Sciweavers

60 search results - page 7 / 12
» Cryptographic Hardness Based on the Decoding of Reed-Solomon...
Sort
View
TIT
2008
83views more  TIT 2008»
13 years 7 months ago
Hard Problems of Algebraic Geometry Codes
The minimum distance is one of the most important combinatorial characterizations of a code. The maximum likelihood decoding problem is one of the most important algorithmic proble...
Qi Cheng
IACR
2011
125views more  IACR 2011»
12 years 7 months ago
On Constructing Homomorphic Encryption Schemes from Coding Theory
Abstract. Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the ...
Frederik Armknecht, Daniel Augot, Ludovic Perret, ...
ACSAC
2005
IEEE
14 years 1 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
14 years 1 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
ICMCS
2008
IEEE
131views Multimedia» more  ICMCS 2008»
14 years 1 months ago
Wyner-Ziv coding with spatio-temporal refinement based on successive turbo decoding
Arising needs for extremely simple encoder motivate investigations on distributed video coding (DVC). The Wyner-Ziv coding, one of the representative DVC schemes, reconstructs vid...
Bonghyuck Ko, Hiuk Jae Shim, Byeungwoo Jeon