Channel upgrading for semantically-secure encryption on wiretap channels
暂无分享,去创建一个
Alexander Vardy | Ido Tal | A. Vardy | I. Tal
[1] R. Gallager. Information Theory and Reliable Communication , 1968 .
[2] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[3] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[4] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[5] Thomas H. Cormen,et al. Introduction to algorithms [2nd ed.] , 2001 .
[6] Erdal Arikan,et al. Channel Polarization: A Method for Constructing Capacity-Achieving Codes for Symmetric Binary-Input Memoryless Channels , 2008, IEEE Transactions on Information Theory.
[7] Alexander Vardy,et al. Achieving the Secrecy Capacity of Wiretap Channels Using Polar Codes , 2010, IEEE Transactions on Information Theory.
[8] Mihir Bellare,et al. Polynomial-Time, Semantically-Secure Encryption Achieving the Secrecy Capacity , 2012, IACR Cryptol. ePrint Arch..
[9] Alexander Vardy,et al. A Cryptographic Treatment of the Wiretap Channel , 2012, IACR Cryptol. ePrint Arch..
[10] Alexander Vardy,et al. Semantic Security for the Wiretap Channel , 2012, CRYPTO.
[11] Alexander Vardy,et al. How to Construct Polar Codes , 2011, IEEE Transactions on Information Theory.
[12] Alexander Vardy,et al. A new polar coding scheme for strong security on wiretap channels , 2013, 2013 IEEE International Symposium on Information Theory.
[13] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[14] 野崎 隆之,et al. 国際会議参加報告:IEEE International Symposium on Information Theory , 2015 .