The odyssey of entropy: cryptography

B Zolfaghari, K Bibak, T Koshiba - Entropy, 2022 - mdpi.com
After being introduced by Shannon as a measure of disorder and unavailable information,
the notion of entropy has found its applications in a broad range of scientific disciplines. In …

Authentication of variable length messages in quantum key distribution

K Bibak, BM Kapron, V Srinivasan - EPJ Quantum Technology, 2022 - Springer
Authentication plays a critical role in the security of quantum key distribution (QKD)
protocols. We propose using Polynomial Hash and its variants for authentication of variable …

[HTML][HTML] Restricted linear congruences

K Bibak, BM Kapron, V Srinivasan, R Tauraso… - Journal of Number …, 2017 - Elsevier
In this paper, using properties of Ramanujan sums and of the discrete Fourier transform of
arithmetic functions, we give an explicit formula for the number of solutions of the linear …

On an almost-universal hash function family with applications to authentication and secrecy codes

K Bibak, BM Kapron, V Srinivasan… - International Journal of …, 2018 - World Scientific
Universal hashing, discovered by Carter and Wegman in 1979, has many important
applications in computer science. MMH∗, which was shown to be Δ-universal by Halevi and …

[图书][B] Restricted congruences in computing

K Bibak - 2020 - taylorfrancis.com
Congruences are ubiquitous in computer science, engineering, mathematics, and related
areas. Developing techniques for finding (the number of) solutions of congruences is an …

DOTMIX-Pro: faster and more efficient variants of DOTMIX for dynamic-multithreading platforms

R Ritchie, K Bibak - The Journal of Supercomputing, 2022 - Springer
Many concurrency platforms offer a processor oblivious model of computation, where the
scheduler dynamically distributes work across threads. While this is convenient, it introduces …

Explicit formulas for the weight enumerators of some classes of deletion correcting codes

K Bibak, O Milenkovic - IEEE Transactions on Communications, 2018 - ieeexplore.ieee.org
We introduce a general class of codes which includes several well-known classes of
deletion/insertion correcting codes as special cases. For example, the Helberg code, the …

[图书][B] Crypto and AI: From Coevolution to Quantum Revolution

B Zolfaghari, HR Nemati, N Yanai, K Bibak - 2023 - Springer
This book studies the intersection between cryptography and AI, highlighting the significant
cross-impact and potential between the two technologies. The authors first study the …

煤基质甲烷扩散系数测试及其影响因素分析.

赵俊龙, 汤达祯, 许浩, 李松, 陶树… - Coal Science & …, 2016 - search.ebscohost.com
为准确测试煤岩甲烷扩散系数, 通过采用片状煤基质作为检测样品, 测试并分析了不同气体压力,
煤阶与水分对甲烷扩散系数的影响. 结果表明: 片状样品保持了煤基质特有的空间结构 …

Weight enumerators of some classes of deletion correcting codes

K Bibak, O Milenkovic - 2018 IEEE International Symposium on …, 2018 - ieeexplore.ieee.org
We derive an explicit expression for the weight enumerator of a general class of codes
which includes several classes of deletion correcting codes, such as Helberg, Levenshtein …