default search action
Ruud Pellikaan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i12]Altan Berdan Kilic, Anne Nijsten, Ruud Pellikaan, Alberto Ravagnani:
Knot Theory and Error-Correcting Codes. CoRR abs/2307.14882 (2023) - 2022
- [j29]Aart Blokhuis, Ruud Pellikaan, Tamás Szonyi:
The extended coset leader weight enumerator of a twisted cubic code. Des. Codes Cryptogr. 90(9): 2223-2247 (2022) - 2021
- [j28]Francisco Revson Fernandes Pereira, Ruud Pellikaan, Giuliano Gadioli La Guardia, Francisco Marcos de Assis:
Entanglement-Assisted Quantum Codes From Algebraic Geometry Codes. IEEE Trans. Inf. Theory 67(11): 7110-7120 (2021)
2010 – 2019
- 2019
- [c6]Francisco Revson Fernandes Pereira, Ruud Pellikaan, Giuliano Gadioli La Guardia, Francisco M. de Assis:
Application of Complementary Dual AG Codes to Entanglement-Assisted Quantum Codes. ISIT 2019: 2559-2563 - [i11]Francisco Revson Fernandes Pereira, Ruud Pellikaan, Giuliano Gadioli La Guardia, Francisco Marcos de Assis:
Entanglement-assisted Quantum Codes from Algebraic Geometry Codes. CoRR abs/1907.06357 (2019) - 2018
- [j27]Relinde P. M. J. Jurrius, Ruud Pellikaan:
Defining the q-Analogue of a Matroid. Electron. J. Comb. 25(3): 3 (2018) - [j26]Claude Carlet, Sihem Mesnager, Chunming Tang, Yanfeng Qi, Ruud Pellikaan:
Linear Codes Over 𝔽q Are Equivalent to LCD Codes for q>3. IEEE Trans. Inf. Theory 64(4): 3010-3017 (2018) - 2017
- [j25]Relinde P. M. J. Jurrius, Ruud Pellikaan:
On defining generalized rank weights. Adv. Math. Commun. 11(1): 225-235 (2017) - [j24]Umberto Martínez-Peñas, Ruud Pellikaan:
Rank error-correcting pairs. Des. Codes Cryptogr. 84(1-2): 261-281 (2017) - [j23]Alain Couvreur, Irene Marquez Corbella, Ruud Pellikaan:
Cryptanalysis of McEliece Cryptosystem Based on Algebraic Geometry Codes and Their Subcodes. IEEE Trans. Inf. Theory 63(8): 5404-5418 (2017) - [i10]Arti D. Yardi, Ruud Pellikaan:
On shortened and punctured cyclic codes. CoRR abs/1705.09859 (2017) - [i9]Ruud Pellikaan:
LCD codes over ${\mathbb F}_q $ are as good as linear codes for q at least four. CoRR abs/1707.08856 (2017) - 2016
- [j22]Irene Marquez Corbella, Ruud Pellikaan:
A characterization of MDS codes that have an error correcting pair. Finite Fields Their Appl. 40: 224-245 (2016) - [i8]Relinde P. M. J. Jurrius, Ruud Pellikaan:
Defining the q-analogue of a matroid. CoRR abs/1610.09250 (2016) - 2015
- [j21]Irene Marquez Corbella, Ruud Pellikaan:
Error-correcting pairs: a new approach to code-based cryptography. ACM Commun. Comput. Algebra 49(1): 21 (2015) - [j20]Relinde P. M. J. Jurrius, Ruud Pellikaan:
The extended and generalized rank weight enumerator of a code. ACM Commun. Comput. Algebra 49(1): 21 (2015) - [i7]Relinde P. M. J. Jurrius, Ruud Pellikaan:
On defining generalized rank weights. CoRR abs/1506.02865 (2015) - [i6]Irene Marquez Corbella, Ruud Pellikaan:
A characterization of MDS codes that have an error correcting pair. CoRR abs/1508.02187 (2015) - [i5]Umberto Martínez-Peñas, Ruud Pellikaan:
Rank error-correcting pairs. CoRR abs/1512.08144 (2015) - 2014
- [j19]Irene Marquez Corbella, Edgar Martínez-Moro, Ruud Pellikaan:
On the unique representation of very strong algebraic geometry codes. Des. Codes Cryptogr. 70(1-2): 215-230 (2014) - [j18]Irene Marquez Corbella, Edgar Martínez-Moro, Ruud Pellikaan, Diego Ruano:
Computational aspects of retrieving a representation of an algebraic geometry code. J. Symb. Comput. 64: 67-87 (2014) - [c5]Alain Couvreur, Irene Márquez-Corbella, Ruud Pellikaan:
Cryptanalysis of Public-Key Cryptosystems That Use Subcodes of Algebraic Geometry Codes. ICMCTA 2014: 133-140 - [c4]Alain Couvreur, Irene Marquez Corbella, Ruud Pellikaan:
A polynomial time attack against algebraic geometry code based public key cryptosystems. ISIT 2014: 1446-1450 - [i4]Alain Couvreur, Irene Marquez Corbella, Ruud Pellikaan:
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems. CoRR abs/1401.6025 (2014) - [i3]Alain Couvreur, Irene Marquez Corbella, Ruud Pellikaan:
Cryptanalysis of public-key cryptosystems that use subcodes of algebraic geometry codes. CoRR abs/1409.8220 (2014) - [i2]Alain Couvreur, Irene Marquez Corbella, Ruud Pellikaan:
A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2014: 64 (2014) - 2013
- [j17]Irene Marquez Corbella, Edgar Martínez-Moro, Ruud Pellikaan:
The non-gap sequence of a subcode of a generalized Reed-Solomon code. Des. Codes Cryptogr. 66(1-3): 317-333 (2013) - 2012
- [j16]Relinde P. M. J. Jurrius, Ruud Pellikaan:
Truncation Formulas for Invariant Polynomials of Matroids and Geometric Lattices. Math. Comput. Sci. 6(2): 121-133 (2012) - [i1]Irene Marquez Corbella, Ruud Pellikaan:
Error-correcting pairs for a public-key cryptosystem. CoRR abs/1205.3647 (2012) - 2010
- [j15]Antonio Campillo, Patrick Fitzpatrick, Edgar Martínez-Moro, Ruud Pellikaan:
Special issue algebraic coding theory and applications. J. Symb. Comput. 45(7): 721-722 (2010)
2000 – 2009
- 2009
- [j14]Stanislav Bulygin, Ruud Pellikaan:
Bounded distance decoding of linear error-correcting codes with Gröbner bases. J. Symb. Comput. 44(12): 1626-1643 (2009) - [p1]Stanislav Bulygin, Ruud Pellikaan:
Decoding Linear Error-Correcting Codes up to Half the Minimum Distance with Gröbner Bases. Gröbner Bases, Coding, and Cryptography 2009: 361-365 - 2008
- [j13]Reza Rezaeian Farashahi, Ruud Pellikaan, Andrey Sidorenko:
Extractors for binary elliptic curves. Des. Codes Cryptogr. 49(1-3): 171-186 (2008) - 2007
- [c3]Reza Rezaeian Farashahi, Ruud Pellikaan:
The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic. WAIFI 2007: 219-236 - 2006
- [j12]Iwan M. Duursma, Ruud Pellikaan:
A symmetric Roos bound for linear codes. J. Comb. Theory A 113(8): 1677-1688 (2006) - 2004
- [j11]Ruud Pellikaan, Xin-Wen Wu:
List decoding of q-ary Reed-Muller codes. IEEE Trans. Inf. Theory 50(4): 679-682 (2004) - 2000
- [j10]Peter Beelen, Ruud Pellikaan:
The Newton Polygon of Plane Curves with Many Rational Points. Des. Codes Cryptogr. 21(1/3): 41-67 (2000)
1990 – 1999
- 1999
- [j9]Ruud Pellikaan, Fernando Torres:
On Weierstrass semigroups and the redundancy of improved geometric Goppa codes. IEEE Trans. Inf. Theory 45(7): 2512-2519 (1999) - [c2]Andries E. Brouwer, Ruud Pellikaan, Eric R. Verheul:
Doing More with Fewer Bits. ASIACRYPT 1999: 321-332 - 1998
- [j8]Petra Heijnen, Ruud Pellikaan:
Generalized Hamming Weights of q-ary Reed-Muller Codes. IEEE Trans. Inf. Theory 44(1): 181-196 (1998) - 1997
- [j7]Aart Blokhuis, Ruud Pellikaan, Tamás Szonyi:
Blocking Sets of Almost Rédei Type. J. Comb. Theory A 78(1): 141-150 (1997) - [c1]Tom Høholdt, Jacobus H. van Lint, Ruud Pellikaan:
Order Functions and Evaluation Codes. AAECC 1997: 138-150 - 1995
- [j6]Tom Høholdt, Ruud Pellikaan:
On the decoding of algebraic-geometric codes. IEEE Trans. Inf. Theory 41(6): 1589-1614 (1995) - [j5]C. Kirfel, Ruud Pellikaan:
The minimum distance of codes in an array coming from telescopic semigroups. IEEE Trans. Inf. Theory 41(6): 1720-1732 (1995) - 1992
- [j4]Ruud Pellikaan:
On decoding by error location and dependent sets of error positions. Discret. Math. 106-107: 369-381 (1992) - [j3]S. C. Porter, Ba-Zhong Shen, Ruud Pellikaan:
Decoding geometric Goppa codes using an extra place. IEEE Trans. Inf. Theory 38(6): 1663-1676 (1992) - 1991
- [j2]Ruud Pellikaan, Ba-Zhong Shen, Gerhard J. M. van Wee:
Which linear codes are algebraic-geometric? IEEE Trans. Inf. Theory 37(3): 583-602 (1991)
1980 – 1989
- 1989
- [j1]Ruud Pellikaan:
On a decoding algorithm for codes on maximal curves. IEEE Trans. Inf. Theory 35(6): 1228-1232 (1989)
Coauthor Index
aka: Irene Márquez-Corbella
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint