Sciweavers

DCC
2002
IEEE
14 years 7 months ago
Searching BWT Compressed Text with the Boyer-Moore Algorithm and Binary Search
Tim Bell, Matt Powell, Amar Mukherjee, Donald A. A...
DCC
2002
IEEE
14 years 7 months ago
Robust Video Transmission over Binary Symmetric Channels with Packet Erasures
A video transmission system is presented based on the 3-D SPIHT algorithm for video compression and turbo codes for channel error protection. The channel considered is a binary sy...
Brian A. Banister, Benjamin Belzer, Thomas R. Fisc...
DCC
2002
IEEE
14 years 7 months ago
Polynomial Interpolation of the Discrete Logarithm
Recently, Coppersmith and Shparlinski proved several results on the interpolation of the discrete logarithm in the finite prime field Fp by polynomials modulo p and modulo p -1, re...
Arne Winterhof
DCC
2002
IEEE
14 years 7 months ago
Ranks of q-Ary 1-Perfect Codes
Kevin T. Phelps, Mercè Villanueva
DCC
2002
IEEE
14 years 7 months ago
Itoh-Tsujii Inversion in Standard Basis and Its Application in Cryptography and Codes
This contribution is concerned with a generalization of Itoh and Tsujii's algorithm for inversion in extension fields GF(qm ). Unlike the original algorithm, the method introd...
Jorge Guajardo, Christof Paar
DCC
2002
IEEE
14 years 7 months ago
On Complete Arcs Arising from Plane Curves
We point out an interplay between Fq-Frobenius non-classical plane curves and complete (k, d)-arcs in P2 (Fq). A typical example that shows how this works is the one concerning an ...
Massimo Giulietti, Fernanda Pambianco, Fernando To...
DCC
2002
IEEE
14 years 7 months ago
On Large Sets of v-1 L-Intersecting Steiner Triple Systems of Order v
F. Franek, Mike J. Grannell, Terry S. Griggs, Alex...
DCC
2002
IEEE
14 years 7 months ago
Subcodes of the Projective Generalized Reed-Muller Codes Spanned by Minimum-Weight Vectors
We use methods of Mortimer [19] to examine the subcodes spanned by minimumweight vectors of the projective generalized Reed-Muller codes and their duals. These methods provide a p...
Peng Ding, Jennifer D. Key
DCC
2002
IEEE
14 years 7 months ago
On the Security of the Digital Signature Algorithm
Ian F. Blake, Theodoulos Garefalakis
DCC
2002
IEEE
14 years 7 months ago
An Enumeration of Binary Self-Dual Codes of Length 32
R. T. Bilous, G. H. John van Rees