Coding theory

Results: 1371



#Item
431Search algorithms / Coding theory / Information theory / Mathematics / Information retrieval / Hash function / Online codes / Hash list / Hash tree / Cryptographic hash functions / Error detection and correction / Hashing

On-the-Fly Verification of Rateless Erasure Codes for Efficient Content Distribution Maxwell N. Krohn Michael J. Freedman

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2004-02-29 16:05:25
432Information theory / Mathematics / Low-density parity-check code / Reed–Solomon error correction / Niederreiter cryptosystem / McEliece cryptosystem / Parity-check matrix / Hamming / Linear code / Coding theory / Cryptography / Error detection and correction

Smaller Keys for Code-based Cryptography: QC-MDPC McEliece Implementations on Embedded Devices Stefan Heyse, Ingo von Maurich, Tim G¨ uneysu Horst G¨ ortz Institute for IT-Security

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-04 16:50:34
433Physical Unclonable Function / Coding theory / Data transmission / Computer arithmetic / Hamming / Forward error correction / Bit error rate / Hardware random number generator / VEST / Cryptography / Randomness / Error detection and correction

Noname manuscript No. (will be inserted by the editor) How to Generate Repeatable Keys Using Physical Unclonable Functions Correcting PUF Errors with Iteratively Broadening and Prioritized Search

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-28 14:37:53
434Randomness / Computational complexity theory / Information theory / Randomness extractor / Coding theory / Extractor / List decoding / Entropy / Min-entropy / Theoretical computer science / Applied mathematics / Cryptography

Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data∗ Yevgeniy Dodis† Rafail Ostrovsky‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-04-01 12:50:42
435Cryptography / Communications protocol / Data transmission / Protocols / Error detection and correction / Telecommunications engineering / Coding theory / Data / Information

Cryptanalysis of Secure Message Transmission Protocols with Feedback (Full version of the ICITS 2009 paper with the same title and authors) Qiushi Yang1,? and Yvo Desmedt1,2,?? 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-21 09:52:54
436Cryptography / Abstract algebra / Linear algebra / Information theory / Network coding / Vector space / Digital signature / Linear map / Homomorphic signatures for network coding / Algebra / Mathematics / Finite fields

Efficient Network Coding Signatures in the Standard Model Dario Catalano1 , Dario Fiore2? and Bogdan Warinschi3 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-03-14 12:17:36
437Number theory / Digital signal processing / Coding theory / Mathematics / Logarithms / Matrix

Tutorial on Compressed Sensing (or Compressive Sampling, or Linear Sketching) Piotr Indyk MIT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2008-11-16 01:53:03
438Probability and statistics / Hamming weight / Variance / Advanced Encryption Standard / Statistics / Coding theory / Normal distribution

Using the Joint Distributions of a Cryptographic Function in Side Channel Analysis Yanis Linge1,2 , C´ecile Dumas1 , and Sophie Lambert-Lacroix2 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-12-22 11:14:13
439Coding theory / Error detection and correction / Theoretical computer science / Numerical analysis / McEliece cryptosystem / Post-quantum cryptography / Niederreiter cryptosystem / List decoding / Horner scheme / Mathematics / Public-key cryptography / Applied mathematics

Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 11:04:10
440Commitment scheme / RSA / Group signature / Homomorphic signatures for network coding / Spectral theory of ordinary differential equations / Cryptography / Finite fields / XTR

Encrypting Proofs on Pairings and Its Application to Anonymity for Signatures Georg Fuchsbauer David Pointcheval

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-12-17 12:32:39
UPDATE