Showing 1 - 5 results of 5 for search 'constantly decodable network coding', query time: 0.09s Refine Results
  1. 1

    Co-decode algorithm of network coding with hardware logic by Hui LI, Ming-long ZHANG, Fu-xing CHEN, Han-xu HOU, Kai PAN, Wei WANG, Hu-sheng YUAN, Tao SUN

    Published 2012-07-01
    “…Practical general coder and decoder of network coding(NC)with HDL(hardware description language)logic for wire-speed nodes was presented.The NC coders applied random linear network coding (RLNC) and the decoders recovered the original packets by Cramer’s rule.The structures and algorithms of NC coder and decoder were designed in detail and implemented in HDL with NetFPGA boards.Comparing with traditional stored-and-forward mechanism,network emulations showed that networks with wire-speed NC coder and decoder nodes could achieve the capacity bound of max-flow min-cut theorem,and the end-to-end delay was guaranteed on a small constant.…”
    Get full text
    Article
  2. 2
  3. 3

    Research on SCLOUD+ post-quantum key encapsulation adaptation and BW lattice optimization for intelligent computing networks by PAN Jie, XI Zhuoning, ZHAO Zhanjun, BU Zhonggui, HOU Huifang, YE Lan, CHEN Xi, XUE Zhao

    Published 2025-07-01
    “…Through compile-time constant optimization, hierarchical hard-coding strategies, and single-instruction, multiple-data (SIMD) friendly memory layouts, the decoding clock cycles of the BW lattice in a 128-dimensional scenario were reduced from 147 798 to 30 107, providing core support for the SCLOUD+ post-quantum key encapsulation mechanism. …”
    Get full text
    Article
  4. 4

    Far from Perfect: Quantum Error Correction with (Hyperinvariant) Evenbly Codes by Matthew Steinberg, Junyu Fan, Robert J. Harris, David Elkouss, Sebastian Feld, Alexander Jahn

    Published 2025-08-01
    “…We introduce a new class of qubit codes that we call Evenbly codes, building on a previous proposal of hyperinvariant tensor networks. …”
    Get full text
    Article
  5. 5

    Leaky McEliece: Secret Key Recovery From Highly Erroneous Side-Channel Information by Marcus Brinkmann, Chitchanok Chuengsatiansup, Alexander May, Julian Nowakowski, Yuval Yarom

    Published 2025-03-01
    “… The McEliece cryptosystem is a strong contender for post-quantum schemes, including key encapsulation for confidentiality of key exchanges in network protocols. A McEliece secret key is a structured parity check matrix that is transformed via Gaussian elimination into an unstructured public key. …”
    Get full text
    Article