Let C = {x_1,...,x_N} ⊂ {0, 1}^n be an [n, N] binary error correcting code (not necessarily linear). Let e ∈ {0, 1}^n be an error vector. A codeword X ∈ C is said to be disturbed by the error e if the closest codeword to X ⴲ e is no longer x. Let A_e be the subset of codewords in C that are disturbed by e. In this work we study the size of A_e in random codes C (i.e. codes in which each codeword x_i is chosen uniformly and independently at random from {0, 1}^n). Using recent results of Vu [random structures and algorithms 20(3)] on the concentration of non-Lipschitz functions, we show that |A_e| is strongly concentrated for a wide range of values of N and ‖e‖. We apply this result in the study of communication channels we refer to as ob...
In this paper, we consider coding schemes for computationally bounded channels, which can introduce ...
Ahlswede R, Wolfowitz J. The capacity of a channel with arbitrarily varying channel probability func...
We revisit the binary adversarial wiretap channel (AWTC) of type II in which an active adversary can...
Let C = {x_1,...,x_N} ⊂ {0, 1}^n be an [n, N] binary error correcting code (not necessarily linear)....
We study reliable communication over point-to-point adversarial channels in which the adversary can ...
Ahlswede R, Cai N. Identification without randomization. IEEE Transactions on Information Theory. 19...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
Classically, error-correcting codes are studied with respect to performance metrics such as minimum ...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
Capacity formulas and random-coding exponents are derived for a generalized family of Gel’fand-Pinsk...
This paper continues the study of algebraic code capacities, which were introduced by Ahlswede (1971...
We consider the problem of basing Oblivious Transfer (OT)and Bit Commitment (BC), with information t...
A class of channel models is presented which exhibit varying burst error severity much like channels...
In secure two-party computation, two mutually distrusting parties are interested in jointly computin...
In this paper, we consider coding schemes for computationally bounded channels, which can introduce ...
Ahlswede R, Wolfowitz J. The capacity of a channel with arbitrarily varying channel probability func...
We revisit the binary adversarial wiretap channel (AWTC) of type II in which an active adversary can...
Let C = {x_1,...,x_N} ⊂ {0, 1}^n be an [n, N] binary error correcting code (not necessarily linear)....
We study reliable communication over point-to-point adversarial channels in which the adversary can ...
Ahlswede R, Cai N. Identification without randomization. IEEE Transactions on Information Theory. 19...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
Classically, error-correcting codes are studied with respect to performance metrics such as minimum ...
We consider coding schemes for computationally bounded channels, which can introduce an arbitrary se...
In the information-theoretic setting, where adversaries have unlimited computational power, the fund...
Capacity formulas and random-coding exponents are derived for a generalized family of Gel’fand-Pinsk...
This paper continues the study of algebraic code capacities, which were introduced by Ahlswede (1971...
We consider the problem of basing Oblivious Transfer (OT)and Bit Commitment (BC), with information t...
A class of channel models is presented which exhibit varying burst error severity much like channels...
In secure two-party computation, two mutually distrusting parties are interested in jointly computin...
In this paper, we consider coding schemes for computationally bounded channels, which can introduce ...
Ahlswede R, Wolfowitz J. The capacity of a channel with arbitrarily varying channel probability func...
We revisit the binary adversarial wiretap channel (AWTC) of type II in which an active adversary can...