A classification of unimodular lattice wiretap codes in small dimensions F Lin, F Oggier IEEE transactions on information theory 59 (6), 3295-3303, 2013 | 36 | 2013 |
2-and 3-modular lattice wiretap codes in small dimensions F Lin, F Oggier, P Solé Applicable Algebra in Engineering, Communication and Computing 26 (6), 571-590, 2015 | 14 | 2015 |
Coding for wiretap channels F Lin, F Oggier Physical Layer Security in Wireless Communications. Auerbach Publications …, 2013 | 11 | 2013 |
Leakage-resilient secret sharing in non-compartmentalized models F Lin, M Cheraghchi, V Guruswami, R Safavi-Naini, H Wang 1st Conference on Information-Theoretic Cryptography (ITC 2020), 2020 | 10 | 2020 |
Secret key agreement using a virtual wiretap channel S Sharifian, F Lin, R Safavi-Naini IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 10 | 2017 |
Secrecy gain of Gaussian wiretap codes from unimodular lattices F Lin, F Oggier 2011 IEEE Information Theory Workshop, 718-722, 2011 | 9 | 2011 |
Non-malleable secret sharing against affine tampering F Lin, M Cheraghchi, V Guruswami, R Safavi-Naini, H Wang arXiv preprint arXiv:1902.06195, 2019 | 8 | 2019 |
Secret sharing with binary shares F Lin, M Cheraghchi, V Guruswami, R Safavi-Naini, H Wang arXiv preprint arXiv:1808.02974, 2018 | 8 | 2018 |
Construction and Secrecy Gain of a Family of 5-modular Lattices X Hou, F Lin, F Oggier 2014 IEEE Information Theory Workshop (ITW 2014), 117-121, 2014 | 8 | 2014 |
Hash-then-encode: A modular semantically secure wiretap code S Sharifian, F Lin, R Safavi-Naini International Worskhop on Communication Security, 49-63, 2017 | 7 | 2017 |
Detecting algebraic manipulation in leaky storage systems F Lin, R Safavi-Naini, P Wang International Conference on Information Theoretic Security, 129-150, 2016 | 6 | 2016 |
Gaussian wiretap lattice codes from binary self-dual codes F Lin, F Oggier 2012 IEEE Information Theory Workshop, 662-666, 2012 | 6 | 2012 |
Erasure adversarial wiretap channels P Wang, R Safavi-Naini, F Lin 2015 53rd Annual Allerton Conference on Communication, Control, and …, 2015 | 5 | 2015 |
Constructions of binary array set with zero-correlation zone P Ke, S Zhang, F Lin Information Sciences 197, 197-206, 2012 | 5 | 2012 |
Leakage-resilient non-malleable secret sharing in non-compartmentalized models F Lin, M Cheraghchi, V Guruswami, R Safavi-Naini, H Wang arXiv preprint arXiv:1902.06195, 2019 | 4 | 2019 |
Constructions of binary sequences with optimal autocorrelation value P Ke, F Lin Electronics letters 46 (20), 1, 2010 | 4 | 2010 |
Lattice Coding for the Gaussian Wiretap Channel—A Study of the Secrecy Gain F Lin NTU PhD Thesis 8, 2013 | 3 | 2013 |
Secrecy gain of Gaussian wiretap codes from 2-and 3-modular lattices F Lin, F Oggier 2012 IEEE International Symposium on Information Theory Proceedings, 1747-1751, 2012 | 3 | 2012 |
Threshold changeable ramp secret sharing F Lin, S Ling, H Wang, N Zeng International Conference on Cryptology and Network Security, 308-327, 2019 | 2 | 2019 |
Non-malleable codes with leakage and applications to secure communication F Lin, R Safavi-Naini, M Cheraghchi, H Wang arXiv preprint arXiv:1708.05462, 2017 | 2 | 2017 |