-
2
-
-
0026116647
-
Maximum-rank array codes and their application to crisscross error correction
-
Roth, R.: Maximum-rank array codes and their application to crisscross error correction. IEEE Transactions on Information Theory 32(2), 328-336 (1991)
-
(1991)
IEEE Transactions on Information Theory
, vol.32
, Issue.2
, pp. 328-336
-
-
Roth, R.1
-
3
-
-
0021941233
-
Theory of code with maximum rank distance
-
Gabidulin, E.: Theory of code with maximum rank distance. Problems of Information Transmission 21(1), 1-12 (1985)
-
(1985)
Problems of Information Transmission
, vol.21
, Issue.1
, pp. 1-12
-
-
Gabidulin, E.1
-
4
-
-
0009068065
-
Bilinear forms over a finite field, with applications to coding theory
-
Delsarte, P.: Bilinear forms over a finite field, with applications to coding theory. Journal of Combinatorial Theory, Series A 25(3), 226-241 (1978)
-
(1978)
Journal of Combinatorial Theory, Series A
, vol.25
, Issue.3
, pp. 226-241
-
-
Delsarte, P.1
-
5
-
-
74049102823
-
Provable data possession at untrusted stores
-
De Capitani di Vimercati, S., Syverson, P. (eds.) ACM, New York
-
Ateniese, G., Burns, R., Curtmola, R., Herring, J., Kissner, L., Peterson, Z., Song, D.: Provable data possession at untrusted stores. In: De Capitani di Vimercati, S., Syverson, P. (eds.) Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 598-609. ACM, New York (2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007)
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
6
-
-
70350681128
-
Proofs of retrievability via hardness amplification
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Dodis, Y., Vadhan, S., Wichs, D.: Proofs of retrievability via hardness amplification. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 109-127. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 109-127
-
-
Dodis, Y.1
Vadhan, S.2
Wichs, D.3
-
7
-
-
51349158835
-
Error and erasure correcting algorithms for rank codes
-
Gabidulin, E., Pilipchuk, N.: Error and erasure correcting algorithms for rank codes. Designs, Codes and Cryptography 49(1-3), 105-122 (2008)
-
(2008)
Designs, Codes and Cryptography
, vol.49
, Issue.1-3
, pp. 105-122
-
-
Gabidulin, E.1
Pilipchuk, N.2
-
8
-
-
74049103479
-
PORs: Proofs of retrievability for large files
-
De Capitani di Vimercati, S., Syverson, P. (eds.) ACM, New York
-
Juels, A., Kaliski, B.: PORs: proofs of retrievability for large files. In: De Capitani di Vimercati, S., Syverson, P. (eds.) Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007), pp. 584-597. ACM, New York (2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007)
, pp. 584-597
-
-
Juels, A.1
Kaliski, B.2
-
9
-
-
33745142417
-
Sequences of games: A tool for taming complexity in security proofs
-
Report 2004/332
-
Shoup, V.: Sequences of games: a tool for taming complexity in security proofs. IACR Cryptology ePrint Archive, Report 2004/332 (2004)
-
(2004)
IACR Cryptology ePrint Archive
-
-
Shoup, V.1
-
10
-
-
33947694320
-
Store, forget, and check: Using algebraic signatures to check remotely administered storage
-
Ahamad, M., Rodrigues, L. (eds.) IEEE Computer Society, Los Alamitos
-
Schwarz, T., Miller, E.: Store, forget, and check: using algebraic signatures to check remotely administered storage. In: Ahamad, M., Rodrigues, L. (eds.) Proceedings of ICDCS 2006, p. 12. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
Proceedings of ICDCS 2006
, pp. 12
-
-
Schwarz, T.1
Miller, E.2
-
11
-
-
58349118819
-
Compact proofs of retrievability
-
Pieprzyk, J. (ed.) ASIACRYPT 2008. Springer, Heidelberg
-
Shacham, H., Waters, B.: Compact proofs of retrievability. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 90-107. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5350
, pp. 90-107
-
-
Shacham, H.1
Waters, B.2
-
12
-
-
80052349425
-
A fast linearized Euclidean algorithm for decoding Gabidulin codes
-
Wachter, A., Sidorenko, A., Bossert, M.: A fast linearized Euclidean algorithm for decoding Gabidulin codes. In: Twelfth International Workshop on Algebraic and Combinatorial Coding Theory (ACCT 2010), pp. 298-303 (2010)
-
(2010)
Twelfth International Workshop on Algebraic and Combinatorial Coding Theory (ACCT 2010)
, pp. 298-303
-
-
Wachter, A.1
Sidorenko, A.2
Bossert, M.3
-
13
-
-
84901649395
-
Proofs of data possession and retrievability based on MRD codes
-
Report 2013/789
-
Han, S., Liu, S., Chen, K., Gu, D.: Proofs of data possession and retrievability based on MRD codes. IACR Cryptology ePrint Archive, Report 2013/789 (2013)
-
(2013)
IACR Cryptology ePrint Archive
-
-
Han, S.1
Liu, S.2
Chen, K.3
Gu, D.4
-
14
-
-
84655169995
-
An authentication code against pollution attacks in network coding
-
Oggier, F., Fathi, H.: An authentication code against pollution attacks in network coding. IEEE/ACM Transactions on Networking (TON) 19(6), 1587-1596 (2011)
-
(2011)
IEEE/ACM Transactions on Networking (TON)
, vol.19
, Issue.6
, pp. 1587-1596
-
-
Oggier, F.1
Fathi, H.2
|