Sciweavers

345 search results - page 32 / 69
» A construction of a space-time code based on number theory
Sort
View
ICC
2007
IEEE
120views Communications» more  ICC 2007»
14 years 2 months ago
Narrowband Interference Mitigation in Turbo-Coded OFDM Systems
— A method for the mitigation of the effect of narrowband interference (NBI) on the turbo decoder in OFDM systems is proposed. The presence of NBI leads to a contaminated Gaussia...
Sheetal Kalyani, Vimal Raj, Krishnamurthy Giridhar
ERLANG
2004
ACM
14 years 1 months ago
Structured programming using processes
Structured Programming techniques are applied to a personal accounting software application implemented in erlang as a demonstration of the utility of processes as design construc...
Jay Nelson
PKC
2000
Springer
118views Cryptology» more  PKC 2000»
13 years 11 months ago
An Identification Scheme Based on Sparse Polynomials
This paper gives a new example of exploiting the idea of using polynomials with restricted coefficients over finite fields and rings to construct reliable cryptosystems and identif...
William D. Banks, Daniel Lieman, Igor Shparlinski
CJ
2006
123views more  CJ 2006»
13 years 7 months ago
Unconditionally Secure Anonymous Encryption and Group Authentication
Anonymous channels or similar techniques that can achieve sender's anonymity play important roles in many applications. However, they will be meaningless if cryptographic prim...
Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, H...
CCS
2008
ACM
13 years 9 months ago
Traitor tracing with constant size ciphertext
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create the box. We present a traitor tracing system where ciphertex...
Dan Boneh, Moni Naor