Sciweavers

437 search results - page 78 / 88
» Randomized Lattice Decoding
Sort
View
83
Voted
CORR
2006
Springer
87views Education» more  CORR 2006»
14 years 11 months ago
Capacity of a Class of Deterministic Relay Channels
Abstract-- The capacity of a class of deterministic relay channels with the transmitter input X, the receiver output Y , the relay output Y1 = f(X, Y ), and a separate communicatio...
Thomas M. Cover, Young-Han Kim
CORR
2006
Springer
104views Education» more  CORR 2006»
14 years 11 months ago
Asymptotically Optimal Multiple-access Communication via Distributed Rate Splitting
We consider the multiple-access communication problem in a distributed setting for both the additive white Gaussian noise channel and the discrete memoryless channel. We propose a ...
Jian Cao, Edmund M. Yeh
JOC
2008
92views more  JOC 2008»
14 years 11 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
IJNSEC
2007
118views more  IJNSEC 2007»
14 years 11 months ago
Code-based Ring Signature Scheme
McEliece is one of the oldest known public key cryptosystems, however it was not quite as successful as RSA. One main reason is that it is widely believed that code-based cryptosy...
Dong Zheng, Xiangxue Li, Kefei Chen
TIT
2008
87views more  TIT 2008»
14 years 11 months ago
Coding Theorems on the Threshold Scheme for a General Source
In this paper, coding theorems on the (t; m)-threshold scheme for a general source are discussed, where m means the number of the shares and t means a threshold. The (t; m)-thresho...
Hiroki Koga