Sciweavers

CORR
2010
Springer
107views Education» more  CORR 2010»
12 years 11 months ago
One-Shot Capacity of Discrete Channels
Shannon defined channel capacity as the highest rate at which there exists a sequence of codes of block length n such that the error probability goes to zero as n goes to infinity....
Rui A. Costa, Michael Langberg, João Barros
CORR
2011
Springer
175views Education» more  CORR 2011»
12 years 11 months ago
The Dispersion of Lossy Source Coding
In this work we investigate the behavior of the minimal rate needed in order to guarantee a given probability that the distortion exceeds a prescribed threshold, at some fixed ...
Amir Ingber, Yuval Kochman
JOC
1998
135views more  JOC 1998»
13 years 4 months ago
Attacks on Fast Double Block Length Hash Functions
The security of hash functions based on a block cipher with a block length of m bits and a key length of k bits, where k ≤ m, is considered. New attacks are presented on a large ...
Lars R. Knudsen, Xuejia Lai, Bart Preneel
CORR
2004
Springer
115views Education» more  CORR 2004»
13 years 4 months ago
Bounds on the decoding complexity of punctured codes on graphs
We present two sequences of ensembles of non-systematic irregular repeat-accumulate codes which asymptotically (as their block length tends to infinity) achieve capacity on the bi...
Henry D. Pfister, Igal Sason, Rüdiger L. Urba...
TIT
2008
89views more  TIT 2008»
13 years 4 months ago
Joint Fixed-Rate Universal Lossy Coding and Identification of Continuous-Alphabet Memoryless Sources
Abstract--The problem of joint universal source coding and density estimation is considered in the setting of fixed-rate lossy coding of continuous-alphabet memoryless sources. For...
Maxim Raginsky
CRYPTO
1993
Springer
131views Cryptology» more  CRYPTO 1993»
13 years 8 months ago
Hash Functions Based on Block Ciphers: A Synthetic Approach
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is appro...
Bart Preneel, René Govaerts, Joos Vandewall...
IMA
2009
Springer
139views Cryptology» more  IMA 2009»
13 years 11 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks