@article{DA_2011_18_3_a2,
author = {V. M. Deundyak and V. V. Mkrtichan},
title = {Research of applying bounds of the information protection scheme based on {PS-codes}},
journal = {Diskretnyj analiz i issledovanie operacij},
pages = {21--38},
year = {2011},
volume = {18},
number = {3},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/DA_2011_18_3_a2/}
}
TY - JOUR AU - V. M. Deundyak AU - V. V. Mkrtichan TI - Research of applying bounds of the information protection scheme based on PS-codes JO - Diskretnyj analiz i issledovanie operacij PY - 2011 SP - 21 EP - 38 VL - 18 IS - 3 UR - http://geodesic.mathdoc.fr/item/DA_2011_18_3_a2/ LA - ru ID - DA_2011_18_3_a2 ER -
V. M. Deundyak; V. V. Mkrtichan. Research of applying bounds of the information protection scheme based on PS-codes. Diskretnyj analiz i issledovanie operacij, Tome 18 (2011) no. 3, pp. 21-38. http://geodesic.mathdoc.fr/item/DA_2011_18_3_a2/
[1] Deundyak V. M., Mkrtichyan V. V., “Matematicheskaya model effektivnoi skhemy spetsialnogo shirokoveschatelnogo shifrovaniya i issledovanie granits eë primeneniya”, Izv. vuzov. Severo-Kavkazskii region. Estestv. nauki, 2009, no. 1, 5–8 | Zbl
[2] Kabatyanskii G. A., “Kody dlya zaschity avtorskikh prav: sluchai dvukh piratov”, Problemy peredachi informatsii, 41:2 (2005), 123–127 | MR | Zbl
[3] Mkrtichyan V. V., “Kompyuternaya model skhemy spetsialnogo shirokoveschatelnogo shifrovaniya na osnove kodov Rida–Solomona i spisochnogo dekodera Gurusvami–Sudana”, Mat. IX mezhdunarodnoi nauchno-prakticheskoi konf. “Informatsionnaya bezopasnost”, v. 2, YuFU, Taganrog, 2007, 111–115
[4] Mkrtichyan V. V., “Kompyuternye modeli spisochnykh dekoderov Gurusvami–Sudana dlya obobschënnykh kodov Rida–Solomona i konkatenirovannykh kodov”, Vestn. DGTU, 7:4 (2007), 384–394
[5] Mkrtichyan V. V., “Ob eksperimentalnom issledovanii nadezhnosti i primenenii skhemy spetsialnogo shirokoveschatelnogo shifrovaniya”, Izv. YuFU. Tekhn. nauki, 2008, no. 8, 203–210
[6] Sidelnikov V. M., Teoriya kodirovaniya, Fizmatlit, M., 2008, 324 pp.
[7] Shnaier B., Prikladnaya kriptografiya. Protokoly, algoritmy, iskhodnye teksty na yazyke Si, Triumf, M., 2002, 816 pp.
[8] Barg A., Blakley G. R., Kabatiansky G. A., “Digital fingerprinting codes: problem statements, constructions, identification of traitors”, IEEE Trans. Inf. Theory, 49 (2003), 852–865 | DOI | MR | Zbl
[9] Chor B., Fiat A., Naor M., “Tracing traitors”, Proc. Advances in cryptology (Crypto' 94), Lect. Notes Comp. Sci., 839, 1994, 257–270 | Zbl
[10] Guruswami V., List decoding of error-correcting codes, Springer-Verl., New York, 2005, 350 pp.
[11] Silverberg A., Staddon J., Walker J., “Application of list decoding to tracing traitors”, Proc. Advances in cryptology (ASIACRYPT 2001), Lect. Notes Comp. Sci., 2248, 2001, 175–192 | MR | Zbl
[12] Staddon J. N., Stinson D. R., Wei R., “Combinatorial properties of frameproof and traceability codes”, IEEE Trans. Inf. Theory, 47 (2001), 1042–1049 | DOI | MR | Zbl