Skip to main content

Showing 1–9 of 9 results for author: Bibak, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2207.01590  [pdf, other

    cs.CR

    The Dichotomy of Cloud and IoT: Cloud-Assisted IoT From a Security Perspective

    Authors: Behrouz Zolfaghari, Abbas Yazdinejad, Ali Dehghantanha, Jacob Krzciok, Khodakhast Bibak

    Abstract: In recent years, the existence of a significant cross-impact between Cloud computing and Internet of Things (IoT) has lead to a dichotomy that gives raise to Cloud-Assisted IoT (CAIoT) and IoT-Based Cloud (IoTBC). Although it is pertinent to study both technologies, this paper focuses on CAIoT, and especially its security issues, which are inherited from both Cloud computing and IoT. This study st… ▽ More

    Submitted 25 October, 2022; v1 submitted 4 July, 2022; originally announced July 2022.

    Comments: The authors metadata field and some parts of paper during replacement has been updated in the new version

  2. MMH* with arbitrary modulus is always almost-universal

    Authors: Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan

    Abstract: Universal hash functions, discovered by Carter and Wegman in 1979, are of great importance in computer science with many applications. MMH$^*$ is a well-known $\triangle$-universal hash function family, based on the evaluation of a dot product modulo a prime. In this paper, we introduce a generalization of MMH$^*$, that we call GMMH$^*$, using the same construction as MMH$^*$ but with an arbitrary… ▽ More

    Submitted 11 October, 2020; originally announced October 2020.

    Journal ref: Information Processing Letters 116 (2016), 481-483

  3. Unweighted linear congruences with distinct coordinates and the Varshamov--Tenengolts codes

    Authors: Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan

    Abstract: In this paper, we first give explicit formulas for the number of solutions of unweighted linear congruences with distinct coordinates. Our main tools are properties of Ramanujan sums and of the discrete Fourier transform of arithmetic functions. Then, as an application, we derive an explicit formula for the number of codewords in the Varshamov--Tenengolts code $VT_b(n)$ with Hamming weight $k$, th… ▽ More

    Submitted 11 October, 2020; originally announced October 2020.

    Journal ref: Designs, Codes and Cryptography 86 (2018), 1893-1904

  4. The Cayley graphs associated with some quasi-perfect Lee codes are Ramanujan graphs

    Authors: Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan

    Abstract: Let $\Z_n[i]$ be the ring of Gaussian integers modulo a positive integer $n$. Very recently, Camarero and Martínez [IEEE Trans. Inform. Theory, {\bf 62} (2016), 1183--1192], showed that for every prime number $p>5$ such that $p\equiv \pm 5 \pmod{12}$, the Cayley graph $\mathcal{G}_p=\textnormal{Cay}(\Z_p[i], S_2)$, where $S_2$ is the set of units of $\Z_p[i]$, induces a 2-quasi-perfect Lee code ov… ▽ More

    Submitted 11 October, 2020; originally announced October 2020.

    Journal ref: IEEE Transactions on Information Theory 62 (2016), 6355-6358

  5. Explicit Formulas for the Weight Enumerators of Some Classes of Deletion Correcting Codes

    Authors: Khodakhast Bibak, Olgica Milenkovic

    Abstract: We introduce a general class of codes which includes several well-known classes of deletion/insertion correcting codes as special cases. For example, the Helberg code, the Levenshtein code, the Varshamov--Tenengolts code, and most variants of these codes including most of those which have been recently used in studying DNA-based data storage systems are all special cases of our code. Then, using a… ▽ More

    Submitted 22 December, 2018; originally announced December 2018.

    Comments: IEEE Transactions on Communications, 2019

  6. A generalization of Schönemann's theorem via a graph theoretic method

    Authors: Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan

    Abstract: Recently, Grynkiewicz et al. [{\it Israel J. Math.} {\bf 193} (2013), 359--398], using tools from additive combinatorics and group theory, proved necessary and sufficient conditions under which the linear congruence $a_1x_1+\cdots +a_kx_k\equiv b \pmod{n}$, where $a_1,\ldots,a_k,b,n$ ($n\geq 1$) are arbitrary integers, has a solution $\langle x_1,\ldots,x_k \rangle \in \Z_{n}^k$ with all $x_i$ dis… ▽ More

    Submitted 5 May, 2019; v1 submitted 18 December, 2017; originally announced December 2017.

    Journal ref: Discrete Mathematics 342 (2019), 3057-3061

  7. arXiv:1507.02331  [pdf, ps, other

    cs.CR cs.DS math.CO math.NT

    On an almost-universal hash function family with applications to authentication and secrecy codes

    Authors: Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, László Tóth

    Abstract: Universal hashing, discovered by Carter and Wegman in 1979, has many important applications in computer science. MMH$^*$, which was shown to be $Δ$-universal by Halevi and Krawczyk in 1997, is a well-known universal hash function family. We introduce a variant of MMH$^*$, that we call GRDH, where we use an arbitrary integer $n>1$ instead of prime $p$ and let the keys… ▽ More

    Submitted 21 April, 2017; v1 submitted 8 July, 2015; originally announced July 2015.

    Comments: International Journal of Foundations of Computer Science, to appear

    Journal ref: International Journal of Foundations of Computer Science 29 (2018), 357-375

  8. arXiv:1503.01806  [pdf, ps, other

    math.NT cs.CR math.CO

    Restricted linear congruences

    Authors: Khodakhast Bibak, Bruce M. Kapron, Venkatesh Srinivasan, Roberto Tauraso, László Tóth

    Abstract: In this paper, using properties of Ramanujan sums and of the discrete Fourier transform of arithmetic functions, we give an explicit formula for the number of solutions of the linear congruence $a_1x_1+\cdots +a_kx_k\equiv b \pmod{n}$, with $\gcd(x_i,n)=t_i$ ($1\leq i\leq k$), where $a_1,t_1,\ldots,a_k,t_k, b,n$ ($n\geq 1$) are arbitrary integers. As a consequence, we derive necessary and sufficie… ▽ More

    Submitted 29 August, 2016; v1 submitted 5 March, 2015; originally announced March 2015.

    Comments: Journal of Number Theory, to appear

    Journal ref: Journal of Number Theory 171 (2017), 128-144

  9. arXiv:1108.3790  [pdf, ps, other

    math.CO cs.CR math.NT

    Additive combinatorics with a view towards computer science and cryptography: An exposition

    Authors: Khodakhast Bibak

    Abstract: Recently, additive combinatorics has blossomed into a vibrant area in mathematical sciences. But it seems to be a difficult area to define - perhaps because of a blend of ideas and techniques from several seemingly unrelated contexts which are used there. One might say that additive combinatorics is a branch of mathematics concerning the study of combinatorial properties of algebraic objects, for… ▽ More

    Submitted 25 October, 2012; v1 submitted 18 August, 2011; originally announced August 2011.

    Comments: 37 pages. In Proceedings of the International Number Theory Conference in Memory of Alf van der Poorten, to appear