Cai, “Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding,” In Cryptography and Coding - 8th IMA Int. Conf. Proc. (to be ...
(2021) Carlet. Boolean Functions for Cryptography and Coding Theory. Boolean functions are essential to systems for secure and reliable communication. This comprehensive survey of Boolean functions for cryptography and coding covers the whole domain and
Koetter R., Kschischang F.R.: Coding for errors and erasures in random network coding. IEEE Trans. Inf. Theory 54, 3579–3591 (2008). Kohnert A., Kurz S.: Construction of large constant dimension codes with a prescribed minimum distance. In: Lecture Notes Computer Science, vol. 5393,...
In addition, our improvement finds interesting applications to character sums, cryptography and coding theory. The key idea behind is that this curve has the Hasse–Witt invariant 0 and we show that the Hasse–Weil bound can be improved for any curves with the Hasse–Witt invariant 0. The ...
Lau, V.K.N., Maric, S.V. (1997). Variable rate adaptive channel coding for coherent and non-coherent rayleigh fading channel. In: Darnell, M. (eds) Crytography and Coding. Cryptography and Coding 1997. Lecture Notes in Computer Science, vol 1355. Springer, Berlin, Heidelberg. https:/...
Network coding offers the potential to increase throughput and improve robustness without any centralized control. Unfortunately, network coding is highly susceptible to “pollution attacks” in which malicious nodes modify packets improperly so as to...
To satisfy the demanding requirements of 5G NR system, new error-correcting codes have been introduced in 5G NR for both data and control channels. Low-density parity-check (LDPC) codes are adopted to support data channels, replacing the turbo codes used in 4G LTE system. Polar codes are ad...
Lossless and reversible data hiding in encrypted images with public-key cryptography. IEEE Trans. Circuits Syst. Video Technol. 2015, 26, 1622–1631. [Google Scholar] [CrossRef] Zhang, W.; Wang, H.; Hou, D.; Yu, N. Reversible data hiding in encrypted images by reversible image ...
Versions Notes Abstract An effective construction method for long-length quantum code has important applications in the field based on large-scale data. With the rapid development of quantum computing, how to construct this class of quantum coding has become one of the key research fields in quantu...