir N. Potapov. 116-118 [doi]
- Bounds and Genericity of Sum-Rank-Metric CodesCornelia Ott, Sven Puchinger, Martin Bossert. 119-124 [doi]
- New Communication Models and Decoding of Maximum Rank Distance CodesWrya K. Kadir. 125-130 [doi]
- On transform-domain decoding of generalized Gabidulin codes : Dedicated to the memory of Ernst M. Gabidulin (1937-2021)Wenhui Li, Vladimir Sidorenko, Antonia Wachter-Zeh. 131-136 [doi]
- Analysis of Binary and Ternary Message Passing Decoding for Generalized LDPC CodesEmna Ben Yacoub, Gianluigi Liva. 137-142 [doi]
- About Usage of Metrics in Decoding of LDPC Codes in Two-State Channels with MemoryAlina M. Veresova, Anna A. Fominykh, Andrei Ovchinnikov. 143-148 [doi]
- Linear Programming Decoding of Non-Linear Sparse-Graph CodesGleb Balitskiy, Alexey A. Frolov, Pavel S. Rybin. 149-154 [doi]
- Deep Neural Network Based Decoding of Short 5G LDPC CodesKirill V. Andreev, Alexey A. Frolov, German Svistunov, Kedi Wu, Jing Liang. 155-160 [doi]
- Bidirectional search application for polar codes with large kernelsIlya Morzharetto, Peter Trifonov. 161-165 [doi]
- Quaternary Reed - Muller codes and their minimum weight basesFaina I. Solov'eva. 166-169 [doi]
- Multi-Server Private Linear Transformation with Joint PrivacyFatemeh Kazemi, Alex Sprintson. 182-187 [doi]
- Field Trace Polynomial Codes for Secure Distributed Matrix MultiplicationRoberto Assis Machado, Rafael G. L. D'Oliveira, Salim El Rouayheb, Daniel Heinlein. 188-193 [doi]