메뉴 건너뛰기




Volumn 9014, Issue , 2015, Pages 481-501

Optimal algebraic manipulation detection codes in the constant-error model

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA; CRYPTOGRAPHY; ERRORS;

EID: 84924672174     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-662-46494-6_20     Document Type: Conference Paper
Times cited : (26)

References (13)
  • 1
    • 84958526962 scopus 로고    scopus 로고
    • Detection of Algebraic Manipulation in the Presence of Leakage
    • Padró, C. (ed.),. Springer, Heidelberg
    • Ahmadi, H., Safavi-Naini, R.: Detection of Algebraic Manipulation in the Presence of Leakage. In: Padró, C. (ed.) ICITS 2013. LNCS, vol. 8317, pp. 238-258. Springer, Heidelberg (2014).
    • (2014) ICITS 2013. LNCS , vol.8317 , pp. 238-258
    • Ahmadi, H.1    Safavi-Naini, R.2
  • 2
    • 33746891219 scopus 로고    scopus 로고
    • Some Randomized Code Constructions from Group Actions
    • Bazzi, L. M. J., Mitter, S. K.: Some Randomized Code Constructions from Group Actions. IEEE Trans. Inf. Theory 52, 3210-3219 (2006).
    • (2006) IEEE Trans. Inf. Theory , vol.52 , pp. 3210-3219
    • Bazzi, L.M.J.1    Mitter, S.K.2
  • 3
    • 38149099254 scopus 로고    scopus 로고
    • Information-theoretic security without an honest majority
    • Kurosawa, K. (ed.),. Springer, Heidelberg
    • Broadbent, A., Tapp, A.: Information-theoretic security without an honest majority. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 410-426. Springer, Heidelberg (2007), http://arxiv. org/abs/0706. 2010.
    • (2007) ASIACRYPT 2007. LNCS , vol.4833 , pp. 410-426
    • Broadbent, A.1    Tapp, A.2
  • 4
    • 31244431824 scopus 로고    scopus 로고
    • Secret sharing schemes with detection of cheaters for a general access structure
    • Cabello, S., Padró, C., Sáez, G.: Secret sharing schemes with detection of cheaters for a general access structure. Des. Codes Cryptogr. 25, 175-188 (2002).
    • (2002) Des. Codes Cryptogr , vol.25 , pp. 175-188
    • Cabello, S.1    Padró, C.2    Sáez, G.3
  • 5
    • 44449149774 scopus 로고    scopus 로고
    • Information-theoretic security without an honest majority
    • Smart,(ed.),. Springer, Heidelberg
    • Cramer, R., Dodis, Y., Fehr, S., Padró, C., Wichs, D.: Information-theoretic security without an honest majority. In: Smart, N. P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 471-488. Springer, Heidelberg (2008).
    • (2008) EUROCRYPT 2008. LNCS , vol.4965 , pp. 471-488
    • Cramer, R.1    Dodis, Y.2    Fehr, S.3    Padró, C.4    Wichs, D.5
  • 6
    • 84880022864 scopus 로고    scopus 로고
    • Algebraic manipulation detection codes
    • Cramer, R., Fehr, S., Padró, C.: Algebraic manipulation detection codes. Sci. China Math. 56, 1349-1358 (2013).
    • (2013) Sci. China Math , vol.56 , pp. 1349-1358
    • Cramer, R.1    Fehr, S.2    Padró, C.3
  • 9
    • 77949630830 scopus 로고    scopus 로고
    • On Complete Primitives for Fairness
    • Micciancio, D. (ed.),. Springer, Heidelberg
    • Gordon, D., Ishai, Y., Moran, T., Ostrovsky, R., Sahai, A.: On Complete Primitives for Fairness. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 91-108. Springer, Heidelberg (2010).
    • (2010) TCC 2010. LNCS , vol.5978 , pp. 91-108
    • Gordon, D.1    Ishai, Y.2    Moran, T.3    Ostrovsky, R.4    Sahai, A.5
  • 10
    • 78751551195 scopus 로고    scopus 로고
    • Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate
    • Full version arXiv. org, arXiv: 1004. 4017 [cs. IT]
    • Guruswami, V., Smith, A.: Codes for Computationally Simple Channels: Explicit Constructions with Optimal Rate. In: FOCS 2010, pp. 723-732 (2010), Full version available at arXiv. org, arXiv: 1004. 4017 [cs. IT].
    • (2010) FOCS 2010 , pp. 723-732
    • Guruswami, V.1    Smith, A.2
  • 12
    • 80052711344 scopus 로고    scopus 로고
    • Algebraic manipulation detection codes and their applications for design of secure cryptographic devices
    • IOLTS 2011
    • Wang, Z., Karpovsky, M.: Algebraic manipulation detection codes and their applications for design of secure cryptographic devices. In: IEEE 17th International On-Line Testing Symposium, IOLTS 2011, pp. 234-239 (2011).
    • (2011) IEEE 17th International On-Line Testing Symposium , pp. 234-239
    • Wang, Z.1    Karpovsky, M.2
  • 13
    • 84861714606 scopus 로고    scopus 로고
    • Public Key Encryption against Related Key Attacks
    • Fischlin, M., Buchmann, J., Manulis, M. (eds.),. Springer, Heidelberg
    • Wee, H.: Public Key Encryption against Related Key Attacks. In: Fischlin, M., Buchmann, J., Manulis, M. (eds.) PKC 2012. LNCS, vol. 7293, pp. 262-279. Springer, Heidelberg (2012).
    • (2012) PKC 2012. LNCS , vol.7293 , pp. 262-279
    • Wee, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.