Efficient erasure correcting codes
MG Luby, M Mitzenmacher… - IEEE Transactions …, 2001 - ieeexplore.ieee.org
We introduce a simple erasure recovery algorithm for codes derived from cascades of
sparse bipartite graphs and analyze the algorithm by analyzing a corresponding discrete-time …
sparse bipartite graphs and analyze the algorithm by analyzing a corresponding discrete-time …
[PDF][PDF] Practical loss-resilient codes
We present randomized constntctions of linear-time encodable and decodable codes that
can transmit over 10SSY channels at rates extremely close to capacity. The encoding and …
can transmit over 10SSY channels at rates extremely close to capacity. The encoding and …
[BOOK][B] Pseudorandomness and cryptographic applications
M Luby - 1996 - books.google.com
… If we set m = n, then the probability that we don't find a witness is exponentially small in n.
On input E {0, 1}", the randomized P-time function ensemble randomly chooses y1,..., Ym at …
On input E {0, 1}", the randomized P-time function ensemble randomly chooses y1,..., Ym at …
Improved low-density parity-check codes using irregular graphs
MG Luby, M Mitzenmacher… - IEEE Transactions …, 2001 - ieeexplore.ieee.org
… The work of MG Luby was supported in part by the National Science Foundation under
Operating Grant NCR-9416101. The work of M. Mitzenmacher was supported in part by the Alfred …
Operating Grant NCR-9416101. The work of M. Mitzenmacher was supported in part by the Alfred …
Acute stroke imaging research roadmap II
Society of Neuroradiology, and the Foundation of the American Society of Neuroradiology
sponsored a series of working group meetings> 12 months, with the final meeting occurring …
sponsored a series of working group meetings> 12 months, with the final meeting occurring …
[PDF][PDF] Self-testing/correcting with applications to numerical problems
M Blum, M Luby, R Rubinfeld - Proceedings of the twenty-second annual …, 1990 - dl.acm.org
… [Blum Luby Rubinfeld] considers the case when the program adaptively … M is an oracle
program if it makes calls to another program that is specified at run time. We let MA denote M …
program if it makes calls to another program that is specified at run time. We let MA denote M …
Optimal speedup of Las Vegas algorithms
M Luby, A Sinclair, D Zuckerman - Information Processing Letters, 1993 - Elsevier
… Moreover, (3) also holds for t = m provided we interpret 0 X w as 0. … Suppose on the other
hand that {m,, ti) is the first stage of run m,. Then the contribution is exactly as in the proof of …
hand that {m,, ti) is the first stage of run m,. Then the contribution is exactly as in the proof of …
How to construct pseudorandom permutations from pseudorandom functions
M Luby, C Rackoff - SIAM Journal on Computing, 1988 - SIAM
… from the attack and given the encryption fT,(M) of M (but not M), L cannot predict the value
of M any better than if L hadno information about M. Symmetrically, let E be the encryption of a …
of M any better than if L hadno information about M. Symmetrically, let E be the encryption of a …
[PDF][PDF] Analysis of low density codes and improved designs using irregular graphs
… cess, consider an individual edge (m, c) between a message node m and a check node c, …
of m. This tree is rooted at m, and the tree branches out from the check nodes of m excluding c, …
of m. This tree is rooted at m, and the tree branches out from the check nodes of m excluding c, …
Pseudo-random generation from one-way functions
… h = (Af, b), where M is an m by n bit matrix and b is a bit vec- … [Impagliazzo, Luby 891 shows
that most cryptographic … combined with [Impa.gliazzo, Luby 891, many others remain open. […
that most cryptographic … combined with [Impa.gliazzo, Luby 891, many others remain open. […