Prof. Dr.-Ing. Antonia Wachter-Zeh
Technical University of Munich
Associate Professorship of Coding and Cryptography (Prof. Wachter-Zeh)
Postal address
Theresienstr. 90
80333 München
- Phone: +49 (89) 289 - 23495
- Room: 0104.03.418
- antonia.wachter-zeh@tum.de
I am an Associate Professor at the Technical University of Munich (TUM) where I am heading the Coding and Cryptography (COD) group. I am a recipient of an ERC Starting Grant and the DFG Heinz Maier-Leibnitz-Preis.
From 2016 to 2020, I was a Rudolf Mößbauer Tenure Track Assistant Professor at TUM and a Fellow at the TUM Institute for Advanced Study (TUM IAS).
From 2013 to 2016, I was a Postdoctoral Researcher at the Computer Science Department of the Technion---Israel Institute of Technology in the group of Tuvi Etzion, Ronny Roth, and Eitan Yaakobi.
From 2009 to 2013, I was a PhD student and teaching assistant under the co-supervision of Martin Bossert at the Institute of Communications Engineering, Ulm University, Germany, and Pierre Loidreau at the Institut de Recherche Mathématique de Rennes (IRMAR), Université de Rennes 1, Rennes, France.
My main research interests are coding theory, post-quantum cryptography (code- and lattice-based), efficient algorithms, security, privacy, machine learning, and applying error-correcting codes to communications, security, and storage in general, in particular to coded computing, DNA storage, network coding, non-volatile memories, distributed data storage, machine learning, and physical unclonable functions.
Selected Grants and Awards
- Johann-Philipp-Reis Award 2023
- EiC Pathfinder Challenge DNA-based digital data storage: Project DiDaX, 2023--2027
- ANR-DFG project "CROWD: Cryptography with Skew Codes", 2023--2025
- DFG Project "Coded Distributed Computation with Application to Machine Learning", 2021--2024
- TUM-ICL Joint Project COALESCENCE on Coded Computing, 2021--2025
- ERC Starting Grant (ERC Press Release | TUM Press Release), 2019--2024
- DFG Project on Post-Quantum Cryptography, 2019--2022
- NVMW Memorable Paper Award 2019
- DFG Heinz Maier-Leibnitz-Preis 2018, (DFG Press Release | TUM Press Release)
- DFG Emmy Noether Program , 2016--2021
- Marie Skłodowska-Curie Individual Fellowship, Horizon 2020, European Commission, 2015--2016
- Minerva Postdoctoral Fellowship, 2013--2015
- Dissertation Award of "Ulmer Universitätsgesellschaft" , 2013
- 2nd Prix de Thèse, Édition 2013, Fondation Rennes 1, 2013
(Co-)Organized Workshops
- ISIT2024 Satellite Workshop: Coding Theory and Algorithms for DNA-based Data Storage
- Munich Workshop on Coding and Cryptography 2024 (MWCC 2024)
- Munich Workshop on Coding and Cryptography 2022 (MWCC 2022)
- International Workshop on Code-Based Cryptography (CBCrypto) 2021
- Munich Workshop on Coding and Cryptography 2019 (MWCC 2019)
- Dagstuhl Seminar 18511 - Algebraic Coding Theory for Networks, Storage, and Security 2018
- Munich Workshop on Coding and Cryptography 2018 (MWCC 2018)
- Munich Workshop on Coding and Applications 2017 (MWCA 2017)
Editorship
- Associate Editor for IEEE Transactions on Information Theory (since April 2021)
Lectures
- Nachrichtentechnik (Mandatory module for Bachelor students), summer term since 2020
- Nachrichtentechnik 2 (Elective module for Bachelor students), winter term 2023/24
- Channel Coding (Core module for Master students), winter term since 2016/17 and summer term since 2020
- Coding Theory for Storage and Networks (Elective module for Master students), summer term 2017-2019
- Security in Communications and Storage (Elective module for Master students), winter term since 2017/18
- Seminar Coding and Cryptography, summer and winter term, since 2020
Administration of Teaching
- MSCE Program Director, TUM-EI, since 10/2020
- Kernbereichsbeauftragte "Communications Engineering and Signal Processing“ (Master EI Program), TUM-EI, since 10/2020
- Member of Examination Board for Master’s degrees, TUM-EI, since 09/2018
Supervision of PhD Students
Current PhD students:
- Gökberk Erdogan, Post-quantum cryptography, since 08/2024
- Emma Munisamy, Post-quantum cryptography, since 07/2024
- Frederik Walter, DNA storage, since 08/2023
- Stefan Ritterhoff, Post-quantum signature schemes, since 04/2023
- Anmoal Porwal, Post-quantum cryptography, since 10/2022
- Sebastian Bitzer, Post-quantum cryptography, since 04/2022
- Maximilian Egger, Coded computation & machine learning, since 01/2022
- Paraskevi (Vivian) Papadopoulou (with ICL), Coded computation & machine learning, since 10/2021
- Christoph Hofmeister, Coded computation, since 10/2021
- Hugo Sauerbier Couvée, Code-based cryptography, since 10/2021
- Luis Maßny, Coded computing for 6G, since 09/2021
- Anna Baumeister (with Munich Aerospace and DLR), Post-quantum cryptography, since 06/2021
- Anisha Banerjee, Coding for DNA and polymer storage, since 04/2021
- Marvin Xhemrishi, Coded computation, since 01/2020
- Thomas Jerkovits (with DLR), Post-quantum cryptography and coding theory
- Lorenz Welter, Insertions/deletions & DNA storage, since 03/2019
- Georg Maringer, Post-quantum cryptography & Feedback channels, since 12/2018
Former PhD students:
- Hedongliang Liu, Coding for storage, 03/2019-06/2024, dissertation "Channel Coding based on Skew Polynomials and Multivariate Polynomials" defended 07/2024.
- Sabine Pircher (partially external with Hensoldt Cyber), Implementation aspects of post-quantum cryptography, 02/2020--03/2023, dissertation "Attacking and Optimizing Code-Based Post-Quantum Cryptosystems" defended 02/2024.
- Haider Al Kim, Coding for memories, 10/2018--12/2023, dissertation "Coding and Bounds for Unreliable Data Storage Memories," defended 11/2023.
- Andreas Lenz, Insertions/deletions & Coding for DNA storage, 12/2016--09/2022, dissertation "Channel Codes for Reliable and Efficient Data Storage in Modern Memories," defended 05/2022.
- Julian Renner, Code-based cryptography & Rank-metric codes, 11/2017--08/2022, dissertation "Post-Quantum Cryptography in the Hamming Metric, the Rank Metric, and the Sum-Rank Metric," defended 04/2022.
- Lukas Holzbaur, Coding for distributed data storage & Private information retrieval, 03/2017--03/2022, dissertation "Data Integrity and Privacy in Distributed Storage," defended 10/2021.
Postdocs in my Group
Current Postdocs:
- Jessica Bariffi, since 07/2024
- Yonatan Yehezkeally, since 10/2020, Humboldt Fellowship
Former Postdocs:
- Violetta Weger, 09/2021--07/2024, SNF Fellowship, EuroTech Fellowship
- Rawad Bitar, 02/2020 (habilitation candidate since 2021)--11/2023
- Serge Kas Hanna, 10/2020--08/2022
- Nikita Polianskii, 11/2019--09/2021
- Sven Puchinger, 05/2018--09/2019 and 02/2021--08/2021
- Alessandro Neri, 01/2020--02/2021, SNF Fellowship
- Ragnar Freij-Hollanti, 11/2017--08/2018
Post-Quantum Cryptography
The recent developments of a quantum supercomputers has motivated research on post-quantum cryptography. Assuming an attack of a sufficiently large quantum computer, several classical public-key algorithms as RSA and elliptic curve cryptography become insecure since computationally intensive mathematical problems become easy-to-solve. It is therefore necessary to design techniques which are secure against an attack of a quantum computer. One approach to achieve this security is code-based cryptography, where encryption and decryption is based on encoding and decoding an algebraic code; another one is based on hard problems in lattices. We investigate and improve post-quantum cryptographic schemes.
- FuLeeca: A Lee-based Signature Scheme
- Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem
- LowMS: a new Rank-Metric Code-Based KEM without ideal structure
- Information Set Decoding with Hints
- Information- and Coding-Theoretic Analysis of the RLWE Channel
- A Power Side-Channel Attack on the CCA2-Secure HQC KEM and on the Reed-Muller Reed-Solomon Version of HQC
- LIGA: A Cryptosystem Based on the Hardness of Rank-Metric List and Interleaved Decoding
- Interleaving Loidreau's Rank-Metric Cryptosystem
- Randomized Decoding of Gabidulin Codes Beyond the Unique Decoding Radius
- A Cryptosystem based on Interleaved Goppa Codes
- Twisted Gabidulin Codes in the McEliece System
Coding for Insertions/Deletions and DNA Storage
The Levenshtein distance, also known as the edit distance, is a measure of similarity between two strings evaluated based on the minimum number of insertion/deletion operations required to transform one string into the other. Codes for correcting insertions and deletions were first proposed for communication applications in the presence of synchronization or sampling errors. However, insertions, deletions, and duplications have particular importance also for numerous applications in bioinformatics such as DNA storage. DNA storage is recently attracting attention as a dense and robust concept for archival storage. The data is written on DNA strands by synthesis and read by DNA sequencing. DNA storage has to cope with sequence losses, loss of ordering of the sequences, and symbol errors such as insertions, deletions and subtitutions.
- Sequential Decoding of Multiple Sequences for Synchronization Errors
- Insertion and Deletion Correction in Polymer-based Data Storage
- Concatenated Codes for Multiple Reads of a DNA Sequence and Index-Based Concatenated Codes for the Multi-Draw DNA Storage Channel
- Coding for Efficient DNA Synthesis
- Criss-Cross Deletion Correcting Codes
- Single-Deletion Single-Substitution Correcting Codes
- Capacity of the DNA Storage Channel and The Noisy Drawing Channel: Reliable Data Storage in DNA Sequences
- Coding over Sets for DNA Storage
- Clustering-Correcting Codes
- Duplication-Correcting Codes
- List Decoding of Insertions and Deletions
- Codes Correcting a Burst of Deletions or Insertions
(Private) Coded Computing and Machine Learning
We investigate how distributed computations of machine learning algorithms such as matrix multiplication can be done while guaranteeing privacy constraints and while coping with slow or failing devices.
- Secure Over-The-Air Computation Using Zero-Forced Artificial Noise
- Computational Code-Based Privacy in Coded Federated Learning
- Distributed Matrix-Vector Multiplication with Sparsity and Privacy Guarantees
- Efficient Distributed Machine Learning via Combinatorial Multi-Armed Bandits
- Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound
- Function-Correcting Codes
- Rateless Codes for Private Distributed Matrix-Matrix Multiplication
Coding for Storage
Data storage media like flash memories (used in USB flash drives or solid state drives) suffer from manufacturing imperfections, wearout, and fluctuating read/write errors. In distributed data storage (necessary for cloud storage systems), the most common problem are failures of servers and the task is to reconstruct the lost data efficiently. It is therefore necessary to design coding solutions tailored to these storage applications.
- Clay and Product-Matrix MSR Codes with Locality
- Correctable Erasure Patterns in Product Topologies
- Secrecy and Accessibility in Distributed Storage
- Partial MDS Codes with Local Regeneration
- List Decoding of Locally Repairable Codes
- Codes for Partially Stuck-at Memory Cells and Coding and Bounds for Partially Defective Memory Cells
- Masking Trapped Charge in Flash Memories
- Erasure List Decoding of Locally Repairable Codes
Network Coding and Rank-Metric Codes
The principle of network coding has been attracting growing attention in the recent years as a technique to disseminate information in data networks. The reason for this interest is that network coding achieves higher throughput than routing. In routing, the packets are simply forwarded at each node of the network, whereas in network coding, the nodes perform linear combinations of all packets received so far. Fundamental questions in the area of network coding include assigning appropriate linear combinations to the nodes and choosing a suitable error-correcting code for the case when erroneous packets occur or packets are lost. Rank-metric codes are thereby of relevance, not only for network coding but also for space time codes and code-based cryptography.
- Linearized Reed-Solomon Codes with Support-Constraint Generator Matrix
- Sum-rank Product Codes and Bounds on the Minimum Distance
- Efficient Decoding of Gabidulin Codes over Galois Rings
- Decoding of Space-Symmetric Rank Errors
- Low-Rank Parity-Check Codes over the Ring of Integers Modulo a Prime Power
- Randomized Decoding of Gabidulin Codes Beyond the Unique Decoding Radius
- Scalar and Vector Solutions of Generalized Combination Networks
- Vector Network Coding Outperforms Scalar Linear Network Coding
- Optimal Ferrers Diagram Rank-Metric Codes
- Convolutional Codes in Rank Metric with Application to Random Network Coding
- Decoding High-Order Interleaved Rank-Metric Codes
List Decoding
List decoding is a major technique for increasing the error correcting capability of codes. The basic idea of list decoding is to return not only a unique decoding result (which is only possible up to half the minimum distance of the corresponding code), but to return all codewords in a certain radius around the received word. This enables us to decode more errors at the cost of a usually small list. Practically, list decoding is used in concatenated coding schemes. Apart from explicit list decoding algorithms, a fundamental question is whether list decoding in a certain metric up to a certain radius can be done in polynomial time.
- List Decoding of 2-Interleaved Binary Alternant Codes
- List Decoding of Locally Repairable Codes
- List Decoding of Insertions and Deletions
- List Decoding of Crisscross Errors
- Some Gabidulin Codes Cannot be List Decoded Efficiently at any Radius
- Bounds on List Decoding of Rank-Metric Codes
- Interpolation-Based Decoding of Interleaved Gabidulin Codes
- Efficient Interpolation-Based Decoding of Interleaved Subspace Codes
Private Information Retrieval
Private information retrieval (PIR) studies the problem when a user wants to retrieve a file from a storage system without revealing the identity of the file in question to the storage servers. Private information retrieval (PIR) studies the problem when a user wants to retrieve a file from a storage system without revealing the identity of the file in question to the storage servers. The files that are stored on the servers might be coded (e.g., to prevent server failures) and some servers might be communicating with each other. We investigate PIR schemes that guarantee either information-theoretic privacy or computational privacy.
- Computational Code-Based Single-Server Private Information Retrieval
- Private Information Retrieval over Networks
- Private Streaming with Convolutional Codes
Fast Algorithms
Fast or efficient algorithms for performing certain polynomial and matrix operations are important in several applications, including coding theory. Our studies include fast algorithms for decoding Gabidulin codes, including fast algorithms for performing certain operations with linearized polynomials.
- Fast Operations on Linearized Polynomials
- Sub-quadratic Decoding of Gabidulin Codes
- A Fast Linearized Euclidean Algorithm
- Fast Multi-Sequence Shift-Register Synthesis with the Euclidean Algorithm
Physical Unclonable Functions
A Physical Unclonable Function (PUF) is a digital circuit that possesses an intrinsic randomness resulting from process variations. This randomness is exploited to generate random keys for cryptographic applications which can be reproduced on demand. Thus, no embedded physically secure non-volatile memory is needed. However, the regeneration of a key is not perfect due to environmental factors such as temperature variations and aging effects of the digital circuit. These variations can be seen as an erroneous channel and therefore error-correcting codes increase the reliability of key regenerations.
- Analysis of Communication Channels Related to Physical Unclonable Functions
- Timing Attack Resilient Decoding Algorithms for Physical Unclonable Functions
- Variable-Length Bit Mapping and Error-Correcting Codes for Higher-Order Alphabet PUFs
Coding for Communications, Reed--Solomon Codes, Cyclic Codes
In communications, error-correcting codes are an indispensable means to cope with errors which happen during the transmission. This includes classical error-correcting codes like Reed--Solomon and BCH codes, but also e.g., staircase codes which are used in optical communication systems.
- Quadratic-Curve-Lifted Reed-Solomon Codes
- Decoding of (Interleaved) Generalized Goppa Codes
- Improved Decoding of Staircase Codes for FEC in Optical Communications
- Decoding Interleaved Reed-Solomon Codes
- Unambiguous Decoding of Reed-Solomon Codes beyond Half the Minimum Distance
- Generalizing Bounds on the Minimum Distance of Cyclic Codes
- Decoding Cyclic Codes up to a New Bound on the Minimum Distance
Convolutional Codes
- Sequential Decoding of Convolutional Codes for Synchronization Errors
- Concatenated Codes for Recovery From Multiple Reads of DNA Sequences
- Private Streaming with Convolutional Codes
- Convolutional Codes in Rank Metric with Application to Random Network Coding
- On (Partial) Unit Memory Codes Based on Gabidulin Codes
- Decoding of Partial Unit Memory Codes of Arbitrary Rate
Publications
Journal Publications
[55] M. Xhemrishi, J. Ostman, A. Wachter-Zeh, and A. Graell i Amat, “FedGT: Identification of Malicious Clients in Federated Learning with Secure Aggregation,” (submitted to) IEEE Transactions on Information Forensics and Security, 2024.
[54] L. Welter, R. Sokolovskii, T. Heinis, A. Wachter-Zeh, E. Rosnes, and A. Graell i Amat, “An End-to-End Coding Scheme for DNA-Based Data Storage With Nanopore-Sequenced Reads,” (submitted to) IEEE Transactions on Information Theory, 2024.
[53] M. Egger, R. Bitar, A. Wachter-Zeh, and D. Gunduz, “Cost-Efficient Distributed Learning via Combinatorial Multi-Armed Bandits,” (submitted to) IEEE Transactions on Information Theory, 2024.
[52] M. Egger, C. Hofmeister, A. Wachter-Zeh, and R. Bitar, “Private Aggregation in Hierarchical Wireless Federated Learning with Partial and Full Collusion,” (submitted to) IEEE Transactions on Information Theory, 2024.
[51] M. Egger, R. Bitar, A. Wachter-Zeh, D. Gunduz, and N. Weinberger, “Maximal-Capacity Discrete Memoryless Channel Identification,” (in revision for) IEEE Transactions on Information Theory, 2024.
[50] H. Liu, H. Wei, A. Wachter-Zeh, and M. Schwartz, “Linearized Reed-Solomon Codes with Support-Constrained Generator Matrix and Applications in Multi-Source Network Coding,” (in revision for) IEEE Transactions on Information Theory, 2023.
[49] A. Banerjee, A. Lenz, and A. Wachter-Zeh, “Sequential Decoding of Multiple Sequences for Synchronization Errors,” (accepted for) IEEE Transactions on Communications, 2024.
[48] A. Banerjee, Y. Yehezkeally, A. Wachter-Zeh, and E. Yaakobi, “Error-Correcting Codes for Nanopore Sequencing,” IEEE Transactions on Information Theory, vol. 70, no. 7, pp. 4956–4967, 2024.
[47] R. Bitar, M. Egger, A. Wachter-Zeh, and M. Xhemrishi, “Sparsity and Privacy in Secret Sharing: A Fundamental Trade-Off,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 5136–5150, 2024.
[46] I. Smagloy, L. Welter, A. Wachter-Zeh, and E. Yaakobi, “Single-Deletion Single-Substitution Correcting Codes,” IEEE Transactions on Information Theory, vol. 69, no. 12, pp. 7659–7671, 2023.
[45] N. Aragon, V. Dyseryn, P. Gaborit, P. Loidreau, J. Renner, and A. Wachter-Zeh, “LowMS: a new rank metric code-based KEM without ideal structure,” Designs, Codes, and Crytopgraphy, vol. 92, pp. 1075–1093, 2023.
[44] H. Al Kim, S. Puchinger, L. Tolhuizen, and A. Wachter-Zeh, “Coding and Bounds for Partially Defective Memory Cells,” Designs, Codes, and Cryptography, vol. 91, pp. 4019–4058, 2023.
[43] A. Lenz, R. Bitar, A. Wachter-Zeh, and E. Yaakobi, “Function-Correcting Codes,” IEEE Transactions on Information Theory, vol. 69, no. 9, pp. 5604–5618, 2023.
[42] A. Banerjee, A. Wachter-Zeh, and E. Yaakobi, “Insertion and Deletion Correction in Polymer-based Data Storage,” IEEE Transactions on Information Theory, vol. 69, no. 7, pp. 4384–4406, 2023.
[41] A. Lenz, P. Siegel, A. Wachter-Zeh, and E. Yaakobi, “The Noisy Drawing Channel: Reliable Data Storage in DNA Sequences,” IEEE Transactions on Information Theory, vol. 69, no. 5, pp. 2757–2778, 2023.
[40] M. Gao, L. Holzbaur, and A. Wachter-Zeh, “Clay and Product-Matrix MSR Codes with Locality,” Advances in Mathematics of Communications, 2023.
[39] G. Maringer, S. Puchinger, and A. Wachter-Zeh, “Information- and Coding-Theoretic Analysis of the RLWE Channel,” IEEE Transactions on Information Forensics and Security, vol. 18, 2023.
[38] I. Maarouf, A. Lenz, L. Welter, A. Wachter-Zeh, E. Rosnes, and A. Graell i Amat, “Concatenated Codes for Multiple Reads of a DNA Sequence,” IEEE Transactions on Information Theory, vol. 69, no. 2, pp. 910–927, 2023.
[37] C. Hofmeister, R. Bitar, M. Xhemrishi, and A. Wachter-Zeh, “Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound,” IEEE Journal on Selected Areas in Information Theory (JSAIT), vol. 3, no. 2, pp. 275–285, 2022.
[36] L. Welter, R. Bitar, A. Wachter-Zeh, and E. Yaakobi, “Multiple Criss-Cross Deletion-Correcting Codes,” IEEE Transactions on Information Theory, vol. 68, no. 6, pp. 3767–3779, 2022.
[35] G. Alfarano, F. J. Lobillo, A. Neri, and A. Wachter-Zeh, “Sum-Rank Product Codes and Bounds on the Minimum Distance,” Finite Fields and Their Applications, vol. 80, Jun. 2022.
[34] R. Bitar, M. Xhemrishi, and A. Wachter-Zeh, “Adaptive Private Distributed Matrix Multiplication,” IEEE Transactions on Information Theory, vol. 68, no. 4, pp. 2653–2673, 2022.
[33] T. Shinkar, E. Yaakobi, A. Lenz, and A. Wachter-Zeh, “Clustering-Correcting Codes,” IEEE Trans. Inform. Theory, vol. 68, no. 3, pp. 1560–1580, 2022.
[32] L. Holzbaur, S. Kruglik, A. Frolov, and A. Wachter-Zeh, “Secure codes with accessibility for distributed storage,” IEEE Transactions on Information Forensics and Security, vol. 16, pp. 5326–5337, 2021.
[31] L. Holzbaur, H. Liu, A. Neri, S. Puchinger, J. Rosenkilde, V. Sidorenko, and A. Wachter-Zeh, “Decoding of Interleaved Alternant Codes,” IEEE Trans. Inform. Theory, vol. 67, no. 12, pp. 8016–8033, 2021.
[30] R. Bitar, L. Welter, I. Smagloy, A. Wachter-Zeh, and E. Yaakobi, “Criss-Cross Insertion and Deletion Correcting Codes,” IEEE Trans. Inform. Theory, vol. 67, no. 12, pp. 7999–8015, 2021.
[29] L. Holzbaur, S. Puchinger, E. Yaakobi, and A. Wachter-Zeh, “Partial MDS Codes with Regeneration,” IEEE Trans. Inform. Theory, vol. 67, no. 10, pp. 6425–6441, 2021.
[28] H. Liu, N. Polianskii, I. Vorobyev, and A. Wachter-Zeh, “Almost Affinely Disjoint Subspaces,” Finite Fields and Their Applications, vol. 75, p. 101879, 2021.
[27] H. Liu, H. Wei, S. Puchinger, A. Wachter-Zeh, and M. Schwartz, “On the Gap between Scalar and Vector Solutions of Generalized Combination Networks,” IEEE Trans. Inform. Theory, vol. 67, no. 8, pp. 5580–5591, 2021.
[26] J. Renner, S. Puchinger, and A. Wachter-Zeh, “LIGA: A Cryptosystem Based on the Hardness of Rank-Metric List and Interleaved Decoding,” Designs, Codes, and Cryptography, vol. 89, p. 1279–1319, 2021.
[25] L. Holzbaur, S. Puchinger, and A. Wachter-Zeh, “Error Decoding of Locally Repairable and Partial MDS Codes,” IEEE Trans. Inform. Theory, vol.67, no. 3, pp. 1571--1595, 2021.
[24] H. Cai, J. Chrisnata, T. Etzion, M. Schwartz, and A. Wachter-Zeh, “Network-Coding Solutions for Minimal Combination Networks and Their Subnetworks,” IEEE Trans. Inform. Theory, vol. 66, no. 11, pp. 6786–6798, 2020.
[23] A. Lenz, P. Siegel, A. Wachter-Zeh, and E. Yaakobi, “Coding over Sets for DNA Storage,” IEEE Trans. Inform. Theory, vol. 66, no. 4, pp. 2331–2351, Apr. 2020.
[22] L. Holzbaur, R. Freij-Hollanti, A. Wachter-Zeh, and C. Hollanti, “Private Streaming with Convolutional Codes,” IEEE Trans. Inform. Theory, vol. 66, no. 4, pp. 2331–2351, Apr. 2020.
[21] R. Tajeddine, A. Wachter-Zeh, and C. Hollanti, “Private Information Retrieval over Random Linear Networks,” IEEE Trans. on Information Forensics and Security, vol. 15, pp. 790--799, Jul. 2019.
[20] V. Immler, M. Hiller, L. Qinzhi, A. Lenz, and A. Wachter-Zeh, “Variable-Length Bit Mapping and Error- Correcting Codes for Higher-Order Alphabet PUFs,” Journal of Hardware and Systems Security, vol. 3, pp. 78–93, Mar. 2019.
[19] L. Holzbaur, H. Bartz, and A. Wachter-Zeh, “Improved Decoding and Error Floor Analysis of Staircase Codes,” Designs, Codes and Cryptography, vol. 2-3, Jan. 2019.
[18] A. Lenz, A. Wachter-Zeh, and E. Yaakobi, “Duplication-Correcting Codes,” Designs, Codes and Cryptogra- phy, vol. 2-3, Jan. 2019.
[17] H. Bartz and A. Wachter-Zeh, “Efficient List Decoding of Interleaved Subspace and Gabidulin Codes Using Gröbner Bases,” Advances in Mathematics of Communications, vol. 12, no. 4, pp. 773–804, Nov. 2018.
[16] S. Puchinger and A. Wachter-Zeh, “Fast Operations on Linearized Polynomials and their Applications in Coding Theory,” Journal of Symbolic Computation, vol. 89, pp. 194–215, Nov. 2018.
[15] A. Wachter-Zeh, “List Decoding of Insertions and Deletions,” IEEE Trans. Inform. Theory, vol. 64, no. 9, pp. 6297–6304, Sep. 2018.
[14] T. Etzion and A. Wachter-Zeh, “Vector Network Coding based on Subspace Codes Outperforms Scalar Linear Network Coding,” IEEE Trans. Inform. Theory, vol. 64, no. 4, pp. 2460–2473, Apr. 2018.
[13] C. Schoeny, A. Wachter-Zeh, R. Gabrys, and E. Yaakobi, “Codes Correcting a Burst of Deletions or Insertions,” IEEE Trans. Inform. Theory, vol. 63, no. 4, pp. 1971–1985, Apr. 2017.
[12] A. Wachter-Zeh, “List Decoding of Crisscross Errors,” IEEE Trans. Inform. Theory, vol. 63, no. 1, pp. 142–149, Jan. 2017.
[11] N. Raviv and A. Wachter-Zeh, “Some Gabidulin Codes Cannot be List Decoded Efficiently at any Radius,” IEEE Trans. Inform. Theory, vol. 62, no. 4, pp. 1605–1615, Apr. 2016.
[10] T. Etzion, E. Gorla, A. Ravagnani, and A. Wachter-Zeh, “Optimal Ferrers Diagram Rank-Metric Codes,” IEEE Trans. Inform. Theory, vol. 62, no. 4, pp. 1616–1630, Apr. 2016. 1/6
[9] A. Wachter-Zeh and E. Yaakobi, “Codes for Partially Stuck-at Memory Cells,” IEEE Trans. Inform. Theory, vol. 62, no. 2, pp. 639–654, Feb. 2016.
[8] A. Wachter-Zeh, M. Stinner, and V. Sidorenko, “Convolutional Codes in Rank Metric with Application to Random Network Coding,” IEEE Trans. Inform. Theory, vol. 61, no. 6, pp. 3199–3213, Jun. 2015.
[7] A. Wachter-Zeh and A. Zeh, “List and Unique Error-Erasure Decoding of Interleaved Gabidulin Codes with Interpolation Techniques,” Des. Codes Cryptogr., vol. 73, no. 2, pp. 547–570, 2014.
[6] A. Wachter-Zeh, A. Zeh, and M. Bossert, “Decoding Interleaved Reed–Solomon Codes beyond their Joint Error-Correcting Capability,” Des. Codes Cryptogr., vol. 71, no. 2, pp. 261–281, Jul. 2014.
[5] A. Wachter-Zeh, “Bounds on List Decoding of Rank-Metric Codes,” IEEE Trans. Inform. Theory, vol. 59, no. 11, pp. 7268–7277, Nov. 2013.
[4] A. Wachter-Zeh, V. Afanassiev, and V. Sidorenko, “Fast Decoding of Gabidulin Codes,” Des. Codes Cryptogr., vol. 66, no. 1, pp. 57–73, Jan. 2013.
[3] A. Zeh, A. Wachter-Zeh, and S. Bezzateev, “Decoding Cyclic Codes up to a New Bound on the Minimum Distance,” IEEE Trans. Inform. Theory, vol. 58, no. 6, pp. 3951–3960, Jun. 2012.
[2] A. Zeh and A. Wachter, “Fast Multi-Sequence Shift-Register Synthesis with the Euclidean Algorithm,” Adv. Math. Commun., vol. 5, no. 4, pp. 667–680, Nov. 2011.
[1] A. Wachter, V. Sidorenko, M. Bossert, and V. Zyablov, “On (Partial) Unit Memory Codes Based on Gabidulin Codes,” Probl. Inf. Transm., vol. 47, no. 2, pp. 38–51, Jun. 2011.
Conference Publications
[124] A. Banerjee, L. Welter, A. Graell i Amat, A. Wachter-Zeh, and E. Rosnes, “Sequential Decoding of Multiple Traces Over the Syndrome Trellis for Synchronization Errors,” in (submitted to) IEEE International Conference on Acoustics, Speech and Signal Processing, Sep. 2025.
[123] M. Egger, G. Ayache, S. El Rouayheb, A. Wachter-Zeh, and R. Bitar, “Self-Duplicating Random Walks for Resilient Decentralized Learning on Graphs,” in IEEE Global Communications Conference, Dec. 2024.
[122] M. Egger, C. Hofmeister, C. Kaya, R. Bitar, and A. Wachter-Zeh, “Scalable and Reliable Over-the-Air Federated Edge Learning,” in IEEE Global Communications Conference, Dec. 2024.
[121] V. Papadopoulou, V. A. Rameshwar, and A. Wachter-Zeh, “How Many Noisy Copies of a Sequence are Needed on Average for Exact Reconstruction?” in IEEE Information Theory Workshop (ITW), Nov. 2024.
[120] G. Maringer and A. Wachter-Zeh, “Reducing Ciphertext and Key Sizes for MLWE-Based Cryptosystems,” in IEEE Information Theory Workshop (ITW), Nov. 2024.
[119] M. Egger, R. Bitar, A. Wachter-Zeh, D. Gündüz, and N. Weinberger, “Capacity-Maximizing Input Symbol Selection for Discrete Memoryless Channels,” in IEEE International Symposium on Information Theory, Jul. 2024.
[118] F. Walter, O. Sabary, A. Wachter-Zeh, and E. Yaakobi, “Coding for Composite DNA to Correct Substitutions, Strand Losses, and Deletions,” in IEEE International Symposium on Information Theory, Jul. 2024.
[117] A. Banerjee, Y. Yehezkeally, A. Wachter-Zeh, and E. Yaakobi, “Correcting a Single Deletion in Reads from a Nanopore Sequencer,” in IEEE International Symposium on Information Theory, Jul. 2024.
[116] S. Bitzer, J. Delvaux, E. Kirshanova, S. Maaßen, A. May, and A. Wachter-Zeh, “How to Lose Some Weight - A Practical Template Syndrome Decoding Attack,” in Workshop on Coding and Cryptography (WCC), Jun. 2024.
[115] A. Porwal, A. Baumeister, V. Weger, A. Wachter-Zeh, and P. Loidreau, “Code-Based Cryptography based on Errors of Large Weight,” in CBCRYPTO, May 2024.
[114] H. Sauerbier Couvée, A. Ravagnani, A. Wachter-Zeh, and V. Weger, “Asymptotic Cost Comparison of Generic Rank Decoders,” in CBCRYPTO, May 2024.
[113] M. Baldi, S. Bitzer, A. Pavoni, P. Santini, A. Wachter-Zeh, and V. Weger, “Post-Quantum Digital Signatures from the Restricted Syndrome Decoding Problem,” in Italian Conference on Cybersecurity (ITASEC), Apr. 2024.
[112] M. Baldi, S. Bitzer, A. Pavoni, P. Santini, A. Wachter-Zeh, and V. Weger, “Zero Knowledge Protocols and Signatures from the Restricted Syndrome Decoding Problem,” in Public-Key Cryptography (PKC), Apr. 2024.
[111] W. Li, A. Wachter-Zeh, and V. Sidorenko, “Interleaving of Polymorphic Gabidulin Codes,” in REDUNDANCY 2023, Oct. 2023.
[110] M. Egger, M. Xhemrishi, A. Wachter-Zeh, and R. Bitar, “Sparse and Private Distributed Matrix Multiplication with Straggler Tolerance,” in IEEE International Symposium on Information Theory, Jun. 2023.
[109] S. Bitzer, A. Pavoni, V. Weger, P. Santini, M. Baldi, and A. Wachter-Zeh, “Generic Decoding of Restricted Errors,” in IEEE International Symposium on Information Theory, Jun. 2023.
[108] T. Jerkovits, H. Bartz, and A. Wachter-Zeh, “Randomized Decoding of Linearized Reed-Solomon Codes Beyond the Unique Decoding Radius,” in IEEE International Symposium on Information Theory, Jun. 2023.
[107] M. Egger, C. Hofmeister, A. Wachter-Zeh, and R. Bitar, “Private Aggregation in Wireless Federated Learning with Heterogeneous Clusters,” in IEEE International Symposium on Information Theory, Jun. 2023.
[106] M. Egger, R. Bitar, A. Wachter-Zeh, D. Gündüz, and N. Weinberger, “Maximal-Capacity Discrete Memoryless Channel Identification,” in IEEE International Symposium on Information Theory, Jun. 2023.
[105] A. Banerjee, Y. Yehezkeally, A. Wachter-Zeh, and E. Yaakobi, “Error-Correcting Codes for Nanopore Sequencing,” in IEEE International Symposium on Information Theory, Jun. 2023.
[104] S. Kas Hanna, Z. Tan, W. Xu, and A. Wachter-Zeh, “Codes Correcting Burst and Isolated Erasures for Reliable and Low-Latency Communication,” in International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Jun. 2023.
[103] S. Ritterhoff, G. Maringer, S. Bitzer, V. Weger, P. Karl, T. Schamberger, J. Schupp, and A. Wachter-Zeh, “FuLeeca: A Lee-based Signature Scheme,” in CBCRYPTO 2023, Apr. 2023.
[102] M. Baldi, S. Bitzer, A. Pavoni, P. Santini, A. Wachter-Zeh, and V. Weger, “Generic Decoding of Restricted Errors,” in CBCRYPTO 2023, Apr. 2023.
[101] A. Baumeister, H. Bartz, and A. Wachter-Zeh, “An Analysis of the RankSign Signature Scheme with Rank Amplifiers,” in CBCRYPTO 2023, Apr. 2023.
[100] M. Baldi, S. Bitzer, A. Pavoni, P. Santini, A. Wachter-Zeh, and V. Weger, “Signature Scheme from Restricted Errors,” in CBCRYPTO 2023, Apr. 2023.
[99] L. Welter, I. Maarouf, A. Lenz, A. Wachter-Zeh, E. Rosnes, and A. Graell i Amat, “Index-Based Concatenated Codes for the Multi-Draw DNA Storage Channel,” in IEEE Information Theory Workshop, Apr. 2023.
[98] H. Liu, H. Wei, A. Wachter-Zeh, and M. Schwartz, “Linearized Reed-Solomon Codes With Support-Constrained Generator Matrix,” in IEEE Information Theory Workshop, Apr. 2023.
[97] L. Maßny and A. Wachter-Zeh, “Secure Over-The-Air Computation Using Zero-Forced Artificial Noise,” in IEEE Information Theory Workshop, Apr. 2023.
[96] Y. Yehezkeally, H. Al Kim, S. Puchinger, and A. Wachter-Zeh, “Bounds on Mixed Codes With Finite Alphabets,” in IEEE Information Theory Workshop, Apr. 2023.
[95] S. Bitzer, J. Renner, A. Wachter-Zeh, and V. Weger, “Generic Decoding in the Cover Metric,” in IEEE Information Theory Workshop, Apr. 2023.
[94] C. Ott, H. Liu, and A. Wachter-Zeh, “Geometrical Properties Of Balls in Sum-Rank Metric,” in International ITG 26th Workshop on Smart Antennas and 13th Conference on Systems, Communications, and Coding, Mar. 2023.
[93] C. Ott, H. Liu, and A. Wachter-Zeh, “Covering Properties of Sum-Rank Metric Codes,” in Annual Allerton Conference on Communication, Control, and Computing, Sep. 2022.
[92] A. Banerjee, A. Lenz, and A. Wachter-Zeh, “Sequential Decoding of Convolutional Codes for Synchronization Errors,” in IEEE Information Theory Workshop, Nov. 2022.
[91] A. Porwal, L. Holzbaur, H. Liu, J. Renner, A. Wachter-Zeh, and V. Weger, “Interleaved Prange: A New Generic Decoder for Interleaved Codes,” in PQCRYPTO 2022, Sep. 2022.
[90] T. Schamberger, L. Holzbaur, J. Renner, A. Wachter-Zeh, and G. Sigl, “A Proven Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem,” in PQCRYPTO 2022, Sep. 2022.
[89] T. Schamberger, L. Holzbaur, J. Renner, A. Wachter-Zeh, and G. Sigl, “A Power Side-Channel Attack on the Reed-Muller Reed-Solomon Version of the HQC Cryptosystem,” CBCRYPTO 2022, May 2022,Trondheim, Norway.
[88] S. Pircher, J. Geier, D. Mueller-Gritschneder, and A. Wachter-Zeh, “Key-Recovery Fault Injection Attack on Classic McEliece KEM,” CBCRYPTO 2022, May 2022, Trondheim, Norway.
[87] L. Holzbaur, H. Liu, A. Porwal, J. Renner, A. Wachter-Zeh, and V. Weger, “Generic Decoding of Interleaved Codes,” CBCRYPTO 2022, May 2022, Trondheim, Norway.
[86] C.-C. Huang, H. Liu, L. Holzbaur, S. Puchinger, and A. Wachter-Zeh, “List Decoding of 2-Interleaved Binary Alternant Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2022, Helsinki, Finland.
[85] L. Welter, E. Stylianou, R. Bitar, A. Wachter-Zeh, and E. Yaakobi, “Equivalence of Insertion/Deletion Correcting Codes for d-Dimensional Arrays,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2022, Helsinki, Finland.
[84] M. Xhemrishi, R. Bitar, and A. Wachter-Zeh, “Distributed Matrix-Vector Multiplication With Sparsity and Privacy Guarantees,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2022, Helsinki, Finland.
[83] M. Egger, R. Bitar, A. Wachter-Zeh, and D. Gunduz, “Efficient Distributed Machine Learning via Combinatorial Multi-Armed Bandits,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2022, Helsinki, Finland.
[82] A. Banerjee, A. Wachter-Zeh, and E. Yaakobi, “Insertion and Deletion Correction in Polymer-Based Data Storage,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2022, Helsinki, Finland.
[81] M. Xhemrishi, A. Graell i Amat, E. Rosnes, and A. Wachter-Zeh, “Computational Code-Based Privacy in Coded Federated Learning,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2022, Helsinki, Finland.
[80] A. Lenz, P. Siegel, A. Wachter-Zeh, and E. Yaakobi, “On the Capacity of DNA-based Data Storage under Substitution Errors,” in Non-Volantile Memories Workshop (NVMW), May 2022, San Diego, USA.
[79] H. Liu, L. Holzbaur, N. Polyanskii, and A. Wachter-Zeh, “Quadratic-Curve-Lifted Reed-Solomon Codes,” in International Workshop on Coding and Cryptography (WCC), Mar. 2022.
[78] C. Hofmeister, R. Bitar, M. Xhemrishi, and A. Wachter-Zeh, “Secure Private and Adaptive Matrix Multiplication Beyond the Singleton Bound,” in International Workshop on Coding and Cryptography (WCC), Mar. 2022.
[77] G. Maringer, M. Xhemrishi, S. Puchinger, K. Garb, H. Liu, T. Jerkovits, L. Kürzinger, M. Hiller, and A. Wachter-Zeh, “Analysis of Communication Channels Related to Physical Unclonable Functions,” in International Workshop on Coding and Cryptography (WCC), Mar. 2022.
[76] A. Lenz, P. H. Siegel, A. Wachter-Zeh, and E. Yaakobi, “On the Capacity of DNA-based Data Storage under Substitution Errors,” in 2021 International Conference on Visual Communications and Image Processing (VCIP), 2021.
[75] W. Li, V. Sidorenko, and A. Wachter-Zeh, “On Transform-Domain Decoding of Generalized Gabidulin Codes,” in REDUNDANCY, Oct. 2021.
[74] A.-L. Horlemann, S. Puchinger, J. Renner, T. Schamberger, and A. Wachter-Zeh, “Information-Set Decoding with Hints,” in CBCrypto, Jul. 2021.
[73] L. Welter, R. Bitar, A. Wachter-Zeh, and E. Yaakobi, “Multiple Criss-Cross Deletion-Correcting Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2021, Melbourne, Australia.
[72] A. Lenz, R. Bitar, A. Wachter-Zeh, and E. Yaakobi, “Function-Correcting Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2021, Melbourne, Australia.
[71] T. Jerkovits, V. Sidorenko, and A. Wachter-Zeh, “Decoding of Space-Symmetric Rank Errors,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2021, Melbourne, Australia.
[70] H. Liu, S. Pircher, A. Zeh, and A. Wachter-Zeh, “Decoding (Interleaved) Generalized Goppa Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2021, Melbourne, Australia.
[69] S. Puchinger, J. Renner, A. Wachter-Zeh, and J. Zumbrägel, “Efficient Decoding of Gabidulin Codes over Galois Rings,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2021, Melbourne, Australia.
[68] L. Holzbaur, S. Puchinger, E. Yaakobi, and A. Wachter-Zeh, “Correctable Erasure Patterns in Product Topologies,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2021, Melbourne, Australia.
[67] J. Renner, S. Puchinger, and A. Wachter-Zeh, “Decoding High-Order Interleaved Rank-Metric Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2021, Melbourne, Australia.
[66] A. Lenz, Y. Liu, C. Rashtchian, P. Siegel, A. Tan, A. Wachter-Zeh, and E. Yaakobi, “Codes for Cost-Efficient DNA Synthesis,” in Non-Volantile Memories Workshop (NVMW), Feb. 2021, San Diego, USA.
[65] L. Holzbaur, S. Puchinger, E. Yaakobi, and A. Wachter-Zeh, “Partial MDS Codes with Local Regeneration,” in Non-Volantile Memories Workshop (NVMW), Feb. 2021, San Diego, USA.
[64] H. Al Kim, S. Puchinger, and Wachter-Zeh, “Coding and Bounds for Partially Defect Memories,” in Non-Volantile Memories Workshop (NVMW), Feb. 2021, San Diego, USA.
[63] A. Lenz, I. Maarouf, L. Welter, A. Wachter-Zeh, E. Rosnes, and A. Graell i Amat, “Concatenated Codes for Recovery From Multiple Reads of DNA Sequences (Invited Paper),” in IEEE Information Theory Workshop, 2020.
[62] L. Holzbaur, H. Liu, A. Neri, S. Puchinger, J. Rosenkilde, V. Sidorenko, and A. Wachter-Zeh, “Success Probability of Decoding Interleaved Alternant Codes,” in IEEE Information Theory Workshop, 2020.
[61] G. Maringer, S. Puchinger, and A. Wachter-Zeh, “Higher Rates and Information-Theoretic Analysis for the RLWE Channel,” in IEEE Information Theory Workshop, 2020.
[60] T. Schamberger, J. Renner, A. Wachter-Zeh, and G. Sigl, “A Power Side-Channel Attack on the CCA2-Secure HQC KEM,” CARDIS 2020, Nov. 2020.
[59] J. Kunz, J. Renner, G. Maringer, T. Schamberger, and A. Wachter-Zeh, “On Software Implementations of Gabidulin Decoders,” International Workshop on Algebraic and Combinatorial Coding Theory (ACCT), Oct. 2020.
[58] H. Al Kim, S. Puchinger, and A. Wachter-Zeh, “Bounds and Code Constructions for Partially Defect Memory Cells,” International Workshop on Algebraic and Combinatorial Coding Theory (ACCT), Oct. 2020.
[57] R. Bitar, M. Xhemrishi, and A. Wachter-Zeh, “Rateless Codes for Private Distributed Matrix-Matrix Multiplication,” IEEE International Symposium on Information Theory and its Applications (ISITA), Oct. 2020, Hawaii, USA.
[56] R. Bitar, I. Smagloy, L. Welter, A. Wachter-Zeh, and E. Yaakobi, “Criss-Cross Deletion Correcting Codes,” IEEE International Symposium on Information Theory and its Applications (ISITA), Oct. 2020, Hawaii, USA.
[55] L. Holzbaur, S. Kruglik, A. Frolov, and A. Wachter-Zeh, “Secrecy and Accessibility in Distributed Storage,” IEEE Global Communications Conference (GLOBECOM), Dec. 2020, Taipei, Taiwan.
[54] L. Holzbaur, C. Hollanti, and A. Wachter-Zeh, “Computational Code-Based Single-Server Private Information Retrieval,” IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2020, Los Angeles, CA, USA.
[53] I. Smagloy, L. Welter, A. Wachter-Zeh, and E. Yaakobi, “Single-Deletion Single-Substitution Correcting Codes,” IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2020, Los Angeles, CA, USA.
[52] A. Lenz, Y. Liu, C. Rashtchian, P. Siegel, A. Wachter-Zeh, and E. Yaakobi, “Coding for Efficient DNA Synthesis,” IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2020, Los Angeles, CA, USA.
[51] H. Liu, H. Wei, S. Puchinger, A. Wachter-Zeh, and M. Schwartz, “On the Gap between Scalar and Vector Solutions of Generalized Combination Networks,” IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2020, Los Angeles, CA, USA.
[50] L. Holzbaur, S. Puchinger, E. Yaakobi, and A. Wachter-Zeh, “Partial MDS Codes with Local Regeneration,” IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2020, Los Angeles, CA, USA.
[49] J. Renner, S. Puchinger, A. Wachter-Zeh, C. Hollanti, and R. Freij-Hollanti, “Low-Rank Parity-Check Codes over the Ring of Integers Modulo a Prime Power,” IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2020, Los Angeles, CA, USA.
[48] J. Renner, T. Jerkovits, H. Bartz, S. Puchinger, P. Loidreau, and A. Wachter-Zeh, “Randomized Decoding of Gabidulin Codes Beyond the Unique Decoding Radius,” in International Conference on Post-Quantum Cryptography (PQCrypto), 2020, Paris, France.
[47] A. Lenz, P. Siegel, A. Wachter-Zeh, and E. Yaakobi, “Achieving the Capacity of the DNA Storage Channel (Invited Paper),” in International Conference on Acoustics, Speech, and Signal Processing (ICASSP), May 2020, Barcelona, Spain.
[46] H. Al Kim, S. Puchinger, and A. Wachter-Zeh, “Error Correction for Partially Stuck Memory Cells,” in International Symposium on Problems of Redundancy in Information and Control Systems 2019, Oct. 2019, Moscow, Russia.
[45] J. Renner, S. Puchinger, and A. Wachter-Zeh, “Interleaving Loidreau’s Rank-Metric Cryptosystem,” in International Symposium on Problems of Redundancy in Information and Control Systems 2019, Oct. 2019, Moscow, Russia.
[44] L. Holzbaur, S. Puchinger, and A. Wachter-Zeh, “On Error Decoding of Locally Repairable and Partial MDS Codes,” in IEEE Information Theory Workshop (ITW), Aug. 2019, Visby, Sweden.
[43] A. Lenz, P. Siegel, A. Wachter-Zeh, and E. Yaakobi, “An Upper Bound on the Capacity of the DNA Storage Channel,” in IEEE Information Theory Workshop (ITW), Aug. 2019, Visby, Sweden.
[42] T. Shinkar, E. Yaakobi, A. Lenz, and A. Wachter-Zeh, “Clustering-Correcting Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2019, Paris, France.
[41] A. Lenz, P. Siegel, A. Wachter-Zeh, and E. Yaakobi, “Anchor-Based Correction of Substitutions in Indexed Sets,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2019, Paris, France.
[40] L. Holzbaur, H. Liu, S. Puchinger, and A. Wachter-Zeh, “On Decoding and Applications of Interleaved Goppa Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2019, Paris, France.
[39] H. Cai, T. Etzion, M. Schwartz, and A. Wachter-Zeh, “Network Coding Solutions for the Combination Network and its Subgraphs,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2019, Paris, France.
[38] A. Lenz, P. Siegel, A. Wachter-Zeh, and E. Yaakobi, “Coding over Sets for DNA Storage,” in Non-Volantile Memories Workshop (NVMW), Feb. 2019, San Diego, USA (NVMW Memorable Paper Award).
[37] L. Holzbaur, R. Freij-Hollanti, A. Wachter-Zeh, and C. Hollanti, “Private Streaming with Convolutional Codes,” in IEEE Information Theory Workshop (ITW), Nov. 2018, Guangzhou, China.
[36] S. Puchinger, J. Renner, and A. Wachter-Zeh, “Twisted Gabidulin Codes in the GPT Cryptosystem,” in Sixteenth International Workshop on Algebraic and Combinatorial Coding Theory (ACCT), Sep. 2018, Svetlogorsk, Russia. 2/6
[35] A. Lenz, N. Jünger, and A. Wachter-Zeh, “Bounds and Constructions for Multi-Symbol Duplication Error Correcting Codes,” in Sixteenth International Workshop on Algebraic and Combinatorial Coding Theory (ACCT), Sep. 2018, Svetlogorsk, Russia.
[34] H. Liu, L. Holzbaur, and A. Wachter-Zeh, “Locality in Crisscross Error Correction,” in Sixteenth In- ternational Workshop on Algebraic and Combinatorial Coding Theory (ACCT), Sep. 2018, Svetlogorsk, Russia.
[33] A. Wachter-Zeh, S. Puchinger, and J. Renner, “Repairing the Faure-Loidreau Public-Key Cryptosystem,” in IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2018, Vail, Colorado, USA.
[32] L. Holzbaur and A. Wachter-Zeh, “List Decoding of Locally Repairable Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2018, Vail, Colorado, USA.
[31] A. Lenz, P. Siegel, A. Wachter-Zeh, and E. Yaakobi, “Coding over Sets for DNA Storage,” in IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2018, Vail, Colorado, USA.
[30] V. Immler, M. Hiller, L. Qinzhi, A. Lenz, and A. Wachter-Zeh, “Variable-Length Bit Mapping and Error- Correcting Codes for Higher-Order Alphabet PUFs,” in Seventh International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), Dec. 2017, Goa, India.
[29] L. Holzbaur, H. Bartz, and A. Wachter-Zeh, “Improved Decoding and Error Floor Analysis of Staircase Codes,” in International Workshop on Coding and Cryptography (WCC), Sep. 2017, St. Petersburg, Russia.
[28] A. Lenz, A. Wachter-Zeh, and E. Yaakobi, “Bounds on Codes Correcting Tandem and Palindromic Duplications,” in International Workshop on Coding and Cryptography (WCC), Sep. 2017, St. Petersburg, Russia.
[27] A. Wachter-Zeh, “Limits to List Decoding of Insertions and Deletions,” in IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2017, Aachen, Germany.
[26] V. Sidorenko, H. Bartz, and A. Wachter-Zeh, “Interleaved Subspace Codes in Fountain Mode,” in IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2017, Aachen, Germany.
[25] S. Puchinger, S. Müelich, M. Bossert, and A. Wachter-Zeh, “Timing Attack Resilient Decoding Algorithms for Physical Unclonable Functions,” in International ITG Conference on Systems, Communications and Coding (SCC), Feb. 2017, Hamburg, Germany.
[24] T. Etzion and A. Wachter-Zeh, “Vector Network Coding based on Subspace Codes Outperforms Scalar Linear Network Coding,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2016, Barcelona, Spain.
[23] S. Puchinger and A. Wachter-Zeh, “Sub-quadratic Decoding of Gabidulin Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2016, Barcelona, Spain.
[22] C. Schoeny, A. Wachter-Zeh, R. Gabrys, and E. Yaakobi, “Codes Correcting a Burst of Deletions or Insertions,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2016, Barcelona, Spain.
[21] A. Zeh and A. Wachter-Zeh, “Improved Erasure List Decoding Locally Repairable Codes using Alphabet- Dependent List Recovery,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2016, Barcelona, Spain.
[20] A. Wachter-Zeh and E. Yaakobi, “Masking Trapped Charge in Flash Memories,” in 53nd Annual Allerton Conference on Communication, Control, and Computing, Oct. 2015, Monticello, IL, USA.
[19] N. Raviv and A. Wachter-Zeh, “Some Gabidulin Codes Cannot be List Decoded Efficiently at any Radius,” in IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2015, Hong Kong, China. 3/6
[18] A. Wachter-Zeh and E. Yaakobi, “Codes for Partially Stuck-at Memory Cells,” in Int. ITG Conf. on Systems, Communications and Coding (SCC), Feb. 2015, Hamburg, Germany.
[17] H. Bartz and A. Wachter-Zeh, “Efficient Interpolation-Based Decoding of Interleaved Subspace and Gabidulin Codes,” in 52nd Annual Allerton Conference on Communication, Control, and Computing, Oct. 2014, Monticello, IL, USA.
[16] A. Wachter-Zeh, “List Decoding of Crisscross Error Patterns,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2014, Honolulu, HI, USA.
[15] S. Puchinger, A. Wachter-Zeh, and M. Bossert, “Improved Decoding of Partial Unit Memory Codes Using List Decoding of Reed–Solomon Codes,” in Int. Zurich Sem. Comm. (IZS), Feb. 2014, Zurich, Switzerland.
[14] A. Wachter-Zeh, “Bounds on Polynomial-Time List Decoding of Rank Metric Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2013, Istanbul, Turkey.
[13] A. Zeh, A. Wachter-Zeh, M. Gadouleau, and S. Bezzateev, “Generalizing Bounds on the Minimum Distance of Cyclic Codes Using Cyclic Product Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2013, Istanbul, Turkey.
[12] A. Wachter-Zeh and A. Zeh, “Interpolation-Based Decoding of Interleaved Gabidulin Codes,” in Int. Workshop Coding Cryptogr. (WCC), Apr. 2013, Bergen, Norway.
[11] V. Sidorenko, A. Wachter-Zeh, and D. Chen, “On fast Decoding of Interleaved Gabidulin Codes,” in Int. Symp. Probl. Redundancy Inf. Control Systems, Sep. 2012, pp. 78–83, St. Petersburg, Russia.
[10] A. Wachter-Zeh, M. Stinner, and M. Bossert, “Efficient Decoding of Partial Unit Memory Codes of Arbitrary Rate,” in IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2012, pp. 2356–2360, Boston, MA, USA.
[9] A. Wachter-Zeh and V. Sidorenko, “Rank Metric Convolutional Codes for Random Linear Network Coding,” in IEEE Int. Symp. Network Coding (Netcod), Jul. 2012, Boston, MA, USA.
[8] A. Wachter-Zeh, “Bounds on List Decoding Gabidulin Codes,” in Int. Workshop Alg. Combin. Coding Theory (ACCT), Jun. 2012, pp. 329–334, Pomorie, Bulgaria.
[7] A. Zeh, A. Wachter-Zeh, and M. Bossert, “Unambiguous Decoding of Generalized Reed-Solomon Codes beyond Half the Minimum Distance,” in Int. Zurich Sem. Comm. (IZS), Feb. 2012, Zurich, Switzerland.
[6] A. Wachter, V. Sidorenko, M. Bossert, and V. Zyablov, “Partial Unit Memory Codes Based on Gabidulin Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Aug. 2011, pp. 2487–2491, St. Petersburg, Russia.
[5] A. Zeh, A. Wachter, and S. Bezzateev, “Efficient Decoding of Some Classes of Binary Cyclic Codes beyond the Hartmann–Tzeng Bound,” in IEEE Int. Symp. Inf. Theory (ISIT), Aug. 2011, pp. 1017–1021, St. Petersburg, Russia.
[4] A. Wachter, V. Afanassiev, and V. Sidorenko, “Fast Decoding of Gabidulin Codes,” in Int. Workshop Coding Cryptogr. (WCC), Apr. 2011, pp. 433–442, Paris, France.
[3] A. Wachter, V. Sidorenko, and M. Bossert, “A Fast Linearized Euclidean Algorithm for Decoding Gabidulin Codes,” in Int. Workshop Alg. Combin. Coding Theory (ACCT), Sep. 2010, pp. 298–303, Novosibirsk, Russia.
[2] A. Wachter, V. Sidorenko, and M. Bossert, “A Basis for all Solutions of the Key Equation for Gabidulin Codes,” in IEEE Int. Symp. Inf. Theory (ISIT), Jun. 2010, pp. 1143–1147, Austin, TX, USA.
[1] S. Kampf, A. Wachter, and M. Bossert, “A Method for Soft-Decision Decoding of Reed-Solomon Codes Based on the Extended Euclidean Algorithm,” in ITG Conf. Source Channel Coding (SCC), Jan. 2010, pp. 1–6, Siegen, Germany.
Standardization Competition
[2] M. Baldi, A. Barenghi, S. Bitzer, P. Karl, F. Manganiello, A. Pavoni, G. Pelosi, P. Santini, J. Schupp, F. Slaughter, A. Wachter-Zeh, and V. Weger, “CROSS: Codes and Restricted Objects Signature Scheme,” in NIST Post-Quantum Cryptography Standardization Process, Round 1, Jun. 2023.
[1] S. Ritterhoff, S. Bitzer, P. Karl, G. Maringer, T. Schamberger, J. Schupp, G. Sigl, A. Wachter-Zeh, and V. Weger, “FuLeeca: A Lee-based Signature Scheme,” in NIST Post-Quantum Cryptography Standardization Process, Round 1, Jun. 2023.
Theses
[3] A. Wachter-Zeh, “Decoding of Block and Convolutional Codes in Rank Metric,” Ph.D. dissertation, Ulm University and University of Rennes 1, Ulm, Germany and Rennes, France, Oct. 2013.
[2] A. Wachter, “Soft-Decision Decoding of Reed–Solomon Codes Beyond Half the Minimum Distance with the Euclidean Algorithm,” Master’s thesis, Ulm University, Ulm, Germany, Oct. 2009.
[1] A. Wachter, “Signal Processing Algorithms for Air-Based Radar Systems,” Bachelor’s thesis, DHBW Ravensburg, Sep. 2007.
Monograph and Book Chapter
[2] H. Bartz, L. Holzbaur, H. Liu, S. Puchinger, J. Renner, and A. Wachter-Zeh, “Rank-Metric Codes and Their Applications,” Foundations and Trends in Communications and Information Theory, 2022.
[1] M. Bossert, V. Sidorenko, and A. Wachter-Zeh, “Coding Techniques for Transmitting Packets Through Complex Communication Networks,” in Communications in Interference Limited Networks, ser. Signals and Communication Technology, W. Utschick, Ed. Springer International Publishing, 2016, pp. 1–29.