David A. Karpuk

Orcid: 0000-0003-3621-9752

According to our database1, David A. Karpuk authored at least 48 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Modular Polynomial Codes for Secure and Robust Distributed Matrix Multiplication.
IEEE Trans. Inf. Theory, June, 2024

Secret Sharing for Secure and Private Information Retrieval: A Construction Using Algebraic Geometry Codes.
CoRR, 2024

Algebraic Geometry Codes for Cross-Subspace Alignment in Private Information Retrieval.
Proceedings of the IEEE International Symposium on Information Theory, 2024

Secure Distributed Matrix Multiplication with Precomputation.
Proceedings of the IEEE International Symposium on Information Theory, 2024

2021
Well-Rounded Lattices: Towards Optimal Coset Codes for Gaussian and Fading Wiretap Channels.
IEEE Trans. Inf. Theory, 2021

Constructing Partial MDS Codes from Reducible Algebraic Curves.
SIAM J. Discret. Math., 2021

Degree Tables for Secure Distributed Matrix Multiplication.
IEEE J. Sel. Areas Inf. Theory, 2021

2020
GASP Codes for Secure Distributed Matrix Multiplication.
IEEE Trans. Inf. Theory, 2020

Private Polynomial Computation From Lagrange Encoding.
IEEE Trans. Inf. Forensics Secur., 2020

Towards Practical Private Information Retrieval From MDS Array Codes.
IEEE Trans. Commun., 2020

Constructing Partial MDS Codes from Reducible Curves.
CoRR, 2020

Notes on Communication and Computation in Secure Distributed Matrix Multiplication.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

2019
Private Information Retrieval From Coded Storage Systems With Colluding, Byzantine, and Unresponsive Servers.
IEEE Trans. Inf. Theory, 2019

$t$ -Private Information Retrieval Schemes Using Transitive Codes.
IEEE Trans. Inf. Theory, 2019

Private Information Retrieval from MDS Array Codes with (Near-) Optimal Repair Bandwidth.
CoRR, 2019

Private Proximity Retrieval.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Robust Private Information Retrieval from Coded Systems with Byzantine and Colluding Servers.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Private Computation of Systematically Encoded Data with Colluding Servers.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Channel Pre-Inversion and Max-SINR Vector Perturbation for Large-Scale Broadcast Channels.
IEEE Trans. Broadcast., 2017

Private Information Retrieval from Coded Databases with Colluding Servers.
SIAM J. Appl. Algebra Geom., 2017

Private Information Retrieval Schemes for Coded Data with Arbitrary Collusion Patterns.
CoRR, 2017

Private information retrieval schemes for codec data with arbitrary collusion patterns.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Lattice coding for Rician fading channels from Hadamard rotations.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
Locally Diverse Constellations From the Special Orthogonal Group.
IEEE Trans. Wirel. Commun., 2016

Perfect Secrecy in Physical-Layer Network Coding Systems From Structured Interference.
IEEE Trans. Inf. Forensics Secur., 2016

Efficiently sphere-decodable physical layer transmission schemes for wireless storage networks.
EURASIP J. Adv. Signal Process., 2016

On Analytical and Geometric Lattice Design Criteria for Wiretap Coset Codes.
CoRR, 2016

Information Bounds and Flatness Factor Approximation for Fading Wiretap Channels.
CoRR, 2016

Large-Scale Channel Inversion and Transmit Vector Perturbation.
CoRR, 2016

Nested Lattice Codes for Vector Perturbation Systems.
CoRR, 2016

Decoding in Compute-and-Forward Relaying: Real Lattices and the Flatness of Lattice Sums.
CoRR, 2016

Well-rounded lattices for coset coding in MIMO wiretap channels.
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016

Information bounds and flatness factor approximation for fading wiretap MIMO channels.
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016

2015
Strong Secrecy in Wireless Network Coding Systems from Structured Interference.
CoRR, 2015

Degrees of Freedom and Secrecy in Wireless Relay Networks.
CoRR, 2015

Reduced Complexity Decoding of n x n Algebraic Space-Time Codes.
CoRR, 2015

Probability estimates for fading and wiretap channels from ideal class zeta functions.
Adv. Math. Commun., 2015

A low-complexity message recovery method for Compute-and-Forward relaying.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

Hybrid channel pre-inversion and interference alignment strategies.
Proceedings of the IEEE International Conference on Communication, 2015

2014
Algebraic Codes and a New Physical Layer Transmission Protocol for Wireless Distributed Storage Systems.
CoRR, 2014

Space-time storage codes for wireless distributed storage systems.
Proceedings of the 4th International Conference on Wireless Communications, 2014

Multi-dimensional and non-uniform constellation optimization via the special orthogonal group.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Node repair for distributed storage systems over fading channels.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

New relay-based transmission protocols for wireless distributed storage systems.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Strong secrecy in wireless network coding systems with M-QAM modulators.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Rotating non-uniform and high-dimensional constellations using geodesic flow on lie groups.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Nonasymptotic Probability Bounds for Fading Channels Exploiting Dedekind Zeta Functions
CoRR, 2013

Probability bounds for an eavesdropper's correct decision over a MIMO wiretap channel.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013


  Loading...