Results 51 to 60 of about 710 (71)

Construction of LDPC convolutional codes via difference triangle sets. [PDF]

open access: yesDes Codes Cryptogr, 2021
Alfarano GN, Lieb J, Rosenthal J.
europepmc   +1 more source

Generic constructions of PoRs from codes and instantiations

open access: yesJournal of Mathematical Cryptology, 2019
In this paper, we show how to construct โ€“ from any linear code โ€“ a Proof of Retrievability (๐–ฏ๐—ˆ๐–ฑ{\mathsf{PoR}}) which features very low computation complexity on both the client (๐–ต๐–พ๐—‹๐—‚๐–ฟ๐—‚๐–พ๐—‹{\mathsf{Verifier}}) and the server (๐–ฏ๐—‹๐—ˆ๐—๐–พ๐—‹{\mathsf{Prover}}) sides,
Lavauzelle Julien   +1 more
doaj   +1 more source

Codes from Jacobian surfaces

open access: yes, 2015
This paper is concerned with some Algebraic Geometry codes on Jacobians of genus 2 curves. We derive a lower bound for the minimum distance of these codes from an upper "Weil type" bound for the number of rational points on irreducible (possibly singular
Haloui, Safia
core  

Moderate-density parity-check codes from projective bundles. [PDF]

open access: yesDes Codes Cryptogr, 2022
Bariffi J   +3 more
europepmc   +1 more source

A new method of choosing primitive elements for Brezingโ€“Weng families of pairing-friendly elliptic curves

open access: yesJournal of Mathematical Cryptology, 2015
In this paper we present a new method of choosing primitive elements for Brezingโ€“Weng families of pairing-friendly elliptic curves with small rho-values, and we improve on previously known best rho-values of families [J.
Yoon Kisoon
doaj   +1 more source

Low-rank parity-check codes over Galois rings. [PDF]

open access: yesDes Codes Cryptogr, 2021
Renner J, Neri A, Puchinger S.
europepmc   +1 more source

Inner product functional encryption based on the UOV scheme

open access: yesJournal of Mathematical Cryptology
We analyze the efficiency and security of the inner product functional encryption (IPFE) protocol introduced in 2021 by Debnath, Mesnager, Dey, and Kundu, specifically when instantiated with UOV.
La Scala Roberto, Meneghetti Alessio
doaj   +1 more source

New lattice attacks on DSA schemes

open access: yesJournal of Mathematical Cryptology, 2016
We prove that a system of linear congruences of a particular form has at most a unique solution below a certain bound which can be computed efficiently.
Poulakis Dimitrios
doaj   +1 more source

On the Dimension of Algebraic-Geometric Trace Codes

open access: yesMathematics, 2016
We study trace codes induced from codes defined by an algebraic curve X. We determine conditions on X which admit a formula for the dimension of such a trace code.
Phong Le, Sunil Chetty
doaj   +1 more source

A note on cohomology and algebraic geometric codes on the curves over rings

open access: yesAnnals of the West University of Timisoara: Mathematics and Computer Science
Let A be a local Artinian ring with residue field k(A). Let X be a curve over A and let be Xโ€ฒ = X ร—spec A spec k(A) the fiber of X over k(A). Consider โ„’ an invertible sheaf on X and โ„’ โ€ฒ = ฯ•*โ„’ โˆˆ Pic(Xโ€ฒ), where ฯ• : Xโ€ฒ โ†’ X is the natural map.
Nyamda Francis, Mouaha Christophe
doaj   +1 more source

Home - About - Disclaimer - Privacy