Finding smooth integers in short intervals using CRT decoding
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Excellent codes from modular curves
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Sparse polynomial approximation in finite fields
STOC '01 Proceedings of the thirty-third annual ACM symposium on Theory of computing
Error-tolerant password recovery
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
An algebraic approach to IP traceback
ACM Transactions on Information and System Security (TISSEC)
Limits to list decodability of linear codes
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Guessing secrets efficiently via list decoding
SODA '02 Proceedings of the thirteenth annual ACM-SIAM symposium on Discrete algorithms
Scalable secure storage when half the system is faulty
Information and Computation
On Fast Interpolation Method for Guruswami-Sudan List Decoding of One-Point Algebraic-Geometry Codes
AAECC-14 Proceedings of the 14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Ideal Error-Correcting Codes: Unifying Algebraic and Number-Theoretic Algorithms
AAECC-14 Proceedings of the 14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Constructions of Codes from Number Fields
AAECC-14 Proceedings of the 14th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Scalable Secure Storage when Half the System Is Faulty
ICALP '00 Proceedings of the 27th International Colloquium on Automata, Languages and Programming
List Decoding from Erasures: Bounds and Code Constructions
FST TCS '01 Proceedings of the 21st Conference on Foundations of Software Technology and Theoretical Computer Science
Efficient Traitor Tracing Algorithms Using List Decoding
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
List Decoding: Algorithms and Applications
TCS '00 Proceedings of the International Conference IFIP on Theoretical Computer Science, Exploring New Frontiers of Theoretical Informatics
Efficient Watermark Detection and Collusion Security
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Fingerprinting Concatenated Codes with Efficient Identification
ISC '02 Proceedings of the 5th International Conference on Information Security
Finding smooth integers in short intervals using CRT decoding
Journal of Computer and System Sciences - Special issue on STOC 2000
Linear time encodable and list decodable codes
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
Reconstructing curves in three (and higher) dimensional space from noisy data
Proceedings of the thirty-fifth annual ACM symposium on Theory of computing
Polynomial interpolation from multiples
SODA '04 Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms
Soft-Decision Tracing in Fingerprinted Multimedia Content
IEEE MultiMedia
A class of I.P.P. codes with efficient identification
Journal of Complexity - Special issue on coding and cryptography
Noisy Chinese remaindering in the Lee norm
Journal of Complexity - Special issue on coding and cryptography
Better extractors for better codes?
STOC '04 Proceedings of the thirty-sixth annual ACM symposium on Theory of computing
Guest column: error-correcting codes and expander graphs
ACM SIGACT News
Towards a VLSI Architecture for Interpolation-Based Soft-Decision Reed-Solomon Decoders
Journal of VLSI Signal Processing Systems
New Constructions for IPP Codes
Designs, Codes and Cryptography
Limits to list decoding Reed-Solomon codes
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
Maximum-likelihood decoding of Reed-Solomon codes is NP-hard
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
A hybrid list decoding and chase-like algorithm of Reed-Solomon codes
WISICT '05 Proceedings of the 4th international symposium on Information and communication technologies
Fast factorization architecture in soft-decision Reed-Solomon decoding
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Correcting Errors Beyond the Guruswami-Sudan Radius in Polynomial Time
FOCS '05 Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science
Partial parallel factorization in soft-decision Reed-Solomon decoding
GLSVLSI '06 Proceedings of the 16th ACM Great Lakes symposium on VLSI
Collusion secure convolutional fingerprinting information codes
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Explicit capacity-achieving list-decodable codes
Proceedings of the thirty-eighth annual ACM symposium on Theory of computing
IEEE Transactions on Knowledge and Data Engineering
Construction of deletion correcting codes using generalized Reed---Solomon codes and their subcodes
Designs, Codes and Cryptography
High-speed interpolation architecture for soft-decision decoding of Reed-Solomon codes
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
CATS '07 Proceedings of the thirteenth Australasian symposium on Theory of computing - Volume 65
Guessing secrets efficiently via list decoding
ACM Transactions on Algorithms (TALG)
Algorithmic results in list decoding
Foundations and Trends® in Theoretical Computer Science
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Efficient multicast stream authentication for the fully adversarial network model
International Journal of Security and Networks
List decoding of Reed-Solomon codes from a Gröbner basis perspective
Journal of Symbolic Computation
List-decoding reed-muller codes over small fields
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
Low-latency factorization architecture for algebraic soft-decision decoding of Reed-Solomon codes
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Algebraic algorithms and coding theory
Proceedings of the twenty-first international symposium on Symbolic and algebraic computation
An improved list decoding algorithm for the second order Reed---Muller codes and its applications
Designs, Codes and Cryptography
A Syndrome Formulation of the Interpolation Step in the Guruswami-Sudan Algorithm
ICMCTA '08 Proceedings of the 2nd international Castle meeting on Coding Theory and Applications
Technical perspective: The beauty of error-correcting codes
Communications of the ACM - Being Human in the Digital Age
Error correction up to the information-theoretic limit
Communications of the ACM - Being Human in the Digital Age
Collision-Resilient Symbol Based Extension of Query Tree Protocol for Fast RFID Tag Identification
Information Networking. Towards Ubiquitous Networking and Services
Unidirectional key distribution across time and space with applications to RFID security
SS'08 Proceedings of the 17th conference on Security symposium
Coding-Based Oblivious Transfer
Mathematical Methods in Computer Science
Improvements on the Johnson bound for Reed-Solomon codes
Discrete Applied Mathematics
Secure Arithmetic Computation with No Honest Majority
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Improving the Boneh-Franklin Traitor Tracing Scheme
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
List decoding tensor products and interleaved codes
Proceedings of the forty-first annual ACM symposium on Theory of computing
Artin automorphisms, cyclotomic function fields, and folded list-decodable codes
Proceedings of the forty-first annual ACM symposium on Theory of computing
Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes
Journal of the ACM (JACM)
How Reed-Solomon codes can improve steganographic schemes
EURASIP Journal on Information Security - Special issue on secure steganography in multimedia content
List Decoding of Binary Codes---A Brief Survey of Some Recent Results
IWCC '09 Proceedings of the 2nd International Workshop on Coding and Cryptology
A Highly Scalable RFID Authentication Protocol
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
List decoding codes on Garcia-Stictenoth tower using Gröbner basis
Journal of Symbolic Computation
List decoding of Hermitian codes using Gröbner bases
Journal of Symbolic Computation
Soft-decision list decoding of hermitian codes
IEEE Transactions on Communications
Ensuring Authentication of Digital Information Using Cryptographic Accumulators
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Private Interrogation of Devices via Identification Codes
INDOCRYPT '09 Proceedings of the 10th International Conference on Cryptology in India: Progress in Cryptology
Authenticated error-correcting codes with applications to multicast authentication
ACM Transactions on Information and System Security (TISSEC)
Multiplicity assignments for algebraic soft-decoding of Reed-Solomon codes using the method of types
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Guest column: from randomness extraction to rotating needles
ACM SIGACT News
Designs, Codes and Cryptography
High-rate random-like spherical fingerprinting codes with linear decoding complexity
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
Performance of sphere decoding of block codes
IEEE Transactions on Communications
A public key encryption scheme based on the polynomial reconstruction problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
On deciding deep holes of Reed-Solomon codes
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Combining prediction hashing and MDS codes for efficient multicast stream authentication
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
An hybrid approach for efficient multicast stream authentication over unsecured channels
ProvSec'07 Proceedings of the 1st international conference on Provable security
Efficient list decoding of explicit codes with optimal redundancy
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Generalized Sudan's list decoding for order domain codes
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Subcodes of Reed-Solomon codes suitable for soft decoding
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
On the computation of non-uniform input for list decoding on Bezerra-Garcia tower
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
How can reed-Solomon codes improve steganographic schemes?
IH'07 Proceedings of the 9th international conference on Information hiding
A rate-distortion perspective on multiple decoding attempts for Reed-Solomon codes
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Key equations for list decoding of Reed-Solomon codes and how to solve them
Journal of Symbolic Computation
List decoding of Reed Solomon codes for wavelet based colour image watermarking scheme
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Subspace polynomials and limits to list decoding of Reed-Solomon codes
IEEE Transactions on Information Theory
Algebraic soft-decision decoding of Hermitian codes
IEEE Transactions on Information Theory
Multitrial decoding of concatenated codes using fixed thresholds
Problems of Information Transmission
M-ary hyper phase-shift keying with Reed Solomon encoding and soft decision reliability information
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Minimum distance decoding of general algebraic geometry codes via lists
IEEE Transactions on Information Theory
Efficient interpolation in the Guruswami-Sudan algorithm
IEEE Transactions on Information Theory
A modified Guruswami-Sudan algorithm for decoding Reed-Solomon codes
Information Processing Letters
Complexity of decoding positive-rate primitive Reed-Solomon codes
IEEE Transactions on Information Theory
IEEE Transactions on Information Theory
Code automorphisms and permutation decoding of certain Reed-Solomon binary images
IEEE Transactions on Information Theory
A family of asymptotically good binary fingerprinting codes
IEEE Transactions on Information Theory
Algorithms and theory of computation handbook
Efficient fuzzy matching and intersection on private datasets
ICISC'09 Proceedings of the 12th international conference on Information security and cryptology
APPROX/RANDOM'10 Proceedings of the 13th international conference on Approximation, and 14 the International conference on Randomization, and combinatorial optimization: algorithms and techniques
High-throughput interpolation architecture for algebraic soft-decision Reed-Solomon decoding
IEEE Transactions on Circuits and Systems Part I: Regular Papers
An error control scheme with virtually segmented packets for wireless multicast protocols
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Optimal error correction for computationally bounded noise
IEEE Transactions on Information Theory
EXIT function aided design of iteratively decodable codes for the poisson PPM channel
IEEE Transactions on Communications
Hardness of Reconstructing Multivariate Polynomials over Finite Fields
SIAM Journal on Computing
Reduced complexity interpolation architecture for soft-decision reed-solomon decoding
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Backward interpolation architecture for algebraic soft-decision reed-solomon decoding
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
List decoding of generalized reed-solomon codes by using a modified extended key equation algorithm
EURASIP Journal on Wireless Communications and Networking
High-rate codes with sublinear-time decoding
Proceedings of the forty-third annual ACM symposium on Theory of computing
Root lifting techniques and applications to list decoding
ACM Communications in Computer Algebra
Optimal rate list decoding via derivative codes
APPROX'11/RANDOM'11 Proceedings of the 14th international workshop and 15th international conference on Approximation, randomization, and combinatorial optimization: algorithms and techniques
Problems of Information Transmission
List Decoding Tensor Products and Interleaved Codes
SIAM Journal on Computing
Dynamic threshold and cheater resistance for shamir secret sharing scheme
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Obtaining asymptotic fingerprint codes through a new analysis of the boneh-shaw codes
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
List decoding subspace codes from insertions and deletions
Proceedings of the 3rd Innovations in Theoretical Computer Science Conference
Fingerprinting schemes. identifying the guilty sources using side information
IWDW'05 Proceedings of the 4th international conference on Digital Watermarking
Computing gröbner bases for vanishing ideals of finite sets of points
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Practical scenarios for the van trung-martirosyan codes
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Modified Low-Complexity Chase Soft-Decision Decoder of Reed---Solomon Codes
Journal of Signal Processing Systems
Indexing information for data forensics
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Identification algorithms for sequential traitor tracing
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Rateless codes for the multicast stream authentication problem
IWSEC'06 Proceedings of the 1st international conference on Security
Achieving multicast stream authentication using MDS codes
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Efficient multicast stream authentication for the fully adversarial network model
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Simplified high-speed high-distance list decoding for alternant codes
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
Folded codes from function field towers and improved optimal rate list decoding
STOC '12 Proceedings of the forty-fourth annual ACM symposium on Theory of computing
Parameter choices on Guruswami--Sudan algorithm for polynomial reconstruction
Finite Fields and Their Applications
Sudan-decoding generalized geometric Goppa codes
Finite Fields and Their Applications
Computing error distance of reed-solomon codes
TAMC'12 Proceedings of the 9th Annual international conference on Theory and Applications of Models of Computation
A key sharing fuzzy vault scheme
ICICS'12 Proceedings of the 14th international conference on Information and Communications Security
The decoding Library for list decoding
ACM Communications in Computer Algebra
Weighted Reed---Muller codes revisited
Designs, Codes and Cryptography
Asymptotic single-trial strategies for GMD decoding with arbitrary error-erasure tradeoff
Problems of Information Transmission
Near-Optimal collusion-secure fingerprinting codes for efficiently tracing illegal re-distribution
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
List decoding reed-solomon, algebraic-geometric, and gabidulin subcodes up to the singleton bound
Proceedings of the forty-fifth annual ACM symposium on Theory of computing
ℓ2/ℓ2-Foreach sparse recovery with low risk
ICALP'13 Proceedings of the 40th international conference on Automata, Languages, and Programming - Volume Part I
Improved probabilistic decoding of interleaved Reed-Solomon codes and folded Hermitian codes
Theoretical Computer Science
Bounds on collaborative decoding of interleaved Hermitian codes and virtual extension
Designs, Codes and Cryptography
Computational aspects of retrieving a representation of an algebraic geometry code
Journal of Symbolic Computation
Decoding interleaved Reed---Solomon codes beyond their joint error-correcting capability
Designs, Codes and Cryptography
Hi-index | 755.38 |
Given an error-correcting code over strings of length n and an arbitrary input string also of length n, the list decoding problem is that of finding all codewords within a specified Hamming distance from the input string. We present an improved list decoding algorithm for decoding Reed-Solomon codes. The list decoding problem for Reed-Solomon codes reduces to the following “curve-fitting” problem over a field F: given n points ((xi·yi))i=1 n, xi, yi∈F, and a degree parameter k and error parameter e, find all univariate polynomials p of degree at most k such that yi=p(xi) for all but at most e values of i∈(1,...,n). We give an algorithm that solves this problem for e