×

Found 4 Documents (Results 1–4)

Codes for detection of limited view algebraic tampering. (English) Zbl 1404.94091

Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 309-320 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Detecting algebraic manipulation in leaky storage systems. (English) Zbl 1407.94137

Nascimento, Anderson C. A. (ed.) et al., Information theoretic security. 9th international conference, ICITS 2016, Tacoma, WA, USA, August 9–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10015, 129-150 (2016).
MSC:  94A60 68P20 68P25
PDFBibTeX XMLCite
Full Text: DOI arXiv

Limited view adversary codes: bounds, constructions and applications. (English) Zbl 1375.94162

Lehmann, Anja (ed.) et al., Information theoretic security. 8th international conference, ICITS 2015, Lugano, Switzerland, May 2–5, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17469-3/pbk; 978-3-319-17470-9/ebook). Lecture Notes in Computer Science 9063, 214-235 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Filter Results by …

Document Type

Year of Publication

Main Field