Results 1 - 10
of
242,283
Primal-Dual Distance Bounds of Linear Codes With Application To Cryptography
, 2005
"... We propose upper and lower bounds on the minimum code length of linear codes with specified minimum Hamming distance and dual distance. From these ..."
Abstract
-
Cited by 8 (0 self)
- Add to MetaCart
We propose upper and lower bounds on the minimum code length of linear codes with specified minimum Hamming distance and dual distance. From these
unknown title
, 2005
"... Primal-dual distance bounds of linear codes with application to cryptography ..."
Abstract
- Add to MetaCart
Primal-dual distance bounds of linear codes with application to cryptography
unknown title
"... Primal-dual distance bounds of linear codes with application to cryptography ..."
Abstract
- Add to MetaCart
Primal-dual distance bounds of linear codes with application to cryptography
A first-order primal-dual algorithm for convex problems with applications to imaging
, 2010
"... In this paper we study a first-order primal-dual algorithm for convex optimization problems with known saddle-point structure. We prove convergence to a saddle-point with rate O(1/N) in finite dimensions, which is optimal for the complete class of non-smooth problems we are considering in this paper ..."
Abstract
-
Cited by 435 (20 self)
- Add to MetaCart
In this paper we study a first-order primal-dual algorithm for convex optimization problems with known saddle-point structure. We prove convergence to a saddle-point with rate O(1/N) in finite dimensions, which is optimal for the complete class of non-smooth problems we are considering
New Directions in Cryptography
, 1976
"... Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper sug ..."
Abstract
-
Cited by 3499 (7 self)
- Add to MetaCart
Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to a need for new types of cryptographic systems, which minimize the need for secure key distribution channels and supply the equivalent of a written signature. This paper
Construction of linear codes having prescribed primal-dual minimum distance with applications in cryptography
- Albanian Journal Math
"... ABSTRACT. A method is given for the construction of linear codes with prescribed min-imum distance and also prescribed minimum distance of the dual code. This works for codes over arbitrary finite fields. In the case of binary codes Matsumoto et al. showed how such codes can be used to construct cry ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
ABSTRACT. A method is given for the construction of linear codes with prescribed min-imum distance and also prescribed minimum distance of the dual code. This works for codes over arbitrary finite fields. In the case of binary codes Matsumoto et al. showed how such codes can be used to construct
On Lattices, Learning with Errors, Random Linear Codes, and Cryptography
- In STOC
, 2005
"... Our main result is a reduction from worst-case lattice problems such as SVP and SIVP to a certain learning problem. This learning problem is a natural extension of the ‘learning from parity with error’ problem to higher moduli. It can also be viewed as the problem of decoding from a random linear co ..."
Abstract
-
Cited by 366 (6 self)
- Add to MetaCart
Our main result is a reduction from worst-case lattice problems such as SVP and SIVP to a certain learning problem. This learning problem is a natural extension of the ‘learning from parity with error’ problem to higher moduli. It can also be viewed as the problem of decoding from a random linear
Iterative decoding of binary block and convolutional codes
- IEEE Trans. Inform. Theory
, 1996
"... Abstract- Iterative decoding of two-dimensional systematic convolutional codes has been termed “turbo ” (de)coding. Using log-likelihood algebra, we show that any decoder can he used which accepts soft inputs-including a priori values-and delivers soft outputs that can he split into three terms: the ..."
Abstract
-
Cited by 600 (43 self)
- Add to MetaCart
: the soft channel and a priori inputs, and the extrinsic value. The extrinsic value is used as an a priori value for the next iteration. Decoding algorithms in the log-likelihood domain are given not only for convolutional codes hut also for any linear binary systematic block code. The iteration
Results 1 - 10
of
242,283