154 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 1, MARCH 2009 IV. CONCLUSION The embedding efficiency of codes from the ZZW embedding construction…
1. Journal Publications1. S. S. Pradhan, R. Puri and K. Ramchandran. MDS source-channel erasure codes. IEEETransactions on Information Theory, 2003. To appear. IEEE, USA.2.…
Slide 1Quantum Copy-Protection and Quantum Money Scott Aaronson (MIT) | | | Any humor in this talk is completely unintentional Slide 2 First Idea in the History of Quantum…
Slide 1Private-Key Quantum Money Scott Aaronson (MIT) Slide 2 Ever since theres been money, thereve been people trying to counterfeit it Previous work on the physics of money:…
Slide 1Oracles Are Subtle But Not Malicious Scott Aaronson University of Waterloo Slide 2 Standard Whine In the 60 years since Shannons counting argument, we havent proven…
Slide 1MASSIMO FRANCESCHETTI University of California at San Diego Information-theoretic and physical limits on the capacity of wireless networks TexPoint fonts used in EMF.…
Slide 1Attacking Cryptographic Schemes Based on Perturbation Polynomials Martin Albrecht (Royal Holloway), Craig Gentry (IBM), Shai Halevi (IBM), Jonathan Katz (Univ. of…
Slide 1Information Theory For Data Management Divesh Srivastava Suresh Venkatasubramanian 1 Slide 2 -- Abstruse Goose (177) Motivation Information Theory is relevant to all…
1.1 Securing Low-cost RFID Systems:an Unconditionally Secure Approach Basel Alomair a , Loukas Lazos b , and Radha Poovendran aaNetwork Security Lab (NSL), University of…
1.A glance at information-geometric signal processing Frank Nielsen Sony Computer Science Laboratories, Inc.22nd October 2012 (MAHI)c 2012 Frank Nielsen, Sony Computer Science…