Information-theoretic security

Results: 33



#Item
11Random oracle / Relational database management systems / Cross-platform software / Oracle Database / Cryptography / Software / Cryptographic hash functions

Towards Information-theoretic Security Proofs in EasyCrypt for Multi-party Protocols Alley Stoughton IACR School on Computer-aided Cryptography University of Maryland

Add to Reading List

Source URL: www.easycrypt.info

Language: English - Date: 2015-06-04 11:02:41
12Computational hardness assumption / Ciphertext indistinguishability / Computer security / Cyberwarfare / Science / Cryptography / Cryptographic primitive / Information-theoretic security

Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

Add to Reading List

Source URL: csf2012.seas.harvard.edu

Language: English - Date: 2012-07-05 18:15:11
13Cryptography / Mathematics / Secure multi-party computation / Function / Communications protocol / Security parameter / Cryptographic primitive / Secure two-party computation / Cryptographic protocols / Data / Information

Towards a Game Theoretic View of Secure Computation Gilad Asharov∗ Ran Canetti†

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2015-07-03 05:13:02
14

Unconditional security Speaker: Junji SHIKATA 1. Introduction I focus on the topics on unconditional (or information-theoretic) cryptography. Informally, unconditional security means the security which is guaranteed agai

Add to Reading List

Source URL: www.jsps.go.jp

- Date: 2008-03-13 01:49:24
    15

    Information-Theoretic Security Analysis of Physical Uncloneable Functions ˇ P. Tuyls, B. Skori´ c, S. Stallinga, A.H.M. Akkermans, and W. Ophey Philips Research Laboratories, Prof. Holstlaan 4,

    Add to Reading List

    Source URL: homepage.tudelft.nl

    Language: English - Date: 2007-06-06 04:19:06
      16Cryptography / One-time pad / MIMO / Information-theoretic security / IEEE 802.11n-2009 / Information / Telecommunications engineering / Applied mathematics / Information theory / Radio resource management / IEEE 802

      Fundamental Limits on Information Security and Privacy

      Add to Reading List

      Source URL: viterbi.usc.edu

      Language: English - Date: 2015-03-27 03:02:27
      17Secure multi-party computation / Standard model / Homomorphic encryption / Pseudorandom generator / Cryptographic primitive / Commitment scheme / Information-theoretic security / Goldwasser–Micali cryptosystem / Secret sharing / Cryptography / Cryptographic protocols / Electronic commerce

      Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-04-14 07:10:50
      18Universal composability / Secure multi-party computation / Information-theoretic security / Zero-knowledge proof / Communications protocol / Actor model / Cryptography / Cryptographic protocols / Secure two-party computation

      Information-Theoretically Secure Protocols and Security Under Composition∗ Eyal Kushilevitz† Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel.

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2009-12-20 09:14:45
      19PUF / Scattering / Speckle pattern / Light scattering / Challenge-response authentication / Information theory / Physics / Physical Unclonable Function / Randomness

      Information-Theoretic Security Analysis of Physical Uncloneable Functions  c, S. Stallinga, A.H.M. Akkermans, W. Ophey P. Tuyls, B. Skori Philips Research Laboratories, Prof. Holstlaan 4,

      Add to Reading List

      Source URL: members.home.nl

      Language: English - Date: 2008-12-09 00:54:27
      20Probability theory / Probability and statistics / Randomness / Entropy / Statistical theory / Independence / Min-entropy / Conditioning / Mutual information / Information theory / Statistics / Mathematical analysis

      An extended abstract of this paper is published in the proceedings of the 8th International Conference on Information-Theoretic Security—ICITSThis is the full version. The Chaining Lemma and its Application Ivan

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-02-18 05:36:30
      UPDATE