Detection of Algebraic Manipulation in the Presence of Leakage
暂无分享,去创建一个
[1] Srdjan Capkun,et al. Integrity Codes: Message Integrity Protection and Authentication over Insecure Channels , 2006, IEEE Transactions on Dependable and Secure Computing.
[2] M. Chiani. Error Detecting and Error Correcting Codes , 2012 .
[3] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[4] Stefan Dziembowski,et al. Leakage-Resilient Cryptography , 2008, 2008 49th Annual IEEE Symposium on Foundations of Computer Science.
[5] Michael Langberg,et al. Oblivious Communication Channels and Their Capacity , 2008, IEEE Transactions on Information Theory.
[6] Silvio Micali,et al. Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering , 2004, TCC.
[7] S. R. Simanca,et al. On Circulant Matrices , 2012 .
[8] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[9] Carles Padró,et al. Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors , 2008, EUROCRYPT.
[10] Venkatesan Guruswami,et al. Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[11] Richard W. Hamming,et al. Error detecting and error correcting codes , 1950 .
[12] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).