-
1
-
-
84958526962
-
Detection of Algebraic Manipulation in the Presence of Leakage
-
Padró, C. (ed.),. Springer, Heidelberg
-
Ahmadi, H., Safavi-Naini, R.: Detection of Algebraic Manipulation in the Presence of Leakage. In: Padró, C. (ed.) ICITS 2013. LNCS, vol. 8317, pp. 238-258. Springer, Heidelberg (2014).
-
(2014)
ICITS 2013. LNCS
, vol.8317
, pp. 238-258
-
-
Ahmadi, H.1
Safavi-Naini, R.2
-
2
-
-
33746891219
-
Some Randomized Code Constructions from Group Actions
-
Bazzi, L. M. J., Mitter, S. K.: Some Randomized Code Constructions from Group Actions. IEEE Trans. Inf. Theory 52, 3210-3219 (2006).
-
(2006)
IEEE Trans. Inf. Theory
, vol.52
, pp. 3210-3219
-
-
Bazzi, L.M.J.1
Mitter, S.K.2
-
3
-
-
38149099254
-
Information-theoretic security without an honest majority
-
Kurosawa, K. (ed.),. Springer, Heidelberg
-
Broadbent, A., Tapp, A.: Information-theoretic security without an honest majority. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 410-426. Springer, Heidelberg (2007), http://arxiv. org/abs/0706. 2010.
-
(2007)
ASIACRYPT 2007. LNCS
, vol.4833
, pp. 410-426
-
-
Broadbent, A.1
Tapp, A.2
-
4
-
-
31244431824
-
Secret sharing schemes with detection of cheaters for a general access structure
-
Cabello, S., Padró, C., Sáez, G.: Secret sharing schemes with detection of cheaters for a general access structure. Des. Codes Cryptogr. 25, 175-188 (2002).
-
(2002)
Des. Codes Cryptogr
, vol.25
, pp. 175-188
-
-
Cabello, S.1
Padró, C.2
Sáez, G.3
-
5
-
-
44449149774
-
Information-theoretic security without an honest majority
-
Smart,(ed.),. Springer, Heidelberg
-
Cramer, R., Dodis, Y., Fehr, S., Padró, C., Wichs, D.: Information-theoretic security without an honest majority. In: Smart, N. P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 471-488. Springer, Heidelberg (2008).
-
(2008)
EUROCRYPT 2008. LNCS
, vol.4965
, pp. 471-488
-
-
Cramer, R.1
Dodis, Y.2
Fehr, S.3
Padró, C.4
Wichs, D.5
-
6
-
-
84880022864
-
Algebraic manipulation detection codes
-
Cramer, R., Fehr, S., Padró, C.: Algebraic manipulation detection codes. Sci. China Math. 56, 1349-1358 (2013).
-
(2013)
Sci. China Math
, vol.56
, pp. 1349-1358
-
-
Cramer, R.1
Fehr, S.2
Padró, C.3
-
7
-
-
77958044826
-
Non-Malleable Codes
-
ICS 2010
-
Dziembowski, S., Pietrzak, K., Wichs, D.: Non-Malleable Codes. In: Innovations in Computer Science, ICS 2010, pp. 434-452 (2010).
-
(2010)
Innovations in Computer Science
, pp. 434-452
-
-
Dziembowski, S.1
Pietrzak, K.2
Wichs, D.3
-
9
-
-
77949630830
-
On Complete Primitives for Fairness
-
Micciancio, D. (ed.),. Springer, Heidelberg
-
Gordon, D., Ishai, Y., Moran, T., Ostrovsky, R., Sahai, A.: On Complete Primitives for Fairness. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 91-108. Springer, Heidelberg (2010).
-
(2010)
TCC 2010. LNCS
, vol.5978
, pp. 91-108
-
-
Gordon, D.1
Ishai, Y.2
Moran, T.3
Ostrovsky, R.4
Sahai, A.5
-
10
-
-
78751551195
-
Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate
-
Full version arXiv. org, arXiv: 1004. 4017 [cs. IT]
-
Guruswami, V., Smith, A.: Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate. In: FOCS 2010, pp. 723-732 (2010), Full version available at arXiv. org, arXiv: 1004. 4017 [cs. IT].
-
(2010)
FOCS 2010
, pp. 723-732
-
-
Guruswami, V.1
Smith, A.2
-
12
-
-
80052711344
-
Algebraic manipulation detection codes and their applications for design of secure cryptographic devices
-
IOLTS 2011
-
Wang, Z., Karpovsky, M.: Algebraic manipulation detection codes and their applications for design of secure cryptographic devices. In: IEEE 17th International On-Line Testing Symposium, IOLTS 2011, pp. 234-239 (2011).
-
(2011)
IEEE 17th International On-Line Testing Symposium
, pp. 234-239
-
-
Wang, Z.1
Karpovsky, M.2
-
13
-
-
84861714606
-
Public Key Encryption against Related Key Attacks
-
Fischlin, M., Buchmann, J., Manulis, M. (eds.),. Springer, Heidelberg
-
Wee, H.: Public Key Encryption against Related Key Attacks. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 262-279. Springer, Heidelberg (2012).
-
(2012)
PKC 2012. LNCS
, vol.7293
, pp. 262-279
-
-
Wee, H.1
|