A classification of unimodular lattice wiretap codes in small dimensions F Lin, F Oggier IEEE transactions on information theory 59 (6), 3295-3303, 2013 | 41 | 2013 |
Quantum-safe cryptography: crossroads of coding theory and cryptography J Wang, L Liu, S Lyu, Z Wang, M Zheng, F Lin, Z Chen, L Yin, X Wu, ... Science China Information Sciences 65 (1), 111301, 2022 | 20 | 2022 |
Leakage-resilient secret sharing in non-compartmentalized models F Lin, M Cheraghchi, V Guruswami, R Safavi-Naini, H Wang 1st Conference on Information-Theoretic Cryptography (ITC 2020), 2020 | 16 | 2020 |
2-and 3-modular lattice wiretap codes in small dimensions F Lin, F Oggier, P Solé Applicable Algebra in Engineering, Communication and Computing 26, 571-590, 2015 | 16 | 2015 |
Secret key agreement using a virtual wiretap channel S Sharifian, F Lin, R Safavi-Naini IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017 | 14 | 2017 |
Secret sharing with binary shares F Lin, M Cheraghchi, V Guruswami, R Safavi-Naini, H Wang arXiv preprint arXiv:1808.02974, 2018 | 12 | 2018 |
Coding for wiretap channels F Lin, F Oggier Physical Layer Security in Wireless Communications. Auerbach Publications …, 2013 | 12 | 2013 |
Gaussian wiretap lattice codes from binary self-dual codes F Lin, F Oggier 2012 IEEE Information Theory Workshop, 662-666, 2012 | 11 | 2012 |
Hash-then-encode: A modular semantically secure wiretap code S Sharifian, F Lin, R Safavi-Naini Proceedings of the 2nd Workshop on Communication Security: Cryptography and …, 2018 | 10 | 2018 |
Non-malleable secret sharing against affine tampering F Lin, M Cheraghchi, V Guruswami, R Safavi-Naini, H Wang CoRR, abs/1902.06195, 2019 | 9 | 2019 |
Secrecy gain of Gaussian wiretap codes from unimodular lattices F Lin, F Oggier 2011 IEEE Information Theory Workshop, 718-722, 2011 | 9 | 2011 |
Construction and secrecy gain of a family of 5-modular lattices X Hou, F Lin, F Oggier 2014 IEEE Information Theory Workshop (ITW 2014), 117-121, 2014 | 8 | 2014 |
Detecting algebraic manipulation in leaky storage systems F Lin, R Safavi-Naini, P Wang International Conference on Information Theoretic Security, 129-150, 2016 | 7 | 2016 |
Constructions of binary array set with zero-correlation zone P Ke, S Zhang, F Lin Information Sciences 197, 197-206, 2012 | 6 | 2012 |
Erasure adversarial wiretap channels P Wang, R Safavi-Naini, F Lin 2015 53rd Annual Allerton Conference on Communication, Control, and …, 2015 | 5 | 2015 |
Leakage-resilient non-malleable secret sharing in non-compartmentalized models F Lin, M Cheraghchi, V Guruswami, R Safavi-Naini, H Wang arXiv preprint arXiv:1902.06195, 2019 | 4 | 2019 |
Threshold changeable ramp secret sharing F Lin, S Ling, H Wang, N Zeng Cryptology and Network Security: 18th International Conference, CANS 2019 …, 2019 | 4 | 2019 |
Secrecy gain, flatness factor, and secrecy-goodness of even unimodular lattices F Lin, C Ling, JC Belfiore 2014 IEEE International Symposium on Information Theory, 971-975, 2014 | 4 | 2014 |
Constructions of binary sequences with optimal autocorrelation value P Ke, F Lin Electronics letters 46 (20), 1, 2010 | 4 | 2010 |
Optimal threshold changeable secret sharing with new threshold change range J Ding, C Lin, F Lin Provable and Practical Security: 14th International Conference, ProvSec 2020 …, 2020 | 3 | 2020 |