M.Sc. Christoph Hofmeister
Technical University of Munich
Associate Professorship of Coding and Cryptography (Prof. Wachter-Zeh)
Postal address
Theresienstr. 90
80333 München
- Phone: +49 (89) 289 - 29059
- Room: 0104.03.415
- christoph.hofmeister@tum.de
Biography
- Dual Study Program with Infineon Technologies (2015-2019)
- B.Eng. in Electrical and Computer Engineering, University of Applied Sciences Munich (2019)
- M.Sc. in Electrical and Computer Engineering, Technical University of Munich (2021)
- Since October 2021, doctoral researcher at the Institute of Communications Engineering, Coding and Cryptography group
Teaching
- Coding Theory for Storage and Networks [Summer 22]
- Fast, Secure, and Reliable Coded Computing [Winter 22/23]
- Channel Coding [Summer 23]
- Coding for Private Reliable and Efficient Distributed Learning [Winter 23/24]
Theses in Progress
Graph Entropy in Combinatorics
Description
Information theory and combinatorics are deeply intertwined. Beyond the use of combinatorics in coding theory and compression, there are many -sometimes surprising- connections.
One such connection is the use of graph entropy in combinatorial existence proofs.
This seminar topic is about explaining the proof technique introduced in [1] and [2] and applied in [3]. The goal is a tutorial-style paper with the focus on clear exposition through well chosen worked examples and visualizations.
[1] M. Fredman, and J. Komlós, On the Size of Separating Systems and Perfect Hash Functions, SIAM J. Alg. Disc. Meth., 5 (1984), pp. 61-68.
[2] J. Körner, Fredman-Komlós bounds and information theory, SIAM J. on Algebraic and Discrete Meth., 4(7), (1986), pp. 560–570.
[3] N. Alon, E. Fachini, and J. Körner, Locally Thin Set Families, Combinatorics, Probability and Computing, vol. 9 (Nov. 2000), pp. 481–488.
Supervisor:
Publications
2024
- Achieving DNA Labeling Capacity with Minimum Labels through Extremal de Bruijn Subgraphs. Munich Workshop on Coding and Cryptography (MWCC), 2024 more…
- Secure Distributed Matrix Multiplication with Modulo Degree Tables. IEEE International Symposium on Information Theory (ISIT), 2024 more…
- Achieving DNA Labeling Capacity with Minimum Labels through Extremal de Bruijn Subgraphs. 2024 IEEE International Symposium on Information Theory (ISIT), IEEE, 2024, 452-457 more… Full text ( DOI )
- Interactive Byzantine-Resilient Gradient Coding for General Data Assignments. 2024 IEEE International Symposium on Information Theory (ISIT), IEEE, 2024, 3273-3278 more… Full text ( DOI )
- Byzantine-resilient and Information-Theoretically Private Federated Learning. Munich Workshop on Coding and Cryptography (MWCC) 2024, 2024 more…
- Byzantine-Resilient and Information-Theoretically Private Federated Learning. IEEE International Symposium on Information Theory (ISIT), 2024 more…
2023
- Private Aggregation in Wireless Federated Learning with Heterogeneous Clusters. 2023 IEEE International Symposium on Information Theory (ISIT), IEEE, 2023 more… Full text ( DOI )
- Trading Communication for Computation in Byzantine-Resilient Gradient Coding. 2023 IEEE International Symposium on Information Theory (ISIT), IEEE, 2023 more… Full text ( DOI )
2022
- Trading Communication and Computation for Security in Gradient Coding. Munich Workshop on Coding and Cryptography 2022, 2022 more…
- Trading Communication and Computation for Security in Gradient Coding. 2022 IEEE European School of Information Theory (ESIT), 2022 more…
- Trading Communication and Computation for Security in Gradient Coding. TUM ICE Workshop Raitenhaslach, 2022 more…
- Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound. IEEE Journal on Selected Areas in Information Theory 3 (2), 2022, 275-285 more… Full text ( DOI )
- Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound. WCC 2022: The Twelfth International Workshop on Coding and Cryptography , 2022 more…