Sciweavers

1054 search results - page 29 / 211
» Secret Communication with Feedback
Sort
View
ICITS
2009
14 years 7 months ago
Survey: Leakage Resilience and the Bounded Retrieval Model
Abstract. This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resist...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
CCS
2010
ACM
14 years 10 months ago
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
Qiyan Wang, Prateek Mittal, Nikita Borisov
EUROCRYPT
2007
Springer
15 years 4 months ago
Atomic Secure Multi-party Multiplication with Low Communication
We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
Ronald Cramer, Ivan Damgård, Robbert de Haan
ICC
2008
IEEE
122views Communications» more  ICC 2008»
15 years 4 months ago
Multi-Carrier Transmission with Limited Feedback: Power Loading over Sub-Channel Groups
— Feedback of channel state information (CSI) enables a multi-carrier transmitter to optimize the power allocation across sub-channels. We consider a single user feedback scheme ...
Manish Agarwal, Dongning Guo, Michael L. Honig
PIMRC
2010
IEEE
14 years 7 months ago
Precoding and feedback schemes for a MIMO backhaul link in the presence of interference
The focus of this paper is on the precoding and feedback strategies for a radio backhaul link between an access base station (ABS) and the hub base station (HBS) in the presence of...
Daniel Sacristán-Murga, Antonio Pascual-Ise...