List decoding

Results: 85



#Item
31Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1  2

Fast and Secure Root Finding for Code-based Cryptosystems Falko Strenzke 1 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-08-07 11:04:10
32A Coding-Theoretic Approach to Recovering Noisy RSA Keys Kenneth G. Paterson, Antigoni Polychroniadou, and Dale L. Sibborn Information Security Group, Royal Holloway, University of London  Abstract. Inspired by cold boot

A Coding-Theoretic Approach to Recovering Noisy RSA Keys Kenneth G. Paterson, Antigoni Polychroniadou, and Dale L. Sibborn Information Security Group, Royal Holloway, University of London Abstract. Inspired by cold boot

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-06 12:25:19
33arXiv:1008.1284v1 [math.NT] 6 AugIdeal forms of Coppersmith’s theorem and Guruswami-Sudan list decoding Henry Cohn

arXiv:1008.1284v1 [math.NT] 6 AugIdeal forms of Coppersmith’s theorem and Guruswami-Sudan list decoding Henry Cohn

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2010-08-09 20:26:12
34Improved Decoding of Reed-Solomon and Algebraic-Geometry Codes Venkatesan Guruswami Madhu Sudan

Improved Decoding of Reed-Solomon and Algebraic-Geometry Codes Venkatesan Guruswami Madhu Sudan

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-08-13 15:03:38
35On collusion-secure codes for copyright protection Hans Georg Schaathun Abstract With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprin

On collusion-secure codes for copyright protection Hans Georg Schaathun Abstract With a digital fingerprinting scheme a vendor of digital copies of copyrighted material marks each individual copy with a unique fingerprin

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-12-12 14:20:25
36Mathematics / Information / Fingerprint / List decoding / Concatenated error correction code / Reed–Solomon error correction / Digital video fingerprinting / Coding theory / Error detection and correction / Theoretical computer science

On watermarking/fingerprinting for copyright protection Hans Georg Schaathun Abstract Collusion-secure codes are used for digital fingerprinting and for traitor tracing. In both cases, the goal is to prevent unauthorised

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2005-12-08 10:13:37
37Optimally Robust Private Information Retrieval∗ Casey Devet Ian Goldberg University of Waterloo {cjdevet,iang}@cs.uwaterloo.ca

Optimally Robust Private Information Retrieval∗ Casey Devet Ian Goldberg University of Waterloo {cjdevet,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-06-22 07:52:20
38rev-kobayashi-vanosdol.indd

rev-kobayashi-vanosdol.indd

Add to Reading List

Source URL: www.ams.org

Language: English - Date: 2012-07-11 07:28:56
39Nearly One-Sided Tests and the Goldreich-Levin Predicate Gustav Hast Department of Numerical Analysis and Computer Science Royal Institute of Technology, [removed]Stockholm, Sweden [removed]

Nearly One-Sided Tests and the Goldreich-Levin Predicate Gustav Hast Department of Numerical Analysis and Computer Science Royal Institute of Technology, [removed]Stockholm, Sweden [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:52
40LIST DECODING ALGORITHMS FOR REED-SOLOMON CODES ITELHOMME FENE UNIVERSITY OF LOUISIANA AT LAFAYETTE 104 UNIVERSITY CIRCLE, LAFAYETTE LA[removed]EMAIL: [removed], [removed],

LIST DECODING ALGORITHMS FOR REED-SOLOMON CODES ITELHOMME FENE UNIVERSITY OF LOUISIANA AT LAFAYETTE 104 UNIVERSITY CIRCLE, LAFAYETTE LA[removed]EMAIL: [removed], [removed],

Add to Reading List

Source URL: anisette.ucs.louisiana.edu

Language: English - Date: 2012-01-21 15:33:26