Sciweavers

IMA
1999
Springer
129views Cryptology» more  IMA 1999»
14 years 3 months ago
Some Soft-Decision Decoding Algorithms for Reed-Solomon Codes
Abstract. In this paper we introduce three soft-decision decoding algorithms for Reed-Solomon (RS) codes. We compare them in terms of performance over both the AWGN and Rayleigh Fa...
Stephan Wesemeyer, Peter Sweeney, David R. B. Burg...
IMA
1999
Springer
108views Cryptology» more  IMA 1999»
14 years 3 months ago
Tensor-Based Trapdoors for CVP and Their Application to Public Key Cryptography
We propose two trapdoors for the Closest-Vector-Problem in lattices (CVP) related to the lattice tensor product. Using these trapdoors we set up a lattice-based cryptosystem which ...
Roger Fischlin, Jean-Pierre Seifert
IMA
1999
Springer
69views Cryptology» more  IMA 1999»
14 years 3 months ago
Some Applications of Bounds for Designs to the Cryptography
Recent years have seen numerous examples when designs play an important role in the study of such topics in cryptography as secrecy and authentication codes, secret sharing scheme...
Svetla Nikova, Ventzislav Nikov
IMA
1999
Springer
79views Cryptology» more  IMA 1999»
14 years 3 months ago
Enhanced Image Coding for Noisy Channels
Paul Chippendale, Cagri Tanriover, Bahram Honary
IMA
1999
Springer
73views Cryptology» more  IMA 1999»
14 years 3 months ago
A Cryptographic Application of Weil Descent
Steven D. Galbraith, Nigel P. Smart