메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Physical-layer security: Combining error control coding and cryptography

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL ERROR; COMMUNICATIONS SYSTEMS; CRYPTOGRAPHIC APPLICATIONS; CRYPTOGRAPHIC PRIMITIVES; CRYPTOGRAPHIC SYSTEMS; ERROR CONTROL CODING; FAST CORRELATION ATTACKS; KEYSTREAM GENERATORS; LINEAR FEEDBACK SHIFT REGISTERS; ORDERS OF MAGNITUDE; PHYSICAL LAYERS; REAL APPLICATIONS; SECRET KEY; WIRETAP CHANNEL;

EID: 70449509760     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2009.5199337     Document Type: Conference Paper
Times cited : (48)

References (17)
  • 4
    • 0026219389 scopus 로고
    • Generalized hamming weights for linear codes
    • Sep
    • V. K. Wei. Generalized hamming weights for linear codes. Information Theory, IEEE Transactions on, 37(5):1412-1418, Sep 1991.
    • (1991) Information Theory, IEEE Transactions on , vol.37 , Issue.5 , pp. 1412-1418
    • Wei, V.K.1
  • 7
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • W. Meier and O. Staffelbach. Fast correlation attacks on certain stream ciphers. Journal of Cryptology, 1:159-176, 1989.
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 8
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28(4):656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 9
    • 70449477294 scopus 로고    scopus 로고
    • D. Welsh. Codes and Cryptography. Oxford University Press, Walton Street, Oxford OX26DP, 1988.
    • D. Welsh. Codes and Cryptography. Oxford University Press, Walton Street, Oxford OX26DP, 1988.
  • 10
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • Jan
    • T. Siegenthaler. Decrypting a class of stream ciphers using ciphertext only. Computers, IEEE Transactions on, C-34(1):81-85, Jan 1985.
    • (1985) Computers, IEEE Transactions on , vol.C-34 , Issue.1 , pp. 81-85
    • Siegenthaler, T.1
  • 11
    • 85030473541 scopus 로고
    • On a fast correlation attack on certain stream ciphers
    • V. V. Chepyzhov and B.J.M. Smeets. On a fast correlation attack on certain stream ciphers. In EUROCRYPT, pages 176-185, 1991.
    • (1991) EUROCRYPT , pp. 176-185
    • Chepyzhov, V.V.1    Smeets, B.J.M.2
  • 12
    • 0036672635 scopus 로고    scopus 로고
    • Theoretical analysis of a correlation attack based on convolutional codes
    • Aug
    • T. Johansson and F. Jonsson. Theoretical analysis of a correlation attack based on convolutional codes. Information Theory, IEEE Transactions on, 48(8):2173-2181, Aug 2002.
    • (2002) Information Theory, IEEE Transactions on , vol.48 , Issue.8 , pp. 2173-2181
    • Johansson, T.1    Jonsson, F.2
  • 13
    • 70449489175 scopus 로고    scopus 로고
    • Promoter Members of Bluetooth SIG. Specification of the Bluetooth System - Core Version 2.1 + EDR. Bluetooth SIG, Inc., July 2007.
    • Promoter Members of Bluetooth SIG. Specification of the Bluetooth System - Core Version 2.1 + EDR. Bluetooth SIG, Inc., July 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.