Skip to main content

Showing 1–50 of 78 results for author: Rosenthal, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.20047  [pdf, ps, other

    cs.IT math.CO

    Schubert Subspace Codes

    Authors: Gianira N. Alfarano, Joachim Rosenthal, Beatrice Toesca

    Abstract: In this paper, we initiate the study of constant dimension subspace codes restricted to Schubert varieties, which we call Schubert subspace codes. These codes have a very natural geometric description, as objects that we call intersecting sets with respect to a fixed subspace. We provide a geometric construction of maximum size constant dimension subspace codes in some Schubert varieties with the… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  2. arXiv:2402.02982  [pdf, other

    cs.IT

    Algorithms for Computing the Free Distance of Convolutional Codes

    Authors: Zita Abreu, Joachim Rosenthal, Michael Schaller

    Abstract: The free distance of a convolutional code is a reliable indicator of its performance. However its computation is not an easy task. In this paper, we present some algorithms to compute the free distance with good efficiency that work for convolutional codes of all rates and over any field. Furthermore we discuss why an algorithm which is claimed to be very efficient is incorrect.

    Submitted 5 February, 2024; originally announced February 2024.

  3. arXiv:2312.14674  [pdf, ps, other

    cs.IT

    Error-Correction Performance of Regular Ring-Linear LDPC Codes over Lee Channels

    Authors: Jessica Bariffi, Hannes Bartz, Gianluigi Liva, Joachim Rosenthal

    Abstract: Most low-density parity-check (LDPC) code constructions are considered over finite fields. In this work, we focus on regular LDPC codes over integer residue rings and analyze their performance with respect to the Lee metric. Their error-correction performance is studied over two channel models, in the Lee metric. The first channel model is a discrete memoryless channel, whereas in the second chann… ▽ More

    Submitted 31 July, 2024; v1 submitted 22 December, 2023; originally announced December 2023.

  4. arXiv:2310.01685  [pdf, other

    cs.LG

    A Framework for Interpretability in Machine Learning for Medical Imaging

    Authors: Alan Q. Wang, Batuhan K. Karaman, Heejong Kim, Jacob Rosenthal, Rachit Saluja, Sean I. Young, Mert R. Sabuncu

    Abstract: Interpretability for machine learning models in medical imaging (MLMI) is an important direction of research. However, there is a general sense of murkiness in what interpretability means. Why does the need for interpretability in MLMI arise? What goals does one actually seek to address when interpretability is needed? To answer these questions, we identify a need to formalize the goals and elemen… ▽ More

    Submitted 16 April, 2024; v1 submitted 2 October, 2023; originally announced October 2023.

    Comments: Published in IEEE Access

  5. arXiv:2305.04693  [pdf, ps, other

    cs.IT

    Binary convolutional codes with optimal column distances

    Authors: Zita Abreu, Julia Lieb, Joachim Rosenthal

    Abstract: There exists a large literature of construction of convolutional codes with maximal or near maximal free distance. Much less is known about constructions of convolutional codes having optimal or near optimal column distances. In this paper, a new construction of convolutional codes over the binary field with optimal column distances is presented.

    Submitted 25 May, 2023; v1 submitted 8 May, 2023; originally announced May 2023.

  6. arXiv:2305.04647  [pdf, ps, other

    cs.IT

    Criteria for the construction of MDS convolutional codes with good column distances

    Authors: Zita Abreu, Julia Lieb, Raquel Pinto, Joachim Rosenthal

    Abstract: Maximum-distance separable (MDS) convolutional codes are characterized by the property that their free distance reaches the generalized Singleton bound. In this paper, new criteria to construct MDS convolutional codes are presented. Additionally, the obtained convolutional codes have optimal first (reverse) column distances and the criteria allow to relate the construction of MDS convolutional cod… ▽ More

    Submitted 25 May, 2023; v1 submitted 8 May, 2023; originally announced May 2023.

  7. arXiv:2211.00233  [pdf, other

    cs.CV cs.AI cs.LG

    Detection of (Hidden) Emotions from Videos using Muscles Movements and Face Manifold Embedding

    Authors: Juni Kim, Zhikang Dong, Eric Guan, Judah Rosenthal, Shi Fu, Miriam Rafailovich, Pawel Polak

    Abstract: We provide a new non-invasive, easy-to-scale for large amounts of subjects and a remotely accessible method for (hidden) emotion detection from videos of human faces. Our approach combines face manifold detection for accurate location of the face in the video with local face manifold embedding to create a common domain for the measurements of muscle micro-movements that is invariant to the movemen… ▽ More

    Submitted 31 October, 2022; originally announced November 2022.

    ACM Class: I.4.3; I.4.9

  8. arXiv:2208.04087  [pdf, ps, other

    cs.IT

    Self-Dual Convolutional Codes

    Authors: Sebastian Heri, Julia Lieb, Joachim Rosenthal

    Abstract: This paper investigates the concept of self-dual convolutional code. We derive the basic properties of this interesting class of codes and we show how some of the techniques to construct self-dual linear block codes generalize to self-dual convolutional codes. As for self-dual linear block codes we are able to give a complete classification for some small parameters.

    Submitted 8 August, 2022; originally announced August 2022.

  9. arXiv:2208.04061  [pdf, ps, other

    cs.IT cs.CR

    Efficient Description of some Classes of Codes using Group Algebras

    Authors: Henry Chimal-Dzul, Niklas Gassner, Joachim Rosenthal, Reto Schnyder

    Abstract: Circulant matrices are an important tool widely used in coding theory and cryptography. A circulant matrix is a square matrix whose rows are the cyclic shifts of the first row. Such a matrix can be efficiently stored in memory because it is fully specified by its first row. The ring of $n \times n$ circulant matrices can be identified with the quotient ring $\mathbb{F}[x]/(x^n-1)$. In consequence,… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

    Comments: A shortened version was submitted to MTNS 2022

  10. arXiv:2203.13888  [pdf

    cs.DC

    Whole Slide Image to DICOM Conversion as Event-Driven Cloud Infrastructure

    Authors: David Brundage, Jacob Rosenthal, Ryan Carelli, Sophie Rand, Renato Umeton, Massimo Loda, Luigi Marchionni

    Abstract: The Digital Imaging and Communication in Medicine (DICOM) specification is increasingly being adopted in digital pathology to promote data standardization and interoperability. Efficient conversion of proprietary file formats into the DICOM standard format is a key requirement for institutional adoption of DICOM, necessary to ensure compatibility with existing scanners, microscopes, and data archi… ▽ More

    Submitted 25 March, 2022; originally announced March 2022.

  11. arXiv:2203.03525  [pdf, ps, other

    cs.CR cs.CC

    Cryptanalysis of some Nonabelian Group-Based Key Exchange Protocols

    Authors: Simran Tinani, Carlo Matteotti, Joachim Rosenthal

    Abstract: In the recently emerging field of nonabelian group-based cryptography, a prominently used one-way function is the Conjugacy Search Problem (CSP), and two important classes of platform groups are polycyclic and matrix groups. In this paper, we discuss the complexity of the conjugacy search problem (CSP) in these two classes of platform groups using the three protocols in [10], [26], and [29] as our… ▽ More

    Submitted 8 October, 2023; v1 submitted 7 March, 2022; originally announced March 2022.

  12. arXiv:2202.11496  [pdf, other

    eess.IV cs.CV

    MITI: SLAM Benchmark for Laparoscopic Surgery

    Authors: Regine Hartwig, Daniel Ostler, Jean-Claude Rosenthal, Hubertus Feußner, Dirk Wilhelm, Dirk Wollherr

    Abstract: We propose a new benchmark for evaluating stereoscopic visual-inertial computer vision algorithms (SLAM/ SfM/ 3D Reconstruction/ Visual-Inertial Odometry) for minimally invasive surgical (MIS) interventions in the abdomen. Our MITI Dataset available at [https://mediatum.ub.tum.de/1621941] provides all the necessary data by a complete recording of a handheld surgical intervention at Research Hospit… ▽ More

    Submitted 23 February, 2022; originally announced February 2022.

    Comments: arXiv admin note: substantial text overlap with arXiv:2202.11075

  13. arXiv:2202.11075  [pdf, other

    cs.CV

    Constrained Visual-Inertial Localization With Application And Benchmark in Laparoscopic Surgery

    Authors: Regine Hartwig, Daniel Ostler, Jean-Claude Rosenthal, Hubertus Feußner, Dirk Wilhelm, Dirk Wollherr

    Abstract: We propose a novel method to tackle the visual-inertial localization problem for constrained camera movements. We use residuals from the different modalities to jointly optimize a global cost function. The residuals emerge from IMU measurements, stereoscopic feature points, and constraints on possible solutions in SE(3). In settings where dynamic disturbances are frequent, the residuals reduce the… ▽ More

    Submitted 22 February, 2022; originally announced February 2022.

  14. arXiv:2201.07119  [pdf, other

    cs.CR cs.IT

    A Survey on Code-Based Cryptography

    Authors: Violetta Weger, Niklas Gassner, Joachim Rosenthal

    Abstract: The improvements on quantum technology are threatening our daily cybersecurity, as a capable quantum computer can break all currently employed asymmetric cryptosystems. In preparation for the quantum-era the National Institute of Standards and Technology (NIST) has initiated in 2016 a standardization process for public-key encryption (PKE) schemes, key-encapsulation mechanisms (KEM) and digital si… ▽ More

    Submitted 17 July, 2024; v1 submitted 18 January, 2022; originally announced January 2022.

    Comments: This book chapter is a part of the Springer Lecture Notes in Mathematics: Coding Theory and Applications V, Applications of Coding Theory in Quantum Computing and Cryptography

  15. arXiv:2110.01878  [pdf, ps, other

    cs.IT

    On the Properties of Error Patterns in the Constant Lee Weight Channel

    Authors: Jessica Bariffi, Hannes Bartz, Gianluigi Liva, Joachim Rosenthal

    Abstract: The problem of scalar multiplication applied to vectors is considered in the Lee metric. Unlike in other metrics, the Lee weight of a vector may be increased or decreased by the product with a nonzero, nontrivial scalar. This problem is of particular interest for cryptographic applications, like for example Lee metric code-based cryptosystems, since an attacker may use scalar multiplication to red… ▽ More

    Submitted 9 February, 2022; v1 submitted 5 October, 2021; originally announced October 2021.

  16. arXiv:2110.01406  [pdf

    cs.LG cs.DC cs.PF cs.SE

    MedPerf: Open Benchmarking Platform for Medical Artificial Intelligence using Federated Evaluation

    Authors: Alexandros Karargyris, Renato Umeton, Micah J. Sheller, Alejandro Aristizabal, Johnu George, Srini Bala, Daniel J. Beutel, Victor Bittorf, Akshay Chaudhari, Alexander Chowdhury, Cody Coleman, Bala Desinghu, Gregory Diamos, Debo Dutta, Diane Feddema, Grigori Fursin, Junyi Guo, Xinyuan Huang, David Kanter, Satyananda Kashyap, Nicholas Lane, Indranil Mallick, Pietro Mascagni, Virendra Mehta, Vivek Natarajan , et al. (17 additional authors not shown)

    Abstract: Medical AI has tremendous potential to advance healthcare by supporting the evidence-based practice of medicine, personalizing patient treatment, reducing costs, and improving provider and patient experience. We argue that unlocking this potential requires a systematic way to measure the performance of medical AI models on large-scale heterogeneous data. To meet this need, we are building MedPerf,… ▽ More

    Submitted 28 December, 2021; v1 submitted 29 September, 2021; originally announced October 2021.

  17. arXiv:2105.08372  [pdf, other

    cs.IT

    Analysis of Low-Density Parity-Check Codes over Finite Integer Rings for the Lee Channel

    Authors: Jessica Bariffi, Hannes Bartz, Gianluigi Liva, Joachim Rosenthal

    Abstract: We study the performance of nonbinary low-density parity-check (LDPC) codes over finite integer rings over two channels that arise from the Lee metric. The first channel is a discrete memory-less channel (DMC) matched to the Lee metric. The second channel adds to each codeword an error vector of constant Lee weight, where the error vector is picked uniformly at random from the set of vectors of co… ▽ More

    Submitted 18 October, 2022; v1 submitted 18 May, 2021; originally announced May 2021.

  18. arXiv:2104.09486  [pdf, ps, other

    cs.IT

    Convolutional codes over finite chain rings, MDP codes and their characterization

    Authors: Gianira N. Alfarano, Anina Gruica, Julia Lieb, Joachim Rosenthal

    Abstract: In this paper, we develop the theory of convolutional codes over finite commutative chain rings. In particular, we focus on maximum distance profile (MDP) convolutional codes and we provide a characterization of these codes, generalizing the one known for fields. Moreover, we relate (reverse) MDP convolutional codes over a finite chain ring with (reverse) MDP convolutional codes over its residue f… ▽ More

    Submitted 30 March, 2022; v1 submitted 19 April, 2021; originally announced April 2021.

    Comments: 19 pages

  19. arXiv:2103.09722  [pdf, ps, other

    cs.IT math.CO

    Moderate Density Parity-Check Codes from Projective Bundles

    Authors: Jessica Bariffi, Sam Mattheus, Alessandro Neri, Joachim Rosenthal

    Abstract: A new construction for moderate density parity-check (MDPC) codes using finite geometry is proposed. We design a parity-check matrix for this family of binary codes as the concatenation of two matrices: the incidence matrix between points and lines of the Desarguesian projective plane and the incidence matrix between points and ovals of a projective bundle. A projective bundle is a special collect… ▽ More

    Submitted 17 March, 2021; originally announced March 2021.

    Comments: 19 pages

    MSC Class: 11T71; 51E05

  20. arXiv:2103.07749  [pdf, ps, other

    cs.IT

    On Bounds for Ring-Based Coding Theory

    Authors: Niklas Gassner, Marcus Greferath, Joachim Rosenthal, Violetta Weger

    Abstract: Coding Theory where the alphabet is identified with the elements of a ring or a module has become an important research topic over the last 30 years. Such codes over rings had important applications and many interesting mathematical problems are related to this line of research. It has been well established, that with the generalization of the algebraic structure to rings there is a need to also… ▽ More

    Submitted 16 March, 2021; v1 submitted 13 March, 2021; originally announced March 2021.

  21. arXiv:2101.11500  [pdf, ps, other

    cs.CC math.GR

    A Deterministic Algorithm for the Discrete Logarithm Problem in a Semigroup

    Authors: Simran Tinani, Joachim Rosenthal

    Abstract: The discrete logarithm problem in a finite group is the basis for many protocols in cryptography. The best general algorithms which solve this problem have time complexity of $\mathcal{O}(\sqrt{N}\log N)$, and a space complexity of $\mathcal{O}(\sqrt{N})$ where $N$ is the order of the group. (If $N$ is unknown, a simple modification would achieve a time complexity of… ▽ More

    Submitted 15 March, 2022; v1 submitted 27 January, 2021; originally announced January 2021.

  22. arXiv:2101.01133  [pdf, other

    cs.CV

    Stereo Correspondence and Reconstruction of Endoscopic Data Challenge

    Authors: Max Allan, Jonathan Mcleod, Congcong Wang, Jean Claude Rosenthal, Zhenglei Hu, Niklas Gard, Peter Eisert, Ke Xue Fu, Trevor Zeffiro, Wenyao Xia, Zhanshi Zhu, Huoling Luo, Fucang Jia, Xiran Zhang, Xiaohong Li, Lalith Sharan, Tom Kurmann, Sebastian Schmid, Raphael Sznitman, Dimitris Psychogyios, Mahdi Azizian, Danail Stoyanov, Lena Maier-Hein, Stefanie Speidel

    Abstract: The stereo correspondence and reconstruction of endoscopic data sub-challenge was organized during the Endovis challenge at MICCAI 2019 in Shenzhen, China. The task was to perform dense depth estimation using 7 training datasets and 2 test sets of structured light data captured using porcine cadavers. These were provided by a team at Intuitive Surgical. 10 teams participated in the challenge day.… ▽ More

    Submitted 28 January, 2021; v1 submitted 4 January, 2021; originally announced January 2021.

  23. Introducing a new high-resolution handwritten digits data set with writer characteristics

    Authors: Cédric Beaulac, Jeffrey S. Rosenthal

    Abstract: The contributions in this article are two-fold. First, we introduce a new hand-written digit data set that we collected. It contains high-resolution images of hand-written The contributions in this article are two-fold. First, we introduce a new handwritten digit data set that we collected. It contains high-resolution images of handwritten digits together with various writer characteristics which… ▽ More

    Submitted 13 April, 2022; v1 submitted 4 November, 2020; originally announced November 2020.

    Comments: Data set available here : https://drive.google.com/drive/folders/1f2o1kjXLvcxRgtmMMuDkA2PQ5Zato4Or?usp=sharing

    Journal ref: SN COMPUT. SCI. 4, 66 (2023)

  24. arXiv:2008.13470  [pdf, ps, other

    cs.IT math.CO

    Construction of LDPC convolutional codes via difference triangle sets

    Authors: Gianira N. Alfarano, Julia Lieb, Joachim Rosenthal

    Abstract: In this paper, a construction of $(n,k,δ)$ LDPC convolutional codes over arbitrary finite fields, which generalizes the work of Robinson and Bernstein and the later work of Tong is provided. The sets of integers forming a $(k,w)$-(weak) difference triangle set are used as supports of some columns of the sliding parity-check matrix of an $(n,k,δ)$ convolutional code, where $n\in\mathbb{N}$, $n>k$.… ▽ More

    Submitted 31 August, 2020; originally announced August 2020.

    Comments: 22 pages, Extended version of arXiv:2001.07969

  25. arXiv:2008.09013  [pdf, ps, other

    cs.IT math.DS

    Erasure decoding of convolutional codes using first order representations

    Authors: Julia Lieb, Joachim Rosenthal

    Abstract: In this paper, we employ the linear systems representation of a convolutional code to develop a decoding algorithm for convolutional codes over the erasure channel. We study the decoding problem using the state space description and this provides in a natural way additional information. With respect to previously known decoding algorithms, our new algorithm has the advantage that it is able to red… ▽ More

    Submitted 20 August, 2020; originally announced August 2020.

  26. arXiv:2001.08281  [pdf, ps, other

    cs.IT

    Convolutional Codes

    Authors: Julia Lieb, Raquel Pinto, Joachim Rosenthal

    Abstract: The article provides a survey on convolutional codes stressing the connections to module theory and systems theory. Constructions of codes with maximal possible distance and distance profile are provided. The article will appear as book chapter in "A Concise Encyclopedia of Coding Theory" to be published by CRC Press.

    Submitted 22 January, 2020; originally announced January 2020.

  27. arXiv:2001.07969  [pdf, ps, other

    cs.IT math.CO

    Construction of Rate (n-1)/n Non-Binary LDPC Convolutional Codes via Difference Triangle Sets

    Authors: Gianira N. Alfarano, Julia Lieb, Joachim Rosenthal

    Abstract: This paper provides a construction of non-binary LDPC convolutional codes, which generalizes the work of Robinson and Bernstein. The sets of integers forming an $(n-1,w)$-difference triangle set are used as supports of the columns of rate $(n-1)/n$ convolutional codes. If the field size is large enough, the Tanner graph associated to the sliding parity-check matrix of the code is free from $4$ and… ▽ More

    Submitted 22 January, 2020; originally announced January 2020.

    Comments: The paper was submitted to ISIT 2020

  28. arXiv:1912.07557  [pdf, other

    cs.LG stat.ML

    Self-Play Learning Without a Reward Metric

    Authors: Dan Schmidt, Nick Moran, Jonathan S. Rosenfeld, Jonathan Rosenthal, Jonathan Yedidia

    Abstract: The AlphaZero algorithm for the learning of strategy games via self-play, which has produced superhuman ability in the games of Go, chess, and shogi, uses a quantitative reward function for game outcomes, requiring the users of the algorithm to explicitly balance different components of the reward against each other, such as the game winner and margin of victory. We present a modification to the A… ▽ More

    Submitted 16 December, 2019; originally announced December 2019.

    Comments: 6 pages, 4 figures

  29. Encryption Scheme Based on Expanded Reed-Solomon Codes

    Authors: Karan Khathuria, Joachim Rosenthal, Violetta Weger

    Abstract: We present a code-based public-key cryptosystem, in which we use Reed-Solomon codes over an extension field as secret codes and disguise it by considering its shortened expanded code over the base field. Considering shortened expanded codes provides a safeguard against distinguisher attacks based on the Schur product. Moreover, without using a cyclic or a quasi-cyclic structure we obtain a key siz… ▽ More

    Submitted 26 November, 2019; v1 submitted 3 June, 2019; originally announced June 2019.

    MSC Class: 14G50; 94A60; 11T71

  30. arXiv:1812.10955  [pdf, ps, other

    cs.IT cs.CR

    Generalization of the Ball-Collision Algorithm

    Authors: Carmelo Interlando, Karan Khathuria, Nicole Rohrer, Joachim Rosenthal, Violetta Weger

    Abstract: In this paper we generalize the Ball-Collision Algorithm by Bernstein, Lange, Peters from the binary field to a general finite field. We also provide a complexity analysis and compare the asymptotic complexity to other generalized information set decoding algorithms.

    Submitted 28 December, 2018; originally announced December 2018.

  31. arXiv:1811.12323  [pdf, other

    stat.ML cs.LG

    A Deep Latent-Variable Model Application to Select Treatment Intensity in Survival Analysis

    Authors: Cédric Beaulac, Jeffrey S. Rosenthal, David Hodgson

    Abstract: In the following short article we adapt a new and popular machine learning model for inference on medical data sets. Our method is based on the Variational AutoEncoder (VAE) framework that we adapt to survival analysis on small data sets with missing values. In our model, the true health status appears as a set of latent variables that affects the observed covariates and the survival chances. We s… ▽ More

    Submitted 29 November, 2018; originally announced November 2018.

    Comments: Machine Learning for Health (ML4H) Workshop at NeurIPS 2018 arXiv:1811.07216

    Report number: ML4H/2018/53

  32. arXiv:1807.06127  [pdf, ps, other

    cs.CR cs.IT

    Design and Implementation of a Digital Signature Scheme Based on Low-density Generator Matrix Codes

    Authors: Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Joachim Rosenthal, Paolo Santini, Davide Schipani

    Abstract: In this paper we consider a post-quantum digital signature scheme based on low-density generator matrix codes and propose efficient algorithmic solutions for its implementation. We also review all known attacks against this scheme and derive closed-form estimates of their complexity when running over both classical and quantum computers. Based on these estimates, we propose new parametrization for… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

    Comments: 40 pages, 4 tables

  33. BEST : A decision tree algorithm that handles missing values

    Authors: Cédric Beaulac, Jeffrey S. Rosenthal

    Abstract: The main contribution of this paper is the development of a new decision tree algorithm. The proposed approach allows users to guide the algorithm through the data partitioning process. We believe this feature has many applications but in this paper we demonstrate how to utilize this algorithm to analyse data sets containing missing values. We tested our algorithm against simulated data sets with… ▽ More

    Submitted 14 April, 2020; v1 submitted 26 April, 2018; originally announced April 2018.

    Comments: To appear in Computational Statistics

    Journal ref: Computational Statistics 2020

  34. Predicting University Students' Academic Success and Major using Random Forests

    Authors: Cédric Beaulac, Jeffrey S. Rosenthal

    Abstract: In this article, a large data set containing every course taken by every undergraduate student in a major university in Canada over 10 years is analysed. Modern machine learning algorithms can use large data sets to build useful tools for the data provider, in this case, the university. In this article, two classifiers are constructed using random forests. To begin, the first two semesters of cour… ▽ More

    Submitted 12 January, 2019; v1 submitted 9 February, 2018; originally announced February 2018.

    Journal ref: Research in Higher Education 2019

  35. arXiv:1705.07668  [pdf, ps, other

    cs.IT

    A decoding algorithm for Twisted Gabidulin codes

    Authors: Tovohery Randrianarisoa, Joachim Rosenthal

    Abstract: In this work, we modify the decoding algorithm for subspace codes by Koetter and Kschischang to get a decoding algorithm for (generalized) twisted Gabidulin codes. The decoding algorithm we present applies to cases where the code is linear over the base field $\mathbb{F}_q$ but not linear over $\mathbb{F}_{q^n}$.

    Submitted 22 May, 2017; originally announced May 2017.

    Comments: This paper was submitted to ISIT 2017

  36. arXiv:1703.03235  [pdf, ps, other

    cs.IT

    Fuzzy Authentication using Rank Distance

    Authors: Alessandro Neri, Joachim Rosenthal, Davide Schipani

    Abstract: Fuzzy authentication allows authentication based on the fuzzy matching of two objects, for example based on the similarity of two strings in the Hamming metric, or on the similiarity of two sets in the set difference metric. Aim of this paper is to show other models and algorithms of secure fuzzy authentication, which can be performed using the rank metric. A few schemes are presented which can th… ▽ More

    Submitted 9 March, 2017; originally announced March 2017.

    Comments: to appear in Cryptography and Physical Layer Security, Lecture Notes in Electrical Engineering, Springer

  37. arXiv:1612.05085  [pdf, ps, other

    cs.IT cs.CR

    Variations of the McEliece Cryptosystem

    Authors: Jessalyn Bolkema, Heide Gluesing-Luerssen, Christine A. Kelley, Kristin Lauter, Beth Malmskog, Joachim Rosenthal

    Abstract: Two variations of the McEliece cryptosystem are presented. The first one is based on a relaxation of the column permutation in the classical McEliece scrambling process. This is done in such a way that the Hamming weight of the error, added in the encryption process, can be controlled so that efficient decryption remains possible. The second variation is based on the use of spatially coupled moder… ▽ More

    Submitted 28 April, 2017; v1 submitted 15 December, 2016; originally announced December 2016.

    MSC Class: 11T71; 94A60; 94C15

  38. arXiv:1610.09244  [pdf, ps, other

    cs.IT cs.CR

    An Application of Group Theory in Confidential Network Communications

    Authors: Juan Antonio Lopez-Ramos, Joachim Rosenthal, Davide Schipani, Reto Schnyder

    Abstract: A new proposal for group key exchange is introduced which proves to be both efficient and secure and compares favorably with state of the art protocols.

    Submitted 28 October, 2016; originally announced October 2016.

    Comments: to appear in Mathematical Methods in the Applied Sciences

  39. On the Genericity of Maximum Rank Distance and Gabidulin Codes

    Authors: Alessandro Neri, Anna-Lena Horlemann-Trautmann, Tovohery Randrianarisoa, Joachim Rosenthal

    Abstract: We consider linear rank-metric codes in $\mathbb F_{q^m}^n$. We show that the properties of being MRD (maximum rank distance) and non-Gabidulin are generic over the algebraic closure of the underlying field, which implies that over a large extension field a randomly chosen generator matrix generates an MRD and a non-Gabidulin code with high probability. Moreover, we give upper bounds on the respec… ▽ More

    Submitted 19 May, 2016; originally announced May 2016.

    Journal ref: Designs, Codes and Cryptography,Volume 86, Issue 2, pp 341-363, 2018

  40. arXiv:1511.01549  [pdf, ps, other

    cs.CR cs.IT

    Extension of Overbeck's Attack for Gabidulin Based Cryptosystems

    Authors: Anna-Lena Horlemann-Trautmann, Kyle Marshall, Joachim Rosenthal

    Abstract: We present a new attack against cryptosystems based on the rank metric. Our attack allows us to cryptanalyze two variants of the GPT cryptosystem which were designed to resist the attack of Overbeck.

    Submitted 4 January, 2016; v1 submitted 4 November, 2015; originally announced November 2015.

  41. arXiv:1509.01081  [pdf, ps, other

    cs.IT

    An Active Attack on a Multiparty Key Exchange Protocol

    Authors: Reto Schnyder, Juan Antonio Lopez-Ramos, Joachim Rosenthal, Davide Schipani

    Abstract: The multiparty key exchange introduced in Steiner et al.\@ and presented in more general form by the authors is known to be secure against passive attacks. In this paper, an active attack is presented assuming malicious control of the communications of the last two users for the duration of only the key exchange.

    Submitted 3 September, 2015; originally announced September 2015.

  42. arXiv:1509.01075  [pdf, ps, other

    cs.IT cs.CR

    Group key management based on semigroup actions

    Authors: Juan Antonio Lopez-Ramos, Joachim Rosenthal, Davide Schipani, Reto Schnyder

    Abstract: In this work we provide a suite of protocols for group key management based on general semigroup actions. Construction of the key is made in a distributed and collaborative way. Examples are provided that may in some cases enhance the security level and communication overheads of previous existing protocols. Security against passive attacks is considered and depends on the hardness of the semigrou… ▽ More

    Submitted 28 July, 2016; v1 submitted 3 September, 2015; originally announced September 2015.

    Comments: accepted for publication in Journal of algebra and its applications

  43. arXiv:1505.02867  [pdf, other

    cs.LG cs.DS cs.IR stat.ML

    The Boundary Forest Algorithm for Online Supervised and Unsupervised Learning

    Authors: Charles Mathy, Nate Derbinsky, José Bento, Jonathan Rosenthal, Jonathan Yedidia

    Abstract: We describe a new instance-based learning algorithm called the Boundary Forest (BF) algorithm, that can be used for supervised and unsupervised learning. The algorithm builds a forest of trees whose nodes store previously seen examples. It can be shown data points one at a time and updates itself incrementally, hence it is naturally online. Few instance-based algorithms have this property while be… ▽ More

    Submitted 11 May, 2015; originally announced May 2015.

    Comments: 7 pages, 4 figs, 1 page supp. info

    Journal ref: Proc. of the 29th AAAI Conference on Artificial Intelligence (AAAI), 2864-2870. Austin, TX, USA. (2015)

  44. On the Geometry of Balls in the Grassmannian and List Decoding of Lifted Gabidulin Codes

    Authors: Joachim Rosenthal, Natalia Silberstein, Anna-Lena Trautmann

    Abstract: The finite Grassmannian $\mathcal{G}_{q}(k,n)$ is defined as the set of all $k$-dimensional subspaces of the ambient space $\mathbb{F}_{q}^{n}$. Subsets of the finite Grassmannian are called constant dimension codes and have recently found an application in random network coding. In this setting codewords from $\mathcal{G}_{q}(k,n)$ are sent through a network channel and, since errors may occur du… ▽ More

    Submitted 4 February, 2014; v1 submitted 2 September, 2013; originally announced September 2013.

    Comments: To be published in Designs, Codes and Cryptography (Springer)

  45. arXiv:1305.5436  [pdf, ps, other

    cs.CR cs.IT

    Using LDGM Codes and Sparse Syndromes to Achieve Digital Signatures

    Authors: Marco Baldi, Marco Bianchi, Franco Chiaraluce, Joachim Rosenthal, Davide Schipani

    Abstract: In this paper, we address the problem of achieving efficient code-based digital signatures with small public keys. The solution we propose exploits sparse syndromes and randomly designed low-density generator matrix codes. Based on our evaluations, the proposed scheme is able to outperform existing solutions, permitting to achieve considerable security levels with very small public keys.

    Submitted 23 May, 2013; originally announced May 2013.

    Comments: 16 pages. The final publication is available at springerlink.com

  46. arXiv:1301.2165  [pdf, ps, other

    cs.IT

    List Decoding of Lifted Gabidulin Codes via the Plücker Embedding

    Authors: Anna-Lena Trautmann, Natalia Silberstein, Joachim Rosenthal

    Abstract: Codes in the Grassmannian have recently found an application in random network coding. All the codewords in such codes are subspaces of $\F_q^n$ with a given dimension. In this paper, we consider the problem of list decoding of a certain family of codes in the Grassmannian, called lifted Gabidulin codes. For this purpose we use the Plücker embedding of the Grassmannian. We describe a way of re… ▽ More

    Submitted 10 January, 2013; originally announced January 2013.

    Comments: Submitted to International Workshop on Coding and Cryptography (WCC) 2013 in Bergen, Norway

    Journal ref: Preproceedings of the International Workshop on Coding and Cryptography (WCC) 2013, Bergen, Norway, pages 539--549, 2013

  47. arXiv:1210.7190  [pdf, ps, other

    cs.IT cs.CR

    Subspace Fuzzy Vault

    Authors: Kyle Marshall, Davide Schipani, Anna-Lena Trautmann, Joachim Rosenthal

    Abstract: Fuzzy vault is a scheme providing secure authentication based on fuzzy matching of sets. A major application is the use of biometric features for authentication, whereby unencrypted storage of these features is not an option because of security concerns. While there is still ongoing research around the practical implementation of such schemes, we propose and analyze here an alternative constructio… ▽ More

    Submitted 16 April, 2015; v1 submitted 26 October, 2012; originally announced October 2012.

    Comments: to appear in Springer Lecture Notes in Electrical Engineering

  48. arXiv:1209.2887  [pdf, ps, other

    cs.IT

    Decoding of Subspace Codes, a Problem of Schubert Calculus over Finite Fields

    Authors: Joachim Rosenthal, Anna-Lena Trautmann

    Abstract: Schubert calculus provides algebraic tools to solve enumerative problems. There have been several applied problems in systems theory, linear algebra and physics which were studied by means of Schubert calculus. The method is most powerful when the base field is algebraically closed. In this article we first review some of the successes Schubert calculus had in the past. Then we show how the proble… ▽ More

    Submitted 13 September, 2012; originally announced September 2012.

    Comments: To appear in Mathematical System Theory - Festschrift in Honor of Uwe Helmke on the Occasion of his Sixtieth Birthday, CreateSpace, 2012, ISBN 978-1470044008

  49. arXiv:1205.5148  [pdf, ps, other

    cs.IT cs.CR

    On Burst Error Correction and Storage Security of Noisy Data

    Authors: Felix Fontein, Kyle Marshall, Joachim Rosenthal, Davide Schipani, Anna-Lena Trautmann

    Abstract: Secure storage of noisy data for authentication purposes usually involves the use of error correcting codes. We propose a new model scenario involving burst errors and present for that several constructions.

    Submitted 23 May, 2012; originally announced May 2012.

    Comments: to be presented at MTNS 2012

  50. A Complete Characterization of Irreducible Cyclic Orbit Codes and their Plücker Embedding

    Authors: Joachim Rosenthal, Anna-Lena Trautmann

    Abstract: Constant dimension codes are subsets of the finite Grassmann variety. The study of these codes is a central topic in random linear network coding theory. Orbit codes represent a subclass of constant dimension codes. They are defined as orbits of a subgroup of the general linear group on the Grassmannian. This paper gives a complete characterization of orbit codes that are generated by an irreducib… ▽ More

    Submitted 18 January, 2012; originally announced January 2012.

    Comments: submitted to Designs, Codes and Cryptography

    Journal ref: Designs, Codes and Cryptography, volume 66, issue 1-3, pages 275-289, 2013