User profiles for M. Luby

Michael Luby

- Verified email at bitripple.com - Cited by 45841

Marie L Luby, Marie Luby

- Verified email at uconn.edu - Cited by 8518

Efficient erasure correcting codes

MG Luby, M Mitzenmacher… - IEEE Transactions …, 2001 - ieeexplore.ieee.org
We introduce a simple erasure recovery algorithm for codes derived from cascades of
sparse bipartite graphs and analyze the algorithm by analyzing a corresponding discrete-time …

[PDF][PDF] Practical loss-resilient codes

MG Luby, M Mitzenmacher, MA Shokrollahi… - Proceedings of the …, 1997 - dl.acm.org
We present randomized constntctions of linear-time encodable and decodable codes that
can transmit over 10SSY channels at rates extremely close to capacity. The encoding and …

[BOOK][B] Pseudorandomness and cryptographic applications

M Luby - 1996 - books.google.com
… If we set m = n, then the probability that we don't find a witness is exponentially small in n.
On input E {0, 1}", the randomized P-time function ensemble randomly chooses y1,..., Ym at …

Improved low-density parity-check codes using irregular graphs

MG Luby, M Mitzenmacher… - IEEE Transactions …, 2001 - ieeexplore.ieee.org
… The work of MG Luby was supported in part by the National Science Foundation under
Operating Grant NCR-9416101. The work of M. Mitzenmacher was supported in part by the Alfred …

Acute stroke imaging research roadmap II

…, TG Jovin, KR Lees, MH Lev, DS Liebeskind, M Luby… - Stroke, 2013 - Am Heart Assoc
Society of Neuroradiology, and the Foundation of the American Society of Neuroradiology
sponsored a series of working group meetings> 12 months, with the final meeting occurring …

[PDF][PDF] Self-testing/correcting with applications to numerical problems

M Blum, M Luby, R Rubinfeld - Proceedings of the twenty-second annual …, 1990 - dl.acm.org
… [Blum Luby Rubinfeld] considers the case when the program adaptively … M is an oracle
program if it makes calls to another program that is specified at run time. We let MA denote M

Optimal speedup of Las Vegas algorithms

M Luby, A Sinclair, D Zuckerman - Information Processing Letters, 1993 - Elsevier
… Moreover, (3) also holds for t = m provided we interpret 0 X w as 0. … Suppose on the other
hand that {m,, ti) is the first stage of run m,. Then the contribution is exactly as in the proof of …

How to construct pseudorandom permutations from pseudorandom functions

M Luby, C Rackoff - SIAM Journal on Computing, 1988 - SIAM
… from the attack and given the encryption fT,(M) of M (but not M), L cannot predict the value
of M any better than if L hadno information about M. Symmetrically, let E be the encryption of a …

[PDF][PDF] Analysis of low density codes and improved designs using irregular graphs

M Luby, M Mitzenmacher, A Shokrollah… - Proceedings of the …, 1998 - dl.acm.org
… cess, consider an individual edge (m, c) between a message node m and a check node c, …
of m. This tree is rooted at m, and the tree branches out from the check nodes of m excluding c, …

Pseudo-random generation from one-way functions

R Impagliazzo, LA Levin, M Luby - Proceedings of the twenty-first annual …, 1989 - dl.acm.org
… h = (Af, b), where M is an m by n bit matrix and b is a bit vec- … [Impagliazzo, Luby 891 shows
that most cryptographic … combined with [Impa.gliazzo, Luby 891, many others remain open. […