Codes for detection of limited view algebraic tampering
From MaRDI portal
Publication:2980863
DOI10.1007/978-3-319-54705-3_19zbMATH Open1404.94091OpenAlexW2594208117MaRDI QIDQ2980863FDOQ2980863
Authors: Fuchun Lin, Pengwei Wang, Reihaneh Safavi-Naini
Publication date: 5 May 2017
Published in: Information Security and Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-54705-3_19
Recommendations
Cites Work
- A Mathematical Theory of Communication
- Authentication Theory/Coding Theory
- Wire-Tap Channel II
- Non-malleable codes from two-source extractors
- Capacity of non-malleable codes
- Non-malleable codes from additive combinatorics (extended abstract)
- Tamper detection and continuous non-malleable codes
- Efficient non-malleable codes and key-derivation for poly-size tampering circuits
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Detection of algebraic manipulation in the presence of leakage
- Invertible Extractors and Wiretap Protocols
- A Model for Adversarial Wiretap Channels
- Detecting algebraic manipulation in leaky storage systems
- Limited view adversary codes: bounds, constructions and applications
- Oblivious Communication Channels and Their Capacity
This page was built for publication: Codes for detection of limited view algebraic tampering
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2980863)