-
1
-
-
79551630839
-
Physical layer error correction based cipher
-
Adamo, O., Fu, S. and Varanasi, M.R. (2010) 'Physical layer error correction based cipher', IEEE Global Telecommunications Conference, GLOBECOM'10, pp.1-5.
-
(2010)
IEEE Global Telecommunications Conference, GLOBECOM'10
, pp. 1-5
-
-
Adamo, O.1
Fu, S.2
Varanasi, M.R.3
-
2
-
-
79958020005
-
Secret keys from channel noise
-
Ahmadi, H. and Safavi-Naini, R. (2011) 'Secret keys from channel noise', Advances in Cryptology, EUROCRYPT'11, Vol. 6632/2011, pp.266-283.
-
(2011)
Advances in Cryptology, EUROCRYPT'11
, vol.6632
, Issue.2011
, pp. 266-283
-
-
Ahmadi, H.1
Safavi-Naini, R.2
-
3
-
-
84857214110
-
Joint scheme for physical layer error correction and security
-
Aamo, O. and Varanasi, M.R. (2011) 'Joint scheme for physical layer error correction and security', ISRN Communications and Networking, Vol. 2011, pp.1-9.
-
(2011)
ISRN Communications and Networking
, vol.2011
, pp. 1-9
-
-
Aamo, O.1
Varanasi, M.R.2
-
5
-
-
84857218722
-
-
CUDA (2011) http://www.nvidia.com/object/cuda-home-new.html
-
(2011)
CUDA
-
-
-
6
-
-
70350589237
-
KATAN and KTANTAN - A family of small and efficient hardware-oriented block ciphers
-
Gligoroski, D., De Canniere, C., Dunkelman, O. and Knežević , M. (2009) 'KATAN and KTANTAN - a family of small and efficient hardware-oriented block ciphers', Cryptographic Hardware and Embedded Systems, CHES'09, Vol. 5747/2009, pp.272-288.
-
(2009)
Cryptographic Hardware and Embedded Systems, CHES'09
, vol.5747
, Issue.2009
, pp. 272-288
-
-
Gligoroski, D.1
De Canniere, C.2
Dunkelman, O.3
Knežević, M.4
-
7
-
-
66149159128
-
Cryptcoding - Encryption and errorcorrection coding in a single step
-
Las Vegas, Nevada, USA
-
Gligoroski, D., Knapskog, S. and Andova, S. (2006) 'Cryptcoding - encryption and errorcorrection coding in a single step', Proceedings of the 2006 International Conference on Security and Management, SAM'06, Las Vegas, Nevada, USA, pp.145 - 151.
-
(2006)
Proceedings of the 2006 International Conference on Security and Management, SAM'06
, pp. 145-151
-
-
Gligoroski, D.1
Knapskog, S.2
Andova, S.3
-
8
-
-
84964823931
-
Secret error-correcting codes (SECC)
-
Hwang, T. and Rao, T. (1988) 'Secret error-correcting codes (SECC)', Advances in Cryptology, CRYPTO'88, Vol. 403/1990, pp.540-563.
-
(1988)
Advances in Cryptology, CRYPTO'88
, vol.403
, Issue.1990
, pp. 540-563
-
-
Hwang, T.1
Rao, T.2
-
9
-
-
0022121935
-
Encryption and error-correction coding using D sequences
-
Kak, S.C. (1985) 'Encryption and error-correction coding using D sequences', IEEE Transactions on Computers, Vol. 100, No. 9, pp.803-809.
-
(1985)
IEEE Transactions on Computers
, vol.100
, Issue.9
, pp. 803-809
-
-
Kak, S.C.1
-
11
-
-
79551648752
-
A lightweight stream cipher WG-7 for RFID encryption and authentication
-
Miami, Florida, USA
-
Luo, Y., Chai, Q., Gong, G. and Lai, X. (2010) 'A lightweight stream cipher WG-7 for RFID encryption and authentication', IEEE Global Telecommunications Conference, GLOBECOM'10, Miami, Florida, USA, pp.1 - 6.
-
(2010)
IEEE Global Telecommunications Conference, GLOBECOM'10
, pp. 1-6
-
-
Luo, Y.1
Chai, Q.2
Gong, G.3
Lai, X.4
-
13
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
McEliece, R.J. (1978) 'A public-key cryptosystem based on algebraic coding theory', DSN Progress Report, Vol. 42, No. 44, pp.114-116.
-
(1978)
DSN Progress Report
, vol.42
, Issue.44
, pp. 114-116
-
-
McEliece, R.J.1
-
14
-
-
84948949623
-
Truncated and higher order differentials
-
Knudsen, L. (1995) 'Truncated and higher order differentials', Fast Software Encryption, FSE'95, Vol. 1008, pp.196-211.
-
(1995)
Fast Software Encryption, FSE'95
, vol.1008
, pp. 196-211
-
-
Knudsen, L.1
-
15
-
-
0024705818
-
Private-key algebraic-code encryptions
-
DOI 10.1109/18.32159
-
Rao, T. and Nam, K.H. (1989) 'Private-key algebraic-code encryptions' IEEE Transactions on Information Theory, Vol. 35, No. 4, pp.829-833. (Pubitemid 20607096)
-
(1989)
IEEE Transactions on Information Theory
, vol.35
, Issue.4
, pp. 829-833
-
-
Rao, T.R.N.1
Nam Kil-Hyun2
-
16
-
-
84956862729
-
The rao-nam scheme is insecure against a chosen-plaintext attack
-
Taubman, D. (1987) 'The Rao-Nam scheme is insecure against a chosen-plaintext attack', Advances in Cryptology, CRYPTO'87, Vol. 293/2006, pp.445-457.
-
(1987)
Advances in Cryptology, CRYPTO'87
, vol.293
, Issue.2006
, pp. 445-457
-
-
Taubman, D.1
-
17
-
-
34547922334
-
Applications of LDPC codes to the wiretap channel
-
DOI 10.1109/TIT.2007.901143
-
Thangaraj, A., Dihidar, S., Calderbank, A.R., McLaughlin, S.W. and Merolla, J.M. (2007) 'Applications of LDPC codes to the wiretap channel', IEEE Transactions on Information Theory, Vol. 53, No. 8, pp.2933-2945. (Pubitemid 47249863)
-
(2007)
IEEE Transactions on Information Theory
, vol.53
, Issue.8
, pp. 2933-2945
-
-
Thangaraj, A.1
Dihidar, S.2
Calderbank, A.R.3
McLaughlin, S.W.4
Merolla, J.-M.5
-
20
-
-
23044531588
-
Cryptanalysis of the Hwang-Rao Secret Error-Correcting Code Schemes
-
Information and Communications Security
-
Zeng, K., Yang, C.H. and Rao, T. (2001) 'Cryptanalysis of the Hwang-Rao secret error-correcting code schemes', Proceedings of the 3rd International Conference on Information and Communications Security, ICICS'01, Xian, China, pp.419 - 428. (Pubitemid 33361992)
-
(2001)
Lecture Notes in Computer Science
, Issue.2229
, pp. 419-428
-
-
Zeng, K.1
Yang, C.-H.2
Rao, T.R.N.3
|