[BOK][B] List decoding of error-correcting codes: winning thesis of the 2002 ACM doctoral dissertation competition

V Guruswami - 2004 - books.google.com
How can one exchange information e? ectively when the medium of com-nication introduces
errors? This question has been investigated extensively starting with the seminal works of …

[BOK][B] Asymptotic overview on separating codes

GD Cohen, HG Schaathun - 2003 - researchgate.net
Separating codes (or systems) are known from combinatorics, and they enjoy increasing
attention due to applications in digital fingerprinting. Previous applications are found in …

Guessing secrets efficiently via list decoding

N Alon, V Guruswami, T Kaufman… - ACM Transactions on …, 2007 - dl.acm.org
We consider the guessing secrets problem defined by Chung et al.[2001]. This is a variant of
the standard 20 questions game where the player has a set of k> 1 secrets from a universe …

Token-controlled public key encryption

J Baek, R Safavi-Naini, W Susilo - … , ISPEC 2005, Singapore, April 11-14 …, 2005 - Springer
Abstract “Token-controlled public key encryption” is a public key encryption scheme where
individual message can be encrypted and sent to every receiver, but the receiver cannot …

Fingerprinting concatenated codes with efficient identification

M Fernández, M Soriano - International Conference on Information …, 2002 - Springer
A fingerprinting code is a set of codewords that are embedded in each copy of a digital
object, with the purpose of making each copy unique. If the fingerprinting code is c-secure …

More on (2, 2)-separating systems

G Cohen, S Encheva… - IEEE Transactions on …, 2002 - ieeexplore.ieee.org
The theory of separating systems has been applied in different areas of science and
technology such as automata synthesis, technical diagnosis, and authenticating ownership …

Improved bounds for separating hash families

M Bazrafshan, T Van Trung - Designs, codes and cryptography, 2013 - Springer
Abstract An (N; n, m,{w_1, ..., w_t\})-separating hash family is a set H of N functions h:\; X ⟶ Y
with| X|= n,| Y|= m, t ≧ 2 having the following property. For any pairwise disjoint subsets …

Guessing secrets with inner product questions

F Chung, R Graham, L Lu - Internet Mathematics, 2004 - Taylor & Francis
We suppose we are given some fixed (but unknown) subset X of a set Ω= 𝔽 n 2, where 𝔽2
denotes the field of two elements. Our goal is to learn as much as possible about the …

Constructions of almost secure frameproof codes with applications to fingerprinting schemes

J Moreira, M Fernández, G Kabatiansky - Designs, Codes and …, 2018 - Springer
This paper presents explicit constructions of fingerprinting codes. The proposed
constructions use a class of codes called almost secure frameproof codes. An almost secure …

[PDF][PDF] Separating hash families

M Bazrafshan - 2011 - core.ac.uk
In der vorliegenden Dissertation wird angestrebt, offene Probleme im Zusammenhang mit
sogenannten “separating hash families” zu diskutieren und zu lösen. Separating hash …