Sciweavers

FTTCS
2006
106views more  FTTCS 2006»
14 years 13 days ago
Algorithmic Results in List Decoding
Error-correcting codes are used to cope with the corruption of data by noise during communication or storage. A code uses an encoding procedure that judiciously introduces redunda...
Venkatesan Guruswami
IFIPTCS
2000
14 years 4 months ago
List Decoding: Algorithms and Applications
Over the years coding theory and complexity theory have benefited from a number of mutually enriching connections. This article focuses on a new connection that has emerged betwee...
Madhu Sudan
AISC
2010
Springer
14 years 5 months ago
On Krawtchouk Transforms
Krawtchouk polynomials appear in a variety of contexts, most notably as orthogonal polynomials and in coding theory via the Krawtchouk transform. We present an operator calculus fo...
Philip Feinsilver, René Schott
IMA
2005
Springer
113views Cryptology» more  IMA 2005»
14 years 6 months ago
Exploiting Coding Theory for Collision Attacks on SHA-1
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus
Norbert Pramstaller, Christian Rechberger, Vincent...

Book
712views
15 years 10 months ago
Network Coding Theory
The book covers several topics such as Acyclic Networks, Cyclic Networks, Network Coding and Algebraic Coding, Superposition Coding and Max-Flow Bound, Network Codes for Acyclic Ne...
Raymond W. Yeung, Shuo-Yen Robert Li, Ning Cai, Zh...

Book
271views
15 years 10 months ago
Notes on Coding Theory
"These notes were written over a period of years as part of an advanced undergraduate/ beginning graduate course on Algebraic Coding Theory at Michigan State University.&quo...
J. I. Hall