Abstract. This survey paper studies recent advances in the field of LeakageResilient Cryptography. This booming area is concerned with the design of cryptographic primitives resist...
The ability to locate random relays is a key challenge for peer-to-peer (P2P) anonymous communication systems. Earlier attempts like Salsa and AP3 used distributed hash table look...
We consider the standard secure multi-party multiplication protocol due to M. Rabin. This protocol is based on Shamir’s secret sharing scheme and it can be viewed as a practical ...
— Feedback of channel state information (CSI) enables a multi-carrier transmitter to optimize the power allocation across sub-channels. We consider a single user feedback scheme ...
The focus of this paper is on the precoding and feedback strategies for a radio backhaul link between an access base station (ABS) and the hub base station (HBS) in the presence of...