搜索结果: 1-9 共查到“Coding Theory”相关记录9条 . 查询时间(0.062 秒)
A Traceable Ring Signature Scheme based on Coding Theory
cryptographic protocols digital signatures
2019/4/1
Traceable ring signatures are a variant of ring signatures which allows the identity of a user to be revealed, when it signs two different messages with respect to the same group of users. It has appl...
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
Side-channel analysis belief propagation random probing model
2018/5/28
One important open question in the field of side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as suggested by masking security...
The design of an efficient code-based signature scheme is by all means still an open problem. In this paper, we propose a simple and efficient scheme following the framework detailed by Lyubashevsky t...
A Provably Secure Short Signature Scheme from Coding Theory
code-based signatures signatures with message recovery provable security
2015/12/22
Signatures with partially message recovery in which some parts of messages are not transmitted with signatures to make them shorter are useful where bandwidth is one of the crucial concern and especia...
Restle's coding theory for movement perception is merged with certain aspects of Johansson's vector descriptions of movement to investigate the relative per-ceptual prominence of several kinds of disp...
A nonlinear neural population coding theory of quantum cognition and decision making
Quantum Probability Psychophysics Neuroeconomics Population Coding
2013/2/20
Mathematical frameworks of quantum theory have recently been adopted in cognitive and behavioral sciences, to explain the violations of normative decision theory and anomalies in cognition. However, t...
On Constructing Homomorphic Encryption Schemes from Coding Theory
foundations Homomorphic Encryption Coding Theory Efficiency
2011/7/25
Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications.
On Constructing Homomorphic Encryption Schemes from Coding Theory
foundations / Homomorphic Encryption Coding Theory Efficiency Provable Security
2012/3/28
Homomorphic encryption schemes are powerful cryptographic primitives that allow for a variety of applications. Consequently, a variety of proposals have been made in the recent decades but none of the...
Applications of semidefinite programming to coding theory
Applications semidefinite programming to coding theory
2010/12/1
We survey recent generalizations and improvements of the linear programming method that involve semidefinite programming. A general framework using group representations and tools from graph theory is...