Detection of Algebraic Manipulation in the Presence of Leakage
From MaRDI portal
Publication:2948267
DOI10.1007/978-3-319-04268-8_14zbMath1395.94265OpenAlexW1235372244MaRDI QIDQ2948267
Unnamed Author, Reihaneh Safavi-Naini
Publication date: 30 September 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-04268-8_14
Related Items (9)
Detection of Algebraic Manipulation in the Presence of Leakage ⋮ Detecting Algebraic Manipulation in Leaky Storage Systems ⋮ Disjoint difference families and their applications ⋮ Weighted external difference families and R-optimal AMD codes ⋮ Codes for Detection of Limited View Algebraic Tampering ⋮ Algebraic manipulation detection codes via highly nonlinear functions ⋮ Combinatorial characterizations of algebraic manipulation detection codes involving generalized difference families ⋮ The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free ⋮ On optimal weak algebraic manipulation detection codes and weighted external difference families
Cites Work
- Unnamed Item
- A Mathematical Theory of Communication
- Detection of Algebraic Manipulation in the Presence of Leakage
- Oblivious Communication Channels and Their Capacity
- On the security of public key protocols
- The Wire-Tap Channel
- Non-Malleable Codes
- Error Detecting and Error Correcting Codes
- Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors
- Theory of Cryptography
This page was built for publication: Detection of Algebraic Manipulation in the Presence of Leakage