-
1Academic Journal
Authors: Malinowski, Simon, Jégou, Hervé, Guillemot, Christine
Contributors: Jégou, Hervé, Digital image processing, modeling and communication (TEMICS), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre National de la Recherche Scientifique (CNRS)-Centre Inria de l'Université de Rennes, Institut National de Recherche en Informatique et en Automatique (Inria), Learning and recognition in vision (LEAR), Centre Inria de l'Université Grenoble Alpes, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Laboratoire Jean Kuntzmann (LJK), Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP)-Centre National de la Recherche Scientifique (CNRS)
Source: IEEE Transactions on Information Theory. 53:368-377
Subject Terms: Networking and Internet Architecture (cs.NI), FOS: Computer and information sciences, [INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI], ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, joint source/channel coding, Computer Science - Information Theory, Information Theory (cs.IT), 05 social sciences, [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT], 02 engineering and technology, variable length codes, Computer Science - Networking and Internet Architecture, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], [MATH.MATH-IT] Mathematics [math]/Information Theory [math.IT], 0508 media and communications, [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], 0202 electrical engineering, electronic engineering, information engineering, [INFO.INFO-IT] Computer Science [cs]/Information Theory [cs.IT], data compression
File Description: application/pdf
Linked Full TextAccess URL: http://arxiv.org/pdf/cs/0612059
http://arxiv.org/abs/cs/0612059
https://inria.hal.science/inria-00119600v2/document
https://inria.hal.science/inria-00119600v2
https://doi.org/10.1109/tit.2006.887512
http://yadda.icm.edu.pl/yadda/element/bwmeta1.element.ieee-000004039667
https://hal.inria.fr/inria-00119600v2
https://www.infona.pl/resource/bwmeta1.element.ieee-art-000004039667
https://hal.inria.fr/inria-00119600/document
https://dblp.uni-trier.de/db/journals/corr/corr0612.html#abs-cs-0612059
http://dblp.uni-trier.de/db/journals/corr/corr0612.html#abs-cs-0612059 -
2Conference
Authors: Hoyrup, Mathieu
Contributors: Theoretical adverse computations, and safety (CARTE), Centre Inria de l'Université de Lorraine, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Department of Formal Methods (LORIA - FM), Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-Laboratoire Lorrain de Recherche en Informatique et ses Applications (LORIA), Institut National de Recherche en Informatique et en Automatique (Inria)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS)-CentraleSupélec-Université de Lorraine (UL)-Centre National de la Recherche Scientifique (CNRS), Christoph Dürr and Thomas Wilke
Source: STACS'12 (29th Symposium on Theoretical Aspects of Computer Science) ; https://inria.hal.science/inria-00606457 ; STACS'12 (29th Symposium on Theoretical Aspects of Computer Science), Feb 2012, Paris, France. pp.567-576
Subject Terms: Shannon-McMillan-Breiman theorem, Martin-Löf random sequence, effective Hausdorff dimension, compression rate, entropy, ACM: F.: Theory of Computation/F.4: MATHEMATICAL LOGIC AND FORMAL LANGUAGES/F.4.1: Mathematical Logic/F.4.1.0: Computability theory, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/1107.1149; ARXIV: 1107.1149
-
3Conference
Authors: Legeay, Matthieu
Contributors: Institut de Recherche Mathématique de Rennes (IRMAR), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-École normale supérieure - Rennes (ENS Rennes)-Université de Rennes 2 (UR2)-Centre National de la Recherche Scientifique (CNRS)-INSTITUT AGRO Agrocampus Ouest, Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)-Institut national d'enseignement supérieur pour l'agriculture, l'alimentation et l'environnement (Institut Agro)
Source: WCC 2011 - Workshop on coding and cryptography ; https://inria.hal.science/inria-00608107 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.193-202
Subject Terms: permutation group, subcode, idempotent subcode, de- coding, Goppa code, quasi-cyclic code, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
-
4Conference
Authors: Pham Sy, Lam, Savin, Valentin, Declercq, David, Pham, Nghia
Contributors: EutelSAT, Eutelsat, Commissariat à l'énergie atomique et aux énergies alternatives - Laboratoire d'Electronique et de Technologie de l'Information (CEA-LETI), Direction de Recherche Technologique (CEA) (DRT (CEA)), Commissariat à l'énergie atomique et aux énergies alternatives (CEA)-Commissariat à l'énergie atomique et aux énergies alternatives (CEA), Equipes Traitement de l'Information et Systèmes (ETIS - UMR 8051), Ecole Nationale Supérieure de l'Electronique et de ses Applications (ENSEA)-Centre National de la Recherche Scientifique (CNRS)-CY Cergy Paris Université (CY)
Source: WCC 2011 - Workshop on coding and cryptography ; https://inria.hal.science/inria-00614468 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.429-432
Subject Terms: LDPC codes, bipartite graph, PEG, UL-FEC, decoding overhead/inefficiency, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
-
5Conference
Authors: Chabot, Christophe
Contributors: Calculs Algébriques et Systèmes Dynamiques (CASYS), Laboratoire Jean Kuntzmann (LJK), Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre Mendès France - Grenoble 2 (UPMF)-Université Joseph Fourier - Grenoble 1 (UJF)-Institut polytechnique de Grenoble - Grenoble Institute of Technology (Grenoble INP)-Centre National de la Recherche Scientifique (CNRS)
Source: WCC 2011 - Workshop on coding and cryptography ; https://inria.hal.science/inria-00611781 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.209-218
Subject Terms: Quasi-cyclic codes, factorisation, non-integral ring, olynomials with matricial coefficients, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
-
6Conference
Authors: Augot, Daniel, Barbier, Morgan, Couvreur, Alain
Contributors: Algorithmic number theory for cryptology (TANC), Laboratoire d'informatique de l'École polytechnique Palaiseau (LIX), École polytechnique (X), Institut Polytechnique de Paris (IP Paris)-Institut Polytechnique de Paris (IP Paris)-Centre National de la Recherche Scientifique (CNRS)-École polytechnique (X), Institut Polytechnique de Paris (IP Paris)-Institut Polytechnique de Paris (IP Paris)-Centre National de la Recherche Scientifique (CNRS)-Centre Inria de Saclay, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Institut Polytechnique de Paris (IP Paris)-Institut Polytechnique de Paris (IP Paris)-Centre National de la Recherche Scientifique (CNRS), Institut de Mathématiques de Bordeaux (IMB), Université de Bordeaux (UB)-Institut Polytechnique de Bordeaux (Bordeaux INP)-Centre National de la Recherche Scientifique (CNRS), Shokrollahi. Amin and da Rocha Jr., Valdemar C. and Costa, Sueli I. R.
Source: IEEE Information Theory Workshop ; https://inria.hal.science/hal-00643794 ; IEEE Information Theory Workshop, Oct 2011, Paraty, Brazil. pp.229 - 233, ⟨10.1109/ITW.2011.6089384⟩
Subject Terms: ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
-
7Conference
Authors: Byrne, Eimear, Sneyd, Alison
Contributors: School of Mathematical Sciences, University College Dublin, University College Dublin Dublin (UCD)
Source: WCC 2011 - Workshop on coding and cryptography ; https://inria.hal.science/inria-00607341 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.81-90
Subject Terms: ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607341; https://inria.hal.science/inria-00607341; https://inria.hal.science/inria-00607341/document; https://inria.hal.science/inria-00607341/file/133.pdf
-
8Conference
Authors: Solé, Patrick, Belfiore, Jean-Claude
Contributors: Télécom ParisTech
Source: WCC 2011 - Workshop on coding and cryptography ; https://inria.hal.science/inria-00614479 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.453-462
Subject Terms: spherical codes, codes for the Euclidean metric, saddle point method, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614479; https://inria.hal.science/inria-00614479; https://inria.hal.science/inria-00614479/document; https://inria.hal.science/inria-00614479/file/10.pdf
-
9Conference
Authors: Trautmann, Anna-Lena, Rosenthal, Joachim
Contributors: Universität Zürich Zürich = University of Zurich (UZH)
Source: WCC 2011 - Workshop on coding and cryptography ; https://inria.hal.science/inria-00611789 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.219-228
Subject Terms: ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00611789; https://inria.hal.science/inria-00611789; https://inria.hal.science/inria-00611789/document; https://inria.hal.science/inria-00611789/file/83.pdf
-
10Conference
Authors: De Boeck, Maarten
Contributors: Department of Mathematics Gent/Ghent, Universiteit Gent = Ghent University Belgium (UGENT)
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607291 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.57-62
Subject Terms: Linear codes, Projective spaces, Small weight codewords, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Relation: inria-00607291; https://hal.inria.fr/inria-00607291; https://hal.inria.fr/inria-00607291/document; https://hal.inria.fr/inria-00607291/file/53.pdf
-
11Conference
Contributors: Università Politecnica delle Marche Ancona (UNIVPM), Allergy Unit - Department of Dermatology, Universität Zürich Zürich (UZH)
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607772 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.173-182
Subject Terms: public key security, McEliece cryptosystem, error-correcting codes, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607772; https://hal.inria.fr/inria-00607772; https://hal.inria.fr/inria-00607772/document; https://hal.inria.fr/inria-00607772/file/69.pdf
-
12Conference
Authors: Vandendriessche, Peter
Contributors: Department of Mathematics, Universiteit Gent = Ghent University Belgium (UGENT)
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00614462 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.419-428
Subject Terms: LDPC codes, bounds, fi nite geometry codes, minimum distance, partial and semipartial geometries, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614462; https://hal.inria.fr/inria-00614462; https://hal.inria.fr/inria-00614462/document; https://hal.inria.fr/inria-00614462/file/61.pdf
-
13Conference
Authors: Hakala, Risto
Contributors: Department of Information and Computer Science, Aalto University
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00614457 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.397-404
Subject Terms: Nonlinearity, Welch Costas functions, exponential function, Fourier transform, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00614457; https://hal.inria.fr/inria-00614457; https://hal.inria.fr/inria-00614457/document; https://hal.inria.fr/inria-00614457/file/52.pdf
-
14Conference
Authors: Schulte-Geers, Ernst
Contributors: Bundesamt für Sicherheit in der Informationstechnik = Office fédéral de la sécurité des technologies de l’information = Federal Office for Information Security (BSI)
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607747 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.131-142
Subject Terms: CCZ-equivalence, addition, Walsh transform, di erential eq. of addition, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607747; https://hal.inria.fr/inria-00607747; https://hal.inria.fr/inria-00607747/document; https://hal.inria.fr/inria-00607747/file/113.pdf
-
15Conference
Authors: Byrne, Eimear, Greferath, Marcus, Zumbragel, Jens, Pernas, Jaume
Contributors: Claude Shannon Institute, University College Dublin Dublin (UCD), Departament d'Enginyeria de la Informacio i de les Comunicacions Barcelona (DEIC / UAB), Universitat Autònoma de Barcelona (UAB)
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607733 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.101-110
Subject Terms: module of solutions, negacyclic code, integers modulo 4, Lee metric, Galois Ring, decoding, Grobner bases, key equation, solution by approximations, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607733; https://hal.inria.fr/inria-00607733; https://hal.inria.fr/inria-00607733/document; https://hal.inria.fr/inria-00607733/file/66.pdf
-
16Conference
Authors: Ville, Junnila, Laihonen, Tero
Contributors: Turku Centre for Computer Science, University of Turku
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607289 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.47-56
Subject Terms: Identifying code, optimal code, hexagonal grid, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607289; https://hal.inria.fr/inria-00607289; https://hal.inria.fr/inria-00607289/document; https://hal.inria.fr/inria-00607289/file/45.pdf
-
17Conference
Authors: Boev, Stoyan, Honold, Thomas, Landjev, Ivan
Contributors: New Bulgarian University, Department of Information and Electronic Engineering, Department of Information and Electronic Engineering Zhejiang University, Hangzhou, CHINA, Institute of Mathematics and Informatics Sofia (IMI), Bulgarian Academy of Sciences (BAS)
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607294 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.63-70
Subject Terms: projective Hjelmslev geometry, projective Hjelmslev plane, arcs, optimal arcs, finite chain ring Subject Classifications:51E26, 51E21, 51E22, 94B05, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607294; https://hal.inria.fr/inria-00607294; https://hal.inria.fr/inria-00607294/document; https://hal.inria.fr/inria-00607294/file/67.pdf
-
18Conference
Authors: Farashahi, Reza Rezaeian
Contributors: Department of computing (Department of computing), Macquarie University
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607279 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.37-46
Subject Terms: Elliptic curve, Legendre curve, Jacobi curve, Hessian curve, Edwards curve, j-invariant, isomorphism, cryptography, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607279; https://hal.inria.fr/inria-00607279; https://hal.inria.fr/inria-00607279/document; https://hal.inria.fr/inria-00607279/file/76.pdf
-
19Conference
Authors: Santanu, Sarkar, Maitra, Subhamoy
Contributors: Indian Statistical Institute Kolkata
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607276 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.27-36
Subject Terms: RSA, CRT-RSA, Dual CRT-RSA, Cryptanalysis, Lattices, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607276; https://hal.inria.fr/inria-00607276; https://hal.inria.fr/inria-00607276/document; https://hal.inria.fr/inria-00607276/file/12.pdf
-
20Conference
Authors: Santanu, Sarkar, Sourav Sen, Gupta, Subhamoy, Maitra
Contributors: Indian Statistical Institute Kolkata
Source: WCC 2011 - Workshop on coding and cryptography ; https://hal.inria.fr/inria-00607242 ; WCC 2011 - Workshop on coding and cryptography, Apr 2011, Paris, France. pp.7-16
Subject Terms: RSA, Error correction, Prime reconstruction, Random known bits, ACM: E.: Data/E.3: DATA ENCRYPTION, ACM: E.: Data/E.4: CODING AND INFORMATION THEORY, ACM: G.: Mathematics of Computing/G.2: DISCRETE MATHEMATICS, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DM]Computer Science [cs]/Discrete Mathematics [cs.DM], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT], [MATH.MATH-IT]Mathematics [math]/Information Theory [math.IT]
Relation: inria-00607242; https://hal.inria.fr/inria-00607242; https://hal.inria.fr/inria-00607242/document; https://hal.inria.fr/inria-00607242/file/90.pdf