Finite fields

Results: 995



#Item
261Telecommunications engineering / Information / Finite fields / Network coding / Wireless sensor network / Throughput / Spectral efficiency / Coding gain / Huffman coding / Network performance / Information theory / Coding theory

How Many Packets Can We Encode? — An Analysis of Practical Wireless Network Coding Jilin Le, John C.S. Lui

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2008-06-28 23:20:51
262Telecommunications engineering / Information / Finite fields / Network coding / Wireless sensor network / Throughput / Spectral efficiency / Coding gain / Joint / Network performance / Information theory / Coding theory

1 On the Performance Bounds of Practical Wireless Network Coding Jilin Le∗ , John C.S. Lui∗ and Dah Ming Chiu+ The Chinese University of Hong Kong

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2009-12-22 01:23:54
263Logarithms / Computational hardness assumptions / Modular arithmetic / Finite fields / Discrete logarithm / Index calculus algorithm / Elliptic curve / Discrete logarithm records / Abstract algebra / Mathematics / Group theory

Discrete logarithms: Recent progress in small characteristic Antoine Joux CryptoExperts Chaire de Cryptologie de la Fondation de l’UPMC — LIP6

Add to Reading List

Source URL: www-fourier.ujf-grenoble.fr

Language: English - Date: 2014-03-31 03:20:36
264Network coding / Network performance / Wireless sensor network / MORE protocol / Transmission Control Protocol / Telecommunications engineering / Information / Technology / Coding theory / Finite fields / Information theory

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. TRANSACTION ON MOBILE COMPUTING, VOL. X, NO. X, AUGUST 2012

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2013-03-28 07:48:29
265Network performance / Network coding / Wireless sensor network / Peer-to-peer / Computing / ANts P2P / Software / Information / Chord / Coding theory / Finite fields / Information theory

On Detecting Malicious Behaviors in Interactive Networks: Algorithms and Analysis Yongkun Li, John C.S. Lui

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-12-10 04:32:26
266Cryptographic software / Boneh/Franklin scheme / Finite fields / Tor / Onion routing / XTR / Diffie–Hellman key exchange / Public-key cryptography / Pairing / Cryptography / Internet privacy / Cryptographic protocols

Pairing-Based Onion Routing with Improved Forward Secrecy ANIKET KATE, GREG M. ZAVERUCHA, and IAN GOLDBERG University of Waterloo This article presents new protocols for onion routing anonymity networks. We define a pro

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2010-12-30 09:39:44
267Mathematics / Information / Hamming code / Entropy / WPCS / Steganography / BCH code / Reed–Solomon error correction / Linear code / Coding theory / Error detection and correction / Finite fields

WET ZZW CONSTRUCTION FOR STEGANOGRAPHY Tomáš Filler and Jessica Fridrich Department of ECE, SUNY Binghamton, NY, USA {tomas.filler, fridrich}@binghamton.edu ABSTRACT Wet paper codes are an essential tool for communicat

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2009-05-21 12:29:43
268Finite fields / Logarithms / Group theory / Integer factorization algorithms / Cryptography / Index calculus algorithm / XTR / Polynomial / Discrete logarithm / Abstract algebra / Mathematics / Algebra

Discrete logarithm in GFwith FFS Razvan Barbulescu, Cyril Bouvier, Jérémie Detrey, Pierrick Gaudry, Hamza Jeljeli, Emmanuel Thomé, Marion Videau, and Paul Zimmermann CARAMEL project-team, LORIA, INRIA / CNRS /

Add to Reading List

Source URL: www.loria.fr

Language: English - Date: 2014-01-09 15:35:58
269Coding theory / Finite fields / Information / Cryptography / Network coding / Hash function / Hash list / Very smooth hash / Homomorphic signatures for network coding / Hashing / Cryptographic hash functions / Error detection and correction

1 On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li∗ John C.S. Lui+

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-05-19 23:15:34
270Information theory / Theoretical computer science / Routing / Computing / Telecommunications engineering / Network coding / MORE protocol / Randomized algorithm / Packet forwarding / Wireless networking / Coding theory / Finite fields

Identifying Pollution Attackers in Network-Coding Enabled Wireless Mesh Networks Yongkun Li John C.S. Lui

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-05-06 01:09:23
UPDATE