Sciweavers

5056 search results - page 12 / 1012
» Network Coding Theory
Sort
View
EUROCRYPT
2007
Springer
14 years 4 months ago
Secure Computation from Random Error Correcting Codes
Abstract. Secure computation consists of protocols for secure arithmetic: secret values are added and multiplied securely by networked processors. The striking feature of secure co...
Hao Chen, Ronald Cramer, Shafi Goldwasser, Robbert...
CDC
2010
IEEE
116views Control Systems» more  CDC 2010»
13 years 5 months ago
A stochastic control approach to coding with feedback over degraded broadcast channels
In this paper we attempt to further demonstrate connections between information theory and control, in a networked setting. Specifically, we consider the communication problem of b...
Siva K. Gorantla, Todd P. Coleman
GECCO
2005
Springer
149views Optimization» more  GECCO 2005»
14 years 3 months ago
There's more to a model than code: understanding and formalizing in silico modeling experience
Mapping biology into computation has both a domain specific aspect – biological theory – and a methodological aspect – model development. Computational modelers have implici...
Janet Wiles, Nicholas Geard, James Watson, Kai Wil...
TCS
2008
13 years 10 months ago
A relation between trinucleotide comma-free codes and trinucleotide circular codes
The comma-free codes and circular codes are two important classes of codes in code theory and in genetics. Fifty years ago before the discovery of the genetic code, a trinucleotid...
Christian J. Michel, Giuseppe Pirillo, Mario A. Pi...
IMA
2005
Springer
113views Cryptology» more  IMA 2005»
14 years 3 months ago
Exploiting Coding Theory for Collision Attacks on SHA-1
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus
Norbert Pramstaller, Christian Rechberger, Vincent...