Sciweavers

1579 search results - page 63 / 316
» On the Constructions of Constant-Weight Codes
Sort
View
JSA
2007
89views more  JSA 2007»
14 years 9 months ago
Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard
— Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. Methods based on traditional fault-tolerant architectures are not suited for prot...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
TSP
2008
112views more  TSP 2008»
14 years 9 months ago
An Algebraic Coding Scheme for Wireless Relay Networks With Multiple-Antenna Nodes
Abstract--We consider the problem of coding over a half-duplex wireless relay network where both the transmitter and the receiver have respectively several transmit and receive ant...
Frédérique E. Oggier, Babak Hassibi
CORR
2008
Springer
117views Education» more  CORR 2008»
14 years 8 months ago
Complexity of Decoding Positive-Rate Reed-Solomon Codes
Abstract. The complexity of maximum likelihood decoding of the ReedSolomon codes [q -1, k]q is a well known open problem. The only known result [4] in this direction states that it...
Qi Cheng, Daqing Wan
WCC
2005
Springer
130views Cryptology» more  WCC 2005»
15 years 3 months ago
On the Design of Codes for DNA Computing
In this paper, we describe a broad class of problems arising in the context of designing codes for DNA computing. We primarily focus on design considerations pertaining to the phen...
Olgica Milenkovic, Navin Kashyap
ICIP
2002
IEEE
15 years 11 months ago
Anti-collusion codes: multi-user and multimedia perspectives
Digital fingerprinting is an effective method to identify users who might try to redistribute multimedia content, such as images and video. These fingerprints are typically embedd...
Wade Trappe, Min Wu, K. J. Ray Liu