Author:
Ahmadi Hadi,Safavi-Naini Reihaneh
Publisher
Springer International Publishing
Reference13 articles.
1. Ahmadi, H., Safavi-Naini, R.: Detection of Algebraic Manipulation in the Presence of Leakage. Cryptology ePrint Archive, Report 2013/637 (2013)
2. Capkun, S., Cagalj, M., Rengaswamy, R.K., Tsigkogiannis, I., Hubaux, J.P., Srivastava, M.: Integrity codes: message integrity protection and authentication over insecure channels. IEEE Trans. Dependable Secure Comput. 5(4), 208–223 (2008)
3. Cramer, R., Dodis, Y., Fehr, S., Padró, C., Wichs, D.: Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 471–488. Springer, Heidelberg (2008)
4. Davis, P.J.: Circulant Matrices. Chelsea Publishing Company, New York (1994)
5. Dolev, D., Yao, A.: On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–208 (1983)
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献