Zeng, Xiangdi; Zhang, Yaozong; Gao, Jian Linear codes from defining sets over \(\mathbb{F}_p + u\mathbb{F}_p\) and their applications. (English) Zbl 07784434 Comput. Appl. Math. 43, No. 1, Paper No. 13, 30 p. (2024). MSC: 94B05 PDFBibTeX XMLCite \textit{X. Zeng} et al., Comput. Appl. Math. 43, No. 1, Paper No. 13, 30 p. (2024; Zbl 07784434) Full Text: DOI
Gao, Jian; Zhang, Yaozong; Meng, Xiangrui; Fu, Fang-Wei Minimal linear codes from defining sets over \(\mathbb{F}_p + u \mathbb{F}_p\). (English) Zbl 1521.94075 Discrete Math. 346, No. 10, Article ID 113584, 18 p. (2023). MSC: 94B05 11T71 PDFBibTeX XMLCite \textit{J. Gao} et al., Discrete Math. 346, No. 10, Article ID 113584, 18 p. (2023; Zbl 1521.94075) Full Text: DOI
Cruz, Romar Dela; Kiermaier, Michael; Kurz, Sascha; Wassermann, Alfred On the minimum number of minimal codewords. (English) Zbl 1521.94071 Adv. Math. Commun. 17, No. 2, 333-341 (2023). MSC: 94B05 94B27 94A60 94B35 PDFBibTeX XMLCite \textit{R. D. Cruz} et al., Adv. Math. Commun. 17, No. 2, 333--341 (2023; Zbl 1521.94071) Full Text: DOI arXiv
Bartoli, Daniele; Denaux, Lins Minimal codewords arising from the incidence of points and hyperplanes in projective spaces. (English) Zbl 1525.94061 Adv. Math. Commun. 17, No. 1, 56-77 (2023). Reviewer: Luca Giuzzi (Brescia) MSC: 94B05 05B25 94A62 51E20 PDFBibTeX XMLCite \textit{D. Bartoli} and \textit{L. Denaux}, Adv. Math. Commun. 17, No. 1, 56--77 (2023; Zbl 1525.94061) Full Text: DOI arXiv
Sagar, Vidya; Sarma, Ritumoni Octanary linear codes using simplicial complexes. (English) Zbl 07706190 Cryptogr. Commun. 15, No. 3, 599-616 (2023). MSC: 94B05 94B60 94B65 05E45 PDFBibTeX XMLCite \textit{V. Sagar} and \textit{R. Sarma}, Cryptogr. Commun. 15, No. 3, 599--616 (2023; Zbl 07706190) Full Text: DOI
Du, Xiaoni; Jin, Wengang; Mesnager, Sihem Several classes of new weakly regular bent functions outside \(\mathcal{RF}\), their duals and some related (minimal) codes with few weights. (English) Zbl 1520.94114 Des. Codes Cryptography 91, No. 6, 2273-2307 (2023). MSC: 94D10 11T71 PDFBibTeX XMLCite \textit{X. Du} et al., Des. Codes Cryptography 91, No. 6, 2273--2307 (2023; Zbl 1520.94114) Full Text: DOI
Bartoli, Daniele; Borello, Martino Small strong blocking sets by concatenation. (English) Zbl 1519.51005 SIAM J. Discrete Math. 37, No. 1, 65-82 (2023). Reviewer: Norbert Knarr (Stuttgart) MSC: 51E21 94B05 PDFBibTeX XMLCite \textit{D. Bartoli} and \textit{M. Borello}, SIAM J. Discrete Math. 37, No. 1, 65--82 (2023; Zbl 1519.51005) Full Text: DOI arXiv
Wu, Xia; Lu, Wei; Cao, Xiwang Minimal linear codes constructed from functions. (English) Zbl 1501.94099 Cryptogr. Commun. 14, No. 4, 875-895 (2022). Reviewer: Nikolay Yankov (Shumen) MSC: 94B05 94A62 PDFBibTeX XMLCite \textit{X. Wu} et al., Cryptogr. Commun. 14, No. 4, 875--895 (2022; Zbl 1501.94099) Full Text: DOI arXiv
Pan, Yang Three-weight minimal linear codes. (English) Zbl 1501.94096 Bull. Malays. Math. Sci. Soc. (2) 45, No. 4, 1823-1838 (2022). Reviewer: P. Shakila Banu (Erode) MSC: 94B05 94D10 PDFBibTeX XMLCite \textit{Y. Pan}, Bull. Malays. Math. Sci. Soc. (2) 45, No. 4, 1823--1838 (2022; Zbl 1501.94096) Full Text: DOI
Xu, Guangkui; Qu, Longjiang; Luo, Gaojun Minimal linear codes from weakly regular bent functions. (English) Zbl 1492.94209 Cryptogr. Commun. 14, No. 2, 415-431 (2022). MSC: 94B05 94D10 94A62 PDFBibTeX XMLCite \textit{G. Xu} et al., Cryptogr. Commun. 14, No. 2, 415--431 (2022; Zbl 1492.94209) Full Text: DOI
Alfarano, Gianira N.; Borello, Martino; Neri, Alessandro; Ravagnani, Alberto Three combinatorial perspectives on minimal codes. (English) Zbl 1506.94088 SIAM J. Discrete Math. 36, No. 1, 461-489 (2022). Reviewer: Francesco Pavese (Bari) MSC: 94B05 51E21 51E20 PDFBibTeX XMLCite \textit{G. N. Alfarano} et al., SIAM J. Discrete Math. 36, No. 1, 461--489 (2022; Zbl 1506.94088) Full Text: DOI arXiv
Alfarano, Gianira N.; Borello, Martino; Neri, Alessandro A geometric characterization of minimal codes and their asymptotic performance. (English) Zbl 1482.51005 Adv. Math. Commun. 16, No. 1, 115-133 (2022). Reviewer: Steven T. Dougherty (Scranton) MSC: 51E21 51E20 94B05 PDFBibTeX XMLCite \textit{G. N. Alfarano} et al., Adv. Math. Commun. 16, No. 1, 115--133 (2022; Zbl 1482.51005) Full Text: DOI arXiv
Kurz, Sascha On the number of minimal codewords in codes generated by the adjacency matrix of a graph. (English) Zbl 1501.94089 Discrete Appl. Math. 309, 221-228 (2022). Reviewer: Tsuyoshi Miezaki (Tokyo) MSC: 94B05 05C50 PDFBibTeX XMLCite \textit{S. Kurz}, Discrete Appl. Math. 309, 221--228 (2022; Zbl 1501.94089) Full Text: DOI arXiv Link
Goyal, Rishab; Kim, Sam; Waters, Brent; Wu, David J. Beyond software watermarking: traitor-tracing for pseudorandom functions. (English) Zbl 07684807 Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13092, 250-280 (2021). MSC: 68P25 68Nxx 94A60 PDFBibTeX XMLCite \textit{R. Goyal} et al., Lect. Notes Comput. Sci. 13092, 250--280 (2021; Zbl 07684807) Full Text: DOI
Goyal, Vipul; Song, Yifan; Srinivasan, Akshayaram Traceable secret sharing and applications. (English) Zbl 1487.94154 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 718-747 (2021). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{V. Goyal} et al., Lect. Notes Comput. Sci. 12827, 718--747 (2021; Zbl 1487.94154) Full Text: DOI
Bartoli, Daniele; Bonini, Matteo; Güneş, Burçin An inductive construction of minimal codes. (English) Zbl 1496.94080 Cryptogr. Commun. 13, No. 3, 439-449 (2021). Reviewer: Nikolay Yankov (Shumen) MSC: 94B05 94A62 PDFBibTeX XMLCite \textit{D. Bartoli} et al., Cryptogr. Commun. 13, No. 3, 439--449 (2021; Zbl 1496.94080) Full Text: DOI arXiv
Kim, Sam; Wu, David J. Watermarking cryptographic functionalities from standard lattice assumptions. (English) Zbl 1518.68088 J. Cryptology 34, No. 3, Paper No. 28, 76 p. (2021). MSC: 68P25 68N30 94A60 PDFBibTeX XMLCite \textit{S. Kim} and \textit{D. J. Wu}, J. Cryptology 34, No. 3, Paper No. 28, 76 p. (2021; Zbl 1518.68088) Full Text: DOI
dela Cruz, Romar; Kurz, Sascha On the maximum number of minimal codewords. (English) Zbl 1476.94059 Discrete Math. 344, No. 9, Article ID 112510, 10 p. (2021). Reviewer: Nikolai L. Manev (Sofia) MSC: 94B65 94B05 94A62 PDFBibTeX XMLCite \textit{R. dela Cruz} and \textit{S. Kurz}, Discrete Math. 344, No. 9, Article ID 112510, 10 p. (2021; Zbl 1476.94059) Full Text: DOI arXiv Link
Pace, Nicola; Sonnino, Angelo On the existence of PD-sets: algorithms arising from automorphism groups of codes. (English) Zbl 1464.94074 Adv. Math. Commun. 15, No. 2, 267-277 (2021). MSC: 94B05 94B35 20B25 PDFBibTeX XMLCite \textit{N. Pace} and \textit{A. Sonnino}, Adv. Math. Commun. 15, No. 2, 267--277 (2021; Zbl 1464.94074) Full Text: DOI
Bonini, Matteo; Borello, Martino Minimal linear codes arising from blocking sets. (English) Zbl 1489.94130 J. Algebr. Comb. 53, No. 2, 327-341 (2021). Reviewer: Nikolay Yankov (Shumen) MSC: 94B05 51E21 94B27 94A62 PDFBibTeX XMLCite \textit{M. Bonini} and \textit{M. Borello}, J. Algebr. Comb. 53, No. 2, 327--341 (2021; Zbl 1489.94130) Full Text: DOI arXiv
Lu, Wei; Wu, Xia; Cao, Xiwang The parameters of minimal linear codes. (English) Zbl 1468.94431 Finite Fields Appl. 71, Article ID 101799, 11 p. (2021). MSC: 94B05 PDFBibTeX XMLCite \textit{W. Lu} et al., Finite Fields Appl. 71, Article ID 101799, 11 p. (2021; Zbl 1468.94431) Full Text: DOI arXiv
Bartoli, Daniele; Bonini, Matteo; Timpanella, Marco On the weight distribution of some minimal codes. (English) Zbl 1460.94080 Des. Codes Cryptography 89, No. 3, 471-487 (2021). Reviewer: Nikolay Yankov (Shumen) MSC: 94B05 94A62 51E21 PDFBibTeX XMLCite \textit{D. Bartoli} et al., Des. Codes Cryptography 89, No. 3, 471--487 (2021; Zbl 1460.94080) Full Text: DOI arXiv
Hyun, Jong Yoon; Kim, Hyun Kwang; Wu, Yansheng; Yue, Qin Optimal minimal linear codes from posets. (English) Zbl 1478.94124 Des. Codes Cryptography 88, No. 12, 2475-2492 (2020). MSC: 94B05 06A11 06E30 PDFBibTeX XMLCite \textit{J. Y. Hyun} et al., Des. Codes Cryptography 88, No. 12, 2475--2492 (2020; Zbl 1478.94124) Full Text: DOI arXiv
Goyal, Rishab; Koppula, Venkata; Waters, Brent Collusion resistant traitor tracing from learning with errors. (English) Zbl 1490.68068 SIAM J. Comput. 49, No. 5, STOC18-94-STOC18-241 (2020). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{R. Goyal} et al., SIAM J. Comput. 49, No. 5, STOC18--94-STOC18--241 (2020; Zbl 1490.68068) Full Text: DOI
Xu, Guangkui; Qu, Longjiang; Cao, Xiwang Minimal linear codes from Maiorana-McFarland functions. (English) Zbl 1469.94148 Finite Fields Appl. 65, Article ID 101688, 18 p. (2020). MSC: 94B05 94A62 94C11 PDFBibTeX XMLCite \textit{G. Xu} et al., Finite Fields Appl. 65, Article ID 101688, 18 p. (2020; Zbl 1469.94148) Full Text: DOI
Shi, Zexia; Fu, Fang-Wei Several families of \(q\)-ary minimal linear codes with \(w_{\min}/w_{\max} \leq (q-1)/q\). (English) Zbl 1448.94272 Discrete Math. 343, No. 6, Article ID 111840, 13 p. (2020). MSC: 94B05 94A62 PDFBibTeX XMLCite \textit{Z. Shi} and \textit{F.-W. Fu}, Discrete Math. 343, No. 6, Article ID 111840, 13 p. (2020; Zbl 1448.94272) Full Text: DOI
Tian, Yangguang; Li, Yingjiu; Sengupta, Binanda; Li, Nan; Su, Chunhua Leakage-resilient biometric-based remote user authentication with fuzzy extractors. (English) Zbl 1455.94219 Theor. Comput. Sci. 814, 223-233 (2020). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Tian} et al., Theor. Comput. Sci. 814, 223--233 (2020; Zbl 1455.94219) Full Text: DOI Link
Li, Xia; Yue, Qin Four classes of minimal binary linear codes with \(w_{\mathrm{min}}/w_{\mathrm{max}}<1/2\) derived from Boolean functions. (English) Zbl 1439.11295 Des. Codes Cryptography 88, No. 2, 257-271 (2020). MSC: 11T71 94D10 94B05 PDFBibTeX XMLCite \textit{X. Li} and \textit{Q. Yue}, Des. Codes Cryptography 88, No. 2, 257--271 (2020; Zbl 1439.11295) Full Text: DOI
Goyal, Rishab; Koppula, Venkata; Waters, Brent New approaches to traitor tracing with embedded identities. (English) Zbl 1455.94159 Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11892, 149-179 (2019). MSC: 94A60 05C62 PDFBibTeX XMLCite \textit{R. Goyal} et al., Lect. Notes Comput. Sci. 11892, 149--179 (2019; Zbl 1455.94159) Full Text: DOI
Carrier, Kevin; Tillich, Jean-Pierre Identifying an unknown code by partial Gaussian elimination. (English) Zbl 1421.94090 Des. Codes Cryptography 87, No. 2-3, 685-713 (2019). MSC: 94B05 94B60 PDFBibTeX XMLCite \textit{K. Carrier} and \textit{J.-P. Tillich}, Des. Codes Cryptography 87, No. 2--3, 685--713 (2019; Zbl 1421.94090) Full Text: DOI
Boripan, Arunwan; Jitman, Somphong; Udomkavanich, Patanee Characterization and enumeration of complementary dual abelian codes. (English) Zbl 1414.94931 J. Appl. Math. Comput. 58, No. 1-2, 527-544 (2018). MSC: 94B15 94B05 16S34 PDFBibTeX XMLCite \textit{A. Boripan} et al., J. Appl. Math. Comput. 58, No. 1--2, 527--544 (2018; Zbl 1414.94931) Full Text: DOI arXiv
Trung Dinh; Steinfeld, Ron; Bhattacharjee, Nandita A lattice-based approach to privacy-preserving biometric authentication without relying on trusted third parties. (English) Zbl 1506.94085 Liu, Joseph K. (ed.) et al., Information security practice and experience. 13th international conference, ISPEC 2017, Melbourne, VIC, Australia, December 13–15, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10701, 297-319 (2017). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{Trung Dinh} et al., Lect. Notes Comput. Sci. 10701, 297--319 (2017; Zbl 1506.94085) Full Text: DOI
Puchinger, Sven; Müelich, Sven; Ishak, Karim; Bossert, Martin Code-based cryptosystems using generalized concatenated codes. (English) Zbl 1384.94097 Kotsireas, Ilias S. (ed.) et al., Applications of computer algebra, Kalamata, Greece, July 20–23, 2015. Cham: Springer (ISBN 978-3-319-56930-7/hbk; 978-3-319-56932-1/ebook). Springer Proceedings in Mathematics & Statistics 198, 397-423 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Puchinger} et al., Springer Proc. Math. Stat. 198, 397--423 (2017; Zbl 1384.94097) Full Text: DOI arXiv
Ling, San; Phan, Duong Hieu; Stehlé, Damien; Steinfeld, Ron Hardness of \(k\)-LWE and applications in traitor tracing. (English) Zbl 1405.94074 Algorithmica 79, No. 4, 1318-1352 (2017). MSC: 94A60 68P25 68Q17 PDFBibTeX XMLCite \textit{S. Ling} et al., Algorithmica 79, No. 4, 1318--1352 (2017; Zbl 1405.94074) Full Text: DOI
Boneh, Dan; Zhandry, Mark Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. (English) Zbl 1405.94045 Algorithmica 79, No. 4, 1233-1285 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Boneh} and \textit{M. Zhandry}, Algorithmica 79, No. 4, 1233--1285 (2017; Zbl 1405.94045) Full Text: DOI Link
Abidin, Aysajan On privacy-preserving biometric authentication. (English) Zbl 1379.94050 Chen, Kefei (ed.) et al., Information security and cryptology. 12th international conference, Inscrypt 2016, Beijing, China, November 4–6, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-54704-6/pbk; 978-3-319-54705-3/ebook). Lecture Notes in Computer Science 10143, 169-186 (2017). MSC: 94A62 PDFBibTeX XMLCite \textit{A. Abidin}, Lect. Notes Comput. Sci. 10143, 169--186 (2017; Zbl 1379.94050) Full Text: DOI Link
Tomović, Siniša; Mihaljević, Miodrag J.; Perović, Aleksandar; Ognjanović, Zoran A protocol for provably secure authentication of a tiny entity to a high performance computing one. (English) Zbl 1400.94187 Math. Probl. Eng. 2016, Article ID 9289050, 9 p. (2016). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. Tomović} et al., Math. Probl. Eng. 2016, Article ID 9289050, 9 p. (2016; Zbl 1400.94187) Full Text: DOI
Choosuwan, Parinyawat; Jitman, Somphong; Udomkavanich, Patanee Self-dual abelian codes in some nonprincipal ideal group algebras. (English) Zbl 1400.94196 Math. Probl. Eng. 2016, Article ID 9020173, 12 p. (2016). MSC: 94B50 94B15 94B27 PDFBibTeX XMLCite \textit{P. Choosuwan} et al., Math. Probl. Eng. 2016, Article ID 9020173, 12 p. (2016; Zbl 1400.94196) Full Text: DOI arXiv
Karabina, Koray; Robinson, Angela Revisiting the false acceptance rate attack on biometric visual cryptographic schemes. (English) Zbl 1407.94124 Nascimento, Anderson C. A. (ed.) et al., Information theoretic security. 9th international conference, ICITS 2016, Tacoma, WA, USA, August 9–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10015, 114-125 (2016). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Karabina} and \textit{A. Robinson}, Lect. Notes Comput. Sci. 10015, 114--125 (2016; Zbl 1407.94124) Full Text: DOI
Higo, Haruna; Isshiki, Toshiyuki; Mori, Kengo; Obana, Satoshi Privacy-preserving fingerprint authentication resistant to hill-climbing attacks. (English) Zbl 1396.94105 Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 44-64 (2016). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{H. Higo} et al., Lect. Notes Comput. Sci. 9566, 44--64 (2016; Zbl 1396.94105) Full Text: DOI
Bringer, Julien; Chabanne, Hervé; Lescuyer, Roch; Patey, Alain Hierarchical identities from group signatures and pseudonymous signatures. (English) Zbl 1405.94046 Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 457-469 (2016). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Bringer} et al., Lect. Notes Comput. Sci. 9100, 457--469 (2016; Zbl 1405.94046) Full Text: DOI
Cohen, Gérard; Mesnager, Sihem; Randriam, Hugues Yet another variation on minimal linear codes. (English) Zbl 1352.94089 Adv. Math. Commun. 10, No. 1, 53-61 (2016). MSC: 94B25 94B27 05D40 PDFBibTeX XMLCite \textit{G. Cohen} et al., Adv. Math. Commun. 10, No. 1, 53--61 (2016; Zbl 1352.94089) Full Text: DOI
Cohen, Gérard; Mesnager, Sihem Variations on minimal linear codes. (English) Zbl 1398.94211 Pinto, Raquel (ed.) et al., Coding theory and applications. 4th international castle meeting, ICMCTA, Palmela Castle, Portugal, September 15–18, 2014. Cham: Springer (ISBN 978-3-319-17295-8/hbk; 978-3-319-17296-5/ebook). CIM Series in Mathematical Sciences 3, 125-131 (2015). MSC: 94B05 PDFBibTeX XMLCite \textit{G. Cohen} and \textit{S. Mesnager}, CIM Ser. Math. Sci 3, 125--131 (2015; Zbl 1398.94211) Full Text: DOI
Li, Fengwei Primitive idempotents in group algebras and minimal abelian codes. (English) Zbl 1371.94696 J. Appl. Math. Comput. 49, No. 1-2, 1-11 (2015). MSC: 94B60 16S34 94B05 PDFBibTeX XMLCite \textit{F. Li}, J. Appl. Math. Comput. 49, No. 1--2, 1--11 (2015; Zbl 1371.94696) Full Text: DOI
Mitrokotsa, Aikaterini Authentication in constrained settings. (English) Zbl 1401.94187 Ors, Berna (ed.) et al., Cryptography and information security in the Balkans. First international conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16–17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). Lecture Notes in Computer Science 9024, 3-12 (2015). MSC: 94A62 68P25 94A60 PDFBibTeX XMLCite \textit{A. Mitrokotsa}, Lect. Notes Comput. Sci. 9024, 3--12 (2015; Zbl 1401.94187) Full Text: DOI
Jang-Jaccard, Julian; Nepal, Surya A survey of emerging threats in cybersecurity. (English) Zbl 1310.68031 J. Comput. Syst. Sci. 80, No. 5, 973-993 (2014). MSC: 68M11 68M12 PDFBibTeX XMLCite \textit{J. Jang-Jaccard} and \textit{S. Nepal}, J. Comput. Syst. Sci. 80, No. 5, 973--993 (2014; Zbl 1310.68031) Full Text: DOI
Bernal, José Joaquín; Simón, Juan Jacobo Information sets in abelian codes: defining sets and Groebner basis. (English) Zbl 1315.94119 Des. Codes Cryptography 70, No. 1-2, 175-188 (2014). MSC: 94B05 94B35 PDFBibTeX XMLCite \textit{J. J. Bernal} and \textit{J. J. Simón}, Des. Codes Cryptography 70, No. 1--2, 175--188 (2014; Zbl 1315.94119) Full Text: DOI
Zhao, Wei; Ye, Dingfeng Certificateless undeniable signatures from bilinear maps. (English) Zbl 1248.94100 Inf. Sci. 199, 204-215 (2012). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{W. Zhao} and \textit{D. Ye}, Inf. Sci. 199, 204--215 (2012; Zbl 1248.94100) Full Text: DOI
Krause, Matthias; Hamann, Matthias The cryptographic power of random selection. (English) Zbl 1292.94096 Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 134-150 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Krause} and \textit{M. Hamann}, Lect. Notes Comput. Sci. 7118, 134--150 (2012; Zbl 1292.94096) Full Text: DOI
Park, Jong Hwan; Lee, Dong Hoon Fully collusion-resistant traitor tracing scheme with shorter ciphertexts. (English) Zbl 1233.94022 Des. Codes Cryptography 60, No. 3, 255-276 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{J. H. Park} and \textit{D. H. Lee}, Des. Codes Cryptography 60, No. 3, 255--276 (2011; Zbl 1233.94022) Full Text: DOI
Kiayias, Aggelos On the effects of pirate evolution on the design of digital content distribution systems. (English) Zbl 1272.94042 Chee, Yeow Meng (ed.) et al., Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 – June 3, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20900-0/pbk). Lecture Notes in Computer Science 6639, 223-237 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Kiayias}, Lect. Notes Comput. Sci. 6639, 223--237 (2011; Zbl 1272.94042) Full Text: DOI
van Deursen, Ton; Radomirović, Saša On a new formal proof model for RFID location privacy. (English) Zbl 1209.68248 Inf. Process. Lett. 110, No. 2, 57-61 (2009). MSC: 68P25 PDFBibTeX XMLCite \textit{T. van Deursen} and \textit{S. Radomirović}, Inf. Process. Lett. 110, No. 2, 57--61 (2009; Zbl 1209.68248) Full Text: DOI
Saxena, Amitabh; Soh, Ben A cryptographic primitive based on hidden-order groups. (English) Zbl 1171.94360 J. Math. Cryptol. 3, No. 2, 89-132 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Saxena} and \textit{B. Soh}, J. Math. Cryptol. 3, No. 2, 89--132 (2009; Zbl 1171.94360) Full Text: DOI
Bringer, Julien; Chabanne, Hervé Another look at extended private information retrieval protocols. (English) Zbl 1246.94023 Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 305-322 (2009). MSC: 94A60 68M12 68P20 PDFBibTeX XMLCite \textit{J. Bringer} and \textit{H. Chabanne}, Lect. Notes Comput. Sci. 5580, 305--322 (2009; Zbl 1246.94023) Full Text: DOI
Billet, Olivier; Phan, Duong Hieu Traitors collaborating in public: Pirates 2.0. (English) Zbl 1239.94071 Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 189-205 (2009). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{O. Billet} and \textit{D. H. Phan}, Lect. Notes Comput. Sci. 5479, 189--205 (2009; Zbl 1239.94071) Full Text: DOI
Fu, Wenqing; Feng, Tao On self-orthogonal group ring codes. (English) Zbl 1196.94083 Des. Codes Cryptography 50, No. 2, 203-214 (2009). MSC: 94B15 11T71 94B05 PDFBibTeX XMLCite \textit{W. Fu} and \textit{T. Feng}, Des. Codes Cryptography 50, No. 2, 203--214 (2009; Zbl 1196.94083) Full Text: DOI
Ouafi, Khaled; Overbeck, Raphael; Vaudenay, Serge On the security of HB\(^{\#}\) against a man-in-the-middle attack. (English) Zbl 1206.94084 Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 108-124 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Ouafi} et al., Lect. Notes Comput. Sci. 5350, 108--124 (2008; Zbl 1206.94084) Full Text: DOI
Billet, Olivier; Phan, Duong Hieu Efficient traitor tracing from collusion secure codes. (English) Zbl 1162.94340 Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 171-182 (2008). MSC: 94A60 94B35 PDFBibTeX XMLCite \textit{O. Billet} and \textit{D. H. Phan}, Lect. Notes Comput. Sci. 5155, 171--182 (2008; Zbl 1162.94340) Full Text: DOI
Güneri, Cem; Özbudak, Ferruh Multidimensional cyclic codes and Artin-Schreier type hypersurfaces over finite fields. (English) Zbl 1137.14016 Finite Fields Appl. 14, No. 1, 44-58 (2008). Reviewer: Cicero Carvalho (Uberlandia) MSC: 14G50 14G15 PDFBibTeX XMLCite \textit{C. Güneri} and \textit{F. Özbudak}, Finite Fields Appl. 14, No. 1, 44--58 (2008; Zbl 1137.14016) Full Text: DOI
Weng, Jian; Liu, Shengli; Chen, Kefei Pirate decoder for the broadcast encryption schemes from Crypto 2005. (English) Zbl 1142.94014 Sci. China, Ser. F. 50, No. 3, 318-323 (2007). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Weng} et al., Sci. China, Ser. F 50, No. 3, 318--323 (2007; Zbl 1142.94014) Full Text: DOI
Boneh, Dan; Sahai, Amit; Waters, Brent Fully collusion resistant traitor tracing with short ciphertexts and private keys. (English) Zbl 1140.94326 Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 573-592 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D. Boneh} et al., Lect. Notes Comput. Sci. 4004, 573--592 (2006; Zbl 1140.94326) Full Text: DOI
O’Sullivan, Michael E. The key equation for one-point codes and efficient error evaluation. (English) Zbl 1009.94015 J. Pure Appl. Algebra 169, No. 2-3, 295-320 (2002). Reviewer: Giorgio Faina (Perugia) MSC: 94B27 13P10 14G50 PDFBibTeX XMLCite \textit{M. E. O'Sullivan}, J. Pure Appl. Algebra 169, No. 2--3, 295--320 (2002; Zbl 1009.94015) Full Text: DOI
Naudin, Patrice; Quitté, Claude Univariate polynomial factorization over finite fields. (English) Zbl 0914.11064 Theor. Comput. Sci. 191, No. 1-2, 1-36 (1998). Reviewer: Ian F.Blake (Palo Alto) MSC: 11Y16 11T06 68W30 PDFBibTeX XMLCite \textit{P. Naudin} and \textit{C. Quitté}, Theor. Comput. Sci. 191, No. 1--2, 1--36 (1998; Zbl 0914.11064) Full Text: DOI