Journal ArticleDOI
Introduction to Coding Theory.
Harold N. Ward,J.H. van Lint +1 more
Reads0
Chats0
About:
This article is published in American Mathematical Monthly.The article was published on 1984-10-01. It has received 501 citations till now. The article focuses on the topics: Coding theory.read more
Citations
More filters
Book ChapterDOI
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
TL;DR: This work provides formal definitions and efficient secure techniques for turning biometric information into keys usable for any cryptographic application, and reliably and securely authenticating biometric data.
MonographDOI
Introduction to finite fields and their applications
Rudolf Lidl,Harald Niederreiter +1 more
TL;DR: An introduction to the theory of finite fields, with emphasis on those aspects that are relevant for applications, especially information theory, algebraic coding theory and cryptology and a chapter on applications within mathematics, such as finite geometries.
Journal ArticleDOI
Quantum error correction via codes over GF(4)
TL;DR: In this article, the problem of finding quantum error-correcting codes is transformed into one of finding additive codes over the field GF(4) which are self-orthogonal with respect to a trace inner product.
Journal ArticleDOI
Hide and seek: an introduction to steganography
Niels Provos,Peter Honeyman +1 more
TL;DR: This article discusses existing steganographic systems and presents recent research in detecting them via statistical steganalysis and discusses the practical application of detection algorithms and the mechanisms for getting around them.
Journal ArticleDOI
Collusion-secure fingerprinting for digital data
Dan Boneh,J M Shaw +1 more
TL;DR: This paper discusses methods for assigning code-words for the purpose of fingerprinting digital data, e.g., software, documents, music, and video, and presents a general fingerprinting solution which is secure in the context of collusion.