Approximate nearest neighbor search in high dimensions

A Andoni, P Indyk, I Razenshteyn - Proceedings of the International …, 2018 - World Scientific
The nearest neighbor problem is defined as follows: Given a set P of n points in some metric
space (X, D), build a data structure that, given any point q, returns a point in P that is closest …

[KIRJA][B] Concise encyclopedia of coding theory

WC Huffman, JL Kim, P Solé - 2021 - api.taylorfrancis.com
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …

Randomly punctured Reed–Solomon codes achieve list-decoding capacity over linear-sized fields

O Alrabiah, V Guruswami, R Li - Proceedings of the 56th Annual ACM …, 2024 - dl.acm.org
Reed–Solomon codes are a classic family of error-correcting codes consisting of
evaluations of low-degree polynomials over a finite field on some sequence of distinct field …

Coded trace reconstruction

M Cheraghchi, R Gabrys, O Milenkovic… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Motivated by average-case trace reconstruction and coding for portable DNA-based storage
systems, we initiate the study of coded trace reconstruction, the design and analysis of high …

Generic reed-solomon codes achieve list-decoding capacity

J Brakensiek, S Gopi, V Makam - Proceedings of the 55th Annual ACM …, 2023 - dl.acm.org
In a recent paper, Brakensiek, Gopi and Makam introduced higher order MDS codes as a
generalization of MDS codes. An order-ℓ MDS code, denoted by MDS (ℓ), has the property …

Randomly punctured reed-solomon codes achieve the list decoding capacity over polynomial-size alphabets

Z Guo, Z Zhang - 2023 IEEE 64th Annual Symposium on …, 2023 - ieeexplore.ieee.org
This paper shows that, with high probability, randomly punctured Reed-Solomon codes over
fields of polynomial size achieve the list decoding capacity. More specifically, we prove that …

Partitionchain: A scalable and reliable data storage strategy for permissioned blockchain

Z Du, X Pang, H Qian - IEEE Transactions on Knowledge and …, 2021 - ieeexplore.ieee.org
Blockchain, a specific distributed database which maintains a list of data records against
tampering and corruption, has aroused wide interests and become a hot topic in the real …

Lossy cryptography from code-based assumptions

Q Dao, A Jain - Annual International Cryptology Conference, 2024 - Springer
Over the past few decades, we have seen a proliferation of advanced cryptographic
primitives with lossy or homomorphic properties built from various assumptions such as …

Low-complexity cryptographic hash functions

B Applebaum, N Haramaty-Krasne, Y Ishai… - 2017 - dspace.mit.edu
Cryptographic hash functions are efficiently computable functions that shrink a long input
into a shorter output while achieving some of the useful security properties of a random …

Improved alternating-moduli PRFs and post-quantum signatures

N Alamati, GV Policharla, S Raghuraman… - Annual International …, 2024 - Springer
We revisit the alternating moduli paradigm for constructing symmetric key primitives with a
focus on constructing highly efficient protocols to evaluate them using secure multi-party …