1018 results in Cryptography ,Cryptology and Coding
15 - Appendices
-
- Book:
- Iterative Receiver Design
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007, pp 243-246
-
- Chapter
- Export citation
Notations
-
- Book:
- Iterative Receiver Design
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007, pp xv-xvi
-
- Chapter
- Export citation
Contents
-
- Book:
- Iterative Receiver Design
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007, pp v-viii
-
- Chapter
- Export citation
9 - Demapping
-
- Book:
- Iterative Receiver Design
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007, pp 177-186
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Iterative Receiver Design
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007, pp i-iv
-
- Chapter
- Export citation
6 - State-space models
-
- Book:
- Iterative Receiver Design
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007, pp 105-134
-
- Chapter
- Export citation
5 - Statistical inference using factor graphs
-
- Book:
- Iterative Receiver Design
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007, pp 77-104
-
- Chapter
- Export citation
Index
-
- Book:
- Iterative Receiver Design
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007, pp 253-254
-
- Chapter
- Export citation
10 - Equalization–general formulation
-
- Book:
- Iterative Receiver Design
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007, pp 187-206
-
- Chapter
- Export citation
List of algorithms
-
- Book:
- Iterative Receiver Design
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007, pp xvii-xviii
-
- Chapter
- Export citation
4 - Factor graphs and the sum–product algorithm
-
- Book:
- Iterative Receiver Design
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007, pp 35-76
-
- Chapter
- Export citation
11 - Equalization: single-user, single-antenna communication
-
- Book:
- Iterative Receiver Design
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007, pp 207-216
-
- Chapter
- Export citation
![](https://assets.cambridge.org/97805218/73154/cover/9780521873154.jpg)
Iterative Receiver Design
-
- Published online:
- 08 January 2010
- Print publication:
- 06 September 2007
5 - Symmetric cryptosystems
-
- Book:
- Complexity and Cryptography
- Published online:
- 06 July 2010
- Print publication:
- 12 January 2006, pp 99-124
-
- Chapter
- Export citation
11 - Identification schemes
-
- Book:
- Complexity and Cryptography
- Published online:
- 06 July 2010
- Print publication:
- 12 January 2006, pp 229-249
-
- Chapter
- Export citation
7 - Public key cryptography
-
- Book:
- Complexity and Cryptography
- Published online:
- 06 July 2010
- Print publication:
- 12 January 2006, pp 141-169
-
- Chapter
- Export citation
10 - Secure encryption
-
- Book:
- Complexity and Cryptography
- Published online:
- 06 July 2010
- Print publication:
- 12 January 2006, pp 203-228
-
- Chapter
- Export citation
Appendix 3 - Algebra and number theory
-
- Book:
- Complexity and Cryptography
- Published online:
- 06 July 2010
- Print publication:
- 12 January 2006, pp 253-256
-
- Chapter
- Export citation
Preface
-
- Book:
- Complexity and Cryptography
- Published online:
- 06 July 2010
- Print publication:
- 12 January 2006, pp ix-x
-
- Chapter
- Export citation
2 - Complexity theory
-
- Book:
- Complexity and Cryptography
- Published online:
- 06 July 2010
- Print publication:
- 12 January 2006, pp 10-38
-
- Chapter
- Export citation