Detecting Algebraic Manipulation in Leaky Storage Systems
暂无分享,去创建一个
[1] Reihaneh Safavi-Naini,et al. A Model for Adversarial Wiretap Channels , 2016, IEEE Transactions on Information Theory.
[2] Carles Padró,et al. Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors , 2008, EUROCRYPT.
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] A. Robert Calderbank,et al. Wiretap channel type II with an active eavesdropper , 2009, 2009 IEEE International Symposium on Information Theory.
[5] Mahdi Cheraghchi,et al. Invertible extractors and wiretap protocols , 2009, 2009 IEEE International Symposium on Information Theory.
[6] Moti Yung,et al. Leakage Resilient Cryptography in Practice , 2010, Towards Hardware-Intrinsic Security.
[7] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[8] Reihaneh Safavi-Naini,et al. Detection of Algebraic Manipulation in the Presence of Leakage , 2013, ICITS.
[9] Suela Kodra. Fuzzy extractors : How to generate strong keys from biometrics and other noisy data , 2015 .
[10] Lawrence H. Ozarow,et al. Wire-tap channel II , 1984, AT&T Bell Laboratories Technical Journal.
[11] Reihaneh Safavi-Naini,et al. Erasure adversarial wiretap channels , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[12] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[13] Reihaneh Safavi-Naini,et al. Codes for limited view adversarial channels , 2013, 2013 IEEE International Symposium on Information Theory.
[14] Stefan Dziembowski,et al. Non-Malleable Codes , 2018, ICS.
[15] Mitsugu Iwamoto,et al. Strongly secure ramp secret sharing schemes for general access structures , 2005, Inf. Process. Lett..