搜索结果: 1-15 共查到“error correction”相关记录33条 . 查询时间(0.125 秒)
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Quantum Error Correction: Foundation and Landscape
量子纠错 基础景观 量子纠错理论
2023/4/18
Academy of Mathematics and Systems Science, CAS Colloquia & Seminars:Quantum Error Correction: Fault-tolerance and Universality
量子纠错 容错性 通用性
2023/4/17
INSAR UNWRAPPING ERROR CORRECTION BASED ON QUASI-ACCURATE DETECTION OF GROSS ERRORS (QUAD)
QUAD, InSAR, Unwrapping Error Correction, Gross Error, L1-norm
2018/5/14
Unwrapping error is a common error in the InSAR processing, which will seriously degrade the accuracy of the monitoring results. Based on a gross error correction method, Quasi-accurate detection (QUA...
"HILA5 Pindakaas": On the CCA security of lattice-based encryption with error correction
Post-quantum cryptography KEM RLWE
2017/12/19
We show that HILA5 is not secure against chosen-ciphertext attacks. Specifically, we demonstrate a key-recovery attack on HILA5 using an active attack on reused keys. The attack works around the error...
On Reliability, Reconciliation, and Error Correction in Ring-LWE Encryption
Ring-LWE Reconciliation Post-Quantum Encryption
2017/5/23
We describe a new reconciliation method for Ring-LWE that has a significantly smaller failure rate than previous proposals while reducing ciphertext size and the amount of randomness required. It is b...
Key Reconciliation Protocols for Error Correction of Silicon PUF Responses
physical unclonable function error correction key reconciliation
2016/12/8
Physical Unclonable Functions (PUFs) are promising primitives for lightweight integrated circuit authentication. Indeed, by extracting an identifier from random process variations, they allow each ins...
Ring-LWE Ciphertext Compression and Error Correction: Tools for Lightweight Post-Quantum Cryptography
Practical Post-Quantum Cryptography Lattice Cryptography Ring-LWE
2016/12/7
Some lattice-based public key cryptosystems allow one to transform ciphertext from one lattice or ring representation to another efficiently and without knowledge of public and private keys. In this w...
Applying Cryptographic Acceleration Techniques to Error Correction
polynomial Barrett BCH error correcting codes
2015/12/23
Modular reduction is the basic building block of many publickey
cryptosystems. BCH codes require repeated polynomial reductions
modulo the same constant polynomial. This is conceptually very similar...
Highly Robust Error Correction by Convex Programming
Linear codes decoding of (random) linear codes sparse solutions to underdetermined systems `1 minimization linear programming second-order cone programming the Dantzig selector restricted orthonormality Gaussian random matrices and random projections
2015/6/17
This paper discusses a stylized communications problem where one wishes to transmit a real-valued signal x ∈ Rn (a block of n pieces of information) to a remote receiver. We ask whether it is possible...
Error Correction via Linear Programming
Linear codes decoding of (random) linear codes sparse solutions to underdetermined systems `1-minimization linear programming restricted orthonormality Gaussian random matrices.
2015/6/17
Suppose we wish to transmit a vector f ∈ Rn reliably. A frequently discussed approach consists in encoding f with an m by n coding matrix A. Assume now that a fraction of the entries of Af are corrupt...
Dense Error Correction for Low-Rank Matrices via Principal Component Pursuit
Dense Error Correction Low-Rank Matrices Principal Component Pursuit
2015/6/17
We consider the problem of recovering a lowrank matrix when some of its entries, whose locations are not known a priori, are corrupted by errors of arbitrarily large magnitude. It has recently been sh...
Automatic Alignment and Error Correction of Human Generated Transcripts for Long Speech Recordings
Automatic Alignment Error Correction
2015/3/10
In this paper we examine the issues of aligning and correcting
approximate human generated transcripts for long audio
files. Accurate time-aligned transcriptions help provide easier
access to...
Physical Information Theoretic Bounds on Energy Costs for Error Correction
Error Correction Linear (n k) code Heat Dissipation Generalized Efficacy Measures Information Loss Fundamental Lower Bounds
2014/12/8
With diminishing returns in performance with scaling of traditional transistor devices, there is a growing need to understand and improve potential replacements technologies. Sufficient reliability ha...
Protecting PUF Error Correction by Codeword Masking
Physical Unclonable Functions Side-Channel Analysis
2014/3/12
One of the main applications of Physical Unclonable Functions~(PUFs) is unique key generation. While the advantages of PUF-based key extraction and embedding have been shown in several papers, physica...
Simple and Scalable WDM/TDMA-PON using Spectral Slicing and Forward Error Correction
Fiber optics communications Networks combinatorial network design
2015/5/22
We describe a simple and scalable WDM/TDMA PON system that uses spectral slicing and FEC in burst-mode upstream transmissions. The sensitivity was improved to -31.5 dB at a sliced bandwidth of 400 GHz...