-
1
-
-
84890522850
-
Communication theory of secrecy systems
-
Shannon, C.: Communication theory of secrecy systems. Bell System Technical Journal 28, 656-715 (1949)
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.1
-
2
-
-
0016562514
-
The wire-tap channel
-
Wyner, A.D.: The wire-tap channel. Bell Syst. Tech. J. 54(8), 1355-1367 (1975)
-
(1975)
Bell Syst. Tech. J.
, vol.54
, Issue.8
, pp. 1355-1367
-
-
Wyner, A.D.1
-
3
-
-
0026698501
-
Conditionally-perfect secrecy and a provably-secure randomized cipher
-
Maurer, U.M.: Conditionally-perfect secrecy and a provably-secure randomized cipher. J. Cryptol. 5(1), 53-66 (1992)
-
(1992)
J. Cryptol.
, vol.5
, Issue.1
, pp. 53-66
-
-
Maurer, U.M.1
-
4
-
-
84977114496
-
On the Impossibility of Private Key Cryptography with Weakly Random Keys
-
Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. Springer, Heidelberg
-
McInnes, J.L., Pinkas, B.: On the Impossibility of Private Key Cryptography with Weakly Random Keys. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 421-435. Springer, Heidelberg (1991)
-
(1991)
LNCS
, vol.537
, pp. 421-435
-
-
McInnes, J.L.1
Pinkas, B.2
-
5
-
-
0036957025
-
On the (non)universality of the one-time pad
-
IEEE Computer Society, Washington, DC
-
Dodis, Y., Spencer, J.: On the (non)universality of the one-time pad. In: Proceedings of the 43rd Symposium on Foundations of Computer Science, FOCS 2002, pp. 376-388. IEEE Computer Society, Washington, DC (2002)
-
(2002)
Proceedings of the 43rd Symposium on Foundations of Computer Science, FOCS 2002
, pp. 376-388
-
-
Dodis, Y.1
Spencer, J.2
-
6
-
-
17744370165
-
On the (im)possibility of cryptography with imperfect randomness
-
IEEE Computer Society, Washington, DC
-
Dodis, Y., Ong, S.J., Prabhakaran, M., Sahai, A.: On the (im)possibility of cryptography with imperfect randomness. In: Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science, pp. 196-205. IEEE Computer Society, Washington, DC (2004)
-
(2004)
Proceedings of the 45th Annual IEEE Symposium on Foundations of Computer Science
, pp. 196-205
-
-
Dodis, Y.1
Ong, S.J.2
Prabhakaran, M.3
Sahai, A.4
-
7
-
-
38049035373
-
Does Privacy Require True Randomness?
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Bosley, C., Dodis, Y.: Does Privacy Require True Randomness? In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 1-20. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 1-20
-
-
Bosley, C.1
Dodis, Y.2
-
8
-
-
84947270656
-
How to Fool an Unbounded Adversary with a Short Key
-
Knudsen, L.R. (ed.) EUROCRYPT 2002. Springer, Heidelberg
-
Russell, A., Wang, H.: How to Fool an Unbounded Adversary with a Short Key. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 133-148. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2332
, pp. 133-148
-
-
Russell, A.1
Wang, H.2
-
9
-
-
24144460521
-
Entropic Security and the Encryption of High Entropy Messages
-
Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
-
Dodis, Y., Smith, A.: Entropic Security and the Encryption of High Entropy Messages. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 556-577. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 556-577
-
-
Dodis, Y.1
Smith, A.2
-
10
-
-
84958598231
-
Unconditional Security against Memory-Bounded Adversaries
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Cachin, C., Maurer, U.M.: Unconditional Security against Memory-Bounded Adversaries. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 292-306. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 292-306
-
-
Cachin, C.1
Maurer, U.M.2
-
11
-
-
84957084138
-
Information Theoretically Secure Communication in the Limited Storage Space Model
-
Wiener, M. (ed.) CRYPTO 1999. Springer, Heidelberg
-
Aumann, Y., Rabin, M.O.: Information Theoretically Secure Communication in the Limited Storage Space Model. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 65-79. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 65-79
-
-
Aumann, Y.1
Rabin, M.O.2
-
12
-
-
84937431717
-
Hyper-Encryption and Everlasting Security
-
Alt, H., Ferreira, A. (eds.) STACS 2002. Springer, Heidelberg
-
Ding, Y.Z., Rabin, M.O.: Hyper-Encryption and Everlasting Security. In: Alt, H., Ferreira, A. (eds.) STACS 2002. LNCS, vol. 2285, pp. 1-26. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2285
, pp. 1-26
-
-
Ding, Y.Z.1
Rabin, M.O.2
-
13
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C.: A mathematical theory of communication. Bell System Technical Journal 27, 379-423 (1948)
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.1
-
14
-
-
84889281816
-
-
2nd edn. Wiley Series in Telecommunications. John Wiley & Sons, Inc.
-
Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2nd edn. Wiley Series in Telecommunications. John Wiley & Sons, Inc. (1991)
-
(1991)
Elements of Information Theory
-
-
Cover, T.M.1
Thomas, J.A.2
-
17
-
-
0025564929
-
General weak random sources
-
IEEE Computer Society, Washington, DC
-
Zuckerman, D.: General weak random sources. In: Proceedings of the 31st Annual Symposium on Foundations of Computer Science, SFCS 1990, vol. 2, pp. 534-543. IEEE Computer Society, Washington, DC (1990)
-
(1990)
Proceedings of the 31st Annual Symposium on Foundations of Computer Science, SFCS 1990
, vol.2
, pp. 534-543
-
-
Zuckerman, D.1
|