Post-quantum Security using Channel Noise
暂无分享,去创建一个
Reihaneh Safavi-Naini | Setareh Sharifian | Fuchun Lin | R. Safavi-Naini | Fuchun Lin | Setareh Sharifian
[1] Oded Regev,et al. On lattices, learning with errors, random linear codes, and cryptography , 2005, STOC '05.
[2] Peter Friess,et al. Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems , 2013 .
[3] Erdem Alkim,et al. Post-quantum Key Exchange - A New Hope , 2016, USENIX Security Symposium.
[4] Peter W. Shor,et al. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..
[5] Craig Costello,et al. Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE , 2016, IACR Cryptol. ePrint Arch..
[6] Alexander Vardy,et al. Semantic Security for the Wiretap Channel , 2012, CRYPTO.
[7] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[8] Alexander Vardy,et al. Channel upgrading for semantically-secure encryption on wiretap channels , 2013, 2013 IEEE International Symposium on Information Theory.
[9] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[10] Reihaneh Safavi-Naini,et al. Hash-then-Encode: A Modular Semantically Secure Wiretap Code , 2017 .
[11] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[12] H. Vincent Poor,et al. Channel Coding Rate in the Finite Blocklength Regime , 2010, IEEE Transactions on Information Theory.
[13] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.