Sciweavers

60 search results - page 4 / 12
» Cryptographic Hardness Based on the Decoding of Reed-Solomon...
Sort
View
STOC
2004
ACM
134views Algorithms» more  STOC 2004»
14 years 7 months ago
Better extractors for better codes?
We present an explicit construction of codes that can be list decoded from a fraction (1 - ) of errors in sub-exponential time and which have rate / logO(1) (1/). This comes close...
Venkatesan Guruswami
GLOBECOM
2008
IEEE
14 years 1 months ago
Lowering LDPC Error Floors by Postprocessing
−A class of combinatorial structures, called absorbing sets, strongly influences the performance of low-density paritycheck (LDPC) decoders at low error rates. Past experiments h...
Zhengya Zhang, Lara Dolecek, Borivoje Nikolic, Ven...
AICT
2006
IEEE
101views Communications» more  AICT 2006»
14 years 1 months ago
Erasure Codes for Increasing the Availability of Grid Data Storage
In this paper, we describe the design of a highlyavailable Grid data storage system. Increased availability is ensured by data redundancy and file striping. Redundant data is com...
Mikko Pitkänen, Rim Moussa, D. Martin Swany, ...
ACNS
2006
Springer
241views Cryptology» more  ACNS 2006»
13 years 11 months ago
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive
In this paper we combine the error correction and encryption functionality into one block cipher, which we call High Diffusion (HD) cipher. The error correcting property of this ci...
Chetan Nanjunda Mathur, Karthik Narayan, K. P. Sub...
DICTA
2007
13 years 9 months ago
Biometric Based Cryptographic Key Generation from Faces
Existing asymmetric encryption algorithms require the storage of the secret private key. Stored keys are often protected by poorly selected user passwords that can either be guess...
B. Chen, V. Chandran