Bit Security: optimal adversaries, equivalence results, and a toolbox for computational-statistical security analysis

D Micciancio, M Schultz-Wu - Theory of Cryptography Conference, 2024 - Springer
We investigate the notion of bit-security for decisional cryptographic properties, as originally
proposed in (Micciancio & Walter, Eurocrypt 2018), and its main variants and extensions …

Exponentially Consistent Outlier Hypothesis Testing for Continuous Sequences

L Zhu, L Zhou - arxiv preprint arxiv:2405.01161, 2024 - arxiv.org
In outlier hypothesis testing, one aims to detect outlying sequences among a given set of
sequences, where most sequences are generated iid from a nominal distribution while …

Distributed sequential hypothesis testing with zero-rate compression

S Salehkalaibar, VYF Tan - 2021 IEEE Information Theory …, 2021 - ieeexplore.ieee.org
In this paper, we consider sequential testing over a single-sensor, a single-decision center
setup. At each time, instant t, the sensor gets k samples (k\gt0) and describes the observed …

Variable-length sparse feedback codes for point-to-point, multiple access, and random access channels

RC Yavas, V Kostina, M Effros - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper investigates variable-length stop-feedback codes for memoryless channels in
point-to-point, multiple access, and random access communication scenarios. The proposed …

Exponentially Consistent Statistical Classification of Continuous Sequences with Distribution Uncertainty

L Zhu, L Zhou - arxiv preprint arxiv:2410.21799, 2024 - arxiv.org
In multiple classification, one aims to determine whether a testing sequence is generated
from the same distribution as one of the M training sequences or not. Unlike most of existing …

Variable-length codes with bursty feedback

JY Chen, RC Yavas, V Kostina - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
We study variable-length codes for point-to-point discrete memoryless channels with
noiseless unlimited-rate feed-back that occurs in L bursts. We term such codes variable …

[LLIBRE][B] The Design of Efficient and Secure Lattice-based (FH) E

MD Schultz-Wu - 2024 - search.proquest.com
Lattice-based cryptography leverages Euclidean lattices (and carefully-applied" noise") to
construct secure cryptographic primitives. In recent years, these primitives have become …

[LLIBRE][B] Non-Asymptotic Analysis of Single-Receiver Channels with Limited Feedback

RC Yavas - 2023 - search.proquest.com
Abstract Emerging Internet of Things, machine-type communication, and ultra-reliable low-
latency communication in 5G demand codes that operate at short blocklengths, have low …