메뉴 건너뛰기




Volumn , Issue , 2012, Pages 2546-2550

Secure network coding and non-malleable codes: Protection against linear tampering

Author keywords

Coset Coding; Non Malleable Codes; Secure Network Coding; Wire Tap Channel II

Indexed keywords

CODEWORD; CODING THEORY; COSET CODING; INDEPENDENT FUNCTIONS; NON-MALLEABILITY; NON-MALLEABLE; SECURE NETWORKS; WIRE-TAP CHANNEL II;

EID: 84867517502     PISSN: 21578105     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2012.6283976     Document Type: Conference Paper
Times cited : (13)

References (15)
  • 1
    • 77958044826 scopus 로고    scopus 로고
    • Non-malleable codes
    • A. C.-C. Yao, Ed. Tsinghua University Press
    • S. Dziembowski, K. Pietrzak, and D. Wichs, "Non-malleable codes," in ICS, A. C.-C. Yao, Ed. Tsinghua University Press, 2010, pp. 434-452.
    • (2010) ICS , pp. 434-452
    • Dziembowski, S.1    Pietrzak, K.2    Wichs, D.3
  • 3
    • 82955189794 scopus 로고    scopus 로고
    • Bitr: Built-in tamper resilience
    • ASIACRYPT, ser. D. H. Lee and X. Wang, Eds., Springer
    • S. G. Choi, A. Kiayias, and T. Malkin, "Bitr: Built-in tamper resilience," in ASIACRYPT, ser. Lecture Notes in Computer Science, D. H. Lee and X. Wang, Eds., vol. 7073. Springer, 2011, pp. 740-758.
    • (2011) Lecture Notes in Computer Science , vol.7073 , pp. 740-758
    • Choi, S.G.1    Kiayias, A.2    Malkin, T.3
  • 6
    • 35248813476 scopus 로고    scopus 로고
    • Optical fault induction attacks
    • CHES, ser. B. S. K. Jr., Çetin Kaya Koç, and C. Paar, Eds., Springer
    • S. P. Skorobogatov and R. J. Anderson, "Optical fault induction attacks," in CHES, ser. Lecture Notes in Computer Science, B. S. K. Jr., Çetin Kaya Koç, and C. Paar, Eds., vol. 2523. Springer, 2002, pp. 2-12.
    • (2002) Lecture Notes in Computer Science , vol.2523 , pp. 2-12
    • Skorobogatov, S.P.1    Anderson, R.J.2
  • 7
    • 84957355967 scopus 로고    scopus 로고
    • On the importance of checking cryptographic protocols for faults
    • extended abstract
    • D. Boneh, R. A. DeMillo, and R. J. Lipton, "On the importance of checking cryptographic protocols for faults (extended abstract)," in EUROCRYPT, 1997, pp. 37-51.
    • (1997) EUROCRYPT , pp. 37-51
    • Boneh, D.1    DeMillo, R.A.2    Lipton, R.J.3
  • 9
    • 85017588958 scopus 로고
    • Wire-tap channel II
    • L. H. Ozarow and A. D. Wyner, "Wire-tap channel II," in EUROCRYPT, 1984, pp. 33-50.
    • (1984) EUROCRYPT , pp. 33-50
    • Ozarow, L.H.1    Wyner, A.D.2
  • 12
    • 79951948185 scopus 로고    scopus 로고
    • Theory of secure network coding
    • march
    • N. Cai and T. Chan, "Theory of secure network coding," Proceedings of the IEEE, vol. 99, no. 3, pp. 421 -437, march 2011.
    • (2011) Proceedings of the IEEE , vol.99 , Issue.3 , pp. 421-437
    • Cai, N.1    Chan, T.2
  • 13
  • 14
    • 44449149774 scopus 로고    scopus 로고
    • Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
    • EUROCRYPT, ser. N. P. Smart, Ed., Springer
    • R. Cramer, Y. Dodis, S. Fehr, C. Padró, and D. Wichs, "Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors," in EUROCRYPT, ser. Lecture Notes in Computer Science, N. P. Smart, Ed., vol. 4965. Springer, 2008, pp. 471-488.
    • (2008) Lecture Notes in Computer Science , vol.4965 , pp. 471-488
    • Cramer, R.1    Dodis, Y.2    Fehr, S.3    Padró, C.4    Wichs, D.5
  • 15
    • 0016562514 scopus 로고
    • The wire-tap channel
    • October
    • A. D. Wyner, "The wire-tap channel," The Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, October 1975.
    • (1975) The Bell System Technical Journal , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.