메뉴 건너뛰기




Volumn 7412 LNCS, Issue , 2012, Pages 1-13

Guessing secrecy

Author keywords

Guessing secrecy; imperfect randomness; Information theoretic security; perfect secrecy; randomness

Indexed keywords

GUESSING SECRECY; IMPERFECT RANDOMNESS; INFORMATION-THEORETIC SECURITY; PERFECT SECRECY; RANDOMNESS;

EID: 84865014320     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-32284-6_1     Document Type: Conference Paper
Times cited : (17)

References (19)
  • 1
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal 28, 656-715 (1949)
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.1
  • 2
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355-1367 (1975)
    • (1975) Bell Syst. Tech. J. , vol.54 , Issue.8 , pp. 1355-1367
    • Wyner, A.D.1
  • 3
    • 0026698501 scopus 로고
    • Conditionally-perfect secrecy and a provably-secure randomized cipher
    • Maurer, U.M.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. Cryptol. 5(1), 53-66 (1992)
    • (1992) J. Cryptol. , vol.5 , Issue.1 , pp. 53-66
    • Maurer, U.M.1
  • 4
    • 84977114496 scopus 로고
    • On the Impossibility of Private Key Cryptography with Weakly Random Keys
    • Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. Springer, Heidelberg
    • McInnes, J.L., Pinkas, B.: On the Impossibility of Private Key Cryptography with Weakly Random Keys. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 421-435. Springer, Heidelberg (1991)
    • (1991) LNCS , vol.537 , pp. 421-435
    • McInnes, J.L.1    Pinkas, B.2
  • 7
    • 38049035373 scopus 로고    scopus 로고
    • Does Privacy Require True Randomness?
    • Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
    • Bosley, C., Dodis, Y.: Does Privacy Require True Randomness? In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 1-20. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4392 , pp. 1-20
    • Bosley, C.1    Dodis, Y.2
  • 8
    • 84947270656 scopus 로고    scopus 로고
    • How to Fool an Unbounded Adversary with a Short Key
    • Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
    • Russell, A., Wang, H.: How to Fool an Unbounded Adversary with a Short Key. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 133-148. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2332 , pp. 133-148
    • Russell, A.1    Wang, H.2
  • 9
    • 24144460521 scopus 로고    scopus 로고
    • Entropic Security and the Encryption of High Entropy Messages
    • Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
    • Dodis, Y., Smith, A.: Entropic Security and the Encryption of High Entropy Messages. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 556-577. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3378 , pp. 556-577
    • Dodis, Y.1    Smith, A.2
  • 10
    • 84958598231 scopus 로고    scopus 로고
    • Unconditional Security against Memory-Bounded Adversaries
    • Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
    • Cachin, C., Maurer, U.M.: Unconditional Security against Memory-Bounded Adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 292-306. Springer, Heidelberg (1997)
    • (1997) LNCS , vol.1294 , pp. 292-306
    • Cachin, C.1    Maurer, U.M.2
  • 11
    • 84957084138 scopus 로고    scopus 로고
    • Information Theoretically Secure Communication in the Limited Storage Space Model
    • Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
    • Aumann, Y., Rabin, M.O.: Information Theoretically Secure Communication in the Limited Storage Space Model. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 65-79. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1666 , pp. 65-79
    • Aumann, Y.1    Rabin, M.O.2
  • 12
    • 84937431717 scopus 로고    scopus 로고
    • Hyper-Encryption and Everlasting Security
    • Alt, H., Ferreira, A. (eds.) STACS 2002. Springer, Heidelberg
    • Ding, Y.Z., Rabin, M.O.: Hyper-Encryption and Everlasting Security. In: Alt, H., Ferreira, A. (eds.) STACS 2002. LNCS, vol. 2285, pp. 1-26. Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2285 , pp. 1-26
    • Ding, Y.Z.1    Rabin, M.O.2
  • 13
    • 84856043672 scopus 로고
    • A mathematical theory of communication
    • Shannon, C.: A mathematical theory of communication. Bell System Technical Journal 27, 379-423 (1948)
    • (1948) Bell System Technical Journal , vol.27 , pp. 379-423
    • Shannon, C.1
  • 14
    • 84889281816 scopus 로고
    • 2nd edn. Wiley Series in Telecommunications. John Wiley & Sons, Inc.
    • Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley Series in Telecommunications. John Wiley & Sons, Inc. (1991)
    • (1991) Elements of Information Theory
    • Cover, T.M.1    Thomas, J.A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.