Bulat-Ziganshin
Bulat-Ziganshin
i'm close to publishing of 0.1. decoder is already developed and checked, it just need new codebase and will be pushed immediately after 0.1 release. sorry, i spend too much...
i've read your docs but not found - what you mean by "on-the-fly" change of protection parameters? fastecc allows to use different protection configs in different calls - f.e. you...
So, the current state: As you can see in README, i've reinvented previous Lin algo that works in GF(p). Their latest paper implements the same high-level algo but in GF(2^n)...
>Very nice paper BTW, very nice and concise, congrats do you mean my README? i never filled any papers :smiley: >Yes you nailed it, by "on-the-fly" I meant changing the...
>Ah sorry I thought you were a co-author of "An Efficient (n,k) Information Dispersal Algorithm based on Fermat Number Transforms" Do you understand the paper? If so, you are smarter...
>Do you have any pointer for NTT in RS encoding beside the paper by Sian-Jheng et al? In BulatECC.zip, these are in directories Par3 (collecting code/papers that were considered for...
>About ECC protection, it's not really necessary to protect ECC bytes because they are protecting themselves, I'm not sure that adding another ECC on ECC is actually better Signal-to-Ratio wise...
It seems that you both say about measuring time intervals, while the code I provided is about measuring effective CPU frequency - using any abovementioned way to measure the time...
I still think that there is a great misunderstanding on your side. Can you describe plan of such attack? flood resistance idea suppose that you send keys to another network...
>use a secure hash function with a secure random key for every table, and never dump keys to log files or when serializing data. Again, I can't talk for any...