Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Approximate nearest neighbor search in high dimensions
The nearest neighbor problem is defined as follows: Given a set P of n points in some metric
space (X, D), build a data structure that, given any point q, returns a point in P that is closest …
space (X, D), build a data structure that, given any point q, returns a point in P that is closest …
[KIRJA][B] Concise encyclopedia of coding theory
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Randomly punctured Reed–Solomon codes achieve list-decoding capacity over linear-sized fields
Reed–Solomon codes are a classic family of error-correcting codes consisting of
evaluations of low-degree polynomials over a finite field on some sequence of distinct field …
evaluations of low-degree polynomials over a finite field on some sequence of distinct field …
Coded trace reconstruction
Motivated by average-case trace reconstruction and coding for portable DNA-based storage
systems, we initiate the study of coded trace reconstruction, the design and analysis of high …
systems, we initiate the study of coded trace reconstruction, the design and analysis of high …
Generic reed-solomon codes achieve list-decoding capacity
In a recent paper, Brakensiek, Gopi and Makam introduced higher order MDS codes as a
generalization of MDS codes. An order-ℓ MDS code, denoted by MDS (ℓ), has the property …
generalization of MDS codes. An order-ℓ MDS code, denoted by MDS (ℓ), has the property …
Randomly punctured reed-solomon codes achieve the list decoding capacity over polynomial-size alphabets
This paper shows that, with high probability, randomly punctured Reed-Solomon codes over
fields of polynomial size achieve the list decoding capacity. More specifically, we prove that …
fields of polynomial size achieve the list decoding capacity. More specifically, we prove that …
Partitionchain: A scalable and reliable data storage strategy for permissioned blockchain
Z Du, X Pang, H Qian - IEEE Transactions on Knowledge and …, 2021 - ieeexplore.ieee.org
Blockchain, a specific distributed database which maintains a list of data records against
tampering and corruption, has aroused wide interests and become a hot topic in the real …
tampering and corruption, has aroused wide interests and become a hot topic in the real …
Lossy cryptography from code-based assumptions
Over the past few decades, we have seen a proliferation of advanced cryptographic
primitives with lossy or homomorphic properties built from various assumptions such as …
primitives with lossy or homomorphic properties built from various assumptions such as …
Low-complexity cryptographic hash functions
B Applebaum, N Haramaty-Krasne, Y Ishai… - 2017 - dspace.mit.edu
Cryptographic hash functions are efficiently computable functions that shrink a long input
into a shorter output while achieving some of the useful security properties of a random …
into a shorter output while achieving some of the useful security properties of a random …
Improved alternating-moduli PRFs and post-quantum signatures
We revisit the alternating moduli paradigm for constructing symmetric key primitives with a
focus on constructing highly efficient protocols to evaluate them using secure multi-party …
focus on constructing highly efficient protocols to evaluate them using secure multi-party …