메뉴 건너뛰기




Volumn 61, Issue 3, 2015, Pages 1159-1173

Squares of random linear codes

Author keywords

Error correcting codes; Quadratic forms; Random codes; Schur product codes

Indexed keywords

CODES (SYMBOLS); NUMBER THEORY;

EID: 84923273649     PISSN: 00189448     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIT.2015.2393251     Document Type: Article
Times cited : (54)

References (32)
  • 3
    • 70350343371 scopus 로고    scopus 로고
    • Asymptotically good ideal linear secret sharing with strong multiplication over any finite field
    • Santa Barbara, CA, USA, Aug.
    • I. Cascudo, H. Chen, R. Cramer, and C. Xing, "Asymptotically good ideal linear secret sharing with strong multiplication over any finite field," in Proc. 29th Annu. IACR CRYPTO, vol. 5677. Santa Barbara, CA, USA, Aug. 2009, pp. 466-486.
    • (2009) Proc. 29th Annu. IACR CRYPTO , vol.5677 , pp. 466-486
    • Cascudo, I.1    Chen, H.2    Cramer, R.3    Xing, C.4
  • 4
    • 80051980228 scopus 로고    scopus 로고
    • The torsion-limit for algebraic function fields and its application to arithmetic secret sharing
    • Santa Barbara, CA, USA, Aug.
    • I. Cascudo, R. Cramer, and C. Xing, "The torsion-limit for algebraic function fields and its application to arithmetic secret sharing," in Proc. 31st Annu. IACR CRYPTO, vol. 6841. Santa Barbara, CA, USA, Aug. 2011, pp. 685-705.
    • (2011) Proc. 31st Annu. IACR CRYPTO , vol.6841 , pp. 685-705
    • Cascudo, I.1    Cramer, R.2    Xing, C.3
  • 6
    • 84903213012 scopus 로고    scopus 로고
    • Torsion limits and Riemann-Roch systems for function fields and applications
    • Jul.
    • I. Cascudo, R. Cramer, and C. Xing, "Torsion limits and Riemann-Roch systems for function fields and applications," IEEE Trans. Inf. Theory, vol. 60, no. 7, pp. 3871-3888, Jul. 2014.
    • (2014) IEEE Trans. Inf. Theory , vol.60 , Issue.7 , pp. 3871-3888
    • Cascudo, I.1    Cramer, R.2    Xing, C.3
  • 7
    • 84862525128 scopus 로고    scopus 로고
    • Asymptotic bound for multiplication complexity in the extensions of small finite fields
    • Jul.
    • I. Cascudo, R. Cramer, C. Xing, and A. Yang, "Asymptotic bound for multiplication complexity in the extensions of small finite fields," IEEE Trans. Inf. Theory, vol. 58, no. 7, pp. 4930-4935, Jul. 2012.
    • (2012) IEEE Trans. Inf. Theory , vol.58 , Issue.7 , pp. 4930-4935
    • Cascudo, I.1    Cramer, R.2    Xing, C.3    Yang, A.4
  • 8
    • 33749554579 scopus 로고    scopus 로고
    • Algebraic geometric secret sharing schemes and secure multi-party computations over small fields
    • Santa Barbara, CA, USA, Aug.
    • H. Chen and R. Cramer, "Algebraic geometric secret sharing schemes and secure multi-party computations over small fields," in Proc. 26th Annu. IACR CRYPTO, vol. 4117. Santa Barbara, CA, USA, Aug. 2006, pp. 521-536.
    • (2006) Proc. 26th Annu. IACR CRYPTO , vol.4117 , pp. 521-536
    • Chen, H.1    Cramer, R.2
  • 11
    • 84905217777 scopus 로고    scopus 로고
    • Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
    • New York, NY, USA: Springer-Verlag, Nov.
    • A. Couvreur, P. Gaborit, V. Gauthier-Umaña, A. Otmani, and J.-P. Tillich, "Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes," in Designs, Codes and Cryptography, vol. 73. New York, NY, USA: Springer-Verlag, Nov. 2014, pp. 641-666.
    • (2014) Designs, Codes and Cryptography , vol.73 , pp. 641-666
    • Couvreur, A.1    Gaborit, P.2    Gauthier-Umaña, V.3    Otmani, A.4    Tillich, J.-P.5
  • 12
    • 84901070281 scopus 로고    scopus 로고
    • New identities relating wild Goppa codes
    • Sep.
    • A. Couvreur, A. Otmani, and J.-P. Tillich, "New identities relating wild Goppa codes," Finite Fields Appl., vol. 29, pp. 178-197, Sep. 2014.
    • (2014) Finite Fields Appl. , vol.29 , pp. 178-197
    • Couvreur, A.1    Otmani, A.2    Tillich, J.-P.3
  • 13
    • 84901650553 scopus 로고    scopus 로고
    • Polynomial time attack on wild McEliece over quadratic extensions
    • Copenhagen, Denmark, May
    • A. Couvreur, A. Otmani, and J.-P. Tillich, "Polynomial time attack on wild McEliece over quadratic extensions," in Proc. 33rd Annu. IACR EUROCRYPT, vol. 8441. Copenhagen, Denmark, May 2014, pp. 17-39.
    • (2014) Proc. 33rd Annu. IACR EUROCRYPT , vol.8441 , pp. 17-39
    • Couvreur, A.1    Otmani, A.2    Tillich, J.-P.3
  • 14
    • 84948975649 scopus 로고    scopus 로고
    • General secure multi-party computation from any linear secret-sharing scheme
    • Bruges, Belgium, May
    • R. Cramer, I. Damgård, and U. Maurer, "General secure multi-party computation from any linear secret-sharing scheme," in Proc. 19th Annu. IACR EUROCRYPT, vol. 1807. Bruges, Belgium, May 2000, pp. 316-334.
    • (2000) Proc. 19th Annu. IACR EUROCRYPT , vol.1807 , pp. 316-334
    • Cramer, R.1    Damgård, I.2    Maurer, U.3
  • 17
    • 0010851903 scopus 로고
    • On the Arf invariant
    • R. H. Dye, "On the Arf invariant," J. Algebra, vol. 53, no. 1, pp. 36-39, 1978.
    • (1978) J. Algebra , vol.53 , Issue.1 , pp. 36-39
    • Dye, R.H.1
  • 18
    • 0042991651 scopus 로고
    • Association schemes of quadratic forms
    • Y. Egawa, "Association schemes of quadratic forms," J. Combinat. Theory, Ser. A, vol. 38, no. 1, pp. 1-14, 1985.
    • (1985) J. Combinat. Theory, Ser. A , vol.38 , Issue.1 , pp. 1-14
    • Egawa, Y.1
  • 22
    • 82955160952 scopus 로고    scopus 로고
    • Zero-knowledge proofs from secure multiparty computation
    • Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, "Zero-knowledge proofs from secure multiparty computation," SIAM J. Comput., vol. 39, no. 3, pp. 1121-1152, 2009.
    • (2009) SIAM J. Comput. , vol.39 , Issue.3 , pp. 1121-1152
    • Ishai, Y.1    Kushilevitz, E.2    Ostrovsky, R.3    Sahai, A.4
  • 23
    • 84905269674 scopus 로고    scopus 로고
    • Connections between construction D and related constructions of lattices
    • Nov.
    • W. Kositwattanarerk and F. Oggier, "Connections between construction D and related constructions of lattices," Designs, Codes, Cryptogr., vol. 73, no. 2, pp. 441-455, Nov. 2014.
    • (2014) Designs, Codes, Cryptogr. , vol.73 , Issue.2 , pp. 441-455
    • Kositwattanarerk, W.1    Oggier, F.2
  • 28
    • 38249008268 scopus 로고
    • On decoding by error location and dependent sets of error positions
    • Sep.
    • R. Pellikaan, "On decoding by error location and dependent sets of error positions," Discrete Math., vols. 106-107, pp. 369-381, Sep. 1992.
    • (1992) Discrete Math. , vol.106-107 , pp. 369-381
    • Pellikaan, R.1
  • 29
    • 84861646697 scopus 로고    scopus 로고
    • Bilinear complexity of algebras and the Chudnovsky-Chudnovsky interpolation method
    • H. Randriambololona, "Bilinear complexity of algebras and the Chudnovsky-Chudnovsky interpolation method," J. Complex., vol. 28, no. 4, pp. 489-517, 2012.
    • (2012) J. Complex. , vol.28 , Issue.4 , pp. 489-517
    • Randriambololona, H.1
  • 30
    • 84876776516 scopus 로고    scopus 로고
    • Asymptotically good binary linear codes with asymptotically good self-intersection spans
    • May
    • H. Randriambololona, "Asymptotically good binary linear codes with asymptotically good self-intersection spans," IEEE Trans. Inf. Theory, vol. 59, no. 5, pp. 3038-3045, May 2013.
    • (2013) IEEE Trans. Inf. Theory , vol.59 , Issue.5 , pp. 3038-3045
    • Randriambololona, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.