Invertible Extractors and Wiretap Protocols
From MaRDI portal
Publication:5272138
DOI10.1109/TIT.2011.2170660zbMath1365.94417OpenAlexW1971485486MaRDI QIDQ5272138
Fredric Didier, Mahdi Cheraghchi, Mohammad Amin Shokrollahi
Publication date: 12 July 2017
Published in: IEEE Transactions on Information Theory (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1109/tit.2011.2170660
Applications of graph theory (05C90) Cryptography (94A60) Structural characterization of families of graphs (05C75) Network protocols (68M12) Random walks on graphs (05C81)
Related Items (6)
2- and 3-modular lattice wiretap codes in small dimensions ⋮ Detecting Algebraic Manipulation in Leaky Storage Systems ⋮ Short leakage resilient and non-malleable secret sharing schemes ⋮ Codes for Detection of Limited View Algebraic Tampering ⋮ Unnamed Item ⋮ Mosaics of combinatorial designs for information-theoretic security
This page was built for publication: Invertible Extractors and Wiretap Protocols