Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Physical layer security for next generation wireless networks: Theories, technologies, and challenges
Physical layer security (PHY-security) takes the advantages of channel randomness nature
of transmission media to achieve communication confidentiality and authentication. Wiretap …
of transmission media to achieve communication confidentiality and authentication. Wiretap …
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
Recently, there has been great interest in physical layer security techniques that exploit the
randomness of wireless channels for securely extracting cryptographic keys. Several …
randomness of wireless channels for securely extracting cryptographic keys. Several …
Secret key generation exploiting channel characteristics in wireless communications
Due to the broadcast nature of wireless channels, wireless communication is vulnerable to
eavesdrop**, message modification, and node impersonation. Securing the wireless …
eavesdrop**, message modification, and node impersonation. Securing the wireless …
Leakage-resilient public-key cryptography in the bounded-retrieval model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an
attacker can repeatedly and adaptively learn information about the secret key, subject only …
attacker can repeatedly and adaptively learn information about the secret key, subject only …
Reusable fuzzy extractors for low-entropy distributions
Fuzzy extractors (Dodis et al., in Advances in cryptology—EUROCRYPT 2014, Springer,
Berlin, 2014, pp 93–110) convert repeated noisy readings of a secret into the same …
Berlin, 2014, pp 93–110) convert repeated noisy readings of a secret into the same …
Two source extractors for asymptotically optimal entropy, and (many) more
X Li - 2023 IEEE 64th Annual Symposium on Foundations of …, 2023 - ieeexplore.ieee.org
A long line of work in the past two decades or so established close connections between
several different pseudorandom objects and applications, including seeded or seedless non …
several different pseudorandom objects and applications, including seeded or seedless non …
Position-based quantum cryptography: Impossibility and constructions
In this work, we study position-based cryptography in the quantum setting. The aim is to use
the geographical position of a party as its only credential. On the negative side, we show that …
the geographical position of a party as its only credential. On the negative side, we show that …
Improved non-malleable extractors, non-malleable codes and independent source extractors
X Li - Proceedings of the 49th Annual ACM SIGACT …, 2017 - dl.acm.org
In this paper we give improved constructions of several central objects in the literature of
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …
randomness extraction and tamper-resilient cryptography. Our main results are:(1) An …
Robust fuzzy extractors and authenticated key agreement from close secrets
Consider two parties holding correlated random variables W and W′, respectively, that are
within distance t of each other in some metric space. These parties wish to agree on a …
within distance t of each other in some metric space. These parties wish to agree on a …
Computational fuzzy extractors
Fuzzy extractors derive strong keys from noisy sources. Their security is usually defined
information-theoretically, with gaps between known negative results, existential …
information-theoretically, with gaps between known negative results, existential …