Chinese remaindering with errors
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
A displacement approach to efficient decoding of algebraic-geometric codes
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Oblivious transfer and polynomial evaluation
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
Pseudorandom generators without the XOR Lemma (extended abstract)
STOC '99 Proceedings of the thirty-first annual ACM symposium on Theory of computing
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Password hardening based on keystroke dynamics
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
List decoding algorithms for certain concatenated codes
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Escrow services and incentives in peer-to-peer networks
Proceedings of the 3rd ACM conference on Electronic Commerce
A Deterministic Multivariate Interpolation Algorithm for Small Finite Fields
IEEE Transactions on Computers
Decoding Hermitian Codes with Sudan's Algorithm
AAECC-13 Proceedings of the 13th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Cryptographic Hardness Based on the Decoding of Reed-Solomon Codes
ICALP '02 Proceedings of the 29th International Colloquium on Automata, Languages and Programming
An Efficient Public Key Traitor Tracing Scheme
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
On Representations of Algebraic-Geometric Codes for List Decoding
ESA '00 Proceedings of the 8th Annual European Symposium on Algorithms
Secure Games with Polynomial Expressions
ICALP '01 Proceedings of the 28th International Colloquium on Automata, Languages and Programming,
Polynomial Reconstruction Based Cryptography
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Revealing information while preserving privacy
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Scalable public-key tracing and revoking
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Designs, Codes and Cryptography
A displacement approach to decoding algebraic codes
Contemporary mathematics
Scalable public-key tracing and revoking
Distributed Computing
Decoding interleaved Reed-Solomon codes over noisy channels
Theoretical Computer Science
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice
Designs, Codes and Cryptography
Public-key traitor tracing from efficient decoding and unbounded enrollment: extended abstract
Proceedings of the 8th ACM workshop on Digital rights management
Improving the Boneh-Franklin Traitor Tracing Scheme
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Noisy polynomial interpolation and noisy chinese remaindering
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Decoding of interleaved Reed Solomon codes over noisy data
ICALP'03 Proceedings of the 30th international conference on Automata, languages and programming
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Practical PIR for electronic commerce
Proceedings of the 18th ACM conference on Computer and communications security
Optimal error correction against computationally bounded noise
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Improving the alphabet-size in high noise, almost optimal rate list decodable codes
STACS'05 Proceedings of the 22nd annual conference on Theoretical Aspects of Computer Science
Cryptanalysis of the niederreiter public key scheme based on GRS subcodes
PQCrypto'10 Proceedings of the Third international conference on Post-Quantum Cryptography
Improved decoding of interleaved AG codes
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
On error correction in the exponent
TCC'06 Proceedings of the Third conference on Theory of Cryptography
Simplified high-speed high-distance list decoding for alternant codes
PQCrypto'11 Proceedings of the 4th international conference on Post-Quantum Cryptography
A general construction for 1-round δ-RMT and (0, δ)-SMT
ACNS'12 Proceedings of the 10th international conference on Applied Cryptography and Network Security
Fuzzy vault for multiple users
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
Optimally robust private information retrieval
Security'12 Proceedings of the 21st USENIX conference on Security symposium
A practical implementation of fuzzy fingerprint vault for smart cards
Journal of Intelligent Manufacturing
Hi-index | 0.00 |
Given an error-correcting code of block length n and an arbitrary input string also of length n, the list decoding problem is that of finding all codewords within a specified Hamming distance from the input string. We present an improved list decoding algorithm for decoding Reed-Solomon codes. The list decoding problem for Reed-Solomon codes reduces to the following ``curve-fitting'' problem over a field F: Given n points (x[i].y[i]), 1 1/3, where the result yields the first asymptotic improvement since Peterson's original algorithm nearly four decades ago.The algorithm generalizes to solve the list decoding problem for other algebraic codes, specifically alternant codes (a class of codes including BCH codes) and algebraic-geometric codes. In both cases, we obtain a list decoding algorithm that corrects up to n - sqrt{n(n-d')} errors, where n is the block length and d' is the designed distance of the code. The improvement for the case of algebraic-geometric codes extends the methods of Shokrollahi and Wasserman [STOC '98] and improves upon their bound for every choice of n and d'. We also present some other consequences of our algorithm including a solution to a weighted curve fitting problem, which is of use in soft-decision decoding algorithms for Reed-Solomon codes.