We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 410 results
  1. Coding and bounds for partially defective memory cells

    This paper considers coding for so-called partially stuck (defect) memory cells. Such memory cells can only store partial information as some of...

    Haider Al Kim, Sven Puchinger, ... Antonia Wachter-Zeh in Designs, Codes and Cryptography
    Article Open access 24 August 2023
  2. On the Minimum Depth of Circuits with Linear Number of Wires Encoding Good Codes

    We determine, up to an additive constant 2, the minimum depth required to encode asymptotically good error-correcting codes using a linear number of...
    Andrew Drucker, Yuan Li in Computing and Combinatorics
    Conference paper 2024
  3. A new metric on symmetric groups and applications to block permutation codes

    Permutation codes have received a great attention due to various applications. For different applications, one needs permutation codes under...

    Article 03 March 2023
  4. Generic Error SDP and Generic Error CVE

    This paper introduces a new family of CVE schemes built from generic errors (GE-CVE) and identifies a vulnerability therein. To introduce the...
    Felice Manganiello, Freeman Slaughter in Code-Based Cryptography
    Conference paper 2023
  5. On Linear Complexity of Finite Sequences: Coding Theory and Applications to Cryptography

    We define two metrics on vector spaces over a finite field using the linear complexity of finite sequences. We then develop coding theory notions for...
    Edoardo Persichetti, Tovohery H. Randrianarisoa in Advances in Information and Computer Security
    Conference paper 2022
  6. Asymmetric entanglement-assisted quantum codes: bound and constructions

    The theory of quantum error-correcting codes has been extended to asymmetric quantum channels-qubit-flip and phase-shift errors may have equal or...

    Hualu Liu, Peng Hu, **usheng Liu in Designs, Codes and Cryptography
    Article 15 February 2021
  7. LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals

    We introduce a new rank-based key encapsulation mechanism (KEM) with public key and ciphertext sizes around 3.5 Kbytes each, for 128 bits of...
    Carlos Aguilar-Melchor, Nicolas Aragon, ... Gilles Zémor in Post-Quantum Cryptography
    Conference paper 2022
  8. On non-binary traceability set systems

    We introduce non-binary IPP set systems with traceability properties that have IPP codes and binary IPP set systems with traceability capabilities as...

    Elena Egorova, Marcel Fernandez, Grigory Kabatiansky in Designs, Codes and Cryptography
    Article 19 March 2020
  9. Steane-enlargement of quantum codes from the Hermitian function field

    In this paper, we study the construction of quantum codes by applying Steane-enlargement to codes from the Hermitian function field. We cover...

    René Bødker Christensen, Olav Geil in Designs, Codes and Cryptography
    Article 11 February 2020
  10. Achieving Positive Rates with Predetermined Dictionaries

    In the first part of the paper we consider binary input channels that are not necessarily stationary and show how positive rates can be achieved...
    Conference paper 2021
  11. Quasi-cyclic constructions of asymmetric quantum error-correcting codes

    Asymmetric quantum error-correcting codes (AQECCs) are an extremely efficient coding scheme against the different occurring probabilities of...

    **gjie Lv, Ruihu Li, Yu Yao in Cryptography and Communications
    Article 22 May 2021
  12. Post-quantum Secure Stateful Deterministic Wallet from Code-Based Signature Featuring Uniquely Rerandomized Keys

    The deterministic wallet is a promising cryptographic primitive used in cryptocurrencies to protect users’ wealth where a key derivation process...
    Conference paper 2023
  13. Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets

    We improve the flexibility in designing access structures of quantum stabilizer-based secret sharing schemes for classical secrets, by introducing...

    Ryutaroh Matsumoto in Designs, Codes and Cryptography
    Article Open access 27 March 2020
  14. Densities of codes of various linearity degrees in translation-invariant metric spaces

    We investigate the asymptotic density of error-correcting codes with good distance properties and prescribed linearity degree, including (sub)linear...

    Anina Gruica, Anna-Lena Horlemann, ... Nadja Willenborg in Designs, Codes and Cryptography
    Article Open access 29 May 2023
  15. Information Set Decoding for Lee-Metric Codes Using Restricted Balls

    The Lee metric syndrome decoding problem is an NP-hard problem and several generic decoders have been proposed. The observation that such decoders...
    Jessica Bariffi, Karan Khathuria, Violetta Weger in Code-Based Cryptography
    Conference paper 2023
  16. Limits of Preprocessing

    Yuval Filmus, Yuval Ishai, ... Guy Kindler in computational complexity
    Article Open access 23 May 2024
  17. An Analysis of the RankSign Signature Scheme with Rank Multipliers

    We investigate the application of rank multipliers as introduced by Loidreau to repair the 2017 NIST proposal RankSign. In RankSign, a signature is...
    Anna Baumeister, Hannes Bartz, Antonia Wachter-Zeh in Code-Based Cryptography
    Conference paper 2023
  18. Non-malleable Codes with Optimal Rate for Poly-Size Circuits

    We give an explicit construction of non-malleable codes with rate \(1-o(1)\)...
    Marshall Ball, Ronen Shaltiel, Jad Silbak in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  19. Reduction from Sparse LPN to LPN, Dual Attack 3.0

    The security of code-based cryptography relies primarily on the hardness of decoding generic linear codes. Until very recently, all the best...
    Kévin Carrier, Thomas Debris-Alazard, ... Jean-Pierre Tillich in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
Did you find what you were looking for? Share feedback.