-
1
-
-
77958044826
-
Non-malleable codes
-
A. C.-C. Yao, Ed. Tsinghua University Press
-
S. Dziembowski, K. Pietrzak, and D. Wichs, "Non-malleable codes," in ICS, A. C.-C. Yao, Ed. Tsinghua University Press, 2010, pp. 434-452.
-
(2010)
ICS
, pp. 434-452
-
-
Dziembowski, S.1
Pietrzak, K.2
Wichs, D.3
-
2
-
-
83655202643
-
Non-malleable codes from the wire-tap channel
-
H. Chabanne, G. Cohen, J. Flori, and A. Patey, "Non-malleable codes from the wire-tap channel," in Information Theory Workshop (ITW), 2011 IEEE, oct. 2011, pp. 55 -59.
-
Information Theory Workshop (ITW), 2011 IEEE, Oct. 2011
, pp. 55-59
-
-
Chabanne, H.1
Cohen, G.2
Flori, J.3
Patey, A.4
-
3
-
-
82955189794
-
Bitr: Built-in tamper resilience
-
ASIACRYPT, ser. D. H. Lee and X. Wang, Eds., Springer
-
S. G. Choi, A. Kiayias, and T. Malkin, "Bitr: Built-in tamper resilience," in ASIACRYPT, ser. Lecture Notes in Computer Science, D. H. Lee and X. Wang, Eds., vol. 7073. Springer, 2011, pp. 740-758.
-
(2011)
Lecture Notes in Computer Science
, vol.7073
, pp. 740-758
-
-
Choi, S.G.1
Kiayias, A.2
Malkin, T.3
-
6
-
-
35248813476
-
Optical fault induction attacks
-
CHES, ser. B. S. K. Jr., Çetin Kaya Koç, and C. Paar, Eds., Springer
-
S. P. Skorobogatov and R. J. Anderson, "Optical fault induction attacks," in CHES, ser. Lecture Notes in Computer Science, B. S. K. Jr., Çetin Kaya Koç, and C. Paar, Eds., vol. 2523. Springer, 2002, pp. 2-12.
-
(2002)
Lecture Notes in Computer Science
, vol.2523
, pp. 2-12
-
-
Skorobogatov, S.P.1
Anderson, R.J.2
-
7
-
-
84957355967
-
On the importance of checking cryptographic protocols for faults
-
extended abstract
-
D. Boneh, R. A. DeMillo, and R. J. Lipton, "On the importance of checking cryptographic protocols for faults (extended abstract)," in EUROCRYPT, 1997, pp. 37-51.
-
(1997)
EUROCRYPT
, pp. 37-51
-
-
Boneh, D.1
DeMillo, R.A.2
Lipton, R.J.3
-
8
-
-
24144482876
-
The sorcerer's apprentice guide to fault attacks
-
H. Bar-El, H. Choukri, D. Naccache, M. Tunstall, and C. Whelan, "The sorcerer's apprentice guide to fault attacks," in Workshop on Fault Diagnosis and Tolerence in Cryptography in association with DSN 2004 - The International Conference on Dependable Systems and Networks, 2004, pp. 330-342.
-
Workshop on Fault Diagnosis and Tolerence in Cryptography in Association with DSN 2004 - The International Conference on Dependable Systems and Networks, 2004
, pp. 330-342
-
-
Bar-El, H.1
Choukri, H.2
Naccache, D.3
Tunstall, M.4
Whelan, C.5
-
9
-
-
85017588958
-
Wire-tap channel II
-
L. H. Ozarow and A. D. Wyner, "Wire-tap channel II," in EUROCRYPT, 1984, pp. 33-50.
-
(1984)
EUROCRYPT
, pp. 33-50
-
-
Ozarow, L.H.1
Wyner, A.D.2
-
10
-
-
51649109673
-
On wiretap networks ii
-
S. Y. El Rouayheb and E. Soljanin, "On wiretap networks ii," in Information Theory, 2007. ISIT 2007. IEEE International Symposium on, june 2007, pp. 551 -555.
-
Information Theory, 2007. ISIT 2007. IEEE International Symposium on, June 2007
, pp. 551-555
-
-
El Rouayheb, S.Y.1
Soljanin, E.2
-
11
-
-
0036353798
-
Secure network coding
-
N. Cai and R. Yeung, "Secure network coding," in Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on, 2002, p. 323.
-
Information Theory, 2002. Proceedings. 2002 IEEE International Symposium on, 2002
, pp. 323
-
-
Cai, N.1
Yeung, R.2
-
12
-
-
79951948185
-
Theory of secure network coding
-
march
-
N. Cai and T. Chan, "Theory of secure network coding," Proceedings of the IEEE, vol. 99, no. 3, pp. 421 -437, march 2011.
-
(2011)
Proceedings of the IEEE
, vol.99
, Issue.3
, pp. 421-437
-
-
Cai, N.1
Chan, T.2
-
13
-
-
38049177353
-
Secure computation from random error correcting codes
-
EUROCRYPT, ser. M. Naor, Ed., Springer
-
H. Chen, R. Cramer, S. Goldwasser, R. de Haan, and V. Vaikuntanathan, "Secure computation from random error correcting codes," in EUROCRYPT, ser. Lecture Notes in Computer Science, M. Naor, Ed., vol. 4515. Springer, 2007, pp. 291-310.
-
(2007)
Lecture Notes in Computer Science
, vol.4515
, pp. 291-310
-
-
Chen, H.1
Cramer, R.2
Goldwasser, S.3
De Haan, R.4
Vaikuntanathan, V.5
-
14
-
-
44449149774
-
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
-
EUROCRYPT, ser. N. P. Smart, Ed., Springer
-
R. Cramer, Y. Dodis, S. Fehr, C. Padró, and D. Wichs, "Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors," in EUROCRYPT, ser. Lecture Notes in Computer Science, N. P. Smart, Ed., vol. 4965. Springer, 2008, pp. 471-488.
-
(2008)
Lecture Notes in Computer Science
, vol.4965
, pp. 471-488
-
-
Cramer, R.1
Dodis, Y.2
Fehr, S.3
Padró, C.4
Wichs, D.5
-
15
-
-
0016562514
-
The wire-tap channel
-
October
-
A. D. Wyner, "The wire-tap channel," The Bell System Technical Journal, vol. 54, no. 8, pp. 1355-1387, October 1975.
-
(1975)
The Bell System Technical Journal
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
|