Reed–Muller code

Results: 16



#Item
1Local List-Decoding of Reed-Muller Codes over F2 Original paper by Gopalan, Klivans, and Zuckerman [6, 7] Sahil Singla Computer Science Department Carnegie Mellon University

Local List-Decoding of Reed-Muller Codes over F2 Original paper by Gopalan, Klivans, and Zuckerman [6, 7] Sahil Singla Computer Science Department Carnegie Mellon University

Add to Reading List

Source URL: manzil.ml

Language: English - Date: 2016-01-03 02:28:12
21/25 List Decoding Reed-Muller Codes over F2

1/25 List Decoding Reed-Muller Codes over F2

Add to Reading List

Source URL: manzil.ml

Language: English - Date: 2016-01-03 02:28:15
3Matrix Embedding for Large Payloads Jessica Fridricha and David Soukalb a Department of Electrical and Computer Engineering; Department of Computer Science;

Matrix Embedding for Large Payloads Jessica Fridricha and David Soukalb a Department of Electrical and Computer Engineering; Department of Computer Science;

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2006-04-26 08:10:29
41  Matrix Embedding for Large Payloads Jessica Fridrich and David Soukal  Abstract— Matrix embedding is a previously introduced coding

1 Matrix Embedding for Large Payloads Jessica Fridrich and David Soukal Abstract— Matrix embedding is a previously introduced coding

Add to Reading List

Source URL: www.ws.binghamton.edu

Language: English - Date: 2006-02-03 15:27:32
5794  IEEETRANSACTIONS [I41 T. Kasami, S. Lin, and W. W. Peterso?,.“New generalizations of the Reed-Muller codes-Part I: Pritnltlve codes,” IEEE Trans.

794 IEEETRANSACTIONS [I41 T. Kasami, S. Lin, and W. W. Peterso?,.“New generalizations of the Reed-Muller codes-Part I: Pritnltlve codes,” IEEE Trans.

Add to Reading List

Source URL: neilsloane.com

Language: English - Date: 2012-04-16 01:14:54
6Chapter 4  Hamming Codes In the late 1940’s Claude Shannon was developing information theory and coding as a mathematical model for communication. At the same time, Richard Hamming, a colleague of Shannon’s at Bell L

Chapter 4 Hamming Codes In the late 1940’s Claude Shannon was developing information theory and coding as a mathematical model for communication. At the same time, Richard Hamming, a colleague of Shannon’s at Bell L

Add to Reading List

Source URL: www.mth.msu.edu

Language: English - Date: 2012-08-31 11:04:32
7Chapter 6  Modifying Codes If one code is in some sense good, then we can hope to find from it similar and related codes that are also good. In this chapter we discuss some elementary methods for modifying a code in orde

Chapter 6 Modifying Codes If one code is in some sense good, then we can hope to find from it similar and related codes that are also good. In this chapter we discuss some elementary methods for modifying a code in orde

Add to Reading List

Source URL: www.mth.msu.edu

Language: English - Date: 2012-08-31 11:04:32
8Code-based Cryptography  Christiane Peters

Code-based Cryptography Christiane Peters

Add to Reading List

Source URL: christianepeters.files.wordpress.com

Language: English - Date: 2012-10-11 17:39:42
9Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur1 , Ayoub Otmani2 , and Jean–Pierre Tillich3

Polynomial Time Attack on Wild McEliece Over Quadratic Extensions Alain Couvreur1 , Ayoub Otmani2 , and Jean–Pierre Tillich3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-02-13 14:34:46
10Foundations and Trends R in sample Vol. xx, No xx (xxxx) 1–114

Foundations and Trends R in sample Vol. xx, No xx (xxxx) 1–114

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-03-05 19:53:10