Follow
FUCHUN LIN
FUCHUN LIN
Postdoc at University of Calgary
Verified email at e.ntu.edu.sg - Homepage
Title
Cited by
Cited by
Year
A classification of unimodular lattice wiretap codes in small dimensions
F Lin, F Oggier
IEEE transactions on information theory 59 (6), 3295-3303, 2013
412013
2-and 3-modular lattice wiretap codes in small dimensions
F Lin, F Oggier, P Solé
Applicable Algebra in Engineering, Communication and Computing 26, 571-590, 2015
162015
Quantum-safe cryptography: crossroads of coding theory and cryptography
J Wang, L Liu, S Lyu, Z Wang, M Zheng, F Lin, Z Chen, L Yin, X Wu, ...
Science China Information Sciences 65 (1), 111301, 2022
152022
Leakage-resilient secret sharing in non-compartmentalized models
F Lin, M Cheraghchi, V Guruswami, R Safavi-Naini, H Wang
1st Conference on Information-Theoretic Cryptography (ITC 2020), 2020
142020
Secret key agreement using a virtual wiretap channel
S Sharifian, F Lin, R Safavi-Naini
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
132017
Coding for wiretap channels
F Lin, F Oggier
Physical Layer Security in Wireless Communications. Auerbach Publications …, 2013
122013
Secret sharing with binary shares
F Lin, M Cheraghchi, V Guruswami, R Safavi-Naini, H Wang
arXiv preprint arXiv:1808.02974, 2018
112018
Gaussian wiretap lattice codes from binary self-dual codes
F Lin, F Oggier
2012 IEEE Information Theory Workshop, 662-666, 2012
112012
Hash-then-encode: A modular semantically secure wiretap code
S Sharifian, F Lin, R Safavi-Naini
Proceedings of the 2nd Workshop on Communication Security: Cryptography and …, 2018
92018
Secrecy gain of Gaussian wiretap codes from unimodular lattices
F Lin, F Oggier
2011 IEEE Information Theory Workshop, 718-722, 2011
92011
Non-malleable secret sharing against affine tampering
F Lin, M Cheraghchi, V Guruswami, R Safavi-Naini, H Wang
CoRR, abs/1902.06195, 2019
82019
Construction and secrecy gain of a family of 5-modular lattices
X Hou, F Lin, F Oggier
2014 IEEE Information Theory Workshop (ITW 2014), 117-121, 2014
82014
Detecting algebraic manipulation in leaky storage systems
F Lin, R Safavi-Naini, P Wang
International Conference on Information Theoretic Security, 129-150, 2016
72016
Constructions of binary array set with zero-correlation zone
P Ke, S Zhang, F Lin
Information Sciences 197, 197-206, 2012
62012
Erasure adversarial wiretap channels
P Wang, R Safavi-Naini, F Lin
2015 53rd Annual Allerton Conference on Communication, Control, and …, 2015
52015
Leakage-resilient non-malleable secret sharing in non-compartmentalized models
F Lin, M Cheraghchi, V Guruswami, R Safavi-Naini, H Wang
arXiv preprint arXiv:1902.06195, 2019
42019
Threshold changeable ramp secret sharing
F Lin, S Ling, H Wang, N Zeng
Cryptology and Network Security: 18th International Conference, CANS 2019 …, 2019
42019
Secrecy gain, flatness factor, and secrecy-goodness of even unimodular lattices
F Lin, C Ling, JC Belfiore
2014 IEEE International Symposium on Information Theory, 971-975, 2014
42014
Constructions of binary sequences with optimal autocorrelation value
P Ke, F Lin
Electronics letters 46 (20), 1, 2010
42010
Optimal threshold changeable secret sharing with new threshold change range
J Ding, C Lin, F Lin
Provable and Practical Security: 14th International Conference, ProvSec 2020 …, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20