Sciweavers

3373 search results - page 39 / 675
» Linear transformations on codes
Sort
View
IH
2005
Springer
15 years 3 months ago
A Family of Collusion 2-Secure Codes
Abstract. We present systematic strategy for collusions attacking a fingerprinting scheme. As a particular case, this strategy shows that linear codes are not good fingerprinting...
Josep Cotrina Navau, Marcel Fernandez, Miguel Sori...
TIT
2010
103views Education» more  TIT 2010»
14 years 4 months ago
Performance bounds for erasure, list and decision feedback schemes with linear block codes
A message independence property and some new performance upper bounds are derived in this work for erasure, list and decision-feedback schemes with linear block codes transmitted ...
Eran Hof, Igal Sason, Shlomo Shamai
ICISC
2007
120views Cryptology» more  ICISC 2007»
14 years 11 months ago
A Note About the Traceability Properties of Linear Codes
We characterize the traceability properties of linear codes. It is well known that any code of length n and minimum distance d is a c-TA code if c2 < n/(n−d). In this paper, w...
Marcel Fernandez, Josep Cotrina Navau, Miguel Sori...
CORR
2010
Springer
80views Education» more  CORR 2010»
14 years 10 months ago
New Set of Codes for the Maximum-Likelihood Decoding Problem
The maximum-likelihood decoding problem is known to be NP-hard for general linear and Reed-Solomon codes [1, 4]. In this paper, we introduce the notion of A-covered codes, that is...
Morgan Barbier
JCT
2006
82views more  JCT 2006»
14 years 9 months ago
A symmetric Roos bound for linear codes
The van Lint-Wilson AB-method yields a short proof of the Roos bound for the minimum distance of a cyclic code. We use the AB-method to obtain a different bound for the weights of...
Iwan M. Duursma, Ruud Pellikaan