Filter
Conference article in proceedings

Search results

  • 2025

    Evasive LWE Assumptions: Definitions, Classes, and Counterexamples

    Brzuska, C., Ünal, A. & Woo, I. K. Y., 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer, Vol. 4. p. 418-449 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15487 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • On Bounded Storage Key Agreement and One-Way Functions

    Brzuska, C., Couteau, G., Egger, C. & Quach, W., 2025, Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. Boyle, E., Boyle, E. & Mahmoody, M. (eds.). Springer, p. 287-318 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15364 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Traitor Tracing Without Trusted Authority from Registered Functional Encryption

    Branco, P., Lai, R. W. F., Maitra, M., Malavolta, G., Rahimi, A. & Woo, I. K. Y., 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer, p. 33-66 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15486 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • 2024

    Algebraic Geometry Codes for Cross-Subspace Alignment in Private Information Retrieval

    Makkonen, O., Karpuk, D. A. & Hollanti, C., 2024, 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings. IEEE, p. 2874-2879 6 p. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Approximate Gradient Coding for Privacy-Flexible Federated Learning with Non-IID Data

    Makkonen, O., Niemelä, S., Hollanti, C. & Hanna, S. K., 2024, 32nd European Signal Processing Conference, EUSIPCO 2024 - Proceedings. European Signal Processing Conference (EUSIPCO), p. 1167-1171 5 p. (European Signal Processing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Breaking DPA-Protected Kyber via the Pair-Pointwise Multiplication

    Bock, E. A., Banegas, G., Brzuska, C., Chmielewski, Ł., Puniamurthy, K. & Šorf, M., 1 Mar 2024, Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Proceedings. Pöpper, C. & Batina, L. (eds.). Springer, p. 101-130 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14584 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • Code-Based Single-Server Private Information Retrieval : Circumventing the Sub-Query Attack

    Verma, N. & Hollanti, C., 2024, 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings. IEEE, p. 2880-2885 6 p. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    7 Downloads (Pure)
  • CryptoZoo : A Viewer for Reduction Proofs

    Brzuska, C., Egger, C. & Puniamurthy, K., 1 Mar 2024, Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024, Proceedings. Pöpper, C. & Batina, L. (eds.). Springer, p. 3-25 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14583 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Dataset, Noise Analysis, and Automated Parameter Estimation for Natural Steganography

    Woo, I. K. Y., Yiu, S., Yin, H. H. F. & Lai, R. W. F., 24 Jun 2024, IH MMSec 2024 - Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security. ACM, p. 13-18 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    28 Downloads (Pure)
  • Flexible Field Sizes in Secure Distributed Matrix Multiplication via Efficient Interference Cancellation

    Makkonen, O., 2024, 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings. IEEE, p. 2562-2567 6 p. (IEEE International Symposium on Information Theory).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Instantiating the Hash-Then-Evaluate Paradigm: Strengthening PRFs, PCFs, and OPRFs

    Brzuska, C., Couteau, G., Egger, C., Karanko, P. & Meyer, P., 2024, Security and Cryptography for Networks - 14th International Conference, SCN 2024, Proceedings. Galdi, C. & Phan, D. H. (eds.). Springer, p. 97-116 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14974 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • Secure Distributed Matrix Multiplication with Precomputation

    Cartor, R., D'Oliveira, R. G. L., Rouayheb, S. E., Heinlein, D., Karpuk, D. & Sprintson, A., 2024, 2024 IEEE International Symposium on Information Theory, ISIT 2024 - Proceedings. IEEE, p. 2568-2573 6 p. (IEEE International Symposium on Information Theory - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

  • 2023

    Adaptive Distributional Security for Garbling Schemes with O(| x| ) Online Complexity

    Bock, E. A., Brzuska, C., Karanko, P., Oechsner, S. & Puniamurthy, K., 2023, Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Guo, J. & Steinfeld, R. (eds.). Springer, p. 139-171 33 p. (Lecture Notes in Computer Science; vol. 14438 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • A State-Separating Proof for Yao's Garbling Scheme

    Brzuska, C. & Oechsner, S., 2023, Proceedings - 2023 IEEE 36th Computer Security Foundations Symposium, CSF 2023. IEEE, p. 137-152 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2023-July).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    3 Citations (Scopus)
  • N-Sum Box : An Abstraction for Linear Computation over Many-to-one Quantum Networks

    Allaix, M., Lu, Y., Yao, Y., Pllaha, T., Hollanti, C. & Jafar, S., 2023, GLOBECOM 2023 - 2023 IEEE Global Communications Conference. IEEE, p. 5457-5462 6 p. (Proceedings - IEEE Global Communications Conference, GLOBECOM).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • On Sustainable Ring-Based Anonymous Systems

    Chow, S. S. M., Egger, C., Lai, R. W. F., Ronge, V. & Woo, I. K. Y., 28 Aug 2023, Proceedings - 2023 IEEE 36th Computer Security Foundations Symposium, CSF 2023. IEEE, p. 568-583 16 p. (Proceedings - IEEE Computer Security Foundations Symposium; vol. 2023-July).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    4 Citations (Scopus)
  • Secure Distributed Gram Matrix Multiplication

    Makkonen, O. & Hollanti, C., 2023, 2023 IEEE Information Theory Workshop, ITW 2023. IEEE, p. 192-197 6 p. (Proceedings : information theory workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • 2022

    Analog Secure Distributed Matrix Multiplication over Complex Numbers

    Makkonen, O. & Hollanti, C., 2022, 2022 IEEE International Symposium on Information Theory, ISIT 2022. IEEE, p. 1211-1216 6 p. (IEEE International Symposium on Information Theory - Proceedings; vol. 2022-June).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    172 Downloads (Pure)
  • General Framework for Linear Secure Distributed Matrix Multiplication with Byzantine Servers

    Makkonen, O. & Hollanti, C., 2022, 2022 IEEE Information Theory Workshop, ITW 2022. IEEE, p. 143-148 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    5 Citations (Scopus)
  • Key-Schedule Security for the TLS 1.3 Standard

    Brzuska, C., Delignat-Lavaud, A., Egger, C., Fournet, C., Kohbrok, K. & Kohlweiss, M., 2022, Advances in Cryptology – ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, 2022, Proceedings. Agrawal, S. & Lin, D. (eds.). Springer, p. 621-650 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13791 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness

    Brzuska, C. & Couteau, G., 2022, Advances in Cryptology – EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2022, Proceedings. Dunkelman, O. & Dziembowski, S. (eds.). Springer, p. 584-613 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13276 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    5 Citations (Scopus)
  • On the Applications and Parallelization of Multichannel Source Coding

    Yin, H. H. F., Woo, I. K. Y. & Lai, R. W. F., 4 Nov 2022, Proceedings of 2022 IEEE Region 10 International Conference, TENCON 2022. IEEE, p. 1-6 6 p. 9977596. (TENCON IEEE Region Ten Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    79 Downloads (Pure)
  • Private Information Retrieval from Colluding and Byzantine Servers with Binary Reed-Muller Codes

    Saarela, P., Allaix, M., Freij-Hollanti, R. & Hollanti, C., 2022, 2022 IEEE International Symposium on Information Theory, ISIT 2022. IEEE, p. 2839-2844 6 p. (IEEE International Symposium on Information Theory).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    2 Citations (Scopus)
  • Security Analysis of the MLS Key Derivation

    Brzuska, C., Cornelissen, E. & Kohbrok, K., 2022, Proceedings - 43rd IEEE Symposium on Security and Privacy, SP 2022. IEEE, p. 2535-2553 19 p. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2022-May).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    File
    16 Citations (Scopus)
    154 Downloads (Pure)
  • 2021

    High-Rate Quantum Private Information Retrieval with Weakly Self-Dual Star Product Codes

    Allaix, M., Holzbaur, L., Pllaha, T. & Hollanti, C., 12 Jul 2021, 2021 IEEE International Symposium on Information Theory, ISIT 2021 - Proceedings. IEEE, p. 1046-1051 6 p. (IEEE International Symposium on Information Theory - Proceedings; vol. 2021-July).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    4 Citations (Scopus)
  • Improved Private and Secure Distributed Matrix Multiplication

    Li, J. & Hollanti, C., 12 Jul 2021, 2021 IEEE International Symposium on Information Theory, ISIT 2021 - Proceedings. IEEE, p. 1859-1864 6 p. (IEEE International Symposium on Information Theory - Proceedings; vol. 2021-July).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    147 Downloads (Pure)
  • On Derandomizing Yao’s Weak-to-Strong OWF Construction

    Brzuska, C., Couteau, G., Karanko, P. & Rohrbach, F., 4 Nov 2021, Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part II. Nissim, K., Waters, B. & Waters, B. (eds.). Springer, p. 429-456 28 p. (Lecture Notes in Computer Science; vol. 13043).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • 2020

    Computational Code-Based Single-Server Private Information Retrieval

    Holzbaur, L., Hollanti, C. & Wachter-Zeh, A., Jun 2020, 2020 IEEE International Symposium on Information Theory, ISIT 2020 - Proceedings. IEEE, p. 1065-1070 6 p. 9174138. (IEEE International Symposium on Information Theory - Proceedings; vol. 2020-June).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    3 Citations (Scopus)
  • Low-Rank Parity-Check Codes over the Ring of Integers Modulo a Prime Power

    Renner, J., Puchinger, S., Wachter-Zeh, A., Hollanti, C. & Freij-Hollanti, R., Jun 2020, 2020 IEEE International Symposium on Information Theory, ISIT 2020 - Proceedings. IEEE, p. 19-24 6 p. 9174384. (IEEE International Symposium on Information Theory - Proceedings; vol. 2020-June).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    7 Citations (Scopus)
  • Quantum Private Information Retrieval from MDS-coded and Colluding Servers

    Allaix, M., Holzbaur, L., Pllaha, T. & Hollanti, C., Jun 2020, 2020 IEEE International Symposium on Information Theory, ISIT 2020 - Proceedings. IEEE, p. 1059-1064 6 p. 9174160. (IEEE International Symposium on Information Theory ; vol. 2020-June).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    5 Citations (Scopus)
  • Security Reductions for White-Box Key-Storage in Mobile Payments

    Alpirez Bock, E., Brzuska, C., Fischlin, M., Janson, C. & Michiels, W., 2020, International Conference on the Theory and Application of Cryptology and Information Security: ASIACRYPT 2020: Advances in Cryptology – ASIACRYPT 2020 . Moriai, S. & Wang, H. (eds.). Springer, p. 221-252 32 p. (Lecture Notes in Computer Science ; vol. 12491).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    9 Citations (Scopus)
  • 2019

    Doubly Half-Injective PRGs for Incompressible White-Box Cryptography

    Alpirez Bock, E., Amadori, A., Bos, J. W., Brzuska, C. & Michiels, W., 1 Jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Springer, p. 189-209 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    7 Citations (Scopus)
  • File Size Distributions and Caching for Offloading

    Paakkonen, J., Dharmawansa, P., Freij-Hollanti, R., Hollanti, C. & Tirkkonen, O., 1 Jul 2019, 2019 IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2019. IEEE, 8815572. ( IEEE International Workshop on Signal Processing Advances in Wireless Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    225 Downloads (Pure)
  • On the Capacity of Private Information Retrieval from Coded, Colluding, and Adversarial Servers

    Holzbaur, L., Freij-Hollanti, R. & Hollanti, C., Aug 2019, 2019 IEEE Information Theory Workshop, ITW 2019. IEEE, 8989216

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    12 Citations (Scopus)
  • Private streaming with convolutional codes

    Holzbaur, L., Freij-Hollanti, R., Wachter-Zeh, A. & Hollanti, C., 15 Jan 2019, 2018 IEEE Information Theory Workshop, ITW 2018. IEEE, p. 550-554 5 p. 8613505. (Information Theory Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    290 Downloads (Pure)
  • Tensor network complexity of multilinear maps

    Austrin, P., Kaski, P. & Kubjas, K., 1 Jan 2019, 10th Innovations in Theoretical Computer Science, ITCS 2019. Blum, A. (ed.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, p. 1-21 7. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 124).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    2 Citations (Scopus)
    98 Downloads (Pure)
  • The Complete Hierarchical Locality of the Punctured Simplex Code

    Grezet, M. & Hollanti, C., 2019, 2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT). IEEE, p. 2833-2837 5 p. (IEEE International Symposium on Information Theory).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    79 Downloads (Pure)
  • The Double-Plane Algorithm: A simple algorithm for the closest vector problem

    Blomqvist, F. & Greferath, M., 8 Mar 2019, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. IEEE, p. 193-197 5 p. 8664371

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    1 Citation (Scopus)
  • The extension theorem for bi-invariant weights over Frobenius rings and Frobenius bimodules

    Gnilke, O. W., Greferath, M., Honold, T., Wood, J. A. & Zumbraegel, J., 2019, Rings, Modules and Codes. Leroy, A., Lomp, C., LopezPermouth, S. & Oggier, F. (eds.). American Mathematical Society, p. 117-129 13 p. (Contemporary Mathematics; vol. 727).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    201 Downloads (Pure)
  • 2018

    Analysis of Some Well-Rounded Lattices in Wiretap Channels

    Damir, T., Gnilke, O., Amoros, L. & Hollanti, C., 24 Aug 2018, 2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2018. IEEE, Vol. 2018-June. p. 496-500 5 p. 8445937. (IEEE International Workshop on Signal Processing Advances in Wireless Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    4 Citations (Scopus)
    245 Downloads (Pure)
  • Bounds on Binary Locally Repairable Codes Tolerating Multiple Erasures

    Grezet, M., Freij-Hollanti, R., Westerbäck, T., Olmez, O. & Hollanti, C., 21 Feb 2018, The International Zurich Seminar on Information and Communication (IZS 2018) Proceedings. Lapidoth, A. & Moser, S. M. (eds.). ETH Zürich, p. 103-107

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsProfessional

    Open Access
    File
    89 Downloads (Pure)
  • On the ineffectiveness of internal encodings - Revisiting the DCA attack on white-box cryptography

    Alpirez Bock, E., Brzuska, C., Michiels, W. & Treff, A., 1 Jan 2018, Applied Cryptography and Network Security: 16th International Conference, ACNS 2018, Proceedings. Springer, p. 103-120 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10892 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    23 Citations (Scopus)
  • Robust Private Information Retrieval from Coded Systems with Byzantine and Colluding Servers

    Tajeddine, R., Gnilke, O. W., Karpuk, D., Freij-Hollanti, R. & Hollanti, C., 15 Aug 2018, 2018 IEEE International Symposium on Information Theory, ISIT 2018. IEEE, Vol. 2018-June. p. 2451-2455 5 p. 8437670

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    13 Citations (Scopus)
    237 Downloads (Pure)
  • State separation for code-based game-playing proofs

    Brzuska, C., Delignat-Lavaud, A., Fournet, C., Kohbrok, K. & Kohlweiss, M., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer, p. 222-249 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11274 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    18 Citations (Scopus)
  • 2017

    Information bounds and flatness factor approximation for fading wiretap MIMO channels

    Barreal Fernandez, A., Karrila, A., Karpuk, D. A. & Hollanti, C., 14 Mar 2017, 26th International Telecommunication Networks and Applications Conference, ITNAC 2016. IEEE, p. 277-282 6 p. 7878822

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    214 Downloads (Pure)
  • Lattice coding for Rician fading channels from Hadamard rotations

    Karrila, A., Väisänen, N., Karpuk, D. & Hollanti, C., 9 Aug 2017, 2017 IEEE International Symposium on Information Theory, ISIT 2017. IEEE, p. 3110-3114 5 p. 8007102

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    1 Citation (Scopus)
    213 Downloads (Pure)
  • On binary matroid minors and applications to data storage over small fields

    Grezet, M., Freij-Hollanti, R., Westerbäck, T. & Hollanti, C., 2017, Coding Theory and Applications: 5th International Castle Meeting, ICMCTA 2017, Vihula, Estonia, August 28-31, 2017, Proceedings. Springer, p. 139-153 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10495 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    1 Citation (Scopus)
  • Private Information Retrieval Schemes for Coded Data with Arbitrary Collusion Patterns

    Tajeddine, R., Gnilke, O., Karpuk, D., Freij-Hollanti, R., Hollanti, C. & El Rouayheb, S., 2017, 2017 IEEE International Symposium on Information Theory (ISIT) . IEEE, p. 1908-1912 5 p. 8006861. (IEEE International Symposium on Information Theory).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    67 Citations (Scopus)
  • Well-rounded lattices for coset coding in MIMO wiretap channels

    Gnilke, O. W., Barreal Fernandez, A., Karrila, A., Tran Nguyen Thanh, H., Karpuk, D. A. & Hollanti, C., 14 Mar 2017, 26th International Telecommunication Networks and Applications Conference, ITNAC 2016. IEEE, p. 289-294 6 p. 7878824

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    8 Citations (Scopus)
    229 Downloads (Pure)
  • 2016

    A connection between locally repairable codes and exact regenerating codes

    Ernvall, T., Westerbäck, T., Freij-Hollanti, R. & Hollanti, C., 10 Aug 2016, Proceedings - ISIT 2016; 2016 IEEE International Symposium on Information Theory. IEEE, Vol. 2016-August. p. 650-654 5 p. 7541379. (IEEE International Symposium on Information Theory).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
    File
    3 Citations (Scopus)
    232 Downloads (Pure)