Optimal Coding for Streaming Authentication and Interactive Communication
暂无分享,去创建一个
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] Amit Sahai,et al. Efficient and Explicit Coding for Interactive Communication , 2011, 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science.
[3] Michael Langberg,et al. Private codes or succinct random codes that are (almost) perfect , 2004, 45th Annual IEEE Symposium on Foundations of Computer Science.
[4] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[5] Mark Braverman,et al. Towards deterministic tree code constructions , 2012, ITCS '12.
[6] Cristopher Moore,et al. Tree codes and a conjecture on exponential sums , 2013, ITCS.
[7] Claude E. Shannon,et al. A Note on a Partial Ordering for Communication Channels , 1958, Information and Control.
[8] Crosby Newell Bonsall,et al. The Case of the Hungry Stranger , 1963 .
[9] Amit Sahai,et al. Efficient Coding for Interactive Communication , 2014, IEEE Transactions on Information Theory.
[10] Leonard J. Schulman. Coding for interactive communication , 1996, IEEE Trans. Inf. Theory.
[11] Rosario Gennaro,et al. How to Sign Digital Streams , 1997, CRYPTO.
[12] Madhu Sudan,et al. Optimal error rates for interactive coding I: adaptivity and other settings , 2013, STOC.
[13] Rafail Ostrovsky,et al. Optimal Coding for Streaming Authentication and Interactive Communication , 2015, IEEE Trans. Inf. Theory.
[14] Moni Naor,et al. Fast Algorithms for Interactive Coding , 2013, SODA.
[15] Rafail Ostrovsky,et al. Public Key Locally Decodable Codes with Short Keys , 2011, APPROX-RANDOM.
[16] Marcin Peczarski. An improvement of the tree code construction , 2006, Inf. Process. Lett..
[17] Rafail Ostrovsky,et al. Public-Key Locally-Decodable Codes , 2008, CRYPTO.
[18] Mark Braverman,et al. List and Unique Coding for Interactive Communication in the Presence of Adversarial Noise , 2014, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[19] Silvio Micali,et al. Optimal Error Correction Against Computationally Bounded Noise , 2005, TCC.
[20] Philippe Golle,et al. Authenticating Streamed Data in the Presence of Random Packet Loss , 2001, NDSS.
[21] Mark Braverman,et al. Toward Coding for Maximum Errors in Interactive Communication , 2011, IEEE Transactions on Information Theory.
[22] Silvio Micali,et al. On-line/off-line digital signatures , 1996, Journal of Cryptology.
[23] Bernhard Haeupler,et al. Optimal Error Rates for Interactive Coding II: Efficiency and List Decoding , 2013, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[24] Leonard J. Schulman,et al. Deterministic coding for interactive communication , 1993, STOC.
[25] Adam D. Smith. Scrambling adversarial errors using few random bits, optimal information reconciliation, and better private codes , 2007, SODA '07.
[26] Leonard J. Schulman,et al. Communication on noisy channels: a coding theorem for computation , 1992, Proceedings., 33rd Annual Symposium on Foundations of Computer Science.
[27] Rafail Ostrovsky,et al. Efficient Error-Correcting Codes for Sliding Windows , 2014, SOFSEM.
[28] Amit Sahai,et al. Adaptive protocols for interactive communication , 2013, 2016 IEEE International Symposium on Information Theory (ISIT).
[29] Venkatesan Guruswami,et al. Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[30] Jessica Staddon,et al. Graph-based authentication of digital streams , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[31] F. MacWilliams,et al. Codes which detect deception , 1974 .
[32] Klim Efremenko,et al. Maximal Noise in Interactive Communication Over Erasure Channels and Channels With Feedback , 2015, IEEE Transactions on Information Theory.
[33] Richard J. Lipton,et al. A New Approach To Information Theory , 1994, STACS.
[34] S. Rajsbaum. Foundations of Cryptography , 2014 .
[35] Yael Tauman Kalai,et al. Efficient Interactive Coding against Adversarial Noise , 2012, 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science.
[36] Gilles Brassard,et al. Noisy Interactive Quantum Communication , 2013, 2014 IEEE 55th Annual Symposium on Foundations of Computer Science.
[37] Klaus Jansen,et al. Approximation, Randomization and Combinatorial Optimization. , 2008 .