Codes for Detection of Limited View Algebraic Tampering
From MaRDI portal
Publication:2980863
DOI10.1007/978-3-319-54705-3_19zbMath1404.94091OpenAlexW2594208117MaRDI QIDQ2980863
Fuchun Lin, Pengwei Wang, Reihaneh Safavi-Naini
Publication date: 5 May 2017
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-54705-3_19
Cites Work
- A Mathematical Theory of Communication
- Non-malleable coding against bit-wise and split-state tampering
- Non-malleable Codes from Two-Source Extractors
- Limited View Adversary Codes: Bounds, Constructions and Applications
- Detection of Algebraic Manipulation in the Presence of Leakage
- Detecting Algebraic Manipulation in Leaky Storage Systems
- A Model for Adversarial Wiretap Channels
- Capacity of non-malleable codes
- Oblivious Communication Channels and Their Capacity
- Authentication Theory/Coding Theory
- Non-malleable codes from additive combinatorics
- Tamper Detection and Continuous Non-malleable Codes
- Invertible Extractors and Wiretap Protocols
- Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Wire-Tap Channel II
This page was built for publication: Codes for Detection of Limited View Algebraic Tampering