We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,029 results
  1. Two properties of prefix codes and uniquely decodable codes

    The paper deals with the code length distributions for which the proportion of the codewords of a given length to all words of this length is a...

    Jie Xu, Zhiyong Zheng, ... Man Chen in Designs, Codes and Cryptography
    Article 20 June 2023
  2. Construction-D lattice from Garcia–Stichtenoth tower code

    Elena Kirshanova, Ekaterina Malygina in Designs, Codes and Cryptography
    Article 10 December 2023
  3. Secure Data Storage in Cloud Computing Using Code Based McEliece and NTRU Cryptosystems

    Information must be kept private and secure because it is shared when people communicate online, making data protection essential. Data sharing is a...

    Geetha Rani E, Chetana Tukkoji in SN Computer Science
    Article 04 April 2024
  4. Scalable local reconstruction code design for hot data reads in cloud storage systems

    Since demand for data is significantly heterogeneous in cloud storage systems (CSSs), there is traffic congestion in nodes storing hot data. In...

    Zhikai Zhang, Shushi Gu, Qinyu Zhang in Science China Information Sciences
    Article 22 November 2022
  5. Pauli Manipulation Detection Codes and Applications to Quantum Communication over Adversarial Channels

    We introduce and explicitly construct a quantum error-detection code we coin a “Pauli Manipulation Detection” code (or PMD), which detects every...
    Conference paper 2024
  6. QRnet: fast learning-based QR code image embedding

    Quick Response (QR) codes usage in e-commerce is on the rise due to their versatility and ability to connect offline and online content, taking over...

    Karelia Pena-Pena, Daniel L. Lau, ... Gonzalo R. Arce in Multimedia Tools and Applications
    Article 16 February 2022
  7. Memory-Hard Puzzles in the Standard Model with Applications to Memory-Hard Functions and Resource-Bounded Locally Decodable Codes

    We formally introduce, define, and construct memory-hard puzzles. Intuitively, for a difficulty parameter t, a cryptographic puzzle is memory-hard if...
    Mohammad Hassan Ameri, Alexander R. Block, Jeremiah Blocki in Security and Cryptography for Networks
    Conference paper 2022
  8. Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018

    This paper presents a key recovery attack on a rank metric based cryptosystem proposed by Lau and Tan at ACISP 2018, which uses Gabidulin codes as...
    Wenshuo Guo, Fang-Wei Fu in Information Security and Privacy
    Conference paper 2022
  9. Digital Signature Scheme to Match Generalized Reed-Solomon Code over GF(q)

    Code-based public key cryptography is one of the most widely studied cryptographic algorithms against quantum computing attacks. The main issue today...
    Yong Wang, Hao **e, Ruyi Wang in Cyberspace Safety and Security
    Conference paper 2022
  10. Cryptanalysis of a code-based full-time signature

    We present an attack against a code-based signature scheme based on the Lyubashevsky protocol that was recently proposed by Song, Huang, Mu, Wu and...

    Nicolas Aragon, Marco Baldi, ... Paolo Santini in Designs, Codes and Cryptography
    Article 12 July 2021
  11. Testing Network Code

    This chapter shows how to use tests to develop code that interacts with the network. You'll learn how to use a Stub Test Double to simulate different...
    Chapter 2021
  12. Entropy Coding

    As the last stage before the code stream generated by the compression system, entropy coding aims to remove the information redundancy or coding...
    Ge Li, Wei Gao, Wen Gao in Point Cloud Compression
    Chapter 2024
  13. An Analysis of the RankSign Signature Scheme with Rank Multipliers

    We investigate the application of rank multipliers as introduced by Loidreau to repair the 2017 NIST proposal RankSign. In RankSign, a signature is...
    Anna Baumeister, Hannes Bartz, Antonia Wachter-Zeh in Code-Based Cryptography
    Conference paper 2023
  14. Random Shortening of Linear Codes and Applications

    Random linear codes (RLCs) are well known to have nice combinatorial properties and near-optimal parameters in many different settings. However,...
    Xue Chen, Kuan Cheng, ... Songtao Mao in Computing and Combinatorics
    Conference paper 2024
  15. Enhanced Color QR Codes with Resilient Error Correction for Dirt-Prone Surfaces

    This study focuses on overcoming the limitations of traditional QR codes, specifically their vulnerability to damage and insufficient error...
    Conference paper 2023
  16. A PCP Theorem for Interactive Proofs and Applications

    The celebrated PCP Theorem states that any language in \(\mathrm {NP}\)...
    Gal Arnon, Alessandro Chiesa, Eylon Yogev in Advances in Cryptology – EUROCRYPT 2022
    Conference paper 2022
  17. A Quantum Circuit to Speed-Up the Cryptanalysis of Code-Based Cryptosystems

    The significant interest in cryptographic primitives providing sound security margins when facing attacks with quantum computers is witnessed by the...
    Simone Perriello, Alessandro Barenghi, Gerardo Pelosi in Security and Privacy in Communication Networks
    Conference paper 2021
  18. Succinct Arguments for RAM Programs via Projection Codes

    Motivated by the goal of proving statements that involve small subsets of a big database, we introduce and study the notion of projection codes. A...
    Yuval Ishai, Rafail Ostrovsky, Akash Shah in Advances in Cryptology – CRYPTO 2023
    Conference paper 2023
  19. Locally Decodable and Updatable Non-malleable Codes and Their Applications

    Non-malleable codes, introduced as a relaxation of error-correcting codes by Dziembowski, Pietrzak, and Wichs (ICS ’10), provide the security...

    Dana Dachman-Soled, Feng-Hao Liu, ... Hong-Sheng Zhou in Journal of Cryptology
    Article 27 November 2018
Did you find what you were looking for? Share feedback.