Codes for detection of limited view algebraic tampering
From MaRDI portal
Publication:2980863
Recommendations
Cites work
- A Mathematical Theory of Communication
- A Model for Adversarial Wiretap Channels
- Authentication Theory/Coding Theory
- Capacity of non-malleable codes
- Detecting algebraic manipulation in leaky storage systems
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Detection of algebraic manipulation in the presence of leakage
- Efficient non-malleable codes and key-derivation for poly-size tampering circuits
- Invertible Extractors and Wiretap Protocols
- Limited view adversary codes: bounds, constructions and applications
- Non-malleable codes from additive combinatorics (extended abstract)
- Non-malleable codes from two-source extractors
- Oblivious Communication Channels and Their Capacity
- Tamper detection and continuous non-malleable codes
- Wire-Tap Channel II
This page was built for publication: Codes for detection of limited view algebraic tampering
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2980863)